

Technical Architecture
Servers : ​
When it comes to Servers, My expertise lies in high-performance servers, complex machines with multiple system boards and extensive I/O capabilities. These platforms enable intricate configurations, allowing me to precisely allocate resources based on specific needs. The installation process is meticulous, requiring strict adherence to site preparation guidelines and model-specific manuals. Through experience, I've prioritized proper cable management and component placement, ensuring optimal airflow and simplifying future maintenance. For servers requiring dynamic reconfiguration, independent management of system and I/O boards is paramount. I avoid nexus configurations, which can introduce bottlenecks. My in-depth understanding of server architecture, particularly the interaction between PCI slots, bus, and CPU, allows me to configure high availability and redundancy, eliminating single points of failure.
​
Storage :
In optimizing storage area networks (SANs), I ensure multipathing is configured for both active-active and active-passive configurations. This redundancy guarantees Logical Unit Numbers (LUNs) remain accessible from all controllers and paths, maximizing uptime. When creating storage pools, I prioritize performance by segregating disk types like SATA and SAS. This segregation ensures each disk type operates at its optimal level.
In case of active-passive storage, I assign dedicated pools to each controller, maximizing resource utilization. This configuration allows the remaining pool to be served by the single active controller in the event of a failure. Additionally, I leverage workload-specific storage features like deduplication and compression. These features are implemented strategically based on the specific workload. For instance, compression would not be applied in OLTP environments, but would be beneficial for archival storage.
For Storage Area Networks (SANs), I favor soft zoning over hard zoning due to its increased manageability. This approach allows for easier World Wide Port Name (WWPN) changes within a single zone containing just one initiator and one target.
Finally, to ensure the security of Network File System (NFS) and Server Message Block (SMB) storage, access is granted only to authorized hosts through implemented policies. This adherence to security best practices safeguards sensitive data.
​
Virtualization :
My approach to virtualization strategies emphasizes a balance between resource optimization and manageability. While virtualization offers significant resource efficiency, clear visibility into resource allocation is paramount. This includes understanding how virtual resources (vCPUs, vNICs, vDisks) are assigned to each virtual machine (VM) and how they map to physical resources. This transparency is especially crucial for on-premise deployments, as a lack of oversight can hinder troubleshooting during outages.
To maintain manageability, I typically avoid overly complex nested virtualization configurations. While technically possible, creating zones (containers) within VMs within domains can become cumbersome to manage. Instead, I advocate for creating smaller, more manageable VMs or domains unless there is a compelling need.
For optimal CPU performance, I allocate CPU resources on whole core boundaries. This ensures each VM has dedicated access to a physical core, eliminating "split core" situations that impact performance.
Network optimization is another key consideration. When Host Bus Adapters (HBAs) support N_Port ID Virtualization (NPIV), I leverage this technology. NPIV allows assigning World Wide Names (WWNs) directly to VMs, eliminating the need for creating and exporting virtual disks. This approach reduces virtualization overhead.
Furthermore, if network cards support Single Root I/O Virtualization (SR-IOV), I enable it to assign virtual functions of the Network Interface Card (NIC) directly to VMs. This eliminates the need to configure virtual NICs and achieves near bare-metal performance within the virtualized environment.
Finally, for type-1 hypervisors (bare-metal hypervisors), while configurations are typically saved on the chassis, I advocate for automating configuration collection and storing it in a central repository. This streamlines the process of restoring last known good configurations, hardware replacements, and machine configuration cloning.
High Availability​ :
​
My approach to high availability (HA) implementations is rigorous, adhering to strict enterprise installation standards.This involves a thorough site readiness assessment followed by meticulous configuration and testing before deployment. Redundancy is prioritized at all levels, ensuring uninterrupted service in the event of a component failure.
​
​
​
​
​
​
​
Typically, I implement a 50% redundancy strategy, encompassing redundant servers, system boards, resources allocated from redundant buses/controllers, ports, and switches. This configuration guarantees that the remaining half can support critical business operations even if one component fails. However, a deep understanding of potential failure points is crucial. For instance, I once identified a major outage where redundant Host Bus Adapter (HBA) card cables were mistakenly connected to the same switch, negating the redundancy benefits.
I implement network redundancy through bonding or the Inter-Switch Link Aggregation Protocol (ISLM) within the operating system. Additionally, I consistently recommend utilizing redundant network switches to ensure high availability of the network infrastructure.
​
Cloud :
My approach to security in multi-tenant cloud environments, whether public or private, prioritizes a principle of least privilege. This translates to assigning privileges only to the resources users require to perform their tasks. Opening network ports only for necessary communication and closing them when not in use. Maintaining strict separation between development, testing, and production environments to minimize risk. Restricting user access to resources based on their specific roles and responsibilities.
As a Professional Services Engineer, for a prominent Space research Organisation, I have installed, configured and consolidated workloads of 50+ commodity hardware as VMs in Oracle Private Cloud Appliance.
I am certified on Oracle cloud and AWS. As a program manger, In have executed a complex migration project for an USA-Italy based auto manufacturer during COVID-19. The complete dealer management system from on-premise was migrated to Oracle Cloud in Frankfurt and London.
I also managed multi-million dollar green-field deployment engagement in Google Cloud for a major energy distribution organization India.
​​​
OpenShift :
While OpenShift and Kubernetes offer powerful functionalities, I view them primarily as workload management tools, not the workloads themselves. Therefore, I apply the same fundamental best practices used for traditional operating system installations when deploying these platforms. I have executed many POCs with Single Node OpenShift (SNO) where all the three layers of the business login resides in a single platform. The Web and App components are containerised and the Database reside in a Virtual Machine in the same platform. The other implementations include compact clusters with either three VMs from Nutanix or three bare metal servers. I continue to create many documents and videos on my learnings and share with community and my personal YouTube channel. Please feel free to leverage those from the ARTICLES & VIDEOS section.
​
Data Center :
Beyond the technical configuration, the data center environment plays a significant role in system reliability. I pay meticulous attention to environmental factors like floor tiles for server racks and cable routing to ensure optimal airflow and cooling. This includes the use of filler panels to prevent hot air from mixing with cold air, maximizing cooling efficiency.
Consistent power delivery is vital for uninterrupted operation. I verify voltage levels between phases, neutral, and ground during installation and every maintenance activity.
Finally, I advocate meticulous cable management, cables are neatly dressed and secured along the sides of the rack for easy access to the server rear. Additionally, I label each cable with information about both ends, simplifying future troubleshooting efforts.
