From ebd55bee558c2aba38a39174c8d60175d0425a57 Mon Sep 17 00:00:00 2001 From: Scott Anderson Date: Tue, 22 Aug 2023 11:21:08 -0600 Subject: [PATCH] Remove mentions of multi-az from Cloud documentation (#5096) * remove mentions of multi-az from cloud documentation * add back mult-az content that should stay * updated heading formatting --- .../reference/internals/security.md | 8 ++------ .../cloud/reference/internals/durability.md | 14 ++++++++++---- .../influxdb/cloud/reference/internals/security.md | 8 ++------ 3 files changed, 14 insertions(+), 16 deletions(-) diff --git a/content/influxdb/cloud-dedicated/reference/internals/security.md b/content/influxdb/cloud-dedicated/reference/internals/security.md index 2d219c308..469d4f6fd 100644 --- a/content/influxdb/cloud-dedicated/reference/internals/security.md +++ b/content/influxdb/cloud-dedicated/reference/internals/security.md @@ -77,9 +77,8 @@ InfluxDB Cloud Dedicated is available on the following cloud providers: - [Microsoft Azure](https://azure.microsoft.com/en-us/) _(Coming)_ - [Google Cloud Platform (GCP)](https://cloud.google.com/) _(Coming)_ -To ensure data security, availability, and durability: -- Each instance is isolated and protected in its own virtual private cloud (VPC). -- Clusters are deployed across multiple provider availability zones. +To ensure data security, availability, and durability, each instance is isolated +and protected in its own virtual private cloud (VPC). Users interact with InfluxDB Cloud Dedicated only through Cloud Dedicated established APIs. For cluster management activities, authorized users interact with the Granite service. @@ -99,7 +98,6 @@ Each VPC within AWS is segmented into public and private subnets: - The private subnet contains supporting infrastructure (for example, compute and storage) not exposed to the public internet. -To ensure fault tolerance across the data layer, clusters are deployed across multiple availability zones. AWS data centers are compliant with many physical and information security standards. For detail about AWS's physical security and data center protocols, see [AWS's Compliance](https://aws.amazon.com/compliance/). @@ -109,7 +107,6 @@ In Google Cloud Platform (GCP), InfluxDB Cloud Dedicated uses the Google Kuberne and Google Compute Engine to deploy individual cluster components. Clusters are isolated at the project level to enhance access controls and data governance, and support auditing. -To ensure fault tolerance across the data layer, clusters are deployed across multiple availability zones. Google Cloud Platform data centers are compliant with many physical and information security standards. For detail about physical security in GCP data centers, see [Google's Compliance website](https://cloud.google.com/security/compliance/). @@ -120,7 +117,6 @@ In Microsoft Azure, InfluxDB Cloud Dedicated uses Azure Kubernetes Service (AKS) and Azure Virtual Machines to deploy individual cluster components. To support auditing and authorization control within Azure, clusters are deployed into dedicated VNets within each region. -To ensure fault tolerance across the data layer, clusters are deployed across multiple availability zones. Microsoft Azure data centers are compliant with many physical and information security standards. For detail about physical security within Microsoft Azure data centers, see [Microsoft's Compliance website](https://www.microsoft.com/en-us/trust-center/compliance/compliance-overview). diff --git a/content/influxdb/cloud/reference/internals/durability.md b/content/influxdb/cloud/reference/internals/durability.md index 99281da31..4f13d03cb 100644 --- a/content/influxdb/cloud/reference/internals/durability.md +++ b/content/influxdb/cloud/reference/internals/durability.md @@ -18,13 +18,13 @@ data is consistent and readable. ##### On this page - +- [Data replication](#data-replication) - [Backup processes](#backup-processes) - [Recovery](#recovery) - [Data verification](#data-verification) - ## Backup processes + InfluxDB Cloud backs up all data in the following way: - [Backup on write](#backup-on-write) @@ -42,6 +42,7 @@ InfluxDB Cloud backs up all data in the following way: - [Periodic TSM snapshots](#periodic-tsm-snapshots) ### Backup on write + All inbound write requests to InfluxDB Cloud are added to a durable message queue. The message queue does the following: @@ -60,6 +61,7 @@ To minimize potential data loss due to defects introduced in the InfluxDB Cloud we minimize the code used between the data ingest and backup processes. ### Backup after compaction + The InfluxDB storage engine compresses data over time in a process known as [compaction](/influxdb/cloud/reference/glossary/#compaction). When each compaction cycle completes, InfluxDB Cloud stores compressed @@ -67,10 +69,12 @@ When each compaction cycle completes, InfluxDB Cloud stores compressed in object storage. ### Periodic TSM snapshots + To provide multiple data recovery points, InfluxDB Cloud takes weekly snapshots of TSM files uploaded to object storage. The TSM snapshot includes a copy of all (non-deleted) data when the snapshot is created. These snapshots are preserved for 100 days. ## Recovery + InfluxDB Cloud uses the following out-of-band backups stored in object storage to recover data: - **Message queue backup:** line protocol from inbound write requests within the last 96 hours @@ -85,12 +89,14 @@ For example, if we need to rebuild all data from the TSM snapshots and message q it could take 24 hours or longer. ## Data verification + InfluxDB Cloud has two data verification services running at all times: - **Entropy detection:** ensures that replicated data is consistent - **Data verification:** verifies that data written to InfluxDB is readable ## InfluxDB Cloud status + InfluxDB Cloud regions and underlying services are monitored at all times. For information about the current status of InfluxDB Cloud, see the [InfluxDB Cloud status page](https://status.influxdata.com). diff --git a/content/influxdb/cloud/reference/internals/security.md b/content/influxdb/cloud/reference/internals/security.md index a5bcfd6d9..1356f3386 100644 --- a/content/influxdb/cloud/reference/internals/security.md +++ b/content/influxdb/cloud/reference/internals/security.md @@ -69,9 +69,8 @@ InfluxDB Cloud is available on the following cloud providers: - [Microsoft Azure](https://azure.microsoft.com/en-us/) - [Google Cloud Platform (GCP)](https://cloud.google.com/) -To ensure data security, availability, and durability: -- Each instance is isolated and protected in its own virtual private cloud (VPC) -- Clusters are deployed across multiple provider availability zones +To ensure data security, availability, and durability, each instance is isolated +and protected in its own virtual private cloud (VPC). ### Amazon Web Services (AWS) @@ -81,7 +80,6 @@ Each VPC within AWS is segmented into public and private subnets: - The public subnet contains resources exposed to the public internet, including load balancers and network address translation (NAT) gateways. - The private subnet contains supporting infrastructure (e.g., compute, storage) not exposed to the public internet. -To ensure fault tolerance across the data layer, clusters are deployed across multiple availability zones. AWS data centers are compliant with many physical and information security standards. For detail about AWS's physical security and data center protocols, see [AWS's Compliance](https://aws.amazon.com/compliance/). @@ -91,7 +89,6 @@ In Google Cloud Platform (GCP), InfluxDB Cloud uses the Google Kubernetes Engine and Google Compute Engine to deploy individual cluster components. Clusters are isolated at the project level to enhance access controls, data governance, and support auditing. -To ensure fault tolerance across the data layer, clusters are deployed across multiple availability zones. Google Cloud Platform data centers are compliant with many physical and information security standards. For detail about physical security in GCP data centers, see [Google's Compliance website](https://cloud.google.com/security/compliance/). @@ -102,7 +99,6 @@ In Microsoft Azure, InfluxDB Cloud uses Azure Kubernetes Service (AKS) and Azure Virtual Machines to deploy individual cluster components. To support auditing and authorization control within Azure, clusters are deployed into dedicated VNets within each region. -To ensure fault tolerance across the data layer, clusters are deployed across multiple availability zones. Microsoft Azure data centers are compliant with many physical and information security standards. For detail about physical security within Microsoft Azure data centers, see [Microsoft's Compliance website](https://www.microsoft.com/en-us/trust-center/compliance/compliance-overview).