IBM Z OMEGAMON AI for JVM overview

IBM® Z OMEGAMON® AI for JVM is a member of the OMEGAMON family of mainframe monitoring products. You use IBM Z OMEGAMON AI for JVM to monitor the health of your vital Java™ virtual machines (JVMs) that run on z/OS® operating systems.

Through IBM Z OMEGAMON AI for JVM, you can see operating and environmental characteristics about your JVMs, and key performance metrics, such as garbage collections rates, that help you manage the performance and availability of your JVMs. By using IBM Z OMEGAMON AI for JVM, you can quickly detect problems and take action in real time to speed up problem resolution.

With IBM Z OMEGAMON AI for JVM, you can monitor the performance of JVMs in different environments on z/OS, such as in CICS®, IMS, or DB2® subsystems, or in pure Java application servers like the WebSphere® Application Server or WebSphere Liberty Profile. IBM Z OMEGAMON AI for JVM agents that are installed on LPARs in your enterprise collect data from Java agents that are deployed on monitored JVMs. The Java agents provide JVM-level performance information that affects application response time and throughput such as garbage collection rates, general-purpose processor usage, and specialized processor usage.

IBM Z OMEGAMON AI for JVM can simultaneously monitor large numbers of JVMs running on the z/OS operating system. It uses instrumentation that is built in to IBM JVM on z/OS to discover key performance indicators and passes the metrics directly to the IBM Z OMEGAMON AI for JVM collector, where they are available for display in the Tivoli® Enterprise Portal and in the OMEGAMON enhanced 3270 user interface.

The monitoring data that IBM Z OMEGAMON AI for JVM provides enables you to perform the following tasks:
  • Collect and analyze reliable, up-to-the-second data so that you can make fast and well-informed operating decisions
  • Proactively manage the performance of all of your JVMs from a single, integrated interface
  • Balance JVM workloads
  • Track JVM performance against goals
  • Exploit user-defined and predefined situations based on thresholds to raise different types of alerts