HIGH TRAFFIC WEB HOSTING
HIGH TRAFFIC WEBSITE HOSTING
A complex infrastructure is needed for the infrastructure of High Traffic Website hosting. This infrastructure works safely within many high traffic receiving systems such as TRT, IETT, Scouting and Guiding Federation of Turkey and Eyup Municipality. Our company builds this infrastructure on Container technology.
The hosting infrastructure supports the connection of 5,000 to 50,000 people at the same time. There exist the Load Balancing Server/Device and the Cache Servers/Devices in front of the Application and Database server. The Cache Server/Device is structured as a minimum of 2 and all the Cache servers work actively. The Load Balancing Server/Device distibutes the incoming web requests to these servers in a session-based and balanced manner.
The Load Balancing Server/Device has the feature of a Web Application Firewall (WAF) feature. This WAF system prevents the incoming L7 attacks such as SQL Injection, Cross-Site Scripting in a safe way.
On video-intensive websites, a separate Video Converter server is set up in order to convert the videos put to the web page. This server drops the video files put on the web to a standard resolution suitable for the automatic web, and then records the video by compressing it. The Video Converter server converts the video automatically whenever a video file is dropped via the FTPS, it can also convert the video with SOAP or Rest API support or from the web control panel. Besides, a separate Video-on-demand Server (VOD server) is installed so that the videos can be displayed on the web page in a healthy way. This server can present the videos in such a way that allows to start from the desired part of the video and to be displayed on both mobile devices and desktop computers.
Everyday, both database and web files (pictures, videos, etc.) are automatically backed up and sent to an external server over an encrypted line.
Logs such as Web Access Logs, Web Firewall Logs, Database Management Panel Logs, Web Management Panel Access and Transaction Logs, Authorized Access to the Servers Logs, Servers’ System Logs, Server Update Logs etc. are compressed, added a time stamp via KamuSM and thus are made valid legally.
The servers and devices are monitored by a separate monitoring and alarm server. The data on whether the server is open or not, whether the services are running or not, the usage status of resources, the update status and other information relating to the server are monitored.