EditAttachPrintable
r8 - 2014-06-27 - 19:32:09 - Main.gcovellYou are here: TWiki >  Deployment Web > DeploymentPlanningAndDesign > RecommendedSSEDeploymentTopologies5

new.png Recommended SSE deployment topologies 5.0

Authors: ThomasPiccoli, GrantCovell
Build basis: The Rational solution for systems and software engineering (SSE) 5.0

Standard topologies overview

This page describes the Recommended SSE Deployment Topologies for version 5.x. Refer to Standard deployment topologies overview for high-level description of the standard topologies, how they are categorized and their key characteristics.

These recommended deployment topologies for the Rational solution for systems and software engineering (SSE) 5.0 are a subset of the standard SSE deployment topologies. For the rest of the standard topologies, see Alternative SSE deployment topologies 5.0. Within this wiki, additional guidance and best practices will be developed about how to best instantiate these recommended topologies.

Introduction and approach

These recommended topologies were chosen based upon the following criteria:

  1. Those that are most commonly and successfully deployed to date by customers and internally within IBM
  2. Those that are based upon the most commonly available platforms, operating systems and middleware
  3. Those that are based upon technologies that customers, partners and the IBM Rational Field have the most experience with
  4. Those that are the focus of testing within IBM Rational.

These recommended topologies represent only a few of the many permutations for deploying the Rational solution for SSE. The SSE systems requirements capture the full set of options for supported deployment permutations.

These topologies have been defined to capture good deployment patterns, which include additional guidance on building in flexibility, scalability, performance, and support for other non-functional requirements, such as high availability, disaster recovery, and security.

(SSE-E1) Enterprise Windows with Oracle

This enterprise topology uses Windows for the server operating systems. The applications are distributed across separate servers and WAS instances. A reverse proxy is used to ensure public URI stability. Oracle is used for the databases and is hosted on a separate server. Finally, licenses are served by a floating license server and Windows Active Directory Server provides the LDAP based user management.

Metadata Variable Value
Operating System Windows
Database Management System Oracle
Application Server WAS
License Management System Floating
User Management System Microsoft Active Directory
Other technologies Reverse Proxy

sse_e1_windows_oracle_50.png

(SSE-E1) Enterprise Windows with Oracle

Server Software
1 JTS, WAS
2 CCM, WAS
3 QM, WAS
4 RM, WAS
5 DCC, WAS
6 RS, WAS
7 DM, WAS
8 RELM, SPARQL_Gateway, WAS
9 VVC, WAS
10 LQE, WAS
11 DOORS DB
12 DWA, Broker, Tomcat
13 DOORS Interops (1..n)
14 Oracle
15 IHS Reverse Proxy Server
16 LDAP Server
17 License Server

(SSE-D3) Departmental Windows with Oracle

Departmental or small organization topology. Uses 3 Windows servers, with Oracle database on its own server, LQE on another server, and all other applications on third server. Uses Microsoft Active Directory as identity management.

Metadata Variable Value
Operating System Windows
Database Management System Oracle
Application Server WAS
License Management System Floating
User Management System Microsoft Active Directory
Other technologies Reverse Proxy

sse_d3_windows_oracle_50.png

(SSE-D3) Departmental Windows with Oracle

Applying the topologies

Every customer's environment is different with unique, necessary and often immutable requirements and constraints. We recognize that these standard topologies may not provide enough detail to make them immediately implementable in some customer environments, but we wanted to describe several topologies with enough variability to give an indication of what is possible and where our recommendations start.

While we recommend customers start with a standard topology that is most applicable to them, we recognize they will need to make changes and customizations to support their own unique requirements and constraints. IBM will support your own implementations, but may ask you to describe which topology is most applicable to your deployment and ask you to document what is unique in your environment to expedite any potential support situation.

To aid you in documenting your chosen deployment topology, we have made the following Rational Software Architect (RSA) model files available:

These may be imported into RSA then further modified or expanded to represent your environment. Look at the Installation_Instructions.txt file for information on how to import the models into RSA.

Datasheets and sizing guidelines

Find CLM-specific performance datasheets, sizing guidelines and performance-related case studies on the Performance datasheets and sizing guidelines page.

Next steps

This topic is meant to briefly introduce these standard topologies and describe how they might be applied. Work is already underway to build upon and apply them. Subsequent updates to this topic and supporting topics will provide additional insight into their usage.

Future updates to this topic or supporting topics may cover:

  • Deeper look at select topologies
  • Provide suggested tuning parameters
  • Consider high availability database topologies
  • Begin to expand this topology model into other domains
  • Discussion of strategic integrations with other Rational and non-Rational products.

Related topics:

External links:

  • None

Additional contributors: None

Edit | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r11 < r10 < r9 < r8 < r7 | More topic actions...
 
This site is powered by the TWiki collaboration platformCopyright © by IBM and non-IBM contributing authors. All material on this collaboration platform is the property of the contributing authors.
Contributions are governed by our Terms of Use. Please read the following disclaimer.
Dashboards and work items are no longer publicly available, so some links may be invalid. We now provide similar information through other means. Learn more here.