Data Center

Purpose and Overview

Miami University provides a secure and scalable hosting environment for critical university applications and services. This service supports on-premises infrastructure as well as Miami’s private cloud solutions hosted in AWS, offering departments flexibility in deploying and managing their IT resources.

Features and Benefits

Features:

  • Virtual Server Hosting: Managed virtual machines for applications, databases, and development environments.
  • Cloud Integration: Private cloud solutions with AWS for scalability and resilience.
  • Data Storage & Backup: Secure and compliant storage with routine backups.
  • Web Hosting: Support for university-affiliated websites and applications.
  • Security & Compliance: Firewalls, monitoring, and access controls to ensure data protection.
  • Database Hosting: Managed solutions for SQL and Oracle databases.

Benefits:

  • Reduced infrastructure management overhead for departments.
  • Secure hosting environment with high availability.
  • Scalable resources to meet evolving business needs.
  • Expert IT staff managing underlying infrastructure and security.
  • Integration with Miami’s Single Sign-On (SSO) and other enterprise tools.

Service Boundaries and Constraints

  • Hosting availability depends on resource capacity and security considerations.
  • Departments are responsible for application-level support and data compliance.
  • Some specialized applications may require additional approvals or custom configurations.

Eligibility and Audience

This service is primarily designed for Miami University's IT staff and affiliated technical teams responsible for managing institutional applications and infrastructure. It supports:

  • IT Administrators: For deploying, managing, and maintaining university-hosted services.
  • Enterprise Application Owners: For hosting and integrating critical business applications.

This service is not generally intended for direct use by faculty, staff, or students for personal or academic purposes but it is possible to request a Memorandum of Understanding for IT Service to host an application or database for such purposes.

Getting Started and Support

  1. Infrastructure requests: Use the red buttons on this service to initiate a wide variety of service requests and changes related to this service

For assistance, visit miamioh.edu/itchat or contact IT Help at 513-529-7900

 
Add or Remove DNS Aliases Create a New Server DNS: Request a DNS Record Request a Firewall Rule Request a Generic Firewall Change Request a New Load Balanced Service Request an IP/VLAN Change Request an IPS Change Request an OpenStack Linux Ubuntu Server Request Cache Clear Request to Add or Modify User Permissions on a Linux or Windows Server Request to Decommission a Server Request Virtual Machine (VM) Changes Secret Management

Service Offerings (14)

Add or Remove DNS Aliases
Technical Support Representatives (TSRs) may use this form to request adding or remove a DNS Alias.
DNS: Request a DNS Record
IT Staff may use this form to request DNS records. You should expect to receive your record within 5 business days. Warning - Only One Item Per Request (Do not Combine More than One item Per Request)
Request a Firewall Rule
IT Staff may use this form to initiate a firewall rule request.
Request a Generic Firewall Change
This is used to initiate a generic firewall change request (used to catch everything that is not a rule request).
Request an IP/VLAN Change
Initiate an IP/VLAN change (this encompasses both firewalled and non-firewalled addresses).
Request an IPS Change
Initiate an IPS change request.
Request to Add or Modify User Permissions on a Linux or Windows Server
Initiate a request to add or modify user permissions on a Linux or Windows server.
Request to Decommission a Server
Service owners, administrators, and other IT staff may use this form is for decommissioning both physical and virtual servers. Servers are typically decommissioned within one month.
Request Virtual Machine (VM) Changes
IT staff may use this form to request Virtual Machine (VM) changes including creation, retirement, and resource allocation adjustments.
Secret Management
Developers and application administrators can use this form to request changes to "secrets" used during the deployment of application assets.

Attachments (0)

No files found.