Connection Log Modernization Guide
Connection Log is a networks and communication product by Inside Products. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Connection Log is a tool designed for z/OS mainframe environments to monitor TCP connections.
Consider using Connection Log if you need to proactively monitor and troubleshoot TCP connections on your z/OS mainframe.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does Connection Log do?
Connection Log is a tool designed for z/OS environments that allows users to monitor and analyze TCP connections on mainframe systems. It provides insights into network activity, helping administrators identify and troubleshoot connectivity issues. It is a tool that enhances network visibility on z/OS.
Is this a system, application, or tool?
Connection Log is a tool designed to provide visibility into TCP connections on z/OS mainframe systems. It is not a complete system or application, but rather a focused utility that enhances network monitoring capabilities. It is a tool.
What types of organizations use this?
Organizations that rely on z/OS mainframe systems for critical applications and require detailed monitoring of TCP connections would benefit from Connection Log. This includes industries such as banking, finance, insurance, and government. Any organization that needs to ensure the reliability and performance of its mainframe network connections is a potential user.
When should we consider Connection Log?
A company should consider using Connection Log when it needs to proactively monitor and troubleshoot TCP connections on its z/OS mainframe. This is especially important when experiencing network performance issues or when needing to ensure the security and stability of mainframe applications. It is useful for diagnosing connectivity problems and optimizing network performance.
What are the alternatives to Connection Log?
Alternatives to Connection Log include general-purpose network monitoring tools and other mainframe-specific utilities that provide TCP connection information. Examples include NetTester/1, eeproxy, and Network Director. However, Connection Log is specifically designed for z/OS and offers focused features for mainframe TCP connection analysis.
Technical
For mainframe products: Does this run in an LPAR?
Connection Log runs on the z/OS platform and requires a z/OS environment to operate. It typically runs within an LPAR (Logical Partition) on the mainframe. It is dependent on z/OS subsystems for network communication and data access.
What infrastructure is required?
Connection Log requires a z/OS environment to operate. It needs access to the TCP/IP stack and related network services on the mainframe. No specific additional software is explicitly required, but standard z/OS utilities and services must be available.
What are the common commands and syntax?
The specific commands and syntax for Connection Log depend on its implementation. However, common operations would include displaying active connections, filtering connections based on criteria (e.g., IP address, port), and generating reports. Configuration files define parameters such as logging levels and data sources.
What are the main architectural components?
Connection Log's architecture includes components for data collection, analysis, and presentation. These components communicate using internal APIs and data structures. The product may use z/OS datasets or VSAM files for storing configuration and log data.
What administrative interfaces are available?
The administrative interface for Connection Log is typically a command-line interface (CLI) or a web-based console. User management is handled through z/OS security mechanisms such as RACF, ACF2, or Top Secret. Configuration parameters include settings for data sources, logging, and display options.
Business Value
What business problems does it solve?
Connection Log provides business value by enabling organizations to proactively monitor and manage TCP connections on their z/OS mainframes. This helps ensure the reliability and performance of critical applications, reduces downtime, and improves overall network security. It aids in identifying and resolving network issues quickly.
What happens if we do not use it?
Without Connection Log, organizations may lack detailed visibility into TCP connections on their z/OS mainframes. This can lead to difficulty in diagnosing network issues, increased downtime, and potential security vulnerabilities. Proactive monitoring and troubleshooting become more challenging.
How does it integrate with enterprise ecosystems?
Connection Log integrates with enterprise ecosystems by leveraging z/OS security and monitoring infrastructure. It can integrate with SIEM (Security Information and Event Management) platforms for centralized security monitoring and reporting. It can also integrate with other mainframe management tools for a holistic view of system performance.
What is the typical licensing model and TCO?
The typical licensing model for Connection Log is likely a perpetual license or a subscription-based model, depending on the vendor. The total cost of ownership includes the licensing fees, implementation costs, and ongoing maintenance and support expenses. Vendor lock-in considerations depend on the specific features and integrations offered by the product.
Security
What specific authentication methods are supported?
Connection Log supports authentication methods provided by z/OS, such as RACF, ACF2, and Top Secret. It uses an access control model based on z/OS security profiles, which define permissions for accessing network connection data. Encryption may be used for sensitive data in transit or at rest, depending on the product's configuration.
What access control model is used?
Connection Log leverages z/OS security mechanisms for access control. The access control model is typically role-based access control (RBAC), where users are assigned roles with specific permissions. This allows administrators to control who can view and manage network connection data.
What audit/logging capabilities exist?
Connection Log provides audit and logging capabilities to track user activity and system events. Audit logs capture information about who accessed what data and when. These logs can be used for security analysis and compliance reporting. The specific logging format and content depend on the product's configuration.
How does it enhance security?
Connection Log enhances security by providing visibility into network connections on the z/OS mainframe. This allows administrators to detect and respond to suspicious activity, such as unauthorized connections or unusual traffic patterns. It helps in identifying potential security breaches and vulnerabilities.
Operations
How is it typically deployed?
Deploying Connection Log typically involves installing the software on a z/OS LPAR and configuring it to access the necessary network data sources. Implementation requires expertise in z/OS systems programming and networking. Common challenges include configuring security settings and ensuring compatibility with existing mainframe infrastructure.
What ongoing operational requirements exist?
Ongoing operational requirements for Connection Log include monitoring the product's performance, maintaining its configuration, and applying updates and patches. Staffing requirements include z/OS systems programmers and network administrators who can manage and troubleshoot the product.
What monitoring/logging capabilities exist?
Monitoring capabilities include tracking the product's resource usage, logging errors and warnings, and generating alerts for critical events. Logging capabilities capture information about network connections, user activity, and system events. These logs can be used for troubleshooting and security analysis.
What level of technical expertise is required?
Technical expertise in z/OS systems programming and networking is required to implement and operate Connection Log. Administrators need to understand z/OS security concepts, TCP/IP networking, and the product's configuration options. Familiarity with mainframe monitoring tools is also beneficial.
Ready to Start Your Migration?
Download our comprehensive migration guide for Connection Log or calculate your ROI.