Administrator's Guide

Administrator's Guide

IBM Open Data Analytics for z/OS Version 1 Release 1 Administrator's Guide IBM SC27-9035-00 Note Before using this information and the product it supports, read the information in “Notices” on page 301. This edition applies to Version 1 Release 1 of IBM® Open Data Analytics for z/OS® (5655-OD1) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-08-29 © Copyright International Business Machines Corporation 2016, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Rocket Software, Inc. 2016, 2019. Contents Figures................................................................................................................. ix Tables.................................................................................................................. xi About this information......................................................................................... xv How to send your comments to IBM....................................................................xvii If you have a technical problem............................................................................................................... xvii Summary of changes for IBM Open Data Analytics for z/OS Administrator's Guide ............................................................................................................. xix Chapter 1. Getting started..................................................................................... 1 Starting the ISPF application.......................................................................................................................1 Primary Option Menu..............................................................................................................................2 Chapter 2. Virtualizing and accessing mainframe data............................................3 Virtual tables (maps)....................................................................................................................................3 Using batch JCL jobs to create or copy maps............................................................................................. 4 Extracting maps via batch jobs.............................................................................................................. 4 Using the ISPF application to create or copy maps..................................................................................13 IBM Open Data Analytics for z/OS Interface for ACI...........................................................................13 IBM Open Data Analytics for z/OS Interface for Adabas.................................................................... 36 IBM Open Data Analytics for z/OS Interface for DB2..........................................................................46 IBM Open Data Analytics for z/OS Interface for IMS DB: support for DBCTL.................................... 48 IBM Open Data Analytics for z/OS Interface for VSAM and Sequential files......................................59 Using the Data Mapping Facility...........................................................................................................64 Chapter 3. Security..............................................................................................75 Security Optimization Management (SOM)...............................................................................................75 Enabling basic SOM support................................................................................................................ 75 Enabling advanced SOM support.........................................................................................................77 Using PassTickets.................................................................................................................................78 Logon and logoff processing................................................................................................................ 78 ACEE retention and deletion................................................................................................................78 Secure Sockets Layer (SSL)....................................................................................................................... 79 Enabling SSL support........................................................................................................................... 79 Configuring AT-TLS manually...............................................................................................................82 Enterprise auditing.....................................................................................................................................82 Using generic and extended IDs..........................................................................................................83 Host side support................................................................................................................................. 84 Creating a z/OS security environment................................................................................................. 84 Enabling enterprise auditing................................................................................................................ 85 Protected resources.................................................................................................................................. 85 Defining resources to RACF................................................................................................................. 89 Defining resources to CA Top Secret................................................................................................... 90 Defining resources to ACF2..................................................................................................................90 Optional security jobs.......................................................................................................................... 90 iii ISPF load modules............................................................................................................................... 91 RACF PassTickets.................................................................................................................................92 Defining security for RPCs....................................................................................................................93 Information access with the TRACEDATA resource........................................................................... 94 Resource security for test versions of Data Service server.................................................................94 Virtual table SAF security.......................................................................................................................... 94 Chapter 4. Performance.......................................................................................97 Workload Manager (WLM)......................................................................................................................... 97 WLM enclaves.......................................................................................................................................97 Configuring Workload Manager (WLM)................................................................................................ 98 Using the WLM Administration Tool.................................................................................................. 103 Workload Manager definitions...........................................................................................................103 WLM classification rules.................................................................................................................... 106 Using WLM classifications..................................................................................................................107 Activating the WLM service policy..................................................................................................... 107 Verifying WLM classification.............................................................................................................. 107 WLM Health Reporting....................................................................................................................... 108 Server load balancing.............................................................................................................................. 109 Enabling load balancing for a group director.................................................................................... 110 Enabling load balancing for CICS/TS.................................................................................................111 Enabling load balancing for Services.................................................................................................111 CICS failover............................................................................................................................................ 112 Enabling CICS failover........................................................................................................................113 Block fetch............................................................................................................................................... 113 Enabling block fetch...........................................................................................................................114

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    328 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us