Top Banner
DB2/UDB Data Collector Status: 12/4/2008
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: DB2/UDB Data Collector

DB2/UDBData Collector

Status: 12/4/2008

Page 2: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 2 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Table of Contents

Introduction ....................................................................................................................................................... 3The Performance Features of the ApplicationManager Data Collector for DB2/UDB........................................... 3The Architecture of the DB2/UDB Database ...................................................................................................... 4The DB2/UDB Data Collector ............................................................................................................................ 5

Monitoring Instances...................................................................................................................................... 6Monitoring DBM Configuration Parameters................................................................................................. 6

Monitoring Databases .................................................................................................................................... 8Monitoring Log Space................................................................................................................................. 8General Properties ..................................................................................................................................... 9

Monitoring Tablespaces ............................................................................................................................... 10Monitoring Bufferpools ................................................................................................................................. 11Managing Performance................................................................................................................................ 12Managing the Operating System .................................................................................................................. 13Pre-defined Monitoring Policies.................................................................................................................... 13

Appendix A: The Data Collector's Object Structure .......................................................................................... 14

Page 3: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 3 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Introduction

There's more to efficient application management than maximizing availability. Targeted tuning can increase theperformance and stability of business-critical applications without having to invest in additional hardware(processors, RAM, disk space).

A number of data collectors have been developed for theGuard! ApplicationManager that providecomprehensive monitoring and generate detailed data analyses. Data collectors do more than simply collectevents according to pre-defined rules. They deliver every performance value and the current status of eachapplication object in real time. They also provide insight into configuration attributes, such as the release statusor the application's parameter settings. Data collectors model an application in objects and sub-objects, enablinga dedicated handling of alerts, monitoring, reporting, service level management, or status messages. This modelensures that information is clearly structured and that messages are easy to allocate to a problem.

Pre-defined and reusable policies for each type of application facilitate the implementation of the solution andthe adaptation of monitoring to dynamic landscapes. The ease with which thresholds are set ensures the earlyrecognition of potential errors. Comprehensive reaction management enables flexible alerting for more than 100different devices and alarm consoles.

The automatic discovery of new application instances and objects, including the automatic allocation of policies,enables automatic monitoring even in those cases in which system administrators have completely reconfiguredthe application, for example, by adding new instances or objects.

Central reporting at the application instance and application object level provides for a detailed and effectivecapacity management of all resources.

Integrated Service Level Management ensures that the service levels for application availability andperformance are achieved, while Operational Level Agreements (OLAs) can be easily defined at the applicationobject level.

The Performance Features of the ApplicationManager DataCollector for DB2/UDB

The data collector for DB2/UDB monitors and analyzes DB2 databases from version 7.2 to 8.1. All of the DB2instances that are installed on the local computer are monitored by one data collector.

In addition to the DB2 instance (database manager, DBM), the databases, tablespaces, bufferpools, and thediagnostic log are defined and analyzed individually within the framework of the CIM model as Managed Objects(MO). The data collector's features are described in the data collector's online documentation. This documentprovides an overview of the most important functions.

Page 4: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 4 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

The Architecture of the DB2/UDB Database

DB2/UDB is a relational database that extensively covers the newest ANSI-SQL standards, which is why it isused by many large business-critical applications. DB2 databases are used to continuously and quickly provide,permanently store, and manage terabytes of data, for example, from an SAP system. A business-criticalapplication can only run smoothly if the basic DB2/UDB database is highly available and bottleneck-free. Largeinvestments are made in database software and hardware technology although most database problems arecaused by the applications using them or external access (administrators). Professional management softwareis a must.

The architecture of the DB2/UDB database enables several DB2 databases to be run and managed by one DB2instance (database manager). Only one DB2 instance is needed to separate and manage the data from differentapplications or business areas. Fully autonomous DB2 instances can be run on appropriately sized and fastservers.

The Architecture of the DB2/UDB Database

Page 5: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 5 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

The DB2/UDB Data Collector

The below figure shows all of the objects of a DB2/UDB instance in theGuard! ApplicationManager's ManagedMonitor. Appendix A contains a complete list of all of the objects.

The DB2 instances, their databases, tablespaces, bufferpools, and the diagnostic log are defined and displayedas Managed Objects in the Managed Monitor.

Managed Objects are hierarchically arranged and clearly structured thus providing the current status of everycomponent at a glance. Monitoring parameters can be defined for each component.

One or more of a database's system processes can be monitored as Managed Objects, for example, as aprocess group in the operating system's data collector.

Page 6: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 6 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Monitoring Instances

Each DB2/UDB instance can be monitored according to the below criteria:

Status of the DB2 instance Changes to DBM configuration parameters DB2 agents and the number of database connections (local and remote) Serious database errors that are recorded in the diagnostic log file

Events are divided into categories and classes making them easy to filter and treat differently. Configurationparameters are used to configure the monitors to the requirements of each DB2 instance. The configuration iseasily transferred to other DB2 instances.

This comprehensive, automatic monitoring relieves database administrators of daily reviews.

It is also possible to constantly monitor additional attributes or display their values in real-time property lists.

Monitoring DBM Configuration Parameters

All of the DBM parameter values can be displayed and compared to target values or ranges of target values.

The DBM configuration parameters are sorted by area:

List of monitored configuration parameters:

Page 7: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 7 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

User-definable target values can be transferred to other databases with a few mouse clicks. This also applies toall of the other configuration settings.

Setting target values to check the DBM configuration parameters:

Erroneously configured critical parameters or instances with different values are quickly and easily detected.Application errors caused by wrong DBM profile parameters are avoided.

Page 8: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 8 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Monitoring Databases

Each DB2 database can be monitored according to the following criteria:

Status of the DB2 database Changes to DBM configuration parameters Log space usage Backup interval Cache quality Number of client connections Statistical evaluation of sorts, locks, deadlocks, SQL statements, and table activity

Events are divided into categories and classes making them easy to filter and treat differently. Configurationparameters are used to configure the monitors to the requirements of each DB2 database. The configuration iseasily transferred to other DB2 databases.

This comprehensive, automatic monitoring relieves database administrators of daily reviews.

It is also possible to constantly monitor additional attributes or display their values in real-time property lists.

Monitoring Log Space

Changes to the application data (inserts, updates, and deletions) are recorded in the transaction log. Thetransaction log is stored in the database's log space. When the log space is full, no more transactions can beadded and the database comes to a partial standstill. Log space is very important for the stability, consistency,and performance of the application.

Log space usage:

Monitoring log space can prevent the database from failing due to a full transaction log. This ensures theavailability and performance of the application even during load peaks.

Page 9: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 9 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

General Properties

In addition to monitoring, important and useful information about a DB2 database can be reported in real time inproperty lists.

The detailed overview contains information such as a summary of the relevant information about the database'stablespaces, whether the tablespace was defined as a Managed Object for detailed monitoring or not.

List: General tablespace information:

List: Tablespace fill level:

This central and concise overview reduces the time it takes to analyze the cause of a problem.

Page 10: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 10 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Monitoring Tablespaces

Tablespaces are the logical containers of a DB2 database. A tablespace's size is determined by the size andnumber of physical storage areas (containers) that are associated with the tablespace. Monitoring tablespacesmainly means monitoring the available disk space.

List of tablespace properties:

Monitoring all of the sizes that are relevant for disk space management enables capacity bottlenecks to berecognized and solved at an early stage. This information can be used to plan the long-term capacity requiredby application data, for example, moving large tables (or table partitions) to their own tablespace.

Page 11: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 11 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Monitoring Bufferpools

Writing to and reading from the hard disk are two of the slowest database operations. They have a considerableimpact on the system's overall performance.

Monitoring bufferpools enables the quality of the bufferpool (hit ratio) and the database's I/O operations to berecorded and evaluated using the detailed reporting functions.

A buffer's hit ratio:

Statistics of a buffer's physical read operations:

Monitoring bufferpools provides valuable information that can be used to optimize the I/O performance andhence the reading and writing application.

Page 12: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 12 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Managing Performance

Managed Objects, such as the DB2 instance or the DB2 database, provide a number of statistical values abouttheir real-time status. For example, usage and performance values such as the number of the current clientconnections, required disk space, quality of the cache, and so forth. Thresholds, which are used to generatealerts when they are violated, can be defined for all of the statistical values. They are also used to monitoroperability and performance. The statistical values can also be collected in the ApplicationManager databaseand evaluated using REALTECH Reporting. This information can be used to generate long-term trend analyses,for example, for hard disk usage, and used as a basis for cost and capacity planning.

In addition, all of the statistical values can be monitored and compared in the real-time performance monitor.These values can be used to optimize performance and storage space. The below figure displays the logspace usage and the number of allocated, secondary log files in Performance Monitor.

Page 13: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 13 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Managing the Operating System

To fully protect a DB2 database, important operating system parameters, such as physical disks, processorusage, page file, etc. should be monitored. These and other parameters can be recorded and evaluated with theappropriate operating system data collectors.

Pre-defined Monitoring Policies

The DB2/UDB data collector consists of a number of pre-configured policies for object types such asinstances, databases, tablespaces, and bufferpools.

For more information aboutREALTECH’s software solutions:

www.realtech.com

REALTECH AGIndustriestr. 39c

69190 Walldorf GermanyTel.: +49-(0)6227-837-591Fax: +49-(0)6227-837-837

mailto:[email protected]://www.realtech.com

Page 14: DB2/UDB Data Collector

Copyright © REALTECH 2008 Page 14 of 14

theGuard! ApplicationManager – DB2/UDB Data Collector

Appendix A: The Data Collector's Object Structure

The collector is structured in object types, which among other things, is essential for the configuration andallocation of events as well as for all of the other functions:

Object Type Sub-object Types Metrics Topic

DB Client One client per managednode

Instance Monitoring – Propertiesof the data collector's clientenvironment

Instance DatabaseDiagnostic Log

One to N instances permanaged node

Instance Monitoring – Status,activity and performance at thedatabase manager level

Database TablespaceBufferpool

One to N databases perinstance

Database Monitoring -Activity and performance at thedatabase level

Tablespace One to N tablespaces perdatabase

Tablespace Monitoring –Controls disk space usage andsegment growth

Bufferpool One to N bufferpools perdatabase

Buffer Monitoring –Buffer usage and performance

Diagnostic Log One diagnostic log perinstance

Alerting on DB2 error reporting