IBM Power Virtual Server Guide For IBM AIX and Linux
IBM Power Virtual Server Guide For IBM AIX and Linux
Redbooks
IBM Redbooks
February 2025
SG24-8512-01
Note: Before using this information and the product it supports, read the information in “Notices” on
page xv.
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Chapter 5. Managing Workloads on IBM Power Virtual Server for IBM AIX and Linux
deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
5.1 IBM Power Virtual Server compatibility with IBM AIX and Linux . . . . . . . . . . . . . . . . . 148
5.1.1 Benefits of managing AIX and Linux workloads on Power Virtual Server. . . . . . 148
5.2 Hints and tips for IBM AIX and Linux workloads on Power Virtual Server . . . . . . . . . 150
5.2.1 Tips for efficient allocation of CPU, memory, and storage . . . . . . . . . . . . . . . . . 150
5.2.2 Recommendations for managing high-performance or resource-intensive workloads
151
Appendix A. Global Replication Services solution using Power Virtual Server . . . . 169
A.1 Solution overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
A.2 Setup for Global Replication Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
A.2.1 DR location sites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
A.2.2 Disaster recovery workflow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
A.2.3 Creating and enabling volume replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
A.2.4 Creating and updating the volume group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
A.3 Failover and failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
A.3.1 Steps to take after a primary site failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
A.4 Disabling the replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
A.4.1 Removing the volumes from the volume group on the primary site . . . . . . . . . . 185
A.4.2 Disabling the replication of a volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
A.5 Billing and charging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
A.6 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
A.6.1 Starting a volume group in any site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
A.6.2 Volume group replication status is not in sync across two sites . . . . . . . . . . . . . 187
A.6.3 Determining whether an update on the volume group fails . . . . . . . . . . . . . . . . 187
A.6.4 The update on a volume group is not working as its status is in error state . . . . 187
A.6.5 Determining which volume is defined as primary for a volume group . . . . . . . . 188
A.6.6 Onboarding new or existing volumes in a volume group . . . . . . . . . . . . . . . . . . 188
A.6.7 Adding more volumes to a volume group after the onboarding operation . . . . . 188
A.6.8 Deleting a volume from one site but not from the other site . . . . . . . . . . . . . . . . 188
A.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Contents ix
x Power Virtual Server for AIX and Linux
Preface
Authors
This book was produced by a team of specialists from around the world working at IBM
Redbooks, Remote Center.
Tim Simon is a Redbooks Project Leader in Tulsa, Oklahoma, USA. He has over 40 years of
experience with IBM primarily in a technical sales role working with customers to help them
create IBM solutions to solve their business problems. He holds a BS degree in Math from
Towson University in Maryland. He has worked with many IBM products and has extensive
experience creating customer solutions using IBM Power, IBM Storage, and IBM System z®
throughout his career.
Andrey Klyachkin is a solution architect at eNFence, an IBM Business Partner who is based
in Germany. He has more than 25 years experience in UNIX systems, designing and
supporting IBM AIX® and Linux systems for different customers worldwide. He is a co-author
of many IBM AIX and IBM Power certification courses, and is an IBM Champion and IBM AIX
Community Advocate. He is also a Red Hat Certified Engineer and Red Hat Certified
Instructor.
Jean-Manuel Lenez Pre-sales engineer since 1999 at IBM Switzerland, Jean-Manuel Lenez
specializes in UNIX Power/ AIX/ IBM i server technologies and related products such as
PowerVM, IBM PowerHA®, PowerSC, Linux On Power, IBM Cloud®. Strongly involved in his
pre-sales mission, he leads projects at major clients around various topics: artificial
intelligence, deep learning, SAP HANA, server consolidation, high availability HA/DR.. Driven
and passionate about technology, he is always ready to follow companies in new market
challenges and to invest in the latest technological developments: Hybrid-Cloud, Openshift,
Dev-Ops,
Lokesh Bhatt is a seasoned technology leader with over 20 years of experience in IBM
systems and cloud solutions. He holds a masters degree in Computer Science and
Engineering. In his current role as the Technical Sales Leader for IBM Cloud across India and
South Asia, he has been instrumental in driving cloud adoption and architecting robust
IBM-based solutions for a wide range of clients. Lokesh has served in key roles, including as
a Systems Lab Services Consultant, where he contributed to major global initiatives like
PowerCare across India, the Philippines, and Australia. His technical expertise spans IBM
Power Systems, AIX environments, virtualization, and hybrid cloud integration, making him a
trusted advisor within the IBM ecosystem. Lokesh is also a recognized thought leader,
regularly engaging in technical presentations, client workshops, and industry forums to share
best practices and cutting-edge innovations.
Youssef Largou is the founding director of PowerM, a platinum IBM Business Partner in
Morocco. He has 22 years of experience in systems, HPC, middleware, and hybrid cloud,
including IBM Power, IBM Storage, IBM Spectrum®, IBM WebSphere®, IBM Db2®, IBM
Cognos®, IBM WebSphere Portal, IBM MQ, ESB, IBM Cloud Pak®, SAP HANA and Red Hat
OpenShift. He has worked within numerous industries with many technologies. Youssef is an
IBM Champion 2020, 2021,2022, 2023 and 2024, an IBM Redbooks Platinum Author and has
designed many reference architectures. His company has been recognized as an IBM
Beacon Award Finalist in Storage, Software-Defined Storage, and LinuxONE five times. He is
a regular speaker at IBM Think®, IBM TechXchange and Common Europe Congress. He
holds an engineer degree in Computer Science from the Ecole Nationale Supérieure des
Mines de Rabat and Executive MBA from EMLyon.
Prerna Upmanyu is a Software Performance Expert in the Power Servers performance team
based out in India. She holds an M.Tech degree in Software Systems from BITS Pilani.
Prerna has over 15 years of experience working with customers designing and deploying
solutions on IBM Power server. She focuses on areas such as AIX Performance , Automation
and Data Lakes-based design and deployments. Prerna’s areas of expertise include system
performance, availability, and automation.
Henry Vo IBM Redbooks Project Lead. He joined IBM right after graduate from University of
Texas at Dallas 2012 with MIS (Management Information System) major. Henry shared his
Maria Ward
PowerVS Product Manager, Austin, US
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our books to be as helpful as possible. Send us your comments about this book or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Preface xiii
https://www.redbooks.ibm.com/rss.html
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM FlashSystem® PowerHA®
Aspera® IBM Services® PowerVM®
Db2® IBM Spectrum® Redbooks®
FlashCopy® IBM Z® Redbooks (logo) ®
IBM® POWER® Satellite™
IBM Cloud® Power8® Storwize®
IBM Consulting™ Power9® SystemMirror®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Ansible, OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in
the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in
the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
This section describes the technical changes made in this edition of the book and in previous
editions. This edition might also include major corrections for chapter organization and
consistency.
New information
Provide information on networking options in Power Virtual Server.
Added additional information about migrating workloads to Power Virtual Server.
Added hints and tips for managing workloads on Power Virtual Server.
Provided additional information about backup options in Power Virtual Server.
Changed information
Updated support to show Power10 support with Power Virtual Server.
Updated screenshots to reflect the newest Power Virtual Server on IBM® Cloud version.
Until now, moving your Power server workloads to the cloud was an impractical, ideal
solution. The chance to have your IBM i, AIX, or Linux on Power on a public or hybrid Cloud
might have seemed difficult and costly. However, these challenges can now be addressed
with the Power Virtual Server offering.
This chapter introduces and presents the conceptual foundations of the Power Virtual Server
service:
“IBM Cloud and the IBM Power Virtual Server offering”
“IBM Power Virtual Server”.
“Key concepts and features for Power Virtual Server”.
“Storage”
“Snapshots, cloning, and restoring”
Figure 1-1 IBM Cloud's full stack of offerings enables hybrid cloud and AI
IBM Cloud offers the most open and secure public cloud for business with a next-generation
hybrid cloud platform, advanced data and AI capabilities, and deep enterprise expertise
across 20 industries. Some of the key reasons why clients prefer IBM cloud are:
Open Innovation
Cloud services are delivered with native open application programming interface, major
contribution to cloud-native open-source work (Istio, Knative, Razee and more).
Security leadership
IBM Cloud provides the highest level of compliance for data encryption (FIPS 140-2
Level4) and is configurable so that even IBM cannot see the data. IBM Cloud provides
edge-to-cloud threat management with security integration from IBM.
Enterprise grade
Cloud support for IBM Power, (AIX, IBM i and Linux), IBM Z®, SAP and other mission
critical applications. Broadest portfolio of compute instances (including IBM POWER® and
x86), VMware Cloud Service Provider (VCSP) pinnacle partner.
Power Virtual Server delivers flexible compute capacity for IBM Power workloads. Integrated
with the IBM Cloud platform for on-demand provisioning, this offering provides a secure and
scalable server virtualization environment that is built upon the advanced Reliability,
Availability, and Scalability (RAS) features and leading performance of the Power platform
and can be deployed either off-premises in IBM Cloud datacenters or on-premises in your
data center or in another data center of your choice.
Figure 1-2 Synergy of IBM POWER Server and IBM Cloud in IBM Power Virtual Server
IBM Power Virtual Server Private Cloud extends this offering, providing enterprises with
secure, integrated data center services at their chosen location, also on a pay-as-you-go
basis. Leveraging the data center expertise gained through IBM Power Virtual Server, the
IBM Power Virtual Server Private Cloud solution delivers performance, scalability, flexibility,
security, and industry-leading reliability. It integrates servers, storage, network, security, and
solution patterns to enable self-service capabilities in the client's data center.
Replicating these cloud capabilities and maintaining this integrated solution would require an
enterprise to invest millions of dollars and months or years of development time.
IBM Power Virtual Server Private Cloud offers the best TCO value for customers wishing to
move to on-premises cloud solutions compared to our competitors as shown in Table 1-1.
IBM offers Power Virtual Server Private Cloud with no upfront capital on a pay-as-you-go
consumption model with a monthly minimum fee for a 3-year or 5-year term. The
configuration can be designed as a small or medium Pod depending on the client workloads.
If you are choosing whether to use Power Virtual Server versus choosing to build your own
infrastructure, consider the points illustrated in Figure 1-3 on page 5. Beyond just the up-front
capital expense for the equipment, you need to consider the costs of creating the support
structure for all of the other components involved in the solution, for example storage,
networking, security and monitoring.
Choosing IBM Power Virtual Server – either in IBM data centers or client locations – provides
an excellent option to implement a Power based infrastructure with no up-front investment
and with usage-based costs.
Power customers who are interested in modernization can benefit from deploying the
workloads to Power Virtual Server instead of moving their applications to a new platform that
can be expensive and high risk. You can access many enterprise services from IBM with
pay-as-you-use billing with which you can quickly scale up and out. IBM Power Virtual Server
enables clients to take full advantage of this trend with the ability to provision AIX®, IBM i, or
Linux instances connected to the cloud.
Power Virtual Servers are collocated with IBM Cloud. Power Virtual Servers have separate
networking hardware and direct-attached storage systems but come with connectivity options
to allow Power Virtual Server instances to integrate with IBM Cloud services. This enables
Power Virtual Server instances to maintain key enterprise software certification and support
as the Power Virtual Server architecture is identical to certified on-premises infrastructure.
The virtual servers, also known as logical partitions (LPAR), run on Power hardware with the
IBM PowerVM® hypervisor.
With the Power Virtual Server, you can quickly create and deploy one or more virtual servers
that are running either IBM AIX, IBM i, or Linux operating systems. After you provision the
Power Virtual Server, you can access infrastructure and physical computing resources
without the need to manage or operate them. However, you must manage the operating
system and the software applications and data. Figure 1-4 represents a responsibility
assignment (RACI) matrix for Power Virtual Server.
IT administrators
IT administrators manage infrastructure technology and are interested in migrating to the
cloud to increase the time-for-value of their Power workloads, shift capital expense to
operating expense, and improve business resilience and scalability. When clients move to a
hybrid cloud model, they can manage a truly hybrid environment with flexible burst
environments for spikes in usage, development and test environments, and production
workloads.
Application developers
Companies with Power servers have subject matter experts in AIX, IBM i, and Linux
development. They want to continue developing mission-critical applications and then deploy
on-premises.
Power Virtual Server stands at the intersection of performance, reliability, and flexibility,
empowering organizations to adopt hybrid cloud strategies, modernize applications, and
optimize operations with confidence.
No single solution exists for all organizations that plan to use the cloud. All solutions have cost
and benefits to consider.
In this section, we present some of the key concepts for the Power Virtual Server:
You cannot create a workspace across multiple geographic regions. If you need instances in
two different geographic regions, then create two workspaces. You can have multiple
workspaces in the same geographic region. For example, you can have a workspace for
development and test environments and a workspace for the production environment.
Note: For a complete list of supported data centers, see Creating a Power Systems Virtual
Server workspace.
1.3.2 Compute
The following IBM Power servers can host Power Virtual Server instances:
Power9 based
IBM Power System S922 (9009-22A)
IBM Power System E980 (9080-M9S)
Processors can be defined as dedicated, shared uncapped, or shared capped. For more
information about processor types, see What's the difference between capped and uncapped
shared processor performance? How do they compare to dedicated processor performance?
If the machine type is S922 or S1022 and the operating system is IBM i, IBM i supports a
maximum of 4 cores per VM.
You can apply an affinity or anti-affinity policy to each VM instance within a server
placement group:
affinity policy All VMs in that placement group are started on the same server.
anti-affinity policy All VMs in that placement group are started on different servers.
Note: You can add or remove VMs within the placement group. But cannot change the
policy or name of a placement group after it is created.
Server placement group can use the following APIs for managing server placement groups:
Get all server placement groups: Displays all existing server placement groups.
Get server placement group details: Displays details about a specific server placement
group.
Delete server placement group: Deletes server placement groups even if they contain
member instances.
Remove server from placement group: Removes a virtual server instance from a server
placement group.
1.3.4 VM pinning
The options to pin a VM to the host where it is running are none (default), soft or hard:
If the pin is not set or set to none, then the VM is automatically migrated or remote
restarted during maintenance windows or a host failure.
When you soft pin a VM, Power Virtual Server automatically migrates the VM back to the
original host after the host is back to its operating state.
If the VM has a licensing restriction for the host, then the hard pin option restricts any VM
movement during maintenance windows or a host failure. Hard pin VMs are stopped if the
frame is down.
Note: If the pool has the required affinity relation with other pools, the best practice is to
deploy the pool directly into the placement group. You must create the pool placement
group first. It prevents the pool from being deployed on a host that does not satisfy the
affinity requirements and having to move it later.
You can specify the host affinity and anti-affinity between two or more SPPs with shared
processor pool placement groups. For more information, see Configuring shared processor
pool placement group.
1.3.6 Storage
IBM Power Virtual Servers use Storage Area Network (SAN) attached NVMe-based flash
systems. The storage systems are IBM Storage FlashSystem controller using IBM flash
technology. and are attached via 16 Gb or 32 Gb SAN infrastructure. The storage
configuration is designed on the best practices for highly available storage.
Availability configuration
To provide the highest level of availability, each Power Virtual Server instance is configured
with four Virtual Fibre Channel adapters: two are mapped to Virtual Fibre Channel adapters
on one VIOS, and the other two are mapped to Virtual Fibre Channel on the other VIOS.
Storage Tiers
IBM Power Virtual Server offers you the option to select an I/O operation per second (IOPS)
based storage based on your requirement. Flexible IOPS is a tier-less storage offering that
removes the notion of disk type and replace it with a storage pool. Each of the storage pools
supports multiple storage tiers. The storage tiers are based on different IOPS levels.
Storage tiers are designed to provide distinct levels of storage pricing. The client is charged
more for higher performance and less for lower performance or inactive data. Storage tier
pricing is based on I/O operations per second (IOPS).
Tier0, Tier1, and Tier3 performance is based on IOPS per GB, meaning that the performance
of your storage volumes is connected to the size of the volume. This works well for many
workloads, but there are some workloads that have a smaller amount of data and are
hampered by the IOPS/GB calculation. For these workloads, PowerVS provides the Fixed
IOPS tier which provides 5000 IOPS per data volume, regardless of the size.
Note: The Fixed IOPS tier is only available for volumes with a size of 200 GB or less.
Above 200 GB using Tier0 provides higher performance (200 GB @ 25 IOPS/GB = 5000
IOPS).
For each Power Virtual Server Instance, you must select a storage tier for the boot volume.
The performance of a storage volume is limited to the maximum number of IOPS based on
volume size and storage tier as shown in Table 1-2. For example, a 100 GB Tier 3 volume can
process up to 300 IOPs, and a 100 GB Tier 1 volume can process up to 1000 IOPS. After the
IOPS limit is reached for the storage volume, the I/O latency increases.
Flexible IOPs offers you multiple tiers of storage to choose from, each with its own pricing,
performance, and capabilities. With flexible IOPs, you can:
Create a volume (or multiple volumes) and specify the desired IOPS level.
Change the IOPS level of existing volumes within the same storage pool.
Clone one or more volumes to your preferred IOPs level. Note that if any of the volumes is
greater than 200GB, the target tier cannot be Fixed IOPs.
Deploy the boot volume of a virtual server instance in any of the supported IOPs levels.
Additional data volumes attached to the new virtual server instance can have different
IOPS levels from that of the boot volume.
Import an image from IBM Cloud Object Storage to any supported IOPs level.
Storage pools
Note: Tier 3 storage tier is not suitable for production workloads. When you are choosing a
storage tier, ensure that you consider not just the average I/O load, but, more importantly,
the peak IOPS of your storage workload.
You can now attach storage volumes to a VM instance from storage tiers and pools that are
different than the storage pool used by the VM instance's boot volume. To do this, you must
modify the VM instance and set the storagePoolAffinity property to false. The VM instance
storagePoolAffinity property is set to true by default.
Note: For Snapshots, cloning and restoring all volumes must be from the same storage
pool. If anti-affinity is enabled, the cloning and restoring will not work.
The use of volume affinity policy (affinity or anti-affinity) requires the availability of multiple storage
pools. You might experience the following errors when you use a volume affinity policy:
If an additional storage provider is not available to fulfill the requested policy, you might receive
an error that indicates the inability to locate a storage provider to create a volume by using the
requested volume affinity policy.
If additional storage providers exist but the storage providers do not have sufficient space to
fulfill the requested policy, you might receive an error that indicates the inability to locate a
storage provider with enough available capacity to satisfy the requested volume size.
Taking a snapshot
By using the snapshot interface, you can create a relationship between your source disks and
target disks at time T1. Target disks are created as part of the snapshot API. The snapshot API
tracks the delta changes done to the source disk beyond time T1. This enables the user to restore
the source disks to their T1 state at a later point in time.
Several use cases exist for the snapshot feature. For example, an administrator plans to upgrade
the middleware on their system but wants to be able to revert to its original state before they
proceed with an upgrade. If the middleware fails, the administrator can restore the source disk to
its earlier state.
When you take a snapshot, consider the following restrictions and considerations:
Parallel VM snapshot operations from different VM nodes for the same shared volume are
not allowed.
You cannot restore a VM if you are taking a snapshot while clone (full-copy) FlashCopy
operations are running in the background. The FlashCopy operations must first complete.
Some of the attributes of source disks cannot be changed while the disks are in a
snapshot relationship. For example, you cannot resize the source disks when snapshot
relationships are defined for those disks.
Volumes that are in a snapshot relationship cannot be detached from the VM.
The clone operation continues to copy data from the source disks to target disks in the
background. The amount of time to complete the clone operation depends on the size of the
source disks and the amount of data to be copied.
When the clone operation is performed on a volume that is in use, the Power Virtual Server
creates a consistent group snapshot and re-creates the copy of the cloned volume by using
the group snapshot.
It is a best practice to quiesce all the applications on the volume that you want to clone.
Note: You cannot modify the source or target disk attributes, such as disk size, while the
clone operation is in progress.
Restoring a snapshot
The restore operation restores all of the volumes that are part of a VM snapshot back to the
source disks. While it restores the VM, the Power Virtual Server creates a backup snapshot,
which can be used if the restore operation fails. If the restore operation succeeds, the backup
snapshots are deleted. If the restore operation fails, you can use the restore_fail_action
query parameter with a value of retry to retry the restore operation. To roll back a previous
disk state, you can pass in the restore_fail_action query parameter with a value of
rollback. When the restore operation fails, the VM enters an error state.
If you plan to restore the boot disks, your VM must be shut down. If the VM has volumes that
are hosting external database applications, quiesce all of your applications and ensure that
there are no active I/O transactions on the disk. Failure to do so can lead to data corruption
and put the VM in maintenance mode.
If you choose to restore a shared volume on one VM, you cannot perform the snapshot,
restore, clone, or capture operations on the other VMs that are using the shared volume while
the restore operation is running.
For more detail on types of networks please check out Chapter 3, “IBM Power Virtual Server
in the IBM Cloud network” on page 71.
The versions of AIX, IBM i, and Linux operating systems that are supported by Power Virtual
Server are described in the following list:
AIX 7.1, or later.
IBM i 7.1, or later. Clients running IBM i 6.1 must first upgrade the OS to a supported level
before migrating to the Power Virtual Server.
Power Virtual Server supports the following ppc64le Linux distributions:
– SUSE Linux Enterprise 12 and 15
– Red Hat Enterprise Linux 8.1, 8.2, 8.3, 8.4, and 8.6
Note: If you use an unsupported version, you might experience outages during planned
maintenance windows with no advanced notification given.
A full Linux subscription provides Red Hat Enterprise Linux and SUSE Linux Enterprise
Server image files that can be used for SAP and non-SAP applications. Power Virtual Server
instances do not have direct access to the IBM Cloud® Satellite™ server and require a proxy
server. See Full Linux subscription for Power Systems Virtual Servers for more details.
Before you use a custom image as the boot volume, review the following information:
Understand the basic concepts of IBM Cloud Object Storage. For more information, see
Getting started with IBM Cloud Object Storage.
If you do not have an existing image, you can use IBM Power Virtualization Center
(PowerVC) to capture and export an image for use with a Power Virtual Server. For more
information, see Capturing a virtual machine and Exporting images.
To capture and export an image by using PowerVC, the PowerVC private environment
must contain N_Port ID Virtualization (NPIV) data volumes. Power Virtual Server does not
support captured images from environment with shared storage pools vSCSI data
volumes.
Alternatively, if you already deployed a virtual server instance, you can capture it and
redeploy a new virtual server instance.
For more information about migrating your workloads to Power Virtual Server, see Importing
images and Deploying a custom image within a Power Systems Virtual Server.
RPO is the specified amount of time allowed since the last save of the data before a failure
occurs.
Both high availability (HA) and disaster recovery (DR) are essential for business continuity.
HA addresses local (single cloud region) outages that are planned and unplanned that have
the following characteristics:
Planned outage management, software, and hardware.
Unplanned outage management, hardware failure for example.
Can provide an RPO of zero.
When you design architecture for a cloud service, consider your availability requirements and
how to respond to potential interruptions in the service. To be successful, you cannot assume
that the Power Virtual Server instance is always there or is always working the way that you
expect.
The Power Virtual Server provides multiple solutions to support business continuity plans as
shown in Figure 1-7.
HA clusters
HA clusters are groups of two or more computers and resources, such as disks and networks
that are connected and configured, so if one fails, an HA manager, such as IBM PowerHA® or
Pacemaker, performs a failover. The failover transfers the state data of applications from the
failing computer to another computer in the cluster and restarts the applications there. This
process provides high availability of services running within the HA cluster.
The IBM Power Virtual Server provides a set of APIs that can enable a disaster recovery (DR)
solution for your virtual server instances. IBM Cloud infrastructure internally uses Global
Mirror Change Volume (GMCV) as storage technology that provides asynchronous replication
and advance network configuration for fast data transfer.
Global Replication Service (GRS) service is used to create and manage replicated resources
that include the following items:
Volume lifecycle operations support on replicated volumes.
APIs to manage volume groups through create, update, delete, start, and stop operations.
Virtual server instance lifecycle operations by using replicated volumes.
Onboard auxiliary volume on secondary site for volume recovery.
Note: You can use the GRS location APIs to determine the locations that support storage
replication and their mapped location. For more information, see Region and data center
locations for resource deployment.
Backup strategies for Power Virtual Server that might apply to your configuration:
Image capture produces a storage IBM FlashCopy of the VM and works for any Operating
System (OS). You can use image capture to store VM images within your account (locally)
as a part of your image catalog, or directly to IBM Cloud Object Storage, or both.
IBM Spectrum® Protect provides scalable data protection for physical file servers,
applications, and virtual environments.
A common IBM i backup strategy is to use IBM Backup, Recovery, and Media Services
(BRMS) with Cloud Storage Solutions for i. Together, these products automatically back up
your LPARs to IBM Cloud Object Storage.
FalconStor Virtual Tape Library (VTL) is an optimized backup and deduplication solution. It
provides tape library emulation, high-speed backup or restore, data archival to supported
S3 clouds for long-term storage, global data deduplication, enterprise-wide replication,
and long-term cloud-based container archive, without requiring changes to the existing
environment.
Power Virtual Server provides the capability to capture full, point-in-time snapshots of
entire logical volumes or data sets.
For more information about creating and configuring a Power Virtual Server running the
FalconStor VTL software in the IBM Cloud, see FalconStor StorSafe VTL for IBM Deployment
Guide.
For best practices and guidelines on AIX backup performance on IBM Power Virtual Server,
see AIX Backup Performance Best Practices and Guidelines on IBM Power Systems Virtual
Server.
For a complete tutorial on backing up and restoring IBM i VM data, see IBM i Backups with
IBM Power Virtual Server.
A Power Virtual Server workspace is a container for all Power Virtual Server instances within
a specific geographic region. Accessible from the Resource list in the Power Virtual Server
interface, a workspace can host multiple instances. For example, you might have separate
workspaces in Dallas, Texas, and Washington, D.C., each capable of containing multiple
Power Virtual Server instances.
Note: In the context of this document, a co-location facility or service, often referred to as a
COLO, is an off-premises data center that provides computing services, such as Power
Virtual Servers.
If you already have an account, you can access that account at https://cloud.ibm.com/login.
Dashboards are customizable. You can create a dashboard that displays information that is
relevant to you. For example, the dashboards you create can be scoped to specific resources.
Also, you can share the dashboards with users in your account, so you can group resources
for projects or teams.
You can securely authenticate users, control access to Power Virtual Server resources with
resource groups and use access groups to allow access to specific resources for a set of
users. This service is based on an Identity and Access Management (IAM) mechanism, which
provides all user and resource management in the IBM Cloud. You can assign IAM
authorizations based on the following criteria:
Individual users
Access groups
Specific types of resources
Resource groups
The catalog is a list of various products, including computing, storage, networking, solutions
for application development, testing and deployment, security management services,
traditional and open-source databases, and cloud-native services. The offerings are a mix of
services, software, and consulting offerings:
Services A portfolio of managed services for infrastructure, developer tools, and
more to build your applications on the public cloud.
Software List of software solutions that take advantage of a simplified
installation process.
Consulting Consulting offering are provided to assist you with implementing IBM
Cloud services – including technical services, strategic planning, and
more – from IBM and a network of strategic IBM partners.
A workspace holds one or more Power Virtual Server instances which are all located in a
single Power Virtual Server location. As all resources in a workspace are from a single
location, you will need a workspace defined in every location where you have a Power Virtual
Server instance.
You can have more than one workspace in a single location. This allows you to group your
resources in that location. For example, you can create a workspace for different departments
You should deploy your workloads to the location that is nearest to your customers to achieve
low latency connectivity. IBM Cloud provides multi-zone regions (MZR), single-campus
multi-zone regions (SC-MZR), and classic data centers for classic infrastructure resources.
IBM Power Virtual Server boasts a significant global presence, operating in 21 data centers
worldwide as of the writing of this book. This is shown in Figure 2-4. With over 650 clients
already utilizing the service, IBM solidifies its position as the leading provider of IBM Power
infrastructure in the cloud, surpassing other vendors in both the number and geographic
reach of its cloud locations.
Select Create a workspace, where you can specify a name for your service and choose the
location where you want to deploy your Power Virtual Server instances.
Figure 2-7 shows the next screen where you set the location for this workspace.
Clicking continue allows you to fill in more details about your workspace such as the
workspace name and any resource groups associated with the workspace. Clicking Continue
on that panel allows you to define any integrations such as monitoring for your workspace.
The next step is to agree to the terms and conditions shown on the right panel and then click
Create. After you click Create, the Resource List page is displayed, which contains a list of
your account resources. Use this page to view and manage your platform and infrastructure
resources in your IBM Cloud.
Another way to access the Resource List page is to click the Navigation menu in the
upper-left, and then click Resource List in the Dashboard menu. You can search for
resources from anywhere in the IBM Cloud by entering the resource or tag in the search field
from the menu bar.
Figure 2-8 shows the result of a Power Virtual Server that was created. All Power Virtual
Servers are under Services and software resources. Each resource is displayed in its row,
and an Actions icon is included at the end of the row. Click the Actions icon to start, stop,
rename, or delete a resource.
Click the Create instance button to create a Power Virtual Server instance (VSI), for example
an LPAR or VM, then complete the required fields under the Virtual servers instances section
as shown in Figure 2-10.
The total due per month is dynamically updated in the Summary panel based on your
selections. This assists you in creating a cost-effective Power Virtual Server instance that
satisfies your business needs.
Number of instances
Specify the number of instances that you want to create for the Power Virtual Server. If you
specify more than one instance, more options are available, such as hosting all instances on
the same server or not and VM pinning. You can choose to soft pin or hard pin a VM to the
host where it is running. When you soft pin a VM for high availability, Power Virtual Server
automatically migrates the VM back to the original host after the returns to its operating state.
The hard pin option restricts the movement of the VM during remote restart, automated
remote restart, Dynamic Resource Optimizer, and live partition migration.
SSH key
Choose an existing SSH key or create one to connect to your Power Virtual Server securely.
Machine type
Specify the machine type. The machine type that you select determines the number of
maximum cores and maximum memory that is available.
Cores
There is a core-to-vCPU ratio of 1:1. For shared processors, fractions of cores round up to the
nearest whole number. For example, 1.25 cores equal 2 vCPUs.
Memory
Select the amount of memory for the Power Virtual Server.
Boot image
When you click Boot image, you select boot images from a group of stock images or the list
of images in your catalog.
Attached volumes
You can either create a new data volume or attach an existing one that you defined in your
account.
Network interfaces
At least one private or public network is required. Network interfaces are created by adding a
public network, private network, or both. When you add an existing private network, you can
choose a specific IP address or have one automatically assigned.
The following chapters in this publication expand and show more details about managing the
Virtual Server instances and the associated resources.
Workload Assessment
The following should be considered in your workload assessment:
Performance Requirements
Analyze the CPU, memory, and storage demands of the applications that will run on AIX or
Linux. Identify any workloads that are compute-intensive, memory-bound, or I/O-heavy to
allocate resources accordingly.
2.2.2 Overview of Supported Configurations and Versions for AIX and Linux
Organizations can choose long term support (LTS) versions of AIX, such as AIX 7.2, which
offer extended support cycles, stability, and regular security patches. This is ideal for
enterprise environments that prioritize stability.
Ensure that the kernel and patch levels align with application requirements, as certain
patches or specific kernel configurations may be needed for compatibility with enterprise
software.
Power Virtual Server uses IBM's Power hardware, ensuring that AIX is optimized for this
architecture. PowerVM is used as the hypervisor, providing advanced features like dynamic
resource allocation, shared processor pools, and partition mobility.
SUSE Linux Enterprise Server (SLES) is another commonly supported distribution, known for
its robustness in enterprise environments. It offers tools for managing workloads, security
features, and high availability.
Ubuntu, particularly LTS versions, is also supported on IBM Power Virtual Server. It is often
chosen for its flexibility and ease of use, especially in DevOps and modern application
environments.
For Linux deployments, ensure the selected distribution has compatible kernel versions and
drivers for IBM Power architecture. Distributions optimized for POWER architecture take full
advantage of hardware capabilities, which improves performance for data-intensive
applications.
Storage Configurations
Power Virtual Server utilizes high performance SAN-attached storage using IBM
FlashSystem® storage controllers. The storage offering allows you to choose the right
performance tier for each volume that is attached. The storage tiers are based on the number
of input/output operations per second (IOPs). See “Storage Tiers” on page 10 for details on the
storage tiers offered.
For database access, choose a storage tier that has a higher IOPS rating such as Tier0 or
Tier1. For system files, Tier3 storage might be a good option. For smaller volumes with high
activity, Power Virtual Server offers the Fixed IOPs tier which provides 5000 IOPS no matter
the size of the volume.
Network Configurations
IBM Power Virtual Server allows for private IP addresses for internal communication and
public IP addresses for Internet-facing applications. Private connectivity can be secured with
Direct Link or VPN, depending on business needs.
Summary
Preparing for AIX and Linux deployments on IBM Power Virtual Server involves assessing
workload requirements, choosing compatible OS versions, and configuring the environment
to meet performance, security, and compliance needs. Organizations can maximize the
benefits of IBM Power Virtual Server's scalable and high-performance infrastructure by
selecting supported versions of AIX and Linux and aligning deployment choices with business
goals. Proper planning and configuration provide a solid foundation for successfully managing
enterprise workloads in the cloud.
This section provides an overview of the various methods available for deploying AIX and
Linux operating systems to IBM Power Virtual Server. IBM Power Virtual Server offers a
IBM Cloud Power Virtual Server provides rich set of REST APIs which you can use together
with almost every possible tool. Options tailored to meet various user/customer needs,
ranging from manual deployments to fully automated solutions, ensuring flexibility and
adaptability for diverse environments.
2. From this screen you can create a new workspace by clicking the button “Create a new
workspace” or select a workspace from the list on the left. The whole work with Power
Virtual Server is done inside of workspaces. Each workspace is created in some Power
Virtual Server datacenter.
The last step to do is to check “I agree to the Terms and conditions” and click “Create”
button on the right side. After you clicked “Create” it takes some seconds to provision your
new workspace. You will be presented with a list of your workspaces and their status.
3. When your new created workspace changes its status to “Active”, you can select it in the
left menu and start working with it.
Let’s take some time to learn all menu options you have when you work with a workspace.
There are 5 big areas:
– Compute
– Networking
– Storage Volumes
– Event Logs
– Additional products and services
• In the last menu “Additional products and services” you can learn which added
services you can deploy on IBM Power Virtual Server, like OpenShift, PowerHA,
PowerSC and others.
• In the “Event Logs” section you can find latest log entries. In a fresh created
workspace there should be no logs. But later when you create different objects like
volumes, networks and virtual servers, you will find here more and more logs. Only
latest 400 log entries are shown in the window. You can filter them by using filter
icon right on the table’s top by resource types, actions and severity.
The other three menu entries - Compute, Network, and Storage Volumes - are where you
spend most of your time working with Power Virtual Server.
• In “Storage Volumes” you can create data volumes for your future virtual servers, or
you can change them to be boot able or shareable between different virtual servers.
You can also configure Global Replication Services between datacenter to enable
disaster recovery for your virtual servers.
• In “Network” you create subnets where your virtual servers will be located. You
need the subnets not only for creating your virtual servers, but also to connect your
IBM Power Virtual Servers workspace to your on-premises datacenter using Transit
Gateway or other ways.
• In “Compute” you manage your virtual servers, SSH keys, you use to access the
virtual servers, and boot images.
No server can be deployed without a boot image. We show using standard images from
the IBM Power Virtual Server catalog. We don’t need to import them, it will happen
automatically. If you have any prepared boot images, you can import them using “Boot
images” menu in “Compute” section.
Attention: Depending on which operating system you will deploy and the SSH software
installed on it, you may need different SSH keys of different types. Not every SSH service
understands “-sk” types for security keys. Older SSH services may only understand
ssh-rsa and ssh-dsa types of SSH keys.
After you created SSH key and have its public key, switch to Compute > SSH keys and
click the blue button “Create SSH key”. Paste your public key into “Public key” field and
enter some name into the field “Key name”. After you finished, click “Add SSH key” as
shown in Figure 2-16.
5. The next step on the way to our first virtual server is to create a subnet. Switch to
“Networking” > “Subnets” and click the button “Create subnet”. Enter name for your future
network into the “Name” field and a network IP address (or CIDR) into the “CIDR” field.
The values you enter here you usually should discuss with your network administration
team. But if you create a server for the first time and only for testing, you can enter here
everything you want. Important is that it is a valid network address in CIDR (or bit)
notation.
Important: Attention: IBM Power Virtual Server automatically sets DNS server address to
127.0.0.1. In normal circumstances you don’t have a DNS server on each of your virtual
servers. If your workspace connected to your on-premises environment or if you already
deployed a DNS server in your cloud environment, you can set your existing DNS server
address here. If you don’t have it, we urge you to deploy at least one DNS server or service
as the first task in the cloud. If you don’t want to do it and just testing, you can use some
open DNS servers like Google DNS 8.8.8.8 and 8.8.4.4.
You can specify multiple DNS servers by separating them with “,” commas.
6. We added our SSH key into Power Virtual Server subnet and created a new subnet. Now
we can deploy the first virtual server. Switch to "Compute" → "Virtual server instances"
and click the button “Create instance”.
Enter your future server’s name into the “Instance name” field. You can create multiple
virtual servers at once if you change the field “Number of instances”.
If you have any server placement groups or shared processor pools, you can add your
server into those during creation.
• You usually need the server placement groups if you want to deploy a highly
available application using IBM PowerHA SystemMirror for AIX or PaceMaker on
Linux.
7. After you entered all values, click “Continue” and switch to the next step.
Here you choose which operating system you deploy and which image you use to deploy
it. Select operating system, select available image, storage tier and storage pool. If you
have multiple storage volumes and would like to have them all on the same storage
system, select here “Affinity” and select one of the existing storage volumes.
Otherwise, if you want to split up your boot volumes from your data volumes, you can
select “Anti-affinity” and select one of your data volumes. Then you boot volume will be
placed on another storage system.
• Under “Advanced settings” you can also create replication of your boot volume into
another datacenter if you have such DR requirements.
8. Click “Continue” to switch to the next step. In the next step you can choose hardware type
where you want to deploy your virtual server and its hardware (CPU, RAM) configuration.
Under “Machine type” you usual have two types of systems - smaller scale-out systems
like S922, S1022 and bigger enterprise systems like E980 or E1080.
Next you select type of cores you wish to be allocated to your virtual server - “shared
uncapped”, “shared capped” or “dedicated”. The types have the same meaning as on IBM
Power LPARs. Depending on the type you can choose different values for “Cores” which
core ponds to the “Desired entitled capacity” and for “Virtual Cores”, which corresponds to
the “Desired virtual processing units”. Figure 2-20 on page 41 show setting the amount of
memory you want to allocate to your virtual server instance
9. Figure 2-21 shows the panel that is used to create new data volumes or attach existing
data volumes to your virtual server. If you don’t need any data volumes, you can skip the
step and click “Continue”.
After you made your selection click “Finish”. Figure 2-23 on page 43 shows your edit
options, If you want change some previous settings, you can click “Edit” near any of the
previous steps.
If you finished configuring your virtual server, you can find cost estimation on the right side
of your window. Figure 2-24 on page 44 shows the cost estimation (actual costs will vary
based on account and location). After that click the option “I agree to the Terms and
conditions”. and then you can click the button “Create”.
11.The creation of the virtual server starts almost immediately after you clicked “Create” and
can take several minutes. After you click “Refresh” button in your “Virtual server instances”
view, you can find your virtual server first in “Building” state, then in “Warning” state, and
after some time in “Active” state. The “Warning” state usually means that your LPAR is
already created but RMC connection is still not available.
You can select your virtual server in the list and check its settings as shown in Figure 2-25
on page 45. You can’t change the settings while the server is being built, but you can open
the console to the system and start working with it, it is already created and the operating
system is booted.
After the system is in “Active” state you can change RAM and CPU settings, attach your
virtual server to new networks, or attach and create new storage volumes to it.
From “VM actions” button you start, stop or restart your virtual server instance. You can
also capture your virtual server as new image or as backup into IBM Cloud Object
Storage. If you have problems accessing your virtual server, you can open console using
the same button and investigate the problems.
If you don’t need your virtual server anymore, you can always remove it by using “Delete”
button left from “VM actions” button.
The MacOS install command is shown in Example 2-2 and the Windows install process is
shown in Example 2-3.
If you don’t have direct Internet access from the system where you want to install IBM
Cloud CLI, you can download a suitable archive from this Github release page and use it
to install IBM Cloud CLI.
After you installed IBM Cloud CLI it is recommended to check regularly for updates as
shown in Example 2-4.
2. Before starting with IBM Cloud Power Virtual Server you must install IBM Cloud Power
Virtual Server CLI plug-in as shown in Example 2-5.
Now you can see all available Power Virtual Server commands with ibmcloud pi
command as shown in Example 2-6.
Usage:
pi [command]
Networking Commands
cloud-connection, cc IBM Cloud Power Virtual Server Cloud Connections.
ike-policy, ike IBM Cloud Power Virtual Server Internet Key
Exchange policies.
ipsec-policy, ips IBM Cloud Power Virtual Server Internet Protocol
Security policies.
network-interface, ni IBM Cloud Power Virtual Network Interfaces.
subnet, snet IBM Cloud Power Virtual Server Subnets.
vpn IBM Cloud Power Virtual Server Virtual Private
Networking.
Storage Commands
disaster-recovery, drl List disaster recovery locations for the current
region or all regions.
image, img IBM Cloud Power Virtual Server Images.
storage-pools, spools List all storage pools for the targeted region.
storage-tiers, stiers List all storage tiers for the targeted region.
volume, vol IBM Cloud Power Virtual Server Volumes.
volume-group, vg IBM Cloud Power Virtual Server Volume Groups.
Additional Commands:
datacenter, dat IBM Cloud Power Virtual Server Datacenters.
job IBM Cloud Power Virtual Server Jobs.
workspace, ws IBM Cloud Power Virtual Server Workspaces.
Flags:
-h, --help Display help information for the command.
--json Format output in JSON
3. But before starting with Power Virtual Server you must login into IBM Cloud. There are
several ways to login into IBM Cloud using CLI.
The first and well known from the web interface is using your login credentials - usually
your e-mail address and password. Just enter ibmcloud login, then enter your e-mail
and your password.
5. After you logged in you can list available workspaces and select one of them as your target
workspace for the future operations. You always can select another workspace if you wish
as shown in Example 2-8.
$ ibmcloud pi ws tg
crn:v1:bluemix:public:power-iaas:mad02:a/f3862ec10c674ec49a6977ace068571f:d52a66f1
-fc55-41e9-bb1b-a4e658c41544::
6. If you don’t have any workspaces, you can create a new workspace. You need a name of
resource group in IBM Cloud and a name of Power Virtual Server datacenter to create
new workspace. You can get list of your resource groups by using ibmcloud resource
groups and the list of Power Virtual Server datacenter by using ibmcloud pi dat ls as
shown in Example 2-9.
$ ibmcloud pi dat ls
Listing datacenters...
Status Type Region
active off-premises wdc07
active off-premises wdc06
active off-premises us-south
active off-premises us-east
active off-premises tor01
active off-premises tok04
active off-premises syd05
active off-premises syd04
active off-premises sao04
active off-premises sao01
active off-premises osa21
active off-premises mon01
active off-premises mad04
active off-premises mad02
active off-premises lon06
active off-premises lon04
active off-premises eu-de-2
active off-premises eu-de-1
active off-premises dal12
active off-premises dal10
active off-premises che01
7. After you’ve collected all required information, you can create a new workspace: as shown
in Example 2-10.
Example 2-10 Creating new Power Virtual Server workspace using IBMCloud CLI
$ ibmcloud pi ws cr RedbookWS -d eu-de-1 -g f7f08119179c4b35ad9c72dfff457798 -p
public
Creating workspace RedbookWS...
Name RedbookWS
Plan ID f165dd34-3a40-423b-9d95-e90a23f724dd
CRN -
Image 86bb4a65-5084-44e5-9732-83ec00da55c0
Name RHEL9-SP4-BYOL
Arch ppc64
Container Format bare
Disk Format raw
Hypervisor phyp
OS rhel
Type stock
Size 100
Created 2024-11-03T15:48:08.000Z
Last Updated 2024-11-03T15:48:08.000Z
Description -
Storage Tier
Storage Pool
9. Before creating a new instance we need a subnet. We can check all available subnets in a
workspace by using the command shown in Example 2-14.
Example 2-14 Listing subnets in workspace and getting information about subnet
$ ibmcloud pi snet ls
Listing subnets under account Andrey Klyachkin's Account as user
[email protected]...
ID Name Address
cff136ca-e9f0-49ea-b139-8100f75e4da6 redbook_net
/pcloud/v1/cloud-instances/a57c0dadfc1b407c89d1809c0aadad2f/networks/cff136ca-e9f0
-49ea-b139-8100f75e4da6
10.If you didn’t find a suitable subnet or need a new subnet, you can create it as shown in
Example 2-15.
CRN -
ID 01781d38-5d02-4a5d-97e3-ab62a44cee67
Name mgmt_net
VLAN 288
Type vlan
CIDR Block 172.16.100.0/24
DNS 8.8.8.8, 161.26.0.10, 161.26.0.11
IP Range [172.16.100.10-172.16.100.250]
Gateway 172.16.100.1
MTU 1450
Jumbo false
11.The last piece of information we need is SSH key. If you don’t have it, you can upload a
new key by using ibmcloud pi ssh cr command. Otherwise check the keys with the
commands
ibmcloud pi ssh ls and ibmcloud pi ssh get <NAME> commands.
12.Now we’ve got all required informations and are ready to create a Power Virtual Server
instance using IBMCloud CLI. We use ibmcloud pi ins cr command to do it as we can
see in Example 2-16.
Example 2-16 Creating a new Red Hat Enterprise Linux 9.4 instance using IBMCloud CLI
$ ibmcloud pi ins cr pvsrb02 -i RHEL9-SP4-BYOL -n redbook_net,mgmt_net -k mac -s
s922 -r shared -p 0.25 -m 4 -t tier0
Creating instance pvsrb02 under account Andrey Klyachkin's Account as user
[email protected]...
Instance pvsrb02 created.
ID b5b31081-af9a-473f-b31f-a1a295dad02c
Name pvsrb02
CRN -
CPU Cores 0.25
Memory 4
Processor Type shared
The first parameter of the command is the name of the future Power Virtual Server
instance. Table 2-1 shows some of the different parameters used to define your instance.
-m RAM in GB
There are many more options you can use during instance creation. IBM Cloud CLI provides
you a very flexible way of creating and managing Power Virtual Server instances.
If you want to automate and use data from IBM Cloud CLI in your automation, most CLI
commands support a setting ( --json) to output data in JSON format as shown in
Example 2-17.
Example 2-17 Getting status of virtual server instance with IBMCloud CLI and jq
$ ibmcloud pi ins get pvsrb02 --json | jq -r .status
ACTIVE
Attention: When using the commands like stop and start, the commands are sent to the
systems immediately. However, the systems may not stop immediately even when the
command is successful. You must check the status of the Power Virtual Server instance
before doing any follow-on steps to ensure that the system is in the expected status.
If you don’t need Power Virtual Server instance anymore, you can delete it using ibmcloud pi
ins del as shown in Example 2-19 below.
By default data volumes are not deleted with the instance. If you want to delete data volumes
together with the instance, you must specify -d option to the command.
To provision the infrastructure, Terraform works with “providers”. Terraform relies on these
plugins – providers – to interact with cloud providers, SaaS providers, and other APIs. IBM
delivers a provider for IBM Cloud. You can find the opensource project on Github at:
https://github.com/IBM-Cloud/terraform-provider-ibm.
To start a new IBM Cloud deployment with Terraform, you must first create a new directory
which will contain the whole Terraform code. The code is written in Terraform configuration
language which is easy to write and to read.
The code can be in several different files or in one big file. For readability reasons we suggest
the use of multiple files.
1. First let’s define some variables as shown in Example 2-20.
Example 2-20 Defining Terraform variables for IBM Cloud in file vars.tf
variable "ibmcloud_apikey" {
type = string
description = "API key to use for IBM Cloud"
default = ""
sensitive = true
}
variable "ibmcloud_region" {
type = string
description = "Region in IBM Cloud"
default = "mad"
}
variable "ibmcloud_zone" {
type = string
description = "Zone in IBM Cloud"
default = "mad02"
}
Some of data like ibmcloud_apikey are sensitive and marked as such. It means this data
will not be in the output of Terraform. If you have the values you can write them directly into
the file but you must not do it.
Some of the values like IBM Cloud API key you can redefine on the fly by using the
environment variable IBMCLOUD_API_KEY. Generally you can redefine each Terraform
variable by using environment variables which start with TF_VAR_. If your Terraform
variable is ibmcloud_zone, then you can use environment variable
TF_VAR_ibmcloud_zone to redefine its value.
Another way to redefine variables on the fly during the provisioning is to use Terraform
variables files (terraform.tfvars). You can define different sets of variables and use them for
different types of deployments. It also makes easy to use Terraform in CI/CD pipelines to
automate cloud deployments.
2. Before creating any resources we must tell Terraform which providers (Terraform plug-ins)
we are going to use and configure them as shown in Example 2-21.
provider "ibm" {
ibmcloud_api_key = var.ibmcloud_apikey
region = var.ibmcloud_region
zone = var.ibmcloud_zone
}
3. After we defined all prerequisite information we are ready to start with our first real
Terraform code. To deploy systems in IBM Cloud Power Virtual Server we first need some
workspace where we do it. See define workspace in Example 2-22.
In our example, we first find an IBM Cloud’s resource group with the name “Default”. If you
have another resource group, define its name here. If we have the resource group, we use
it and the datacenter we defined earlier in the variable files to create a new workspace
called “Redbook TF workspace”.
4. In Example 2-23, we show providing the SSH key that must be uploaded to Power Virtual
Server cloud. It is done by using the resource ibm_pi_key:
We used our local SSH key which is saved in our home directory. You can provide another
file or write the SSH public key as a string.
5. In Example 2-24 we show the next step to create a network for our future deployment.
6. Our last step before we deploy a new LPAR is to get image information of the operating
system we want to deploy. Example 2-25 shows the step to show which images exist in the
images catalog.
Example 2-25 Getting AIX 7.3 TL2 SP1 image from the Power Virtual Server image catalog
data "ibm_pi_catalog_images" "pvs_catalog" {
pi_cloud_instance_id = ibm_pi_workspace.redbook_ws.id
}
locals {
img_index = index(data.ibm_pi_catalog_images.pvs_catalog.images[*].name,
"7300-02-01")
pvs_image = data.ibm_pi_catalog_images.pvs_catalog.images[local.img_index]
}
7. When we got the Power Virtual Server image catalog, we searched for an image with the
name “7300-02-01” which is AIX 7.3 TL2 SP1 image. We copy the image into our
workspace to use it later to deploy an LPAR.
At this point we have all prerequisites and are ready to deploy our first LPAR. We use the
resource ibm_pi_instance to define our LPAR in Power Virtual Server. Example 2-26
shows this step.
8. You probably need some volumes for your workloads, These are defined as shown in
Example 2-27.
9. You are now ready to deploy your first IBM Power Virtual Server system! You can initialize
the Terraform project and create the resources as shown in Example 2-28.
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
Terraform used the selected providers to generate the following execution plan.
Resource actions are indicated
with the following symbols:
+ create
<= read (data resources)
+ pi_network {
+ external_ip = (known after apply)
+ ip_address = (known after apply)
+ mac_address = (known after apply)
+ network_id = (known after apply)
+ network_name = (known after apply)
+ type = (known after apply)
}
}
+ pi_ipaddress_range {
+ pi_ending_ip_address = "172.16.100.250"
+ pi_starting_ip_address = "172.16.100.10"
}
}
Changes to Outputs:
+ images = (known after apply)
10.After couple of minutes, your new Power Virtual Server is ready to work. The only
additional consideration is that your LPAR is not configured right now. You can use Ansible
to configure it or you can specify provision in the Terraform code as shown in
Example 2-29.
Example 2-29 Terraform local provisioner for AIX in Power Virtual Server
resource "null_resource" "configure_lpar" {
connection {
host = ibm_pi_instance.lpar.pi_network[0].ip_address
user = "root"
private_key = file("~/.ssh/id_rsa")
agent = "false"
timeout = "10m"
}
provisioner "remote-exec" {
inline = [
"set -v",
"set -o errexit",
"cfgmgr",
"mkvg -S -y datavg hdisk1",
"mklv -t jfs2 -c1 -ex -y lvdata datavg 10G",
If you don’t need the environment, you can always delete it completely using the same code
you created and the Terraform destroy command as shown in Example 2-30.
Terraform used the selected providers to generate the following execution plan.
Resource actions are indicated
with the following symbols:
- destroy
- pi_network {
- ip_address = "172.16.100.102" -> null
- pi_ipaddress_range {
- pi_ending_ip_address = "172.16.100.250" -> null
- pi_starting_ip_address = "172.16.100.10" -> null
}
}
Changes to Outputs:
- images = 2 -> null
The site is interactive and if you choose an API call, you will not only get the documentation
on the call but also examples using the API call with curl. Using these examples and the
documentation you can automate Power Virtual Server deployments in a script or in any
programming language which supports REST API calls.
In the context of IBM Power Virtual Server, a VPN allows organizations to securely extend
their on-premises environments into the cloud. This secure connectivity enables users to
access applications, data, and resources hosted on Power Virtual Servers without exposing
them to the public internet. By leveraging VPNs, organizations ensure secure communication
between their on-prem infrastructure and the IBM cloud-based Power Virtual Server, while
maintaining data integrity and confidentiality.
In summary, the use of VPNs in IBM Power Virtual Server environments enhances security,
facilitates seamless integration with existing on-premises systems, and provides a
cost-effective and scalable solution for connecting resources across disparate locations. As
more organizations adopt hybrid cloud models, VPNs continue to play a critical role in
ensuring secure, encrypted, and reliable network connectivity.
Security Considerations
VPNs are a critical security layer in cloud environments, and it's important to maintain strong
security measures:
Encryption Strength
Ensure strong encryption standards (e.g., AES-256) to prevent data interception or
tampering.
Key Management
Regularly rotate encryption keys and use secure key storage mechanisms to prevent
unauthorized access.
Setting up a VPN in IBM Power Virtual Server is an essential step for securing
communications between your cloud environment and on-premises infrastructure or remote
users. By following the outlined steps-choosing the right VPN technology, configuring
gateways, establishing security protocols, and testing connections-organizations can create a
secure and reliable network to support their cloud workloads. With strong encryption, access
controls, and monitoring, VPNs provide a robust solution for protecting sensitive data in the
cloud.
Security Aspects
Securing a Virtual Private Network (VPN) in IBM Power Virtual Server is vital for ensuring
data confidentiality, integrity, and compliance with security standards. Robust security
measures help protect the data traveling between on-premises systems and cloud
environments. Here's an in-depth look at two key areas: encryption protocols and access
control with traffic filtering features.
Summary
In IBM Power Virtual Server, encryption protocols like SSL/TLS and IPsec ensure secure and
private data transmission across networks, protecting against unauthorized access. Access
control mechanisms and traffic filtering features provide granular control over user and data
access, enhancing security further. By combining these advanced security aspects,
organizations using IBM Power Virtual Server VPNs can establish robust, secure connections
that protect sensitive data and maintain regulatory compliance.
The networking framework within IBM Power Virtual Server is engineered to support both
scalability and security, catering to hybrid cloud needs and enabling seamless integration of
on-premises resources with cloud-hosted workloads. This overview explains the basic
network architecture, how it supports AIX and Linux workloads, and the structure of public
and private network options.
The architecture also incorporates security groups and access control lists (ACLs) to regulate
traffic. Security groups provide virtual firewalls at the instance level, while ACLs enforce rules
at the subnet level, controlling inbound and outbound access.
How the network is designed to integrate both AIX and Linux workloads
IBM Power Virtual Server offers seamless integration of both AIX and Linux workloads by
using advanced visualization and networking technologies that are optimized for IBM Power
Systems. The network design is built to support heterogeneous environments, where AIX and
Linux workloads can coexist, communicate, and share resources without compatibility issues.
Network compatibility
IBM Power Virtual Server utilizes virtual switches to handle traffic between different virtual
machines (VMs) and bare-metal instances running AIX or Linux. This virtual switch-based
approach ensures that AIX-specific network configurations and Linux-based networking
services can coexist without conflict. A Virtual I/O Server (VIOS) is often employed to manage
and route network traffic across AIX and Linux workloads, offering a consistent and
high-performance interface between the network and different operating systems.
Public networks are internet-accessible and are suitable for workloads that require external
access, such as web applications, APIs, or resources that users access from outside the
VPC. Security groups and firewall rules are essential for regulating traffic to public networks,
ensuring that only approved IPs and protocols can access public resources. Common
protocols (HTTP, HTTPS, SSH) are configured with strict access control policies. Public IP
addresses are assigned to resources requiring internet connectivity. These resources are
typically placed in a public subnet, where they remain accessible to authorized users from the
internet.
Private networks are isolated from the internet, ensuring data security by restricting access to
internal applications and sensitive workloads. Private networks are ideal for hosting
Inter-subnet Communication
While private subnets are isolated, they can still communicate with other subnets within the
VPC, allowing applications on public and private subnets to interact without compromising
security.
Public networks allow workloads to interact with the internet for data collection, customer
access, or integration with third-party services. Private networks, on the other hand, serve as
secure environments for handling sensitive data, running internal applications, and
supporting compliance requirements.
Summary
The networking infrastructure of IBM Power Virtual Server offers a flexible and secure
foundation to support AIX and Linux workloads in a cloud environment. Using VPCs, VLANs,
subnets, and various gateways, Power Virtual Server enables customers to configure public
and private networks, manage connectivity, and apply consistent security controls across
different operating systems. This design allows organizations to integrate their on-premises
and cloud environments seamlessly, create secure and high-performing network
configurations, and maintain the flexibility to adapt to evolving business and security needs.
Subnets
Subnets divide the IP address space within a VPC into smaller, more manageable segments.
Each subnet has its own IP address range and can be configured as either public or private,
depending on the workload's access needs.
Public subnets are connected to the internet through a public IP, making them suitable for
resources like web servers or APIs that need to be publicly accessible. Public subnets require
additional security controls, such as firewalls and access control lists (ACLs), to protect
exposed resources.
Private subnets are not accessible from the internet and are used for internal resources like
databases or application servers. Private subnets can only be accessed through secure
channels, such as VPN or Direct Link, enhancing security by limiting exposure. Subnets
provide the following benefits”
Simplified Traffic Management
By grouping resources into subnets, administrators can apply consistent security and
routing policies.
Gateways
Gateways are critical components that manage data flow between different network
environments, including on-premises networks, IBM Cloud services, and the internet. Power
Virtual Server supports various gateways to accommodate diverse connectivity needs. There
are multiple types of gateways:
Internet Gateway
Manages outbound traffic from VPCs to the internet, enabling internet access for
resources on public subnets.
Edge Gateway
Provides secure VPN and Direct Link connections to link on-premises resources with IBM
Cloud environments. The Edge Gateway facilitates secure communication between
isolated networks and allows businesses to deploy hybrid environments effectively.
Transit Gateway
Used for connecting multiple VPCs and regions, the Transit Gateway simplifies network
management by centralizing traffic routing across hybrid and multi-region deployments.
Megaport
Megaport is a network-as-a-service provider that enables direct connectivity between IBM
Cloud (including Power Virtual Server) and other cloud providers, data centers, and
on-premises environments. By leveraging Megaport's software-defined network,
organizations can quickly establish private, high-speed connections to multiple cloud
Edge Gateway
The Edge Gateway acts as a secure entry and exit point for traffic between IBM Power Virtual
Server and external networks, including on-premises systems and remote users. Edge
Gateway provides secure connections through IPsec VPN and Direct Link, enabling
organizations to build hybrid environments that bridge IBM Cloud and on-premises resources.
The Edge Gateway provides the following features and benefits:
VPN Support
Edge Gateway can be configured to support IPsec VPNs, offering encrypted access
between remote users or external sites and Power Virtual Server resources. This makes
Edge Gateway ideal for securing remote access and protecting data in transit.
Direct Link Integration
Edge Gateway works in tandem with Direct Link, offering an additional layer of security
and control over traffic flowing between on-premises and IBM Cloud environments.
Centralized Security Management
Edge Gateway's role as the entry point for both VPN and Direct Link traffic allows
administrators to enforce security policies at a single, central location, simplifying network
management and enhancing security.
Summary
The network components within IBM Power Virtual Server-VPC, VLANs, subnets, gateways,
Direct Link Connect, Megaport, and Edge Gateway-are foundational to creating a secure,
flexible, and efficient networking environment. Together, these components enable
organizations to design scalable and secure network architectures that integrate seamlessly
with on-premises systems, support hybrid and multi-cloud deployments, and provide the
flexibility to manage both public and private workloads. By combining private connectivity
options, secure gateways, and network segmentation, IBM Power Virtual Server offers a
robust solution for managing complex cloud networking needs while maintaining high levels of
control and security.
The network connectivity options in IBM Power Virtual Server are categorized broadly into:
Non-production or proof-of-concept (POC) environments
Production environments.
Each category supports a variety of network configurations and connectivity options, allowing
organizations to select the optimal setup based on factors such as data sensitivity,
compliance requirements, performance needs, and cost considerations.
Workload Sensitivity
Development, testing, and POC environments typically require flexibility and cost efficiency,
but production environments demand higher performance and enhanced security due to the
critical nature of the workloads.
The choice of network scenario in IBM Power Virtual Server plays a crucial role in aligning
cloud resources with workload requirements. Production, non-production, and multi-region
setups each offer distinct advantages, from cost-efficiency in development environments to
high availability and performance in production. Selecting the right scenario based on factors
like workload sensitivity, performance needs, security, and budget ensures that organizations
can deploy their applications and data with the optimal balance of security, cost, and
resilience, meeting their operational and business goals effectively.
A well-designed network strategy aligns with the specific needs and risks associated with
each environment.
Production Environment:
Production environments demand the highest levels of availability, performance, and security.
Connectivity is absolutely critical. Multiple redundant connections to the internet and within
the data center are essential. This often involves diverse network paths, multiple ISPs, and
redundant network devices (routers, switches, firewalls). Failover mechanisms should be
automatic and rapid. Sufficient bandwidth is crucial to handle peak traffic loads and ensure
low latency for critical applications. This may involve dedicated high-speed connections.
Robust security measures are paramount. This includes firewalls, intrusion
detection/prevention systems, network segmentation (VLANs), access control lists (ACLs),
and regular security audits. DMZs (demilitarized zones) are often used to isolate publicly
accessible servers. Comprehensive network monitoring and management tools are
necessary to proactively identify and resolve issues. Real-time alerts and performance
dashboards are crucial. QoS mechanisms prioritize critical traffic (e.g., database traffic,
VoIP) to ensure consistent performance even under heavy load.
Additional considerations
A production environment has additional considerations that differentiate it from other
environments. Specifically consider:
Compliance
Industry-specific regulations (e.g., HIPAA, PCI DSS) may impose strict requirements on
network security and data protection.
Disaster Recovery
Production environments need to have a disaster recovery plan to ensure that business
can continue in case of unanticipated outages or even planned outages. A well-defined
disaster recovery plan should include network connectivity considerations, such as
backup connections to a secondary data center.
In general, the network architecture can be simpler than production, reducing complexity and
cost.
Additional considerations
For a non-production or testing environment, consider the following requirements:
Data Masking
Sensitive data should be masked or anonymized in non-production environments to
protect privacy.
Realistic Testing Environment
The network configuration should mimic the production environment as closely as possible
to ensure accurate testing.
Additional considerations
For a POC environment, consider the following requirements:
Rapid Deployment
The network should be easy to set up and tear down.
Cost-Effectiveness
Keep the cost of network infrastructure for POCs to a minimum.
Focus on Functionality
The primary goal is to demonstrate functionality, not necessarily performance or
scalability.
These scenarios typically use VPN-based connections, like SSL or IPsec VPNs, which
provide secure remote access while maintaining flexibility and cost efficiency. POC
environments may also integrate jump servers or intermediary network layers for added
security and control over remote access. Some example configurations are:
SSL VPN with Jump Server
Enables secure access to a POC environment with minimal setup, allowing remote
developers to test applications in a simulated cloud setting.
Direct Link for Limited Testing
In scenarios where low latency is beneficial but not critical, a limited Direct Link setup can
support POC testing.
These setups often use VPN-based connections (such as SSL or IPsec VPNs) for secure,
low-cost remote access. VPNs provide the necessary security for remote users and
developers accessing the environment but without the expense of dedicated links. It is
common for non-production environments to have a smaller budget than production
environments. They can be less costly to operate as they do not require the same level of
redundancy or high-performance infrastructure as production setups. The use of VPNs to
connect on-demand enables cost savings and provides flexibility.
A non-production setup might utilize a secure SSL VPN connection to allow remote
developers access to the test environment, often using a jump server for additional security
and network segregation.
Production scenarios often rely on dedicated connectivity solutions like Direct Link or
Megaport to ensure secure, high-speed connections between on-premises environments and
the Power Virtual Server cloud. Multi-colocation (multi-COLO) and multi-region production
setups enable distributed workloads across IBM Cloud regions, supporting redundancy, high
availability, and failover capabilities. Some example configurations are:
Direct Link with Edge Gateway
Provides a private, dedicated connection between on-premises and IBM Cloud, suitable
for applications that require consistent performance and high security.
Multi-COLO and Multi-Region with Megaport
For global operations, this scenario connects multiple co-location facilities across regions,
offering low-latency access and resiliency through redundant, geographically dispersed
links.
Production setups usually include enhanced security features, such as multi-layered firewalls,
VPNs, and stringent access controls. These measures protect sensitive data and support
compliance with industry standards and regulations.
A production network might include a Direct Link connection with an Edge Gateway, creating
a secure and high-performance path between on-premises infrastructure and IBM Power
Virtual Server resources.
IBM's partnerships with connectivity providers like Megaport, along with IBM Cloud's Transit
Gateway, support easy integration with other clouds, enabling data flow across platforms and
regions. Some example configurations are:
Transit Gateway with Multi-Cloud Access:
Facilitates seamless connectivity across IBM Cloud regions, other cloud platforms, and
on-premises environments, simplifying network management in multi-cloud architectures.
Direct Link and Multi-Cloud with Megaport:
Combines secure, dedicated connections to IBM Cloud with multi-cloud connectivity,
supporting complex, multi-environment workloads.
A multi-region setup might use Transit Gateway to link VPCs across IBM Cloud regions,
coupled with Megaport to establish private, dedicated connections to other cloud providers,
enabling a robust multi-cloud architecture.
Production scenarios are for mission-critical applications and high-priority workloads that
require robust performance, low latency, and enhanced security. Production environments are
running core business functions that need high availability – transaction processing, customer
databases, and enterprise applications.
Connectivity Options
Connectivity in non-production scenarios often relies on VPN connections (e.g., SSL or IPsec
VPN), which are cost-effective and secure enough for development or testing environments
but may not support high-bandwidth or low-latency requirements. VPN access provides
flexibility for remote access, making it easy for developers to connect as needed without
requiring costly dedicated links.
Production scenarios require robust security measures to protect sensitive data, often
including dedicated private connections (Direct Link, Megaport) that minimize exposure to the
public internet. Multi-layered security controls, such as firewalls, access control lists (ACLs),
and stringent identity management policies, help ensure compliance with industry regulations
and protect critical business data.
Cost structure
Non-production scenarios are more cost-effective, using VPN connections and shared
resources that reduce expenses. These environments are ideal for minimizing costs during
the development and testing phases, where resource demands are lower.
Production environments typically incur higher costs due to the need for dedicated,
high-performance infrastructure, including private connections, enhanced security
configurations, and redundancy features. However, these costs are justified by the need to
maintain reliability, performance, and security for business-critical applications.
Production environments are built with scalability and availability in mind, often incorporating
redundant network paths and high-availability configurations to support business continuity.
Production setups may also include multi-region or multi-colocation (multi-COLO)
configurations for failover and disaster recovery.
By using SSL/TLS encryption, data integrity and confidentiality are maintained, making SSL
VPNs suitable for POC environments where secure access is necessary but full-scale,
dedicated connectivity is not required.
SSL VPNs can be configured to provide remote access to specific subnets or VLANs within
the POC environment, ensuring that only approved users can access designated resources.
This helps isolate test environments while facilitating remote development and testing.
QA teams can use SSL VPNs to conduct testing and debugging sessions, securely accessing
applications and services to validate performance and functionality.
Even in a non-production environment, safeguarding data during trials is essential, and SSL
VPNs provide a reliable way to ensure secure access.
Private connection using IPsec VPN, Direct Link Connect, and Edge
Gateway
IPsec (Internet Protocol Security) is a robust protocol suite used to establish secure tunnels
for data transmission between on-premises infrastructure and cloud environments like IBM
Power Virtual Server. Setting up an IPsec VPN involves several key steps to ensure a secure
and reliable connection.
To integrate Direct Link Connect with IPsec VPN initiate a Direct Link Connect service
through the IBM Cloud Console and associate it with the existing VPN gateway. Configure
routing tables to ensure that traffic intended for the cloud environment is directed through
Direct Link Connect, providing a seamless path for data flows.
While Direct Link Connect offers a secure private connection, maintaining an IPsec VPN as a
backup can provide redundancy. This ensures that in the event of an issue with the private
link, the VPN can handle traffic as a failover.
To Integrate Edge Gateway with IPsec VPN set up the Edge Gateway in the IBM Power
Virtual Server environment, configuring it to act as the endpoint for the IPsec VPN. Integrate
the Edge Gateway with Direct Link Connect to ensure that traffic can be routed privately and
securely without exposing data to public networks.
Apply security policies to filter traffic and define which data flows are allowed through the VPN
and Direct Link. For enhanced connectivity, configure the Edge Gateway to switch between
IPsec VPN and Direct Link based on network conditions. This ensures that data can continue
flowing securely even if one connection experiences an issue.
Test the connection to ensure that the Edge Gateway correctly switches between Direct Link
Connect and IPsec VPN under test conditions to verify redundancy. Monitor performance and
track data flow performance through the integrated setup using monitoring tools to assess
bandwidth, latency, and packet integrity.
Benefits of Integration
Combining Direct Link Connect and Edge Gateway with your IPsec VPN provides the
following benefits:
Improved Security
Combining IPsec VPN with Direct Link Connect and Edge Gateway provides multiple
layers of security for data transmissions, protecting against external threats and
unauthorized access.
Megaport enables customers to connect their on-premises data centers to the IBM Cloud
through private, virtual cross-connects that integrate seamlessly with Direct Link Connect.
Within the Megaport SDN you create Virtual Cross-Connects (VXCs) to connect between
sites. VXCs are Layer 2 Ethernet circuits providing private, flexible, and on-demand
connections between any of the locations on the Megaport network with 1 Mbps to 100 Gbps
of capacity. Megaport's VXCs are key to creating point-to-point and multi-point connectivity
across different colocation facilities and cloud regions. These virtual connections can be
provisioned and managed through Megaport's platform, offering flexibility and scalability.
Unlike public internet connections, IBM Cloud Backbone ensures that data remains within a
controlled, private infrastructure. This minimizes the risk of interception, data loss, or latency
issues, making it suitable for applications that require stringent security and consistent
performance.
Chapter 3. IBM Power Virtual Server in the IBM Cloud network 101
The architecture of IBM Cloud Backbone is built with redundancy and failover capabilities,
ensuring high availability and reducing the risk of network outages or performance
bottlenecks.
IBM Cloud Backbone facilitates smooth data transfer across different colocation sites,
ensuring that workloads can communicate efficiently without disruptions or latency spikes.
This is essential for applications that require synchronized data replication or distributed
processing.
Use cases
Here are some possible use cases for private connections with the IBM Cloud Backbone:
Latency-Sensitive Applications
Applications that require real-time responsiveness, such as video conferencing platforms,
gaming services, or high-frequency trading systems, benefit greatly from the low-latency
connections facilitated by the IBM Cloud Backbone.
The architecture supports dynamic scaling, allowing businesses to increase bandwidth and
expand their network coverage as needs evolve. This scalability is essential for enterprises
experiencing rapid growth or those with fluctuating workload demands.
IBM Cloud Backbone also provides simplified network management for clients. Organizations
can leverage IBM Cloud's network management tools to monitor traffic, manage routes, and
maintain a high level of control over data flows. This unified approach simplifies the task of
overseeing complex, multi-region network architectures.
IBM Cloud Backbone allows for quick provisioning of new connections and expansions,
enabling businesses to respond promptly to changing requirements without extended delays.
Chapter 3. IBM Power Virtual Server in the IBM Cloud network 103
104 Power Virtual Server for AIX and Linux
4
In this example, a customer is moving ten IBM AIX and Linux virtual machines from data
centers LPZ01 and LPZ02 in La Paz, Bolivia to IBM Power Virtual Servers on IBM Cloud in
data centers SAO01 and SAO04 in Sao Paulo, Brazil. During migration, the only change to
any of the VMs is an operating system upgrade from AIX version 7.2 to version 7.3. The ten
virtual machines are four production IBM AIX and Linux VMs, one development VM, one
archive VM, and four disaster recovery VMs that are duplicated to SAO04. This IBM Cloud
environment includes storage, backups in IBM Cloud Object Storage (COS), internal
networking including firewalls and a jump server to manage access of the virtual machines.
Additionally, this example includes a third-party vendor, replication across different zones in
IBM Cloud. See Figure 4-1.
Figure 4-1 Migrating IBM AIX and Linux VMs from La Paz (on premises) to Sao Paulo (off premises)
Note: Bolivia and Brazil are in the same continent (South America) that is why this
hypothetical case describes both countries, La Paz is 3000 kilometers from Sao Paulo. For
more information about multizone regions, see Locations for resource deployment.
4.1.1 Scope
In this example, all ten IBM AIX and Linux virtual machines (VMs) are migrated from data
center LPZ01, a customer replication source, and LPZ02, a customer replication target. The
VMs are managed by the customer in La Paz, Bolivia and will be migrated to the IBM Cloud
data centers, SAO01, the replication source, and SAO04, the replicated target, in Sao Paulo,
Brazil. Development and archive VMs in the La Paz data centers are migrated to IBM Cloud
by using IBM Cloud Object Storage backup and then restored to the target VM in Power
Virtual Server on IBM Cloud. The IBM AIX and Linux production VMs currently running at
Note: Typically, you need a maintenance contract and an activation key of the logical
replication, installation, and configuration done by the third-party vendor solution.
After the migrated VMs are active, the data is restored to the target location and connectivity
from the La Paz data centers is established by using IBM Access Client Solution (ACS). After
validation of the migrated VMs, the customer’s applications are configured and started in the
environment. Each migrated VM is assessed for proper operation. IBM provides the technical
information to the customer, such as IP addresses, DNS names, and VM temporary name.
The original VMs in La Paz must remain unaffected by tests of the migrated VMs.
Important: It is the customer’s responsibility to administer their applications and user IDs.
Post-migration, IBM conducts security scans tailored to each AIX or Linux environment,
based on the customer's security policy, and provides the results for customer review. The
transition and ongoing support of the environment involve multiple teams, including those
responsible for IBM Cloud Connect for Network, Cloud Object Storage, Power Virtual Server,
and the AIX and Linux operating systems. The customer's application team and any
third-party vendors supporting logical replication are also key stakeholders in this process.
Image catalogs, created from optical device backups, must be restored onto the IBM Power
Virtual Server instance. This restoration process leverages migration strategies involving IBM
Cloud Object Storage and NFS servers.
Infrastructure considerations
The technical infrastructure architecture and design includes deploying several zones in
IBM Cloud in Sao Paulo. In addition to the Power Virtual Servers zone named “Power Colo”,
which is a contraction of Power co-location, a front-end zone is defined in which the jump
servers are deployed. Jump servers can be used to manage user access and for other
function such as a proxy for accessing the IBM Cloud Object Storage services. Those
services are hosted in an IBM Cloud Bare Metal Server. A cluster of firewalls is deployed in
the front-end zone within the SAO01 site. In the SAO04 data center, a stand-alone firewall is
deployed.
Functional requirements
The solution must satisfy functional and nonfunctional requirements in a way that best
balances competing concerns of stakeholders and must consider possible constraints.
Management services for IBM AIX and Linux Support for IBM AIX and Linux operating systems
Dual sites high availability The use of any third-party vendor solution on
logical replication to establishing disaster
recovery between SAO01 and SAO04.
Provide fault tolerant LAN infrastructure in Provide Network connectivity for application and
IBM Cloud servers.
Data replication between IBM Cloud and Use a logical replication solution for replicating
customer data center data for IBM AIX and Linux for replicating data for
the move of application
Provide traffic isolation and segmentation Use jump servers and traffic filtering on
IBM Cloud
Provide WAN connectivity Customer provides WAN circuit and the POP
network infrastructure. IBM provides the
termination endpoint in Sao Paulo.
Nonfunctional requirements
The nonfunctional requirements are:
IBM Cloud portal access for IBM AIX and Linux virtual machines provisioning.
Tools for alert monitoring and reporting on IBM AIX and Linux.
Traffic bandwidth in IBM Cloud infrastructure cannot exceed 1 Gbps.
Traffic bandwidth for replication is limited to 500 Mbps. Use Internet for preserving
production traffic.
Local network redundancy to be provided in primary IBM Cloud site (SAO01) including
firewall cluster in High Availability and dual ports connectivity.
Jump servers are used for managing access to the Power Virtual Server VMs.
These decisions have significant implications for cost, performance, and the degree to which
the system fulfills its requirements and addresses the needs of various stakeholders.
Documenting these choices establishes a formal record and ensures transparency regarding
the rationale underlying the system's design.
Documenting your architecture design process helps demonstrate and defend the reasoning
behind the design choices. It helps verify that the configuration fulfills both functional and
nonfunctional prerequisites and ensures that the stakeholders are satisfied with the
configuration. This can help avoid superfluous adjustments of the design during the design
process. In the following sections we present some examples of architectural decisions that
Note: The design decisions that need to be made are unique to each client situation and
will be guided by the functional and non-ffunctional requirements in that situation.
Alternatives No alternatives.
Note: Using Equinix you can get a direct link to IBM Cloud Classic and from IBM Cloud
Classic reach Power Virtual Server over Direct Link Connect. Alternatively, from Equinix,
you can get a cross connect to Megaport and connect to Power Virtual Server directly.
Before you begin, determine the location connection to IBM Cloud by verifying your
collocation provider's or service provider's capabilities to reach the meet-me room (MMR) and
cross-connect into IBM Cloud. For more information, see Direct Link Dedicated Hosting on
Classic. For example, on SAO01, the location type is a data center and the MMR Operator is
Ascenty.
In this use case, to migrate IBM AIX and Linux VMs from Bolivia to Brazil, it is possible to
establish the connection from Bolivia to SAO01. To do this you contract directly with a carrier
Two sites are used for the solution: one in SAO01 and the
Assumptions
other one in SAO04, which is in a different zone.
Alternatives No alternatives
The use of IBM Cloud Object Storage for the migration is one
Assumptions of the available methods for moving workload to IBM Power
Virtual Server in IBM Cloud.
The use of IBM Cloud Object Storage to move IBM AIX and
Motivation
Linux workloads to SAO01 and SAO04.
Defining connectivity
This section describes the considerations for defining the connectivity as shown in Table 4-5.
IBM Cloud Direct Link Dedicated provides a dedicated connection (single-tenant) for users
with strict compliance needs. It uses a dedicated port in an IBM Cloud Point of Presence
(PoP). You connect via a fiber cross-connection through a network service provider (NSP),
who handles the “last mile” link between your network and the local IBM Cloud data center.
Like other Direct Link options, you can add global routing for private network access to all IBM
To decide which Direct Link solution to order, see Getting started with IBM Cloud Direct Link
on Classic and Getting started with IBM Cloud Direct Link (2.0).
SAO01 is where the IBM AIX and Linux production runs in two subzones. The first subzone is
named Client Front End Account and contains the jump servers and services such as IBM
Cloud firewalls and proxy. The second subzone, named Power Colo, is where the IBM Power
Virtual Server resides. The two zones communicate by the internal IBM Cloud network
backbone. SAO04 is for disaster recovery if there is an SAO01 outage.
Figure 4-2 Sample architectural diagram of IBM AIX and Linux on IBM Power Virtual Server
Note: You cannot transfer an OS license from an on-premises system to a Power Virtual
Server. The license cost is factored into the overall hourly billing rate.
This service offers cost-effective storage for large datasets, commonly used for archiving,
backups, web/mobile applications, and analytics. It features tiered storage classes for cost
management and integrates IBM Aspera® for high-speed data transfer. The “query-in-place”
function allows you to perform analytics directly on the stored data.
Note: Some of the screen captures in this example might be different than the current
version because they were created with a previous version of the IBM Cloud Object
Storage interface.
4. After you create the instance, the Cloud Object Storage window is displayed. Click Create
bucket to store data. See Figure 4-4.
Note: You can view and select instances by clicking Instances on the left side panel,
Cloud Object Storage.
You can choose to create a custom bucket or select a predefined bucket. In this example,
customize your bucket by clicking the blue arrow in the lower right of the Customize your
bucket section. See Figure 4-6.
e. The newly created bucket is listed in COS PowerVS instance as shown in Figure 4-8.
7. After the creation of the bucket, define Service Credentials, which provide the information
to connect an application to object storage. Click Service credentials and then click New
credential as shown in Figure 4-9 on page 117.
8. Enter the service credential name, click Role to choose a role from the list, and enable the
Include HMAC Credential. See Figure 4-10
9. Click Add.
c. You can now begin uploading any OVA file by using Aspera Connect which is a built-in
feature. For instructions on creating the OVA file see 4.2.3, “Creating an OVA image”
on page 122.
Note: You can set Aspera as your default for any uploads. For more information, see Using
Aspera high-speed transfer.
10.To upload the OVA image to the IBM Cloud Object Storage, click Upload as shown in
Figure 4-13.
12.Click Upload files to browse your notebook folder. Choose a file and start the upload. You
can monitor the file transfer from the GUI. See Figure 4-15.
a. You can view the transferred file in the bucket as shown in Figure 4-16.
17.View the created Power Virtual Server instance as shown in Figure 4-20.
You can also import the OVA package into any cloud service that supports the Open
Virtualization Format (OVF) packaging standard. The imported OVA package can be
deployed as a virtual machine. For more information about creating an OVA image by using
AIX 7.3, see create_ova Command.
After the upload is complete, you can view the file in the bucket as shown in Figure 4-24.
3. Create a Power Virtual Server instance to receive the mksysb image, by clicking Create
Instance and enter the instance name as shown in Figure 4-25 on page 124.
4. Select the machine type, CPU, and memory configuration as shown in the example in
Figure 4-26.
Figure 4-26 Selecting CPU and Memory for a new Power Virtual Server instance
6. Agree to the terms and conditions and click Create instance. See Figure 4-28.
7. When the Power Virtual Server instance creation is completed, open the console into the
instance by selecting the VM actions pull-down menu. Click Open console. See
Figure 4-29.
9. Connect to the public IP address of the Power Virtual Server instance using SSH. See
Figure 4-31.
10.Access the Power Virtual Server instance by using its public IP address as shown in
Figure 4-32.
Figure 4-32 Access the Power Virtual Server instance from public IP address
b. Name the volume and ensure that the volume is large enough to contain the mksysb
file. Then click Create and Attach as shown in Figure 4-34.
c. From the ssh console, run cfgmgr and the new volume is available as shown in
Figure 4-35.
12.Create a staging volume group and a file system on the new disk, and mount it as shown
in Figure 4-36.
b. Run the cloud_setup script to install a series of open-source packages that are
dependencies for the AWS CLI. See Figure 4-38.
e. Use the AWS CLI to copy the mksysb image from your bucket into the stage file
system:
i. View the listed public endpoint. Figure 4-41.
ii. List the objects in the bucket PowerVS-aix as shown in Figure 4-42.
iii. Copy the example.mksyb file from PowerVS-aix bucket to the /stage filesystem as
shown in Figure 4-43.
Figure 4-45 Viewing the disk size from the image backup
15.From the GUI, create a new volume that is large enough to deploy the mksysb as shown in
Figure 4-46.
16.After the volume is created, click Storage volumes in the left column, and then click Edit
for your new volume as shown in Figure 4-47.
18.Return to the console and run cfgmgr to discover the new volume. You can confirm the
size with bootinfo -s as shown in Figure 4-49.
19.Enter the command alt_disk_mksysb to restore your mksysb onto the new disk. This step
can take 20–30 minutes. See Figure 4-50.
Figure 4-51 Bootlist automatically set to point to the restored root volume
20.Boot from the new boot volume with the restored mksysb:
a. Return to the GUI and click Open console as shown in Figure 4-52.
b. Reboot your Power Virtual Server instance. This can take some time as devices must
be re-created in the restored environment. You notice at least one reboot during this
process. If the console closes while you are waiting, open it again. See Figure 4-53 on
page 133.
c. After approximately 20–30 minutes, the system start is complete. Set the terminal type
to vt100 and press Enter. See Figure 4-54.
d. In the next screen, which is not shown, choose the option for Tasks Complete – Exit to
Login.
The following steps describe an overview to deploy an instance by using a custom image:
1. Create the custom image.
2. Store the image in your IBM Cloud Object Storage account.
3. Point the Power Virtual Server console to the image in the IBM Cloud Object Storage and
deploy the Virtual Server instance.
After you create the bucket, the bucket is listed in the COS Power Virtual Server server
instance IBM Cloud Object Storage as shown in Figure 4-57.
2. For Service Credentials, use the same credentials that were created previously as
described in “Creating an instance of IBM Cloud Object Storage in IBM Cloud”.
You can now start uploading any OVA file by using Aspera Connect which is a built-in
feature.
After you select files to upload, you see a page as shown in Figure 4-59.
4. Click Upload files to select a file from a local folder. Select a file and start the upload.
You can see the file transfer in the UI as shown in Figure 4-60.
6. Import the OVA file to your Power Virtual Server instance. Select Resource list →
Services → Power Virtual Server Server Guide → Select the Boot images tab as
shown in Figure 4-62.
7. Before you import the image, you need the following information:
– Storage type (Tier 1 or Tier 3).
– Region.
– Image filename.
– Bucket name.
– IBM Cloud Object Storage access key. Select Menu icon → Resource list →
Storage → Cloud Storage Object name → Service credentials → View
credentials. Copy the access_key_id.
– IBM Cloud Object Storage secret key. Select the Menu icon → Resource list →
Storage Cloud Storage Object name → Service credentials → View credentials.
Copy the secret_access_key.
8. Click Import image.
10.Verify that the boot image is listed after the file has been imported as shown in
Figure 4-64. After the image is imported, use the image to deploy a new Linux virtual
machine.
15.Verify that the instance was created by viewing it in the Virtual server instances page as
shown in Figure 4-66.
The IBM and SAP multi-decade alliance is why IBM was selected as one of SAP’s strategic
infrastructure providers for hybrid cloud. Support for SAP's suite of products is available
through the highly scalable, open, and security-rich IBM Cloud.
4.5.1 The unique value proposition of IBM Power Virtual Server for SAP
workloads
IBM Power Virtual Server differentiates itself with the following value propositions.
Accelerated time-to-value
IBM Power Virtual Server provides an accelerated time-to-value for your SAP workloads
through:
– Seamless transition from on-premises systems to IBM Power on IBM Cloud, ensuring a
consistent user experience throughout.
– Easy migration with a unified architecture that facilitates a smooth shift to IBM Power
on IBM Cloud.
– IBM offers comprehensive, optimized support for SAP across all layers, including
infrastructure, hypervisor, and operating system.
Maximum Uptime
Power Virtual Server provides enhanced availability capabilities which help provide maximum
uptime through the following:
– Achieve unparalleled server reliability, designed to meet or exceed SLAs, allowing IT
operations to focus on core business priorities. IBM Power has been ranked as the top
server for availability by ITIC for the past 15 years1, boasting an impressive 99.999%
uptime.
– Enterprise-class servers are engineered for resilience, featuring advanced recovery
and self-healing capabilities.
– IBM emphasizes continuous reliability improvements through a vertically integrated
design and System Life Cycle processes, including supercomputer simulations,
real-world system testing, and early client engagement.
– IBM Power servers utilize real-time advanced self-diagnosis to facilitate proactive
measures, further enhancing uptime.
– Comprehensive security is maintained across all layers, from firmware and hypervisor
to operating system, complemented by secure high-performance storage and
networking capabilities.
– Data is encrypted both at rest and in motion at speeds double that or faster than
industry standards, ensuring robust protection across the stack.
– On-chip accelerators expedite the compression and encryption of entire VMs,
significantly outperforming traditional software methods for GZIP file handling.
– IBM PowerVM provides the highest level of security among hypervisors underpinning
Cloud IaaS, with the lowest reported CVEs according to the US National Vulnerability
Database, safeguarding mission-critical data effectively.
Continuous Innovation
Power Virtual server helps with continuous innovation through:
– Focus resources on future business requirements rather than managing infrastructure
and SAP systems, enabling sustained growth.
– Enhance business processes with SAP S/4HANA, complemented by valuable insights
from IBM Consulting.
– Systems built on the IBM POWER processor benefit from over 30 years of enhanced
performance and reliability.
1 https://www.ibm.com/downloads/documents/us-en/107a02e959c8f503
2
https://community.sap.com/t5/enterprise-resource-planning-blogs-by-members/the-impact-of
-2027-on-sap-customers/ba-p/13525401
Additionally, the platform supports a wide range of operating systems, ensuring flexibility for
various workloads as shown in Table 4-6 and Table 4-7.
For SAP HANA used in production, the following virtual server configurations/instances are
tested and supported:
IBM Power10 server generation (IBM Power System S1022 and E1080):
– SUSE Linux Enterprise Server (SLES) for SAP 15 SP4 or newer Red Hat Enterprise
Linux (RHEL) 8.6 or newer
– Red Hat Enterprise Linux (RHEL) 9.2 or newer
– HANA Version 2 SPS07 or newer
IBM Power9 Server Generation (IBM Power System E980)
– SUSE Linux Enterprise Server (SLES) for SAP 12 SP1 or newer SUSE Linux
Enterprise Server (SLES) for SAP 15 SP4 or newer Red Hat Enterprise Linux (RHEL)
8.1 or newer
– Red Hat Enterprise Linux (RHEL) 9.2 or newer
– HANA Version 2 SPS04 or newer
Power Virtual Server is a Power enterprise infrastructure as a service (IaaS) offering. Power
Virtual Servers are physically located with low-latency connectivity to the IBM Cloud
Infrastructure. This infrastructure design enables Power Virtual Servers to maintain key
enterprise software certification and support as its architecture is identical to a certified
on-premises infrastructure.
The IBM Power Virtual Server offering is ideal for many SAP HANA use case scenarios. You
can use your servers for mission-critical workloads, as your test environment, or for your
business continuity disaster recovery site. All SAP HANA-based products are supported on
Power Virtual Servers.
For more information, see this IBM Cloud Document on SAP Profiles.
4.6.2 IBM Power Virtual Server certified profiles for SAP NetWeaver
IBM Power Virtual Servers are available with fully adjustable CPU cores and memory. You
can specify a custom size when defining the Power Virtual Server to use for SAP NetWeaver,
in accordance with existing SAP NetWeaver or SAP AnyDB for IBM Power best practices and
guidance from SAP. Therefore, no profile names are used to define running SAP NetWeaver
or SAP AnyDB that uses IBM Power Virtual Servers.
For SAP applications, the following virtual server configurations are supported. SAP
NetWeaver. Instance sizing is flexible, but it must follow the standard SAP sizing guidelines by
using SAPS benchmarks as shown in Table 4-8.
For more information refer to the following SAP note and IBM Redbooks:
SAP HANA on IBM Power Systems Virtual Servers: Hybrid Cloud Solution
https://www.redbooks.ibm.com/abstracts/redp5693.html
SAP Note 2947579 - SAP HANA on IBM Power Virtual Servers
https://launchpad.support.sap.com/#/notes/2947579
The content in this chapter is derived from actual experiences while deploying and managing
workloads on-premises and in the IBM Cloud with the IBM Power Virtual Server.
IBM Power Virtual Server is compatible with IBM AIX (IBM's UNIX operating system), Linux, and
IBM i. This compatibility makes it ideal for businesses already running mission-critical applications
on AIX or Linux who want to take advantage of cloud infrastructure while maintaining the stability
and performance of IBM Power Systems.
IBM Power Virtual Server supports a variety of Linux distributions, such as Red Hat Enterprise
Linux (RHEL), SUSE Linux Enterprise Server (SLES), and Ubuntu, providing enterprises with
flexibility and choice for their Linux workloads. This compatibility allows businesses to transition
seamlessly from on-premises IBM Power environments to the cloud, keeping operational
continuity intact while taking advantage of IBM Cloud's capabilities.
5.1.1 Benefits of managing AIX and Linux workloads on Power Virtual Server
Power Virtual Server offers several key advantages for managing AIX and Linux workloads. Here is
a summary of those benefits:
Flexibility
Power Virtual Server provides significant flexibility in the following areas:
Hybrid Cloud Integration
Power Virtual Server allows organizations to deploy and manage AIX and Linux workloads in a
hybrid cloud environment. This integration enables seamless data flow between on-premises
data centers and IBM Cloud, providing the flexibility to keep certain workloads on-premises
while moving others to the cloud based on business needs.
Choice of Operating System
Businesses can deploy either AIX or a variety of Linux distributions on the same Power Virtual
Server platform, supporting different applications and use cases. This choice allows
organizations to optimize their environment for specific workloads and maintain compatibility
with legacy applications.
Scalability
Enhanced scalability is provided by:
On-Demand Resource Allocation
Power Virtual Server enables businesses to scale CPU, memory, and storage resources
up or down as needed. This scalability is especially beneficial for workloads with
fluctuating demands, such as seasonal processing tasks or applications with variable
workloads.
Global Reach
As part of IBM Cloud, Power Virtual Server can support global operations, allowing
organizations to deploy instances in multiple regions. This geographic flexibility helps meet
data sovereignty requirements and improve application performance for users in different
locations.
Cost-effectiveness
Power Virtual Server provides cost effectiviness through:
Reduced capital expenses
By moving AIX and Linux workloads to Power Virtual Server, businesses can reduce the
capital expenses associated with maintaining on-premises infrastructure. This cost
efficiency is particularly advantageous for businesses with high infrastructure costs that
can benefit from IBM's pay-as-you-go pricing models.
Resource optimization
IBM Power Virtual Server allows organizations to allocate resources efficiently, paying only
for what they use. This resource optimization helps lower operational costs and enables
businesses to manage budgets more effectively.
Summary
IBM Power Virtual Server offers a powerful, scalable, and secure environment for managing
AIX and Linux workloads in the cloud. By providing compatibility with IBM's trusted operating
systems and leveraging the high-performance IBM Power architecture, Power Virtual Server
Chapter 5. Managing Workloads on IBM Power Virtual Server for IBM AIX and Linux deployments 149
enables organizations to modernize their infrastructure while maintaining the reliability and
efficiency they rely on. Whether for hybrid cloud, global expansion, or cost management,
Power Virtual Server is an optimal solution for enterprises seeking to extend the benefits of
IBM Power Systems to the cloud.
5.2 Hints and tips for IBM AIX and Linux workloads on Power
Virtual Server
Managing IBM AIX and Linux workloads on IBM Power Virtual Server can be streamlined and
optimized by applying a set of best practices and expert tips. These insights cover everything
from resource allocation and performance tuning to network configuration and security.
Leveraging these hints and tips can help organizations maximize efficiency, ensure robust
security, and enhance the reliability of critical applications running on AIX and Linux. By
understanding how to optimize resource usage, configure backup and recovery solutions, and
implement effective monitoring, IT teams can create a stable, high-performing environment
that meets the demands of enterprise workloads. These tips are tailored to the unique
characteristics of AIX and Linux on IBM's Power architecture, offering targeted strategies for
getting the most out of the Power Virtual Server platform.
Efficient resource allocation is crucial for optimizing performance, managing costs, and
ensuring stability for IBM AIX and Linux workloads on IBM Power Virtual Server. The right
approach to allocating CPU, memory, and storage resources can make a significant
difference in how effectively workloads run, especially for high-performance or
resource-intensive applications. Here are some key tips and recommendations for optimizing
resource allocation for AIX and Linux workloads.
Chapter 5. Managing Workloads on IBM Power Virtual Server for IBM AIX and Linux deployments 151
4. Monitoring and adjustment
Set up monitoring for resource utilization by implementing monitoring tools such as nmon
(AIX), top, vmstat, or IBM Cloud Monitoring to track CPU, memory, disk, and network
usage over time. Monitoring helps identify performance trends, pinpoint bottlenecks, and
enables proactive adjustments to resource allocations.
Based on performance metrics, consider adjusting CPU, memory, and storage allocations.
For example, if an application consistently uses high memory, allocate additional memory
to prevent performance dips. IBM Power Virtual Server's flexibility enables resource
adjustments with minimal downtime.
5. Use partition mobility for resource optimization
For workloads on IBM Power Systems, Power Virtual Server supports live partition
mobility, allowing you to move active workloads between servers without downtime. This
can help balance resource usage, distribute workloads evenly, and prevent overloading
specific resources.
If your environment experiences workload fluctuations, consider automating resource
balancing to allocate more resources during peak times and reduce them during off-peak
hours. This can optimize resource usage, reduce costs, and improve overall performance.
Effective resource allocation and optimization for IBM AIX and Linux workloads on IBM Power
Virtual Server involve careful planning, regular monitoring, and strategic adjustments. By
optimizing CPU, memory, and storage allocation based on workload requirements and
applying best practices for high-performance applications, organizations can maximize
efficiency, reduce costs, and maintain consistent performance. These strategies ensure that
critical AIX and Linux workloads perform reliably, leveraging the full potential of IBM Power
Virtual Server's architecture.
Chapter 5. Managing Workloads on IBM Power Virtual Server for IBM AIX and Linux deployments 153
5. Sar (System Activity Report) for AIX and Linux
Sar is part of the sysstat package and provides historical data on CPU, memory, disk, and
network usage. It allows administrators to collect system performance data over time for
trend analysis and capacity planning.
Key Features:
– Sar logs system activity at regular intervals, making it possible to analyze performance
trends and historical data.
– Sar provides detailed reports on CPU usage, memory paging, disk I/O, and network
traffic.
Sar is useful for long-term monitoring and capacity planning, especially for workloads
where historical data is needed to identify performance patterns over time.
5.4.1 Creating user roles and setting permissions for AIX and Linux
environments
It is important to define users, create user roles and sett the appropriate permissions in the
system.
1. Defining User Roles
Role-Based Access Control (RBAC): Implement RBAC to assign specific roles and
permissions to users based on their job responsibilities. For example:
– Administrator Role: Full access to system resources and configurations.
– Developer Role: Limited access to application files and testing environments.
– Operator Role: Permissions to monitor and manage basic operations but restricted
from critical system changes.
Create groups for role management - Use groups to manage roles efficiently. In AIX, use
the mkgroup command or smitty security to create groups, and in Linux, use the
groupadd command. Assign users to these groups to inherit predefined permissions.
2. Creating Users
Adding Users
– In AIX: Use the mkuser command or smitty user to create new users. Specify the
user's home directory, shell, and primary group during creation.
Chapter 5. Managing Workloads on IBM Power Virtual Server for IBM AIX and Linux deployments 155
– In Linux: Use the useradd or adduser command to create users. For example, useradd
-m -d /home/username -s /bin/bash username creates a user with a home directory
and default shell.
Assigning Groups
– In AIX: Use chuser groups=<group1,group2> to assign a user to multiple groups.
– In Linux: Use usermod -aG <group> username to add a user to supplementary groups.
3. Setting Permissions
File and Directory Permissions
– Use chmod, chown, and chgrp to control access to files and directories. For example:
• chmod 750 /path/to/directory grants read, write, and execute permissions to the
owner, and read and execute permissions to the group.
• chown user:group /path/to/file changes the file ownership.
Access Control Lists (ACLs)
– For more granular permission control, use ACLs. In AIX, use the aclget and aclput
commands to manage ACLs, and in Linux, use setfacl and getfacl. ACLs allow you
to grant specific users or groups permissions beyond the standard file ownership
model.
4. Setting Up sudo Privileges, Configuring Passwords, and Implementing Basic Security
Protocols
– Setting Up sudo Privileges
• Install and Configure sudo:
In Linux, ensure the sudo package is installed. Use the visudo command to edit the
/etc/sudoers file for configuring privileges securely. For AIX, use smitty or manually
edit the sudoers file if sudo is installed.
• Grant Specific Commands to Users
Limit the commands users can run with sudo to reduce risk. For example, add a rule
like username ALL=(ALL) NOPASSWD: /usr/bin/systemctl restart nginx to allow
the user to restart a service without granting full administrative rights.
• Group-Based sudo Access
Assign sudo privileges to groups for easier management. For example, in Linux,
create a group (sudo) and add users to it. Add a rule in /etc/sudoers like %sudo
ALL=(ALL:ALL) ALL.
– Configuring Password Policies
• Enforce Strong Passwords
Use tools like password to enforce password complexity rules. In AIX, configure
password policies in /etc/security/user. For Linux, use pam_pwquality in
/etc/security/pwquality.conf to enforce length, complexity, and reuse limits. See
Example 5-1.
Chapter 5. Managing Workloads on IBM Power Virtual Server for IBM AIX and Linux deployments 157
158 Power Virtual Server for AIX and Linux
6
6.2 Secure automated backup with Compass for AIX and Linux
IBM Cloud Partner Cobalt Iron provides an automated backup offering for AIX and Linux
instances of IBM Power Virtual Server. The backup offering is called Secure Automated
Backup with Compass referred hereafter as “Backup Offering.” The Backup Offering is
powered by Cobalt Iron Compass and is accessible from the IBM Cloud Catalog.
The Backup Offering provides enterprise-class backup and restore features in a cloud-centric
SaaS solution. Compass capabilities and security features, along with many other security
functions provides protection and self-assessments to protect enterprise data and
applications.
Cobalt Iron Compass protects various platforms, applications, and data classes. The Backup
Offering includes the following unique features and functions:
1. AIX operating systems
– File-level backup and restore
– Image-level backup and restore
– Policy management down to the directory and file object or type levels
– Back up and archive features that include long-term retention of data
2. Linux on Power operating systems
– File-level backup and restore
– Image-level backup and restore
– Policy management down to the directory and file object or type levels
– Back up and archive features that include long-term retention of data
3. Db2 on AIX databases
– Db2-integrated backup and restore of Db2 databases
– Db2-integrated archive logging of Db2 databases
4. Oracle on AIX databases
– RMAN-integrated backup and restore of Oracle databases
– RMAN-integrated archive logging of Oracle databases
– Support for Oracle Automated Storage Management (Oracle ASM) features
The Backup Offering provides various integrated security and operational features including:
Alerting, notifications, and ticketing features and integration
Automated auditing and validation of backup server landscape
Backup server automation that includes hands-free automation of all backup server tasks
Centralized policy management
Complete governance
Data reduction through compression and deduplication
Data replication across regions in IBM Cloud
Encryption of data in all phases from in-transit, to-storage, and at-rest
Extensive support for encryption, data immutability, and other security access controls
Multi-tenancy and unlimited sub-organizations
Role-based access control management.
Note: The Backup Offering is not currently applicable to the IBM i environment in Power
Virtual Server.
You can use the Backup Offering to back up your AIX and Linux virtual server instances in
IBM Cloud Power Virtual Server. To deploy the Backup Offering, complete the following steps:
1. From the IBM Cloud catalog, provision the Backup Offering for your account for a region.
2. Attach the Power Virtual Server workspace that you want to enable for backup zones to
the IBM Cloud Transit Gateway.
3. Access the Cobalt Iron Commander graphical interface to download the software and
install the agent inside the virtual machines.
4. Define the fine granular backup policies for your virtual server instances, files, and file
systems.
It is highly recommended that you refrain from deploying any additional resources to Backup
Offering VPC. The Backup Offering VPC is the managed backup server instance that is
deployed when the Backup Offering is provisioned.
Upon deployment of the backup server instance, an automation process creates the
following:
A local Transit Gateway if it does not exist
A VPC for exclusive use of the backup activity
A VPE for each of the backup servers
Security group with inbound rule, address prefix, and subnet.
The Backup Offering VPC and the Power Virtual Server workspaces are required be present
in the same region and connected by using the local Transit Gateway. You can connect your
on-premises workloads to the Transit Gateway through a Direct Link connection. Alternatively,
a VPN connection will work the same and is equivalent to a Direct Link connection.
6.2.3 Pricing
When you use the Backup Offering, you are billed monthly through IBM Cloud for amount of
data backed up for the region at an hourly rate. For current pricing see Cobalt Iron Pricing.
Connectivity between Power Virtual Server instances and the backup servers is established
via a Transit Gateway connection to the backup VPC. Name resolution for the backup server
connections is also required. You can accomplish this using the agent system's /etc/hosts file,
or by adding CNAME entries to your agent system's DNS server. These elements need to be
deployed in your account. The Transit Gateway and VPC provisioning and setup happens
through automation when the Backup Offering is provisioned.
DAL10 WDC07
DAL12 WDC06
MAD02 FRA04
MAD04 FRA05
SAO01 SAO04
OSA21 TOK04
SYD04 SYD05
Additional support
Support for the Backup Offering is provided by Cobalt Iron and you need to have login
credentials to Cobalt Iron to access the following:
For issues related to backup and restore, reach out to Cobalt Iron by opening a service
ticket via support URL.
If you encounter an issue that is related to Power Virtual Server or IBM Cloud, see Getting
help and support.
You can use image capture to store VM images within your account (locally) as a part of your
image catalog, directly to IBM Cloud Object Storage, or both.
Importing and exporting images requires a considerable amount of processing power and
network bandwidth. As a result, you can submit only one import or export request before it is
queued. Typically, users import or export system disks (AIX rootvg disks) that are smaller in
size (less than 1 TB) to facilitate the transfer to and from Cloud Object Storage. If your image
size is greater than 1 TB, your transfer might take a long time and be prone to failure. The
maximum uncompressed image size that you can import or export is 10 TB.
Your existing backup software can be combined with the VTL emulation provided by StorSafe
to provide an enterprise level backup and restore solution for your Power Virtual Server
instances, whether they are running AIX, Linux or even IBM i.
StorSafe also supports NFS and SMB interfaces in a NAS environment. AIX and Linux
systems can use StorSafe as an NFS server for applications such as Oracle RMAN or SAP
Hana Studio. You can also store backup files created with the Veeam Agent for IBM AIX on
backup repositories managed by Veeam Backup & Replication (VBR).
FalconStor StorSafe is available as an option in the IBM Cloud catalog. For more information,
see FalconStor StorSafe
Establishing a solid backup and recovery plan for IBM AIX and Linux workloads on IBM Power
Virtual Server is essential to ensure data resilience, regulatory compliance, and business
continuity. By following best practices for scheduling, encryption, multi-site replication, and
retention policies, organizations can protect their data effectively. Leveraging IBM Cloud's
suite of backup solutions-such as IBM Cloud Backup, IBM Spectrum Protect, IBM Cloud
Object Storage, Power Virtual Server snapshots, and DRaaS-enables flexible and scalable
data protection strategies. These solutions provide the tools needed for efficient backup
management and quick recovery, helping organizations minimize downtime and mitigate data
loss in the face of unexpected disruptions.
IBM Power Virtual Server cloud provides a Global Replication Services solution that provides
the replication capability to your workloads by maintaining the benchmarks for Recovery Point
Objective (RPO) and Recovery Time Objective (RTO) as shown in Figure A-1.
Global Replication Services (GRS) uses IBM Storwize® Global Mirror with Change Volumes
(GMCV) asynchronous replication. A Power Virtual Server GRS solution provides access to
IBM Cloud API and CLI to create and manage replication-enabled volumes.
Global Replication Services on Power Virtual Server include the following benefits:
– At the remote site, maintain a consistent and recoverable copy of the data, which is
created with minimal impact to applications at your local site
– Efficiently synchronize the local and remote sites with support for failover and failback
modes, helping to reduce the time that is required to switch back to the local site after a
planned or unplanned outage
– Replicate more data in less time to remote locations
– Maintain redundant data centers in distant locations for rapid recovery from disasters
– Eliminate costly dedicated networks for replication and avoid bandwidth upgrades
Figure A-2 is an example showing the use of GRS between data centers DAL12 and WDC06.
wdc06 dal12
wdc07 dal10
osa21 tok04
syd04 syd05
sao01 sao04
mon01 tor01
lon04 lon06
Appendix A. Global Replication Services solution using Power Virtual Server 171
Supported tier 1 and tier 3 storage controllers are preconfigured to use replication by using
Global Mirror with Change Volumes (GMCV). GRS provides the replication at the storage
level by using GMCV asynchronous replication. When using GMCV, the initial synchronization
copies the entire data from master to auxiliary. After the initial synchronization, only the delta
changes are synchronized with the periodic interval of 500 seconds, which means the
maximum RPO will be 1000 seconds, which is approximately 16–17 minutes.
For every replicated volume that is created, 4 volumes are created across 2 sites as shown in
Figure A-4:
1. Primary volume on site1.
2. Primary change volume on site1 to store the delta changes.
3. Auxiliary volume on site2.
4. Auxiliary change volume on site2 to update the delta changes.
GMCV uses a remote copy consistency group to ensure that the data that is spread across
multiple volumes are consistent while the data is copied to remote sites. Also, it helps to
switch the replication direction during the time of planned and unplanned outages. GRS API
and CLI can be used to create and manage replicated volumes and consistency groups.
For example when using DAL12 and WDC06 data centers enabled to use GRS APIs. If you
are using DAL12 as a primary site, then auxiliary volumes are created on WDC06. And if you
are using WDC06 as a primary site, then auxiliary volumes are created on DAL12. The site
where volumes are created or enabled for replication is the primary site.
After you have the volumes replicated at both primary and secondary, you can use “Disaster
recovery workflow” on page 173 to start the standby VM by using the replicated volumes.
Create a Power Virtual Service instance on each replication enabled site. After you create the
service instances, you can list the instances to find the Cloud Resource Names (CRNs) by
using the ibmcloud pi service-list command.
Appendix A. Global Replication Services solution using Power Virtual Server 173
Figure A-6 shows the steps to enable the replication for your application workload that is
running on the primary site and make it ready to trigger failover and failback.
Figure A-7 shows an AIX VM with volumes (vol1, vol2, and vol3), and after enabling
replication, it creates aux_vol1, aux_vol2 and aux_vol3 on the auxiliary storage. These
volumes are not visible and are managed by the service broker workspace.
Appendix A. Global Replication Services solution using Power Virtual Server 175
The properties of the volume include the following
masterVolumeName
The name of the master volume.
auxVolumeName
Name of the auxiliary volume
auxiliary
if status is true, then the volume is an auxiliary volume. If the value is false, then the
volume is the master volume.
primaryRole
Specifies how the volume is being used.
replicationStatus
If the field is enabled, then the volume is enabled for replication and is active.
mirroringState
Specifies the state of the replication relationship. If the value is consistent_copying, then
the two sites are in sync.
The output of the ibmcloud pi vg <volume-group-id> --long --json command includes the
status of the following properties:
consistencyGroupName
The name of the replication consistency group which is created at the storage level. This
field is the same for a replication consistency group across the two sites.
volumeIDs
Lists the volume IDs in the volume group.
statusDescription
Populated if there are any failures while adding the volumes to the volume group.
status
The current state of the volume group. Status available means it is active. Possible values
are available, error, updating, and creating.
Appendix A. Global Replication Services solution using Power Virtual Server 177
replicationStatus
The replication state of the volume group.
When a volume is part of a replication volume group. The output of the command includes the
group_id and consistencyGroupName fields in the volume group details.
The output of the command to retrieve volume storage details includes the current
consistency group information from the storage back end. See Figure A-14.
cyclePeriodSeconds
Duration in seconds between the start of a remote copy
remoteCopyRelationshipNames
Remote copy relationships that belong to the consistency group
state
The current status of a consistency group, which includes the following possible states:
– consistent_copying
– inconsistent_copying
– inconsistent_stopped
– idling
– idling_disconnected
– inconsistent_disconnected
After the volume group is created, if its current state is consistent_copying, then the volume
data is copied to the secondary site.
Appendix A. Global Replication Services solution using Power Virtual Server 179
Onboarding auxiliary volumes
Although auxiliary volumes are in the backend storage of the secondary site, these volumes
are not managed by the current Power Virtual Server workspace. Configure the auxiliary
volume, so it can be managed and accessed by the cloud user. The onboard operation
requires a source CRN that is used to verify if the remote user has required permissions to
access and onboard the auxiliary volumes. Permissions are based on the owner of the paired
primary volumes. If the user does not have valid permissions, then the onboard operation fails
with an authentication error. Refer to Figure A-16.
As part of the onboard auxiliary volume operation, the required volume IDs are created to
manage the existing auxiliary volumes. If the auxiliary volumes are part of the consistency
group, the onboard operation also creates the volume group IDs to manage the existing
consistency group.
The status field lists whether the onboarding process completed successfully. If the
onboarding completes successfully, the results field lists the onboarded auxiliary volumes.
After completion of the onboard operation, you can view the auxiliary volumes by using the
volume list, or you can retrieve the volume details by using the volume name. Volume IDs and
group ID for the master and auxiliary volume pair are different on the primary and the
secondary sites. However, you can view other fields such as masterVolumeName,
auxVolumeName, and consistencyGroupName.
Figure A-19 and Figure A-20 on page 182 show the volume and the volume group details that
are created after the onboard operation.
Appendix A. Global Replication Services solution using Power Virtual Server 181
Figure A-20 Ibmcloud list volume information json format
You can use the existing commands to provision and attach volumes. For more information,
see ibmcloud pi instance-create and ibmcloud pi volume-attach.
If a site is down, then no new replication operations are allowed. Access existing workloads
by powering on the standby VM and auxiliary replication volumes from the secondary site
after giving them read access.
Appendix A. Global Replication Services solution using Power Virtual Server 183
After the volume group is stopped, the remote copy consistency group changes to a state of
idling, and the replication status is disabled. See Figure A-24
Figure A-24 Viewing the state of the remote copy consistency group
Power on the standby VM and run the instructions to access your application configured on
the auxiliary volumes.
A.4.1 Removing the volumes from the volume group on the primary site
If the volume is a part of any volume group, then remove the volume from its associated
volume group as demonstrated by the following example command:
ibmcloud pi vgu 5bbe734a-7ec6-4f0a-a34e-8bd45fc189ca --remove-member-volume-ids
afd07003-a61a-45ca-97d1-4f910272306d
Figure A-28 Removing a volume from a volume group on the primary site
Appendix A. Global Replication Services solution using Power Virtual Server 185
A.4.2 Disabling the replication of a volume
When you disable the volume replication, this removes the replication relationship and
deletes the auxiliary volume. Use the following command as an example to disable the
volume replication:
ibmcloud pi vola afd07003-a61a-45ca-97d1-4f910272306d –replication_enabled=False
Disabling replication is an asynchronous process. View the volume details to verify that
volume replication is disabled as shown in Figure A-30.
If the volume group is empty, then you can delete the volume group:
ibmcloud pi vgd 96e037e3-9efd-4d6d-90cf-d1f6cc76d6c3
If the auxiliary volume is not deleted from the secondary site, then this volume moves to an
error state because these volumes no longer exist in the storage back end. The error is
triggered by an out-of-band periodic verification over an interval of 24 hours.
Upon a site failure due to a catastrophe, metering is not available from the failed site. The
auxiliary volumes are charged from remote site for its 2x size based on its tier. There is no
replication capability cost for any replication-enabled volume.
A.6 Troubleshooting
This section provides some problem determinations procedures.
A.6.2 Volume group replication status is not in sync across two sites
Examine the storage details of the volume group to check the actual replication status of the
volume group, not the volume group details.
The start and stop operation on the volume group updates the replication status of the volume
group on the site from where the start and the stop operations are performed, but it does not
update the replication status of the corresponding volume group on the other site.
A.6.4 The update on a volume group is not working as its status is in error
state
You can perform a reset operation on the volume group. This action does not change the
replication status but sets its status to available so that updates can be performed on the
volume group.
This action does not clear the errors field from the volume group. The next successful update
operation resets this field.
Appendix A. Global Replication Services solution using Power Virtual Server 187
A.6.5 Determining which volume is defined as primary for a volume group
Retrieve the storage-details of a volume group and check the primaryRole field. A master
value indicates that master volumes are playing the primary role.
A.6.7 Adding more volumes to a volume group after the onboarding operation
Add volumes to the volume group on the primary site and then onboard the volumes on the
secondary site.
A.6.8 Deleting a volume from one site but not from the other site
The replicated volume that is managed on its corresponding remote site moves to an error
state in an interval of 24 hours. Any operation on this replicated volume fails except a delete
operation.
Delete the volumes from the primary site. Otherwise, master volumes are charged when you
delete the auxiliary volume but fail to delete the master volume.
A.7 References
IBM Power System Virtual Servers API Reference
https://cloud.ibm.com/apidocs/power-cloud
IBM Power System Virtual Servers CLI Reference
https://cloud.ibm.com/docs/power-iaas-cli-plugin?topic=power-iaas-cli-plugin-power-iaas-
cli-reference
This appendix is intended to provide a high-level guide to some of the planning tasks that
need to be addressed as you develop your migration plan. It is not intended to be
comprehensive but is a starting point.
If you would like additional assistance in planning your move to Power Virtual Server, there
are many services available from IBM and IBM business partners to help you build and
execute a plan for your migration. For further details see this IBM Cloud document.
These are just some examples of the things you need to consider. IBM has several offerings
available to help you build a migration plan. For more information see IBM Technology Expert
Labs.
B.3 Sizing
Sizing your workload to determine the configuration of your Power Virtual Server Virtual Server
Instance consists of two distinct components: sizing the compute requirements (CPU and
memory) and sizing the storage requirements.
CPU Cores
When sizing for CPU, size for typical LPAR processor utilization, not the maximum allocation.
Remember to not include any Virtual I/O Server (VIOS) LPARs in your sizing. Sizing on Power
Virtual Server often saves from 25%-50% of CPU compared to your existing on-premises
utilization as Power Virtual Server doesn't need the control plane and capacity headroom.
If you are not currently running on Power10 based servers, then you will need to convert the
CPU numbers on your existing IBM Power technology to the IBM Power10. You can use a loose
estimate. Optimize Cores by LPAR loosely based on the numbers in Table B-1.
Memory sizing
Memory is charged on allocated memory at the LPAR, not on the memory utilization shown
by the operating system. In general, the memory size for your Power Virtual Server LPAR will
be the same as your current implementation. Reminder that if you allocate more than 64 GB
of memory per core, then there is an additional charge for the memory. Avoid this 1.5x
memory premium if possible.
Storage tiers can be mixed as appropriate. The storage tier of a LUN can be dynamically
changed.
Storage sizing
Right-size storage volume sizes based on utilization. Aim for 70-75% utilization of allocated
storage on your volumes. This means that if you have a volume allocated at 20 TB with only
30% utilization, then it can be optimized to 10TB.
The publications listed in this section are considered particularly suitable for a more detailed
discussion of the topics covered in this book.
IBM Redbooks
The following IBM Redbooks publications provide additional information about the topic in this
document. Note that some publications referenced in this list might be available in softcopy
only.
IBM Power Security Catalog, SG24-8568
SAP HANA on IBM Power Systems Virtual Servers: Hybrid Cloud Solution, REDP-5693
Introduction to IBM Power Virtual Server Private Cloud, REDP-5745
IBM Power Systems Virtual Server Guide for IBM i, SG24-8513
You can search for, view, download or order these documents and other Redbooks,
Redpapers, Web Docs, draft and additional materials, at the following website:
ibm.com/redbooks
Online resources
These websites are also relevant as further information sources:
IBM Power System Virtual Servers API Reference
https://cloud.ibm.com/apidocs/power-cloud
IBM Power System Virtual Servers CLI Reference
https://cloud.ibm.com/docs/power-iaas-cli-plugin?topic=power-iaas-cli-plugin-power-iaas-
cli-reference
SG24-8512-01
ISBN
Printed in U.S.A.
®
ibm.com/redbooks