Skip to content

Commit 4778808

Browse files
maheshwarishikhaShikha Maheshwari
andauthored
Service Frmaework related docs and update reference architecture (#229)
--------- Co-authored-by: Shikha Maheshwari <[email protected]>
1 parent 4cea923 commit 4778808

File tree

3 files changed

+144
-1
lines changed

3 files changed

+144
-1
lines changed

reference-architecture/deployable-architecture-observability-instances.svg

Lines changed: 1 addition & 1 deletion
Loading

reference-architecture/heat-map-observability-da.svg

Lines changed: 4 additions & 0 deletions
Loading
Lines changed: 139 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,139 @@
1+
---
2+
3+
copyright:
4+
years: 2024
5+
lastupdated: "2024-12-06"
6+
7+
subcollection: deployable-reference-architectures
8+
9+
authors:
10+
- name: Shikha Maheshwari
11+
12+
# The release that the reference architecture describes
13+
version: 2.4.1
14+
15+
# Use if the reference architecture has deployable code.
16+
# Value is the URL to land the user in the IBM Cloud catalog details page for the deployable architecture.
17+
# See https://test.cloud.ibm.com/docs/get-coding?topic=get-coding-deploy-button
18+
deployment-url: https://cloud.ibm.com/catalog/7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3/architecture/deploy-arch-ibm-observability-a3137d28-79e0-479d-8a24-758ebd5a0eab-global
19+
20+
image_source: https://github.com/terraform-ibm-modules/terraform-ibm-observability-da/blob/main/reference-architecture/deployable-architecture-observability-instances.svg
21+
22+
use-case:
23+
- Observability
24+
- PlatformLogging
25+
- PlatformMonitoring
26+
- ATEventsRouting
27+
28+
industry: SoftwareAndPlatformApplications, Technology, ITConsulting, FinancialSector
29+
30+
compliance:
31+
32+
docs: https://cloud.ibm.com/docs/observability-hub?topic=observability-hub-overview
33+
34+
content-type: reference-architecture
35+
36+
production: true
37+
38+
---
39+
40+
{{site.data.keyword.attribute-definition-list}}
41+
42+
43+
44+
# Cloud Automation for Observability
45+
{: #observability-deployable-architecture}
46+
{: toc-content-type="reference-architecture"}
47+
48+
Observability is iportant for ensuring reliability and scalability in the distributed and cloud-based architectures. This deployable architecture simplifies and automates the organization's observability configuration, the associated dependencies and its maintenance.
49+
50+
This deployable architecture includes:
51+
52+
1. {{site.data.keyword.keymanagementserviceshort}}
53+
54+
{{site.data.keyword.keymanagementserviceshort}} is responsible for centrally managing the lifecycle of encryption keys that are used by {{site.data.keyword.cos_full_notm}} buckets. Additionally, it can manage encryption keys for any customer workload that requires protection.
55+
56+
2. {{site.data.keyword.cos_full_notm}}
57+
58+
{{site.data.keyword.cos_full_notm}} buckets are utilized to store logs, events, and metrics. All data stored in {{site.data.keyword.cos_full_notm}} is encrypted for security.
59+
60+
3. {{site.data.keyword.monitoringlong_notm}}
61+
62+
{{site.data.keyword.monitoringlong_notm}} is used to store platform metrics and, by default, collects them automatically. Additionally, you can extend its capabilities by adding custom metrics.
63+
64+
4. {{site.data.keyword.logs_full_notm}}
65+
66+
{{site.data.keyword.logs_full_notm}} is used to store platform logs, which are enabled by default. You can configure {{site.data.keyword.cos_full_notm}} buckets to store your {{site.data.keyword.logs_full_notm}} data and metrics from logs for long term storage and search. Additionally, {{site.data.keyword.logs_full_notm}} policies can be setup to better control the data that is ingested, and manage the data available for search within CL.
67+
68+
5. {{site.data.keyword.en_full_notm}}
69+
70+
It supports integration with {{site.data.keyword.en_full_notm}} to gather notification events, which can then be configured to consume notifications.
71+
72+
73+
## Architecture diagram
74+
{: #architecture-diagram}
75+
76+
The following diagram represents the architecture for the Cloud Automation for Observability deployable architecture.
77+
78+
![Architecture.](deployable-architecture-observability-instances.svg "Architecture"){: caption="Figure 1. Architecture diagram" caption-side="bottom"}{: external download="deployable-architecture-observability-instances.svg"}
79+
80+
The Cloud automation for Observability deployable architecture automates the following.
81+
82+
- creates the {{site.data.keyword.monitoringlong_notm}} and the {{site.data.keyword.logs_full_notm}} instances.
83+
- configures {{site.data.keyword.logs_full_notm}} routing to route platform logs to {{site.data.keyword.logs_full_notm}}.
84+
- setup routing of the cloud platform activity events to the {{site.data.keyword.logs_full_notm}} and the {{site.data.keyword.cos_full_notm}} bucket.
85+
- configures routing of the cloud platform logs and the metrics from logs to {{site.data.keyword.cos_full_notm}} buckets.
86+
- integration of the existing {{site.data.keyword.en_full_notm}} with {{site.data.keyword.logs_full_notm}}.
87+
- it also supports provisioning of a resource group, root keys in an existing key management service (KMS), {{site.data.keyword.cos_full_notm}} instance and KMS encrypted {{site.data.keyword.cos_full_notm}} buckets.
88+
89+
It requires the `crn` of the KMS instance as a required input. You can also provide the KMS key crn for encryption. If you do not specify an KMS key, then the deployable architecture automatically creates one for you in a key ring of your choice (if you do not specify a key ring, then the default one is used).
90+
91+
You can provide the existing {{site.data.keyword.cos_full_notm}} instance and {{site.data.keyword.cos_full_notm}} buckets to store logs and events. If you do not specify existing {{site.data.keyword.cos_full_notm}} or {{site.data.keyword.cos_full_notm}} bucket details, then it creates the required infrastructure for you. Each bucket is configured to encrypt data at rest by using encryption keys managed by {{site.data.keyword.keymanagementserviceshort}}.
92+
93+
## Design concepts
94+
{: #design-concepts}
95+
96+
- Storage: Backup, Archive
97+
- Networking: Cloud-native connectivity
98+
- Security: Identity and access, governance, risk and compliance
99+
- Resiliency: Backup & restore
100+
- Service management: Monitoring, logging, auditing and tracking, alerting, automated deployment, management/orchestration
101+
102+
![heatmap](heat-map-observability-da.svg "Current diagram"){: caption="Architecture design scope" caption-side="bottom"}{: external download="heat-map-observability-da.svg"}
103+
104+
## Requirements
105+
{: #requirements}
106+
107+
The following table outlines the requirements that are addressed in this architecture.
108+
109+
| Aspect | Requirements |
110+
| -------------- | -------------- |
111+
| Security | Encrypt all application data in transit and at rest to protect it from unauthorized disclosure. \n Encrypt all security data (operational and audit logs) to protect from unauthorized disclosure. \n Encrypt all data using customer-managed keys to meet regulatory compliance requirements for additional security and customer control. |
112+
| Resiliency | Support application availability targets and business continuity policies. \n Ensure availability of the application during planned and unplanned outages. \n Back up application data to enable recovery during unplanned outages. \n Provide highly available storage for security data (logs) and backup data. |
113+
| Service Management | Monitor system and application health metrics and logs to detect issues that might impact the availability of the application. \n Generate alerts/notifications about issues that might impact the availability of applications to trigger appropriate responses to minimize downtime. \n Monitor audit logs to track changes and detect potential security problems. \n Provide a mechanism to identify and send notifications about issues that are found in audit logs. |
114+
{: caption="Requirements" caption-side="bottom"}
115+
116+
## Components
117+
{: #components}
118+
119+
The following table outlines the products or services used in the architecture for each aspect.
120+
121+
| Aspects | Architecture components | How the component is used |
122+
| -------------- | -------------- | -------------- |
123+
| Storage | [{{site.data.keyword.cos_full_notm}}](https://cloud.ibm.com/docs/cloud-object-storage?topic=cloud-object-storage-about-cloud-object-storage) | Web app static content, backups, logs (application, operational, and audit logs) |
124+
| Networking | [Virtual Private Endpoint (VPE)](https://cloud.ibm.com/docs/vpc?topic=vpc-about-vpe) | For private network access to {{site.data.keyword.cloud_notm}} services, for example, {{site.data.keyword.keymanagementserviceshort}}. |
125+
| Security | [IAM](https://cloud.ibm.com/docs/account?topic=account-cloudaccess) | {{site.data.keyword.iamshort}} |
126+
| | [{{site.data.keyword.keymanagementserviceshort}}](https://cloud.ibm.com/docs/key-protect?topic=key-protect-about) | A full-service encryption solution that allows data to be secured and stored in {{site.data.keyword.cloud_notm}} |
127+
| Service Management | [{{site.data.keyword.monitoringlong_notm}}](https://cloud.ibm.com/docs/monitoring?topic=monitoring-about-monitor) | Apps and operational monitoring |
128+
| | [{{site.data.keyword.logs_full_notm}}](https://cloud.ibm.com/docs/cloud-logs?topic=cloud-logs-getting-started) | Apps and operational logs |
129+
| | [{{site.data.keyword.atracker_short}}](https://cloud.ibm.com/docs/activity-tracker?topic=activity-tracker-getting-started) | Audit logs |
130+
{: caption="Table 2. Components" caption-side="bottom"}
131+
132+
133+
## Compliance
134+
{: #compliance}
135+
136+
Ensures compliance with some of the controls in the {{site.data.keyword.framework-fs_full}} profile. To view the list of added controls, follow these steps:
137+
138+
1. Go the {{site.data.keyword.cloud_notm}} [catalog](/catalog#reference_architecture){: external} and search for the Cloud Automation for Observability deployable architecture.
139+
1. Click the tile for the deployable architecture to open the details. The Security & compliance tab lists all of the controls that are included in the deployable architecture.

0 commit comments

Comments
 (0)