IBM Version 52 Computer Accessories User Manual


 
Index
A
active threads 101
activities
monitoring 94
stopping 95
AE_ExecuteCycle 174
AE_ExecuteCycleTime 174
aftrouting.log 89
alerterlogger.log 90
AllowStealing 176
analyzing log files 84
archive.log 90
ASI 173
performance tuning 166
queue tuning 173
queues 172
ASI queue 173
ASM 46
audit.log 93, 94
auditing 93
Authentication.log 92
B
Backuplogs.log 92
Basic Scheduling policy 172
bizIntel.log 91
BLOB 32
bpdeadline.log 92
business process
resolving 232
halted 232
halting 232
interrupted 232
waiting 232
business process execution time
causes 231
improving 230
symptoms
increasing 230
business process threads 3
C
cache 3
determining cause of inefficiency 228
disk 227
inefficient 228
memory 227
soft 227
symptoms of inefficiency 228
cache contents
compressing 180
cache usage 104
CacheThreshold 175
capacity requirements 14
example 15
causes
slow system 234
cdinterop_cdjava.log 90
cdinterop.log 90
cdsp.log 90
ceuinterop.log 90
checklist
Sterling File Gateway 9
Sterling Integrator 5
Clean-Up Processes Monitor 104
cluster environment and JNDI 101
cluster node status 3
common3splogger.log 92
compressing cache contents 180
configuring
DB resource monitor 225
DB2 35
Microsoft SQL Server 51
Oracle 22
console listener
enabling 186
Consume business process 96
controllers 99
creating
performance statistics report 214
crypto.log 90
cspftp.log 90
csphttp.log 90
D
database
buffer pool statistics 29
connection issues 222
failed requests 222
resolve 224
db_optimization_tool 217
down 224
full database
causes 219
issues 218
resolution 220
symptoms 219
instance efficiency 29
JDBC connections 226
maintenance 214
monitoring disk space 14
optimizing 217
planning 13
statistics report 215
storage 26
ASM 26
raw disks 26
tablespaces 27
DB2
configuring 35
connections 39
event monitors 49
indexes 51
logs 47
LOGFILSIZ 48
LOGPRIMARY 48
LOGSECOND 48
NUM_LOG_SPAN 48
DB2 (continued)
monitoring 35, 48
snapshots 48
parameters 38
performance manager 50
storage 44
tablespaces 45
volatile tables 51
deadlock 50, 53, 61, 72
defrag 61
delete.log 90
deprecated resources
identifying 109
monitoring 109
descriptors
file 191, 193
file descriptors 166
determining cause
inefficient cache 228
slow system 234
directory naming convention 82
disabling
perimeter server 106
document persistence 221
DTDs
repositories 185
trusted domains 185
E
ebXML.log 90
EDI 187
edi.log 90
EDIINT.log 90
embeddedEngine.log 90
EnableDeadlines 175
enabling
console listener 186
perimeter server 106
enveloping.properties.in 187
event.log 91
F
Fair Share Scheduling policy 172
file descriptors 191, 193
file system 14
native 16
ftp.log 91
ftpclient.log 91
G
garbage collection 62
example 62
HotSpot 64
tools 65
© Copyright IBM Corp. 2000, 2015 251