SlideShare a Scribd company logo
1 of 35
Insert
Custom
Session
QR if
Desired.
15884: Using Policies to Manage
Critical CICS Resources
Matthew Webster, IBM
Please Note
IBM’s statements regarding its plans, directions, and intent are subject to change
or withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general
product direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a
commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be incorporated
into any contract. The development, release, and timing of any future features or
functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM
benchmarks in a controlled environment. The actual throughput or performance
that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user’s job stream,
the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results
similar to those stated here.
2
CICS Cloud and CICS Tools Sessions
• Monday
– 15855: Modernizing CICS for Cloud
• Wednesday
– 15552: Modernizing CICS - Hands-on Lab Parts 1 & 2
– 15882: Managing Multi-version Applications in CICS
• Thursday
– 15883: CICS Futures Interactive Discussion
– 15884: Using Policies to Manage Critical CICS Resources
– 15559: CICS Question Box and Pot Luck
4
Topics
• CICS Platform
• CICS Threshold Policy
• CICS Tools
5
CICS Cloud “Toolbox”
• Artifacts like Platform that can be kept under version
control describe what the system should look like
• A RESTful, batch and online API to help automate
deployment and management
• The CICS Explorer UI for administration integrates
the CICS Tools and with source code management
• Monitoring Data allows you measure resource
consumption
• Creating Policy helps you enforce coding standards
throughout the application lifecycle and protect
production environments
6
CICS Platform
7
CICS Cloud Resources
• Application:
– Entry points: PROGRAM, URIMAP
– Resources: LIBRARY, OSGIBUNDLE, WEBSERVICE, …
– Dependencies: JVMSERVER, PIPELINE, …
• Binding
– Deployment rules
– Policy
– Resources: URIMAP, …
– Dependencies: TCPIPSERVICE
• Platform
– Topology
– Policy
– Services: FILE, JVMSERVER, PIPELINE,
TCPIPSERVICE
8
CICS Explorer: “CICS Cloud” Perspective
9
New in CICS TS V5.2: Platform Resources
• Resources
– FILE
– JVMSERVER (including Liberty)
– TCPIPSERVICE
– PIPELINE (web services)
• Example driven configuration
– JVM server profile
– pipeline configuration
• Configuration life-cycled with parent resource
– definition, configuration, …
– creation, collaboration, deployment
10
Create JVM Server Definition in a CICS Bundle
11
Monitoring
PlatformPlatform
ApplicationApplication
QueuesQueues
ApplicationsApplications
JavaApplicationsJavaApplications
FilesFiles DatabaseDatabase
TerminalsTerminals WebWeb
OperationOperation
SMFSMF
/Platform/Application/1/0/0/Operation
Dynamic routing by application context
• PROGRAM and URIMAP entry points set application context
• Application context available in addition to TRANID in
the following URMs:
– The CICS Dynamic Routing Exit Commarea
(DFHDYPDS)
– The CPSM User Service Program Commarea
(EYURWTRA)
– The CPSM WLM Router Access Program Commarea
(EYURWCOM)
13
CICS Threshold Policy
14
Real World Example: Phone Contract
200 free minutes
Unlimited text messages
500MB of data
“You have now used 80% of your data
allowance”
15
Rules and Policy
• Rules
– Resources: minutes, texts, data
– Threshold: 80%, 100%
– Action: message, change tariff
• Policy
– Collection of rules (contract)
16
17
Threshold Policy
• Policy Based Management
– Resource, threshold, and action
– Action can be:
• Emit a message
• Emit a system event
• Abend the task
• Scoped
• New resources in CICS TS V5.2
Define a PolicyDefine a Policy
Threshold
breach
Threshold
breach
CICS Triggers an actionCICS Triggers an action
Abend EventMessage
Trigger an actionTrigger an action
SQLSQL
FilesFiles
StorageStorage
CPUCPU An XML Policy document defines
the threshold and action
Policy Scoping
Application AApplication A
Platform PPlatform P
OperationOperation
Application BApplication B
OperationOperation OperationOperation
Binding A2PBinding A2P Binding B2PBinding B2P
OperationOperation
18
Policy Scoping: Platform
Application AApplication A
Platform PPlatform P
OperationOperation
Application BApplication B
OperationOperation OperationOperation
Binding A2PBinding A2P Binding B2PBinding B2P
OperationOperation
PolicyPolicy
19
Policy Scoping: Application
Application AApplication A
Platform PPlatform P
OperationOperation
Application BApplication B
OperationOperation OperationOperation
Binding A2PBinding A2P
PolicyPolicy
Binding B2PBinding B2P
OperationOperation
20
Policy Scoping: Operation
Application AApplication A
Platform PPlatform P
OperationOperation
Application BApplication B
OperationOperation OperationOperation
Binding A2PBinding A2P Binding B2PBinding B2P
OperationOperation
PolicyPolicy
21
Policy Scoping: Application Multi-Versioning
Application A 1.0.0Application A 1.0.0
Platform PPlatform P
OperationOperation
Application A 1.0.1Application A 1.0.1
OperationOperation OperationOperation
Binding A2P 1.0.0Binding A2P 1.0.0
Policy PPolicy P
Binding A2P 1.0.1Binding A2P 1.0.1
OperationOperation
Policy P’Policy P’Policy QPolicy Q Policy QPolicy Q
22
Policy Scoping: CICS Region
RegionRegion
TaskTask TaskTask TaskTask TaskTask
PolicyPolicy
Threshold Policies
• V5.1
– CPU time
– Storage requests & bytes
– SQL requests
– LINK requests
– FILE requests
• V5.2
– Elapsed time (RFE 31868 “Add elapsed time …”)
– TDQ requests & bytes
– TSQ requests & bytes
– START requests
– SYNCPOINT requests
24
2525
TS Queue bytes
 Trigger on amount
of data written
 Selection for
 Main and AUX
 Request is counted
whether the request
is successful or not
 Both local and
remote requests are
counted
25
DevOps: Using Policy Throughout the Application Life-
cycle
DEVDEV TESTTEST PRODPROD
development.Bindingdevelopment.Binding
ApplicationApplication ApplicationApplication
test.Bindingtest.Binding production.Bindingproduction.Binding
PolicyPolicyPolicyPolicyPolicyPolicy
26
27
System Events
 Capture events when:
– DB2 connection status changes
– FILE enable status changes
– FILE open status changes
– CICS message is issued
– Unhandled transaction abends
– Current active tasks for a TRANCLASS goes above or below a
certain percentage of MAXACTIVE
– Current active task in a region goes above or below a certain
percentage of MAXTASKs
System Event Examples
• Generate an alert whenever a connection from CICS
to DB2 is no longer in Connected status
• Emit events for all transaction classes when the
number of transactions in the tranclass goes below
50%, to understand which tranclasses are least used
(write the events to a TS queue, or monitor by
sending to IBM business monitor)
• Collect events about any changes in the open status
of the ‘CUSTOMER’ file, to ensure these happen
within the approved batch windows
28
• V4.2
– System events
• V5.1
– Application, Platform, Policy
– 1 Entry Point: PROGRAM
– 5 Thresholds: CPU time, Storage requests & bytes, ...
• V5.2
– Platform resources: JVMSERVER, PIPELINE,
TCPIPSERVICE,
– 2 Entry Points: PROGRAM, URIMAP
– 10 Thresholds: Elapsed time, TDQ requests & bytes, …
– Dynamic routing by application context
Summary
CICS Performance Analyzer
30
CICS Cloud perspective
Application Context performance summary
32
Delivered in CICS PA 5.1
Report forms to help with definition of policy
Name Type Description
MPFCRQ SUMMARY Platform - File Request Summary
MPMISC SUMMARY Platform - CPU/LINKs/DB2 Summary
MPSHRSTG SUMMARY Platform - Shared Stg Summary
MPT24STG SUMMARY Platform - 24-bit Stg Summary
MPT31STG SUMMARY Platform - 31-bit Stg Summary
MPT64STG SUMMARY Platform - 64-bit Stg Summary
MPTXCLST LIST Platform - Threshold Exceeded
MPTABND LIST Platform policy - Transaction Abend
New in CICS PA 5.2
Name Type Description
MPMISC1 SUMMARY Platform - Response/CPU Summary
MPMISC2 SUMMARY Platform - Misc Requests Summary
MPTDRQ SUMMARY Platform - TD Request Summary
MPTSRQ SUMMARY Platform - TS Request Summary
33
• V5.1
– Application, Platform, Policy
– 1 Entry Point: PROGRAM
– 5 Thresholds: CPU time, Storage requests & bytes, ...
• V5.2
– Platform resources: JVMSERVER, PIPELINE,
TCPIPSERVICE,
– 2 Entry Points: PROGRAM, URIMAP
– 10 Thresholds: Elapsed time, TDQ requests & bytes, …
– Dynamic routing by application context
Summary
Questions?
• Bloghttps
://www.ibm.com/developerworks/mydeveloperworks/blogs/cics
en
– Meet Abigail and Simon
– What is CICS Application Multi-versioning?
• Podcastshttp://www.ibm.com/software/os/systemz/podcasts/
websphereonz/
– Coming soon!
• Scenarioshttps://www-
01.ibm.com/support/knowledgecenter/#!/SSGMCP_5.1.0/com
.ibm.cics.ts.scenarios.doc/topics/Scenarios.html
– Scenario: Creating and deploying policies
More Information
Insert
Custom
Session
QR if
Desired.
15884: Using Policies to Manage
Critical CICS Resources
Matthew Webster, IBM

More Related Content

Viewers also liked

Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenariosnick_garrod
 
Ensayodecortedirecto 130826121403-phpapp01-1
Ensayodecortedirecto 130826121403-phpapp01-1Ensayodecortedirecto 130826121403-phpapp01-1
Ensayodecortedirecto 130826121403-phpapp01-1Yordi Dipas Ganboa
 
SHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitySHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitynick_garrod
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you nick_garrod
 
S105 performance
S105 performanceS105 performance
S105 performancenick_garrod
 
تحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌هاتحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌هابازآران
 
П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"Biblioteka-22
 
IBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid appsIBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid appsnick_garrod
 
Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.Biblioteka-22
 
3983 cics java real life projects
3983   cics java real life projects3983   cics java real life projects
3983 cics java real life projectsnick_garrod
 
Facebook - The Social Network
Facebook - The Social NetworkFacebook - The Social Network
Facebook - The Social Networkgeersb
 
4236 What Skills Issue? From the perspective of a Generation z CICS customer
4236   What Skills Issue? From the perspective of a Generation z CICS customer4236   What Skills Issue? From the perspective of a Generation z CICS customer
4236 What Skills Issue? From the perspective of a Generation z CICS customernick_garrod
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloudnick_garrod
 
Finding your Tinderella
Finding your TinderellaFinding your Tinderella
Finding your Tinderellazoebaron
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternitenick_garrod
 
InterConnect session 2819 1_billion_smart Phones
InterConnect session 2819  1_billion_smart PhonesInterConnect session 2819  1_billion_smart Phones
InterConnect session 2819 1_billion_smart Phonesnick_garrod
 
Change Detection Anno Domini 2016
Change Detection Anno Domini 2016Change Detection Anno Domini 2016
Change Detection Anno Domini 2016Artur Skowroński
 
20150522101718 歷代散文發展
20150522101718 歷代散文發展20150522101718 歷代散文發展
20150522101718 歷代散文發展kuok kuoklin
 

Viewers also liked (19)

Share multi versioning scenarios
Share  multi versioning scenariosShare  multi versioning scenarios
Share multi versioning scenarios
 
2829 liberty
2829 liberty2829 liberty
2829 liberty
 
Ensayodecortedirecto 130826121403-phpapp01-1
Ensayodecortedirecto 130826121403-phpapp01-1Ensayodecortedirecto 130826121403-phpapp01-1
Ensayodecortedirecto 130826121403-phpapp01-1
 
SHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalabilitySHARE 2014, Pittsburgh CICS scalability
SHARE 2014, Pittsburgh CICS scalability
 
S101 cics what's in it for you
S101   cics what's in it for you S101   cics what's in it for you
S101 cics what's in it for you
 
S105 performance
S105 performanceS105 performance
S105 performance
 
تحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌هاتحقیقات بازاریابی، اهداف و روش‌ها
تحقیقات بازاریابی، اهداف و روش‌ها
 
П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"П. Третьяков: "Галерея превыше всего…"
П. Третьяков: "Галерея превыше всего…"
 
IBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid appsIBM Impact Session 2351 hybrid apps
IBM Impact Session 2351 hybrid apps
 
Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.Поэзия обыденного. Серов В. А.
Поэзия обыденного. Серов В. А.
 
3983 cics java real life projects
3983   cics java real life projects3983   cics java real life projects
3983 cics java real life projects
 
Facebook - The Social Network
Facebook - The Social NetworkFacebook - The Social Network
Facebook - The Social Network
 
4236 What Skills Issue? From the perspective of a Generation z CICS customer
4236   What Skills Issue? From the perspective of a Generation z CICS customer4236   What Skills Issue? From the perspective of a Generation z CICS customer
4236 What Skills Issue? From the perspective of a Generation z CICS customer
 
S104 twist and cloud
S104 twist and cloudS104 twist and cloud
S104 twist and cloud
 
Finding your Tinderella
Finding your TinderellaFinding your Tinderella
Finding your Tinderella
 
S110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraterniteS110 gse - liberte egalite fraternite
S110 gse - liberte egalite fraternite
 
InterConnect session 2819 1_billion_smart Phones
InterConnect session 2819  1_billion_smart PhonesInterConnect session 2819  1_billion_smart Phones
InterConnect session 2819 1_billion_smart Phones
 
Change Detection Anno Domini 2016
Change Detection Anno Domini 2016Change Detection Anno Domini 2016
Change Detection Anno Domini 2016
 
20150522101718 歷代散文發展
20150522101718 歷代散文發展20150522101718 歷代散文發展
20150522101718 歷代散文發展
 

Similar to SHARE 2014, Pittsburgh Using policies to manage critical cics resources

2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in town2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in townnick_garrod
 
2844 inter connect cics policy (2844)
2844  inter connect cics policy (2844)2844  inter connect cics policy (2844)
2844 inter connect cics policy (2844)nick_garrod
 
Share cics policy (2844)
Share cics policy (2844)Share cics policy (2844)
Share cics policy (2844)nick_garrod
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIsCisco DevNet
 
Mainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataMainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataDevOps for Enterprise Systems
 
SHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloudSHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloudnick_garrod
 
Share 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical OverviewShare 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical Overviewnick_garrod
 
IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview nick_garrod
 
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...nick_garrod
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPOlivia LaMar
 
What's New in the Winter '16 Release (4.2)
What's New in the Winter '16 Release (4.2)What's New in the Winter '16 Release (4.2)
What's New in the Winter '16 Release (4.2)AppDynamics
 
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153	Enterprise Application to Infrastructure Integration – SDN AppsDEVNET-1153	Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN AppsCisco DevNet
 
CICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open betaCICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open betaMark Cocker
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)nick_garrod
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKSPhil Reay
 
MuleSoft Manchester Meetup #4 slides 11th February 2021
MuleSoft Manchester Meetup #4 slides 11th February 2021MuleSoft Manchester Meetup #4 slides 11th February 2021
MuleSoft Manchester Meetup #4 slides 11th February 2021Ieva Navickaite
 
IBM APM for Hybrid Applications
IBM APM for Hybrid ApplicationsIBM APM for Hybrid Applications
IBM APM for Hybrid ApplicationsMatthew Cheah
 
Enterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsEnterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsMiftakhZein1
 
IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018Chris Phillips
 

Similar to SHARE 2014, Pittsburgh Using policies to manage critical cics resources (20)

2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in town2844 CICS Policy Based Management – There’s a new sheriff in town
2844 CICS Policy Based Management – There’s a new sheriff in town
 
2844 inter connect cics policy (2844)
2844  inter connect cics policy (2844)2844  inter connect cics policy (2844)
2844 inter connect cics policy (2844)
 
Share cics policy (2844)
Share cics policy (2844)Share cics policy (2844)
Share cics policy (2844)
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 
Mainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live DataMainframe Application Testing both With and Without Live Data
Mainframe Application Testing both With and Without Live Data
 
SHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloudSHARE 2014 Pittsburgh, Modernizing cics for cloud
SHARE 2014 Pittsburgh, Modernizing cics for cloud
 
Share 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical OverviewShare 2014 Pittsburgh CICS Technical Overview
Share 2014 Pittsburgh CICS Technical Overview
 
IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview IBM Impact session CICS V52 overview
IBM Impact session CICS V52 overview
 
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
Session 6638 - The One-Day CICS Transaction Server Upgrade: Migration Conside...
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
 
What's New in the Winter '16 Release (4.2)
What's New in the Winter '16 Release (4.2)What's New in the Winter '16 Release (4.2)
What's New in the Winter '16 Release (4.2)
 
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153	Enterprise Application to Infrastructure Integration – SDN AppsDEVNET-1153	Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
 
CICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open betaCICS TS V4 and V5 recap, and the new V5.3 open beta
CICS TS V4 and V5 recap, and the new V5.3 open beta
 
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
Cics ts v4 and v5 recap, and the new cics ts v5.3 open beta (1)
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
Application Modernisation with PKS
Application Modernisation with PKSApplication Modernisation with PKS
Application Modernisation with PKS
 
MuleSoft Manchester Meetup #4 slides 11th February 2021
MuleSoft Manchester Meetup #4 slides 11th February 2021MuleSoft Manchester Meetup #4 slides 11th February 2021
MuleSoft Manchester Meetup #4 slides 11th February 2021
 
IBM APM for Hybrid Applications
IBM APM for Hybrid ApplicationsIBM APM for Hybrid Applications
IBM APM for Hybrid Applications
 
Enterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN AppsEnterprise Application to Infrastructure Integration - SDN Apps
Enterprise Application to Infrastructure Integration - SDN Apps
 
IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018IBM API Connect Deployment `Good Practices - IBM Think 2018
IBM API Connect Deployment `Good Practices - IBM Think 2018
 

More from nick_garrod

Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesnick_garrod
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)nick_garrod
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devopsnick_garrod
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudnick_garrod
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilitynick_garrod
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridgednick_garrod
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle libertynick_garrod
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_centernick_garrod
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSnick_garrod
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloudnick_garrod
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewnick_garrod
 
16370 cics project opening and project update f
16370  cics project opening and project update f16370  cics project opening and project update f
16370 cics project opening and project update fnick_garrod
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 
Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4nick_garrod
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soanick_garrod
 

More from nick_garrod (19)

Enhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilitiesEnhanced cics cloud enablement and dev ops capabilities
Enhanced cics cloud enablement and dev ops capabilities
 
Api management customer
Api management customerApi management customer
Api management customer
 
Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)Anz cics ts v5 technical update seminar intro (half day event)
Anz cics ts v5 technical update seminar intro (half day event)
 
S111 cics connectivity in devops
S111   cics connectivity in devopsS111   cics connectivity in devops
S111 cics connectivity in devops
 
S109 cics-java
S109 cics-javaS109 cics-java
S109 cics-java
 
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?
 
S107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloudS107 5 compelling reasons for using cics in the cloud
S107 5 compelling reasons for using cics in the cloud
 
S106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cicsS106 using ibm urban code deploy to deliver your apps to cics
S106 using ibm urban code deploy to deliver your apps to cics
 
S103 cics cloud and dev ops agility
S103 cics cloud and dev ops agilityS103 cics cloud and dev ops agility
S103 cics cloud and dev ops agility
 
S102 cics the future is closer abridged
S102 cics the future is closer abridgedS102 cics the future is closer abridged
S102 cics the future is closer abridged
 
Share seattle liberty
Share seattle libertyShare seattle liberty
Share seattle liberty
 
Share seattle health_center
Share seattle health_centerShare seattle health_center
Share seattle health_center
 
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICSSHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
SHARE Seattle 2015 Taming the Beast – Best Practices for zFS with CICS
 
Share seattle cics cloud
Share seattle cics cloudShare seattle cics cloud
Share seattle cics cloud
 
SHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overviewSHARE 2015 SeattleShare cics ts 52 technical overview
SHARE 2015 SeattleShare cics ts 52 technical overview
 
16370 cics project opening and project update f
16370  cics project opening and project update f16370  cics project opening and project update f
16370 cics project opening and project update f
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4Session 3 _exposing_mainframe_applications_services_v4
Session 3 _exposing_mainframe_applications_services_v4
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soa
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

SHARE 2014, Pittsburgh Using policies to manage critical cics resources

  • 1. Insert Custom Session QR if Desired. 15884: Using Policies to Manage Critical CICS Resources Matthew Webster, IBM
  • 2. Please Note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2
  • 3. CICS Cloud and CICS Tools Sessions • Monday – 15855: Modernizing CICS for Cloud • Wednesday – 15552: Modernizing CICS - Hands-on Lab Parts 1 & 2 – 15882: Managing Multi-version Applications in CICS • Thursday – 15883: CICS Futures Interactive Discussion – 15884: Using Policies to Manage Critical CICS Resources – 15559: CICS Question Box and Pot Luck 4
  • 4. Topics • CICS Platform • CICS Threshold Policy • CICS Tools 5
  • 5. CICS Cloud “Toolbox” • Artifacts like Platform that can be kept under version control describe what the system should look like • A RESTful, batch and online API to help automate deployment and management • The CICS Explorer UI for administration integrates the CICS Tools and with source code management • Monitoring Data allows you measure resource consumption • Creating Policy helps you enforce coding standards throughout the application lifecycle and protect production environments 6
  • 7. CICS Cloud Resources • Application: – Entry points: PROGRAM, URIMAP – Resources: LIBRARY, OSGIBUNDLE, WEBSERVICE, … – Dependencies: JVMSERVER, PIPELINE, … • Binding – Deployment rules – Policy – Resources: URIMAP, … – Dependencies: TCPIPSERVICE • Platform – Topology – Policy – Services: FILE, JVMSERVER, PIPELINE, TCPIPSERVICE 8
  • 8. CICS Explorer: “CICS Cloud” Perspective 9
  • 9. New in CICS TS V5.2: Platform Resources • Resources – FILE – JVMSERVER (including Liberty) – TCPIPSERVICE – PIPELINE (web services) • Example driven configuration – JVM server profile – pipeline configuration • Configuration life-cycled with parent resource – definition, configuration, … – creation, collaboration, deployment 10
  • 10. Create JVM Server Definition in a CICS Bundle 11
  • 12. Dynamic routing by application context • PROGRAM and URIMAP entry points set application context • Application context available in addition to TRANID in the following URMs: – The CICS Dynamic Routing Exit Commarea (DFHDYPDS) – The CPSM User Service Program Commarea (EYURWTRA) – The CPSM WLM Router Access Program Commarea (EYURWCOM) 13
  • 14. Real World Example: Phone Contract 200 free minutes Unlimited text messages 500MB of data “You have now used 80% of your data allowance” 15
  • 15. Rules and Policy • Rules – Resources: minutes, texts, data – Threshold: 80%, 100% – Action: message, change tariff • Policy – Collection of rules (contract) 16
  • 16. 17 Threshold Policy • Policy Based Management – Resource, threshold, and action – Action can be: • Emit a message • Emit a system event • Abend the task • Scoped • New resources in CICS TS V5.2 Define a PolicyDefine a Policy Threshold breach Threshold breach CICS Triggers an actionCICS Triggers an action Abend EventMessage Trigger an actionTrigger an action SQLSQL FilesFiles StorageStorage CPUCPU An XML Policy document defines the threshold and action
  • 17. Policy Scoping Application AApplication A Platform PPlatform P OperationOperation Application BApplication B OperationOperation OperationOperation Binding A2PBinding A2P Binding B2PBinding B2P OperationOperation 18
  • 18. Policy Scoping: Platform Application AApplication A Platform PPlatform P OperationOperation Application BApplication B OperationOperation OperationOperation Binding A2PBinding A2P Binding B2PBinding B2P OperationOperation PolicyPolicy 19
  • 19. Policy Scoping: Application Application AApplication A Platform PPlatform P OperationOperation Application BApplication B OperationOperation OperationOperation Binding A2PBinding A2P PolicyPolicy Binding B2PBinding B2P OperationOperation 20
  • 20. Policy Scoping: Operation Application AApplication A Platform PPlatform P OperationOperation Application BApplication B OperationOperation OperationOperation Binding A2PBinding A2P Binding B2PBinding B2P OperationOperation PolicyPolicy 21
  • 21. Policy Scoping: Application Multi-Versioning Application A 1.0.0Application A 1.0.0 Platform PPlatform P OperationOperation Application A 1.0.1Application A 1.0.1 OperationOperation OperationOperation Binding A2P 1.0.0Binding A2P 1.0.0 Policy PPolicy P Binding A2P 1.0.1Binding A2P 1.0.1 OperationOperation Policy P’Policy P’Policy QPolicy Q Policy QPolicy Q 22
  • 22. Policy Scoping: CICS Region RegionRegion TaskTask TaskTask TaskTask TaskTask PolicyPolicy
  • 23. Threshold Policies • V5.1 – CPU time – Storage requests & bytes – SQL requests – LINK requests – FILE requests • V5.2 – Elapsed time (RFE 31868 “Add elapsed time …”) – TDQ requests & bytes – TSQ requests & bytes – START requests – SYNCPOINT requests 24
  • 24. 2525 TS Queue bytes  Trigger on amount of data written  Selection for  Main and AUX  Request is counted whether the request is successful or not  Both local and remote requests are counted 25
  • 25. DevOps: Using Policy Throughout the Application Life- cycle DEVDEV TESTTEST PRODPROD development.Bindingdevelopment.Binding ApplicationApplication ApplicationApplication test.Bindingtest.Binding production.Bindingproduction.Binding PolicyPolicyPolicyPolicyPolicyPolicy 26
  • 26. 27 System Events  Capture events when: – DB2 connection status changes – FILE enable status changes – FILE open status changes – CICS message is issued – Unhandled transaction abends – Current active tasks for a TRANCLASS goes above or below a certain percentage of MAXACTIVE – Current active task in a region goes above or below a certain percentage of MAXTASKs
  • 27. System Event Examples • Generate an alert whenever a connection from CICS to DB2 is no longer in Connected status • Emit events for all transaction classes when the number of transactions in the tranclass goes below 50%, to understand which tranclasses are least used (write the events to a TS queue, or monitor by sending to IBM business monitor) • Collect events about any changes in the open status of the ‘CUSTOMER’ file, to ensure these happen within the approved batch windows 28
  • 28. • V4.2 – System events • V5.1 – Application, Platform, Policy – 1 Entry Point: PROGRAM – 5 Thresholds: CPU time, Storage requests & bytes, ... • V5.2 – Platform resources: JVMSERVER, PIPELINE, TCPIPSERVICE, – 2 Entry Points: PROGRAM, URIMAP – 10 Thresholds: Elapsed time, TDQ requests & bytes, … – Dynamic routing by application context Summary
  • 30. CICS Cloud perspective Application Context performance summary 32
  • 31. Delivered in CICS PA 5.1 Report forms to help with definition of policy Name Type Description MPFCRQ SUMMARY Platform - File Request Summary MPMISC SUMMARY Platform - CPU/LINKs/DB2 Summary MPSHRSTG SUMMARY Platform - Shared Stg Summary MPT24STG SUMMARY Platform - 24-bit Stg Summary MPT31STG SUMMARY Platform - 31-bit Stg Summary MPT64STG SUMMARY Platform - 64-bit Stg Summary MPTXCLST LIST Platform - Threshold Exceeded MPTABND LIST Platform policy - Transaction Abend New in CICS PA 5.2 Name Type Description MPMISC1 SUMMARY Platform - Response/CPU Summary MPMISC2 SUMMARY Platform - Misc Requests Summary MPTDRQ SUMMARY Platform - TD Request Summary MPTSRQ SUMMARY Platform - TS Request Summary 33
  • 32. • V5.1 – Application, Platform, Policy – 1 Entry Point: PROGRAM – 5 Thresholds: CPU time, Storage requests & bytes, ... • V5.2 – Platform resources: JVMSERVER, PIPELINE, TCPIPSERVICE, – 2 Entry Points: PROGRAM, URIMAP – 10 Thresholds: Elapsed time, TDQ requests & bytes, … – Dynamic routing by application context Summary
  • 34. • Bloghttps ://www.ibm.com/developerworks/mydeveloperworks/blogs/cics en – Meet Abigail and Simon – What is CICS Application Multi-versioning? • Podcastshttp://www.ibm.com/software/os/systemz/podcasts/ websphereonz/ – Coming soon! • Scenarioshttps://www- 01.ibm.com/support/knowledgecenter/#!/SSGMCP_5.1.0/com .ibm.cics.ts.scenarios.doc/topics/Scenarios.html – Scenario: Creating and deploying policies More Information
  • 35. Insert Custom Session QR if Desired. 15884: Using Policies to Manage Critical CICS Resources Matthew Webster, IBM