How to Model Applications
Before you create an Application Profile, review your architectural requirements to determine the type of profile required for your application. Use the list in the following table to consider the different architectural aspects required for your application.
|No.||Consideration||Links||Action Items and Details|
|1||What services are required for your application and how are these services are dependent on each other?|
See OOB Services
Identify and provide a top-down hierarchy for the required services
|2||Does you application contain multiple tiers?||See Understand Application Tier Properties|
For each tier, provide the list of dependent services. The services listed in this section also identify the dependency from the service deployment perspective.
|3||Are you using Workload Manager-supported services?||See|
The bundle store contains the agent and service bundles. This repository is hosted by Workload Manager CDN () or can be hosted locally in a private cloud environment using a standard Apache server.
|4||Did you determine the hosting location for your service(s)?||Seeif using Workload Manager-supported services and worker VMs cannot access the internet||Every Workload Manager deployment requires a Workload Manager Package Store and a hosting location for all Workload Manager-supported (out-of-box) Services . When you properly configure a region in Workload Manager, all services are automatically detected by the Package Store and displayed via the Topology Modeler Properties tab.|
Are there external services that need to be connected to and communicated with (e.g., a new schema on an existing SQL server cluster, a new VIP on an existing load balancer)?
See External Service
You can create an application using multiple tiers where you can stipulate each tier to use a different Workload Manager-supportedor externally-provided service (third-party services).
Are you using custom/private services?
Where are the required artifacts for these services to be successfully deployed?
|7||Do you have all the dependent application data, files, and packages?||See Artifact Repository||Typically, enterprises maintain their application packages, data, and scripts in repositories. Use the Artifact Repository to attach your own external repository to store and access your files. Workload Manager provides a Repositories tab in the Workload Manager UI for this purpose.|
|8||Have you identified the infrastructure requirements for each service?||See Manage Instance Types||For private clouds, use the number of VM instances that you manage for your enterprise, and the instance type, storage and network each one requires, to calculate your hardware requirements.|
|9||What are the networking requirements for each service to talk to the others?||See Security and Firewall Rules|
Use firewall rules and security groups to ensure proper inter-tier communication and external communication.
Application Discovery Considerations
Workload Manager profiles are generally based on core configuration details, elaborate workflows that describe the sequence of steps required to deploy the application, or run on big-data processing workloads. Use the list in the following table to consider the different discovery aspects required for your application.
Application Profile Type
|For each application profile, identify the category.|
Application (or tier) requirements
See the following links:
For each application (or tier), provide the dependent parameters and scripts.
Port and firewall accessibility
Identify the scripts or dependencies at the time of deployment.
You can attach multiple volumes to all tier types in N-tier applications. For each volume, you must specify the size and can optionally configure the volume type.
Testing and verification
|Refer to your enterprise policies and requirements.|
Be sure to identify you dependent test cases for each profile.
Besides the information required to model your application ensure to address the following external dependencies:
Application packages and associated licenses, if applicable.
Application credentials to access and verify each application, if applicable.
Infrastructure requirements such as minimum CPUs, memory, storage, and other requirements specific to your application(s).
- No labels