Precisely z/OS

Ironstream Modernization Guide

Data Discovery, Mining and ProcessiOperations

Ironstream is a data discovery, mining and processi product by Precisely. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Ironstream is a tool designed to forward z/OS-based log data, including SYSLOG, SMF, and log4j data, to non-mainframe sources such as Splunk, IBM ServiceNow, MicroFocus, Microsoft SCOM, and Elastic.

It supports protocols like TCP and UDP for data transmission, with options for secure communication using TLS/SSL.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What types of data does Ironstream collect and where does it send it?

Ironstream collects z/OS data, transforms it, and forwards it to platforms like Splunk, ServiceNow, and Elastic. It supports various z/OS data sources, including SMF, SYSLOG, and log4j.

How is Ironstream configured?

Ironstream uses configuration files to define data sources, transformations, and destinations. These files specify parameters for data collection, filtering, and forwarding.

What communication protocols does Ironstream use?

Ironstream supports protocols such as TCP and UDP for data transmission. It can also use secure protocols like TLS/SSL for encrypted communication.

What kind of logging or monitoring is available?

Ironstream provides logging capabilities to monitor its operations. Logs capture information about data collection, transformation, and forwarding processes, aiding in troubleshooting and auditing.

Technical

What configuration files or interfaces are used?

Ironstream uses configuration files, typically in a text-based format, to define data sources, transformations, and destinations. These files are edited directly or through a provided interface.

What types of APIs does Ironstream expose?

Ironstream does not expose a public-facing API in the traditional sense (REST, SOAP). Instead, it relies on configuration files and internal mechanisms for integration with other systems.

What are the main system components?

The main system components include the Data Collector, Transformation Engine, and Forwarder. The Data Collector retrieves data from z/OS sources. The Transformation Engine processes and formats the data. The Forwarder sends the data to external platforms.

What authentication methods are supported?

Ironstream supports authentication methods such as LDAP and Kerberos for secure access. It also uses TLS/SSL for encrypting data in transit.

What are the main configuration parameters?

Configuration parameters include data source definitions, transformation rules, destination settings, and security configurations. These parameters are set in the configuration files.

Business Value

How does Ironstream provide business value?

Ironstream provides real-time visibility into z/OS data, enabling faster problem resolution and improved decision-making. By forwarding data to platforms like Splunk, it allows organizations to leverage their existing analytics tools.

How does Ironstream improve IT operations?

By centralizing z/OS data with other enterprise data, Ironstream enables a holistic view of IT operations. This helps organizations identify and address issues that span multiple platforms.

How does Ironstream help with compliance?

Ironstream helps organizations meet compliance requirements by providing a secure and auditable way to access and analyze z/OS data. It supports encryption and access controls to protect sensitive information.

Security

What authentication methods are supported?

Ironstream supports authentication methods such as LDAP, Kerberos, and X.509 certificates. These methods ensure that only authorized users can access the system.

What access control model is used?

Ironstream uses an access control model based on user roles and permissions. This allows administrators to define granular access controls for different users and groups.

What encryption is used and where?

Ironstream uses TLS/SSL encryption to protect data in transit. This ensures that sensitive information is not exposed during transmission between components.

What audit/logging capabilities exist?

Ironstream provides audit logging capabilities to track user activity and system events. These logs can be used to monitor security and compliance.

Operations

What administrative interfaces are available?

Ironstream provides a command-line interface (CLI) and web console for administrative tasks. The CLI is used for scripting and automation, while the web console provides a graphical interface for configuration and monitoring.

How is user management handled?

User management is handled through the administrative interfaces, where administrators can create, modify, and delete user accounts. Access controls are defined based on user roles and permissions.

What monitoring/logging capabilities exist?

Ironstream provides monitoring and logging capabilities to track system performance and identify potential issues. Logs capture information about data collection, transformation, and forwarding processes.

How do I configure Ironstream?

To configure Ironstream, you typically modify configuration files to define data sources, transformations, and destinations. These files are usually in a text-based format and can be edited directly.

Ready to Start Your Migration?

Download our comprehensive migration guide for Ironstream or calculate your ROI.

Calculate ROI