Your most visible and strategic business services rely on transactions that originate on a mobile or web-based platform and connect to back-end applications on a mainframe. You’re likely monitoring these services 24/7 for problems impacting response times and performance – but do you have the details you need to identify and fix problems when they arise on the mainframe?
Syncsort Ironstream® Transaction Tracing gives you the information you need to spot problems fast. Get deep insight into a transaction’s impact on the mainframe – no matter where it originates – with unprecedented granularity that enables you to monitor and improve IT operations and application performance.
View this webcast to learn how Ironstream Transaction Tracing gives you:
• Expanded visibility into the total end-user experience to meet stringent SLAs
• Deeper insight into transactions’ impact on mainframe resources
• Integration with leading operational analytics platforms, such as Splunk® Enterprise and Splunk® IT Service Intelligence
• Minimal footprint, easy installation and low overhead – with no mainframe expertise required
Handwritten Text Recognition for manuscripts and early printed texts
End-to-End Transaction Visibility from Mobile Devices to Your Mainframe
1. End-to-end Transaction Visibility From
Mobile Devices To Your Mainframe
Ian Hartley, Principal Engineer
Ed Hallock, Director of Product Marketing & Management
2. 2
Housekeeping
• Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please reach out to us using
the chat window.
• Questions Welcome:
– Submit your questions at any time during the presentation using the chat window.
– We will answer them during our Q&A session following the presentations.
• Recording and Slides:
– This webcast is being recorded. You will receive an email following the webcast with a link to
download both the recording and the slides.
Syncsort Confidential and Proprietary - do not copy or distribute
3. 3
Today’s Presenters
Syncsort Confidential and Proprietary - do not copy or distribute
Ed Hallock is a highly experienced Information Technology Professional with a broad
experience base in software product development, support, product management, marketing,
and business development. In his diverse career Ed has benefited from working for some of the
largest independent software vendors, in a variety of roles, providing enterprise solutions to
Global 1000 corporations. Ed has extensive experience in performance and availability
management for systems and applications. He holds a bachelor’s degree in Computer Science
from Montclair State University in Upper Montclair, New Jersey and has presented at numerous
industry events as well as corporate related conferences and seminars.
Ian Hartley has worked in software development and system architecture roles where he
has gained a wide range of experience across many environments and platforms. He has a
passion for all things IT, and is always on the lookout for new technologies.
Starting with COBOL and CICS® on the mainframe, he migrated into several languages and
stacks ranging from C, Java, web services, mobile and JavaScript with the likes of Angular.
Ian has also produced many Splunk apps, add-ons and integrations for Enterprise Security® and
IT Service Intelligence®. He works closely with the Splunk teams in EMEA and the USA.
When Ian is not coding, you’ll find him off-road, running a trail somewhere.
4. 4
Agenda
•The Transaction Tracing Challenge
•What is Transaction Tracing and How Does It Work
•A Quick Intro – Syncsort Ironstream
•Demo of the Ironstream Transaction Tracing Solution
•Summary
•Q&A
Syncsort Confidential and Proprietary - do not copy or distribute
5. 5
The Transaction Tracing Challenge
• Growth of large-scale business services that incorporate web
and mobile applications has exploded across all industries.
• Many organization have a significant reliance on the
mainframe, including banking, insurance, financial services,
retail, and healthcare corporations.
• Transactions that originate on a tablet, phone, etc. and
connect to back-end applications hosted on the mainframe
tend to be very visible to customers, partners, and
executives.
• Unacceptable response times and unreliable performance
do not go unnoticed.
Syncsort Confidential and Proprietary - do not copy or distribute
6. 6
The Transaction Tracing Challenge
• Organizations may monitor the overall end-user experience
to detect potential problems but have poor visibility into
what happens to them on the mainframe.
• Many know how long a transaction spends on the
mainframe but have no way to know what it is doing within
multiple systems and subsystems, including CICS and Db2.
• Lack of visibility creates significant challenges and can have
significant consequences on service levels.
Syncsort Confidential and Proprietary - do not copy or distribute
7. 7
What is Transaction Tracing
• Enables organizations to get deep insight into web-based and mobile transactions’ impact on
the mainframe.
• Unprecedented granularity that enables you to monitor and improve and application
performance.
• Lightweight solution with a minimal footprint
Syncsort Confidential and Proprietary - do not copy or distribute
• Leverages Syncsort Ironstream® to
deliver IBM z/OS machine data in
real-time to leading platforms for
operational analytics, like Splunk®
8. 8
How Does It Work?
• Uses a transaction identifier to
correlate transaction workloads
through CICS and Db2 on z/OS.
• Ties the transaction identifier to
SMF 110 and 101 records
generated by CICS and Db2.
• Provides the correlated SMF
data to Splunk for a visualization
of various performance
attributes of the units of work.
• Time spent in the CICS and Db2
sub-systems along with
resources consumed to support
the transactions is clearly
reported.
Syncsort Confidential and Proprietary - do not copy or distribute
9. 9
Polling Question #1
•What technologies are you currently using, if any, to monitor and
correlate mainframe components for transactions initiated outside of the
mainframe environment?
– Dynatrace
– AppDynamics
– Home grown solution
– None
Syncsort Confidential and Proprietary - do not copy or distribute
10. 10
Critical Mainframe Data Normalized and Streamed to Splunk with Ironstream®
Syncsort Confidential and Proprietary - do not copy or distribute
19. 19
Polling Question #2 (Multiple Choice)
•What technologies are involved in your cross-platform transactions
initiated outside of the mainframe environment?
– Java
– C+
– CICS Transaction Gateway (CTG)
– CICS Web Services/RESTful API
– IBM MQ
– IMS Connect
Syncsort Confidential and Proprietary - do not copy or distribute
– Db2 Connect
– DataPower Gateway
– WebSphere Application
Server (WAS)
20. 20
Let's Go To Demo
Syncsort Confidential and Proprietary - do not copy or distribute
21. 21
Summary
• Tracks transactions initiated on and off the mainframe –
including mobile and web platforms -- and feeds data in real-
time to Splunk Enterprise to take advantage of its advanced
analytics and visualization.
• Provides critical information on overall transaction response
time, with the ability to drill-down into transaction details
including time spent, and resources consumed, on CICS and
Db2 on z/OS.
• Enables transaction problem isolation and resolution for long-
running transactions, to meet SLAs, improving application
performance and end-user experience.
Syncsort Confidential and Proprietary - do not copy or distribute
22. 22
More Information on Transaction Tracing
http://www.syncsort.com/en/Transaction-Tracing
http://www.syncsort.com/en/Resource-
Center/Mainframe/SolutionSheets/Syncsort-Ironstream-Transaction-Tracing
Syncsort Confidential and Proprietary - do not copy or distribute
23. 23
Get Ironstream® for SYSLOG for free
Syncsort Confidential and Proprietary - do not copy or distribute
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Make more sense of the massive machine data piled up in your mainframe.
Get started with Ironstream today!
Mainframes power mission-critical applications around the world. But many organizations are still flying blind,
with no easy way to derive operational intelligence from the vast amounts of
machine data generated by these critical systems.