Total System Analyzer Modernization Guide
Total System Analyzer is a performance product by BMC. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Total System Analyzer (TSA) was designed to locate high-activity systems and program modules within z/OS environments.
These tools offer comprehensive monitoring and analysis features for z/OS performance management.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What was the primary function of Total System Analyzer?
Total System Analyzer provided reports to identify high-activity systems and program modules. It helped pinpoint areas where resources were heavily utilized, enabling optimization efforts.
What was the role of the Problem Program Evaluator (PPE)?
The Problem Program Evaluator (PPE) was integrated to enhance module performance analysis. PPE provided detailed insights into program module behavior, aiding in identifying performance bottlenecks.
Where is Total System Analyzer functionality available now?
Total System Analyzer is no longer a standalone product. Its functionality has been incorporated into MAINVIEW products, offering a more comprehensive monitoring and performance management solution.
Technical
What were the common commands and configuration methods?
While specific commands are not available due to the product's discontinuation, it likely involved commands to initiate analysis, specify target systems or modules, and generate reports. Configuration likely involved specifying data sources and report parameters.
What types of APIs did Total System Analyzer expose?
Details on specific APIs are unavailable, but performance monitoring tools often expose APIs for data retrieval and integration with other systems. These could include methods for accessing performance metrics and triggering alerts.
What was the general architecture of Total System Analyzer?
Information on the architecture is limited, but it likely involved data collection agents on z/OS systems, a central processing component, and a reporting module. Communication would have occurred over standard z/OS communication protocols.
Business Value
What business value did Total System Analyzer provide?
Total System Analyzer helped organizations identify and address performance bottlenecks, leading to improved system efficiency and reduced resource consumption. This resulted in cost savings and better service levels.
How did Total System Analyzer improve user experience?
By optimizing system performance, Total System Analyzer contributed to improved application response times and overall user experience. This enhanced productivity and satisfaction.
How did Total System Analyzer support decision-making?
The tool provided data-driven insights into system behavior, enabling informed decision-making regarding resource allocation and system tuning. This proactive approach helped prevent performance issues.
Security
What security features were included in Total System Analyzer?
Specific security features are unavailable, but z/OS security mechanisms were likely leveraged for authentication and authorization. Access control would have been integrated with z/OS security systems.
How was data protected, and what audit capabilities existed?
Encryption details are not available, but sensitive data transmitted or stored would have been protected using z/OS encryption capabilities. Audit trails would have been generated to track user activity and system events.
What authentication methods were supported?
Given its integration with z/OS, Total System Analyzer likely supported standard z/OS authentication methods, such as RACF, ACF2, or Top Secret. These methods provided secure user identification and access control.
Operations
How was Total System Analyzer administered?
Administration likely involved configuring data sources, setting reporting parameters, and managing user access. This would have been performed through a z/OS interface or a dedicated administration tool.
What monitoring and logging capabilities were available?
Monitoring capabilities would have included tracking system performance metrics, generating alerts for threshold breaches, and providing historical data for trend analysis. Logging would have captured system events and user activity.
How were performance issues troubleshooted?
Troubleshooting involved analyzing performance reports, identifying bottlenecks, and tuning system parameters. Diagnostic tools within z/OS would have been used to further investigate performance issues.
Ready to Start Your Migration?
Download our comprehensive migration guide for Total System Analyzer or calculate your ROI.