Handling SMF and System Messages

Slides:



Advertisements
Similar presentations
1 Authority on Demand Flexible Access Control Solution.
Advertisements

Welcome to PC361: Managing Customer Contracts. Please set cell phones and pagers to silent Refrain from side discussions. We all want to hear what you.
Practice Management Training Webinar - Chapter 3 of 4 Ros Campbell Product Consultant.
Conditions and Terms of Use
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Understanding Systems Programming Procedures and Roles Company Name Date - Time 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence.
Our z/OS Security Administration and Auditing Company name Introducing z/OS Security 1 hour PowerPointOur z/OS Security PowerPoint Our z/OS Security Administration.
Indicator 13 Assessment Webcast Section 5 Reporting Results : Using the Electronic Reporting System.
WSM Administrator Training. WSM Administrator Discussion of WSM Administrator responsibilities Discussion of WSM administrative interfaces Detailed discussion.
Our COBOL Programming COBOL Programming - Basics 1 hour PowerPoint Our COBOL Environment PowerPoint Our COBOL Programming Webinar Understanding COBOL and.
Our COBOL Environment COBOL Programming - Basics 1 hour PowerPoint Our COBOL Environment PowerPoint Our COBOL Programming Webinar Understanding COBOL and.
Identifying and Gathering Problem Data Company Name 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence Identifying z/OS System.
Our Programming and Batch Systems Company Name 1 |Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence z/OS Application Development.
Understanding Data Center Operations and Your Role Company Name Date - Time 1 | Introduction to the IBM Enterprise Environment 45 minutes 1 hour PowerPoint.
Our Mainframe Network Operations Company name 1 |Copyright © Interskill Learning Pty Ltd 2012 – Commercial in Confidence Introducing Mainframe Networks.
Our Mainframe Under the Microscope Company name 1 | Introduction to the IBM Enterprise Environment 45 minutes 1 hour PowerPoint Our Data Centre Structure.
V7 Foundation Series Vignette Education Services.
10 Copyright © 2007, Oracle. All rights reserved. Managing Undo Data.
SchoolSuccess for Coordinators
SQL Database Management
Core ELN Training: Office Web Apps (OWA)
What’s New in ProMonitor 9
Project Management: Messages
VISION Learning Station
Module Overview Installing and Configuring a Network Policy Server
SCC P2P – Collaboration Made Easy Contract Management training
Introduction to Triggers
SCC P2P – Collaboration Made Easy Contract Management training
Deploying and Configuring SSIS Packages
What’s New – Overview & Basic Functionality
Our Data Center Structure
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
System Monitoring Practices and Procedures
Test Administration & The TA Sites.
Critical Warnings and Alerts
Active Orders Supplier Administrator Training Getting Started Activities This training presentation describes the Getting Started activities that will.
Monitoring Test Progress and Data Cleanup
Online Testing System Assessment Viewing Application (AVA)
Practice Insight Instructional Webinar Series Reporting
Understanding COBOL and Your Role
JCL Standards #2 Company Name
Online Testing System Assessment Viewing Application (AVA)
Understanding System Problem Resolution
JCL Standards #5 Company Name
JCL Standards #3 Company Name
Our CICS Systems Company name CICS TS - Introduction Graphic
Our Mainframe Applications and Subsystems
Our z/OS System Setup Company Name Introduction to z/OS
How to Create and Start a Test Session
Appeals Process Screener Training Module Module 6
Company Name Date - Time
Understanding IMS and Your Role
Lesson Nine: Epic Appointment Scheduling Referrals Reports
Administrative Module
Company Name Date - Time
Understanding System Monitoring Tasks and Roles
Online Testing System Assessment Viewing Application (AVA)
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
AIRWays Benchmark Previewing System
Understanding DB2 and Your Role
Workshop.
System Problem Resolution Practices
Participation Reports
Lesson Nine: Epic Appointment Scheduling Referrals Reports
Participation Reports
Lesson Nine: Epic Appointment Scheduling Referrals Reports
System Start-Up and Shutdown
Monitoring Test Progress and Data Cleanup
Preparing for the Windows 8.1 MCSA
Visual Basic for Applications: Introduction
Presentation transcript:

Handling SMF and System Messages Monitoring the z/OS System 55 minutes Using System Commands and Consoles 45 minutes Displaying Active Jobs, Tasks and Users 45 minutes Displaying Device Status 45 minutes Using Advanced Monitoring Facilities PowerPoint System Monitoring Practices and Procedures 40 minutes Working with SMF 70 minutes MPF and Message Suppression Graphic: Insert your organization’s name in the above slide. Audio: will need to cover the following: Welcome to the “Handling SMF and System Messages” presentation. My name is _____, I work in the ___ department and have worked in our organization’s data center for ___ years (This should be expanded so the learner is confident that you have the right credentials to create this presentation). This presentation follows on from the Datatrain “Working with SMF” and “MPF and Message Suppression” modules and expands on this content to explain how it relates to our mainframe practices. Any questions about the content of this presentation or the Datatrain modules mentioned above should be forwarded to _______ so they can be included in the Webinar, which appears at the end of this learning pathway. PowerPoint Handling SMF and System Messages Handling SMF and System Messages z/OS System Operation 60 minutes Company Name Webinar Understanding System Monitoring Tasks and Roles Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

Presentation Topics How do we use SMF? Managing system messages Audio: will need to cover the following: The “Working with SMF” Datatrain module you have completed in this pathway described how SMF can be configured, and how to display its status and attributes. In this section you will see how SMF is used in our environment, how it is defined and real-life scenarios involving SMF. You will also see how message suppression and message flooding is handled in our organization. This is linked to the “MPF and Message Suppression” Datatrain course you completed earlier. Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

Who uses SMF and how is it used? What type of information do we capture using SMF? Who needs to access SMF? What is SMF data used for? Audio: will need to cover the following: You will need to explain how the organization uses SMF to capture information relating to the resources that are used on the system (i.e. how long jobs run for, resource usage at specific times, misuse of resources, changes to system configuration). Explain how there are a number of people that need to access the SMF product itself and the data produced by it: - The general day-to-day operation/monitoring of the product is handled by operators SMF data may be used by: - Security personnel needing to identify unauthorized access to the system and resources - Systems Programmers needing to identify whether resource attributes need to be modified - Production Schedulers to fine-tune the scheduling of jobs (so that they don’t run concurrently) Describe any other tasks that your organization uses SMF data for (i.e. analyzed for billing purposes, performance monitoring, system fine tuning purposes). Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

How is SMF configured in our environment? Do we use log data sets or log streams? How is our SMF processing automated.?? Graphics: You may want to include a screen capture of the parmlib member that contains SMF defaults. Audio: will need to cover the following: You will need to describe where configuration data for SMF is stored (i.e. SMFPRMxx member of Parmlib). You may also want to go through some of the configuration statements (i.e. whether log data sets or log streams are used, the system where SMF is active, types of SMF records generated). You will need to explain the aspects of SMF that are automated (i.e. when SMF data sets are full, automatic switching and dumping occurs). You will also need to explain if any manual actions are required and in what situations (i.e. if automation does not switch or dump). Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

SMF real-life problem scenarios What types of SMF problems have we encountered? Who is responsible for resolving problems with SMF? Audio: will need to cover the following: You will need to look back through your problem logs to identify problems that have occurred with SMF and then explain how the person was alerted to the problem, and what action was taken to resolve it. You should also mention the people responsible for monitoring (i.e. operators) and managing/resolving problems (i.e. operators, system programmers). Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

Message suppression Do we suppress specific messages? Which messages are suppressed and why? Which products do we use for message suppression and who is responsible for them? Scenarios. Audio: will need to cover the following: You will need to explain whether specific messages are suppressed in your environment, describing the scenarios that led to this action (i.e. to cut down on non-important messages being sent to operator console). Describe which messages in particular are suppressed and possibly show how this has been coded into the tool responsible for message suppression. Mention that the Datatrain courses discussed the use of MPFLSTxx in the logical parmlib, for message suppression. Describe the tools that you use for this purpose (i.e. it might be MPFLSTxx but could also be products such as CA-Opera or BMC Mainview for AutoOperator). You should also mention who is responsible for identifying problem messages (operator, system programmer) and for entering message suppression details into the product you use. You may want to expand on scenarios that led to those messages needing to be suppressed (you may also have the opposite where some messages are not being produced that should be, which could be the result of the message suppression product). Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

How do we handle message flooding? Have we had problems with message flooding? Do we use message flood automation? Audio: will need to cover the following: You will need to explain whether message flooding has been a problem in your organization, describing the scenarios that occurred (i.e. one day message buffers became full which slowed/shut-down the system). If you use message flood automation, describe whether it is always turned on and how it has been configured in your environment (maybe compare them to those discussed in the Datatrain courses). Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence

Monitoring the z/OS System 55 minutes Using System Commands and Consoles Summary 45 minutes Displaying Active Jobs, Tasks and Users How do we use SMF? Managing system messages. 45 minutes Displaying Device Status 45 minutes Using Advanced Monitoring Facilities PowerPoint System Monitoring Practices and Procedures 40 minutes Working with SMF 70 minutes MPF and Message Suppression Audio: will need to cover the following: This first part of this presentation provided you with a number of real-life scenarios describing how SMF is used by our organization, how it is configured for operation and the people that interact with it. It also described problem scenarios associated with SMF and how they were resolved. The second part of this presentation described the types of system messages we receive and some of the problems they have caused. This was then expanded to describe the tools we use for message suppression and prevention of message flooding. Your next training step involves you undertaking an assessment, which is followed by a Webinar. This Webinar will provide you with hands-on exercises and discussions on z/OS monitoring practices. Thank you for attending. PowerPoint Handling SMF and System Messages z/OS System Operation 60 minutes Webinar Understanding System Monitoring Tasks and Roles Copyright © Interskill Learning Pty Ltd 2011 – Commercial in Confidence