HPC OpenStack Private Cloud Hosting
High-Performance Compute (HPC) Cloud hosting: deploy and run compute-intensive software on CPU, GPU and FPGA. Storage services and private network connectivity also available. Using optimised-OpenStack environment with configurable cluster management. Ideally suited for research computation and spinning up Virtual Machines (VM's) quickly.
Features
- OpenStack powered IaaS platform with full API access and support
- Deploy VM's or dedicated bare metal servers
- Centralised application repository: install any applications network-wide
- CPU, GPU and FPGA compute processing.
- Integrate leading storage technologies.
- Automated provisioning, loading and removal of cloud servers.
- UK-based Managed Service team for rapid response.
- Global data centre reach or cross-site integration.
- Optional: on-premise cloud appliance integration
- Optional: low-latency, secure, fibre private network
Benefits
- Easy administration: management portal for all admin tasks.
- Save time: quick provisioning and automation tools.
- Performance-optimised: achieving 98% RAW performance on Virtual Machines (VM)
- Multi-disciplinary research: use VM's for team workflows.
- Lab-quality environment: create and save containerised environments.
- Tailoring: solution designed around your unique requirements.
- Resilient design: solution designed for High Availability (HA).
- Secure access: from any authorised user device.
- Strong support: from hardware to tool containerisaiton and migration.
- Cost effective: short-term, leasing, OpEx and CapEx.
Pricing
£0.03 a unit
- Education pricing available
- Free trial available
Service documents
Framework
G-Cloud 12
Service ID
6 5 1 1 4 5 0 0 2 2 8 7 9 0 0
Contact
BIOS IT
Joseph Ball
Telephone: 0203 178 6467
Email: tenders@bios-it.com
Service scope
- Service constraints
- HPC Cloud Hosting includes an optimised OpenStack cloud platform, CentOS 7, Slurm cluster management, and Ceph storage as standard. All hosted on private, dedicated hardware. All applications, tools, backup storage, and user permissions system are outside of standard scope of work, but can be included for additional cost.
- System requirements
-
- Operating System (OS) includes Linux CentOS 7.
- Other open source OS available on request (Ubuntu).
- Cluster Manangement Software (CMS) includes Slurm or others available.
- CMS commercial licences additional cost or customer-supplied.
- Application and tool licences not included, to be customer-supplied.
- Application and tool migration and containerisation support for additional cost.
- Dedicated, private, 'dark fibre' network connection for additional cost.
- User and group permissions configuration (Active Directory) for additional cost.
- Firewall services and hardware for additional cost.
- Backup services for additional cost.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times dependant on Service Level chosen: Gold – 24x7 Support, with a 4-Hour Fix; Silver – 9-to-5 (Weekday) Support, with a Next Business Day Fix; Bronze – 9-to-5 (Weekday) Support, with a 10-day Fix.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
BIOS IT offers three core support levels - Gold, Silver and Bronze. Depending on level chosen, services include:
Technicians on-site for diagnostics, support, and as needed hardware repair and/or replacement assistance.
24x7 online support portal with access to tracking tool for bug reporting and issue resolution, knowledge base materials and troubleshooting information.
24x5 (Monday – Friday) call centre telephone assistance for service requests (English only).
9 AM – 5.30 PM normal business hours (UK) telephone technical assistance where technicians assist with Product troubleshooting (English only).
Support requests: all support requests are categorised according to priority, with highest priority demanding a quicker resolution. Priority 1 (critical) is any major failure impacting full site or full service. Priority 2 (high) for when the service is degraded, but remains operational. Priority 3 (normal) for when service is fully operational but the customer requires enhancement, bugfix or modification. Priority 4 (low) is for non-production requirements. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide a community portal where videos and tutorials are provided to assist users with service on-boarding. In addition to this we also provide a full professional on-boarding service where vScaler cloud engineers and account managers will work with end users to setup, con- figure and deploy their cloud based infrastructure. Our service includes:
• A dedicated implementation manager to help the transition of your IT infrastructure into the new site. • A dedicated client service manager working with you on a day-to-day basis.
• Proactive service reporting and account management on a monthly basis.
• Bespoke customer interface providing ‘single pane of glass’ view to site and services.
• Provision of a Customer Welcome pack which details all processes. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Prior to terminating the contract, the customer is able to transfer all their data out of the solution. When the customer terminates their agreement with vScaler, vScaler ensures all of the organisation’s data is deleted.
We provide a number of tools to assist with service off-boarding including but not limited to: • Data migration tools
• Image migration tools
• VM conversion tools
• Secure erase - End-of-contract process
-
When the customer terminates their agreement with vScaler, vScaler ensures all of the organisation’s data is deleted.
We provide a number of tools to assist with service off-boarding including but not limited to: • Data migration tools
• Image migration tools
• VM conversion tools
• Secure erase
Using the service
- Web browser interface
- Yes
- Using the web interface
-
The web interface for vScaler provides comprehensive capabilities for setting up the service and making changes. The interface provides the user with the full functionality of our cloud solution within an intuitive, easy-to-use layout. vScaler's web interface is powered by OpenStack APIs, so any users with existing interfaces or programs that plug into OpenStack APIs will also be able to fully utilise our platform.
Alternatively, the vScaler web interface can be stripped back to basics for those customers who opt for a complete managed service where all set up and changes are looked after by BIOS IT's support team on the customer's behalf. - Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Customers with existing, preferred interfaces that can plug into OpenStack APIs will be able to fully utilise our platform. At present, there is no built-in vScaler support for Assistive Technologies.
- Web interface accessibility testing
- None.
- API
- Yes
- What users can and can't do using the API
- The APIs provides comprehensive capabilities for customers when setting up and making changes to the cloud. The APIs facilitate the full functionality of our product. vScaler's API is powered by OpenStack, so any users with existing interfaces or programs that plug in with OpenStack APIs will be able to fully utilise our platform.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- The Command Line Interface (CLI) is available for customers. The CLI provides full functionality of the cloud at customer control - including during set up and creating changes . vScaler's CLI is powered by OpenStack APIs, so any users with existing interfaces or programs that plug in with these APIs will be able to fully utilise our platform.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- We have a tier within our offering that allows users access to dedicated resources without over-commitment. This reduces the impact of any noisy neighbours and guarantees levels of performance.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Number of active instances
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- VScaler Limited
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Machines
- Files
- Databases
- Multiple OS support
- Backup controls
- Backups can be automated or customised depending on user requirements
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Users schedule backups through a web interface
- Backup recovery
- Users can recover backups themselves, for example through a web interface
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
- VLAN
Availability and resilience
- Guaranteed availability
- 99.99%
- Approach to resilience
- Available on request
- Outage reporting
- Public dashboard and API
Identity and authentication
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- Multi-tier privileged access for our different interfaces.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Optional Biometric authentication module.
- Devices users manage the service through
- Dedicated device over multiple services or networks
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Telstra Global
- ISO/IEC 27001 accreditation date
- 2013
- What the ISO/IEC 27001 doesn’t cover
-
"Our datacenters are fully ISO 27001 certified:
10 layers of physical security including biometrics, man traps and 24-hour security. Secure audit trails of all personnel entering the building. 24/7 internal and external intelligent CCTV monitored in a security reception. Manned vehicle entry gate to site. All building areas are secured by an alarm system. Low kinetic risk to site from road, rail or flight path. Crash tested security bollards and discrete anti-vehicle crash barriers at all access points. Three metre high monitored perimeter fence with 4m security fence around delivery areas
Options to incorporate customer bespoke security on racks and in customer private areas. DCIM security options including 24/7 rack CCTV streaming
VESDA and inert gas fire extinguishing system throughout technical areas." - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- As per ISO/IEC 27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All upgrades and version changes are tracked via repositories that enable us to roll back in the event of any issues. Any new capabilities or features are tested in a development environment before being rolled out to our live environment.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- All of our infrastructure is patched and updated on a regular basis to ensure vulnerabilities are not exposed. In addition to this, images that are provided to customers are always the latest available releases. If customers require older Operating systems or software they have the option to do this but the responsibility lies with them to ensure it is patched appropriately.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- We regularly undergo penetration testing on our infrastructure to identify any potential patches or breaches. Any identified incidents are prioritised according to our incident reporting process on a scale of 1-4 and dealt with accordingly.
- Incident management type
- Supplier-defined controls
- Incident management approach
- VScaler uses a strict escalation process that incorporates a flat structure to guarantee issue resolution. Customers are able to submit a support ticket online from their account using a short and simple form that is used to collect the basic information required in order to assist the customer further. This information then becomes the basis of a forum-style thread of dialog between help desk staff and the customer. At any stage, files can be attached either to provide further information for diagnostics purposes, or to provide the customer with any files necessary to resolve the reported problem.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- KVM hypervisor
- How shared infrastructure is kept separate
- VXLAN and Linux Namespaces
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Our data centre adheres to the Code of Conduct for Energy Efficiency in Data Centres and has a Power Usage Effectiveness (PUE) ratio of 1.4 which places us between Efficient and Very Efficient classifications.
Pricing
- Price
- £0.03 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Free trial service is subject to user application profiling.
- Link to free trial
- http://www.vscaler.com/requestdemo