Skip to content

Latest commit

 

History

History
138 lines (100 loc) · 11.8 KB

deploy-arch-ibm-pvs-inf-full-stack.md

File metadata and controls

138 lines (100 loc) · 11.8 KB
copyright lastupdated keywords subcollection authors version production deployment-url docs image_source related_links use-case industry compliance content-type
years
2023
2023-04-13
deployable-reference-architectures
name
Arnold Beilmann
v1.0.0
false
title url description
SAP in IBM Cloud documentation
SAP in IBM Cloud documentation.
title url description
Reference architecture for "Secure infrastructure on VPC for regulated industries" as standard variation
Reference architecture for "Secure infrastructure on VPC for regulated industries" as standard variation
ITServiceManagement
Technology
SAPCertified
reference-architecture

{{site.data.keyword.attribute-definition-list}}

Power Virtual Server with VPC landing zone - as new deployment

{: #deploy-arch-ibm-pvs-inf-full-stack} {: toc-content-type="reference-architecture"} {: toc-industry="Technology"} {: toc-use-case="ITServiceManagement"} {: toc-compliance="SAPCertified"} {: toc-version="1.0.0"}

New deployment of the Power Virtual Server with VPC landing zone creates a Power Virtual Server workspace and connects it with VPC services.

A proxy service for public internet access from the PowerVS workspace is configured. You can optionally configure some management components on VPC (such as an NFS server, NTP forwarder, and DNS forwarder).

Architecture diagram

{: #full-architecture-diagram}

Architecture diagram for 'Power Virtual Server with VPC landing zone' - variation 'PowerVS workspace'.{: caption="Figure 1. Single-zone PowerVS workspace accessible over secure landing zone" caption-side="bottom"}{: external download="deploy-arch-ibm-pvs-inf-full-stack.svg"}

Design requirements

{: #full-design-requirements}

Design requirements for 'Power Virtual Server with VPC landing zone' - variation 'PowerVS workspace'.{: caption="Figure 2. Scope of the solution requirements" caption-side="bottom"}

IBM Cloud® Power Virtual Servers (PowerVS) is a public cloud offering that an enterprise can use to establish its own private IBM Power computing environment on shared public cloud infrastructure. PowerVS is logically isolated from all other public cloud tenants and infrastructure components, creating a private, secure place on the public cloud. This deployable architecture provides a framework to build a PowerVS offering according to the best practices and requirements from the IBM Cloud.

Components

{: #full-components}

VPC architecture decisions

{: #full-vpc-components-arch}

Requirement Component Choice Alternative choice
* Ensure public internet connectivity \n * Isolate most virtual instances to not be reachable directly from the public internet Edge VPC service Create a separate VPC service where public internet connectivity is allowed to be configured
* Provide infrastructure administration access \n * Limit the number of infrastructure administration entry points to ensure security audit Management VPC service Create a separate VPC service where SSH connectivity from outside is allowed
* Provide infrastructure for service management components like backup, monitoring, IT service management, shared storage \n * Ensure you can reach all IBM Cloud and on-premises services Workload VPC service Create a separate VPC service as an isolated environment, without direct public internet connectivity and without direct SSH access
* Allow customer to choose operating system from two most widely used commercial Linux operating system offerings \n * Support new OS releases Linux operating system Red Hat Enterprise Linux (RHEL) SUSE Linux Enterprise Server(SLES)
* Create a virtual server instance that can act as an internet proxy server Proxy server VPC instance Create a Linux VPC instance that can act as a proxy server. Preconfigure ACL and security group rules to allow public internet traffic over proxy that uses default proxy ports (3828) Configure application load balancer to act as proxy server manually
* Create a virtual server instance as the only management access point to the landscape Bastion host VPC instance Create a Linux VPC instance that acts as a bastion host. Configure ACL and security group rules to allow SSH connectivity (port 22). Add a public IP address to the VPC instance. Allow connectivity from a restricted and limited number of public IP addresses. Allow connectivity from IP addresses of the Schematics engine nodes
* Create a virtual server instance to host basic management services like DNS, NTP, NFS Management services VPC instance Create a Linux VPC instance that can host management components. Configure ACL and security group rules to allow communication for basic management components. Modify number of virtual server instances and allowed ports in preset or perform the modifications manually
* Ensure financial services compliancy for VPC services \n * Perform network setup of all created services \n * Perform network isolation of all created services \n * Ensure all created services are interconnected Secure landing zone components Create a minimum set of required components for a secure landing zone Create a modified set of required components for a secure landing zone in preset
{: caption="Table 1. VPC architecture decisions" caption-side="bottom"}

PowerVS workspace architecture decisions

{: #full-pvs-components-workspace}

Requirement Component Choice Alternative choice
* Connect PowerVS workspace with VPC services Cloud connections Set up two redundant cloud connections
* Configure the network for management of all instances \n * Throughput and latency are not relevant Management network Configure private network with default configurations and attach it to both cloud connections
* Configure separate network for backup purposes with higher data throughput Backup network Configure separate private network with default configurations and attach it to both cloud connections. Networks characteristics might be adapted by the users manually (for example to improve throughput)
* Preload OS images relevant for customer workload Preloaded OS images Preload Linux OS images for SAP workload. Keep the number of preloaded images at minimum to save costs. Modify the input parameter that specifies the list of preloaded OS images.
* Preload a public SSH key that is injected into every OS deployment Preloaded SSH public key Preload customer specified SSH public key
{: caption="Table 2. PowerVS workspace architecture decisions" caption-side="bottom"}

PowerVS management services architecture decisions

{: #full-pvs-components-mgmt}

Requirement Component Choice Alternative choice
* Ensure public internet connectivity from all the instances to be deployed in PowerVS workspace SQUID proxy Set up SQUID proxy software on Linux virtual server instance that is running in edge VPC
* Provide shared NFS storage that might be directly attached to all the instances to be deployed in PowerVS workspace NFS server Export NFS disk that is attached to Linux virtual server instance that is running in workload VPC. Disk size is specified by the user. Shared NFS storage on VPC is optional.
* Provide time synchronization to all instances to be deployed in PowerVS workspace NTP forwarder Synchronize time by using public NTP servers. Set up time synchronization on Linux virtual server instance that is running in workload VPC. By using time synchronization servers directly reachable from PowerVS workspace, NTP forwarder is not required.
* Provide a DNS forwarder to a DNS server not directly reachable from PowerVS workspace (for example, running on-premises or in other isolated environment) DNS forwarder Configure DNS forwarder on Linux virtual server instance that is running in workload VPC By using default IBM Cloud DNS service, DNS forwarder is not needed. Direct domain name resolution is possible.
{: caption="Table 3. PowerVS management services architecture decisions" caption-side="bottom"}

Network security architecture decisions

{: #full-net-sec}

Requirement Component Choice Alternative choice
* Isolate edge VPC and allow only a limited number of network connections \n * All other connections from or to edge VPC are forbidden ACL and security group rules in edge VPC Open following ports by default: 53 (DNS service), 8443 (OS registration), 443 (HTTPS), 80 (HTTP). \n All ports to PowerVS workspace are open. \n All ports to other VPCs are open. More ports might be opened in preset or added manually after deployment
* Isolate management VPC and allow only a limited number of network connections \n * All other connections from or to management VPC are forbidden ACL and security group rules in management VPC Open following ports by default: 22 (for limited number of IPs). \n All ports to PowerVS workspace are open. \n All ports to other VPCs are open. More ports might be opened in preset or added manually after deployment
* Isolate workload VPC and allow only a limited number of network connections \n * All other connections from or to workload VPC are forbidden ACL and security group rules in workload VPC Open following ports by default: 53 (DNS service). \n All ports to PowerVS workspace are open. \n All ports to other VPCs are open. More ports might be opened in preset or added manually after deployment
* Enable floating IP on bastion host to execute deployment Floating IPs on bastion host in management VPC Use floating IP on bastion host from IBM Schematics to complete deployment
* Preload VPN configuration to simplify VPN setup VPNs VPN configuration is the responsibility of the customer
{: caption="Table 4. Network security architecture decisions" caption-side="bottom"}

Key and password management architecture decisions

{: #full-key-pw}

Requirement Component Choice Alternative choice
* Use public/private SSH key to access virtual server instances by using SSH \n * Use SSH proxy to log in to all virtual server instances by using the bastion host \n * Do not store private ssh key on any virtual instances, also not on the bastion host \n * Do not allow any other SSH login methods except the one with specified private/public SSH key pair Public SSH key - provided by customer. Private SSH key - provided by customer. Ask customer to specify the keys. Accept the input as secure parameter or as reference to the key stored in IBM Cloud Secure Storage Manager. Do not print SSH keys in any log files. Do not persist private SSH key.
{: caption="Table 5. Key and passwords management architecture decisions" caption-side="bottom"}

Compliance

{: #full-compliance}

This reference architecture is certified for SAP deployments.

Next steps

{: #full-next-steps}

Install the SAP on Power deployable architecture on this infrastructure.