The present invention generally relates to software configuration, and more particularly relates to cross-configuring software with reusable software cross-configuration modules.
Cloud computing platforms and virtualization technologies enable the provisioning of computing utilities as a service. This includes, but is not limited to, infrastructure-as-a service (IaaS), platform-as-a-service (PaaS), or software-as-a-service (SaaS). Software providers, solution providers, and end-users commonly use pre-packaged software solutions that are provided as virtual images. These virtual images are pre-packaged with software that exposes a set of configuration parameters specific to certain software packages. The pre-packaged software is referred to as a composable software bundle (bundle) and represents a cloud independent description of software that captures those aspects needed to install and configure it in a virtual appliance/machine (VM). This description allows the bundle to be used to support image construction for multiple target cloud platforms. However, many distributed software applications require multiple virtual images for deployment and provisioning. Therefore, software on one virtual image generally needs to be cross-configured with software on another virtual image. Conventional configuration methods usually require a human to manually cross-configure software across multiple virtual images and even within the same virtual image. Manual cross-configuration of software is very time consuming, costly, and error prone.
In one embodiment, a computer program storage product for creating a cross-configuration software module for cross-configuring software entities is disclosed. The computer program storage product comprises instructions configured to perform a method. The method comprises obtaining a first set of requirements and at least a second set of requirements. Each of the first and second set of requirements identify at least one set of software entities required to be present on at least one system comprising software entities to be cross-configured. At least one set of operations is obtained. The at least one set of operations comprises at least one executable instruction that configures at least a first software entity with at least a second software entity. A first configuration definition is generated comprising at least the first set of requirements and the at least one set of operations. A second configuration definition is generated comprising at least the second set of requirements. The first and second configuration definitions are stored within a cross-configuration software module. The software configuration module cross-configures software entities within systems satisfying the set of requirements in the first and second configuration definitions.
In another embodiment, a computer program storage product for creating a cross-configuration software module for cross-configuring software entities is disclosed. The computer program storage product comprises instructions configured to perform a method. The method comprises retrieving a semantic representation of a set of systems capable of utilizing the cross-configuration software module. A functional representation of a set of operations is retrieved. Each operation in the set of operations is to be performed on a set of software entities associated with the set of systems during at least one connector life-cycle phase in a set of connector life-cycle phases. The set of operations cross-configure at least a first of the set of software entities with at least a second of the set of software entities. A set of artifacts comprising at least one of a set of metadata and a set of executable instructions associated with the set of operations are identified. The semantic representation, the functional representation, and the set of artifacts, are stored in the cross-configuration software module.
In yet another embodiment, a computer program storage product creating a virtual system pattern is disclosed. The computer program storage product comprises instructions configured to perform a method. The method comprises receiving a selection of at least one system comprising a set of software entities. A plurality of cross-configuration software modules is identified. Each cross-configuration software module comprises at least two configuration definitions each comprising at least a set of requirements and identifying at least one software module to be cross-configured. The set of software entities of the at least one system is compared to the set of requirements for each of the plurality of cross-configuration software modules. At least one of the plurality of cross-configuration software modules having the set of requirements being satisfied by at least two of the set of software entities of the at least one system is identified. The at least two software entities are automatically cross-configured based on the at least two configuration definitions of the at least one identified cross-configuration software module.
In yet another embodiment, a system for creating a cross-configuration software module for cross-configuring software entities is disclosed. The system comprises a memory and a processor that is communicatively coupled to the memory. A connector creation tool is communicatively coupled to the memory and the processor. The connector creation tool is configured to perform a method. The method comprises obtaining a first set of requirements and at least a second set of requirements. Each of the first and second set of requirements identify at least one set of software entities required to be present on at least one system comprising software entities to be cross-configured. At least one set of operations is obtained. The at least one set of operations comprises at least one executable instruction that configures at least a first software entity with at least a second software entity. A first configuration definition is generated comprising at least the first set of requirements and the at least one set of operations. A second configuration definition is generated comprising at least the second set of requirements. The first and second configuration definitions are stored within a cross-configuration software module. The software configuration module cross-configures software entities within systems satisfying the set of requirements in the first and second configuration definitions.
The accompanying figures where like reference numerals refer to identical or functionally similar elements throughout the separate views, and which together with the detailed description below are incorporated in and form part of the specification, serve to further illustrate various embodiments and to explain various principles and advantages all in accordance with the present invention, in which:
Operating Environment
Configuring software components/products on systems (e.g., virtual images, virtual appliances/machines, etc.) to work together can be challenging since system builders cannot anticipate at construction time how a system is to be used in a composite of systems. For example, configuring systems to deploy a distributed software application may require the installation of software components, installation scripts, and configuration scripts on one or more systems. The installation or configuration scripts on a particular system may require specific configuration parameters from configuration scripts on another system to be functional (such as the hostname or IP address). This requires a coordinated activation mechanism to customize the software on each system and propagate configuration parameters across systems.
Therefore, the cross-configuration of systems is a challenging task requiring numerous steps on all systems that need to be connected and configured. Conventional configuration mechanisms are mostly a set manual steps following some best practices. Software or solution experts manually configure each system that is part of the composition or by using pre-defined configuration scripts. This implies copying software artifacts, installation and configuration scripts to each system after its deployment; orchestrating the execution the required configuration scripts and ensuring that configuration parameters are set correctly. These manual steps are a key problem and increasing cost factor because of the inherent lack or re-use of systems, especially in large enterprises. The scalability of the manual approach is very low and it leads to non-repeatable installation and configuration procedures. Moreover, in virtualization environments numerous configuration parameters are only available when a virtual image has been deployed (such as the hostname that may be dynamically assigned). This requires the expert to manually enforce a certain startup order to be able to get certain configuration values. This is a time consuming task and repetitive task because it has to be done on each deployment of the application.
Therefore, one or more embodiments provide an operating environment 100, as shown in
The server system 108 includes, for example, an interactive environment 110 for designing, creating, and deploying connectors 112 for cross-configuring software entities 114 (also referred to herein as “software components/products”) present on or associated with one or more systems 116, 118. A connector 112 (which is also referred to herein as a “cross-configuration connector”, a “configuration connector”, and a “cross-configuration software module”) represents a self-contained software package that automatically configures a software component(s)/product(s) 114 present on (or associated with) a given system 116, 118 for operation/interaction with another software component(s)/product(s) 114 present on (or associated with) another system 116, 118 (or within the same system). In one embodiment, the interactive environment 110 is the same as, part of, or separate from an environment/tool for designing and creating the systems and their software components/products. For example, the interactive environment 110 can be the same as, part of, or separate from an environment/tool for creating, designing, and/or deploying composable software bundle assets and virtual image assets. Examples of these environments/tools are given in the commonly owned U.S. application Ser. No. 13/036,588 entitled “Designing and Building Virtual Images Using Semantically Rich Composable Software Image Bundles”, and the commonly owned U.S. application Ser. No. 12/895,461, entitled “Semantically Rich Composable Software Image Bundles”, which are hereby incorporated by reference in their entireties.
Users of the user systems 104, 106 interact with the interactive environment 110 via a user interface 120, 122 or programmatically via an API. It should be noted that separate users systems are not required and a user can interact directly with the server 108 itself via a user interface at the server 108. Examples of a user interface are a web page, mashup, graphical user interface (GUI), a command line, etc.
The interactive environment 110, in one embodiment, comprises at least a connector design/creation tool 124, a connector searching module 126, and a virtual system pattern (VSP) design/creation tool 128. The connector design/creation tool 124 enables users to define and publish reusable connectors 112. Connectors 112, in one embodiment, are stored in a connector repository 130, which can be separate from or reside within the server 108. The connector searching module 126, in one embodiment, identifies connectors 112 from the repository 130 that can be used to cross-configure one or more systems 116, 118, as will be discussed in greater detail below. These identified connectors 112 can be automatically applied to the selected systems 116, 118 (by the interactive environment 110) or can be presented to a user via the user interface 120, 124 who can then select one or more of the connectors 112 to be applied to the systems 116, 118. Connectors 112 and their components are discussed in greater detail below.
A “system” capable of being cross-configured refers to any entity/environment on which one or more software components/products are present or coupled to. For example,
One example of a software component/product (also referred to herein as a “software entity”) is a software bundle 114. A software bundle is a cloud independent description of software that captures those aspects needed to install and configure it in a virtual machine. This description allows the bundle to be used to support image asset construction for multiple target cloud platforms. The metadata for each bundle describes one or more of: (1) the software's requirements and capabilities to ensure valid composition; (2) the install steps that need to be executed and their parameters as part of a virtual image build life-cycle phase; (3) the deploy time configuration steps that need to be executed and their parameters as part of a virtual image deploy life-cycle phase (4) the deploy time configurations that can be made with external software via virtual port definitions; and (5) the capture time cleanup steps that need to be executed and their parameters as part of a virtual image capture life-cycle phase. The metadata can comprise references to specific artifacts: scripts, binaries, response files, etc. These can be local references (the artifacts are contained in the bundle) or remote references (to a remote repository). It should be noted that other virtual image life-cycle phases such as, but not limited to, a start phase can be supported as well.
It should be noted that even though
Cross-Configuration Connectors
A connector 112, in one embodiment, represents a self-contained software package including semantic and functional model, artifacts, and scripts including, but not limited to, installation and configuration scripts. Connectors 112 comprise a set of endpoints that identify and describe the system(s) 116, 118 capable of being cross-configured by the connector 112. In one embodiment, these endpoints are represented as endpoint definitions comprising requirements on the systems in terms of software bundles to be installed on the instance of that system, specific software products to be installed on the system, operation system requirements, and hardware requirements.
The connectors 112 are advantageous because they provide separation of concerns and simplicity of use by encapsulating the connector logic into a reusable package. The packaging, in one embodiment, can be performed by a skilled specialist that has an in-depth understanding of the systems that can be connected. The resulting connector is made available for reuse by non-specialists. Connectors 112 enable standardization within an organization by leveraging standardized components such as bundles, virtual images, virtual appliances, and/or virtual system patterns (a composition of virtual images (or machines) bundles, and a connector(s)) more as basic building blocks. All of these components follow the same underlying modeling principles by having a semantic and functional topology that represents the semantically rich metadata. Connectors 112 can be re-used because they do not depend on a system, but depend on the endpoint software (i.e., the software that is installed/present on the system). Connectors 112 do not dictate the actual deployment topology. A connector 112 can be used to cross-configure software on single system as well as on different systems. Connectors 112 can be defined in a fine granular way. Multiple connectors 112 can be used to connect the same system to allow fine granular methods of encapsulating cross-configuration knowledge within a connector 112.
The design/creation tool 124 of the interactive environment 110 enables users to create a connector 112 by specifying endpoint definitions, their requirements on software bundles, software products and operating system requirements, as well as hardware requirement. The design/creation tool 124 also allows a user to specify installation and configuration operations that are executed as part of the connector execution at system activation time. Users are further able to specify parameter propagation from different endpoint definitions. These parameters can be configuration parameters of software bundles that are present at an endpoint or parameters of other configuration operations defined in the endpoint definition. These parameters may be required as input in the connector configuration scripts. Connectors 112 can be applied and executed at runtime in different virtualization environments. In this embodiment, the required software artifacts defined in a connector 112 for each endpoint are packaged and transferred it to the corresponding virtual image 116 (or virtual appliance 118) that matches the connector endpoint definition requirements. In addition, the necessary activation logic that can execute the connector installation and configuration upon creation time of the virtual image 116 is also generated.
In one embodiment, a connector 112 cross-configures systems by “connecting” to each of the selected systems and automatically configuring software components/products on one system with software components/products on another system (or the same system). Stated differently, a connector 112 connects two or more software components/products on one or more systems for cross-configuration purposes. For example,
As part of the cross-configuration logic, in this example, the connector 302 creates the appropriate data source configuration for the Web Application 308. For example, the connector 302 installs the database driver on the Application Server 310 and creates a special property file that instructs the Web Application 308 to use the Database 312 on the second virtual appliance 306. The connector 302 also propagates the hostname and port of the Database 312 to the Application Server 310. With respect to the database 312, the connector 302 creates the Database 312 and populates the database 312 with the database schema and initial data. It should be noted that these are only examples of configuration operations performed by the connector 302.
The requirements 332, 334 associated with an endpoint definition 328, 330 comprise one or more of software bundle requirements, software product requirements, operating system (OS) requirements, and hardware requirements. Software bundle requirements express requirements on zero or more software bundles that need to be present on a system 116, 118 that is being coupled to the connector 302. Software bundle requirements comprise a universal identifier associated with each required bundle. The universal identifier includes a name and a version of a given software bundle. The universal identifier ensures that a software bundle can be referenced in a unique way across different bundle repositories. An example of universal identifier for a software bundle is com.mysql.mysql-server—1.0.0, which universally and uniquely identifies a MySQL bundle with version 1.0.0. The specification of software bundle requirements can use different constraints to restrict the version of the bundle such as, but not limited to, version range constraints, constraints specifying a lower or upper bound of a specific version, or regular expressions of versions.
Software product requirements express requirements on zero or more software products that are present on a system to be coupled to the connector. One example of a software product requirement is “Software Product A v5+”, which indicates that Software Product A with version 5 or higher needs to be present on a system 116, 118 being coupled to the connector 302. Operating system requirements express requirements on the operating system for a system 116, 118. This requirement is important because a connector 302 may install software that can only run on a specific platform (such as Linux RHEL v5+). Although software bundles also express requirements on the OS, these bundles might be written to support a variety of operating systems. By including OS requirements in each endpoint definition of the connector, the operating systems can be restricted to what is supported by the connector 302, installation scripts, and or configurations scripts.
Hardware requirements express requirements on a system to be coupled to the connector. One example is a requirement on the system processor speed indicating the minimum speed of the processor unit. Other examples are RAM size, available disk space, or speed of the network interface card (NIC). For example, a connector may install a software product that requires at least 4 GB or hard disk space to successfully operate.
Capabilities 336, 338 formally describe the software that is installed by the connector 302 on a particular system 116, 118 that matches the endpoint definition requirements 332, 334. Capabilities 336, 338 are included within an endpoint 328, 330 if the connector 302 requires additional software to be installed for configuring software components/products on a connected system 116, 118. This software constitutes a capability that will be installed on the system that satisfies the given endpoint definition's s requirements. Capabilities 336, 338 are identified by product identifier, a version, and a vendor name. It should be noted that in some instances a system 116, 118 coupled to the connector 302 may already include the software identified in a capability 336, 338. In this situation the software identified by the capability 336, 338 does not need to be installed on the system 116, 118.
For example, the requirements 332 of the first endpoint definition 328 can be the Application Software Bundle 310, Operating System A (e.g., Linux), and Hardware Requirement A (e.g., Intel Server) while a capability 336 can be the Web Application Software Bundle 308. In this example, the first virtual appliance 304 comprises these software bundle, OS, and hardware requirements and, therefore, can be connected to connector 302 at the first endpoint definition 332. In one embodiment, if the first virtual appliance 304 does not already include the Web Application Software Bundle 308, the connector 302 installs the Web Application Software Bundle 308 on the respective image 305 of the first virtual appliance 304 using one or more artifacts 340 such as software binaries, installation scripts, etc. for the Web Application Software Bundle 308. However, the connector 302 is not required to install this bundle 308. If the first virtual appliance 304 already comprises the Web Application Software Bundle 308 it does not need to be reinstalled unless the capability identifies a given version not present on the first virtual appliance 304.
With respect to operations 344, 346, an operation provides implementations of the logic that should be executed at specific life-cycle phases of the connector. In particular, operations can include logic to install software on a system 116, 118 and logic to configure the software. Operations are ordered and can be associated with parameters. Operation parameters can be associated with a name, label, description, a set of default values, or other items. Operations can further be assigned to execute in a specific stage of the connector life-cycle, which phases are used to model different lifecycles of the connector 302. Examples of connector lifecycle phases are a Connector_Install phase and Connector_Config phase. These phases are respectively used by the underlying execution environment of a system 116, 118 to install software on deployment and configure the installed software upon activation time. The Connector_Install phase defines how software is installed on the system 116, 118 matching a corresponding endpoint definition 328, 330 of the connector at deployment time. The deployment time is the time when a connector is instantiated (i.e., its life-cycle phases are executed) as part of a virtual system patterns execution. In one embodiment, the installation phase has at least one user defined script and zero or more parameters. The user defined script(s) is the entry point of the installation and performs all required steps to complete the installation of software (capabilities) on the endpoint. A connector 302 comprises a Connector_Install lifecycle phase for each endpoint definition 328, 330.
The Connector_Config phase defines how software is configured after the Connector_Install phase. An endpoint definition 328, 330 can include zero or more configuration operations 344, 346. Each operation 344, 346 defines at least one configuration script and a number of artifacts that it might need. A configuration script includes zero or more configuration parameters. The parameters to a script are either input or output parameters. The values of an input parameter can be user supplied and/or propagated from another parameter in a connected endpoint, the other connected endpoint, and/or a software bundle that is specified in the requirements 332, 334 of the endpoint definitions 328, 330 in the connector 302. Output parameters are produced by the script. The value of an output parameter can be propagated to any other parameter in the same connected endpoint, the other connected endpoint, and/or a software bundle that is specified in the requirements 332, 334 of the endpoint definitions in the connector 302. Additionally, parameter propagations between software bundles can be expressed as well. This allows a parameter to be passed from one software bundle to other software bundles, irrespective of whether they reside on the same system 116 or different systems 116, 118. This avoids a configuration operation being defined just to read the source parameter and assigning it to the target parameter.
As discussed above, the connector 302 can install additional software or configure software. Therefore, in some situations various ports such as a firewall port may need to be opened in the underlying execution environment to allow the cross-configured software to function properly (such as a cloud infrastructure that closes most of the ports by default). Therefore, the connector 302 can comprise a configuration operation that opens needed ports and also propagates port information to one or more software bundles.
The components of the endpoint definitions 328, 330 of a connector are captured by the design/creation tool 124 using semantically rich metadata. For example, the design/creation tool 124 defines the structure of a connector in a semantic model (describing the what). The lifecycle operations are defined in a functional model (describing the how). In particular, the semantic topology/model of the connector describes both endpoints and, therefore, comprises two server units, two operating systems, and the software (capabilities) that is being installed as SoftwareInstall units. Consider a connector 112 that is being built for cross-configuring two software bundles, Software Bundle A (a web application) and Software Bundle C (a database). The topologies/models (both semantic and functional) for each of these bundles are shown in
The semantic model 502 shown in
As shown above, a connector provides the ability to connect two or more software components/products on a system(s) for cross-configuration purposes. Connectors use the notation of an endpoint definition to define where (on which system) specific configuration steps are to be executed. Generally, a connector can comprise software and configuration scripts, define requirements and capabilities, and install other artifacts that are specific to one endpoint definition. Connectors are decoupled from specific software components that are installed on virtual appliance to allow a better reusability. Connectors only encapsulate configuration logic that is specific for cross-configuring two separate software bundles. Connectors are not dependent on the system itself because requirements for an endpoint are defined on a bundle and product level only. Connectors can be used independently whether the bundles are placed on the same or different virtual image.
Creating A Cross-Configuration Connector
The following provides an illustrative example of creating a connector 112. As the user interacts with the connector design/creation tool 124 various windows are displayed to the user via the user interface 120. It should be noted that although
In
On the Petclinic endpoint there are two tasks. The first task is to install the MySQL connector JAR file and the second task is to perform a configuration operation that creates the jdbc.properties file in the Petclinic application that is deployed on the Tomcat application server. Therefore, the user needs to define installation and configuration operations/scripts for the Petclinic endpoint. Specifying installation and configuration operations/scripts on endpoints means that configuration is performed on each of endpoint at deployment time. It is also possible that only one endpoint needs configuration whereas the other endpoint does not. Each installation and configuration script can have 0 . . . * parameters that need to be specified and defined by the connector creator. These parameters can either be queried from the user upon deployment or they can be mapped from a parameter of a bundle on one of connected systems or a depending connector configuration operation. This is defined as a parameter propagation rule that is resolved at deployment time.
As discussed above, the Petclinic Application also has a configuration task, which creates the jdbc.properties file in the Petclinic application that is deployed on the Tomcat application server. This configuration operation is defined by the user via a “Configuration” window (not shown) of the design/creation tool 124. The process for defining a configuration operation is similar to the process for defining an install operation, as discussed above with respect to
For example,
Similar operations can be performed for defining/specifying installation and configuration operations for the MySQL endpoint. However, in this example, the MySQL endpoint does not require installation or configuration operations. It should be noted that for each endpoint definition representing an endpoint (e.g., a system that is capable of connecting to the connector), optional firewall rules can be specified using the design/creation tool. Firewall rules may be necessary because the cross-configuration might require a specific port to be open. For example, a database that is accessed from another host needs to have the port open, which is generally not the case when accessing it from the local machine via a named pipe). At deployment time, the ports identified in a firewall rule are opened on the underlying system that matches the corresponding endpoint definition. Licenses can also be specified for a connector to ensure that the user accepts them at deployment time. This may be necessary because a connector can install additional software as part of the installation phase.
Once the user has finished entering the information shown in
Connector Matchmaking and Deployment
The cross-configuration connectors discussed above can be used in different contexts and environment. One use case for connectors is in the modeling and deployment of complete application topologies (i.e., virtual system patterns) using virtualization technologies. These application topologies can require complex cross-configuration for successful provisioning. In one embodiment, these application topologies can be modeled visually allowing a user to connect different pre-built virtual images (or appliances) by using a set of available connectors.
When creating a virtual system pattern, the connector searching module 126 identifies one or more connectors 112 from the connector repository 130 that can connect two systems 116, 118 such as (but not limited to) virtual images and virtual appliances selected by the user. In another embodiment, the connector searching module 126 identifies one or more systems 116, 118 that can be connected to a selected connector 112. The connector searching module 126 identifies systems 116, 118 that satisfy the requirements 332, 334 of the connector endpoint definitions, as discussed above. For example, the connector searching module 126 determines the capabilities of the underlying virtual images (i.e., the software bundles and their versions) and compares these capabilities against the requirements 332, 334 (bundle requirements, software products requirements, operating system requirements, and/or hardware requirements) of the connectors 112. When a successful match is identified, the given connector(s) 112 are displayed to a user via the user interface 120, 122. A selection is received from the user of or more of the matching connectors 112. The software entities (e.g., components such as software bundles 114) identified by each of the selected connectors 112 are then automatically cross-configured by the selected connectors 112.
The following provides a more detailed example on deploying a connector 112. When a successful match is identified by the searching module 126, the given connector 112 can be used to connect the systems 116, 118. After determining what connectors 112 are useable, a deployment component can initiate the deployment of a connector 112. Deployment of a connector 112 comprises the installation of the necessary software artifacts (if present) on the connected system(s) (e.g., the virtual image(s) determined in the matchmaking phase). Deployment also comprises the generation of the necessary activation scripts to invoke the connector configuration scripts. The generation of activation artifacts is specific to underlying activation mechanism supported by the target virtualization environment.
Two different modes of deployment can be used, Deployment using Capture and On-demand Deployment. In the Deployment using Capture mode, a connector 112 is deployed on the systems 116, 118 when these systems are built by a system builder (e.g., a virtual image builder). The connector artifacts 340, 342 are installed and configured on the corresponding systems that match the endpoint definition requirements 332, 334. In case of a connector 112 with two images, these can be either on the same virtual image or on two separate images. The connector installation artifacts (software+scripts) are installed before the image is captured and the necessary activation scripts are generated to invoke the connector configuration scripts. This allows correct activation of the connector configuration upon deployment of the virtual image. After the installation, the systems 116, 118 can be captured by using the underlying capture mechanism of the target virtualization environment. Connectors 112 can also have deployment parameters that allow user to configure certain software components. The target virtualization environment should provide appropriate support for querying those parameters from the user and also pass those parameters to the underlying activation mechanism of the systems. In addition, connectors 112 may enforce a specific startup order that needs to be enforced by the virtualization environment to enable proper activation.
With respect to the On-demand Deployment mode, capturing the systems is not required. Connector artifacts 340, 342 are transferred to the systems 116, 118 to enable installation and configuration upon activation time. This involves the execution of the installation as well as the configuration scripts upon activation of the systems. Thus, activation artifacts are generated for the installation and configuration scripts and the correct order of execution is ensured. Similar to the Deployment using Capture mode, connector deployment parameters may need to be supported and a specific startup order may need to be enforced.
The connector design/creation tool 124, at step 1506, obtains at least one set of configuration operations. The at least one set of configuration operations comprises at least one executable instruction/script that configures at least a first software entity with at least a second software entity. It should be noted that installation operations comprising at least executable instruction/script can also be obtained. Also, each script can take a set of parameters. The script command, parameter style, executing user, artifacts that a script requires, and dependencies between scripts and parameters can also be obtained as well.
The connector design/creation tool 124, at step 1508, generates a first configuration definition comprising at least the first set of requirements and the at least one set of configuration operations, and a second configuration definition comprising at least the second set of requirements. In addition, each of the configuration definitions can also include/identify software products that each definition installs, firewall rules, and license agreements. The connector design/creation tool 124, at step 1510, stores the first and second configuration definitions within a cross-configuration software module, wherein the software configuration module is usable by systems 116, 118 satisfying the set of requirements in the first and second configuration definitions for cross-configuring software entities. The control flow then exits at step 1512.
Cloud Environment
It is understood in advance that although the following is a detailed discussion on cloud computing, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, various embodiments of the present invention are capable of being implemented in conjunction with any other type of computing environment now known or later developed. For example, various embodiments of the present invention are applicable to any computing environment with a virtualized infrastructure or any other type of computing environment.
For convenience, the Detailed Description includes the following definitions which have been derived from the “Draft NIST Working Definition of Cloud Computing” by Peter Mell and Tim Grance, dated Oct. 7, 2009, which is cited in an IDS filed herewith, and a copy of which is attached thereto. However, it should be noted that cloud computing environments that are applicable to one or more embodiments of the present invention are not required to correspond to the following definitions and characteristics given below or in the “Draft NIST Working Definition of Cloud Computing” publication. It should also be noted that the following definitions, characteristics, and discussions of cloud computing are given as non-limiting examples.
Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
Characteristics are as follows:
On-demand self-service: a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
Broad network access: capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
Resource pooling: the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
Rapid elasticity: capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Measured service: cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
Service Models are as follows:
Software as a Service (SaaS): the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS): the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
Infrastructure as a Service (IaaS): the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
Deployment Models are as follows:
Private cloud: the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
Community cloud: the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or by a third party, and may exist on-premises or off-premises.
Public cloud: the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
Hybrid cloud: the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure comprising a network of interconnected nodes.
Referring now to
In cloud computing node 1800 there is a computer system/server 1802, which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 1802 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
Computer system/server 1802 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types. Computer system/server 1802 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices.
As shown in
Bus 1808 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
Computer system/server 1802 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 1002, and it includes both volatile and non-volatile media, removable and non-removable media.
System memory 1806, in one embodiment, comprises the interactive environment 110 (e.g., the connector/pattern design and creation environment) and its components as shown in
Program/utility 1816, having a set (at least one) of program modules 1818, may be stored in memory 1806 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment. Program modules 1818 generally carry out the functions and/or methodologies of various embodiments of the invention as described herein.
Computer system/server 1802 may also communicate with one or more external devices 1020 such as a keyboard, a pointing device, a display 1822, etc.; one or more devices that enable a user to interact with computer system/server 1802; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 1802 to communicate with one or more other computing devices. Such communication can occur via I/O interfaces 1824. Still yet, computer system/server 1002 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 1826. As depicted, network adapter 1826 communicates with the other components of computer system/server 1802 via bus 1808. It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 1802. Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.
Referring now to
Referring now to
Hardware and software layer 2002 includes hardware and software components. Examples of hardware components include mainframes, in one example IBM® zSeries® systems; RISC (Reduced Instruction Set Computer) architecture based servers, in one example IBM pSeries® systems; IBM xSeries® systems; IBM BladeCenter® systems; storage devices; networks and networking components. Examples of software components include network application server software, in one example IBM WebSphere® application server software; and database software, in one example IBM DB2®, database software. (IBM, zSeries, pSeries, xSeries, BladeCenter, WebSphere, and DB2 are trademarks of International Business Machines Corporation registered in many jurisdictions worldwide)
Virtualization layer 2004 provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers; virtual storage; virtual networks, including virtual private networks; virtual applications and operating systems; and virtual clients.
In one example, management layer 2006 may provide the functions described below. Resource provisioning provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment. Metering and Pricing provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses. Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources. User portal provides access to the cloud computing environment for consumers and system administrators. Service level management provides cloud computing resource allocation and management such that required service levels are met. Service Level Agreement (SLA) planning and fulfillment provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
Workloads layer 2008 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation; software development and lifecycle management; virtual classroom education delivery; data analytics processing; transaction processing; and composable software bundle and virtual image asset design and creation.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method, or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention have been discussed above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to various embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
This application is a continuation of and claims priority from U.S. patent application Ser. No. 13/491,241 Attorney Docket No. YOR920120313US1, filed on Jun. 7, 2012, the entire disclosure of which is herein incorporated by reference. This application is also related to the following co-pending applications: U.S. patent application Ser. No. 13/036,588, filed on Feb. 28, 2011, which is a continuation of U.S. application Ser. No. 12/895,461, filed on Sep. 30, 2010; U.S. application Ser. No. 12/476,006, filed Jun. 1, 2009; and U.S. application Ser. No. 12/210,139, filed Sep. 12, 2008. The teachings and contents of all of these related patent applications are hereby incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 13491241 | Jun 2012 | US |
Child | 13800827 | US |