Sign up now for Client Certification Foundation Course - June cohort!
Pure's logos
Pure Help Center for Pure Administrators

If you are a researcher, or other non-admin at your institution, click here.

  • Home
  • Announcements
  • Release Notes
  • Technical user guides
  • Training
  • Events
  • Support
  • Contact Us
  • Home
  • Training
  • Technical user guides
  • Hosting and installation

How Can We Help?

Search Results

Filter By Category

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Contact us

Hosting and installationHosting and installation

What you will find here: 

Documentation and supplementary information on hosting and installing Pure.

Amazon Web Services (AWS)

Important Reference Pages

  • Privacy and Data Protection
  • Data Security
  • Release and Quality Assurance

Pure Cloud Hosting - AWS

Introduction

Elsevier leverages the Amazon infrastructure (AWS/EC2) for hosting of Pure. By letting Elsevier handle hosting, clients no longer need to maintain in-house knowledge on hosting and managing their own infrastructure for Pure.

This has the a lot of advantages, among others:

  • Uptime. We ensure that Pure is running as expected and that the system is available according to our SLAs
  • Simplifying upgrade pains. We handle all upgrades of your Pure installation.
  • Server Monitoring. Your Pure installation is continuously monitored actively by our infrastructure team to ensure stability and performance of your Pure installation
  • Highly Performant. We ensure that your Pure installation runs on adequately provisioned servers and continuously monitor the system performance.
  • Security. All data created in Pure isolated is from other customers. The security advantages from Amazon Web Services further improves on this.
  • Reduced infrastructure costs. There is no need to buy and maintain local server infrastructure, database licenses etc. As the hardware requirements for the Pure software evolve, you don't need to invest in new hardware as this is covered by us.
  • Backups. All important system data is automatically backed up and kept for 26 weeks, ensuring system availability can easily be restored.

 

This document is not intended to cover topics already covered in our other documents:

  • Privacy and Data Protection  and Data Security in context of Pure
  • Release and quality assurance governing releases of Pure
  • Our standard SLA - more information is available in section 4 below.

Where

We support hosting of Pure in the following AWS regions:

  • US East (N. Virginia)
  • EU (Ireland)
  • Asia Pacific (Singapore)
  • Australia (Sydney)
  • China (Ningxia)

 

Our AWS set-up

Our typical set-up, looks like this

  • Pure running on top of a Unix server (using the Amazon Linux 2 AMI)
  • PostgreSQL database running on top of a Unix server (using the Amazon Linux 2 AMI)
  • Front-end in form of a Apache server running on top of a Unix server (using the Amazon Linux 2 AMI)
  • Pure Portal running on top of a number of Unix servers in multi-AZ setup for fault tolerance, with Cassandra and ElasticSearch backends for storage and search (using the Amazon Linux 2 AMI)

As described in the section on Service Windows (See section 12 below), we will perform maintenance upgrade of the underlying Unix Server (the Amazon Linux 2 AMI), as well as perform "ad hoc" patching as need when critical security updates are released for the specific Linux distribution we use. All servers are monitored (See section 7.2 below) and all modifiable data (databases, files, configuration, etc) are backed up regularly (See section 10 below).

You can read more about the Amazon Linux AMI here: http://aws.amazon.com/amazon-linux-ami/

We use (in Q1 2022) a mixture of m5a.xlarge, m5a.2xlarge and m5a.4xlarge instance to host the various parts of Pure (web-apps, database, file-system, services, etc).

 

SLA

Our SLA covers the following general topics and service levels. The points in bold, is already included in this document. Further SLAs are found in Service Level Agreement.

  • Mailing lists
  • Help Desk services
  • Error Reporting
  • Categorization of Defects
  • Remediation times in relation to error reporting
  • Escalation of errors
  • System response times
  • System operational and availability guarantees 
  • Procedures in case of lacking availability
  • Warranty regarding availability
  • Security
  • Storage and Backup
  • System Maintenance Windows
  • Disaster recovery
  • Backup procedures
  • Monitoring

Our SLA is a standard SLA for all customers, however, it does evolve over time - depending on new needs and/or changes in the infrastructure. Evolution is strictly "inclusive", hence we do not plan to relax service levels over time, nor discontinue certain service levels. What we do plan is to, over time, introduce more services levels, and in general strengthen the hosting offering - while adhering to our hosting principle as outlined above.

We are happy to share a copy of our current standard SLA with any customers, or potential customers.

 

Certificates

We are ISO27001 certified  (view our certification) , and we have defined procedures for Privacy and Data Protection, Data Security and Release and quality assurance.

Furthermore, our hosting partner, Amazon Web Services (AWS), holds an ISO 27001 certificate, which, along with their SOC 1 and SOC 2, can be made available to our active Pure customers on request to Elsevier. Note that any reports shared will be confidential, in accordance with your Pure agreement. AWS also holds an ISO 9001 certificate, and their SOC 3 is publicly available.

You can read more on Amazon's compliance here: http://aws.amazon.com/compliance/

Security

Please read our procedures for Data Security .

All servers will be behind an Apache HTTPD server and will only be accessible through HTTPS (SSL). All servers are behind a firewall with only port 80 and port 443 open. Port 80 will only be used to redirect client to port 443 so they do not get an error if trying to access the Subscribed Products with HTTP instead of HTTPS.

  • All access to the internal network will be through VPN, so the traffic will always be encrypted
  • All database users (one per customer) will have unique passwords and all relevant elements of the Subscribed Products is run as an Authorized User, without administrator rights

Our security is subject to change - please consult the latest version of our SLA for our current security measures.

System operational and availability guarantees

Elsevier warrants that the System shall have a yearly Availability of at least 99.5% - excluding scheduled maintenance. Furthermore, downtime excluded from availability includes Critical Security Patches, Permitted Maintenance and any disruptions in the availability of the System or reduced availability caused by problems beyond Elsevier’s control (e.g. force majeure or network problems) or caused by the Subscriber’s own equipment or applications.

Our System operational and availability guarantees are subject to change - please consult the latest version of our SLA for our current security measures.

Procedures in case of lacking availability

If either party discovers lacking availability, they must inform the other party hereof, without undue delay. 
Elsevier shall commence work to re-establish availability, no later than the morning of the next working day. Elsevier shall inform the Subscriber in writing when work to re-establish availability has been initiated, and again when availability has been re-established.  
When availability has been completely re-established Elsevier shall send a written report detailing the cause and responsibility for the incident, as well as a short summary of the incident, to the Subscriber.

Please consult the latest version of our SLA for information on warranty regarding availability.

 

Monitoring

All production servers hosted by Elsevier, will be registered in Elsevier’s monitoring software, which runs at regular intervals, 24 hours a day in order to ensure that any system malfunctions are detected, and that relevant people are alerted. We have different escalation procedures in place depending on the severity of the alert. Specifically the monitoring software will log response times, and alert Elsevier if the response times are too high - including checking that Pure can reached through the web interface, and that the Java / Tomcat process is running. The monitoring software will also monitor disk usage, memory usage, CPU usage, and all required services related to the OS. Furthermore, the monitoring software also checks that the backups have run correctly every night.

Our monitoring setup also provide us with statistics on "performance" and up-time of our different servers - we plan to make these statistics available for our customers as a "downloadable" report in the future.

 

Performance

Performance of our Pure servers is constantly monitored, and in the event of performance issues we use the means available in AWS to alleviate such problems. Specifically by changing instance types, provisioned IOPS, EBS "optimisations", and so on. In extreme cases we even have the option of running the individual Pure applications (Admin, Portal, WS) on different servers, or running on a dedicated database server.

The Pure architecture does not support traditional load balancing (nor, is it relevant). However, we are constantly testing and benchmarking Pure as part of our development process - this allows us to spot potential performance degradation as part of the introduction of new features, or as a result of changes in general.

 

Storage

Hosting shall include storage of up to 1 TB front end data, including, but not limited to, the database, upload files, audit logs, etc. Should the Subscriber exceed this limit, Elsevier shall contact the Subscriber, to agree any needed changes to the Agreement. Any changes to the storage limit shall be agreed in writing between the parties, and may be subject to additional fees. 

The Subscriber shall endeavor to inform Elsevier before uploading more than 100 GB of data in any one week.

Backup

We perform a backup of all data stored in Pures database, file system and configurations - i.e. this covers all modifiable data in Pure.

Our backup pattern:  

Most recent 7 days: 6 times per day. The backups will be stored for a week. 

Most recent month: 1 time per week on Saturdays. The backups will be stored for 1 month.  

After 1 month up to 6 months: 1 time per month on the first Saturday of the month.  

Any backups older than 6 months are deleted. 

 

Our backup pattern for non-production environments:   

Most recent 7 days: 1 time per day. The backups will be stored for a week. 

Most recent month: 1 time per week on Saturdays. The backups will be stored for 1 month. 

After 1 month up to 6 months: 1 time per month on the first Saturday of the month. 

Any backups older than 6 months are deleted.

 

Notice that restoring backup data is for emergencies only.

 

Disaster recovery

In the event of a disaster, the servers will, if possible, be restored in the same datacenter as before. If not, the servers will be created in an alternative data center. After the servers have been recreated all data will be restored from the latest backups. Whenever possible the Subscriber will be notified of the expected timeline for getting the server ready again. Elsevier will generally notify the Subscriber of the status and progress during the recovery process.

The current RPO (Recovery Point Objective) for Pure production instances is 4 hours, and for Pure staging instances 24 hours. The RTO (Recovery Time Objective) is 8 hours.

Elsevier also has a Business Continuity Plan in place for more global emergencies (e.g., total loss of Elsevier’s Hosting Environment).

 

 

Service Windows

System Maintenance

Elsevier reserves the last weekend of each month for maintenance work on the servers. Maintenance work only includes actual maintenance on the servers, such as operating system updates or other software updates, moving servers to different hardware, etc. The service cannot, and will not, be used for updating any hosted software (this is defined in New Pure Releases, see below).

Elsevier will send a notification to the Notification Mailing List one week prior to any monthly service window if Elsevier is planning any maintenance work within that particular month. It will also be listed on our Planned system maintenance  page.

 

 

New Pure Releases

The roll out process for new versions of Pure are based on the type of release and the purchased hosting package.

Upgrades to Pure are normally performed within the following service windows, during which pure will be offline. Under normal circumstances a pure upgrade will take less than 1 hour. The Pure Portal will still be online during upgrades.

Region Service window for upgrades
APAC Wednesdays 14:00-18:00 CET/CEST (21:00-01:00 SGT)
KSA Fridays 09:00-12:00 CET/CEST (11:00-14:00 AST)
EMEA Wednesdays 20:00-24:00 CET/CEST
AMER Thursday 08:00-12:00 CET/CEST (03:00-07:00 EST)

The individual customer will experience downtime for about 1 hour (usually less) per environment for their specific Pure installation. All customers will be notified via our mailing lists in advance. We cannot provide the specific time for a given Pure installation, but we will provide a time window, and the update will happen within that window. We aim to use update windows outside normal office hours within a given region.

 

 

Release type Frequency Primary Purpose Standard Pure Hosting Dedicated Pure Cloud Hosting
major version 3 times / year New features
  • Automatic deployment in service window (see region time table)
  • Production server: 3rd service window after release (+3w)
  • Staging server: 1st service window after release (+1w)
  • Upon request to support
  • Lead time expected
minor version Every month Fixes and minor improvements
  • Automatic deployment in service window (see region time table)
  • 1st service window after release
  • Upon request to support
  • Lead time expected
dash/emergency release Only when needed Urgent bug fixes
  • Automatic deployment in service window (see region time table)
  • 1st service window after release
  • Upon request to support
  • Lead time expected

Critical Security Patches

Critical security issues will be handled on a case-by-case basis – Elsevier will assert the criticality of the issue, and will assert actions needed to remedy the issue. Elsevier will notify the customer in case Elsevier deems it necessary to act immediately upon a critical security issue. Such notification will include information on the issue that is being addressed and information on expected downtime.

 

Pure mail

Pure allows simple mail sending via Amazon SES. This is the default settings and it will only allow sending mails from purehosted@elsevier.com.

If wanting to use any other sender or own domain (using DKIM, SPF, DMARK or like), we cannot provide this and suggest using the Subscribers own mail system.

 

Pure HTTPS settings

Pure is running behind an Apache HTTPD proxy server.

It is configured to support TLS version 1.2 only and have HTTP Strict Transport Security enabled.

This is based on Mozilla's recommendation for modern browser support (See https://wiki.mozilla.org/Security/Server_Side_TLS#Modern_compatibility for more information) which matches the @suppor supported browsers for Pure.

 

IPs in use for Pure and Pure Portal

These are the IPs used by Pure and Pure Portal.

If you need to setup something that make use of any of these it is recommended to use the DNS names, as that will always point to the correct IPs.

We do try to never change the IPs, but there can be instances where it is needed to be able to move to improved infrastructure.

The most likely thing to happen is that extra IPs are added to a given region to make it more robust.

We will send out notifications of any planned changes to the IPs in advance.

Outgoing IPs (NAT Gateways)

The IPs used by Pure and the Pure Portal when connecting to something on the outside of AWS.

IPs in bold are new IPs added on November 26th 2022.

Region AWS Region DNS IPs
APAC ap-southeast-1 ngw-ap-southeast-1.elsevierpure.com 52.220.30.250, 3.1.174.150, 54.254.104.244
AU ap-southeast-2 ngw-ap-southeast-2.elsevierpure.com 52.63.71.162, 52.64.67.59, 54.153.215.209
EU eu-west-1 ngw-eu-west-1.elsevierpure.com 54.194.229.108, 34.255.212.255, 99.81.63.13
US us-east-1 ngw-us-east-1.elsevierpure.com 52.203.176.132, 54.85.209.252, 34.239.77.147
China cn-northwest-1   52.83.103.221, 161.189.168.87, 52.82.69.84

Incoming IPs

The IPs used when connecting to Pure from outside AWS.

The real DNS names are not listed here, as each Pure has its own DNS name.

All new customers only get a elsevierpure.com DNS name, while a lot of old customers have both an elsevierpure.com and pure.elsevier.com DNS

name.

Region AWS Region DNS IPs
APAC ap-southeast-1 <CUST>.elsevierpure.com, <CUST>.pure.elsevier.com 13.228.199.194, 18.139.148.124,52.74.61.34
AU ap-southeast-2 <CUST>.elsevierpure.com, <CUST>.pure.elsevier.com 3.106.37.196, 3.25.2.196,13.238.85.235
EU eu-west-1 <CUST>.elsevierpure.com, <CUST>.pure.elsevier.com 34.248.98.230, 34.253.178.11,54.74.68.52
US us-east-1 <CUST>.elsevierpure.com, <CUST>.pure.elsevier.com 18.210.30.88, 3.90.122.189,54.172.222.125
China cn-northwest-1 Per customer Per customer

 

 

 

Published at January 24, 2025

Download
Table of Contents
  1. Amazon Web Services (AWS)
  2. Pure Cloud Hosting - AWS
  3. Introduction
  4. Where
  5. Our AWS set-up
  6. SLA
  7. Certificates
  8. Security
  9. System operational and availability guarantees
  10. Procedures in case of lacking availability
  11. Monitoring
  12. Performance
  13. Storage
  14. Backup
  15. Disaster recovery
  16. Service Windows
  17. System Maintenance
  18. New Pure Releases
  19. Critical Security Patches
  20. Pure mail
  21. Pure HTTPS settings
  22. IPs in use for Pure and Pure Portal
  23. Outgoing IPs (NAT Gateways)
  24. Incoming IPs
Related Articles
  • Information on change to supported systems
  • External authentication mechanisms
  • Planned system maintenance
Keywords
  • installation
  • hosting
  • amazon
  • aws
  • ip addresses
  • soc 2
  • sla
  • iso certification
  • iso27001
  • soc 1
  • iso 9001
  • 27001
  • hosting and installation

Was this article helpful?

Yes
No
Give feedback about this article

    About Pure

  • Announcements

    Additional Support

  • Events
  • Client Community
  • Training

    Need Help?

  • Contact Us
  • Submit a Support Case
  • My Cases
  • Linkedin
  • Twitter
  • Facebook
  • Youtube
Elsevier logo Relx logo

Copyright © 2025 Elsevier, except certain content provided by third parties.

  • Terms & Conditions Terms & Conditions
  • Privacy policyPrivacy policy
  • AccesibilityAccesibility
  • Cookie SettingsCookie Settings
  • Log in to Pure Help CenterLog in to Helpjuice Center

Knowledge Base Software powered by Helpjuice

Expand