Tools for Managing Big Data Analytics on z/os



Similar documents
Sharing Secrets Using Encryption Facility

A guide for creating a more secure, efficient managed file transfer methodology

Securing Data At Rest And Data In Motion - Strategic Data-Centric Security. 9 th March 2012

Configuring and Tuning SSH/SFTP on z/os

Crypto and Disaster Recovery. Greg Boyd

System z Batch Network Analyzer Tool (zbna) - Because Batch is Back!

Encryption Facility for z/os Version 1.10

z/os Cryptographic Services - ICSF Best Practices

PKI Services: The Best Kept Secret in z/os

The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005

End-to-End Enterprise Encryption:

Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012

PKZIP /SecureZIP for z/os

Mainframe. Large Computing Systems. Supercomputer Systems. Mainframe

10195 Crypto And Disaster Recovery

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

DOAG November Hintergrund. Oracle Mainframe Datanbanken für extreme Anforderungen

Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance

Secure Database Backups with SecureZIP

Alliance AES Encryption for IBM i Solution Brief

Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011

ZIP/390 : Application Programming Interface. MVS et VSE

Benefits of Unifying Enterprise Storage, Management and Replication for Mainframe DASD, Virtual Tape, and Open Systems Data

Digital Certificates Demystified

Licensed Programming Specifications

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

Secure Network Communications FIPS Non Proprietary Security Policy

CICS Transactions Measurement with no Pain

GPU File System Encryption Kartik Kulkarni and Eugene Linkov

Security Intelligence, Audit and Compliance for the Mainframe

z/os Communications Server Security Using Policy Agent

Big Data Storage in the Cloud

Forecasting Performance Metrics using the IBM Tivoli Performance Analyzer

CA Big Data Management: It s here, but what can it do for your business?

Oracle Database 11g Comparison Chart

IBM Security Key Lifecycle Manager for z/os: Deployment and Migration Considerations

Aktuelles aus z/vm, z/vse, Linux on System z

Virtual Machines.

How-to Access RACF From Distributed Platforms

Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.

CA TPX Session Management r5.3

Getting Started with Digital Certificates Part II (RACDCERT)

Karmjeet Kahlon Director Global z Systems Software Sales

z/os Performance Monitoring Tools Shoot-Out: ASG, BMC, CA, Rocket

SkyRecon Cryptographic Module (SCM)

New CICS support for Secure Sockets Layer

ERserver. iseries. Securing applications with SSL

Mainframe alternative Solution Brief. MFA Sizing Study for a z/os mainframe workload running on a Microsoft and HP Mainframe Alternative (MFA)

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible

ERserver. iseries. Secure Sockets Layer (SSL)

IBM z13 Software Pricing Announcements

INTRODUCTION to CRYPTOGRAPHY & CRYPTOGRAPHIC SERVICES on Z/OS BOSTON UNIVERSITY SECURITY CAMP MARCH 14, 2003

Frequently Asked Questions (FAQs) United Computer Group, Inc. VAULT400 System i (AS/400) Agent

Real Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries

Introduction to Virtual Machines

zpcr Capacity Sizing Lab Part 2 Hands-on Lab

FDRSOS (Safeguard Open Storage)

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Implementing SSL Security on a PowerExchange Network

CA Integrated Agent Services

Cryptography and Network Security Chapter 15

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

CA s Cloud Storage for System z

IBM Software Group. Lotus Domino 6.5 Server Enablement

Experiences with Using IBM zec12 Flash Memory

z/tpf FTP Client Support

Virtualization and the U2 Databases

z/os Firewall Technology Overview

The Flash Express Feature on IBM zenterprise EC12 and z/os exploitation of flash storage

Encryption? Yeah, We Do That. Encryption facilities, challenges, and choices on System z

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS by Nikos Mavroyanopoulos

Version Overview. Business value

An Oracle White Paper July Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

Cisco Integrated Services Routers Performance Overview

IBM Crypto Server Management General Information Manual

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

Overview. Business value

CA Insight Database Performance Monitor for DB2 for z/os

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

EMC DATA DOMAIN ENCRYPTION A Detailed Review

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Managed Portable Security Devices

Contingency Access to Enterprise Encrypted Data

Running Oracle Databases in a z Systems Cloud environment

CRYPTOGRAPHY AS A SERVICE

The Truth Behind IBM AIX LPAR Performance

Maximizing Hadoop Performance and Storage Capacity with AltraHD TM

FIPS Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

PGP from: Cryptography and Network Security

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Digital Certificate Goody Bags on z/os

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03

Driving force. What future software needs. Potential research topics

IBM Mainframe Services. 10 April G-Cloud. service definitions

Memory Resource Management in VMware ESX Server

CA MICS Resource Management r12.7

Cross-Platform Access

DB2 Security and PCI Compliance

Transcription:

Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org

Introduction Heterogeneous Analysis Addressing the process of packaging and transferring z/os based information to an off-board analytic platform in an Effective, Cost-efficient and Secure manner. What are some major hurdles that exploitation of advanced System z facilities can overcome in this venue? 2

Introduction Heterogeneous Analysis Data Transformation Code page differences (EBCDIC/ASCII) Data Structures (Binary, Endian mode numerics, Parsing) Portability between dissimilar file system formats Data Packaging (multiple discrete components) Data Protection Data Volume Total raw size Number of exchanges 3

4 Finding the Sweet Spot

5 What is the business impact of selected designs and facilities?

Focus on experiences with System z Facilities that help address two areas Data Transformation Code page differences (EBCDIC/ASCII) Data Structures (Binary, Endian numerics, Parsing) Portability between dissimilar file system formats Data Packaging (multiple discrete components) Data Protection - Encryption Data Volume Hardware Assisted Compression Total raw size Number of exchanges 6

Data Protection Data-Centric Encryption using ICSF Machine z10- EC 2097 z10- BC 2098 z196 2817 z114 2818 zec12 2827 zbc12 2828 Algorithm Supported DES 3DES DES 3DES DES 3DES DES 3DES DES 3DES DES 3DES AES128, 192, 256 AES128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 AES 128, 192, 256 Crypto Hardware CPACF CEX2C CPACF CEX2C CPACF CEX3C CPACF CEX3C CPACF CEX3C CPACF CEX3C CEX3C CEX3C CEX4C CEX4C 7

Application Design Cryptographic Design Influences Data Exchange Format Collection with associative constructs Data Transport (Container Format) In-flight and at rest security Authentication and decryption service availability Cryptographic Identity and Associated Key Management Dynamic vs. Static Keys Inter-system Key Coordination Data Recovery (Contingency Keys) Resource Capacity Timeliness of service 8

9 Key Exposures The need for Key Management

Crypto Facilities ICSF CKDS & PKDS RACF/ACF2/Top Secret Proprietary Certificate Store OpenPGP Keyrings Application Services LDAP Administration Certificate Cryptographic CEXnC / CPACF / Software Crypto X.509 Certificates Public Certificate Authority Native X.509 Certificates 10

Data-Centric Encryption ICSF Data Encipherment Algorithms RSA PKi Encryption Losing ground for longevity due to high cost of processing increased key lengths Symmetric Clear Key DES class, AES (128 256 bit key strength) May be employed with passphrase-generated key or CKDS stored key Symmetric Protected Key (SYMCPACFWRAP) CKDS Secure Key 11

Symmetric Key Operational Comparison Clear Fast, but Risky Protected Fast & Secure Secure Slow o o ICSF Software -or- System z CPACF o System z CPACF o Cryptographic Card o o Passphrase Value -or- ICSF CKDS Registered (clear) o ICSF CKDS Registered (encrypted) o ICSF CKDS Registered (encrypted) 12

13 Leverage ICSF CKDS to Protect Passphrase Derived Keys

14 Illustrate Registered ICSF CKDS Key Set

15 CKDS Policy Control Duplicate Key Value Protection

RACF key ring/certificate with PKDS Label:MSTEBNERSHARETEST ç RACF Label (r_datalib API access) Certificate ID:2QPVweLV4uPFwtXF2fLw8P1A Status:TRUST Start Date:2013/12/17 19:00:25 End Date: 2014/01/18 19:00:24 Serial Number:10F0F1FF3C718DEE4D24BBEDA47A49D0 Issuer's Name:CN=UTN-USERFirst-Client Authentication and Email.OU=http: //www.usertrust.com.o=the USERTRUST Network.L=Salt Lake City.SP=UT.C=US Subject's Name:mike.stebner@pkware.com.CN=Mike Stebner.OU=Corporate Secure Email.OU=Issued through PKWARE E-PKI Manager.O=PKWARE.648 N PL ANKINTON AVE.L=MILWAUKEE.SP=WI.53203.C=US Key Usage:HANDSHAKE Key Type:RSA Key Size:2048 Private Key:YES PKDS Label:SHARE2014MSTEBNER ç ICSF PKDS Label (implied access) 16

17 What is the business impact of selected designs and facilities?

Inherited OpenPGP Data Flow Encryption Layer Compression Layer Literal Data Layer 18

Consider the Basic Data Flow Simple copies from phase to phase 19

20 Understand OpenPGP Internal Stream Formatting (RFC 2440 or 4880)

OpenPGP Data Flow Overhead Additional data manipulation logic from phase to phase 21

Illustration of Container Format Influence on Encipherment Facilities Symmetric Keys X.509 Certificates OpenPGP RACF/ACF/CA-TSS ICSF PKDS ICSF CKDS FIPS 140-2 GOOD WORK REQUIRED NOT AVAILABLE 22

Compression Why is it important? Data acquisition APPLICATION SERVICES GCP/ ziip/zedc Result: Compressed & Encrypted Data on Target Platform Data is offloaded, encrypted, and compressed. 23

What Compression Facilities are Available on System z? Software-based General CP (e.g. gzip, OpenPGP, PKZIP, zlib) Any viable cross-platform compatible algorithm chosen for implementation Deflate (RFC1951) is a commonly used algorithm that combines LZ77 sliding dictionary compression with Huffman coding. Software using ziip offload Execute software routines on a System z9 or later Requires APF authorization to run SRB enclave scheduling Provides economic compression, but may not improve latency performance. 24

What Compression Facilities are Available on System z? Hardware-based System z CMPSC Static Dictionary hardware compression Available since the early 1990 s Static dictionary LZ77 Limited applicability outside of z/os System z Enterprise Data Compression hardware New with zec12 and zbc12 systems PCIE adapter card Implements Deflate algorithm 25

Compression Facility Functional Comparison Software General CP Software on ziip CMPSC Static Dictionary zedc Portable Generalized Compression Requirements General CP Capacity System z9 ziip Capacity (APF) Pre-defined data structures zec12/zbc12 z/os 2.1 zedc Card GOOD WORK REQUIRED NOT AVAILABLE 26

IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (I) IBM Announcement; Document Number: ZSB03059USEN Implements RFC 1951 Deflate compression When zlib uses zedc, there can be up to 118X reduction in CPU and up to 24X throughput improvement One or more PCIE cards servicing multiple partitions (15) Currently supported only under a native z/os LPAR Check IBM statements of direction Optimized for larger amounts of data Has configurable minimum size limits (4k floor) PTFs available for z/os 1.12 and 1.13 to inflate Also see SMP/E FIXCAT(IBM.Function.ZEDC) 27

IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (III) System Use Cases SMF Phased Roll-out intentions BSAM/QSAM (infrastructure layer) DFSMSdss /DFSMShsm backup/restore z/os Java Technology Edition, Version 7 Detailed SHARE sessions 15209: Experiences with IBM zaware and zedc 15099: zenterprise Data Compression: What is it and How Do I Use it? (Wed. 4:30 PM) 15080: z/os zenterprise Data Compression Usage and Configuration 28

IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (IV) z/os V2R1.0 MVS Callable Services for HLL (Ch. 13-15) Deflate stream compatible with GZIP, PKZIP, OpenPGP Hardware availability checks to determine availability IBM-provided compatible C library functions APF Authorized API for single-block compress/inflate Unauthorized zlib interface (streaming data) 29

IBM zenterprise Data Compression for z/ OS and the zedc Express Feature (V) z/os V2R1.0 MVS Callable Services for HLL (Ch. 13-15) Unauthorized zlib interface (streaming data) Uses zlib.net z_stream programming interface (subset) Raw Deflate Stream or GZIP modes (CRC32 with GZIP) libzz.a include wrapper Controlled by SAF-protected FACILITY class resource FPZ.ACCELERATOR.COMPRESSION z/os UNIX _HZC_COMPRESSION_METHOD environment control variable May fall back to zlib software routines depending on zedc requirements, including size limitations PARMLIB IQPPRMxx DEFMINREQSIZE (4K) and INFMINREQSIZE (16K) 30

IBM zenterprise Data Compression PKWARE Early Test Program Experience Objective Assess compression using software GCP, ziip and zedc zec12 5 General CPs, 2 ziips, 1 zedc Workloads Single system (no LPAR sharing of zedc) Large (1gb+) linear with multiple parallel (80 concurrent) Small (256k) high volume Metrics Elapsed Time Processor time 31

zedc Operations Console Display General PCIE Status 32

zedc Operations Display zedc PCIE Adapter Status 33

34 zedc Operational Monitoring (II)

zedc Processing Characteristics Multi-tasking with the zlib API is available zlib API may not run on the zedc hardware (per design) Different minimum buffer size thresholds for deflate & inflate Only one level of zedc Deflate compression 9 levels available in zlib software Internal implementations of RFC 1951 Deflate may differ May experience varying compression ratios (based on level) right around the minimum buffer size restriction. 35

IBM zenterprise Data Compression PKWARE Early Test Program Experience Initial Results Overview (I) zedc sustained 1gb+ per second of raw compression zedc capacity exceeded application resource constraints The affects of I/O and application processing prevented saturation of zedc Under appropriate conditions, ziip met or exceeded application performance when compared to zedc. Optimized zlib C routines showed benefits over the libzz.a wrapper code under some conditions. Small files under the minimum buffer size Inflation 36

IBM zenterprise Data Compression PKWARE Early Test Program Experience Initial Results Overview (II) ETP limitations of first implementation identified Buffer allocation issues Buffer release Rejected concurrent requests for the same size buffer Compression ratio (77% vs. 89% for software implementations) 37

38 Effect of Resource Availability zedc vs. ziip

39 Incorporate Design with Facility Transactional Example (1.5mb each)

Summary Slide The Mainframe is typically the source of record for critical business data Data needs to move off the mainframe quickly, efficiently and securely. Numerous facilities on z/os exist to make this quick, efficient and secure ziip, CryptoExpress4S, CPACF, zedc Proper Transformation is critical to reduce hardware dependencies and facilitate long term viability 40