|By Skytap Blog||
|June 4, 2014 07:50 AM EDT||
Specifically, the Skytap Automation Pack for IBM UrbanCode Deploy adds the following Skytap actions to IBM UrbanCode Deploy for use IBM UrbanCode Deploy process definitions:
- Skytap Cloud Authentication
- Add Configuration to Project
- Add Template to Project
- Change Configuration State
- Connect to Network in another Configuration (ICNR)
- Connect to VPN Tunnel
- Create Configuration from Template
- Create Published Service
- Create Published URL
- Create Template from Configuration
- Delete Configuration
- Get VM ID
- List Published URL for Configuration
- List VM Published Service
- Merge Template into Configuration
- Set VM User Data
We will discuss some of these Skytap Cloud Actions below, but you can read more detailed information about all of the actions in the user documentation available on the Skytap website.
Accessing the Skytap Actions for IBM UrbanCode Deploy
The Skytap Cloud actions that are available for use in IBM UrbanCode Deploy are exposed in the “Cloud->Skytap Cloud” entry in the IBM UrbanCode Deploy “Available Plugin Steps” window in the IBM UrbanCode Deploy Component Process Editor:
Depending on which action you select, you will be presented with a set of input properties to specify in order to enable execution of the Skytap Action. The specific input and output parameters that are required differ depending on which Skytap Cloud Action you select.
Let’s examine a very simple process flow where we do the following:
1. Establish Skytap Cloud Authentication properties
2. Create a Skytap configurations from a pre-configured Skytap template
3. Run the Configuration
Constructing the IBM UrbanCode Deploy Component Process
For purposes of this exercise, we’ll assume an already-created application named “Deploy UCD Environment in Skytap” and an associated component named “Skytap UCD Deployment Component.” We will be creating a process in the “Skytap UCD Deployment Component” named “Deploy-Environment Process” as illustrated below:
Authentication with Skytap Cloud
To use the Skytap Automation Pack for IBM UrbanCode Deploy, you must first be able to authenticate with Skytap Cloud. This authentication requires a Skytap Cloud user ID and an API Security Token. Assuming you already have a Skytap Cloud User ID, you can retrieve your API Security Token in your Skytap Account Settings:
If you don’t have a Skytap Cloud account, you can sign up for one here: http://www.skytap.com/
The first Skytap Cloud Action in our application process is “Skytap Cloud Authentication,” which will also likely be your first Skytap Cloud Action in your application process. This action allows you to specify the Skytap Cloud authentication information that will be used by subsequent Skytap Cloud Actions.
Below is a screenshot of the Skytap Cloud Authentication step dialog:
Note that the Username and Authentication Key properties are required.
Once we fill in the required properties and click the “Save” button, we can see the step in our application process:
Create the Skytap Configuration
Since we first want to create a Skytap configuration from a template, select “Create Configuration from Template” from the “Available Plugin Steps” window and drag it onto your application process diagram:
The dialog associated with the “Create Configuration from Template” Skytap Cloud Action will then be displayed and we can fill out the specific properties required for this Skytap action:
In this case, we will specify a Template ID of 331965, which corresponds to a template in the Skytap Public Template Library that contains a CentOS 6.4 x32 VM. Additionally, we have specified a name of “Skytap UCD Configuration” that will be assigned to the newly created configuration. If we didn’t specify a name, the name of the template, “CentOS 6.4 x32 Desktop,” would be assigned as the configuration name.
Also note that the Skytap Authentication properties that we specified in the first process step are being “inherited” by this step. If we wanted to override the authentication we could simply fill in the desired authentication property values in the corresponding property fields in this process step.
When we click the “Save” button we will see our process step in our application process:
Run the Skytap Configuration
Now that the Skytap Configuration has been created, we can run it by selecting “Change Configuration State” as the Skytap Cloud Action and dragging it onto our process diagram:
The dialog associated with the “Change Configuration State” Skytap Cloud Action will then be displayed and we can fill out the specific properties required for this Skytap action:
Because we just created the Skytap Configuration as part of this component process, we don’t know the configuration ID. The configuration ID of the created process, though, is an output property of the “Create Configuration from Template” Skytap Cloud Action, so we are able to use the “configID” output property from that Skytap Cloud Action as an input property to this process step to specify the Skytap Configuration that we just created.
We also set the desired configuration state to “Running”. Other possible values are “Suspended” and “Shutdown”.
This Skytap Cloud Action will inherit the Skytap Cloud Authentication properties entered earlier in the process definition.
If we now scroll down and click the “Save” button, we will see our new process step:
Complete and Run the IBM UrbanCode Deploy Process
We’ve now created the desired Skytap Cloud Actions so we can create the process arrow from the “Change Configuration State” step to “Finish” and click on the disk icon to save our process:
When the process definition has been saved, we will see a dialog:
Running our Process
Once the component process has been defined and saved, we can run the process by navigating to the IBM UrbanCode Deploy Application tap and click on the application that is associated with the component in which our process is defined:
Click on the “Request Process” button on the associated Environment:
Click the “Submit” button in the “Run Process…” dialog:
Once the process has started, we can review it’s progress by clicking the “Details” link associated with the process:
Here we see that each step in the process has executed successfully:
And we can review the Skytap Cloud Action log by clicking on the “Console” icon associated with the specific action that we want to review, in this case the “Change Configuration State” Skytap Action:
The “Output Log” for the “Change Configuration State” Skytap Action provides detailed and verbose logging of the action execution:
Verify the Configuration is Running
Now we can log into Skytap Cloud and use the Skytap Web GUI to verify that the proper execution of the IBM UrbanCode Deploy process by confirming that the desired configuration was indeed created and is running:
Here we see that a Skytap Configuration has been created and assigned a name of “Skytap UCD Configuration,” exactly as specified in our IBM UrbanCode Deploy Component process, and we can verify that the configuration is running, again exactly as specified.
We’ve used the Skytap Cloud Automation Pack for IBM UrbanCode Deploy to create a simple IBM UrbanCode Deploy Component Process that interacts with Skytap Cloud to establish authentication and create and run a Skytap Cloud Configuration. The principles demonstrated in this simple exercise and the additional Skytap actions provided by the Skytap Cloud Automation Pack for IBM UrbanCode Deploy can easily be expanded further into more complex scenarios based on your deployment requirements.
Please contact Skytap at 1-888-759-8278 or http://www.skytap.com if you want more information about Skytap or the Skytap Cloud Automation Pack for IBM UrbanCode Deploy.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Sep. 28, 2016 09:15 AM EDT Reads: 3,152
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 09:00 AM EDT Reads: 3,840
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 28, 2016 08:45 AM EDT Reads: 2,545
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 28, 2016 08:45 AM EDT Reads: 1,121
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 28, 2016 08:45 AM EDT Reads: 1,200
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 28, 2016 08:30 AM EDT Reads: 1,151
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Sep. 28, 2016 08:30 AM EDT Reads: 1,569
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 28, 2016 08:15 AM EDT Reads: 536
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 28, 2016 08:00 AM EDT Reads: 2,054
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 28, 2016 07:45 AM EDT Reads: 2,260
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 28, 2016 07:45 AM EDT Reads: 2,257
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 28, 2016 07:30 AM EDT Reads: 2,904
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Sep. 28, 2016 07:00 AM EDT Reads: 2,686
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Sep. 28, 2016 07:00 AM EDT Reads: 3,360
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Sep. 28, 2016 07:00 AM EDT Reads: 3,473
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 28, 2016 07:00 AM EDT Reads: 2,100
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 28, 2016 07:00 AM EDT Reads: 2,271
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 28, 2016 05:30 AM EDT Reads: 1,473
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 28, 2016 05:15 AM EDT Reads: 2,822
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Sep. 28, 2016 05:00 AM EDT Reads: 1,204