You are previewing SOA Policy, Service Gateway, and SLA Management.
O'Reilly logo
SOA Policy, Service Gateway, and SLA Management

Book Description

This IBM® Redbooks® publication teaches you how to automate your runtime policy by using a centralized policy management system. The SOA Policy Solution provides a centralized policy administration, enforcement, and monitoring for runtime policies that enable traffic management for service level agreement enforcement, service mediation, and other customized policies. Policies can be defined once and reused among multiple services, thus enabling a standardized, consistent approach to a runtime policy that saves time and money for implementation and maintenance of non-functional requirements for the enterprise and assists with faster time to market.

Business users can use the SOA Policy Solution to help create the service level agreements for their business services to deliver on promises for business performance. IT Architects can use the SOA Policy Solution to architect the policy solution patterns that standardize the runtime policy usage at their organization. Developers select specific policy patterns to implement the non-functional requirements that are associated with their projects. Operations groups provide information about operation needs and create standardized monitoring policy for operational action at run time.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. The team who wrote this book
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Part 1 Introduction
  5. Chapter 1. The SOA Policy Solution
    1. 1.1 Information about the SOA Policy Solution
      1. 1.1.1 What is the solution
      2. 1.1.2 What products are involved
      3. 1.1.3 Who uses the solution
      4. 1.1.4 Did you know
    2. 1.2 Business value: The business aspects of the solution
    3. 1.3 Solution overview
    4. 1.4 Solution architecture
      1. 1.4.1 How the components of this solution fit together
      2. 1.4.2 Hardware platform
      3. 1.4.3 Software requirements
    5. 1.5 Scenarios of use
      1. 1.5.1 Standardized SLAs
      2. 1.5.2 Differentiating Service SLAs
      3. 1.5.3 Easily allow new consumers to access back office services
      4. 1.5.4 Reject low-priority traffic during business hours
      5. 1.5.5 Reroute traffic during maintenance windows
      6. 1.5.6 Deny access to rogue consumer applications
      7. 1.5.7 Service versioning support
      8. 1.5.8 Apply standard security to access provider services
      9. 1.5.9 Provide operational status and alerts
      10. 1.5.10 Automatically apply policy to new services
      11. 1.5.11 Provide a standardized policy group for services
    6. 1.6 How to use this book
  6. Chapter 2. Business case for using the SOA Policy Solution
    1. 2.1 Introducing the ITSO Redbooks Travel Company
      1. 2.1.1 History of the company
      2. 2.1.2 The IT environment
      3. 2.1.3 The business goals and objectives
    2. 2.2 Creating the business case
    3. 2.3 Business case results
    4. 2.4 Instructions for constructing your own business case
  7. Part 2 Policy examples
  8. Chapter 3. Policy traffic management, provider only, with operations
    1. 3.1 Implement the provider services scenario
      1. 3.1.1 Verify product installations
      2. 3.1.2 Validate existing services
      3. 3.1.3 Integrate products in the pattern
    2. 3.2 Service governance
      1. 3.2.1 Sample files
      2. 3.2.2 Governing the services yourself
      3. 3.2.3 Using your own services
      4. 3.2.4 Creating your business spaces
    3. 3.3 Govern existing services
      1. 3.3.1 Creating a business service and service version
      2. 3.3.2 Creating service level definitions
      3. 3.3.3 Creating policies
      4. 3.3.4 Attaching policies to SLDs for services you want
      5. 3.3.5 Setting up a service gateway in DataPower
      6. 3.3.6 Promoting the services to WSRR run times
      7. 3.3.7 Synchronization with DataPower
    4. 3.4 Creating policies
      1. 3.4.1 Creating mediation policy for queuing
      2. 3.4.2 Creating mediation policy for throttling
      3. 3.4.3 Creating Mediation Policy for Notify
      4. 3.4.4 Running client transactions to validate provider services
    5. 3.5 Attaching policies
      1. 3.5.1 Attaching a policy to a specific service and operations
      2. 3.5.2 Attaching the policy to all services matching a name
      3. 3.5.3 Attaching policy to all services for an organization
    6. 3.6 Reporting on services and policies applied to services
  9. Chapter 4. Policy traffic management and consumer provider pairs
    1. 4.1 Implement the consumer-to-provider services scenario
      1. 4.1.1 Create a business application with capability application version
      2. 4.1.2 Govern business application
      3. 4.1.3 Create a service level agreement
      4. 4.1.4 Create policies
      5. 4.1.5 Add the SLD as an agreed endpoint to the SLA
      6. 4.1.6 Attach policies to an SLA
      7. 4.1.7 Promote the services to the WSRR run time
      8. 4.1.8 Synchronization with DataPower
      9. 4.1.9 Validate the services
    2. 4.2 Determining customer priority
    3. 4.3 Customer priority policy example
      1. 4.3.1 Defining a Gold customer
      2. 4.3.2 Silver customer
      3. 4.3.3 Blacklist customer
      4. 4.3.4 Rogue customer
  10. Chapter 5. Versioning with custom policy
    1. 5.1 General description of the versioning use case
    2. 5.2 Implementing the versioning pattern with DataPower and WSRR
    3. 5.3 Custom versioning policy enforcement details
    4. 5.4 Pricing service versions
      1. 5.4.1 Details of the Pricing service versions
      2. 5.4.2 Data mediation between versions of the Pricing service
      3. 5.4.3 Pricing services in WSRR
    5. 5.5 Creating custom policy domain and assertions for versioning
    6. 5.6 Creating custom policy XSL style sheet for the custom versioning policy
      1. 5.6.1 Creating the DataPower configuration artifacts
      2. 5.6.2 Exporting the DataPower configuration artifacts
      3. 5.6.3 Writing the custom policy style sheet for versioning
    7. 5.7 Attaching the custom versioning policy to a specific service
      1. 5.7.1 Attaching the custom versioning policy in WSRR at design-time
      2. 5.7.2 Creating a saved search in WSRR at design-time
      3. 5.7.3 Creating a Web Service Proxy for versioning in DataPower
      4. 5.7.4 Demonstration of the custom versioning policy enforcement
  11. Chapter 6. Security using custom policy
    1. 6.1 Service security
    2. 6.2 Creating a custom policy for security
      1. 6.2.1 DataPower AAA policy
      2. 6.2.2 Prerequisites
      3. 6.2.3 Policy decision point (PDP) versus policy administration point (PAP)
    3. 6.3 Creating custom policy domain and assertion for security
    4. 6.4 Creating a custom policy XSL style sheet for the custom security policy
      1. 6.4.1 Creating the DataPower configuration artifacts
      2. 6.4.2 Exporting the DataPower configuration artifacts
      3. 6.4.3 Writing the custom policy style sheet for security
    5. 6.5 Attach custom policy to all services for an organization
      1. 6.5.1 Attaching the custom security policy in WSRR at design-time
      2. 6.5.2 Attaching a custom security policy loaded on the DataPower device
  12. Chapter 7. Policy monitoring
    1. 7.1 Monitoring services
    2. 7.2 Displaying services in ITCAM
    3. 7.3 Monitoring examples
      1. 7.3.1 Steps to create a policy
      2. 7.3.2 Attaching to an SLD and creating a situation
      3. 7.3.3 Various situation tables
  13. Part 3 Policy administration point
  14. Chapter 8. WebSphere Service Registry and Repository for traffic management
    1. 8.1 Overview of WSRR as the PAP
    2. 8.2 Creating a mediation policy
      1. 8.2.1 Attribute conditions
      2. 8.2.2 Schedule conditions
      3. 8.2.3 Actions
    3. 8.3 Viewing a mediation policy
    4. 8.4 Updating a mediation policy
    5. 8.5 Deleting a mediation policy
    6. 8.6 Using Consumer ID and Context ID
  15. Chapter 9. WebSphere Service Registry and Repository for monitoring policy
    1. 9.1 Why monitor
      1. 9.1.1 Monitoring or IBM Service Management
      2. 9.1.2 Terminology
    2. 9.2 Monitoring options in WSRR
      1. 9.2.1 Basic ITCAM architecture
      2. 9.2.2 Creating a monitoring policy
      3. 9.2.3 Modifying a Policy
    3. 9.3 When a threshold is crossed
      1. 9.3.1 Operator’s monitor
      2. 9.3.2 Automatic response by ITCAM
      3. 9.3.3 Automatic response to WSRR (eventing)
    4. 9.4 Advanced monitoring with ITCAM
      1. 9.4.1 Creating situations without WSRR
      2. 9.4.2 Creating situations in ITCAM
      3. 9.4.3 Advanced situation functions
  16. Chapter 10. Attaching a policy to a service
    1. 10.1 Attaching a policy to a service
    2. 10.2 Viewing and editing a policy attachment by using WSRR
      1. 10.2.1 Dynamic attachment of a policy to a set of services
      2. 10.2.2 Attaching a policy from a specific item
    3. 10.3 Attaching a policy to a provider service using an SLD
      1. 10.3.1 Service
      2. 10.3.2 Operation
      3. 10.3.3 Endpoint
    4. 10.4 Attaching policy to consumer-provider pair by using SLA
      1. 10.4.1 Service
      2. 10.4.2 Operation
      3. 10.4.3 Endpoint
    5. 10.5 Specifying policies from unknown consumers
  17. Chapter 11. Policy administration point utilities
    1. 11.1 Understanding the policy lifecycle
    2. 11.2 Viewing policies attached to a service
    3. 11.3 Viewing services attached to a policy
    4. 11.4 Restricting policy access
    5. 11.5 Viewing activity log for a policy
    6. 11.6 Using policy events for management of monitoring policy results
  18. Part 4 Policy enforcement point
  19. Chapter 12. DataPower policy enforcement point configuration
    1. 12.1 Overview
    2. 12.2 WSRR server object
    3. 12.3 Web Service Proxy object
    4. 12.4 Front Side Handler
    5. 12.5 WSRR subscriptions and saved search subscription
      1. 12.5.1 WSRR subscription
      2. 12.5.2 WSRR saved search subscription
    6. 12.6 Policy Parameter Set object
    7. 12.7 SLA policy details
      1. 12.7.1 SLD Definition Files
      2. 12.7.2 SLA policy
      3. 12.7.3 DataPower Rules grid
    8. 12.8 Scope of a policy on one or more DataPower appliances
      1. 12.8.1 Applying policy to a single appliance
      2. 12.8.2 Applying policy to several appliances
      3. 12.8.3 Applying policy to a DataPower cluster
  20. Chapter 13. Creating and using custom policies
    1. 13.1 When to use a custom policy
    2. 13.2 Creating a custom policy
      1. 13.2.1 Custom policy governed in WSRR
      2. 13.2.2 Custom policy loaded in DataPower
      3. 13.2.3 Actors and components
      4. 13.2.4 Steps to create a custom policy
      5. 13.2.5 Custom policy domain
      6. 13.2.6 Custom policy XSL style sheet
    3. 13.3 Importing a custom policy in WSRR
    4. 13.4 Custom policy attachment in WSRR
    5. 13.5 Importing a custom policy in DataPower
    6. 13.6 Custom policy attachment in DataPower
    7. 13.7 Custom policy enforcement
  21. Chapter 14. ITCAM as policy monitoring point
    1. 14.1 Overview of ITCAM as the PMP
    2. 14.2 Overview of Tivoli architecture
      1. 14.2.1 IBM Tivoli Monitoring Architecture
      2. 14.2.2 ITCAM for SOA architecture
    3. 14.3 ITCAM for Applications processes policy and management updates from WSRR
    4. 14.4 Configuring for integration of WSRR and ITCAM for Applications
    5. 14.5 Troubleshooting the installation
    6. 14.6 Troubleshooting and tracing the integration
      1. 14.6.1 Situation verification
      2. 14.6.2 Trace levels in WSRR
      3. 14.6.3 Trace levels in ITCAM
      4. 14.6.4 Example traces
    7. 14.7 Operations notification and upstream integration with other Tivoli products
    8. 14.8 ITCAM monitoring agent for DataPower policies
  22. Part 5 Appendixes
  23. Appendix A. Implementing a SOA Policy Solution flow of work
    1. A.1 Installing the samples from this book
    2. A.2 Validating installation of each individual product in the SOA Policy Solution
    3. A.3 Integrating products in the SOA Policy Solution
    4. A.4 Governing of services
    5. A.5 Creating Policies
    6. A.6 Attaching policies
    7. A.7 Promotion within WSRR
    8. A.8 Running the client to validate the services
  24. Appendix B. ITCAM monitoring attribute tables
    1. B.1 Attribute table descriptions
    2. B.2 Endpoint Inventory attributes
    3. B.3 Fault Log_610 attributes
    4. B.4 Message Arrival Threshold_610 attributes
    5. B.5 Services Inventory_610 attributes
    6. B.6 Services Inventory Requester Identity_610 attributes
  25. Appendix C. Additional material
    1. C.1 Locating the web material
    2. C.2 Using the web material
    3. C.3 Set up and use the Sample SOA Policy Pattern Business Case ROI spreadsheet
  26. Related publications
    1. IBM Redbooks
    2. Online resources
    3. Help from IBM
  27. Back cover