Prerequisites for networking

The various components within the z/OS system, the IBM® Z APM Connect Distributed Gateway (DG) machine, and the Instana backend use the Transmission Control Protocol/Internet Protocol (TCP/IP) for communication.

You must use the following ports if a Red Hat OpenShift route or proxy is not in use.

  • Ports to use from z/OS host components to IBM Z APM Connect DG machine:

    • Z APM Connect Base proc uses port 30455

    • CICS® TG server and z/OS Connect EE server use port 30090

  • Ports to use from IBM Z APM Connect DG machine to the Instana backend machine:

    • DG enables the serverless endpoint for communication with the Instana backend.

    • DG automatically assigns a port number while retrieving the serverless endpoint URL from the Instana User Interface.

Transport Layer Security

If you are using Transport Layer Security (TLS) you must consider the following:

  • Kafka and Connection Manager both use a Java style .jks keystore and truststore (including their password) to load certificates for TLS.

    • Each keystore must contain a private key and a matching certificate that the DG uses for connections.

    • Each truststore must contain the full trust chain of certificates that the DG uses to validate the contents of the keystore.

    Note:

    You can use the Java keytool to convert a pkcs12 keystore to .jks keystore format. For more information, see keytool and How to convert a p12 keystore to jks keystore.

  • You must use TLS v1.2 to connect the Z APM Connect Base to DG.