Ibm Smartcloud: Building A Cloud Enabled Data Center: Front Cover
Ibm Smartcloud: Building A Cloud Enabled Data Center: Front Cover
Redguides
for Business Leaders
Pietro Iannucci
Manav Gupta
Infrastructure as a service (IaaS) is the typical starting point for most organizations when
moving to a cloud computing environment. IaaS can be used for the delivery of resources
such as compute, storage, and network services through a self-service portal. With IaaS, IT
services are delivered as a subscription service, eliminating up-front costs and driving down
ongoing support costs.
IBM® has defined the Cloud Computing Reference Architecture (CCRA) based on years of
experience of working with customers who have implemented cloud-computing solutions. The
IBM CCRA is a blueprint or guide for architecting cloud-computing implementations. It is
driven by functional and nonfunctional requirements that are collected from many
cloud-computing implementations. IBM CCRA provides guidelines and technical work
products, such as service and deployment models, and has defined the overarching
implementations as adoption patterns. An adoption pattern embodies the architecture
patterns that represent the ways organizations are implementing cloud-computing solutions.
An adoption pattern can help guide the definition of your cloud-computing solution.
The adoption pattern for IaaS as defined by the CCRA is called the Cloud Enabled Data
Center adoption pattern. The Cloud Enabled Data Center adoption pattern contains
prescriptive guidance on how to architect, design, and implement an IaaS solution. It also
defines the core requirements and provides guidance on adding new capabilities as they are
needed.
The Cloud Enabled Data Center adoption pattern contains four architectural patterns. Each
architectural pattern addresses a specific set of business needs for an IaaS solution. This
modular architecture allows the extension of an IaaS solution by adding new capabilities and
components as needed.
This IBM Redguide™ publication highlights the Cloud Enabled Data Center adoption pattern
and describes how you can use it to define an IaaS solution. This guide is intended for chief
technology officers, data center architects, IT architects, and application architects who want
to understand the cloud-computing infrastructure necessary to support their applications and
In the private cloud context, providing IaaS is the natural starting point to implement a
cloud-computing model. By using IaaS, you can deliver the most fundamental IT services,
such as computing, storage, and network resources, in a more efficient and cost effective
way. IaaS also enables the various lines of business (LOBs) to rapidly deliver new services or
adapt existing services. A private IaaS provides an extensible model that you can use to
extend the cloud resources to include resources from a public cloud (referred to as a hybrid
cloud model). For these reasons, IaaS is gaining increased visibility with corporate executives
and LOB leaders.
Even though cloud computing is presently a small percentage of the overall IT market, it is
one of the fastest growing segments. The private cloud portion is one of the areas that
enterprises are currently investing in. If you look at the cloud market from the type of cloud
services, you can see that IaaS represents more than the 25 percent of the entire investment
in the private cloud space. It is becoming evident that IaaS, in relation to the private cloud, is
where most enterprises are planning to invest in the next three years. This effort will align
their IT and business models to a cloud-oriented service model.
3
Lower cost of deployment
By using high levels of automation, IT resources are made available faster, repeatedly, and
accurately. For example, IT does not have to incur the cost of configuring a server every
time it needs one.
Provide faster deployment and retirement of systems
With standardized services offered through the service catalog, IT can provision systems
faster. In some cases (such as development and test workloads), users might be allowed
to provision the servers and manage them through a web-based portal. The ability to
automate the deprovisioning of the resources (after a period of use) is important. This
approach ensures that resources that are no longer used are returned in the pool of
available resources and can be reused for other purposes.
Establish a utility service
A Cloud Enabled Data Center provides a pay-as-you-use model, which can be used to
measure and charge individual LOBs for their IT usage.
Create predictable deployment
A Cloud Enabled Data Center promotes standardization of components, which are made
available through the service catalog and the description of the service itself. This
approach ensures a predictable outcome every time a service is requested.
Support dynamic scaling
A scale-up and scale-down infrastructure is required to support a business service. When
a business experiences periods of high demand, a new IT infrastructure can be
provisioned to meet temporary increases in workloads. The provisioned IT infrastructure
can be deprovisioned when it is no longer required. This approach adds enormous
flexibility to the IT environment and ensures optimal utilization of resources.
Greater level of control and visibility
Every task performed by the Cloud Enabled Data Center solution is monitored and
reported so that organizations have greater visibility to the use of IT resources.
The maturity model defines an evolutionary improvement path for organizations that are
embarking on cloud computing from virtualization (initial level) to monetization (highest level).
The model can also be used as a benchmark for comparison and as an aid to understand the
Cloud Enabled Data Center solution. For example, the model can be used to compare the
cloud-computing deployments of two different organizations.
Each level in the maturity curve is implemented with capabilities that are required by that
specific maturity level. At each level of the maturity curve, functions are stacked on top of the
ones from the previous level. The software and hardware components that implement these
capabilities are also included. With this approach, you can create an incremental architecture,
“Designing a Cloud Enabled Data Center solution” on page 11 describes the architectural
patterns of a Cloud Enabled Data Center solution and how they map to each level of the cloud
maturity model.
The Cloud Enabled Data Center capability maturity model consists of five maturity levels as
illustrated in Figure 1:
Virtualized
Deployed
Optimized
Enhanced
Monetized
5. Monetized
Cloud
Cloud storefront Service
Integration with CRM and billing Provider
adoption
pattern
Increasing capabilities
Advanced IaaS 3
3. Optimized
Image management
Monitoring Cloud Cloud
2
Backup and restore Management Enabled
Security and patch management Data
Center
adoption
2. Deployed pattern
Standardized services
Simple provisioning automation Simple IaaS
Service catalog 1
(VMs)
Usage metering
1. Virtualized
5
individual infrastructure components and the motivation of the system administrator to
fulfill a request.
At this level, the following types of situations can arise:
– The IT staff cannot meet commitments or requests from the organization in a timely
and repeatable manner.
– There is a lack of standardized services that are easily accessed by the users. This
situation causes long times (measured in weeks) to obtain new capacity (such as
compute or storage) in order to support business needs.
– Most of the time is spent in ensuring that the firewall access rules are correct and port
flows are configured on the new servers.
– There are wide variations in cost, schedule, and quality targets. Most of the work
performed is manual, even though there might be some automation (typically by using
scripts that are written by system administrators to support their activities).
Deployed (maturity level 2)
At the deployed level, the virtualization technologies are augmented with an automation
layer. Basic management processes are established to track cost, support schedules, and
manage functions. IT can deliver new capacity to meet business needs without requiring a
capital investment to acquire a new infrastructure each time.
Cloud Enabled Data Centers at this level exhibit the following capabilities:
– Standardization of services
Standardization of services reduces significantly the number of different platforms or
middleware that is supported. It allows organizations to shift focus back to delivering
value to clients rather than on the IT infrastructure. This approach simplifies
management of infrastructure and reduces errors.
– Basic provisioning automation
After the services are standardized, delivery can be automated. IT can automate
delivery of one or more virtual servers with attached storage by using a self-service
portal. Additional manual configuration might be required to deploy application
components or to integrate newly provisioned capacity with existing systems.
– Service catalog
Standardized services with automated delivery are now available by using a service
catalog. Users might be allowed to take snapshots of provisioned images and add
them to the catalog.
– Usage metering
All provisioned infrastructure is monitored, and usage is reported. Organizations use
these reports to show the cost of IT to LOB organizations to request funding and
capacity planning.
Optimized (maturity level 3)
At maturity level 3, an organization deploys all the functions of maturity level 2 and
incorporates additional capabilities to manage the infrastructure. This activity reduces the
operational costs and improves the service-level agreements (SLAs) and QoS.
At this maturity level, a set of mature management processes performs the following
activities:
– Monitors the infrastructure health
– Feeds the monitoring data into the capacity planning and forecasting processes to
optimize utilization
7
– Service orchestration is about stitching together hardware and software components to
deliver and manage the lifecycle of any type of IT services using a cloud delivery
model. Service orchestration uses automation to manage and maintain services
efficiently. The activities range from creating virtual servers on demand to creating IT
services on demand. Service orchestration can also enable the users who created
services to manage them.
– By using hybrid cloud integration, you can connect your hybrid world of public clouds,
private clouds, and on-premise applications. With this capability, you can quickly
integrate, manage, and secure these core assets to better support your current
business needs.
– Integration with the enterprise Information Technology Infrastructure Library (ITIL)
processes allows better governance for the cloud infrastructure and for the cloud
services that are created through it. Because of the complex and critical nature of the
cloud services that are provided at this maturity level, each infrastructure change must
go through a corresponding change management process. Also, any problem must be
managed through an efficient incident management process.
Monetized (maturity level 5)
At maturity level 5, an organization has already deployed all the capabilities and
processes that are defined by the other maturity levels. At this level, the IT organization
has moved from being a cost center to generating revenue by offering a utility service to
obtain compute and storage to other organizations or companies or to consumers or
users. At this level, vigorous processes are in place for service inception, development,
offering, billing, and retirement. This level also has a greater focus on the ease of use and
customizability of user interfaces.
The monetized level 5 includes the following capabilities:
– Service storefront provides a richer user experience for customer management and
reporting functions. It integrates typical e-commerce capabilities, such as shopping
cart and credit card payments, to address consumer and enterprise marketplaces.
– Integration occurs with customer relationship management (CRM) and billing, so that
you can provide customers the services that they request with the contracted SLAs or
QoS at the agreed to price.
– Federated services are a standards-based means of sharing and managing the identity
data of people to support single sign-on across secure domains and organizations.
These services allow an organization to offer services externally to trusted business
partners and to provide services to personnel in different internal departments and
divisions.
In many cases, the monetized level 5 represents the natural evolution of a Cloud Enabled
Data Center solution toward a Cloud Service Provider business model. For this reason, this
maturity level is included but is not explored in this guide because the solutions at level 5 are
outside the scope of Cloud Enabled Data Center. For a detailed description of the Cloud
Service Provider adoption pattern and related business models, see IBM SmartCloud:
Becoming a Cloud Service Provider, REDP-4912.
The IBM CCRA also includes common architecture patterns for items that cut across all the
adoption patterns, including security, resiliency, performance, and governance. These
common patterns enable a consistent base to support a broad set of business and technical
goals that are realized through different cloud deployments.
The following cloud adoption patterns are identified by the IBM CCRA:
Cloud Enabled Data Center adoption pattern
The Cloud Enabled Data Center adoption pattern is typically the entry point into the cloud
solutions space. It provides guidance on the definition, design, and deployment of
cloud-computing solutions that deliver IaaS typically within the enterprise boundaries.
Platform-as-a-service (PaaS) adoption pattern
The PaaS adoption pattern describes how to design cloud-computing solutions that deliver
preconfigured ready-to-execute runtime environments or middleware stacks onto which
applications can be deployed. It also describes how to tie together application
development and application deployment processes into a single continuous delivery
process based on application development and IT operations (DevOps) principles.
Cloud Service Providers adoption pattern
The Cloud Service Provider adoption pattern defines cloud-based solutions that provide
cloud services through a service provider model. A service provider is an organization that
provides the cloud usually for external customers. A service provider manages and
provides cloud services as a general provider, rather than operating a computing facility
for its own organization.
Software-as-a-service (SaaS) adoption pattern
The SaaS adoption pattern defines the architecture for definition and operation of SaaS
applications. The Cloud Service Provider adoption pattern provides the architecture that
enables SaaS applications to be managed and offered by the cloud service provider. The
cloud service provider also supports systems that provide the environment in which SaaS
business models are realized.
9
Figure 2 shows an overview of the IBM Cloud Computing Reference Architecture that
includes the Cloud Enabled Data Center adoption pattern.
Interfaces
BP Mgmt
and third
API
party BPaaS Service
services, Customer Service Service Composer
Service Delivery Catalog
Cloud Service Partner Account Offering Offering
Integration Ecosystems Management Catalog Management
Tools
Management Management
Service
Platform
Management
API
Applications Tools
API
IaaS Software
Middleware Service Provider Portal and API
Development
Tools
Deployment Transition Operations Security and Customer
Infrastructure
Architect Manager Manager Risk Manager Care
Image Creation
Tools
Consumer
Administrator Infrastructure
Governance
Figure 2 shows the operationally oriented services and the business-oriented capabilities that
are needed to implement a cloud-computing solution. For each of the four cloud adoption
patterns, the IBM CCRA defines which services are mandatory and which are recommended
or can be included depending on the specific customer needs.
For the Cloud Enabled Data Center adoption pattern, the IBM CCRA identifies the most
common use cases for a private IaaS cloud solution. It also determines the mandatory,
recommended, or optional services to implement that solution. In addition, it describes the
physical components that make up these functions and how these components can be
integrated together to realize the required scenarios.
The Cloud Enabled Data Center adoption pattern takes a pattern-based approach to provide
modular building blocks that provide incremental functionality. This adoption pattern has been
segmented into four architectural patterns, called macropatterns. Each macropattern
addresses a specific subset of the IaaS use cases and describes the components that are
needed to implement them. Each macropattern represents a different level in the cloud
maturity model for Cloud Enabled Data Center solutions, with each macropattern at the next
level incorporating the capabilities of previous macropatterns.
The Cloud Enabled Data Center adoption pattern includes several key concepts. It also
includes typical user roles, use cases, and requirements for a private IaaS.
11
Cloud Enabled Data Center user roles
The Cloud Enabled Data Center establishes new user roles that interact with cloud services.
A cloud service can enable the user role to create, offer, use, maintain, and run the
cloud-computing services. A user role is delineated by a distinctive set of typical tasks that
can be performed by a single person.
Cloud user roles support the design and development of services, and they support the
servicing process for the cloud service. Each role can be accomplished by one or more
persons. For example, an organization can have a logical construct or a single human being
perform the user role. Conversely, a person can fill a role, part of a role, or multiple roles.
Figure 3 shows the user roles that are defined by CCRA that support a Cloud Enabled Data
Center solution.
Service Component
Offering Manager
Developer
Business Manager
May act as
Consumer End
Facilities
User
Manager
Security
Information P9: Self-service Automation (Services) P10: Hybrid Clouds Integration
and
Event Mgmt Role and Services Requests Hybrid Clouds
Auth Mgmt Orchestration Approval/Denial Integration
Identity and
Access
P8: Self-service Automation (Storage) P7: Self-service Automation (Network)
Mgmt
Storage Network
Cloud Role and Provision Provision Cloud Role and
Threat and Mgmt Auth Mgmt and and Mgmt Auth Mgmt
Vulnerability Configuration Configuration
Mgmt
Security
Compliance P3: Images Mgmt P2: Data Resiliency P1: Monitoring, Events and Capacity Mgmt
Mgmt
Images Backup and Events Capacity
Monitoring
Mgmt Restore Mgmt Mgmt
Legend:
P0: Virtualization
Use relation Server Basic Storage Basic Network Hypervisor
Optional use relation Virtualization Virtualization Virtualization Mgmt
Figure 4 Cloud Enabled Data Center micropatterns and their associated use cases
The micropatterns (shown in Figure 4) provides a comprehensive view of the Cloud Enabled
Data Center capabilities. The micropatterns are defined as follows from P0 to P12:
Virtualization (P0) Includes compute, storage, and network virtualization use cases, in
addition to hypervisor-management use cases.
Monitoring and event and capacity management (P1)
Pertains to monitoring the health of the cloud infrastructure, collection
and management of exception events, and capacity planning.
Data resiliency (P2) Includes use cases for backup of storage volumes, virtual machines,
and recovery from a backup if a failure or disruption occurs.
Image management (P3)
Includes use cases for image registration and backup, image
capturing, deep image search, drift analysis, version control, and
management of image sprawl.
13
Self-service automation (P4)
Contains use cases for onboarding, provisioning, and management of
virtual machines (VMs) that are made available from the service catalog.
Metering and accounting (P5)
Includes use cases for the measurement, reporting, and chargeback
of the resources of a Cloud Enabled Data Center.
Storage and network virtualization management (P6)
Includes use cases about advanced management capabilities for
virtualized storage and network environments, such as storage and
network discovery, provisioning, and monitoring.
Self-service automation (storage) (P7)
Includes discovery, configuration, provisioning, commissioning, and
decommissioning of storage use cases.
Self-service automation (network) (P8)
Includes use cases for discovery, configuration, and provisioning
virtual networks and network devices. Such devices include virtual
local area networks (VLANs), virtual routing and forwarding (VRF),
load balancers, and firewalls.
Self-service automation (services) (P9)
Includes use cases for provisioning and configuration of complex
services that consist of more than one VM, storage, and network
element or use cases for production workloads.
Hybrid cloud integration (P10)
Includes use cases for deployment of workloads to public clouds,
integration of service management, and governance across
on-premise Cloud Enabled Data Center and public clouds.
IT service management (P11)
Includes use cases for implementing the ITIL processes. Example
processes include incident and problem management, change and
configuration management, IT asset management, license
management, service desk, and release management in a private
cloud environment.
Security (P12) Includes use cases for securing different levels of the Cloud Enabled
Data Center solution and infrastructure, such as identity and access
management, and for securing the virtual infrastructure, security event
management, and automation of security checks for complex services.
Nonfunctional requirements
In addition to the required use cases, Cloud Enabled Data Center solutions are heavily
influenced by nonfunctional requirements. For example, the implementation of an IaaS
solution that provisions many VMs quickly to support thousands of users would be different
from an IaaS solution for a handful of users who require only a few VMs.
For this reason, nonfunctional requirements are key to determining the maturity level of an
IaaS solution. They also heavily influence the design of the solution, for example, by
determining where components are deployed and how they are integrated into the solution.
Reliability, High availability and resiliency of cloud Typically measured by key performance indicators
availability, and management and managed infrastructure (KPIs) such as the following examples:
serviceability 99.99 percent availability of management
environment
99.99 percent availability of workload
Disaster recovery of cloud management Measured by KPIs such as restoring service within 4
and managed infrastructure business hours
Performance User interface response times Typically measured by KPIs such as the following
VM provisioning time examples:
Service provisioning time Complete image provisioning within 8 minutes of
request
Access gained to a file within 100 milliseconds,
excluding full transfer time or rate
Capability to provision 100 VMs concurrently
Scalability Number of concurrent users Typically measured by KPIs such as the following
Number of VMs/services provisioned examples:
per minute/hour Number of concurrent users
Support multiple data centers Number of VMs or services provisioned per minute
or hour
Number of customers per point of delivery; terabyte
capacity
Security Support of security standards and Determination of industry relevant compliance standard
best-practices such as British Standard and application of them to cloud management system
7799, Information Technology Security
policy ITCS 104, data privacy, Lightweight
Directory Access Protocol (LDAP), Virtual
Partition Manager (VPM), Multi-VLAN
support, audit, vulnerability, and antivirus
Some nonfunctional requirements are also influenced by the workloads that you want to
deploy through your IaaS solution. Although development and test environments usually have
limited (if any at all) requirements for monitoring and backup, the same is not true for
production environments. For example, in a production environment, you might be asked to
provide disaster recovery capabilities or advanced security protection features.
As you deploy workloads that are increasingly mission critical, the nonfunctional requirements
of your solution increase. In the same way, these workloads and nonfunctional requirements
increase the sophistication level of a Cloud Enabled Data Center solution.
15
Macropatterns
To further abstract and simplify the design of a Cloud Enabled Data Center solution, use case
sets were aggregated together into micropatterns. To drive this abstraction to a higher level,
multiple micropatterns are grouped into a macropattern. Macropatterns provide incremental
increases in capabilities and functionality and describe, from an architectural perspective, the
solution to implement.
Figure 5 shows the macropatterns that are identified for Cloud Enabled Data Center and
illustrates how they are mapped over the micropatterns.
ITIL Managed
IaaS
P12: Security
Management P11: IT Service Management
Security
Information P9: Self-service Automation (Services) P10: Hybrid Clouds Integration
and
Event Mgmt
Identity and
Access P8: Self-service Automation (Storage) P7: Self-service Automation (Network)
Mgmt
Threat and
Vulnerability
Mgmt
Advanced IaaS P6: Storage and Network
Virtualization Mgmt
Simple IaaS
P5: Metering and
P4: Self-service Automation (VMs)
Accounting
Patch
Management
Security
Compliance P3: Images Mgmt P2: Data Resiliency P1: Monitoring, Events and Capacity Mgmt
Mgmt
Cloud
Management
P0: Virtualization
Each macropattern represents a subset of the entire Cloud Enabled Data Center adoption
pattern and addresses a business problem through a specific set of capabilities. However,
macropatterns are just recommendations that you can use to consider or not to consider a
specific capability based on your operational and business needs and costs considerations.
5. Monetized
Cloud
Cloud storefront Service
Integration with CRM and billing Provider
adoption
pattern
Increasing capabilities
Advanced IaaS 3
3. Optimized
Image management
Monitoring Cloud Cloud
2
Backup and restore Management Enabled
Security and patch management Data
Center
adoption
2. Deployed pattern
Standardized services
Simple provisioning automation Simple IaaS
Service catalog 1
(VMs)
Usage metering
1. Virtualized
By using these four Cloud Enabled Data Center macropatterns, you can implement solutions
that address the business needs and the capabilities described in levels 1 - 4 of the maturity
model. These four Cloud Enabled Data Center macropatterns are also prerequisites for
building more sophisticated solutions that are oriented to the Cloud Service Provider
business models as required by Monetized level 5 of the maturity model.
The following macropatterns that are defined for the Cloud Enabled Data Center adoption
pattern build on top of each other, starting with the simplest micropattern:
Simple IaaS (VM)
This micropattern is the entry point in the IaaS cloud space. You can use it to start building
a multitenant cloud infrastructure and model that delivers simple VMs (configured with the
appropriate network and storage) that cover the most common business needs for cloud
computing.
Cloud management
This macropattern complements the Simple IaaS macropattern by adding management
capabilities that you can use to manage such requirements as SLAs, security, resiliency,
and capacity planning. This macropattern helps you further optimize the IT processes,
17
manage complexity of virtualization and automation, and increase efficiency for both the
infrastructure that provides the cloud and the cloud service itself. This macropattern
addresses nonfunctional requirements in the area of reliability, availability, and basic
security.
Advanced IaaS
This macropattern is used to create a more sophisticated cloud infrastructure for delivery and
management of complex and critical IaaS in highly demanding environments. It also can
deploy services in more than one data center or to scale out to off-premise public clouds.
Dealing with the complex, production-like environments, this macropattern also addresses
nonfunctional requirements in the area of performance, scalability, extensibility, and
advanced security.
ITIL managed IaaS
For this macropattern, the Advanced IaaS macropattern are integrated with ITIL process.
This macropattern defines a cloud-computing environment that integrates with the existing
enterprise applications, systems, and processes. This integration is accomplished by
including the cloud infrastructure and services in the enterprise ITIL processes. This
macropattern is typically the last step in the transformation of a Cloud Enabled Data
Center. It is generally the prerequisite step for implementing more sophisticated Cloud
Service Provider Solutions that move the maturity level of your cloud solution to the
Monetized level 5 in the capability maturity curve.
Figure 7 shows a more schematic view of the four macropatterns and their key capabilities. It
also shows how these macropatterns stack one on top of the other to build more
sophisticated Cloud Enabled Data Center solutions.
Advanced IaaS
Storage Network
Advanced security
Provisioning Provisioning
Services Hybrid Cloud (Threat and vulnerability, identity Increasing Capability
and and
Orchestration Integration and access, security info and 3
Automation Automation
event management)
Management Management
Cloud Management
Endpoint
Virtualized Capacity
Event Backup and Patch Compliance
Infrastructure Management
Management Restore Management and 2
Monitoring and Planning
Management
Usage
VM
Role and metering,
provisioning Cloud VM Image Image
and On- Administration
Authentication
Construction Management
accounting 1
Management and
boarding
chargeback
The Simple IaaS macropattern (row 1 at bottom of Figure 7 on page 18) contains the
following functional blocks of key capabilities:
VM provisioning and onboarding
The existing virtualization capabilities are used to provide a simple interface to consumers
of IT to provision VMs to satisfy the customers’ needs. The underlying resources that are
required by a VM (such as processor, memory, storage, and network resources) are
preconfigured and made available as resources that are attached to a VM as requested.
There might be a simple workflow to approve creation of VMs. VMs that exist in the data
center might be discovered by this macropattern and onboarded under the control of the
cloud management infrastructure. Alternatively, they can be migrated from one cloud
environment to another.
Cloud administration
Cloud administration provides capabilities to administer a cloud environment, such as
adding new storage or computational resources in the cloud pool or defining new
segregated networks.
Role and authentication management
The Cloud Enabled Data Center ecosystem has many users, who each performs different
roles. This capability can assign users to roles and can ensure that authorized access to
cloud resources exists to perform a task, such as approving the creation of VMs.
VM image construction
This capability provides tools to build virtual images for deployment into the Cloud Enabled
Data Center.
Image management
VMs tend to drift from the original copy (provided by the service catalog) as new security
and operating system (OS) patches are installed. This capability provides tools to create
new VMs, establish version control, search for and compare images, and delete images
from your virtual images templates repositories.
Usage metering, accounting, and chargeback
As workloads are abstracted from the physical infrastructure that supports them, it is not
possible to build a chargeback model based on the allocation of physical resources.
Instead, you must meter the resources that are used by each workload running on the
shared infrastructure. This capability provides tools to track the usage for each
characteristic of a workload (such as processor, memory, storage, and network), rating
each characteristic and generating consumption-based chargeback reports.
19
Cloud Management
As the Cloud Enabled Data Center solution matures and you begin to deal with business and
mission-critical workloads, you need to ensure that your underlying infrastructure performs
well. Also, you might need to reduce (as much as possible) the unexpected failures or
overloads that can cause you to miss your SLAs. Such workloads can require better
orchestration and support to recover quickly if a disaster occurs. Capacity planning becomes
more important, because the business expects IT to be more agile and accommodate new
workloads quickly.
These additional requirements are fulfilled by the set of management tools that re provided by
the Cloud Management macropattern. The Cloud Management macropattern has various
optional services and components that provide the following services:
Health management of the cloud management environment and cloud-managed services
Capacity planning of cloud infrastructure
Backup and restore of cloud services
Event management
Patch management and security compliance
The functional blocks in the Cloud Management macropattern deliver the following key
capabilities (shown in row 2 of Figure 7 on page 18):
Virtual infrastructure monitoring
A highly virtualized infrastructure requires a virtualization monitoring tool that provides
end-to-end visibility. Although the virtualization helps to reduce costs, improve availability,
and increase flexibility, it makes it difficult to determine the root cause of service
performance degradation. This capability provides the tools to monitor virtual
infrastructure use by the Cloud Enabled Data Center, ensures availability of business
critical applications, and quickly identifies, isolates, and remedies performance issues.
Capacity planning
One promise of cloud computing is that virtualization reduces the number of servers that
are needed. Therefore, you must identify the balanced amount of cloud infrastructure that
is required to meet the anticipated needs of users. This capability provides the tooling and
governance to help capacity planners define the right business context and requirements.
The analysis is necessary so the Cloud Enabled Data Center can continue to meet the
performance goals of a business application while contributing to the organization’s
financial goals.
Event management
As the super charged data center delivers services to support business-critical
applications, you must identify exception situations quickly and determine the root cause
of the problem. This capability provides the tools and best practices to collect events that
come from the different elements of the infrastructure, correlate them, and eventually
trigger notifications or remediation actions.
Backup and restore
This capability provides tools and governance for backup processes to enable service to
be restored within agreed service levels to ensure that the business is protected.
Patch management
This capability provides tools and governance to ensure that the VMs that are provisioned
are patched to the right security and version levels.
Endpoint compliance and management
This capability provides tools to ensure that all the deployed VMs are compliant with the
organization’s security and enterprise policies.
The main functional blocks that implement this macropattern (shown in row 3 of Figure 7 on
page 18) deliver the following key capabilities:
Storage provisioning and automation management
This capability provides functions for discovery of storage resources, dynamic
provisioning, allocation of storage resources, monitoring, provisioning, and configuration
capabilities across different heterogeneous devices. With this capability, you can
automatically provision different types of storage resources (defined as cloud-computing
services), making them available to the computing resources. Also, these (provisioned)
storage resources can be used to generate a new revenue stream by offering a new
service such as storage-as-a-service.
Network provisioning and automation management
This capability provides functions for management and discovery of network resources,
dynamic provisioning and allocation, and monitoring across heterogeneous devices. With
this capability, you can automatically configure a load balancer or allocate a new network
that can be deployed as part of a cloud service and used by the VMs. Also, these network
resources can be used to generate a new revenue stream by offering them as a network
as a service.
Cloud services orchestration
One of the most powerful capabilities provided by this macropattern is the automated
arrangement, coordination, and management of complex computer systems, middleware,
and services. You can use this capability to deliver a complex business application that
consists of two or more VMs with attached storage and interconnectivity. Another example
is to provision across data centers by using a single self-service interface. The self-service
interface includes the following capabilities:
– Self-service provisioning of infrastructure elements such as VMs, storage, or network
elements with multitenancy
– Self-service provisioning of complex integrated infrastructure services
Hybrid cloud integration
Hybrid cloud integration provides the capability to provision to external cloud-computing
environments (such as public clouds) to meet peak workloads. This optional capability
makes it possible to provision VMs into a public cloud and to securely connect and
manage from a private infrastructure. It can also implement cloud bursting scenarios in
case of workload peaks or for cost reasons.
Advanced security
The advanced security capabilities support more complex environments, which require
more sophisticated security to protect against threats and vulnerability. This support is
accomplished by providing identity and access controls, security information, event
management, and log information management.
21
ITIL managed IaaS
Because the Cloud Enabled Data Center solution delivers complex cloud services, its
management processes must be integrated with the organization’s IT management
processes such as change management and incident management.
This capability is typically required when delivering complex and composite services in
environments similar to production environments. This macropattern allows for registration of
cloud services in a Configuration Management Database (CMDB) and for the services to be
placed under control of the major enterprise ITIL processes. The ITIL managed IaaS (shown
in row 4 of Figure 7 on page 18) includes the following capabilities:
Problem and incident management
IT assets management
Licenses management
Change and configuration management
Service desk
Release management
This capability is also a prerequisite to moving your Cloud Enabled Data Center solution to a
Cloud Service Provider business model. In the Cloud Service Provider business model,
governance and control capabilities are important to ensure the QoS and SLAs that are
typical of the Cloud Service Provider business.
IaaS
Service Provider Portal and API
Infrastructure
Governance
23
Figure 9 introduces the components that are needed to implement the services. It also
provides the architectural overview of the Cloud Enabled Data Center, using the IBM CCRA
patterns-based approach.
Advanced IaaS
Increasing Capability
3
Cloud Management
Backup Endpoint
Virtualized Capacity
Health Monitoring Events
Event Backup and Patch Management
Patches and
Compliance
Infrastructure Management and
and Capacity Management Management
Management Restore Management and
Security Compliance
Monitoring and Planning Restore Management
2
Usage
VM Virtual Virtual
Role and metering,and
Metering
provisioning Cloud VM Image Image
and On- VMManagement
Provisioning Authentication Image
Construction Image
Management
accounting
Management Chargeback
and
boarding Construction Management
chargeback
1
Starting from the bottom of Figure 9, the Cloud Enabled Data Center architecture has the
following the layers:
The compute, storage, and network virtualization layer provides the base. Most
organizations today have adopted virtualization technologies, such as compute and
storage hypervisors. In many cases, it common to have a mix of hardware and
virtualization technologies from different vendors to avoid vendor lock-in.
The Simple IaaS (layer 1) encompasses the self-service provisioning and configuration of
VMs from a self-service catalog and the possibility to meter the resources usage for
simple reporting or for accounting and chargeback purposes.
The Cloud Management (layer 2) provides monitoring, event management, backup and
restore, and security and patch management capabilities.
The Advanced IaaS (layer 3) support the delivery of value-add services (such as
network-as-a-service and storage-as-a-service), provisioning of complex services,
advanced security and integration with public clouds.
The ITIL Managed Services (layer 4) provides governance and discipline to integrate the
service management functions of a Cloud Enabled Data Center with the organization’s
enterprise service management systems.
25
Implementing a Cloud Enabled Data Center solution
The capabilities provided by each macropattern are mapped to the appropriate IBM Software
components used to implement them. Figure 10 highlights the required software components
(in blue), the recommended components (in green), and the optional components for each
macropattern (in gray). Optional components can be added, if needed, to solve a specific
customer need.
Advanced IaaS
Increasing Capability
and
SmartCloud Virtual an
nd
and Tivoli Orchestration
NetCool Integration
(HCI Securityty info
Securrity and
Virtual Server
3
Automation
Storage Center Autom
A mation
Automation
Configuration Manager Qradar Log
Protection for
g
Management Management
M gement Extensions) Managerevents
evenntts mgmt
VMWare
Cloud Management
Usage
VM SmartCloud
Role and metering,
provisioning Cloud VM Image Image
and On-
SmartCloud
Administration
Provisioning
Authentication
Construction Management Cost
accounting 1
Management and
Management
boarding
chargeback
Cloud management
The following IBM software products are used to implement the Cloud Management
macropattern (Figure 10 on page 26):
Required: IBM SmartCloud Monitoring
IBM SmartCloud Monitoring monitors the health and performance of a private cloud
infrastructure, including environments that contain physical and virtualized components.
This software provides the tools that are needed to assess current health and capacity
and model expansion, as needed. IBM SmartCloud Monitoring provides the following
capabilities:
– Visibility into the cloud infrastructure, including environments that contain physical and
virtualized components
– Monitoring of heterogeneous environments for visibility and control into all areas of the
infrastructure, such as physical, virtual, and cloud
– Policy-driven analytics for intelligent workload placement
– What-if capacity planning to accommodate capacity growth while optimizing the usage
of the existing environment
Recommended: IBM Tivoli® Storage Manager Suite for Unified Recovery
IBM Tivoli Storage Manager Suite for Unified Recovery is a bundle of Tivoli Storage
Manager products and provides backup and restore capabilities for the entire cloud
environment. It can efficiently back up VMs and storage infrastructures and restores them
if a failure occurs.
27
Recommended: IBM SmartCloud Patch Management
IBM SmartCloud Patch Management manages patches automatically for multiple
operating systems and applications across physical and virtual servers regardless of
location, connection type, or status. IBM SmartCloud Patch Management provides the
following benefits:
– Reduces security risks by reducing remediation cycles, especially in development and
test environments, where virtual machines that are not patched increase the risk of
hacking and virus exposure
– Improves performance with reliable, nonstop cloud computing that can automatically
tolerate and recover from software and hardware failures
– Saves IT costs by automating provisioning operations and providing a service interface
– Reduces complexity through ease of implementation, use, and simplified cloud
administration
Optional: IBM Tivoli Netcool/OMNIbus
IBM Tivoli Netcool/OMNIbus is operations management software that consolidates
complex IT and network operation management tasks. It provides event collection,
correlation, and automation capabilities. This component is critical for Cloud Enabled Data
Centers to deliver business-critical services and where it is important to identify and
resolve the most critical problems quickly.
Advanced IaaS
The following software implements the Advanced IaaS macropattern (Figure 10 on page 26):
Required: IBM Tivoli Service Automation Manager (IBM Service Delivery Manager)
This product is the cornerstone to implement sophisticated Cloud Enabled Data Center
solutions. By using IBM Tivoli Service Automation Manager, users can request, deploy,
monitor, and manage cloud-computing services with these capabilities:
– Provides traceable approvals and processes
– Provides management of storage and network resources
– Provides a workflow engine to model and deliver complex services that combine two or
more virtual machines with attached storage and the desired network interconnectivity
This product can be combined with SmartCloud Provisioning to use its functions in the
area of virtual images library management and application or middleware patterns to
provide more sophisticated solutions.
Required: IBM Service Delivery Manager (or Tivoli Service Automation Manager)
By implementing IBM Service Delivery Manager, the data center can accelerate the
creation of service platforms for various workload types. It provides a high degree of
integration, flexibility, and resource optimization with the following core service
management capabilities:
– A self-service portal interface for previously placed computing reservations of
virtualized environments, including storage and networking resources
– Automated provisioning and deprovisioning of resources
– Real-time monitoring of physical and virtual cloud resources
– Integrated usage and accounting chargeback capabilities that can help system
administrators track and optimize system usage
– Built-in high availability of the cloud management platform
– Prepackaged automation templates and workflows for the most common resource types
29
point solutions. Security Network Intrusion Prevention is used to discover threats to the
Cloud Enabled Data Center infrastructure. It is also used to take preventive measures
against threats to these high value assets and to protect the workloads from threats such
as SQL injection and cross-site scripting attacks.
Optional: IBM Virtual Server Protection for VMware
IBM Virtual Server Protection for VMware is used in Cloud Enabled Data Center solutions
to meet regulatory compliance by limiting critical data access, tracking user access, and
providing virtual infrastructure reports. It provides defense-in-depth, dynamic security with
VM rootkit detection, virtual infrastructure auditing, and monitoring of network traffic
through hypervisor integration.
31
Architectural decisions
The following key architectural decisions can influence a Cloud Enabled Data Center solution
are summarized:
Metering scope
Metering is a mechanism for gathering compute resource usage. Organizations can get a
better handle on resource use and cost when they work in the cloud-computing
environment. However, it is easy to attempt to measure everything such as hypervisors,
virtual disk size, network I/O, occupied IP addresses, virtual processors and
random-access memory (RAM). The complexity of the cloud-computing solution increases
with the metrics that are being collected. When you deploy a Cloud Enabled Data Center
solution, consider the scope of metering. Detailed usage and chargeback reports increase
the complexity of the solution and might require more monitoring components.
Service catalog
The Cloud Enabled Data Center solution provides a set of services (typically virtual
machines) that users can provision through a self-service portal. You need to consider
whether to embed the applications (such as middleware and database) within the base
operating system image or to create more deployment workflows to provision the
applications. Placing the applications with the operating system images reduces the time
to deploy the solution, but makes currency management difficult.
High availability
Cloud computing introduces the concept of management (tooling for automation) and
managed (data center infrastructure that is automated) components. It might be desirable
to have the management systems highly available. However, this approach comes at the
cost of additional effort and resource requirements. Similarly, it might be desirable to have
highly available managed environment. However, it would require more resources (such
as spare nodes in the compute cluster) and new tools (such as tools to restart a VM in
case of hardware failures).
Managed infrastructure
An organization that adopts a Cloud Enabled Data Center solution might want to automate
the provisioning of its entire existing data center infrastructure, such as a storage area
network (SAN) or network-attached storage (NAS), compute servers, and network
switches. In this case, careful consideration is required to select the infrastructure that
would provide the best value.
Storage-as-a-service Storage-as-a-service
Service Orchestration TSAM or ISDM
Service Orchestration
Advanced
IaaS/PaaS Tivoli NetCool
Virtual Network Mgmt Virtual Network Mgmt Configuration Manager
Usage metering Usage metering Usage metering Usage metering SmartCloud Cost
and accounting and accounting and accounting and accounting Management
Entry-level
IaaS/PaaS Image Composition Image Composition Image Composition Image Composition
Image Mgmt Image Mgmt Image Mgmt Image Mgmt SmartCloud
Provisioning Provisioning Provisioning Provisioning Provisioning
Self-service catalog Self-service catalog Self-service catalog Self-service catalog
Reduce costs Improve efficiency Delivery of complex Prepare for moving to Cloud
of delivering IT and costs of IT services with a Cloud Service Enabled
infrastructure delivering IT high QoS in Provider business Data Center
services infrastructure dynamically scaling Business
model
value
services environments
Figure 11 Incremental approach to build Cloud Enabled Data Center solutions based on macropatterns
You must consider that each new component easily stacks on top of and integrates with the
existing components. The roadmap provides a step-by-step approach that minimizes risks
and enables you to get immediate business value from the deployed components and
functions. This approach also fits well with the transformational nature of a cloud adoption
journey.
By using an incremental model, the IBM solution makes a complex effort manageable and
ensures predictable results. This result is accomplished by using robust assets that are based
on a standardized deployment architecture and management processes.
33
disaster-recovery services. By using this approach, the company can test market reaction. If it
is successful, the company’s long-term plan is to provide PaaS and SaaS solutions. The
company wants the solution in production in a few weeks to quickly test this solution with
selected customers.
The company needs a lightweight highly functional solution that delivers basic IaaS, such as
VMs and storage. The solution must support the delivery of IaaS and provide a good ROI in
terms of cost, speed, agility, and minimized operations.
The intended key differentiator is to provide rapid deployment of new services in seconds
rather than hours. This capability is fundamental. The company must consider
disaster-recovery scenarios where customers need to create hundreds of new VM instances
in a few minutes to support their recovered workloads.
The company must rapidly create a solution to test the market reaction. They do not need a
strong QoS, SLAs, or strong management and governance capabilities. This requirement
leads them to select a solution that is based on the Simple IaaS macropattern. By using this
macropattern, the company can quickly build a scalable cloud solution, that is ready to test
the business value and ROI of the cloud-computing model.
The company implemented IBM SmartCloud Provisioning as the core delivery platform
across multiple compute and storage nodes. The solution uses the KVM hypervisor to deliver
VMs with minimal license cost, customer management, and VLAN separation. VLAN
separation allowed for multitenant isolation at the network and presentation layer. By
integrating the solution with IBM Storwize® V7000 Unified Disk Systems, the company can
offer variable SLAs for storage. Also, the solution included the capabilities that are necessary
for implementing disaster recovery scenarios for storage.
The simple and low maintenance solution based on SmartCloud Provisioning provides the
following benefits:
The ability for the company to start with a small initial investment
The ability to deliver its own IaaS to several customers in a few weeks
Direct testing of the solution on the market without incurring signification expenses
The Chief Information Officer (CIO) decided to address these challenges by reorganizing the
IT organization and processes toward a cloud computing service-oriented model. This model
is based on the automated delivery and management of standardized infrastructures and
software stacks that are delivered through a services catalog. The service catalog will
become the official and standard way for LOBs to access and ask for IT services. All the
services that are delivered through this new cloud-computing model must meet the QoS and
SLAs that are required by the IT team. Also, the services must comply with all the corporate
policies, including security, change management, and license management.
The company needed the set of capabilities that are typically delivered by level 4 of the cloud
maturity model that maps to the Advanced IaaS Integrated with ITIL Processes macropattern.
To achieve this level of maturity, the company was able to select the architectural components
that it needed to deliver the right solution. This approach was important to address the
In the solution, the company used IBM Tivoli Service Automation Manager to implement a
cloud service catalog that allows the LOBs to request infrastructure services. The
infrastructure services include, creation of simple VMs (on different hypervisors technology)
starting from a set of standard images, logical partitions (LPARs), storage of different classes,
configuration of firewalls, and load balancers.
All the VMs and LPARs created through this service catalog are automatically equipped with
the standard monitoring and backup agents based on a third-party solution and with the Tivoli
Workload Scheduler scheduling agent. This way, all the new VMs and LPARs are ready to be
monitored, backed up, and scheduled through the standard IT tools.
The company also implemented a set of additional services so that users can automatically
install and configure the standard banking middleware and databases, such as IBM DB2®
and Oracle Database, on top of the requested VMs.
They integrated the Tivoli Service Automation Manager solution with their existing CMDB and
license management process. These solutions ensured that, each time a new service is
allocated (or deleted) from the service catalog, the CMDB and the software license inventory
database are automatically updated to register or unregister the cloud asset or the
corresponding software license.
This drastic change brought the following advantages to the IT organization and the entire
company:
Cut the deployment time of software stacks from two weeks to minutes with good delivery
predictability and a near-zero error rate
Better utilization of a reduced number of systems, managing resource pools instead of
individual systems (producing economies of scale) and using the automatic deprovisioning
of resources after expiration
Little or no human intervention to deploy new system stacks and improve the
server-to-administrator ratio
Avoidance of handoff of activities from one person to another
By using this approach, IT can implement a centralized management of progress, perform
historical tracking, and obtain insight into where process bottlenecks occurred.
Summary
IBM provides the essential solutions, products, and architecture materials to assist
organizations in adopting an IaaS solution in an efficient and cost-effective way. The Cloud
Enabled Data Center adoption pattern of the IBM Cloud Computing Reference Architecture
provides a comprehensive business and architecture approach to companies that want to
establish or extend an IaaS solution. By applying the CCRA, its adoption patterns, and the
related detailed guidance, your IT organization can take advantage of the IBM
cloud-computing expertise garnered by working with companies around the world.
This guide showed how the Cloud Enabled Data Center adoption pattern covers the business
and technical needs and long-term plans for your company. It also showed how to apply the
35
essential requirements to support an initial deployment. Plus, it explained how to grow the
solution as business needs change and expand to support new business opportunities and
business models.
The Cloud Enabled Data Center adoption pattern within the IBM CCRA has been
implemented and deployed with a wide variety of customers. It provides a sound foundation
for building an IaaS solution. IBM customers have created a wide range of IaaS solutions from
simple single purpose solutions to sophisticated ITIL aligned deployments. As cloud
computing becomes a more integral part of the computing fabric, the flexible architectural
model of the CCRA and the Cloud Enabled Data Center adoption pattern will provide a robust
platform for your business to thrive on and grow.
For more information about the products that are introduced in this guide, see the following
web pages:
IBM SmartCloud Provisioning
http://www.ibm.com/software/products/us/en/smartcloud-provisioning
IBM SmartCloud Cost Management
http://www.ibm.com/software/tivoli/products/smartcloud-cost-mgmt
IBM SmartCloud Monitoring
http://www.ibm.com/software/products/us/en/ibmsmarmoni
IBM Tivoli Netcool/OMNIbus
http://www.ibm.com/software/tivoli/products/netcool-omnibus
IBM Tivoli Storage Manager Suite for Unified Recovery
http://www.ibm.com/software/tivoli/products/storage-mgr-unified
IBM SmartCloud Patch Management
http://www.ibm.com/software/products/us/en/ibmsmarpatcmana
IBM Tivoli Business Service Manager
http://www.ibm.com/software/tivoli/products/bus-srv-mgr
IBM Service Delivery Manager
http://www.ibm.com/software/tivoli/products/service-delivery-manager
IBM SmartCloud Virtual Storage Center
Pietro Iannucci is a Senior Technical Staff Member (STSM) in the Tivoli Services division of
IBM Software Group. He is part of a worldwide team that specializes in cloud solutions and
helps IBM customers in the design and delivery of cloud implementations. Pietro is also
responsible for the architecture specifications for the Cloud Enabled Data Center adoption
pattern in the IBM Cloud Computing Reference Architecture. He has over 20 years of
experience in software development. For many years, he has been the chief architect of the
Tivoli Workload Automation portfolio and guided the technological and architectural evolution
of associated products. He has written extensively and created several patents related to
scheduling, automation, and cloud computing. Pietro holds a degree in mathematics.
Manav Gupta is a Software Client Architect in Canada bringing thought leadership across
IBM Software Group brands to clients in the telecommunications industry. He has 15 years of
experience in the telecommunications industry. His areas of expertise include systems
management, cloud computing, and big data. He has written extensively on fault and
performance management using products and technologies such as IBM Tivoli Netcool,
Cloud Computing, and Big Data. Manav holds a degree in mathematics from Maharshi
Dayanand Saraswati University in India and has a postgraduate diploma in software
development from The Open University, in the United Kingdom.
LindaMay Patterson
ITSO, Rochester, MN
Brian Naylor
IBM Software Group -Tivoli, UK
37
Jochen Breh
IBM Global Technology Services®, Germany
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Any performance data contained herein was determined in a controlled environment. Therefore, the results
obtained in other operating environments may vary significantly. Some measurements may have been made
on development-level systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been estimated through
extrapolation. Actual results may vary. Users of this document should verify the applicable data for their
specific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.
®
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries, or
both. These and other IBM trademarked terms are marked on their first occurrence in
this information with the appropriate symbol (® or ™), indicating US registered or
common law trademarks owned by IBM at the time this information was published. Such
trademarks may also be registered or common law trademarks in other countries. A
current list of IBM trademarks is available on the Web at
Redbooks®
http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
Cast Iron® Netcool® Storwize®
DB2® PowerVM® Tivoli®
Global Technology Services® Redbooks® WebSphere®
IBM SmartCloud™ Redguide™ z/VM®
IBM® Redbooks (logo) ®
ITIL is a registered trademark, and a registered community trademark of The Minister for the Cabinet Office,
and is registered in the U.S. Patent and Trademark Office.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.
Other company, product, or service names may be trademarks or service marks of others.