IBM Enterprise Workload Manager V2.1

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on September 26, 2006, updated May 03, 2007

  1. .PDF (4.8 MB)


Share this page:   

ISBN-10: 0738496790
ISBN-13: 9780738496795
IBM Form #: SG24-6785-01


Authors: Paola Bari, G. Michael Connolly, Sam Alexander, Andre Botura, Mark Ecker, Kyungmee Park, Cathrin Perzl, Hong Xia and Miho Yamazaki

    menu icon

    Abstract

    This IBM Redbooks publication provides an introduction to the Enterprise Workload Manager (EWLM) Version 2 Release 1. In addition to describing the overall product concept and functionality, it presents a detailed discussion of the elements that comprise an EWLM solution.

    Step-by-step instructions take you through the installation of EWLM code on multiple platforms, for both the domain manager and managed servers, and also show how to enable the instrumentation of the middleware for a 3-tier Web application. The features for administering EWLM are described, along with the monitoring, managing, and reporting capabilities.

    Sample scenarios implemented in the ITSO environment are used to guide you through the process of classifying workload and defining and deploying your own EWLM policy. These scenarios are then used to demonstrate the business goal based partition management capabilities of EWLM.

    Techniques for securing your EWLM domain as well as the load balancing capabilities of EWLM are described. Troubleshooting hints and tips are provided, along with some basic performance considerations to help you design the optimum EWLM solution.

    Table of Contents

    Chapter 1. IBM Enterprise Workload Manager overview

    Chapter 2. Installing and configuring EWLM

    Chapter 3. Using a firewall and securing EWLM

    Chapter 4. Enabling middleware for EWLM

    Chapter 5. EWLM concepts and setup

    Chapter 6. EWLM monitoring and reporting

    Chapter 7. EWLM Management

    Chapter 8. The ITSO EWLM environment

    Chapter 9. Scenarios

    Chapter 10. EWLM traces and logs

    Chapter 11. Performance considerations

    Appendix A. EWLM domain policies

    Appendix B. Additional material

     

    Others who read this also read