SlideShare a Scribd company logo
Syncsort Customer Education Webinar
What’s New in Syncsort Ironstream® Version 2.1
March 28, 2018
Today’s Presenters
Ed Wrazen Director, Mainframe Product Management
is responsible for the product strategy & roadmap for
Syncsort’s Mainframe products and solutions. With a career
in Enterprise IT spanning 35 years, Ed has held roles in
software development, database administration, product
management, consulting and marketing in global businesses
and enterprise technology companies. Ed has experience in
Enterprise systems architectures, performance management,
database and data management technologies and is a regular
speaker at industry events worldwide.
2Syncsort Confidential and Proprietary - do not copy or distribute
Ian Hartley, Principal Engineer, develops solutions for both
Splunk and Elastic. He has a close working relationship with
both organizations and uses his IT knowledge to build great
results. Ian has worked in the software industry since the late
80’s and has held several development and architecture roles.
He has worked with many different technology stacks and
environments for software companies. Ian also speaks at
events and writes articles.
Agenda
Introduction to Syncsort Ironstream®
Recent New Features
– SMF Versioning
– Enclave support for RMF III data
– Multiple Application Programming Interface
What’s new in Ironstream 2.1
– Support for Elastic Logstash
– IMS Log Forwarding
– Enhanced SMF data collection
Demo
Q&A
Syncsort Confidential and Proprietary - do not copy or distribute 3
Utilizing Machine Data for Log Analytics
Syncsort Confidential and Proprietary - do not copy or distribute
Log Analytics Platform
Cloud or On-Premise
Machine Data: Any Location, Type, Volume
Online
Services
Web
Services
Servers
Security GPS
Location
Storage
Desktops
Networks
Packaged
Applications
Custom
Apps
Messaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
Call Detail
Records
Smartphones
and Devices
RFID
On-
Premises
Private
Cloud
Public
Cloud
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Answer Any Question
Developer
Platform
Report &
analyze
Custom
dashboards
Monitor
& alert
Ad hoc
search
Mainframe
4
Critical Mainframe Data 
Normalized and Streamed with Ironstream®
Syncsort Confidential and Proprietary - do not copy or distribute 5
Critical Mainframe Data 
Normalized and Streamed with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Syncsort Confidential and Proprietary - do not copy or distribute 6
Critical Mainframe Data 
Normalized and Streamed with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Syncsort Confidential and Proprietary - do not copy or distribute 7
Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Syncsort Confidential and Proprietary - do not copy or distribute 8
Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Security and Compliance/SIEM
- Ensure Audits Passed
Syncsort Confidential and Proprietary - do not copy or distribute 9
Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Security and Compliance/SIEM
- Ensure Audits Passed
IT Operational Analytics/ITOA
-Ensure Ops SLAs Met
Syncsort Confidential and Proprietary - do not copy or distribute 10
Value of an End-to-End View, Inclusive of Mainframe
Extend What your Log Analytics Solution Does Already, to include
critical z/OS systems:
– 360ᵒ Degree View: Make the View of the Enterprise Complete via Including
Mainframe Data
– Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic
and Splunk Apps
Security and Compliance/SIEM
- Ensure Audits Passed
IT Operational Analytics/ITOA
-Ensure Ops SLAs Met
IT Service Intelligence/ITSI
-Ensure Services Health
Syncsort Confidential and Proprietary - do not copy or distribute 11
Recent Enhancements
to Ironstream
13Syncsort Confidential and Proprietary - do not copy or distribute
SMF Versioning
z/OS SMF Changes
SMF record structures can and do change from one release of z/OS to
another
Significant No. of SMF changes with z/OS 2.3 (avail Sep 29, 2017)
– Up to 2048 record types supported
– Up to 65k subtypes per record type
– DSECT changes - Fields Added or Moved
– Extended Headers now available
Changes with subsystems
– Different versions of CICS or Db2
– Different versions running on same LPAR
14Syncsort Confidential and Proprietary - do not copy or distribute
SMF Processing requirement for different z/OS levels
Technologies that process SMF data from z/OS need to be mindful
of changes between releases
An SMF Processing Solution compiled on one z/OS may need to
process SMF data from another z/OS
Ability to process SMF data on a z/OS level that did not
generate the original data
Ability to detect subsystem version that generated SMF
– CICS 4.2, CICS 5.1, CICS 5.2 CICS 5.3, CICS 5.4
– Db2 v10, Db2 v11, Db2 v12
15Syncsort Confidential and Proprietary - do not copy or distribute
New Ironstream Support for SMF Versioning
Dynamically detects the z/OS level
Determines the structure of z/OS SMF records
Determines the subsystem SMF record structure
Supports multiple versions of z/OS SMF data in a single instance
Ironstream now includes a framework for supporting
multiple versions of z/OS SMF data
• Positioned for future z/OS releases
• Correctly formats the SMF record for Log analytics
• Multiple versions/formats supported
16Syncsort Confidential and Proprietary - do not copy or distribute
17Syncsort Confidential and Proprietary - do not copy or distribute
Enclave support for RMF III data
What are Enclave Attributes?
An enclave is a transaction that can span multiple dispatchable units
(SRBs and tasks) in one or more address spaces and is reported on and
managed as a unit.
The enclave is managed separately from the address spaces it runs in.
A program can create an enclave, schedule SRBs into it, or join tasks to it.
A multisystem work manager can process a transaction on multiple
systems by using a multisystem enclave.
An enclave represents a “business unit of work”
– Used by a variety of workloads – Db2, Db2 DDF, Websphere, MQ, LDAP, TCP/IP
– Enclave created and used for work across multiple address spaces and systems
18Syncsort Confidential and Proprietary - do not copy or distribute
Enclave support for RMF III data
Enclave is used to keep track of
address space independent
transactions
– Can consist of multiple TCBs
or SRBs executing across
multiple address spaces
Enclave used by Db2
– Distributed Data Facility (DDF)
– Db2 Stored Procedures
– Db2 Sysplex query parallelism
– Db2 sequential prefetch
Other users
– MQSeries
– Websphere
– TCP/IP
– LDAP
19Syncsort Confidential and Proprietary - do not copy or distribute
Displaying Enclave activity using RMF
Configuring Ironstream to collect Enclave Attributes
1. Activate Ironstream Desktop
Browser
2. On Admin menu, select
Ironstream instance
3. Select RMF Filters
– Automatically built using RMF
DDS
4. Select Enclave attributes from
MVS Image Attributes
Syncsort Confidential and Proprietary - do not copy or distribute 20
21Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream API Enhancement
Ironstream API Enhancements
The Ironstream API enables Ironstream instances to programmatically
collect user-defined EBCDIC or ASCII data and forward it.
The API includes a configurable IRONSTREAM_API data source and a
SSDFAPI routine, which is a standalone load module that can be called
or link edited statically into the calling program
New capability allows an API instance to be INITiated and TERMinated
– Enables multiple records to be sent while the connection is active
22Syncsort Confidential and Proprietary - do not copy or distribute
Using the Multi-Send API
23Syncsort Confidential and Proprietary - do not copy or distribute
CALL SSDFPAPI,(NUMPARM,REQUEST,
CLASS,TYPE,SUBTYPE,TOKEN,
RETCODE, RSNCODE)
|
|
|
PROCESS DATA 1-N
CALL SSDFPAPI,(NUMPARM,
REQUEST, TOKEN, DATA,
LENGTH, RETCODE, RSNCODE)
|
END DATA |
|
|
CALL SSDFPAPI,(NUMPARM,REQUEST,
TOKEN,RETCODE, RSNCODE)
Requesting Program Ironstream
INIT Request
SEND Request…1
SEND Request…N
TERM Request
▪ Validate Request
▪ Perform RACF Check
▪ Build Control Block Chain
▪ Send a valid Token to Requestor
▪ Validate request
▪ Process record for each SEND
request
▪ Validate request
▪ Release Storage
1. Request: Request type can be
“INIT”, “SEND” or “TERM”
2. Class: Identifies the
Ironstream instance running
with the same class
3. Type: Identifies the Ironstream
instance running with same
class and type combination.
4. Subtype: Identifies the
Ironstream instance running
with Same class, type and
subtype combination
5. Token: Used by API
6. Data: Data Address
7. Length: Data Length
API Parameter Options
Advantages of the Multi-Send API
Good for multiple, sequential send requests
– E.g. Processing file input
Connection persists over multiple send requests
– RACF check performed only on the initiation of the connection
Eliminates the need for the API to allocate and release storage for
each operation
Up to 10x Performance Improvement over Single-Send API when
sending multiple records
For single or few requests, Single-Send is appropriate
24Syncsort Confidential and Proprietary - do not copy or distribute
Extending Ironstream Data Sources, Connectivity & Integration
SMF Versioning
– Ensuring All Software Levels are
Supported by Ironstream
– Enable Ironstream to work seamlessly
with z/OS software upgrades
RMF Enclave Attributes
– Extend coverage of key z/OS metrics
– Deliver insight into operational services
– Monitor and identify problems faster
API Enhancements
– Enhance performance for application
data solutions to Ironstream
– Provide flexibility in connectivity options
– Minimize resource consumption &
utilization
25Syncsort Confidential and Proprietary - do not copy or distribute
What’s New in Ironstream 2.1
26Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream 2.1 Overview
27Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
Ironstream 2.1 Overview
28Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
Ironstream 2.1 Overview
29Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
Ironstream 2.1 Overview
30Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
z/OS
SPLUNK
Enterprise
Security
SPLUNK
IT Service
Intelligence
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
67
types
RMF
Up to 50,000
values
IMS
Log Forwarding to Elastic Logstash
Ironstream now offers the capability
to forward z/OS Mainframe log and
application data directly to Logstash
– Connection via TCPIP, HTTP
– All data sources supported by
Ironstream can be forwarded
to Elastic
– Sample Ironstream Kibana
dashboards available
31Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
32Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
33Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
34Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
35Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
36Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
37Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Support
38Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Examples
39Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Examples
40Syncsort Confidential and Proprietary - do not copy or distribute
Elastic Examples
41Syncsort Confidential and Proprietary - do not copy or distribute
IMS Log Forwarding
For organization who are running IMS systems, Ironstream now offers IMS log
forwarding to Splunk and ELK
– Ironstream supports both Synchronous (real-time) and Asynchronous log collection
– Data is sent in JSON for ingestion into Splunk or Elastic Logstash
– Ironstream exploits zIIP for reduced Mainframe MSU and associated savings
42Syncsort Confidential and Proprietary - do not copy or distribute
IMS Log Forwarding
For organization who are running IMS systems, Ironstream now offers IMS log
forwarding to Splunk and ELK
– Ironstream supports both Synchronous (real-time) and Asynchronous log collection
– Data is sent in JSON for ingestion into Splunk or Elastic Logstash
– Ironstream exploits zIIP for reduced Mainframe MSU and associated savings
43Syncsort Confidential and Proprietary - do not copy or distribute
IMS Log Records Supported
Master Terminal x’01’, X’03’
System x’45’
Transaction x’01’, x’03’, x’06’, x’07’, x’08’,
x’0A’, x’31’, x’32’, x’33’, x’34’,
x’35’, x’38’, x’56’
BMC Mainview x’FA’ (coming soon)
Summary level information also available for
Transaction statistics
IMS Log Forwarding
For organization who are running IMS systems, Ironstream now offers IMS log
forwarding to Splunk and ELK
– Ironstream supports both Synchronous (real-time) and Asynchronous log collection
– Data is sent in JSON for ingestion into Splunk or Elastic Logstash
– Ironstream exploits zIIP for reduced Mainframe MSU and associated savings
Insight into IMS System & Transaction Statistics & performance for ITOA
– Monitor IMS resource utilization
– Report transaction response times & isolate issues
– Problem identification
– Monitor Critical Service Levels
44Syncsort Confidential and Proprietary - do not copy or distribute
IMS Log Records Supported
Master Terminal x’01’, X’03’
System x’45’
Transaction x’01’, x’03’, x’06’, x’07’, x’08’,
x’0A’, x’31’, x’32’, x’33’, x’34’,
x’35’, x’38’, x’56’
BMC Mainview x’FA’ (coming soon)
Summary level information also available for
Transaction statistics
Ironstream IMS Log Collection - Synchronous
45Syncsort Confidential and Proprietary - do not copy or distribute
TCPIP
HTTP/HTTPS
Synchronous Collection for online regions using the “log write” exit point
▪ IMS calls the “log write” exit after a block of data has been written to the IMS online log dataset.
▪ The exit gathers the entire block of data.
▪ Required log records are extracted from within the block and formatted into JSON for forwarding at no impact to the online service
IMS Control
Region
IMS Log
Exit
SSDFILSG
Data
Space
Record
Extract
&
Format
Ironstream
Forwarder
Cloud or
On-premise
z/OS
SLDS
Ironstream IMS Log Collection - Asynchronous
46Syncsort Confidential and Proprietary - do not copy or distribute
IMS
Control
Region TCPIP
HTTP/HTTPS
Asynchronous Collection for online regions using a Log Archive process step
SLDS
IMS
Archive Log
Ironstream
IMS Job
Log
Gatherer
▪ The Asynchronous log gatherer processes the IMS Archive file produced by a previous job step. In this case, the entire
Ironstream process runs as a step within the IMS archive job
▪ Required log records are extracted from within the block and formatted into JSON for forwarding.
Data
Space
Record
Extract
&
Format
Ironstream
Forwarder
IMS Archive Job
z/OS
Cloud or
On-premise
SMF INMEM Resources
47Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
SMF INMEM Resources
IRONSTREAM PROCESSING
Enables collection of SMF data through the SMF
INMEM resources and API
– Low-latency
– Can run on a zIIP Engine
– Requires LOGSTREAM to be defined in
SMFPRMxx definitions
48Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
SMF INMEM Resources
IRONSTREAM PROCESSING
Enables collection of SMF data through the SMF
INMEM resources and API
– Low-latency
– Can run on a zIIP Engine
– Requires LOGSTREAM to be defined in
SMFPRMxx definitions
Defining SMF INMEM to Ironstream
– Add “SMF_SOURCE”:”INMEM”
– Add “INMEM_RESOURCE~.”<logstream>” as required
49Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
SMF INMEM Resources
IRONSTREAM PROCESSING
Enables collection of SMF data through the SMF
INMEM resources and API
– Low-latency
– Can run on a zIIP Engine
– Requires LOGSTREAM to be defined in
SMFPRMxx definitions
Defining SMF INMEM to Ironstream
– Add “SMF_SOURCE”:”INMEM”
– Add “INMEM_RESOURCE~.”<logstream>” as required
Logstream connections can be controlled by the
Operator Modify Command
50Syncsort Confidential and Proprietary - do not copy or distribute
SMF PROCESSING OPTIONS
Data set mode - SMF information is recorded in
SYS1. MANx data sets
Logstream mode - SMF information is recorded in
multiple logstreams and data can be read directly
from the logstreams
In-memory (real-time) mode - SMF information is
read directly from the system buffer. SMF
information is read in real-time
– IFAMCON – Connect to SMF in-memory
– IFAMGET – Obtain data
– IFAMDSC – Disconnect
– IFAMQRY – Query SMF INMEM
Summary: Value Today for Enterprises with a z/OS Mainframe
Syncsort Confidential and Proprietary - do not copy or distribute
Less Complexity
Collect mainframe data; correlate
with data from other platforms; no
mainframe expertise required
Clearer Security Information
Identify unauthorized mainframe
access, other security risks; prepares
and visualizes key data for
compliance audits
Healthier IT Operations
Real-time alerts identify problems in
all key environments View latency,
transactions per second, exceptions,
etc.
Effective Problem-Resolution
Management
Real-time views to identify real or
potential failures earlier; view related
'surrounding' information to support
triage repair or prevention
Higher Operational Efficiency
Enhanced event correlation across
systems; Staff resolves problems faster;
“do more with less”
Eliminate Your Mainframe
“Blind-Spot”
Splunk/Elastic + Ironstream = Your
360ᵒ Enterprise View
51
What Now?
Syncsort Confidential and Proprietary - do not copy or distribute 52
VISIT:
HTTP://WWW.SYNCSORT.COM/EN/PRODUCTS/MAINFRAME/IRONSTREAM
CONTACT:
INFO@SYNCSORT.COM
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Get Ironstream® for SYSLOG for free
Thank You.
Questions?
Syncsort Confidential and Proprietary - do not copy or distribute 53

More Related Content

What's hot

Hortonworks Data Platform with IBM Spectrum Scale
Hortonworks Data Platform with IBM Spectrum ScaleHortonworks Data Platform with IBM Spectrum Scale
Hortonworks Data Platform with IBM Spectrum Scale
Abhishek Sood
 
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite
Shawn Wells
 
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Accenture
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
projectmgmt456
 
Fannie mae bmc remedy its mv7 interface diagram_v6_021009
Fannie mae bmc remedy its mv7 interface diagram_v6_021009Fannie mae bmc remedy its mv7 interface diagram_v6_021009
Fannie mae bmc remedy its mv7 interface diagram_v6_021009
Accenture
 
Oracle EBS R12.1.3_Installation_linux(64bit)_Pan_Tian
Oracle EBS R12.1.3_Installation_linux(64bit)_Pan_TianOracle EBS R12.1.3_Installation_linux(64bit)_Pan_Tian
Oracle EBS R12.1.3_Installation_linux(64bit)_Pan_Tian
Pan Tian
 
Oracle Fusion Middleware Infrastructure Best Practices
Oracle Fusion Middleware Infrastructure Best PracticesOracle Fusion Middleware Infrastructure Best Practices
Oracle Fusion Middleware Infrastructure Best Practices
Revelation Technologies
 

What's hot (7)

Hortonworks Data Platform with IBM Spectrum Scale
Hortonworks Data Platform with IBM Spectrum ScaleHortonworks Data Platform with IBM Spectrum Scale
Hortonworks Data Platform with IBM Spectrum Scale
 
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite
2009-08-24 Managing your Red Hat Enterprise Linux Guests with RHN Satellite
 
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
 
Rha cluster suite wppdf
Rha cluster suite wppdfRha cluster suite wppdf
Rha cluster suite wppdf
 
Fannie mae bmc remedy its mv7 interface diagram_v6_021009
Fannie mae bmc remedy its mv7 interface diagram_v6_021009Fannie mae bmc remedy its mv7 interface diagram_v6_021009
Fannie mae bmc remedy its mv7 interface diagram_v6_021009
 
Oracle EBS R12.1.3_Installation_linux(64bit)_Pan_Tian
Oracle EBS R12.1.3_Installation_linux(64bit)_Pan_TianOracle EBS R12.1.3_Installation_linux(64bit)_Pan_Tian
Oracle EBS R12.1.3_Installation_linux(64bit)_Pan_Tian
 
Oracle Fusion Middleware Infrastructure Best Practices
Oracle Fusion Middleware Infrastructure Best PracticesOracle Fusion Middleware Infrastructure Best Practices
Oracle Fusion Middleware Infrastructure Best Practices
 

Similar to What’s New in Syncsort Ironstream 2.1

Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Precisely
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Precisely
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overviewabhi1112
 
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Precisely
 
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New FeaturesOracle Solaris 11.1 New Features
Oracle Solaris 11.1 New FeaturesOrgad Kimchi
 
IBM Spectrum Scale ECM - Winning Combination
IBM Spectrum Scale  ECM - Winning CombinationIBM Spectrum Scale  ECM - Winning Combination
IBM Spectrum Scale ECM - Winning Combination
Sasikanth Eda
 
Building a Business Objects Shared-Services Environment.pdf
Building a Business Objects Shared-Services Environment.pdfBuilding a Business Objects Shared-Services Environment.pdf
Building a Business Objects Shared-Services Environment.pdf
KhairulAmri730768
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
xKinAnx
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
zOSCommserver
 
Highlights of the Telecommunications Event Data Analytics toolkit
Highlights of the Telecommunications Event Data Analytics toolkitHighlights of the Telecommunications Event Data Analytics toolkit
Highlights of the Telecommunications Event Data Analytics toolkit
lisanl
 
S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5
Tony Pearson
 
MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...
MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...
MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...
MongoDB
 
Technical Skillwise
Technical SkillwiseTechnical Skillwise
Technical Skillwise
Skillwise Consulting
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Precisely
 
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB
 
Red hat Enterprise Linux 6.4 for IBM System z Technical Highlights
Red hat Enterprise Linux 6.4 for IBM System z Technical HighlightsRed hat Enterprise Linux 6.4 for IBM System z Technical Highlights
Red hat Enterprise Linux 6.4 for IBM System z Technical Highlights
Filipe Miranda
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facilityramparasa
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facilityramparasa
 
Skillwise Consulting -Technical competency
Skillwise Consulting -Technical competencySkillwise Consulting -Technical competency
Skillwise Consulting -Technical competency
Skillwise Consulting
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solaris
Pajana Load
 

Similar to What’s New in Syncsort Ironstream 2.1 (20)

Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
 
Mainframe Architecture & Product Overview
Mainframe Architecture & Product OverviewMainframe Architecture & Product Overview
Mainframe Architecture & Product Overview
 
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
 
Oracle Solaris 11.1 New Features
Oracle Solaris 11.1 New FeaturesOracle Solaris 11.1 New Features
Oracle Solaris 11.1 New Features
 
IBM Spectrum Scale ECM - Winning Combination
IBM Spectrum Scale  ECM - Winning CombinationIBM Spectrum Scale  ECM - Winning Combination
IBM Spectrum Scale ECM - Winning Combination
 
Building a Business Objects Shared-Services Environment.pdf
Building a Business Objects Shared-Services Environment.pdfBuilding a Business Objects Shared-Services Environment.pdf
Building a Business Objects Shared-Services Environment.pdf
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
Highlights of the Telecommunications Event Data Analytics toolkit
Highlights of the Telecommunications Event Data Analytics toolkitHighlights of the Telecommunications Event Data Analytics toolkit
Highlights of the Telecommunications Event Data Analytics toolkit
 
S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5
 
MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...
MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...
MongoDB World 2018: Managing a Mission Critical eCommerce Application on Mong...
 
Technical Skillwise
Technical SkillwiseTechnical Skillwise
Technical Skillwise
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
 
Red hat Enterprise Linux 6.4 for IBM System z Technical Highlights
Red hat Enterprise Linux 6.4 for IBM System z Technical HighlightsRed hat Enterprise Linux 6.4 for IBM System z Technical Highlights
Red hat Enterprise Linux 6.4 for IBM System z Technical Highlights
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Symmetrix remote-data-facility
Symmetrix remote-data-facilitySymmetrix remote-data-facility
Symmetrix remote-data-facility
 
Skillwise Consulting -Technical competency
Skillwise Consulting -Technical competencySkillwise Consulting -Technical competency
Skillwise Consulting -Technical competency
 
Interview operating system solaris
Interview operating system solarisInterview operating system solaris
Interview operating system solaris
 

More from Precisely

AI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptxAI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptx
Precisely
 
Building a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i SecurityBuilding a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i Security
Precisely
 
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdfOptimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Precisely
 
Chaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdfChaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdf
Precisely
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
Navigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful MigrationNavigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful Migration
Precisely
 
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google ChronicleUnlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Precisely
 
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
Precisely
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Precisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Precisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
Precisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Precisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
Precisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
Precisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
Precisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
Precisely
 

More from Precisely (20)

AI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptxAI-Ready Data - The Key to Transforming Projects into Production.pptx
AI-Ready Data - The Key to Transforming Projects into Production.pptx
 
Building a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i SecurityBuilding a Multi-Layered Defense for Your IBM i Security
Building a Multi-Layered Defense for Your IBM i Security
 
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdfOptimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
Optimierte Daten und Prozesse mit KI / ML + SAP Fiori.pdf
 
Chaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdfChaining, Looping, and Long Text for Script Development and Automation.pdf
Chaining, Looping, and Long Text for Script Development and Automation.pdf
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
Navigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful MigrationNavigating the Cloud: Best Practices for Successful Migration
Navigating the Cloud: Best Practices for Successful Migration
 
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google ChronicleUnlocking the Power of Your IBM i and Z Security Data with Google Chronicle
Unlocking the Power of Your IBM i and Z Security Data with Google Chronicle
 
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

What’s New in Syncsort Ironstream 2.1

  • 1. Syncsort Customer Education Webinar What’s New in Syncsort Ironstream® Version 2.1 March 28, 2018
  • 2. Today’s Presenters Ed Wrazen Director, Mainframe Product Management is responsible for the product strategy & roadmap for Syncsort’s Mainframe products and solutions. With a career in Enterprise IT spanning 35 years, Ed has held roles in software development, database administration, product management, consulting and marketing in global businesses and enterprise technology companies. Ed has experience in Enterprise systems architectures, performance management, database and data management technologies and is a regular speaker at industry events worldwide. 2Syncsort Confidential and Proprietary - do not copy or distribute Ian Hartley, Principal Engineer, develops solutions for both Splunk and Elastic. He has a close working relationship with both organizations and uses his IT knowledge to build great results. Ian has worked in the software industry since the late 80’s and has held several development and architecture roles. He has worked with many different technology stacks and environments for software companies. Ian also speaks at events and writes articles.
  • 3. Agenda Introduction to Syncsort Ironstream® Recent New Features – SMF Versioning – Enclave support for RMF III data – Multiple Application Programming Interface What’s new in Ironstream 2.1 – Support for Elastic Logstash – IMS Log Forwarding – Enhanced SMF data collection Demo Q&A Syncsort Confidential and Proprietary - do not copy or distribute 3
  • 4. Utilizing Machine Data for Log Analytics Syncsort Confidential and Proprietary - do not copy or distribute Log Analytics Platform Cloud or On-Premise Machine Data: Any Location, Type, Volume Online Services Web Services Servers Security GPS Location Storage Desktops Networks Packaged Applications Custom Apps Messaging Telecoms Online Shopping Cart Web Clickstreams Databases Energy Meters Call Detail Records Smartphones and Devices RFID On- Premises Private Cloud Public Cloud Platform Support (Apps / API / SDKs) Enterprise Scalability Universal Indexing Answer Any Question Developer Platform Report & analyze Custom dashboards Monitor & alert Ad hoc search Mainframe 4
  • 5. Critical Mainframe Data  Normalized and Streamed with Ironstream® Syncsort Confidential and Proprietary - do not copy or distribute 5
  • 6. Critical Mainframe Data  Normalized and Streamed with Ironstream® Log4jFile Load SYSLOG SYSLOGD logs security SMF 67+ types RMF Up to 50,000 values DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USS Syncsort Confidential and Proprietary - do not copy or distribute 6
  • 7. Critical Mainframe Data  Normalized and Streamed with Ironstream® Log4jFile Load SYSLOG SYSLOGD logs security SMF 67+ types RMF Up to 50,000 values DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USS Syncsort Confidential and Proprietary - do not copy or distribute 7
  • 8. Value of an End-to-End View, Inclusive of Mainframe Extend What your Log Analytics Solution Does Already, to include critical z/OS systems: – 360ᵒ Degree View: Make the View of the Enterprise Complete via Including Mainframe Data – Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic and Splunk Apps Syncsort Confidential and Proprietary - do not copy or distribute 8
  • 9. Value of an End-to-End View, Inclusive of Mainframe Extend What your Log Analytics Solution Does Already, to include critical z/OS systems: – 360ᵒ Degree View: Make the View of the Enterprise Complete via Including Mainframe Data – Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic and Splunk Apps Security and Compliance/SIEM - Ensure Audits Passed Syncsort Confidential and Proprietary - do not copy or distribute 9
  • 10. Value of an End-to-End View, Inclusive of Mainframe Extend What your Log Analytics Solution Does Already, to include critical z/OS systems: – 360ᵒ Degree View: Make the View of the Enterprise Complete via Including Mainframe Data – Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic and Splunk Apps Security and Compliance/SIEM - Ensure Audits Passed IT Operational Analytics/ITOA -Ensure Ops SLAs Met Syncsort Confidential and Proprietary - do not copy or distribute 10
  • 11. Value of an End-to-End View, Inclusive of Mainframe Extend What your Log Analytics Solution Does Already, to include critical z/OS systems: – 360ᵒ Degree View: Make the View of the Enterprise Complete via Including Mainframe Data – Same Dashboards, Bigger, More Complete Data Sets; Free Ironstream Elastic and Splunk Apps Security and Compliance/SIEM - Ensure Audits Passed IT Operational Analytics/ITOA -Ensure Ops SLAs Met IT Service Intelligence/ITSI -Ensure Services Health Syncsort Confidential and Proprietary - do not copy or distribute 11
  • 13. 13Syncsort Confidential and Proprietary - do not copy or distribute SMF Versioning
  • 14. z/OS SMF Changes SMF record structures can and do change from one release of z/OS to another Significant No. of SMF changes with z/OS 2.3 (avail Sep 29, 2017) – Up to 2048 record types supported – Up to 65k subtypes per record type – DSECT changes - Fields Added or Moved – Extended Headers now available Changes with subsystems – Different versions of CICS or Db2 – Different versions running on same LPAR 14Syncsort Confidential and Proprietary - do not copy or distribute
  • 15. SMF Processing requirement for different z/OS levels Technologies that process SMF data from z/OS need to be mindful of changes between releases An SMF Processing Solution compiled on one z/OS may need to process SMF data from another z/OS Ability to process SMF data on a z/OS level that did not generate the original data Ability to detect subsystem version that generated SMF – CICS 4.2, CICS 5.1, CICS 5.2 CICS 5.3, CICS 5.4 – Db2 v10, Db2 v11, Db2 v12 15Syncsort Confidential and Proprietary - do not copy or distribute
  • 16. New Ironstream Support for SMF Versioning Dynamically detects the z/OS level Determines the structure of z/OS SMF records Determines the subsystem SMF record structure Supports multiple versions of z/OS SMF data in a single instance Ironstream now includes a framework for supporting multiple versions of z/OS SMF data • Positioned for future z/OS releases • Correctly formats the SMF record for Log analytics • Multiple versions/formats supported 16Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. 17Syncsort Confidential and Proprietary - do not copy or distribute Enclave support for RMF III data
  • 18. What are Enclave Attributes? An enclave is a transaction that can span multiple dispatchable units (SRBs and tasks) in one or more address spaces and is reported on and managed as a unit. The enclave is managed separately from the address spaces it runs in. A program can create an enclave, schedule SRBs into it, or join tasks to it. A multisystem work manager can process a transaction on multiple systems by using a multisystem enclave. An enclave represents a “business unit of work” – Used by a variety of workloads – Db2, Db2 DDF, Websphere, MQ, LDAP, TCP/IP – Enclave created and used for work across multiple address spaces and systems 18Syncsort Confidential and Proprietary - do not copy or distribute
  • 19. Enclave support for RMF III data Enclave is used to keep track of address space independent transactions – Can consist of multiple TCBs or SRBs executing across multiple address spaces Enclave used by Db2 – Distributed Data Facility (DDF) – Db2 Stored Procedures – Db2 Sysplex query parallelism – Db2 sequential prefetch Other users – MQSeries – Websphere – TCP/IP – LDAP 19Syncsort Confidential and Proprietary - do not copy or distribute Displaying Enclave activity using RMF
  • 20. Configuring Ironstream to collect Enclave Attributes 1. Activate Ironstream Desktop Browser 2. On Admin menu, select Ironstream instance 3. Select RMF Filters – Automatically built using RMF DDS 4. Select Enclave attributes from MVS Image Attributes Syncsort Confidential and Proprietary - do not copy or distribute 20
  • 21. 21Syncsort Confidential and Proprietary - do not copy or distribute Ironstream API Enhancement
  • 22. Ironstream API Enhancements The Ironstream API enables Ironstream instances to programmatically collect user-defined EBCDIC or ASCII data and forward it. The API includes a configurable IRONSTREAM_API data source and a SSDFAPI routine, which is a standalone load module that can be called or link edited statically into the calling program New capability allows an API instance to be INITiated and TERMinated – Enables multiple records to be sent while the connection is active 22Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. Using the Multi-Send API 23Syncsort Confidential and Proprietary - do not copy or distribute CALL SSDFPAPI,(NUMPARM,REQUEST, CLASS,TYPE,SUBTYPE,TOKEN, RETCODE, RSNCODE) | | | PROCESS DATA 1-N CALL SSDFPAPI,(NUMPARM, REQUEST, TOKEN, DATA, LENGTH, RETCODE, RSNCODE) | END DATA | | | CALL SSDFPAPI,(NUMPARM,REQUEST, TOKEN,RETCODE, RSNCODE) Requesting Program Ironstream INIT Request SEND Request…1 SEND Request…N TERM Request ▪ Validate Request ▪ Perform RACF Check ▪ Build Control Block Chain ▪ Send a valid Token to Requestor ▪ Validate request ▪ Process record for each SEND request ▪ Validate request ▪ Release Storage 1. Request: Request type can be “INIT”, “SEND” or “TERM” 2. Class: Identifies the Ironstream instance running with the same class 3. Type: Identifies the Ironstream instance running with same class and type combination. 4. Subtype: Identifies the Ironstream instance running with Same class, type and subtype combination 5. Token: Used by API 6. Data: Data Address 7. Length: Data Length API Parameter Options
  • 24. Advantages of the Multi-Send API Good for multiple, sequential send requests – E.g. Processing file input Connection persists over multiple send requests – RACF check performed only on the initiation of the connection Eliminates the need for the API to allocate and release storage for each operation Up to 10x Performance Improvement over Single-Send API when sending multiple records For single or few requests, Single-Send is appropriate 24Syncsort Confidential and Proprietary - do not copy or distribute
  • 25. Extending Ironstream Data Sources, Connectivity & Integration SMF Versioning – Ensuring All Software Levels are Supported by Ironstream – Enable Ironstream to work seamlessly with z/OS software upgrades RMF Enclave Attributes – Extend coverage of key z/OS metrics – Deliver insight into operational services – Monitor and identify problems faster API Enhancements – Enhance performance for application data solutions to Ironstream – Provide flexibility in connectivity options – Minimize resource consumption & utilization 25Syncsort Confidential and Proprietary - do not copy or distribute
  • 26. What’s New in Ironstream 2.1 26Syncsort Confidential and Proprietary - do not copy or distribute
  • 27. Ironstream 2.1 Overview 27Syncsort Confidential and Proprietary - do not copy or distribute Mainframe Data Forwarder DCE IDT Ironstream DesktopData Collection Extension Data ForwarderData Forwarder z/OS SPLUNK Enterprise Security SPLUNK IT Service Intelligence DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load SYSLOG SYSLOGD logs security SMF 67 types RMF Up to 50,000 values IMS
  • 28. Ironstream 2.1 Overview 28Syncsort Confidential and Proprietary - do not copy or distribute Mainframe Data Forwarder DCE IDT Ironstream DesktopData Collection Extension Data ForwarderData Forwarder z/OS SPLUNK Enterprise Security SPLUNK IT Service Intelligence DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load SYSLOG SYSLOGD logs security SMF 67 types RMF Up to 50,000 values IMS
  • 29. Ironstream 2.1 Overview 29Syncsort Confidential and Proprietary - do not copy or distribute Mainframe Data Forwarder DCE IDT Ironstream DesktopData Collection Extension Data ForwarderData Forwarder z/OS SPLUNK Enterprise Security SPLUNK IT Service Intelligence DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load SYSLOG SYSLOGD logs security SMF 67 types RMF Up to 50,000 values IMS
  • 30. Ironstream 2.1 Overview 30Syncsort Confidential and Proprietary - do not copy or distribute Mainframe Data Forwarder DCE IDT Ironstream DesktopData Collection Extension Data ForwarderData Forwarder z/OS SPLUNK Enterprise Security SPLUNK IT Service Intelligence DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load SYSLOG SYSLOGD logs security SMF 67 types RMF Up to 50,000 values IMS
  • 31. Log Forwarding to Elastic Logstash Ironstream now offers the capability to forward z/OS Mainframe log and application data directly to Logstash – Connection via TCPIP, HTTP – All data sources supported by Ironstream can be forwarded to Elastic – Sample Ironstream Kibana dashboards available 31Syncsort Confidential and Proprietary - do not copy or distribute
  • 32. Elastic Support 32Syncsort Confidential and Proprietary - do not copy or distribute
  • 33. Elastic Support 33Syncsort Confidential and Proprietary - do not copy or distribute
  • 34. Elastic Support 34Syncsort Confidential and Proprietary - do not copy or distribute
  • 35. Elastic Support 35Syncsort Confidential and Proprietary - do not copy or distribute
  • 36. Elastic Support 36Syncsort Confidential and Proprietary - do not copy or distribute
  • 37. Elastic Support 37Syncsort Confidential and Proprietary - do not copy or distribute
  • 38. Elastic Support 38Syncsort Confidential and Proprietary - do not copy or distribute
  • 39. Elastic Examples 39Syncsort Confidential and Proprietary - do not copy or distribute
  • 40. Elastic Examples 40Syncsort Confidential and Proprietary - do not copy or distribute
  • 41. Elastic Examples 41Syncsort Confidential and Proprietary - do not copy or distribute
  • 42. IMS Log Forwarding For organization who are running IMS systems, Ironstream now offers IMS log forwarding to Splunk and ELK – Ironstream supports both Synchronous (real-time) and Asynchronous log collection – Data is sent in JSON for ingestion into Splunk or Elastic Logstash – Ironstream exploits zIIP for reduced Mainframe MSU and associated savings 42Syncsort Confidential and Proprietary - do not copy or distribute
  • 43. IMS Log Forwarding For organization who are running IMS systems, Ironstream now offers IMS log forwarding to Splunk and ELK – Ironstream supports both Synchronous (real-time) and Asynchronous log collection – Data is sent in JSON for ingestion into Splunk or Elastic Logstash – Ironstream exploits zIIP for reduced Mainframe MSU and associated savings 43Syncsort Confidential and Proprietary - do not copy or distribute IMS Log Records Supported Master Terminal x’01’, X’03’ System x’45’ Transaction x’01’, x’03’, x’06’, x’07’, x’08’, x’0A’, x’31’, x’32’, x’33’, x’34’, x’35’, x’38’, x’56’ BMC Mainview x’FA’ (coming soon) Summary level information also available for Transaction statistics
  • 44. IMS Log Forwarding For organization who are running IMS systems, Ironstream now offers IMS log forwarding to Splunk and ELK – Ironstream supports both Synchronous (real-time) and Asynchronous log collection – Data is sent in JSON for ingestion into Splunk or Elastic Logstash – Ironstream exploits zIIP for reduced Mainframe MSU and associated savings Insight into IMS System & Transaction Statistics & performance for ITOA – Monitor IMS resource utilization – Report transaction response times & isolate issues – Problem identification – Monitor Critical Service Levels 44Syncsort Confidential and Proprietary - do not copy or distribute IMS Log Records Supported Master Terminal x’01’, X’03’ System x’45’ Transaction x’01’, x’03’, x’06’, x’07’, x’08’, x’0A’, x’31’, x’32’, x’33’, x’34’, x’35’, x’38’, x’56’ BMC Mainview x’FA’ (coming soon) Summary level information also available for Transaction statistics
  • 45. Ironstream IMS Log Collection - Synchronous 45Syncsort Confidential and Proprietary - do not copy or distribute TCPIP HTTP/HTTPS Synchronous Collection for online regions using the “log write” exit point ▪ IMS calls the “log write” exit after a block of data has been written to the IMS online log dataset. ▪ The exit gathers the entire block of data. ▪ Required log records are extracted from within the block and formatted into JSON for forwarding at no impact to the online service IMS Control Region IMS Log Exit SSDFILSG Data Space Record Extract & Format Ironstream Forwarder Cloud or On-premise z/OS
  • 46. SLDS Ironstream IMS Log Collection - Asynchronous 46Syncsort Confidential and Proprietary - do not copy or distribute IMS Control Region TCPIP HTTP/HTTPS Asynchronous Collection for online regions using a Log Archive process step SLDS IMS Archive Log Ironstream IMS Job Log Gatherer ▪ The Asynchronous log gatherer processes the IMS Archive file produced by a previous job step. In this case, the entire Ironstream process runs as a step within the IMS archive job ▪ Required log records are extracted from within the block and formatted into JSON for forwarding. Data Space Record Extract & Format Ironstream Forwarder IMS Archive Job z/OS Cloud or On-premise
  • 47. SMF INMEM Resources 47Syncsort Confidential and Proprietary - do not copy or distribute SMF PROCESSING OPTIONS Data set mode - SMF information is recorded in SYS1. MANx data sets Logstream mode - SMF information is recorded in multiple logstreams and data can be read directly from the logstreams In-memory (real-time) mode - SMF information is read directly from the system buffer. SMF information is read in real-time – IFAMCON – Connect to SMF in-memory – IFAMGET – Obtain data – IFAMDSC – Disconnect – IFAMQRY – Query SMF INMEM
  • 48. SMF INMEM Resources IRONSTREAM PROCESSING Enables collection of SMF data through the SMF INMEM resources and API – Low-latency – Can run on a zIIP Engine – Requires LOGSTREAM to be defined in SMFPRMxx definitions 48Syncsort Confidential and Proprietary - do not copy or distribute SMF PROCESSING OPTIONS Data set mode - SMF information is recorded in SYS1. MANx data sets Logstream mode - SMF information is recorded in multiple logstreams and data can be read directly from the logstreams In-memory (real-time) mode - SMF information is read directly from the system buffer. SMF information is read in real-time – IFAMCON – Connect to SMF in-memory – IFAMGET – Obtain data – IFAMDSC – Disconnect – IFAMQRY – Query SMF INMEM
  • 49. SMF INMEM Resources IRONSTREAM PROCESSING Enables collection of SMF data through the SMF INMEM resources and API – Low-latency – Can run on a zIIP Engine – Requires LOGSTREAM to be defined in SMFPRMxx definitions Defining SMF INMEM to Ironstream – Add “SMF_SOURCE”:”INMEM” – Add “INMEM_RESOURCE~.”<logstream>” as required 49Syncsort Confidential and Proprietary - do not copy or distribute SMF PROCESSING OPTIONS Data set mode - SMF information is recorded in SYS1. MANx data sets Logstream mode - SMF information is recorded in multiple logstreams and data can be read directly from the logstreams In-memory (real-time) mode - SMF information is read directly from the system buffer. SMF information is read in real-time – IFAMCON – Connect to SMF in-memory – IFAMGET – Obtain data – IFAMDSC – Disconnect – IFAMQRY – Query SMF INMEM
  • 50. SMF INMEM Resources IRONSTREAM PROCESSING Enables collection of SMF data through the SMF INMEM resources and API – Low-latency – Can run on a zIIP Engine – Requires LOGSTREAM to be defined in SMFPRMxx definitions Defining SMF INMEM to Ironstream – Add “SMF_SOURCE”:”INMEM” – Add “INMEM_RESOURCE~.”<logstream>” as required Logstream connections can be controlled by the Operator Modify Command 50Syncsort Confidential and Proprietary - do not copy or distribute SMF PROCESSING OPTIONS Data set mode - SMF information is recorded in SYS1. MANx data sets Logstream mode - SMF information is recorded in multiple logstreams and data can be read directly from the logstreams In-memory (real-time) mode - SMF information is read directly from the system buffer. SMF information is read in real-time – IFAMCON – Connect to SMF in-memory – IFAMGET – Obtain data – IFAMDSC – Disconnect – IFAMQRY – Query SMF INMEM
  • 51. Summary: Value Today for Enterprises with a z/OS Mainframe Syncsort Confidential and Proprietary - do not copy or distribute Less Complexity Collect mainframe data; correlate with data from other platforms; no mainframe expertise required Clearer Security Information Identify unauthorized mainframe access, other security risks; prepares and visualizes key data for compliance audits Healthier IT Operations Real-time alerts identify problems in all key environments View latency, transactions per second, exceptions, etc. Effective Problem-Resolution Management Real-time views to identify real or potential failures earlier; view related 'surrounding' information to support triage repair or prevention Higher Operational Efficiency Enhanced event correlation across systems; Staff resolves problems faster; “do more with less” Eliminate Your Mainframe “Blind-Spot” Splunk/Elastic + Ironstream = Your 360ᵒ Enterprise View 51
  • 52. What Now? Syncsort Confidential and Proprietary - do not copy or distribute 52 VISIT: HTTP://WWW.SYNCSORT.COM/EN/PRODUCTS/MAINFRAME/IRONSTREAM CONTACT: INFO@SYNCSORT.COM http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition Get Ironstream® for SYSLOG for free
  • 53. Thank You. Questions? Syncsort Confidential and Proprietary - do not copy or distribute 53