Appendix A is a spreadsheet showing the seed data for an Account table of the SugarSuite system. Appendix A forms part of this specification.
A software-based system is described and in particular a system and method for deploying a software-based system using one or more hardware components are described.
The deployment of a single user/single enterprise software-based system is relatively straight-forward in that the software is installed on a computer and executed on that computer. The deployment of a software-based system across a wide geographic area is more difficult since it is not possible to have a single installation of the software due to network latency and other issues. Thus, it is desirable to provide a data center edition system and method and it is to this end that the system and method are directed.
An application clustering system and method are provided wherein the system may include a set of geographically distributed nodes (where each node is typically composed of a cluster of servers). In addition, each customer instance is served by a primary node, with hot stand-by nodes in different locations. The system may also have data centers in US East, US West, and Europe each hosting multiple nodes for capacity growth and fault isolation. The system may also include storage area network and network storage appliance units in each node for high performance and storage reliability.
The system is particularly applicable to a customer relationship management software application system (a SugarCRM system) and it is in this context that the system will be described. It will be appreciated, however, that the clustering system and method in accordance with the invention has greater utility since the clustering system may be used with a variety of software applications wherein those software applications benefit from the clustering system and method.
An example of an exemplary embodiment of the application clustering system may be the Sugar On-Demand system which is a product offering from SugarCRM Inc. The Sugar On-Demand system is a scalable grid of computers around the globe working together to provide a seamless user experience for millions of end-users. Each node in the grid is itself an independent installation of Sugar On-Demand. These nodes, when coordinated, can provide disaster recovery for each other. The system uses well known, typical components as much as possible to avoid specialist knowledge, avoid the cutting edge, and keep predictability and reliability high.
Each layer may be implemented by a computing device, such as a server computer or any other processing unit based device, that has the typical server computer components and executes one or more software applications as described below. The Networking layer consists of the firewalls, switches, and load balancers as shown in
Each load balancer serves three primary purposes. Each of these purposes is implemented by one or more lines of computer code that are executed by a processing unit in the load balancer unit that implement the purposes described below. First, it serves its traditional function, sharing load among the multiple machines in a single layer. For many systems, it is desirable to have session affinity turned on. PHP (a known scripting language used to create dynamic web pages) session IDs are passed in cookies (or the URL if cookies are disabled) and should be available on every request. There are two ways to share sessions that will not require, but still may benefit from, session affinity. A shared file system, in which the sessions are stored, would make affinity redundant. Having cluster aware software that coordinates the sessions and makes them available to the entire layer would also render affinity redundant. Having most requests from one session go to one web server allows for better use of cache. Each round trip for dynamic content needs the session information in order to complete. If the session information is already cached on the server, then it does not have to be retrieved from the shared storage.
The second main purpose of the load balancer is to provide automatic failover to an alternate system should one of the primary systems fail. This can be failover between network cards, switches, or an entire server or node that is no longer functioning or is overloaded. Ideally monitored system load metrics would also be used as criteria for switching between machines.
The final main purpose of the load balancer is to encrypt and decrypt SSL communications. Leveraging SSL provides enhanced security for critical data. Using the load balancer to encrypt/decrypt the traffic is a good way to make sure the enhanced security does not come at the cost of too much server load.
In most configurations, there will only be one layer of web servers. They can be on an isolated network, and barring the discussion of affinity above, they can be considered identical. Only real-time system load and affinity requirements need to be analyzed when routing requests. To this end, there only needs to be one virtual IP for the web servers in each node. All web server requests should go to this IP.
The database layer needs the ability to communicate among the servers internally, reach the file system, and be reachable from the web server layer on specified ports. The load balancing of the databases is a little trickier than load balancing the web servers. There should be two virtual IPs for database servers, one for the master, one for a slave. As long as the slaves are responding, any slave should be able to process any read only request. If a master fails, the backup master must be activated as the new master. If the master comes back online, it should not automatically be put back as the master. The databases must be checked for consistency and most likely, the old master will be configured to be the backup master.
The web server layer needs to be reachable from the outside and needs to be able to reach the database layer. Servers in the web server layer need to be able to communicate with each other if there is cluster aware software running on the systems. If they are only leveraging a common file system, they do not need access to each other. The database layer needs to be reachable from the web server layer.
Since the traditional web and application layers have been collapsed, there are really only two layers of servers in a typical deployment. Traditional web servers can be used in the DMZ for static files and as proxies for added security if desired.
Proxy Server Layer
This system is designed to operate over huge geographic distances and networks may not provide sufficient bandwidth for a satisfactory user experience. In order to improve the end user experience, local web proxy servers may be used to provide several key benefits. Among the potential benefits are:
Web Server Layer
The web layer is typically composed of a grid of simple off the shelf systems running identical platform software with the application, such as SugarCRM in the preferred example, running on the systems. They must have a common application image in order for them to effectively form a SugarCRM cluster to function correctly. Processor and network throughput are the primary things to purchase for on this layer.
The web layer should leverage PHP accelerators. PHP accelerators save a lot of processing on the server side with every round trip. Traditionally, PHP re-parses all files on each round trip from scratch (only the operating system file cache provides any speedup). All PHP accelerators save intermediate states of page compilation and many have no PHP compilation after the first run, just execution processing. There are many accelerators on the market. The Zend Platform, for instance, has the ability to cache PHP in different states of processing, greatly decreasing the work on each round trip. It also has the ability to manage sessions across the cluster (keeping them in memory and only writing them to the file system for failure recovery). It also has the ability to efficiently transfer large files through PHP and cache generated output across sessions. Three other accelerators are APC, php-accelerator, and eAccelerator. The Zend Platform has been known to work well with Sugar under heavy load; the other accelerators are under testing.
Database Layer
The database layer will differ significantly depending on the database that you are using. From the application perspective, there needs to be at least one server IP Address and credentials that the application can use to read and write data. As the application evolves, it will have increasing ability to leverage read-only slaves from a cluster in order to remove hotspots from the cluster. The majority of a CRM application's queries are read only. Eventually, reporting database servers will be supported. These three layers of database servers can be collapsed transparently if the read-only servers or reporting servers fail or become unavailable.
With any supported database, there are a few common configuration Best Practices to consider. Persistent database connections should be enabled. This will save time spent connecting to the database on each round trip. Currently Sugar uses a single database connection for all queries in one round trip. The connection is made at the beginning of the page processing and is released at the very end. Protect the network between the web servers and the database server. This allows for the communication between web server and database to be unencrypted. This will also save processing power. The currently supported databases may include MySQL and Oracle.
MySQL
With MySQL, there are two primary replication options:
Master-Master configuration
Master-Slave configuration
All writes should go to a master. The system may be setup so that if the primary master were to fail, all of the slaves would replicate off of the backup master and all inbound queries would go to the backup master as well. Once the original master is ready to be put back into production, the cluster can be reconfigured to re-label the primary and backup masters or the primary master can be recovered.
For smaller configurations, the publicly available MyISAM is an excellent storage engine that performed well during testing and MyISAM is very fast and flexible. For larger systems, the publicly available InnoDB should be considered. In an ideal configuration, the master would leverage InnoDB and the slaves would leverage MyISAM. This configuration provides the enhanced locking and transaction capabilities of InnoDB while still allowing the speed, flexibility, and full-text search capabilities of the MyISAM engine. At the time of installation, it is highly recommended that an administrator set the default engine and code page to the values that the administrator wants the application, such as SugarCRM, to use.
Oracle
Oracle is a well-known database to the enterprise market and most enterprise companies have Oracle database administrators (DBAs) already on staff. For this reason, the example application (“Sugar”) supports both Oracle 9i and 10g databases. Sugar is configured to create all tables and indexes in the default tablespace of the user. It is recommended, however, that indexes are created in a different tablespace in order to reduce contention. At this time, the easiest way to accomplish this is to get a dump of all indexes, drop them, and then recreate them in another tablespace. In the future, the Sugar application will be ask for appropriate tablespace names during the installation process.
File System Layer
A Sugar Suite, that may be an installation of a suite of software applications that includes the SugarCRM customer relationship management application described above, is composed of many files. The files fall into one of several general categories. Each of the categories is detailed below along with approximate sizing.
Application Files
Application files are the primary files that compose the Sugar Suite. A clean install of 4.2 Professional or Enterprise are composed of roughly 6,000 files which take roughly 40 MB of disk space. These initial files are infrequently modified, but are frequently read. All application functionality is coded in these files.
Application Customizations
Application Customizations include new modules, new logic, override files, language packs, and any other enhancements made to the Sugar Suite at the file system level. These modifications would generally not be expected to be more than the same rough size as the initial application files. It is quite possible, however, that the customizations will be far larger than the base application.
Attachments
Attachments are one of the quickest growing segments of files in the application. The use of uploaded files is dependant on the use of the Sugar Suite by each enterprise. Some enterprises quickly end up with gigabytes of attachments; others only have megabytes of attachments after a long period of time. If the particular enterprise practices attaching files to opportunities, accounts, cases, bugs, etc., then it is highly recommend that the enterprise sets aside a good deal of storage space to accommodate the size of the attachments based on the business process. For example, SugarCRM Inc. (that distributes the Sugar Suite) recommends that at least 20 GB be ear-marked for this purpose at the time of installation and expand as needed over time. This approach will provide enough storage for most implementations in the beginning while providing visibility into actual usage allowing the enterprise to adjust and manage the filesystem appropriately.
An attribute of attachments is that they rarely change. Once a file is uploaded the application leaves it intact. As a Best Practice recommendation, it's a good idea to perform maintenance from time to time to clean out old files. Coincidentally, users expect a reasonable delay when retrieving an attachment. As such, attachments can be stored on slower disks in the SAN or on the inner part of the disks. For this reason, less expensive drive arrays can be used for the larger attachment folders since they will be less frequently accessed and users should have a higher tolerance for small delays (there is only one attachment per round trip as compared to possibly over one hundred read files for a normal page).
Cache Files
Cache files are generated by the application during normal processing. When a user requests a graph, for instance, the graph data is calculated and stored in an XML file. When they refresh their browser, the XML file is re-read instead of being recalculated. It is important that cache files for a particular session be available on the next round trip. This can be accomplished via a shared filesystem or session affinity with periodic file synchronization.
Logs
Log files during development, testing, and tuning can be quite large. In production, the log level is typically set to FATAL which drastically decreases the growth of log files. Log files are typically stored in the root of the application folder. When any kind of performance monitoring or tuning logs levels are in use, the log files are rather frequently updated. It is important that this not become a source of contention for a shared file system. To this end, each web server should have a local log that it writes to that is then later merged with the other logs (or copied to a common location).
Configuration Files
Configuration files rarely change. There are a few reasons why a user might want to have different configuration files for each of the web severs in a cluster. In general, all of the webserver(s) should be configured in the same manner.
Session Files
In a cluster of web servers, it is best if a cluster session manager is used in which case a shared file system can be used to store a copy of the session data in case of system failure. If a cluster session manager is not used, the user can store all of the sessions in a shared files system. The session files are read and written on each round trip to the database. In addition, the data from the last round trip may be present when processing the next round trip (i.e. the cluster file system must operate as a single global file system for session files).
The application clustering system may also provide redundancy to each cluster including network redundancy, power redundancy, database redundancy, server capacity, file system capacity, monitoring redundancy, multi-site redundancy, backups and adverse condition strategies. The adverse condition strategies may include a notification plan for virus attack, massive hardware failure, local catastrophe, DDOS Attack, hack attempts, successful hacks, security vulnerability, customer load tests, poor customer customizations, operational maintenance and urgent unplanned maintenance. The redundancy provided by the system also may include regular maintenance.
The system may also provide capacity planning which may include capacity planning for the file system, for the network, for power, for space and for backup. For the file system, the capacity planning may include slow files (files such as uploaded content and cache folders.) They do not change often and can take a little while to retrieve (much longer than one of the PHP pages used in common UI responses), application files, application customizations, uploaded files, logs, configuration files and database files. The network capacity planning may include end-user, backup, sync and monitoring. The system may also provide rapid growth capacity planning.
The system may also provide access control that may include ION, customer databases, customer files and/or shell accounts. The system also may provide monitoring that may include simple repair actions that need to become automated, every round trip being logged, the file system, the database, the processing units (CPUs), system loads, memory, swap and ideally queries and stuff based on sampling.
The system may also provide rollout testing that may include how new versions or new scripts, etc are rolled out or the process to follow before pushing the update button. The system may also provide production, load testing, quality assurance (QA), a customer sandbox environment, security and a shared file system. The customer sandbox environment may give Customers and professional services (PS) people access to a sandbox to edit their application and give them the ability to reset their instance, or migrate changes into production. The security permits audits and change approval and tracking.
Each of the data centers 22 shown in
Uploaded Files—These are files that have been uploaded to the instance and potentially linked to records in the system. These files may include, but are not limited to: contracts, documents, images, logs, . . . .
Another aspect of the DCE system may be the ability to provide an intelligent cache designed to decrease the file system or processing load produced on or by the web servers. There are several different ways in which caching file accesses will decrease server load. One common issue in a system composed of components that reside in multiple folders where an included file can be located in one of many folders is determining which folder a file should be included from. In an instance of sugar in DCE, it is important that the system be able to quickly figure out which path a file comes from. To that end, a cache of the result of determining where a file is located, either by folder or by individual file, may be kept to help reduce redundant searches through the file system. Another common extension point in Sugar is the automatic inclusion of extension files if they are present. The implementation of this requires the system to frequently check to determine if a given file is present or not. If the file is present, this file is cached by the operating system. If the file is not present, this file is typically not cached by the operating system. This leads directly to disk load. The system may cache files that do not exist just like it caches the files that do exist. This cache would offload the file system and prevent it from performing complicated searches for files that, in the end, do not exist. The fact that the files do not exist may be stored by directories or filename.
The DCE system allows users to function as administrators of distributed installations of the Sugar application and view system and application related reports from within a unified application management console.
The DCE system may be comprised of several high-level features that include deployment composition, deployment management and license management, monitoring, alerts and reports and access control management. All of these features are subject to access control as well as general Search & Filter capabilities because this system must comply with all guidelines (including UI, design, administration, coding practices and frameworks) set forth by SugarSuite documentation available at www.sugarcrm.com which are incorporated herein by reference.
The DCE system can manage, monitor and deploy applications on the following platforms: Linux platforms (including the commercially available UBUNTU 6.1.0 and/or Red Hat Enterprise Linux (RHEL) 4.0), Windows Platforms (including XP, Vista, Longhorn and/or Windows 2000), databases (including MySQL 5.x, Oracle 10g and/or SQL server) and/or web servers (including Apache and/or IIS).
A deployment is a single instance of SugarSuite deployed in the DCE environment as shown in
Template Requirements and Management
Each template is either 1) an unmodified release and/or patch versions of a SugarSuite; or 2) customized releases specific for groups of users and possessing a specific and well-defined combination of features (such as for instance a Real Estate Template). The templates function as a generic code-base for a number of further customized instances. The instance customizations work by overriding the template version of a file via introducing a customer version in a sub-location. The SugarSuite software uses the customized file version if such version is available, or the generic “template” version otherwise.
Each template instance may have one or more of the following properties:
Instance Management
The instances of SugarSuite are distinct instances of the SugarCRM application at distinct URLs generally created for a variety of purposes. Each instance must be based on one SugarSuite Template. A typical use of instances can include creating development, stage and production versions of an application. Each instance may have one or more of the following properties:
SugarSuite Database Schema
Each SugarSuite Instance must be linked to a database schema as shown in
Will be a complete SugarSuite Data schema.
Can be optionally seeded with data.
Upgrade and Installation Files
DCE may include the capability to automate detection, download and execution of software upgrades based on the information provided by a remote server as well as local installation/modification metadata created by the DCE on the target system in response to user actions. A remote server mentioned above may be a server that the system knows to go to in order to look for and/or download updates. Once connected to the remote server, in addition to looking to see if new updates are available, the system may download the new updates directly from the server. These upgrades can be executed either manually or automatically by the system. To enable this the upgrade files must contain template components and instance components. The template components may include files to copy or replace on the target system and/or any scripts necessary to execute the file upgrade. The instance components may include files to copy or replace on the target system, any scripts necessary to execute the file upgrade, a database schema to copy or replace on the target system, and/or any scripts necessary to execute the database upgrade.
Deployment Management
Deployment Management allows SugarSuite administrators to create, delete, deactivate and otherwise manage distributed SugarSuite installations. Deployment Management spans Template management, Instance Management, License Management and Access management, each of which is described in more detail below. Each Instance is associated with a Template; in other words Templates->Instance relationship is one-to-many.
Templates allow DCE administrators to logically and functionally organize their installations of SugarSuite. Multiple Sugar instances extending a single Template will share all specific functionality of that template amongst them. However, they can further individually enhance those customizations. This kind of organizational model for shared-tendency installations will allow for simpler methods of managing, installing and removing new instances of the software. In the illustrative embodiment, all the deployment management functions are subject to Access Control rules.
Template Management & Functionality
The template management may include one or more of the following functions:
Template upgrade can be fully automated, partially automated or a fully manual process. Two main kinds of upgrades will be readily available: a Sandbox Upgrade (see the exemplary method shown in
Implementation Paradigm
Templating feature may be implemented in various ways to conform to specifics of the environment including, but not limited to: languages, interpreters, and platforms. Regardless of the specific implementation, effective caching may be an important contributor to performance. Sharing common files and loading directly from a common template will decrease the number of files loaded and parsed and will boost cache effectiveness. A few proposed methods for implementing the templating feature are the follows:
In the exemplary embodiment, a single tier of templates is supported, but multiple tiers of templates may also be supported. An example of a multiple tiers of templates would be an environment where there may have a base template as shipped from Sugar. There may then be a template created based on that template that provides extra functionality and/or changes the system to be targeted to a specific audience like a real estate vertical. Specific instances may be created based on any level of the template. A user may create an instance based on the original code, or the real estate vertical. When updates are applied, the user can roll the updates down through the layers of templates. This extra capability of templating may help the user maintain customizations from which multiple templates are derived.
Instance Management
A SugarSuite Administrator must be able to manage a range of SugarSuite instances, modify/customize those instances, and perform other management duties as listed below. Zero or more SugarSuite instances might be linked to a Template, but each instance is associated with only one template. As with the other deployment management functions, the Instance Management functions are subject to Access Control rules.
One specific type of SugarSuite Instance is a Sandbox Environment. A sandbox environment exists to validate functionality, perform tests, allow for online development and other management functions.
1. Create new Instance
2. Delete Instance
3. Clone Instance. This is useful for sandbox instances.
4. Instance Editing
5. Upgrade to Template
6. Deployment
7. Permissions
8. Monitoring
9. Other
System & Cluster Management
System or Cluster administration functions allow the DCE administrators to set-up, assemble, configure and destroy clusters of SugarSuite installations across a range of servers. A cluster consists of a number of “virtually headless” web servers (these might include “specialized” servers that handle reporting, static content, chronicle jobs) or an NFS mount for the file system and a DB cluster. Each web server must be configured with a set of rules to discover the SugarSuite Instance referred to by the request URL. Each SugarSuite instance may include the following configuration files for access to the DB cluster:
Online Instance Management & Dynamic Reallocation
DCE may provide a User Interface to manage dynamic application functions. The system may allow for the following runtime tasks:
Tracker
The system may implement a mechanism for tracking and reporting on system-wide dimensions, application coordinates (delivered via heartbeats), and change logs. Examples may include
Product Change
The DCE may also support product change. The product change functions may include one or more of the following:
The DCE may provide monitoring, reporting and alerts that may more specifically include monitoring and backups (system and instance monitoring), backups, reporting, dashboards and alarms.
Monitoring & Backups
Administrator must be able to monitor system performance, application performance across Instances and Application Performance on per-instance basis. Two types of monitoring should be implemented: System Monitoring and Instance Monitoring. System monitoring may provide information on all components in the cluster (Servers, Routers . . . ). Application monitoring will provide data specific to every individual instance of Sugar's performance across the DCE cluster. The cross-section of server-application performance may provide valuable insight into the overall performance of the cluster and allow for further tuning of servers and instances.
System Monitoring
Administrator should be able to monitor system performance, application performance across Instances and Application Performance on per-instance basis. The system monitoring allows administrators to monitor performance of the system running SugarSuite Instances and the following system parameters will be available: Server names or IPs being monitored and statistics (current) for each Server: CPU, Memory, disk utilization (throughput levels and space percentage), Number of Concurrent Live Sessions, any currently blocked requests (Locked Queries, connections waiting on a server, connection pool limits reached, . . . ) and/or component specific response times that may include server response times, database response times and routing delay.
Instance Monitoring
The monitoring may also allow the Administrator to monitor the current instances of Sugar in the DCE ecosystem. An instance of the application can be deployed on numerous physical servers and multiple logical servers (clusters). The monitoring information needs to be forwarded to DCE to provide a reconciled view of the information provided by the System Monitoring component to create a coherent picture of the DCE ecosystem. The data on the performance of each instance will then be available. The following performance information may be available to the DCE Administrator:
Information from instance monitoring should be made available in a user interface (UI) that presents the user with high level information and allows them to drill down. The information should also be filterable by date/time, instance, module, action, and response time. These filters should be able to be used in any combination. This level of filtering presents a unique way to view the performance of the server. The user can start at a high level UI that shows there is some degradation of performance. The user can then drill in and see that the issue appears to being caused by one instance on a cluster. The user can then drill into that instance and see that one module is causing most of the slowdown and it appears related to list views on that module. With this information in hand, the user can look at individual page tracking to see if all list views are a problem or just ones that are filtered in a particular way. This drilling down process on the logs gives the user a very powerful view into the system and will highlight any problems or places that the user can tune.
Backups
Administrators should be provided with basic data management capabilities, including automated system back-ups. System back-ups and other administrative tasks can be scheduled at a particular time in the day/week/month and with a specified frequency (by hour, day, week, . . . ):
Analytics
DCE should enable basic analytics capabilities for the clustered deployment. DCE should gather and reconcile data from different instances and servers to be presented in a coherent manner. DCE server should introspect this information and be able to take action to heal the cluster if possible. Alarms should be configurable and be triggered on appropriate events (including the system not having the ability to automatically remedy an issue). The analytics component should work based on one or more of the following threshold parameters:
Average response time.
Response time inappropriate for the module, action, or module/action combination
Specific response time (for specific query/url).
System usage levels (CPU, Disk space, disk percentage, memory, . . . ).
The DCE engine should be able to:
Shut down/start/re-start a process
Remove server from the cluster active server pool to cluster standby server pool.
Take a new server from the standby list and bring it into a cluster.
Migrate instances from an impacted cluster to one of the standby clusters.
Send alarm when system state is critical.
Business Intelligence and Reporting
The reporting is a key component enabling the DCE to run and service clusters autonomously. Reporting will automate essential IT processes to provide and send-out up to date information of uptime and performance of the cluster components as a whole and each individual implementation. DCE should expose this information through an API for seamless integration into other monitoring tools. Reports should also provide an overview of the installations and composition of the clusters to the system administrators.
The following out-of-the-box system reports should be available to the Administrator.
Instance data aggregation and consolidation, querying, and analysis from all managed instances for the purposes of deriving cross-organizational or cross-departmental metrics and systems. This may be implemented by providing a uniform interface into all individual instances managed by the DCE application. Queries and analytics may utilize this interface to create a framework for organizing, automating and optimizing business processes managed by multiple SugarCRM core applications.
Dashboards
The system should provide a dashboard with all monitored Key Performance Indicators. This should have functionality similar to Sugar's reporting module. In its preferred form it will be based on the Sugar reporting and dashboard framework (with support for flash charts/graphs, tabular views, filters, printing to PDF, and export to CSV.) The following reports may be provided:
Alarms
Alarms alert system administrators if one or many of the DCE-managed instances in the cluster are acting abnormally. Alarms should be configurable based on time/performance/resource utilization thresholds. DCE should also detect if multiple instances are having problems, log the information and aggregate multiple incidents into a few targeted alarms to avoid flooding the network if a significant outage is in progress. If there is a problem with a cluster, for instance, reporting for each instance on that cluster would flood the alarm infrastructure and hamper repair efforts. The Administrator must be able to configure watermark and time-based alarms for various system monitoring components. The System must be able to perform proactive monitoring and automated self-notification as a means to verify that:
Alarms should be templates that are reused. These templates should have the following parameters:
License Management
The DCE may provide license management. The license management functions may include:
License acquisition
Periodic automated license renewal (monthly, quarterly, yearly, etc.)
System should gather all licensing information and report in batch to Sugar.
All usage heartbeats should go to DCE first, instead of the primary SugarCRM servers.
Update license information (for any changes such as extensions, date changes, etc.)
Bulk license management
Add notification if license limits are getting close or exceeded
Add Upgrade notices
Add cart integration to purchase more licenses
Apart from managing the licenses of instances, DCE should have provisions to manage its own licenses. This is important when DCE is sold to other hosting providers and also as part of Sugar Enterprise edition
Expiration of licenses
Permitted number of instances exceeded
Bulk license seats available
Free incremental seats available
Cost for incremental seats (if they have pre-paid, this may be 0)
Incremental seat batch count (if they buy increments of 50 seats, . . . )
Acquire, Upgrade and Renewal Processes for new instances
Access Control encompasses two kinds of user administration: DCE users/roles management and SugarSuite user/role management.
SugarSuite ACL Management:
The following are requirements for all Sugarsuite Customers:
Support case portal going to DCE instead of straight to Sugar
Customers have no direct file access
Application ability to lock down:
DCE ACL Management:
While the foregoing has been with reference to a particular embodiment of the invention, it will be appreciated by those skilled in the art that changes in this embodiment may be made without departing from the principles and spirit of the invention, the scope of which is defined by the appended claims.
This application claims the benefit of/priority under 35 USC 119(e) and 35 USC 120 to U.S. Provisional Patent Application Ser. No. 60/922,606 filed on Apr. 9, 2007 and entitled “Data Center Edition System and Method” and to U.S. Provisional Patent Application Ser. No. 60/977,521 filed on Oct. 4, 2007 and entitled “Data Center Edition System and Method”, both of which are incorporated herein by reference in their entirety. In addition, this application also claims priority under 35 USC 120 and is a continuation in part of U.S. patent application Ser. No. 11/732,321, filed on Apr. 2, 2007 and entitled “Application Clustering System and Method” which in turn claims priority under 35 USC 119(e) and 120 to U.S. Provisional Patent Application Ser. No. 60/787,975 filed on Mar. 31, 2006 and entitled “Application Clustering System and Method”, both of which are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
60922606 | Apr 2007 | US | |
60977521 | Oct 2007 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11732321 | Apr 2007 | US |
Child | 12100322 | US |