SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Downloaden Sie, um offline zu lesen
Syncsort Mainframe Customer Education Webinar
New Ironstream® Facilities For Enhanced z/OS
Analytics
2Q 2017
Today’s Presenters
Ed Wrazen Director, Mainframe Product Management is responsible for
the product strategy & roadmap for Syncsort’s Mainframe products and
solutions. With a career in Enterprise IT spanning 35 years, Ed has held
roles in software development, database administration, product
management, consulting and marketing in global businesses and
enterprise technology companies. Ed has experience in Enterprise
systems architectures, performance management, database and data
management technologies and is a regular speaker at industry events
worldwide.
2Syncsort Confidential and Proprietary - do not copy or distribute
Ed Hallock is a highly experienced Information Technology Professional
with a broad experience base in software product development, support,
product management, marketing, and business development. In his
diverse career Ed has benefited from working for some of the largest
independent software vendors, in a variety of roles, providing enterprise
solutions to Global 1000 corporations. Ed has extensive experience in
performance and availability management for systems and applications.
He holds a bachelor’s degree in Computer Science from Montclair State
University in Upper Montclair, New Jersey and has presented at numerous
industry events as well as corporate related conferences and seminars.
Agenda
Introduction to Ironstream®
New Features:
– Advanced Filtering for SMF data
– Data Loss Protection
Integration with Splunk’s IT Service Intelligence
Ironstream Sample Splunk Applications
Splunk: The Industry-Leading Platform For Machine Data
Syncsort Confidential and Proprietary - do not copy or distribute
Machine Data: Any Location, Type, Volume
Online
Services
Web
Services
Servers
Security GPS
Location
Storage
Desktops
Networks
Packaged
Applications
Custom
Apps
Messaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
Call Detail
Records
Smartphones
and Devices
RFID
On-
Premises
Private
Cloud
Public
Cloud
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Answer Any Question
Developer
Platform
Report &
analyze
Custom
dashboards
Monitor
& alert
Ad hoc
search
Mainframe
4
Critical Mainframe Data 
Normalized and Streamed to Splunk with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Value of an End-to-End View, Inclusive of Mainframe
Extend What Splunk Does Already, to include critical z/OS systems:
– 360ᵒ Degree View: Make the Splunk View of the Enterprise Complete via
Including Mainframe Data
– Same Splunk Dashboards, Bigger, More Complete Data Sets; Free Ironstream
Splunk Apps and Modules
Security and Compliance/SIEM
- Ensure Audits Passed
IT Operational Analytics/ITOA
-Ensure Ops SLAs Met
IT Service Intelligence/ITSI
-Ensure Services Health
Polling Question #1
What analytics platforms are you using today for z/OS IT operational
intelligence:
 Splunk
 Hadoop
 ELK (Elastic Stack)
 Spark
 Custom/Home Grown solution
 None
7
8Syncsort Confidential and Proprietary - do not copy or distribute
Advanced Filtering for SMF Data
Why Filter SMF Data?
SMF volumes can be enormous – large CICS and DB2 installations can
generate TBs of data daily
Transferring data that is not useful puts a strain on network and other
system resources
Need to provide control over volume of SMF data processed and
forwarded by Ironstream to Splunk
Need to eliminate data clutter by forwarding only those fields that are
truly needed
9Syncsort Confidential and Proprietary - do not copy or distribute
SMF Filtering and WHERE Processing
Ability to select only desired fields within individual SMF records
– INCLUDE statement in configuration file or via field selection in the Ironstream
Desktop GUI
New extension enables selection of fields based upon the value of
field
– WHERE clause in configuration file
10Syncsort Confidential and Proprietary - do not copy or distribute
Basic WHERE Syntax
"SELECT":"SMFnnn"
"INCLUDE":"field_1,field_2,...,field_n" Optional Statement
– If omitted, INCLUDE defaults to ALL
"WHERE":"search_condition AND/OR search_condition“
– Any number of search conditions can be specified
– If multiple search conditions are given, each must be separated by a
logical AND or OR operator
– Search_condition: Field_1 operator operand
• Field_1 must be the name of a field from the SMF record
• The operator can be: EQ, NE, LT, LE, GE, GT
• Operands can be another field name, character strings, decimal values, hex
values, date, time
• Wildcards supported for character strings
11Syncsort Confidential and Proprietary - do not copy or distribute
Basic WHERE Syntax
"SELECT":"SMFnnn"
"INCLUDE":"field_1,field_2,...,field_n" Optional Statement
– If omitted, INCLUDE defaults to ALL
"WHERE":"search_condition AND/OR search_condition“
– Any number of search conditions can be specified
– If multiple search conditions are given, each must be separated by a
logical AND or OR operator
– Search_condition: Field_1 operator operand
• Field_1 must be the name of a field from the SMF record
• The operator can be: EQ, NE, LT, LE, GE, GT
• Operands can be another field name, character strings, decimal values, hex
values, date, time
• Wildcards supported for character strings
12Syncsort Confidential and Proprietary - do not copy or distribute
Examples
"DATATYPE":"SMF"
"SELECT":"SMF030"
"WHERE":"SMF30TME GT T'11:17:00.00' AND SMF30TME LT T'11:30:00.00'“
"DATATYPE":"SMF"
"SELECT":"SMF030"
"WHERE":"(SMF30JBN EQ ‘WWC*' AND (SMF30_TIME_ON_ZIIP GT T’00:00:01.00’ +
OR SMF30_TIME_ZIIP_ON_CP GT 0)) OR SMF30JBN EQ ‘CYB*'"
13Syncsort Confidential and Proprietary - do not copy or distribute
14Syncsort Confidential and Proprietary - do not copy or distribute
Data Loss Protection (DLP)
Why is DLP Needed?
To prevent loss of data forwarded by Ironstream to Splunk
– Early implementations of Splunk did not include any mechanism for ensuring
that data forwarded by Ironstream was both received and successfully indexed
by the Splunk platform
• If Splunk encountered an error prior to indexing the data it received from
Ironstream, that data was lost even though Ironstream had successfully forwarded
it
– Network failures preventing Ironstream from forwarding data for a long
enough period would cause the in-storage data buffers to overflow resulting in
data loss
15Syncsort Confidential and Proprietary - do not copy or distribute
New Feature: Data Loss Protection (DLP)
Minimizes data loss during times of network or other external failures.
Uses IBM’s Coupling Facility’s System Logger functions, and Splunk’s
Indexer Acknowledgement feature.
– Splunk indexer acknowledgement feature allows Ironstream to detect when
data it has forwarded has been successfully received and indexed by the
Splunk platform.
16Syncsort Confidential and Proprietary - do not copy or distribute
New Feature: Data Loss Protection (DLP)
Minimizes data loss during times of network or other external failures.
Uses IBM’s Coupling Facility’s System Logger functions, and Splunk’s
Indexer Acknowledgement feature.
– Splunk indexer acknowledgement feature allows Ironstream to detect when
data it has forwarded has been successfully received and indexed by the
Splunk platform.
Optional feature that must be enabled….
– Must define and configure a log stream within a coupling facility and make
Ironstream configuration parameter changes.
– No modifications required to existing Ironstream configuration files for those
customers not requiring DLP.
– More information is available in the Ironstream Configuration and Users Guide.
17Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream SMF Processing without DLP
SMF Exits
Store data in DataStore
Extract from Data Store
and normalize data
Buffers and send data
No mechanism to ensure Splunk
has indexed data received from
Ironstream
Potential DataStore overflow on
network or Splunk failure
18Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream SMF Processing with DLP
SMF Exits
Store data in DataStore
Move function takes records
from DS and stores in CF
Extracts from CF and
normalize data
Buffers and sends data
ACK is received from Splunk
before deleting CF records
CF data only deleted from there
once a positive acknowledgement
has been received from the
Splunk indexer.
CF continues to collect and retain
data during extended network or
Splunk outages
Ironstream re-sends it once
Splunk is active or network
problems are resolved.
19Syncsort Confidential and Proprietary - do not copy or distribute
Polling Question #2
What analytics platforms are you considering or evaluating to use for
z/OS IT operational intelligence:
 Splunk
 Hadoop
 ELK (Elastic Stack)
 Spark
 Custom/Home Grown solution
 Other
20
21Syncsort Confidential and Proprietary - do not copy or distribute
IT Service Intelligence (ITSI)
Integation
What is Splunk IT Service Intelligence (ITSI)?
Splunk IT Service Intelligence delivers
machine learning-powered analytics to
simplify operations, prioritize issue resolution
and provide visibility into critical services.
22Syncsort Confidential and Proprietary - do not copy or distribute
 Delivers a central, unified view of
critical IT services for powerful, data-
driven monitoring
 Maps critical services with KPIs to
easily pinpoint what matters most
 Uses machine learning to detect
patterns, dynamically adapt
thresholds, highlight anomalies and
pinpoint areas of impact
 Provides business and service
context to prioritize incident
investigation and triage
 Supports drill downs to profile an
entity and rapidly troubleshoot
outages and service degradations
Ironstream ITSI Integration
Providing z/OS Metrics & Analysis to IT Service Intelligence
23Syncsort Confidential and Proprietary - do not copy or distribute
3 Levels
Overall Mainframe Central Processor Complex
LPAR Logical Partition (virtual machine equivalent)
Software Components
 CICS online transaction processing
 DB2 database, typically used with CICS
ITSI z/OS Data Sources provided by Ironstream
24Syncsort Confidential and Proprietary - do not copy or distribute
2 Data Sources
- Resource Measurement Facility (RMF)
- System Management Facilities (SMF)
Mainframe CPC
CPU Load % RMF M8D2550
Delay % RMF M8D0160
I/O Rate % RMF M8D0E90
Service Rate % RMF M8D1FB0
Workflow % RMF M8D0550
LPAR
CPU Load % RMF M8D0460
Delay % RMF M8D0160
Free Memory % RMF M8D0380
Free Storage % RMF M8D2A50
Using % RMF M8D04A0
Workflow % RMF M8D0550
CICS System & Individual Transactions
ABENDs SMF 110
Response Times SMF 110
DB2
Deadlocks SMF 101, IFCID 3
Exclusive Escalations SMF 101, IFCID 3
Shared Escalations SMF 101, IFCID 3
Lock Waits SMF 101, IFCID 3
Timeouts SMF 101, IFCID 3
Ironstream Desktop (IDT)
Ironstream ITSI Integration
25Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
TCP/IP
SSL or non-SSL
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
z/OS
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
Enterprise
Security
IT Service
Intelligence SPLUNK
Ironstream ITSI Integration
Service Analyzer
26
KPIs provided for
mainframe systems in
Service Analyzer
– CEC (Central
Electronic Complex),
i.e. “the box”
– LPARs (logical
partitions)
– Critical services
Glass Tables for
visualization
Ironstream Integration with ITSI
Glass Table with 3 Level Overview
27
Critical services
CEC (Central
Electronic Complex)
LPARs (logical
partitions)
Ironstream Integration with ITSI
Glass Table for Online Banking Services
28
Ironstream Integration with ITSI
DB2 Deep Dive
29
Ironstream Integration with ITSI
CICS Details
30
Polling Question #3
What Security Information and Event Management (SIEM) platform is in
use within your Enterprise:
 IBM zSecure/QRadar
 Correlog
 Splunk Enterprise Security
 HP Arcsight
 Logrythm
 Other
31Syncsort Confidential and Proprietary - do not copy or distribute
32Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream Splunkbase Apps
What are apps and how are they used?
Sample dashboards that utilize specific data sources to demonstrate
the value of Ironstream
Downloaded from splunkbase and installed into the Splunk Enterprise
environment for use with Ironstream supplied data
– 3-step simple process for a Splunk admin
1. Upload/install the app
2. Ensure an Ironstream index is defined to Splunk
3. Define the TCP/IP connection to Splunk for the Ironstream datasource
Note: Splunk admin has the ability to modify queries and reports
contained within each dashboard to meet their individual
requirements
33Syncsort Confidential and Proprietary - do not copy or distribute
Search on Ironstream or Syncsort in splunk base to see our apps
34Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream Applications on splunkbase
Syslog
– RACF violations and message trends
CICS Region Monitor
– CICS Region Health Check
– CICS Region transaction rates, response times, CPU usage, & failures
MQ Monitor
– Queue depths and response time
– Message Get/Put rates and CPU use
– Ability to filter by connection name and queue name
35Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream Applications on splunkbase
System Performance Monitor
– CEC MSU capacity alongside the 4-hour rolling average figures (4HRA) for each
LPAR
– z/OS system performance data including:
• CPU utilization, memory and common storage utilization, Paging rates
Dataset Analyzer
– Critical datasets to be monitored are defined via a .CSV file in Splunk
36Syncsort Confidential and Proprietary - do not copy or distribute
Select an app and download Product Documentation from the Details Tab
37Syncsort Confidential and Proprietary - do not copy or distribute
Syslog App: Benefits
View RACF violations by type and user
– Understand invalid logon attempts
– Unauthorized attempts to access datasets
Look at message trends over time to determine potential security
threats
View messages by subsystem
38Syncsort Confidential and Proprietary - do not copy or distribute
Syslog App: RACF Violations and Message Trends
Syncsort Confidential and Proprietary - do not copy or distribute 39
RACF Violations by type RACF Violations by user
Trend message volumes today vs. same time last week and 2 weeks ago
CICS App: Benefits
Monitor CICS regions and transactions supporting critical business
services
Understand transaction rates, response times, and resource utilization
to determine if business services are being met or impacted
Identify transaction failures that are impacting business services
40Syncsort Confidential and Proprietary - do not copy or distribute
CICS Region Health Check
Syncsort Confidential and Proprietary - do not copy or distribute 41
Transaction Response Time Transaction Rates
Dispatch Time
MQ App: Benefits
Monitor MQ connections and queues supporting critical business
services
Understand message rates, response times, and resource utilization to
determine if business services are being met or impacted
42Syncsort Confidential and Proprietary - do not copy or distribute
MQ Monitor
43Syncsort Confidential and Proprietary - do not copy or distribute
Queue Response Time by Connection
GET and PUT CPU Time by Connection
System Performance App: Benefits
Monitor all critical resources for a z/OS LPAR to ensure business
services are not impacted
Determine if specialty processors(zIPP) are being used to reduce
general processor utilization
Monitor the 4-hour rolling average for MSUs by LPAR
44Syncsort Confidential and Proprietary - do not copy or distribute
System Performance Monitor
45Syncsort Confidential and Proprietary - do not copy or distribute
4HRA by LPAR CEC MSUs
CPU usage by processor type
Dataset Analyzer App: Benefits
Define and monitor access to critical datasets
Determine potential security threats based on unauthorized access
attempts
Ensure only authorized users are accessing critical datasets
Understand when dataset access conflicts could be impacting overall
application performance
46Syncsort Confidential and Proprietary - do not copy or distribute
Dataset Analyzer App
47Syncsort Confidential and Proprietary - do not copy or distribute
Access by type for each critical dataset
Summary: Value Today for Enterprises with a z/OS Mainframe
Syncsort Confidential and Proprietary - do not copy or distribute
Less Complexity
Collect mainframe data; correlate
with data from other platforms; no
mainframe expertise required
Clearer Security Information
Identify unauthorized mainframe
access, other security risks; prepares
and visualizes key data for
compliance audits
Healthier IT Operations
Real-time alerts identify problems in
all key environments View latency,
transactions per second, exceptions,
etc.
Effective Problem-Resolution
Management
Real-time views to identify real or
potential failures earlier; view related
'surrounding' information to support
triage repair or prevention
Higher Operational Efficiency
Enhanced event correlation across
systems; Staff resolves problems faster;
“do more with less”
Eliminate Your Mainframe
“Blind-Spot”
Splunk + Ironstream = Your 360ᵒ
Enterprise View
Industry Leader in Mainframe
Software Products
What Now?
50
Get Ironstream® for SYSLOG for free
VISIT:
HTTP://WWW.SYNCSORT.COM/EN/PRODUCTS/MAINFRAME/IRONSTREAM
CONTACT:
INFO@SYNCSORT.COM
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
Thank You.
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

TFA, ORAchk and EXAchk 20.2 - What's new
TFA, ORAchk and EXAchk 20.2 - What's new TFA, ORAchk and EXAchk 20.2 - What's new
TFA, ORAchk and EXAchk 20.2 - What's new Sandesh Rao
 
Tendencias Storage
Tendencias StorageTendencias Storage
Tendencias StorageFran Navarro
 
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RACAUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RACSandesh Rao
 
Machine Learning and AI at Oracle
Machine Learning and AI at OracleMachine Learning and AI at Oracle
Machine Learning and AI at OracleSandesh Rao
 
Oracle IaaS Overview - AIOUG Hyderabad Chapter
Oracle IaaS Overview - AIOUG Hyderabad ChapterOracle IaaS Overview - AIOUG Hyderabad Chapter
Oracle IaaS Overview - AIOUG Hyderabad Chapteraioughydchapter
 
AIOUG-GroundBreakers-Jul 2019 - 19c RAC
AIOUG-GroundBreakers-Jul 2019 - 19c RACAIOUG-GroundBreakers-Jul 2019 - 19c RAC
AIOUG-GroundBreakers-Jul 2019 - 19c RACSandesh Rao
 
LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...
LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...
LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...Sandesh Rao
 
LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...
LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...
LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...Sandesh Rao
 
Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0Gareth Chapman
 
APEX – jak vytvořit jednoduše aplikaci
APEX – jak vytvořit jednoduše aplikaciAPEX – jak vytvořit jednoduše aplikaci
APEX – jak vytvořit jednoduše aplikaciMarketingArrowECS_CZ
 
Using Xeon + FPGA for Accelerating HPC Workloads
Using Xeon + FPGA for Accelerating HPC WorkloadsUsing Xeon + FPGA for Accelerating HPC Workloads
Using Xeon + FPGA for Accelerating HPC Workloadsinside-BigData.com
 
How to use Exachk effectively to manage Exadata environments OGBEmea
How to use Exachk effectively to manage Exadata environments OGBEmeaHow to use Exachk effectively to manage Exadata environments OGBEmea
How to use Exachk effectively to manage Exadata environments OGBEmeaSandesh Rao
 
Introduction to Machine Learning - From DBA's to Data Scientists - OGBEMEA
Introduction to Machine Learning - From DBA's to Data Scientists - OGBEMEAIntroduction to Machine Learning - From DBA's to Data Scientists - OGBEMEA
Introduction to Machine Learning - From DBA's to Data Scientists - OGBEMEASandesh Rao
 
The Machine Learning behind the Autonomous Database ILOUG Feb 2020
The Machine Learning behind the Autonomous Database   ILOUG Feb 2020 The Machine Learning behind the Autonomous Database   ILOUG Feb 2020
The Machine Learning behind the Autonomous Database ILOUG Feb 2020 Sandesh Rao
 
How to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata EnvironmentsHow to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata EnvironmentsSandesh Rao
 
Oracle RAC 19c with Standard Edition (SE) 2 - Support Update
Oracle RAC 19c with Standard Edition (SE) 2 - Support UpdateOracle RAC 19c with Standard Edition (SE) 2 - Support Update
Oracle RAC 19c with Standard Edition (SE) 2 - Support UpdateMarkus Michalewicz
 
Oracle NoSQL Database release 3.0 overview
Oracle NoSQL Database release 3.0 overviewOracle NoSQL Database release 3.0 overview
Oracle NoSQL Database release 3.0 overviewDave Segleau
 
A History of Oracle Corporation
A History of Oracle CorporationA History of Oracle Corporation
A History of Oracle Corporationdsp
 
Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...
Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...
Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...Hirofumi Iwasaki
 

Was ist angesagt? (20)

TFA, ORAchk and EXAchk 20.2 - What's new
TFA, ORAchk and EXAchk 20.2 - What's new TFA, ORAchk and EXAchk 20.2 - What's new
TFA, ORAchk and EXAchk 20.2 - What's new
 
Tendencias Storage
Tendencias StorageTendencias Storage
Tendencias Storage
 
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RACAUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
AUSOUG - NZOUG-GroundBreakers-Jun 2019 - 19c RAC
 
Machine Learning and AI at Oracle
Machine Learning and AI at OracleMachine Learning and AI at Oracle
Machine Learning and AI at Oracle
 
Oracle IaaS Overview - AIOUG Hyderabad Chapter
Oracle IaaS Overview - AIOUG Hyderabad ChapterOracle IaaS Overview - AIOUG Hyderabad Chapter
Oracle IaaS Overview - AIOUG Hyderabad Chapter
 
AIOUG-GroundBreakers-Jul 2019 - 19c RAC
AIOUG-GroundBreakers-Jul 2019 - 19c RACAIOUG-GroundBreakers-Jul 2019 - 19c RAC
AIOUG-GroundBreakers-Jul 2019 - 19c RAC
 
LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...
LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...
LAD -GroundBreakers-Jul 2019 - The Machine Learning behind the Autonomous Dat...
 
LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...
LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...
LAD - GroundBreakers - Jul 2019 - Using Oracle Autonomous Health Framework to...
 
Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0Whats new in oracle trace file analyzer 18.3.0
Whats new in oracle trace file analyzer 18.3.0
 
APEX – jak vytvořit jednoduše aplikaci
APEX – jak vytvořit jednoduše aplikaciAPEX – jak vytvořit jednoduše aplikaci
APEX – jak vytvořit jednoduše aplikaci
 
Using Xeon + FPGA for Accelerating HPC Workloads
Using Xeon + FPGA for Accelerating HPC WorkloadsUsing Xeon + FPGA for Accelerating HPC Workloads
Using Xeon + FPGA for Accelerating HPC Workloads
 
How to use Exachk effectively to manage Exadata environments OGBEmea
How to use Exachk effectively to manage Exadata environments OGBEmeaHow to use Exachk effectively to manage Exadata environments OGBEmea
How to use Exachk effectively to manage Exadata environments OGBEmea
 
Introduction to Machine Learning - From DBA's to Data Scientists - OGBEMEA
Introduction to Machine Learning - From DBA's to Data Scientists - OGBEMEAIntroduction to Machine Learning - From DBA's to Data Scientists - OGBEMEA
Introduction to Machine Learning - From DBA's to Data Scientists - OGBEMEA
 
Sparc solaris servers
Sparc solaris serversSparc solaris servers
Sparc solaris servers
 
The Machine Learning behind the Autonomous Database ILOUG Feb 2020
The Machine Learning behind the Autonomous Database   ILOUG Feb 2020 The Machine Learning behind the Autonomous Database   ILOUG Feb 2020
The Machine Learning behind the Autonomous Database ILOUG Feb 2020
 
How to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata EnvironmentsHow to Use EXAchk Effectively to Manage Exadata Environments
How to Use EXAchk Effectively to Manage Exadata Environments
 
Oracle RAC 19c with Standard Edition (SE) 2 - Support Update
Oracle RAC 19c with Standard Edition (SE) 2 - Support UpdateOracle RAC 19c with Standard Edition (SE) 2 - Support Update
Oracle RAC 19c with Standard Edition (SE) 2 - Support Update
 
Oracle NoSQL Database release 3.0 overview
Oracle NoSQL Database release 3.0 overviewOracle NoSQL Database release 3.0 overview
Oracle NoSQL Database release 3.0 overview
 
A History of Oracle Corporation
A History of Oracle CorporationA History of Oracle Corporation
A History of Oracle Corporation
 
Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...
Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...
Case Study: Credit Card Core System with Exalogic, Exadata, Oracle Cloud Mach...
 

Andere mochten auch

Presentatie big data expo swarovski
Presentatie big data expo swarovskiPresentatie big data expo swarovski
Presentatie big data expo swarovskiBigDataExpo
 
Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920BigDataExpo
 
Picnic Big Data Expo
Picnic Big Data ExpoPicnic Big Data Expo
Picnic Big Data ExpoBigDataExpo
 
NUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data AnalyticsNUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data AnalyticsNUS-ISS
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu MockupNone None
 
Accenture Big Data Expo
Accenture Big Data ExpoAccenture Big Data Expo
Accenture Big Data ExpoBigDataExpo
 
De Bijenkorf Niels Reijmer
De Bijenkorf Niels ReijmerDe Bijenkorf Niels Reijmer
De Bijenkorf Niels ReijmerBigDataExpo
 
Eneco Ronald Root
Eneco Ronald RootEneco Ronald Root
Eneco Ronald RootBigDataExpo
 
Incident response on a shoestring budget
Incident response on a shoestring budgetIncident response on a shoestring budget
Incident response on a shoestring budgetDerek Banks
 
Elasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautésElasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautésMathieu Elie
 
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry PakAnomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry PakData Con LA
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityData Science Thailand
 
Google Big Data Expo
Google Big Data ExpoGoogle Big Data Expo
Google Big Data ExpoBigDataExpo
 
ProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der VoortProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der VoortBigDataExpo
 
Technology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and BeyondTechnology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and BeyondJames Huang
 
De groote de man Ingrid de Poorter
De groote de man Ingrid de PoorterDe groote de man Ingrid de Poorter
De groote de man Ingrid de PoorterBigDataExpo
 

Andere mochten auch (20)

Presentatie big data expo swarovski
Presentatie big data expo swarovskiPresentatie big data expo swarovski
Presentatie big data expo swarovski
 
Travelbird
TravelbirdTravelbird
Travelbird
 
Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920Bde presentatie bakker_bart_20170920
Bde presentatie bakker_bart_20170920
 
Picnic Big Data Expo
Picnic Big Data ExpoPicnic Big Data Expo
Picnic Big Data Expo
 
Polar Bears Mario
Polar Bears MarioPolar Bears Mario
Polar Bears Mario
 
NUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data AnalyticsNUS-ISS Learning Day 2016 - Big Data Analytics
NUS-ISS Learning Day 2016 - Big Data Analytics
 
Digital transformation - Jo Caudron
Digital transformation - Jo CaudronDigital transformation - Jo Caudron
Digital transformation - Jo Caudron
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu Mockup
 
Accenture Big Data Expo
Accenture Big Data ExpoAccenture Big Data Expo
Accenture Big Data Expo
 
De Bijenkorf Niels Reijmer
De Bijenkorf Niels ReijmerDe Bijenkorf Niels Reijmer
De Bijenkorf Niels Reijmer
 
Eneco Ronald Root
Eneco Ronald RootEneco Ronald Root
Eneco Ronald Root
 
Incident response on a shoestring budget
Incident response on a shoestring budgetIncident response on a shoestring budget
Incident response on a shoestring budget
 
Elasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautésElasticsearch 5.0 les nouveautés
Elasticsearch 5.0 les nouveautés
 
Datasnap web client
Datasnap web clientDatasnap web client
Datasnap web client
 
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry PakAnomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
Anomaly Detection in Time-Series Data using the Elastic Stack by Henry Pak
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance Security
 
Google Big Data Expo
Google Big Data ExpoGoogle Big Data Expo
Google Big Data Expo
 
ProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der VoortProRail Laurens Koppenol & Paul van der Voort
ProRail Laurens Koppenol & Paul van der Voort
 
Technology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and BeyondTechnology and AI sharing - From 2016 to Y2017 and Beyond
Technology and AI sharing - From 2016 to Y2017 and Beyond
 
De groote de man Ingrid de Poorter
De groote de man Ingrid de PoorterDe groote de man Ingrid de Poorter
De groote de man Ingrid de Poorter
 

Ähnlich wie Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced z/OS Analytics

Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...Precisely
 
What’s New in Syncsort Ironstream 2.1
What’s New in Syncsort Ironstream 2.1What’s New in Syncsort Ironstream 2.1
What’s New in Syncsort Ironstream 2.1Precisely
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataPrecisely
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITPrecisely
 
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5Splunk
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunk
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Greg Hanchin
 
Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnSplunk
 
Customer Presentation - Financial Services Organization
Customer Presentation - Financial Services OrganizationCustomer Presentation - Financial Services Organization
Customer Presentation - Financial Services OrganizationSplunk
 
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Precisely
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
How to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkHow to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkPrecisely
 
Getting Started with Splunk
Getting Started with SplunkGetting Started with Splunk
Getting Started with SplunkSplunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding OverviewSplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding OverviewSplunk
 
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunk
 

Ähnlich wie Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced z/OS Analytics (20)

Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
 
What’s New in Syncsort Ironstream 2.1
What’s New in Syncsort Ironstream 2.1What’s New in Syncsort Ironstream 2.1
What’s New in Syncsort Ironstream 2.1
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS DataBig Data Analytics for Real-time Operational Intelligence with Your z/OS Data
Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Old Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe ITOld Dogs, New Tricks: Big Data from and for Mainframe IT
Old Dogs, New Tricks: Big Data from and for Mainframe IT
 
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
SplunkLive! Washington DC May 2013 - Splunk Enterprise 5
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
 
Customer Presentation - Financial Services Organization
Customer Presentation - Financial Services OrganizationCustomer Presentation - Financial Services Organization
Customer Presentation - Financial Services Organization
 
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
How to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkHow to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with Splunk
 
Getting Started with Splunk
Getting Started with SplunkGetting Started with Splunk
Getting Started with Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding OverviewSplunkLive! Frankfurt 2018 - Data Onboarding Overview
SplunkLive! Frankfurt 2018 - Data Onboarding Overview
 
SplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding OverviewSplunkLive! Munich 2018: Data Onboarding Overview
SplunkLive! Munich 2018: Data Onboarding Overview
 

Mehr von Precisely

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenPrecisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 

Mehr von Precisely (20)

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced z/OS Analytics

  • 1. Syncsort Mainframe Customer Education Webinar New Ironstream® Facilities For Enhanced z/OS Analytics 2Q 2017
  • 2. Today’s Presenters Ed Wrazen Director, Mainframe Product Management is responsible for the product strategy & roadmap for Syncsort’s Mainframe products and solutions. With a career in Enterprise IT spanning 35 years, Ed has held roles in software development, database administration, product management, consulting and marketing in global businesses and enterprise technology companies. Ed has experience in Enterprise systems architectures, performance management, database and data management technologies and is a regular speaker at industry events worldwide. 2Syncsort Confidential and Proprietary - do not copy or distribute Ed Hallock is a highly experienced Information Technology Professional with a broad experience base in software product development, support, product management, marketing, and business development. In his diverse career Ed has benefited from working for some of the largest independent software vendors, in a variety of roles, providing enterprise solutions to Global 1000 corporations. Ed has extensive experience in performance and availability management for systems and applications. He holds a bachelor’s degree in Computer Science from Montclair State University in Upper Montclair, New Jersey and has presented at numerous industry events as well as corporate related conferences and seminars.
  • 3. Agenda Introduction to Ironstream® New Features: – Advanced Filtering for SMF data – Data Loss Protection Integration with Splunk’s IT Service Intelligence Ironstream Sample Splunk Applications
  • 4. Splunk: The Industry-Leading Platform For Machine Data Syncsort Confidential and Proprietary - do not copy or distribute Machine Data: Any Location, Type, Volume Online Services Web Services Servers Security GPS Location Storage Desktops Networks Packaged Applications Custom Apps Messaging Telecoms Online Shopping Cart Web Clickstreams Databases Energy Meters Call Detail Records Smartphones and Devices RFID On- Premises Private Cloud Public Cloud Platform Support (Apps / API / SDKs) Enterprise Scalability Universal Indexing Answer Any Question Developer Platform Report & analyze Custom dashboards Monitor & alert Ad hoc search Mainframe 4
  • 5. Critical Mainframe Data  Normalized and Streamed to Splunk with Ironstream® Log4jFile Load SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USS
  • 6. Value of an End-to-End View, Inclusive of Mainframe Extend What Splunk Does Already, to include critical z/OS systems: – 360ᵒ Degree View: Make the Splunk View of the Enterprise Complete via Including Mainframe Data – Same Splunk Dashboards, Bigger, More Complete Data Sets; Free Ironstream Splunk Apps and Modules Security and Compliance/SIEM - Ensure Audits Passed IT Operational Analytics/ITOA -Ensure Ops SLAs Met IT Service Intelligence/ITSI -Ensure Services Health
  • 7. Polling Question #1 What analytics platforms are you using today for z/OS IT operational intelligence:  Splunk  Hadoop  ELK (Elastic Stack)  Spark  Custom/Home Grown solution  None 7
  • 8. 8Syncsort Confidential and Proprietary - do not copy or distribute Advanced Filtering for SMF Data
  • 9. Why Filter SMF Data? SMF volumes can be enormous – large CICS and DB2 installations can generate TBs of data daily Transferring data that is not useful puts a strain on network and other system resources Need to provide control over volume of SMF data processed and forwarded by Ironstream to Splunk Need to eliminate data clutter by forwarding only those fields that are truly needed 9Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. SMF Filtering and WHERE Processing Ability to select only desired fields within individual SMF records – INCLUDE statement in configuration file or via field selection in the Ironstream Desktop GUI New extension enables selection of fields based upon the value of field – WHERE clause in configuration file 10Syncsort Confidential and Proprietary - do not copy or distribute
  • 11. Basic WHERE Syntax "SELECT":"SMFnnn" "INCLUDE":"field_1,field_2,...,field_n" Optional Statement – If omitted, INCLUDE defaults to ALL "WHERE":"search_condition AND/OR search_condition“ – Any number of search conditions can be specified – If multiple search conditions are given, each must be separated by a logical AND or OR operator – Search_condition: Field_1 operator operand • Field_1 must be the name of a field from the SMF record • The operator can be: EQ, NE, LT, LE, GE, GT • Operands can be another field name, character strings, decimal values, hex values, date, time • Wildcards supported for character strings 11Syncsort Confidential and Proprietary - do not copy or distribute
  • 12. Basic WHERE Syntax "SELECT":"SMFnnn" "INCLUDE":"field_1,field_2,...,field_n" Optional Statement – If omitted, INCLUDE defaults to ALL "WHERE":"search_condition AND/OR search_condition“ – Any number of search conditions can be specified – If multiple search conditions are given, each must be separated by a logical AND or OR operator – Search_condition: Field_1 operator operand • Field_1 must be the name of a field from the SMF record • The operator can be: EQ, NE, LT, LE, GE, GT • Operands can be another field name, character strings, decimal values, hex values, date, time • Wildcards supported for character strings 12Syncsort Confidential and Proprietary - do not copy or distribute
  • 13. Examples "DATATYPE":"SMF" "SELECT":"SMF030" "WHERE":"SMF30TME GT T'11:17:00.00' AND SMF30TME LT T'11:30:00.00'“ "DATATYPE":"SMF" "SELECT":"SMF030" "WHERE":"(SMF30JBN EQ ‘WWC*' AND (SMF30_TIME_ON_ZIIP GT T’00:00:01.00’ + OR SMF30_TIME_ZIIP_ON_CP GT 0)) OR SMF30JBN EQ ‘CYB*'" 13Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. 14Syncsort Confidential and Proprietary - do not copy or distribute Data Loss Protection (DLP)
  • 15. Why is DLP Needed? To prevent loss of data forwarded by Ironstream to Splunk – Early implementations of Splunk did not include any mechanism for ensuring that data forwarded by Ironstream was both received and successfully indexed by the Splunk platform • If Splunk encountered an error prior to indexing the data it received from Ironstream, that data was lost even though Ironstream had successfully forwarded it – Network failures preventing Ironstream from forwarding data for a long enough period would cause the in-storage data buffers to overflow resulting in data loss 15Syncsort Confidential and Proprietary - do not copy or distribute
  • 16. New Feature: Data Loss Protection (DLP) Minimizes data loss during times of network or other external failures. Uses IBM’s Coupling Facility’s System Logger functions, and Splunk’s Indexer Acknowledgement feature. – Splunk indexer acknowledgement feature allows Ironstream to detect when data it has forwarded has been successfully received and indexed by the Splunk platform. 16Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. New Feature: Data Loss Protection (DLP) Minimizes data loss during times of network or other external failures. Uses IBM’s Coupling Facility’s System Logger functions, and Splunk’s Indexer Acknowledgement feature. – Splunk indexer acknowledgement feature allows Ironstream to detect when data it has forwarded has been successfully received and indexed by the Splunk platform. Optional feature that must be enabled…. – Must define and configure a log stream within a coupling facility and make Ironstream configuration parameter changes. – No modifications required to existing Ironstream configuration files for those customers not requiring DLP. – More information is available in the Ironstream Configuration and Users Guide. 17Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. Ironstream SMF Processing without DLP SMF Exits Store data in DataStore Extract from Data Store and normalize data Buffers and send data No mechanism to ensure Splunk has indexed data received from Ironstream Potential DataStore overflow on network or Splunk failure 18Syncsort Confidential and Proprietary - do not copy or distribute
  • 19. Ironstream SMF Processing with DLP SMF Exits Store data in DataStore Move function takes records from DS and stores in CF Extracts from CF and normalize data Buffers and sends data ACK is received from Splunk before deleting CF records CF data only deleted from there once a positive acknowledgement has been received from the Splunk indexer. CF continues to collect and retain data during extended network or Splunk outages Ironstream re-sends it once Splunk is active or network problems are resolved. 19Syncsort Confidential and Proprietary - do not copy or distribute
  • 20. Polling Question #2 What analytics platforms are you considering or evaluating to use for z/OS IT operational intelligence:  Splunk  Hadoop  ELK (Elastic Stack)  Spark  Custom/Home Grown solution  Other 20
  • 21. 21Syncsort Confidential and Proprietary - do not copy or distribute IT Service Intelligence (ITSI) Integation
  • 22. What is Splunk IT Service Intelligence (ITSI)? Splunk IT Service Intelligence delivers machine learning-powered analytics to simplify operations, prioritize issue resolution and provide visibility into critical services. 22Syncsort Confidential and Proprietary - do not copy or distribute  Delivers a central, unified view of critical IT services for powerful, data- driven monitoring  Maps critical services with KPIs to easily pinpoint what matters most  Uses machine learning to detect patterns, dynamically adapt thresholds, highlight anomalies and pinpoint areas of impact  Provides business and service context to prioritize incident investigation and triage  Supports drill downs to profile an entity and rapidly troubleshoot outages and service degradations
  • 23. Ironstream ITSI Integration Providing z/OS Metrics & Analysis to IT Service Intelligence 23Syncsort Confidential and Proprietary - do not copy or distribute 3 Levels Overall Mainframe Central Processor Complex LPAR Logical Partition (virtual machine equivalent) Software Components  CICS online transaction processing  DB2 database, typically used with CICS
  • 24. ITSI z/OS Data Sources provided by Ironstream 24Syncsort Confidential and Proprietary - do not copy or distribute 2 Data Sources - Resource Measurement Facility (RMF) - System Management Facilities (SMF) Mainframe CPC CPU Load % RMF M8D2550 Delay % RMF M8D0160 I/O Rate % RMF M8D0E90 Service Rate % RMF M8D1FB0 Workflow % RMF M8D0550 LPAR CPU Load % RMF M8D0460 Delay % RMF M8D0160 Free Memory % RMF M8D0380 Free Storage % RMF M8D2A50 Using % RMF M8D04A0 Workflow % RMF M8D0550 CICS System & Individual Transactions ABENDs SMF 110 Response Times SMF 110 DB2 Deadlocks SMF 101, IFCID 3 Exclusive Escalations SMF 101, IFCID 3 Shared Escalations SMF 101, IFCID 3 Lock Waits SMF 101, IFCID 3 Timeouts SMF 101, IFCID 3 Ironstream Desktop (IDT)
  • 25. Ironstream ITSI Integration 25Syncsort Confidential and Proprietary - do not copy or distribute Mainframe TCP/IP SSL or non-SSL Data Forwarder DCE IDT Ironstream DesktopData Collection Extension Data ForwarderData Forwarder DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load z/OS SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values Enterprise Security IT Service Intelligence SPLUNK
  • 26. Ironstream ITSI Integration Service Analyzer 26 KPIs provided for mainframe systems in Service Analyzer – CEC (Central Electronic Complex), i.e. “the box” – LPARs (logical partitions) – Critical services Glass Tables for visualization
  • 27. Ironstream Integration with ITSI Glass Table with 3 Level Overview 27 Critical services CEC (Central Electronic Complex) LPARs (logical partitions)
  • 28. Ironstream Integration with ITSI Glass Table for Online Banking Services 28
  • 29. Ironstream Integration with ITSI DB2 Deep Dive 29
  • 30. Ironstream Integration with ITSI CICS Details 30
  • 31. Polling Question #3 What Security Information and Event Management (SIEM) platform is in use within your Enterprise:  IBM zSecure/QRadar  Correlog  Splunk Enterprise Security  HP Arcsight  Logrythm  Other 31Syncsort Confidential and Proprietary - do not copy or distribute
  • 32. 32Syncsort Confidential and Proprietary - do not copy or distribute Ironstream Splunkbase Apps
  • 33. What are apps and how are they used? Sample dashboards that utilize specific data sources to demonstrate the value of Ironstream Downloaded from splunkbase and installed into the Splunk Enterprise environment for use with Ironstream supplied data – 3-step simple process for a Splunk admin 1. Upload/install the app 2. Ensure an Ironstream index is defined to Splunk 3. Define the TCP/IP connection to Splunk for the Ironstream datasource Note: Splunk admin has the ability to modify queries and reports contained within each dashboard to meet their individual requirements 33Syncsort Confidential and Proprietary - do not copy or distribute
  • 34. Search on Ironstream or Syncsort in splunk base to see our apps 34Syncsort Confidential and Proprietary - do not copy or distribute
  • 35. Ironstream Applications on splunkbase Syslog – RACF violations and message trends CICS Region Monitor – CICS Region Health Check – CICS Region transaction rates, response times, CPU usage, & failures MQ Monitor – Queue depths and response time – Message Get/Put rates and CPU use – Ability to filter by connection name and queue name 35Syncsort Confidential and Proprietary - do not copy or distribute
  • 36. Ironstream Applications on splunkbase System Performance Monitor – CEC MSU capacity alongside the 4-hour rolling average figures (4HRA) for each LPAR – z/OS system performance data including: • CPU utilization, memory and common storage utilization, Paging rates Dataset Analyzer – Critical datasets to be monitored are defined via a .CSV file in Splunk 36Syncsort Confidential and Proprietary - do not copy or distribute
  • 37. Select an app and download Product Documentation from the Details Tab 37Syncsort Confidential and Proprietary - do not copy or distribute
  • 38. Syslog App: Benefits View RACF violations by type and user – Understand invalid logon attempts – Unauthorized attempts to access datasets Look at message trends over time to determine potential security threats View messages by subsystem 38Syncsort Confidential and Proprietary - do not copy or distribute
  • 39. Syslog App: RACF Violations and Message Trends Syncsort Confidential and Proprietary - do not copy or distribute 39 RACF Violations by type RACF Violations by user Trend message volumes today vs. same time last week and 2 weeks ago
  • 40. CICS App: Benefits Monitor CICS regions and transactions supporting critical business services Understand transaction rates, response times, and resource utilization to determine if business services are being met or impacted Identify transaction failures that are impacting business services 40Syncsort Confidential and Proprietary - do not copy or distribute
  • 41. CICS Region Health Check Syncsort Confidential and Proprietary - do not copy or distribute 41 Transaction Response Time Transaction Rates Dispatch Time
  • 42. MQ App: Benefits Monitor MQ connections and queues supporting critical business services Understand message rates, response times, and resource utilization to determine if business services are being met or impacted 42Syncsort Confidential and Proprietary - do not copy or distribute
  • 43. MQ Monitor 43Syncsort Confidential and Proprietary - do not copy or distribute Queue Response Time by Connection GET and PUT CPU Time by Connection
  • 44. System Performance App: Benefits Monitor all critical resources for a z/OS LPAR to ensure business services are not impacted Determine if specialty processors(zIPP) are being used to reduce general processor utilization Monitor the 4-hour rolling average for MSUs by LPAR 44Syncsort Confidential and Proprietary - do not copy or distribute
  • 45. System Performance Monitor 45Syncsort Confidential and Proprietary - do not copy or distribute 4HRA by LPAR CEC MSUs CPU usage by processor type
  • 46. Dataset Analyzer App: Benefits Define and monitor access to critical datasets Determine potential security threats based on unauthorized access attempts Ensure only authorized users are accessing critical datasets Understand when dataset access conflicts could be impacting overall application performance 46Syncsort Confidential and Proprietary - do not copy or distribute
  • 47. Dataset Analyzer App 47Syncsort Confidential and Proprietary - do not copy or distribute Access by type for each critical dataset
  • 48. Summary: Value Today for Enterprises with a z/OS Mainframe Syncsort Confidential and Proprietary - do not copy or distribute Less Complexity Collect mainframe data; correlate with data from other platforms; no mainframe expertise required Clearer Security Information Identify unauthorized mainframe access, other security risks; prepares and visualizes key data for compliance audits Healthier IT Operations Real-time alerts identify problems in all key environments View latency, transactions per second, exceptions, etc. Effective Problem-Resolution Management Real-time views to identify real or potential failures earlier; view related 'surrounding' information to support triage repair or prevention Higher Operational Efficiency Enhanced event correlation across systems; Staff resolves problems faster; “do more with less” Eliminate Your Mainframe “Blind-Spot” Splunk + Ironstream = Your 360ᵒ Enterprise View
  • 49. Industry Leader in Mainframe Software Products
  • 50. What Now? 50 Get Ironstream® for SYSLOG for free VISIT: HTTP://WWW.SYNCSORT.COM/EN/PRODUCTS/MAINFRAME/IRONSTREAM CONTACT: INFO@SYNCSORT.COM http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition