dos2unix on z/OS

  • Post category:Utilities
  • Reading time:1 min read

On z/OS UNIX, the dos2unix utility is not included. You can achieve similar functionality using other tools available on z/OS UNIX, such as sed or tr. These tools can be used to convert DOS-style line endings (CRLF) to Unix-style line endings (LF). For example, you can use sed to remove carriage return characters: sed 's/\r$//' inputfile > outputfile Or you can use tr tr -d '\r' < inputfile > outputfile

The 4 Eyes Principle

  • Post category:Principles
  • Reading time:2 mins read

Another principle today. In the realm of software development, the four-eyes principle dictates that an action can only be executed when it is approved by two individuals, each providing a unique perspective and oversight. This principle is designed to safeguard against errors and misuse, ensuring the integrity and quality of the software. The four eyes principle can help during the construction of software systems by finding weaknesses in architecture, design or code and can help to improve the quality. In every phase of the software development cycle, this principle can be applied, from the requirements analysis phase to the detailed coding phase. Software architecture, design, and code could be co-developed by two people or peer-reviewed. In the design of software systems, the four-eye principle applies to the process of validating design decisions on various levels. Pair programming is a software development technique in which two programmers work together on code, one usually doing the coding and the other doing the validation. In other engineering industries, dual or duplicate inspection is a common practice. In regulated environments such as Financial Institutions, compliance requirements may dictate that code is always peer-reviewed to prevent backdoors in code. In software systems itself, the four-eyes principles may be implemented when supporting business processes requiring this for security or quality validation reasons. Change management, a critical aspect of software development, often relies on the four-eyes principle. When code changes are transitioned into production, a formal change board may mandate a signed-off peer review, ensuring that all changes meet the required standards. Change and Configuration Management tools for software systems are often designed to support this four-eyes principle process, further enhancing the quality and security of the production environment. Further assurance can be added by adding a (random) rotation scheme of authorized individuals to serve as the second pair of eyes. This may provide additional assurance as it will not be known beforehand which two individuals will be dealing with a given decision. Related / similar: Dual Inspection, Code Review.

System Z Enthusiasts Discord

  • Post category:Uncategorized
  • Reading time:1 min read

Quick one. Just joined the System Z Enthusiasts Discord community. They are a pretty awesome group.

Continuous availability presentation in 2006, updated

  • Post category:Uncategorized
  • Reading time:9 mins read

Continuous availability The slide deck tells me that it was in 2006 that I created a set of slides for "Kees" with an overview of the continuous availability features of an IBM mainframe setup. The deck's content was interesting enough to share here, with some enhancements. What is availability? First, let's talk a little bit about availability. What do we mean when we talk about availability? A highly available computing setup should provide for the following: A highly available fault-tolerant infrastructure that enables applications to run continuously. Continuous operations to allow for non-disruptive backups and infrastructure and application maintenance. Disaster recovery measures that protect against unplanned outages due to disasters caused by factors that can not be controlled. Definitions Availability is the state of an application service being accessible to the end user. An outage (unavailability) is when a system is unavailable to an end user. An outage can be planned, for example, for software or hardware maintenance, or unplanned. What causes outages? A research report from Standish Group from 2005 showed the various causes of outages. Causes of outages It is interesting to see that (cyber) security was not part of this picture, while more recent research published by UpTime Intelligence shows this growing concern. More on this later. Causes of outages 2020 - 2021 - 2022 The myth of the nines The table below shows the availability figures for an IBM mainframe setup versus Unix and LAN availability. Things have changed. Unix (now: Linux) server availability has gone up. Server quality has improved, and so has software quality. Unix, however, still does not provide a capability similar to a z/OS sysplex. Such a sysplex simply beats any clustering facility by providing built-in, operating system-level availability. Availability figures for an IBM mainframe setup versus Unix and LAN At the time of writing, IBM publishes updated figures for a sysplex setup as well (see https://www.ibm.com/products/zos/parallel-sysplex): 99.99999% application availability for the footnote configuration: "... IBM Z servers must be configured in a Parallel Sysplex with z/OS 2.3 or above; GDPS data management and middleware recovery across Metro distance systems and storage and DS888X with IBM HyperSwap. Other resiliency technology and configurations may be needed." Redundant hardware The following slides show the redundant hardware of a z9 EC (Enterprise Class), the flagship mainframe of that time. The redundant hardware of a z9 EC Contrasting this with today's flagship, the z16 (source https://www.vm.ibm.com/library/presentations/z16hwov.pdf), is interesting. Since the mainframe is now mounted in a standard rack, the interesting views have moved to the rear of the apparatus. (iPDUs are the power supplies in this machine.) The redundant hardware of a z16 Redundant IO configuration A nice, highly tolerant server is insufficient for an ultimately highly available setup. Also, the IO configuration, a.k.a. storage configuration, must be highly available. A redundant SAN setup The following slide in the deck highlights how this can be achieved. Depending on your mood, what is amusing or annoying and what triggers me today are the "DASD CU" terms in…