Install z/IRIS clients
Created: | Updated:
Download z/IRIS z/OS Clients
z/IRIS client packages can be downloaded from the mainstorconcept JFrog repository.
mainstorconcept GmbH and its partners license and distribute z/IRIS software. For more information about obtaining the required licenses to run z/IRIS, please consult your z/IRIS representative.
Please refer to the minimum hardware and software requirements page.
Apache Kafka integration
z/IRIS clients connect to a network accessible Kafka clusters. For more information about z/IRIS integration with Apache Kafka, visit Apache Kafka - Configuration Guide.
All z/IRIS clients must be granted access to SMF in-memory resources using SAF permissions. The RACFJCL text file is a RACF batch job to create a surrogate userid for the z/IRIS client started task with the required permissions for OMVS, SMF in-memory resources and MVS display commands.
Upload, customize and submit RACFJCL from the zIRISzOSClient.v%.%.%.zip installation package.
The settings detailed in the RACFJCL are not final, and some settings can be omitted. To ensure a problem free installation, consult your mainstorconcept Technical Professional regarding any changes to RACF permission in RACFJCL before proceeding with the installation.
zFS directory preparations ($APP_HOME)
Customize and run the following JCL example to create and mount a new zFS directory for z/IRIS in USS.
Sample JCL to create z/IRIS zFS directory
// JOB //* Create a z/IRIS zFS directory //CREATE EXEC PGM=BPXBATCH, // PARM='SH mkdir -p /usr/lpp/ziris' //* Create ZFS mount point for z/IRIS //DEFINE EXEC PGM=IDCAMS //SYSPRINT DD SYSOUT=* //SYSIN DD * DEFINE CLUSTER (NAME(hlq.ZIRIS.ZFS) - LINEAR CYL(200 50)) VOLUMES(xxxxxx) - /* //* Mount the z/IRIS directory //MOUNT EXEC PGM=IKJEFT01,DYNAMNBR=10 //SYSTSPRT DD SYSOUT=* //SYSTSIN DD * MOUNT FILESYSTEM('hlq.ZIRIS.ZFS') + MOUNTPOINT('/usr/lpp/ziris') + TYPE(ZFS) MODE(RDWR) /* AUTOMOVE */
Steps to install z/OS client package
Extract and upload (in binary mode) the zirisv%%.pax to the $APP_HOME directory on z/OS USS.
Unpack the file using the tar command:
pax -w[v]f zirisv1%%.paxBASH
Apply the authorized extended attribute to $APP_HOME/bin/CONSL001:
cd $APP_HOME/bin extattr +a ./CONSL001CODE
Make all commands in $APP_HOME/bin executable:
cd $APP_HOME/bin chmod +x ./*CODE