Use TE_VRFY_ZIIP_ENVIRON@BESn to ensure that zIIP resources are being used when they are available in the system. If there are zIIP processors available to perform work, but you are not using them, this check goes into exception status.
Every 24 hours.
15 minutes.
Using zIIP processors is considered the best practice for performing encryption work. When zIIP processors are available to use, the zIIPExploitation attribute should be set to Y and the PercentRunOnzIIP should be set to a non zero value.
None.
Yes.
Yes.
BESH0011E zIIP processors are enabled for use, but the BESn zIIPExploitation attribute setting prevents the use of zIIP processors.
For more information see the Configuration Guide and the Messages Guide.
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |