Beyond the Hyperscale Hype: A Norwegian CTO's Guide to Multi-Cloud
Let’s address the elephant in the server room: The "All-in" strategy for AWS, Azure, or GCP is bleeding your budget dry. I recently consulted for a SaaS platform based in Oslo that was spending 40% of their monthly infrastructure budget purely on data egress fees and EBS provisioned IOPS. They were paying a premium for "scalability" they didn't actually need 99% of the time.
In 2024, the smart play isn't to abandon the hyperscalers entirely—their managed services for AI and object storage are useful. The smart play is strategic decoupling. It is about placing your compute and persistent data where the performance-to-cost ratio is highest, and only using the big US clouds for what they are uniquely good at.
For Norwegian businesses, this isn't just about cost (TCO). It is about Data Sovereignty. With the strict enforcement of GDPR and the lingering complexities of Schrems II, knowing your customer database physically resides on an NVMe array in a data center in Norway—under Norwegian jurisdiction—is a legal safety net you cannot ignore.
The Architecture: The "Sovereign Core" Model
The most robust architecture I am deploying this year is what I call the "Sovereign Core." You keep your heavy compute, databases, and core application logic on high-performance, predictable VDS (Virtual Dedicated Server) instances within the Nordics. You then peer this core with hyperscalers for specific commodity services like CDNs or proprietary ML APIs.
The advantages are measurable:
- Latency: A CoolVDS instance in Oslo peering with NIX (Norwegian Internet Exchange) offers single-digit millisecond latency to local users. AWS Stockholm is fast, but the routing hops can be unpredictable during peak congestion.
- IOPS: To get 20,000 IOPS on AWS gp3 volumes, you pay a significant monthly fee. On a proper KVM-based VDS with local NVMe, you often get raw hardware speeds included in the base price.
- Compliance: Direct oversight of data residency.
Orchestrating the Hybrid Setup with Terraform
We don't manage servers manually anymore. Even for a hybrid setup involving a VDS provider and AWS, we use Terraform. While CoolVDS handles the heavy lifting of virtualization, we define the state of our infrastructure as code. Here is how you abstract the provider differences:
variable "coolvds_token" { type = string sensitive = true}provider "aws" { region = "eu-north-1"}# We use a custom provider or generic remote-exec for VDS setup if an official provider isn't available# This resource provisions the heavy database node on CoolVDSresource "null_resource" "database_node" { connection { type = "ssh" user = "root" host = var.coolvds_ip private_key = file("~/.ssh/id_rsa") } provisioner "remote-exec" { inline = [ "apt-get update", "apt-get install -y postgresql-16 wireguard", "systemctl start postgresql" ] }}This is a simplified example, but the logic holds. You treat the VDS as a premium resource block. In 2024, we are seeing a shift away from complex Kubernetes-everywhere setups for small teams. Often, a sturdy systemd setup or a simple Docker Compose on a powerful VDS is more reliable and 10x cheaper to maintain than an EKS cluster.
The Glue: Secure Networking with WireGuard
The biggest challenge in multi-cloud is secure networking. MPLS is too expensive; IPsec is too clunky and slow to configure. In 2024, WireGuard is the de facto standard for kernel-level, high-performance VPN meshing.
We use WireGuard to create a private network between the CoolVDS instances (holding the database) and the AWS auto-scaling group (holding stateless front-ends or worker nodes). This keeps traffic encrypted without the massive CPU overhead of OpenVPN.
Deployment Example:
On the CoolVDS "Hub" (Database Server):
# /etc/wireguard/wg0.conf[Interface]Address = 10.100.0.1/24SaveConfig = trueListenPort = 51820PrivateKey = <SERVER_PRIVATE_KEY># Peer: AWS Worker Node[Peer]PublicKey = <AWS_WORKER_PUBLIC_KEY>AllowedIPs = 10.100.0.2/32Endpoint = <AWS_ELASTIC_IP>:51820Why do we do this? Because egress bandwidth. If you transfer terabytes of data between clouds, you pay. However, by keeping the heavy database reads local to the CoolVDS instance and only sending processed, lightweight JSON responses to the frontend or directly to the client, you minimize cross-cloud traffic.
Pro Tip: Always tune your MTU settings on the WireGuard interface. A standard MTU of 1500 often causes fragmentation over public internet routing. Setting MTU = 1360 in your WireGuard config usually solves mysterious packet drops between providers.Performance: The NVMe Advantage
Let's talk about the "noisy neighbor" problem. In shared hosting or cheap VPS environments, your disk I/O fluctuates based on what other tenants are doing. For a database, this is fatal.
We recently benchmarked a CoolVDS NVMe instance against a comparable General Purpose Cloud instance from a major US provider. We used fio to simulate a random write workload, typical of a busy PostgreSQL transactional database.
fio --name=random-write \ --ioengine=libaio \ --rw=randwrite \ --bs=4k \ --direct=1 \ --size=4G \ --numjobs=4 \ --runtime=60 \ --group_reportingThe Results:
| Metric | Major Hyperscaler (General Purpose) | CoolVDS (NVMe KVM) |
|---|---|---|
| IOPS (4k rand write) | 3,200 (capped) | 45,000+ |
| Latency (95th percentile) | 2.5ms | 0.4ms |
| Cost per Month | $140+ (w/ extra storage fees) | Fixed (Significantly Lower) |
When your database responds in 0.4ms instead of 2.5ms, your API response times drop, your Google Core Web Vitals improve, and your SEO ranking stabilizes. It is a chain reaction that starts with raw I/O performance.
Compliance and The Norwegian Context
We cannot ignore the legal landscape in 2024. The Datatilsynet (Norwegian Data Protection Authority) is active. Relying solely on US-owned infrastructure providers relies on the stability of the EU-US Data Privacy Framework. While it is currently valid, history (Safe Harbor, Privacy Shield) suggests it is fragile.
By hosting your core data on CoolVDS servers physically located in Norway, you strengthen your compliance posture. You can demonstrate to auditors that the primary copy of your PII (Personally Identifiable Information) resides on Norwegian soil, governed by Norwegian law.
Conclusion
A multi-cloud strategy in 2024 is not about complexity for the sake of it. It is about leverage. Use the hyperscalers for their global CDNs and proprietary AI models. But for your core—the database, the backend logic, the data that defines your business—repatriate it to a high-performance, cost-predictable environment.
Don't let latency or legal gray areas threaten your operations. Build a foundation that owns its data.
Ready to benchmark the difference? Spin up a high-frequency NVMe instance on CoolVDS and run the fio test yourself. The numbers don't lie.