SlideShare ist ein Scribd-Unternehmen logo
1 von 36
IBM Confidential
Client Deployment of IBM Cloud Private
#5964A
—
Michael Elder
IBM Distinguished Engineer – IBM Multicloud
Platform
@mdelder
Yong Feng
IBM Senior Technical Staff Member – IBM
Cloud Private
@luckyfengyong
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Please note
IBM’s statements regarding its plans, directions, and intent are subject to change
or withdrawal without notice and at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general
product direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a commitment, promise,
or legal obligation to deliver any material, code or functionality. Information about potential
future products may not be incorporated into any contract.
The development, release, and timing of any future features or functionality described for our
products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM benchmarks in
a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the
amount of multiprogramming in the user’s job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an
individual user will achieve results similar to those stated here.
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
What’s
included in
IBM Cloud
Private? 3Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Reference Architecture
4
http://ibm.biz/icpreferencearch
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Topology Architecture
5
http://ibm.biz/icptopologyarch
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Available Resources
6
http://bit.ly/icp-planning
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Operator guides were produced as a joint
effort between engineering, support, and
teams in the field
Designed to provide real world guidance
Always under improvement – give us your
feedback!
How should
you plan
your specific
architectureThink 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
8
Critical Architecture Decisions
HA Workload Feature
• How many failed nodes
can be tolerated?
• Do you need
availability zones?
• Upgrade with zero
downtime?
• What characteristics
define your workload:
cpu-intensive, memory-
intensive or others?
• What phase delivery
lifecycle: dev, test, UAT
or production?
• What is your required
throughput from your
consumers?
• Monitoring?
• Logging?
• Metering?
• Vulnerability Scan?
Security
• Do you need stringent
isolation for multiple
cluster consumers?
• Is certificate
management required?
• Is full PCI compliance
required?
• SELinux and firewall?
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
How should
you design
a cluster?
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Provision
infrastructure
Prepare external
service
Ready for installation
1
# of
cluster
How many
clusters?
2
Host
group
What kind of host
group, how many
hosts in the host
groups and what’s
the size of hosts?
3
Network
Network
topology, ingress
of management
control plan and
user workload
4
Storage
Storage for
management
services and
user workload
Five Key Principles Define IBM’s Approach…
5
Infra
Infrastructure
utilities leveraged
from infrastructure
manager
Design cluster with six key factors
6
Config
Configuration of OS
of host,
configuration of
management
services,
configuration of
external services
Installation
configuration
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
# of Cluster
11
The overall approach within the enterprise
Cost:
Aligned with the organisational units
Network latency:
Aligned with the geography
Scalability:
Aligned with the size of the managed nodes
Environment Requirement:
Aligned with the number of the distinct environment such as test, UAT and
production (whether namespaces isolation achieves the desired goals?)
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Host Group
12
Determine optional host group
• etcd: Enable for large scale cluster
• management: Enable when loads of management services are high
• va: Enable when vulnerability advisor and mutation advisor are enabled
• proxy: Enable when throughput of accessing to services from outside
cluster is high
Determine resource isolation
• Dedicate proxy node for a namespace
• Dedicate worker node for a namespace
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Number and Size of Host
13Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Machine Role Number vCPU (>= 2.4 GHz) Memory Disk Space Comment
Master 3 16 32GB 500GB 3 for HA
Management 2 16 32GB 500GB 2 for HA
Proxy 2 4 16GB 400GB 2 for HA
Vulnerability Advisor 1 8 32GB 500GB Optional (none-HA)
Worker Nodes 2-50 8 32GB 400GB
A typical production environment
http://ibm.biz/icpcapacityplan
Management Node considerations
14Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Separate management node from master node
– CPU, Memory and Disk intensive services running in management nodes
Increate the number of management node for large cluster
– Adding more management nodes not only increase the high availability but
balance the load of management services
Proxy Node considerations
15Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Proxy nodes scale better
vertically vs horizontally as
shown in the figure. Notice
that 1 Proxy Node of 8
vCPU supports nearly the
same workload as 3 Proxy
Nodes of 4 vCPU
– Rather than adding more
nodes, it is better to increase
the size of the node
Network - Resources
16Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
External Load Balancer
– ELB for master node
– ELB for proxy node
VIP
– Recommend ELB for
Production environment
Container network
– Network policy
Host network
External Network Controller
Network - Firewall Rule
17Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Protocol within cluster
– ipip (94) of IPV4
Port number
– Externally access to master and proxy nodes
– Internally access between master, proxy, management, va, etcd and worker
nodes
http://ibm.biz/icpportnumber
Network - DNS
18Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
DNS resolving of services
– <service>.<namespace>.sv
c.<cluster_domain>
Join upstream DNS chain
– Pick up upstream DNS
configuration from host
automatically
– Specify upstream DNS
configuration explicitly
Storage – Management Service
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Shared storage
– Image Registry: Large capacity which depends on the number of images
– License Audit Log: Small capacity
Local storage
– Docker: https://docs.docker.com/storage/storagedriver/select-storage-driver/
– etcd: High IOPS, SSD is preferred
– MongoDB: SATA is OK, but SSD is better.
– Elasticsearch: Large capacity
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Storage – User Application
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Storage options hosted on IBM Cloud Provider cluster
– GlusterFS
– Ceph block storage by using Rock
– Minio
Storage options hosted outside IBM Cloud Provider cluster
– vSphere storage provider
– Network file system
– IBM Spectrum Scale
Storage options allowed by Kubernetes
– https://kubernetes.io/docs/concepts/storage/volumes/#types-of-volumes
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Storage - Backup
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Kubernetes cluster state
– etcd: http://ibm.biz/icpbackup
Persistent volumes
– Traditional base backup tools can be used for backing up nodes and file system.
Storage – Backup with VM Solution
February 15, 2019
http://ibm.biz/icpbackupwithvmware
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Infrastructure Provider
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Infrastructure Metadata
– Host topology such as available zone
– Labels
Network
– NSX-T by vSphere
– ALB/ELB by AWS
– F5
Storage
– Datestore by vSphere
– EBS by AWS
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Infrastructure Provider (Cont’d)
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
AWS
– AWS Cloud Provider
https://kubernetes.io/docs/concepts/cluster-administration/cloud-providers/#aws
vSphere
– vSphere Cloud Provider
https://vmware.github.io/vsphere-storage-for-kubernetes/documentation/overview.html
F5
– F5 Network Solution
https://clouddocs.f5.com/containers/v2/kubernetes/
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Configuration - OS
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Security
– Enable Selinux to get better security protection on host resource
– Enable local firewall to get better security protection on network
Kernel Parameter
– Network related parameters
http://ibm.biz/icposkernelparam
– Virtual memory related parameter for elasticsearch
vm.max_map_count
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Configuration – External Service
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
LDAP/AD
– Prepare LDAP/AD for user authentication
http://ibm.biz/icpldap
Key Management Service
– Prepare KMS for secret encryption
http://ibm.biz/icpkmssecret
Vault
– Prepare HashiCorp Vault for certificate manager
http://ibm.biz/icpvault
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Configuration – Management Service
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Docker
– Follow CIS security benchmark
– Storage driver
Kubernetes
– Scheduler policy
– Configuration for large cluster: http://ibm.biz/icplargecluster
etcd
https://coreos.com/etcd/docs/latest/tuning.html
ELK
http://ibm.biz/icpelktuning
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Examples
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
IBM Cloud Private in
AWSLeverage available zone
– Master/mgmt/va across available
zone
– User application across available
zone
AWS ALB/NLB
– Load balancer for management
control plane
– Load balancer for user application
– Security group to control network
access
EBS as persistent storage
http://ibm.biz/icponaws
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Large Scale Cluster (1000 nodes)
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Size of host
– etcd/Master/Management/Proxy/VA: 36 CPU, 60 GM memory and 10 GB networ
OS kernel parameter
– Network and virtual memory: net.core.somaxconn, net.ipv4.neigh.default.gc_thresh, fs.file-max …
Calico
– Enable router reflector
etcd
– --heartbeat-interval=500, --election-timeout=2500, --snapshot-count=5000
Kubernetes
– memory cache, communication timeout, API throttle, parallelism of ops
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Multiple Tenants with Isolation
Proxy in DMZ can only
access service from
tenant A
Proxy in intranet can only
access service from
tenant B
Services from tenant A
and Service from tenant B
are running in different
workers and cannot
access between each
other
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Air-gapped Environment
Proxy configuration for Docker
## Docker environment setup
docker_env:
- HTTP_PROXY=http://1.2.3.4:3128
- HTTPS_PROXY=http://1.2.3.4:3128
- NO_PROXY=localhost,127.0.0.1,{{ cluster_CA_domain }}
Proxy configuration for helm-api
tiller_http_proxy: http://1.2.3.4:3128
tiller_https_proxy: http://1.2.3.4:3128
http://ibm.biz/icpairgapped
February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers
Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
Notices and disclaimers
Think 2019 / 6393A / Feb 11, 2019 / © 2019 IBM Corporation
© 2019 International Business Machines Corporation. No part of this
document may be reproduced or transmitted in any form without
written permission from IBM.
U.S. Government Users Restricted Rights — use, duplication or
disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to
products that have not yet been announced by IBM) has been reviewed
for accuracy as of the date of initial publication and could include
unintentional technical or typographical errors. IBM shall have no
responsibility to update this information. This document is distributed
“as is” without any warranty, either express or implied. In no event,
shall IBM be liable for any damage arising from the use of this
information, including but not limited to, loss of data, business
interruption, loss of profit or loss of opportunity. IBM products and
services are warranted per the terms and conditions of the agreements
under which they are provided.
IBM products are manufactured from new parts or new and used parts.
In some cases, a product may not be new and may have been previously
installed. Regardless, our warranty terms apply.”
Any statements regarding IBM's future direction, intent or product
plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a
controlled, isolated environments. Customer examples are presented as
illustrations of how those
customers have used IBM products and the results they may have
achieved. Actual performance, cost, savings or other results in other
operating environments may vary.
References in this document to IBM products, programs, or services does
not imply that IBM intends to make such products, programs or services
available in all countries in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared
by independent session speakers, and do not necessarily reflect the views
of IBM. All materials and discussions are provided for informational
purposes only, and are neither intended to, nor shall constitute legal or
other guidance or advice to any individual participant or their specific
situation.
It is the customer’s responsibility to insure its own compliance with legal
requirements and to obtain advice of competent legal counsel as to
the identification and interpretation of any relevant laws and regulatory
requirements that may affect the customer’s business and any actions the
customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products
will ensure that the customer follows any law.
Notices and disclaimers
continued
Information concerning non-IBM products was obtained from the
suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products about this
publication and cannot confirm the accuracy of performance, compatibility
or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of
those products. IBM does not warrant the quality of any third-party
products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM expressly disclaims all
warranties, expressed or implied, including but not limited to, the
implied warranties of merchantability and fitness for a purpose.
The provision of the information contained herein is not intended to, and
does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com and [names of other referenced IBM
products and services used in the presentation] are trademarks of
International Business Machines Corporation, registered in many
jurisdictions worldwide. Other product and service names might
be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at “Copyright and trademark
information” at: www.ibm.com/legal/copytrade.shtml.
Think 2019 / 6393A / Feb 11, 2019 / © 2019 IBM Corporation
IBM Confidential
Thank you
Think 2019 / 6393A / Feb 11, 2019 / © 2019 IBM Corporation
®
https://www.ibm.com/legal/us/en/copytrade.shtml

Weitere ähnliche Inhalte

Was ist angesagt?

An architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbencyAn architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbency
Michael Elder
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical training
Ajit Yohannan
 
IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)
Simon Baker
 

Was ist angesagt? (20)

Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
 Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
Learn how to Leverage Kubernetes to Support 12 Factor for Enterprise Apps
 
An architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbencyAn architect’s guide to leveraging your incumbency
An architect’s guide to leveraging your incumbency
 
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
Deploying Kubernetes in the Enterprise (IBM #Think2019 #7678 Tech Talk)
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
 
Accelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud PrivateAccelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud Private
 
How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?
 
IBM Multicloud Management on the OpenShift Container Platform
IBM Multicloud Management on theOpenShift Container PlatformIBM Multicloud Management on theOpenShift Container Platform
IBM Multicloud Management on the OpenShift Container Platform
 
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...
Elevate Your Continuous Delivery Strategy Above the Rolling Clouds - UrbanCod...
 
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
Continuous Delivery on IBM Bluemix: Manage Cloud Native Services with Cloud N...
 
IBM Bluemix hands on
IBM Bluemix hands onIBM Bluemix hands on
IBM Bluemix hands on
 
IBM Bluemix
IBM BluemixIBM Bluemix
IBM Bluemix
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical training
 
How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...
 
IBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceIBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix Marketplace
 
IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)IBM SmartCloud and ISVs September 2013 (Softlayer)
IBM SmartCloud and ISVs September 2013 (Softlayer)
 
DevOps for IBM Commerce
DevOps for IBM CommerceDevOps for IBM Commerce
DevOps for IBM Commerce
 
How to Adopt Docker Within Your Enterprise Using IBM UrbanCode Deploy (Interc...
How to Adopt Docker Within Your Enterprise Using IBM UrbanCode Deploy (Interc...How to Adopt Docker Within Your Enterprise Using IBM UrbanCode Deploy (Interc...
How to Adopt Docker Within Your Enterprise Using IBM UrbanCode Deploy (Interc...
 
Elevating your Continuous Delivery Strategy Above the Rolling Clouds
Elevating your Continuous Delivery Strategy Above the Rolling CloudsElevating your Continuous Delivery Strategy Above the Rolling Clouds
Elevating your Continuous Delivery Strategy Above the Rolling Clouds
 
Scaling Integration
Scaling IntegrationScaling Integration
Scaling Integration
 
Cloud adoption patterns
Cloud adoption patternsCloud adoption patterns
Cloud adoption patterns
 

Ähnlich wie Client Deployment of IBM Cloud Private (Think 2019 Session 5964A)

Ähnlich wie Client Deployment of IBM Cloud Private (Think 2019 Session 5964A) (20)

IBM Cloud Private and IBM Power Systems: Overview and Real-World Scenarios
IBM Cloud Private and IBM Power Systems: Overview and Real-World ScenariosIBM Cloud Private and IBM Power Systems: Overview and Real-World Scenarios
IBM Cloud Private and IBM Power Systems: Overview and Real-World Scenarios
 
MQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and ContainersMQ Guide France - IBM MQ and Containers
MQ Guide France - IBM MQ and Containers
 
Emerging Cloud Migration Approaches
Emerging Cloud Migration ApproachesEmerging Cloud Migration Approaches
Emerging Cloud Migration Approaches
 
Supercharged Notes 10 Upgrade: Turning the Worst Notes Deployments into the Best
Supercharged Notes 10 Upgrade: Turning the Worst Notes Deployments into the BestSupercharged Notes 10 Upgrade: Turning the Worst Notes Deployments into the Best
Supercharged Notes 10 Upgrade: Turning the Worst Notes Deployments into the Best
 
Supercharged Notes 10 Upgrade
Supercharged Notes 10 UpgradeSupercharged Notes 10 Upgrade
Supercharged Notes 10 Upgrade
 
20230614 LinuxONE Distinguished_Recognition ISSIP_Award_Talk.pptx
20230614 LinuxONE Distinguished_Recognition ISSIP_Award_Talk.pptx20230614 LinuxONE Distinguished_Recognition ISSIP_Award_Talk.pptx
20230614 LinuxONE Distinguished_Recognition ISSIP_Award_Talk.pptx
 
Iasp Enablement
Iasp EnablementIasp Enablement
Iasp Enablement
 
AdminCamp2019 - We love Domino V10 - 15 neue Domino-Admin-Features
AdminCamp2019 - We love Domino V10 - 15 neue Domino-Admin-FeaturesAdminCamp2019 - We love Domino V10 - 15 neue Domino-Admin-Features
AdminCamp2019 - We love Domino V10 - 15 neue Domino-Admin-Features
 
So you want to provision a test environment...
So you want to provision a test environment...So you want to provision a test environment...
So you want to provision a test environment...
 
Making the Most of Data in Multiple Data Sources (with Virtual Data Lakes)
Making the Most of Data in Multiple Data Sources (with Virtual Data Lakes)Making the Most of Data in Multiple Data Sources (with Virtual Data Lakes)
Making the Most of Data in Multiple Data Sources (with Virtual Data Lakes)
 
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...Seminar Accelerating Business Using Microservices Architecture in Digital Age...
Seminar Accelerating Business Using Microservices Architecture in Digital Age...
 
IBM Cloud Integration Platform High Availability - Integration Tech Conference
IBM Cloud Integration Platform High Availability - Integration Tech ConferenceIBM Cloud Integration Platform High Availability - Integration Tech Conference
IBM Cloud Integration Platform High Availability - Integration Tech Conference
 
The trial period is over - Microservices adoption gains momentum 
The trial period is over - Microservices adoption gains momentum The trial period is over - Microservices adoption gains momentum 
The trial period is over - Microservices adoption gains momentum 
 
Effectively Plan for Your Move to the Cloud
Effectively Plan for Your Move to the CloudEffectively Plan for Your Move to the Cloud
Effectively Plan for Your Move to the Cloud
 
Kafka with IBM Event Streams - Technical Presentation
Kafka with IBM Event Streams - Technical PresentationKafka with IBM Event Streams - Technical Presentation
Kafka with IBM Event Streams - Technical Presentation
 
15 New Domino Admin Features Sure to Spark a Lasting Love Affair with Domino ...
15 New Domino Admin Features Sure to Spark a Lasting Love Affair with Domino ...15 New Domino Admin Features Sure to Spark a Lasting Love Affair with Domino ...
15 New Domino Admin Features Sure to Spark a Lasting Love Affair with Domino ...
 
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayerPresentation_ISDC 2014_Jonathan Wisler_SoftLayer
Presentation_ISDC 2014_Jonathan Wisler_SoftLayer
 
IBM Power Systems - enabling cloud solutions
IBM Power Systems - enabling cloud solutionsIBM Power Systems - enabling cloud solutions
IBM Power Systems - enabling cloud solutions
 
L105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902aL105704 ibm-cloud-private-z-cairo-v1902a
L105704 ibm-cloud-private-z-cairo-v1902a
 
Z105745 ibmz-cloud-cairo-v1902a
Z105745 ibmz-cloud-cairo-v1902aZ105745 ibmz-cloud-cairo-v1902a
Z105745 ibmz-cloud-cairo-v1902a
 

Mehr von Yong Feng

Mehr von Yong Feng (10)

ISTIO Deep Dive
ISTIO Deep DiveISTIO Deep Dive
ISTIO Deep Dive
 
Cloud nativecomputingtechnologysupportinghpc cognitiveworkflows
Cloud nativecomputingtechnologysupportinghpc cognitiveworkflowsCloud nativecomputingtechnologysupportinghpc cognitiveworkflows
Cloud nativecomputingtechnologysupportinghpc cognitiveworkflows
 
When HPC meet ML/DL: Manage HPC Data Center with Kubernetes
When HPC meet ML/DL: Manage HPC Data Center with KubernetesWhen HPC meet ML/DL: Manage HPC Data Center with Kubernetes
When HPC meet ML/DL: Manage HPC Data Center with Kubernetes
 
Kubernetes on EGO : Bringing enterprise resource management and scheduling to...
Kubernetes on EGO : Bringing enterprise resource management and scheduling to...Kubernetes on EGO : Bringing enterprise resource management and scheduling to...
Kubernetes on EGO : Bringing enterprise resource management and scheduling to...
 
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
Edge 2016 Session 1886  Building your own docker container cloud on ibm power...Edge 2016 Session 1886  Building your own docker container cloud on ibm power...
Edge 2016 Session 1886 Building your own docker container cloud on ibm power...
 
Edge 2016 SCL-2484: a software defined scalable and flexible container manage...
Edge 2016 SCL-2484: a software defined scalable and flexible container manage...Edge 2016 SCL-2484: a software defined scalable and flexible container manage...
Edge 2016 SCL-2484: a software defined scalable and flexible container manage...
 
State of Resource Management in Big Data
State of Resource Management in Big DataState of Resource Management in Big Data
State of Resource Management in Big Data
 
Mesos Con 2016 Optimistic Offer
Mesos Con 2016 Optimistic OfferMesos Con 2016 Optimistic Offer
Mesos Con 2016 Optimistic Offer
 
IBM Platform Computing Products Connector for Apache Mesos
IBM Platform Computing Products Connector for Apache MesosIBM Platform Computing Products Connector for Apache Mesos
IBM Platform Computing Products Connector for Apache Mesos
 
Platform Resource Scheduler Holistic Application Policy in Heat
Platform Resource Scheduler Holistic Application Policy in HeatPlatform Resource Scheduler Holistic Application Policy in Heat
Platform Resource Scheduler Holistic Application Policy in Heat
 

Kürzlich hochgeladen

Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Kürzlich hochgeladen (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Client Deployment of IBM Cloud Private (Think 2019 Session 5964A)

  • 1. IBM Confidential Client Deployment of IBM Cloud Private #5964A — Michael Elder IBM Distinguished Engineer – IBM Multicloud Platform @mdelder Yong Feng IBM Senior Technical Staff Member – IBM Cloud Private @luckyfengyong Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 2. Please note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice and at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 3. What’s included in IBM Cloud Private? 3Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 4. Reference Architecture 4 http://ibm.biz/icpreferencearch Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 5. Topology Architecture 5 http://ibm.biz/icptopologyarch Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 6. Available Resources 6 http://bit.ly/icp-planning Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation Operator guides were produced as a joint effort between engineering, support, and teams in the field Designed to provide real world guidance Always under improvement – give us your feedback!
  • 7. How should you plan your specific architectureThink 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 8. 8 Critical Architecture Decisions HA Workload Feature • How many failed nodes can be tolerated? • Do you need availability zones? • Upgrade with zero downtime? • What characteristics define your workload: cpu-intensive, memory- intensive or others? • What phase delivery lifecycle: dev, test, UAT or production? • What is your required throughput from your consumers? • Monitoring? • Logging? • Metering? • Vulnerability Scan? Security • Do you need stringent isolation for multiple cluster consumers? • Is certificate management required? • Is full PCI compliance required? • SELinux and firewall? Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 9. How should you design a cluster? Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 10. Provision infrastructure Prepare external service Ready for installation 1 # of cluster How many clusters? 2 Host group What kind of host group, how many hosts in the host groups and what’s the size of hosts? 3 Network Network topology, ingress of management control plan and user workload 4 Storage Storage for management services and user workload Five Key Principles Define IBM’s Approach… 5 Infra Infrastructure utilities leveraged from infrastructure manager Design cluster with six key factors 6 Config Configuration of OS of host, configuration of management services, configuration of external services Installation configuration Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 11. # of Cluster 11 The overall approach within the enterprise Cost: Aligned with the organisational units Network latency: Aligned with the geography Scalability: Aligned with the size of the managed nodes Environment Requirement: Aligned with the number of the distinct environment such as test, UAT and production (whether namespaces isolation achieves the desired goals?) Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 12. Host Group 12 Determine optional host group • etcd: Enable for large scale cluster • management: Enable when loads of management services are high • va: Enable when vulnerability advisor and mutation advisor are enabled • proxy: Enable when throughput of accessing to services from outside cluster is high Determine resource isolation • Dedicate proxy node for a namespace • Dedicate worker node for a namespace Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 13. Number and Size of Host 13Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation Machine Role Number vCPU (>= 2.4 GHz) Memory Disk Space Comment Master 3 16 32GB 500GB 3 for HA Management 2 16 32GB 500GB 2 for HA Proxy 2 4 16GB 400GB 2 for HA Vulnerability Advisor 1 8 32GB 500GB Optional (none-HA) Worker Nodes 2-50 8 32GB 400GB A typical production environment http://ibm.biz/icpcapacityplan
  • 14. Management Node considerations 14Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation Separate management node from master node – CPU, Memory and Disk intensive services running in management nodes Increate the number of management node for large cluster – Adding more management nodes not only increase the high availability but balance the load of management services
  • 15. Proxy Node considerations 15Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation Proxy nodes scale better vertically vs horizontally as shown in the figure. Notice that 1 Proxy Node of 8 vCPU supports nearly the same workload as 3 Proxy Nodes of 4 vCPU – Rather than adding more nodes, it is better to increase the size of the node
  • 16. Network - Resources 16Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation External Load Balancer – ELB for master node – ELB for proxy node VIP – Recommend ELB for Production environment Container network – Network policy Host network External Network Controller
  • 17. Network - Firewall Rule 17Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation Protocol within cluster – ipip (94) of IPV4 Port number – Externally access to master and proxy nodes – Internally access between master, proxy, management, va, etcd and worker nodes http://ibm.biz/icpportnumber
  • 18. Network - DNS 18Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation DNS resolving of services – <service>.<namespace>.sv c.<cluster_domain> Join upstream DNS chain – Pick up upstream DNS configuration from host automatically – Specify upstream DNS configuration explicitly
  • 19. Storage – Management Service February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Shared storage – Image Registry: Large capacity which depends on the number of images – License Audit Log: Small capacity Local storage – Docker: https://docs.docker.com/storage/storagedriver/select-storage-driver/ – etcd: High IOPS, SSD is preferred – MongoDB: SATA is OK, but SSD is better. – Elasticsearch: Large capacity Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 20. Storage – User Application February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Storage options hosted on IBM Cloud Provider cluster – GlusterFS – Ceph block storage by using Rock – Minio Storage options hosted outside IBM Cloud Provider cluster – vSphere storage provider – Network file system – IBM Spectrum Scale Storage options allowed by Kubernetes – https://kubernetes.io/docs/concepts/storage/volumes/#types-of-volumes Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 21. Storage - Backup February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation Kubernetes cluster state – etcd: http://ibm.biz/icpbackup Persistent volumes – Traditional base backup tools can be used for backing up nodes and file system.
  • 22. Storage – Backup with VM Solution February 15, 2019 http://ibm.biz/icpbackupwithvmware Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 23. Infrastructure Provider February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Infrastructure Metadata – Host topology such as available zone – Labels Network – NSX-T by vSphere – ALB/ELB by AWS – F5 Storage – Datestore by vSphere – EBS by AWS Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 24. Infrastructure Provider (Cont’d) February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers AWS – AWS Cloud Provider https://kubernetes.io/docs/concepts/cluster-administration/cloud-providers/#aws vSphere – vSphere Cloud Provider https://vmware.github.io/vsphere-storage-for-kubernetes/documentation/overview.html F5 – F5 Network Solution https://clouddocs.f5.com/containers/v2/kubernetes/ Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 25. Configuration - OS February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Security – Enable Selinux to get better security protection on host resource – Enable local firewall to get better security protection on network Kernel Parameter – Network related parameters http://ibm.biz/icposkernelparam – Virtual memory related parameter for elasticsearch vm.max_map_count Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 26. Configuration – External Service February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers LDAP/AD – Prepare LDAP/AD for user authentication http://ibm.biz/icpldap Key Management Service – Prepare KMS for secret encryption http://ibm.biz/icpkmssecret Vault – Prepare HashiCorp Vault for certificate manager http://ibm.biz/icpvault Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 27. Configuration – Management Service February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Docker – Follow CIS security benchmark – Storage driver Kubernetes – Scheduler policy – Configuration for large cluster: http://ibm.biz/icplargecluster etcd https://coreos.com/etcd/docs/latest/tuning.html ELK http://ibm.biz/icpelktuning Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 28. Examples Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 29. IBM Cloud Private in AWSLeverage available zone – Master/mgmt/va across available zone – User application across available zone AWS ALB/NLB – Load balancer for management control plane – Load balancer for user application – Security group to control network access EBS as persistent storage http://ibm.biz/icponaws February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 30. Large Scale Cluster (1000 nodes) February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Size of host – etcd/Master/Management/Proxy/VA: 36 CPU, 60 GM memory and 10 GB networ OS kernel parameter – Network and virtual memory: net.core.somaxconn, net.ipv4.neigh.default.gc_thresh, fs.file-max … Calico – Enable router reflector etcd – --heartbeat-interval=500, --election-timeout=2500, --snapshot-count=5000 Kubernetes – memory cache, communication timeout, API throttle, parallelism of ops Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 31. Multiple Tenants with Isolation Proxy in DMZ can only access service from tenant A Proxy in intranet can only access service from tenant B Services from tenant A and Service from tenant B are running in different workers and cannot access between each other Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 32. Air-gapped Environment Proxy configuration for Docker ## Docker environment setup docker_env: - HTTP_PROXY=http://1.2.3.4:3128 - HTTPS_PROXY=http://1.2.3.4:3128 - NO_PROXY=localhost,127.0.0.1,{{ cluster_CA_domain }} Proxy configuration for helm-api tiller_http_proxy: http://1.2.3.4:3128 tiller_https_proxy: http://1.2.3.4:3128 http://ibm.biz/icpairgapped February 15, 2019 ICP Solutioning Guide 101 | IBM Confidential | IBM Cloud Solutioning Centers Think 2019 / 5964A / Feb 15, 2019 / © 2019 IBM Corporation
  • 33. Notices and disclaimers Think 2019 / 6393A / Feb 11, 2019 / © 2019 IBM Corporation © 2019 International Business Machines Corporation. No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights — use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. This document is distributed “as is” without any warranty, either express or implied. In no event, shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted per the terms and conditions of the agreements under which they are provided. IBM products are manufactured from new parts or new and used parts. In some cases, a product may not be new and may have been previously installed. Regardless, our warranty terms apply.” Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer follows any law.
  • 34. Notices and disclaimers continued Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products about this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM expressly disclaims all warranties, expressed or implied, including but not limited to, the implied warranties of merchantability and fitness for a purpose. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com and [names of other referenced IBM products and services used in the presentation] are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at: www.ibm.com/legal/copytrade.shtml. Think 2019 / 6393A / Feb 11, 2019 / © 2019 IBM Corporation
  • 35. IBM Confidential Thank you Think 2019 / 6393A / Feb 11, 2019 / © 2019 IBM Corporation

Hinweis der Redaktion

  1. As a role of thumb memory requirement is 4X vCPU requirements. For HA, master nodes require a quorum so it should be an odd number while management nodes and proxy nodes do not require a quorum The workload (application and middleware) sizing determines the total capacity requirement and the number of worker nodes is derived from that
  2. As a role of thumb Memory requirement is 4X vCPU requirements. For HA, master nodes require a quorum so it should be an odd number while management nodes and proxy nodes do not require a quorum The workload (application and middleware) sizing determines the total capacity requirement and the number of worker nodes is derived from that
  3. As a role of thumb Memory requirement is 4X vCPU requirements. For HA, master nodes require a quorum so it should be an odd number while management nodes and proxy nodes do not require a quorum The workload (application and middleware) sizing determines the total capacity requirement and the number of worker nodes is derived from that
  4. External Load Balancer: The load balancers to control the access to master node and proxy node from outside cluster and balance the requests ELB for master node ELB for proxy node VIP: The default implementation of IBM Cloud Private to provide endpoint of master and proxy node for HA topology. Recommend ELB for Production environment Container network: Overlay network on top of host network for communication between containers. Network policy to control accessibility of container Host network: A few containers are using host network directly Infrastructure Provider: AWS, vSphere, F5 …