BlueMix is IBM's PaaS (Platform as a Service) offering A cloud-based platform for rapidly building, managing and running applications of all types (web, mobile, big data, social,

About the Book



BlueMix is IBM’s PaaS (Platform as a Service) offering A cloud-based platform for rapidly building, managing and running applications of all types (web, mobile, big data, social, … ). Allows developers to use capabilities (services) from IBM or ecosystem partners in a pay-as-you-go model in the cloud. – Running on IBM SoftLayer infrastructure (IaaS) – Based on open-standards (OpenStack, CloudFoundry) Bluemix provides access to a wide variety of services that can be incorporated into an application. Some of these services are delivered through Cloud Foundry. Others are delivered from IBM and third party vendors. New and enhanced services are added to the catalog often. To see the current list of runtimes and services, and their status go to the Bluemix catalog.

Some of the commonly used runtimes are:

  • js
  • PHP
  • Python
  • Ruby

Some of the Bluemix services available from the expanding catalog include:

Service nameDescription
BigInsights for HadoopPowered by InfoSphere BigInsights, which is based on open source Hadoop, this service provides the open source capabilities of HBase, Hive, MapReduce, Pig and others, including your own open source packages.
Business RulesEnables developers to spend less time recoding and testing when the business policy changes. This service minimizes your code changes by keeping business logic separate from application logic.
Cloudant NoSQL DBProvides access to a fully managed NoSQL JSON data layer that’s always on. This service is compatible with CouchDB, and accessible through a simple to use HTTP interface for mobile and web application models.
Data CacheImprove the performance and user experience of web applications by retrieving information from fast, managed, in-memory caches, instead of relying entirely on slower disk-based databases.
DevOps Auto-ScalingEnables you to automatically increase or decrease the compute capacity of your application. The number of application instances are adjusted dynamically based on the Auto-Scaling policy you define.
DevOps Delivery PipelineAutomate builds and deployments, test execution, configure build scripts, and automate execution of unit tests. Automatically build and deploy your application to IBM’s cloud platform, Bluemix.
Embeddable ReportingUse a simple cloud editor then embed reports and dashboards in your web or mobile app using a wide variety of languages such as Node.js or Java using a RESTful API.
Geospatial AnalyticsLeverage real-time geospatial analytics to track when devices enter or leave defined regions.
Internet of ThingsLets your apps communicate with and consume data collected by your connected devices, sensors, and gateways.
Mobile Push NotificationsPush information to all application users or to a specific set of users and devices. You can even let users subscribe to specific tags or topics for notification.
MongoDBA popular NoSQL database
MQ LightDevelop responsive, scalable applications with a fully-managed messaging provider in the cloud. Quickly integrate with application frameworks through easy-to-use APIs.
RedisA popular distributed dictionary server used by many distributed applications
Secure GatewayBrings Hybrid Integration capability to your Bluemix environment. It provides secure connectivity from Bluemix to other applications and data sources running on-premise or in other clouds. A remote client is provided to enable secure connectivity.
SendgridSendgrid’s cloud-based email infrastructure relieves businesses of the cost and complexity of maintaining email systems.
Session CacheImprove application resiliency by storing session state information across many HTTP requests. Enable persistent HTTP sessions for your application and seamless session recovery in event of an application failure.
Single Sign-OnImplement user authentication for your web and mobile apps quickly, using simple policy-based configurations.
SQL DatabaseAdd an on-demand relational database to your application. Powered by DB2, it provides a managed database service to handle web and transactional workloads.
Watson Alchemy APILeverage natural language processing and computer vision in your apps to deeply understand the world’s conversations, documents and photos.
Watson Language TranslationConverts text input in one language into a destination language for the end user. Translation is available among English, Brazilian Portuguese, Spanish, French, and Arabic.
Watson Personality InsightsDerives insights from transactional and social media data to identify psychological traits which determine purchase decisions, intent and behavioral traits; utilized to improve conversion rates.

Companies making use of Bluemix :

BlueMix has some buildpacks built in so that you do not have to specify an external buildpack when deploying an application – for example a Java web application, Node.js application, Ruby application. This uses buildpacks which can be sourced from the community ecosystem – see some of the links provided by others as answers to this question.

Security of the Bluemix platform :


Bluemix provides functional, infrastructure, operational, and physical security (through IBM SoftLayer) for the core platform. The Bluemix environment on SoftLayer is compliant with the most restrictive IBM information technology (IT) security standards, including the following, which meet or exceed the industry standards: Network, data encryption and access control Application access control lists (ACLs), permissions, and penetration testing Identification, authentication, and authorization Information and data protection Service integrity and availability Vulnerability and fix management Denial of service and systematic attacks detection Security incident response Functional security Bluemix provides various functional security capabilities, including user authentication, access authorization, auditing of critical operations, and data protection: Authentication Application developers are authenticated to Bluemix by using the IBM web identity. For Bluemix Dedicated, authentication through LDAP is supported by default. On request, authentication through IBM web identity can be set up instead. Authorization Bluemix uses Cloud Foundry mechanisms to ensure that each application developer has access only to the applications and service instances that they created. Authorization to Bluemix services is based on OAuth. Access to all Bluemix Platform internal endpoints are restricted to external users. Auditing Audit logs are created for all successful and unsuccessful authentication attempts of application developers. Audit logs are also created for privileged access to Linux systems that host the containers where Bluemix applications run. Data protection All Bluemix traffic goes through IBM WebSphere DataPower® SOA Appliances, which provide reverse proxy, SSL termination, and load balancing functions. The following HTTP methods are allowed: DELETE, GET, HEAD, OPTIONS, POST, PUT, TRACE. If HTTP is inactive, it times out at two minutes. Secure development practices Periodic security vulnerability scans are performed on various Bluemix components by using IBM Security AppScan Dynamic Analyzer and static analyzer offerings. Threat modeling and penetration testing are performed to detect and address any potential vulnerabilities. In addition, application developers can use the AppScan Dynamic Analyzer service to secure their web apps that are deployed on Bluemix.

Infrastructure security :

Bluemix builds upon Cloud Foundry to provide a robust foundation for running your applications. Within the architecture, several components are provided for security and isolation: Environment segregation Development and production environments are segregated from each other to improve application stability and security. Firewalls Firewalls are in place to restrict access to the Bluemix network. Intrusion protection Bluemix enables intrusion protection to discover threats so that they can be addressed. Intrusion protection policies are enabled on firewalls. Secure application container management Each Bluemix application is isolated and runs in its own container that has specific resource limits for processor, memory, and disk. Operating system security hardening IBM administrators regularly perform network and operating system hardening by using tools such as IBM Endpoint Manager. In addition, change management and backup and recovery procedures are implemented to ensure integrity and availability. Operational security Bluemix provides a robust operational security environment with the following controls: Vulnerability scan Bluemix uses the Tenable Network Security vulnerability scanning tool, Nessus, to detect any issues with network and host configurations so that the issues can be resolved. Automated fix management Bluemix administrators ensure that fixes for operating systems are applied at appropriate frequencies. Automated fixes are enabled by using IBM Endpoint Manager. Audit log consolidation and analysis Bluemix uses the IBM QRadar® Security Intelligence Platform tools to consolidate Linux logs to monitor privileged access on Linux systems. Bluemix also uses IBM QRadar security information and event management (SIEM) to monitor successful and unsuccessful login attempts of application developers. User access management Within Bluemix, Segregation of Duties guidelines are followed to assign granular access privileges to users and to ensure that users have only the access that is required to perform their jobs according to the principle of least privilege. Within a Bluemix dedicated environment, assigned administrators can manage roles and permissions for Bluemix user in their organization by using the Admin console.

Book Club Resources
Disclosure of Material Connection: Some of the links in the page above are "affiliate links." This means if you click on the link and purchase the item, I will receive an affiliate commission. I am disclosing this in accordance with the Federal Trade Commission's 16 CFR, Part 255: "Guides Concerning the Use of Endorsements and Testimonials in Advertising."