Updated: October 29, 2018
Cloud Application Manager allows organizations to do more with their clouds by driving collaboration between the spheres of influence within enterprise IT — Developers, IT Operations and Finance — into a common team workspace, where they focus on modeling workloads, manage them through their lifecycle, and optimize costs against business initiatives.
From a single platform, an automated software-defined managed service can automatically configure, deploy, scale, or update new and existing applications for public, private and hybrid IT environments, track applications and workloads, and certain public cloud services can be procured and consumed within the platform. By subscribing to CenturyLink support, users can leverage the experts at CenturyLink to monitor and manage the health and stability of workloads.
Cloud Application Manager offers 2 support tiers. All Customers receive the baseline Platform Advisory Support. Customers may select Managed Services Anywhere (“MSA”) for each Supported Provider (see section below) account. Each support tier is more fully described in Sections A and B below.
The primary capabilities of Cloud Application Manager focus on:
Cloud Application Manager has two commercial versions available. Cloud Application Manager is not available for any public sector (e.g. federal, state, local or education) customer who requires FISMA or any other higher level security or regulatory requirements. Please review the sector availability matrix for further details.
This automated software defined managed services platform, powered by cloud and infrastructure experts, provides a complete management experience for hybrid IT environments. MSA is designated at the cloud or infrastructure provider account layer and includes management of applications or workloads that run on top of the cloud platform. The standard features of MSA include deployment, configuration, administration, monitoring, maintenance and support for the Supported Providers and certain provider services.
By selecting MSA, Customer agrees and shall ensure that it has all appropriate permissions to enable the installation by CenturyLink of a proprietary management appliance on each platform/environment for which MSA is selected in order to enable CenturyLink to perform it obligations. CenturyLink’s management fees are not applicable to the appliance itself. In addition, a remote gateway is deployed on the appliance to establish a secure connection between customer network and CenturyLink to remotely access managed devices on the customer’s network. The connection is monitored and maintained by CenturyLink.
The table below describes the standard operational functions of MSA. CenturyLink reserves the right to require Advanced Managed Services or other upgrades (subject to additional terms and pricing) for any Customer request that is not described in the tables below or otherwise deemed out of scope.
|Patching and Maintenance
AWS and Azure Resale
Supports all available critical and vendor-recommended patches. CenturyLink ensures only such patches are installed. Customers have full control to define when and if CenturyLink should schedule their patching cycles. CenturyLink’s automated system tracks the change request, performs the patch management and provides reports. This includes:
Change Management activities through risk assessments, testing procedures, tracking metrics throughout progress, roll-back processes and post-deployment validation. This includes Customer access to operating system-level change data performed by CenturyLink. Such changes are performed on behalf of the Customer and are available for auditing purposes. Customers are responsible for requesting the implementation of patch releases.
Maintenance Windows: All times listed under Schedule Maintenance Windows are local times and subject to change.
CenturyLink manages user policies, administration and password management enforcement of Supported Provider accounts configured within Cloud Application Manager.
CenturyLink secures the OS with industry-standard anti-virus protection, including the guidelines of the Supported Providers, regular virus and malware signature updates, and additional OS-level hardening to mitigate risk on the Supported Provider environment. This also includes permissions and hardening policies (see Permissions and Hardening section).
CenturyLink will provide support for the following license types for instances that are designated for MSA, subject to the Permissions and Hardening section below:
|Watcher Monitoring and Alerting (limited to BYOC, Greenfield or existing Brownfield accounts for AWS and Azure)||
The CenturyLink developed and proprietary monitoring service (Watcher) that is automatically integrated directly with AWS and Azure monitoring technologies enables host, service, and application monitoring of Customer’s AWS or Azure cloud environments. The Watcher utilizes an intelligent agent deployed to all managed VMs. Monitoring policies are centrally configured and maintained by CenturyLink certified cloud engineers.
CenturyLink’s Watcher uses both agent based and cloud service provider integrations to collect metrics and generate alerts.
The following standard Cloud Application Manager platform features are available and are included in the standard MSA service (no additional charges). See the Feature Descriptions under B. Platform Advisory Support for more details.
Managed Services Anywhere is currently available for the following cloud service provider accounts, which may be modified or changed from time to time. This support type must be selected for each individual subscription account:
RDS (MySQL, Oracle, SQL)
Elastic Load Balancing
AR & VR Tools
Business Productivity Tools
Media Services Tools
App Integration Tools
Game Development Tools
Desktop/App Streaming Tools
Serverless App Repository
All Management Tools
|Managed Technologies||Virtual Machines
Local Network Gateway
|Advisory Technologies||App Service
SQL Data Warehouse
AI Machine Learning Tools
Azure Container Services
The tables below describe the activities Centurylink will perform against the technologies noted above.
Managed Activities against the Managed Technologies noted above for AWS and Azure (examples only, not a finite list)
Advisory Activities against the Advisory Technologies noted above for AWS and Azure (examples only, not a finite list)
The table below provides examples of some of the Customer requests that would require Advanced Managed Services (subject to additional terms and pricing).
Requests Requiring Advanced Managed Services Upgrades
|Managed Technologies||Edge Gateway
VMware vCloud Director service features
|Advisory Technologies||Any applications or workloads managed by vCloud Director
VMware vRealize Operations
|Managed Technologies||Cloud Servers
||Managed Services on CLC
|Advisory Technologies||Other Cloud Servers
Other Application Services
The tables below describe the activities CenturyLink will perform against the technologies noted above.
Managed Activities against the Managed Technologies noted above for CenturyLink Private Cloud on VMware Cloud Foundation and CenturyLink Cloud.
Advisory Activities against the Advisory Technologies noted above for CenturyLink Private Cloud on VMware Cloud Foundation and CenturyLink Cloud.
The table below provides examples of some of the Customer requests that would require Advanced Managed Services (subject to additional terms and pricing).
Requests Requiring Advanced Managed Services Upgrades
Below is a list of applications covered under Managed Services Anywhere residing on the Supported Provider platforms as long as the application is running on any Supported Provider platform.
|Managed Technologies||Microsoft IIS
|Advisory Technologies (e.g. apps)||Oracle SAP Containers
Other Open Source Technologies
Any other tech, app, service, language
Managed Activities against the Managed Technologies above for Applications & Databases
Advisory Activities against the Advisory Technologies above for Applications & Databases
The table below provides examples of some of the Customer requests that would require Advanced Managed Services (subject to additional terms and pricing)
Requests Requiring Advanced Managed Services Upgrades
|A list of supported Operating Systems:|
|Managed Technologies||Red Hat Enterprise
(RHEL 6, RHEL 7)
Windows Server 2016 Datacenter
|Windows Server 2008 R2
(Std., Enterprise, Datacenter)
Windows Server 2012 R2
(Std., Enterprise, Datacenter)
|Advisory Technologies (e.g. apps)||Ubuntu||Centos|
Guidance in an advisory capacity is the baseline support tier and is automatically applied unless Customer designates Managed Services Anywhere against each Supported Provider account. This support tier enables CenturyLink to lead all support responsibilities for Azure and AWS (when they are being procured in a Brownfield or Greenfield scenario) as well as Application Lifecycle Management.
The following features, as more fully described below, are available to be consumed (some may include additional charges). See the Feature Description section for more details.
The following features are available in Platform Advisory support:
The table below describe standard features of Cloud Application Manager regardless of support tier.
|Core Platform||Users can integrate with their existing Authentication systems with the following authentication protocols:
|Application Lifecycle Management (ALM)||ALM provides an orchestration platform for users to deploy and manage multiple environments across public and private cloud platforms. This module allows for the modeling of infrastructure and applications in Cloud Application Manager once and deploy to any of the supported environments. Users can choose to model their application in a cloud agnostic fashion or use one of the cloud provider’s native modeling templates like AWS Cloud Formation Template or Azure Resource Manager template. Once applications are deployed using the templates, users can manage the lifecycle of the application, auto-scale the infrastructure, update/patch their applications without down-time and replicate them across environments.
Application Lifecycle Management also has a Continuous Integration and Continuous Deployment (CI/CD) plugin that can be configured to invoke policies in Cloud Application Manager and update their applications and infrastructure residing in the underlying provider platforms, on every code release. Customers can choose to use this functionality even without having to run the bill through Cloud Application Manager.
The Auto-Discovery feature for instances running on AWS, Azure and CenturyLink Cloud infrastructure provider(s) enables visibility of resources that have been previously running. Once a provider is configured, Cloud Application Manger discovers all of the virtual machine instances in that environment and lists them for the user. At that time, a virtual machine instance can be selected and imported. Users register an existing instance so that the lifecycle can be managed within the Cloud Application Manager platform.
Additional features include:
|Cloud Optimization & Analytics
exclusively for AWS and Azure
|Cloud Optimization & Analytics provides the following features:
For both Platform Advisory Support and Managed Services Anywhere, CenturyLink provides consolidated billing, cost optimization, spend analytics, chargeback and best practice recommendations. Certain restrictions, limitations apply
|Authorized Resale of AWS and Azure||Users can setup new AWS and Azure accounts or shift their existing AWS and Azure accounts to CenturyLink Cloud Application Manager. There are three distinct options:
All AWS and Azure accounts are required to be fully hardened per the CenturyLink guidelines (see Permissions and Hardening Policy section)
|Technical Account Management||Both Platform Advisory Support and Managed Services Anywhere provides customers with a designated (not dedicated) Technical Account Manager. This consists of a functional workgroup comprised of technical experts and program governance agents that are designated to a customer account. Technical Account Managers support inquiries regarding Application Lifecycle Management, Cloud Optimization & Analytics, AWS and Azure services. The Technical Account Management responsibilities consist of providing proactive service delivery plans based on the customer strategies, management of support escalations, answering advisory questions related to any of the three core Cloud Application Manager capabilities, addresses billing inquiries and coordinates more extensive architectural and design services from CenturyLink managed services experts. Certain tasks or requests related to the Technical Account Management services may require an upgrade to Advanced Managed Services (subject to additional terms and pricing).
Platform Advisory Support
Managed Services Anywhere
Examples of Activities Requiring AMS Upgrades
|All MSA and Platform Advisory Support is provided by the CenturyLink Global Operations Center. Customers can engage CenturyLink 365x24x7 via phone, email or by opening a ticket as outlined in the table below.|
|incident@CenturyLink.com||Response objective: less than 6 hours|
|Phone||United States: 1-888-638-6771
EMEA: 00800 72884743
Asia Pacific: +65 6768 8099
|Response objective: 1-5 minutes|
|Ticket||Cloud Application Manager portal||Response objective: less than 1 hour|
In addition to the above, Cloud Application Manager provides easy access to the CenturyLink Global Operations Center via links provided within the platform. Once logged into Cloud Application Manager, Customers can launch the Support Center and view existing tickets or open new tickets. When opening a new ticket, the Support Center will navigate the user based on the selections.
CenturyLink Global Operations Center personnel will log into the Cloud Application Manager using CenturyLink maintained credentials to manage customer services, handle support calls and troubleshoot issues.
Within Cloud Application Manager, CenturyLink’s Global Operations Center personnel will have access to the Customers’ instances in the workspaces belonging to Customer when CenturyLink is authorized by the Customer to help manage workloads, workspaces and cost centers. As part of initial setup, every Customer within Cloud Application Manager is configured to add CenturyLink support group as an administrator in order for CenturyLink to provide the support/services requested by Customer.
Log Retention. As a part of the Managed Services Anywhere and Platform Advisory Support for Cloud Application Manager, CenturyLink receives and analyzes Customer logs as needed. Logs are managed according to the policies of the CenturyLink Global Operations Center. The details of the log policy can be found here.
When CenturyLink Global Operations Center personnel look up an instance for management activities, the following information is available about the instance:
Each of the support tiers (Managed Services Anywhere and Platform Advisory Support) is billed monthly based on the spend of the Supported Provider and consumed CenturyLink services.
Bills are provided on the 1st of the month. When CenturyLink owns the consolidated billing relationship for AWS and Azure, there will be reconciliation from the previous month to account for provider adjustments that are posted after CenturyLink’s bill run on the 1st.
All Supported Provider accounts that are identified for Managed Services Anywhere or procured via CenturyLink’s Value Added Reseller program (AWS and Azure – in a Greenfield or Brownfield scenario) are required to be configured with the security and permissions identified below in order to accurately process billing as a percentage of Supported Provider spend for CenturyLink support services. Below are the required levels of access:
In order to complete migration of existing accounts to CenturyLink, Customer must give access to CenturyLink’s Global Operations Support personnel on their existing subscription(s) and designate CenturyLink the Owner role so that resources can be transferred. This is a meta-data change and causes no downtime and does not affect connectivity. The Global Operations Support staff will have permission to review configurations within the account but will not have permission to add, change, or delete resources. Any support inquiries will need to be opened via CenturyLink Global Operations Support and cannot open tickets directly with the provider. The Technical Account Manager will be enabled to facilitate requests and changes on the Customer’s behalf as an administrator only as a part of Advanced Managed Services upgrade subscription. CenturyLink will maintain the ability to make changes to the account as best practices change or the configurations conflicts. CenturyLink will take all the necessary steps to ensure these roles are enabled continuously or until the end of the applicable service term. Upon expiration or termination of the underlying agreement for services, Customer will be able to remove these policies and roles. Customer will retain access to migrated accounts that existed prior to the migration.
AWS Account Security Configurations
Fully hardened, Customer AWS accounts created within or migrated into CenturyLink’s Value Added Reseller program must comply with security best practices and allow operational access as designated by AWS. When accounts are created or on-boarded, CenturyLink must initially be given programmatic access to accounts to enable security-related configuration and to permit appropriately-permissioned, CenturyLink employee access. All credentials provided by the Customer (if part of the Value Added Reseller program) will be encrypted. The following steps will be taken during onboarding:
Customer-owned information about security events will be stored within the customer account and will be retained for the duration of the applicable service term.
CenturyLink maintains AWS requirements by restricting access to cost and spend data directly in the AWS portal account. This information is available within Cloud Application Manager and is provided at no additional cost through Cloud Application Manager’s Cloud Optimization and Analytics module.
The following is a service option available to Customers with Cloud Application Manager. This Service, if enabled, may be subject to additional terms and charges.
The following service description applies to SafeHaven version 5.0. The service description for SafeHaven version 4.0 can be found at SafeHaven Disaster Recovery as a Service 4.0.
Overview: CenturyLink’s SafeHaven software is a distributed software architecture that enables the DRaaS to: deliver group consistency and run book automation for multi-tiered applications, automate data center disaster recovery orchestration, enable continuous recovery with group consistency and checkpoints, and provide recovery/redundancy for both physical and virtual IT systems. DRaaS also includes a graphical user interface, is compatible with multiple servers, and is available with hypervisors and virtual or dedicated data centers.
As used herein, “data centers” refers to the infrastructure on which SafeHaven Replication Node (“SRN”) and CMS are deployed and configured. CenturyLink Cloud services may be utilized as the default production data center; however, Customer may designate any supported data center as the production data center, and the remaining supported data centers would thereby be the recovery data center.
In addition to the applicable Service Schedule, Customers will also be required to sign a Statement of Work and applicable contract documents for all onboarding activities prior to commencement of DRaaS Services. DRaaS is not available to Customers who click to accept the CenturyLink Cloud Master Services Agreement online.
The SafeHaven software is comprised of certain open source software. Customers must install the relevant software on all desktop or laptop computers that Customer will use for DRaaS administration. Please see the Knowledge Base article SafeHaven 5: Open Source Components for additional details.
DRaaS includes the system components listed below and follows a structural hierarchy in the following order:
A SafeHaven cluster means the group of data centers Customer selects to use with its DRaaS Service. Each SafeHaven cluster can service up to 64 data centers. For CenturyLink Cloud, the data centers are virtual data centers, however a Customer may utilize any combination of virtual data centers and dedicated data centers; provided however, dedicated data centers will require the purchase of certain CenturyLink Managed Hosting services.
A Central Management Server (CMS) is an Ubuntu 16 based lightweight virtual appliance (virtual machine) in a recovery data center that connects all the data centers/appliances together and provides access to the DR environment via a SafeHaven console (GUI), which is a standalone java client (provided by CenturyLink) utilized to access the SafeHaven cluster.
The console remotely sends commands to the CMS installed at the recovery site (as more fully described below). Commands are encrypted automatically by embedded SSL in the console and the CMS. Customers use the SafeHaven console to administer the DRaaS and manage their DR environment and initiate point-and-click recovery operations upon individual virtual machines, groups of servers and data drives, or entire data centers. Recovery operations include:
Each SafeHaven cluster includes a single active Central Management Server (CMS). The CMS utilizes the SafeHaven virtual appliance installed at the recovery site and is part of the SafeHaven architecture that:
Data Center Layer
The data center layer is the set of data centers Customer chooses to provision as the recovery site(s) within a cluster via the SafeHaven console.
SafeHaven classifies data centers based on the API used for orchestration of recovery operations and recognizes the following five data center types.
For Clauses 2-5 immediately above, where the data center type is identified as third party, the following additional conditions apply: Where Customer is using their own account, Customer is solely responsible for configuring their account(s), using the third party services in a manner that provides security and redundancy, including enhanced access controls, encryption and backup, and ensuring CenturyLink has all appropriate permissions, credentials and access in order for CenturyLink to perform installation and configuration of SafeHaven. CenturyLink is not responsible or liable for any losses or damages related to the third party services, (direct or via any indemnity) including any liability, losses or damages related to unauthorized access or content or data loss and any losses or damages arising from or related to the installation and operation of SafeHaven on third party systems.
For all 5 data center types above, Customer is fully responsible for performing operations required to control and manage the Service including failover, failback, encryption and data management requirements and other operations documented in these “Disaster Recovery” Knowledge Base articles. Any required network or internet connectivity between any of the data center types listed above is solely the responsibility of the Customer. Customer acknowledges that CenturyLink’s responsibility herein is related to enabling production and recovery environments and storage as detailed herein and such responsibility does not extend to any information, data or content that the Customer may send and/or store within such production or recovery sites. Customer is solely responsible for all data or content, in transit and at rest, whether in the DR or Production environment or in the storage space on disc as detailed in SRN layer below. CenturyLink is not liable for any losses or damages direct or via indemnity related to such data or information including any liability, losses or damages related to unauthorized access or content or data loss.
The SRN is an Ubuntu 16 based lightweight virtual appliance (virtual machine) which transfers and retains production data. This layer includes all SRNs provisioned within the SafeHaven cluster. Each SRN is associated with a data center as shown in the SafeHaven hierarchy. A given data center may include an arbitrary number of SRNs. The SRN virtual appliance which is a component of the SafeHaven software is set up to automatically:
SRNs replicate at the LUN level transmitting updated blocks for each Protection Group to a peered SRN in a remote data center. Although each active Protection Group has a replica in only one other site, an SRN may support a set of Protection Groups that each have replica instances in distinct remote data centers.
Customer is responsible for purchasing and providing the following additional storage requirements or CenturyLink may not be able to provide the Service:
A Protection Group is a set of servers and hard disks grouped by SafeHaven that failover and failback together to the same instant in time and are shutdown and brought-up according to a prescribed recovery plan. Each Protection Group corresponds to a distinct set of servers and hard disks replicated to a remote site by SRNs. When protecting a multi-tiered application, administrators should provision a Protection Group that includes the set of all servers and hard disks that participate in the multi-tiered application. SafeHaven is set up to allow the applicable systems to recover via a remote data center with mutually consistent data images as they were at specific instances in time. Each data center within a cluster can include both active Protection Groups and replica instances of remote Protection Groups.
Protection Groups are logical mappings between the production and recovery servers. Protection Groups are created from within the SafeHaven console and users have the choice to either include one or multiple servers inside a single protection group. All the recovery operations are initiated from a Protection Group level.
Write traffic for each protected VM and hard disk is locally and synchronously mirrored within the production data center so that it is written both to the primary data store and also to a local SRN. For Windows Server Operating Systems 2008R2 and later, the SafeHaven local replication agent is employed and in Linux Operating Systems, Rsync is employed.
SafeHaven checkpoints correspond to LUN-level Copy on Write snapshots and are block-consistent representations of a Protection Group at an instant in time.
Open Source Software
DRaaS uses SafeHaven software to employ the relevant open source software. Details of the various components can be found in the Knowledge Base article SafeHaven: Open Source Components. All users of the Service are subject to the terms and conditions of any applicable open source license agreements.
Due to the self-service nature of the Service, upon termination of the DRaaS Services, Customer is responsible for deleting all SafeHaven software, any related cloud infrastructure and components employed to provide the Service and any and all data or content Customer chose to replicate and/or store to an applicable data center while using the Services.
Break/Fix: Break/fix refers to the fee-for-service method of providing information technology repairs to businesses, in which a customer calls up a service provider to do an upgrade of a computer program, software product, computer, or a repair of something computer-related like a printer or drive array that is broken, the IT provider offers a solution or repair.
Cumulative Update: A grouping of Hotfixes or quick fix engineering updates that have not been fully regression tested by Microsoft but are designed to resolve specific issues with Microsoft SQL Server.
Domain Name System (DNS) Proxy: is a network system of servers that translates numeric IP addresses into readable, hierarchical Internet addresses, and vice versa.
Hardened OS: Hardened OS means that all non-essential services and testing patched bundled in a standard operating system are disabled and functionality has been confirmed.
Hotfix: A hotfix or quick fix engineering update is a single cumulative package that includes information that is used to address a problem in a software product.
Hypertext Transfer Protocol (HTTP) Proxy: Provides port access to the Internet.
Major Release: Major Releases (X.y.z) are vehicles for delivering major and minor feature development and enhancements to existing features. They incorporate all applicable error corrections made in prior Major Releases, Minor Releases, and Patch Releases. Software Provider typically has one Major Release per year.
Minor Release: Minor Releases (x.Y.z) are vehicles for delivering minor feature developments, enhancements to existing features, and defect corrections. They incorporate all applicable error corrections made in prior Minor Releases, and Patch Releases.
Network Time Protocol (NTP) Service: Synchronize all server times to a common system time.
Patch Release: Patch Releases (x.y.Z) are vehicles for delivering security fixes, feature developments, enhancements to existing features, and defect corrections. They incorporate all applicable error corrections made in prior Patch Releases.
Custom Patch Requirements: Customer selection of specific patches versus accepting all recommended patches, custom reporting to meet regulatory requirements versus standard reporting, variable patch schedule versus defined Maintenance Windows (see Definitions) and support for maintaining multiple patch levels versus having all patches applied (i.e. patches applied differ based on Production or Non-Production Environment).
Data Center: The facility in which the Systems are located.
Systems: The computer equipment and software that is approved by CenturyLink and utilized by the Customer in connection with the provision of Service by CenturyLink.