Cloud Hosting Scope and Services

Setup
The ability to define “infrastructure configurations” in a programmatic way that leverages versioning, Reuse, and source control management. Develop an Automation solution to provision the services, resources and infrastructure component.
- Complete SSL (Encryption) Setup
- Replication and Clustering Setup
- Development Server Setup
- Quality Analysis (QA) Server Setup
- Production Server Setup
- Remote Server Setup

Support
- Go-Live Support
- Upgrade Support
- Helpdesk Support
- Server Optimization
- Global Cloud Infra to Scale up

Deployment
- Server and Application Hosting
- Code Deployment on Production Servers
- Server Optimization
- Database Encryption
- Patch Installation for Packages

Monitoring
- Server Monitoring
- Infrastructure Monitoring
- Application Monitoring
- Ticketing System Tracking

Management
- Server Management
- Application Management
- Infrastructure Management
- Server Backup
- Application and Database Backup
Do you want more information on DHIS2 Cloud Hosting?
Features of Cloud Hosting
We have deployed DHIs 2 systems in many organizations across the globe with advanced cloud hosting features that show our expertise and experience to improve management, stability, security and performance of your company. We work with a host of VPS providers to host and manage DHIS 2 instances that are suitable for your organization. Our DHIS 2 features
- End-to-End infrastructure management, design, and implementation
- On-Demand Disaster Recovery & Cluster setups for mission critical applications for redundancy, availability, and failover
- Team of certified technical specialists in various technologies working 24×7 to manage Infrastructure
- World Class monitoring and ticketing systems for proactive and reactive remediation’s
- SLA based support with 99% guaranteed uptime
- Stringent Physical, Network and Data, security and access control for protecting Client’s Intellectual property data
- Process oriented data backups with retention, and regular validation to ensure data availability
- SSL and Data encryption for authenticity, protection, and security of Data while in transit as well as at rest
- Continuous Infrastructure and Application updates and upgrades for avoiding vulnerabilities and exploits
- Support and Management based on Industry standards and ITIL guidelines for highest quality services
- Critical Service Levels for performance measurement, tracking, and reporting
- Greater visibility to Clients with Reporting, real-time control, and analysis of historical trends
- Automation Tools to leverage flexibility and scalability to grow infrastructure horizontally and vertically
- Cloud Technology adoptions for flexibility, scalability, redundancy and availability, Globally
- Global hosting options, in different countries, based on Client’s requirement
- Tangible business benefits with Agility, new business models, less operational issues, better use of resources and less CapEx involvement
Require a custom plan for DHIS 2 cloud setup?
Shared Hosting Plan for Every Business
$60USD/mo
10 GB HDD Space
4 GB Ram
2 core CPU
$110USD/mo
50 GBHDD Space
4 GB Ram
2 core CPU
$165 USD/mo
100 GB HDD Space
8 GB Ram
2 core CPU
How we can help
From setup to technical support and everything in between, our highly trained certified technical specialists for Cloud hosting have in-depth understanding of the DHIS2 components. We assist with:
- Problem Description Detailing
- Environment monitoring
- Application Information
- Error entry and message checks
- Item priority checks for troubleshooting
- Screenshots, log and other checks
SLA and Response Times
Email/incident support 24/7
Serverity | Acknowledgement Receipt1 | Target Resolution2 | Final Resolution |
---|---|---|---|
Critical | 2 Hours | 1 Business day | 5 Business day |
High | 4 Hours | 2 Business day | 10 Business day |
Medium | 4 Hours | 3 Business day | 15 Business day |
Low | 4 Hours | 4 Business day | 30 Business day |
1. Acknowledge Receipt means the time by which KNOWARTH must respond to the Incident reporter acknowledging receipt of the Incident.
2. Target Resolution means the target time for KNOWARTH to resolve the Incident and or deliver a temporary patch/fix.
Need Consultation? Speak to our DHIS2 Cloud consultants
Frequently Asked Questions
Data Collection
There are few services which are not part of the Cloud Hosting Services like:
- DBA Activities
- Data Migration, Validation and Cleansing
- App Maintenance, App Development and App enhancements
- Third-party tool, application, interface troubleshooting
- Issues found with apps when production deployment is carried out or rolled back
- Any Software cost would be bared by Client
- KNOWARTH Team will work from off-shore office in Ahmedabad
- Client owned domain name
- KNOWARTH will request Admin Access to required servers/systems/services as and when required
Security question
Network Operations Center Management and Security
Audits and Standards
Test and Development Environments
Data Breach, Incident Investigation and Response
Data and Metadata Retention
a) The provider should only keep data as long as necessary to perform the services to the organization.
a) Is data deleted on a specific schedule or only on termination of contract? Can your organization request that information be deleted? What is the protocol for such a request?
Data Storage and Data Access
a) Will any data be stored outside Canada?
b) Is all or some data at rest encrypted (e.g. just passwords, passwords and sensitive data, all data) and what encryption method is used?
b) (‘Incl’) – All data will be encrypted by changing one configuration of application.
b) DHIS2 platform allows various integration like Google Maps. Limited data is being exposed to such parties when using/leveraging features implemented in such platforms.
c) Support team will have super user credentials. So, based on request, L1 support staff will be able to use ‘super admin’ credentials to manage users account.
a) Does the provider perform background checks on personnel with administrative access to servers, applications and customer data?
b) Does the provider subcontract any functions, such as analytics? (this includes Google Analytics)
c) What is the provider’s process for authenticating callers and resetting access controls, as well as establishing and deleting accounts?
How does the provider assure the proper management and disposal of data?
a) The provider should only keep data as long as necessary to perform the services to the organization.
a) Is data deleted on a specific schedule or only on termination of contract? Can your organization request that information be deleted? What is the protocol for such a request?
Development and Change Management Process
Availability