Multi-Cloud Strategy for Norwegian Enterprises: Surviving Schrems II without Bankrupting Ops
The concept of "Multi-Cloud" often sounds like a buzzword invented by consultants to sell more billing hours. But here in August 2021, for a Norwegian CTO, it is no longer optional. It is a survival mechanism.
Since the CJEU struck down the Privacy Shield (Schrems II) last year, relying solely on US-based hyperscalers like AWS or Azure has become a legal minefield. If you are handling Norwegian citizen data, the Datatilsynet (Norwegian Data Protection Authority) is watching. You cannot simply trust Standard Contractual Clauses (SCCs) anymore.
Beyond the legal headaches, there is the issue of cost. Egress fees from major cloud providers are bleeding budgets dry. I recently audited a startup in Oslo that spent 40% of their monthly burn on data transfer fees just for moving backups between availability zones.
This guide isn't about abstract concepts. It is about the technical execution of a Hybrid Multi-Cloud architecture: keeping your critical data sovereign on CoolVDS (Norway) while leveraging global edge networks for content delivery.
The "Data Bunker" Architecture
The most resilient pattern emerging in 2021 is the "Data Bunker." In this setup, your System of Record (database, user PII, storage) resides on a provider with strict Norwegian jurisdiction and predictable pricing, while your System of Engagement (stateless frontends, heavy compute jobs) can float across hyperscalers.
Why CoolVDS for the bunker? Latency and law. Connecting to the Norwegian Internet Exchange (NIX) in Oslo ensures that your local customers get sub-5ms response times. AWS Stockholm is close, but it's not in Norway, and US ownership laws (CLOUD Act) still apply.
1. The Connectivity Layer: WireGuard Mesh
In the past, bridging clouds meant clunky IPsec tunnels or expensive Direct Connect circuits. Since the Linux 5.6 kernel release, WireGuard has become the standard for high-performance, encrypted cross-cloud networking. It is faster, simpler, and has a smaller attack surface than OpenVPN.
Here is how we configure a secure tunnel between a CoolVDS NVMe instance (the Data Bunker) and an external compute node. We assume you are running Ubuntu 20.04 LTS.
On the CoolVDS Node (Hub):
# /etc/wireguard/wg0.conf
[Interface]
Address = 10.100.0.1/24
SaveConfig = true
PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
ListenPort = 51820
PrivateKey =
[Peer]
# External Compute Node
PublicKey =
AllowedIPs = 10.100.0.2/32
On the External Node (Spoke):
# /etc/wireguard/wg0.conf
[Interface]
Address = 10.100.0.2/32
PrivateKey =
[Peer]
PublicKey =
Endpoint = 185.x.x.x:51820 # CoolVDS Public IP
AllowedIPs = 10.100.0.0/24
PersistentKeepalive = 25
Run wg-quick up wg0 on both. You now have a private, encrypted LAN spanning providers. Benchmark it using iperf3; you will likely see 95%+ of line speed, unlike the heavy overhead of IPsec.
2. Infrastructure as Code: Terraform 1.0
With Terraform finally hitting version 1.0 a few months ago (June 2021), the API stability guarantees are perfect for enterprise adoption. We avoid vendor lock-in by abstracting our infrastructure.
Instead of relying on proprietary tools like CloudFormation, we use Terraform to provision resources. While CoolVDS offers high-performance KVM, you can manage it alongside other resources using standard providers.
Pro Tip: Use the local-exec provisioner in Terraform to bootstrap your CoolVDS instances with Ansible immediately after creation. This ensures your security hardening scripts run before the server takes a single HTTP request.
resource "null_resource" "bootstrap_coolvds" {
connection {
type = "ssh"
user = "root"
host = var.coolvds_ip
private_key = file("~/.ssh/id_rsa")
}
provisioner "remote-exec" {
inline = [
"apt-get update",
"apt-get install -y python3 python3-pip",
"# Set up firewall immediately",
"ufw allow 22/tcp",
"ufw allow 51820/udp",
"ufw enable"
]
}
}
3. Database Replication Strategy
Running a database across a WAN is risky. Latency kills transactions. However, for a read-heavy application, you can keep the Master database on CoolVDS (Safe, Sovereign) and use Read Replicas elsewhere if absolutely necessary.
For PostgreSQL 13, tuning the WAL (Write Ahead Log) transmission is critical when nodes are separated by the internet. Do not rely on default settings.
# postgresql.conf optimization for WAN replication
wal_level = replica
max_wal_senders = 10
wal_keep_segments = 64 # Keep enough WAL files in case of network jitter
max_replication_slots = 10
hot_standby = on
# TCP Keepalives are vital for WAN stability
tcp_keepalives_idle = 60
tcp_keepalives_interval = 10
tcp_keepalives_count = 5
This configuration ensures that if the connection between Oslo and Frankfurt drops for a few seconds, the replication stream doesn't crash entirely; it buffers and resumes.
The TCO Reality Check: Egress Fees
Let's talk money. This is usually where the "Cloud" dream turns into a finance nightmare. Hyperscalers charge heavily for data leaving their network (Egress).
| Cost Factor | Hyperscaler (Avg) | CoolVDS (Norway) |
|---|---|---|
| Outbound Data | $0.09 - $0.12 / GB | Included / Low Flat Rate |
| Storage Performance | Pay extra for Provisioned IOPS | NVMe Standard |
| Data Sovereignty | Complex (US Law applies) | Simple (Norwegian/EU Law) |
If you host a media-heavy site or a high-traffic API, moving 10TB of data out of AWS could cost you over $900/month just in transfer fees. On CoolVDS, that bandwidth is generally part of the package. By keeping your bandwidth-heavy assets on CoolVDS and only using hyperscalers for burst compute, you optimize TCO significantly.
Security Compliance (GDPR & ISO)
Using a Norwegian provider like CoolVDS simplifies your GDPR Article 30 records. When a customer asks, "Where is my data?", you can answer: "Physically in Norway, protected by Norwegian law."
We recommend enabling LUKS encryption on your data partitions. Even if the physical drive is stolen (a rare "Mission Impossible" scenario, but we are paranoid), the data is useless without the key.
# Check encryption status on your volume
lsblk -o NAME,TYPE,SIZE,FSTYPE,MOUNTPOINT
# Encrypting a raw partition (Caution: Destructive)
cryptsetup luksFormat /dev/vdb
cryptsetup luksOpen /dev/vdb secure_data
mkfs.ext4 /dev/mapper/secure_data
mount /dev/mapper/secure_data /mnt/secure
Conclusion
A multi-cloud strategy in 2021 is not about using every cloud provider at once. It is about placing workloads where they make the most sense economically and legally.
For Norwegian businesses, the logic is clear:
- Core Data & Storage: CoolVDS (No egress shock, GDPR compliant, NVMe speed).
- Burst Compute / Global Edge: Hyperscalers (Only when necessary).
- Glue: WireGuard & Terraform.
Don't let your infrastructure be dictated by default settings. Take control of your latency and your ledger. Deploy a test instance on CoolVDS today and ping it from your office in Oslo—you will see the difference immediately.