Book description
This IBM® Redbooks® publication is based on the Presentations Guide of the course A Practical Approach to Cloud IaaS with IBM SoftLayer, which was developed by the IBM Redbooks team in partnership with IBM Middle East and Africa University Program.
This course is designed to teach university students how to build a simple infrastructure as a service (IaaS) cloud environment based on IBM SoftLayer®. It provides students with the fundamental skills to design, implement, and manage an IaaS cloud environment using the IBM SoftLayer platform as an example.
The primary target audience for this course is university students in undergraduate computer science and computer engineer programs with no previous experience working in cloud environments. However, anyone new to cloud computing can benefit from this course.
The workshop materials were created in July 2015. Thus, all IBM SoftLayer features discussed in this Presentations Guide are current as of July 2015.
Table of contents
- Front cover
- Notices
- IBM Redbooks promotions
- Preface
-
Unit 1. Understanding the IaaS approach
- 1.1 What you should be able to do
- 1.2 References
- 1.3 Teaching topics
- 1.4 What is Cloud Computing?
- 1.5 Definition of Cloud Computing
- 1.6 Essential characteristics
- 1.7 Deployment models
- 1.8 Service models
- 1.9 Cloud service models in practice
- 1.10 Cloud service models – Technology mapping
- 1.11 Cloud adoption and migration is workload driven
- 1.12 Infrastructure as a Service
- 1.13 Example IaaS use case: Website publishing scenario
- 1.14 Platform as a Service
- 1.15 Software as a Service
- 1.16 Implications of Cloud Computing
- 1.17 Business benefits of Cloud Computing
- 1.18 Development benefits of Cloud Computing
- 1.19 Industry impact
- 1.20 IaaS: Common storage models
- 1.21 Overview of storage options
- 1.22 IaaS: SoftLayer public cloud
- 1.23 IaaS products and services overview (SoftLayer)
- 1.24 Key takeaways: Cloud Computing
-
Unit 2. Platform architecture for cloud computing
- 2.1 What you should be able to do
- 2.2 Teaching topics
- 2.3 Typical IaaS offerings
- 2.4 What an IaaS provider could offer
- 2.5 Location location location
- 2.6 SoftLayer presence
- 2.7 The datacenter
- 2.8 Network architecture
- 2.9 Triple network architecture
- 2.10 The Orchestration Management System
- 2.11 Sample IaaS datacenter
- 2.12 Checkpoint
- 2.13 Checkpoint (2)
- 2.14 Management web interface
- 2.15 Management web interface capabilities
- 2.16 Monitor/control/change instances from the web interface
- 2.17 Monitor/control/change instances
- 2.18 Account administration
- 2.19 Adding users to your account
- 2.20 Defining permissions for users
- 2.21 Default permission templates
- 2.22 Defining instance access
- 2.23 Checkpoint
- 2.24 Checkpoint (2)
-
Unit 3. Server offerings in cloud computing
- 3.1 What you should be able to do
- 3.2 References
- 3.3 Teaching topics
- 3.4 Compute Nodes in IaaS Cloud
- 3.5 IaaS cloud server offerings (SoftLayer)
- 3.6 Virtual Servers - Public node
- 3.7 Virtual Servers - Public node (2)
- 3.8 Virtual Servers - Private node
- 3.9 All virtual servers:
- 3.10 Bare metal servers
- 3.11 Bare metal servers with hourly billing
- 3.12 Bare metal servers with monthly billing
- 3.13 Bare metal servers with monthly billing (continued)
- 3.14 All server offerings:
- 3.15 Checkpoint questions
- 3.16 Checkpoint questions (2)
- 3.17 Ordering servers
- 3.18 Provisioning server instances
- 3.19 Inspecting server details
- 3.20 Upgrading or downgrading server instances
- 3.21 Accessing server instances
- 3.22 Canceling server instances
- 3.23 Checkpoint questions
- 3.24 Checkpoint questions (2)
-
Unit 4. Storage options in cloud computing
- 4.1 What you should be able to do
- 4.2 References
- 4.3 Teaching topics
- 4.4 Introduction to storage: Storage types
- 4.5 Introduction to storage: DAS
- 4.6 Introduction to storage: DAS (2)
- 4.7 Introduction to storage: SAN
- 4.8 Introduction to storage: SAN (2)
- 4.9 Introduction to storage: NAS
- 4.10 Introduction to storage: NAS (2)
- 4.11 Introduction to storage: Object Storage
- 4.12 Introduction to storage: RAID arrays
- 4.13 iSCSI: Components
- 4.14 iSCSI addressing
- 4.15 iSCSI access control
- 4.16 NFS components
- 4.17 NFS addressing
- 4.18 NFS access control
- 4.19 SoftLayer storage offerings: DAS
- 4.20 SoftLayer storage offerings: Block storage
- 4.21 SoftLayer storage offerings: File storage
- 4.22 SoftLayer storage offering: Storage options
- 4.23 SoftLayer storage offering: Storage options (2)
- 4.24 SoftLayer storage offering: Storage options (3)
- 4.25 SoftLayer storage offering: Object storage
- 4.26 Overview
- 4.27 Check point: Questions
- 4.28 Check point: Questions and answers
- 4.29 Recap
-
Unit 5. Networking options in cloud computing
- 5.1 What you should be able to do
- 5.2 References
- 5.3 Teaching topics
- 5.4 What is cloud computing?
- 5.5 The network is critical to Cloud Computing
- 5.6 Networking had to change
- 5.7 Attributes of Cloud Networking
- 5.8 Example: Data center switch network architecture
- 5.9 Virtual Ethernet switch in a virtualized server environment
- 5.10 Networking overview
- 5.11 Networking overview (2)
- 5.12 Networking overview (3)
- 5.13 Learning about public networks
- 5.14 Learning about public networks (2)
- 5.15 Learning about public networks - Carriers
- 5.16 Understanding the primary features
- 5.17 Understanding bandwidth
- 5.18 Learning about private networks
- 5.19 Learning about private networks (2)
- 5.20 Learning about private networks (3)
- 5.21 Learning about management network
- 5.22 SoftLayer network architecture
- 5.23 Reviewing SoftLayer network tooling
- 5.24 Using Looking Glass, SoftLayer’s IP backbone
- 5.25 Using SoftLayer Looking Glass, SoftLayer's IP backbone
- 5.26 Using SoftLayer Looking Glass, SoftLayer's IP backbone (2)
- 5.27 Using other networking tools
- 5.28 Using other networking tools (2)
- 5.29 Using other networking tools (3)
- 5.30 Using other networking tools from SoftLayer Control Panel
- 5.31 Managing VPN connections to SoftLayer
- 5.32 General concept of VPN
- 5.33 Managing VPN connections to SoftLayer
- 5.34 Managing VPN connections to SoftLayer (2)
- 5.35 Managing VPN connections to SoftLayer (3)
- 5.36 Managing VPN connections to SoftLayer (4)
- 5.37 Direct Link use case
- 5.38 Direct Link use case (continued)
- 5.39 Direct Link use case (continued) (2)
- 5.40 Recap
- 5.41 Checkpoint questions
- 5.42 Checkpoint questions (2)
- 5.43 Checkpoint questions (3)
- 5.44 Checkpoint questions (4)
- 5.45 Checkpoint questions (5)
- 5.46 Checkpoint questions (6)
- 5.47 Checkpoint questions (7)
- 5.48 Checkpoint questions (8)
-
Unit 6. Managing a simple IaaS environment
- 6.1 What you should be able to do
- 6.2 Teaching topics
- 6.3 Basics of cloud infrastructure and components
- 6.4 Cloud service model overview
- 6.5 Platform architecture
- 6.6 Locations of platform architecture
- 6.7 Types of servers
- 6.8 Server options
- 6.9 Storage types and protocols
- 6.10 Other storage types
- 6.11 Network types
- 6.12 Basics of cloud infrastructure and components
- 6.13 Conclusion of recap
- 6.14 Technologies enabling transformation of infrastructure
- 6.15 Overview of technologies
- 6.16 Virtualization
- 6.17 Hypervisor
- 6.18 Provisioning
- 6.19 Managing cloud infrastructure
- 6.20 Cloud infrastructure IaaS key points
- 6.21 Managing cloud infrastructure in IaaS
- 6.22 Checkpoint
-
Unit 7. Server offerings in cloud computing: Advanced topics
- 7.1 What you should be able to do
- 7.2 Teaching topics
- 7.3 Introducing the image template concept
- 7.4 Image template types in SoftLayer
- 7.5 Image template types in SoftLayer: Standard images
- 7.6 Image template types in SoftLayer: Flex Images
- 7.7 Image template types in SoftLayer
- 7.8 Creating image templates in SoftLayer
- 7.9 Creating image templates in SoftLayer (2)
- 7.10 Sharing, finding, and deploying the image templates
- 7.11 Sharing, finding, and deploying the image templates (2)
- 7.12 Sharing, finding, and deploying the image templates (3)
- 7.13 Sharing, finding, and deploying the image templates (4)
- 7.14 Provisioning scripts
- 7.15 Usage scenarios in SoftLayer
- 7.16 Usage scenarios in SoftLayer (2)
- 7.17 Checkpoint questions
- 7.18 Checkpoint questions (2)
- 7.19 Checkpoint questions (3)
- 7.20 Checkpoint questions (4)
-
Unit 8. Storage options in cloud computing: Advanced topics
- 8.1 What you should be able to do
- 8.2 References
- 8.3 Teaching topics
- 8.4 Backup and recovery: Concepts
- 8.5 Backup and recovery: Concepts (2)
- 8.6 Backup and recovery solutions in SoftLayer
- 8.7 Snapshots and replication of Endurance storage
- 8.8 Dedicated storage
- 8.9 Dedicated storage: OS NEXUS QuantaStor
- 8.10 Check point: Questions
- 8.11 Check point: Questions answered
-
Unit 9. Networking options in cloud computing: Advanced topics
- 9.1 What you should be able to do
- 9.2 References
- 9.3 Teaching topics
- 9.4 SoftLayer network topology
- 9.5 IP addresses in SoftLayer
- 9.6 IP addresses in SoftLayer (2)
- 9.7 Five steps to start using IPv6 in SoftLayer
- 9.8 Separating devices and subnets with VLANs
- 9.9 VLAN spanning
- 9.10 VLAN spanning (2)
- 9.11 Load balancing fundamentals
- 9.12 Load balancing fundamentals (2)
- 9.13 Load balancing options in SoftLayer
- 9.14 Load balancing options in SoftLayer (2)
- 9.15 Load balancing solutions in SoftLayer use case
- 9.16 SoftLayer Content Delivery Network
- 9.17 EdgeCast CDN locations
- 9.18 Example SoftLayer CDN users
- 9.19 SoftLayer Content Delivery Network use case
- 9.20 SoftLayer Content Delivery Network implementation guide
- 9.21 SoftLayer Content Delivery Network use case
- 9.22 SoftLayer Content Delivery Network use case (2)
- 9.23 SoftLayer Content Delivery Network use case (3)
- 9.24 SoftLayer Content Delivery Network use case (4)
- 9.25 SoftLayer Content Delivery Network use case (5)
- 9.26 SoftLayer Content Delivery Network use case (6)
- 9.27 SoftLayer Content Delivery Network use case (7)
- 9.28 SoftLayer Content Delivery Network use case (8)
- 9.29 SoftLayer Content Delivery Network use case (9)
- 9.30 SoftLayer Content Delivery Network use case (10)
- 9.31 Vyatta appliance
- 9.32 Recap
- 9.33 Checkpoint questions
- 9.34 Checkpoint questions (2)
- 9.35 Checkpoint questions (3)
- 9.36 Checkpoint questions (4)
- 9.37 Checkpoint questions (5)
- 9.38 Checkpoint questions (6)
- 9.39 Checkpoint questions (7)
- 9.40 Checkpoint questions (8)
- 9.41 Checkpoint questions (9)
- 9.42 Checkpoint questions (10)
- 9.43 Introduction to OSI model
- 9.44 Understanding TCP/IP addressing and subnetting basics
-
Unit 10. Securing cloud environments
- 10.1 What you should be able to do
- 10.2 References
- 10.3 Teaching topics
- 10.4 Why security is important
- 10.5 Data center security
- 10.6 Additional security offerings
- 10.7 Securing communications
- 10.8 Securing instances using firewalls
- 10.9 Securing instances using firewalls (2)
- 10.10 Hardware firewalls
- 10.11 Appliance firewalls
- 10.12 OS firewalls
- 10.13 IaaS provider firewalls
- 10.14 Checkpoint
- 10.15 Checkpoint (2)
- 10.16 Securing instances using OS hardening
- 10.17 Using portal to set up and verify security
- 10.18 Administering firewall from the portal
- 10.19 Verify security in the portal
- 10.20 Checkpoint
- 10.21 Checkpoint (2)
-
Unit 11. Monitoring cloud environments
- 11.1 What you should be able to do
- 11.2 References
- 11.3 Teaching topics
- 11.4 Typical service models responsibilities and typical service access to infrastructure
- 11.5 Typical core infrastructure monitoring and typical infrastructure components monitored
- 11.6 Why monitoring is important
- 11.7 Typical monitoring tool limitations
- 11.8 How typical monitoring tools work
- 11.9 Typical monitoring alert
- 11.10 Typical monitoring response
- 11.11 Practical approach to SoftLayer monitoring
- 11.12 Ordering a monitoring service
- 11.13 Building your own simple monitoring solution
- 11.14 Upgrading a monitoring package
- 11.15 Cancelling a monitoring package
- 11.16 Checkpoint questions
- 11.17 Checkpoint questions (2)
-
Unit 12. Automating cloud management with APIs
- 12.1 What you should be able to do
- 12.2 References
- 12.3 Teaching topics
- 12.4 Introducing the API concept
- 12.5 API advantages
- 12.6 API advantages (2)
- 12.7 Hybrid cloud scenarios that use the API economy
- 12.8 SoftLayer API overview
- 12.9 SoftLayer API overview (2)
- 12.10 The SoftLayer API structure
- 12.11 The SoftLayer API structure (2)
- 12.12 The main SoftLayer library
- 12.13 The Object Store API
- 12.14 The Message Queue API
- 12.15 Using the SoftLayer API
- 12.16 Using the SoftLayer API: Services and methods
- 12.17 Using the SoftLayer API: Data types
- 12.18 Using the SoftLayer API: Service hierarchy sample
- 12.19 Using the SoftLayer API
- 12.20 Using the SoftLayer API (cont.)
- 12.21 Example scenarios of using an API
- 12.22 Checkpoint questions
- 12.23 Checkpoint questions (2)
- 12.24 Checkpoint questions (3)
- 12.25 Checkpoint questions (4)
- 12.26 Checkpoint questions (5)
- 12.27 Recap
- Glossary
- Back cover
Product information
- Title: A Practical Approach to Cloud IaaS with IBM SoftLayer: Presentations Guide
- Author(s):
- Release date: February 2016
- Publisher(s): IBM Redbooks
- ISBN: 9780738441566
You might also like
book
Securing Cloud Services - A pragmatic approach, second edition
Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains …
book
Practical Microsoft Azure IaaS: Migrating and Building Scalable and Secure Cloud Solutions
Adopt Azure IaaS and migrate your on-premise infrastructure partially or fully to Azure. This book provides …
book
Introduction to AWS IaaS Solutions
Learn how to design and deploy infrastructure-as-a-service (IaaS) solutions in the cloud using Amazon Web Services. …
book
Architecting the Cloud: Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
An expert guide to selecting the right cloud service model for your business Cloud computing is …