IBM Cloud Architecture
Turn an IBM Cloud brief into a VPC architecture workspace for zones, subnets, ingress, workload runtime, and services. Map security controls, operations, hybrid connectivity, Cloud Internet Services, Transit Gateway, and generated inventory. Refine the stage, inspect score and design notes, then export the diagram state for documentation or handoff.
Use one brief prompt with workload scale, availability zones, VPC CIDR, subnet tiers, ingress, workload runtime, managed services, security controls, operations, and hybrid connectivity. Preset selection or Generate Architecture creates the editable workspace.
Basic
Cloud Internet Services, public ingress, private app/data subnets, security groups, flow logs, and monitored operations.
Custom
Selected item
Select a node or boundary box Move, resize, or highlight Arrow keys move selected item Shift moves faster Alt + arrow keys resize Cmd/Ctrl + Z undoes last edit
IBM Cloud Architecture
Secure VPC App preset
Technical Inventory
| # | Component | Placement | Purpose | Action |
|---|
Prompt Notes
Prompt summary
Detected keywords
Applied assumptions
Current model
Pros
Review points
Restorable state
JSON preserves editable IBM Cloud architecture state.
Overview
IBM Cloud Architecture is an InfraStack prompt-driven workspace for turning a short IBM Cloud VPC brief into a first-pass architecture diagram. The workspace reads explicit terms such as region, zone, VPC address prefix, ingress services, workload tier, data tier, egress mode, observability controls, and hybrid links, then uses that normalized model to render the stage, technical inventory, prompt notes, and export state.
IBM Cloud (n.d.-a) describes IBM Cloud VPC as isolated virtual networks with subnets, security groups, routes, gateways, and compute resources. The workspace uses that source-backed boundary as the anchor for placement, review, and restore behavior.
Use the workspace first. Start with a prompt or preset, generate the initial model, then refine it through the inspector and stage instead of rebuilding the architecture from scratch. You can change control values, move supported stage objects, review inventory rows, and save the working state as JSON.
This first pass is useful for review, presales, handover, documentation, and option comparison. It is not a final implementation source, certification result, or substitute for engineering review.
Technical Details
The workspace builds one normalized architecture model from the prompt, selected preset, and current inspector state. That same model drives the visual stage, technical inventory, prompt notes, score or status summary, and JSON export. IBM Cloud (n.d.-a) describes IBM Cloud VPC as isolated virtual networks with subnets, security groups, routes, gateways, and compute resources, so the generated boundary is treated as a planning container rather than a decorative frame. IBM Cloud (n.d.-b) documents public gateways as an outbound connectivity option for VPC resources, which is why egress and private-access choices are exposed as reviewable architecture intent instead of hidden assumptions.
- Start with prompt notes to separate explicit input from preset defaults.
- Check the generated boundary before trusting the rest of the diagram.
- Trace ingress, private placement, data dependencies, egress, and hybrid links.
- Use the table at the end as the fast review checklist.
- PNG and SVG are presentation exports.
- JSON is the restore format for follow-up edits and comparison.
- The workspace organizes a first pass; it does not inspect a live environment.
- Implementation, policy, sizing, and approval checks stay outside the diagram.
1. Prompt interpretation and defaults
The parser is deterministic and IBM Cloud VPC-specific. If the same prompt, preset, and control values are provided, the workspace should produce the same first-pass model. The prompt is not treated as prose to be admired; it is treated as structured design evidence. Explicit terms such as us-south, 10.50.0.0/16, Virtual Server Instances, Code Engine, Red Hat OpenShift on IBM Cloud, Databases for PostgreSQL, Cloudant, Cloud Databases, DNS Services, Internet Services, Application Load Balancer, and public gateway, floating IP egress, private-only egress give the parser concrete choices to map. When a prompt is short, the selected preset fills the gaps and the prompt notes surface those assumptions for review.
2. Boundary and placement layers
The VPC is rendered as the main workspace boundary, with placement layers for public entry, private workloads, protected data, operations, and external connectivity. This is deliberately higher level than an implementation diagram. It shows how components relate, where traffic enters, which layers should stay private, and where supporting services sit. It does not try to replace low-level address management, route-table documentation, interface-level cabling, policy design, or infrastructure-as-code. The useful review question is whether the visible boundary matches the intended ownership and trust model.
3. Ingress and edge path
Edge components such as DNS Services, Internet Services, Application Load Balancer, Public Gateway are placed before the main workload path when they are enabled or named in the prompt. That makes public entry, request filtering, DNS, delivery, and load balancing visible in one line of sight. If those services are omitted, the generated path becomes simpler and the prompt notes should make the omission visible. The workspace does not infer every edge decision. TLS policy, certificate ownership, advanced filtering rules, identity-aware access, and traffic-management failover still require design review outside the generated first pass.
4. Workload and data tiers
Workload choices such as Virtual Server Instances, Code Engine, Red Hat OpenShift on IBM Cloud, Kubernetes Service are placed in the application layer so reviewers can see runtime responsibility without reading a deployment plan. Data and dependency choices such as Databases for PostgreSQL, Cloudant, Cloud Databases, Object Storage are placed in protected or service-adjacent positions depending on how the tool models that provider or domain. The diagram uses these names as role markers. It does not validate engine versions, replication policies, maintenance windows, backup schedules, encryption keys, capacity limits, licensing constraints, or patch ownership. Those details belong in the review backlog or implementation plan.
5. Egress, private access, and hybrid connectivity
Egress settings communicate a design tradeoff. public gateway, floating IP egress, private-only egress change the visual path and the inventory notes because outbound access affects resilience, cost, control, and troubleshooting. Private service access through service endpoints appears separately from general outbound access because it usually carries a different policy and review boundary. Hybrid choices such as VPN for VPC, Transit Gateway extend the model beyond a standalone environment. Once those appear, reviewers should check routing ownership, propagated routes, segmentation, failure paths, and operational handoff rather than treating the connector as a finished network design.
6. Operations, observability, and support surfaces
Operations choices such as IBM Cloud Monitoring, Flow Logs for VPC are not on the direct request path, but they matter because an architecture that cannot be observed or restored is hard to operate. The workspace places those surfaces near the model so reviewers remember to discuss metrics, logs, retention, ownership, alert routing, backup evidence, and support access. Their presence is a prompt for the conversation, not proof that monitoring or recovery is complete. The generated score or status summary is advisory and bounded to the model that the workspace can see.
7. Editable stage and normalized state
After generation, controls and stage edits refine the same normalized state. Users can adjust visible settings, move or resize supported stage objects, reset layout, inspect generated inventory, copy rows, and export the result. JSON is the durable state boundary because it preserves the prompt, preset, controls, inventory, notes, and layout overrides. PNG and SVG are presentation outputs. They are useful for tickets, documents, chat, and slides, but they do not preserve the full editable workspace. When a design needs to be revisited, the JSON should travel with any image export.
8. Limits and review points
IBM Cloud (n.d.-c) provides IBM Cloud architecture guidance for reviewing workload choices and operational boundaries, so this page treats the generated output as review material rather than validation evidence. The workspace does not certify security, resilience, compliance, production readiness, cost accuracy, service availability, or implementation completeness. It also does not perform detailed subnet math, policy analysis, failover simulation, performance sizing, or change-control approval. A useful first pass can still be wrong when the prompt is vague, the selected preset is a poor fit, or the real environment has constraints that the browser-side model cannot see.
9. Practical review workflow
A practical review starts with the prompt notes, then moves through the diagram as a short design review rather than a slow essay. Use this sequence before sharing the output:
- Intent: compare the prompt notes with the real design brief and mark every preset-filled assumption.
- Boundary: confirm the main container matches ownership, trust, routing, and support scope.
- Path: trace ingress, private workload placement, data dependencies, egress, and external links in order.
- Operations: check whether monitoring, logging, backup, and support surfaces are visible enough for review.
- State: export JSON when the design will be reopened, compared, or corrected later.
10. Handoff checklist
A clean handoff includes the diagram, the inventory rows, the prompt notes, and the JSON state. The diagram explains the visible model, but the notes explain how the workspace interpreted the prompt. The inventory gives reviewers a compact list of components, placements, and purposes. The JSON keeps the model editable so another reviewer can reopen the same state instead of recreating it from memory. For IBM Cloud Architecture, the handoff should also state which choices came from the prompt, which choices came from the preset, and which choices were corrected after generation. That distinction matters because a diagram that looks polished can still hide a weak assumption if the team does not know where a value came from.
Before sharing the artifact outside the immediate design conversation, answer these handoff checks:
- Who owns each visible component, external connection, and operational surface?
- Which private layers must stay private, and what still needs policy or routing review?
- Which assumptions came from the prompt, the preset, or manual correction after generation?
- Which export format matches the next workflow: visual review, ticket attachment, approval prep, or later restoration?
Use PNG or SVG when the next step is visual review. Use JSON when the next step is iteration, comparison, approval preparation, or later restoration. Do not let an image-only export become the only record of a design that still needs editing.
11. What the export does not prove
Exported output is evidence of workspace state, not evidence that the architecture is ready to deploy. The workspace does not inspect a live account, device, tenant, rack, or provider subscription. It also does not confirm:
- Environment facts such as quotas, subnet availability, route propagation, or service reachability;
- Control facts such as firewall policy, backup success, license coverage, or incident-response maturity;
- Provider facts such as regional service availability, platform limits, or live configuration drift;
- Organization facts such as internal standard approval, ownership assignment, or change-control acceptance.
Those checks belong to engineering review, provider documentation review, implementation planning, and environment-specific validation.
The right use of the export is disciplined communication. The diagram should make the model easy to discuss; the table should make assumptions easy to scan; the JSON should make the work reproducible. Treat the output as a structured draft that reduces ambiguity before the real implementation decisions are made. That is useful precisely because it stays honest about its boundary: it can organize the conversation, but it cannot replace the architecture review.
For that reason, reviewers should keep source prompts, exported JSON, and meeting decisions together. If a later change alters placement, connectivity, or operations intent, regenerate or import the JSON state and make the change visible in the workspace instead of patching only a screenshot. That keeps the review trail inspectable and prevents stale diagram copies from becoming quiet design debt.
| Review area | Workspace behavior | Design implication |
|---|---|---|
| Prompt | Extracts provider or domain terms and applies preset defaults when details are missing. | Check prompt notes before accepting inferred values. |
| Boundary | Renders the VPC as the main ownership and placement container. | Confirm the boundary matches the intended trust and routing model. |
| Ingress | Places edge services such as DNS Services and Internet Services before workloads when enabled. | Review public entry, filtering, and load-balancing assumptions. |
| Private layers | Separates workload and data responsibilities into readable placement layers. | Validate isolation, dependency, backup, and support ownership outside the diagram. |
| Egress | Shows outbound or private-access intent through the selected egress model. | Review routing, policy, failure mode, and cost implications separately. |
| JSON | Preserves the editable model and layout state. | Use JSON for restore; use PNG or SVG only for presentation. |
Example Prompts
Paste one of these prompts into the architecture prompt box, generate the first pass, then verify the prompt notes and technical inventory before exporting or sharing the result.
Create an IBM Cloud Architecture in us-south with VPC address prefix 10.50.0.0/16. Use public subnets for an Application Load Balancer, private app subnets for Virtual Server Instances, private data subnets for Databases for PostgreSQL, public gateway egress, service endpoints, IBM Cloud Monitoring, and Flow Logs for VPC.
Show prompt use Hide prompt use
Build an IBM Cloud VPC architecture in eu-de across 2 zones for Red Hat OpenShift on IBM Cloud. Place Internet Services and an Application Load Balancer on the edge, keep cluster workloads private, use Databases for PostgreSQL and Object Storage, add service endpoints, IBM Cloud Monitoring, Flow Logs for VPC, and public gateways per zone.
Show prompt use Hide prompt use
Draft a private IBM Cloud VPC in jp-tok with no public app tier, service endpoints, VPN for VPC, Transit Gateway, Databases for PostgreSQL in private data subnets, IBM Cloud Monitoring, and Flow Logs for VPC.
Show prompt use Hide prompt use
Prompt Tips
The generator works best when the prompt names the important IBM Cloud VPC decisions directly. Write for the parser and the reviewer, not for a marketing brief.
What should the prompt include?
Good prompts name the technical intent directly before listing optional detail.
- Name the region, zone count, and VPC address prefix when those values matter.
- Describe the main entry path with terms such as
DNS Services,Internet Services,Application Load Balancer. - Call out workload, data, egress, observability, and hybrid choices explicitly.
- State negative choices directly, such as
no public app tier,no NAT, orprivate only.
What prompt habits produce cleaner diagrams?
Clean prompts isolate one scenario and use exact IBM Cloud VPC terms the parser can map consistently.
- Keep one environment or site per prompt.
- Use a preset for a stable baseline, then refine generated state with controls.
- Separate design intent from implementation detail when the workspace only models the higher-level view.
- Prefer explicit services and placement rules over broad phrases such as
secure backend.
What needs explicit review after generation?
Generated output still needs human review where assumptions, risk, and unsupported details matter.
- Assumptions created from short or ambiguous prompts.
- Security-sensitive, regulated, hybrid, or shared-service patterns.
- Exact routing, identity, encryption, backup, retention, sizing, cost, and operations decisions.
- Any dependency or constraint outside the workspace model.
How To Use
Use this workflow to move from a rough architecture brief to a reviewed workspace artifact. Start with a preset or focused prompt, generate the first pass, then use the controls, stage, inventory, and export options to refine the model before sharing it.
1. Start with a preset or brief
Select a preset when you want a stable IBM Cloud VPC pattern, or write a focused brief that names scope, placement, connectivity, and controls.
2. Generate the first-pass diagram
Run the generate action to build the normalized model, visual stage, inventory rows, prompt notes, and JSON payload.
3. Review the stage and notes
Check the status summary, diagram stage, technical inventory, and prompt notes before treating the first pass as a review artifact.
4. Refine controls and layout
Use the inspector, selected-item controls, stage movement, zoom, fit, and reset actions to make the model match the intended handoff view.
5. Export or restore the workspace
Use Export PNG for a static image, Download SVG for vector output, and Copy JSON, Download JSON, or Import JSON when the editable workspace state must be preserved.
Export Notes
The workspace supports several export paths, but they do not preserve the same information.
Export PNG
Use Export PNG when you need a quick visual snapshot for tickets, approvals, chat, slide decks, or static documentation.
PNG preserves the current visible diagram as a bitmap image. It does not preserve editable workspace state.
Download SVG
Use Download SVG when you need a clean vector version for documentation, decks, or diagrams that may be edited in vector tools.
SVG preserves the current stage drawing as vector output, but it is still a presentation format.
Copy JSON / Download JSON
Use Copy JSON or Download JSON when you want to preserve the actual workspace state.
- The normalized model values
- The brief or prompt inputs and selected preset
- Inspector choices
- Layout overrides
- Inventory, notes, and assumptions
JSON is the restore format, not just a visual export.
Import JSON
Use Import JSON to reopen a previously saved workspace state and rebuild the editable controls, diagram, inventory, notes, and output tables.
FAQ
Use these answers to confirm the workspace boundary before relying on the output. They clarify parser limits, review expectations, editable state, and what each export path preserves.
Does this tool call an external AI service?
No. The workspace uses deterministic IBM Cloud VPC-specific prompt extraction and local browser-side state handling.
What happens if my prompt is incomplete or ambiguous?
The tool applies controlled defaults from the selected preset and records assumptions in prompt notes. Review those notes before treating the first pass as final.
Can I edit the generated result after generation?
Yes. You can adjust inspector values, change supported controls, move or resize stage objects where implemented, and preserve those changes in JSON.
What is the best way to save work in progress?
Save the JSON export. PNG and SVG are presentation outputs; JSON preserves the restorable workspace model and layout state.
When should I not rely on the first-pass output alone?
Do not rely on the first pass alone when the design is security-sensitive, regulated, hybrid, unusually complex, or close to implementation. Review the unsupported engineering details separately.
Acronyms
Use this table to define short technical terms and explain why each term matters in this architecture workspace.
| Acronym | Meaning | Why it matters in this tool |
|---|---|---|
| VPC | Virtual Private Cloud | The IBM Cloud network boundary modeled by the workspace. |
| VSI | Virtual Server Instance | Represents virtual machine workloads in private subnets. |
| ROKS | Red Hat OpenShift on IBM Cloud | Represents OpenShift workloads in the application tier. |
| VPN | Virtual Private Network | Represents hybrid connectivity to external networks. |
| DNS | Domain Name System | Represents name resolution and edge service intent. |
| JSON | JavaScript Object Notation | The restore format for the editable workspace state. |
| SVG | Scalable Vector Graphics | Used when the current stage needs crisp vector export. |
| PNG | Portable Network Graphics | Used when the current stage needs a quick image snapshot for sharing. |
| JSON | JavaScript Object Notation | Used as the restore format for prompt state, layout state, and structured output. |
References
These sources support the in-text citations used in this tool page. They establish the main architecture boundary, egress or connectivity method, and review frame referenced above.
| Source type | In-text citation | Reference |
|---|---|---|
| Website | (IBM Cloud, n.d.-a) | IBM Cloud. (n.d.-a). About Virtual Private Cloud. IBM Cloud Docs. Retrieved May 17, 2026, from https://cloud.ibm.com/docs/vpc |
| Website | (IBM Cloud, n.d.-b) | IBM Cloud. (n.d.-b). About public gateways. IBM Cloud Docs. Retrieved May 17, 2026, from https://cloud.ibm.com/docs/vpc?topic=vpc-about-public-gateways |
| Website | (IBM Cloud, n.d.-c) | IBM Cloud. (n.d.-c). Architecture framework. IBM Cloud Docs. Retrieved May 17, 2026, from https://cloud.ibm.com/docs/architecture-framework |