© 2014 IBM Corporation No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy Matthew Webster IBM
Jun 19, 2015
© 2014 IBM Corporation
No rainclouds here! Using CICS Platform and Policies to keep your private cloud healthy
Matthew Webster IBM
Please Note IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.
Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision.
The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
2
Abstract
CICS V5 introduces significant capability to help manage CICS as a private cloud. The Platform definition can monitor the health of shared services and maintain consistency across regions simplifying application deployment while threshold policies can protect production systems against rogue applications by enforcing coding standards throughout the development lifecycle. See how to use these new resources in conjunction with existing facilities including CICS Monitoring and tools like CICS PA to manage and measure the health of your CICS environment. This session will cover recent enhancements to CICS including support for deploying and managing shared services such as TCP/IP connectivity, web services resources and Java runtimes as part of a Platform. Customers using workload management will discover how Application context information can now assist with dynamic routing. We will also describe the new threshold policies.
3
Cloud and Tools Sessions
! Monday • 1699 CICS TS V5.2 Technical Overview
! Tuesday • 2416 Business value of creating a CICS cloud • 1985 Why talk to your colleagues? • 1961 No rainclouds here !
! Thursday • 2377 Mainframe isn't too heavy for the cloud
4
Topics
! CICS Platform ! CICS Threshold Policy ! CICS Tools
5
CICS Cloud “Toolbox”
! Artifacts like Platform that can be kept under version control describe what the system should look like
! A RESTful, batch and online API to help automate deployment and management
! The CICS Explorer UI for administration integrates the CICS Tools and with source code management
! Monitoring Data allows you measure resource consumption ! Creating Policy helps you enforce coding standards throughout
the application lifecycle and protect production environments
6
CICS PLATFORM
7
CICS Cloud Resources
! Application: • Entry points: PROGRAM, URIMAP • Resources: LIBRARY, OSGIBUNDLE, WEBSERVICE, … • Dependencies: JVMSERVER, PIPELINE, …
! Binding • Deployment rules • Policy • Resources: URIMAP, … • Dependencies: TCPIPSERVICE
! Platform • Topology • Policy • Services: FILE, JVMSERVER, PIPELINE, TCPIPSERVICE
8
CICS Explorer: “CICS Cloud” Perspective
9
New in CICS TS V5.2: Platform Resources
! Resources • FILE • JVMSERVER (including Liberty) • TCPIPSERVICE • PIPELINE (web services)
! Example driven configuration • JVM server profile • pipeline configuration
! Configuration life-cycled with parent resource • definition, configuration, … • creation, collaboration, deployment
10
Create JVM Server Definition in a CICS Bundle
11
Monitoring
Platform
Application
Queues
Applications
JavaApplications
Files Database
Terminals Web
Operation
SMF
/Platform/Application/1/0/0/Operation
12
Dynamic routing by application context
! PROGRAM and URIMAP entry points set application context ! Application context available in addition to TRANID in the
following URMs: • The CICS Dynamic Routing Exit Commarea (DFHDYPDS) • The CPSM User Service Program Commarea (EYURWTRA) • The CPSM WLM Router Access Program Commarea
(EYURWCOM)
13
CICS THRESHOLD POLICY
14
Real World Example: Phone Contract
200 free minutes Unlimited text messages 500MB of data
“You have now used 80% of your data allowance”
15
Rules and Policy
! Rules • Resources: minutes, texts, data • Threshold: 80%, 100% • Action: message, change tariff
! Policy • Collection of rules (contract)
16
17
Threshold Policy
! Policy Based Management • Resource, threshold, and action • Action can be:
– Emit a message – Emit a system event – Abend the task
! Scoped ! New resources in CICS TS V5.2
Define a Policy
Threshold breach
CICS Triggers an action
Abend Event Message
Trigger an action
SQL
Files
Storage
CPU An XML Policy document defines the threshold and action
Policy Scoping
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
18
Policy Scoping: Pla@orm
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy
19
Policy Scoping: ApplicaBon
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P
Policy
Binding B2P
Operation
20
Policy Scoping: OperaBon
Application A
Platform P
Operation
Application B
Operation Operation
Binding A2P Binding B2P
Operation
Policy
21
Policy Scoping: ApplicaBon MulB-‐Versioning
Application A 1.0.0
Platform P
Operation
Application A 1.0.1
Operation Operation
Binding A2P 1.0.0
Policy P
Binding A2P 1.0.1
Operation
Policy P’ Policy Q Policy Q
22
Threshold Policies
! V5.1 • CPU time • Storage requests & bytes • SQL requests • LINK requests • FILE requests
! V5.2 • Elapsed time (RFE 31868 “Add elapsed time …”) • TDQ requests & bytes • TSQ requests & bytes • START requests • SYNCPOINT requests
23
24 24
TS Queue bytes § Trigger on amount of
data written
§ Selection for
§ Main and AUX
§ Request is counted whether the request is successful or not
§ Both local and remote requests are counted
24
DevOps: Using Policy Throughout the ApplicaBon Life-‐cycle
DEV TEST PROD
development.Binding
Application Application
test.Binding production.Binding
Policy Policy Policy
25
26
System Events
§ Capture events when: – DB2 connection status changes
– FILE enable status changes – FILE open status changes
– CICS message is issued
– Unhandled transaction abends – Current active tasks for a TRANCLASS goes above or below a
certain percentage of MAXACTIVE
– Current active task in a region goes above or below a certain percentage of MAXTASKs
System Event Examples
! Generate an alert whenever a connection from CICS to DB2 is no longer in Connected status
! Emit events for all transaction classes when the number of transactions in the tranclass goes below 50%, to understand which tranclasses are least used (write the events to a TS queue, or monitor by sending to IBM business monitor)
! Collect events about any changes in the open status of the ‘CUSTOMER’ file, to ensure these happen within the approved batch windows
27
CICS TOOLS
28
CICS CONFIGURATION MANAGER
29
CICS Configuration Manager Highlights
! Single point of control for CICS resource definitions including • Create, Update, Delete, Copy, Replicate
! Provides the ability to “change manage” definitional change through the various user environments (e.g. Development, Test, Production)
! Provides audit, back-out and change authorization capabilities
30
! Migration schemes identify source and target repositories ! Different schemes to progressively migrate a change
package
Development environment
Test environment
Change package
Production environment
Change package
“Development to Test” migration scheme
“Test to Production” migration scheme
CICS CM: Migrating definitions through application life cycle
31
CICS CM: Backout and audit compliance
! All changes logged to a journal file ! Backout entire change package ! Recover individual resource definitions ! View resource definition histories on screen ! Batch, ISPF and CICS Explorer view of change history
Backout Production Changes System failure! Test
32
CICS CM: Coordination with SCM 1. Integrate CM with batch 2. Drive SCM from CM
Package
CICS CM SCM
Endevor RTC
SCLM
JCL User Exit
• READY • MIGRATE • BACKOUT
Package
33
Management of resource types for cloud
! V5.1 • APPLDEF • PLATDEF
! V5.2 • System definitions • System groups • WLM definitions and associations
34
CICS INTERDEPENDENCY ANALYZER
35
Visualize Applications used by Platform
Show resources used by Platform/Application
Which other Platforms/Application use a resource?
CICS PERFORMANCE ANALYZER
39
CICS PA perspective Application Context performance summary
40
CICS Cloud perspective
Application Context performance summary
41
Delivered in CICS PA 5.1 Report forms to help with definition of policy
Name Type Description MPFCRQ SUMMARY Platform - File Request Summary MPMISC SUMMARY Platform - CPU/LINKs/DB2 Summary MPSHRSTG SUMMARY Platform - Shared Stg Summary MPT24STG SUMMARY Platform - 24-bit Stg Summary MPT31STG SUMMARY Platform - 31-bit Stg Summary MPT64STG SUMMARY Platform - 64-bit Stg Summary MPTXCLST LIST Platform - Threshold Exceeded MPTABND LIST Platform policy - Transaction Abend
New in CICS PA 5.2
Name Type Description MPMISC1 SUMMARY
Platform - Response/CPU Summary
MPMISC2 SUMMARY Platform - Misc Requests Summary MPTDRQ SUMMARY Platform - TD Request Summary MPTSRQ SUMMARY Platform - TS Request Summary
42
New Summary report tiered format
1 V5R2M0 CICS Performance Analyzer Performance Summary + __________________________________________________ 0SUMM0002 Printed at 15:05:19 3/18/2014 Data from 16:24:07 2/03/2014 to 16:37:57 2/03/2014 Page 1 Platform Application - Summary ACPlatNm: DSWCloud ACApplNm: DSWCloudApplication ACApplVr: 1.0.0 Avg Max Avg Avg Avg Max Avg Avg ACOperNm #Tasks Response Response Dispatch User CPU Suspend Suspend DispWait FC Wait Time Time Time Time Time Time Time Time BillofMaterialInquiry 1316 .4004 2.2716 .0028 .0025 .3976 2.2660 .0099 .0123 CustomerDetailsUpdate 2233 .1093 .4219 .0013 .0011 .1080 .4203 .0031 .0025 CustomerInquiry 2233 .0435 .1800 .0010 .0008 .0425 .1787 .0015 .0009 HotelBookingDetails 1342 .0650 .1647 .0009 .0008 .0641 .1638 .0020 .0021 HotelBookingInquiry 1342 .0340 .1559 .0009 .0007 .0331 .1549 .0012 .0011 InprocessInventoryUpdate 2220 .1102 .5251 .0019 .0017 .1082 .5230 .0038 .0059 InquiryonBillofMaterial 3104 .0331 .0966 .0018 .0016 .0313 .0948 .0016 .0016 LabourOperationsInquiry 4024 .0333 .1075 .0025 .0023 .0307 .1018 .0017 .0016 Menu 28727 .0278 .1217 .0005 .0004 .0273 .1211 .0008 .0000 MessageTransfertoLog 2601 .0286 .1121 .0006 .0005 .0280 .1115 .0009 .0000 OrderInquiry 2655 .0279 .0761 .0005 .0004 .0274 .0755 .0009 .0000 PartLocationInquiry 2655 .0329 .2390 .0017 .0015 .0311 .2369 .0015 .0013 PartNumberDelete 4431 .1113 .4668 .0011 .0010 .1102 .4657 .0030 .0026 ReceiveData 7009 .0549 .2366 .0011 .0010 .0538 .2352 .0020 .0020 65892 .0515 2.2716 .0010 .0008 .0505 2.2660 .0016 .0012
! New tiered report summarizes activity based on two level keys • Used for Summary report for Platforms and Applications – Using new sample form MPAPPSUM
43
Topics
! CICS Platform ! CICS Threshold Policy ! CICS Tools
44
Questions?
Customer Sessions
! Thursday • 2267 Smarter Banking Process : More flexible and stable batch
process with QGate on CICS/MQ, Bank Central Asia • 2436 Modernizing the mainframe, Humana
46
We Value Your Feedback
! Don’t forget to submit your Impact session and speaker feedback! Your feedback is very important to us – we use it to continually improve the conference.
! Use the Conference Mobile App or the online Agenda Builder to quickly submit your survey
• Navigate to “Surveys” to see a view of surveys for sessions you’ve attended
47
Legal Disclaimer
• © IBM Corporation 2014. All Rights Reserved. • The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in
this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete: Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete: All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server). Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete: Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete: Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete: Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete: Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete: UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete: Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration purposes only.
48