No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy Matthew Webster IBM © 2014 IBM Corporation.
Download ReportTranscript No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy Matthew Webster IBM © 2014 IBM Corporation.
No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy Matthew Webster IBM © 2014 IBM Corporation Please Note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2 Abstract CICS V5 introduces significant capability to help manage CICS as a private cloud. The Platform definition can monitor the health of shared services and maintain consistency across regions simplifying application deployment while threshold policies can protect production systems against rogue applications by enforcing coding standards throughout the development lifecycle. See how to use these new resources in conjunction with existing facilities including CICS Monitoring and tools like CICS PA to manage and measure the health of your CICS environment. This session will cover recent enhancements to CICS including support for deploying and managing shared services such as TCP/IP connectivity, web services resources and Java runtimes as part of a Platform. Customers using workload management will discover how Application context information can now assist with dynamic routing. We will also describe the new threshold policies. 3 Cloud and Tools Sessions Monday • 1699 CICS TS V5.2 Technical Overview Tuesday • 2416 Business value of creating a CICS cloud • 1985 Why talk to your colleagues? • 1961 No rainclouds here ! Thursday • 2377 Mainframe isn't too heavy for the cloud 4 Topics CICS Platform CICS Threshold Policy CICS Tools 5 CICS Cloud “Toolbox” Artifacts like Platform that can be kept under version control describe what the system should look like A RESTful, batch and online API to help automate deployment and management The CICS Explorer UI for administration integrates the CICS Tools and with source code management Monitoring Data allows you measure resource consumption Creating Policy helps you enforce coding standards throughout the application lifecycle and protect production environments 6 CICS PLATFORM 7 CICS Cloud Resources Application: • Entry points: PROGRAM, URIMAP • Resources: LIBRARY, OSGIBUNDLE, WEBSERVICE, … • Dependencies: JVMSERVER, PIPELINE, … Binding • • • • Deployment rules Policy Resources: URIMAP, … Dependencies: TCPIPSERVICE Platform • Topology • Policy • Services:FILE, JVMSERVER, PIPELINE, TCPIPSERVICE 8 CICS Explorer: “CICS Cloud” Perspective 9 New in CICS TS V5.2: Platform Resources Resources • • • • FILE JVMSERVER (including Liberty) TCPIPSERVICE PIPELINE (web services) Example driven configuration • JVM server profile • pipeline configuration Configuration life-cycled with parent resource • definition, configuration, … • creation, collaboration, deployment 10 Create JVM Server Definition in a CICS Bundle 11 Monitoring Application Operation /Platform/Application/1/0/0/Operation Platform Queues Terminals Web Applications JavaApplications Files Database SMF 12 Dynamic routing by application context PROGRAM and URIMAP entry points set application context Application context available in addition to TRANID in the following URMs: • The CICS Dynamic Routing Exit Commarea (DFHDYPDS) • The CPSM User Service Program Commarea (EYURWTRA) • The CPSM WLM Router Access Program Commarea (EYURWCOM) 13 CICS THRESHOLD POLICY 14 Real World Example: Phone Contract 200 free minutes Unlimited text messages 500MB of data “You have now used 80% of your data allowance” 15 Rules and Policy Rules • Resources: • Threshold: • Action: minutes, texts, data 80%, 100% message, change tariff Policy • Collection of rules (contract) 16 Threshold Policy Policy Based Management • Resource, threshold, and action • Action can be: – Emit a message – Emit a system event – Abend the task Scoped New resources in CICS TS V5.2 Define a Policy Trigger an action CICS Triggers an action SQL Files Threshold breach Abend Storage CPU Message Event An XML Policy document defines the threshold and action 17 Policy Scoping Operation Operation Operation Operation Application A Application B Binding A2P Binding B2P Platform P 18 Policy Scoping: Platform Operation Operation Operation Operation Application A Application B Binding A2P Binding B2P Platform P Policy 19 Policy Scoping: Application Operation Operation Operation Operation Application A Application B Binding A2P Binding B2P Policy Platform P 20 Policy Scoping: Operation Operation Operation Operation Operation Application A Application B Binding A2P Binding B2P Policy Platform P 21 Policy Scoping: Application Multi-Versioning Operation Operation Operation Operation Application A 1.0.0 Application A 1.0.1 Binding A2P 1.0.0 Binding A2P 1.0.1 Policy P Policy P’ Policy Q Platform P 22 Policy Q Threshold Policies V5.1 • • • • • CPU time Storage requests & bytes SQL requests LINK requests FILE requests V5.2 • • • • • Elapsed time (RFE 31868 “Add elapsed time …”) TDQ requests & bytes TSQ requests & bytes START requests SYNCPOINT requests 23 TS Queue bytes Trigger on amount of data written Selection for Main and AUX Request is counted whether the request is successful or not Both local and remote requests are counted 24 24 DevOps: Using Policy Throughout the Application Life-cycle Application development.Binding Policy DEV Application test.Binding Policy TEST 25 production.Binding Policy PROD System Events Capture events when: – DB2 connection status changes – FILE enable status changes – FILE open status changes – CICS message is issued – Unhandled transaction abends – Current active tasks for a TRANCLASS goes above or below a certain percentage of MAXACTIVE – Current active task in a region goes above or below a certain percentage of MAXTASKs 26 System Event Examples Generate an alert whenever a connection from CICS to DB2 is no longer in Connected status Emit events for all transaction classes when the number of transactions in the tranclass goes below 50%, to understand which tranclasses are least used (write the events to a TS queue, or monitor by sending to IBM business monitor) Collect events about any changes in the open status of the ‘CUSTOMER’ file, to ensure these happen within the approved batch windows 27 CICS TOOLS 28 CICS CONFIGURATION MANAGER 29 CICS Configuration Manager Highlights Single point of control for CICS resource definitions including • Create, Update, Delete, Copy, Replicate Provides the ability to “change manage” definitional change through the various user environments (e.g. Development, Test, Production) Provides audit, back-out and change authorization capabilities 30 CICS CM: Migrating definitions through application life cycle Migration schemes identify source and target repositories Different schemes to progressively migrate a change package Test environment Development environment Production environment Change package Change package “Development to Test” migration scheme “Test to Production” migration scheme 31 CICS CM: Backout and audit compliance All changes logged to a journal file Backout entire change package Recover individual resource definitions View resource definition histories on screen Batch, ISPF and CICS Explorer view of change history Test Changes Production 32 System failure! Backout CICS CM: Coordination with SCM 1. Integrate CM with batch 2. Drive SCM from CM SCM CICS CM Endevor RTC SCLM Package Package • • • READY MIGRATE BACKOUT User Exit JCL 33 Management of resource types for cloud V5.1 • APPLDEF • PLATDEF V5.2 • System definitions • System groups • WLM definitions and associations 34 CICS INTERDEPENDENCY ANALYZER 35 Visualize Applications used by Platform Show resources used by Platform/Application Which other Platforms/Application use a resource? CICS PERFORMANCE ANALYZER 39 Application Context performance summary CICS PA perspective 40 Application Context performance summary CICS Cloud perspective 41 Report forms to help with definition of policy Delivered in CICS PA 5.1 Name Type Description MPFCRQ SUMMARY Platform - File Request Summary MPMISC SUMMARY Platform - CPU/LINKs/DB2 Summary MPSHRSTG SUMMARY Platform - Shared Stg Summary MPT24STG SUMMARY Platform - 24-bit Stg Summary MPT31STG SUMMARY Platform - 31-bit Stg Summary MPT64STG SUMMARY Platform - 64-bit Stg Summary MPTXCLST LIST Platform - Threshold Exceeded MPTABND LIST Platform policy - Transaction Abend New in CICS PA 5.2 Name Type Description MPMISC1 SUMMARY Platform - Response/CPU Summary MPMISC2 SUMMARY Platform - Misc Requests Summary MPTDRQ SUMMARY Platform - TD Request Summary MPTSRQ SUMMARY Platform - TS Request Summary 42 New Summary report tiered format New tiered report summarizes activity based on two level keys • Used for Summary report for Platforms and Applications – Using new sample form MPAPPSUM 1 V5R2M0 + 0SUMM0002 Printed at 15:05:19 3/18/2014 Page 1 Platform Application - Summary ACPlatNm: DSWCloud ACApplNm: DSWCloudApplication ACOperNm BillofMaterialInquiry CustomerDetailsUpdate CustomerInquiry HotelBookingDetails HotelBookingInquiry InprocessInventoryUpdate InquiryonBillofMaterial LabourOperationsInquiry Menu MessageTransfertoLog OrderInquiry PartLocationInquiry PartNumberDelete ReceiveData CICS Performance Analyzer Performance Summary __________________________________________________ Data from 16:24:07 2/03/2014 to 16:37:57 2/03/2014 ACApplVr: 1.0.0 Avg Max Avg Avg Avg Max Avg #Tasks Response Response Dispatch User CPU Suspend Suspend DispWait Time Time Time Time Time Time Time 1316 .4004 2.2716 .0028 .0025 .3976 2.2660 .0099 2233 .1093 .4219 .0013 .0011 .1080 .4203 .0031 2233 .0435 .1800 .0010 .0008 .0425 .1787 .0015 1342 .0650 .1647 .0009 .0008 .0641 .1638 .0020 1342 .0340 .1559 .0009 .0007 .0331 .1549 .0012 2220 .1102 .5251 .0019 .0017 .1082 .5230 .0038 3104 .0331 .0966 .0018 .0016 .0313 .0948 .0016 4024 .0333 .1075 .0025 .0023 .0307 .1018 .0017 28727 .0278 .1217 .0005 .0004 .0273 .1211 .0008 2601 .0286 .1121 .0006 .0005 .0280 .1115 .0009 2655 .0279 .0761 .0005 .0004 .0274 .0755 .0009 2655 .0329 .2390 .0017 .0015 .0311 .2369 .0015 4431 .1113 .4668 .0011 .0010 .1102 .4657 .0030 7009 .0549 .2366 .0011 .0010 .0538 .2352 .0020 65892 .0515 2.2716 .0010 .0008 .0505 2.2660 .0016 43 Avg FC Wait Time .0123 .0025 .0009 .0021 .0011 .0059 .0016 .0016 .0000 .0000 .0000 .0013 .0026 .0020 .0012 Topics CICS Platform CICS Threshold Policy CICS Tools 44 Questions? Customer Sessions Thursday • 2267 Smarter Banking Process : More flexible and stable batch process with QGate on CICS/MQ, Bank Central Asia • 2436 Modernizing the mainframe, Humana 46 We Value Your Feedback Don’t forget to submit your Impact session and speaker feedback! Your feedback is very important to us – we use it to continually improve the conference. Use the Conference Mobile App or the online Agenda Builder to quickly submit your survey • Navigate to “Surveys” to see a view of surveys for sessions you’ve attended 47 Legal Disclaimer • © IBM Corporation 2014. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. • References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. • If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. • If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. • Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both. • If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. • If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. • If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries. • If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. • If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only. 48