You are previewing Adopting IBM PureApplication System V1.0.
O'Reilly logo
Adopting IBM PureApplication System V1.0

Book Description

This IBM® Redbooks® publication introduces users to the concepts of the IBM PureApplication™ System V1.0. This book covers the most common problems, solutions, best practices, and use cases about adopting the IBM PureApplication System V1.0.

The target audience for this book is anyone from the IT industry who wants to acquire a better understanding of IBM PureApplication System, including technical consultants, business partners, and independent software vendors who are considering migrating to a cloud computing solution. This book also is applicable to system administrators, middleware specialists, and software engineers who need a more in-depth approach to PureApplication System features and capabilities.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. The team who wrote this book
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Chapter 1. Introduction
    1. 1.1 The cloud environment
      1. 1.1.1 Characteristics
      2. 1.1.2 Cloud deployment models
      3. 1.1.3 Cloud service layers
      4. 1.1.4 Benefits of the cloud
      5. 1.1.5 Challenges and requirements
    2. 1.2 IBM PureSystems solutions
      1. 1.2.1 IBM PureFlex System
      2. 1.2.2 IBM PureApplication System
      3. 1.2.3 IBM PureData System
      4. 1.2.4 Patterns of expertise
    3. 1.3 IBM PureApplication System overview
      1. 1.3.1 Configurations
      2. 1.3.2 Virtual patterns
      3. 1.3.3 Management
      4. 1.3.4 Problem determination
    4. 1.4 Scope of this book
      1. 1.4.1 Intended audience
      2. 1.4.2 Assumptions
  5. Chapter 2. Integrating IBM PureApplication System into an existing data center
    1. 2.1 Prerequisites in the data center
      1. 2.1.1 Physical requirements
      2. 2.1.2 Software infrastructure requirements
    2. 2.2 The Genesis process
    3. 2.3 Interfaces for using and administering IBM PureApplication System
      1. 2.3.1 Web GUI
      2. 2.3.2 Command-line interface
      3. 2.3.3 REST API
    4. 2.4 Security
      1. 2.4.1 User roles
      2. 2.4.2 Group level permissions
      3. 2.4.3 Customer engineer access
      4. 2.4.4 LDAP integration
    5. 2.5 License management
      1. 2.5.1 Bundled software licenses
      2. 2.5.2 IBM License Metric Tool
      3. 2.5.3 License information
    6. 2.6 Networking
      1. 2.6.1 Networking hardware in IBM PureApplication System
      2. 2.6.2 Main networks
      3. 2.6.3 Port setup
      4. 2.6.4 Link aggregation
      5. 2.6.5 VLANS
    7. 2.7 Auditing
      1. 2.7.1 Auditor roles
      2. 2.7.2 External storage server for audit logs
      3. 2.7.3 Handling audit data
    8. 2.8 Monitoring
      1. 2.8.1 Integrated solutions
      2. 2.8.2 PureApplication System Monitoring Portal
      3. 2.8.3 Monitoring layers
      4. 2.8.4 External monitoring
    9. 2.9 Integration with external backup systems
      1. 2.9.1 Tivoli Storage Manager System plug-in configuration
      2. 2.9.2 Configuring a scheduled Tivoli Storage Manager database backup
      3. 2.9.3 Creating a manual backup
    10. 2.10 Export and import features
    11. 2.11 External database integration
    12. 2.12 Integrating shared network storage to virtual machines
      1. 2.12.1 Network Access Server integration on virtual system level
      2. 2.12.2 NAS integration on virtual application level
      3. 2.12.3 iSCSI integration
  6. Chapter 3. Usage patterns for isolating applications
    1. 3.1 Cloud computing overview
      1. 3.1.1 Cloud computing concepts
      2. 3.1.2 IBM PureApplication System features for cloud computing
    2. 3.2 Managing compute nodes
      1. 3.2.1 Starting compute nodes
      2. 3.2.2 Suspending compute nodes
      3. 3.2.3 Putting compute nodes in maintenance mode
      4. 3.2.4 Viewing compute node reports
    3. 3.3 Managing IP groups
      1. 3.3.1 Adding IP groups
      2. 3.3.2 Administering IP groups
      3. 3.3.3 Viewing IP group reports
      4. 3.3.4 Deleting IP groups and addresses
    4. 3.4 Managing cloud groups
      1. 3.4.1 Adding cloud groups
      2. 3.4.2 Administering cloud groups
      3. 3.4.3 Deleting cloud groups
      4. 3.4.4 Viewing cloud group reports
      5. 3.4.5 Managing storage volumes in cloud groups
      6. 3.4.6 Managing virtual machines in cloud groups
    5. 3.5 Managing shared services
      1. 3.5.1 Existing shared services
      2. 3.5.2 Deploying the System Monitoring service
      3. 3.5.3 Using an external caching service
      4. 3.5.4 Deploying an ELB proxy shared service
      5. 3.5.5 Deploying the Database Performance Monitor service
    6. 3.6 Managing environment profiles
      1. 3.6.1 Adding environment profiles
      2. 3.6.2 Editing an environment profile
      3. 3.6.3 Cloning an environment profile
    7. 3.7 IBM PureApplication System isolation strategies
      1. 3.7.1 Resource isolation via networking
      2. 3.7.2 Resource isolation via access control
      3. 3.7.3 Application environments
      4. 3.7.4 Multiple lines of businesses
      5. 3.7.5 Resource isolation by using a trust domain
      6. 3.7.6 Isolation for shared resources
  7. Chapter 4. PureApplication Deployment Models
    1. 4.1 Introduction
      1. 4.1.1 Virtual systems
      2. 4.1.2 Virtual applications
    2. 4.2 Trade-offs between control against total cost of ownership and total time to value
    3. 4.3 Virtual Appliances
    4. 4.4 Virtual Images
      1. 4.4.1 Hypervisor edition images
      2. 4.4.2 Parts of hypervisor edition image
    5. 4.5 Virtual Systems
      1. 4.5.1 Virtual System Patterns
      2. 4.5.2 Planning and designing your virtual system pattern
      3. 4.5.3 Deploying virtual patterns
      4. 4.5.4 Customizing images and patterns
      5. 4.5.5 Image Construction and Composition Tool and AMC tools usage
      6. 4.5.6 Logical to physical mapping for virtual systems
      7. 4.5.7 Benefits and trade-offs
    6. 4.6 Virtual applications
      1. 4.6.1 Concepts
      2. 4.6.2 Virtual application patterns
      3. 4.6.3 Simple topology instantiation
      4. 4.6.4 Topology with scaling policy instantiation
      5. 4.6.5 Shared services
      6. 4.6.6 Benefits and trade-offs
    7. 4.7 Implementation strategy
      1. 4.7.1 Questions for consideration in application migration or creation
      2. 4.7.2 Database best practices to deploy
    8. 4.8 PureSystems Centre
  8. Chapter 5. Customizing Virtual System Patterns
    1. 5.1 Resources for customization
      1. 5.1.1 Customization targets
      2. 5.1.2 Tools for customization
    2. 5.2 Managing patterns by using Virtual System Pattern Editor
      1. 5.2.1 Editing virtual system patterns
      2. 5.2.2 Cloning virtual system patterns
      3. 5.2.3 Creating virtual system patterns
    3. 5.3 Build virtual images by using the IBM Image Construction and Composition Tool
      1. 5.3.1 Installing Image Construction and Composition Tool
      2. 5.3.2 Enabling Image Construction and Composition Tool as a virtual application
      3. 5.3.3 Working with Image Construction and Composition Tool
      4. 5.3.4 Creating software bundles with Image Construction and Composition Tool
      5. 5.3.5 Using command-line interface for Image Construction and Composition Tool
      6. 5.3.6 Advanced configuration with Image Construction and Composition Tool
    4. 5.4 Administering PureApplication System by using CLI
    5. 5.5 Working with script packages
    6. 5.6 Using Advanced Middleware Configuration
      1. 5.6.1 Overview
      2. 5.6.2 AMC User interfaces for PureApplications System
      3. 5.6.3 On-boarding applications with AMC
    7. 5.7 Add-ons and advanced options
      1. 5.7.1 Catalog add-ons to virtual system patterns
      2. 5.7.2 Advanced options
  9. Chapter 6. Customizing Virtual Application Patterns
    1. 6.1 Prerequisites
      1. 6.1.1 Hardware requirements
      2. 6.1.2 Software requirements
    2. 6.2 Virtual Application Pattern elements
      1. 6.2.1 Components
      2. 6.2.2 Policy types customization
    3. 6.3 Creating virtual application patterns with the virtual application builder interface
    4. 6.4 Lifecycle management of virtual applications
      1. 6.4.1 Virtual pattern development kit
      2. 6.4.2 Plug-in overview
      3. 6.4.3 Virtual application lifecycle
    5. 6.5 Plug-in environment setup and creation of custom patterns
      1. 6.5.1 Troubleshooting and monitoring services
      2. 6.5.2 Deploying and managing virtual applications
  10. Chapter 7. Integrating PureData for Transaction
    1. 7.1 Advantages of integrating PureData for Transaction with PureApplication System
    2. 7.2 Prerequisites for integrating the PureData for Transaction with PureApplication
    3. 7.3 Registration of PureData for Transaction with PureApplication System
    4. 7.4 Deploying pureScale Database from PureData for Transaction
    5. 7.5 Deploying PureApplication System middleware
      1. 7.5.1 Creation of a virtual application pattern
      2. 7.5.2 Deploying the virtual application
  11. Chapter 8. Troubleshooting PureApplication System Environment
    1. 8.1 Troubleshooting overview
    2. 8.2 Consoles available for PureApplication System troubleshooting
      1. 8.2.1 System Console
      2. 8.2.2 Workload Console
    3. 8.3 Command-line interface
    4. 8.4 Product logs and tracing
      1. 8.4.1 Enable product tracing
      2. 8.4.2 Product logs
    5. 8.5 Image Construction and Composition Tool
      1. 8.5.1 Troubleshooting the Image Construction and Composition Tool
      2. 8.5.2 Image Construction and Composition Tool log files
    6. 8.6 Virtual image synchronization problems
      1. 8.6.1 ESX VMWare Server and Microsoft Windows related troubleshooting
      2. 8.6.2 Common problem troubleshooting
  12. Chapter 9. High Availability and Disaster Recovery
    1. 9.1 High Availability and Disaster Recovery overview
      1. 9.1.1 Failover strategies
      2. 9.1.2 Software clustering modes
      3. 9.1.3 HADR solution components
      4. 9.1.4 Disaster recovery models
    2. 9.2 Workload failover and recovery scenarios
      1. 9.2.1 Virtual applications: WebSphere Application Server
      2. 9.2.2 Virtual systems: WebSphere Application Server without IMP
      3. 9.2.3 Virtual systems: WebSphere Application Server with IMP
      4. 9.2.4 Virtual applications: DBaaS
      5. 9.2.5 Virtual systems: DB2
      6. 9.2.6 Caching shared service
      7. 9.2.7 Proxy shared service
      8. 9.2.8 Custom image
    3. 9.3 Hardware high availability
    4. 9.4 High availability scenarios
      1. 9.4.1 Intra-rack high availability
      2. 9.4.2 Inter-rack high availability
      3. 9.4.3 Inter-rack high availability within the same data center
      4. 9.4.4 Inter-rack high availability across distributed data centers
    5. 9.5 Disaster recovery approaches
      1. 9.5.1 Virtual application pattern backup and restore
      2. 9.5.2 Virtual system pattern back up and restore
      3. 9.5.3 Virtual appliance pattern backup and restore
      4. 9.5.4 Configurations backup
    6. 9.6 Current limitations
  13. Related publications
    1. Online resources
    2. Help from IBM
  14. Back cover