Skip to Main Content
IBM Power Ideas Portal


This portal is to open public enhancement requests against IBM Power Systems products, including IBM i. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Delivered
Workspace AIX
Created by Guest
Created on Nov 20, 2017

Splitting Up Dumps into Confidential and Non-Confidential Data

Swiss banking laws do not allow access to bank customer data from abroad. For this reason it is not possible to send dumps outside of Switzerland for analysis by Labs in other countries. We would like a solution whereby dumps can be split up, ensuring that only the technical/metadata (non-customer data) part of the dump can be extracted and sent to the global support teams located outside of Switzerland.

Idea priority High
  • Guest
    Reply
    |
    Oct 21, 2021

    Available in the December 2021 GA of AIX 7.3

  • Guest
    Reply
    |
    Apr 2, 2019

    This would be really beneficial for meeting other requirements like GDPR, health care data protection.
    E.g. would it be possible to map IP addresses collected to a 10. range and write the mapping information to a file that is not transferred to IBM? IBM could analyze the data. If the IP address is important to solve the issue, the client could look into the mapping table.
    Same would be required for MAC addresses, directory listing (non default directories), file names, content of passwd, etc.
    This would solve many of the issues we are facing today because cleaning an existing dump does not work.

  • Guest
    Reply
    |
    Mar 27, 2018

    Yes it's quite difficult to define "Confidential" and "Customer Data" in the first place. The approach to give the user a config file where he can define which snap/dump data gets zipped for further investigation would help a lot, as it's nothing that the vendor can and should decide. The customer (we) are the ones who can and should decide what information can be passed along. Examples od data that would need to be configurable: Users, IP,hosts,network,binary dumps(Memory by user space if possible).

  • Guest
    Reply
    |
    Mar 26, 2018

    I think before we can talk about if/how/when we can do this, we need to understand more about what exactly we want have here. The following questions need answers:
    -- What exactly will be the definition of "confidential" or "customer data"?
    -- Who is going to decide that? Should IBM provide some sort of configuration file where the system admin goes and says: this and this is confidential data.
    -- Now dump contains the memory pages of programs running on the system which can also come under this "confidential" category. So if there is an issue with that program itself which needs the program data to be debugged, still should dump capture it or not?
    -- Whatever dump captures as of now, all are important data and can become crucial for a particular issue to be debugged. The problem is, one cannot know which data is important from a particular issue point of view before starting to actually debug. So if it turns out that dump is missing some required data due to "confidentiality" feature, will that be acceptable?