This presentation explains how to monitor memory consumption of DataStage processes during run time.



Similar documents
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8.

Enterprise Applications in the Cloud: Non-virtualized Deployment

Operating System and Process Monitoring Tools

Setting up PostgreSQL

OS Thread Monitoring for DB2 Server

System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring

Hands-On UNIX Exercise:

INASP: Effective Network Management Workshops

TOP(1) Linux User s Manual TOP(1)

HP-UX Essentials and Shell Programming Course Summary

DS License Server V6R2013x

Recommendations for Performance Benchmarking

Data Integrator Performance Optimization Guide

Video Scripts for View Account Summary and Balances. Slide 1. Audio: No Audio. Page 1 of 13

ISP Best Practices. Addressing a DDoS Attack on a Host. Hervey Allen Network Startup Resource Center

Basic C Shell. helpdesk@stat.rice.edu. 11th August 2003

Introduction to Linux and Cluster Basics for the CCR General Computing Cluster

Thirty Useful Unix Commands

CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1

Pattern Insight Clone Detection

IBM WebSphere DataStage Online training from Yes-M Systems

Outline. Unix shells Bourne-again Shell (bash) Interacting with bash Basic scripting References

PUBLIC Performance Optimization Guide

University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014

Optimizing System Performance by Monitoring UNIX Server with SAS

3. License Management - Unix & Linux

by Jonathan Kohl and Paul Rogers 40 BETTER SOFTWARE APRIL

Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008

Authoring for System Center 2012 Operations Manager

Offline Image Viewer Guide

Network Security EDA /2012. Laboratory assignment 4. Revision A/576, :13:02Z

MyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC

Expert Reference Series of White Papers. Performance and Troubleshooting with esxtop

CRM Global Search: Installation & Configuration

Linux Crontab: 15 Awesome Cron Job Examples

Higher National Unit Specification. General information for centres. Multi User Operating Systems. Unit code: DH3A 34

Web Application s Performance Testing

Linux System Administration on Red Hat

SSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed.

PROGRAMMING FOR BIOLOGISTS. BIOL 6297 Monday, Wednesday 10 am -12 pm

Lecture 25 Systems Programming Process Control

DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x

Introduction to Operating Systems

This document presents the new features available in ngklast release 4.4 and KServer 4.2.

Kiko> A personal job scheduler

Unix Scripts and Job Scheduling

Users Guide. Ribo 3.0

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

SAP HANA Client Installation and Update Guide

Forensic Analysis of Internet Explorer Activity Files

grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print

SendMIME Pro Installation & Users Guide

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

USEFUL UNIX COMMANDS

Preface. DirX Document Set

Monitoring, Tracing, Debugging (Under Construction)

SANbox Manager Release Notes Version Rev A

TDA - Thread Dump Analyzer

System Administration

SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package Data Federation Administration Tool Guide

An Introduction to SAS/SHARE, By Example

Leak Check Version 2.1 for Linux TM

Cisco Setting Up PIX Syslog

Some quick definitions regarding the Tablet states in this state machine:

How to control Resource allocation on pseries multi MCM system

A Crash Course on UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

LSN 10 Linux Overview

Subversion Integration

Witango Application Server 6. Installation Guide for OS X

SLURM Resources isolation through cgroups. Yiannis Georgiou Matthieu Hautreux

Tutorial 0A Programming on the command line

Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright Palo Alto Networks

Microsoft Windows PowerShell v2 For Administrators

University of Southern California Shibboleth High Availability with Terracotta

StreamServe Persuasion SP5 Microsoft SQL Server

IBM Cloud Manager with OpenStack

Using SNMP to Obtain Port Counter Statistics During Live Migration of a Virtual Machine. Ronny L. Bull Project Writeup For: CS644 Clarkson University

Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute

Packet Sniffers. * Windows and Linux - Wireshark

Module Title: Advanced Systems Administration 2

MapReduce. from the paper. MapReduce: Simplified Data Processing on Large Clusters (2004)

Open Source Computational Fluid Dynamics

Perdix: A Query Language for Security Logs

Toad for Oracle 8.6 SQL Tuning

New Features in BSF4ooRexx (Camouflaging Java as oorexx)

Tutorial: Load Testing with CLIF

STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE

Monitoring and Managing a JVM

IBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages

Computational Mathematics with Python

Wakanda Studio Features

Transcription:

This presentation explains how to monitor memory consumption of DataStage processes during run time. Page 1 of 9

The objectives of this presentation are to explain why and when it is useful to monitor memory usage of DataStage processes and how to monitor this using the ps command. This presentation also explains how to perform this task under different scenarios. Page 2 of 9

Analyzing memory usage can be useful in several scenarios. Some of the most common scenarios include identifying memory leaks. A memory leak is a type of bug that causes a program to keep increasing its memory usage indefinitely. Another scenario is to tune a job design. Comparing the amount of memory different job designs consume can help you tune your designs to be more memory efficient. The last scenario is to tune job scheduling. Collecting memory usage by processes over a period of time can help you organize job scheduling to prevent peaks of memory consumption. Page 3 of 9

Different operating systems provide different monitoring tools that can collect detailed information. This presentation will use the ps command because it is easy to use and is available on all UNIX and Linux platforms. The syntax to display basic information of all running processes is ps e -o pid, ppid,user, vsz, etime, args. Where pid is the process id, ppid is the parent s process id, user is the user that owns the process, vsz is the amount of virtual memory used by the process, etime is the elapsed time the process has been running, and args is the command line that started the process. Page 4 of 9

The example displayed on this slide shows a list of all running processes and sorts them by memory consumption. To do this, use the ps command and pipe the output to the sort command. In the example output on this slide, the fourth column of the ps results shows the amount of virtual memory being used and the processes with the largest amount of memory are listed first. This output was produced on a machine running AIX 6.1. The format of this output may vary in different operating systems. Page 5 of 9

The example displayed on this slide shows how to capture memory of all osh processes in a continuous loop. osh processes are processes created by DataStage parallel jobs. This command is used to monitor all osh processes over a period of time. In this example, the grep command is used to filter processes with the string osh but this can be modified if you want to filter processes by something else such as user ID or ppid. This loop is started every second but can also be modified by increasing the value after the sleep command. This command will continue to run until you press Ctrl + c. Page 6 of 9

The next example shows how to capture statistics for new processes. Sometimes it is difficult to find a common string to filter the processes you want to monitor. In those cases, and assuming that you can reproduce the problem or condition you want to analyze, you can use this script to keep track of all new processes. This script will ignore processes that existed before the script was executed. This is useful, for example, if you want to monitor all the processes of a job you are about to run. To use this script, open a text editor, create a new file and paste the lines included in this slide. You can edit the variable OUTPUT_FILE to indicate a different location for the output file and the variable SLEEP_TIME to indicate the delay between each execution. Save the file and call it ps_new.sh. Page 7 of 9

Next, make the file executable using the chmod command and run the script. Reproduce the problem or start the job you want to monitor. Press Ctrl + c to stop the script. Inspect the output file to see the results. Monitor the size of the output file while the script is running as it may grow very quickly and take up too much disk space. Page 8 of 9

Page 9 of 9