MQ – Using Containers

MQ Technical Conference.  September 2018.  Powerpoint.
MQ, IIB, Docker, Kubernetes, & the IBM Cloud“  (40 slides).

View the Presentation

This Conference presentation provides an overview of the impact of deploying IBM MQ and IBM Integration Bus into the Cloud using Containers.  The presentation first provides an overview of the IBM Cloud software stack relevant to Containers: Docker, Kubernetes, Helm, and Istio.  The presentation then goes on to describe the Open Systems Interconnection (OSI) reference model and its seven layers.  The impact of the OSI model upon containerization is then discussed in terms of Application developers, MQ administrators, and Network engineers.  Finally, the challenges inherent in deploying a MQ network, as opposed to a stand-alone Queue Manager, into one or more Containers are reviewed.

By the end of the presentation, the viewer should have a basic understanding of the Cloud software stack and the purpose and use of Containers.  The viewer should also have an awareness of the OSI software stack model and the implications of placing non-Application layer components into a Container.

MQ – Security

MQ Technical Conference.  September 2018.  Powerpoint.
MQ Security:  A Holistic Approach“  (46 slides).

View the Presentation

This Conference presentation first provides an overview of essential security concepts:  Entities, Identities, Authentication, Authorization, and Audit.  The presentation then goes on to describe how these concepts map to MQ features.  MQ security capabilities covered include SSL/TLS processing, Connection Authentication, Channel Authentication, Object Access Manager (OAM), Security Exits, Advanced Message Security (AMS), Event Queues, and Logs.  All MQ capabilities discussed are mapped back to the essential security concepts that they support.

The available MQ security features are then described in the context of both local Applications (Server Bindings) and Client Connections using TCP/IP (Client Bindings).  Finally, this presentation places MQ security within a larger context.  Additional MQ issues impacting security (Clustering, Triggering, and Command Server) are covered.  Finally,  external security issues such as physical security, enterprise Single Sign-On (SSO), Operating System and file system security, are mentioned to define the context within which MQ security exits.

This presentation is designed to provide an overview of MQ security and to create a framework in which the individual MQ security features can be analyzed and implemented.  Each of the individual security features covered could be, and already have been, individual presentations in their own right.  By the end of the presentation, the viewer should have a basic understanding of security concepts, the MQ features available to implement those concepts, and the way in which the various features can be configured to implement the required security.

MQ – Performance Benchmarking

MQ Technical Conference.  September 2017.  Powerpoint.
MQ Performance Benchmarking“  (69 slides).

View the Presentation

This Conference presentation first reviews the methodology for benchmarking the performance of a MQ infrastructure.  The presentation then covers, in depth, the tools available for performing that benchmark.  The tools covered include:

  • “q” program (formerly SupportPac MA01 by Paul Clarke)
  •  xmqqstat (SupportPac MH04)
  •  PerfHarness (IBM Lab developed tool)
  •  PerfRating (IBM Lab developed tool)
  •  amqsrua program
  •  amqsmon program
  • “top” command (UNIX)
  •  PerfMon (Windows)

By the end of the presentation, the viewer should have a basic understanding of the tools available, and their capabilities, to develop MQ infrastructure benchmark data.

MQ – How MFT uses MQ

MQ Technical Conference.  September 2017.  Powerpoint.
MQ & MFT: How they Work in Tandem“  (53 slides).

View the Presentation

This Conference presentation provides an overview of how the IBM MQ Managed File Transfer (MFT) product uses MQ.  An overview of the MFT product architecture is presented first.  Then the MFT use of MQ Queue Managers, Queues, and Topics are all covered in detail.  Communications between the various MFT components  (Java Agents,  Java Logger, Command Line shells, and Queue Managers) is reviewed.  The specific Queues used by MFT agents, as well as the MQ Topic tree, are discussed in detail.  Finally, both MFT commands and security are discussed.

This presentation provides both an in-depth look at how MFT uses MQ resources and capabilities as well as an example of how a software Application can leverage those capabilities.  The viewer should come away with both a deeper understanding of the capabilities of the MQ product and also how those capabilities can be leveraged to support real world solutions.  Many of the MQ product capabilities are illustrated in the MFT product offering, so an understanding of how MFT uses MQ can carry over into understanding how MQ can support other software Applications.

By the end of the presentation, the viewer should have a basic understanding of the Managed File Transfer product architecture, the MQ components supporting that architecture, and MFT’s overall use of the MQ infrastructure.  This presentation should enable an MQ administrator to begin to provide support and analysis for an MFT installation.

In memory of David Van Doren, who was killed in 2018.  RIP, dear friend and colleague.  

MQ – SSL/TLS Certificate Management

MQ Technical Conference.  September 2015.  Powerpoint presentation.
IBM MQ – SSL/TLS Certificate Management“  (55 slides).

View the Presentation

This presentation provides an overview of the lifecycle of both Personal and Signer x.509 certificates and then provides detailed examples of both Keystore and Certificate processing.  The entire Certificate lifecycle, from request to deployment, is covered and illustrated using screenshots from the IBM iKeyMan tool.  Finally, the tools available for Certificate management are identified.

By the end of the presentation, the viewer should have a basic understanding of the data content and Signing chain of an x.509 certificate as well as the lifecycle for a Certificate.  The viewer should be prepared to begin managing x.509 certificates in order to support MQ SSL/TLS channel processing.

MQ – SOA, Services, APIs, and MQ

MQ Technical Conference.  September 2015.  Powerpoint presentation.
IBM MQ – SOA, Services, and APIs“  (37 slides).

View the Presentation

This presentation covers the use of MQ to support Services and Application Programming Interfaces (APIs) in a Service Oriented Architecture (SOA).  The presentation covers basic software design principles (Loose Coupling, High Cohesion) and provides a summary of the SOA architecture and its principles. In particular, the presentation covers the role MQ plays in the Enterprise Service Bus (ESB) architecture.

By the end of the presentation, the viewer should have an understanding of the fundamental software design principles, of SOA architecture and how it is built upon those principles, and the key role MQ plays in the SOA Enterprise Service Bus.

MQ – “Golden Image” Queue Managers

MQ Technical Conference.  September 2014.  Powerpoint presentation.
IBM MQ – “Golden Image” Queue Managers“  (33 slides).

View the Presentation

This presentation covers the creation of standardized Queue Managers.  These Queue Managers are to be built as copies of a “Golden Image”.  The automation of this creation process, the custom configuration that should be considered, and the supporting tools that may need to be deployed are all covered in this presentation.

By the end of the presentation, the viewer should have an understanding of how to define a “Golden Image” and how to automate the Queue Manager build and configuration process based upon the “Golden Image”.