SlideShare uma empresa Scribd logo
1 de 19
SoftBase’s Batch Healthcare:
Checkpoint Facility
SoftBase Batch Healthcare


Batch Healthcare Consists of:


   Attach Facility (DB2 Call Attach)

   Checkpoint (Checkpoint Facility)

   Batch Analyzer ( DB2 Batch Analysis)

   DeadLock Advisor (DeadLock-Timeout Reporting)




    - All can be licensed separately or in combination
SoftBase Checkpoint Facility
Batch Healthcare Solution
SoftBase Checkpoint Facility


What is SoftBase Checkpoint Facility?


   Checkpoint Facility Allows You to Restart DB2 Batch
    Programs At or Near the Point of Failure
SoftBase Checkpoint Facility
SoftBase Checkpoint Facility


Checkpoint Facility


   Restart DB2 batch applications at or near point of failure

   Modify frequency of Commits and Checkpoints on the fly

   Easiest deployment of restart code in the industry
SoftBase Checkpoint Facility


SoftBase Checkpoint Facility & MQ


   Updates to DB2, MQ, and other RRS compliant
                                                        Execute

    resources stay in synch with your program's
    sequential files and cursor positions, working
    storage and random VSAM updates.

   Applications can restart at or near the point of
    failure after abends, recompiles, and even          Rollback

    system IPLs -- with all resources in a consistent
    state.
SoftBase Checkpoint Facility


Checkpoint Facility – How?


   Capturing restart data and storing it in a DB2 table so it is
    recoverable

   Requires no JCL modification to restart, just a resubmit

   Notifying the program that a restart is in progress, and then

   Reopening and repositioning all input and output sequential files and
    restoring working storage
SoftBase Checkpoint Facility


Checkpoint Facility – Functionality


   Subroutines Fully Supported

   I/O Subsystem for Physical Sequential I/O

   Extended and Large Format Physical Sequential Files
SoftBase Checkpoint Facility


Checkpoint Facility – ISPF Monitor


   Active Job

   Waiting on Restart

   Storage Usage

   Frequency Type

   Logical Unit of Work Count

   Checkpoint Count
SoftBase Checkpoint Facility


Checkpoint Facility – IMS Bridge


   Checkpoint Facility provides an IMS bridge for applications that use
    IMS Symbolic Checkpoint and GSAM files only.

   The IMS Bridge eases implementation for shops moving off IMS
    licenses.

   Few IF ANY code changes are required.
SoftBase Checkpoint Facility


Modify Commit Frequency without Code Changes


   Intelligently optimize COMMIT frequency to maximize DB2
    throughput

       o   LUWs, Elapsed Time, I/O Activity

   Avoid deadlock/timeout situations caused by infrequent COMMITS
SoftBase Checkpoint Facility


Checkpoint Facility – VSAM


   VSAM KSDS Repositioning

      o   Support through an API
      o   VSAM data changes are journaled for restart

      o   Journal file is self maintaining
SoftBase Checkpoint Facility


Checkpoint Facility – Data Sharing


   Support Data Sharing Environments

   Restart Data Stored in DB2

   When on DB2 subsystem in a data sharing group fails, Checkpoint
    Facility can restart the application

       o   From the failed subsystem
       o   Or any other subsystem in the group
SoftBase Checkpoint Facility


Checkpoint Facility Deployment


Program function calls can be inserted by 2 different
methods.

   Running Precompiler

    o Taking the defaults, or
    o Customize via control file parameters
   Hand-coding

    o Customize placement by hard-coding into source code
SoftBase Checkpoint Facility


Checkpoint Compiler Overview
      Original
Code Remains
                       User Application
  Unchanged             Source Code
                                              WS SCF




                                                          Restartable Program
                                             boundaries




                                                             Load Module
   Inserts code            SoftBase
statements into        Checkpoint Facility    INIS call
   source code           Pre-Compiler        CKPT call
                                             TERM call

                                             Non-DB2
           Optional,
     for customizing        SCF PC            file I/O
                           Control File
SoftBase Checkpoint Facility


Checkpoint Facility Deployment

Working Storage.
 DBCC-WS-START
   ~~~~~~~            - - - - - > User defined WS data, including
   ~~~~~                          Open Cursor host variables
 DBCC-WS-END

 DBR-Variables

Procedure Division.
        INIS          - - - - -> Loads job/step name key in CKPT_TABLE
                                 & location of WS areas to be saved
L
U       CKPT          - - - - -> Saves contents of WS to CKPT_TABLE
W                                & status listing of all active files

        TERM          - - - - -> Deletes completed job/stepname row
                                 from CKPT_TABLE
SoftBase Checkpoint Facility
Batch Healthcare Solution
SoftBase
   20 Fall Pippin Lane, Suite 202
   Asheville, NC USA 28803
   sales@softbase.com
   support@softbase.com
   800-669-7076




© 2011 Candescent SoftBase, LLC
SoftBase® is a Registered Trademark. All Right Reserved.
Phone: (800) 669-7076 | (828) 670-9900

Mais conteúdo relacionado

Destaque

DB2 for z/O S Data Sharing
DB2 for z/O S  Data  SharingDB2 for z/O S  Data  Sharing
DB2 for z/O S Data SharingSurekha Parekh
 
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the myths
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the mythsDB2 for z/OS and DASD-based Disaster Recovery - Blowing away the myths
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the mythsFlorence Dubois
 
Db2 Important questions to read
Db2 Important questions to readDb2 Important questions to read
Db2 Important questions to readPrasanth Dusi
 
Best practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recoveryBest practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recoveryFlorence Dubois
 

Destaque (7)

IBM DB2
IBM DB2IBM DB2
IBM DB2
 
DB2 9.7 Overview
DB2 9.7 OverviewDB2 9.7 Overview
DB2 9.7 Overview
 
Ibm db2
Ibm db2Ibm db2
Ibm db2
 
DB2 for z/O S Data Sharing
DB2 for z/O S  Data  SharingDB2 for z/O S  Data  Sharing
DB2 for z/O S Data Sharing
 
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the myths
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the mythsDB2 for z/OS and DASD-based Disaster Recovery - Blowing away the myths
DB2 for z/OS and DASD-based Disaster Recovery - Blowing away the myths
 
Db2 Important questions to read
Db2 Important questions to readDb2 Important questions to read
Db2 Important questions to read
 
Best practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recoveryBest practices for DB2 for z/OS log based recovery
Best practices for DB2 for z/OS log based recovery
 

Semelhante a DB2 for z/OS Checkpoint and Restart Solution

Sharing-Knowledge-OAM-3G-Ericsson .ppt
Sharing-Knowledge-OAM-3G-Ericsson   .pptSharing-Knowledge-OAM-3G-Ericsson   .ppt
Sharing-Knowledge-OAM-3G-Ericsson .pptwafawafa52
 
WebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination FeaturesWebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination FeaturesChris Bailey
 
Blue Phoenix Idms Migration
Blue Phoenix Idms MigrationBlue Phoenix Idms Migration
Blue Phoenix Idms MigrationGilShalit
 
Database Cloud Services Office Hours - 0421 - Migrate AWS to OCI
Database Cloud Services Office Hours - 0421 - Migrate AWS to OCIDatabase Cloud Services Office Hours - 0421 - Migrate AWS to OCI
Database Cloud Services Office Hours - 0421 - Migrate AWS to OCITammy Bednar
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CanSecWest
 
VMWARE Professionals - Security, Multitenancy and Flexibility
VMWARE Professionals -  Security, Multitenancy and FlexibilityVMWARE Professionals -  Security, Multitenancy and Flexibility
VMWARE Professionals - Security, Multitenancy and FlexibilityPaulo Freitas
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guidejww330015
 
SAP SQL Anywhere High Availability Tutorial for Business Objects
SAP SQL Anywhere High Availability Tutorial for Business ObjectsSAP SQL Anywhere High Availability Tutorial for Business Objects
SAP SQL Anywhere High Availability Tutorial for Business ObjectsSitesh Patel
 
Installing tivoli system automation for high availability of db2 udb bcu on a...
Installing tivoli system automation for high availability of db2 udb bcu on a...Installing tivoli system automation for high availability of db2 udb bcu on a...
Installing tivoli system automation for high availability of db2 udb bcu on a...Banking at Ho Chi Minh city
 
The Very Very Latest in Database Development - Oracle Open World 2012
The Very Very Latest in Database Development - Oracle Open World 2012The Very Very Latest in Database Development - Oracle Open World 2012
The Very Very Latest in Database Development - Oracle Open World 2012Lucas Jellema
 
VMworld 2013: Automated Management of Tier-1 Applications on VMware
VMworld 2013: Automated Management of Tier-1 Applications on VMware VMworld 2013: Automated Management of Tier-1 Applications on VMware
VMworld 2013: Automated Management of Tier-1 Applications on VMware VMworld
 
Configuration management comes to Windows
Configuration management comes to WindowsConfiguration management comes to Windows
Configuration management comes to WindowsRavikanth Chaganti
 
Best Practice SharePoint Architecture
Best Practice SharePoint ArchitectureBest Practice SharePoint Architecture
Best Practice SharePoint ArchitectureMichael Noel
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
Impact 2009 1783 Achieving Availability With W A Sz User Experience
Impact 2009 1783  Achieving  Availability With  W A Sz   User ExperienceImpact 2009 1783  Achieving  Availability With  W A Sz   User Experience
Impact 2009 1783 Achieving Availability With W A Sz User ExperienceElena Nanos
 
"Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?""Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?"Volker Linz
 

Semelhante a DB2 for z/OS Checkpoint and Restart Solution (20)

DB2 for z/OS Solutions
DB2 for z/OS SolutionsDB2 for z/OS Solutions
DB2 for z/OS Solutions
 
Sharing-Knowledge-OAM-3G-Ericsson .ppt
Sharing-Knowledge-OAM-3G-Ericsson   .pptSharing-Knowledge-OAM-3G-Ericsson   .ppt
Sharing-Knowledge-OAM-3G-Ericsson .ppt
 
WebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination FeaturesWebSphere Technical University: Top WebSphere Problem Determination Features
WebSphere Technical University: Top WebSphere Problem Determination Features
 
Blue Phoenix Idms Migration
Blue Phoenix Idms MigrationBlue Phoenix Idms Migration
Blue Phoenix Idms Migration
 
Database Cloud Services Office Hours - 0421 - Migrate AWS to OCI
Database Cloud Services Office Hours - 0421 - Migrate AWS to OCIDatabase Cloud Services Office Hours - 0421 - Migrate AWS to OCI
Database Cloud Services Office Hours - 0421 - Migrate AWS to OCI
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
 
VMWARE Professionals - Security, Multitenancy and Flexibility
VMWARE Professionals -  Security, Multitenancy and FlexibilityVMWARE Professionals -  Security, Multitenancy and Flexibility
VMWARE Professionals - Security, Multitenancy and Flexibility
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
SAP SQL Anywhere High Availability Tutorial for Business Objects
SAP SQL Anywhere High Availability Tutorial for Business ObjectsSAP SQL Anywhere High Availability Tutorial for Business Objects
SAP SQL Anywhere High Availability Tutorial for Business Objects
 
Installing tivoli system automation for high availability of db2 udb bcu on a...
Installing tivoli system automation for high availability of db2 udb bcu on a...Installing tivoli system automation for high availability of db2 udb bcu on a...
Installing tivoli system automation for high availability of db2 udb bcu on a...
 
Basics to Configure NW Device
Basics to Configure NW DeviceBasics to Configure NW Device
Basics to Configure NW Device
 
The Very Very Latest in Database Development - Oracle Open World 2012
The Very Very Latest in Database Development - Oracle Open World 2012The Very Very Latest in Database Development - Oracle Open World 2012
The Very Very Latest in Database Development - Oracle Open World 2012
 
The Very Very Latest In Database Development - Lucas Jellema - Oracle OpenWor...
The Very Very Latest In Database Development - Lucas Jellema - Oracle OpenWor...The Very Very Latest In Database Development - Lucas Jellema - Oracle OpenWor...
The Very Very Latest In Database Development - Lucas Jellema - Oracle OpenWor...
 
VMworld 2013: Automated Management of Tier-1 Applications on VMware
VMworld 2013: Automated Management of Tier-1 Applications on VMware VMworld 2013: Automated Management of Tier-1 Applications on VMware
VMworld 2013: Automated Management of Tier-1 Applications on VMware
 
Configuration management comes to Windows
Configuration management comes to WindowsConfiguration management comes to Windows
Configuration management comes to Windows
 
Best Practice SharePoint Architecture
Best Practice SharePoint ArchitectureBest Practice SharePoint Architecture
Best Practice SharePoint Architecture
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
Impact 2009 1783 Achieving Availability With W A Sz User Experience
Impact 2009 1783  Achieving  Availability With  W A Sz   User ExperienceImpact 2009 1783  Achieving  Availability With  W A Sz   User Experience
Impact 2009 1783 Achieving Availability With W A Sz User Experience
 
Bfc Presentation
Bfc PresentationBfc Presentation
Bfc Presentation
 
"Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?""Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?"
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

DB2 for z/OS Checkpoint and Restart Solution

  • 2. SoftBase Batch Healthcare Batch Healthcare Consists of:  Attach Facility (DB2 Call Attach)  Checkpoint (Checkpoint Facility)  Batch Analyzer ( DB2 Batch Analysis)  DeadLock Advisor (DeadLock-Timeout Reporting) - All can be licensed separately or in combination
  • 4. SoftBase Checkpoint Facility What is SoftBase Checkpoint Facility?  Checkpoint Facility Allows You to Restart DB2 Batch Programs At or Near the Point of Failure
  • 6. SoftBase Checkpoint Facility Checkpoint Facility  Restart DB2 batch applications at or near point of failure  Modify frequency of Commits and Checkpoints on the fly  Easiest deployment of restart code in the industry
  • 7. SoftBase Checkpoint Facility SoftBase Checkpoint Facility & MQ  Updates to DB2, MQ, and other RRS compliant Execute resources stay in synch with your program's sequential files and cursor positions, working storage and random VSAM updates.  Applications can restart at or near the point of failure after abends, recompiles, and even Rollback system IPLs -- with all resources in a consistent state.
  • 8. SoftBase Checkpoint Facility Checkpoint Facility – How?  Capturing restart data and storing it in a DB2 table so it is recoverable  Requires no JCL modification to restart, just a resubmit  Notifying the program that a restart is in progress, and then  Reopening and repositioning all input and output sequential files and restoring working storage
  • 9. SoftBase Checkpoint Facility Checkpoint Facility – Functionality  Subroutines Fully Supported  I/O Subsystem for Physical Sequential I/O  Extended and Large Format Physical Sequential Files
  • 10. SoftBase Checkpoint Facility Checkpoint Facility – ISPF Monitor  Active Job  Waiting on Restart  Storage Usage  Frequency Type  Logical Unit of Work Count  Checkpoint Count
  • 11. SoftBase Checkpoint Facility Checkpoint Facility – IMS Bridge  Checkpoint Facility provides an IMS bridge for applications that use IMS Symbolic Checkpoint and GSAM files only.  The IMS Bridge eases implementation for shops moving off IMS licenses.  Few IF ANY code changes are required.
  • 12. SoftBase Checkpoint Facility Modify Commit Frequency without Code Changes  Intelligently optimize COMMIT frequency to maximize DB2 throughput o LUWs, Elapsed Time, I/O Activity  Avoid deadlock/timeout situations caused by infrequent COMMITS
  • 13. SoftBase Checkpoint Facility Checkpoint Facility – VSAM  VSAM KSDS Repositioning o Support through an API o VSAM data changes are journaled for restart o Journal file is self maintaining
  • 14. SoftBase Checkpoint Facility Checkpoint Facility – Data Sharing  Support Data Sharing Environments  Restart Data Stored in DB2  When on DB2 subsystem in a data sharing group fails, Checkpoint Facility can restart the application o From the failed subsystem o Or any other subsystem in the group
  • 15. SoftBase Checkpoint Facility Checkpoint Facility Deployment Program function calls can be inserted by 2 different methods.  Running Precompiler o Taking the defaults, or o Customize via control file parameters  Hand-coding o Customize placement by hard-coding into source code
  • 16. SoftBase Checkpoint Facility Checkpoint Compiler Overview Original Code Remains User Application Unchanged Source Code WS SCF Restartable Program boundaries Load Module Inserts code SoftBase statements into Checkpoint Facility INIS call source code Pre-Compiler CKPT call TERM call Non-DB2 Optional, for customizing SCF PC file I/O Control File
  • 17. SoftBase Checkpoint Facility Checkpoint Facility Deployment Working Storage. DBCC-WS-START ~~~~~~~ - - - - - > User defined WS data, including ~~~~~ Open Cursor host variables DBCC-WS-END DBR-Variables Procedure Division. INIS - - - - -> Loads job/step name key in CKPT_TABLE & location of WS areas to be saved L U CKPT - - - - -> Saves contents of WS to CKPT_TABLE W & status listing of all active files TERM - - - - -> Deletes completed job/stepname row from CKPT_TABLE
  • 18. SoftBase Checkpoint Facility Batch Healthcare Solution
  • 19. SoftBase 20 Fall Pippin Lane, Suite 202 Asheville, NC USA 28803 sales@softbase.com support@softbase.com 800-669-7076 © 2011 Candescent SoftBase, LLC SoftBase® is a Registered Trademark. All Right Reserved. Phone: (800) 669-7076 | (828) 670-9900

Notas do Editor

  1. SoftBase Batch Health Care Consists of:Attach Facility - DB2 Call Attach which permits DB2 batch applications to be run as native MVS jobstreamsCheckpoint - Checkpoint Facility which permits DB2 batch applications to restart at or near the point of failureBatch Analyzer - DB2 Batch Analysis which pinpoints the most expensive batch applications and SQL statements anywhere in batchDeadLock Advisor - DeadLock-Timeout Reporting that immediately reports on all batch jobs involved in -904/-911 situations.
  2. SoftBase's Checkpoint Facility Facility allows you quickly insert COMMITs and CHECKPOINTS into your DB2 batch job streams - in some instances without even editing your programs. These COMMITs will often speed up DB2 batch programs and also free up DB2 resources for other production jobs that are running at the same time. After COMMITS are added to your DB2™ batch programs, Checkpoint Facility allows you to quickly restart any abended production job from the point of failure.