Our Solutions
All in one Data Center Box
Now a day’s implementing stat of art datacenter becomes very difficult for small and mid-size organizations. The cost of purchasing all the system required for this kind of implementations is very high along with the required resources. Furthermore, the maintenance and operation cost is very high as well. So most of the small and mid-size organization are building their datacenters without adapting the standards and best practices which will result in big issues for business such as complexity and data lose in some cases.
Our Solution will address all above mentioned problems by implementing All in one Datacenter in a Box.
All in one Datacenter in a Box is a technology which will focus on building a complete IT infrastructure solutions in a single hardware box keeping in consideration all required technologies which are used in normal datacenters such as networking, security, storage, servers, virtualization and etc.
The solution built to adapt the concept of hyper converged infrastructure utilizing the power of Linux technologies. This is because hyper converged infrastructure is also called as software defined IT infrastructure which is focusing on virtualizing all the components of underlying hardware.
We also kept in mind the consideration of new technologies trend such as cloud computing, infrastructure security, cybersecurity, software as a services – SAS, software defined network – SDN and software defined storage – SDS.

KVM Virtualization with oVirt Management
Hypervisor is a technologies that uses a software to allow people to properly utilize hardware resources and convert one physical server into many virtual servers. The virtual servers are called as virtual machines, or VMs, consuming the server physical resources, and sharing these resources between all the hosted VMs.
Virtualization has made a lot of progress during the last decade, primarily due to the development of myriad open-source virtual machine hypervisors. This progress has almost eliminated the barriers between operating systems and dramatically increased utilization of powerful servers, bringing immediate benefit to companies.
Our 15+ years of experience in Linux make us fully confidant in Linux KVM deployments which will help you eliminating the hidden licenses cost of commercial visualization solutions.
On top of KVM Virtualization we deploy oVirt as virtualization management solution. oVirt is a distributed virtualization solution, designed to manage your entire enterprise infrastructure.

oVirt VDI Infrastructure
Virtual desktop infrastructure (VDI) is virtualization technology that hosts a desktop operating system on a centralized server in a data center. VDI is a variation on the client-server computing model, sometimes referred to as server-based computing.
Most VDI deployments in enterprises run with VMware Horizon View, or Citrix XenDesktop, or with smaller or up and coming market players such as Parallels, Ericom, and Workspot.
However, an increasing demand nowadays for a KVM supported VDI solution. Customers want to run VDI on KVM, eliminating hypervisor license costs, therefore reducing the total cost per desktop. Furthermore, it’s also possible to remove Microsoft licenses if Linux is used. Cost per desktop has been one of the factors playing against VDI adoption and leading to many ROI discussions.
We offer a complete KVM based VDI solution with oVirt virtualization.

Disaster Recovery Solution
Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant negative events. DR allows an organization to maintain or quickly resume mission-critical functions following a disaster.
Active-Active Disaster Recovery:
This solution is implemented using a stretch cluster configuration. This means that there is a single oVirt environment with a cluster that contains hosts capable of running the required virtual machines in the primary and secondary site. Virtual machines automatically migrate to hosts in the secondary site if an outage occurs. However, the environment must meet latency and networking requirements.
Active-Passive Disaster Recovery:
Also referred to as site-to-site failover, this disaster recovery solution is implemented by configuring two separate oVirt environments: the active primary environment, and the passive secondary (backup) environment. Failover and failback between sites must be manually executed, and is managed by Ansible.

ERPNext Solution
Enterprise resource planning (ERP) is business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.
ERPNext is the perfect solution that will help company to organize and manage the work of each department. ERPNext is an open source web-based system aimed at small and medium sized businesses. It assists companies with accounting, project and task management, sales, purchase, inventory, CRM, administration, human resource management, manufacturing, and even website. This system is the most suitable for businesses in manufacturing, retail, and distribution spheres. Extensive functionality is integrated into a single platform for easy management.
ERPNext is built using Python and MySQL as the database backend. The underlying web app framework is called Frappe and is a separate platform for development and deployment of rich web applications. ERPNext has a Model-View-Controller architecture that together with metadata modeling tools provides flexibility: users are able to adapt the system to unique purposes of their business without the need for custom programming.

NextCloud File System Management
Providing businesses a self hosted file access, sync and share solution with powerful integration in existing infrastructure and storage solutions, Nextcloud makes data available to users wherever it is. No need for new storage solutions or moving all data over. Easy integration and quick deployment brings organizations immediately in a compliant, secure state.
Its familiar, easy to use interface on web, mobile and desktop allows users to work efficiently and be confident everybody has access to the same, latest version of data. Its enterprise capabilities ensure IT maintains full control over sharing, retention and availability of data within and across the boundaries of the organization.
Simply keeping your data behind your company firewall rather than in the cloud makes compliance and security easy. With Nextcloud, you don't lose the benefits of modern cloud collaboration and team productivity!
Your FTP or Windows Network Drive simply don't suffice - employees work around, rather than with them, using Dropbox and other unsafe solutions. Nextcloud puts your IT back in control over your data.

Ceph Storage Solution
The power of Ceph can transform your organization’s IT infrastructure and your ability to manage vast amounts of data. If your organization runs applications with different storage interface needs, Ceph is for you! Ceph’s foundation is the Reliable Autonomic Distributed Object Store (RADOS), which provides your applications with object, block, and file system storage in a single unified storage cluster—making Ceph flexible, highly reliable and easy for you to manage.
Ceph’s RADOS provides you with extraordinary data storage scalability—thousands of client hosts or KVMs accessing petabytes to exabytes of data. Each one of your applications can use the object, block or file system interfaces to the same RADOS cluster simultaneously, which means your Ceph storage system serves as a flexible foundation for all of your data storage needs. You can use Ceph for free, and deploy it on economical commodity hardware.
Organizations prefer object-based storage when deploying large scale storage systems, because it stores data more efficiently. Object-based storage systems separate the object namespace from the underlying storage hardware—this simplifies data migration.

Video Conferencing Solution
Video conferencing is a visual communication session between two or more users regardless of their location, featuring audio and video content transmission in real time.
For effective video conferencing, an organization needs to set up a video conferencing system profiling software and hardware solutions for rooms, PCs, mobile devices, and browsers.
Video Conferencing Benefits
- Reduced Travel Time and Costs
- Optimised Attendance
- Structured Meetings with Improved Communications
- Increased Productivity
- Employee Retention
- Sustained Competitive Advantage
Jitsi is a solution that allows you to easily manage and establish a secure videoconferencing rooms and meetings.
Features:
- Unlike other videoconferencing technologies, Jitsi Videobridge, the heart of Jitsi, passes everyone’s video and audio to all participants, rather than mixing them first.
- The result is lower latency, better quality and, if you are running your own service, a much more scalable and inexpensive solution.
- Jitsi is compatible with WebRTC, the open standard for Web communication.
- Jitsi supports advanced video routing concepts such as simulcast, bandwidth estimations, scalable video coding and many others.

Security – Pfsense firewall
Pfsense firewall is used in two logical locations in any datacenter. It is been used as core and parameter firewalls. All the traffic In and Out is filtered through these firewalls. Core firewall is used to segregate and control the traffic between the servers and also between the users and servers. Zoning approach has been taken for this segregation and VLANs segregation in each zone. Parameter firewall is used to protect the infrastructure from outside word and to publish all required and allowed services publically.
Pfsense core firewall advantages to the solution
- Support to achieve and adapt security best practice.
- Provides a full protection for the entire solution.
- Provides zoning segregation as per the security recommendations.
- Control the traffic between the servers inside the box.
- Control and filter the traffic coming in and going out from the box.
- Protect the box management system.
Pfsense core firewall advantages to the solution
- Act as the first defense in the parameter level of the solution logical infrastructure.
- Provides a protection for different types of attacks such as distributed denial of service attacks (DDOS), phishing attacks, password attacks and TCP SYN flooding attacks.
- Performs all static and dynamic NATing required for the hosted servers and users.
- Filters and blocks all the traffic coming to the box from internet except the allowed one.
Divide the solution in to tree logical parts that are inside which represents the servers farm, outside which represents the internet and DMZ which is used to host the servers that hosting services publically published to external world.

Infrastructure Automation with Ansible
Infrastructure automation is the process of scripting environments — from installing an operating system, to installing and configuring servers on instances, to configuring how the instances and software communicate with one another, and much more. By scripting environments, you can apply the same configuration to a single node or to thousands.
Infrastructure automation also goes by other names: configuration management, IT management, provisioning, scripted infrastructures, system configuration management, and many other overlapping terms. The point is the same: you are describing your infrastructure and its configuration as a script or set of scripts so that environments can be replicated in a much less error-prone manner. Infrastructure automation brings agility to both development and operations because any authorized team member can modify the scripts while applying good development practices — such as automated testing and versioning — to your infrastructure.
Whatever you’re deploying, there’s infrastructure underneath it. Not only does Ansible have great support for automating across the Cloud and across services, but it also supports building your infrastructure from the ground up.
Our Ansible great experience will allow you to easily manage various physical devices - including the provisioning of bare metal servers, network devices or even storage devices. Using Ansible’s Playbook-based automation is easy, and integrates into your current provisioning infrastructure.

IP Address Management Solution
IPAM (IP Address Management) is the administration of DNS and DHCP, which are the network services that assign and resolve IP addresses to machines in a TCP/IP network. Simply put, IPAM is a means of planning, tracking, and managing the Internet Protocol address space used in a network. Most commonly, tools such as DNS and DHCP are used in tandem to perform this task, though true IPAM will glue these services together so that each is aware of changes in the other (for instance DNS knowing of the IP address taken by a client via DHCP, and updating itself accordingly).
IP Address Management (IPAM) is an integrated suite of tools to enable end-to-end planning, deploying, managing and monitoring of your IP address infrastructure, with a rich user experience. IPAM automatically discovers IP address infrastructure servers and Domain Name System (DNS) servers on your network and enables you to manage them from a central interface.
Feature list
- IPv4/IPv6 IP address management
- Section / Subnet management
- Automatic free space display for subnets
- Visual subnet display
- Automatic subnet scanning / IP status checks
- PowerDNS integration
- NAT support
- RACK management
- Domain authentication (AD, LDAP, Radius)
- Per-group section/subnet permissions
- Device / device types management
- RIPE subnets import
- XLS / CVS subnets import
- IP request module
- REST API
- Locations module
- VLAN management
- VRF management
- IPv4 / IPv6 calculator
- IP database search
- E-mail notifications
- Custom fields support
- Translations
- Changelogs

Password Management Solution
In the world of IT, password management is being able to manage user passwords from one centralized location. Managing passwords includes enforcing password complexity, password rotation, and ensuring users are following best practices for password security. Weak password management in an organization is a significant security risk because passwords play a serious role in protecting your digital kingdom.
Features list:
- Built for Teams & DevOps and it works with the tools your team loves: browser, emails, terminal, chat.
- Open security standards, Passbolt uses GnuPG to authenticate users and verify secrets server side.
- Top of the line tooling and we ship with tools and code standards your admin team will like to work with.
- Extensible by design and you can start building on top of our JSON API to automate passwords.
- Methodically tested, Half of the code base is there to make sure the other half is behaving.

SAMBA4 Linux Domain Controller
The power of Ceph can transform your organization’s IT infrastructure and your ability to manage vast amounts of data. If your organization runs applications with different storage interface needs, Ceph is for you! Ceph’s foundation is the Reliable Autonomic Distributed Object Store (RADOS), which provides your applications with object, block, and file system storage in a single unified storage cluster—making Ceph flexible, highly reliable and easy for you to manage.
Ceph’s RADOS provides you with extraordinary data storage scalability—thousands of client hosts or KVMs accessing petabytes to exabytes of data. Each one of your applications can use the object, block or file system interfaces to the same RADOS cluster simultaneously, which means your Ceph storage system serves as a flexible foundation for all of your data storage needs. You can use Ceph for free, and deploy it on economical commodity hardware.
Organizations prefer object-based storage when deploying large scale storage systems, because it stores data more efficiently. Object-based storage systems separate the object namespace from the underlying storage hardware—this simplifies data migration.

Video Conferencing Solution
Video conferencing is a visual communication session between two or more users regardless of their location, featuring audio and video content transmission in real time.
For effective video conferencing, an organization needs to set up a video conferencing system profiling software and hardware solutions for rooms, PCs, mobile devices, and browsers.
Video Conferencing Benefits
- Reduced Travel Time and Costs
- Optimised Attendance
- Structured Meetings with Improved Communications
- Increased Productivity
- Employee Retention
- Sustained Competitive Advantage
Jitsi is a solution that allows you to easily manage and establish a secure videoconferencing rooms and meetings.
Features:
- Unlike other videoconferencing technologies, Jitsi Videobridge, the heart of Jitsi, passes everyone’s video and audio to all participants, rather than mixing them first.
- The result is lower latency, better quality and, if you are running your own service, a much more scalable and inexpensive solution.
- Jitsi is compatible with WebRTC, the open standard for Web communication.
- Jitsi supports advanced video routing concepts such as simulcast, bandwidth estimations, scalable video coding and many others.

Security – Pfsense firewall
Pfsense firewall is used in two logical locations in any datacenter. It is been used as core and parameter firewalls. All the traffic In and Out is filtered through these firewalls. Core firewall is used to segregate and control the traffic between the servers and also between the users and servers. Zoning approach has been taken for this segregation and VLANs segregation in each zone. Parameter firewall is used to protect the infrastructure from outside word and to publish all required and allowed services publically.
Pfsense core firewall advantages to the solution
- Support to achieve and adapt security best practice.
- Provides a full protection for the entire solution.
- Provides zoning segregation as per the security recommendations.
- Control the traffic between the servers inside the box.
- Control and filter the traffic coming in and going out from the box.
- Protect the box management system.
Pfsense core firewall advantages to the solution
- Act as the first defense in the parameter level of the solution logical infrastructure.
- Provides a protection for different types of attacks such as distributed denial of service attacks (DDOS), phishing attacks, password attacks and TCP SYN flooding attacks.
- Performs all static and dynamic NATing required for the hosted servers and users.
- Filters and blocks all the traffic coming to the box from internet except the allowed one.
Divide the solution in to tree logical parts that are inside which represents the servers farm, outside which represents the internet and DMZ which is used to host the servers that hosting services publically published to external world.