Administrator's Guide
Total Page:16
File Type:pdf, Size:1020Kb
IBM Open Data Analytics for z/OS Version 1 Release 1 Administrator's Guide IBM SC27-9035-00 Note Before using this information and the product it supports, read the information in “Notices” on page 301. This edition applies to Version 1 Release 1 of IBM® Open Data Analytics for z/OS® (5655-OD1) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-08-29 © Copyright International Business Machines Corporation 2016, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Rocket Software, Inc. 2016, 2019. Contents Figures................................................................................................................. ix Tables.................................................................................................................. xi About this information......................................................................................... xv How to send your comments to IBM....................................................................xvii If you have a technical problem............................................................................................................... xvii Summary of changes for IBM Open Data Analytics for z/OS Administrator's Guide ............................................................................................................. xix Chapter 1. Getting started..................................................................................... 1 Starting the ISPF application.......................................................................................................................1 Primary Option Menu..............................................................................................................................2 Chapter 2. Virtualizing and accessing mainframe data............................................3 Virtual tables (maps)....................................................................................................................................3 Using batch JCL jobs to create or copy maps............................................................................................. 4 Extracting maps via batch jobs.............................................................................................................. 4 Using the ISPF application to create or copy maps..................................................................................13 IBM Open Data Analytics for z/OS Interface for ACI...........................................................................13 IBM Open Data Analytics for z/OS Interface for Adabas.................................................................... 36 IBM Open Data Analytics for z/OS Interface for DB2..........................................................................46 IBM Open Data Analytics for z/OS Interface for IMS DB: support for DBCTL.................................... 48 IBM Open Data Analytics for z/OS Interface for VSAM and Sequential files......................................59 Using the Data Mapping Facility...........................................................................................................64 Chapter 3. Security..............................................................................................75 Security Optimization Management (SOM)...............................................................................................75 Enabling basic SOM support................................................................................................................ 75 Enabling advanced SOM support.........................................................................................................77 Using PassTickets.................................................................................................................................78 Logon and logoff processing................................................................................................................ 78 ACEE retention and deletion................................................................................................................78 Secure Sockets Layer (SSL)....................................................................................................................... 79 Enabling SSL support........................................................................................................................... 79 Configuring AT-TLS manually...............................................................................................................82 Enterprise auditing.....................................................................................................................................82 Using generic and extended IDs..........................................................................................................83 Host side support................................................................................................................................. 84 Creating a z/OS security environment................................................................................................. 84 Enabling enterprise auditing................................................................................................................ 85 Protected resources.................................................................................................................................. 85 Defining resources to RACF................................................................................................................. 89 Defining resources to CA Top Secret................................................................................................... 90 Defining resources to ACF2..................................................................................................................90 Optional security jobs.......................................................................................................................... 90 iii ISPF load modules............................................................................................................................... 91 RACF PassTickets.................................................................................................................................92 Defining security for RPCs....................................................................................................................93 Information access with the TRACEDATA resource........................................................................... 94 Resource security for test versions of Data Service server.................................................................94 Virtual table SAF security.......................................................................................................................... 94 Chapter 4. Performance.......................................................................................97 Workload Manager (WLM)......................................................................................................................... 97 WLM enclaves.......................................................................................................................................97 Configuring Workload Manager (WLM)................................................................................................ 98 Using the WLM Administration Tool.................................................................................................. 103 Workload Manager definitions...........................................................................................................103 WLM classification rules.................................................................................................................... 106 Using WLM classifications..................................................................................................................107 Activating the WLM service policy..................................................................................................... 107 Verifying WLM classification.............................................................................................................. 107 WLM Health Reporting....................................................................................................................... 108 Server load balancing.............................................................................................................................. 109 Enabling load balancing for a group director.................................................................................... 110 Enabling load balancing for CICS/TS.................................................................................................111 Enabling load balancing for Services.................................................................................................111 CICS failover............................................................................................................................................ 112 Enabling CICS failover........................................................................................................................113 Block fetch............................................................................................................................................... 113 Enabling block fetch...........................................................................................................................114