IBM® Wave for z/VM® (IBM Wave) is a virtualization management solution for IBM z/VM and Linux on z SystemsTM. This virtualization management software provides a simplified and cost-effective way for companies to harness the consolidation capabilities of the IBM zTM Systems platform and its ability to host the workloads of tens of thousands of commodity servers. IBM Wave is a complete management solution for z Systems based virtual server farms. This IBM Redbooks® publication provides a guide to understanding IBM Wave by providing information about the IBM Wave architecture and how it fits into the cloud. This publication also provides a planning and design guide that is based on common scenarios. This publication also provides installation and configuration task information and how to manage and operate the environment. The intended audience for this publication is IT Architects who are responsible for planning their IBM Wave environments and IT Specialists who are responsible for implementing them.
This book was written by IBM® IT specialists who have experience implementing IBM Z® solutions, especially Linux on IBM LinuxONETM (LinuxONE) or IBM Z servers. Therefore, the content of this book follows the guidelines from Linux and IBM z/VM® regarding LinuxONE and IBM Z installations. The preferred practices described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This publication provides you with all of the information that you need to decide the best scaling architecture when implementing Linux on IBM Z or LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE and IBM Z differentiation for each x86 server sprawl problem To provide virtulization and security options for LinuxOne and IBM Z The scaling up and scaling out architectures enable you to scale the capacity of an existing system to attend a sporadic application demand or an application workload. This gives you some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to a server sprawl situation where your environment houses more servers than it should based on its current and predicted requirements. Although scaling out on x86 systems is a common form of scaling because of their popularity, the x86 systems were originally designed as cheap computers. Unfortunately, the scale out on x86 can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase in terms of number of physical servers. The LinuxONE and IBM Z servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the scaling options. The audience of this publication consists of the following groups: Customers, IBM Business Partners, and IBM consultants planning and installing Linux on IBM Z, IBM Z family or x86 platform System administrators administering the Linux Systems If you are a customer considering LinuxONE and IBM Z family as a platform for your applications (analytics, blockchain, cloud, or other) or a pre-sales person, read those publications.
As workloads are being offloaded to IBM® z SystemsTM based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
This IBM® Redbooks® publication describes important networking concepts and industry standards that are used to support high availability on IBM System z®. Some of the networking standards described here are VLANs, VLAN trunking, link aggregation, virtual switches, VNICs, and load-balancing. We examine the various aspects of network setups and introduce the main Linux on System z networking commands and configuration files. We describe the management of network interface parameters, assignment of addresses to a network interface, and usage of the ifconfig command to configure network interfaces. We provide an overview of connectivity options available on the System z platform. We also describe high availability concepts and building a high availability solution using IBM Tivoli® System Automation. We also provide the implementation steps necessary to build a redundant network connections set up between an IBM z/VM® system and the external network switches using two Open Systems Adapter-Express 3 (OSA-Express 3) adapters with 10 Gb Ethernet ports. We describe the tests performed in our lab environment. The objectives of these tests were to gather information about performance and failover from the perspective of a real scenario, where the concepts of described in this book were applied. This book is focused on information that is practical and useful for readers with experience in network analysis and engineering networks, System z and Linux systems administrators, especially for readers that administer networks in their day-to-day activities. For additional reading: A Technote is availalble that explains changes to using channel bonding interfaces introduced with SLES 11 SP 2. It can be found at: http://www.redbooks.ibm.com/abstracts/tips1000.html?Open
There are many reasons why you would want to optimize your servers through virtualization using Linux on IBM® System z®: Too many distributed physical servers with low utilization A lengthy provisioning process that delays the implementation of new applications Limitations in data center power and floor space High total cost of ownership (TCO) Difficulty allocating processing power for a dynamic environment This IBM Redbooks® publication provides a technical planning guide and example for IT organizations to migrate from their x86 environment to Linux on System z. It begins by examining the benefits of migrating workloads to Linux on System z. Here, we describe the workload centric method of information technology and then discuss the benefits of migrating workloads to Linux on System z. Next, we describe total cost of ownership analyses and we guide you in understanding how to analyze your environment before beginning a migration project. We also assist you in determining the expected consolidation ratio for a given workload type. We also describe virtualization concepts along with describing the benefits of migrating from the x86 environment to guests residing on an IBM z/VM® single system image with live guest relocation. This IBM Redbooks publication walks you through a migration approach, includes planning worksheets, as well as a chapter to assist you in analyzing your own systems. We also discuss post migration considerations such as acceptance testing of functionality and performance measurements.
Regarding online transaction processing (OLTP) workloads, IBM® z SystemsTM platform, with IBM DB2®, data sharing, Workload Manager (WLM), geoplex, and other high-end features, is the widely acknowledged leader. Most customers now integrate business analytics with OLTP by running, for example, scoring functions from transactional context for real-time analytics or by applying machine-learning algorithms on enterprise data that is kept on the mainframe. As a result, IBM adds investment so clients can keep the complete lifecycle for data analysis, modeling, and scoring on z Systems control in a cost-efficient way, keeping the qualities of services in availability, security, reliability that z Systems solutions offer. Because of the changed architecture and tighter integration, IBM has shown, in a customer proof-of-concept, that a particular client was able to achieve an orders-of-magnitude improvement in performance, allowing that client's data scientist to investigate the data in a more interactive process. Open technologies, such as Predictive Model Markup Language (PMML) can help customers update single components instead of being forced to replace everything at once. As a result, you have the possibility to combine your preferred tool for model generation (such as SAS Enterprise Miner or IBM SPSS® Modeler) with a different technology for model scoring (such as Zementis, a company focused on PMML scoring). IBM SPSS Modeler is a leading data mining workbench that can apply various algorithms in data preparation, cleansing, statistics, visualization, machine learning, and predictive analytics. It has over 20 years of experience and continued development, and is integrated with z Systems. With IBM DB2 Analytics Accelerator 5.1 and SPSS Modeler 17.1, the possibility exists to do the complete predictive model creation including data transformation within DB2 Analytics Accelerator. So, instead of moving the data to a distributed environment, algorithms can be pushed to the data, using cost-efficient DB2 Accelerator for the required resource-intensive operations. This IBM Redbooks® publication explains the overall z Systems architecture, how the components can be installed and customized, how the new IBM DB2 Analytics Accelerator loader can help efficient data loading for z Systems data and external data, how in-database transformation, in-database modeling, and in-transactional real-time scoring can be used, and what other related technologies are available. This book is intended for technical specialists and architects, and data scientists who want to use the technology on the z Systems platform. Most of the technologies described in this book require IBM DB2 for z/OS®. For acceleration of the data investigation, data transformation, and data modeling process, DB2 Analytics Accelerator is required. Most value can be achieved if most of the data already resides on z Systems platforms, although adding external data (like from social sources) poses no problem at all.
This IBM® Redbooks® publication shows the power of IBM System z® virtualization and flexibility in sharing resources in a flexible production environment. In this book, we outline the planning and setup of Linux on System z to move from a development or test environment into production. As an example, we use one logical partition (LPAR) with shared CPUs with memory for a production environment and another LPAR that shares some CPUs, but also has a dedicated one for production. Running in IBM z/VM® mode allows for virtualization of servers and based on z/VM shares, can prioritize and control their resources. The size of the LPAR or z/VM resources depends on the workload and the applications that run that workload. We examine a typical web server environment, Java applications, and describe it by using a database management system, such as IBM DB2®. Network decisions are examined with regards to VSWITCH, shared Open Systems Adapter (OSA), IBM HiperSocketsTM and the HiperPAV, or FCP/SCSI attachment used with a storage area network (SAN) Volume Controller along with performance and throughput expectations. The intended audience for this IBM Redbooks publication is IT architects who are responsible for planning production environments and IT specialists who are responsible for implementation of production environments.
The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. This volume describes the basic system programming activities related to implementing and maintaining the z/OS installation and provides details about the modules that are used to manage jobs and data. It covers the following topics: Overview of the parmlib definitions and the IPL process. The parameters and system data sets necessary to IPL and run a z/OS operating system are described, along with the main daily tasks for maximizing performance of the z/OS system. Basic concepts related to subsystems and subsystem interface and how to use the subsystem services that are provided by IBM subsystems. Job management in the z/OS system using the JES2 and JES3 job entry subsystems. It provides a detailed discussion about how JES2 and JES3 are used to receive jobs into the operating system, schedule them for processing by z/OS, and control their output processing. The link pack area (LPA), LNKLST, authorized libraries, and the role of VLF and LLA components. An overview of SMP/E for z/OS. An overview of IBM Language Environment® architecture and descriptions of Language Environment's full program model, callable services, storage management model, and debug information. Other volumes in this series include the following content: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 3: Introduction to DFSMS, data set basics, storage management, hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, the IBM Z platform and IBM Z connectivity, LPAR concepts, HCD, and the DS Storage Solution Volume 11: Capacity planning, performance management, WLM, IBM RMFTM, and SMF Volume 12: WLM Volume 13: JES3, JES3 SDSF
This IBM® RedpaperTM provides a broad understanding of the components necessary to secure your IBM z Systems environment. It provides an end-to-end architectural reference document for a use case that employs both mobile and analytics. It also provides an end to end explanation of security on z Systems from the systems of record through the systems of engagement. Security is described in terms of transactions, covering what happens after a transaction hits the system of engagement and what needs to be in place from that moment forward. The audience for this paper is IT architects and those planning to use z Systems for their mobile and analytics environments.
In this IBM® Redbooks® publication, we expand upon the concepts and experiences described in "An introduction to z/VM Single System Image (SSI) and Live Guest Relocation (LGR)", SG24-8006. An overview of that book is provided in Chapter 1, "Overview of SSI and LGR" on page 1. In writing this book, we re-used the same lab environment used in the first book, but expanded it to include IBM DB2® v10 on Linux on System z®, two IBM WebSphere® Application Server environments, and added a WebSphere application, used for performance benchmarking, which provided a workload that allowed us to observe the performance of the WebSphere Application Server during relocation of the z/VM® 6.2 member that was hosting the application server. Additionally, this book examines the use of small computer system interface (SCSI) disks in the z/VM v6.2 environment and the results of using single system images (SSI) and live guest relocation (LGR) in this type of environment. In the previous book, a detailed explanation of relocation domains was provided. In this book, we expand that discussion and provide use cases of relocation domains in different situations. Finally, because the ability to back up and restore your data is of paramount importance, we have provided a discussion about how to use one tool, the IBM Backup and Restore Manager for z/VM, which can be used in the new z/VM6.2 environment. We provide a brief overview of the tool and describe the changes in the installation process as a result of using single system image clusters. We also demonstrate how to set up the configuration file, and how to back up and restore both a user and an identity. This publication is intended for IT architects who will be responsible for designing the system and IT specialists who will have to build the system.
This IBM® Redbooks® publication is Volume 4 of a series of books entitled The Virtualization Cookbook for IBM z Systems. The other volumes in the series are: The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3, SG24-8147 The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers, SG24-8303 The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890 It is advised that you start with Volume 1 of this series, because the IBM z/VM® Hypervisor is the foundation for installing Linux on IBM zTM Systems.
IBM® z/VM® 6.2 introduces significant changes to z/VM in the form of multi-system clustering technology allowing up to four z/VM instances in a single system image (SSI) cluster. This technology is important, because it offers clients an attractive alternative to vertical growth by adding new z/VM systems. In the past, this capability required duplicate efforts to install, maintain, and manage each system. With SSI, these duplicate efforts are reduced or eliminated. Support for live guest relocation (LGR) allows you to move Linux virtual servers without disruption to the business, helping you to avoid planned outages. The z/VM systems are aware of each other and can take advantage of their combined resources. LGR enables clients to avoid loss of service due to planned outages by relocating guests from a system requiring maintenance to a system that remains active during the maintenance period. Together, the SSI and LGR technologies offer substantial client value, and they are a major departure from past z/VM practices. This IBM Redbooks® publication gives you a broad understanding of the new SSI architecture and an overview of LGR. We show an LGR example that shows a typical SAP user environment. In our example, the SAP Application Server Central Instance resides on a Linux on System z® guest and an IBM DB2® 10 database server runs on z/OS®. This book is written for IT architects, who design the systems, and IT specialists, who build the systems.
The ABCs of IBM® z/OS® System Programming is an 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful technical tool. This IBM Redbooks® publication, Volume 10, provides an introduction to IBM z/Architecture®, IBM z14 processor design, IBM Z connectivity, LPAR concepts and Hardware Configuration Definition (HCD). The contents of all the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, IBM Language Environment® Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, z14 processor design, IBM Z connectivity, LPAR concepts, and HCD Volume 11: Capacity planning, performance management, WLM, IBM RMFTM, and SMF Volume 12: WLM Volume 13: JES3, JES3 SDSF
This IBM® Redbooks® publication is Volume 3 of a series of three books called The Virtualization Cookbook for IBM z Systems. The other two volumes are called: The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3, SG24-8147 The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers, SG24-8303 It is suggested that you start with Volume 1 of this series, because IBM z/VM® is the base "layer" when installing Linux on IBM z SystemsTM. Volume 1 starts with an introduction, describes planning, and then describes z/VM installation into a two-node, single system image (SSI) cluster, configuration, hardening, automation, and servicing. It adopts a cookbook format that provides a concise, repeatable set of procedures for installing and configuring z/VM using the SSI clustering feature. Volumes 2 and 3 describe how to roll your own Linux virtual servers on z Systems hardware under z/VM. The cookbook format continues with installing and customizing Linux. Volume 3 focuses on SUSE Linux Enterprise Server 12. It describes how to install and configure SUSE Linux Enterprise Server 12 onto the Linux administration system, which does the cloning and other tasks. It also explains how to use AutoYaST2, which enables you to automatically install Linux using a configuration file, and explains how to create and use appliances and bootable images from configuration files. In addition, it provides information about common tasks and tools available to service SUSE Linux Enterprise Server.
This IBM® Redbooks® publication presents an overview of the IBM Geographically Dispersed Parallel Sysplex® (IBM GDPS®) offerings and the roles they play in delivering a business IT resilience solution. The book begins with general concepts of business IT resilience and disaster recovery, along with issues that are related to high application availability, data integrity, and performance. These topics are considered within the framework of government regulation, increasing application and infrastructure complexity, and the competitive and rapidly changing modern business environment. Next, it describes the GDPS family of offerings with specific reference to how they can help you achieve your defined goals for disaster recovery and high availability. Also covered are the features that simplify and enhance data replication activities, the prerequisites for implementing each offering, and tips for planning for the future and immediate business requirements. Tables provide easy-to-use summaries and comparisons of the offerings. The extra planning and implementation services available from IBM also are explained. Then, several practical client scenarios and requirements are described, along with the most suitable GDPS solution for each case. The introductory chapters of this publication are intended for a broad technical audience, including IT System Architects, Availability Managers, Technical IT Managers, Operations Managers, System Programmers, and Disaster Recovery Planners. The subsequent chapters provide more technical details about the GDPS offerings, and each can be read independently for those readers who are interested in specific topics. Therefore, if you read all of the chapters, be aware that some information is intentionally repeated.
Artificial intelligence (AI) enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. AI development is made possible by the availability of large amounts of data and the corresponding development and wide availability of computer systems that can process all that data faster and more accurately than humans can. What happens if you infuse AI with a world-class database management system, such as IBM Db2®? IBM® has done just that with Db2 AI for z/OS (Db2ZAI). Db2ZAI is built to infuse AI and data science to assist businesses in the use of AI to develop applications more easily. With Db2ZAI, the following benefits are realized: Data science functionality Better built applications Improved database performance (and DBA's time and efforts are saved) through simplification and automation of error reporting and routine tasks Machine learning (ML) optimizer to improve query access paths and reduce the need for manual tuning and query optimization Integrated data access that makes data available from various vendors including private cloud providers. This IBM Redpaper® publication helps to simplify your installation by tailoring and configuration of Db2 AI for z/OS®. It was written for system programmers, system administrators, and database administrators.
The IBM® Smart Analytics System 9600 is a single, end-to-end business analytics solution to accelerate data warehousing and business intelligence initiatives. It provides integrated hardware, software, and services that enable enterprise customers to quickly and cost-effectively deploy business-changing analytics across their organizations. As a workload-optimized system for business analytics, it leverages the strengths of the System z® platform to drive: Significant savings in hardware, software, operating, and people costs to deliver a complete range of data warehouse and BI capabilities Faster time to value with a reduction in the time and speed associated with deploying Business Intelligence Industry-leading scalability, reliability, availability, and security Simplified and faster access to the data on System z
Cybersecurity is the most important arm of defense against cyberattacks. With the recent increase in cyberattacks, corporations must focus on how they are combating these new high-tech threats. When establishing best practices, a corporation must focus on employees' access to specific workspaces and information. IBM Z® focuses on allowing high processing virtual environments while maintaining a high level of security in each workspace. Organizations not only need to adjust their approach to security, but also their approach to IT environments. To meet new customer needs and expectations, organizations must take a more agile approach to their business. IBM® Z allows companies to work with hybrid and multi-cloud environments that allows more ease of use for the user and efficiency overall. Working with IBM Z, organizations can also work with many databases that are included in IBM Cloud Pak® for Data. IBM Cloud Pak for Data allows organizations to make more informed decisions with improved data usage. Along with the improved data usage, organizations can see the effects from working in a Red Hat OpenShift environment. Red Hat OpenShift is compatible across many hardware services and allows the user to run applications in the most efficient manner. The purpose of this IBM Redbooks® publication is to: Introduce IBM Z and LinuxONE platforms and how they work with the Red Hat OpenShift environment and IBMCloud Pak for Data Provide examples and the uses of IBM Z with Cloud Paks for Data that show data gravity, consistent development experience, and consolidation and business resiliency The target audience for this book is IBM Z Technical Specialists, IT Architects, and System Administrators.
This IBM Redbooks publication shows the strengths of z/VM and how you can use these strengths to create a highly flexible test and production environment. Some of the strengths of z/VM that are shown in this book are that you can run Linux on z/VM, you can run a sysplex under z/VM, and you can develop code under z/VM for z/TPF. You can also provision Linux guests under z/VM. A vswitch allows you to connect all of your guests (all operating systems that run under z/VM) easily to the network. You can simulate your production environment on a sysplex. The intention of this book is to show the strengths of z/VM and how you can use these strengths to simulate your production environment and expand your application development and testing environments.
The term big data refers to extremely large sets of data that are analyzed to reveal insights, such as patterns, trends, and associations. The algorithms that analyze this data to provide these insights must extract value from a wide range of data sources, including business data and live, streaming, social media data. However, the real value of these insights comes from their timeliness. Rapid delivery of insights enables anyone (not only data scientists) to make effective decisions, applying deep intelligence to every enterprise application. Apache Spark is an integrated analytics framework and runtime to accelerate and simplify algorithm development, depoyment, and realization of business insight from analytics. Apache Spark on IBM® z/OS® puts the open source engine, augmented with unique differentiated features, built specifically for data science, where big data resides. This IBM Redbooks® publication describes the installation and configuration of IBM z/OS Platform for Apache Spark for field teams and clients. Additionally, it includes examples of business analytics scenarios.
As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.
What is the difference between a virtual machine and a Docker container? A virtual machine (VM) is like a house. It is fully contained with its own plumbing and heating and cooling system. If you want another house, you build a new foundation, with new walls, new plumbing, and its own heating and cooling system. VMs are large. They start their own operating systems. Containers are like apartments in an apartment building. They share infrastructure. They can be many different sizes. You can have different sizes depending on the needs. Containers "live" in a Docker host. If you build a house, you need many resources. If you build an apartment building, each unit shares resources. Like an apartment, Docker is smaller and satisfies specific needs, is more agile, and more easily changed. This IBM® Redbooks® publication examines the installation and operation of Docker Enterprise Edition on the IBM Z® platform.
As Linux on System z becomes more prevalent and mainstream in the industry, the need for it to deliver higher levels of availability is increasing. This IBM Redbooks publication starts with an explanation of high availability (HA) fundamentals such as HA concepts and terminology. It continues with a discussion of why a business needs to consider an HA solution and then explains how to determine your business single points of failure. We outline the components of a high availability solution and describe these components. Then we provide some architectural scenarios and demonstrate how to plan and decide an implementation of an end-to-end HA solution, from Linux on System z database scenarios to z/OS, and include storage, network, z/VM, Linux, and middleware. This implementation includes the IBM Tivoli System Automation for Multiplatforms (TSA MP), which monitors and automates applications distributed across Linux, AIX®, and z/OS® operating systems, as well as a GDPS based solution. It includes the planning for an end-to-end scenario, considering Linux on System z, z/VM, and z/OS operating environments, and the middleware used. The TSA MP implements HA for infrastructure, network, operating systems, and applications across multiple platforms and is compared to a Linux HA implementation based on open source Linux-HA, which is Linux only.
No IT server platform is 100% secure and useful at the same time. If your server is installed in a secure vault, three floors underground in a double-locked room, not connected to any network and switched off, one would say it was reasonably secure, but it would be a stretch to call it useful. This IBM® Redbooks® publication is about switching on the power to your Linux® on System z® server, connecting it to the data and to the network, and letting users have access to this formidable resource space in a secure, controlled, and auditable fashion to make sure the System z server and Linux are useful to your business. As the quotation illustrates, the book is also about ensuring that, before you start designing a security solution, you understand what the solution has to achieve. The base for a secure system is tightly related to the way the architecture and virtualization has been implemented on IBM System z. Since its inception 45 years ago, the architecture has been continuously developed to meet the increasing demands for a more secure and stable platform. This book is intended for system engineers and security administrators who want to customize a Linux on System z environment to meet strict security, audit, and control regulations. For additional information, there is a tech note that describes the best practices for securing your network. It can be found at: http://www.redbooks.ibm.com/abstracts/tips0981.html?Open
Application modernization is essential for continuous improvements to your business value. Modernizing your applications includes improvements to your software architecture, application infrastructure, development techniques, and business strategies. All of which allows you to gain increased business value from existing application code. IBM® z/OS® Container Extensions (IBM zCX) is a part of the IBM z/OS operating system. It makes it possible to run Linux on IBM Z® applications that are packaged as Docker container images on z/OS. Application developers can develop, and data centers can operate, popular open source packages, Linux applications, IBM software, and third-party software together with z/OS applications and data. This IBM Redbooks® publication presents the capabilities of IBM zCX along with several use cases that demonstrate Red Hat OpenShift Container Platform for IBM zCX and the application modernization benefits your business can realize.
IBM® Geographically Dispersed Parallel SysplexTM (GDPS®) is a collection of several offerings, each addressing a different set of IT resiliency goals. It can be tailored to meet the recovery point objective (RPO), which is how much data can you are willing to lose or recreate, and the recovery time objective (RTO), which identifies how long can you afford to be without your systems for your business from the initial outage to having your critical business processes available to users. Each offering uses a combination of server and storage hardware or software-based replication, and automation and clustering software technologies. This IBM Redbooks® publication presents an overview of the IBM GDPS active/active (GDPS/AA) offering and the role it plays in delivering a business IT resilience solution.
This IBM Redbooks publication discusses z/VM and Linux operations from the perspective of the z/OS programmer or system programmer. Although other books have been written about many of these topics, this book gives enough information about each topic to describe z/VM and Linux on IBM System z operations to somebody who is new to both environments. This book is intended for z/OS programmers and system programmers who are transitioning to the z/VM and Linux on System z environments and who want a translation guide for assistance. We base this book on our experiences using System z10 Enterprise Edition, z/VM version 5.3 RSU 0701, and Novell SUSE Linux Enterprise Server (SLES) 10 on System z.
This IBM Redbooks publication addresses some of the common problems that customers have experienced on the Linux® on System zTM platform. This book provides a problem determination methodology and tools to help the reader diagnose the problem in an easy-to-read self-help manual. We start with a discussion on how to approach problem solving in the Linux on System z environment and continue on to describe some of the problem determination tools commonly used for z/VM and Linux on system z. We continue with discussions on network problem determination, performance problem determination, and storage problems. Additionally, we discuss the formation of eligible (or eligibility) lists.
This IBM® Redbooks® publication is Volume 2 of a five-volume series of books entitled The Virtualization Cookbook for IBM Z®. This volume includes the following chapters: Chapter 1, "Installing Red Hat Enterprise Linux on LNXADMIN" on page 3, describes how to install and configure Red Hat Enterprise Linux onto the Linux Administration server, which performs the cloning and other tasks. Chapter 2, "Automated Red Hat Enterprise Linux installations by using Kickstart" on page 37, describes how to use Red Hat's kickstart tool to create Linux systems. This tool is fundamentally different from cloning in that an automated installation is implemented. You can try kickstart and cloning. Understand that these applications attempt to accomplish the same goal of quickly getting Linux systems up and running, and that you do not need to use both. Chapter 3, "Working with subscription-manager, yum, and DaNdiFied" on page 47, describes how the Red Hat Network works. It provides centralized management and provisioning for multiple Red Hat Enterprise Linux systems. Kickstart is an easy and fast way to provision your Linux guests in any supported Linux platform. It re-creates the operating system from the beginning by using the kickstart profile configuration file that installs the new operating system unattended. It also sets up the new guest according to the definition that was set up in the kickstart file. Usually, Linux is administered by the same team that manages Linux on all platforms. By using kickstart, you can create a basic profile that can be used in all supported platforms and customize Linux profiles, as needed. Cloning requires a better understanding of the z/VM environment and z/VM skills. It is a fast process if you enable the IBM FlashCopy® feature in advance. It clones the disks from a golden image to new disks that are used by the new Linux guest. The process can be automated by using the cloning scripts that are supplied with this book. It is recommended that you start with The Virtualization Cookbook for IBM Z Volume 1: IBM z/VM 7.2, SG24-8147 of this series because the IBM® z/VM hypervisor is the foundation (or base "layer") for installing Linux on IBM Z.
The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised.
This IBM Redbooks® publication presents a Smart Analytics Cloud. The IBM Smart Analytics Cloud is an IBM offering to enable delivery of business intelligence and analytics at the customer location in a private cloud deployment. The offering leverages a combination of IBM hardware, software and services to offer customers a complete solution that is enabled at their site. In this publication, we provide the background and product information for decision-makers to proceed with a cloud solution. The content ranges from an introduction to cloud computing to details about our lab implementation. The core of the book discusses the business value, architecture, and functionality of a Smart Analytics Cloud. To provide deeper perspective, documentation is also provided about implementation of one specific Smart Analytics Cloud solution that we created in our lab environment. Additionally, we also describe the IBM Smart Analytics Cloud service offering that can help you create your own Smart Analytics cloud solution that is tailored to your business needs.
This IBM® RedpaperTM publication discusses security practices for running Linux on z Systems on the IBM z14. It examines the unique security and integrity features that the IBM Z platform brings to the enterprise. It also examines pervasive encryption and its role in protecting data at rest.
The TCP/IP protocol suite has become the de facto standard for computer communications in today's networked world. The ubiquitous implementation of a specific networking standard has led to an incredible dependence on the applications enabled by it. Today, we use the TCP/IP protocols and the Internet not only for entertainment and information, but to conduct our business by performing transactions, buying and selling products, and delivering services to customers. We are continually extending the set of applications that leverage TCP/IP, thereby driving the need for further infrastructure support. It is our hope that both the novice and the expert will find useful information in this publication.
The Restructured Extended Executor (REXX) language is a procedural language that allows you to write programs and algorithms in a clear and structural way. It is an interpreted and compiled language, and you do not have to compile a REXX command list before executing it. With IBM z/OS V1.9, you can harness the versatility of REXX to interface and interact with the power of SDSF. A new function called REXX with SDSF is available that provides access to SDSF functions through the use of the REXX programming language. This REXX support provides a simple and powerful alternative to using SDSF batch. This IBM Redbooks publication describes the new support and provides sample REXX execs that exploit the new function and that perform real-world tasks related to operations, systems programming, system administration, and automation. This book complements the SDSF documentation, which is primarily reference information. The audience for this book includes operations support, system programmers, automation support, and anyone with a desire to access SDSF using a REXX interface.
This IBM® Redbooks® publication provides information to help clients that have JES3 and want to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions. This book considers the features of JES2 as available on releases of IBM z/OS® V2R3 and V2R4. It should be used with JES3 to JES2 Migration Considerations, SG24-8083. This publication is divided into three parts: Part 1, "Planning to migrate from JES3 to JES2" on page 1, gives you information to make the decision and plan your migration. Part 2, "Use case study" on page 111, provides a Use Case Study that is based on an actual customer experience in a successful migration. Part 3, "Appendixes" on page 193, provides an appendix with sample tools that can help the migration process and exploitation of some of the new JES2 functions. This book is aimed at operations personnel, system programmers, and application developers
Is it time for you to modernize your IBM® z/OS® applications to allow for access to an entire system of open source and Linux on IBM Z® workloads? Is co-location of these workloads on the z/OS platform with no porting requirements of value to you? Your open source or Linux on IBM Z software can benefit from being co-located and managed inside a z/OS environment; leveraging z/OS quality of service for optimized business continuity. Your software can be integrated with and can help complement existing z/OS workloads and environments. If your software can communicate with z/OS and external components by using TCP/IP, now is the time examine how IBM z/OS Container Extensions (IBM zCX) makes it possible to integrate Linux on Z applications with z/OS. This IBM Redbooks® publication is a follow-on to Getting started with z/OS Container Extensions and Docker, SG24-8457, which provides some interesting use cases for zCX. We start with a brief overview of IBM zCX. In Part 1, "Integration" on page 9, we demonstrate use cases that integrate with zCX. In Part 2, "DevOps in zCX" on page 165, we describe how organizations can benefit from running a DevOps flow in zCX and we describe the set up of necessary components. Finally, in Part 3, "Monitoring and managing zCX systems" on page 229, we discuss IBM Service Management Unite Automation, a free-of-charge customizable dashboard interface and an important discussion of creating the suitable container restart policy.
The power of the IBM System z, combined with the flexibility of Linux on System z, provides the ideal platform on which to implement SAP application servers. System z provides the benefits of continuous availability, high performance, scalability, and ease of management; these qualities support and complement mission-critical SAP business applications. This IBM Redbooks publication focuses on the implementation of SAP application servers on Linux on System z to leverage the synergy of this combination of products. It provides detailed information to guide you through the planning process, including resource sharing considerations, hardware and software requirements, support and maintenance. This book takes you through the steps to prepare the system environment, describing system and network configurations, and demonstrates the procedures for installing and customizing your system. It describes in detail how to install SAP application servers in z/VM Linux images, including the installation of SAP and Java and hipersockets. Finally, it provides guidance for performance tuning and introduces some useful monitoring tools.
IBM® z/VM® 6.2 introduced significant changes to z/VM with a multi-system clustering technology that allows up to four z/VM instances in a single system image (SSI) cluster. This technology is important because it offers you an attractive alternative to vertical growth by adding new z/VM systems. In the past, this capability required duplicate efforts to install, maintain, and manage each system. With SSI, these duplicate efforts are reduced or eliminated. Support for live guest relocation (LGR) allows you to move Linux virtual servers without disrupting your business or incurring loss of service, thus reducing planned outages. The z/VM systems are aware of each other and take advantage of their combined resources. LGR enables you to relocate guests from a system requiring maintenance to a system that will remain active during maintenance. A major advantage for DB2 v10 customers is that using z/VM 6.2 does not require any changes to existing DB2 structures. This remarkable benefit is due to the fact that DB2 v10 is installed as part of the LInux guest on z/VM and is fully integrated into LGR. This allows you to smoothly move DB2 v10 when you move Linux virtual servers, without interrupting either DB2 v10 or z/VM operations and services. This IBM Redbooks® publication will help you understand how DB2 10 on Linux for System z® behaves while running on a z/VM that is being relocated using z/VM's 6.2 Live Guest Relocation feature. In this book, we explore memory management, the DB2 Self-tuning memory manager feature, time synchronization, networking, and storage and performance considerations with regards to relocation. We also offer some best practices found during a live guest relocation for DB2 v10.
LinuxONE® is a hardware system that is designed to support and use the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service various needs. On LinuxONE, security is built into the hardware and software. This IBM® Redpaper® publication gives a broad understanding of how to use the various security features that make the most of and complement the LinuxONE hardware security features, including the following examples: Hardware accelerated encryption of data, which is delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry-leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that use LinuxONE security capabilities and practical use cases for these technologies. This publication was written for IT executives, architects, specialists, security administrators, and others who consider security for LinuxONE.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.