The document provides guidelines and commands for analyzing z/VM performance. It discusses processor, storage, paging, and server machine guidelines. Key performance metrics like CPU utilization, response time, and throughput are defined. Commands for monitoring load, queues, paging, storage, and more are listed. REORDMON is introduced as a tool for diagnosing reorder processing overhead.
Upgrade to IBM z/OS V2.4 technical actionsMarna Walle
Yes, "upgrade" is the new name for these traditional "migration" sessions! This is part one of a two-part session that will be of interest to System Programmers and their managers who are upgrading to z/OS 2.4 from either z/OS 2.2 or 2.3. It is strongly recommended that you review sessions for a complete upgrade picture.
The general availability date for z/OS V2.4 was September 30, 2019.
z/OS V2R2 Communications Server OverviewzOSCommserver
This presentation provides an overview of features in the upcoming z/OS V2R2 Communications Server. Features to be discussed include:
- Improved scalability with 64-bit support for the TCP/IP stack
- Shared Memory Communications over RDMA (SMC-R) adapter virtualization
- Security improvements such as AT-TLS and FTP support for TLS session reuse
- The ability to configure the TCP/IP stack via the IBM Configuration Assistant for z/OSMF
- Support for CICS transaction tracking
- TCP/IP autonomics enhancements
… and many more features!
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
The need to perform a DB2 log-based recovery of multiple objects is a very rare event, but statistically, it is more frequent than a true disaster recovery event (flood, fire, etc). Taking regular backups is necessary but far from sufficient for anything beyond minor application recovery. If not prepared, practiced and optimised, it can lead to extended application service downtimes – possibly many hours to several days. This presentation will provide many hints and tips on how to plan, design intelligently, stress test and optimise DB2 log-based recovery.
This is the planning part of a two-part session for system programmers and their managers who are planning on upgrading to z/OS V2.5. In part one, the focus is on preparing your current system for upgrading to either release. The system requirements to run and how to prepare your system for the upgrade are discussed. Part two covers the only upgrade details for upgrading to z/OS V2.5 from either V2.3 or V2.4. It is strongly recommended that you attend both sessions for an upgrade picture for z/OS V2.5.
The general availability date for z/OS V2.5 was for September 30, 2021.
Maintec Technologies provides affordable access to latest Mainframe infrastructure for development, training, additional short term capacity increases and outsourcing needs. Leverage our Mainframe infrastructure, without investing the time, expense and manpower it would take to build your own!.
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
This presentation shows how to position z/OS in preparing for the new IBM z16 server. This presentation contains the "must know" information to successfully IPL z/OS on IBM z16.
Upgrade to IBM z/OS V2.4 technical actionsMarna Walle
Yes, "upgrade" is the new name for these traditional "migration" sessions! This is part one of a two-part session that will be of interest to System Programmers and their managers who are upgrading to z/OS 2.4 from either z/OS 2.2 or 2.3. It is strongly recommended that you review sessions for a complete upgrade picture.
The general availability date for z/OS V2.4 was September 30, 2019.
z/OS V2R2 Communications Server OverviewzOSCommserver
This presentation provides an overview of features in the upcoming z/OS V2R2 Communications Server. Features to be discussed include:
- Improved scalability with 64-bit support for the TCP/IP stack
- Shared Memory Communications over RDMA (SMC-R) adapter virtualization
- Security improvements such as AT-TLS and FTP support for TLS session reuse
- The ability to configure the TCP/IP stack via the IBM Configuration Assistant for z/OSMF
- Support for CICS transaction tracking
- TCP/IP autonomics enhancements
… and many more features!
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
The need to perform a DB2 log-based recovery of multiple objects is a very rare event, but statistically, it is more frequent than a true disaster recovery event (flood, fire, etc). Taking regular backups is necessary but far from sufficient for anything beyond minor application recovery. If not prepared, practiced and optimised, it can lead to extended application service downtimes – possibly many hours to several days. This presentation will provide many hints and tips on how to plan, design intelligently, stress test and optimise DB2 log-based recovery.
This is the planning part of a two-part session for system programmers and their managers who are planning on upgrading to z/OS V2.5. In part one, the focus is on preparing your current system for upgrading to either release. The system requirements to run and how to prepare your system for the upgrade are discussed. Part two covers the only upgrade details for upgrading to z/OS V2.5 from either V2.3 or V2.4. It is strongly recommended that you attend both sessions for an upgrade picture for z/OS V2.5.
The general availability date for z/OS V2.5 was for September 30, 2021.
Maintec Technologies provides affordable access to latest Mainframe infrastructure for development, training, additional short term capacity increases and outsourcing needs. Leverage our Mainframe infrastructure, without investing the time, expense and manpower it would take to build your own!.
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
This presentation shows how to position z/OS in preparing for the new IBM z16 server. This presentation contains the "must know" information to successfully IPL z/OS on IBM z16.
Upgrade to zOS V2.5 - Planning and Tech Actions.pdfMarna Walle
This is a critical presentation for those that are upgrading from z/OS 3.1 from z/OS V2.4/V2.5. Using this presentation, you can see the planning activities and technical upgrade actions.
DB2 for z/OS - Starter's guide to memory monitoring and controlFlorence Dubois
DB2 for z/OS makes more and more use of REAL memory to improve performance and reduce cost. But if you don't carefully budget and monitor the use of REAL memory on your system, you could be putting your applications at risk. This presentation will go back to the basics and answer the most common questions about REAL memory management including: how does DB2 uses virtual and REAL memory? how to build a budget based on system settings and buffer pool sizes? how to size the LFAREA? what are the key performance indicators and how do I know I am running 'safely'? what can be done to protect the system?
SMC-D with IBM z13 and z13s Internal Shared Memory (ISM) provides a highly optimized intra-CPC communications.
SMC-D is expected to provide substantial performance, throughput, response time, and CPU consumption
benefits compared to standard TCP/IP communications over HiperSockets.
Esta apresentação tem como objetivo enfatizar a evolução tecnológica da plataforma mainframe com a implementação de novos recursos que permitem aumentar a eficiência do processamento com segurança, integridade, e redução de custo. Conheçam a revolução de se ganhar até 40% da capacidade de um processador utilizando simultaneous multi-threading em máquinas de última geração.
[오픈소스컨설팅] Red Hat ReaR (relax and-recover) Quick GuideJi-Woong Choi
본 문서는 RHEL에 내장된 재해복구솔루션 ReaR (Relax and Recover)를 이용하여 OS 영역의 데이터를 백업하고 복구하는 방법을 다루고 있습니다. ReaR는 iso를 비롯한 다양한 백업 데이터 포맷을 지원하나, 이 문서에서는 CD/DVD 미디어 반입/보관이 보안상 대부분 허용되지 않는 기업 환경에서도 원활히 사용할 수 있는 PXE boot를 지원하는 포맷으로 ReaR 백업 데이터를 생성하고 복구하는 방법만을 자세히 설명합니다.
Covers the basics of Direct Memory Access (DMA). Further to this, the generic Linux DMA engine is covered along with steps to initiate the DMA transfer
Challenges to build virtual machines
Performance isolation
Scheduling priority
Memory demand
Network traffic
Disk accesses
Support for various OS platforms
Small performance overhead
z/OS V2R3 Communications Server introduces HiperSockets Converged Interface (HSCI) support that provides the following benefits:
(1) Linux on z Systems Layer 2 and z/VM VSwitch Bridge Compatibility:
Clients prefer the administrative and operational advantages when configuring Linux guests with a single IP interface using a z System layer 2 configuration. The usability advantages are extended by the z/VM VSwitch bridge support allowing Linux guests to configure a single IP interface for HiperSockets providing both internal CPC and external LAN communications. The current z/OS HS support only provides layer 3 connectivity which is incompatible with this Linux and z/VM environment. The new z/OS V2R3 HSCI support resolves this issue by providing compatibility for both HS Layer 2 and Linux guests using HS with the z/VM VSwitch bridge.
(2) Improved ("hands free") HiperSockets Usability for z/OS Environments:
HSCI transparently "converges" a HS interface with your OSA interface providing transparent and dynamic access and usage of HS.
With the HSCI enhancement:
- Access to HS is achieved without requiring the z/OS network administrator to configure, provision, manage or operate a HS interface (e.g. an IP address is not required for HiperSockets).
- Relocating a z/OS instance to another CPC can be accomplished without making any HS definitions, changes or taking any operator actions to access HS on the new CPC. With HSCI your external LAN is "logically extended" within each CPC (over IQD) providing a single seamless LAN topology within your data center (i.e. the internal LAN is an extension of the external LAN). Once your OSA interface is restarted on the new CPC (z/OS location), your HSCI will dynamically be reestablished.
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
With the explosion of data volumes today, businesses are looking for ways to copy huge volumes of data very quickly – from seconds to minutes – with minimal disruption to the running of applications. In this presentation, you will hear about practical use cases for IBM FlashCopy technology in a Db2 for z/OS environment including non-disruptive data integrity checks, FlashCopy image copies allowing for instant restore, SHRLEVEL(CHANGE) consistent image copy backups, system-level backup and recovery. We will provide many hints and tips on how to set up your environment, share lessons learned from customer experience and address common pitfalls.
Upgrade to zOS V2.5 - Planning and Tech Actions.pdfMarna Walle
This is a critical presentation for those that are upgrading from z/OS 3.1 from z/OS V2.4/V2.5. Using this presentation, you can see the planning activities and technical upgrade actions.
DB2 for z/OS - Starter's guide to memory monitoring and controlFlorence Dubois
DB2 for z/OS makes more and more use of REAL memory to improve performance and reduce cost. But if you don't carefully budget and monitor the use of REAL memory on your system, you could be putting your applications at risk. This presentation will go back to the basics and answer the most common questions about REAL memory management including: how does DB2 uses virtual and REAL memory? how to build a budget based on system settings and buffer pool sizes? how to size the LFAREA? what are the key performance indicators and how do I know I am running 'safely'? what can be done to protect the system?
SMC-D with IBM z13 and z13s Internal Shared Memory (ISM) provides a highly optimized intra-CPC communications.
SMC-D is expected to provide substantial performance, throughput, response time, and CPU consumption
benefits compared to standard TCP/IP communications over HiperSockets.
Esta apresentação tem como objetivo enfatizar a evolução tecnológica da plataforma mainframe com a implementação de novos recursos que permitem aumentar a eficiência do processamento com segurança, integridade, e redução de custo. Conheçam a revolução de se ganhar até 40% da capacidade de um processador utilizando simultaneous multi-threading em máquinas de última geração.
[오픈소스컨설팅] Red Hat ReaR (relax and-recover) Quick GuideJi-Woong Choi
본 문서는 RHEL에 내장된 재해복구솔루션 ReaR (Relax and Recover)를 이용하여 OS 영역의 데이터를 백업하고 복구하는 방법을 다루고 있습니다. ReaR는 iso를 비롯한 다양한 백업 데이터 포맷을 지원하나, 이 문서에서는 CD/DVD 미디어 반입/보관이 보안상 대부분 허용되지 않는 기업 환경에서도 원활히 사용할 수 있는 PXE boot를 지원하는 포맷으로 ReaR 백업 데이터를 생성하고 복구하는 방법만을 자세히 설명합니다.
Covers the basics of Direct Memory Access (DMA). Further to this, the generic Linux DMA engine is covered along with steps to initiate the DMA transfer
Challenges to build virtual machines
Performance isolation
Scheduling priority
Memory demand
Network traffic
Disk accesses
Support for various OS platforms
Small performance overhead
z/OS V2R3 Communications Server introduces HiperSockets Converged Interface (HSCI) support that provides the following benefits:
(1) Linux on z Systems Layer 2 and z/VM VSwitch Bridge Compatibility:
Clients prefer the administrative and operational advantages when configuring Linux guests with a single IP interface using a z System layer 2 configuration. The usability advantages are extended by the z/VM VSwitch bridge support allowing Linux guests to configure a single IP interface for HiperSockets providing both internal CPC and external LAN communications. The current z/OS HS support only provides layer 3 connectivity which is incompatible with this Linux and z/VM environment. The new z/OS V2R3 HSCI support resolves this issue by providing compatibility for both HS Layer 2 and Linux guests using HS with the z/VM VSwitch bridge.
(2) Improved ("hands free") HiperSockets Usability for z/OS Environments:
HSCI transparently "converges" a HS interface with your OSA interface providing transparent and dynamic access and usage of HS.
With the HSCI enhancement:
- Access to HS is achieved without requiring the z/OS network administrator to configure, provision, manage or operate a HS interface (e.g. an IP address is not required for HiperSockets).
- Relocating a z/OS instance to another CPC can be accomplished without making any HS definitions, changes or taking any operator actions to access HS on the new CPC. With HSCI your external LAN is "logically extended" within each CPC (over IQD) providing a single seamless LAN topology within your data center (i.e. the internal LAN is an extension of the external LAN). Once your OSA interface is restarted on the new CPC (z/OS location), your HSCI will dynamically be reestablished.
Db2 for z/OS and FlashCopy - Practical use cases (June 2019 Edition)Florence Dubois
With the explosion of data volumes today, businesses are looking for ways to copy huge volumes of data very quickly – from seconds to minutes – with minimal disruption to the running of applications. In this presentation, you will hear about practical use cases for IBM FlashCopy technology in a Db2 for z/OS environment including non-disruptive data integrity checks, FlashCopy image copies allowing for instant restore, SHRLEVEL(CHANGE) consistent image copy backups, system-level backup and recovery. We will provide many hints and tips on how to set up your environment, share lessons learned from customer experience and address common pitfalls.
Your Linux AMI: Optimization and Performance (CPN302) | AWS re:Invent 2013Amazon Web Services
Your AMI is one of the core foundations for running applications and services effectively on Amazon EC2. In this session, you'll learn how to optimize your AMI, including how you can measure and diagnose system performance and tune parameters for improved CPU and network performance. We'll cover application-specific examples from Netflix on how optimized AMIs can lead to improved performance.
VMworld 2013: How SRP Delivers More Than Power to Their Customers VMworld
VMworld 2013
Sheldon Brown, SRP
Girish Manmadkar, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
VMworld 2015: Extreme Performance Series - vSphere Compute & MemoryVMworld
In this session we'll dive deep into how the vSphere compute and memory schedulers work to provide the same level of performance as bare metal. Hosted by two outstanding performance engineers, they will review concepts like how and when vSphere schedules vCPUs, how virtual machines are idles, understand virtual machine memory overhead and how large memory pages help or hurt performance. If you want to understand what vSphere does at an atomic level you don't want to miss this advanced session.
POLYTEDA LLC, a provider of semiconductor design software and PV-services announced the general availability of PowerDRC/LVS version 2.2.
This release is dedicated to delivering fill layer generation for multi-CPU mode, new KLayout integration functionality and other significant improvements for multi-CPU mode
Slow things down to make them go faster [FOSDEM 2022]Jimmy Angelakos
Talk from FOSDEM 2022
It's easy to get misled into overconfidence based on the performance of powerful servers, given today's monster core counts and RAM sizes. However, the reality of high concurrency usage is often disappointing, with less throughput than one would expect. Because of its internals and its multi-process architecture, PostgreSQL is very particular about how it likes to deal with high concurrency and in some cases it can slow down to the point where it looks like it's not performing as it should. In this talk we'll take a look at potential pitfalls when you throw a lot of work at your database. Specifically, very high concurrency and resource contention can cause problems with lock waits in Postgres. Very high transaction rates can also cause problems of a different nature. Finally, we will be looking at ways to mitigate these by examining our queries and connection parameters, leveraging connection pooling and replication, or adapting the workload.
Topics:
1. Understand what we mean by high concurrency.
2. Understand ACID & MVCC in Postgres.
3. Understand how high concurrency affects Postgres performance.
4. Understand how locks/latches affect Postgres performance.
5. Understand how high transaction rates can affect Postgres.
6. Mitigation strategies for high concurrency scenarios.
Slides from Android Builder's Summit 2014 in San Jose, CA
The 4.4 KitKat release includes the results of “Project Svelte”: a set of tweaks to the operating system to make it run more easily on devices with around 512 MiB RAM. This is likely to be especially important for people working with “Embedded Android”, that is, implementing Android on devices that are not smart phones or tablets.
Velocity Conference NYC 2014 - Real World DevOpsRodrigo Campos
In a world where agility has become a requirement, business and engineering demands have decreed the death of the “Department of No”. This talk will cover the journey of an IT Operations department from a single DevOps team to a business-wide cultural shift that has affected the way people interact and work with each other.
In order to make sure that our DevOps initiative would be successful, we needed to make changes to the corporate organization, rearrange teams and roles in several areas, and make sure that everyone fully understand where we were being headed to.
All these steps will be covered in this talk that will demonstrate some common pitfalls and misconceptions that jeopardize the DevOps adoption, particularly in large enterprises with several compliancy requirements and some outdated bureaucracy.
DevOps has become a broad term that is frequently misunderstood. This presentation, originally made to Walmart GeC Brazil Operations teams, aimed at explaining the basic aspects of DevOps and how its adoption can help us to become more agile.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
3. 3
Definition of Performance
• Performance definitions:
– Response time
– Batch elapsed time
– Throughput
– Resource consumed per unit of work done
– Utilization
– Users supported
– Phone ringing
– Consistency
• All of the above
5. 5
Processor Guidelines
• Dedicated processors - mostly political
– Absolute share can be almost as effective
– Gets wait state assist and 500 ms minor time slice
– Perhaps not a good idea if you are CPU-constrained
– A virtual machine should have all dedicated or all shared processors
• Share settings
– Use absolute if you can judge percent of resources required
– Use relative if difficult to judge and if lower share as system load increases is
acceptable
– Be aware that share value is split by vCPUs
– Do not use LIMITHARD settings unnecessarily
• Masks looping users
• More scheduler overhead
• Use the right number of virtual processors for the guest's workload
• Don’t share all available IFLs to all LPARs
– Suspend Time can be high
6. 6
Storage Guidelines
Virtual-to-real ratio should be <= 3:1 or make sure paging system is robust
– To avoid any performance impact for production workloads, you may need to keep ratio to 1:1
– See also http://www.vm.ibm.com/perf/tips/memory.html
– VIR2REAL EXEC (Bruce Hayden)
http://www.vm.ibm.com/download/packages/descript.cgi?VIR2REAL
Define some processor storage as expanded storage to provide paging hierarchy
– For more background, see http://www.vm.ibm.com/perf/tips/storconf.html
Size guests appropriately
– Avoiding over provisioning
– Do not put them in a high guest paging position
– Right-sized usually means "just barely swapping"
Exploit shared memory where possible
– IPL your Linux guests from a segment
– Use the Linux XIP (execute-in-place) file system
Total Virtual storage (all logged on userids): 388308 MB (379.2 GB)
Usable real storage (pageable) for this system: 202927 MB (198.2 GB)
Total LPAR Real storage: 204800 MB (200.0 GB)
Expanded storage usable for paging: 25600 MB ( 25.0 GB)
Total Virtual disk (VDISK) space defined: 50176 MB ( 49.0 GB)
Average Virtual disk size: 512 MB
Virtual + VDISK to Real storage ratio: 2.2 : 1
7. 7
Paging Guidelines
• DASD paging allocations less than or equal to 50%
– QUERY ALLOC PAGE
• Watch blocks read per paging request (keep >10)
– Long block runs make paging I/O efficient
• Multiple volumes and multiple paths
– Remember, one I/O per real device at a time
– Use lots of little volumes rather than a few big volumes
– Pay attention in Response Time and Wait Queues
• Do not mix sizes of paging DASD
– Use all -3s, or all -9s, or whatever
• Paging to FCP SCSI (EDEVICES) may offer higher paging bandwidth with
higher processor requirements
– See also http://www.vm.ibm.com/perf/tips/prgpage.html
8. 88
Reorder Processing - Background
• Page reorder is the process in z/VM of managing
user frame owned lists as input to demand scan
processing.
– It includes resetting the HW reference bit.
– Serializes the virtual machine (all virtual processors).
– In all releases of z/VM
• It is done periodically on a virtual machine basis.
• The cost of reorder is proportional to the number
of resident frames for the virtual machine.
– Roughly 130 ms/GB resident
– Delays of ~1 second for guest having 8 GB resident
– This can vary for different reasons +/- 40%
9. 9
9
Reorder Processing - Diagnosing
Performance Toolkit
– Check resident page fields (“R<2GB” & “R>2GB”) on
FCX113 UPAGE report
• Remember, Reorder works against the resident pages, not total
virtual machine size.
– Check Console Function Mode Wait (“%CFW”) on
FCX114 USTAT report
• A virtual machine may be brought through console function mode to
serialize Reorder. There are other ways to serialize for Reorder and
there are other reasons that for CFW, so this is not conclusive.
REORDMON
– Available from the VM Download Page
http://www.vm.ibm.com/download/packages/
– Works against raw MONWRITE data for all monitored
virtual machines
– Works in real time for a specific virtual machine
– Provides how often Reorder processing occurs in each
monitor interval
11. 11
11
Reorder Processing - Mitigations
• Try to keep the virtual machine as small as possible.
• Virtual machines with multiple applications may need to be
split into multiple virtual machines with fewer applications.
• See http://www.vm.ibm.com/perf/tips/reorder.html for more
details.
• Apply APAR VM64774 if necessary:
– SET and QUERY commands, system wide settings
– Corrects problem in earlier “patch” solution that inhibits paging of
PGMBKs (Page Tables) for virtual machines where Reorder is set
off.
– z/VM 5.4.0 PTF UM33167 RSU 1003
– z/VM 6.1.0 PTF UM33169 RSU 1003
12. 12
Minidisk Cache Guidelines
• In general, enable MDC for everything
• Configure some real storage for MDC
• Set maximum MDC limits
– SET MDC STOR 0M 256M and SET MDC XSTOR 0M 0M
• Disable MDC for
– Write-mostly or read-once disks (logs, accounting, Linux swap)
– Target volumes in backup scenarios
• Better performer than Virtual Disk in Storage (VDISK) for read I/Os
13. 13
Server Machine Guidelines
• Server Virtual Machine (SVM)
• TCP/IP, RACFVM, etc.
• QUICKDSP ON to avoid eligible list
• Higher SHARE setting
• Ensure performance data includes these virtual
machines
14. 14
CP INDICATE Command
• LOAD: shows total system load
– Processors, XSTORE, paging, MDC, queue lengths, storage load
– STORAGE value not very meaningful
• USER EXP: more useful than plain USER
• QUEUES EXP: great for scheduler problems and quick state sampling
– Mostly useful for eligible list assessments
• PAGING: lists users in page wait
• I/O: lists users in I/O wait
• ACTIVE: displays number of active users over given interval
• Consider using MONITOR DATA instead for "serious" examinations
16. 16
Selected CP QUERY Commands
USERS: number and type of users on system
SRM: scheduler/dispatcher settings (LDUBUF, etc.)
SHARE: type and intensity of system share
FRAMES: real storage allocation
PATHS: physical paths to device and status
ALLOC MAP: DASD allocation
ALLOC PAGE: how full your paging space is
XSTORE: assignment of expanded storage
MONITOR: current monitor settings
MDC: MDC usage
VDISK: virtual disk in storage usage
SXSPAGES: System Execution Space
17. 17
5,000 Foot View
CP Control
Blocks
Application
Data
VM Events
*MONITOR System Service
MONDCSS
Segment
MONWRITE Utility
Performance
Toolkit
Raw
Monwrite
History
Files
TCP/IP
Network
3270
Browser
VMRM
22. 22
REPORT NAME REPORT CODE COMMAND
Auxiliary Storage Log FCX146 AUXLOG
CP Owned Device FCX109 DEVICE CPOWNED
User Page Data FCX113 UPAGE
Shared Data Spaces FCX134 DSPACESH
SXS Available Page Queues Mgnt FCX261 SXSAVAIL
Mini Disk Storage FCX178 MDCSTOR
Storage Utilization FCX103 STORAGE
Available List Log FCX254 AVAILLOG
Storage
23. 23
FCX109 Run 2011/05/31 17:44:26 DEVICE CPOWNED
Load and Performance of CP Owned Disks
From 2011/05/12 16:48:41 To 2011/05/12 17:31:41
For 2580 Secs 00:43:00 Result of 20110512 Run
_______________________________________________________________________________
Page / SPOOL Allocation Summary
PAGE slots available 25165k SPOOL slots available 3605928
PAGE slot utilization 25% SPOOL slot utilization 65%
T-Disk cylinders avail. ....... DUMP slots available 0
T-Disk space utilization ...% DUMP slot utilization ..%
. . . . . . . . . . _____ . .<
Device Descr. -> <------------- Rate/s -------------> User Serv MLOAD
Volume Area Area Used <--Page---> <--Spool--> SSCH Inter Queue Time Resp
Addr Devtyp Serial Type Extent % P-Rds P-Wrt S-Rds S-Wrt Total +RSCH feres Lngth /Page Time
EDF1 9336 ZDPAG1 PAGE 12583k 25 196.5 199.9 ... ... 396.4 .0 0 8.18 5.5 88.0
EDF2 9336 ZDPAG2 PAGE 12583k 24 194.2 206.1 ... ... 400.4 .0 0 7.23 6.0 58.4
4374 3390 610SP1 SPOOL 802880 61 .0 .0 .0 .0 .0 .1 0 0 .4 .4
4672 3390 610SP2 SPOOL 803060 68 .0 .0 .0 .0 .0 .0 0 0 1.0 1.0
24. 24
I/O
REPORT NAME REPORT CODE COMMAND
General I/O Device FCX108 DEVICE
SCSI Device FCX249 SCSI
DASD Performance Log FCX131 DEVCONF
FICON Channel Load FCX215 INTERIM FCHANNEL
General I/O Device Data Log FCX168 DEVLOG
I/O Processor Log FCX232 IOPROCLG
25. 25
Studying MONWRITE Data
• z/VM Performance Toolkit
• Interactively – possible, but not so useful
• PERFKIT BATCH command – pretty useful
– Control files tell Perfkit which reports to produce
– You can then inspect the reports by hand or
programmatically
• See z/VM Performance Toolkit Reference for
information on how to use PERFKIT BATCH
• PRFIT (Brian Wade)
http://www.vm.ibm.com/download/packages/descript.cgi?PRFIT
26. 26
26
Some Notes on z/VM Limits
• Sheer hardware:
– z/VM 5.2: 24 engines, 128 GB real
– z/VM 5.3: 32 engines, 256 GB real
– zSeries: 65,000 I/O devices
• Workloads we’ve run in test have included:
– 54 engines
– 440 GB real storage
– 128 GB XSTORE
– 240 1-GB Linux guests
– 8 1-TB guests
• Utilizations we routinely see in customer
environments
– 85% to 95% CPU utilization without worry
– Tens of thousands of pages per second without
worry
• Our limits tend to have two distinct shapes
– Performance drops off slowly with utilization (CPUs)
– Performance drops off rapidly when wall is hit
(storage)
Performance
Utilization
Precipitous (e.g., storage)
Gradual (e.g., CPUs)
27. 27
Some Final Thoughts
• Define what is performance for your case
• Collect data for a base line of good
performance
• Implement change management process
• Make as few changes as possible at a time
• Relieving one bottleneck will reveal another