Limited supportBMC provides limited support for this version of the product. As a result, BMC no longer accepts comments in this space. If you encounter problems with the product version or the space, contact BMC Support.BMC recommends upgrading to the latest version of the product. To see documentation for that version, see BMC AMI Ops Monitor for CMF 6.3.

CPU Utilization by Protect Key Report


The CPU Utilization by Protect Key Report shows CPU status by storage protection key.

The CPU Utilization by Protect Key Report is produced by using the PROTKEY Analyzer control statement. The data is obtained by using the CPU Extractor control statement.

There are three sections in the CPU Utilization by Protect Key Report:

  • Sub System
    This section gives information about protect keys 0 through 7.
  • V = V
    This section shows all jobs running under key 8 for V=V.
  • V = R or Special V = V
    This section shows all protect keys that had either nonpageable jobs that were running under them or pageable jobs that were not in key 8. Keys 9 through F can appear in this section as well.

If dashes (---) appear for a given protect key under the CPU column, no activity information was encountered during sampling. If dashes appear for all protect keys under a given CPU, that CPU does not exist. For purposes of this report, you must specify the ID of the CPU to be examined.

The following figure shows an example of the CPU Utilization by Protect Key Report.

PRODUCED BY CMF ANALYZER (v.r.mm  RSL yymm )                CPU UTILIZATION BY PROTECT KEY REPORT                 RPTSEQ     4 PAGE     25
BMC SOFTWARE, INC.                                           XYZ COMPANY                               REPORT DATE: DD MMM YY 14.08
 ACTL 10 JUN YY 16.15.00  11 JUN YY 16.30.00            WORLDWIDE HEADQUARTERS                          SYSTEM ID: SJSE     Z v.rr.n


 BASED ON REC TYPE/# RECS/# SAMPLES/REC HOURS:  240-1/96/17.2K/23.87
 ---------------------------------------------------   CPU  0: SUB SYSTEM SECTION  -------------------------------------------------
                                     KEY        SUB SYSTEM           BUSY        SUPRV        PROBL

                                      0         SUPERVISOR            5.5        100.0           .0
                                      1         SCHEDULER,JES          .0        100.0           .0
                                      3         RESERVED               .0           .0        100.0
                                      4         RESERVED               .5         98.8          1.2
                                      5         DATA MANAGEMENT        .0        100.0           .0
                                      6         TCAM/VTAM              .1        100.0           .0
                                      7         IMS/DB2                .2        100.0           .0
-------------------------------------------------------  CPU  0: V = V SECTION  ----------------------------------------------------
                                     KEY        SUB SYSTEM           BUSY        SUPRV        PROBL

                                      8         V = V                  .2         19.4         80.6
-***********************************************************************************************************************************
----------------------------------------------------   CPU  1: SUB SYSTEM SECTION  -------------------------------------------------
                                     KEY        SUB SYSTEM           BUSY        SUPRV        PROBL

                                      0         SUPERVISOR            5.4        100.0           .0
                                      1         SCHEDULER,JES          .0        100.0           .0
                                      4         RESERVED               .7        100.0           .0
                                      5         DATA MANAGEMENT        .0        100.0           .0
                                      6         TCAM/VTAM              .1        100.0           .0
                                      7         IMS/DB2                .2        100.0           .0

CPU Utilization by Protect Key Report field descriptions

The table below describes each field in the CPU Utilization by Protect Key Report.

Note

The same columns of data appear in each section of this report.

Field

Description

KEY

protect key being measured; its value is 0 through F

SUB SYSTEM

name of the system function that usually resides in this protect key

BUSY

percentage of CPU time in this protect key

SUPRV

percentage of CPU busy time in this protect key in supervisor state

PROBL

percentage of CPU busy time in this protect key in a problem state

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*