Focusing analysis by authorization ID can be particularly helpful for insights into managing DDF work which is often challenging since it lacks many of the controls in place for other types of workloads.
More Db2 Accounting Videos
- Exploring Analysis by Connection Type
- Exploring Analysis by Correlation ID
- Exploring Elapsed Time Profiles
- Exploring Analysis by Authorization ID
- Exploring Prefetch Activity and Suspension Events
- Exploring Analysis by Plan or Package Name
- Exploring Database Sync I/O Activity
- Case Study: Isolating Change Drivers
- Exploring Other Metrics in Accounting Data by Plan
- Accounting Data: Customized Dashboard Recap
Video Transcript
Another primary way to explore analysis of accounting data is through the authorization ID. Auth ID is captured for all connection types, but it can be particularly helpful for insights into DDF work, which often lacks many of the controls in place for other types of work. So we will initially here work from this report set of views that are specifically focused on DDF work. So one thing we learned right away from this aggregate view is that much of the CPU is executed on zIIP engines in yellow so that it doesn’t incur software license charges. And that’s of course, a key benefit of DDF work. So one, you know, initial right off the top, we might want to explore which auth IDs are the top CPU consumers. And so here they are, and we’re going to continue to collect these views on our dashboard and we’ll come back and look at that later. And as we explore the at time of day profile for this top consumer follows a typical online profile, so indicating, and may be invoked as part of some standard business transaction processing.
And one of the challenges of managing DDF work can be in user-submitted tasks, inadvertently turning into rogue runaway work, consuming, large amounts of CPU. So here, when we view the CPU over time and I’ll extend it to this entire weekend, the demo database, there’s no major outliers, which is good news, but there is a daily spike here that’s worth exploring. So let’s go ahead and customize this view. We’ll focus on the general-purpose CPU time. We will view it by authorization ID. We’ll kind of narrow it down to the top 10, so that gets rid of some of the noise. And so now when we do that, we can correlate the spikes to a particular auth ID, which appears to kick off a daily process early morning, each day.
You May Also Be Interested In:
What's New with IntelliMagic Vision for z/OS? 2024.2
February 26, 2024 | This month we've introduced changes to the presentation of Db2, CICS, and MQ variables from rates to counts, updates to Key Processor Configuration, and the inclusion of new report sets for CICS Transaction Event Counts.
Viewing Connections Between CICS Regions, Db2 Data Sharing Groups, and MQ Queue Managers
This blog emphasizes the importance of understanding connections in mainframe management, specifically focusing on CICS, Db2, and MQ.
What's New with IntelliMagic Vision for z/OS? 2024.1
January 29, 2024 | This month we've introduced updates to the Subsystem Topology Viewer, new Long-term MSU/MIPS Reporting, updates to ZPARM settings and Average Line Configurations, as well as updates to TCP/IP Communications reports.
Book a Demo or Connect With an Expert
Discuss your technical or sales-related questions with our mainframe experts today