SlideShare a Scribd company logo
1
Big Data Analytics for Real-time
Operational Intelligence with Your
z/OS Data
“Splunking” Your z/OS Mainframe
Ed Hallock
Director, Product Management
Housekeeping
• Webcast Audio:
– Today’s webcast audio is streamed through your computer speakers.
– If you need technical assistance with the web interface or audio, please reach out
to us using the chat window.
• Questions Welcome:
– Submit your questions at any time during the presentation using the chat window.
– We will answer them during our Q&A session following the presentations.
• Recording and Slides:
– This webcast is being recorded. You will receive an email following the webcast
with a link to download both the recording and the slides.
© 2016 Syncsort Incorporated
Agenda
3
Syncsort Confidential and Proprietary - do not copy or distribute
Big Iron to Big Data Analytics Challenge
“Splunking” Your Mainframe Data
Introducing Ironstream®
 Ironstream for z/OS and Enterprise Security
 Ironstream for IT Operations Analytics
 Ironstream for IT Service Intelligence
Ironstream apps on Splunkbase and the Ironstream Starter Edition
Q&A
Big Iron to Big Data Analytics Challenge
So many data sources
– SMF, Syslog, Log4j web and application logs, RMF, RACF,
USS files and standard datasets
Volume of data
– Millions of SMF records generated daily
Format of data
– Complex data structures (SMF) with headers, product
sections, data sections, variable length and self-describing
– EBCDIC not recognized outside of the mainframe world
– Binary flags and fields
Difficult to get the information in a timely manner
– Not real-time, typically have to wait overnight for an
offload
4
Syncsort Confidential and Proprietary - do not copy or distribute
What Has Been Done in the Past?
Performance Monitors
– Proactively analyze and manage z/OS
operating systems, databases other z/OS sub-
systems for optimal performance
– Very good at detecting bottlenecks and other
potential performance problems in z/OS, CICS,
IMS, DB2, MQ, Storage, etc.
– Most include historical reporting and trending
facilities but that is typically limited to a
subset of the data that the monitor collects
Capacity Planning Tools
– Next day, next week, next month reporting of
offloaded SMF data
Event Management Systems
– Alert management
5
Syncsort Confidential and Proprietary - do not copy or distribute
Challenges with these Legacy Technologies
Tend to have fixed displays with little room for
customization on how an end-user can see
data provided
The interface(s) to these products have
traditionally been closed and proprietary
Limited view into security issues and threats
Limited ability to monitor business services and
provide service-level intelligence
6
Syncsort Confidential and Proprietary - do not copy or distribute
They typically have a silo approach: a monitor for DB2, another monitor for CICS,
etc. without any real correlation between the different pieces
Require Subject Matter Experts (SMEs) with in depth technical knowledge of
z/OS and its sub-systems in order to effectively use the products
Most have evolved into very complex and resource intensive solutions in an
attempt to cover ever aspect of the systems they monitor
What is Needed?
High performance, low-cost, platform for collecting critical system
information in real-time
Normalization of the z/OS data so it can be used off platform
analytics engines
Full analytics, visualization, and customization with no limitations
on what can be viewed
Ability to easily combine information from different data sources
and systems
Address the SME challenge: use by network managers, security
analysts, application analysts, enterprise architects without
requiring mainframe access or expertise
7
Syncsort Confidential and Proprietary - do not copy or distribute
“Splunking” Your Mainframe Data into
The Industry-Leading Platform For Machine Data
Syncsort Confidential and Proprietary - do not copy or distribute
Machine Data: Any Location, Type, Volume
Online
Services
Web
Services
Servers
Security GPS
Location
Storage
Desktops
Networks
Packaged
Applications
Custom
Apps
Messaging
Telecoms
Online
Shopping
Cart
Web
Clickstreams
Databases
Energy
Meters
Call Detail
Records
Smartphones
and Devices
RFID
On-
Premises
Private
Cloud
Public
Cloud
Platform Support (Apps / API / SDKs)
Enterprise Scalability
Universal Indexing
Answer Any Question
Developer
Platform
Report &
analyze
Custom
dashboards
Monitor
& alert
Ad hoc
search
Mainframe
8
Critical Mainframe Data 
Normalized and Streamed to Splunk with Ironstream®
Log4jFile
Load
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream
API
Application Data
Assembler
C
COBOL
REXX
USS
Ironstream: Architectural Overview
10
Syncsort Confidential and Proprietary - do not copy or distribute
Mainframe
TCP/IP
(SSL)
Data Forwarder DCE IDT
Ironstream DesktopData Collection Extension
Data ForwarderData Forwarder
DB2SYSOUT
Live/Stored
SPOOL Data
Alerts
Network
Components
Ironstream API
Application Data
Assembler
C
COBOL
REXX
USSLog4jFile
Load
z/OS
SYSLOG
SYSLOGD
logs
security
SMF
50+
types
RMF
Up to 50,000
values
Enterprise Security
ACK
Primary Use Cases for z/OS Log Data
11
Syncsort Confidential and Proprietary - do not copy or distribute
Security &
Compliance
IT Operational
Analytics(ITOA)
IT Service
Intelligence(ITSI)
RACF
Intrusion Detection
SMF Type 80
SyslogD
Mainframe Application
Operator logs for DB2,
CICS, IMS, etc
Related Mainframe Logs
Syslog
SMF
DB2 Accounting Records
CICS Accounting Records
WebSphere
Job / Step Accounting Records
SMF Type 101
SMF Type 110
Log4j
SMF Type 30
12
Syncsort Confidential and Proprietary - do not copy or distribute
IRONSTREAM Z/OS SECURITY &
SPLUNK ENTERPRISE SECURITY
Security Issues You Can Monitor with Ironstream
Intrusion Detection
TSO logon tracking
TSO account change activity
FTP authentications and file transfers
IP traffic analysis
Network events
13
Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream z/OS Security App
All data sources collected by Ironstream are
exposed in an application focused on z/OS
security only
This app shows z/OS mainframe security
data and is NOT an enterprise-wide
integrated view
14
Syncsort Confidential and Proprietary - do not copy or distribute
z/OS Security Dashboard
15
Syncsort Confidential and Proprietary - do not copy or distribute
Intrusion Detection showing Port Scans and
Denial of Service Attacks
TCP/IP Network Traffic
z/OS Security Dashboard
Syncsort Confidential and Proprietary - do not copy or distribute
16
Job Initiations
TSO Account Activity
TSO Lockouts
FTP Session Activity
FTP Transfer Activity
Ironstream z/OS Security & Splunk Enterprise Security App
All collected data sources can also be mapped to Splunk CIM for
Enterprise Security and automatically exposed in ES dashboards
along with security information from other platforms
– Requires the Ironstream TA for Splunk Enterprise Security
to be installed
– Provides an enterprise-wide, integrated view of security
across all platforms via ES dashboards provided by Splunk
17
Syncsort Confidential and Proprietary - do not copy or distribute
Sample Intrusion Center Dashboard With Splunk Enterprise Security™
18
Syncsort Confidential and Proprietary - do not copy or distribute
Now shows z/OS® intrusions
and anomalies along with
events from other platforms
Sample Security Posture Dashboard With Splunk Enterprise Security™
19
Syncsort Confidential and Proprietary - do not copy or distribute
Now shows z/OS® intrusions
and anomalies along with
events from other platforms
20
Syncsort Confidential and Proprietary - do not copy or distribute
IT OPERATIONS ANALYTICS
What Can You with IT Operations Analytics?
View RACF violations by type and user
Look at message trends over time to determine potential security threats
Monitor completion of critical batch JOBs
Monitor CICS regions and transactions supporting critical business services
Monitor DB2 database lock contention
Monitor MQ connections and queues
Define and monitor access to critical datasets
Monitor all critical resources for a z/OS LPAR
And much more!!!
21
Syncsort Confidential and Proprietary - do not copy or distribute
Operational Analytics: RACF Violations and Message Trends
Data Source: SYSLOG
Syncsort Confidential and Proprietary - do not copy or distribute
22
RACF Violations by type RACF Violations by user
Trend message volumes today vs. same time last week and 2 weeks ago
Operational Analytics: Job Monitor for SLA Tracking
Data Source: SMF Type 30
Syncsort Confidential and Proprietary - do not copy or distribute
23
Track JOB execution against
defined service levels and identify
JOBS that are at risk of non-
compliance with service level
agreement target
Drill down to predecessor
JOBS
Application Monitoring: DB2 Performance
Data Source: SMF Type 100, 101, 102
Syncsort Confidential and Proprietary - do not copy or distribute
24
Logging Rate Uncommitted
Records by Plan
Lock State Escalations
Lock Contention
Unavailable
Resources
Application Monitoring: CICS Transaction Analysis
Data Source: SMF Type 110
Syncsort Confidential and Proprietary - do not copy or distribute
25
Transaction Rates CPU Usage by Transaction
Transaction Response Time Transaction Failures
IT SERVICE INTELLIGENCE (ITSI)
Why is IT Service Intelligence Critical?
Need to understand what critical IT services are dependent upon which IT
resources and components
What are the Key Performance Indicators (KPIs) for IT components
comprising an IT service
How is the performance of an IT resource or component affecting a critical
IT service
27
Syncsort Confidential and Proprietary - do not copy or distribute
Ironstream Integration with Splunk ITSI
KPIs provided for
mainframe systems in
Service Analyzer
– CEC (Central
Electronic Complex),
i.e. “the box”
– LPARs (logical
partitions)
– Critical services
Glass Tables for
visualization
Ironstream ITSI Glass Table for Mainframe
Ironstream ITSI Glass Table for Online Banking Service
Value Today for Organizations with a z/OS Mainframe
31
Less Complexity
Collect mainframe data; correlate with data from other
platforms; no mainframe expertise required
Clearer Security Information
Identify unauthorized mainframe access, other security
risks
Healthier IT Operations
Real-time alerts identify problems in all key
environments View latency, transactions per second,
exceptions, etc.
More Effective Problem-Resolution Management
Real-time views to identify real or potential failures earlier
View related 'surrounding' information to support triage repair
or prevention
Higher Operational Efficiency
Enhanced event correlation across systems
Staff resolves problems faster; can “do more with less”
Eliminate Your Mainframe “Blind-Spot”
Splunk + Syncsort Ironstream for Your 360ᵒ Enterprise View
Ironstream Apps Are Now On Splunk App Store (splunkbase)
32
Syncsort Confidential and Proprietary - do not copy or distribute
https://splunkbase.splunk.com/
 Search Syncsort
Ironstream Applications on splunkbase
Syslog
– RACF violations and message trends
CICS Region Monitor
– CICS Region Health Check
– CICS Region transaction rates, response times, CPU usage, & failures
MQ Monitor
– Queue depths and response time
– Message Get/Put rates and CPU use
– Ability to filter by connection name and queue name
33
Syncsort Confidential and Proprietary - do not copy or distribute
Additional information for each application is available via
download on splunkbase, as well as via Product Documentation
under Resources at www.Syncsort.com
Ironstream Applications on splunkbase
System Performance Monitor
– CEC MSU capacity alongside the 4-hour rolling average figures (4HRA)
for each LPAR
– z/OS system performance data including:
• CPU utilization, memory and common storage utilization, Paging rates
Dataset Analyzer
– Critical datasets to be monitored are defined via a .CSV file in Splunk
34
Syncsort Confidential and Proprietary - do not copy or distribute
Additional information for each application is available via
download on splunkbase, as well as via Product Documentation
under Resources at www.Syncsort.com
Get Ironstream® for SYSLOG for free
35
Syncsort Confidential and Proprietary - do not copy or distribute
http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
36
Syncsort Confidential and Proprietary - do not copy or distribute
THANK YOU!

More Related Content

PDF
Peter Zaitsev - Practical MySQL Performance Optimization
PPTX
Streaming real time data with Vibe Data Stream
PPTX
IaaS: the past, present and the future
PDF
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
PPTX
5 Paths to HPC - SUSE
PDF
Model-driven and low-code development for event-based systems | Bobby Calderw...
PPTX
Transform Your Mainframe Data for the Cloud with Precisely and Apache Kafka
PDF
Continus sql with sql stream builder
Peter Zaitsev - Practical MySQL Performance Optimization
Streaming real time data with Vibe Data Stream
IaaS: the past, present and the future
Building a Modern, Scalable Cyber Intelligence Platform with Apache Kafka | J...
5 Paths to HPC - SUSE
Model-driven and low-code development for event-based systems | Bobby Calderw...
Transform Your Mainframe Data for the Cloud with Precisely and Apache Kafka
Continus sql with sql stream builder

What's hot (20)

PPTX
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!
PDF
OpenPOWER Roadmap Toward CORAL
PPTX
Splunk Enterprise 6.3 - Splunk Tech Day
PDF
Data Acquisition Automation for NiFi in a Hybrid Cloud environment – the Path...
PPTX
Introducing MFX for z/OS 2.1 & ZPSaver Suite
PPTX
Georgia Azure Event - Scalable cloud games using Microsoft Azure
PDF
Qlik and Confluent Success Stories with Kafka - How Generali and Skechers Kee...
PPTX
RecordService for Unified Access Control
PDF
Joe Witt presentation on Apache NiFi
PDF
Getting ready for Infrastructure Transformation with hyper-converged
PDF
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
PDF
Presentacin webinar move_up_to_power8_with_scale_out_servers_final
PPTX
Insight into Hyperconverged Infrastructure
PDF
SteelCentral NetSensor 3.0
PDF
How to scale your PaaS with OVH infrastructure?
PPTX
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
PPTX
Database Performance Problems: Emergency Remediation and Proactive Alerting
PDF
Hybrid Cloud Keynote
PPTX
SplunkLive! Customer Presentation – athenahealth
PPTX
Product Overview: An Analytics Primer
Hi! Ho! Hi! Ho! SQL Server on Linux We Go!
OpenPOWER Roadmap Toward CORAL
Splunk Enterprise 6.3 - Splunk Tech Day
Data Acquisition Automation for NiFi in a Hybrid Cloud environment – the Path...
Introducing MFX for z/OS 2.1 & ZPSaver Suite
Georgia Azure Event - Scalable cloud games using Microsoft Azure
Qlik and Confluent Success Stories with Kafka - How Generali and Skechers Kee...
RecordService for Unified Access Control
Joe Witt presentation on Apache NiFi
Getting ready for Infrastructure Transformation with hyper-converged
QualysGuard InfoDay 2013 - QualysGuard RoadMap for H2-­2013/H1-­2014
Presentacin webinar move_up_to_power8_with_scale_out_servers_final
Insight into Hyperconverged Infrastructure
SteelCentral NetSensor 3.0
How to scale your PaaS with OVH infrastructure?
MySQL Visual Analysis and Scale-out Strategy definition - Webinar deck
Database Performance Problems: Emergency Remediation and Proactive Alerting
Hybrid Cloud Keynote
SplunkLive! Customer Presentation – athenahealth
Product Overview: An Analytics Primer
Ad

Viewers also liked (20)

PPTX
Operational Intelligence Using Hadoop
PDF
State of the Mainframe for 2017
PPTX
SplunkLive! Customer Presentation – Availity
PPT
Operational Intelligence at Eadington Conference
PDF
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
PDF
ITC Infrastructure Support Services
PPTX
Mainframe Customer Education Webcast: Syncsort Gets Zen
PDF
Experiences in Mainframe-to-Splunk Big Data Access
PDF
SplunkLive Auckland - Operational Intelligence
PDF
Una nueva dirección para el soporte de TI: Ofrecer una experiencia omnicanal ...
PDF
Mainframe Optimization in 2017
PPSX
Creación del departamento de apoyo y soporte técnico en la dirección de Malar...
PDF
DevOps for the IBM Mainframe environment
PDF
Don't Re-write Code to Get Better Analytics
PPTX
Splunk live beginner training nyc
PPTX
Scale Splunk
PPTX
The Transformation of your Data in modern IT (Presented by DellEMC)
PPTX
Unlocking Operational Intelligence from the Data Lake
PDF
IBM Bankenstamm - Mehrwert durch kanalübergreifenden Kundendialog im Banking
PDF
New IBM Mainframe 2016 - Z13
Operational Intelligence Using Hadoop
State of the Mainframe for 2017
SplunkLive! Customer Presentation – Availity
Operational Intelligence at Eadington Conference
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
ITC Infrastructure Support Services
Mainframe Customer Education Webcast: Syncsort Gets Zen
Experiences in Mainframe-to-Splunk Big Data Access
SplunkLive Auckland - Operational Intelligence
Una nueva dirección para el soporte de TI: Ofrecer una experiencia omnicanal ...
Mainframe Optimization in 2017
Creación del departamento de apoyo y soporte técnico en la dirección de Malar...
DevOps for the IBM Mainframe environment
Don't Re-write Code to Get Better Analytics
Splunk live beginner training nyc
Scale Splunk
The Transformation of your Data in modern IT (Presented by DellEMC)
Unlocking Operational Intelligence from the Data Lake
IBM Bankenstamm - Mehrwert durch kanalübergreifenden Kundendialog im Banking
New IBM Mainframe 2016 - Z13
Ad

Similar to Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data (20)

PDF
Old Dogs, New Tricks: Big Data from and for Mainframe IT
PDF
What’s New in Syncsort Ironstream 2.1
PDF
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
PPTX
Getting Started with Splunk Enterprise
PDF
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
PPTX
SplunkLive! Splunk App for VMware
PPTX
SplunkLive! - Splunk for Security
PPTX
Splunk for Security Breakout Session
PDF
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
PDF
End-to-End Transaction Visibility from Mobile Devices to Your Mainframe
PPTX
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
PDF
Security and Virtualization in the Data Center
PDF
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PPTX
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
PDF
Delivering New Visibility and Analytics for IT Operations
PDF
SplunkLive Wellington 2015 - Operational Intelligence
PDF
Getting Started with Splunk Enterprise
PDF
IT Network Asset Discovery & Inventory
PPTX
Splunk for IT Operations Breakout Session
Old Dogs, New Tricks: Big Data from and for Mainframe IT
What’s New in Syncsort Ironstream 2.1
Better IT Operations and Security through Enhanced z/OS Analytics: New Featur...
Getting Started with Splunk Enterprise
Mainframe Customer Education Webcast: New Ironstream Facilities for Enhanced ...
SplunkLive! Splunk App for VMware
SplunkLive! - Splunk for Security
Splunk for Security Breakout Session
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
End-to-End Transaction Visibility from Mobile Devices to Your Mainframe
Bringing Mainframe Security Information Into Your Splunk Security Operations ...
Security and Virtualization in the Data Center
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
PPT-Splunk-LegacySIEM-101_FINAL
Splunk Discovery Day Düsseldorf 2016 - Splunk für IT Operations
Delivering New Visibility and Analytics for IT Operations
SplunkLive Wellington 2015 - Operational Intelligence
Getting Started with Splunk Enterprise
IT Network Asset Discovery & Inventory
Splunk for IT Operations Breakout Session

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
KodekX | Application Modernization Development
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
KodekX | Application Modernization Development
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data

  • 1. 1 Big Data Analytics for Real-time Operational Intelligence with Your z/OS Data “Splunking” Your z/OS Mainframe Ed Hallock Director, Product Management
  • 2. Housekeeping • Webcast Audio: – Today’s webcast audio is streamed through your computer speakers. – If you need technical assistance with the web interface or audio, please reach out to us using the chat window. • Questions Welcome: – Submit your questions at any time during the presentation using the chat window. – We will answer them during our Q&A session following the presentations. • Recording and Slides: – This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. © 2016 Syncsort Incorporated
  • 3. Agenda 3 Syncsort Confidential and Proprietary - do not copy or distribute Big Iron to Big Data Analytics Challenge “Splunking” Your Mainframe Data Introducing Ironstream®  Ironstream for z/OS and Enterprise Security  Ironstream for IT Operations Analytics  Ironstream for IT Service Intelligence Ironstream apps on Splunkbase and the Ironstream Starter Edition Q&A
  • 4. Big Iron to Big Data Analytics Challenge So many data sources – SMF, Syslog, Log4j web and application logs, RMF, RACF, USS files and standard datasets Volume of data – Millions of SMF records generated daily Format of data – Complex data structures (SMF) with headers, product sections, data sections, variable length and self-describing – EBCDIC not recognized outside of the mainframe world – Binary flags and fields Difficult to get the information in a timely manner – Not real-time, typically have to wait overnight for an offload 4 Syncsort Confidential and Proprietary - do not copy or distribute
  • 5. What Has Been Done in the Past? Performance Monitors – Proactively analyze and manage z/OS operating systems, databases other z/OS sub- systems for optimal performance – Very good at detecting bottlenecks and other potential performance problems in z/OS, CICS, IMS, DB2, MQ, Storage, etc. – Most include historical reporting and trending facilities but that is typically limited to a subset of the data that the monitor collects Capacity Planning Tools – Next day, next week, next month reporting of offloaded SMF data Event Management Systems – Alert management 5 Syncsort Confidential and Proprietary - do not copy or distribute
  • 6. Challenges with these Legacy Technologies Tend to have fixed displays with little room for customization on how an end-user can see data provided The interface(s) to these products have traditionally been closed and proprietary Limited view into security issues and threats Limited ability to monitor business services and provide service-level intelligence 6 Syncsort Confidential and Proprietary - do not copy or distribute They typically have a silo approach: a monitor for DB2, another monitor for CICS, etc. without any real correlation between the different pieces Require Subject Matter Experts (SMEs) with in depth technical knowledge of z/OS and its sub-systems in order to effectively use the products Most have evolved into very complex and resource intensive solutions in an attempt to cover ever aspect of the systems they monitor
  • 7. What is Needed? High performance, low-cost, platform for collecting critical system information in real-time Normalization of the z/OS data so it can be used off platform analytics engines Full analytics, visualization, and customization with no limitations on what can be viewed Ability to easily combine information from different data sources and systems Address the SME challenge: use by network managers, security analysts, application analysts, enterprise architects without requiring mainframe access or expertise 7 Syncsort Confidential and Proprietary - do not copy or distribute
  • 8. “Splunking” Your Mainframe Data into The Industry-Leading Platform For Machine Data Syncsort Confidential and Proprietary - do not copy or distribute Machine Data: Any Location, Type, Volume Online Services Web Services Servers Security GPS Location Storage Desktops Networks Packaged Applications Custom Apps Messaging Telecoms Online Shopping Cart Web Clickstreams Databases Energy Meters Call Detail Records Smartphones and Devices RFID On- Premises Private Cloud Public Cloud Platform Support (Apps / API / SDKs) Enterprise Scalability Universal Indexing Answer Any Question Developer Platform Report & analyze Custom dashboards Monitor & alert Ad hoc search Mainframe 8
  • 9. Critical Mainframe Data  Normalized and Streamed to Splunk with Ironstream® Log4jFile Load SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USS
  • 10. Ironstream: Architectural Overview 10 Syncsort Confidential and Proprietary - do not copy or distribute Mainframe TCP/IP (SSL) Data Forwarder DCE IDT Ironstream DesktopData Collection Extension Data ForwarderData Forwarder DB2SYSOUT Live/Stored SPOOL Data Alerts Network Components Ironstream API Application Data Assembler C COBOL REXX USSLog4jFile Load z/OS SYSLOG SYSLOGD logs security SMF 50+ types RMF Up to 50,000 values Enterprise Security ACK
  • 11. Primary Use Cases for z/OS Log Data 11 Syncsort Confidential and Proprietary - do not copy or distribute Security & Compliance IT Operational Analytics(ITOA) IT Service Intelligence(ITSI) RACF Intrusion Detection SMF Type 80 SyslogD Mainframe Application Operator logs for DB2, CICS, IMS, etc Related Mainframe Logs Syslog SMF DB2 Accounting Records CICS Accounting Records WebSphere Job / Step Accounting Records SMF Type 101 SMF Type 110 Log4j SMF Type 30
  • 12. 12 Syncsort Confidential and Proprietary - do not copy or distribute IRONSTREAM Z/OS SECURITY & SPLUNK ENTERPRISE SECURITY
  • 13. Security Issues You Can Monitor with Ironstream Intrusion Detection TSO logon tracking TSO account change activity FTP authentications and file transfers IP traffic analysis Network events 13 Syncsort Confidential and Proprietary - do not copy or distribute
  • 14. Ironstream z/OS Security App All data sources collected by Ironstream are exposed in an application focused on z/OS security only This app shows z/OS mainframe security data and is NOT an enterprise-wide integrated view 14 Syncsort Confidential and Proprietary - do not copy or distribute
  • 15. z/OS Security Dashboard 15 Syncsort Confidential and Proprietary - do not copy or distribute Intrusion Detection showing Port Scans and Denial of Service Attacks TCP/IP Network Traffic
  • 16. z/OS Security Dashboard Syncsort Confidential and Proprietary - do not copy or distribute 16 Job Initiations TSO Account Activity TSO Lockouts FTP Session Activity FTP Transfer Activity
  • 17. Ironstream z/OS Security & Splunk Enterprise Security App All collected data sources can also be mapped to Splunk CIM for Enterprise Security and automatically exposed in ES dashboards along with security information from other platforms – Requires the Ironstream TA for Splunk Enterprise Security to be installed – Provides an enterprise-wide, integrated view of security across all platforms via ES dashboards provided by Splunk 17 Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. Sample Intrusion Center Dashboard With Splunk Enterprise Security™ 18 Syncsort Confidential and Proprietary - do not copy or distribute Now shows z/OS® intrusions and anomalies along with events from other platforms
  • 19. Sample Security Posture Dashboard With Splunk Enterprise Security™ 19 Syncsort Confidential and Proprietary - do not copy or distribute Now shows z/OS® intrusions and anomalies along with events from other platforms
  • 20. 20 Syncsort Confidential and Proprietary - do not copy or distribute IT OPERATIONS ANALYTICS
  • 21. What Can You with IT Operations Analytics? View RACF violations by type and user Look at message trends over time to determine potential security threats Monitor completion of critical batch JOBs Monitor CICS regions and transactions supporting critical business services Monitor DB2 database lock contention Monitor MQ connections and queues Define and monitor access to critical datasets Monitor all critical resources for a z/OS LPAR And much more!!! 21 Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. Operational Analytics: RACF Violations and Message Trends Data Source: SYSLOG Syncsort Confidential and Proprietary - do not copy or distribute 22 RACF Violations by type RACF Violations by user Trend message volumes today vs. same time last week and 2 weeks ago
  • 23. Operational Analytics: Job Monitor for SLA Tracking Data Source: SMF Type 30 Syncsort Confidential and Proprietary - do not copy or distribute 23 Track JOB execution against defined service levels and identify JOBS that are at risk of non- compliance with service level agreement target Drill down to predecessor JOBS
  • 24. Application Monitoring: DB2 Performance Data Source: SMF Type 100, 101, 102 Syncsort Confidential and Proprietary - do not copy or distribute 24 Logging Rate Uncommitted Records by Plan Lock State Escalations Lock Contention Unavailable Resources
  • 25. Application Monitoring: CICS Transaction Analysis Data Source: SMF Type 110 Syncsort Confidential and Proprietary - do not copy or distribute 25 Transaction Rates CPU Usage by Transaction Transaction Response Time Transaction Failures
  • 27. Why is IT Service Intelligence Critical? Need to understand what critical IT services are dependent upon which IT resources and components What are the Key Performance Indicators (KPIs) for IT components comprising an IT service How is the performance of an IT resource or component affecting a critical IT service 27 Syncsort Confidential and Proprietary - do not copy or distribute
  • 28. Ironstream Integration with Splunk ITSI KPIs provided for mainframe systems in Service Analyzer – CEC (Central Electronic Complex), i.e. “the box” – LPARs (logical partitions) – Critical services Glass Tables for visualization
  • 29. Ironstream ITSI Glass Table for Mainframe
  • 30. Ironstream ITSI Glass Table for Online Banking Service
  • 31. Value Today for Organizations with a z/OS Mainframe 31 Less Complexity Collect mainframe data; correlate with data from other platforms; no mainframe expertise required Clearer Security Information Identify unauthorized mainframe access, other security risks Healthier IT Operations Real-time alerts identify problems in all key environments View latency, transactions per second, exceptions, etc. More Effective Problem-Resolution Management Real-time views to identify real or potential failures earlier View related 'surrounding' information to support triage repair or prevention Higher Operational Efficiency Enhanced event correlation across systems Staff resolves problems faster; can “do more with less” Eliminate Your Mainframe “Blind-Spot” Splunk + Syncsort Ironstream for Your 360ᵒ Enterprise View
  • 32. Ironstream Apps Are Now On Splunk App Store (splunkbase) 32 Syncsort Confidential and Proprietary - do not copy or distribute https://splunkbase.splunk.com/  Search Syncsort
  • 33. Ironstream Applications on splunkbase Syslog – RACF violations and message trends CICS Region Monitor – CICS Region Health Check – CICS Region transaction rates, response times, CPU usage, & failures MQ Monitor – Queue depths and response time – Message Get/Put rates and CPU use – Ability to filter by connection name and queue name 33 Syncsort Confidential and Proprietary - do not copy or distribute Additional information for each application is available via download on splunkbase, as well as via Product Documentation under Resources at www.Syncsort.com
  • 34. Ironstream Applications on splunkbase System Performance Monitor – CEC MSU capacity alongside the 4-hour rolling average figures (4HRA) for each LPAR – z/OS system performance data including: • CPU utilization, memory and common storage utilization, Paging rates Dataset Analyzer – Critical datasets to be monitored are defined via a .CSV file in Splunk 34 Syncsort Confidential and Proprietary - do not copy or distribute Additional information for each application is available via download on splunkbase, as well as via Product Documentation under Resources at www.Syncsort.com
  • 35. Get Ironstream® for SYSLOG for free 35 Syncsort Confidential and Proprietary - do not copy or distribute http://www.syncsort.com/en/TestDrive/Ironstream-Starter-Edition
  • 36. 36 Syncsort Confidential and Proprietary - do not copy or distribute THANK YOU!