Upload
phungkien
View
232
Download
9
Embed Size (px)
Citation preview
© 2013 IBM Corporation
AIX, PowerVM &PowerHA Software
© 2013 IBM Corporation2
�Strong, stable, non-disruptive roadmap
�Improved Efficiency through Virtualization
�Outstanding Performance
�Innovation through integrated Development
Why AIX is the Premier UNIX® Platform Today
© 2013 IBM Corporation3
POWER4 P690(2002)
List Price ~$3M32 Processors
rPerf – 60.6Weight 1000kg
POWER 710(2010)
List Price ~$11K6 ProcessorsrPerf 76.69
Weight 28kg
=
Power Systems Scalability and Value Growth
© 2013 IBM Corporation4
Networks and network storage
ServiceProcessor
Processors
Memory
Expansion slots
Local devices & storage
CoD
Resources
Power Hypervisor
LinuxPartitions
Virtual Network
AIX5.3
Virtual Processors Virtual Adapters
5.25.2
WPAR
5.35.3
7.17.1
WPAR
VirtualI/O
Server
VirtualNetwork
& Storage
SLICLinuxKernels
AIX 6/7 Partitions
AIXKernels
VirtualI/O
Server
VirtualNetwork
& Storage
IBM i
WPAR
HMC
PowerVM key design points• Designed for high efficiency to provide high overall performance• Designed for high scalability – linear from 1/20 to 256 cores• Designed for isolation to provide security and “no compromise” consolidation • Designed for maximum resource granularity to reduce wasting resources
PowerVM Virtualization Architecture
© 2013 IBM Corporation5 5
IBM*MultipleDevice Drivers
IBM*EMC / HDS / IBM / HPStorage
IBM*Symantec / IBM / EMCBackup / Recovery
IBMCisco, HP, Dell, IBMSystem
IBM*Symantec / Steeleye /
Microsoft / VMware / Red HatHigh Availability
IBM*Red Hat / Novell / SUN /
MicrosoftOS
IBM*Microsoft / Oracle / IBMDataBase
X86 ServersPower
Systems
Processor Intel / AMD IBM
Firmware Phoenix or other IBM
Virtualization VMware / Xen / KVM / Microsoft IBM
Networking Cisco / HP / IBM IBM*
Innovation & Integration: End to End
* Can chose a 3rd party option
© 2013 IBM Corporation6
LOAD BALANCER
500TPS
500 TPS
With Capacity on Demand andPowerVM you can automatically handle the largest workload spikes –without paying for unused capacity
With Capacity on Demand andPowerVM you can automatically handle the largest workload spikes –without paying for unused capacity
500TPS
500TPS
1500 TPS
1500 TPS
1500 TPS
1500 TPS
1500 TPS
1500 TPS
1500 TPS
1500 TPS
PowerVM and Elastic Capacity on Demand
© 2013 IBM Corporation7
Source: IBM Software Group Competitive Study
Wasted Resources
Number of Virtual Servers On the Physical Server
Competitor
5.75
12.806
22.8
31.07
20.04
15.06
9.86
5.22
0
5
10
15
20
25
30
35
1 2 3 4
IBM Power 750
% C
PU
Uti
lizati
on
(32 c
ore
s)
3% CPU overhead
with 2 VMs
11% CPU overhead
with 4 VMs
7% CPU overhead
with 3 VMs
PowerVM Hypervisor is More Efficient than Competition
© 2013 IBM Corporation8
AIX 5200-06 CAPP/EAL4+Application: 01/11/05Final report: 10/26/05Certificate: 12/14/05
AIX 5L 5200-05 andPitbull LSPP/EAL4+
Application :01/11/05
Certificate issued: 05/16/06
AIX 5300-05 LSPP/EAL4+
Pitbull product Supports P5, P4Certificate issued: 12/19/06
Pitbull MLS Ported to AIX 5300-03
Pitbull product available to customers Dec 31, 05
LegendAIX V5.2AIX V5.3
AIX 6AIX 7 VIOS
POWER6POWER7
Certification HistoryAIX 4.2 C2: Apr 24, 1997AIX 4.3 C2: May 6, 19987
AIX 5.2 CAPP/EAL4+ : Nov 4, 2002POWER4 HW CAPP/EAL4+ : Apr 2003AIX 5.2 ML1 CAPP/EAL4+ : Sept 8, 2003AIX 5.2 ML6 CAPP/EAL4+ : Dec 14, 2005
AIX 5.2 ML5 and Pitbull LSPP: May 16, 2006AIX 5.3 TL5 and Pitbull LSPP: May 16, 2006AIX 5.2 TL4 & VIOS CAPP/EAL4+: Dec 16, 2006POWER6: Dec, 2007AIX 6: May 26, 2008
AIX 7: Sept , 2012POWER7: June 2013
POWER6 Hardware EAL4+
Dynamic LPAR with
MicroPartitioning
AIX 6100-00) CAPP/RBACPP/LSPP/EAL4+
MLS capabilities integrated into standard AIX product
One certification for 3 Protection Profiles
Supports P6, P5, P4
2006 20072005
AIX & Power Systems Security Certifications
AIX 7100-00) OSPP Version 2.0
OSPP-Advanced MgmtOSPP – Crypto
OSPP – Integrity VerificationOSPP – Labeled Security
OSPP - VirtualizationSupports P7, P6, P5, P4
2012
AIX 5300-04 CAPP/EAL4+Supports P5, P4Certificate issued: 12/19/06
VIOS EAL4+Included with AIX 53.00-04 CAPP/EAL4+
2013
POWER7 Hardware EAL4+
Dynamic LPAR with MicroPartitioning
© 2013 IBM Corporation9
Virtualization Security
PowerVM hypervisor has never had a reported security vulnerability and provides the bullet-proof security that customers demand for mission-critical workloads
Dare to compare – search any security tracking DB and compare Power against x86
IBM
0 reported security breeches
on the PowerVM hypervisor
© 2013 IBM Corporation10
Unlike x86-based virtualization products, the PowerVM hypervisor is secure by design. IBM is the only vendor that has designed the virtualized
environment from ‘bare metal’ through the hypervisor.
PowerVM hypervisor is part of the digitally-signed firmware with strong
cryptography which makes it very difficult to attack.
There are zero vulnerabilities reported against the PowerVM hypervisor by
US CERT or by MITRE Corporation
PowerVM is certified at a Common Criteria Evaluated Assurance Level 4+
Remember, zero is a number too …a very good number in the Security domain.
PowerVM delivers firmware-based security
© 2013 IBM Corporation11
SAP on Power versus competitive SAP deployments study with over 54,150 clients analyzed
The security for ERP systems, including SAP, can be very challenging – by nature, the mixture of application modules, user profiles, plug-in components and so on, provide many avenues for security breaches
IBM
Source: Business Impacts on SAP Deployments; Solitaire Interglobal Ltd (All rights reserved); January 2013.
0 reported security breeches
with SAP and IBM DB2 or
Oracle DB2 on Power
Security of SAP deployments on Power
© 2013 IBM Corporation12
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
1
10
100
1,000
10,000
Number of Common Vulnerability Exposures per YearSource: NIST - web.nvd.nist.gov/view/vuln/statistics
Linux Kernel
AIX
Common Security Vulnerabilities: AIX versus Linux
© 2013 IBM Corporation13
Scalability beyond x86�Optimization well beyond 4 sockets – up to 256 cores
�Elastic capacity on demand to provide flexible change in capacity
Highly efficient virtualization based on mainframe technology�Allows flexibility to automatically respond to workload changes�Improved IT agility to support new business initiatives
Built-in security�Firmware based hypervisor
�Proprietary operating system features
Availability – avoiding unplanned and planned outages�Mainframe inspired hardware resilience and reliability design
�AIX features designed to isolate and avoid outages
Summary: Why Power versus X86
© 2013 IBM Corporation14
PowerSC provides a security and compliance solution to protect datacenters virtualized with PowerVM enabling higher quality services
Capabilities
Trusted Logging The SVM/VIOS capture all LPAR audit
log information in real time.
Trusted BootBoot images and OS are
cryptographically signed and validated using a virtual Trusted Platform Module
(vTPM)
Trusted Firewall Provide integrated firewall inside of
the virtual network infrastructure
Security Compliance Automation (PowerSC Express)
Pre-built compliance profiles that match various industry standards such as
Payment Card Industry, HIPAA, DOD and Sox/Cobit. Activated and Reported on
centrally using AIX Profile Mgr
�Business Requirements
Compliance automationand reporting
Tamper-proof logs
Defense againsttampering
Integrated networksecurity
Compliance and Audit to
External Standards
Compliance and Audit
Guarantee that the OS has not been hacked or
compromised in any way
Protected tiers of network access
Trusted Network Connect and Patch Management
Detect any system attempting to access the network and determine if it is at the correct security patch and
update level.
Notification ofUnpatched systems
Ensure that every Virtual System has appropriate
security patches
PowerSC Standard Edition
© 2013 IBM Corporation15
Challenge: Prevent malicious users from “covering their tracks.”
Power SC Solution: Move log events to a secure external VM via the hypervisor. Centralized logging ensures that even when virtual machines are discarded the audit logs remain on the central location for audit purposes.
• Discourage malicious activity by ensuring individual accountability; trace actions to authenticated individuals.
• Reduce the time it takes to identify tampering and/or unauthorized changes
• Reduce the time it takes to demonstrate Security Compliance by maintaining strict control over audit logs.
How PowerSC works: •Trusted Logging provides tamperproof secure centralized protection for AIX audit and system logs and is integrated with PowerVM virtualization. •Limited access to the Secure VM to a few privileged super users•Guest VM logs can be managed and backed up from a single location within each physical server. •Log scraping agents and reporting agents can be removed from guest OS.
PowerSC – Trusted Logging
© 2013 IBM Corporation16
Challenge: Ensure that every virtual machine image in your datacenter hasn’t be altered either by accident or maliciously.
PowerSC Solution: Trusted Boot forms the core root of trust for the image, i.e. a foundation for trust. Each stage of the boot process measures the next, starting at the firmware.
• PowerSC offers the only solution on the market to form a chain of trust for VMs all the way from boot to application!
• Improve QoS by reducing the risk of accidental or malicious image tampering
• Reduce the time it takes to ensure that every VM in your datacenter is running authorized and trusted software.
How PowerSC works:1.Measure the boot process and securely store the results in a Virtual Trusted Platform Module(vTPM)2.Provide a sealed set of measurements to the requestor3.Verify these measurements against a reference manifest
Applications
O/S
Kernel
BIOS
PowerSC – Trusted Boot and Trusted Execution
© 2013 IBM Corporation17
Challenge: Ensure that images are trusted and at the proper patch level when they connect to the network.
PowerSC Solution: Trusted Network Connect and Patch Management detects noncompliant virtual machines during activation and alerts administrators immediately.
• Reduce business risk by active notification of down level systems via email and SMS.
• Lower admin costs by automatically spotting non compliant systems within the virtual data center and cloud environments
• Lower costs of demonstrating compliance. Monitoring at virtual machine activation proves compliance to patch policy
Out of
compliance
How PowerSC works: • An image that does not meet trusted measurements and patch levels will trigger an alert to the administrator.
PowerSC – Trusted Network Connect
© 2013 IBM Corporation18
Challenge: Ensure that every virtual machine has appropriate network isolation with the best possible performance.
PowerSC Solution: Trusted Firewall provides network isolation for VMs and layer 2,3,4 firewalling between virtual workloads within the server.
• Improves performance by providing network firewall services within the server not requiring an external firewall for VM to VM traffic on the same CEC.
• Reduces network resource consumption by not using network resources for VM to VM network traffic when VMs are running on the same CEC.
How PowerSC works:1.When network traffic flows from one VM to another on the same CEC, the Trusted Firewall which is running in the VIO server provides network isolation and firewall services between VMs.2. Trusted Firewall is managed just like any firewall with either Tivoli Netcool or BladecenterHarmony Manager or via the command line.
App ServerApp Server
Power Hypervisor
DB ServerDB Server
ExternalFirewallExternalFirewall
Power Systems Server
VIOSVIOS
PowerSC – Trusted Firewall
© 2013 IBM Corporation19
Challenge: Demonstrate compliance to Regulatory standards by setting security configurations on systems in a uniform manner.
PowerSC solution: Compare settings across all of the systems in the datacenter against prebuilt profiles, e.g. Payment Card Industry (PCI), HIPAA, DoD STIG and COBIT.
• Lower Administration costs by setting security configs in a repeatable manner
• Lower Admin costs by automating compliance reporting
• Automatic remediation of servers that are out of compliance
How PowerSC works: • A single dashboard monitors compliance and generates audit reports.• Sets and checks compliance for systems based on prebuilt security profiles
PowerSC – Security Compliance Automation
© 2013 IBM Corporation20
AIX Workload Partitions (“WPARs”)
What is it?
�Virtualized AIX operating system environments within a single AIX image
�Each WPAR shares the single AIX operating system but can be separately managed
�Applications and users inside a WPAR cannot affect resources outside the WPAR
�Each WPAR can have a regulated share of processor, memory and other resources
�Two types of WPAR:�System WPARs have separate
security and appear like a completely
separate OS
�Application WPARs are manageability
wrappers around a single application
AIX Global Instancein an LPAR
ApplicationServerWPAR
AIX 5.2
BillingServerWPAR
AIX 5.3Test
WPAR
WebServerWPAR
AIX 7.1
DB2OLTPWPAR
PowerVM™ Hypervisor
Memory
© 2013 IBM Corporation21
Change to the mkwpar command
Simple Migration from LPAR to WPAR:•Create a mksysb image of the LPAR•Provision any datavg’s to the new LPAR•Create a WPAR, specifying the mksysbimage
Options:•Create the WPAR “in-place” in the same LPAR
•Create a Shared WPAR
• Shared (read-only) /usr and /opt with the global for ease of maintenance and reduced storage and memory footprint
•Create a Detached WPAR• Private (writable) /usr and /opt directly
from the mksysb
LPAR B
LPAR A
WAS
Workload
/usr/opt
WPARAdam
mksysb
mkwpar
WAS
LPAR to WPAR
© 2013 IBM Corporation22
Active Memory Expansion compresses in-memory data to fit more data into memory
� Increases the effective amount of memory capacity
Initial version of active memory expansion is managed by the OS and hypervisor
� OS compresses and decompress data based on memory accesses
Memory compression is transparent to applications
Active Memory Expansion requires additional CPU utilization for compression
� CPU utilization will vary based on workload
Active Memory Expansion is configurable on a per-LPAR basis
� Supports dedicated memory LPAR’s and active memory sharing LPAR’s
Expand memory capacity through in-memory data compression
Active Memory Expansion – POWER7+ & AIX
© 2013 IBM Corporation23
POWER7+ uses on-chip hardware accelerator to do some of the compression / decompression work. There is a knee-of-cure relationship for CPU resource required for memory expansion
� Even with POWER7+ hardware accelerator there is some resource required.
� The more memory expansion done, the more CPU resource required
Knee varies depending on how compressible memory contents are
% CPU
utilization for expansion
Amount of memory expansion
POWER7 POWER7+
Active Memory Expansion - CPU & Performance
Demo
© 2013 IBM Corporation24
Application Memory Region
Me
mo
ry S
pa
ce
Hot Pages
Warm Pages
Cold Pages
Compressed
ExpandedMemory
Hot Pages
Warm Pages
No AME With AME
Enhanced Active Memory Expansion
Compressed
With POWER7+ AME
© 2013 IBM Corporation25
Note: This is an illustrative scenario based on using a sample workload. This data represents measured results in a controlled lab environment. Your results may vary.
Max Partition throughput: 99 tps Max Partition Throughput: 166 tps
Without Active Memory ExpansionPartition utilization
� Memory: 100% (18 GB)� CPU: 46% (12 cores in LPAR)
Memory capacity is the bottle-neck
� CPU is under-utilized� Handles 1000 simulated users
With Active Memory ExpansionPartition utilization
� Memory: 100% (18 GB true)� CPU: 88% (12 cores in LPAR) Note:
Most of the CPU increase is due to additional work done on server
Higher throughput enabled with the same amount of physical memory� Gain 37% memory capacity� Handles 1700 simulated users
+ 65%
12-core POWER7 partition24.7 GB Memory
18 GB true .6.7 GB expanded
12-core POWER7 partition18 GB Memory18 GB true .0 GB expanded
Expanded Memory
SAP ERP Workload:(DataBase + AppServer)
© 2013 IBM Corporation26
Time
Syste
m P
erf
orm
an
ce
� Optimize software to fully utilizemore cores in parallel
� Optimize systems for specific
workloads►Balanced resources
►Special purpose accelerators
Workload Optimizations
� Silicon improvements will continue to
allow more transistors on a chip►Multi-core chips
►Servers with more parallel threads
►Specialized chip accelerators
Silicon Technology
In the past, thismay require manualoptimization
Workload Optimizations
Boost Performance And Improve Price Performance
© 2013 IBM Corporation27
AIX Dynamic System Optimization
Performance Monitoring Unit
Kernel Statistics Resource Allocations
� Runs as a daemon in AIX� Analyzes process statistics over time
� Identifies processes for optimization
� Provides 4 optimization strategies� Cache affinity using dynamic RSETs
� Memory affinity
� Shared memory optimization
� Data stream pre-fetch optimization
� Monitors and adjusts optimizations as needed
PID 1
PID 2
PID 3
PID 4
PID 5
PID 6
PID 7
PID 8
Monitor Processes Optimize
AIX Dynamic System Optimization : How does it work?
© 2013 IBM Corporation28
Looks for ways to optimize Cache Affinity�Analyzes cache access patterns of a workload by gathering information from
the kernel and PMU
�Makes changes based on predictions• Could take at least 30 minutes of monitoring a stable workload before making any
changes
�Continues to monitor workload and if changes don’t yield the expected result it
immediately reverts them
Optimizer relocates workloads to same socket for best cache affinity
L3 Cache
DSO Cache Affinity Optimizer
© 2013 IBM Corporation29
0
20
40
60
80
100
120
140
160
DayTrader SPECJBB-MOD COPR-DB2 COPR-Proc SDET
Original
With DSO
Re
lati
ve
Pe
rfo
rma
nce %
Dynamic System Optimization Performance Summary
© 2013 IBM Corporation30
Systems subject to Processor / Memory Affinity issues transition in dynamic multi-core systems…
Partition placement can become sub-optimal � Dynamic creation and deletion of partitions� DLPAR operations� Partition Mobility
Platform will provide a mechanism to optimize partition placement dynamically� Available: 4Q12� Requires eFW: 7.60
Dynamic Platform Optimization Overview
Processor / Memory Defragmentation
© 2013 IBM Corporation31
Partition XMemory
Partition YMemory
Partition ZMemory
Free LMBs
Legend
Dynamic Platform Optimizer Function
© 2013 IBM Corporation32
AIX Editions
Cap
abili
ty
AIX StandardEdition
AIX EnterpriseEdition
AIX ExpressEdition
AIX is available in three different editions:
–AIX Standard Edition•Suitable for most UNIX workloads•Vertical scalability up to 256 cores (AIX 7)
–AIX Enterprise Edition•AIX plus enterprise management •Includes AIX Standard Edition plus
management components from Systems Director, Tivoli and the Workload Partitions Manager for AIX
•Vertical scalability up to 256 cores (AIX 7)
–AIX Express Edition•Lower priced edition targeted a low end servers and
consolidation of smaller workloads on larger servers •Includes most of the functionality of AIX Standard Edition•Vertical scalability is limited to 4 cores and 8GB of memory per core in a single partition•Clients can use multiple AIX Express Edition partitions in a single larger server
© 2013 IBM Corporation33
AIX Enterprise Edition Past
AIX 7 or AIX 6
WPAR Manager
Systems Director Enterprise
Edition� IBM System Director
�Active Energy Manager
�VMControl Enterprise Edition
�Network Control
�Transition Manager for HP® SIM
�Service and Support Manager
Tivoli Products� IBM Tivoli Monitoring
� IBM Tivoli Monitoring for Energy
Management
�Tivoli Application Dependency
Discovery ManagerDate
AIX Enterprise Edition Future
AIX 7 or AIX 6
WPAR Manager
PowerVC
PowerSC Standard Edition
Active System Optimizer
SmartCloud Entry for Power+Director Storage Control
+Systems Director Standard Edition• IBM System Director
• Active Energy Manager
• Network Control
• Transition Manager for HP® SIM
• Service and Support Manager
=VMControl Enterprise Edition
Tivoli Products� IBM Tivoli Monitoring
AIX Enterprise Edition Content Changes
© 2013 IBM Corporation34
New AIX tuning option (schedo) to more aggressively drive higher SMT levels for scaled throughput versus lower SMT levels for raw thread performance on all POWER7 systems
Scaled-Throughput Approach (Biased to SMT4)
Core 1 Core 1 Core 1 Core 1 Core 2 Core 2 Core NCore 1Core 1 Core 1 Core 1Core 1 Core 1 Core 1Core 1Core 1 Core 1 Core 1Core 1Core 1Core 1 Core 2 Core 2Core 2
Default Processor Folding Approach
Core 3Core 2 Core 1Core 1 Core 2 Core 1 Core N
SMT4SMT1 SMT2
`̀`̀
Core 1Core 1Core 1Core 1 Core 2Core 2 Core 1 Core 1
P
D DDDT
P TT
PP PP P
Per LPAR behavior
D D D DDDT
PT T T TT
P P P
Effect on System
D - Development
- TestT
- Production P
AIX Scaled Throughput Processor Folding Option
© 2013 IBM Corporation35
New PowerVM and Virtualization Features
Live Partition Mobility for IBM i (1H12)
Allow 1/20 core minimum entitlement
LPM Concurrency Improvements
LPM Performance Improvements
Usability enhancements
VIOS Performance Advisor
Shared Storage Pools Improvements
PowerSC Trusted Surveyor
PowerSC Express – HIPAA profile
© 2013 IBM Corporation36
CPU Section Snapshot� Proactive VIOS Health
Check
� Provides Advise on how to Tune the VIO Server Before Problems Occur
� Shipped with PowerVM 2.2.2
� Reports are viewed with a web browser
� Can be use as a historical measure of performance
New!! VIOS Performance Advisor
© 2013 IBM Corporation37
Extending Integrated Storage Virtualization Beyond a Single Server
PowerVM PowerVM with Shared Storage PoolsNW
SSP enables optimized utilization of SAN resources across many Power Servers
SSP provides space efficient virtual storage that can be rapidly provisioned
Storage Pool Storage Pool Storage Pool Storage Pool
Server
VIOS
LPAR
LPAR
LPAR
Server
VIOS
LPAR
LPAR
LPAR
Server
VIOS
LPAR
LPAR
LPAR
Server
VIOS
LPAR
LPAR
LPAR
Server
VIOS
LPAR
LPAR
LPAR
Server
VIOS
LPAR
LPAR
LPAR
Advantages of Shared Storage
• Cost savings through sharing; efficient utilization of physical I/O
• Facilitates server consolidation by enabling more LPARs (increased density)
• Agility: quick LPAR deployment / teardown
• Simplify Live Partition Mobility
• Reduce SAN infrastructure and SAN management costs
• Reduce datacenter footprint
PowerVM – Shared Storage Pools (SSP)
© 2013 IBM Corporation38
Increase scaling to 16 nodes in a cluster
Scalability Improvements
Storage Utilization Statistics and Reporting
Cluster Level RAS Improvements
VIOS Shared Storage Pools Updates
© 2013 IBM Corporation39
Virtualization
Compute Memory
Significant value in the tight integration of server, storage and network aspects
� Allocate resources on the target host.� Provide access (re-zone/re-mask) to the virtual server storage on the target host� Move the required network resources and state� Move the virtual server in-memory state to target host.� De-allocating resources on the source host.
Virtual Server
Compute MemoryIO / Network
Virtual Server
IO / Network
SW
OS
SW
OS
SW
OS
SW
OSSW
OS
SW
OS
Virtual Server
Virtualization
Virtual Server
Virtual Server Relocation within a System Pool
© 2013 IBM Corporation40
What is it?• VM Remote Restart automates VM restarts in the case of server failure
• Improves availability of systems by recovering faster from server HW failure• Works with AIX, IBM i or Linux VMs• Requires VMControl Enterprise Edition• VMControl automates failover via system pools
• Requires PowerVM Enterprise Edition
PowerVM Remote VM Restart Automation with VMControl
© 2013 IBM Corporation41
Themes Driving the Future AIX & Power Software
Enabling the next generation of Power Systems�Processors, Systems, I/O, Storage, accelerators, etc.
Simplification of Cloud and scalable virtualization�Deployment , initial configuration, and management simplification
Advanced Workload Optimization and Enablement of Emerging Workloads�Dynamic Optimization, Scale-out workloads, Big Data
Increased Uptime�Reduced planned downtime and continuous availability enablers
�AIX Lifecycle adjustments
All statements regarding IBM's future direction and intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
© 2013 IBM Corporation42
AIX Release Plan
*All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
-Marketed & serviced -Fee-based service extension
-Serviced only -Web support only
-Technology Level Update
-Last TL Update
202320222021 20242020201920182017201620152014201320122011
AIX 5.3GA 08/04EoM 4/11
AIX
6.1 & EE
GA 11/07
AIX
7.1 & EE
GA 9/10EoL
9/24EoS 9/20EoM 04/19
EoM 04/16 EoS 9/17
EoS 04/12
EoL4/21
EoL04/16
Year 3Year 2Year 1
AIX 5.3 Extended Support5.3 Extended Support Offering
Year 1&2 Ser Packs and New HW SupportYear 3 phone support and iFixes
TL9
TL7TL6TL5TL4TL3TL2TL1
TL8TL7
© 2013 IBM Corporation43
2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
AIX 5.3GA EOS
4/12
Year 3Year 1 Year 2
AIX 5.3 Service Extension
TL124/10
EOM4/11
AIX 5.3 service Extension Offering Content
* Entitlement will be required to download Service Extension Service Packs from Fix Central
• Phone service for usage questions and problem determination
• Some new hardware support• Two planned Service Packs*
• Phone support for usage questions and problem determination
• Some new hardware support• Two planned Service Packs*
• Phone support for usage questionsand problem determination
• No new hardware support• Interim Fixes only
Year 3Year 1 Year 2
AIX 5.3 Service Extension
No Native POWER8 Support
© 2013 IBM Corporation44
High Availability Clustering Solutions
High Availability (HA) Management
�Business continuity by workload failovers�Provides for redundant operating environment�Automated workload bring ups�Environment specific outage actions�Planned and unplanned outage management
Disaster Recovery (DR) Management
�Geographically dispersed locations�Host based or Storage based replication�Simplified compliance testing
Data Center Clustering
External LAN
LAN 1 LAN 2
SAN 1
SAN 2
Heartbeat 1
Heartbeat 2
Logical server
Multi-Site Clustering
External LAN
LAN 1 LAN 2
SAN 1
SAN 2
Heartbeat 1
Heartbeat 2
Logical server
External LAN
LAN 1 LAN 2
SAN 1
SAN 2
Heartbeat 1
Heartbeat 2
Logical server
© 2013 IBM Corporation45
PowerHA SystemMirror Editions
PowerHA SystemMirror Standard Edition
Cluster management for the data center
� Monitors, detects and reacts to events
� Establishes a heartbeat between the systems
� Enables automatic switch-overIBM shared storage clustering
� Can enable near-continuous application service
� Minimize impact of planned & unplanned
outages
� Ease of use for HA operations
PowerHA SystemMirror Enterprise Edition
Cluster management for the Enterprise� Multi-site cluster management � Includes the Standard Edition function
© 2013 IBM Corporation46
LPAR
PowerHA Cluster
LPAR
Application
Hypervisor
LPAR LPAR
Hypervisor
CoD Spare PoolInactive Pool
PowerHA: Resource Optimized High Availability
PowerHA provides for LPAR resource management during failovers
Can readjust resources from the free pool
Can enable CPU and memory as needed using CoD
© 2013 IBM Corporation47
Oracle DB 5 CPU
Banner DB 5 CPU
Standby 5 CPU
Standby 5 CPU
Standby 5 CPU
Standby 5 CPU
PeopleSoft 5 CPU
Financial DB 5 CPU
System A System B
Cluster 1
Cluster 2
Cluster 3
Cluster 4
PowerHA SystemMirror: DLPAR Value Proposition
Oracle DB 1 CPU
Banner DB 1 CPU
Standby 1 CPU
Standby 1 CPU
Standby 1 CPU
Standby 1 CPU
PeopleSoft 1 CPU
Financial DB 1 CPU
System A System B
+ 4 CPU
+ 4 CPU
+ 4 CPU
+ 4 CPU
Acquired
via DLPAR
with App
Acquired
via DLPAR
with App
Cluster 1
Cluster 2
Cluster 3
Cluster 4
PowerHA license counts:Cluster 1 : 10 CPUsCluster 2 : 10 CPUs
Cluster 3 : 10 CPUsCluster 4 : 10 CPUs
Total : 40 licenses
HMC
Environment using dedicated CPU model (No DLPAR)
Environment using DLPAR modelPowerHA license counts:Cluster 1 : 6 CPUsCluster 2 : 6 CPUsCluster 3 : 6 CPUsCluster 4 : 6 CPUs
Total : 24 licenses
System A – 12 CPUsSystem B – 12 CPUs
System A: 20 CPUsSystem B: 20 CPUs
© 2013 IBM Corporation48
PowerHA SystemMirror Enterprise Ed�Two distinct options for multi-site
deployments
�Each option provide configurations
optimized for customer requirements
Stretched Cluster�Exploits multicast communications
�Triple redundant heartbeat
�Campus/Metro deployments
Linked Cluster�Enables two sites with independent
networks (campus or cross country)
�Suitable for campus, metro and cross
country deployments
Two-Site Stretched Cluster
Two-Site Linked Cluster
Future capability*
Repository Disk
PowerHA 7.1 Two-Site Solutions
© 2013 IBM Corporation49
Site 2
PowerHA
Site 1
S PPRC
PowerHA
MPIO
MPIO
MPIO
Primary Secondary
Legend:Active Path
Passive Path
� Designed to dramatically improve service availability
� Eliminates most outages caused by storage errors
� Uses IBM Storage device Peer to Peer Remote Copy functionality
� Similar to IBM System z GDPS Hyperswap capability
Continuous Availability for Storage
PowerHA SystemMirror for AIX Hyperswap
© 2013 IBM Corporation50
Questions?