No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy Matthew Webster IBM © 2014 IBM Corporation.

Download Report

Transcript No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy Matthew Webster IBM © 2014 IBM Corporation.

No rainclouds here! Using
CICS Platform and Policies to
keep your private cloud
healthy
Matthew Webster
IBM
© 2014 IBM Corporation
Please Note
IBM’s statements regarding its plans, directions, and intent are subject to change
or withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general
product direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a
commitment, promise, or legal obligation to deliver any material, code or
functionality. Information about potential future products may not be incorporated
into any contract. The development, release, and timing of any future features or
functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM
benchmarks in a controlled environment. The actual throughput or performance
that any user will experience will vary depending upon many factors, including
considerations such as the amount of multiprogramming in the user’s job stream,
the I/O configuration, the storage configuration, and the workload processed.
Therefore, no assurance can be given that an individual user will achieve results
similar to those stated here.
2
Abstract
CICS V5 introduces significant capability to help manage CICS as
a private cloud. The Platform definition can monitor the health of
shared services and maintain consistency across regions
simplifying application deployment while threshold policies can
protect production systems against rogue applications by enforcing
coding standards throughout the development lifecycle. See how to
use these new resources in conjunction with existing facilities
including CICS Monitoring and tools like CICS PA to manage and
measure the health of your CICS environment.
This session will cover recent enhancements to CICS including
support for deploying and managing shared services such as
TCP/IP connectivity, web services resources and Java runtimes as
part of a Platform. Customers using workload management will
discover how Application context information can now assist with
dynamic routing. We will also describe the new threshold policies.
3
Cloud and Tools Sessions
Monday
•
1699 CICS TS V5.2 Technical Overview
Tuesday
• 2416 Business value of creating a CICS cloud
• 1985 Why talk to your colleagues?
• 1961 No rainclouds here !
Thursday
• 2377 Mainframe isn't too heavy for the cloud
4
Topics
CICS Platform
CICS Threshold Policy
CICS Tools
5
CICS Cloud “Toolbox”
Artifacts like Platform that can be kept under version control
describe what the system should look like
A RESTful, batch and online API to help automate deployment
and management
The CICS Explorer UI for administration integrates the CICS
Tools and with source code management
Monitoring Data allows you measure resource consumption
Creating Policy helps you enforce coding standards throughout
the application lifecycle and protect production environments
6
CICS PLATFORM
7
CICS Cloud Resources
Application:
• Entry points: PROGRAM, URIMAP
• Resources: LIBRARY, OSGIBUNDLE, WEBSERVICE, …
• Dependencies: JVMSERVER, PIPELINE, …
Binding
•
•
•
•
Deployment rules
Policy
Resources:
URIMAP, …
Dependencies: TCPIPSERVICE
Platform
• Topology
• Policy
• Services:FILE, JVMSERVER, PIPELINE, TCPIPSERVICE
8
CICS Explorer: “CICS Cloud” Perspective
9
New in CICS TS V5.2: Platform Resources
Resources
•
•
•
•
FILE
JVMSERVER (including Liberty)
TCPIPSERVICE
PIPELINE (web services)
Example driven configuration
• JVM server profile
• pipeline configuration
Configuration life-cycled with parent resource
• definition, configuration, …
• creation, collaboration, deployment
10
Create JVM Server Definition in a CICS Bundle
11
Monitoring
Application
Operation
/Platform/Application/1/0/0/Operation
Platform
Queues
Terminals
Web
Applications
JavaApplications
Files
Database
SMF
12
Dynamic routing by application context
PROGRAM and URIMAP entry points set application context
Application context available in addition to TRANID in the
following URMs:
• The CICS Dynamic Routing Exit Commarea (DFHDYPDS)
• The CPSM User Service Program Commarea (EYURWTRA)
• The CPSM WLM Router Access Program Commarea
(EYURWCOM)
13
CICS THRESHOLD POLICY
14
Real World Example: Phone Contract
200 free minutes
Unlimited text messages
500MB of data
“You have now used 80% of your data
allowance”
15
Rules and Policy
Rules
• Resources:
• Threshold:
• Action:
minutes, texts, data
80%, 100%
message, change tariff
Policy
• Collection of rules (contract)
16
Threshold Policy
Policy Based Management
• Resource, threshold, and action
• Action can be:
– Emit a message
– Emit a system event
– Abend the task
Scoped
New resources in CICS TS V5.2
Define a Policy
Trigger an action
CICS Triggers an action
SQL
Files
Threshold
breach
Abend
Storage
CPU
Message
Event
An XML Policy document defines
the threshold and action
17
Policy Scoping
Operation
Operation
Operation
Operation
Application A
Application B
Binding A2P
Binding B2P
Platform P
18
Policy Scoping: Platform
Operation
Operation
Operation
Operation
Application A
Application B
Binding A2P
Binding B2P
Platform P
Policy
19
Policy Scoping: Application
Operation
Operation
Operation
Operation
Application A
Application B
Binding A2P
Binding B2P
Policy
Platform P
20
Policy Scoping: Operation
Operation
Operation
Operation
Operation
Application A
Application B
Binding A2P
Binding B2P
Policy
Platform P
21
Policy Scoping: Application Multi-Versioning
Operation
Operation
Operation
Operation
Application A 1.0.0
Application A 1.0.1
Binding A2P 1.0.0
Binding A2P 1.0.1
Policy P
Policy P’
Policy Q
Platform P
22
Policy Q
Threshold Policies
V5.1
•
•
•
•
•
CPU time
Storage requests & bytes
SQL requests
LINK requests
FILE requests
V5.2
•
•
•
•
•
Elapsed time
(RFE 31868 “Add elapsed time …”)
TDQ requests & bytes
TSQ requests & bytes
START requests
SYNCPOINT requests
23
TS Queue bytes
 Trigger on amount of
data written
 Selection for
 Main and AUX
 Request is counted
whether the request
is successful or not
 Both local and
remote requests are
counted
24
24
DevOps: Using Policy Throughout the Application Life-cycle
Application
development.Binding
Policy
DEV
Application
test.Binding
Policy
TEST
25
production.Binding
Policy
PROD
System Events
 Capture events when:
– DB2 connection status changes
– FILE enable status changes
– FILE open status changes
– CICS message is issued
– Unhandled transaction abends
– Current active tasks for a TRANCLASS goes above or below a
certain percentage of MAXACTIVE
– Current active task in a region goes above or below a certain
percentage of MAXTASKs
26
System Event Examples
Generate an alert whenever a connection from CICS to DB2 is
no longer in Connected status
Emit events for all transaction classes when the number of
transactions in the tranclass goes below 50%, to understand
which tranclasses are least used (write the events to a TS
queue, or monitor by sending to IBM business monitor)
Collect events about any changes in the open status of the
‘CUSTOMER’ file, to ensure these happen within the approved
batch windows
27
CICS TOOLS
28
CICS CONFIGURATION
MANAGER
29
CICS Configuration Manager Highlights
Single point of control for CICS resource definitions including
• Create, Update, Delete, Copy, Replicate
Provides the ability to “change manage” definitional change
through the various user environments (e.g. Development, Test,
Production)
Provides audit, back-out and change authorization capabilities
30
CICS CM: Migrating definitions through application life
cycle
Migration schemes identify source and target repositories
Different schemes to progressively migrate a change
package
Test
environment
Development
environment
Production
environment
Change
package
Change
package
“Development to Test”
migration scheme
“Test to Production”
migration scheme
31
CICS CM: Backout and audit compliance
All changes logged to a journal file
Backout entire change package
Recover individual resource definitions
View resource definition histories on screen
Batch, ISPF and CICS Explorer view of change history
Test
Changes
Production
32
System
failure!
Backout
CICS CM: Coordination with SCM
1. Integrate CM with batch
2. Drive SCM from CM
SCM
CICS CM
Endevor
RTC
SCLM
Package
Package
•
•
•
READY
MIGRATE
BACKOUT
User
Exit
JCL
33
Management of resource types for cloud
V5.1
• APPLDEF
• PLATDEF
V5.2
• System definitions
• System groups
• WLM definitions and associations
34
CICS INTERDEPENDENCY
ANALYZER
35
Visualize Applications used by Platform
Show resources used by Platform/Application
Which other Platforms/Application use a
resource?
CICS PERFORMANCE
ANALYZER
39
Application Context performance summary
CICS PA perspective
40
Application Context performance summary
CICS Cloud perspective
41
Report forms to help with definition of policy
Delivered in CICS PA 5.1
Name
Type
Description
MPFCRQ
SUMMARY
Platform - File Request Summary
MPMISC
SUMMARY
Platform - CPU/LINKs/DB2 Summary
MPSHRSTG
SUMMARY
Platform - Shared Stg Summary
MPT24STG
SUMMARY
Platform - 24-bit Stg Summary
MPT31STG
SUMMARY
Platform - 31-bit Stg Summary
MPT64STG
SUMMARY
Platform - 64-bit Stg Summary
MPTXCLST
LIST
Platform - Threshold Exceeded
MPTABND
LIST
Platform policy - Transaction Abend
New in CICS PA 5.2
Name
Type
Description
MPMISC1
SUMMARY
Platform - Response/CPU Summary
MPMISC2
SUMMARY
Platform - Misc Requests Summary
MPTDRQ
SUMMARY
Platform - TD Request Summary
MPTSRQ
SUMMARY
Platform - TS Request Summary
42
New Summary report tiered format
New tiered report summarizes activity based on two level keys
• Used for Summary report for Platforms and Applications
– Using new sample form MPAPPSUM
1 V5R2M0
+
0SUMM0002 Printed at 15:05:19 3/18/2014
Page
1
Platform Application - Summary
ACPlatNm: DSWCloud
ACApplNm: DSWCloudApplication
ACOperNm
BillofMaterialInquiry
CustomerDetailsUpdate
CustomerInquiry
HotelBookingDetails
HotelBookingInquiry
InprocessInventoryUpdate
InquiryonBillofMaterial
LabourOperationsInquiry
Menu
MessageTransfertoLog
OrderInquiry
PartLocationInquiry
PartNumberDelete
ReceiveData
CICS Performance Analyzer
Performance Summary
__________________________________________________
Data from 16:24:07 2/03/2014 to 16:37:57 2/03/2014
ACApplVr: 1.0.0
Avg
Max
Avg
Avg
Avg
Max
Avg
#Tasks Response Response Dispatch User CPU Suspend Suspend DispWait
Time
Time
Time
Time
Time
Time
Time
1316
.4004
2.2716
.0028
.0025
.3976
2.2660
.0099
2233
.1093
.4219
.0013
.0011
.1080
.4203
.0031
2233
.0435
.1800
.0010
.0008
.0425
.1787
.0015
1342
.0650
.1647
.0009
.0008
.0641
.1638
.0020
1342
.0340
.1559
.0009
.0007
.0331
.1549
.0012
2220
.1102
.5251
.0019
.0017
.1082
.5230
.0038
3104
.0331
.0966
.0018
.0016
.0313
.0948
.0016
4024
.0333
.1075
.0025
.0023
.0307
.1018
.0017
28727
.0278
.1217
.0005
.0004
.0273
.1211
.0008
2601
.0286
.1121
.0006
.0005
.0280
.1115
.0009
2655
.0279
.0761
.0005
.0004
.0274
.0755
.0009
2655
.0329
.2390
.0017
.0015
.0311
.2369
.0015
4431
.1113
.4668
.0011
.0010
.1102
.4657
.0030
7009
.0549
.2366
.0011
.0010
.0538
.2352
.0020
65892
.0515
2.2716
.0010
.0008
.0505
2.2660
.0016
43
Avg
FC Wait
Time
.0123
.0025
.0009
.0021
.0011
.0059
.0016
.0016
.0000
.0000
.0000
.0013
.0026
.0020
.0012
Topics
CICS Platform
CICS Threshold Policy
CICS Tools
44
Questions?
Customer Sessions
Thursday
• 2267 Smarter Banking Process : More flexible and stable batch
process with QGate on CICS/MQ, Bank Central Asia
• 2436 Modernizing the mainframe, Humana
46
We Value Your Feedback
Don’t forget to submit your Impact session and speaker
feedback! Your feedback is very important to us – we use it to
continually improve the conference.
Use the Conference Mobile App or the online Agenda Builder to
quickly submit your survey
• Navigate to “Surveys” to see a view of surveys for sessions
you’ve attended
47
Legal Disclaimer
• © IBM Corporation 2014. All Rights Reserved.
• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by
you will result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs
and performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM
Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server).
Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your
presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in
your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International
Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and
other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of
others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta
Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration
purposes only.
48