Consider that job-end statistics (if the output is captured or reviewed by the submitter) only represents a portion of what would normally be a chargeback bill/invoice/receipt (okay, or call it cost allocation or recovery). Also, how will a DB2 DDF (remote) customer get their bill or a CICS transaction user, etc. -- these typically involve tables mapping USERIDs to a related owner/group? Considering the cost of DASD and tape storage (local/vault, reel, real, virtual, high-capacity), how will these resources be tallied and communicated to the appropriate department/cost_center or resource consumer?
CPU normalization, rates, and possibly surcharge/discount logic may need to be maintained, depending on the chargeback algorithm and IT chargeback methodology intended to be used for any given system/customer. Support for "new rates" with effective dates and other comprehensive logic should likely be considered, if the reported charges are to be considered credible, especially when transitioning between fiscal calendar cycles. Better to consider generating a consolidated resource consumer report, at day's end (or otherwise), and accumulate the various resource buckets/areas, in a back-end system that post-processes the various SMF and other system logs. Some that come to mind are SMF type 30 (address space activity for batch, TSO, STC, OMVS/USS, and maybe APPC), type 6 (output/print), type 101 (DB2), type 110 (CICS/CMF), IMS log (or BMC's Patrol / IMF), other DBMS tools (IDMS, M204, Datacom, Supra), and DASD (IBM DCOLLECT snapshot), tape (tape mgmt catalog snapshot) focusing on long-term data storage. Given the possibilities of unknowns, it's best to get management's expectations well-documented, evolve that information along with technical/business considerations into an explanation and/or position paper, so all involved parties understand what's at stake before valuable staff resources are expended. Sincerely, Scott Barry SBBWorks, Inc. Date: Thu, 3 Aug 2006 12:00:24 -0400 From: Anne Crabtree <[EMAIL PROTECTED]> Subject: IEFACTRT Does anyone have an example of IEFACTRT using type 30 and doing chargeback that they would be willing to share? ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html