DB2 for z/OS: Systems Administration

This course is the definitive DB2 for z/OS systems administration course.
It comprises all the information required to understand and manage DB2 system functions. The course describes and explains the installation and tailoring of the DB2 system and its attachments, system security, problem determination, system recovery and performance issues.
This course is applicable to all DB2 for z/OS environments up to and including DB2 11.

This course is also available for one-company, on-site presentations and for live presentation over the Internet, via the Virtual Classroom Environment service.


On successful completion of this course you will be able to:

  • describe the address space structure and components of a DB2 subsystem
  • understand the DB2 installation process
  • identify DB2 functions that best suit the requirements of their site
  • implement security for the DB2 system
  • understand and implement DB2 system and data recovery and restart procedures
  • understand the control and use DB2 trace information to perform system and application tuning
  • understand the basic problem determination tools.

Who Should Attend

System Programmers, technical DBAs and other technical support personnel responsible for implementing and/or managing a DB2 for z/OS system.


A working knowledge of TSO/ISPF and a basic understanding of SQL and DB2 objects (databases, tables, indexes, etc.) used in DB2 systems.


3 days

Fee (per attendee)

£1550 (ex VAT)

Course Code



DB2 System Architecture

Architecture overview; Working Storage Areas; Buffer, Sort, RID & EDM pools; Buffer Pools - 64 bit addressing; EDM pool; Sort pool; RID pool; DB2 Attachments; System data sets & databases; DB2 objects; Object characteristics; SQL overview; DB2 Interactive (DB2I); Basic DB2 operations; DB2 commands; DB2I commands panel.
This segment examines the major components of the DB2 system.

DB2 System Installation, Migration & Modification

Definitions; DB2 modes: migration to DB2 10, migration to DB2 11; Installation / Migration steps; DASD storage requirements; Storage estimates: DB2 system, DB2 data sets; Virtual storage requirements; Buffer, Sort & RID pool storage; EDM pool storage; The major Installation / Migration tasks; Loading DB2 libraries (the SMP/E process); The installation CLIST; Invoking the installation CLIST; Updating the CLIST defaults (DSNTIJXZ); DSNTIPA1 - Installation CLIST Main Panel; DSNTIP0A - data sharing options (Type INSTALL); DSNTIP0B - data sharing options (Type MIGRATE); Installation CLIST Panels: DB2 10, DB2 11; DSNTIPC, DSNTIPC1 - CLIST calculations; The customised jobs; Migration considerations ; Pre-migration queries (DSNTIJPM); Migration compatibility; Migration tasks; Prerequisites & maintenance level of current system; Migration steps; Fallback; Enable New Function Mode jobs; Updating DB2 - using the installation CLIST; Updating DB2 - modifying job DSNTIJUZ; Invoking modified parameters; -SET SYSPARM command.
This segment identifies and describes the major tasks involved in installing a DB2 subsystem.

Connecting to DB2

DB2 Attachments; DB2 connections (Attachments); Universal Language Interface Module (DSNULI); DSNULI entry points; TSO Attachment; Job DSNTIJVC - Build the CLIST library; Make libraries available to TSO; Connect DB2I panels to main panel; Invoking TSO Attachment; CICS Attachment; CICS / DB2 connection; Defining DB2CONN; Defining DB2ENTRY; Defining DB2TRAN; Controlling CICS Attachment; IMS Attachment; IMS Subsystem Member (SSM); Subsystem Member relationships; Resource Translation Table (RTT); Controlling IMS attachment.
Introduces the various attachment facilities and how they are set up and invoked.

DB2 Security Administration

Security overview; Address space authorisation; Protected access profiles; Permitting RACF access; Protecting DB2 data sets; Security management (DB2 or RACF); Security strategy (Transaction Manager or DB2) ); Security management (centralised or decentralised); Traditional DB2 security mechanism; Security terminology; Authorisation id; Maintaining security; Data Control Language; Grouped privileges; Additional administrative privileges; Explicit & implicit privileges; Ownership considerations; Level of access; Using VIEWs; Multi-Level Security overview; Security labels; Row level granularity; Multi-Level Security and SELECT; Multi-Level Security and INSERT; Multi-Level Security and UPDATE; Multi-Level Security and DELETE; Multi-Level Security and utilities; Row and column access; Row permissions; Column masks; DB2 security using RACF profiles; RACF / DB2 External Security Module; Installation; Mapping DB2 authorisation checks; Scope of RACF classes; Multi-subsystem scope classes; Single subsystem scope classes; Customisation; DB2 objects and RACF classes; Profiles.
Covers the system security requirements and the SQL syntax to maintain DB2 security.

DB2 Logging

DB2 Logging; DB2 log processing; Unit Of Recovery; Two-phase commit protocol; Active Log parameters; Checkpoint parameters; Checkpoint records; Logging commands - SET LOG; Logging commands - DISPLAY; Logging commands - ARCHIVE.
Describes the DB2 logging strategy and the components involved.

DB2 Data Recovery

Backup & recovery components; Invoking online utilities using DB2I; Invoking utilities - dataset names; Invoking utilities - control statements; Controlling utilities using DB2I; COPY utility; COPYTOCOPY; MERGECOPY utility; QUIESCE utility; RECOVER utility; Point-In-Time recovery; REBUILD INDEX utility; REPORT utility; MODIFY utility; Other online utilities; Stand-alone utilities (service aids); Catalog & directory recovery; Catalog & directory point in time recovery; P-I-T recovery implications.
Discusses the utilities available to backup and restore DB2 application and system data.

DB2 Shutdown, Startup & Recovery

DB2 command format; Starting DB2; Integrity - normal termination; Integrity - abnormal termination; Log Initialisation; Current Status Rebuild; Forward Log Recovery; Forward Backward Log Recovery; Processing log records; In-doubt resolution; Deferred restart: effect on committed UORs, effect on in-flight UORs; Delaying backout of long running tasks; Effect of delaying backout; Conditional restart: Control Record, log Truncation / limit restart, bypass backout / cold start; Conditional restart implications; Maintaining data integrity with conditional restart; Stopping DB2; BACKUP SYSTEM utility; BACKUP SYSTEM control data; RESTORE SYSTEM utility; Restoring to a point in time.
Examines the utilities to backup and recover the entire system and discusses the normal and specialised DB2 start-up processes.

DB2 Monitoring & Control

DB2 commands; Controlling the DB2 subsystem; Controlling the IRLM; Controlling the TSO Attachment; Controlling the CICS Attachment; Controlling the IMS Attachment; Issuing commands using DB2 Interactive; Controlling Distributed Data Facility; Controlling logging; Controlling buffer pools; Controlling data sharing; Controlling utilities; Controlling Resource Limit Facility; Controlling databases; Controlling threads; Controlling procedures; Controlling functions; DB2 traces; Trace classes; Controlling traces.
Describes the DB2 traces available, and their use in basic system and application tuning, and general control of the DB2 system.

Problem Determination

Basic code structure; DB2 subcomponents; DB2 control block structure; DB2 page sets; Page set structure; Index structure; Index keys and pointers; Data navigation; RIDs, map ids, pointers and holes; Row headers; Row data format; Versions and system pages; OBDREC entries; Version examples; Identifying and handling problems; Basic dump analysis; Diagnosis tools: traces, utilities; Possible problem areas; Active log out of space; Active log I/O errors; Archive log I/O errors; BSDS errors; Forced single BSDS mode; Recovering BSDS; Data errors; Down level data sets.
Covers the DB2 messages and tools available to handle various problem scenarios.

Performance Overview

What is 'performance'?; Performance objectives; Workload categories; Service Level Agreements; Performance factors; System parameters; EDM pool size; Buffer pool sizes; Buffer pool thresholds; Buffer pool development; Database design factors; Application design factors; DB2 traces.

What the students say

Good pace, presented in a way that I could understand easily.


© RSM Technology 2017