0% found this document useful (0 votes)
324 views155 pages

ADABAS Dba Best Practices 20080808

The document discusses the roles and responsibilities of a database administrator (DBA). It explains that a DBA helps determine database design at both the hardware and application levels. This includes tasks like determining disk usage, transaction design, backup/recovery procedures, performance tuning, and data security. The document also provides examples of specific DBA duties like creating file definition tables and installing database software components. It notes that the job may involve both development and system administration responsibilities.

Uploaded by

Peter Campell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
324 views155 pages

ADABAS Dba Best Practices 20080808

The document discusses the roles and responsibilities of a database administrator (DBA). It explains that a DBA helps determine database design at both the hardware and application levels. This includes tasks like determining disk usage, transaction design, backup/recovery procedures, performance tuning, and data security. The document also provides examples of specific DBA duties like creating file definition tables and installing database software components. It notes that the job may involve both development and system administration responsibilities.

Uploaded by

Peter Campell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 155

What it means to be a DBA

Best Practices

Natural Conference in Boston, MA


August 17-20, 2008

Dieter W. Storr
[email protected]
DBA ?
 Doing Business As ……
 Deutsche Ba (German airline)
 Doctor of Business Administration
 Davis-Bacon Act of 1931
 Design Basis Accident
 Design Business Association
 Dual Band Antenna
 Direct Budget Authority
 Dollar Bill Acceptors
 Dumb But Adorable
 Danish Beekeepers' Association
Dieter W. Storr
August 2008 [email protected] 2
ASSO

DATA

WORK

Data
Base
Administrator

Dieter W. Storr
August 2008 [email protected] 3
Content 1
 Tasks of a DBA
 [Help to] determine the database design
 Hardware level

 Application design level

 Determine the ADABAS parameters


 Help to determine the transaction design
 Coordinate the online and batch processes

Dieter W. Storr
August 2008 [email protected] 4
Content 2

 Develop Back-up and recovery procedures


 Ensure (force) quality assurance and quality
control
 Performance and tuning
 Educate and train staff members
 [Help to] determine data security

Dieter W. Storr
August 2008 [email protected] 5
Content 3

 [Help to] determine standard routines and


help functions
 Maintain and optimize the database system
 Ideal DBA profile -- technically and personally
 Future requirements
 Position and salary of the DBA in the
enterprise
Dieter W. Storr
August 2008 [email protected] 6
Tasks of a DBA

 Sometimes different organizational units


 Run Utilities
 Create FDT
 Determine Disks
 Determine DB Components
 Determine Access paths
 Install ADABAS SVC/Router

Dieter W. Storr
August 2008 [email protected] 7
Tasks of a DBA

 Leads to performance problems


 DBA must have good knowledge about
development as well as system tasks, for
example
 Programming (Natural, Cobol, Assembler), design
 Operating system, TP monitor, SVC installation
 Supervisor and coordinator
 Mainframe, Unix, Linux and/or Windows

Dieter W. Storr
August 2008 [email protected] 8
Database Design
(Mainframe)

Hardware level
 Help to determine number and type of disks, cache
 Help to distribute disks to channels
 Determine which component to be allocated on what
disk, for example ASSO, DATA, WORK, PLOG, TEMP,
SORT, CLOG, etc.
 Disk arrays – distribution still important?
Dieter W. Storr
August 2008 [email protected] 9
AS DA WO TE SO PL PL CL CL
SO TA RK MP RT OG OG OG OG
1 2 1 2
ASS - N- N- J N N N N N
O K K

DAT N- - J N J N N N N
A K

WOR N- J *) J J N N N N
K K

TEM J N J - J J J J J
P

SOR N J J J **) J J J J
T

PLO N N N N N - N N N
G1

PLO N N N N N N - N N
G2

CLO N N N J J N N - N
G1

CLO N N N J J N N N -
G2 Dieter W. Storr
August 2008 [email protected] 10
Database Design
(Mainframe)

Hardware level – PLOG Performance


 Since ADA52: LFIOP > 0
 WORK and PLOG I/Os asynchronously
 No wait for I/Os
 Minimize I/Os by using large blocksizes for
WORK and PLOG
 Good results with half-track blocking
 For PLOG: don’t use tape, use disk
NPLOG=[0, 2-8]

Dieter W. Storr
August 2008 [email protected] 11
Database Design
(Mainframe)

Hardware level – CLOG Performance


 Very costly in performance
 Activate on demand only
 APAS has own CLOG, writing from a subtask
 TRIM is using crunching to minimize I/Os
 NCLOG=[0, 2-8]

Dieter W. Storr
August 2008 [email protected] 12
Database Design
(Mainframe)

Hardware level
 Distribution of ADABAS nuclei to different CPUs
 Help to determine the priorities between ADABAS, TP
Monitor, EntireX and others
 Distribution of nuclei to logical machines (VM)
 Work load manager and service class
http://storrconsulting.com/sc510-ada006.html
Dieter W. Storr
August 2008 [email protected] 13
Database Design
(Mainframe)

Hardware level – to be measured (1)


 DASD analysis, space and data management
 Channel and I/O activities
 Processor status and usage, SRM and PR/SM
 Address space activities
 Paging and swapping
 Cache device usage
Dieter W. Storr
August 2008 [email protected] 14
Database Design
(Mainframe)

Hardware level – to be measured (2)


 Usage of CSA, ECSA, SQA, ESQA (ADA SVC)
 ENQ usage
 ASP usage of work space
 Used OP code
 Type and reason for interrupts
 Name of loaded system overlays / length of overlay
queues
Dieter W. Storr
August 2008 [email protected] 15
Database Design
(Mainframe)
V e r sElapsed
t r i c h e n eTime
Zeit

SRB = Service Request Block


TCB = Task Control Block
CPU = Processor
CPU Time
CPU-Zeit

SRB
TCB-Zeit
TCB
SRB-Zeit Wait
Wartezeit
Time Time Time

elapsed time = wait time + SRB time + TCB time


Dieter W. Storr
August 2008 [email protected] 16
Database Design
(Mainframe)

Hardware level – tools


 MVS -- z/OS:
ALERT, CMF, CUE, EXPLORE, LOOK, MVS-PT,
OMEGAMON, RESOLVE, RMF-II
 VSE:
EXPLORE, SMART, SMT
 CICS:
CMF, EXPLORE for CICS, THE MONITOR FOR CICS
Dieter W. Storr
August 2008 [email protected] 17
Database Design
(Unix)
Hardware level
 Spreading the container files (RAID devices?)
 For Linux only: use file system ext3
 Most of what applies on the mainframe also applies
to ADABAS on Unix or Windows
 Increasing system V IPC resources by using several
parameters, e.g. AIO_MAX (not for AIX)

Dieter W. Storr
August 2008 [email protected] 18
Database Design
(Unix)

Hardware level
 Enabling asynchronous I/O (AIX)
 Changing the thread scheduling model (AIX)
 Raw device or file system
 Most of the ADABAS container files can be located on both,
for example ASSO, DATA, WORK, SORT, etc.
 Some files can only be loaded on file system, for example
ADAMUP ISN, FDT, raw data
Dieter W. Storr
August 2008 [email protected] 19
Processes

Database
Shell Library Programs
s

System Calls

Design (Unix) (read,fork...)


UNIX
-
Kernel

System Call Interface

OS (Processor) File System Admin exec


Process
 IBM AIX Mgmt
System
 SUN Solaris (UltraSPARC) Buffer

 HP-UX (PA_RISC) Character Block


Virtual
Storage
Mgmt
 HP-UX (Itanium) Driver

 LINUX (IA-32) Red Hat


Hardware Interface
 LINUX (IA-32) SUSE
 IBM zLinux (zSeries)
File System
Dieter W. Storr
August 2008 [email protected] 20
Database Design
(Unix)
 Process Management
 Parallel execution of multiple processes (multi tasking)
 Mode switching
 Privileged kernel mode
 Less privileged user mode
 Context switch – process is swapped out to RAM
 Excessive context switching = CPU bottleneck
http://www.uwsg.iu.edu/UAU/process/manage.html

Dieter W. Storr
August 2008 [email protected] 21
Database Design
(Unix)

Memory Management
 IPC Interprocess Communication
 Message queue (like a mailbox)
 Signals, files, pipes
 Shared memory segments
 Semaphore (locking mechanism used to control
access to to files, shared memory, message
queues or any system resource)
 ipcs displays and ipcrm destroys a semaphore

More info see SL24, technical papers


Dieter W. Storr
August 2008 [email protected] 22
Database Design
(Unix)

Performance Management
 User-state CPU

 System-state CPU

 I/O Time and Network Time

 Virtual Memory Performance

 Time spent running other programs

Dieter W. Storr
August 2008 [email protected] 23
Database Design
(Unix)

Measure Performance Management (1)


 cron Process scheduling
 nice/renice Change priorities
 setpri Set priorities
 netstat Network statistics
 nfsstat NFS statistics
 time/timex Process CPU Utilization
 uptime System Load Average

Dieter W. Storr
August 2008 [email protected] 24
Database Design
(Unix)

Measure Performance Management (2)


 ps Process Statistics
 iostat BSD tool for I/O

 sar Bulk System Activity

 vmstat BSD tool for V. Memory

 gprof Call Graph profiling

 prof Process Profiling

 trace Used to get more depth

http://www.circle4.com/jaqui/papers/webunuk.html
Dieter W. Storr
August 2008 [email protected] 25
Database Design
(Unix)
Measure Performance Management (3)
 Commands may differ depending on the platform
they are being run on, for example AIX:
 tprof CPU Usage
svmon Memory Usage


 filemon Filesystem, LV .. activity

 netpmon Network resources

 sar command with several sar –options

SarCheck from Aptitune Corp., analyzing sar output


http://www.circle4.com/jaqui/papers/webunuk.html
Dieter W. Storr
August 2008 [email protected] 26
Database Design
User level
 Data modeling
 [Help to] determine the transition from
logical to physical database design (DBA or
DA)
 Entity relationship
 Normalization

 Denormalization

 Unified Modeling Language


Dieter W. Storr
August 2008 [email protected] 27
Source:
ISBN 3-528-
15289-3
Dieter W. Storr
August 2008 [email protected] 28
Database Design
 Normalization – technique for data analysis
defined in relational database theory
 First normal form 1NF
 Eliminate repeating attributes / groups

 Each record has a primary key

 Second normal form 2NF


 Eliminate attributes, which are related to a

multi valued key. Create a separate table.


 Third normal form 3NF
 Eliminate attributes not dependent to the

key. Create a separate talbe.


Dieter W. Storr
August 2008 [email protected] 29
Database Design
 Denormalization
 Transform entities / relation and cardinality
 1:1 same primary key

 1:1 different primary key but same attributes

 1:N common part of primary key

 1:N hierarchical structure

 Sub-entities and common primary key

 Split record type

 Add record types, for example results

 Add fields

Dieter W. Storr
August 2008 [email protected] 30
Database Design
 Denormalization
 1:N Integrate primary key as foreign key into
subordinated entity
 1:1C or 1:NC Insert new attribute into primary
entity
 1:N recursive primary key of superordinated line
is foreign key in the subordinated line or all
primary keys of subordinated
 1:N multiple recursive: Primary key in relational
table.
Dieter W. Storr
August 2008 [email protected] 31
Database Design
 Denormalization N:M
 Two files and multiple field in second entity
 One file with multiple field in PE group
 Two files and multiple field in first entity
 One file and one PE group

All solutions have pros and cons

Dieter W. Storr
August 2008 [email protected] 32
Database Design
 Manual denormalization
 Transform relations and cardinalities
 Determine integrity rules
 Determine access paths
 Implement database physically
 Optimize processes
 Performance and tuning

Dieter W. Storr
August 2008 [email protected] 33
Database Design

From Object-Oriented Programming


 Unified Modeling Language (UML)

 UML is a standard notation for the


modeling of real-world objects as a first
step in developing an object-oriented
design methodology. Determine access
paths

Dieter W. Storr
August 2008 [email protected] 34
Database Design
 Its notation is derived from and unifies
the notations of three object-oriented
design and analysis methodologies:
 Grady Booch's methodology for describing a
set of objects and their relationships
 James Rumbaugh's Object-Modeling
Technique (OMT)
 Ivar Jacobson's approach which includes a
use case methodology

Dieter W. Storr
August 2008 [email protected] 35
Database Design
 Use-Case Modeling

 An actor represents anything that


interacts with the system

 A use case is a “chunk” of


functionality performed by a system,
yielding a measurable result of value for
an actor

Dieter W. Storr
August 2008 [email protected] 36
Database Design
A use case diagram is drawn to illustrate that use cases and actors
interact by sending stimuli to one another

Customer
Conduct Bank Transactions
Bank

Run Reports

Maintain ATM Machine


ATM Maintainer
Dieter W. Storr
August 2008 [email protected] 37
Database Design
 Scenario
 Object (State, Behavior, Identity)
 Interaction Diagrams
 Sequence Diagrams and Scripts
 Collaboration Diagrams
 Link Notations
 Classes and Objects

Dieter W. Storr
August 2008 [email protected] 38
Database Design
 User level
 Different databases for
 DBAs, Test and development

 User acceptance test

 Production and staging (FNAT,

FUSER, FSEC, FDIC)


 Training, Spool NAF, CON-NECT, CASE, ESS,

etc.

Dieter W. Storr
August 2008 [email protected] 39
ADABAS Parameters

 Determine some of the parameters in


connection with the system group to avoid an
increase of
 CPU time
 Paging rate
 Number of I/Os

Dieter W. Storr
August 2008 [email protected] 40
ADABAS Parameters

 Influences performance
 Size of buffer pool
 Size of work pool
 Size of dynamic caching
 Number of buffer flushes
 Bypass device caching
 Size of protection log (work part 1)

Dieter W. Storr
August 2008 [email protected] 41
ADABAS Parameters

 Influences performance
 Number of queues and threads
 Size of format buffer
 Size of TBI pool
 Size of hold queue
 Size of security pool
 Values of time limit windows

Dieter W. Storr
August 2008 [email protected] 42
Transaction Design
DB transaction must end before DC transaction

READ VIEW1 BY ISN R1. READ VIEW1 BY ISN


DISPLAY FIELD1 DISPLAY FIELD1
UPDATE G1. GET VIEW1(R1.)
END TRANSACTION UPDATE (G1.)
END-READ END TRANSACTION
END-READ

Dieter W. Storr
August 2008 [email protected] 43
Transaction Design
Add many DB transactions into one (batch)
Reason: performance, ET commands are costly
. . .
Note:
UPDATE
ADD 1 TO #UPDATE-COUNTER
Hold queue
overflow
IF #UPDATE-COUNTER > 50
NAT3009-1
RESET #UPDATE-COUNTER NAT3045
END TRANSACTION
Work-1 overflow
END-IF NAT3009-15
Dieter W. Storr
August 2008 [email protected] 44
Transaction Design
 Determine the number of write commands
per logical DB transaction
 STORE, UPDATE, DELETE
 Hold queue overflow NAT3009-1 NAT3045
 Back-out, Work-1 overflow, NAT3009-15
 Adjust parameters HQ, LP

Dieter W. Storr
August 2008 [email protected] 45
Transaction Design
 Determine the maximal number of
ADABAS commands per DC transaction
 Between terminal I/Os
 Adjust Natural parameter MADIO to avoid
NAT1009
 TP monitor: CPU time limit exceeded
 TP monitor: ADALIMIT=32767 (before cancel)
 TP monitor: ADACALLS=50 (before rolls)
 TP monitor: ADAROLL=.1 (before rolls)

Dieter W. Storr
August 2008 [email protected] 46
Transaction Design
 See handouts:
‘System Event Conditions and User ID
Handling’
 Unplanned System Event Descriptions
 Parameter values in different databases
 Effect
 Action

Dieter W. Storr
August 2008 [email protected] 47
Online and Batch Process
 ADABAS doesn’t differentiate between online
and batch users
 Batch users can send more ADABAS
commands per second than online users
 Batch users can influence the online response
time
 DBAs can discuss with OP the best time to
use batch programs, for example before 8:00
AM and after 5:00 PM.

Dieter W. Storr
August 2008 [email protected] 48
Online and Batch Process
 Possibilities to slow
down batch processes Batch

 Write user exit B in


ADALNK
 Batch slow down from ADALNK
Treehouse (TRMUEXBB) User Exit B
by time, commands, jobs
 Batch class priorities
 Work load manager
ADABAS

Dieter W. Storr
August 2008 [email protected] 49
Back-up and Recovery
Procedures

 ADABAS backup is primarily used to physically


restore a database
 Create procedures (JCL) to back-up and
restore databases
 Create procedures for disaster recovery D/R

Dieter W. Storr
August 2008 [email protected] 50
W e e k ly
ADABAS 6.2.2 Back-up at LA Times
2 1 :0 0 -2 1 :3 0 2 1 :3 0 -1 :1 5 2 :0 0 3 :0 0 8 :0 0 -1 1 :0 0

A D A P n B K F A D A P n P L C A D A P n P L C
O n lin e S A V E F E O F P L P L O G S w itc h

D is k
P o o l P D S , G D G s , e tc .

D F D S S A D A P n B K O B R M /A B A R S
F u ll V o lu m e C o p y O n lin e S e v e ra l J o b s
B a c k -u p S A V E s

J o b N u m b e r o f
3 4 9 0 ta p e s
A D A P 1 B K O 2
A D A P 2 B K O 3 5
A D A P 3 B K O 1 6
A D A P 4 B K O 8
A D A P 5 B K O 4
6 5
D F D S S / o n e 5 9
ta p e p e r v o lu m e
B R M /A B A R S 2 2
T O T A L 2 1 1
( O n ly fo r A D A B A S ) P ic k -u p b y R e c a ll
S ta tu s : 1 2 N o v 2 0 0 4

Dieter W. Storr
August 2008 [email protected] 51
Back-up and Recovery
Procedures
Basic restore procedure (based on the previous slide)
 Full volume restore (only formatted ASSO, DATA,
WORK, PLOG etc. areas)
 Format WORK, PLOG1, and PLOG2

 Restore the databases by using online save back-ups


and protection logs (RESTONL)
 Regenerate all activities after the last back-up of all
databases by using the protection logs
 Repeat ADABAS utilities, for example mass ADALOD
updates
 Continue to regenerate the relevant files

Dieter W. Storr
August 2008 [email protected] 52
Where to get recovery
info from
Without ADARAI
 ADAREP and ADASAV: Session/PLOG #

 ADASAV job: dataset name

 ADAREP CPLIST: SYN1/SYN2 and other


synchronized checkpoints
 PLCOPY jobs: dataset name, from/to block #

Dieter W. Storr
August 2008 [email protected] 53
Where to get recovery
info from
With ADARAI
 CHKDB: Check the Database Status

 DISABLE: Deactivate Recovery Logging

 LIST: Display Current RLOG Generations

 PREPARE: Initialize and Start the RLOG

 RECOVER: Build a Recovery Job Stream

 REMOVE: Remove the Recovery Aid

Dieter W. Storr
August 2008 [email protected] 54
A D A R A I V7.4 SM2 DBID = 00215 Started 2006-08-26 20:15:10

Parameters:
-----------
ADARAI LIST GENS=YES,RELGEN=2-0
Recovery Log File for database 215

MINGENS value is 16
Start RABN for Log Data Area is 21
Highest Log Area RABN is 480
Current value for Rotating RABN is 305
I Gen- I I Block I Date / Time I
I Number I S I From To I From To I
I--------I---I-----------------I---------------------------------------------I
I 744 I N I 305 305 I 2006-08-26 14:32:32 2006-08-26 14:32:54 I
I 743 I N I 304 304 I 2006-08-25 21:03:04 2006-08-26 14:32:32 I
I 742 I N I 303 303 I 2006-08-24 21:03:28 2006-08-25 21:03:04 I
I 741 I N I 302 302 I 2006-08-23 21:03:11 2006-08-24 21:03:28 I
I 740 I N I 301 301 I 2006-08-22 21:02:50 2006-08-23 21:03:11 I
I 739 I N I 300 300 I 2006-08-21 21:02:58 2006-08-22 21:02:50 I
I 738 I N I 299 299 I 2006-08-20 21:02:48 2006-08-21 21:02:58 I
I 737 I N I 298 298 I 2006-08-19 14:33:30 2006-08-20 21:02:48 I
I 736 I N I 297 297 I 2006-08-18 21:02:40 2006-08-19 14:33:30 I
I 735 I N I 296 296 I 2006-08-17 21:03:18 2006-08-18 21:02:40 I
I 734 I N I 295 295 I 2006-08-16 21:02:48 2006-08-17 21:03:18 I
I 733 I N I 294 294 I 2006-08-15 21:02:53 2006-08-16 21:02:48 I
I 732 I N I 293 293 I 2006-08-14 21:03:03 2006-08-15 21:02:53 I
I 731 I N I 292 292 I 2006-08-13 21:02:59 2006-08-14 21:03:03 I
I 730 I N I 291 291 I 2006-08-12 14:34:19 2006-08-13 21:02:59 I
I 729 I N I 290 290 I 2006-08-11 21:02:43 2006-08-12 14:34:19 I
I--------I---I-----------------I---------------------------------------------I

Dieter W. Storr
August 2008 [email protected] 55
<snip>

*** 2006-10-09 21:03:29 Nucleus PLOG Number=1815


*** SAVE DATABASE ONLINE

Save dataset PLOG Number = 1815


Block number of SYN1/4-Checkpoint = 4174
Block number of SYN2/5-Checkpoint = 4184
FILES = 6,7,8,9,11,12,15,17,19,25,37,40,42,46,53,55,77,106
FILES = 108,109,111,113,117,122,198

ADARUN DBID=215,SVC=254,DEVICE=9990,LP=65535
ADARUN PROGRAM=ADASAV,TNAX=18000
ADARUN IGNDIB=NO

ADASAV SAVE BUFNO=2,TTSYN=60

//DDSAVE1 DD DSN=ADABAS.PROD.DB1.BACKUP.FULL.G2327V00(+1),
// UNIT=3490,DISP=NEW,DCB=(RECFM=VB,BLKSIZE=262144,
// LRECL=32756),
// VOL=SER=(L06352,L08301,L06382)

DDSAVE1 VOLSER=L06352 From Block=1 (ASSO)


. To Block=115236
. Volume is associated with PLOG No. 1817
.
. DDSAVE1 VOLSER=L06352 From Block=1 (DATA)

<snip>
Dieter W. Storr
August 2008 [email protected] 56
Delta Save Facility (DSF)
ASSO
ASSO ADASAV
NUCLEUS ASSO SAVE
DELTA
Buffer Pool Delta Log (RABN)
DLOG changed RABN

DSF=YES
changed blocks

DATA
DSF=YES DATA Delta Save
DATA

Dual Protection Log DDDSIM


DDPLOGR2 DDSAVE1
Extracted
DSIM
ADARES
PLCOPY Blocks
DSF=YES
DDPLOGR1 PLOG copy
Dieter W. Storr DDSIAUS1
August 2008 [email protected] 57
Delta Save Facility
Full Image
Save
Online/Offline ASSO
DDREST1

ADASAV
Delta Save RESTORE
RABN DSF=YES

DDDELT1-8 DATA
Online
Images DSIM
extracted
RABN
from PLOG DDDSIM
Dieter W. Storr
August 2008 [email protected] 58
B/R Methods
 Disk to Disk
 Mirroring
 Hardware
 Software
 Replicating
 Software

Dieter W. Storr
August 2008 [email protected] 59
Example For Disk Mirroring

Back Up / Hot Site


S/390 UNIX
EMC 5700

SRDF OC-3 link SRDF


remote mirrored remote mirrored
synchronized 12-15 miles synchronized

EMC 5700

S/390 UNIX
Main Platform
Dieter W. Storr
August 2008 [email protected] 60
Peer-to-Peer Remote Copy Extended Distance (PPRC-XD)
PPRC = 60 miles - PPRC-XD = continent

FlashCopy

ESS Shark ESS Shark

- IBM ESS DASD


- HDS
also support PPRC
Also see TimeFinder from EMC

Dieter W. Storr
August 2008 [email protected] 61
How FlashCopy Works
Pre-defined
time window Read only: update requests are queued
NU = NC
Suspend Resume

Read
Read / update only Read / update

snap

Source
Source Physical
Physical
Snapshot
Snapshot
Data
Data Backup
Backup
Source: SAG
ADADBS TRANSACTIONS SUSPEND,TTSYN=60,TRESUME=120
Dieter W. Storr
August 2008 [email protected] 62
ADABAS Data Replication
z/OS
z/OS Image A Target
Image C
Field
Origin
Target DBMS Target
File File Field

Target Target

DBMS z/OS Table Unix


Image B Server D
Dieter W. Storr
August 2008 [email protected] 63
Possible Hot Site Solutions

Enterprise Server Los Angeles

Shark Shark EMC


Converter ESCON
OC3 OC3 FICON OC3
OC3 OC3 OC3
Fiber
Optic
Shark EMC EMC

Own Enterprise Server Hot Site


Dieter W. Storr
August 2008 [email protected] 64
Back-up and Recovery
Procedures

 Logical restore in a parallel updated


environment is generally impossible

S4 N1 N2 E1 A1 ET S1 N1 . . .
User 1 File 20

L4 A1 ET
User 2 File 20

Dieter W. Storr
August 2008 [email protected] 65
Back-up and Recovery
Procedures
Handbook: z/OS Recovery Procedures
 Recovering the z/OS platform
 Reestablishing the network connections
 Recovering the ABARS aggregates
Aggregate Backup And Recovery Support (ABARS) is a function
of DFSMShsm.

 Recovering the ADABAS databases


 Restoring third-party software products
Dieter W. Storr
August 2008 [email protected] 66
Quality Assurance
Quality Control
 Measure hardware and software to control
the performance of the database
 Evaluate database statistics, for example
 Reports

 Session statistics

 ASF

 SYSAOS

 Performance monitors

Dieter W. Storr
August 2008 [email protected] 67
Quality Assurance
Quality Control
 Analyze programs regarding database access
efficiency and transaction design
 Educate and train developers and
programmers regarding database access
commands by using Natural, Cobol, PL/1,
Assembler, SQL
 Performance and tuning in detail 

Dieter W. Storr
August 2008 [email protected] 68
Performance and Tuning

 What data can be collected


 What tools can be used
 How to analyze

Dieter W. Storr
August 2008 [email protected] 69
Performance and Tuning

Symptoms
 Development

 One program is using workload


 Production
 Resources are no longer available and the cause
must be found

Dieter W. Storr
August 2008 [email protected] 70
Performance and Tuning

 Symptoms for increased workload


 Number of I/Os
 Number of ADABAS commands
 CPU time
 Duration of ADABAS commands

Dieter W. Storr
August 2008 [email protected] 71
Performance and Tuning

 Collect performance data (free tools)


 ADAREP
 Session statistics
 User exit 4
 Command log

Dieter W. Storr
August 2008 [email protected] 72
Performance and Tuning
ADAREP
Physical layout ASSO, DATA, WORK
From To Number Dev Table File VOLSER
Blk Blk of Blks Type Type Number

1306 - 1398 93 9990 DSST 0 PAR076


1399 - 1430 32 9990 PPT 0 PAR076
1431 - 1433 3 9990 AC 19 PAR076
1434 - 1434 1 9990 NI 19 PAR076
<snip>

Dieter W. Storr
August 2008 [email protected] 73
Performance and Tuning
ADAREP
File components
File Name Loaded TOP-ISN MAX-ISN Extents Padding
NUA D A% D%
13 AGNT-DRAW-ACTVTY 1991-10-26 3368661 3739111 111 1 1 1
14 AGNT-SRVC-CMPLNT 1995-02-25 6317341 7694255 111 1 1 1
18 CUST-ACCT-ADJSTM 1990-10-14 16079502 20000543 111 1 1 1
19 CHECKPOINT 2002-10-05 2338 5023 111 1 1 1
22 CUSTOMER-ACCOUNT 1994-12-16 11205876 20000543 121 1 1 1
<snip>

Dieter W. Storr
August 2008 [email protected] 74
Performance and Tuning
ADAREP
File space allocations
File Name Alloc.: NI UI AC Data/Cyl
Unused:

13 AGNT-DRAW-ACTVTY 316484 2044 2977 178371/1698


13 115650 1100 34070/324
14 AGNT-SRVC-CMPLNT 41953 485 6126 60502/576
14 2412 254 12900/122
22 CUSTOMER-ACCOUNT 119923 549 15924 416526/3966
22 42850 254 46786/445
<snip>
Dieter W. Storr
August 2008 [email protected] 75
Performance and Tuning
ADAREP
File extents
List I Dev Block I Space Alloc. I From To I Unused Space I
Type I Type Lngth I Blocks Cyl I RABN RABN I Blocks Cyl I
-----I------------I------------------I---------------------I------------------I
AC I 9990 3768 I 15924 81I 2926304 2942227I I
NI I 9990 3768 I 119923 614I 2942228 3062150I 42850 219I
UI I 9990 3768 I 292 1I 3062151 3062442I I
UI I 9990 3768 I 257 1I 3904794 3905050I 254 1I
DSST I 9990 3768 I 111 0I 1548 1658I I
DS I 9990 7548 I 416526 3966I 913133 1329658I 46786 445I
<snip>
Dieter W. Storr
August 2008 [email protected] 76
Performance and Tuning

Nucleus session statistics


 Duration, wait time, CPU time
 I/O statistics
 Logical reads / buffer efficiency
 Command statistics, by thread, by file, by type
 Translated and overwritten formats
 Auto restarts and throwbacks
 Buffer flushes

Dieter W. Storr
August 2008 [email protected] 77
Performance and Tuning
ADABAS

ADABAS
Session Statistics

PGM

ADABAS File

Dieter W. Storr
August 2008 [email protected] 78
Performance and Tuning

Dieter W. Storr
August 2008 [email protected] 79
Performance and Tuning

Dieter W. Storr
August 2008 [email protected] 80
Performance and Tuning

Dieter W. Storr
August 2008 [email protected] 81
Performance and Tuning

Dieter W. Storr
August 2008 [email protected] 82
Performance and Tuning

Dieter W. Storr
August 2008 [email protected] 83
Performance and Tuning

User exit 4
 Example assembler program see source dataset
ADABAS.ADA742.SRCE(USEREX4), ADA811: no
 ADARUN parameter UEX4=pgm
 Gets control after a command processed and
before CLOG will be written
 CLOG dataset must be defined (not dummy)
 ADARUN parameter: LOGGING=YES
 Collect info and print it out at nucleus end

Dieter W. Storr
August 2008 [email protected] 84
Performance and Tuning

User exit B[efore] and A[fter]


 Called from link routine (ADALNK, ADALNC) before
the command will be processed
 Define length of user block (7th ADABAS parameter)
in user exit 4: LNUINFO=xxx bytes
 Fill in user block in UEXITB with performance data,
for example Natural program name
 Example assembler program see source dataset
ADABAS.ADA742.SRCE(UEXITB), ADA811: no

Dieter W. Storr
August 2008 [email protected] 85
Performance and Tuning

Command Log
 V4: CLOGLAYOUT=4 (ADA8: no longer supported)
 V5-7: CLOGLAYOUT=5
 V8: CLOGLAYOUT=8, also new extended ADABAS
control block (ACBX)
 ADARUN parameter LOGGING=YES
 ADABAS PRILOG utilities for V4, V5, for V8
available with ADA811 and L002 tape

Dieter W. Storr
August 2008 [email protected] 86
Performance and Tuning

Command Log
 Physical I/Os are very costly in time
 Be careful: CLOG is using the work pool (LWP),
even if it is not written physically – was a problem
under ADA526, RC88, under ADA7/8 ?
 CLOG can be switched on and off via UEX4
 CLCOPY via UEX2 and

Dieter W. Storr
August 2008 [email protected] 87
User-Program / TP-Monitor

ADALNK / ADALNC LNUINFO EQU Bytes

USER-EXIT-B USER-EXIT-A

Control-Block - CB User-Block

FB RB SB VB IB
ROUTER

ADABAS

NUCLEUS ADARUN UEX2=progname


ADARUN UEX4=progname
USER- USER- ADARUN LOGGING=YES
EXIT-2 EXIT-4 ADARUN LOGCB=YES
........ und eventuell andere Puffer

aktiv
RJE
(DD)CLOGR1 (DD)CLOGR2

Job-Übergabe

..CMD... ASSO...
S1 519
S2 2713
ADARES PRILOG /
CLCOPY PRILOG5
S2 1683 Source:
FB .......
SB
ISBN 3-528-
.... 15289-3
Dieter W. Storr
August 2008 [email protected] 88
BATCH TP-MONITOR

User-Program User-Program
CALL 'ADABAS' USING ....
CALL 'ADABAS' USING....
CB FB RB SB VB IB
CB FB RB SB VB IB

ADARUN
ADABAS CSECT

Dynamisches LINK

ADALNC UB
ADALNK UB

USER- USER-
USER- USER-
EXIT-B EXIT-A
EXIT-B EXIT-A

ROUTER / SVC

ADABAS ADABAS ADABAS Source:


DATENBANK 1 DATENBANK 2 DATENBANK 3 ISBN 3-528-
15289-3
Dieter W. Storr
August 2008 [email protected] 89
Performance and Tuning

AFPLOOK
 Determine, which files are candidates for
ADABAS Fast Path
 ADABAS 7.1: ADAAFP
 ADABAS 7.2 and ADA811: AFPADA
 It is invoked using the ADARUN command:
ADARUN FASTPATH=YES
 Was (<ADA7) special user exit 4 from SAG
Dieter W. Storr
August 2008 [email protected] 90
Performance and Tuning

AVILOOK
 ADABAS Access Analysis Tool
 Identify files that may benefit from the
ADABAS Vista partitioning option.
 It’s a SYSAOS function

Dieter W. Storr
August 2008 [email protected] 91
Performance and Tuning

Nucleus
Parame-
ters 5 %
Applica-
tion Logic
70 % File
Design
20 %
Hardware
5%
Source:
ISBN 3-528-
15289-3
Dieter W. Storr
August 2008 [email protected] 92
Performance and Tuning

 Collect performance data (add-on tools)


 SYSAOS (SAG)
 ADABAS Statistic Facility (SAG)
 Review (SAG)
 APAS/Insight/SpaceMan (Debug, Goal, Legent,
CA)
 TRIM (Treehouse)

Dieter W. Storr
August 2008 [email protected] 93
Performance and Tuning

 Collect performance data (add-on tools)


 Profiler for Natural (Treehouse)
 Test Coverage Analyzer for Natural (World
Quality Systems Limited, Derby, England
 INFONAT from InfoTech-CS, s.r.o. Brno, CSSR
 Omegamon (Candle, IBM)
 Strobe (Compuware)
 TMON – The Monitor for CICS (ASG Software
Solutions)

Dieter W. Storr
August 2008 [email protected] 94
Performance and Tuning
SYSAOS
Code Basic Services Code Other Services
---- ---------------------- ---- ---------------------
A Session monitoring 1 Adabas Cache Facility
C Checkpoint maintenance 2 Delta Save Facility
F File maintenance 3 Trigger Maintenance
M Database maintenance 4 AOS Security
O Session opercoms 5 Transaction Manager
R Database report 6 Adabas Statistics
S Space calculation 7 Vista
? Help 8 Fastpath
. Exit 9 SAF Security

Dieter W. Storr
August 2008 [email protected] 95
Performance and Tuning

PREFETCH / MULTIFETCH
 Find candidates with high number of read
sequenses
 For batch and online – but mostly for batch

Dieter W. Storr
August 2008 [email protected] 96
Performance and Tuning

PREFETCH / MULTIFETCH
//DDCARD DD DISP=SHR,DSN=ADABAS.CNTLLIB(ADANUC)
// DD DISP=SHR,DSN=ADABAS.CNTLLIB(MULTFTCH)

PREFETCH=YES
PREFIFILE=123,PREFICMD=L1 include file (<7.4 exclude)
PREFIFILE=135,PREFICMD=L3
PREFIFILE=135,PREFICMD=L9
PREFNREC=xxx not higher than the number of reads per loop
PREFSBL=xxxxx PREFSBL = 2* ( ARB * PREFNREC * 4/3 )
PREFTBL=xxxxxx set equal to PREFSBL unless multiple
sequential processes are involved
Dieter W. Storr
August 2008 [email protected] 97
Performance and Tuning

READ (50000) VIEW1 BY ISN with different PREFSBL.


ADABAS Calls w/o Multifetch = 50,000
ADABAS Calls with Multifetch: see figure
Number of I/Os with and w/o Multifetch are approx. the same
but can be different depends on the ADABAS buffer pool
Dieter W. Storr
August 2008 [email protected] 98
Education and Training

 Educate and train staff members


 Inhouse or extern training through SAG or
others

Dieter W. Storr
August 2008 [email protected] 99
Education and Training

Analysts, developers, programmers


 Improve database techniques and access
routines
 Learn programming techniques, e.g. in
NATURAL
 Learn how to us the data dictionary PREDICT

 New and updated versions and releases

Dieter W. Storr
August 2008 [email protected] 100
Education and Training
Data Administrators
 Transform the logical into the physical data
model
 Determine and evaluate optimal access paths
and use it for the data model
 Usage of scheme generator of PREDICT CASE

Dieter W. Storr
August 2008 [email protected] 101
Education and Training
Data Administrators
 Usage of PREDICT GATEWAY to migrate from
Excelerator or IEW to PREDICT
 Learn how to migrate to PREDICT from

 UML
 BPM, for example ARI
 ......
 Inform about new and updated versions and
releases
Dieter W. Storr
August 2008 [email protected] 102
Education and Training
Operating
 Design and apply job procedures to

support the database, e.g. utilities, jobs,


MQSeries, EntireX
 Inform about new and updated versions

and releases

Dieter W. Storr
August 2008 [email protected] 103
Education and Training
User
 Help to develop and carry out training for

new or updated applications


 Help to train end-user if they can use

applications like Super Natural, especially


in search strategies

Dieter W. Storr
August 2008 [email protected] 104
Data Security

 ADABAS Security
 NATURAL Security
 PREDICT Security
 SYSAOS Security
 Third-party products, e.g TRIM, APAS/Insight,
N2O, etc.

Dieter W. Storr
August 2008 [email protected] 105
Data Security
ADABAS Security
 Data encryption (only DATA)

 ADASCR
 Access or update level by file
 Value-level protection
 ADASAF -- System Authorization Facility
 RACF, ACF2, Top Secret
 ADAESI

Dieter W. Storr
August 2008 [email protected] 106
Data Security

Dieter W. Storr
August 2008 [email protected] 107
Data Security

SAF Repository

Product Protects
ADABAS SAF ADABAS
ADABAS SQL Server SAF ADABAS SQL
Entire Net-Work SAF Entire Net-Work version 5.6 and above
EntireX SAF EntireX, Entire Broker, Broker Services
NATURAL SAF NATURAL

Dieter W. Storr
August 2008 [email protected] 108
Data Security

ADASAF
 Entire SAF Gateway

 Entire Network SAF (NETSAF)

Dieter W. Storr
August 2008 [email protected] 109
Data Security

 NATURAL Security (MF, UNIX, Windows)


 SYSSEC
 Users
 Libraries
 Links Between Users and Libraries
 DDMs/Files
 Utilities
 Applications
 Other Object Types
 Profile Parameters

Dieter W. Storr
August 2008 [email protected] 110
Data Security

 NATURAL Security (MF, UNIX, Windows)


 LOGONEX1-3
 NSCxxEX1: xx= US, LI, DD, FI, EX – User Exits
 NSC---L, NSC---P, etc. -- Application Interfaces
 SECNOTE - User Exit for Security Notes
 Plug-ins under NSC
 SYSDIC under NSC
 SYSAOS under NSC

Dieter W. Storr
August 2008 [email protected] 111
Data Security

 NATURAL SAF Security


 Add-on to NSC
 SAF-compliant (RACF, CA-ACF2, CA Top Secret)
 SYSSAFOS (defined in NSC)
 SAF interfaces: NSFNPAS, NSFNPASZ, NSFNPAX

Dieter W. Storr
August 2008 [email protected] 112
Data Security

 PREDICT Security

Dieter W. Storr
August 2008 [email protected] 113
Data Security

ADABAS Online System Security


 Requires Natural Security

Dieter W. Storr
August 2008 [email protected] 114
Data Security

 Third-party products, e.g TRIM, APAS/Insight,


N2O, etc.

Dieter W. Storr
August 2008 [email protected] 115
Standard Routines
Help Functions

 Write HTML-based help functions and publish


it into your Intranet
 Publish the manuals (not security)

Dieter W. Storr
August 2008 [email protected] 116
Maintain and Optimize
DB System

 Check and search SL24 for


 Early warnings
 Fixes
 Technical papers
 Search SAG-L for
 Problems and customer solutions
 Do a Google search, for example
 “ADABAS response code 148” or “Unix Tools”
Dieter W. Storr
August 2008 [email protected] 117
Maintain and Optimize
DB System

 Observe the databases – plan ahead


 Nucleus session statistics
 Extents
 Buffer flushes
 ASSO, DATA, WORK I/Os
 Compare logs with previous sessions
 .....

Dieter W. Storr
August 2008 [email protected] 118
Maintain and Optimize
DB System

 Observe the databases – plan ahead


 ADABAS reports
 Extents
 Unused spaces
 File distribution in connection with accesses
 .....

Dieter W. Storr
August 2008 [email protected] 119
Maintain and Optimize
DB System

 Observe the databases – plan ahead


 Reports of performance monitors
 High water marks
 I/O activities
 Unusual events
 Number of field accesses (format buffer)
 Descriptor usages
 .....

Dieter W. Storr
August 2008 [email protected] 120
Maintain and Optimize
DB System
11:56:34 ***** A D A B A S BASIC SERVICES ***** 2006-10-02
DBID 215 - High Water Marks - PACUH02

Pool / Queue I Size I Used I %Used I Date Time I


------------------------------------------------------------------------------
Attached Buffer(NAB) I 1310720 I 276224 I 21.0 I I
Command Queue (NC) I 61440 I 4800 I 7.8 I 2006-10-02 09:27:34 I
Format Pool (LFP) I 2650000 I 2649844 I 99.9 I 2006-10-01 00:07:04 I
Hold Queue (NH) I 112168 I 10304 I 9.1 I 2006-10-02 09:13:38 I
ISN-List Table (LI) I 7000 I 3668 I 52.4 I 2006-10-01 08:00:50 I
Seq. Cmd. Table(LQ) I 9000 I 2912 I 32.3 I 2006-09-23 21:25:21 I
User Queue (NU) I 90848 I 57120 I 62.8 I 2006-10-02 09:24:43 I
Unique DE Pool (DUQ) I 5300 I 1980 I 37.3 I 2006-09-28 18:00:33 I
Security Pool (LCP) I 2000 I 0 I 0.0 I I
UQ File List (UQF) I 31080 I 14256 I 45.8 I 2006-10-02 09:24:43 I
ATM Trans. IDs (XID) I 0 I 0 I 0.0 I I
Work Pool (LWP) I 870000 I 410292 I 47.1 I 2006-09-23 21:25:22 I
Redo Pool (LRDP)I 0 I 0 I 0.0 I I
Dieter W. Storr
August 2008 [email protected] 121
Maintain and Optimize
DB System
I/O statistics
I/O counts (including initialization)
READS WRITES
------------------------------------
ASSO 8919359 1462298
DATA 74228690 1191707
WORK 1625 1168619
PLOG 70 927378
CLOG 0 0
------------------------------------
Total 83149744 4750002

Log. reads 804,563,314 [/ phys. reads =]


Buffer eff. 9.0

Dieter W. Storr
August 2008 [email protected] 122
Maintain and Optimize
DB System
5299,256 Formats had to be translated
0 Formats had to be overwritten
0 Autorestarts were done
4 Throw-backs due to ISN problem
0 Throw-backs due to space problem
3,235 Bufferflushes were done

Dieter W. Storr
August 2008 [email protected] 123
Maintain and Optimize
DB System
Command Queue (NC)

ET L3 S1
Selection by Throwbacks if
- Priority - ISN problem
- Age - Space problem (LWP)
- Cmd type - Deadlocks (LBP RABNs
- ET block
Threads (NT)

A1 S1 S2
active ready to run waiting

Interrupts and thread changes by waiting of resources


I/Os, RABNs, LWP space, WORK-II
Dieter W. Storr
August 2008 [email protected] 124
Maintain and Optimize
DB System

 Observe the databases – plan ahead


 Reports of special ADABAS utilities
 ADAICK, ADAACK, ADADCK
 Block usage
 Padding area usage
 Compressed record length (other block sizes?)
 Estimate ADAM accesses (if used)
 .....

Dieter W. Storr
August 2008 [email protected] 125
Maintain and Optimize
DB System
ADAACK
*********************************************
* Check AC for File 19 (CHECKPOINT ) *
*********************************************
Reusable ISNS (Hexadecimal):
00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
<snip>
Pass 1 - Load Address Converter into memory.
---------------------------------------------
ERROR-126, AC-ELEMENT contains DS-RABN 00000004 (4) (Duplicate ISN)
DS Block=00000007 (7), ISN=000009D1 (2513)
<snip>

Dieter W. Storr
August 2008 [email protected] 126
Maintain and Optimize
DB System
ADADCK DSCHECK FILE=019,USAGE

RABN LNG I....1....2....3....4....5....6....7....8....9.....I %


00000001 1CDA I************************************************* I 98
00000002 1CA8 I************************************************ I 97
00000003 10B5 I**************************** I 57 <
00000004 1D0C I************************************************* I 99
00000005 1D1E I************************************************* I 99
RABN LNG I....1....2....3....4....5....6....7....8....9.....I %

412 Records processed for File 19,


the largest record has 629 bytes.

Dieter W. Storr
August 2008 [email protected] 127
Maintain and Optimize
DB System

 Observe the databases – plan ahead


 Reports of ADABAS Statistic Facility
 Analyze trend reports
 .....
 Reports of user exits (4 and B)
 . . . . .

Dieter W. Storr
August 2008 [email protected] 128
Maintain and Optimize
DB System
------------------------------------------------------------------------------
2005-12-12 18:16:13 ADABAS Capacity Planning Page 1
ADAREP3 ZINDWS
------------------------------------------------------------------------------
DB Allocated Mega Bytes Used Mega Bytes Unused Mega Bytes Number
ASSO / DATA PCT ASSO / DATA PCT ASSO / DATA PCT Volume
----- ----------- ----- ----------- ----- ----------- ----- ------
PROD1 2336 100.0 285 12.2 2051 87.8 1
2520 100.0 2093 83.1 427 16.9 1
----- ----------- ----- ----------- ----- ----------- ----- ------
Subtot 4856 100.0 2378 49.0 2478 51.0 2
------------------------------------------------------------------------------
PROD2 16357 100.0 13780 84.2 2577 15.8 7
27726 100.0 25555 92.2 2171 7.8 11
----- ----------- ----- ----------- ----- ----------- ----- ------
Subtot 44083 100.0 39335 89.2 4748 10.8 18
------------------------------------------------------------------------------
<snip>

Dieter W. Storr
August 2008 [email protected] 129
Maintain and Optimize
DB System
------------------------------------------------------------------------------
DB Allocated Mega Bytes Used Mega Bytes Unused Mega Bytes Number
ASSO / DATA PCT ASSO / DATA PCT ASSO / DATA PCT Volume
----- ----------- ----- ----------- ----- ----------- ----- ------
Total 522508 100.0 458609 87.7 63899 12.2 213
------------------------------------------------------------------------------
Remarks:
In addition to the above mentioned ASSO and DATA volumes,
the following additional space is needed for each database:
--- ------------------------------------------------
Vol Database Components
--- ------------------------------------------------
1 WORK1
2 PLOG1/2 - protection log
1 ADARAI - recovery log information
- RLOG1 - recovery log information / with PLOG
- RLOGM1 - recovery log information / with PLOG
- CLOG1/2 - command log information / not yet (2)
2 TEMP1/2 - temporary area for utilities
2 SORT1/2 - sort area for utilities
1 DSIM1 -
--- ------------------------------------------------
9
------------------------------------------------------------------------------
End of the report
------------------------------------------------------------------------------
Dieter W. Storr
August 2008 [email protected] 130
Maintain and Optimize
DB System

 Document installation processes


 Describe all datasets
 Describe scheduled jobs, for example CA-7
 Add new volumes
 Write tools (ADAREP+) for capacity planning
 Analyze and evaluate shut-down statistics
 Maintain ADABAS databases and versions

Dieter W. Storr
August 2008 [email protected] 131
Maintain and Optimize
DB System

 Maintain used and free file numbers


 Reorganize databases and files
 Refresh development, acceptance test, and
training DB with production data
 Analyze problems and solve them

Dieter W. Storr
August 2008 [email protected] 132
Maintain and Optimize
DB System

 Analyze problems and solve them, for


example
 ADABAS nucleus doesn’t respond to ADAEND
 ADABAS nucleus won’t start
 Change tape/cartridge/VTS unit
 User file is blocked after 5th extent
 User file extent cannot be allocated
 Checkpoint file extent cannot be allocated

Dieter W. Storr
August 2008 [email protected] 133
Maintain and Optimize
DB System

 Maintain and optimize other SAG products:


 NATURAL
 NATURAL Security
 ADABAS Basic System (AOS, etc.)
 PREDICT
 TP Monitor Interfaces (Com-plete and/or CICS)
 Review
 EntireX
 .....
Dieter W. Storr
August 2008 [email protected] 134
Maintain and Optimize
DB System

 Maintain and optimize third-party products:


 CA: APAS/Insight, SpaceMan, PLEU
 Treehouse: TRIM, N2O, . . . . .
 UNIX performance tools
 Mercury LoadRunner and others – see the URLs

 http://h30097.www3.hp.com/docs/porting/interop/performance
.html
 http://www.itworld.com/Comp/3380/UIR010329cockcroftletters
/#ruletool

Dieter W. Storr
August 2008 [email protected] 135
Maintain and Optimize
DB System

 Open problem request to SAG (SL24)


 Open C/E requests (SL24)
 Discuss problems and C/Es at your User
Group meetings and/or SIGs
 Give presentations during SAGGROUP
meetings. --- Yes! You will learn from it!
 ......

Dieter W. Storr
August 2008 [email protected] 136
Ideal DBA Profile
Mainframe and Unix
 Organizing and managing computer data

 Ensure integrity and availability

 Ensure that computer server environments


are functioning properly
 Ensure that any development or modifications
are consistent with the organization’s
computer architecture

Dieter W. Storr
August 2008 [email protected] 137
Ideal DBA Profile
Mainframe and Unix
 Plan and install upgrades to DBMS

 Maximize performance of computer systems

 Design and modify databases as per user


requests and system requirements
 Monitor system performance

 Establish and implement backup and recovery


processes

Dieter W. Storr
August 2008 [email protected] 138
Ideal DBA Profile
Mainframe and Unix
 Establish data security and integrity

 Manage disk space

 May need to be available after hours to


perform some of the duties

Dieter W. Storr
August 2008 [email protected] 139
Ideal DBA Profile

 Bachelor’s degree in MIS, Computer Science


or related field.
 Minimum of five years IT experience with at
least 2 years as a DBA
 Experiences in one or more DBMS
 Knowledge of DB concepts, theories and
principles

Dieter W. Storr
August 2008 [email protected] 140
Ideal DBA Profile

 2-3 years experience in DB design – from


logical to physical DB design
 Excellent analytical skills
 Previous success working on mission critical
technology projects.
 Capacity planning

Dieter W. Storr
August 2008 [email protected] 141
Ideal DBA Profile

Very good experience in hard and software


 Mainframe, for example
 Hardware architecture, for example

 Coupling links, channels,


 Operating systems, for example
 z/OS, z/VM, VSE, Linux, Unix, or BS2000
 Languages, for example
 Assembler, Natural, JCL
 System and tuning software
Dieter W. Storr
August 2008 [email protected] 142
Ideal DBA Profile
Very good experience in hard and software
 UNIX
 Hardware architecture

 SAN devices
 Unix authentication and administration
 Active Directory
 Operating systems, for example
 HP-Unix, Windows XP, Linux, AIX – Unix/Sun Solaris

Dieter W. Storr
August 2008 [email protected] 143
Ideal DBA Profile
Very good experience in hard and software
 UNIX
 Knowledge of programming concepts,

techniques and languages, for example


 Development Platforms
 Client server
 Citrix
 n-tier
 Web

Dieter W. Storr
August 2008 [email protected] 144
DBA Salary
 US:
 Starting level up to: $73,896

Santa Barbara, for example $81,390


 Median expected salary: $84,824

Santa Barbara, for example $93,299


 Senior level: $96,162+

Santa Barbara, for example $105,734


 + bonuses
Source: http://swz.salary.com/salarywizard/...........

Dieter W. Storr
August 2008 [email protected] 145
DBA Salary
 UK:
 Range of typical starting salaries: £16,000

- £20,000 ($37.514)
 After two-three years salaries typically

range from £20,000 - £30,000 ($56.270)


 At a senior level/with experience (e.g. after

10-15 years in the role): £35,000 -


£45,000+ ($84.406)
1 British Pound = 1.87569 US Dollar
Source: http://www.prospects.ac.uk/......... (July 2006)
Dieter W. Storr
August 2008 [email protected] 146
Ideal DBA Profile

 Must be able to effectively work on multiple


projects concurrently
 Strong organizational and time management
skills.

Dieter W. Storr
August 2008 [email protected] 147
Ideal DBA Profile

 Excellent written and oral communication skills


 Ability to work in a team environment
 Project management experience
 Knowledge in data dictionaries
 Tuning knowledge
 System automation knowledge

Dieter W. Storr
August 2008 [email protected] 148
Future Requirements
 Network administration
 Knowledge of networking architecture
 How to measure response time in the
network
 Web access
 Knowledge in downsizing, for example from
the mainframe to Unix or Windows
 Client-server technology

Dieter W. Storr
August 2008 [email protected] 149
Future Requirements
 Service-Oriented Architecture (SOA)
 Collection of services
 Loosely coupled software architecture
 Services and connections

Dieter W. Storr
August 2008 [email protected] 150
Future Requirements
Acquiring knowledge about
 Model Driven Architecture (MDA)
A way to organize and manage enterprise
architectures (Leader: IBM Rational)
 Computation Independent Model (CIM)
 Platform Independent Model (PIM)
 Platform Specific Model (PSM)
 Implementation Specific Model (ISM)

Dieter W. Storr
August 2008 [email protected] 151
Future Requirements

MDA provides an open, vendor-


neutral approach to the
challenge of business and
technology change
MDA separates business and
application logic from
underlying platform technology
Built using UML and other OMG
model standards
Source:
http://www.omg.org/mda/

Dieter W. Storr
August 2008 [email protected] 152
Position of a DBA

 Part of a database group (ADABAS, Oracle,


Sybase, etc.)
 Not integrated in programming
 Authorized to issue directives
 Same level as programming managers and
system programmer manager

Dieter W. Storr
August 2008 [email protected] 153
Position of a DBA

 Help to design or “the designer?”


 Help to advise or “the adviser?”
 .....

Dieter W. Storr
August 2008 [email protected] 154
Everything
DBA is under
control

Dieter W. Storr
August 2008 [email protected] 155

You might also like