Two-factor Authentication in Apache CloudStack l CloudStack Feature First Look

Ensuring CloudStack Perimeter Security with Two Factor Authentication and Time-based OTP

Introduction Two-Factor Authentication (2FA) is an authentication method where a user is authorised to login into a system only after successfully presenting two pieces of data, or factors. Something that the user knows plus something which the user possesses. Apache CloudStack 4.18 introduces a 2FA framework designed to bolster security when users access the platform. […]

Changing from Cluster-wide to Zone-wide Storage

changing from cluster-wide to zone-wide storage

Historically, all Primary Storage Pools inside CloudStack were Cluster-wide. Each Pool was “dedicated” to one cluster only – or in other words, only hosts in one cluster could access/use that Primary Storage Pool. This was an inheritance of the traditional storage implementations in various hypervisors – i.e. a Datastore in vSphere mounted on hosts in […]

Volume Encryption l CloudStack Feature Deep Dive

CloueStack volume encryption

Introduction Everyone would agree that data is the most important thing in the cloud today, and after so many breaches, encrypting data is increasingly popular among cloud service providers. Adding this additional security layer can make it even more difficult for unauthorized users to access your precious data. In this article, I’d like to introduce […]

CloudStack European User Group 2023 Roundup

CloudStack european user group 2023

CloudStack European User Group 2023 took place on the 4th May. ShapeBlue is proud to have supported the event, taking place in London. We would also like to take the chance to thank the other sponsors –  Your.Online and StorPool. Three of our own held their own sessions at the user group – Giles Sirett, Lucian […]

New CloudStack Database Encryption Engine l CloudStack Feature Deep Dive

new cloudstack database engcryption engine

Introduction As part of its security capabilities, Apache CloudStack encrypts sensitive information such as user credentials and passwords. For over a decade, Apache CloudStack has used the StandardPBEStringEncryptor from the jasypt library to encrypt data. However, the encryption algorithm used by this library, “PBEWithMD5AndDes” is now considered insecure because it relies on outdated cryptographics, namely […]

Ensuring CloudStack Perimeter Security with Two Factor Authentication and Time-based OTP

Ensuring CloudStack Perimeter Security with Two Factor Authentication and Time-based OTP

Control and oversight of who can access an organization’s computer systems and networks and the actions they can perform are referred to as user access security perimeter. This aspect of perimeter security is essential in preventing unauthorized access and safeguarding sensitive information. Securing user access to Apache CloudStack, where vital components of the business layer […]

Cloud Repatriation with Opensource Tools

Cloud Repatriation with Opensource Tools

Introduction The COVID-19 pandemic has acted as a catalyst for the widespread adoption of public cloud services, accelerating the digital transformation of numerous industries and organizations. Public cloud adoption has also revolutionized services, agility, and the pace of an entire generation of companies but many organizations are starting to realize that it doesn’t come for […]

CNCF Tungsten Fabric and Apache CloudStack – the Future of Cloud Networking

CNCF Tungsten Fabric and Apache CloudStack – the Future of Cloud Networking

As the world moves into a more connected and digitized future, cloud technologies are becoming increasingly essential for business. However, with the rise of hyperscale cloud providers, all-size companies and enterprises are finding it increasingly difficult to keep up with modern networking and security demands. This is where Tungsten Fabric and Apache CloudStack come in. […]

Adaptive Affinity Groups l CloudStack Feature First Look

Adaptive Affinity Groups

In Apache CloudStack, Host Affinity and Host Anti-Affinity refer to the ability to deterministically ensure that a set of Instances run on the same or diverse hypervisor hosts in order to meet specific workload needs. How Affinity Groups Worked Previously Before Apache CloudStack 4.18 there were two types of Affinity Groups: Host Affinity and Host […]

Securing Your Data with Volume Encryption in Apache CloudStack

Securing Your Data with Volume Encryption in Apache CloudStack

Protecting sensitive data is crucial in the face of growing cyber-attacks, meaning robust security measures are necessary. While backup and disaster recovery (BDR) play a significant role in data protection, other technologies such as volume encryption offer additional protection against a broader range of threats, especially unauthorized disclosure of sensitive information. This can include confidential […]

ShapeBlue
top 5 VMware Replacements

Compare the top VMware alternatives for 2025 – Apache CloudStack, OpenStack, Proxmox, OpenNebula, and Nutanix