Now available to the public: IBM Graphical Workload Management (GWLM) tool

After a long hiatus due to vacation and travel, I thought I should come back with a bang :) so...

With great pleasure, I am announcing that we are now able to offer all of you access to the IBM Graphical Workload Management (GWLM) tool!

GWLM is an internally developed tool that Kevin Beck and I have been toying with over the last few years. Its purpose is to allow you to graphically view and manipulate DB2 workload management configurations. We have found it very useful for understanding and modifying the many WLM configurations that we have looked at over the years.

We think you will also find it useful even in its current state of development so we have asked for (and received) permission to let our prototype out into the wild to let all of you take advantage of it.

The IBM Graphical Workload Management Tool provides a visual overview of a workload management (WLM) configuration in the DB2 for Linux, UNIX, and Windows product. The objective of the concept was to show at a glance how work is categorized and controlled as well as allow you to explore and manipulate the details of individual workloads, service classes, etc in a more intuitive manner.


You can find the download file for the tool in a new devloperWorks community IBM Graphical Workload Management (GWLM ) Tool. The .zip file is attached there with the installation, documentation, and licence information.

The GWLM tool was written using Adobe Flex and runs under the Adobe Air infrastructure ( You will need to download and install Adobe Air in order to use this tool.

This tool is provided as-is. This tool is not an official IBM product nor does it represent any commitment by IBM to actually implement or provide a product such as this to the general public at a later date.

Enjoy! :)

Recent Stories
New place to download IBM Graphical WLM (GWLM) tool

How to influence Db2 through RFE Voting: Security

How can I stay current on what fix packs are available for each Db2 release, what Hiper APARs might be out there, and if there are any security vulnerabilities that I should know about?