Instalar windows en ibm power logo ibm windows xp sobre el logo de sixe

Installing Windows on IBM Power (for fun)

In a recent conversation with what I call the Wizards of Power, i.e. the technical management of this fantastic platform: inventors, architects, distinguished engineers and great teams of people behind it, I was asked. “Hugo, why your interest in emulation, who would want to emulate other architectures on Power, what’s the point?”

My answer is that in the open source world, many of the things we do, we do out of curiosity or even just for fun. It resonates in my head that if one day I can have as much fun on a Linux on ppc64le as I do on x86 or slowly on ARM (Mac, Raspberry) it will mean that Power can be “the third” architecture for Linux far beyond the actual use cases and mission-critical workloads. In other words, if I can do the same on ppc64le as on other architectures, I can use Power for any use case.

Why have a thousand x86 servers wasting energy and taking up space in the DPC when we can have a few Power servers doing the same job in a more secure and efficient way? Customers will say, for compatibility, for using standard tools. But multi-architecture can be a new standard, if it isn’t already.

I don’t want to go too deep into this topic today, there are several ideas published on the IBM portal and I think the IBM, Debian, Canonical and Red Hat teams are doing an excellent job which I will cover in future posts.

There were news in the kernel.org list that we have been covering at SIXE blog during the last months regarding the hard work being done on this, and with the arrival of the new FW1060 level we finally have full KVM support on PowerVM. This is something equivalent to that which exists in IBM Z/Linux One. Great!

As always, I wanted to push the technology to its limits including an old dream: to run a Windows (the “enemy” for AIX & Linux guys) and in this case and for more fun Windows XP on a Power10, using KVM and QEMU.

Preparation

We need to configure the LPAR to be KVM host, this will change the way it uses PowerVM in such a way that there is no overhead, and at least one dedicated processor must also be assigned to it (not in “donating” mode, mind you). This will give us 8 dedicated threads to run our virtual processors in KVM. Yes, it’s a lot simpler and less capable than PowerVM with its micro-partitioning, but it’s still an industry standard and not everyone needs to commute to work on a plane. Don’t you think so?

Choosing the distribution

In my experience the best support for ppc64le experiments is usually Debian or Fedora. In this case I have installed Fedora40 and upgraded to the latest levels. Then you have to install all the  virtualization packages and qemu support for other architectures. Following my idea of creating interactive articles, I will use virt-manager to avoid complex QEMU settings. I my environment I have installed all qemu-system-*

To get Windows to detect our virtual SATA disks as usable, you’ll need to set up this

Once you are done you can install what your disks will need

# dnf install virtio-win-stable

You will also need a Windows XP .iso and its licence numbers. I recommend placing it in /var/lib/libvirtd/images so that it is automatically detected by virt-manager.

Creating the VM (just follow the wizard)

Make sure you select x86 as architecture (qemu will be in charge of this)

 

Just like when we ran AIX on x86, don’t expect it to go very fast, although it took about an hour to install… actually about as long as it took on a PC of the time. What I do to see MS Messenger again! Enjoy the video and stay updated by following us! 

Installing Windows on IBM Power (for fun)Installing Windows on IBM Power (for fun)

Further tests

What about running a MS PowerShell for ARM64 on docker? I can now “dir” on Power, fantastic! :P

Conclusion

The work done to support KVM is for me the biggest news in recent years because of the endless possibilities it opens up for the Power platform.  As far as I have been able to test everything works and works very well. Congratulations to all the people who have made it possible. 

Logo Suse En fondo de SIXE

Understanding high availability (HA) on SUSE Linux

High availability and business continuity are crucial to keep applications and services always operational.
High availability clusters allow critical services to keep running, even if servers or hardware components fail.
SUSE Linux offers a robust set of tools for creating and managing these clusters.
In this article, we explore the current state of clustering in SUSE Linux, with a focus on key technologies such as Pacemaker, Corosync, DRBD and others.
These, with minor differences are available on x86 and ppc64le.

Pacemaker: the brain of the cluster

Pacemaker is the engine that manages high availability clusters in SUSE Linux.
Its main function is to manage cluster resources, ensuring that critical services are operational and recover quickly in case of failure. Pacemaker continuously monitors resources (databases, web services, file systems, etc.) and, if it detects a problem, migrates those resources to other nodes in the cluster to keep them up and running.
Pacemaker stands out for its flexibility and ability to manage a wide variety of resources.
From simple services to more complex distributed systems, it is capable of handling most high-availability scenarios that a company may need.

Corosync: the cluster’s nervous system

Corosync is responsible for communication between cluster nodes.
It ensures that all nodes have the same view of the cluster status at all times, which is essential for coordinated decision making.
It also manages quorum, which determines whether there are enough active nodes for the cluster to operate safely.
If quorum is lost, measures can be taken to prevent data loss or even service downtime.

DRBD: the backbone of the data

DRBD (Distributed Replicated Block Device) is a block-level storage replication solution that replicates data between nodes in real time.
With DRBD, data from one server is replicated to another server almost instantaneously, creating an exact copy.
This is especially useful in scenarios where it is crucial that critical data is always available, even if a node fails.
Combined with Pacemaker, DRBD allows services to continue operating with access to the same data, even if they are on different nodes.

Other key technologies in SUSE Linux clusters

In addition to Pacemaker, Corosync and DRBD, there are other essential technologies for building robust clusters on SUSE Linux:

  • SBD (Storage-Based Death): SBD is a fencing tool that isolates a misbehaving node from causing problems in the cluster.
    This is achieved by using a shared storage device that nodes use to communicate their state.
  • OCF (Open Cluster Framework): OCF scripts are the basis of the resources managed by Pacemaker.
    They define how to start, stop and check the status of a resource, providing the flexibility needed to integrate a wide range of services into the cluster.
  • Csync2: A tool for synchronizing files between nodes in a cluster.
    It ensures that configuration files and other critical data are always up to date on all nodes.

Current status and future trends

Clusters in SUSE Linux have matured and are adapting to new business demands.
With the growing adoption of containerized environments and with parts in different clouds, clusters in SUSE Linux are evolving to better integrate with them.
This includes improved support for container orchestration and distributed applications that require high availability beyond replicating two disks per DRBD and keeping a virtual IP alive :) Still, today, the combination of Pacemaker, Corosync, DRBD and other tools provides a solid foundation for creating high availability clusters that can scale and adapt to the needs of SAP HANA and other solutions that require high if not total availability. If you need help at SIXE we can help you.

Cheatsheet for creating and managing clusters with Pacemaker on SUSE Linux

Here is a modest cheatsheet to help you create and manage clusters with Pacemaker on SUSE Linux.
Sharing is caring!

Task Command / Description
Package installation
Installing Pacemaker and Corosync zypper install -y pacemaker corosync crmsh
Basic configuration
Configure the Corosync file Edit /etc/corosync/corosync.conf to define the transport, interfaces and network.
Start services systemctl start corosync && systemctl start pacemaker
Enable services at startup systemctl enable corosync && systemctl enable pacemaker
Cluster management
View cluster status crm status
See node details crm_node -l
Add a new node crm node add <nombre_del_nodo>
Eject a node crm node remove <nombre_del_nodo>
View cluster logs crm_mon --logfile <ruta_del_log>
Resource configuration
Create a resource crm configure primitive <nombre_recurso> <tipo_agente> params <parámetros>
Delete a resource crm configure delete <nombre_recurso>
Modify a resource crm configure edit <nombre_recurso>
Show complete cluster configuration crm configure show
Configuration of groups and assemblies
Create a resource group crm configure group <nombre_grupo> <recurso1> <recurso2> ...
Create an ordered set crm configure colocation <nombre_conjunto> inf: <recurso1> <recurso2>
Create an execution order crm configure order <orden> <recurso1> then <recurso2>
Restrictions and placements
Create placement restriction crm configure colocation <nombre_restricción> inf: <recurso1> <recurso2>
Create location restriction crm configure location <nombre_ubicación> <recurso> <puntaje> <nodo>
Failover and recovery
Force migration of a resource crm resource migrate <nombre_recurso> <nombre_nodo>
Clear status of a resource crm resource cleanup <nombre_recurso>
Temporarily disable a resource crm resource unmanage <nombre_recurso>
Enabling a resource after disabling it crm resource manage <nombre_recurso>
Advanced configuration
Configure the quorum `crm configure property no-quorum-policy=<freeze
Configure fencing crm configure primitive stonith-sbd stonith:external/sbd params pcmk_delay_max=<tiempo>
Configure timeout of a resource crm configure primitive <nombre_recurso> <tipo_agente> op start timeout=<tiempo> interval=<intervalo>
Validation and testing
Validate cluster configuration crm_verify --live-check
Simulate a failure crm_simulate --run
Policy management
Configure recovery policy crm configure rsc_defaults resource-stickiness=<valor>
Configure resource priority crm configure resource default-resource-stickiness=<valor>
Stopping and starting the cluster
Stop the entire cluster crm cluster stop --all
Start up the entire cluster crm cluster start --all

 

Logos sixe podman docker y lxd ubuntu

Discover Ubuntu LXD: The alternative to Docker or Podman

Do you still use only Docker or Podman? Find out why you should try Ubuntu LXD

INTRODUCTION

Ubuntu LXD is Ubuntu’s container manager, based on LXC(Linux Containers), which despite the rise of technologies such as Docker in the Kubernetes ecosystem, remains highly relevant. This article explores the reasons behind the persistence of LXD, its distinctive use cases and the products that employ it in the real world. Ready to find out why you should pay attention?

WHAT IS UBUNTU LXD?

LXD is a container management tool that acts as an enhancement to LXC, offering a more complete containerization experience geared towards lightweight virtual machines. While Docker and all other containers based on the OCI standard are ephemeral by design, LXD is more focused on providing full system containers, allowing multiple processes and services to run in a virtual machine-like fashion. You can even, deploy a complete Kubernetes environment, with its containers inside an LXD In that it looks much more like its close relatives such as BSD jails, Solaris zones and AIX WPARs. Still think Docker or Podman are your only options?

LXD interface screenshot

The evolution of containers

Remember when Docker was the one containerization tool everyone loved? Since its release in 2013, Docker revolutionized application development and deployment by making containers accessible and easy to use. Docker allowed developers to package their applications together with all their dependencies, ensuring that they would work consistently in any environment. This innovation led to a massive adoption of containers in the industry, with Docker and Podman becoming de facto standards, if not directly their orchestrators such as Kubernetes. But is Docker the only star of the show?

While Docker was getting all the attention, LXD was quietly working to offer something different: full OS containers. As organizations adopt containers for more use cases, the need for more sophisticated and efficient management has arisen. This is where LXD comes in. Can you imagine having the flexibility of virtual machines but with the efficiency of containers, without having to go crazy and totally change use cases?

Comparison between Ubuntu LXD, Podman and Docker

Docker and Podman are designed to package and deploy individual applications, while Ubuntu LXD offers a more complete experience. Its architecture focuses on containerization of microservices, cloud applications and continuous deployment.

In addition, they are tightly integrated with Kubernetes, the most popular container orchestration tool on the market. On the other hand, LXD allows you to run a complete system inside a container. This capability makes it ideal for use cases where a complete environment is required, similar to a virtual machine but with the efficiency of containers. See the difference?image of LXD and Docker logos

Ubuntu LXD Use Cases

LXD excels in several specific scenarios. For example, in
Infrastructure as a Service (IaaS)
LXD enables the creation and management of complete operating system containers. This is ideal for cloud service providers who need to offer complete environments without the overhead of traditional virtual machines. Have you ever had trouble replicating a development environment identical to the production environment? With LXD, developers can create isolated and replicable development environments, minimizing configuration and dependency issues.

lxd image virtual machines and linux containers

In the field of network simulations and testing, LXD allows you to simulate complex networks and test services at the network level. This capability is crucial for replicating entire network infrastructures within a single host. For system administration and DevOps tasks, LXD offers flexibility beyond application containerization. It allows the creation of complete environments that can be managed, updated and monitored as if they were physical machines, but with the efficiency of containers. Still think that only Docker is your only alternative?

Solutions using Ubuntu LXD

Canonical, the company behind Ubuntu and a Sixe partner, has developed several solutions based on Ubuntu LXD to offer exceptional performance and flexibility. Among these solutions is MAAS (Metal as a Service), which uses LXD to provide highly configurable development and test environments. It allows users to deploy complete operating systems in containers, facilitating the management of large and complex infrastructures.

canonical's microcloud github statistics

Microcloud benefits from LXD by integrating it to offer full operating system containers as an additional (or alternative) option to traditional virtual machines, improving flexibility and efficiency in resource management. In addition, Travis CI, a continuous integration platform, uses LXD to run its test environments, enabling Travis CI to deliver fast and reproducible test environments, improving developer efficiency. Are you surprised? There is more.

For those of you who are looking to implement these solutions in your environment,
SIXE Engineering
is the reference partner of Canonical and Ubuntu that you are looking for. With extensive experience in implementing LXD and other virtualization technologies, SIXE can help you maximize the potential of your technology infrastructures. Whether you need support for MAAS, OpenStack or any other LXD-based solution, SIXE has the knowledge and experience to guide you every step of the way. When there are many paths that fork, we can recommend, advise and accompany you on the one that suits you best. Without compromises or being tied to any manufacturer, because with Canonical we do not offer closed products, but open technologies, made with and for the community, taking the philosophy of free software to its ultimate consequences.

Conclusion

Despite the dominance of lightweight containerization technologies such as Docker and Podman in Kubernetes, LXD remains relevant in many use cases because of its ability to provide full OS containers. Its use in infrastructure as a service, development environments, network simulations and system administration as well as its adoption in products such as MAAS, OpenStack and Travis are proof of this.

In our view, the benefits of LXD lie in its unique ability to combine the efficiency of containers with the simplicity of virtual machines, offering a hybrid solution that remains essential for multiple applications. Still think Docker is the only option? Surely not. We hope you enjoyed this article and remember that, for any implementation of these technologies,
you can count on SIXE’s expert support by clicking here.
We will always be at your side with the best free solutions.

Can we run (nested) KVM VMs on the top of IBM PowerVM Linux LPARs?

Updated! No longer a rumor but officially supported as of July 19, 2024 (see annoucement)

A brief history of nested virtualization on IBM Hardware

Nested virtualization enables a virtual machine (VM) to host other VMs, creating a layered virtualization environment. This capability is particularly beneficial in enterprise scenarios where flexibility, scalability, and efficient resource management (if we save on CPU we do on $$$ licenses) are critical.

While it can be used for testing purposes with KVM on x86 or VMware, the performance is often suboptimal due to multiple translations and modifications of hardware instructions before they reach the CPU or I/O subsystem. This issue is not unique to these platforms and can affect other virtualization technologies as well.

On platforms like Z, although the performance impact of nested virtualization exists, improvements and optimisations in the hypervisor can mitigate these effects, making it 100% viable for enterprise use.

Virtualization layers on IBM Mainframe

Before delving into nested KVM on PowerVM, it’s essential to understand similar technologies. If the mainframe is the grandfather of current server technology, then logical partitioning (LPARs) and virtualization technologies (zVM) are the grandmothers of hypervisor solutions.

zvm linuxone kvm powervm hypervisors

In this picture (taken from this GREAT article from ) you can see up to 4 layers

Level 1 Virtualization: Shows an LPAR running Linux natively

Level 2 Virtualization: Shows VMs running on z/VM or KVM Hypervisor

Level 3 Virtualization: Shows nesting of z/VM Virtual Machines

Level 4 Virtualization: Shows Linux containers that can either run as stand-alone containers or can be orchestrated with kubernetes

Now have a look to this old (2010) image from the IBM Power platform architecture. Can you see anything similar? :) Let’s move on!

powervm virtualization

Deploying VMs on the top of a PowerVM Linux LPAR

If we have LPARs on Power where we can run AIX, Linux, and IBM i, and in Linux, we can install KVM, can we run VMs inside an LPAR?

Not quite; it will fail at some point. Why? Because KVM is not zVM (for now), and we need some tweaks in the Linux kernel code to support nested virtualization not just with IBM Power9 or Power10 processors, but also with the Power memory subsystem and I/O.

By examining the kernel.org mailing lists, we can see promising developments. Successfully running multiple VMs with KVM on a PowerVM LPAR means porting some fantastic mainframe virtualization technology to IBM Power, allowing us to run VMs and Kubernetes/OpenShift Virtualization on ppc64le for production purposes. This would make a significant difference if the performance penalty is minimal.CPU virtualization on Power and Mainframe systems simply allocates processor time without mapping a full thread as KVM or VMware do. Therefore, it is technically possible to add a hypervisor on top without significantly affecting performance as IBM does with LinuxOne.

Latest news for KVM on IBM PowerVM LPARs  (May 2024)

At Sixe, we have been closely monitoring developments in ppc64 and ppc64le for years. Recently, we’ve found some intriguing messages on the Linux kernel mailing lists. These messages provide insights into the immediate roadmap for this highly anticipated and demanded technology.

1) Add a VM capability to enable nested virtualization
Summary: This message discusses the implementation of nested virtualization capabilities in KVM for PowerPC, including module configurations and support on POWER9 CPUs.

2) Nested PAPR API (KVM on PowerVM)
Summary: It details the extension of register state for the nested PAPR API, the management of multiple VCPUs, and the implementation of specific hypercalls.

3) KVM: PPC: Book3S HV: Nested HV virtualization
Summary: A series of patches improving nested virtualization in KVM for PowerPC, including the handling of hypercalls, page faults, and mapping tables in debugfs.

For more detailed information, you can consult the following links:

Will we be able to install Windows on Power Systems (for fun)?

CAKE - Perhaps, Perhaps, Perhaps (Official Audio)CAKE – Perhaps, Perhaps, Perhaps (Official Audio)

Stay tuned!!

IBM Power10 Servers

New IBM Power10 S1012 server for Edge Computing, HA, DR and Small Environments

The most compact Power10 for your remote environment, disaster recovery, edge computing and AI inferencing

IBM has just announced a new IBM Power server model, the S1012. A true BEAUTY that SIXE will soon have in the office, and depending on the noise it makes, maybe even under the table :) It can be obtained in tower or rackmount format, either by joining two servers together, as each one occupies half the width of a conventional rack, as shown in this image, or by leaving a “gap” to fill the entire 2U. It can be configured as you wish. The serviodr comes with 1 socket up to 8 cores and 256GB of RAM and at SIXE we will start offering it from June 2024.

What can we run on the new S1012?

Linux distributions such as Ubuntu, Rocky, Alma, RHEL and SUSE, as well as AIX and IBM i, can be installed directly or virtualized with PowerVM. IBM Power S1012 is designed to enhance remote management capabilities for customers looking to expand applications such as AI inference, OpenShift nodes, critical applications under “Edge Computing” architectures, i.e. bringing these servers physically to where they are needed to directly process data without the need to transfer them first, achieving significant cost savings, speed and efficiency. In addition, thanks to the tower format, we can install these servers wherever we want without the need for rack cabinets.

 

Reduce your carbon footprint

With Power10 servers you can do much more with less. Thanks to its 8 threads per physical core, you can consolidate many, many x86 or ARM environments on a single Power, saving power and space in your data centers.

Use cases

It is designed and optimized for distributed computing such as photovoltaic plants, industries, ships, airplanes, vehicles, military environments, spacecraft and many more. It is also ideal for running major workloads in small organizations, for example ERPs or industrial management applications on IBMi and RPG, or as a very low-cost solution for backup environments (Remote Office / Back Office – ROBO). It is also easy to connect directly to cloud services such as IBM® Power® Virtual Server for backup and disaster recovery. In addition for critical databases, with GLVM we can create clusters between sites hundreds of miles apart for Oracle, Informix or DB2 without the need for dedicated fiber connections.

Technical detailsAccess the redbook that IBM has prepared with all the details of these systems.

Price

The S1012 offers the lowest entry price of all Power servers and up to 3 times the performance of an equivalent x86 system. If you are an IBM i customer you can license a single core and use the rest for other workloads on AIX or Linux. If you want to know more, call us!

 

logos LXD, IBM PowerVM, Proxmox y Red Hat OpenShift vs. VMware ESXi

Comparing hypervisors: LXD, IBM PowerVM, Proxmox and Red Hat OpenShift as alternatives to VMWare ESXi

Virtualization is a vital tool in the IT world, enabling companies to optimize their hardware resources and improve the efficiency and management of their systems. VMware ESXi has been an undisputed leader in this space, but with its purchase by Broadcom and the very important changes in pricing, and above all, the elimination of its free version, thousands of customers are evaluating the existing alternatives.

Here is our small contribution, as IBM PowerVM experts but also enthusiasts of the other KVM-based options. All of them (except VMWare) work in our labs and depending on the projects we choose one or the other for our customers. If you would like us to discuss it in detail
please contact us without obligation.

While it is difficult to provide a comprehensive comparison with all ESXi features, as they vary between versions and specific combinations with other VMware tools, the following table provides a summary of what we consider to be the most important ESXi features and how they are supported in LXD, PowerVM, Proxmox and Red Hat OpenShift. We hope you find it useful.

Feature LXD VMware ESXi PowerVM Proxmox Red Hat OpenShift (OCP)*
Type of software Open source. Owner Proprietary (IBM specific) Open source (KVM and container-based) Proprietary (based on Kubernetes and containers)
It is based on KVM. Just as OCP supports containers and also VMs. VMkernel Based on IBM technology inherited from Mainframe environments, with advanced processor micro-partitioning technologies and HW isolation of VMs. KVM and LXC KVM (for virtual machines *if installed in bare-metal mode and not on top of other hypervisors) and Kubernetes for containers
Web UI Yes Yes, but limited. vSphere is required for many functionalities. Yes HMC (equivalent to vSphere) or PowerVC (based on OpenStack) Yes Yes
Clustering Yes Yes Yes Yes Yes (through Kubernetes)
High Availability Yes Yes Yes Yes Yes (with advanced Kubernetes features)
VM live migration Yes Yes Yes Yes Yes (via Kubernetes and OpenShift Virtualization)
Shared storage Ceph vSAN Supports various file systems and storage Ceph, ZFS and others GlusterFS, Ceph and others
Networking Bridge, OVN NSX Compatible with almost all network technologies Bridge, VLAN, VXLAN and others SDN, OVN and others
Snapshots Yes Yes Yes Yes Yes
Backup Yes Yes Yes (with IBM and third-party management tools) Yes Yes
Free trial N/A (unlimited free use) 30 days Not applicable (included free with IBM hardware) N/A (unlimited free use) Free trial available
Cost Free of charge, with enterprise support available per physical host Full functionality requires a paid license. Included with IBM Power hardware Free of charge, with enterprise support by subscription Core-based underwriting; varies by environment.
Number of yarns Limited to 2 threads per core (x86) Limited to 2 threads per core (x86) Up to 1,920 threads (Power10 E1080) Limited to 2 threads per core (x86) Limited to 2 threads per core (x86)
Type of hypervisor Level 1 (over KVM) Level 1 Level 0 (separate VMs at firmware level with CPU mapping) Level 1 (KVM) and Level 2 (LXC) Level 2 (on RHEL)
Technology maturity (years) > 10 years > 20 years > 30 years (coming from Z environments / LPARs) > 10 years > 10 years
Maximum RAM capacity per VM Up to 2TB Up to 2 TB Up to 32 TB Up to 2TB Up to 2TB
Migrar de oracle

How to get out of Oracle ULA and save up to 60% by migrating to IBM Power

Exiting an Oracle Unlimited License Agreement (ULA) contract and migrating to IBM Power systems can be a complex process, but executed well, it can offer significant savings and long-term benefits. In this article, we will explore how to make this transition effectively and without penalties, based on real examples.

Understanding Oracle ULA

First, it is essential to understand what an Oracle ULA entails. It’s a contract that Oracle bought from a third-party company and continues to scare and delight in equal parts. Allows unlimited use of certain Oracle software products for a specified period of time, usually between 3 and 5 years. At the end of the ULA contract, the company must declare the use of these products and this becomes their “certification” for future license audits. There is a famous saying that it is better to know the bad than to know the good. And another that the devil is in the details. In the case of Oracle, no two ULAs are the same. They are all based on the same premise “when Oracle believes it can get money from its customer”. But beyond that, there are rules of the game that, once understood, allow us to help our clients.

Steps to Exit the Oracle ULA

  1. Initial audit: Prior to the completion of the ULA, we conduct an internal audit to fully understand your current usage of Oracle products. This includes identifying which products are essential and which can be replaced or discarded.
  2. Future needs analysis: We evaluate the future needs of your company in terms of software and databases. This step is crucial to determine whether the transition to IBM Power is feasible and what the potential savings are.
  3. Third-party licensing contract review: Since Oracle contracts can be complex, it is advisable to work with specialized Oracle licensing consultants. They can help you understand the implications of your ULA and how to get out of it without incurring penalties.
  4. We negotiate with Oracle: We help you negotiate a new agreement that best suits your current and future needs.
  5. Migration planning: Develop a detailed plan to migrate from Oracle to IBM Power.

Migration to IBM Power

Migrating to IBM Power involves moving Oracle database and application workloads to an IBM environment. This may include the use of IBM Db2, which is known for its high performance and security.

  1. Compatibility assessment: We ensure that your current applications are compatible with IBM Power. Oracle is Oracle in all its current and future versions, but there can always be an application that requires some modification to change architecture (we do it every day and without problems).
  2. Design of the new environment: Based on the previous audit, we design a new secure, simple, powerful and stable environment adapted to your needs and budget.
  3. IBM Power Implementation: We help you acquire and deploy IBM Power. We configure the necessary databases and applications.
  4. Data Migration: We move data from Oracle to IBM Power, ensuring that data integrity is maintained during the process.
  5. Performance, HA and DR testing: Perform extensive testing to ensure that all applications and databases function correctly in the new environment.
  6. Training and technical support: We train your team in the use of the new platform and if you need it, you can use our preventive maintenance and technical support services to help them.

More things to like about Oracle in Power

We have official and supported Ansible playbooks to automate all deployments and day 2 operations:

Lots of documentation:

 

And at SIXE, as an official IBM training provider, we ensure that your technical teams master the platform within weeks. As technicians ourselves, we guarantee that they will be very grateful for the change.

 

 

How much budget can I save by migrating Oracle to IBM Power?

In terms of costs, migrating from Oracle to IBM Power can result in significant savings, although these vary from customer to customer. Real-world examples have shown savings of 20% to 60% in total cost of ownership (TCO) by migrating from Oracle to alternative solutions such as IBM. These savings come from lower licensing costs, reduced need for high-performance hardware due to the efficiency of IBM Power, and lower maintenance and support costs.

But Oracle licenses for Power are more expensive!

True, but we have customers where we can do with 25 Power10 cores the same as with 100 in an Exadata, but IBM Power is not restricted to Oracle (although there are more than 80,000 installations worldwide). You can deploy OpenShift, SAP HANA or any other workload running on SUSE, Red Hat, AIX and IBMi. In reality, the most common use case is the consolidation of all Exadata and most x86 servers into one Power10 in each data center. Running everything on a hypervisor that is at another level, where instead of “mapping cpus” as KVM or VMWare does, the capacity of each one is shared in real time, gaining in overall system utilization as well as performance. Exadatas have been a great marketing achievement, but they are neither cheaper, nor do they deliver better performance or provide the security of IBM Power.

Conclusion

Exiting an Oracle ULA contract and migrating to IBM Power is perfectly feasible. By doing this correctly, not only can penalties be avoided but also considerable cost savings can be achieved, while improving the efficiency and technological adaptability of the company. It is essential to have the support of licensing experts and conduct a thorough analysis to ensure a successful transition.

We do not expect to have convinced you, but perhaps we could talk without obligation, discuss any questions and, if you find it interesting, perform a feasibility analysis free of charge . In the worst case, you renew the ULA as is. Just kidding (or not) :)

Logo AIX

Looking for an alternative to Oracle on Solaris? Try AIX (or Linux) on IBM Power!

At SIXE we love Solaris, and have worked with many SPARC machines for many years. Unfortunately, its life cycle is coming to an end, but not that of its Oracle databases (nor its not at all cheap per-processor licenses). What are the alternatives? This is what we thinkbased on our experience. As a systems integrator, we specialize in mission-critical environments. We work hard to design them, configure them and keep them secure and available 24x7x365. Our natural choice is IBM Power with AIX (for Oracle, DB2 or Informix) and Linux for new workloads with open source databases. Within proprietary environments, Oracle 19c and 21c databases form a large part of our customers’ installed base. Legacy SAP environments and a wide variety of applications depend on them.

Why choose IBM Power for Oracle?

We are going to give you five reasons to try, if not to convince you, at least to make you want to talk to us and discuss it in more detail. Those of you who know us know that we are generally better engineers than sales people. For those who don’t, you will soon find out why. Here we go!

1. It is a better long-term investment

As long term as SPARC machines have been with so many customers. When you have a Power20 you will be able to prove us right. It is a robust, secure, high-performance architecture with full support for UNIX (AIX) and Linux environments. In fact, before Oracle bought Sun, the Power-AIX-Oracle combination was even in TV commercials. Much of IBM’s UNIX server technology was designed for large Oracle, DB2 and Informix databases. Oracle marketing says their bet is Exadatas based on OracleLinux , but more than 80,000 customers worldwide use Power. There must be a reason.

2. If you want, you can keep or switch to UNIX (and this is not a joke).

Although we love Linux, containers, free software and all this world, we think that there is no more stable environment for a critical database (other than HOST / IBM Z) and secure than AIX. It is a modern UNIX, flexible, compatible with hundreds of free software packages and extremely easy to use. If you come from Solaris, you’ll see that they are first cousins and at SIXE we give you the Training you need, or a L2 and L3 support for the entire infrastructure throughout the lifecycle of the machines so that you only have to worry about the database or your applications. Many are surprised that we execute Oracle Linux to AIX migration projects, but it’s all advantages for customers and their system administrators. AIX is a UNIX will remain with us, just like FreeBSD or MacOS for many reasons. Even so, if for whatever reason you prefer Red Hat or SUSE, they also work perfectly well, although Oracle only supports them on its Z systems (LinuxOne). But the other Oracle alternatives like PostgreSQL / EnterpriseDB, MongoDB or MariaDB work great and have full support for all Linux distributions running on Power (ppc64le). Also free ones such as Alma, Rocky Linux and OpenSUSE.

You are going to save many, many thousands or hundreds of thousands of Euros.

IBM has for many years migrated to Power the micro-partitioning technologies of processors from Mainframe environments. This means that you can allocate the portions of processors you need with extreme flexibility and reliability. For example you can buy 10 Oracle licenses and run 20 virtual machines on a 24-core physical machine. You do not have to license the entire machine. In addition, each IBM Power core performs approximately 3 to 4 times as well as an equivalent generation x86 core. Oracle’s Exadatas are (in our opinion) more expensive, less reliable and less secure.

4. You radically reduce the attack surface.

We have many customers who have been attacked with ransomware (and worse). No Power system upgraded, maintained and with our PowerSC-based cybersecurity solution has been affected. And we’re going to state the obvious, but most malicious code is not compiled for Power environments :P Just as your money is safer in a Z / s390 environment, your database will probably live more peacefully in ppc64. And don’t worry, we are heading towards a multi-architecture world, where there will be more and more freedom to choose whether you want ARM, x86, ppc64le or RISC-V. Or don’t you know anyone with a MAC?

5. It is very well documented, works by default and you can automate it.

There are hundreds of guides for architecture, deployment, administration, problem determination and general day 2 operations. Also in the case of AIX, the default kernel setting is optimized for large databases such as Oracle. In addition, the Power architecture has no bottlenecks between processor and memory, with very good performance on SMT-4 and SMT-8. You can also automate most administration tasks with Ansible. There is
updated collections
developed by IBM and Red Hat.

Services for Oracle on AIX / Power by SIXE


SIXE offers specialized Oracle services in IBM Power
providing a smooth and efficient transition, with full support and resource optimization, ensuring a successful migration and operation, taking into account the needs of availability, performance and security. We can help you with:

In conclusion: migrating Oracle from SPARC / Solaris to IBM Power with AIX (or Linux) is not only a smart decision in terms of performance and support, but also an investment and strategic decision. Contact us!

Migrate to SAP HANA, 2027 is here. Tips and recommendations.

What does IBM Power10 for SAP HANA bring us?

Imagine a world where SAP HANA and IBM Power10 come together, like Batman and Robin in the world of technology. IBM Power is not just a server; it’s like a superhero of efficiency and security. What if I told you that running SAP HANA on IBM Power10 is like trading a bicycle for a rocket? It’s often true and we can prove it with performance metrics!

Why choose IBM Power10 for SAP HANA?

Well, here comes the dilemma. Some say that switching to IBM Power10 is like trying to teach your grandfather how to use TikTok. But did you know that SAP HANA runs best on IBM Power10, especially with operating systems like SUSE and Red Hat Linux? It’s as if these operating systems were designed with Power10 in mind. The reason? Superior performance, unmatched security and energy efficiency that would make traditional x86-based servers blush.

Frequently Asked Questions about SAP HANA and IBM Power10

Is it Difficult to Migrate to IBM Power10 for SAP HANA?

Migrating to SAP HANA on IBM Power10 is easier than you think, and the benefits are enormous. Imagine better performance, greater safety and energy savings. SAP, Red Hat and SUSE all have the same packages for Power (ppc64le) as x86. Your system administrators and SAP environment administrators will not notice any difference. The HW is different, but only for the better. Well configured by our specialists, it does not fail, does not give performance problems and is very secure. Oh, and the administration is graphical and simple.

What are the Benefits of Using SUSE and Red Hat Linux on IBM Power10?

Here’s the secret sauce! Both SUSE and Red Hat Linux fit IBM Power10 like a glove. These operating systems take advantage of Power10’s unique capabilities, because they have been running on Power for many, many years. In fact, it is the only architecture supported for deploying multiple productive and non-productive environments on the same systems.

Conclusion: The winning combination for SAP HANA is IBM Power10.

In short, migrating to SAP HANA on IBM Power10 on your favorite Linux distribution is a natural choice. With SUSE and Red Hat Linux, this platform becomes an oasis of performance and reliability. And well, everything that is not migrated to HANA can continue to run for many years smoothly and securely on AIX. Don’t get left behind and join the IBM Power10 and SAP HANA revolution!

SiXe Ingeniería
×