Beruflich Dokumente
Kultur Dokumente
SC09-4459-00
SC09-4459-00
Note Before using this information and the product it supports, be sure to read the general information under Notices on page 533.
First Edition (June 1999) This edition applies to: VisualAge Component Development for WebSphere Application Server Version 3.0, Enterprise Edition for AIX, program number 5765E27 VisualAge Component Development for WebSphere Application Server Version 3.0, Enterprise Edition for Windows NT, program number 5639I07 WebSphere Application Server Version 3.0, Enterprise Edition for AIX, program number 5765E28 WebSphere Application Server Version 3.0, Enterprise Edition for Solaris, program number 5765E29 WebSphere Application Server Version 3.0, Enterprise Edition for Windows NT, program number 5639I09 WebSphere Application Server Version 3.0, Enterprise Edition Development Runtime for Windows NT, program number 5639I11 WebSphere Application Server Version 3.0, Enterprise Edition Development Runtime for AIX, program number 5765E31 WebSphere Application Server Version 3.0, Enterprise Edition Development Runtime for Solaris, program number 5765E30 and to all subsequent versions, releases, and modications until otherwise indicated in new editions. Consult the latest edition of the applicable system bibliography for current information on these products. Order publications through your IBM representative or through the IBM branch office serving your locality. Copyright International Business Machines Corporation 1999. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Figures . Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii ix cicscp - region commands . . . . . . . cicscp - SFS commands. . . . . . . . cicscp - SNA commands . . . . . . . cicscp - SNA link commands . . . . . . cicscp - telnet server commands . . . . . cicscvt - Create data conversion table . . . cicsdb2conf - Congure DB2 . . . . . . cicsdb2import - Build metadata for DB2 cicsddt - DB2 diagnostic tool . . . . . . cicsdefault - Create a copy of the default region . . . . . . . . . . . . . cicsdefaultservers - Create default resource les for servers . . . . . . . . . . cicsdelete - Delete CICS resource denitions cicsdestroy - Destroy a CICS region . . . cicsdfmt - Dump formatter . . . . . . cicsexport - Export CICS resource denitions . . . . . . . . . . . . cicsget - Get CICS resource denition information . . . . . . . . . . . cicsgetbindingstring - Get binding string for region or Encina server. . . . . . . . cicsgpid - Get region process identier . . cicshpterm - 3270 terminal emulator . . . cicsimport - Import CICS resource denitions . . . . . . . . . . . . cicsinstall - Install CICS resource denitions cicsivp - Set up resource denitions for installation verication . . . . . . . . cicslssrc - Check subsystem status . . . . cicslterm - Invoke the local CICS client 3270 terminal emulator . . . . . . . . . cicsmakelv - Create a logical volume . . . cicsmfmt - Monitoring data formatter . . . cicsmigrate - Create migration script . . . cicsmigrateclass - Add and delete resource attributes . . . . . . . . . . . . cicsmigrateclients - Recongure DCE . . . cicsmkcobol - Create the cicsprCOBOL le cicsnotify - Deallocate resources . . . . . cicsppcgwy - Start a PPC Gateway server cicsppcgwycreate - Create a PPC Gateway server server . . . . . . . . . . . cicsppcgwydestroy - Destroy a PPC Gateway server . . . . . . . . . . 109 113 117 119 121 124 126 129 131 142 144 145 148 150 153 156 159 161 162 166 169 171 173 175 178 179 181 184 186 187 190 191 193 195
About this book . . . . . Who should read this book . Document organization . . Conventions used in this book How to send your comments.
. xi . xi . xi . xii . xiii . . . . . . . . . . . . . . . . . . . . 1 1 1 1 8 12 14 16 19 21 24 25 27 32 54 57 61 64 66 73 81 85
Chapter 1. Resource denitions . . . Restrictions on the use of characters . . Shorthand notation for resource denitions Communications Denitions (CD) . . . File Denitions (FD). . . . . . . . Gateway Denitions (GD) . . . . . . Gateway Server Denitions (GSD) . . . Journal Denitions (JD) . . . . . . Listener Denitions (LD) . . . . . . Monitoring Denitions (MD) . . . . . Object denitions (OD). . . . . . . Product Denitions (XAD) . . . . . Program Denitions (PD) . . . . . . Region Denitions (RD) . . . . . . Region Denitions (RD) for le server. . Schema File Denitions (SCD) . . . . Structured File Server Denitions (SSD) Temporary Storage Denitions (TSD) . . Terminal Denitions (WD) . . . . . Transaction Denitions (TD) . . . . . Transient Data Denitions (TDD) . . . User Denitions (UD) . . . . . . . Chapter 2. Resource denition commands and offline utilities . . About the CICS commands . . . . cicsadd - Add CICS resource denitions cicscleandce - Remove DCE groups and CDS directories . . . . . . . . cicscopystanza command . . . . . cicscp - CICS control program . . . cicscp - all options . . . . . . . cicscp - COBOL commands . . . . cicscp - DCE commands . . . . . cicscp - PPC Gateway server commands
Copyright IBM Corp. 1999
. .
. .
89 89 91
. . . . . .
iii
cicsppcgwylock - Lock or unlock a PPC Gateway server . . . . . . . . . . cicsppcgwyshut - Shut down a PPC Gateway server . . . . . . . . . . cicsremovelv - Remove a logical volume cicsrlck - Remove old region lock les. . . cicssdt - SFS diagnostic tool . . . . . . cicssetupclients - Congure DCE for the CICS clients . . . . . . . . . . . cicssetupdce - Create directories and groups within a DCE cell . . . . . . . . . cicssfmt - Statistics formatter . . . . . . cicssfs - Start a CICS SFS . . . . . . . cicssfsconf - Congure a CICS SFS . . . . cicssfscreate - Create a CICS SFS . . . . cicssfsdestroy - Destroy a CICS SFS . . . cicssfsimport - Build an SFSs metadata cicssfslock - Release an SFS lock le . . . cicssfsshut - Shut Down a CICS SFS . . . cicsstart - Start a CICS region . . . . . cicsstop - Stop a CICS region. . . . . . cicstail - Display the end of a le . . . . cicstcpnetname - Display NETNAME for CICS family TCP/IP connection . . . . . cicsteld - Connect telnet clients to regions cicsterm - Invoke the CICS 3270 terminal emulator . . . . . . . . . . . . cicstermp - Printer emulation. . . . . . cicstfmt - Trace formatter . . . . . . . cicstracelter - Trace lter . . . . . . . cicsupdate - Modify CICS resource denitions . . . . . . . . . . . . cicsupdateclass command . . . . . . . cicsusedceservers - Migrate CICS regions and Encina servers to use DCE . . . . . Chapter 3. CICS-supplied transactions Overview of the CICS-supplied transactions How to invoke the CICS-supplied transactions . . . . . . . . . . . Syntax notation used in the descriptions Minimum abbreviation of keywords Default security settings . . . . . . Complete list of CICS-supplied transactions Interface descriptions for the CICS-supplied transactions . . . . . . . . . . . CALF (Data Conversion) . . . . . . . CDCN (Application Diagnosis Conguration) (CICS for AIX) . . . . . CEBR (Temporary Storage Browse) . . . .
197 199 200 201 203 216 218 221 225 228 230 233 235 237 238 240 242 243 245 247 251 255 258 261 263 267 270 273 273 274 275 276 277 278 279 281 287 292
CECI (Command Level Interpreter) and CECS (Syntax Checker) . . . . . . CEDF (Execution Diagnostic Facility) . . CEMT (Runtime Resource Management) An overview of the CEMT parameters How to invoke CEMT . . . . . . Using the CEMT screen . . . . . Concepts of Inquire and Set Operations CEMT PERFORM SNAP . . . . . CEMT INQ/SET AUTOINSTALL . . CEMT INQ/SET AUXTRACE . . . CEMT INQ/SET DUMP . . . . . CEMT INQ/SET DUMPOPTIONS . . CEMT INQ/SET FILE . . . . . . CEMT INQ/SET JOURNAL . . . . CEMT INQ/SET MONITOR . . . . CEMT INQ/SET NETNAME . . . . CEMT INQ/SET PROGRAM . . . . CEMT INQ/SET TASK . . . . . . CEMT INQ/SET TCLASS . . . . . CEMT INQ/SET TDQUEUE . . . . CEMT INQ SET TERMINAL . . . . CEMT INQ/SET TRACE . . . . . CEMT INQ/SET TRANSACTION . . Inquiring upon CICS system parameters using CEMT . . . . . . . . . CESF (Signoff) and CSSF (Signoff) . . . CESN (Signon) . . . . . . . . . CMLV (Console Message Log Viewer). . CRTE (Routing Transaction) . . . . . CSTD (Statistics) . . . . . . . . . Chapter 4. Operator control of FEPI . CEMTmaster terminal transaction . CEMT DISCARD. . . . . . . . CEMT INQUIRE FECONNECTION . CEMT INQUIRE FENODE . . . . CEMT INQUIRE FEPOOL. . . . . CEMT INQUIRE FEPROPSET . . . CEMT INQUIRE FETARGET . . . . . . . . . . . .
. 298 . 309 321 321 . 323 . 324 328 . 330 . 331 . 332 . 333 . 334 . 335 . 338 . 339 . 340 . 342 . 344 . 347 . 348 . 351 . 353 . 354 . . . . . . . . . . . . . . 355 357 359 362 364 367 369 369 370 371 377 381 384 386 389 390 390 390 393 394 395
Chapter 5. CICS-supplied programs . . . Terminal autoinstall user program . . . . Terminal model denition . . . . . . The supplied terminal autoinstall program. . . . . . . . . . . . Terminal autoinstall program parameters When the terminal autoinstall program is accessed. . . . . . . . . . . . External Security Manager user program
iv
Performance monitoring user program . Setting up CICS to call performance monitoring . . . . . . . . . . The Supplied Performance Monitoring User Program . . . . . . . . . Performance monitoring user program parameters . . . . . . . . . . When the performance monitoring program is accessed . . . . . . . Chapter 6. User exits . . . . . . Standard denitions and data types . Constants . . . . . . . . . Standard header structure . . . . Task termination user exit (UE014015). Function prototype . . . . . . Exit-specic constants . . . . . Exit-specic structure . . . . . Fields in exit-specic structure . . Return codes . . . . . . . . Dump request user exit (UE052017) . Function prototype . . . . . . Exit-specic constants . . . . . Exit-specic structure . . . . . Fields in exit-specic structure . . Return codes . . . . . . . . Dynamic transaction routing user exit (UE014025) . . . . . . . . . . Function Prototype . . . . . . Exit-specic constants . . . . . Exit-specic structure . . . . . Fields in exit-specic structure . . Return Codes . . . . . . . . Dynamic distributed program link user (UE015050) . . . . . . . . . . Function prototype . . . . . . Exit-specic constants . . . . . Exit-specic structure . . . . . Fields in exit-specic structure . . Return codes . . . . . . . . Syncpoint user exit (UE016051) . . . Function prototype . . . . . . Exit-specic constants . . . . . Exit-specic structure . . . . . Fields in exit-specic structure . . Return codes . . . . . . . . . . . . . . . . . . . . . . . .
. 395 . 395 . 396 . 400 . 406 . . . . . . . . . . . . . . . . 407 408 408 408 410 410 410 410 411 411 411 411 411 412 412 413 413 413 413 414 414 418 418 419 419 419 420 422 422 422 422 423 423 424
CICS_MFMT_OpenMonitorFile and CICS_MFMT_CloseMonitorFile . . Return codes . . . . . . . CICS_MFMT_ReadNext . . . . Return codes . . . . . . . CICS_MFMT_FindField . . . . Return codes . . . . . . . CICS_MFMT_GetMessage, CICS_MFMT_FreeMessage, and CICS_MFMT_ReleaseCatalogue . . Return codes . . . . . . . Statistics formatter functions . . . CICS_SFMT_OpenStatsFile and CICS_SFMT_CloseStatsFile . . . Return codes . . . . . . . CICS_SFMT_FindRecord . . . . Return codes . . . . . . . CICS_SFMT_ReadRecord . . . . Return codes . . . . . . . CICS_SFMT_Msg2Int . . . . . Return codes . . . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . . . . . . .
. . . . . . . . . . .
. 428 . 429 . 429 . . . . . . . . . . . . . . . . . . . . . . . 430 430 431 431 431 432 432 432 433 433 434 441 442 445 454 457 458 459 464 473 476 480 483 485
. . . . . . . . . . . . exit . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 8. The statistics records . . . About the statistics records . . . . . General statistics . . . . . . . . . Dump statistics . . . . . . . . . File statistics . . . . . . . . . . Intersystem communication (ISC) statistics Journal statistics . . . . . . . . . Logical unit of work (LUW) statistics . . Program statistics . . . . . . . . Runtime database statistics . . . . . Storage statistics . . . . . . . . . Task statistics . . . . . . . . . . Terminal statistics . . . . . . . . Transient data statistics. . . . . . . Transaction statistics . . . . . . . Temporary storage statistics . . . . .
Chapter 9. Environment variables used by CICS . . . . . . . . . . . . 491 CICS and Encina Environment Variables 491 Environment variables for Micro Focus COBOL and Net Express compiler options 498 Chapter 10. Terminal model denitions Chapter 11. Index of CICS resource attributes . . . . . . . . . . 501
Chapter 7. The CICS monitoring data formatter offline utilities . . . . . . Monitoring data formatter functions . .
. 425 . 425
. 507
Contents
Bibliography . Notices . . .
. .
. .
. .
. .
. .
. .
. .
. .
. .
. 531 . 533
. .
. .
. .
. 535 . 539
vi
Figures
1. 2. 3. CEMT INQ . . . . . . . . . CEMT status screen . . . . . . CEMT INQUIRE FECONNECTION screen . . . . . . . . . . . . 324 . 329 . 372 4. 5. 6. 7. CEMT CEMT CEMT CEMT INQUIRE INQUIRE INQUIRE INQUIRE FENODE screen FEPOOL screen FEPROPSET screen FETARGET screen 378 382 384 387
vii
viii
Tables
1. Road map for the CICS Administration Reference book . . . . . . . . . 2. Conventions used in this book 3. Monitoring data formatter les 4. Statistics data formatter les . . . . 5. Shortcode and code pages (Open Systems) . . . . . . . . . . . 6. Shortcode and code pages (Windows NT) . . . . . . . . . 7. Default security settings for the CICS-supplied transactions . . . . . 8. The CEMT extended parameters used with INQUIRE and SET . . . . . . 9. The CEMT extended parameters used with INQUIRE only . . . . . . . 10. Statistic categories. . . . . . . . 11. Statistic types . . . . . . . . . 12. Dump statistics. . . . . . . . . 13. File statistics . . . . . . . . . 14. ISC statistics . . . . . . . . . 15. Journal statistics . . . . . . . . 16. Logical unit of work statistics 17. Program statistics . . . . . . . . 18. Runtime database statistics . . . . . 19. Region pool statistics. . . . . . . 20. Task-shared pool statistics . . . . . 21. Task-private pool statistics . . . . . 22. Task statistics . . . . . . . . . 23. Terminal statistics . . . . . . . . 24. Transient data statistics . . . . . . 25. Transaction statistics . . . . . . . 26. Temporary storage statistics . . . . 27. CICS and Encina Environment Variables . . . . . . . . . . . 28. Environment variables for Micro Focus COBOL compiler options . . . . . xi xii 180 221 249 249 277 321 322 434 438 441 442 446 454 458 459 459 464 466 471 473 477 481 483 485 491 498 29. Road map for terminal model denitions . . . . . . . . . . 30. Terminal Denition attributes for autoinstall models MDCL, MDCI, MD01, MD02, MD03, MD04, MD05 and MD06 . . . . . . . . . . 31. Terminal Denition attributes for autoinstall models MD07, MD08, MD09, MD10, MD11, MD12, MD13 and MD14 . . . . . . . . . . 32. Terminal Denition attributes for autoinstall models MD15, MD16, MD17, MD18, MD19, MD20, MD21 and MD22 . . . . . . . . . . 33. Terminal Denition attributes for autoinstall models MD23, MD24, MD25, MD26, MD27 and MD28 . . . 34. Communications Denitions (CD) 35. File Denitions (FD) . . . . . . . 36. Gateway Denitions (GD) . . . . . 37. Gateway Server Denitions (GSD) 38. Journal Denitions (JD) . . . . . . 39. Listener Denitions (LD) . . . . . 40. Monitoring Denitions (MD) . . . . 41. Product Denitions (XAD) . . . . . 42. Program Denitions (PD) . . . . . 43. Region Denitions (RD) . . . . . . 44. Schema File Denitions (SCD) 45. Structured File Server Denitions (SSD) 46. Temporary Storage Denitions (TSD) 47. Terminal Denitions (WD) . . . . . 48. Transaction Denitions (TD) . . . . 49. Transient Data Denitions (TDD) 50. User Denitions (UD) . . . . . . 51. Alphabetic cross-reference of attribute names to attribute descriptions . . . 501
502
502
503
504 507 507 508 508 509 509 509 510 510 510 513 514 515 515 516 517 517 518
ix
Document organization
The material in each reference chapter is organized alphabetically.
Table 1. Road map for the CICS Administration Reference book
If you want information about ... Resource attributes Resource denition commands and offline utilities CICS-supplied transactions CICS-supplied programs User exits Formatting functions for monitor and statistics data Statistics tables Environment variables used by CICS, Encina and the Micro Focus COBOL compiler Refer to ... Chapter 1. Resource denitions on page 1 Chapter 2. Resource denition commands and offline utilities on page 89 Chapter 3. CICS-supplied transactions on page 273 Chapter 5. CICS-supplied programs on page 389 Chapter 6. User exits on page 407 Chapter 7. The CICS monitoring data formatter offline utilities on page 425 Chapter 8. The statistics records on page 433 Chapter 9. Environment variables used by CICS on page 491
xi
Table 1. Road map for the CICS Administration Reference book (continued)
If you want information about ... Resource attribute name to description cross-reference The conventions used in this book. Refer to ... Chapter 11. Index of CICS resource attributes on page 507 xii.
Monospace Italics
Entering commands
[] {}
xii
IN
OUT
INOUT
$CICS
xiii
xiv
not_sent to prevent userids from being sent on outbound requests for this connection sent_only_with_pswd to send the userid with its password. If the password is not available, do not send the userid. sent_maybe_with_pswd to send the userid with its password. If the password is not available, send the userid already-veried. The default value is sent. Permanent (Protect resource from modication?) This attribute species whether or not CICS permits you to amend or delete the permanent database entry. If you set the attribute to no, you can amend or delete the entry. You can still amend or delete an entry with Permanent=yes by rst setting Permanent to no. If you do amend the entry, you should set Permanent back to yes afterwards. The default value is no.
See the CICS Intercommunication Guide for more information. RemoteLUName (Name of remote system) This attribute species the name of the remote system and the value required depends on the attribute ConnectionType. If ConnectionType=ppc_tcp , set RemoteLUName to the APPLID (region name) of the remote system. If ConnectionType=local_sna or ConnectionType=ppc_gateway, set RemoteLUName to the Logical Unit (LU) name of the remote system. If ConnectionType=cics_tcp , RemoteLUName to the APPLID of the remote system unless the remote system is CICS for OS/2 in which case set it to the NETNAME returnedcicstcpnetname command. The default value is "". RemoteNetworkName (SNA network name for the remote system) This attribute species the name of the network to which the remote system is attached. The name can be up to eight characters long. If the remote system is connected using SNA, the value of this attribute must be the SNA network name of the remote system. If the remote system is connected using TCP/IP, the value of this attribute must be the network name, if any, dened in the remote system. On CICS on Open Systems the network name of the system is specied in the attribute LocalNetworkName in the Region Denitions (RD).The default value is "". RemoteSysEncrypt (Transmission encryption level) This attribute species whether or not encryption is required, and, if
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
To nd a table specied as a string, CICS searches the directory /var/cics_regions/regionName/data (for Open Systems) or rootDir\var\cics_regions\regionName\data (for Windows NT). For programs written in a language other than Java, the lename specied in the PathName attribute must not contain an extension. For programs written in Java, the lename must include the .class suffix. CICS searches for the program le based on its installed extension in the following orders: v On CICS for Open Systems when Micro Focus COBOL Animator is not used (not all languages are available on all operating systems): 1. C program les (no extension) 2. IBM COBOL les (with extension .ibmcob) 3. Micro Focus COBOL native code les (with extension .gnt) 4. Micro Focus COBOL intermediate code les (with extension .int) 5. IBM PL/I les (with extension .ibmpli) 6. IBM C++ les (with extension .ibmcpp) v On CICS for Open Systems when Micro Focus COBOL Animator is used (not all languages are available on all operating systems):
Chapter 1. Resource denitions
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
v turquoise v yellow v neutral ERRHilight (Extended highlighting for error messages) Some of the supplied transactions use this ag, indicating the highlighting of the error messages. The default value is no. This option takes effect only if ERRLastLine is yes. Possible values are as follows: v no v blink v reverse
Chapter 1. Resource denitions
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
public transactions allow any user to access them. For further information about transaction security, see the CICS Administration Guide. The default value is 1. TraceFile (User Trace lename) This ASCII text attribute contains the le name to which CICS writes user trace information. The le is located in the directory dened by the UserTraceDirectory attribute in the Region Denitions (RD). The default value is "".
88
CICS on Open Systems only A user with root privileges is any userid that has system as the primary group. This userid needs to be a member of every group that root is in. (Processes can run with root privileges if the effective userid of the process is zero.) Even if a userid may meet the above criteria, but there are some commands that must be run by the native root userid.
CICS for Windows NT only For Windows NT, a user with administration privileges is any userid that is a member of the group Administrators. The following list describes how to use the CICS commands: Purpose Describes the purpose of the command. Syntax Shows the syntax of the command ags and parameters. Prerequisite Tasks or Conditions Where applicable, the command reference information lists tasks or conditions that must take place before the command can be used. Description Where necessary, provides a detailed description of how the command is used.
89
90
Syntax
cicsadd -c className [-r regionName] [-P | -B] [-f leName] [-m modelId] resourceName [attributeName=attributeValue ... ] cicsadd -?
Description
The Resource Denition Online (RDO) command cicsadd adds a resource denition of a given class to the permanent resources database, and can install a resource denition into the runtime database. All resource attributes are optional. If you do not set an attribute, its value is obtained from the resource denition dened by the -m parameter or from the default resource denition if you do not specify a model. You can use cicsupdate to modify the default denition. The cicsadd command initializes the data structures for the resource with default values from the reserved resource default, before overwriting them with your specied values. Stopping the command before completion can result in a damaged database. The command returns 0 if the run is successful, 1 otherwise.
Options
-c className determines the resource class to which the resource denition is to be added, and is one of these two- or three-character codes: cd fd gd gsd jd ld od Communication Files Gateways Gateway Servers Journals Listeners Objects (AIX only)
91
cicsadd
pd scd ssd td tdd tsd ud wd xad Programs SFS Schemas SFS Servers Transactions Transient Data Queues Temporary Storage Queues Users Terminals Products
-r regionName species the region to which the resource denition is added. If you do not specify a region name, CICS adds the resource denition to the region specied by the CICSREGION environment variable. The -r parameter is invalid if you specify scd, ssd, or gsd as the resource class, because these classes are associated with a collection of regions rather than with a specic one. -m modelId species the model used to supply the values for the denition that are not explicitly given in the attributeName=attributeValue pairs. If you do not specify a model, values for omitted attributes are obtained from the default denition. If the named model does not exist, an error is generated. -f leName species the le that contains the schema denitions. This ag is valid only when you specify scd (SFS schema denitions) as the resource class. -P instructs the command to add the resource denition to the permanent database, without installing it into the runtime database. This is the default option if you do not specify either the -P or -B options. instructs the command to add the resource denition to the permanent database and then to update the runtime database and install the resource denition in a running system. The -B ag is invalid if you specify gsd, scd, ssd, or xad as the resource class. If you are using DCE authentication, you must be authenticated as a DCE principal before running the command with this ag.
-B
92
cicsadd
resourceName is the name of the resource denition to be added. attributeName=attributeValue ... are the names and values of attributes for which you do not wish to use the default values or the values from the specied model. If you are using cicsadd from the command line and you want to use a metacharacter within an attribute value, you must use the shell escape mechanism. For example, to use a value of **, enter one of the following:
"**" \*\* '**'
You must use the pipe (|) character as the separator for multiple entries into Transaction Security Level (TSL) and Resource Security Level (RSL) key lists. Note: The term metacharacter refers to the following special characters: dollar ($), at sign (@), period (.), slash (/), dash (-), underscore (_), percent (%), ampersand (&), question mark (?), exclamation (!), vertical bar or pipe (|), double quote (), comma (,), semicolon (;), less than (<), greater than (>), and decimal 170. The set of attributeName=attributeValue pairs depends on the class of the resource. -? causes the usage message to be displayed.
Examples
1. To add a denition for the le TEST in the region REGION1 in the permanent database only:
cicsadd -c fd -r REGION1 -P TEST ActivateOnStartup=yes
2. To add a denition for the program PROG1 in the region REGION2 in both the permanent and runtime databases:
3. To add a denition for journal 03 to region rb in both the permanent and runtime databases (the command places the journal les in the same place as any extrapartition Transient Data Queues dened by the system):
cicsadd -c jd -r rb -B 03 RSLKey=public DiskA=j03a DiskB=j03b
93
cicscleandce removes the DCE groups and CDS directories created by the cicssetupdce command.
Syntax
cicscleandce [-I] [-v] cicscleandce -?
Description
v Unless you are migrating from a DCE cell environment to a non-DCE cell environment,you must destroy the regions and SFSs before using this command. v You must be logged on as a user with root or administrator privileges v You must be authenticated as a DCE principal (such as cell_admin) with sufficient privileges to remove a DCE group, directory or object. cicscleandce deletes the DCE groups and CDS directories listed below. Deleting the group cics_users automatically removes all accounts in this group. If one of these groups or directories does not exist, cicscleandce continues so you can use this command to clean up a partially successful execution of cicssetupdce. Errors, such as a failure to delete a CDS directory, forces cicscleandce to terminate abnormally unless the -I ag is used. The following DCE groups are deleted: v cics_admin v cics_sfs v cics_ppcgwy v cics_regions v cics_users The following CDS directories are deleted: v /.:/cics v /.:/cics/sfs v /.:/cics/ppc v /.:/cics/ppc/gateway v /.:/cics/trpc v /.:/cics/tmxa
94
cicscleandce
v /.:/cics/prole CAUTION: Do not use cicscleandce if you have any servers or regions congured or running.
Options
-I -v -? (Uppercase i) Ignores errors. Error messages are changed to warning messages and cicscleandce continues. (verbose) gives a detailed output while the command runs. displays help about the command.
Examples
To remove all DCE groups and CDS directories despite possible errors, rst log in as root or administrator and then authenticate as cell_admin, and then enter:
cicscleandce -I
95
Copies a complete stanza, or resource denition le, for a given class from one region database to another.
Syntax
cicscopystanza [[-w] -s sourceRegion] -t targetRegion -c className -k resourceName cicscopystanza -?
Description
The cicscopystanza command is used when an upgrade of CICS contains new default entries in the region database, for example, a new supplied transaction or a new model terminal. cicscopystanza adds appropriate default entries to the region database. The cicscopystanza commands are generated automatically and are included in the migration shell script which was created when you ran cicsmigrate. You can edit the cicscopystanza commands in the shell script, if, for example, you did not want to add a specic default entry to your region, or you do not want to add a new terminal.
Options
-s sourceRegion species the name of the region supplying the resource denition le. -t targetRegion species the name of the region receiving the resource denition le. -c className species the class of the resource denition le to copy. -k resourceName species the name of the resource denition le to copy. -? causes the usage message to be displayed
Examples
To copy a user denition for user1 from region1 to region2:
cicscopystanza -s region1 -t region2 -c ud -k user1
96
Congures and administers COBOL, DCE, PPC Gateway servers, regions, SFS, SNA nodes, > SNA links, and telnet servers.
Syntax
cicscp [-I] [-l logFile] [-v] command objectType [options] cicscp -? cicscp
Description
The CICS control program (cicscp) is a conguration tool to congure CICS regions and associated servers. It provides an easy-to-use command line interface to a CICS conguration which supports a range of users from a new user, who will be able to congure a default region without any user input other than the region name, and to an experienced user who will be able to override any default value (where there is a purpose in overriding a default value) and use model denitions to simplify the creation of similar congurations. The commands automate as much as possible of the conguration of a machine to run a CICS region using default values where necessary and imposing some naming conventions. They also provide some exibility for customization within this framework, for example allowing the machine to be congured as a DCE client rather than a server. They support the use of an existing conguration for greater exibility, for example, allowing the use of an existing DCE conguration where a conguration such as a secondary CDS server is required. It is not intended that cicscp be the sole interface to the conguration of the underlying stack; rather that it can automate simple congurations. You should be aware of this and use the other CICS commands to create more complex congurations. This extends to the conguration of CICS itself, as cicscp does not have an update command, so an existing conguration must always be altered by the other commands. It is expected that you will begin by doing all the conguration necessary for CICS through cicscp until you need a sophisticated custom conguration.
97
cicscp
You must be logged on as a user with root or administrator privileges. Some tasks require you to be authenticated to DCE. If you are using DCE authentication, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails.
Options
-I (uppercase i) ignore errors. -l logFile produce a log of activity in logFile. -v (verbose) Show output of low-level commands used (see note 1).
command cicscp accepts the following commands: all cobol (for Open Systems) dce ppcgwy_server (for Open Systems) region sfs_server sna sna_link (for Open Systems) telnet_server -? is the ag which produces the usage message.
If no arguments are supplied to cicscp it enters an interactive mode in which you can enter a sequence of commands. Notes: 1. In normal operation, cicscp will only issue a single message indicating if the command worked or not. The effects of the -v ag are as follows: a. cicscp will send more messages to stderr identifying the step being performed, for example creating the DCE conguration. b. The standard output of the commands issued will be allowed through to the standard output of cicscp. c. When cicscp calls a CICS command that takes a -v option, cicscp will specify the -v option on the call.
98
cicscp
New users of cicscp commands should always use the -v and -l logFile options, in order to understand and keep a record of what is happening. 2. In the following pages the cicscp commands are grouped by object. For example, all the commands that affect the DCE (create, destroy, start, and stop) are together.
Examples
1. To create SFS sfs1 and ignore all errors, enter:
cicscp -I create sfs_server sfs1
99
Used with destroy, start and stop commands to apply them to all objects.
Syntax
cicscp destroy all cicscp start all cicscp stop all
Description
When the all option is used with the destroy, start or stop commands, the effect is to apply the particular command to all objects that cicscp can currently manage on the system. You must be logged on as a user with root or administrator privileges. If you are using DCE authentication, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails. Attention: Always be aware when using the all option that the command might destroy, start or stop the wrong objects.
Examples
To remove all CICS processes from the local system, enter
cicscp destroy all
This will stop all running objects and then destroy them, removing all trace of CICS processing from the local system. This includes destroying the DCE conguration, but does not include the removal of the SFS logical volumes or user identiers.
100
Syntax
cicscp create cobol cicscp destroy cobol [-f]
Description
cicscp create cobol: The create command builds the default Micro Focus COBOL language method le cicsprCOBOL. If you want to include any special objects or libraries in cicsprCOBOL, you must use cicsmkcobol. cicscp destroy cobol: The destroy command destroys the Micro Focus COBOL language method le cicsprCOBOL. You must be logged on as a user with root or administrator privileges. If you are using DCE authentication, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails.
Options
-f causes the command to execute without issuing prompts for conrmation. This only applies when using the cicscp destroy cobol command.
Examples
To create the default cicsprCOBOL, enter:
cicscp create cobol
101
On Open Systems it creates, destroys, starts or stops DCE clients or servers. On Windows NT it creates DCE clients or servers.
Syntax
Syntax (for Open Systems): cicscp create dce { -R | [-n cellName [-s securityServer]] } cicscp destroy dce [-f] cicscp start dce cicscp stop dce Syntax (for Windows NT): cicscp create dce -R
Description
cicscp create dce: The create command creates the basic DCE conguration for either a server (a CDS server and a security server) or a client. -s parameter is supplied with either the name or the Internet Protocol (IP) address1 of the machine acting as the security server for the cell of which the client is to be part. This is not required if the DCE Security Server is on the local host. In addition to the basic DCE conguration, cicscp runs cicssetupdce (if necessary) and cicssetupclients to congure DCE for CICS. If a DCE conguration exists before cicscp is run, as long as it is a valid conguration cicscp will only create the necessary CICS conguration; it will not over-write the existing conguration. Thus, it is possible to congure a machine as only a CDS server using the DCE conguration tools and then use cicscp to do the CICS-related conguration. cicscp destroy dce:
1. Internet Protocol (IP) is the protocol that provides the packet delivery service for TCP, UDP, and ICMP.
102
On CICS for Windows NT The create command congures your machine to run in RPC-only mode, that is without using DCE authentication or DCE name services. To create a DCE server conguration see related information in the CICS Administration Guide. To create a DCE client conguration see related information in the CICS Administration Guide. You must be logged on as a user with root or administrator privileges. If you are using DCE authentication, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails.
Options
-R species that DCE is to be congured not to use DCE authentication or DCE name services.
-n cellName species the name of the cell to be created (with or without /.../). The default cell name is dce_cell.hostName.domainName. -s securityServer species the name or IP address of the security server. -f causes the command to execute without issuing prompts for conrmation.
103
104
cicscp - PPC Gateway server commands cicscp - PPC Gateway server commands
AIX X HP-UX X Sun Solaris Windows NT X
Syntax
cicscp create ppcgwy_server gatewayServer [-m modelId] [attributeName=attributeValue ... ] cicscp destroy ppcgwy_server {gatewayServer | all} [-f] cicscp start ppcgwy_server {gatewayServer | all} [attributeName=attributeValue ... ] cicscp stop ppcgwy_server {gatewayServer | all} [-f]
Description
CICS must be installed on the same machine as the PPC Gateway server. If CICS is not installed on the same machine as the PPC Gateway server, refer to the Encina Administration Guide Volume 2: Server Administration manual for an alternative procedure. cicscp create ppcgwy_server: The create command creates a PPC Gateway server server on the machine. If necessary, cicsdefaultservers is run automatically. It is an error to attempt to create a server that is already dened - the old server denition must be removed rst. Each PPC Gateway server server must have a unique ShortName value in the Gateway Server Denitions (GSD), so if one is not supplied as an attribute override on the create command, cicscp chooses one which is of the form PbaseName where baseName is the rstpart of the server name, truncated to seven characters if necessary.No check is made that this name is unique, therefore the server name must be unique in the rst seven characters if the default ShortName is to be used. As an example, if the PPC Gateway server server ppcgwysrv1 were created, the default ShortName chosen would be Pppcgwys and an attempt to create ppcgwysrv2 would result in a duplicate ShortName being used and an error. If the UserID specied in the Gateway Server Denitions (GSD) for the server does not exist, cicscp will create it with the appropriate home directory.
Chapter 2. Resource denition commands and offline utilities
105
106
Options
gatewayServer is the name of the PPC Gateway server. A name that does not begin with the string /.:/cics/ppc/gateway/ will have that string added to the front of the name. -m modelId identies the existing entry on which the one to be created should be based. -f (on cicscp destroy ppcgwy_server) causes the command to execute without issuing prompts for conrmation. attributeName=attributeValue ... are overrides for Gateway Server Denitions (GSD) attributes. For more details, see the CICS Intercommunication Guide, which describes which attributes are suited to modication at startup. See also Gateway Server Denitions (GSD) on page 14. -f (on cicscp stop ppcgwy_server) forces the server to stop.
Examples
1. To create a gateway server named /.:/cics/ppc/gateway/GwyThree with attribute overrides, verbose messaging and a log le recording cicscp processing, enter:
cicscp -v -l /tmp/cicscp.log create ppcgwy_server /.:/cics/ppc/gateway/GwyThree ShortName=Gate3 ThreadPoolSize=15
Note: UserID defaults to ShortName, so cicscp will create and use the userid Gate3 for this gateway.
Chapter 2. Resource denition commands and offline utilities
107
108
Syntax
cicscp create region regionName [-g groupId] [-i leName] [-l{m|o|c|r}] [-d] [-o instanceName -a aliasName [-u userName] [-n|-s] ] cicscp destroy region {regionName | all} [-f] [-s] cicscp start region {regionName | all} [-d distributedServers] [attributeName=attributeValue ... ] cicscp stop region {regionName | all} [-f|-c]
Description
cicscp create region: The create command creates the named CICS region. If the DCE is not running, cicscp starts it, creating the default conguration if necessary. If the -i option is specied then cicscp uses cicsimport, otherwise it uses cicsdefault. -d option is not specied, cicscp checks that the SFS dened as the default le server for the region is congured, creates a default conguration if it is not, and then starts the server if it is not already running. Finally cicscp congures the server for the region. Before using the region you have created, you may wish to consider using a mounted le system for the CICS log le as described in he Planning and Installation Guide. cicscp destroy region: The destroy command stops and then destroys the named region, or all congured regions if the reserved name all is used. If the -s option is specied with all it is applied to all regions. cicscp start region: The start command starts the named region, or all congured regions if the reserved name all is used. If a single region is started and it is not congured,
109
cicscp - region
a default region of the specied name is created. Any attribute overrides specied on the start command are not passed through to the create. Once the region has been created if necessary, cicscp checks that the necessary SFS and PPC Gateway servers are running, unless the type of server has been declared as remote with the -d option. If SFSs are not declared as remote, cicscp starts the default le server for the region and then browses each File Denition entry and examines the server specied for the le. If it is not running then cicscp starts it. Each of these starts could result in the implicit creation of the server if it does not already exist. If PPC Gateway servers are not declared as remote, cicscp browses the Gateway Denitions and starts each server if necessary. Each of these starts could result in the implicit creations of the server if it does not already exist. Once all the necessary servers have been started, the region itself is started. cicscp stop region: The stop command stops the named region, or all running regions if the reserved name all is used. You must be logged on as a user with root or administrator privileges. If you are using DCE authentication, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails.
Options
regionName is the name of the region. -g groupId species the name of the group-id with which all les of the new region are created. -l{m|o|c|r} species the action that cicscp is to take if it cannot nd the target of a symbolic link. The default action is to terminate the restoration abnormally: -lm -lo Mandatory. cicscp abnormally terminates the restoration if it cannot nd the symbolic target. Optional. cicscp produces a warning message, creates the link
110
cicscp - region
and continues restoration if it cannot nd the symbolic target. This allows you to restore further regions that resolve the missing links. -lc -lr Continue. cicscp overrides any symbolic link requirements dened as part of the cicsexport command. Resolve. If cicscp cannot nd the symbolic target, it restores a physical copy of the missing denition, and produces a warning message.
-i leName species the le name of the archive copy of the resource denitions, in cpio format. If you do not specify the -i ag, the le is read from stdin. -d (on cicscp create region) indicates a distributed conguration. If this option is used, cicscp will not check for the presence of the SFS. It will assume that the SFS is dened on a different machine and that therefore its status cannot be checked. -o instanceName species the name of the instance of DB2. -a aliasName species the name of the DB2 database to be used as the le server. This name is stored in the DefaultFileServer attribute in the Region Denitions (RD). -u userName species the name to be used for explicit authentication. If this parameter is specied it will form part of the XAOpen string in the Product Denitions (XAD) entry. -n species the creation of a system-dened Product Denitions (XAD) entry specifying non-XA integration.
-s (on cicscp create region) suppresses the creation of a system-dened Product Denitions (XAD) entry all used with destroy, start or stop, causes cicscp to apply the command to all congured CICS regions.
-f (on cicscp destroy region) causes the command to execute without issuing prompts for conrmation. -f (on cicscp stop region) forces an immediate shutdown.
111
cicscp - region
-s (on cicscp destroy region) causes the deletion of le server denitions for TD, TS and local queues. -d distributedServers (on cicscp start region) indicates a distributed conguration. Valid values for distributedServers are: all sfs_server ppcgwy_server ppcgwy_server sfs_server -c forces a cancel shutdown. cicsnotify is run automatically.
attributeName=attributeValue ... are the overrides for Region Denitions (RD) attributes. See Region Denitions (RD) on page 32.
Examples
1. To create a region called REGION1, copying the denitions from a le called REGIONFILE enter:
cicscp create region REGION1 -i REGIONFILE
3. To start the region TestReg with verbose messaging and a log le recording cicscp processing, enter:
cicscp -v -l /tmp/cicscp.log start region TestReg
This will create the region TestReg (using cicsdefault) and will congure it for the default SFS. Additional processing will be done for SFS and DCE as necessary.
112
Syntax
cicscp create sfs_server serverName [-m modelId] [attributeName=attributeValue ... ] cicscp destroy sfs_server {serverName | all} [-f] cicscp start sfs_server {serverName | all} [attributeName=attributeValue ... ] cicscp stop sfs_server {serverName | all} [-f]
Description
cicscp create sfs_server: The create command creates a SFS server on the machine. If necessary, cicsdefaultservers is run automatically. It is an error to attempt to create a server that is already dened - the old server denition must be removed rst. Each SFS server must have a unique ShortName value in the Structured File Server Denitions (SSD) so if one is not supplied as an attribute override on the create command, cicscp chooses one which is of the form SbaseName where baseName is the last part of the server name, truncated to the rst seven characters if necessary. No check is made that this name is unique, therefore the server name must be unique in the rst seven characters if the default ShortName is to be used. As an example, if the SFS server sfssrv1 were created, the default ShortName chosen would be Ssfssrv1 and an attempt to create sfssrv11 would result in a duplicate ShortName being used and an error. If the UserId specied for the server in the Structured File Server Denitions (SSD) does not exist, cicscp will create it with the appropriate home directory. If the DCE is not running, cicscp will start it, creating the default conguration if necessary (on Open Systems). On Windows NT cicscp starts it only if the DCE is already congured.
113
cicscp - SFS
There are two logical volumes associated with each SFS server: the logical volume for the le data, specied by the Structured File Server Denitions (SSD) attribute DataVolume, and the logical volume holding the recovery information, specied by the attribute LogVolume. If either logical volume specied does not exist, cicscp creates it. If either does exist and is owned by the correct user, cicscp issues a warning message. If either exists and is owned by a different user, cicscp issues an error message. The location and size of each logical volume are controlled by environment variables. There is a pair of environment variables that controls both logical volumes and there is also a separate pair for each logical volume, allowing each to be controlled separately. If one of the environment variables corresponding to a particular logical volume is set, it takes priority over the corresponding general environment variable. The location is controlled by the general environment variable CICS_SFS_VG and the separate environment variables CICS_SFS_DATA_VG and CICS_SFS_LOG_VG. The size is controlled by the general environment variable CICS_SFS_SIZE and the separate environment variables CICS_SFS_DATA_SIZE and CICS_SFS_LOG_SIZE. There are default values coded into cicscp which means that none of these environment variables needs to be set if the default values are acceptable. The default size of both the data and log logical volumes is 64MB. The default location depends on the platform, on CICS for AIX it is rootvg and on CICS for HP-UX it is vg00. If the DCE name service is not being used for name resolution cicscp adds an entry for the server to /var/cics_servers/server_bindings. cicscp destroy sfs_server: The destroy command stops the server if it is running and removes the server denition from CICS, but does not remove the user or the logical volumes. If the reserved name all is used, all congured servers are destroyed. cicscp start sfs_server: The start command starts the server, creating a default server of the correct name if necessary. Note: Any attribute overrides specied on the start command do not affect the server created implicitly by the start command; they are only applied to the start of the server. Issuing a start command for a server that does not exist is equivalent to a create command for that server without any overrides followed by the start command with the overrides. This means that there can in such situations be a mismatch
114
cicscp - SFS
between the attributes applied to the server by default, and the overrides provided with the start command, resulting in the command failing to complete successfully. If the reserved name all is used, all congured servers are started and any attribute overrides specied are passed to each server. cicscp stop sfs_server: The stop command stops the named SFS gateway server, or all running servers if the reserved name all is used. You must be logged on as a user with root or administrator privileges. If you are using DCE authentication, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails.
Options
serverName is the name of the server. A simple name (one without a leading /.:/cics/sfs/ string) will have the string added to the front of the name. -m modelId identies the existing entry on which the one to be created should be based. If you do not specify a name, the server is modeled on the default Structured File Server Denitions (SSD). attributeName=attributeValue ... are the overrides for Structured File Server Denitions (SSD) attributes. See Structured File Server Denitions (SSD) on page 61. all used with destroy, start or stop, causes cicscp to apply the command to all congured or running servers.
-f (on cicscp destroy sfs_server) causes the command to execute without issuing prompts for conrmation. -f (on cicscp stop sfs_server) forces an immediate shutdown.
Examples
1. To create an SFS named /.:/cics/sfs/SrvOne with attribute overrides, verbose messaging and a log le recording cicscp processing, enter:
115
cicscp - SFS
cicscp -v -l /tmp/cicscp.log create sfs_server /.:/cics/sfs/SrvOne \ ShortName=Sfs1 BufferPoolSize=1250
Note: This example is doing an implicit create, so specifying ShortName=Sfs2 would not work because the ShortName default would have been used during the create. 3. To start all SFSs, assuming that they can all be autostarted, enter:
cicscp start sfs_server all
116
On Open systems this command creates, destroys, starts or stops SNA while on Windows NT it starts or stops SNA.
Syntax
cicscp create sna -d nodeName -w networkName -x XIDname -y stationType [-q stationName] [-s stationAddress] [-b localSecondaryStationAddress] cicscp destroy sna [-f] cicscp start sna cicscp stop sna
Description
On CICS on Open Systems the cicscp create sna command creates, activates and veries an SNA conguration. Following this command, the node is ready to operate as a node on an APPN network. On CICS for Windows NT the cicscp start/stop sna commands try to start or stop the IBM Communications Server. If this server is not found, the commands try to start or stop the Microsoft SNA Server. If you are using DCE authentication and the task you are performing requires you to be logged in as the DCE cell administrator, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails. For more information, see the CICS Intercommunication Guide.
Options
-d nodeName species the name of the SNA node. -w networkName species the control point name of the local SNA node.
117
cicscp - SNA
-x XIDname species the exchange identier associated with the control point name of the local SNA node. -y stationType species an initial link station type. For CICS for AIX, any type supported by SNA Services is valid. -q stationName species the name of the initial link station. If a dynamic listening link station is required this value can be omitted. This type of station is only supported over token ring and ethernet. -s stationAddress species the address of the local link station if this is a listening link, or of a remote link station if it is a calling link. -b localSecondaryStationAddress species the local secondary station address for SDLC link stations. -f causes the command to execute without issuing prompts for conrmation.
Examples
On CICS for AIX, to create an SNA node called AIX00005 using a token ring with a link station called LINKVTAM at address 400012345678, enter:
cicscp create sna -d AIX00005 -w MYSNANET -x 07101234 \ -y token_ring -q LINKVTAM -s 400012345678
118
Syntax
cicscp create sna_link stationName -y stationType [-s stationAddress] [-b localSecondaryStationAddress] cicscp destroy sna_link stationName -y stationType [-f] If you are using DCE authentication and the task you are performing requires you to be logged in as the DCE cell administrator, cicscp prompts you for a password if you are running interactively, you have not set the cell_admin_pw environment variable, and the cell_admin password is not the default password (-dce-). If you are not running interactively, have not set the cell_admin_pw environment variable, and the password is not the default, the command fails. The cicscp create sna_link command creates and veries an SNA link.
Options
stationName is the name of the link station. -y stationType species an initial link station type. For CICS for AIX, any type supported by SNA Services is valid. -s stationAddress species the address of the local link station if this is a listening link, or of a remote link station if it is a calling link. -b localSecondaryStationAddress species the address of the local secondary station for SDLC link stations. -f causes the command to execute without issuing prompts for conrmation.
The environment variable XID_NODE_ID is required to be set. This identies the XID name of the PU concerned. Creation of token ring link stations (type LLC2) requires a token ring station TRN-O to be dened in the running Peer Server. Local SNA conguration le
Chapter 2. Resource denition commands and offline utilities
119
120
Syntax
cicscp create telnet_server serverName [-P portName] [-c clientCodeset] [-e emulation] [-h hostList][-k keytabFile] [-l localeName] [-m modelId] [-n netName] [-p principalName] [-r regionName] [-s serverCodeset] [-t transId] cicscp destroy telnet_server {serverName | all} [-f]
Description
cicscp create telnet_server: The create command creates a telnet server conguration that can be used with inetd. On Windows Nt inetd runs as an NT Service. A shell script is automatically created in /var/cics_clients for each telnet server created by cicscp containing the arguments to the cicsteld command. -p option, it is added to the DCE group cics_users if it is not already in the group. If no keytab le is specied using the -k option, cicscp creates one in /var/cics_clients. If no principal is specied, no DCE principal or keytab le will be created. If you are not using DCE authentication or if you are using DCE authentication but you want to use the default keytab le created in /var/cics_clients by cicssetupclients, then you should not specify a principal. The -m ag allows all parameter values except netName (which must be unique) to be copied from the telnet server named with the -m parameter. It may not be possible for cicscp to retrieve the parameter values from the model server if the server was not created by cicscp, or the shell script has been edited after the server was created. cicscp destroy telnet_server: The destroy command destroys a telnet server conguration, but it does not remove the DCE principal. If you are using DCE authentication and the task you are performing requires you to be logged in as the DCE cell administrator, cicscp prompts you for a
Chapter 2. Resource denition commands and offline utilities
121
Options
serverName is the name of the server. This name must be different from every other name used in the le /etc/services. cicscp create telnet_server will add an entry to /etc/services for the specied server and cicscp destroy telnet_server will delete the entry. -P portName species the port to be used. This port name must be unique, and will be chosen automatically if omitted. -c clientCodeset species the client codeset. -e emulation species the type of 3270 to emulate. -h hostList species a blank-delimited list of names or addresses of hosts to be searched for the specied region. If a list of host names is not specied, the contents of the environment variable CICS_HOSTS will be used. If the environment variable CICS_HOSTS is not set, the local machine will be searched. -k keytabFile species the name of the keytab le. -k option is not specied but the -p option is used, then cicscp will create a keytab le. -l localeName species the name of the locale. -m modelId species the model denition on which the one to be created should be based. -n netName species the network name. -p principalName species the name of the principal to be used for DCE authentication of this CICS telnet server. -r regionName species the region to connect to. If no region is specied, a menu of regions will be displayed.
122
Examples
To create a telnet server called TELNX1 on port 9001 listening for a request to access REGION1, enter:
cicscp create telnet_server TELNX1 -P 9001 -r REGION1
123
cicscvt is used to build conversion templates from DFHCNV macro conversion les.
Syntax
cicscvt leName cicscvt -?
Description
The cicscvt command is a utility that converts a macro source conversion table containing DFHCNV macros into a conversion template for each resource dened in the table. cicscvt creates a conversion template for each DFHCNV macro in the input le. The name of the conversion template created is resourceName.resourceType.cnv, where resourceName is the name coded as the RNAME parameter, and resourceType is the type coded as the RTYPE parameter. To use the template it must be moved or copied to
/var/cics_regions/regionName/database/resourceType/resourceName.cnv
Options
leName species the name of the le to be processed. -? causes the usage message to be displayed.
Returned Values
0 The table was successfully converted. non-zero The templates were not created successfully.
Examples
If le TESTCNV contains the macro:
DFHCNV TYPE=ENTRY,RTYPE=PC,RNAME=TEST
it can be converted and installed for region regionName by using the commands:
124
cicscvt
cicscvt TESTCNV mv TEST.PC.cnv /var/cics_regions/regionName/database/PC/TEST.cnv OR copy TEST.PC.cnv /var/cics_regions/regionName/database/PC/TEST.cnv
The mv command is used on UNIX platforms. The copy command is used on Windows NT.
125
You use this command to congure CICS resource denitions for DB2 and to congure DB2 to manage CICS queues and les.
Syntax
cicsdb2conf [-I] [-m] -r regionName [-l logFileName] { -C -i instanceName -a aliasName [-f] [-n|-s] [-u userName[,password]] [-g] | [ -S] |[ -N] |[ -D] |[ -P] |[ -T] |[ -L] |[ -Q ] ... } cicsdb2conf -?
Description
You must be logged in with DB2 sysadm authority. The command cicsdb2conf congures the resource denitions in the CICS region to meet the requirements of DB2 and adds the necessary tables to the DB2 database. You run cicsdb2conf from the operating system command line.
Options
-I -m causes non-critical errors to be ignored. species that cicsdb2conf should set the IndexName for each le dened in the File Denitions (FD) by appending 0 to its key.
-r regionName species the name of the CICS region for which you are conguring DB2. -l logFileName species the name of the le to be used for logging conguration messages. If this parameter is not specied the le regionName/data/cicsdb2conf.log will be used. -C species the complete conguration of DB2 for the region and the conguration of the region resources for DB2. The ags -i, -a, -n, -f, -s, -u and -l are valid when this option is specied.
126
cicsdb2conf
-a aliasName species the name of the DB2 database to be used as the le server. This name is stored in the DefaultFileServer attribute in the Region Denitions (RD). -f By default, the Fileserver attribute for all File Denitions (FD) entries is set to NULL and the default specied by the DefaultFileServer attribute in the Region Denitions (RD) is used. If this option is specied the FileServer attributes are not set to NULL. species the creation of a system-dened Product Denitions (XAD) entry specifying integration through the DB2 single-phase commit optimization. If this ag is not specied cicsdb2conf will place a new default entry in the XAD that will allow the region to connect to the aliasName database through the XA interface. suppresses the creation of a system-dened Product Denitions (XAD) entry. An XAD entry is required in order to specify a DB2 database that will manage the CICS regions queues and les. If this ag is not specied cicsdb2conf will create a new default entry in the XAD that will allow the region to connect to the aliasName database. The use of this ag allows you to dene your own XAD entry for the aliasName database.
-n
-s
-u userName[,password] species the user name to be used for explicit authentication. If this parameter is specied, it forms part of the XAOpen string in the Product Denitions (XAD) entry. If the password is not specied, CICS prompts you to enter it. -g grant minimum privileges. If this ag is specied, cicsdb2conf will grant EXECUTE authority to allow the userid that CICS uses to connect to the database to execute the CICS le and queue management package. If this ag is not specied, cicsdb2conf will grant DBADM authority to the userid that CICS uses to connect to the database. -S species that a table for recoverable auxiliary TSQs is to be created. The name of the table will be regionNameREQTSQ#. The table will be recoverable. species that a table for non-recoverable auxiliary TSQs is to be created. The name of the table will be regionNameNREQTSQ#. The table will be recoverable since non-recovereable tables are not supported by DB2. species that a table for logically recoverable TDQs is to be created. The name of the table will be regionNameLOGTDQ#. The table will be recoverable.
-N
-D
127
cicsdb2conf
-P species that a table for physically recoverable TDQs is to be created. The name of the table will be regionNamePHTDQ#. The table will be logically recoverable since physically recoverable tables are not supported by DB2. species that a table for non-recoverable TDQs is to be created. The name of the table will be regionNameNREQTDQ#. The table will be recoverable since non-recoverable tables are not supported by DB2. species that a table for locally queued protected STARTs is to be created. The name of the table will be regionNameLQPROT#. The table will be recoverable. species that a table for locally queued unprotected STARTs is to be created. The name of the table will be regionNameLQUE#. The table will be recoverable. causes the usage message to be displayed.
-T
-L
-Q
-?
Returned Values
0 DB2 has been congured. non-zero The attempt to congure DB2 was unsuccessful.
Examples
1. To congure DB2 for REGION1 with default parameters, using alias CICSTEST for instance DB2USER:
cicsdb2conf -r REGION1 -C -i DB2USER -a CICSTEST -n
128
Syntax
cicsdb2import -i schemaFileName [-d databaseName] [-u userName [p passWord]] [-I] [-f leName [-x indexName] ... ] cicsdb2import -? v You must be logged on as a user with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v You must have a running DB2 database available for connection. v You must be authorized to connect to the database. v You must have a schema le containing the necessary le denitions. A schema le can be created by using cicsadd -cscd ... or by using SMIT on CICS for AIX or SAM on CICS for HP-UX.
Description
The cicsdb2import command allows you to create les on a DB2 database based on the information provided in a schema le. You can specify which database a le is to be created on, and you can optionally select which les are created from those dened within the schema. You can also select which indexes are to be created from those dened for a particular le in the schema. You run cicsdb2import from the operating system command line.
Options
-I causes non-critical errors to be ignored. -i schemaFileName species the name of the le containing the schema denition. -d databaseName species the name of the database to which connection is required. If the name of the database is not specied, the name contained in the environment variable DB2DBDFT is used.
129
cicsdb2import
-u userName species the name of the user to be used for explicit authentication. If the user name is not specied, implicit authentication is used. -p passWord species the password to be used for explicit authentication. If the password is not specied, you will be prompted to enter the password. -f leName species the name of the le to be loaded from the schema. If no le name is specied, all les in the schema are loaded. -x indexName species the name of an index to be loaded. If no index name is specied, all indexes for the specied le are loaded. -? causes the usage message to be displayed.
Returned Values
0 The le or les were successfully loaded into the database. non-zero The import operation was unsuccessful.
130
The CICS DB2 diagnostic tool (DDT) provides an interactive interface to DB2.
Syntax
cicsddt [-s databaseName] [-i inputFile] [-o outputFile] [-e] [-r] [-c DDTcommands ...] cicsddt -?
Description
v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v You must have a running DB2 database available for connection. v You must be authorized to connect to the database.
Options
Note: Except for -c, which must be the last parameter, the parameters can be in any order. -s databaseName species the name of the DB2 database. For example, cicstest. If this option is not specied, the server name in the environment variable CICS_XDT_SERVER or DB2DBDFTis used. -i inputFile species a text le containing DDT commands to be read and executed. The le can be created either by hand or by using the -o option. Each line of the input le is treated as if it were typed in interactive mode. The text from the input le is also displayed as it is processed by cicsddt. Comments can be included in the le by starting a line with /*. For example, if you create a le called create.input that contains the following lines:
/* /* This is a sample file to create a table called qsamtest /* create cics.qsamtest k fl char 10 f2
Chapter 2. Resource denition commands and offline utilities
131
cicsddt
varchar 100 f1 a quit
A new table called CICS.QSAMTEST is created on the specied database. -o outputFile causes commands entered in the DDT session to be written to the specied output le. This le can then be used as an input le using the -i option. -e requests DDT to terminate if an error occurs. If -e is specied and DDT is being driven from a shell script (-i) or the command line (-c), any error resulting from a command will exit DDT with a non-zero return code. activates DDT statistics. Statistics for DDT and DB2 calls are sent to a le called ddt.stats in the current directory. This is useful for monitoring performance.
-r
-c DDTcommands ... species a list of commands and text to be used in the DDT session. This is useful for calling DDT commands from a shell script. This parameter must be used last. Using the DDT commands: To issue commands in DDT, pass them to DDT using the -i or -c option, or type the command at the command prompt. DDT accepts command abbreviations. In the command syntax the minimum abbreviation is shown in parentheses; for example, (c)reate. Any command that requires a le name will default to the last name used if nothing is given at the prompt. DDT also recognizes any environment variables used at the command prompt. DDT commands - list (l)ist [(l)] searchString Lists all the tables on the database that DDT is accessing. l option is used,additional information is given for each table. Only tables owned by the user cics will be shown. A search string can also be given to list specic les. If a search string is used, DDT will look for all the
132
cicsddt
lenames that contain the string. There are no wild card characters, so the search string is taken as entered.
cicsddt -s cicstest -c li l jim Table Name ======================= CICS.JIM6CICSNLQFILE CICS.JIM6CICSNRECTSQFIL CICS.JIM6CICSPLQFILE CICS.JIM6CICSRECTSQFILE CICS.JIM6CICSTDQLGFILE CICS.JIM6CICSTDQNOFILE CICS.JIM6CICSTDQPHFILE Organisation ==================== Key-Sequenced (KSDS) Key-Sequenced (KSDS) Key-Sequenced (KSDS) Key-Sequenced (KSDS) Key-Sequenced (KSDS) Key-Sequenced (KSDS) Key-Sequenced (KSDS) Primary Index No. Records ============== =========== CICSNLQIDX (empty) CICSNRECTSQIDX (empty) CICSPLQIDX (empty) CICSRECTSQIDX 2 CICSTDQLGIDX 11 CICSTDQNOIDX (empty) CICSTDQPHIDX (empty)
DDT commands - create (c)reate tableName Creates a new DB2 table. All the table information is prompted for in turn. To aid usability and eliminate creation errors, DDT will validate as much as possible and default to sensible values where appropriate. One exception is the table column name and index column name that use an empty entry to indicate there are no more columns. If q! is entered at any prompt the create is cancelled.
cicsddt -s cicstest -c create cics.qsamtest [File Type [Ksds/Esds/Rrds] .: K[sds] [Column 01: Name ............: f1 [Column 01: Type ............: Error: Invalid column type. Type must be: char, varchar, long varchar or graphic. [Column 01: Type ............: char [Column 01: Size ............: 10 [Column 02: Name ............: f2 [Column 02: Type ............: varchar [Column 02: Size ............: 100 [Column 03: Name ............: [Primary Index Name .........: CICS.QSAMTEST0 [Index Part 01: Column Name .: f1 [Index Part 01: Ordering ....: a[scending] [Index Part 02: Column Name .:
DDT commands - read (r)ead tableName Reads rows from a CICS DB2 table. Rows can be read from the beginning of the table or from a specic key based on any existing index. Rows can also be read continuously or individually. When a key value is specied it is taken as a string unless it is in the format
133
cicsddt
#n, where n is a numeric value. The following format can be used for a hexadecimal representation of the key:
0x0a01 ...
If the read is not continuous you have the option to delete or update each row read. If nothing is entered for a column during an update the column is left unaltered, otherwise data entry is same as for the write command. The read command will only show up to 44 bytes of column data and should therefore not be used to check the data integrity of tables containing long columns. The dtof command is more suitable for this.
cicsddt -s cicstest -c r cics.qsamtest [Index To Use ...............: QSAMTEST0 [Read From Beginning ? [Y]/N : Y [Continuous Read ? Y/[N] ....: N [Read #00000001 [F1 ][KEY0001... [Hex][4B455930303031000000 [F2 ][Data providing information about KEY0001 [Hex][446174612070726F766964696E6720696E666F726D6174 [Read Another, Delete or Update ? [Y]/N/D/U n [1 Record(s) Read] ][000010] ] ][000040] ]
DDT commands - write (w)rite tableName Writes rows to a CICS DB2 table. Text or hexadecimal data can be entered in each column; these cannot be mixed. Hexadecimal is entered in the following form:
0x010203 ...
If the column is long and you need to enter a large amount of data, a shorthand method can be used. For example, to ll the remainder of a column with 33 A characters enter:
A>>32
or enter
0x20>>32
for 33 spaces.
134
cicsddt
You must enter something in at least one of the columns in the row for DDT to write a complete row; if all are left blank no row will be written. If A>>32 would exceed the column length the string A>>32 is taken literally.
cicsddt -s cicstest -c -w qsamtest [F1 ][ CHAR [KEY0000002 [F2 ][ VARCHAR [This the data that comes with KEY 2 [Another ? [Y]/N n [1] Record(s) Added OK. ][ Size:00010] ][ Size:00100]
DDT commands - empty (e)mpty tableName Empties a table of all committed rows.
cicsddt -s cicstest -c empty qsamtest [Empty Table "CICS.QSAMTEST" ? Y/[N] y
DDT commands - delete (d)elete tableName Deletes a table from the CICS DB2 database.
cicsddt -s cicstest -c delete qsamtest [Delete Table "CICS.QSAMTEST" ? Y/[N] y
DDT commands - addindex (a)ddindex tableName Adds a secondary index to the CICS DB2 table. Typing q! will cancel the command.
cicsddt -s cicstest -c a angus [Secondary Index Name........: index2 [Index Col. 01: Column Name .: f2 [Index Col. 01: Ordering ....: a[scending] [Index Col. 02: Column Name .:
DDT commands - delindex (deli)ndex tableName Deletes a secondary index from the CICS DB2 table.
cicsddt -s cicstest -c delindex angus [Secondary Index Name........: index2
135
cicsddt
DDT commands - info (i)nfo tableName Shows detailed information about the DB2 table.
cicsddt -s cicstest -c i angus [Information For Table: CICS.ANGUS ] -----------------------------------------------------------------[Table Organization ] Key-Sequenced (KSDS) [Primary Index Name ] ANGUS0 (Unique index) [Primary Index Column(s) ] F1 [Secondary Index Names ] (None defined) [Number Of Records In Table ] 0 [Number Of Columns Per Row ] 3 [Column 001: F1 ][CHAR ][Size: 5] [Column 002: F2 ][CHAR ][Size: 5] [Column 003: F3 ][CHAR ][Size: 5] ------------------------------------------------------------------
DDT commands - database (da)tabase databaseName Drops the current DDT database connection and attempts to connect to a new DB2 database. If the new connection fails DDT will reconnect to the old database.
cicsddt -s cicstest -c da sample ERZ037070I/0740: Contacting database ... ERZ037172I/0738: (Database OK)
DDT commands - user (u)ser userName,password Reconnects to the current DB2 database with the new user. If connection with the new user fails, DDT reconnects with the old user and password.
cicsddt -s cicstest -c u acooke,jg8wq9z ERZ037172I/0738: (Database OK)
DDT commands - qtod (qt)od QSAMleName Transfers and converts a QSAM table to a DB2 table.
cicsddt -s cicstest -c qtod qsam [Default Code Pages: EBCDIC (IBM-037) -> ASCII (ISO8859-1) ... [Transferring Records. Record No.][00000022]
136
cicsddt
(dt)of DB2tableName Transfers a CICS DB2 table to a at table. The format of the at le can either be DDT format or Asis (the table is transferred byte by byte as it is). In DDT format the at le starts with a header containing information on the structure of the table, followed by an end-of-header marker. The remainder of the at le contains the actual records that are in the format: a newline character, followed by an eight-byte ASCII number, followed by the actual data.The number is the length of the row excluding the number itself. If the table is transferred Asis, no extra information is contained in the at le. A single record or a range of records can be dumped. The record number corresponds to the position of the row using the primary index. To dump row 10 enter 10 at the [Dump Row(s)] prompt. Type 10- to dump rows from 10 onwards and type 10-12 to dump rows 10 to 12 inclusive.
cicsddt -s cicstest -c dtof CICS.RRDS [Flat Filename ..............: CICS.RRDS.ddt [Dump table Asis ? .... Y/[N]: N [Dump Row(s) ................: ALL [Dumping All Rows] [Dumping Row #][00000003]
DDT commands - ftof (f)tod DB2tableName Transfers a at table produced from the dtof command to a CICS DB2 table. If the at table is not in DDT format then dtof will still attempt to transfer the le as normal text or binary. If the DB2 table does not exist and the at le is in DDT format, DDT will ask you if you want the le to be created. DDT also reads and transfers at les created by cicssdt (in SDT format).
cicsddt -s cicstest -c f CICS.RRDS [Flat Filename ..............: CICS.RRDS.ddt [Loading Record #][00000003]
DDT commands - ! ! Escapes to a system command prompt. Exiting from the command prompt returns control to DDT.
cicsddt -s DB2name -c ! [Exit To Shell. Use <Ctrl-D> To Return .....
137
cicsddt
ls q* (Open Systems) dir q*.* /w (Windows NT) qsam qsam.dfh qsam.conv qsam.log qsam.def qsam.ddt.def
DDT commands - quit Exits DDT and returns control to the calling process. (q)uit
cicsddt -s cicstest -c q
DDT commands - help or ? (h)elp (or ?) commandName Gives general or specic online help for DDT commands.
cicsddt -s cicstest ? create
DDT commands - QSAM to DB2 le transfer The purpose of this section is to help you understand how to transfer QSAM les from a IBM mainframe-based CICS system to a CICS on Open Systems system (the target system). When a le is sent directly to a target system, record boundaries are lost when it is received. By capturing the le on TSO or CMS in netdata format and sending it as a binary le to the target system using the File Transfer Program (ftp), the original netdata format is preserved. The cicsnetdata program is used to read the le and re-construct the output records with the count preceding each record, as expected by the cicsddt qtod command. If a le is in netdata format, you will nd that control records INMR01, INMR02, INMR03 precede the data, and INMR06 follows the data; these names are in EBCDIC. All input (control records and data) is segmented. The rst byte of a segment contains the segment length, including itself. The second byte of the segment contains a ag byte. The ag settings are:
0x80 first segment 0x40 last segment 0x20 segment is part of a control record
To transmit a le from TSO: 1. Enter: TRANSMIT (nodeName/userId) DSN(data.le) OUTDSN(data.NETDATA) SEQ TRANSMIT can be abbreviated to XMIT.
138
cicsddt
nodeName/userId is required syntactically. Although it is not used when transmitting to a le, it is validated, so specify a known node and userid. DSN names the input to XMIT. OUTDSN names the output netdata le. The type NETDATA is suggested. If the input was a PDS member, then SEQ is required, or the le will not be usable on the target system. The name of utility function must be INMCOPY for correct results (see sample messages below). 2. Enter: ftp systemName where systemName is the name of the target system. Enter userid and password when prompted. 3. Enter: cd directoryName to change to the target directory if necessary. 4. Enter: binary to set the transmission type to I (image). 5. Enter: put data.NETDATA The target le name can also be specied, if different from the source. Make a note of the byte count, which should be the same for the le on the target system. The target system keeps the name in lower case, even though it was upper case in TSO. To transmit a le from CMS: 1. Enter: sendle dataFile TO * to send the le to your reader in netdata format. Do not RECEIVE it, because RECEIVE will decode the netdata. Use CP commands to ORDER it and CHANGE its CLASS to suit the reader. Dene a temporary disk if the le is large. 2. Enter: read data NETDATA A to read the le and preserve the netdata format. 3. Enter: ftp systemName systemName is the name of the target system. Enter userid and password when prompted. 4. Enter: cd directoryName to change to the target directory if necessary. 5. Enter: binary to set the transmission type to I (image). 6. Enter: put data.NETDATA The target le name can also be specied, if different from the source. Make a note of the byte count, which should be the same for the le on the target system. The target system keeps the name in lower case, even though it was upper case in CMS.
Chapter 2. Resource denition commands and offline utilities
139
cicsddt
To run the cicsnetdata program:
cicsnetdata < data.netdata > outputFileName
Denition les used by qtod: In addition to the QSAM data le produced by the cicsnetdata program there must be two other denition les for a successful conversion: v QSAMleName.ddt.def This le must be in the same directory as the QSAM data le. It contains the key and data information about each QSAM record. The sample le qsam.sdt.def, describes what each tag means. A sample data le can be found in prodDir/src/examples/sdt. The le must be renamed to qsam.ddt.def for qtod to pick it up. The tag SFSFile=qsamtest must also be changed to DB2File=CICS.QSAMTEST. v QSAMleName.dfh This le must also be in the same directory as the QSAM data le and is the DFHCNV template source for the QSAM records. DDT will not validate this le so it is recommended that the le is checked using the cicscvt program rst. DDT only understands the source, not the compiled output from cicscvt. The sample le qsam.dfh shows a typical template.
140
cicsddt
To run qtod: A sample QSAM data le qsam.netdata has been provided to demonstrate QSAM to DB2 conversion using the qtod command. The following describes the steps necessary to convert this example: 1. Convert qsam.netdata to DDT-readable format using the cicsnetdata program as follows:
cicsnetdata < qsam.netdata > qsam
to produce a le called qsam in the current directory. 2. Create a suitable DB2 table to receive the QSAM records. For this example, enter
cicsddt -s DB2name -c create qsamTest
3. Make sure you have the following les in a directory you can write to:
qsam qsam.dfh qsam.ddt.def
The default code pages for conversion are dened at the top of the table qsam.dfh; these may have to be changed, depending on your operating system. 4. Run cicsddt so that it is working with the database that has CICS.QSAMTEST on it, Enter:
cicsddt -s DB2name -c qtod qsam
The le qsam must be in the current directory. DDT will show a running count of the records being transferred. If an error occurs the table must be emptied before it is reloaded. 5. When the command has nished the DDT prompt should reappear and a log le will have been created in the current directory. The le will be called qsam.ddt.log in this example. Check this log le to make sure DDT picked up all the record types and there were no conversion errors.
141
The purpose of the cicsdefault command is to allow you to restore an archive copy of the resource denitions from the default CICS region.
Syntax
cicsdefault -r regionName [-g groupId] [-v] [-S] [-F] cicsdefault -?
Description
v You must be logged on as a user with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v If you are using DCE authentication you must have a DCE context that has sufficient authority to: Create a DCE principal and account Create a Server Key Table. Usually this is a DCE cell administrator. The cicsdefault command restores the resource denitions from the default CICS region to your new region. You run cicsdefault from the operating system command line. The resource denitions that cicsdefault restores are: v All conguration les except those dening the SFS. These will have to be recongured. v All resource denitions v Conversion templates v All programs v All maps v All Java classes v The contents of the regions data directory. The region environment and region properties les are not restored. You are prompted for your DCE password if you are using DCE authentication.
142
cicsdefault Options
-r region is the name of the new region. Do not use underscores or the word stanza in the region name. -g groupId is the name of the operating systems groupId with which all les of the new region are created. The default groupId is cics (Open Systems) or cicsgroup (Windows NT). -v -S (verbose) lists the les as they are restored. causes the new region to be set up without using DCE servers. The Region Denitions (RD) attributes NameService and AuthenticationService will be set to none and CICS respectively. forces the region to be overwritten if the region already exists, but does not recreate DCE and the entries in the operating mechanism used for starting and stopping long running processes if they already exist. causes the usage message to be displayed.
-F
-?
Examples
1. To create region REGION1:
cicsdefault -r REGION1
143
Creates the default resource les for the SFS, SFS schemas and PPC gateway servers. (Open Systems) and for the SFS schemas (Windows NT).
Syntax
cicsdefaultservers [ -s | -c | -p ]
Description
cicsdefaultservers creates the following default resource les for the: SFS schema /var/cics_servers/SCD/SCD.stanza gateway /var/cics_servers/GSD/GSD.stanza These les are owned by cics and, on Open Systems, have the permissions -rw-rw----. If no ags are specied, les are created for the SFS, schemas and, on Open Systems, gateway servers. Run this command as root or administrator and once per machine after CICS has been installed for the rst time. /var/cics_servers/SSD/SSD.stanza
Options
-s -c -p creates the default SFS resource le (SSD.stanza). creates only the default schema resource le (SCD.stanza). creates only the default PPC gateway resource le (GSD.stanza).
Examples
To create the SFS and schema resource les on one machine, enter:
cicsdefaultservers -s -c
144
Syntax
cicsdelete -c className [-r regionName] [-P | -R | -B] [-f leName] resourceName [resourceName ... ] cicsdelete -?
Description
The Resource Denition Online (RDO) command cicsdelete deletes one or more resource denitions of a given class from the permanent resources database, and can delete them from the runtime database. CAUTION: Stopping the command before completion can result in a damaged database. After you delete a resource denition, you cannot recover it. Each resource deletion is atomic. For example, suppose you try to delete three resource denitions with a single command. The rst two resource denitions are deleted successfully, but the third resource denition deletion fails. The command abnormally terminates, but it has still successfully deleted the rst two resource denitions. These two denitions are not recovered. The command returns 0 if the command completes successfully, 1 otherwise.
Options
-c className determines the resource class from which the resource denition is to be deleted, and is one of these two- or three-character codes: cd fd gd gsd jd ld od Communication Files Gateways Gateway Servers Journals Listeners Objects
Chapter 2. Resource denition commands and offline utilities
145
cicsdelete
pd scd ssd td tdd tsd ud wd xad Programs SFS Schemas SFS Servers Transactions Transient Data Queues Temporary Storage Queues Users Terminals Products
Resource classes rd (Region denition) and md (Monitoring denitions) cannot be deleted. -r regionName species the region from which the resource denition is deleted. If you do not specify a region name, CICS deletes the resource denitions from the region specied by the CICSREGION environment variable. The -r parameter is invalid if you specify gsd, scd, or ssd as the resource class, because these classes are associated with a collection of regions rather than with a specic one. -f leName species the name of the le that contains the schema denitions. This ag is valid only when you specify scd (SFS schema denitions) as the resource class. -P instructs the command to delete the resource denitions from the permanent database without uninstalling them from the runtime database. This is the default option if you do not specify either the -P, -R, or -B options. instructs the command to uninstall the resource denitions from the running system and delete them from the runtime database. If you are using DCE authentication, you must be authenticated as a DCE principal before running the command with this ag. The -R ag is invalid if you specify gsd, scd, or ssd as the resource class, because these classes are associated with a collection of regions rather than with a specic region. -B instructs the command to delete the resource denitions from the permanent database, uninstall them from the running system, and delete them from the runtime database. If you are using DCE
-R
146
cicsdelete
authentication, you must be authenticated as a DCE principal before running the command with this ag. The -B ag is invalid if you specify gsd, scd, or ssd as the resource class, because these classes are associated with a collection of regions rather than with a specic region. resourceName is the name of a resource denition to be deleted. -? causes the usage message to be displayed.
Examples
1. To remove terminals T001 and T002 from the runtime database only in region REGION5:
cicsdelete -c wd -r REGION5 -R T001 T002
2. To remove transient data queues TDQUEUE1 and TDQUEUE2 from the permanent and runtime databases in region REGION6:
cicsdelete -c tdd -r REGION6 -B TDQUEUE1 TDQUEUE2
147
The purpose of the cicsdestroy command is to allow you to destroy an existing CICS region.
Syntax
cicsdestroy -r regionName [-s] [-I] cicsdestroy -?
Description
v You must be logged on as a user with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v If you are using DCE authentication you must have a DCE context that has sufficient authority to: Create a DCE principal and account Create a Server Key Table Administer the le system for the region (if you want to use the -s ag) Usually this is a DCE cell administrator. The cicsdestroy command destroys the specied region in the following way: All operating system les associated with the region are destroyed. If you specify the -s option, the TSQ, TDQ, and local queue les for the region are deleted on the relevant le systems.The servers must be available and you must be logged in to DCE with sufficient authority to perform the deletions. cicssrcdestroy deletes the region used for managing CICS processes. However, if the directories and les of the CICS region have been deleted before the cicsdestroy command is issued, the SRC entries for the region are not removed. If you are using DCE authentication,you are logged in to DCE, and you have sufficient authority, the region principal, region account and CDS directories for the region are deleted. Note: Although cicsdestroy deletes the DCE principal and account for the region userid, it does not delete the DCE principals and accounts for
148
cicsdestroy
the users of this region. If these users are not required for other regions, the DCE principals and accounts may be deleted using DCE facilities. When you use cicsdestroy, you are prompted for your DCE password if you are using DCE authentication.
Options
-r regionName species the region to be destroyed. -s -I -? species that region-owned data inle system usedis also to be destroyed. ignore errors. causes the usage message to be displayed.
Examples
1. To destroy a region without destroying its file system data:
cicsdestroy -r REGION1
149
Use this command to extract data from a dump le or les that CICS creates as part of a CICS dump sequence. The command formats the CICS dump into a form that can be written to the operating system standard output.
Syntax
cicsdfmt [ [-r regionName] [leName] | directoryName | leName | -p [-r regionName] [dumpFileName] ] cicsdfmt -?
Description
If you do not specify any parameters, the cicsdfmt command lists the dump les located beneath the default regions dump directory, and sends some explanatory text about how to use the command to the operating system standard error destination. If you specify a region and the name of a dump le, the cicsdfmt command generates the full path of the dump directory for the region, extracting a value for the dump directory from the Region Denitions (RD). It searches in the subdirectories of the dump directory for the named dump le. If you specify a lename alone, the cicsdfmt command searches the subdirectories of several locations, in the following order, to check whether the named dump le exists: 1. The current directory 2. The parent of the current directory 3. The default regions dump directory If the named dump le does not exist, the cicsdfmt command sends an error message to the standard error output. If the named dump le exists, it formats all dump les with this name to standard output. Note: If a dump produced by cicsdfmt contains lines greater than 2048 bytes, some text editors cannot be used. For example, on CICS on Open Systems, you cannot use the vi editor to examine such dumps, but you can use: v cat fileName | fold newName (This converts all the lines to 80 characters to allow normal use of vi.)
150
cicsdfmt
v more fileName v pg fileName v emacs, if available
Options
-r regionName species the region to use. The cicsdfmt command generates the full path of the dump directory for the region regionName, extracting a value for the dump directory name from the Region Denitions (RD). The cicsdfmt command checks that regionName is valid. If regionName is invalid, it sends an error message to the standard error stream. If you specify leName as well as regionName, the request formats the dump le leName for the specied region. If you do not specify leName, the request lists all the dump les for region regionName. If you do not specify a region name, CICS processes dumps for the region specied by the CICSREGION environment variable. leName species the base name of the le or set of les to be formatted to standard output. If you specify the leName and -r regionName options, the cicsdfmt command formats only the dump les contained in the specied region. You can specify lename with a relative or absolute path. A dump can be contained in more than one le, but the les all share the same base name; supply the base name to this command. Note: The suffix of the lename must not be entered. The format of the name of the dump le is aaaannnn, where nnnn is the dump sequence number that CICS increments each time a dump is performed, and aaaa is a prex to denote how the dump arose. The prex takes the following values: ASRA From an ASRA abnormal termination. ASRB From an ASRB abnormal termination. SYSA From a SYSA abnormal termination. SHUT From a shutdown request. SNAP From a CEMT PERFORM SNAP DUMP request. A four letter dumpcode From an EXEC CICS DUMP command.
151
cicsdfmt
A four letter abnormal termination code From an EXEC CICS ABEND command or from a transaction abnormal termination initiated by CICS. directoryName lists the dump les located in the subdirectories of a specied directory. You can specify directoryName as a full or relative pathname. -p [dumpFileName] removes all dump les specied by the dumpFileName parameters. The dumpFileName is the base name of the le or set of les that you want to remove. You can specify dumpFileName with a relative or absolute path. A dump can be contained in more than one le, but the les all share the same base name; supply the base name to this command. If you do not specify a dumpFileName parameter, the cicsdfmt command lists the specied les, requests conrmation that all the les are to be deleted, and, if conrmed, removes the les. If you specify -p with a dumpFileName parameter, the specied dump les are deleted without requesting conrmation. -? provides you with a help facility showing the correct syntax for the command. cicsdfmt also displays the correct syntax if you enter the command syntax incorrectly.
Examples
1. To list all dump les located in directory /u/dumpdir:
cicsdfmt /u/dumpdir
3. To format all dump les with a base name of shut001 that are located in the current directory, the parent of the current directory, or the default regions dump directory:
cicsdfmt shut001
152
Use this command to make an archive copy of all the resource denitions in an existing CICS region. Using the cicsexport command with the cicsimport command lets you either create a new region as a copy of an existing region, or create an archive that you can unpack to create an arbitrarily named region. This process lets you transfer regions across machines, possibly on distinct networks. Attention: This command creates a copy of the region in the /var/cics_regions directory (for CICS on Open Systems) or in the \var\cics_regions directory (for CICS for Windows NT). Before you use this command, verify that you have enough space for the copy in the directory.
Syntax
cicsexport [-r regionName] [-o outFile] [-l className...] cicsexport -?
Description
The cicsexport command copies the resource denitions from an existing CICS region. To run cicsexport from the command line, you must be logged in as a user with root or administrator privileges and be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). The cicsexport command copies the following denitions: v All conguration les except those dening the SFS server. These have to be recongured. v All resource denitions v Conversion templates v All programs v All maps v All Java classes v The contents of the regions data directory. Note: If you install maintenance on CICS or a new version of CICS, the existing DEFAULT archive le is overwritten, including any alterations you made to it.
153
cicsexport
To migrate an exported region, you must import it, migrate it by using the cicsmigrate -r command, and then reexport it. The region can then be imported successfully as required.
Options
-r regionName species the existing region from which the cicsexport command copies resource denitions. If you do not specify a region name, CICS copies the resource denitions from the region specied by the CICSREGION environment variable. -l className (CICS on Open Systems only) permits the archive copy to be generated in a form that creates symbolic links for the specied resource denition les. The className can be one or more of the following: cd fd gd jd ld md pd od rd td tdd tsd ud wd xad Communication Files Gateways Journals Listeners Monitoring Programs Objects Regions Transactions Transient Data Queues Temporary Storage Queues Users Terminals Products
-o outFile species the output le to which the cicsexport command writes the archive copy of the resource denitions, in Copy In and Out (cpio) format. If you do not specify the -o ag, cicsexport writes the le to standard output. -? causes the usage message to be displayed.
154
cicsexport Examples
1. To export the region REGION1:
cicsexport -r REGION1
2. To export the region REGION2, placing symbolic links for the le and program denitions:
cicsexport -l fd pd -r REGION2
155
Syntax
cicsget -c className [-r regionName] {-l | -s [resourceName] | [resourceName]} cicsget -c scd [-f leName] {-l | -s resourceName | resourceName} cicsget -?
Description
The Resource Denition Online (RDO) command cicsget retrieves resource attributes of a specied class from the permanent resources database so that you can query on their status. Output from cicsget is written to standard output. Do not specify the resourceName for the Region Denitions (RD) and the Monitoring Denitions (MD). However, you must specify it for all other resource types. The -l and -s options are mutually exclusive.
Options
-c className determines the resource class from which the resource denition is to be retrieved, and is one of these two- or three-character codes: cd fd gd gsd jd ld md od pd Communication Files Gateways Gateway Servers Journals Listeners Monitoring Objects Programs
156
cicsget
rd scd ssd td tdd tsd ud wd xad Regions Schema File Denitions SFS Servers Transactions Transient Data Queues Temporary Storage Queues Users Terminals Products
-r regionName species the region from which the command retrieves the resource attributes. If you do not specify a region name, CICS retrieves the resource attributes from the region specied by the CICSREGION environment variable. The -r parameter is invalid if you specify gsd, scd, or ssd as the resource class, because these classes relate to the servers rather than to the regions. -s causes a list of attribute names and attribute values to be written to standard output. The information is written as two lines of information. The rst line, which begins with a number sign (#), is a list of attribute names separated by colons (:). The second line contains all the corresponding attribute values, also separated by colons. The cicsget command appends the word region to the end of the rst line, and appends the region name to the end of the second line. Specify the resourceName for all classes except the region and monitoring classes. causes a list of all resources and their descriptions for a given class to be written to standard output.
-l
resourceName is the name of the resource denition to be retrieved. You must specify a resourceName for all classes except rd and md. To retrieve the attributes for the default denition, use as the value. This attribute without the -s ag results in a list of attributeName=attributeValue pairs being written to standard output. -f leName species the le containing the resource denitions. Use this attribute only when retrieving data for the Schema File Denitions (SCD). The class scd must be used when specifying the lename.
157
cicsget
-? causes the usage message to be displayed.
Examples
1. To inquire about the denition attributes for the temporary storage queue TSQUEUE1 in the region REGION7:
cicsget -c tsd -r REGION7 TSQUEUE1
2. To inquire about the users in the region REGION8 and write the details as a list to standard output:
cicsget -c ud -r REGION8 -l
158
The purpose of the cicsgetbindingstring command is to display the binding string used to contact a given CICS region or Encina SFS or PPC Gateway server when the DCE directory service is not being used.
Syntax
cicsgetbindingstring { regionName | serverName } cicsgetbindingstring -?
Description
The environment variable CICS_HOSTS must have the same value as it does when CICS components and Encina servers are started. Otherwise the results displayed may not correctly represent the endpoints used by CICS. This command searches the DCE RPC daemons for information about regions and servers. It will search the daemons on the machines that are specied by the environment variable CICS_HOSTS or those on the current machine if CICS_HOSTS is not set. If none of the daemons on the specied machines has information about the region or server, a nal check is made in the le /var/cics_servers/server_bindings for any binding that may have been entered there. Note that cicsgetbindingstring displaying a binding string does not guarantee that a region or server is currently active and available on the given endpoint. Rather it represents the endpoint that will be used by CICS processes when attempting to contact the region or server in the absence of the DCE directory service. Normally however this will indeed be an active process. In the case of Encina SFS and PPC Gateway servers the binding string returned by cicsgetbindingstring may be used in place of the server name when using Encina facilities for manipulating the servers. This is especially important when using tkadmin, sfsadmin or ppcadmin with servers operating without the DCE directory service. Specifying the server name in such cases will not enable Encina to locate the server concerned (unless the environment variable ENCINA_BINDING_FILE is set to the name of a le containing a mapping between the server name and a binding string, for example, the le /var/cics_servers/server_bindings). On the other hand the string binding may be freely used in place of the server name and Encina will then be able to locate the server.
Chapter 2. Resource denition commands and offline utilities
159
cicsgetbindingstring Options
regionName is the name of a CICS region on one of the machines specied by the environment variable CICS_HOSTS or on the current machine if CICS_HOSTS is not set. serverName is the name of an Encina SFS or PPC Gateway server on one of the machines specied by the environment variable CICS_HOSTS or on the current machine if CICS_HOSTS is not set -? causes the usage message to be displayed.
Examples
1. To nd the binding string that will be used by CICS to contact the CICS region REGION1 running on machine BLUE, enter
export CICS_HOSTS=BLUE cicsgetbindingstring REGION1
2. To nd the binding string that will be used by CICS to contact the Encina SFS server /.:/cics/sfs/SERVER1 running on one of the machines RED, BLUE or GREEN, enter
export CICS_HOSTS="RED BLUE GREEN" cicsgetbindingstring /.:/cics/sfs/SERVER1
3. To get a list of les on the Encina SFS server /.:/cics/sfs/SERVER1 running on machine BLUE
export CICS_HOSTS=BLUE sfsadmin list files -server $(cicsgetbindingstring /.:/cics/sfs/SERVER1)
160
Use this command to determine the process identier of the main CICS process.
Syntax
cicsgpid [-r regionName] cicsgpid -?
Description
cicsgpid determines the process identier of the main CICS process.
Options
-r regionName species the region name. The cicsgpid command checks that regionName is valid. If regionName is invalid, cicsgpid writes an error message to the standard error stream. If you do not specify a region name, CICS determines the process identier for the region specied by the CICSREGION environment variable. -? provides you with a help facility showing the correct syntax for the cicsgpid command. If you enter the command syntax incorrectly, the correct syntax is displayed.
Examples
To determine the process identier for the CICS region REGIONB:
cicsgpid -r REGIONB
161
Invokes the CICS 3270 Terminal Emulator, from the operating system, so that you can connect to a CICS region. Note: The syntax for cicshpterm is identical to that of cicsterm (see cicsterm - Invoke the CICS 3270 terminal emulator on page 251). Once cicshpterm performs the conguration steps outlined under Description, it invokes cicsterm. All the description given for cicsterm is equally valid for cicshpterm.
Syntax
cicshpterm [-r regionName] [-n netName | -m modelId] [-t transId] [-A [animatorTTY] [-T animatorTERM] cicshpterm -?
Description
1. You need access to a terminal or window that can access a machine in the DCE cell in which the CICS region is dened. Your terminal must either be suitable for autoinstall, or have an entry in the NetName attribute in the Terminal Denitions (WD). 2. Your window must contain at least 12 lines, so that the terminal emulator can display a menu of region names when necessary. A menu of region names is displayed if you do not specify a region when you invoke the CICS 3270 Terminal Emulator. The 12 lines are needed to display various headers, PF key legends, blank space, and at least one region name so that you can scroll through the list of available regions. If the window contains less than 12 lines, there is an error message and the terminal emulator terminates abnormally. It is recommended that you use a window with 25 lines. 3. If you are using DCE authentication, you must be authenticated as a DCE principal, as explained under Description. A DCE ticket is allocated when the DCE principal authenticates with the DCE security service. Tickets have a limited lifetime; 10 hours by default. If a ticket expires while the client is active, the client is terminated and any in-ight transactions are terminated abnormally. DCE accounts may have their ticket lifetime changed. 4. You must be authorized to run the transactions that you specify. That is, the UD entry for the userid you are using must have the TSL and RSL
162
cicshpterm
keys listed in it that allow you to access the transactions that you want to run. This is described in the CICS Administration Guide. The cicshpterm command is an intelligent cicsterm wrapper that automatically examines your environment and congures cicsterm for the maximum functionality possible within your environment. If you use cicsterm alone, you are required to perform these conguration steps manually. cicsterm command, cicshpterm checks whether or not your environment is capable of displaying a window on a graphics terminal. If your environment is capable of displaying a window on a graphics terminal, cicshpterm creates an hpterm window that runs cicsterm. The cicsterm command is run using a high-function terminal model and a customized hpterm window that provides 24 programmed softkeys and full color capabilities. The characteristics of the hpterm window created by cicshpterm are dened in the X resources le /opt/cics/etc/cicshpterm.resources. The key mapping le applied is /opt/cics/etc/3270keys.hpterm. If your environment is not capable of displaying a window on a graphics terminal, cicshpterm determines whether you are running on a terminal or emulation that it supports. For the supported terminals and emulations, cicshpterm congures your environment for the maximum functionality possible. In these cases, cicsterm runs in monochrome mode with 8 or 16 programmed soft keys. The following table lists the terminal models recognized by cicshpterm and the 3270 key mapping le located in /opt/cics/etc that is applied for each model:
Terminal type supported HP 2392A, HP 2394A, HP 700/92, HP 700/94, HP 700/96, HP 700/98 hpterm terminal emulator (non-graphics mode) hpterm terminal emulator (graphics mode) VT100/ VT200 Associated keymap le 3270keys.hp 3270keys.hp 3270keys.hp 3270keys.hpterm 3270keys.vt100
If cicshpterm does not recognize your terminal/emulation, it makes no changes to your environment. The keymap le applied is /opt/cics/etc/3270keys.
163
cicshpterm
The cicshpterm command defaults the correct cicsterm model (-m) parameter for its supported terminals whenever the cicsterm netname (-n) parameter is not specied. You can override this default by specifying a terminal model using the -m parameter.
Options
-r regionName species the name of the CICS region to which you wish to attach. If you do not specify a regionName, CICS displays an interactive menu of available regions that you can select from. If there are no regions available, CICS displays an error message. You must conrm this message by pressing ENTER before CICS terminates the CICS 3270 Terminal Emulator. -t transId species the transaction identier of the transaction to run after Terminal Emulator initialization. -n netName species the name of the netName to use for installation. To install as a particular terminal, specify the netName of the required terminal. If you omit the netName, then cicshpterm autoinstalls, and a unique netName is generated in the region. -m modelId species the name of the DevType to use for autoinstallation. See Processing on page 254. -A animatorTTY species the name of the device for ANIMATOR stdin/stdout. If you specify the -A, option without a value, and you are using X Windows, cicshpterm will create a window for use as the ANIMATOR console. -T animatorTERM species the name of the TERM type of the ANIMATOR terminal. -? causes the usage message to be displayed.
Examples
1. To display the syntax for accessing CICS:
cicshpterm -?
3. To start a terminal with the NetName BlueTerm in its Terminal Denitions on region region1:
cicshpterm -n BlueTerm -r region1
164
cicshpterm
4. If you want to log on to a different userid after you have started cicshpterm:
cicshpterm -r region1 -t CESN
165
Use this command to restore an archive copy of the resource denitions from an existing CICS region. Using the cicsimport command with the cicsexport command lets you either create a new region as a copy of an existing region, or create an archive that you can unpack to create an arbitrarily named region. This process lets you transfer regions across machines, possibly on distinct networks.
Syntax
cicsimport -r regionName [-g groupName] [-i inFile] [-l{m|o}][-v] [-F] [-S|-D] [-o] cicsimport -?
Description
v You must be logged on as a user with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v If you are using DCE authentication, you must have a DCE context that has sufficient authority to create a DCE principal, account, and server key table. Usually this requires identity as a DCE cell administrator. The cicsimport command restores the resource denitions from an existing region to your new region. You run cicsimport from the command line as long as you are logged in as a user with root or administrator privileges. The denitions that cicsimport restores are: v All conguration les except those dening the SFS. Even if SFS les already exist for an imported region, you should rerun cicssfsconf to reset the ACLs. v All resource denitions v Conversion templates v All programs v All maps v All Java classes v The contents of the regions data directory
166
cicsimport
If you are using DCE authentication and there are User Denitions (UD) in the region archive being imported that do not currently exist in the DCE cell, their DCE principals and accounts are created automatically with the following details: v The password is the same as that for the users id. v The group is cics_users. v The organization is none. v The home directory is /. v The shell is cicsterm. If you are using DCE authentication, all users, whether or not they exist already, are made members of the DCE group cics_users. If you are not using DCE authentication or name services, the option -S must be specied. If you install a new region, this command can be used to copy another region which already exists. If you want to migrate an exported region database, you must import using cicsmigrate -r, and then re-export it again. The region can then be imported successfully as required. If you are using SFS for CICS queues and les, after running cicsimport, run cicssfsconf to reset the Access Control Lists.
Options
-r regionName species the name of the region to restore. -g groupName species the name of the group with which all les of the new region are created. The default groupid is cics (CICS on Open Systems) and cicsgroup (CICS for Windows NT). -l{m|o} (CICS on Open Systems only) species the action that cicsimport is to take if it cannot nd the target of a symbolic link: -lm -lo Mandatory. cicsimport terminates the restoration immediately. Optional. cicsimport produces a warning message, creates the link, and continues restoration. This allows you to restore further regions that resolve the missing links.
167
cicsimport
-i inFile species the name of the archive copy of the resource denitions in Copy In and Out (cpio) format. If you do not specify the -i ag, the le is read from stdin. -v -F (verbose) lists les as they are created. forces an overwrite of the region if the region already exists, but does not recreate DCE and the entries in the database of the facility that starts and stops processes if they already exist. causes the new region to be set up without using DCE servers. It must be specied if the region from which the archive was created used DCE servers but the new region does not. The Region Denitions (RD) attributes NameService and AuthenticationService will be set to CICS respectively. forces DCE servers to be used when migrating a region that did not use DCE servers to a machine that does use them. The Region Denitions (RD) attributes NameService and DCE. Do not create DCE principals and accounts for the CICS users in the region. If not specied, each user denition in the region will have a DCE principal and account added to the DCE registry and the account will be added to the DCE group cics_users. produces the usage message.
-S
-D
-o
-?
Examples
1. To import region REGION1 from archive le /archive/region1:
cicsimport -r REGION1 -i /archive/region1
2. To import region REGION2 from archive le /archive/region2 producing warning messages if any symbolic link requirements dened as part of the cicsexport command cannot be found:
cicsimport -lo -r REGION2 -i /archive/region2
168
Use this command to install CICS resource denitions into the runtime database.
Syntax
cicsinstall [-v] [-r regionName] { -a | -g groupName [groupName ... ] } cicsinstall -?
Description
The Resource Denition Online (RDO) command cicsinstall installs resource denitions into the runtime database for the specied region. The -g and -a options are mutually exclusive. v You must be logged on as a user with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v If you are using DCE authentication, you must have a DCE context that has sufficient authority to create a DCE principal and account and create a server key table. Usually, this requires an identity as a DCE cell administrator.
Options
-r regionName species the region to which the cicsinstall command is to install the resource denitions. If you do not specify a region name, CICS installs the resource denitions to the region specied by the CICSREGION environment variable. -g groupName ... species the names of the group or groups whose resource denitions the cicsinstall command is going to install. As many as ten group names can be specied. The -g ag must be the last ag specied on the cicsinstall command. -v requests that the cicsinstall command produce messages indicating which resources it has installed, as well as the total number of resources installed. If you do not specify this option, it produces a message only if an error occurs. requests the cicsinstall command to install into the CICS runtime
-a
169
cicsinstall
database all resource denitions from the permanent database that have the ActivateOnStartup ag set. -? causes the usage message to be displayed.
Examples
1. To install all resource denitions from the group GROUP1 in the region REGION9 into the runtime database:
cicsinstall -r REGION9 -g GROUP1
2. To install into the runtime database all denitions in the region REGION0 that have the ActivateOnStartup ag set, plus receive progress messages:
cicsinstall -r REGION0 -a -v
170
Sets up the resource denitions required to run the Installation Verication Programs (IVPs).
Syntax
cicsivp -r regionName [-s serverName] [-v volumeName] [-l sampleLanguage] cicsivp -r regionName [-s databaseName][-l sampleLanguage]
Description
v On Open Systems you must be logged in as a member of the group cics. On Windows NT you must be logged in as a member of the group cicsgroup. v If you are using an SFS as a le server: You must be running an SFS. cicssfsconf must have been run to congure the SFS. You must have authority to create an SFS le. Usually this means that you must be logged in with the DCE principal, cell_admin. v If you are using DB2 as a le server: You must have a running DB2 database available for connection. You must be authorized to connect to the database. cicsdb2conf must have been run to congure the database.
You must have the authority to create a table. The IVPs are designed to run with a set of pre-dened resource denitions. The cicsivp command adds these resource denitions to the specied region database. After youve run cicsivp, you must cold start the region for the changes to take effect. Once the region is running, you can run cicsivp again to change the language in which the sample transactions are coded.
Options
-r regionName species the region to be amended. -s serverName species the name of the required SFS if the region is using an SFS le server(attribute FileSystemType=SFS in the Region Denition). If the
Chapter 2. Resource denition commands and offline utilities
171
cicsivp
server is not specied then the default server is /.:/cics/sfs/hostName, where hostName is the name of the machine running CICS and can be found using the command uname -n. -s databaseName species the name of the required DB2 database if the region is using DB2 as a le server (attribute FileSystemType=DB2 in the Region Denition). If the name of the database is not specied then the value of the Region Denition attribute DefaultFileServer is used as the database name. -v volumeName species the name of the required SFS logical volume. If it is not specied, the default volume is DataVolume in the Structured File Server Denitions (SSD). -l sampleLanguage species the language of the sample transactions. The language can be one of: C the samples coded in C are to be used.
IBMCOB the samples coded in IBM COBOL are to be used (CICS for AIX only). COBOL the samples coded in Micro Focus COBOL are to be used.
Examples
1. To add the required resource denitions to a region called REGION1, using the default SFS and SFS logical volume, enter:
cicsivp -r REGION1
2. To add to required resource denitions to a region called REGION1, using the default SFS, which has an SFS logical volume called sfs_MINE, enter:
cicsivp -r REGION1 -v sfs_MINE
172
The cicslssrc command shows the status of CICS subsystems. By default, all subsystems are listed. Alternatively, a specic region or SFS may be listed.
Syntax
cicslssrc [ -a | -s subsystem | -g groupName ] cicslssrc -?
Description
You must be logged in as a member of the group cics. The following information is provided when the cicslssrc command is used: v The process ID (PID) of the subsystem if it is active or stopping. Otherwise, this eld is blank. v The current status of the subsystem. The statuses are: inoperative The subsystem is not currently running. active The subsystem is running as the process identied by the PID eld. stopping The subsystem is processing a shutdown request.
Options
-a display the status of all subsystems. This is the default parameter. -s subsystem display the status of the specied subsystem. A regions subsystem name is formed by appending the region name to cics.; for example cics.region2. An SFS subsystem name is similarly formed by appending the short name of the SFS to cicssfs.; for example, cicssfs.SHostA. -g groupName display the status of all subsystems in the specied group. -? causes the usage message to be displayed.
Examples
1. To list all CICS subsystems, use the following:
cicslssrc
Chapter 2. Resource denition commands and offline utilities
173
cicslssrc
On a system with a region named region2 and an SFS named SHostA, something similar to the following is shown:
Subsystem cics.region2 cicssfs.SHostA PID 7444 605 Status active active
174
cicslterm cicslterm - Invoke the local CICS client 3270 terminal emulator
AIX HP-UX Sun Solaris Windows NT X
Invokes the local CICS client 3270 terminal emulator so that you can connect to a region on the local machine.
Syntax
cicslterm [-s=serverName | -r=serverName] [-t=transId] [-k=keyFile] [-c=colorFile] [-m=modelId] [-n=netName] [-p=printCommand | -f=printFile] [-q | -w] cicslterm -?
Description
v You need to understand about the 3270 terminal subsystem before you use the cicslterm command. See the CICS Administration Guide for more information. v The window in which you start cicslterm must contain at least 12 lines. It is recommended that you use a window with 25 lines. v You must be authorized to run the transactions that you specify. That is, the UD entry for the userid you are using must have the TSL and RSL keys listed in it that allow you to access the transactions that you want to run. This is described in the CICS Administration Guide. After you are connected to the region, CICS leaves you with a blank screen that is running the IBM 3270 Information Display System emulation. You can then enter the transaction identier of the transaction you want to run. Alternatively, you can run a transaction immediately when cicslterm is initially invoked, by entering
cicslterm -t=transId
where transId is the transaction identier. The name of the pipe that is to be used for communication with the region is determined from le cicslcli.ini in directory prodDir/bin. The le cicslcli.ini must contain a stanza of the form
Server=serverName Protocol=LOCALCLI NamedPipeName=pipeName ...
where serverName is the name of the server specied on the cicslterm command. and pipeName is the 6-character name of the pipe to be used. The
Chapter 2. Resource denition commands and offline utilities
175
cicslterm
last two characters of the name of the pipe must be unique on the machine. The pipe name must match the attribute NamedPipeName (local Named Pipe name) of an entry in the Listener Denitions (LD) for the region. If you change the le cicslcli.ini, you must use the Stop All Local Terminals icon to stop all CICS local terminals and the cicslcli client before using cicslterm to restart a CICS local terminal to pick up the change. For a full description of the format of the client initialization le, see CICS Clients: Administration. The CICS 3270 Terminal Emulator is associated with a particular region for the lifetime of the cicslterm process. If the region terminates, the cicslterm process is left running to wait for any current scheduled protected transactions for the given terminal when the region is restarted. Otherwise, the cicslterm process terminates.
Options
-s=serverName or -r=serverName species the name of the CICS server you wish to use. -t=transId species the identier of the transaction to run after the terminal emulator has initialized. -k=keyFile species the name of the keyboard mapping le to be used by the emulator. If this parameter is omitted, the environment variable CICSKEY is used to identify the key mapping le. If CICSKEY is not dened, it is assumed that a le called cicskey.ini in the current directory contains the keyboard mapping. -c=colorFile species the name of a color mapping le to be used by the emulator. If this parameter is omitted, the environment variable CICSCOL is used to identify the color mapping e. If CICSCOL is not dened, it is assumed that a le called cicscol.ini in the current directory contains the color mapping. -m=modelId species the name of a model terminal denition, dened in the regions Terminal Denitions (WD), that is to be used to dene the characteristics of the window in which transactions are to be run. If neither of the -m or -n parameters is specied, then any ModelTerm value from the client initialization le is used. If no ModelTerm value has been specied in the initialization le, or if the -m parameter is specied without a value, the servers default terminal denition is used.
176
cicslterm
-n=netName species the name of a particular terminal denition as dened in the regions Terminal Denitions (WD). -p=printCommand species a Windows NT command used to process the temporary print le generated when requests are received by the terminal emulator. The temporary print le is processed by executing the command obtained by appending the name of the le to the specied command. CICS does not delete the temporary print le. The command that is executed is responsible for deleting the temporary print le, if that is appropriate. If the command contains embedded blanks, then it must be surrounded by double quotation marks ("). Any double quotation marks within the command must be entered as backslash double quote (\"). If neither of the -f or -p parameters is specied, the PrintCommand or PrintFile parameter in the client initialization le denes the command or le to be used for print requests. -f=printFile species the name of a le to which the output of print requests is appended. If the name of the le contains embedded blanks, it must be enclosed in double quotation marks ("). Any double quotation marks within the name of the le must be entered as backslash double quote (\"). If neither of the -f or -p parameters is specied, the PrintCommand or PrintFile parameter in the client initialization le denes the command or le to be used for print requests. -q -w (quiet) suppresses the display of any messages generated by the command. (wait) prompts the user to press the Enter key before the command completes, to conrm that messages generated by the command have been read. causes the usage message to be displayed.
-?
Examples
1. To log on to the server server1 and run transaction CEMT:
cicslterm -s=server1 -t=CEMT
177
The cicsmakelv command creates a logical volume for use by an Encina server.
Syntax
cicsmakelv [-I] -v volumeName -s volumeSize -p dataPath cicsmakelv -?
Description
You must be logged on as a user who has administrative privileges The cicsmakelv command is used to create an operating system le, at the location specied by dataPath, that will be used as an Encina logical volume by an Encina server. A volume created using cicsmakelv should only be removed using the cicsremovelv command since cicsmakelv also adds information to the NT Registry concerning the location of the logical volume. Removing the volume by other means could result in incorrect information being left in the NT Registry.
Options
-I Ignore errors. If an Encina Logical Volume previously existed with this name but was only partially removed, then this ag may be specied to force the redenition of the volume.
-v volumeName species the name of the logical volume as it is to be referenced by the Encina Server. -s volumeSize species the size of the logical volume in bytes. -p dataPath species the location of the logical volume.
Examples
1. To create a logical volume for server sfs_Server1 of size 16384 Kbytes at D:\var\volumes\sfs_Server1:
cicsmakelv -v sfs_Server1 -s 16384000 -p D:\var\volumes\sfs_Server1
178
Use cicsmfmt to extract data from a monitoring transient data queue that CICS creates as part of a CICS monitoring sequence. cicsmfmt formats the CICS monitoring data into a form that can easily be written to standard operating system output. You can replace cicsmfmt with your own customized program. This information describes the version delivered with CICS and may not correspond to the version running on your system.
Syntax
cicsmfmt leName cicsmfmt -?
Description
If you specify too few or too many parameters, or enter the -? option, cicsmfmt sends some explanatory text to the standard error destination, on how to use the command. Otherwise, cicsmfmt checks that the le exists, and formats the le records. cicsmfmt formats several elds for each transient data queue record: v the transaction name v the terminal name v the start and end time stamps for the task v the time spent waiting for le input and output, and the number of times CICS started and stopped the clock v the program name v the total number of le requests v the data segment memory occupancy v the rst abnormal termination code, if set. cicsmfmt is a sample program generated from the sample source le cicsmfmt.c. It can be built with the sample makele in the directory prodDir/src/samples/mfmt using the command make -e -f Makele (on Open Systems) or nmake -e -f Makele (on Windows NT). If you want to replace cicsmfmt with your own program, you must change the sample makele accordingly.
179
cicsmfmt
The following les make up the monitoring data formatter:
Table 3. Monitoring data formatter les
File Type Contents The executable monitoring formatter program Sample monitoring formatter program source Sample makele that builds and installs the monitoring formatter Library containing the functions for reading and processing a Monitoring Data le Denitions used by the sample monitoring formatter English messages used by the sample monitoring formatter Message catalog for cicsmfmt produced by gencat. Only required by formatter programs compiled with CICS release 2.1.1 or earlier.
prodDir/bin/cicsmfmt (CICS on Open Systems) executable c:\opt\bin\cicsmfmt.exe (CICS for Windows NT) prodDir/src/samples/mfmt/cicsmfmt.c prodDir/src/samples/mfmt/Makele prodDir/lib/libcicsmfmtsa.a (CICS on Open Systems) prodDir/lib/libcicsmfmtsa.lib (CICS for Windows NT) prodDir/include/cicsmfmt.h prodDir/include/cicsmfmt_msg.h prodDir/msg/en_US/cicsmfmt.cat (CICS for AIX and Solaris) prodDir/msg/en_US.iso88591/cicsmfmt.cat (CICS for HP-UX) source makele object library
Options
leName an operating system le corresponding to a CICS extrapartition transient data queue containing monitoring data from a previous run. Note that the transient data queue must have a variable length record. -? provides you with a help facility, showing the correct syntax for the command. cicsmfmt also displays this if you enter the command syntax incorrectly.
Examples
1. To list le shut001:
cicsmfmt shut001
2. To obtain help:
cicsmfmt -?
180
Creates a shell script (On Open Systems) or a command le (Windows NT) which updates, or migrates, databases and DCE principal names to accommodate the changes required by a Program Temporary Fix (PTF) or a new release.
Syntax
On Open Systems: cicsmigrate [-r regionName | -s | -c | -p | -m] -g leName -o outputLog cicsmigrate -? On Windows NT: cicsmigrate regionName
Description
Use the cicsmigrate command after installing a PTF or a new release. cicsmigrate creates a migration shell script (On Open Systems) or a command le (Windows NT) which you can run to update resource databases and DCE principal names to provide for the changes required by the PTF or new release. This shell script (On Open Systems) or a command le (Windows NT) can: v Add new attributes v v v v Delete old attributes Add new resource classes Change the names for SFS Change an attributes value, for example, the minimum value, or the default v Add new resource denitions, for example a new model terminal or supplied transaction. The shell script (On Open Systems) or a command le (Windows NT) incorporates the cicsmigrateclass, cicsupdateclass, and cicscopystanza commands which make the appropriate changes. Although typically, in a standard installation, you do not normally need to make any modications, if you want to make any specic changes to the databases, such as changing the
181
cicsmigrate
default value of a new attribute, edit the migration shell script (On Open Systems) or a command le (Windows NT) before running it. The shell script (On Open Systems) or a command le (Windows NT) updates the permanent and auto-start images of the databases. To run the shell script (On Open Systems) or a command le (Windows NT) generated by the cicsmigrate command, you must be logged in as root or administrator and authenticated as cell_admin.
Options
-r regionName builds a migration shell script (On Open Systems) or a command le (Windows NT) which migrates only the named region (affects all the les in /var/cics_regions/region/database). Note: For Windows NT, regionName is sufficient; you do not need the -r option. regionName species the CICS region to be migrated. If regionName is not specied, the command only migrates the SFS resource denitions. Note: Note: -s -c builds a migration shell script (On Open Systems) which migrates only the SFS resource database builds a migration shell script (On Open Systems) which migrates only the default schema database (affects only the /var/cics_servers/SCD/SCD.stanza le). builds a migration shell script (On Open Systems) which migrates only the GSD resource database (affects only the les in /var/cics_servers/GSD). builds a migration shell script (On Open Systems) that migrates all the regions, SFS, schema and PPC gateway les on the host machine (affects all the les in /var/cics_servers/SSD). Once this migration script has been built and run for a new release, it should not be rebuilt for that release. Instead, either rerun the original script or migrate items individually.
-p
-m
-g leName species the name of the migration shell script (On Open Systems) to be created. -o outputLog species the name of the log le which will contain all the changes
182
cicsmigrate
made to the system when the shell script (On Open Systems) is run. outputLog is empty until the shell script (On Open Systems) is run. -? displays the usage message.
Examples
On Open Systems: 1. To create a shell script called migratescript that upgrades only the region database in region1, enter:
cicsmigrate -g /homes/mine/migratescript -o /tmp/logfile -r region1
/tmp/logfile is empty until you run the shell script migratescript. 2. To create a shell script called migratesfsscript that upgrades only the SFS resource database, enter:
cicsmigrate -g /homes/mine/migratesfsscript -o /tmp/logfile -s
3. To create a shell script called migrateallscript that upgrades all the regions and SFS on a machine, enter:
cicsmigrate -g /homes/mine/migrateallscript -o /tmp/logfile -m
On Windows NT: 1. To create a command le called migratescript that upgrades only the region database in region1, enter:
cicsmigrate region1
183
Adds new attributes and deletes old attributes from the resource denition le for a given class.
Syntax
cicsmigrateclass [-r regionName] [-w] -c className [-a attributeName {n defaultValue | -d | -u newAttributeName} ] [-f leName] cicsmigrateclass -?
Description
The cicsmigrateclass command adds, updates, or deletes the appropriate attributes in a resource denition le that needs to be changed because of an upgrade to CICS. The cicsmigrateclass commands are generated automatically and are included in the migration shell script which was created when you ran cicsmigrate. The updates to the attributes are mandatory. You can specify a new value using the cicsmigrate commands -n parameter, but you must not delete, or change cicsmigrateclass commands within the migration shell script. The syntax is described here so you can understand the shell script that cicsmigrate generates. In a migration shell script created by cicsmigrate, all cicsmigrateclass commands automatically include the -w ag.
Options
-r regionName species the name of the region database being modied. For most classes, you must specify the regionName parameter. It is optional only for the ssd, scd, and gsd classes. -w updates the autostart images.
-c className species the name of the class being modied. Valid classes are: cd fd gd gsd jd ld Communication denitions File denitions Gateway denitions Gateway server denitions Journal denitions Listener denitions
184
cicsmigrateclass
md od pd rd ssd scd td tdd tsd ud wd xad Monitoring denitions Object denitions Program denitions Region denitions Structured le server denitions Schema le denitions. Must be used with -f leName. Transaction denitions Transient data denitions Temporary storage denitions User denitions Terminal denitions Product denitions.
-a attributeName species the name of the attribute to add, modify, or delete. -f leName species the path and lename of the schema resource le. This option is valid only if -c scd is specied. -n defaultValue species the default value of a new attribute to add. -d deletes the attribute.
-u newAttributeName species the new name of the attribute. -? causes the usage message to be displayed.
Examples
1. To add the new attribute Salutation, with the value greetings, to every entry, including the default entry, in the User denitions for region1, enter:
cicsmigrateclass -r region1 -w -c ud -a Salutation -n "greetings"
2. To change the name of the attribute Salutation in the User denitions for region1 to Farewell, enter:
cicsmigrateclass -r region1 -w -c ud -a Salutation -u Farewell
3. To delete the attribute Farewell from every entry in the le for the User denitions in region1, enter:
cicsmigrateclass -r region1 -w -c ud -a Farewell -d
185
Recongures DCE for each host running a CICS client or region. Use this command only if you have changed your DCE principal names.
Syntax
cicsmigrateclients [ -I] [ -v] cicsmigrateclients [-?]
Description
This command creates a new DCE principal and account for the client and deletes the old principal and account. It sets new passwords for the account in the keytab le in the /var/cics_clients directory. If you are using DCE authentication you must be logged in as root or administrator and authenticated as cell_admin. Run this command on all hosts which run CICS clients or regions.
Options
-I -v -? (Uppercase letter i) Ignores errors. gives a detailed output while the command runs. causes the usage message to be displayed.
Examples
To recongure a DCE client after a patch has been installed, rst log in as root or administrator and authenticate as cell_admin, then enter:
cicsmigrateclients
186
Syntax
cicsmkcobol [-o outFileName] [-L libraryPathName] ... [objectFileNames] [libraryNames]
Description
Creates the COBOL language method le and the COBOL runtime library. The cicsmkcobol command must be run whenever one of the following is installed: v A new version or release of Micro Focus COBOL v A new version or release of CICS applicable to your operating system v A new version or release of any supported database product cicsmkcobol creates the COBOL language method le and the CICS runtime library for Micro Focus COBOL support. It combines the object les containing the CICS COBOL-support routines with the COBOL runtime system to create a loadable and executable le, and a shared library containing the COBOL runtime support. The language method le is placed in the current directory as cicsprCOBOL unless another path and lename are specied using the -o option. The CICS COBOL runtime library is placed in prodDir/lib as libcicscobrtsrt.so libcicscobrtsrt.sl on CICS for HP-UX). Note: On Windows NT there is no specic action required to provide a language environment for CICS. The COBOL language method le cicsprCBFNT is provided in the c:\opt\cics\bin directory
Processing
To be used by CICS: v The COBOL language method le must be placed either in prodDir/bin or in /var/cics_regions/regionName/bin with the name cicsprCOBOL. Versions of the le placed in /var/cics_regions/regionName/bin take precedence over the le placed in prodDir/bin. This allows you to have different COBOL language method les for each region. v The CICS COBOL runtime library must be placed in a directory that is included in your library search path specied by the appropriate environment variable. On CICS for AIX the environment variable is LIBPATH; on CICS for HP-UX it is SHLIB_PATH. The sequential order in which the directories appear in the environment variable determines which
187
cicsmkcobol
libcicscobrtsrt.so le is used by CICS. This allows you to have different COBOL runtime libraries for each region. To run cicsmkcobol, v Log in as root or administrator. v Make prodDir/bin the current directory if you want to create a cicsprCOBOL le for use by all regions, or make /var/cics_regions/regionName/bin the current directory if you want to create a cicsprCOBOL le for use by region regionName. v Set the environment variable LD_LIBRARY_PATH to contain /opt/lib/cobol/coblib (or /opt/cobol/cobdir/coblib on CICS for HP-UX) to ensure correct linkage to the COBOL libraries. v Ensure that the PATH environment variable allows cicsmkcobol to nd: COBOL executable les.
For CICS for AIX, CICS for HP-UX only If COBOL is not installed in the standard directory, set the environment variables COBDIR and COBLIB to the directory where the COBOL executables are held. In the PATH environment variable, the executables directory (for example, $COBDIR/bin) must be before the COBOL driver directory (for example, /usr/bin). Operating system commands (such as echo, sed, and grep) The executable les for CICS on your operating system.
Options
-o outFileName (on CICS for AIX, and CICS for HP-UX only) species the name of the generated le. If the command is run without the -o parameter (and always on and CICS for Solaris), the le is named cicsprCOBOL and is placed in the directory prodDir/bin. -L libraryPathName species a directory you want to add to the library path used by cicsprCOBOL. This is useful where you want to include shared libraries. objectFileNames are the names of the object les you want to use (for example, C functions). Ths object les should be put into the $CICS/lib directory. libraryNames are the names of the libraries you want to use.
188
cicsmkcobol Examples
To create a cicsprCOBOL le in the current directory, enter:
cicsmkcobol
189
Use the cicsnotify command to deallocate resources left allocated when the region is no longer running.
Syntax
cicsnotify subsystemName
Description
This command is used to release resources and delete the region lock le when, due to a non-normal shutdown, resources are left allocated after the region is no longer running. Note: This command should only be used after a stopsrc (on CICS for AIX) or cicsstop (on all other CICS on Open Systems platforms) command has been used with the -c option, or when the region has failed to complete a shutdown in a logical manner.
Options
subsystemName is the subsystem name used by the region. This is normally in the form cics.regionName.
Examples
To deallocate resources in a specic CICS region called REGION1:
cicsnotify cics.REGION1
190
The purpose of the cicsppcgwy command is to start and initialize an Encina PPC Gateway server.
Syntax
cicsppcgwy [-I] [-t component:traceMask [:component:traceMask] ... ] [[-T traceClass [=traceClass ... ] = [modier,modier]outputClass:destination]...] [serverName] [attributeName=attributeValue ... ] cicsppcgwy -?
Description
v You must be logged in as a user who can run the startsrc (CICS for AIX) or cicsstart (all other CICS on Open Systems platforms) command. v The logical volume and userid for the PPC Gateway server must have been created by the user before this command is run. v If you are not using DCE servers, you must add an entry to /var/cics_servers/server_bindings after running cicsppcgwycreate. v CICS must be installed on the same machine as the PPC Gateway server. If CICS is not installed on the same machine as the PPC Gateway server, then refer to the Encina Administration Guide Volume 2: Server Administration for descriptions of alternative procedures. The cicsppcgwy command starts and initializes an Encina PPC gateway server. If for any reason cicsppcgwy encounters a problem, it leaves the PPC Gateway server as it is, to allow investigation of the problem. cicsppcgwyshut can then be used to shut down the PPC Gateway server when required. The servers details are retrieved from the stanza entry in /var/cics_servers/GSD/GSD.stanza (on cold starts), or /var/cics_servers/GSD/AUTO.stanza (on auto starts), and then the server is started using an operating system command. On CICS for AIX this is the startsrc command. Stanza attributes can be overridden by supplying one (or more) pairs of attributeName=attributeValue assignments. Note that the specication of a StartType override (cold or auto) determines whether the details are retrieved
191
cicsppcgwy
from the server database or its recovery-image. On CICS for AIX only, if the command is called from the SMIT panels cicscstartgsd or cicsastartgsd, this override is explicitly added. The -t and -T options are provided to allow the PPC gateway to be traced using the Encina trace facilities. It is expected that these options will only be used under the direction of your support organization, so they are not documented here in detail. See the CICS Intercommunication Guide for more information.
Options
-I -t ... -T ... causes errors to be ignored. species Encina trace masks. species Encina trace output classes. -T can be used more than once.
serverName is the full name of the server, such as /.:/cics/ppc/gateway/servername. If a server name is not given cicsppcgwy will use contents of the environment variable CICS_PPCGWY_SERVER. attributeName=attributeValue ... are overrides for database values. -? causes the usage message to be displayed.
Examples
1. To start and initialize the PPC Gateway server GATESERV1 with a StartType of cold, enter
cicsppcgwy /.:/cics/ppc/gateway/GATESERV1 StartType=cold
192
The purpose of the cicsppcgwycreate command is to create an Encina PPC Gateway server.
Syntax
cicsppcgwycreate [-v] [-I] [-S] serverName [-m modelName] [attributeName=attributeValue ... ] cicsppcgwycreate -?
Description
v You must be logged in as root or administrator because cicsppcgwycreate adds a new SRC subsystem. v If you are using DCE authentication you must be logged in to DCE, with sufficient authority to create a DCE principal, account and keytab - usually the DCE cell administrator. v The userid, which is to be used as the gateway ShortName, must have been created. It should be dened with a primary group of cics and a home directory of /var/cics_servers/GSD/cics/ppc/gateway/userId. You will nd how to create a userid in the CICS Intercommunication Guide. v You must create a logical volume for the userid, called log_userId. v CICS must be installed on the same machine as the PPC Gateway server. If CICS is not installed on the same machine as the PPC Gateway server, then refer to the Encina Administration Guide Volume 2: Server Administration manual for descriptions of alternative procedures. cicsppcgwycreate cannot be used to create an Encina PPC Gateway server on a remote machine because the underlying startsrc (CICS for AIX) or cicsstart (all other CICS on Open Systems platforms) command has no host parameter. A remote Encina PPC Gateway server must be created manually on the remote machine. The cicsppcgwycreate command is used to add a PPC Gateway server server into the server database. It also adds an SRC entry, the CDS entry, and registry and keytab entries. An invalid option will result in an error message being displayed. With no options specied cicsppcgwycreate will display the usage message for this command.
Chapter 2. Resource denition commands and offline utilities
193
cicsppcgwycreate
If you are not using DCE servers you must add an entry to /var/cics_servers/server_bindings after running cicsppcgwycreate.
Options
-v -I -S (verbose) Messages describing the progress of the server creation are displayed. causes errors to be ignored. causes the PPC Gateway server server to be created without using DCE servers.
serverName is the name of the PPC Gateway server server (GSD.stanza key). -m modelName species the name of a model server. attributeName=attributeValue ... overrides for database values. -? causes the usage message to be displayed.
Examples
1. To create the PPC Gateway server server GATESERV1 using the model server MODELGATE, enter
cicsppcgwycreate /.:/cics/ppc/gateway/GATESERV1 \ -m /.:/cics/ppc/gateway/MODELGATE
2. To create the PPC Gateway server server GATESERV1 with a short name of GATESERV1, enter
cicsppcgwycreate /.:/cics/ppc/gateway/GATESERV1 ShortName=GATESERV1
194
The purpose of the cicsppcgwydestroy command is to destroy an Encina PPC Gateway server.
Syntax
cicsppcgwydestroy [-v] [-S] serverName cicsppcgwydestroy -?
Description
v You must be logged in as root or administrator. v If you are using DCE authentication you must have the DCE credentials to delete the principal/account for the principal. v CICS must be installed on the same machine as the PPC Gateway server. If CICS is not installed on the same machine as the PPC Gateway server, then refer to the Encina Administration Guide Volume 2: Server Administration manual for descriptions of alternative procedures. The cicsppcgwydestroy command is used to destroy a PPC Gateway server, by removing the log restart les, all details about the server from the /var/cics_servers directory, and the relevant DCE entries. The SRC entry for the server is also removed. Note: Use this command with care because, although a PPC gateway can be recreated, data associated with the gateway is lost.
Options
-v -S (verbose) Messages describing the progress of the destruction of the server are displayed. causes the PPC Gateway server server to be destroyed without using DCE servers.
serverName is the name of the PPC Gateway server. -? causes the usage message to be displayed.
195
cicsppcgwydestroy Examples
To destroy the PPC Gateway server GATESERV1, enter
cicsppcgwydestroy /.:/cics/ppc/gateway/GATESERV1
196
The purpose of the cicsppcgwylock command is to take or release an Encina PPC Gateway server lock.
Syntax
cicsppcgwylock { -l | -u | -t } serverName cicsppcgwylock -? CICS must be installed on the same machine as the PPC Gateway server. If CICS is not installed on the same machine as the PPC Gateway server, then refer to the Encina Administration Guide Volume 2: Server Administration manual for descriptions of alternative procedures. The cicsppcgwylock command either takes or releases a lock for a specied PPC Gateway server. It is used to serialize the create, start, stop, and destroy phases of a PPC Gateway server. Each PPC Gateway server (/.:/cics/ppc/gateway/serverName) has a lock le called /var/cics_servers/GSD/cics/ppc/gateway/serverName/lock.
Options
-l -u -t cicsppcgwylock to wait until the PPC Gateway server that owns the lock le is no longer running and then takes the lock. causes the lock le for the PPC Gateway server to be released unconditionally. cicsppcgwylock to try to take the lock le but to return immediately if it is unsuccessful.
serverName is the name of the PPC Gateway server for which the lock is to be taken or released. -? causes the usage message to be displayed.
Returned Values
0 1 Successful Unsuccessful
197
cicsppcgwylock Examples
1. To take the lock on the PPC Gateway server GATESERV1 and return error if it is not free, enter
cicsppcgwylock -t cicsppcgwylock -u /.:/cics/ppc/gateway/GATESERV1 /.:/cics/ppc/gateway/GATESERV1
198
The purpose of the cicsppcgwyshut command is to shut down an Encina PPC Gateway server.
Syntax
cicsppcgwyshut [-f] [-c] serverName cicsppcgwyshut -?
Description
v You must be logged in as a user who can run the stopsrc (on CICS for AIX) or cicsstop (on all other CICS for Open Systems platforms) command. v If you are using DCE authentication, you must be logged in to DCE. v CICS must be installed on the same machine as the PPC Gateway server. If CICS is not installed on the same machine as the PPC Gateway server, then refer to the Encina Administration Guide Volume 2: Server Administration manual for descriptions of alternative procedures. The cicsppcgwyshut command shuts down a PPC Gateway server for a CICS region. It also removes the lock on the server after a successful shutdown.
Options
-f -c forces a shutdown of the PPC Gateway server. cancels the SRC subsystem in which the PPC Gateway server is running.
serverName is the name of the PPC Gateway server. -? causes the usage message to be displayed.
Examples
To force a shutdown of the PPC Gateway server GATESERV1, enter
cicsppcgwyshut -f /.:/cics/ppc/gateway/GATESERV1
199
The cicsremovelv command removes a logical volume that was created by cicsmakelv.
Syntax
cicsremovelv -v volumeName cicsremovelv -?
Description
You must be logged on as a user who has administrative privileges The cicsremovelv command deletes a logical volume and removes the NT Registry information for the volume. This command destroys all data on the logical volume; the data cannot be recovered at a later time.
Options
-v volumeName species the name of the logical volume that is to be deleted.
Examples
1. To delete the logical volume known as sfs_Server1:
cicsremovelv -v sfs_Server1
200
Use this command to remove any lock les for a region left by a CICS process that terminated in an uncontrolled manner.
Syntax
cicsrlck [-f] { -a | -r regionName} cicsrlck -?
Description
The cicsrlock command removes any CICS lock les left by a CICS process that terminated in an uncontrolled manner. You must use this command with great care because the -a and -f ags enable you to override CICS locking mechanisms, allowing you to run multiple CICS processes in the same region. The cicsrlck command writes a message to the system log for each lock le that it removes.
Options
-f -a removes a single lock le from the region whose owning CICS process is still running. unconditionally removes the lock les from all regions. If the region or regions are still running, the locks are removed regardless of whether or not the -f ag is specied.
-r regionName species the region name when removing a single lock le. The cicsrlck command checks that regionName is valid. If regionName is invalid, cicsrlck writes an error message to standard error. If you do not specify a region name, CICS removes the lock les for the region specied by the CICSREGION environment variable. -? displays the usage message that shows the correct syntax for the cicsrlck command. If you enter the command syntax incorrectly, the correct usage is displayed.
Examples
1. To remove all CICS lock les:
cicsrlck -a
201
cicsrlck
cicsrlck -r REGIONB
202
The CICS SFS Diagnostic Tool (SDT) provides an interactive interface to the SFS.
Syntax
cicssdt [-s SFSname] [-i inputFile] [-o outputFile] [-e] [-r] [-c SDTcommands ...] cicssdt -?
Description
v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v You must have an active SFS. v If you are using DCE authentication you must have a DCE context that has sufficient authority to: Create a DCE principal and account. Create a Server Key Table. Usually this is a DCE cell administrator. v If you are not using DCE authentication, you must have the environment variable ENCINA_BINDING_FILE set.
Options
Note: Except for -c, which must be the last parameter, the parameters can be in any order. -s SFSname species the name of the SFS. For example, /.:/cics/sfs/SFS1. If this option is not specied, the server name in the environment variable CICS_XDT_SERVER is used. CICS_XDT_SERVER overrides CICS_SFS_SERVER. -i inputFile species a text le containing SDT commands to be read and executed. The le can be created either by hand or by using the -o option. Each line of the input le is treated as if it were typed in interactive mode. The text from the input le is also displayed as it is processed by cicssdt. Comments can be included in the le by starting a line with /*.
203
cicssdt
For example, if you create an input le called create.input that contains the following lines:
/* /* This is a sample file to create a SFS file called qsamTest /* create qsamTest b fl byteArray 10 f2 varLenByteArray 100 f1 y f1 a 1 quit
A new le called qsamTest is created on the specied SFS. -o outputFile causes commands entered in the SDT session to be written to the specied output le. This le can then be used as an input le using the -i option. -e requests SDT to terminate if an error occurs. If -e is specied and SDT is being driven from a shell script (-i) or the command line (-c), any error resulting from a command will exit SDT with a non-zero return code. activates SDT statistics. Statistics for SDT and SFS calls are sent to a le called sdt.stats in the current directory. This is useful for monitoring performance.
-r
-c SDTcommands ... species a list of commands and text to be used in the SDT session. This is useful for calling SDT commands from a shell script. This parameter must be used last. Using the SDT commands: To issue commands in SDT, pass them to SDT using the -i or -c option, or type the command at the command prompt. SDT accepts command abbreviations. In the command syntax the minimum abbreviation is shown in parentheses; for example, (s)etopen. Any command
204
cicssdt
that requires a le name will default to the last name used if nothing is given at the prompt. SDT also recognizes any environment variables used at the command prompt. SDT commands - setopen (s)etopen Denes the characteristics of any open calls used in other SDT commands. Non-transactional opens are used by default. If the open is transactional, SDT will manage the client transaction for you. This command also lets you dene the locking mode used during a read, (the default is no lock or a dirty read). If a value of zero is specied for the OFD operation timeout this effectively denes no timeout, such as wait forever. Error Isolation can only be inactive for transactional OFDs.
cicssdt -s SFSname -c setopen [Type In New Letter To Change Value. Just <ENTER> To Leave Asis ... [Access Mode - [S]hared/[E]xclusive - (SharedAccess): [Timeout For OFD Operations (In Seconds) - (60 ): [Consistency - [T]ransactional/[N]on-Trans - (Non-Transactional): t [Turn Error Isolation Off ? .............................. Y/[N]: y [Lock Mode - [R]ead/[W]rite/[B]racket/[N]one - (No Lock):
SDT commands - list (l)ist [(l)] searchString Lists all the les on the server that SDT is accessing. If the l option is used, additional information is given for each le. If SDT cannot open a le to obtain long information, processing continues with the next le. A search string can also be given to list specic les. If a search string is used, SDT will look for all the lenames that contain the string. There are no wild card characters, so the search string is taken as entered.
cicssdt -s SFSname -c li l AC1cics File Name ================== AC1cicsnlqfile AC1cicsnrectsqfil AC1cicsplqfile AC1cicsrectsqfile AC1cicstdqlgfile Organisation ===================== btreeClustered (KSDS) btreeClustered (KSDS) btreeClustered (KSDS) btreeClustered (KSDS) btreeClustered (KSDS) Primary Index No. Records =============== =========== cicsnlqidx (empty) cicsnrectsqidx (empty) cicsplqidx (empty) cicsrectsqidx (empty) cicstdqlgidx (empty)
SDT commands - create (c)reate leName Creates a new SFS le. All the le information is prompted for in turn. To aid usability and eliminate creation errors, SDT will make
Chapter 2. Resource denition commands and offline utilities
205
cicssdt
sure everything entered is valid and default to sensible values if nothing is entered. One exception is the record Field Name and index Field Name that use an empty entry to indicate there are no more elds. Also, some elds may not be able to determine a default entry and reprompt for input after displaying some help. If q! is entered at any prompt the create is cancelled.
cicssdt -s SFSname -c create qsamTest [SFS Server Volume Name .....: sfs_SFS_SERV [File Organisation [E/R/B] ..: B[treeClustered] [Field 01: Name .............: f1 [Field 01: Type .............: Error: Invalid field type. Type must be: unsignedInt16, signedInt16, unsignedInt32, signedInt32, unsignedInt64, signedInt64, float, double, string, nlsString, byteArray, varLenByteArray, shortVarLenByteArray, timestamp or decimal. [Field 01: Type .............: byteArray [Field 01: Size .............: 10 [Field 02: Name .............: f2 [Field 02: Type .............: varLenByteArray [Field 02: Size .............: 100 [Field 03: Name .............: [Maximum Number Of Records ..: SFS_NATURAL_RECORD_LIMIT [Primary Index Name .........: f1 [Is Index Unique ? [Y]/N ....: Y [Index Field 01: Field Name .: f1 [Index Field 01: Ordering ...: a[scending] [Index Field 02: Field Name .: [Number Of Pages To Allocate : 1
SDT commands - read (r)ead leName Reads records from a le on the SFS. Records can be read from the beginning of the le or from a specic key based on any active index. Records can also be read continuously or individually. When a key value is specied it is taken as a string unless it is in the format #n, where n is a numeric value. The following format can be used for a hexadecimal representation of the key:
0x0a01 ...
If the read is not continuous you have the option to delete or update each record read. If the record is to be updated the primary index cannot be changed. If nothing is entered for a eld during an update the eld is left unaltered, otherwise data entry is same as for the write
206
cicssdt
command. This command will not handle , nor will it handle reads using the Entry Sequence Number for sequential les. It will, however, handle alternate index reads, that is, reads using the SFS secondary index. The read command will only show up to 44 bytes of eld data and should therefore not be used to check the data integrity of records containing long elds. The stof command is more suitable for this.
cicssdt -s SFSname -c r qsamTest [Index To Use ...............: f1 [Read From Beginning ? [Y]/N : Y [Continuous Read ? Y/[N] ....: N [Read #00000001 [f1 ][........@@ ][000010] [Hex][01C3D7E2E2C4D4F14040 ] [f2 ][@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@.............][000126] [Hex][4040404040404040404040404040404040404040404040 ] [Read Another, Delete or Update ? [Y]/N/D/U n [1 Record(s) Read]
SDT commands - write (w)rite leName Writes records to a le on the SFS. Text or hexadecimal data can be entered in each eld; these cannot be mixed. Hexadecimal is entered in the following form:
0x010203 ...
If the eld is long and you need to enter a large amount of data, a shorthand method can be used. For example, to ll the remainder of a eld with 33 A characters enter
A>>32
or enter
0x20>>32
for 33 spaces. You must enter something in at least one of the elds in the record for SDT to write it; if all are left blank no record will be written. Partly lled xed-length elds are not automatically padded with spaces. If A>>32 would exceed the eld length the string A>>32 is taken literally. Automatic writes can be achieved by specifying #N followed
207
cicssdt
by the number of writes in an unsignedInt32 eld. For example, use #N10 to add 10 records automatically. If #N or #N0 is specied, writes will continue until an error occurs.
cicssdt -s SFSname -c w recover [skey1 [001 [srecord1 [Some text [Another ? [Y]/N n [1] Record(s) Added OK. ][ byteArray ][ byteArray ] [Size:00008] ] [Size:00042]
SDT commands - empty (e)mpty leName Empties a le of all committed records. SDT provides two types of record emptying; an exclusive empty and a shared empty. An exclusive empty will attempt to get exclusive access to the le to issue an empty call. If a shared empty is requested SDT will delete as many records as it can, leaving the ones that are locked. The exclusive empty is recommended as this guarantees an empty le.
cicssdt -s SFSname -c empty recover [Exclusive Empty ? [Y]/N ....: Y [Empty File "recover" ? Y/[N] y
SDT commands - delete (d)elete leName Deletes a le from the SFS. This command will time out and fail if the le is still in use.
cicssdt -s SFSname -c delete recover [Delete File "recover" ? Y/[N] y
SDT commands - free (fr)ee leName Destroys all the Open File Descriptors (OFDs) associated with a particular le. This command should only be used if the le is not in use. SDT will tell you the transaction identiers related to each OFD it destroys. The transaction identiers will not necessarily disappear with the OFD. Use tkadmin commands to check the status of the transaction identiers if the le still remains locked. For details of tkadmin commands, see the Encina Administration Guide Volume 1: Basic Administration.
208
cicssdt
cicssdt -s SFSname -c free recover [Are You Sure You Want To Close All OFDS On This File ? Y/[N] y [Closing All OFDs on File: recover... --------------------------------------------------------[OFD 00000307:(TIDS 03211413) ..... Closed. ---------------------------------------------------------
SDT commands - addindex (a)ddindex leName Adds a secondary index to the SFS le. Exclusive access is required for this command, so the le should not be in use. The secondary index will be added and made active automatically. Typing q! will cancel the command.
cicssdt -s SFSname -c a Angus [Filename ...................: [Secondary Index Name........: [Is Index Unique ? [Y]/N ....: [Alternate Rec. Spec. ? Y/[N]: [Index Field 01: Field Name .: [Index Field 01: Ordering ...: [Index Field 02: Field Name .: Angus index2 n N f2 d[escending]
SDT commands - delindex (deli)ndex leName Deletes a secondary index from the SFS le. Exclusive access is required for this command, so the le should not be in use.
cicssdt -s SFSname -c delindex Angus [Secondary Index Name........: index2
SDT commands - info (i)nfo leName Shows detailed information about the SFS le. This command will list all the active Open File Descriptors (OFDs) and locks held on the le. This is particularly useful to see if a le is still in use or has unresolved transactions using it.
cicssdt -s SFSname -c i Angus [Information For File: Angus ] ---------------------------------------------------------------[File Organisation ] btreeClustered (KSDS) [Primary Index Name ] f1 (Unique index) [Primary Index Field(s) ] f1 [Secondary Index Names ] (None Defined) [Number Of Records In File ] 4
209
cicssdt
[Number Of Fields Per Record] 2 [Field 001: f1 ][byteArray] [Size:10 ] [Field 002: f2 ][unsignedInt32] [Size: 4 ] ---------------------------------------------------------------[OFD: 0000052 DCE Owner: (Not defined) Access: Shared Mode] Type: Transactional TID: (n/a) RPC Count: 00000002 Isolation: Cursor Stability Op. Timeout: 60 (Secs) Open TID: 65669 Idle Timeout: 300 (Secs) Label: (null) Open Time: Tue Aug 23 11:16:52 1994 [OFD: 0000055 DCE Owner: (Not defined) Access: Shared Mode] Type: Transactional TID: 65681 RPC Count: 00000002 Isolation: Cursor Stability Op. Timeout: 60 (Secs) Open TID: 65649 Idle Timeout: 300 (Secs) Label: (null) Open Time: Tue Aug 23 11:17:26 1994 [Locks Held Against TID: 65681] Lock 01: File (Null Lock) Lock 02: Record Write Intent Lock Lock 03: Record Write Lock held on index f1 ----------------------------------------------------------------
SDT commands - server (ser)ver serverName Changes the current SDT server to the new one specied. The complete server name must be given. If the new server cannot be contacted the old server remains current.
cicssdt -s SFSname -c ser /.:/cics/sfs/jim [Contacting new server... (Server OK)]
SDT commands - qtos (qt)os QSAMleName Transfers and converts a QSAM le to an SFS le.
cicssdt -s SFSname -c qtos qsam [Default Code Pages: EBCDIC (IBM-037) -> ASCII (ISO8859-1) ... [Transferring Records. Record No.][00000022]
SDT commands - stof (st)of SFSleName Transfers an SFS le to a at le. The format of the at le can either be SDT format or Asis (the le is transferred byte by byte as it is). In SDT format the at le will start with a header containing information on the structure of the le, followed by a newline character and an eight-byte number. The number is the length of the record excluding the number itself. If the le is transferred Asis, no extra information is contained in the at le. A single record or a range of records can be
210
cicssdt
dumped. The record number corresponds to the position of the record using the primary index. To dump record 10, enter 10 at the [Dump Record(s) prompt. Type 10- to dump records from 10 onwards and type 10-12 to dump records 10 to 12 inclusive.
cicssdt -s SFSname -c stof Angus [Flat Filename ..............: Angus.sdt [Dump file Asis ? ..... Y/[N]: N [Dump Record(s) .............: ALL [File "Angus.sdt" Already Exists. Overwrite ? [N]/Y y [Dumping All Records] [Dumping Record #][00000010]
SDT commands - ftos (f)tos SFSleName Transfers a at le produced from the stof command to an SFS le. The SFS le must already exist, but does not have to be the le used to create the at le. In fact, ftos will transfer anything that will t into the specied SFS le. See the stof command for the expected at le format. If the SFS le does not exist and the at le is in SDT format, SDT will ask if you want the le to be created. If the at le is not in a recognised format produced using the stof command, ftos will read the at le as it is and will attempt to t the data into the SFS le.
cicssdt -s SFSname -c f Angus [Filename ...................: Angus [Flat Filename ..............: Angus.sdt [Loading Record #][00000010]
SDT commands - ! Escapes to a system command prompt. Exiting the command prompt returns control to SDT.
cicssdt -s SFSname -c ! [Exit To Shell. Use <Ctrl-D> To Return ..... ls q* (Open Systems) or dir q*.* /w (Windows NT) qsam qsam.dfh qsam.conv qsam.log qsam.def qsam.sdt.def |D
211
cicssdt
(q)uit Exits SDT and returns control to the calling process.
cicssdt -s SFSname -c q
SDT commands - help or ? (h)elp (or ?) commandName Gives general or specic online help for SDT commands.
cicssdt -s SFSname ? create
QSAM to SFS le transfer: The purpose of this section is to help you understand how to transfer QSAM les from a host system to a target system running a CICS for Open Systems product. When a le is sent directly to a target system, record boundaries are lost when it is received. By capturing the le on TSO or CMS in netdata format and sending it as a binary le to the target system using the File Transfer Program (ftp), the original netdata format is preserved. The cicsnetdata program is used to read the le and re-construct the output records with the count preceding each record, as expected by the cicssdt qtos command. If a le is in netdata format, you will nd that control records INMR01, INMR02, INMR03 precede the data, and INMR06 follows the data; these names are in EBCDIC. All input (control records and data) is segmented. The rst byte of a segment contains the segment length, including itself. The second byte of the segment contains a ag byte. The ag settings are:
0x80 first segment 0x40 last segment 0x20 segment is part of a control record
To transmit a le from TSO: 1. Enter: transmit (nodeName/userId) DSN (data.le) OUTDSN(data.NETDATA) SEQ TRANSMIT can be abbreviated to XMIT. nodeName/userId is required syntactically. Although it is not used when transmitting to a le, it is validated, so specify a known node and userid. DSN names the input to XMIT. OUTDSN names the output netdata le. The type NETDATA is suggested. If the input was a PDS member, then SEQ is required, or the le will not be usable on the target system. The name of utility function must be INMCOPY for correct results (see sample messages below). 2. Enter: ftp systemName
212
cicssdt
where systemName is the name of the target system. Enter userid and password when prompted. 3. Enter: cd directoryName to change to the target directory if necessary. 4. Enter: binary to set the transmission type to I (image). 5. Enter: put data.NETDATA The target le name can also be specied, if different from the source. Make a note of the byte count, which should be the same for the le on the target system. The target system keeps the name in lower case, even though it was upper case in TSO. To transmit a le from CMS: 1. Enter: sendle dataFile TO * to send the le to your reader in netdata format. Do not receive it because receive will decode the netdata. Use CP commands to order it and change its class to suit the reader. Dene a temporary disk if the le is large. 2. Enter: read data NETDATA A to read the le and preserve the netdata format. 3. Enter: ftp systemName where systemName is the name of the target system. Enter userid and password when prompted. 4. Enter: cd directoryName to change to the target directory if necessary. 5. Enter: binary to set the transmission type to I (image). 6. Enter: put data.NETDATA The target le name can also be specied, if different from the source. Make a note of the byte count, which should be the same for the le on the target system. The target system keeps the name in lower case, even though it was upper case in CMS. To run the cicsnetdata program: cicsnetdata < data.netdata > outputle Messages are sent to the operating system le stream stderr. Messages from a sample run of cicsnetdata (origin CMS):
213
cicssdt
... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... control record: INMR01 logical record length origin node name origin userid BAILEYM target node name target userid * origin time stamp no of files 1 control record: INMR02 file number 1 file size in bytes file organisation logical record length name of utility function record format 8000 name of the file filemode number0 last change date control record: INMR03 file size in bytes file organisation logical record length record format 0001 control record: INMR06 22 input records 4 control records 18 output records 80 WINVMB WINVMB 19931029164640000000
Denition les used by qtos: In addition to the QSAM data le produced by the cicsnetdata program there must be two other denition les for a successful conversion: v QSAMlename.sdt.def This le must be in the same directory as the QSAM data le. It contains the key and data information about each QSAM record. The sample le qsam.sdt.def, describes what each tag means. A sample data le can be found in prodDir/src/examples/sdt. v QSAMlename.dfh This le must also be in the same directory as the QSAM data le and is the DFHCNV template source for the QSAM records. SDT will not validate this le so it is recommended that the le is checked using the cicscvt program rst. SDT only understands the source, not the compiled output from cicscvt. The sample le qsam.dfh shows a typical template. To run qtos: A sample QSAM data le qsam.netdata has been provided to demonstrate QSAM to SFS conversion using the qtos command. The following describes the steps necessary to convert this example:
214
cicssdt
1. Convert qsam.netdata to SDT-readable format using the cicsnetdata program as follows:
cicsnetdata < qsam.netdata > qsam
to produce a le called qsam in the current directory. 2. Create a suitable SFS le to receive the QSAM records. For this example, enter
cicssdt -s SFSname -c create qsamTest
3. Make sure you have the following les in a directory you can write to:
qsam qsam.dfh qsam.sdt.def
The default code pages for conversion are dened at the top of the le qsam.dfh; these may have to be changed, depending on your operating system. 4. Run cicssdt so that it is working with the server which has qsamTest on it. Enter
cicssdt -s SFSname -c qtos qsam
The le qsam must be in the current directory. SDT will show a running count of the records being transferred. If an error occurs the le must be emptied before it is reloaded, unless the setopen command has been previously used to give a transactional load. 5. When the command has nished the SDT prompt should reappear and a log le will have been created in the current directory. The le will be called qsam.sdt.log in this example. Check this log le to make sure SDT picked up all the record types and there were no conversion errors.
215
If you are using DCE authentication the command cicssetupclients is used to congure a DCE client for a CICS client or region. On CICS for AIX only, it is also used to install the AIX kernel extensions used by the CICS terminal emulator. You must run this command once for each host before you run a terminal or region. You may also need to use this command if you add or change a network card in your client machine since the card number is used to generate the principal name for the client.
Syntax
cicssetupclients [-I] [-v] [-m] [-d] cicssetupclients -?
Description
v You must be logged in as a user with root or administrator privileges. v You must be authenticated as a DCE principal with authority to create other principals (cell_admin, for example). If you are using DCE authentication use this command to congure a DCE client for a CICS client.This command creates a keytab le containing the clients principal and account. The keytab le is placed in the directory /var/cics_clients. Run this command on all hosts which will run CICS clients or regions. On CICS for AIX only, use this command to install the AIX kernel extensions used by the CICS terminal emulator. If you are not using DCE authentication and you are not running CICS for AIX you do not need to use this command at all.
Options
-I -v -m (Uppercase letter i) Ignores errors. gives a detailed output while the command runs. installs the kernel extensions on CICS for AIX only without conguring DCE.
216
cicssetupclients
-d -? congures DCE but does not install the kernel extensions on CICS for AIX only. displays the usage message.
Examples
To congure DCE for a newly installed CICS client, rst log in as root or administrator and authenticate your DCE principal, then enter:
cicssetupclients
217
Creates directories and groups for CICS within DCEs Cell Directory Service.
Syntax
cicssetupdce [-v] [-C | -I [-a | -o]]
Description
cicssetupdce adds the following directories and groups to DCEs Cell Directory Service. The directories will eventually contain entries for SFS and regions: Directories: /.:/cics CDS directory /.:/cics/ppc CDS directory /.:/cics/ppc/gateway CDS directory /.:/cics/trpc CDS directory /.:/cics/tmxa CDS directory /.:/cics/prole CDS prole /.:/cics/sfs CDS directory Groups: cics_users contains principals for CICS processes cics_admin contains principals for CICS administrators cics_sfs contains principals for SFS cics_ppcgwy contains principals for PPC group
218
cicssetupdce
cics_regions contains principals for CICS regions You need to run cicssetupdce only once per DCE cell, during the conguration of a newly installed CICS system. To run it, you must be authenticated as a DCE principal (such as cell_admin) with sufficient privileges to create or view a DCE group, directory or object and to set the necessary Access Control Lists (ACLs). ACLs control the security of directories. Use cicssetupdce to set the ACLs for each newly created directory so that the members of the appropriate group, the principal that is executing the command, the CDS groups subsys/dce/cds-admin and subsys/dce/cds-server have access to the directory and its objects. Members of the other groups are granted more restrictive access to these directories based on their needs. cicssetupdce also sets the initial container and initial object ACLs. cicssetupdce rst searches to see if the groups and directories it is about to create currently exist. If you specify the -l ag when you invoke cicssetupdce, it overwrites any existing groups or directories with new ones. You can use the -a or -o option to control how cicssetupdce changes the ACLs of existing directories or groups. If neither of these ags is specied, then the ACLs for pre-existing directories are left unchanged because to alter these ACLs may compromise security. If the -l ag wasnt used, cicssetupdce stops with an error code when it encounters a pre-existing group or directory. Note: Make sure that your /etc/hosts le contains a valid host name and that its permissions are set correctly.
Options
-I (Uppercase i) Ignores error messages about pre-existing entries. Error messages are changed to warning messages and cicssetupdce continues, overwriting existing directories and groups with new ones. Use this ag if a DCE cell has already been partially pre-congured, possibly by a previous invocation of the command that was interrupted. ACLs dening how the groups access the CDS directories are added to the ACLs for the existing CDS directories. ACLs dening how any other principals or groups access these directories are not changed. If you use this option, check that the resulting ACLs meet your security needs. Use this with the -l ag ACLs dening how the groups access the CDS directories override the ACLs for the existing CDS directories. Any pre-existing ACLs for other principals or groups are removed. This ag can be used only in
-a
-o
219
cicssetupdce
a cell whose CDS server principals are members of group subsys/dce/cds-server. Use this with the -l ag. -C removes any existing CICS groups and CDS directories prior to recreating them. Accounts that are members of these groups are also deleted. Using this ag is equivalent to executing cicscleandce before running cicssetupdce. Use this parameter only if you know that none of the entities selected for removal are required. gives a detailed output while the command runs.
-v
Examples
1. If you want to permit access to CICS directories by CICS groups without revoking other groups access, enter:
cicssetupdce -I -a
This creates the required groups and directories. If pre-existing directories are discovered, cicssetupdce adds to their ACLs, the ACLs dening the access privileges for the CICS groups. 2. If you want cicssetupdce to display what it is doing while it creates the required groups and directories and to fail if it discovers pre-existing groups or directories, enter:
cicssetupdce -v
Because you have not specied the -l ag, cicssetupdce stops with an error code if it discovers a pre-existing group or directory.
220
To extract data from a statistics le or les that CICS creates as part of a CICS statistics sequence.
Syntax
cicssfmt [-c categoryNames] [-s startTime] [-e endTime] [-l pageLength] [-w pageWidth] [-h] [-i] leName1 ... leNamen cicssfmt [-?]
Description
cicssfmt formats the CICS statistics data into a form that can easily be written to operating system standard output. cicssfmt is requested from the operating system shell, and can be replaced with your own customized version. This information describes the version delivered with CICS and this may not correspond to the version running on your system. If you specify too few or too many parameters, or enter the -? option, cicssfmt sends some explanatory text on how to use the command to the operating system standard error output. If the named statistics le does not exist, cicssfmt outputs an error to the standard error output. If the named statistics le exists, cicssfmt formats all statistics records to standard output. cicssfmt is a sample program generated from the source le cicssfmt.c. It can be built with the sample makele in the directory prodDir/src/samples/sfmt using the command make -e -f Makele (on Open Systems) or nmake -e -f Makele (on Windows NT). If you want to replace cicssfmt with your own program, you must change the sample makele accordingly. The following les make up the statistics data formatter:
Table 4. Statistics data formatter les
File prodDir/bin/cicssfmt (CICS on Open Systems) or prodDir/bin/cicssfmt.exe (CICS for Windows NT) Type executable Contents The executable statistics formatter program
221
cicssfmt
Table 4. Statistics data formatter les (continued)
File Type Contents Sample statistics formatter program source
Sample makele that builds and installs the statistics formatter Library containing the functions for reading and processing a statistics data le Denitions used by the sample statistics formatter English messages used by the sample statistics formatter Message catalog for cicssfmt produced by gencat. Only required by formatter programs compiled with CICS release 2.1.1 or earlier.
prodDir/lib/libcicssfmtsa.a (CICS on Open Systems), prodDir/lib/libcicssfmtsa.lib (CICS for Windows NT) prodDir/include/cicssfmt.h prodDir/include/cicssfmt_msg.h
object library
include include
/msg/en_US.iso8859/cicssfmt.cat (CICS for HP-UX) prodDir/msg/en_US/cicssfmt.cat (CICS for AIX and Solaris)
message text
Options
-c categoryNames species a comma-separated list of categories to be formatted. If the -c option is not specied, all categories are formatted. The categories are as follows: DUMP Dump statistics FILE File statistics
ISCM Intersystem Communication Management statistics JOUR Journal statistics LUWM Logical Unit of Work Management statistics PROG Program statistics RTDB Runtime Database statistics STOR Region Storage statistics
222
cicssfmt
STOT Task Storage statistics TASK Task statistics TERM Terminal statistics TDQU Transient Data Queue statistics (summary statistics only) TRAN Transaction statistics TSQU Temporary Storage Queue statistics (summary statistics only) Note: CICS does not collect summary statistics for the TRAN category. However, it does collect details, so to obtain transaction statistics, you must specify the TRAN category with the -i option. -s startTime species the start time for the report to be produced. You should specify the time in the format yymmddhhmmss. The default starting time is the timestamp on the rst record in the le. -e endTime species the end time for the report to be produced. You should specify the time in the format yymmddhhmmss. The default ending time is the timestamp on the last record in the le. -l pageLength species the length, in lines, of each page of the report. The default value is 24 lines on each page. -w pageWidth species the width, in columns, of each page of the report. The default value is 80 columns. -h -i suppresses the printing of page headers. The default is to print page headers. indicates that detailed statistics are required. The default is to produce summary statistics.
leName1 ... leNamen species the les containing the CICS-generated statistics. -? causes the usage message to be displayed. cicssfmt also displays the usage message if you enter the command syntax incorrectly.
Examples
1. To list statistics le shut001:
cicssfmt shut001
223
cicssfmt
2. To list transaction interval statistics produced from 9 a.m. on January 1st, 1995 onwards, from le shut001 with no page headers:
cicssfmt -c TRAN -s 950101090000 -h -i shut001
3. To list le summary statistics produced up to 6 p.m. on January 1st, 1995, from le shut001 with no page headers:
cicssfmt -c FILE -e 950101180000 -h shut001
224
Syntax
Syntax (CICS on Open Systems) cicssfs [serverName] [attributeName=attributeValue ... ] [-a] [-I] [-t component:traceMask [:component:traceMask] ... ] [[-T traceClass [=traceClass ... ] = [modier,modier]outputClass:destination]...] [-v] cicssfs -?
Syntax (CICS for Windows NT) cicssfs [serverName] [attributeName=attributeValue ... ] [-a|-nlv] [-I] [-t component:traceMask [:component:traceMask] ... ] [[-T traceClass [=traceClass ... ] = [modier,modier]outputClass:destination]...] [-v] cicssfs -?
Description
v You must create the following logical volumes for the SFS: The logical volume used for journal data written by the SFS, as specied by the LogVolume attribute for the SFS. The default is log_shortName, where shortName is the server short name. The logical volume used for the SFS le data, as specied by the DataVolume attribute for the SFS. The default is sfs_shortName, where shortName is the server short name. v When an SFS is created with the cicssfscreate command an operating system userid is associated with the server. This userid must have read and write access to the logical volumes and associated raw devices. v You must be logged on to a userid with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v If you are using DCE authentication you must have a DCE context that has the authority to read and test the Cell Directory Service (CDS) directory where the CDS object representing the SFS will be created, and to read the object itself.
Chapter 2. Resource denition commands and offline utilities
225
cicssfs
For example, to start a server named /.:/cics/sfs/SFSserver1, you need read and test permission for directory /.:/cics/sfs, and you need read permission for /.:/cics/sfs/SFSserver1. Usually, you must be a DCE cell administrator or a member of the DCE group cics_users. v If you are not using DCE servers, an entry must be added to /var/cics_servers/server_bindings after running cicssfscreate. v If you are restarting the SFS because your machine crashed or terminated abnormally, the lock le of the server might not be cleaned up. You must use the cicssfslock command to remove the lock le, which is:
/var/cics_servers/SSD/cics/sfs/modifiedCDSname/lock
Refer to cicssfslock - Release an SFS lock le on page 237 for more information. The command cicssfs starts an SFS that CICS uses and waits for it to initialize before returning. You run cicssfs from the operating system command line. The output of the SFS is directed to the le whose path is constructed from the Cell Directory Service (CDS) name of the server. CICS removes the /.: or /... from the front of this name, and substitutes the modied CDS name into:
/var/cics_servers/SSD/cics/sfs/modifiedCDSname/msg
If you are warm starting the SFS, the restart string is held in the same directory as the output le of the server, for example:
/var/cics_servers/SSD/cics/sfs/modifiedCDSname/res
You can specify the type of start that you require by specifying the attribute value StartType=cold, or StartType=auto. If you do not specify the start type, the SFS is started as if StartType=auto had been used. The -t and -T options are provided to allow the SFS to be traced using the Encina trace facilities. It is expected that these options will only be used under the direction of your support organization, so they are not documented here in detail. For more information about problem determination for SNA products see the relevant SNA booklet: v Using IBM Communications Server for AIX with CICS v Using IBM Communications Server for Windows NT with CICS v Using Microsoft SNA Server with CICS v Using SNAP-IX for Solaris with CICS v Using HP-UX SNAplus2 with CICS
226
cicssfs Options
serverName is the name of the SFS to be started.If the server is being cold-started the name of the server must be specied. If the server is not being cold-started and the name of the server is not specied, then the name of the sever is obtained from the environment variable CICS_SFS_SERVER. attributeName=attributeValue is the value or values that override those in the CICS permanent database for the server. -a starts the SFS in administrative mode. You cannot cold start an SFS in administrative mode, so this ag is ignored for a cold start.
-nlv (CICS for Windows NT only) starts the SFS in administrative mode and with no logical volumes. This can be used when logical volumes need to be extended after lling up. -I -t ... -T ... -v -? 0 causes errors to be ignored. species Encina trace masks. species Encina trace output classes. -T can be used more than once. requests verbose output. is the ag which produces the usage message. SFS started.
Additional information is contained in the CICS Administration Guide and the CICS Administration Guide.
227
Syntax
cicssfsconf [-I] [-q] wc regionName cicssfsconf [-I] [-q] {ra | na | lr | pr | nr | lqp | lqu} regionName [attributeName=attributeValue ... ] cicssfsconf [-I] [-q] -R wc regionName DefaultFileServer=serverName cicssfsconf -?
Description
The SFS must be running. You must be logged in as root or administrator on the machine that is running the region. The command cicssfsconf congures the SFS to meet the CICS region requirements. You run cicssfsconf from the operating system command line. If the region is not using DCE servers the cicssfsconf command will assume that the SFS is also not using DCE servers and that the SFS will be found on one of the machines specied by the environment variable CICS_HOSTS. Note: You can congure all queues (this is the default) at a time for each use of cicssfsconf or, if only one queue is specied, only that queue is congured.
Options
-I -q wc causes non-critical errors to be ignored. is used to request quiet processing. If -q is specied, no information messages will be displayed. congures the SFS without changing any Region Denition values.
regionName species the name of the CICS region for which you are conguring the SFS.
228
cicssfsconf
ra na lr pr nr lqp lqu congures the SFS for recoverable auxiliary TS queues. congures the SFS for non-recoverable auxiliary TS queues. congures the SFS for logically recoverable TD queues. congures the SFS for physically recoverable TD queues. congures the SFS for non-recoverable TD queues. congures the SFS for locally-queued protected STARTs. congures the SFS for locally-queued unprotected STARTs.
attributeName=attributeValue ... specify attribute names and values to override those in the Region Denitions (RD). -R (CICS for AIX and CICS for Solaris only) resets the region to use Structured File Server (SFS) instead of DB2. DefaultFileServer=serverName species the name of the Structured File Server (SFS) to be used. The name of the server will be stored in the DefaultFileServer attribute in the Region Denitions (RD). -? causes the usage message to be displayed.
Returned Values
0 SFS congured non-zero Unsuccessful attempt to congure SFS.
Examples
1. To congure the SFS for REGION1 without changing any attributes of the Region Denition:
cicssfsconf wc REGION1
2. To congure the SFS for REGION1 for recoverable auxiliary TS queues, logically recoverable TD queues, and protected STARTs:
cicssfsconf ra REGION1 cicssfsconf lr REGION1 cicssfsconf lqp REGION1
3. To congure the SFS for REGION1 and change the maximum number of records that can be held in LocalQFile to 500000:
cicssfsconf lqu REGION1 LocalQMaxRecs=500000
4. To reset region REGION2 to work with Structured File Server (SFS), using server SERVER1:
cicssfsconf -R wc REGION2 DefaultFileServer=/.:/cics/sfs/SERVER1
229
Syntax
cicssfscreate [-v] [-I] [-S] [-m modelName] serverName [attributeName=attributeValue ... ] cicssfscreate -? v You must be logged in as a user with root or administrator privileges. v You must create a user for the SFS, specifying its home directory as
/var/cics_servers/SSD/cics/sfs/ServerName
and setting its primary group as cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). For example, on CICS for AIX:
mkuser pgrp=cics home=/var/cics_servers/SSD/cics/sfs/ServerName Userid
The SFS userid must have permission to read and write the SFS logical volumes and their associated raw devices. Either make the SFS userid the owner of the volumes, or add the SFS userid to the group that can read and write the volumes, so that volumes can be shared. The user for the SFS must be set up as a local user on the machine. The user denitions must not come from the Network Information Service (NIS). v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v You must have a DCE context that has sufficient authority to: Create a DCE principal and account. Create a Server Key Table. Usually, you must be a DCE cell administrator. The command cicssfscreate creates an SFS and the data necessary to allow CICS to use it. You run cicssfscreate from the operating system command line. cicssfscreate adds: v An SFS into the CICS server database.
230
cicssfscreate
v Its entry for the operating system mechanism which is used to start and stop long running processes. v If you are using DCE authentication, its DCE principal, its DCE account and its DCE keytab entry. You must set the ShortName attribute override to a unique ShortName within all SFS that CICS uses in this DCE cell. On CICS for AIX you can get a list of all the current SFS ShortNames used by CICS by entering the following shell commands:
for i in cicsget -c ssd -l | cut -d' ' -f1 do cicsget -c ssd $i | grep ShortName done
You must set the UserID attribute in the SSD to the userid for the SFS. If you are not using DCE servers you must add an entry to /var/cics_servers/server_bindings after running cicssfscreate. Note: cicssfscreate cannot be used to create an SFS on a remote machine. You must create the remote SFS while logged on to the remote machine.
Options
-v -I -S produces verbose informational output. continues processing on non-critical errors causes the SFS to be created without using DCE servers.
-m modelName species the name of the SFS to model this server on. If you do not specify a name, the server is modeled on the default SSD entry. serverName species the name of the SFS, SSD key, to be created. attributeName=attributeValue ... specify attribute names and values to override those in the model or default server. -? produces the usage message.
Returned Values
0 SFS created. non-zero Unsuccessful attempt to create SFS.
231
cicssfscreate Examples
To create an SFS named SERVER1, with a ShortName of SERVER1 and an SFS userid of SFSSERVER:
cicssfscreate /.:/cics/sfs/SERVER1 ShortName=SERVER1 UserID=SFSSERVER
232
Syntax
cicssfsdestroy [-v] [-S][-I]serverName cicssfsdestroy -? v Ensure that the SFS is not running before you destroy it. v You must be logged in as a user with root or administrator privileges. v If you are using DCE authentication you must have a DCE context that has sufficient authority to: Delete a DCE principal and account. Delete a Server Key Table. Normally you must be a DCE cell administrator. v You must also destroy the logical volumes of the SFS separately using operating system facilities. (You can do this before or after you destroy the SFS.) The command cicssfsdestroy destroys an SFS that CICS uses. You run cicssfsdestroy from the command line. cicssfsdestroy deletes: v An SFS from the CICS server database. v Its entry in the operating system mechanism used for starting and stopping long running processes. v If you are using DCE authentication, its DCE principal, its DCE account, and its DCE keytab entry. On Windows NT use the home directory of the SFS userid, if you have the authority to do so. The output of the SFS is directed to the le whose path is constructed from the CDS name of the server. CICS removes the /.: or /... from the front of this name, and substitutes the modied CDS name into:
/var/cics_servers/SSD/cics/sfs/modifiedCDSname/msg
233
cicssfscreate
After you have run cicssfsdestroy, it is useful to also carry out the following operations: v Remove the operating system user id specied by the UserID attribute in the SSD. (Use the operating system to do this.) v Remove the SFS directory:
/var/cics_servers/SSD/cics/sfs/serverName
v Remove the logical volume specied in the DataVolume attribute in the SSD. (Use the operating system to do this.) v If you are using DCE authentication, reauthenticate the DCE tickets for any dce_login contexts that have accessed the server, either by logging in to the DCE again or by using the DCE command kinit. This will remove any cached tickets for the old server, and so avoid problems if a new SFS is created using the same name as the one just destroyed.
Options
-v -S -I produces verbose informational output. causes the SFS to be destroyed without using DCE servers. causes errors to be ignored.
serverName is the name of the SFS to be destroyed. -? is the ag that produces the usage message.
Note: cicssfsdestroy cannot be used to destroy an SFS on a remote machine. You must destroy the remote SFS on the remote machine itself.
Returned Values
0 SFS destroyed. non-zero Unsuccessful attempt to destroy SFS.
Examples
To destroy an SFS SERVER1:
cicssfsdestroy /.:/cics/sfs/SERVER1
The CICS Administration Guide and the Planning and Installation Guide contain additional information.
234
You use this command to build an SFSs metadata using one or more entries in a schema le.
Syntax
cicssfsimport -i schemaFileName -s serverName [-I] [-f leName] [[-x indexName] ... ]
Description
v You must be logged in as a user with root or administrator privileges. v The userid must have read/write permission for the schema le as dened explicitly by the le permissions. v You must have sufficient privileges to create SFS les (CICS on Open Systems). You must be a member of the group cicsgroup (CICS for Windows NT). v If you are using DCE authentication you must be logged in to DCE. v You must create logical volumes of the same name as those referenced in the schema le before you use cicssfsimport. v The userid that the SFS runs under must have read and write access to these volumes and their raw devices. v If the SFS has been set up to accept only authenticated RPCs, then to apply a Schema File Denitions (SCD) to SFS, you need to be a member of the group cics_admin. The cicssfsimport command creates one or more les on an SFS. It builds the SFSs metadata using one or more entries in a Schema File Denitions (SCD). The server does not need to be present in the Structured File Server Denitions (SSD), so you can build arbitrary SFSs without the overhead of entering their details into the system. All the les are created before secondary indexes are created. A le that is named in the list must exist at index creation time. If a le or index named in the lists does not exist in the schema le, there will be a warning message, but the import continues.
235
cicssfsimport Options
-i schemaFileName is the relative or absolute path to the schema le. The relative path is in relation to the working directory. -I is a ag to force the command to ignore errors. This is useful if a previous cicssfsimport did not complete, for example after a machine crash, but some les have been created. If the -I ag is set, you can run cicssfsimport again, and any le exists errors generated are ignored.
-s serverName is the Cell Directory Service (CDS) name of the SFS on which the les and indexes are to be built. -f leName is a le from the schema to be created. To specify a list of les, specify each le with a separate -f ag. If you do not specify the -f option, then all les and indexes in the named schema le are created. If you specify the -f option, but do not specify a -x option, then all the indexes for that le are created. -x indexName species an index from the preceding le to add. To specify a list of indexes, specify each index with a separate -x ag. If a set of indexes associated with a le does not include the primary index, a primary index is created. If you specify the -f option, but do not specify a -x option, then all the indexes for that le are created.
Examples
1. To create two les, FILE1 and FILE2 on a server SERVER1, using the entries from schema le SCHEMA1. FILE1 has indexes INDEX1, INDEX2, and INDEX3, and FILE2 has indexes INDEX4 and INDEX5:
cicssfsimport -i SCHEMA1 -s /.:/cics/sfs/SERVER1 -f FILE1 \ -x INDEX1 -x INDEX2 -x INDEX3 -f FILE2 -x INDEX4 -x INDEX5
2. To create a le FILE3 and all its indexes on a server SERVER1, using the entries from schema le SCHEMA1:
cicssfsimport -i SCHEMA1 -s /.:/cics/sfs/SERVER1 -f FILE3
3. To create all les and indexes from a schema le SCHEMA2 on SERVER1, ignoring errors:
cicssfsimport -i SCHEMA2 -s /.:/cics/sfs/SERVER1 -I
236
Use this command to release an SFS lock le that may have been left when an SFS terminated in an uncontrolled manner.
Syntax
cicssfslock {-l | -u | -t} serverName cicssfslock -?
Description
cicssfslock takes or releases a lock for a particular SFS. The lock is used to serialize the create, start, stop and destroy phases of an SFS. The lock le is in:
/var/cics_servers/SSD/cics/sfs/serverName/lock
Options
-l -u -t cicssfslock to wait until the SFS that owns the lock le is no longer running and then takes the lock. causes the lock le for the SFS to be released unconditionally. cicssfslock to try to take the lock le but to return immediately if it is unsuccessful.
serverName species the name of the SFS. -? causes the usage message to be displayed. cicssfslock also displays the usage message if you enter the command incorrectly.
Returned Values
0 1 Successful Unsuccessful
Examples
To release the lock for SFS sfs_SFS_SERV:
cicssfslock -u /.:/cics/sfs/sfs_SFS_SERV
237
You use this command to shut down an SFS that CICS uses.
Syntax
cicssfsshut [-f] [-c] serverName cicssfsshut -?
Description
v You must be logged in as a user with root or administrator privileges. v You must be a member of the group cics (CICS on Open Systems) or cicsgroup (CICS for Windows NT). v If you are using DCE authentication you must have a DCE context that has the authority to read and test the Cell Directory Service (CDS) directory containing the CDS object representing the SFS, and to read the object itself. For example, to shut down the server named /.:/cics/sfs/sfs_SFS_SERV, you need read and test permission on the directory /.:/cics/sfs, and you need read permission for directory . Usually, you must be a DCE cell administrator or a member of the DCE group cics_users. v If the SFS is not using DCE authentication (that is, if NameService=none in the SSD) you must not be logged into DCE. The command cicssfsshut shuts down an SFS that CICS uses. You run cicssfsshut from the operating system command line. The output of the SFS is directed to the le whose path is constructed from the Cell Directory Service (CDS) name of the server. CICS removes the /.: or /... from the front of this name, and substitutes the modied CDS name into:
/var/cics_servers/SSD/modifiedCDSname/msg
Returned Values
-f -c forces an abnormal shutdown of an SFS. Do not use this ag unless you cannot shut the SFS down without it. Cancel the SRC subsystem in which the SFS is running. Do not use this ag unless you need to terminate the server abnormally.
238
cicssfsshut
serverName is the name of the SFS to shut down. -? is the ag that produces the usage message.
Returned Values
0 SFS is shut down. non-zero Unsuccessful attempt to shut down SFS.
Examples
To shut down an SFS SERVER1:
cicssfsshut /.:/cics/sfs/SERVER1
239
Syntax
cicsstart [-c] [-a] [-o attributeName=attributeValue ... ] [regionName]
Description
You must be logged on as a user with root or administrator privileges. The cicsstart command causes a CICS region to start. Once CICS successfully starts and runs post-initialization programs, CICS allows transaction processing. It fails if the region is locked, in which case cicsstop should be used to ensure that the region is shutdown. By default cicsstart performs an AUTO start of cics. This normally involves clearing SFS. You can run the cicsstart command directly from the command line. You can override multiple RD parameters on the same command line. To make permanent changes to the RD, use the CICS resource management commands. For more information, see the CICS Administration Guide.
Options
-c -a -o forces cicsstart to perform a cold start of CICS. forces cicsstart to perform an automatic start of CICS. is used to override Region Denitions (RD) for this region startup.
attributeName=attributeValue is an attribute and its value to be used in this startup. Multiple attributeName=attributeValue pairs can be specied in the -o option. Use double quotes to delimit values containing spaces.
240
cicsstart
regionName is the name of the region to be started. If you do not specify a region name, CICS starts the region specied by the environment variable CICSREGION.
Examples
To cold start the region named REGION1:
cicsstart -c REGION1
241
Syntax
cicsstop [-f] [-k] [regionName]
Description
You must be logged on as a user with root or administrator privileges. The cicsstop command shuts down a CICS region. A normal shutdown (without the -f or -k options) completes all current processing and releases resources before shutting the region down. If the -f (force) option is used, cicsstop releases the resources, but does not wait for processes to stop before shutting down the region. If the -k (kill) option is used, cicsstop does not attempt to release resources, nor does it wait for processes to complete before shutting down the region. You can run the cicsstop command directly from the command line.
Options
-f -k forces cicsstop to shut the region down after releasing resources. forces cicsstop to shut the region down immediately, killing all CICS processes, removing lock les, and cleaning up shared memory.
regionName species the name of the region to be stopped. If you do not specify a region name, CICS stops the region specied by the CICSREGION environment variable.
Examples
To shut down the region named REGION1 immediately:
cicsstop -k REGION1
For more information about the shutdown process, see the CICS Administration Guide.
242
Use this command to display the console.nnnnnn and CSMT.out les for a specied CICS region, or to display a user-specied le.
Syntax
cicstail [-r regionName] | [-f leName] [-b numBytes] cicstail -?
Description
The cicstail command displays the current console.nnnnnn and CSMT.out le for a CICS region and displays new lines as they are added to these les. Alternatively, if the name of a le is specied, the output displays that le and any new lines that are added to the le. New lines are displayed as they are added to the le or les until the command is interrupted when CTRL-C is pressed.
Options
-r regionName species the name of the CICS region whose les are to be displayed. The cicstail command displays the contents of the regions console.nnnnnn and CSMT.out les in a single output stream. If neither the -r or -f options are specied, cicstail displays the les for the region whose name is set in the environment variable CICSREGION. -f leName (CICS for Windows NT only) species the name of a le to be displayed. The name can be absolute or relative to the current directory. -b numBytes (CICS for Windows NT only) species that the display of the le (or les) start numBytes before the end of the le. If the -b option is omitted, the display starts 2,000 bytes before the end of the le. -? causes the usage message to be displayed.
Examples
1. To display les for the region REGION1:
cicstail -r REGION1
243
cicstail
2. To display the le \tmp\file1:
cicstail -f c:\tmp\file1
244
cicstcpnetname displays the 1-8 character NETNAME which is used by a CICS region on a CICS family TCP/IP connection. This NETNAME is derived from the Internet Protocol (IP) address and port used by the region.
Syntax
cicstcpnetname -a [ IPaddress | hostName] -p portNumber cicstcpnetname -?
Description
This command displays the NETNAME (Logical Unit (LU) name) for a CICS region using CICS family TCP/IP connections. A CICS regions NETNAME used for these types of connections is derived from the Internet Protocol (IP) address and port on which the CICS region is listening for connection requests.
Options
-a [ IPaddress | hostName ] species the name or address of the network adapter used by the region to accept CICS family TCP/IP connections. The address can be in one of the following forms: v The Internet Protocol (IP) address in dotted decimal notation. For example, 1.23.45.67. v The IP address in dotted hexadecimal notation. For example 0x01.0x17.0x2D.0x43. v The host name dened in the Internet name service. For example aix5.cicsland.com. -p portNumber species the Internet port number used by the region to accept CICS family TCP/IP connections. -? causes the usage message to be displayed.
Returned Values
0 NETNAME returned non-zero Unable to convert the value passed on the -a ag into an Internet Protocol (IP) address.
Chapter 2. Resource denition commands and offline utilities
245
cicstcpnetname Examples
1. To print the NETNAME for network adapter 1.23.45.67 on port 1435:
cicstcpnetname -a 1.23.45.67 -p 1435
246
Syntax
cicsteld [-r regionName] [-p principalName] [-P portNumber] [-l locale] [-e emulation] [-t initialTransaction] [-c clientCodePage] [-s serverCodePage] [-n netName] [-k keytabFile][-h hostList] [-v] cicsteld -?
Description
You must have run cicssetupclients if you are using DCE authentication. You can run the cicsteld command either as a normal operating system process, or as a child of the inetd daemon that is supplied by the operating system. If you want to register more than ve parameters (including the program name) with inetd, create an operating system shell script or command le which contains the actual call and parameters for cicsteld, then register the shell script or command le with inetd. For more about setting up the cicsteld server (CICS Telnet server), including registering cicsteld with inetd, see the CICS Administration Guide.
Options
-p principalName species the DCE principal that cicsteld is to use for authentication, if DCE authentication is being used. -P portNumber species the numeric Transmission Control Protocol (TCP) port number that cicsteld listens on for incoming telnet client requests. If you do not specify a port number, cicsteld takes the port number from service name entry of cicsteld in the le /etc/services. If you specify a port number that already exists in /etc/services, cicsteld will comment out the existing entry and add a new one. If the port number is not valid, cicsteld issues an explanation message. If the inetd daemon has started cicsteld, cicsteld ignores this parameter because the connection to the telnet client is already established.
Chapter 2. Resource denition commands and offline utilities
247
cicsteld
-n netName species the network name that is used by the CICS autoinstall program to create the terminal identier of the terminal. If you specify a network name, it must exist in the Terminal Denitions (WD) of the region. If no network name is specied, the CICS region generates a network name when the terminal autoinstalls. If you specify a netName of longer than eight characters, cicsteld truncates the netName to eight characters, and logs a message. -r regionName species the region for cicsteld to connect with. If you do not specify a region, when the user connects to the port, cicsteld presents a menu of available regions and allows the user to select one. -t initialTransaction species the transaction to be run at initial connection time after autoinstall. This could be the CESN transaction, to force users to sign on. -e emulation Use this option to override the model type that is selected by cicsteld. When a region is connected for a telnet client, cicsteld checks if the telnet client is using a valid terminal. If the terminal is valid, cicsteld selects a model type for that terminal. To override this selection, use the -e option to specify a user dened model type or a CICS supplied model type. The preferred CICS model types that can be used for cicsteld are: v hft and mft for terminals with extended data stream v lft for terminals that do not have extended data stream. See the CICS Administration Guide for more information about model types and Chapter 10. Terminal model denitions on page 501 for the denitions of the autoinstall models. -l locale species the National Language Support (NLS) locale to use for this instance of cicsteld. If you do not specify this option, On CICS on Open Systems: cicsteld uses the locale that is named in the environment variable LANG. On CICS for Windows NT: cicsteld uses the locale determined by the Language setting in the International section of the Control Panel. -c clientCodePage cicsteld client (for example, the telnet daemon). The client of cicsteld
248
cicsteld
is a 3270 emulator that uses an EBCDIC character set, so this must be an EBCDIC code page. If you do not supply this option, cicsteld uses the code page with shortcode 037. This option corresponds to the CLINTCP option of the DFHCNV macro. See the table under the -s option. -s serverCodePage species the code page of the cicsteld server. This requires an ASCII code page that matches the code page of cicsteld. If you do not supply this option, cicsteld uses the code page with shortcode 8859-1. This option corresponds to the SRVERCP option of the DFHCNV macro. You can supply the code page for the -c and -s options as a shortcode which is recognized and converted by cicsteld as follows:
Table 5. Shortcode and code pages (Open Systems)
Code page Shortcode 037 850 930 932 EUCJP 8859-1 CICS for AIX and CICS for Solaris IBM-037 IBM-850 IBM-930 IBM-932 IBM-eucJP ISO8859-1 CICS for HP-UX american_e roman8 japanese_e japanese japanese.euc iso8859_1
Table 6. Shortcode and code pages (Windows NT) Shortcode Code page
037 850 930 932 EUCJP 8859-1 IBM-037 IBM-850 IBM-930 IBM-932 IBM-eucJP ISO8859-1
If you specify a code page option that does not belong to this set, cicsteld does not alter it. For example, the command cicsteld -c ISO8859-7 uses ISO8859-7 as the name of the client codepage. -k keytabFile species the keytab le that cicsteld uses as the servertab le. If you do not specify this parameter, cicsteld attempts to use the le varDir/cics_clients/krb5/v5srvtab.
249
cicsteld
-h hostList species a blank-delimited list of names or addresses of hosts to be searched for the specied region. If a list of host names is not specied, the contents of the environment variable CICS_HOSTS will be used. If the environment variable CICS_HOSTS is not set, the local machine will be searched. -v -? (verbose) causes all informational messages to be displayed during startup. displays a short help message.
Examples
1. To specify that cicsteld listen on port 9001 for a request to access region REGION1 and run transaction CESN:
cicsteld -P 9001 -r REGION1 -t CESN & (Open Systems) start cicsteld -P 9001 -r REGION1 -t CESN (Windows NT)
3. To specify the cisteld listen on port 9002 for a request to access REGION2 which is to be found on system BLUE, GREEN, or RED:
cicsteld -P 9002 -r REGION2 -h "BLUE GREEN RED" & (Open Systems) start cicsteld -P 9002 -r REGION2 -h "BLUE GREEN RED" (Windows NT)
250
Invokes the CICS 3270 Terminal Emulator, from the operating system, so that you can connect to a CICS region.
Syntax
cicsterm [-r regionName] [-n netName] [-m modelId] [-t transId] [-A [animatorTTY] [-T animatorTERM]] [-h hostList] cicsterm -?
Description
v You need to understand about the 3270 terminal subsystem before you use the cicsterm command. v You need access to a terminal or window that can access a machine in the DCE cell in which the CICS region is dened. Your terminal must either be suitable for autoinstall (see Terminal autoinstall user program on page 390), or have an entry in the attribute NetName in the Terminal Denitions (WD). v Your window must contain at least 12 lines, so that the terminal emulator can display a menu of region names when necessary. A menu of region names is displayed if you do not specify a region when you invoke the CICS 3270 Terminal Emulator. The 12 lines are needed to display various headers, PF key legends, blank space, and at least one region name so that you can scroll through the list of available regions. If the window contains less than 12 lines, there is an error message, and the terminal emulator terminates abnormally. It is recommended that you use a window with 25 lines. v If you are using DCE authentication and you are connecting to a region that has the attribute none, then you must run dce_login successfully before using cicsterm. This causes a DCE ticket to be allocated by the DCE security service. Tickets have a limited lifetime; 10 hours by default. If a ticket expires while the client is active, the client is terminated. DCE accounts may have their ticket lifetime changed. v If you are not using DCE authentication then either you should not have run dce_login before using the cicsterm command, or you must have run cicssetupclients with the -d option on the host to which you are connecting in order to create a keytab le in directory /var/cics_clients. v You must be authorized to run the transactions that you specify. That is, the UD entry for the userid you are using must have the TSL and RSL keys
251
cicsterm
listed in it that allow you to access the transactions that you want to run. This is described in the CICS Administration Guide. If you do not specify a region with the -r option, a list of regions is displayed so that you can select one. Your selection is veried before you are connected to the region. When you use the -r option to specify a region, you are not shown the list and cicsterm connects you to the region you specied. CICS veries that your request is valid by checking that the DCE principal maps to a User Denitions (UD) entry for the selected region. (The DCE principal is specied in a UD entry with the attribute Principal.) v If a UD entry exists for the DCE principal, you are connected to the CICS region using the key to the UD entry as the userid. You are given access to those transactions and resources with TSL and RSL keys that match those listed in the attributes TSLKeyList and RSLKeyList for that UD entry. v If a UD entry does not exist for the DCE principal, you are connected to the region as the regions default userid. You are given access to those transactions and resources with TSL and RSL keys that match those listed in the TSLKeyList and RSLKeyList in the UD entry for the regions default userid. If a UD entry is not dened for the regions default userid, then you are given access only to public transactions and resources. Note: The regions default userid is specied with the attribute DefaultUserId in the Region Denitions (RD), as described in Region Denitions (RD) on page 32. After you are connected to the region, CICS leaves you with a blank screen that is running the IBM 3270 Information Display System emulation. You can enter the transaction identier of the transaction you want to run. Alternatively, you can run a transaction immediately when cicsterm is initially invoked, by entering
cicsterm -r regionName -t transId
where regionName is the region name, and transId is the transaction identier. The CICS 3270 Terminal Emulator is associated with a particular region for the lifetime of the cicsterm process. If the region terminates, the cicsterm process is left running to wait for any current scheduled protected transactions for the given terminal when the region is restarted. Otherwise, the cicsterm process terminates. When cicsterm receives a user interrupt signal SIGINT, it terminates immediately. If a transaction is running, it is purged. The purge happens only at the start or end of an EXEC CICS call, so the transaction does not terminate
252
cicsterm
if it is waiting for a resource, or if it is in a loop that does not involve EXEC CICS calls. If a transaction in this situation needs to terminate, the systems administrator must purge it. Refer to the FORCEPURGE parameter description in CEMT INQ/SET TASK on page 344. You can specify a particular terminal to install by using the -n option with the NetName of the terminal from its Terminal Denitions (WD). You can explicitly specify a model type to autoinstall by using the -m option, as described below. See Processing on page 254.
Options
-r regionName species the name of the CICS region to which you want to attach. If you do not specify a regionName, CICS displays an interactive menu of available regions that are available for you to select. If there are no regions available, CICS displays an error message. -t transId species the identier of the transaction to run after Terminal Emulator initialization. -n netName species the netName to use for installation. To install as a particular terminal, specify the netName of the required terminal. If you omit the netName, cicsterm autoinstalls, and a unique netName is generated in the region. -m modelId species the name of the model device type (DevType) to use for autoinstallation. See Processing on page 254. -A animatorTTY species the name of the device for ANIMATOR stdin/stdout. If you specify the -A option without a value, and you are using X Windows, cicsterm will create a window for use as the ANIMATOR console. -T animatorTERM species the name of the TERM type of the ANIMATOR terminal. -h hostList species a blank-delimited list of names or addresses of hosts to be searched for the specied region. If a list of host names is not specied, the contents of the environment variable CICS_HOSTS is used. If the environment variable CICS_HOSTS is not set, the Cell Directory Service (CDS) is searched for a region with the specied name. If there is no CDS the local machine is searched. -? causes the usage message to be displayed.
Chapter 2. Resource denition commands and offline utilities
253
cicsterm Examples
1. To display the syntax for accessing CICS:
cicsterm -?
3. To start a terminal using the denition for a high function terminal with multi-byte character support on a region region1:
cicsterm -m hft-mb -r region1
4. To start a terminal with the NetName BlueTerm in its Terminal Denitions on region region1:
cicsterm -n BlueTerm -r region1
5. If you want to log on to a different userid after you have started cicsterm:
cicsterm -r region1 -t CESN
Processing
Suggested Setup: Instead of running cicsterm interactively at the command line, you can set up cicsterm to run as part of the /etc/passwd conguration for a particular user authentication or from a prole or shell script. This is helpful when you always connect to the same region, and you always invoke the same transaction when you are connected to it. Selecting Suitable Autoinstall Models: The autoinstall program is passed a number of model entries in the Terminal Denitions (WD). The models that are selected are: 1. The models with a DevType that matches the model parameter specied in the -m option. For example, when -m hft is specied, the denitions in the WD stanza that has DevType=hft are used. 2. If the -m option is not specied, the models selected are those with a DevType that matches the environment variable CICSTERM. 3. If CICSTERM is not set, the models selected are those with a DevType that matches the environment variable TERM. The default autoinstall program will select the rst of the models that are passed to it. See the CICS Administration Guide for descriptions of autoinstall models that are supplied with CICS. How cicsterm selects the Locale: cicsterm uses the locale that is held in the environment variable LANG. The value of LANG is passed from cicsterm to the region. Therefore, denitions for the locale that is specied in LANG must exist in the system on which the region resides.
254
The cicstermp command performs a xed-size printer emulation of 64 lines by 132 columns and ignores print attributes such as highlight, underline, high intensity and color.
Syntax
cicstermp -n netName -r regionName [-h hostList] [-t transId] [-P printCommand] [-S][-p printerType [-f font] [-M paperType] [-s fontSize] [-R]] cicstermp -?
Description
v If you are using DCE authentication you must be authenticated as a DCE principal to run this command. A DCE ticket is given when the DCE principal authenticates with the DCE security service. Tickets have a limited lifetime, and the default lifetime is 10 hours. If a ticket expires while the client is active, the client is terminated and any in-ight transactions are abended. DCE accounts can have their ticket lifetime changed. v Printers cannot be autoinstalled, so there must be an entry in the Terminal Denitions (WD) whose attribute NetName matches the netName specied on the command before a printer can be attached to a region. v You need to understand about the 3270 terminal subsystem before using the cicstermp command. CICS 3270 Terminal Emulators associated with printer devices are identical to normal user CICS 3270 Terminal Emulators, except that printer CICS 3270 Terminal Emulators are not connected to an interactive device, so they can never receive keyboard input. Either CICS must create these printer CICS 3270 Terminal Emulators when the region starts up, using the Terminal Denitions (WD), or you can enter cicstermp with the -P printCommand option. The -P option or its default, is used to process the data when a print control is detected in the data stream sent to the terminal. The data is placed in a temporary le and the print command is issued with the name of the temporary le appended as a parameter. The temporary le is then erased. Note that there is no requirement for the print command actually to print the data. It could, for example, copy the data so that it can be incorporated into documentation. Also, note that, since the temporary le is immediately erased, the print command must nish processing the le before returning. This
255
cicstermp
precludes the use of a command such as the AIX qprt command (without the -c option) that simply records the name of the le for later processing. Those parameters that are only associated with a PostScript printer type (-f, -M, -s and -R), must have valid values. If not, incorrect printer output may occur. If any of these parameters are used when PostScript printer type isnot used, an error message will be sent and cicstermp will terminate.
Options
-n netName species the network name, which is mandatory. The network name determines which printer terminal emulator is selected from the Terminal Denitions. -r regionName species the name of the CICS region to which you wish to attach. -h hostList species a blank-separated list of names or addresses of hosts to be searched for the specied region. If a list of host names is not specied, the contents of the environment variable CICS_HOSTS will be used. If CICS_HOSTS is not set, the local machine will be searched. -t transId species the transaction identier of the transaction to run after printer CICS 3270 Terminal Emulator initialization. -P printCommand species the command used by CICS to process the data sent to the terminal. The command is appended with the name of the temporary le before it is issued. The default is the operating system lp -c command, which in turn uses the default print destination. -S suppresses the insertion of a blank character between single- and double-byte characters.
-p printerType species the type of printer. The valid printer types are postscript and ps55. These types are valid in either upper or lower case. -f font species the default font. The default values are:
Courier (for single-byte characters) GothicBBB-Medium-RKSJ-H (for Ja_JP) GothicBBB-Medium-EUC-H (for ja_JP)
This option is valid only if the printer type is postscript. -M paperType species the paper size. Valid paper types are:
256
cicstermp
LETTER, FOLIO, EXECUTIVE, LEGAL, LEDGER, TABLOID, A0, A1, A2, A3, A4, A5, A6, A7, A8, A9, B0, B1, B2, B3, B4, B5, B6, B7, B8, B9 and B10.
The default value is A4. This option is valid only if the printer type is postscript. -s fontSize species the default font size. The default value is 11. This option is valid only if the printer type is postscript. -R -? rotates the printed output through 90 degrees. This option is valid only if the printer type is postscript. causes the usage message to be displayed.
Examples
1. To display the syntax:
cicstermp -?
2. To use the default printer for CICS region wessex and netname Printer1:
cicstermp -r wessex -n Printer1
3. To use a specic printer (lp0) on CICS region wessex and netname Printer1:
cicstermp -r wessex -n Printer1 -P "lp -ddest lp0"
4. To print DBCS data with outlines onto PS/55 printers whose queue name is dbcs on CICS region wessex and netname DBCSPRT with codepage 932 (LANG=Ja_JP):
cicstermp -r wessex -n DBCSPRT -p ps55 -P "qprt -c \ -Pdbcs -l0 -x2 -L! -XIBM-932"
257
Use this command to create a trace report from the trace data generated by the CICS trace facility. This trace report is written either to standard operating system output or to an operating system le if you provide a lename.
Syntax
cicstfmt [-h [!]hookIdList] [-m [!]moduleIdList] [-o outFile] [-f leName] [-r regionName] [-s {a | b}] [-u userId] [-n traceSeqNo | -p [traceSeqNos]] cicstfmt -?
Description
The CICS trace facility generates trace data in a compact form. The CICS trace formatter, cicstfmt, reads this trace data and generates readable trace output of the form described in the CICS Problem Determination Guide. The cicstfmt command can be used to: v Format a regions auxiliary trace le v Format a user trace le v List a users trace les v Delete all of a users trace les v Delete some of a users trace les v Format a specic le If you enter the command syntax incorrectly or specify invalid parameters, the cicstfmt command writes a message to standard error. It does not produce an error message if a trace le contains invalid data. The cicstfmt command formats trace les that contain only CICS trace. On AIX, you can format trace les that contain non-CICS trace by using the operating system trace formatting utility trcrpt.
Options
-h [!]hookIdList species a list of hook identiers (separated by spaces or commas) of those trace entries that are to be formatted or, if an exclamation point (!) is specied, that are to be ignored. Each hook identier must be a hexadecimal number between 000 and FFF. A range of hook identiers can be specied by using the hyphen () character. If the list contains spaces, the list must be enclosed in quotes. If this option is not
258
cicstfmt
specied, the cicstfmt command formats the trace data for all the CICS trace hook identiers, subject to the effect of the -m parameter. The hook identiers used by CICS are listed in the CICS Problem Determination Guide. -m [!]moduleIdList species a list of module names or identiers (separated by spaces or commas) of those trace entries that are to be formatted or, if an exclamation point (!) is specied, that are to be ignored. An asterisk (*) can be used as a wild character in a module name. If the list contains spaces, the list must be enclosed in quotes. Each CICS module has a ve-character name and a numeric identier. The names and identiers are listed in the CICS Problem Determination Guide. -o outFile species a lename for the trace report. If you do not specify this option, the cicstfmt command uses the standard output. -f leName species the pathname and lename of the trace le you wish to format. -r regionName species the region name. This option is required only if formatting an auxiliary or user trace le, otherwise, it is ignored. The cicstfmt command checks that regionName is valid. If regionName is invalid, the cicstfmt command writes an error message to standard error. If you do not specify a region name, CICS formats trace les for the region specied by the CICSREGION environment variable. -s {a | b} species that cicstfmt formats one of the auxiliary trace les. The options a or b specify which auxiliary trace le to format. For example, specifying -s a formats the trace le specied in the Region Denitions (RD) TraceFileA attribute. If you do not specify a or b, cicstfmt writes an error message to the standard error stream. -u userId species that the cicstfmt command format a user trace le for user userId. If you do not specify this option, the command uses the userid specied by the environment variable LOGNAME. -n traceSeqNo species the sequence number of a user trace le. The cicstfmt command uses the userId (specied by the -u parameter) to look up the trace lename in the TraceFile attribute of User Denitions. It then uses this value and the traceSeqNo to generate the lename of the user trace le. For example, if the TraceFile attribute is set to MyTracefile
259
cicstfmt
and the traceSeqNo is 001, then the user trace le is called MyTracefile.001. Only one sequence number can be specied after -n. -p [traceSeqNos] species that you wish to delete some or all of a users trace les. If you specify any trace le sequence numbers, the cicstfmt command removes all trace les associated with the specied traceSeqNos. If traceSeqNos is not specied, all the users trace les are removed. The cicstfmt command requests conrmation before it deletes all les. More than one sequence number can be specied after the -p option. -? causes the usage message to be displayed.
Examples
1. To format all trace data in auxiliary trace le A for the region REGIONA to the le auxa:
cicstfmt -o auxa -r REGIONA -s a
2. To format trace hooks 584 and 582 from the user trace le 001 for the user USER1 in the region REGIONB:
cicstfmt -h "584 582" -r REGIONB -u USER1 -n 001
3. To list all of the user trace les for the user USER1 in the region REGIONB:
cicstfmt -r REGIONB -u USER1
4. To delete all of the user trace les for user USER1 in the region REGIONB:
cicstfmt -r REGIONB -u USER1 -p
5. To delete the user trace le 001 for the user USER1 in the region REGIONB:
cicstfmt -r REGIONB -u USER1 -p 001
6. To format trace entries made by the storage modules in the trace data le TraceFile in the current directory to a le called TraceOutput:
cicstfmt -msto* -o TraceOutput -f TraceFile
See the CICS Administration Guide and CICS Application Programming Guide for related information.
260
The cicstracelter command lters a CICS trace le to select or remove specied trace entries. The trace entries to be selected or removed can be specied by hook identier or by CICS module identier or both. On CICS for AIX only, this command may also be used to lter an AIX EPTF-format le.
Syntax
cicstracelter [-h [!]hookIdList] [-m [!]moduleIdList] cicstracelter -?
Description
cicstracelter reads standard input, which is assumed to be in the format of a CICS trace le. Each trace entry is echoed to standard output or is discarded depending on the values of the -h and -m options. The output from cicstracelter is also in the format of a CICS trace le and can be formatted using the CICS program cicstfmt. using the CICS program cicstfmt or, on AIX only, using the AIX program trcrpt.
Options
-h [!]hookIdList species a comma-separated list of hook identiers of those trace entries that are to be echoed to standard output or, if ! is specied, the entries that are to be discarded. Each hook identier must be a hexadecimal number between 000 and FFF. A range of hook identiers can be specied by using a character. The hook identiers used by CICS are listed in the CICS Problem Determination Guide. -m [!]moduleIdList species a comma-separated list of names or identiers of modules whose trace entries are to be echoed to standard output or, if ! is specied, whose entries that are to be discarded. An asterisk can be used as a wild character in a module name. Each CICS module has a ve-character name and a numeric identier. The names and identiers are listed in the CICS Problem Determination Guide. -? causes the usage message to be displayed.
261
cicstracelter Examples
1. To select only hook entries for identiers 581 to 583 and 586 the CICS trace entries not made by modules StoTA or StoRE in the trace le trace1 placing the output in le filteredtrace, enter:
cicstracefilter -h581-583,586 -m!stota,store <trace1 >filteredtrace
2. To remove EXEC CICS interface entry and exit traces from the trace le trace2, enter:
cicstracefilter -h!582,583 <trace2
262
Syntax
cicsupdate -c className [-r regionName] [-P | -R | -B] [-f leName] [resourceName] [attributeName=attributeValue ... ] cicsupdate -?
Description
The Resource Denition Online (RDO) command cicsupdate updates a resource denition of a specied class in the permanent resources database, or installs the resource denition into the runtime database, or both. The cicsupdate command initializes the data structures for the resource with the current values before overwriting them with your specied values. Stopping the command before completion can result in a damaged database. The command returns 0 if the command runs successfully, 1 otherwise. You can use the cicsupdate command to update the reserved resource default associated with each resource class.
Options
-c className determines the resource class to which the resource denition is to be updated, and is one of these two- or three-character codes: cd fd gd gsd jd ld md od pd Communication Files Gateways Gateway Servers Journals Listeners Monitoring Objects Programs
263
cicsupdate
rd scd ssd td tdd tsd ud wd xad Regions SFS Schemas SFS Servers Transactions Transient Data Queues Temporary Storage Queues Users Terminals Products
-r regionName species the region whose resource denition is to be updated. If you do not specify a region name, CICS updates the resource denition in the region specied by the CICSREGION environment variable. The -r parameter is invalid if you specify gsd, scd, or ssd as the resource class, because these classes are associated with a collection of regions rather than with a specic one. -f leName species the le that contains the schema denitions. Use this ag only when you specify scd (SFS schema denitions) as the resource class. -P instructs the command to update the resource denition in the permanent database without installing it into the runtime database. This is the default option if you do not specify the -P, -R, or -B options. instructs the command to update the runtime database and install the resource denition in a running system. If you are using DCE authentication, you must be authenticated as a DCE principal before running the command with this ag. The -R ag is invalid if you specify rd or md as the resource class because these classes cannot be updated in a running system, or if you specify gsd, scd, or ssd as the resource class, since these classes are not associated with a specic region. -B instructs the command to update the resource denition in the permanent database, update the runtime database, and install the resource denition in a running system. The second part of this operation fails if there is already an entry in the runtime database, so you must use cicsdelete -R to delete any existing entry rst. If you are
-R
264
cicsupdate
using DCE authentication, you must be authenticated as a DCE principal before running the command with this ag. The -B ag is invalid if you specify rd or md as the resource class because these classes cannot be updated in a running system, or if you specify gsd, scd, or ssd as the resource class since these classes are not associated with a specic region. resourceName is the name of the resource denition to be updated. You must enter a resourceName for all classes except rd and md. To update the reserved default resource denition, enter resourceName as two double quotation marks (). attributeName=attributeValue ... are the names and values of attributes belonging to the class className that you wish to change. If you are using cicsupdate from the command line and you want to use a metacharacter such as double asterisks (**), backslash (\), or pipe (|) within an attribute value, you must use a shell escape mechanism. For example, if you want to use ** as a value, you must enter one of the following:
"**" \*\* '**'
You must use the pipe (|) character as the separator for multiple entries into Transaction Security Level (TSL) and Resource Security Level (RSL) key lists. Note: The term metacharacter refers to the following special characters: dollar ($), at sign (@), period (.), slash (/), dash (-), underscore (_), percent (%), ampersand (&), question mark (?), exclamation (!), vertical bar or pipe (|), double quotation (), comma (,), semicolon (;), less than (<), greater than (>). The set of attributeName=attributeValue pairs depends on the class of the resource. -? causes the usage message to be displayed.
Examples
1. To update the program name for the transaction TEST in the region REGION3 in the permanent database only:
cicsupdate -c td -r REGION3 -P TEST ProgName=PROG2
2. To update the path name for the program PROG1 in the region REGION4 in the permanent database and install it in the runtime database:
265
cicsupdate
cicsupdate -c pd -r REGION4 -B PROG1 \ PathName=/var/cics_regions/REGION4/bin/prog1
266
Syntax
cicsupdateclass [-r regionName] [ -w ] -c className -a attributeName {-n newValue | -b fromAttribute} [ [ -lt | -gt | -eq ] oldValue ] [ -k key ] [ -f lename ] cicsupdateclass -?
Description
The cicsupdateclass command is used when an upgrade of CICS on Open Systems causes a change to the value of an attribute in the default resource denition le, for example, the default value, or a change in the range of values that the attribute can take. cicsupdateclass globally modies the value of each specied attribute for all the resource denition les in that class. These commands are generated automatically and are included in the migration shell script which was created when you ran cicsmigrate. If you ran cicsmigrate to update the warm start region images, the cicsupdateclass commands are generated with a -w ag. You can edit the cicsupdateclass commands in the shell script, for example, if you wanted to change the default value of an attribute for your system. You can explicitly specify the new value using the -n parameter, or you can copy a new value from an existing attribute using the -b parameter. You can also specify that the attribute value changes only under certain conditions. For example, you can specify that a change occurs only if the current value is less than, or greater than, a numerical value that you specify. If you use the condition that the attribute value changes only if the current value is equal to a specied value, you can specify either a numerical value, or a valid character value. You can also specify that a change occurs only for a certain stanza by naming its key.
Options
-r regionName species the name of the region being modied. It is optional only for the following resources: ssd, gsd, and scd. -w updates the warm start region images.
Chapter 2. Resource denition commands and offline utilities
267
cicsupdateclass
-c className species the name of the class being modied. Valid classes are: cd fd gd gsd jd ld md od pd rd scd ssd td tdd tsd ud wd xad Communication denitions File denitions Gateway denitions Gateway server denitions Journal denitions Listener denitions Monitoring denitions Object denitions Program denitions Region denitions Schema le denitions Structured le server denitions Transaction denitions Transient data denitions Temporary storage denitions User denitions Terminal denitions Product denitions.
-a attributeName species the name of the attribute being modied. -n newValue species the new value for the attribute. -b fromAttribute species the name of an attribute whose value is used as the new value for the attribute being modied. -lt oldValue changes the value of the attribute only if its current value is less than a numerical value, oldValue, that you specify. -gt oldValue changes the value of the attribute only if its current value is greater than a numerical value, oldValue, that you specify.
268
cicsupdateclass
-eq oldValue changes the value of the attribute only if its current value is equal to a value, oldValue, that you specify. The value you specify can be numerical or valid characters. -k key changes the value of the stanza only with the key specied. -f lename species the path and lename of the schema resource le. This option is valid only if -c scd is specied. -? causes the usage message to be displayed.
Examples
1. To change the value of the Priority attribute to 99 for every user in region1:
cicsupdateclass -r region1 -c ud -a Priority -n 99 -w
2. To change the value of the InDoubt attribute to wait_commit if it previously had the value wait_backout for every entry in the Transaction Denitions (TD) in region2:
cicsupdateclass -r region2 -c td -a InDoubt -n wait_commit \ -eq wait_backout -w
3. To change the value of the RegionPoolSize attribute in the Region Denitions (RD) for region3 to 24679 if the existing value is less than 2050:
cicsupdateclass -r region3 -c rd -a RegionPoolSize -n 24679 \ -lt 2050 -w
4. To change the value of the TSLCheck attribute to the value of the RSLCheck attribute for every transaction in the Transaction Denitions (TD) in region4:
cicsupdateclass -r region4 -c td -a TSLCheck -f RSLCheck -w
5. To set the attribute NameService to NONE for a specied Structured File Service Denition (SSD) entry:
cicsupdateclass -w -c ssd -a NameService -n NONE \ -k "/.;/cics/sfs/serverName"
269
cicsusedceservers cicsusedceservers - Migrate CICS regions and Encina servers to use DCE
AIX X HP-UX X Sun Solaris X Windows NT X
The purpose of the cicsusedceservers command is to migrate CICS regions and Encina SFS and PPC Gateway servers to make use of the DCE CDS and Security services after originally being created not to use these services.
Syntax
cicsusedceservers { -A [-I] | -R regionName | -S serverName | -G gatewayName } [-v] cicsusedceservers -?
Description
The DCE directory and security services must have been installed on the machine. You must be logged in to DCE with credentials to create DCE principals and accounts. This command will migrate CICS regions and Encina servers from operating without the use of the DCE directory and security services to operate using these service. It is intended to ease the migration to a more complex conguration or to one that requires the use of DCE security. The command may be used to migrate all regions and servers on the machine at once or to migrate individual regions and servers. All Encina servers should be migrated before attempting to use any migrated regions that make use of their facilities. cicsusedceservers will create the necessary DCE principals and keytab les which are normally created by cicsdefault or by cicsimport, cicssfscreate and cicsppcgwycreate (CICS on Open Systems only) when those commands are used in the presence of the DCE servers. It will also change the settings of the NameService and AuthenticationService attributes for the regions and servers to DCE. The various attributes specifying RPC protection levels will all be left set to none, however, so, if higher protection levels are required, it will be necessary to use SMIT (on CICS for AIX), SAM (on CICS for HP-UX) or cicsupdate and cicsupdateclass to change these settings after you have run cicsusedceservers.
270
cicsusedceservers Options
-A -I causes cicsusedceservers to migrate all CICS regions and all Encina servers dened on the local machine. causes cicsusedceservers -A to continue migration of other CICS regions and Encina servers if a failure is encountered in migrating one of them.
-R regionName species the name of a single region on the local machine that is to be migrated. -S serverName species the name of a single Encina SFS server to be migrated. -G gatewayName species the name of a single Encina PPC gateway server to be migrated. -v -? causes cicsusedceservers to display more information about the progress of the migration. causes the usage message to be displayed.
Examples
1. To migrate all CICS regions and Encina servers on the local machine even if an error is encountered with one or more of them, enter
cicsusedceservers -AI
271
cicsusedceservers
272
273
Signon (CESN) This transaction is used to sign on to CICS. CJDB Java application diagnosis conguration Console Message Log Viewer (CMLV) This transaction can be used to browse through the console message log, console.nnnnnn. Routing Transaction (CRTE) This transaction is used to route to another system so that you can sign on to CICS on that system. Signoff (CSSF) This transaction is used to sign off from CICS. It has the same effect as CESF. Statistics (CSTD) This transaction is used to display statistics information. CICS uses the tranid to identify the application programs that handle the specied transactions and to establish a task to run them. Note: CEDF and CRTE are private transactions. They do not have a program name in the Transaction Denitions (TD) so you cannot change their names or copy them. For more information, see Chapter 3. CICS-supplied transactions on page 273. For information about how user-written as well as CICS-supplied transactions are dened to CICS, see Transaction Denitions (TD) on page 73.
where CEMT is the tranid of the Runtime Resource Management transaction, the INQ keyword species that you want to make an inquiry, PROGRAM states the resource type, and PROG1 is the specic name of the program.
274
The transaction starts a full screen session. When you end the session, the following message is generated:
STATUS: SESSION ENDED
Prompts, issued from the transaction, are displayed if required keywords or values are missing or incorrect. Note: If the upper case translation ag for your terminal is set to yes, you can enter the tranid at your terminal in either uppercase or lowercase characters, although they are all shown here in uppercase.
Example of using vertical bars {INQ | SET} v An item in bold type indicates the default that is used if you do not select an item from an item list. For example, the following indicates that if neither EXIT nor GOODNIGHT are selected, the transaction is executed as if EXIT were specied.
Example of showing the default CESF [EXIT | GOODNIGHT] v Enter parentheses exactly as shown, unless indicated otherwise, as they act as delimiters. v When an ellipsis (...) is shown in a list, repeat as many items, or group of items, as needed. The following example of CEMT transaction syntax demonstrates that: 1. Either INQ or SET must be specied.
275
2. TRANSACTION must also be specied, but because there are brackets around (tranid), you do not need to provide it. 3. The brackets around ALL, PRIORITY(value), and ENABLED | DISABLED indicate that these are optional. 4. When PRIORITY is specied, you must provide a value.
Example of showing when a value must be provided CEMT {INQ | SET} TRANSACTION[(tranId)] [ALL] [PRIORITY(value)] [ENABLED | DISABLED] To set the maximum permitted number of servers to 5, you enter:
Example of providing a value CEMT SET TCLASS MAXSERVERS(5) Syntax notation on screen displays The syntax notation displayed on screen, and in gures showing example screens, differs slightly from the syntax notation used in this book: v Square brackets [ ] are replaced by the less than (<) and greater than (>) symbols. v Braces ({ and }) are not used. If a mandatory option is left out, CICS displays an error message and does not continue performing the command until you specify the option. v Parentheses are used to indicate that an option requires a value or data eld, but you have not specied one.
276
For internal security checking, each transaction is assigned a TSL key value and an RSL key value. This value is either a number or public. CICS users are assigned a list of TSL and RSL key numbers in the User Denitions (UD). These numbers indicate which transactions they are
277
permitted to use. If a number in the user list matches a transaction key number, then the user has permission to use that transaction. In other words, if a transaction has a TSL key of 10 and an RSL key of 20, then users must have 10 in their TSL key list if they need to start the transaction and they must have 20 in their RSL key list if they need to be able to access resources with that transaction. The CICS-supplied transactions are initially shipped with these TSL and RSL keys set to public so that all CICS users can use them. However, this may have been changed by your local administrator. For example, it may not be desirable for all users to be able to use CEMT as this gives them the ability to change CICS resource denitions in the runtime environment. If you are responsible for setting up security checking for the CICS-supplied transactions, and you need more information about this, see the CICS Administration Guide.
278
CECS * CEDF *(p) CEMT * CESF * CESN * CFTS (p) CGWY CHAT (p) CICE (p) CLAM (p) CMLV * CPMI (p) CRAB (p) CROW (p) CRSR (p) CRTE *(p) CSMI (p) CSM1 (p) CSM2 (p) CSM3 (p) CSM5 (p) CSSF * CSTD * CST0 - CST9, CSTA, CSTB, CSTZ (p) CTDP (p) CTIN (p) CUBS (p) CURD (p) CVMI (p)
Command syntax check Execution diagnostic facility Master terminal Signoff transaction Signon transaction Delete surrogate terminals Gateway transaction. For information about this transaction, see the CICS Intercommunication Guide. Autoinstall terminals Interval control element expiry transaction Monitors internal data consistency Browses the console log Function shipping mirror transaction Run program list Region shutdown Remote scheduling Routing transaction Function shipping mirror transaction SYSMSG model Scheduler model Queue model DL/I model Signoff transaction Statistics display transaction Statistics display transactions Purges read reacords from the Transient Data Queues Autoinstall CICS Client terminals Update blocked starts Update runtime database Function shipping mirror transaction
279
v A synopsis of the transaction including a brief description of its purpose, the layout of the syntax, descriptions of the parameters, and examples. v A comprehensive description of the transaction. v Information about how the transaction is started and how it ends. v If applicable, detailed information about how to use the screens associated with the transaction. v Additional information as required.
280
Syntax
CALF
Description
CALF is a CICS-supplied transaction that performs data conversion so that existing VSAM-based applications can be migrated to the CICS structured le server (SFS) environment used in . CALF accepts the following three le types: v Key sequenced data set (KSDS) v Entry sequenced data set (ESDS) v Relative record data set (RRDS) The transaction copies records from a source le to a destination le. You enter control data in the data entry elds to control the transaction, and use the PF keys to run the transaction. Starting and ending CALF: You start the CALF transaction directly by entering the tranid CALF. You end the transaction by pressing PF3. Using the CALF screens: CALF displays the following screen:
281
CALF
CICS FILE IMPORT FACILITY SYNCPOINT : (0000) DUPREC : (Y) REMOTE SYSTEM :
SOURCE FILE : ( REMOTE NAME : FILE NAME : FILE SERVER : INDEX NAME : FILE TYPE : DESTINATION FILE : ( FILE NAME : FILE SERVER : INDEX NAME : FILE TYPE :
PAD : (Y)
The CALF screen area contains several distinct areas: v Data Entry Fields (the second and ninth lines of text on the screen). v Information (lines three to eight, and lines nine to fourteen of the text on the screen). v Status information (the line above the PF keys. This line is blank until there is status information to display). v PF Key Values (last line of text on the screen). There is a second CALF screen, which is generated only if the import request does not complete (see The Calf error screen on page 283). The transaction ends, and the screen displays an error message, the number of records that were copied, and information about the last record that was copied. The information about the last record copied depends upon the letype. For a KSDS le, the screen displays 255 bytes containing the key in hexadecimal. For an ESDS le, it displays the relative byte address (RBA), and for an RRDS le, it displays the relative record number (RRN).
282
CALF
The CALF error screen area has two areas: v Error message (the second line of the screen) v Information (the remaining lines of the screen) Data entry elds: These are the elds on the second and ninth lines of text on the screen, indicated by brackets, where you can enter the source le name, the destination le name, and transaction control data. SOURCE FILE is the le that the transaction copies records from. The le can be local or remote. The le types, record lengths, and record formats of the source le must be consistent with the destination le. If the le is local, you can check this in the information elds after you press PF5. If the le is remote, when you press PF5, only the information elds REMOTE NAME and REMOTE SYSTEM contain meaningful data, so you cannot check letype, record length, or record format consistency. There might be record length conicts during the copy process, with the following results: v If a source record is not long enough to contain the key of the destination record, the transaction terminates abnormally. v If a source record is longer than the length of a xed length le, a LENGERR error condition occurs and the transaction terminates abnormally.
283
CALF
v If a source record is shorter than the length of a xed length le, the outcome depends upon the setting of the PAD data entry eld (see the PAD description below). v If records are of variable length, an attempt to write a record might cause an INVREQ or a LENGERR error condition, and the transaction terminates abnormally. If the source le is an ESDS le, the transaction maintains the record order, but the structured le server (SFS) allocates its own relative byte addresses (RBAs). SYNCPOINT controls how often a SYNCPOINT is issued if the destination eld is recoverable. The value of the eld species the number of records that are written in each logical unit of work (LUW). The default is 0. DUPREC controls whether or not to ignore DUPREC conditions. The DUPREC condition occurs if an attempt is made to add a record to a data set when the same key already exists in the data set. You can set the eld to Y or N. If you set the eld to Y, the transaction ignores the DUPREC conditions and you can resubmit a partially completed copy operation. The default is Y. PAD controls whether or not to pad a record with nulls when the source record length is less than the record length of a xed length le. This type of record length conict can occur when you import a remote le. If the eld is set to Y, the record is padded with nulls to the required length and a record is written. If the eld is set to N, the transaction terminates abnormally. The default is Y. DESTINATION FILE is the le that the transaction copies records to. The destination le must be local, so after you press PF5, there is always data in the FILE TYPE, RECORD LENGTH, and RECORD FORMAT information elds. The destination le must be congured with the correct information about all indexes, because the transaction only has information about the index it uses for access. Information: REMOTE NAME displays the name of the le if the letype is remote. REMOTE SYSTEM displays the name of the system if the letype is remote.
284
CALF
FILE NAME displays the Structured File Server (SFS) name for the le. FILE SERVER displays the name of the SFS le system where this le resides. INDEX NAME displays the name of the SFS index associated with this path to the le. FILE TYPE displays the type of le if the le is local. File types can be KSDS, ESDS, or RRDS. RECORD LENGTH displays the record length if the le is local. RECORD FORMAT displays the record format if the le is local. The record format can be xed or variable. KEY LENGTH displays the length of the key in the underlying SFS le if the le is local, or the value recorded in the File Denitions (FD) if the le is remote. KEY POSITION displays the key position in the underlying SFS le if the le is local, or the value recorded in the File Denitions (FD) if the le is remote. COPIED is a eld that is periodically updated, depending on the SYNCPOINT, as the transaction carries out the copy procedure. DUPLICATES is a eld that is periodically updated as the transaction carries out the copy procedure. RECOVERABLE displays whether a le is recoverable or not. It can be Y or N, respectively. Status information: This is the line above the PF keys on the screen. It is blank until there is status information to display. Information can be error messages or messages about the transaction status. Program function (PF) key values: PF1 displays help. PF2 clears all elds.
Chapter 3. CICS-supplied transactions
285
CALF
PF3 exits from CALF. PF5 opens the les specied in the data entry elds, and displays information about the les. PF9 initiates copying records from the source le to the destination le. You must open the les rst.
286
Syntax
CDCN [TERMID=termId] [SYSID=sysId] [TRANSID=transId] [PROGRAM=programName] [DISPLAY=display] [ ON | OFF ]
Description
CDCN is a CICS-supplied transaction that turns the IBM Application Debugging Program on and off. The IBM Application Debugging Program can be used to diagnose errors in a transaction identied by naming a resource in one of the following classes: v v v v Terminal (identied by its termid) System (identied by its sysid) Transaction (identied by its transid) Program (identied by its program name)
When a transaction meets one (or more) of the criteria set by CDCN, the IBM Application Debugging Program starts an X-window session on the specied display.
Options
TERMID=termId species the four-character identier of the terminal on which the transaction to be tested will be run. This may or may not be the terminal on which CDCN is invoked. If no other resources are specied termId defaults to the identier of the current terminal. This terminal must be dened in the Terminal Denitions (WD), unless it is generated from a terminal autoinstall. The terminal must be a terminal in the same region as the current terminal. To nd the identier of an autoinstalled terminal, you can run the CEMT INQ TERMINAL transaction, which lists all the terminals logged on to the CICS region. Alternatively, you can look at the autoinstall message in the CSMT log, in the le /var/cics_regions/regionName/data/CSMT.out. SYSID=sysId species the four-character identier of the remote region where the transaction to be diagnosed will originate. This region must be dened in the Communications Denitions (CD).
287
CDCN
TRANSID=transId species the identier of the transaction to be diagnosed. This transaction must be dened in the Transaction Denitions (TD). PROGRAM=programName species the name of the program to be diagnosed. This program must be dened in the Program Denitions (PD). -a option of the cicstcl command and its source must be in the directories specied by the xldb.sourceSearchPath resource in your .Xdefaults le. See the CICS Application Programming Guidefor more information. DISPLAY=display species the name of the X-display on which the IBM Application Debugging Program will display its panels. If this parameter is not specied, the name of the display is obtained from the le specied by the environment variable CICSDEBUGENV. The name of the display must be specied in the format XserverName:displayNumber. ON species that the IBM Application Debugging Program is to be turned on for the named resources. This is the default if neither ON nor OFF is specied. species that the IBM Application Debugging Program is to be turned off for the named resources.
OFF
Using the CDCN screen: If you enter CDCN without specifying the DISPLAY parameter or if the command line is invalid or incomplete, the following screen is displayed:
288
CDCN
CDCN DISPLAY :( CICS Debugging Configuration Transaction ) DEBUG : ON ) ) ) )
To configure for a terminal specify the TERMID To configure for a system specify the SYSID To configure for a transaction specify the TRANSID To configure for a program specify the PROGRAM
TERMID : ( SYSID : (
TRANSID: ( PROGRAM: (
ENTER: COMMIT SELECTION PF1 : HELP PF2 : PF4 : MESSAGES PF5 : PF7 : UNDEFINED PF8 : PF10: UNDEFINED PF11:
The data entry elds, indicated by parentheses, are where you can enter data corresponding to the parameters. After you have lled in the elds you want, press ENTER from the main screen. Program Function Keys: The program function keys have the following functions: PF1 PF2 PF3 PF4 displays help toggles the IBM Application Debugging Program on and off exits from CDCN messages
Using CDCN: When you use CDCN to turn the IBM Application Debugging Program on for a named resource, it does not cause the IBM Application Debugging Program to start immediately. If you satisfy the security checks, and you are able both to run the CDCN transaction and to access the region database entries to turn on the IBM Application Debugging Program for the resource, the resource you name acts as a trigger. Startup of the IBM Application Debugging Program is triggered later, depending on the type of resource involved:
289
CDCN
Resource termid sysid transid program Startup of the IBM Application Debugging Program triggered by The next transaction run on that terminal The next transaction run as a result of a request from that system The next invocation of that transaction The next invocation of that program
When the IBM Application Debugging Program is rst started, it remains attached to the CICS application server (cicsas) process, debugging one or more programs, until the end of the transaction (even when it has been triggered to debug a program), or until you choose to quit from the IBM Application Debugging Program. The IBM Application Debugging Program is attached when it is attached to the cicsas process (that is, actually debugging one or more programs); the IBM Application Debugging Program is detached when it is no longer attached to the cicsas process (that is, when it has nished debugging a transaction and is waiting to be triggered again). Once the IBM Application Debugging Program has started, it can only be terminated in one of two ways: v When the IBM Application Debugging Program is attached, using the quit facility of the IBM Application Debugging Program itself. v When the IBM Application Debugging Program is detached, using CDCN. Each trigger resource can have just one session of the IBM Application Debugging Program started for it, and there is an implied order of precedence of: 1. termid 2. sysid 3. transaction 4. program This means, for example, that, if you turn on debugging both for a terminal with identier AR01 and for a transaction with identier ALAN, and you run transaction ALAN on terminal AR01, only one session of the IBM Application Debugging Program will be started (that associated with terminal AR01) because two debug sessions cannot debug the same physical copy of the code and the terminal trigger takes precedence over the transaction trigger. A second invocation of ALAN run from a different terminal, however, will also start a session of the IBM Application Debugging Program (that associated with transaction ALAN). It is thus possible to have multiple copies of the same program code being debugged at the same time. Note that only programs compiled for debug will produce symbolic output from the IBM Application Debugging Program when run under control of the IBM Application Debugging Program. If the IBM Application Debugging
290
CDCN
Program is triggered for a program that has not been compiled for debug, the IBM Application Debugging Program displays the program as assembler statements.
291
Syntax
CEBR [queueName]
Options
queueName is the name of the temporary storage queue that you wish to browse. If you do not specify a queue name, the CEBR transaction generates one for you. The generated queue name is CEBRtermId, where termId is your terminal identier.
Examples
To browse temporary storage queue TSQ1:
CEBR TSQ1
Description
Temporary Storage Browse (CEBR) is a debugging aid that you can use to browse (read without changing) and manipulate the contents of CICS temporary storage queues. You can also use it to transfer a transient data queue to or from a temporary storage queue. The CEBR facility allows you to answer the following questions: v Did the record go to the correct queue? v Are the correct number of records in the queue? v Exactly what data is held in the temporary storage queue? v What is the current content of the transient data queue to which this application program has just written? v Do the transient data records contain the correct information? Starting and ending CEBR: You start the CEBR transaction directly by entering the tranid CEBR, and, optionally, a queue name. You end the transaction by pressing PF3. Using the CEBR screens: CEBR begins by generating the CEBR screen area, as shown in the following gure. In this gure, no queue name is supplied, and the terminal invoking the CEBR transaction has a terminal identier of TERM.
292
TEMPORARY STORAGE QUEUE CEBRTERM PF1 : HELP PF2 : SWITCH HEX/CHAR PF4 : VIEW TOP PF5 : VIEW BOTTOM PF7 : SCROLL BACK HALF PF8 : SCROLL FORWARD HALF PF10: SCROLL BACK FULL PF11: SCROLL FORWARD FULL
The CEBR screen contains three distinct areas. These are: v Command Input (the second line of the screen) v Information (18 lines on a 24 x 80 screen) v PF Key Values (the last four lines of the screen) Command input: This is the second line of the screen. You use this line to enter any of the following CEBR commands: BOTTOM shows the last page of the current queue. COLUMN nnnn moves the displayed area to this column of the queue. FIND /string nds the next occurrence of the specied string after the current line, making the line containing the string the second on the display page. The slash (/) is a delimiting character. The delimiting character does not have to be slash. However, it must not be a character that appears in the search argument. If there are blank characters in the string, you must terminate that string with the delimiting character that started it. For example, to nd the rst occurrence of the string QUEUE TSQ1, enter:
FIND /QUEUE TSQ1/
If you use a slash as the delimiter, you can omit the keyword FIND. FIND does not nd a specied string if it is on the rst line or on the current line. GET TDqueueName moves the data from a named transient data queue to the temporary storage queue that is being browsed. This allows you to browse the
Chapter 3. CICS-supplied transactions
293
CEBR responds by displaying the data held in the named queue. You can also change the current queue by overtyping the queue name, displayed in the TS QUEUE eld on the top of the screen, and pressing the ENTER key. TERMINAL termId changes the name of the queue. CEBR takes the rst four characters of the
294
295
296
297
CECI and CECS CECI (Command Level Interpreter) and CECS (Syntax Checker)
To check the syntax of, interpret, and run EXEC CICS commands.
Syntax
{CECI | CECS} [commandName]
Options
commandName is the name of the CICS API command whose syntax you wish to check, or that you wish to interpret.
Examples
To read a record with key 009000 from le FILEA:
CECI READ FILE('FILEA') RIDFLD('009000')
Description
CECI allows you to check the syntax of, interpret, and run EXEC CICS commands. CECS allows you to check the syntax of EXEC CICS commands, but does not allow you to invoke them. The CECI and CECS transactions perform a dual role in the operation of a CICS system. v When writing application programs, you can check the syntax of the whole CICS command level application programming interface. If you are using CECI, you can carry through most of the commands to invocation, and you can request to see the results of the invocation. v Using CECI provides a means of interaction with the system. For example, you can correct a le control record that has been overwritten with invalid data, create or delete a temporary storage queue, and so on. CECI provides a useful extension to the facilities provided by the runtime resource management transaction, CEMT. Starting and ending CECI or CECS: You start the CECI or CECS transaction directly by entering the transaction identier CECI or CECS, respectively and, optionally, a CICS command. You end the transaction by pressing PF3. Using the CECI and CECS screens: The command checker and interpreter divides the screen into four areas. These are:
298
Command input: This is the rst line of the screen. You use this line to enter the command whose syntax is to be checked, or that is to be performed, either in the normal format, or in an abbreviated or condensed form that reduces the number of keystrokes involved. The condensed form of the command is obtained because: v The keywords EXEC CICS are optional. v You can abbreviate the options of a command to the minimum number of characters needed to make each option unique. Valid abbreviations are shown in uppercase characters in the syntax displayed on screen. v The quotes around character strings are optional, and all strings of characters are treated as character-string constants unless they are preceded by an ampersand (&), when they are treated as variables. v Command options receiving a value from CICS at runtime are called receivers, and do not have to be specied. The value received from CICS is included in the syntax screen after CICS performs the command. The following example shows the condensed form of a command. You can enter the le control command:
EXEC CICS READ FILE('FILEA') RIDFLD('009000') INTO(data area)
or at a minimum, as:
READ F(FILEA) R(009000)
In this example, the INTO option is a receiver (as dened previously), and you can leave it out. Status: This is the second line of the screen. It contains one of the following messages:
COMMAND SYNTAX CHECK ABOUT TO EXECUTE COMMAND COMMAND EXECUTION COMPLETE (or COMMAND NOT EXECUTED)
299
The status message describes the type of information in the information area of the screen. The COMMAND SYNTAX CHECK status message indicates that CICS has checked the syntax of the entered command, but is not about to perform the command. This is always the status for CECS, and for CECI with a question mark before the command. It is also the status when the syntax check of the command gives severe error messages and for those commands that can not be run (for example, HANDLE CONDITION and HANDLE AID). The ABOUT TO EXECUTE COMMAND status message appears when none of the reasons for stopping at COMMAND SYNTAX CHECK apply. The COMMAND EXECUTION COMPLETE status message appears in response to the ENTER key after an ABOUT TO EXECUTE COMMAND. CICS performs the command and displays the results on the screen. The EXEC INTERFACE BLOCK status message appears when you press PF4. The VARIABLES status message appears when you press PF5. The SYNTAX MESSAGES status message appears when you press PF9. The EXPANSION OF status message appears when you position the cursor at an option value or a variable, and press ENTER. Information: This area consists of the remainder of the screen between the command input and status areas at the top, and PF key values at the bottom of the screen. CICS uses this area to display the syntax of the entered command, error message information, the response to the run, and any other information that can be obtained by using the PF keys or the cursor. A line at the bottom of this area is reserved for messages describing errors in the conversation with you (for example, INVALID PACKED DECIMAL). CICS highlights these messages to attract attention. The content of the information area varies, depending on which message is in the status area. The information area of the screen for COMMAND SYNTAX
300
301
302
303
Syntax messages: The information area shows, in response to pressing the PF9 key, any syntax messages associated with the entered command. Each message has an associated severity, which is displayed as a single character and a colon preceding the error message. An example is an error message, which is preceded by E:. If there is more than one message generated for a command, the number of messages is also displayed. Expansion of screen area: The whole of the information area of the screen is used to display an area selected by means of the cursor. You can position the cursor at the start of the value of an option on a syntax screen, or under the ampersand of a variable in a variables screen. Press ENTER to get the expanded area screen. You can use the scrolling keys to display all the information if it exceeds a full screen. Program function (PF) key values:
304
305
Running CECI or CECS: To run the command interpreter and syntax checker, you must have a transaction security key (TSL) that matches the transaction security key dened in the Transaction Denitions (TD). The TD entry for the CECI transaction species, by default, that resource level security checking is required for any resources referenced with the interpreter. This checking applies to les, transient data queues, temporary storage queues, programs, transaction identiers of the EXEC CICS START command, and journal le identiers. If the resource security level (RSL) specied in the appropriate resource denitionsuch as the File Denitions (FD) for a leis not matched by RSL keys of the user that is signed on, the resource security check fails, and the response to the command is the NOTAUTH condition. This response is given on the command execution complete screen. The following example gives the screen shown in CECI screen after command syntax error on page 307.
CECI READ FILE('FILEA')
Note: CICS displays an error message (indicated by E:) near the bottom of the screen. If there is more than one error message, the screen displays a message to press PF9 to see them.
306
NAME=
gives the screen shown in CECI screen after the correct command input. The error message has disappeared because you have supplied the requested record identication eld.
READ FILE('FILEA') RIDFLD('009000') STATUS: ABOUT TO EXECUTE COMMAND EXEC CICS READ Dataset() | File(FILEA ) SEt() | Into() <Length()> RIdfld(009000) <Keylength() <GEneric> | RBa | RRn> <SYsid()> <GTeq | Equal> <Update> NAME=
The command is now ready to be run, and you achieve this by pressing the ENTER key. CICS displays the screen shown in CECI screen after command has been executed on page 308, showing the result of performing the command.
307
A question mark (?) before the command gives the command syntax check screen and prevents CICS performing the command. The use of CECS forces a question mark before the command. This gives the command syntax check screen and prevents CICS performing the command. In a system where security is important, you can make CECS more widely available than CECI. See the CICS Application Programming Reference and the CICS Administration Guide for related information.
308
Syntax
CEDF { termId | sysId } [,ON | ,OFF ]
Options
termId is the four-character identier of the terminal on which the transaction to be tested is being run. This identier must be dened in the Terminal Denitions (WD), unless it is generated from a terminal autoinstall. The terminal must be another terminal in the same region as the current terminal. The WD entry species what type the terminal is, for example a physical terminal or a window. To nd the terminal identier of an autoinstalled terminal, you can run the CEMT INQ TERMINAL transaction, which lists all the terminals logged on to the CICS region. Alternatively, you can look at the autoinstall message in the CSMT log, which is in the following le:
/var/cics_regions/regionName/data/CSMT.out
sysId is the four-character identier of the remote region (sysid) when you want to test inbound transactions from a different region. This identier must be dened in the Communications Denitions (CD). ON species that the EDF session is to be started. This is the default. OFF species that the EDF session is to be ended. Examples: 1. To start an EDF session to debug an application running on a terminal with a termid of TRM1:
CEDF TRM1
Description
CEDF is the transaction identier used to start or stop an Execution Diagnostic Facility (EDF) session on a terminal or a region. EDF enables you to test, online, an application program that has been preprocessed using the -e option of the CICS translator (cicstran), without modifying the program. If the
Chapter 3. CICS-supplied transactions
309
CEDF
-d option of the cicstran command is also used, the translator source listing also has line numbers that EDF can use. CICS passes control to EDF at specic interception points. EDF displays the state of the application program at the interception point, and allows you to interact with EDF screens to both view additional information about the program, and overtype certain areas of the screen to test the execution of the program, before returning control to the application code. In CICS on Open Systems or CICS for Windows NT, you can use EDF in either single or dual screen mode. In single screen mode the CEDF transaction and the application being debugged run on the same terminal and PF6 is used to switch between them. In dual screen mode two different terminals are used, one for the CEDF transaction and one for the application, though these may be two logical terminals (windows) on one physical terminal. You can use EDF only from a terminal that has a screen width of 80 columns or more, and a screen depth of 24 lines or more. When you run CEDF to debug a transaction, the transaction runs, sets a ag, and exits, all in a very short time. Therefore, CEDF is not running in the system as you run your transaction (in a similar way that a pseudo-conversational transaction is not running and most of the time does not appear on INQ TASK displays). On CICS on Open Systems of CICS for Windows NT, both terminals are under the control of a single task (the user task), which is effectively debugging itself and sending the output to the terminal running under CEDF. You can use EDF to test user transactions (application programs) and the function shipping mirror transaction supplied by CICS. You must rst translate any applications for use by EDF using cicstran or cicstcl. You cannot use EDF for any other transaction provided by CICS. Starting and ending CEDF: You start the CEDF transaction by entering the transaction identier CEDF and, for dual screen mode, either a terminal id or a sysid. The ON parameter is not required as ON is the default. You end the transaction by entering CEDF OFF. Using the CEDF screen: The execution diagnostic facility divides the screen into four areas. These are: v Program information (the rst line of the screen) v Status (the second line of the screen) v Information (18 lines on a 24 x 80 screen) v PF Key Values (the last four lines of the screen)
310
CEDF
The following gure shows a typical EDF screen.
TRANSACTION: ABCD PROGRAM: ABCDPROG STATUS: COMMAND EXECUTION COMPLETE EXEC CICS READQ TS QUEUE ('AC011111') INTO (' ........') LENGTH (12) ITEM (1) TASK NUMBER: 0000000059 DISPLAY: 00
LINE: RESPONSE:
EIBFN=X'0A04' EIBRESP=0 SWITCH HEX/CHAR WORKING STORAGE SCROLL FORWARD UNDEFINED PF3 : PF6 : PF9 : PF12: END EDF SESSION USER DISPLAY STOP CONDITIONS ABEND USER TASK
ENTER: CONTINUE PF1 : HELP PF4 : SUPPRESS DISPLAYS PF7 : SCROLL BACK PF10: UNDEFINED
If you press the ENTER key while the cursor is not positioned within the PF key denition area, EDF performs the function specied for the ENTER key. EDF uses the line immediately above the PF key menu to display messages to you. You can request argument values to be displayed in character or hexadecimal format. If you request character format, EDF shows numeric arguments in numeric character format, with a sign if the number is negative. Each argument value is restricted to one line of the screen. If the value is too long, EDF only displays characters to the end of the line, followed by ... to indicate that the value is incomplete. If EDF displays the argument in hexadecimal format, EDF also displays the address of the argument. You can overtype any screen area where the cursor stops when you press the tab keys. For example, you can move the cursor to the response eld and change the response from NORMAL to ERROR, to test the programs error handling at this point in the program. You can overtype any screen area where the cursor stops when you press the tab keys. For example, you can move the cursor to the response eld and change the response from NORMAL to ERROR, to test the programs error handling at this point in the program. The response of EDF to your user request is in the following order of priority: 1. If you use the CLEAR key, EDF redisplays the screen and ignores any changes.
311
CEDF
2. If you make invalid changes, EDF redisplays the screen with a diagnostic message for the invalid changes, but accepts any valid changes. 3. If you use a PF key or the ENTER key when the cursor is in the PF key denition area, EDF accepts any changes and performs the action requested by the PF key. 4. If you use the ENTER key while the cursor is not in the PF key denition area, and have not modied the screen (other than the REPLY eld), then EDF performs one of the following functions, corresponding to the ENTER key: CONTINUE causes your user transaction to continue, unless you have modied the screen. If you have modied the screen, EDF redisplays the screen with changes incorporated. CURRENT DISPLAY displays the screen displayed before you started examining other screens, such as EIB, unless you have modied the screen. If you have modied the screen, EDF redisplays the screen with changes incorporated. Program information: The rst line of a CEDF screen displays information about the application program being debugged. It displays the transaction identier, the program identier, and the task number. It also shows the current display number (xed at 00 for this release of CICS). Status: This is the second line of the screen. It contains one of the following:
PROGRAM INITIATION ABOUT TO EXECUTE COMMAND COMMAND EXECUTION COMPLETE (or COMMAND NOT EXECUTED) PROGRAM TERMINATION TASK TERMINATION AN ABEND HAS OCCURRED ABNORMAL TASK TERMINATION EXECUTION INTERFACE BLOCK DISPLAY ON CONDITIONS
This status line describes the type of information in the immediately following information area. Information:
312
CEDF
This area consists of the remainder of the screen between the status area at the top, and the PF key values at the bottom of the screen. CEDF uses this area to display the syntax of the command being performed, error message information, the response to the run, and any other information that can be obtained by using the PF keys or the cursor. Program function (PF) key values: The four lines at the bottom of the CEDF screen provide a menu indicating the effect of the PF keys for that particular screen. Although the menu changes from one screen to another, the PF keys stay in the same place on each screen. If your keyboard does not have PF keys, you can position the cursor, using the tab keys, under the required instruction on the screen, and press the ENTER key. PF1 : HELP displays help. PF2 : SWITCH HEX/CHAR toggles the display between hexadecimal and character representation. CICS maintains further screen displays in the chosen mode until the next time you press the PF2 key, or you exit from CEDF. PF3 : END EDF SESSION exits from CEDF. The debugging session ends, so the terminal comes out of EDF mode. The user transaction continues. PF4 : EIB DISPLAY displays the value of elds in EIB and COMMAREA (if any). PF4 : SUPPRESS DISPLAYS suppresses all EDF displays until the next stop condition occurs. PF5 : WORKING STORAGE displays the current working storage section of a COBOL user program. The information corresponding to this section is shown in both hexadecimal and character representations, similar to a dump listing. You cannot view your own main storage area (acquired by the use of the EXEC CICS GETMAIN command), but you can view the COMMAREA storage. PF5 : DATA AREA displays the current data area of a C user program. The information corresponding to this section is shown in both hexadecimal and character representations, similar to a dump listing. You cannot view your own main storage area (acquired by the use of the EXEC CICS GETMAIN command), but you can view the COMMAREA storage. If the stack frame of the C user program is available, you can use PF9 to switch between the current data area and the current stack frame.
313
CEDF
PF5 : STACK FRAME displays the current stack frame of a C user program. This is available only from the About to Execute Command, Command Execution Complete, and Command Not Executed screens. The information corresponding to this section is shown in both hexadecimal and character representations, similar to a dump listing. You can use PF9 to switch between the current data area and the current stack frame. PF6 : USER DISPLAY is used in single screen mode to switch from the CDEF display to the application display. Once in the application pressing any key switches back to the CEDF display. PF7 : SCROLL BACK scrolls a command or EIB display backwards. A plus sign (+) against the rst option or eld indicates there are more options or elds preceding. PF7 : SCROLL BACK HALF scrolls a working storage display half a screen backwards, displaying lower addresses. PF8 : SCROLL FORWARD HALF scrolls a working storage display half a screen forward, displaying higher addresses. PF9 : DATA AREA switches the stack frame display for a C user program to the data area display. You use this in conjunction with PF5. PF9 : STACK FRAME switches the data area display for a C user program to the stack frame display. You use this in conjunction with PF5. PF9 : STOP CONDITIONS switches to a display that allows you to determine the conditions under which CEDF will interrupt the program being tested. PF10: SCROLL BACK FULL scrolls a working storage display a full screen backwards, displaying lower addresses. PF11: SCROLL FORWARD scrolls a command or EIB display forward. A plus sign (+) against the last option or eld indicates there are more options or elds following. PF11: SCROLL FORWARD FULL scrolls a working storage display a full screen forward, displaying higher addresses. PF12: ABEND USER TASK terminates the user task. EDF asks you to conrm this action by
314
CEDF
displaying the message ENTER ABEND CODE AND REQUEST ABEND AGAIN. To abnormally terminate the task with a transaction dump identied by a specied abend code, enter the code at the cursor position and request the PF12 function again. If you enter NO, CICS abnormally terminates the task without a dump. Abnormal termination codes beginning with the character A are reserved for use by CICS. If you use a CICS abnormal termination code you might cause unpredictable results. You cannot use this function if an abnormal termination is already in progress or the task is terminating. PFxx: UNDEFINED means that this function is not available from this screen. Overtyping EDF displays: You can overtype certain areas of an EDF screen. These areas are the elds that the cursor stops at when you move it using the tab keys. You also use the tab keys to move the cursor within the PF key menu, but you cannot change the menu elds. v You can overtype any EXEC CICS command with blanks, NOP, or NOOP before running. This prevents CICS performing the command. v You can overtype any argument value, but not the keyword of the argument. You cannot remove an optional argument, nor can you add or delete an option. When EDF displays an argument in hexadecimal format, EDF also displays the address of the argument location. v Numeric values always have a sign eld that you can overtype only with a minus or a blank. v You can overtype the response eld in the information area with the name of any exceptional condition, including ERROR, that can occur for the current function, or with the word NORMAL. When EDF continues, the program takes the prescribed action for the specied response. v The EIBRESP eld can be overtyped with any desired decimal value that is valid for this eld when it is displayed as part of the EXEC interface block (EIB). This does not apply when this eld is part of a command display. When you overtype a eld representing a data area of a program, EDF places the entered value directly into the application programs storage. However, before performing a command, when you overtype a eld representing a data value (which may be a constant), EDF uses a copy of the eld. Therefore, the change does not affect other parts of the program using the same constant for an unrelated purpose.
315
CEDF
For example, you might overtype the map name before running an EXEC CICS SEND MAP command. The map used temporarily is the map name you entered, but the map name displayed on response is the original map name. When EDF displays an argument in character format, some of the characters may not be displayable (including lowercase characters). EDF replaces each nondisplayable character by a period. When overtyping a period, you must be aware that periods indicate either a valid period character, or storage containing other nondisplayable data. You cannot overtype characters with a period in character format, because EDF ignores the change, and does not issue any diagnostic message. Similarly, when EDF displays a value in hexadecimal format, EDF ignores overtyping with a blank character, and does not issue any diagnostic message. To overtype a character with a period, use PF2 to switch the screen to hexadecimal format and type X2E. When EDF displays storage in both character and hexadecimal format, if you change both and the changes conict, the value of the hexadecimal eld takes precedence. EDF does not issue any diagnostic message. Data display does not take into account the locale the user is using, and any byte in the data stream that is displayable is displayed in its character form. In a single-byte environment, nondisplayable bytes are displayed as a period (.). In a multi-byte environment, nondisplayable bytes should be displayed as a period, but some nondisplayable data might be displayed as characters. Binary data might also be displayed as characters. Note: The term locale is used to refer to a subset of a users environment that denes conventions for a specied culture, such as time formatting, numeric formatting, monetary formatting, and character classication, conversion, and collation. Refer to your operating system documentation for more information about locales and how they are used. If you enter invalid data, regardless of the action you requested, EDF ignores the invalid data and displays a diagnostic message. Interception points: When running a user transaction in debug mode, EDF intercepts the running of the application program at the following points, to allow you to interact with EDF before returning control to the application: 1. At program initiation:
316
CEDF
After initialization of the EIB, but before giving control to the application program. Immediately before performing each EXEC CICS command: After making the initial trace entry, but before performing the requested action. Immediately after performing each EXEC CICS command (except ABEND, XCTL, and RETURN): After performing the requested action, but before invoking the EXEC CICS HANDLE CONDITION mechanism, and before making the response trace entry. At program termination, task termination, and abnormal task termination. When an ABEND occurs.
2.
3.
4. 5.
At all the above points of interception, EDF displays the current status by identifying the cause of interception. In addition: v At point 1, EDF displays the contents of the elds in the EIB. v At point 2, EDF displays the command, including keywords, options, and argument values. The command is identied by transaction identier, program name, and, if the program has been translated using the cicstran command with the -d option, the line number of the command as given in the translator source listing. You can modify any argument value, or suppress the running of the command, but you cannot add or delete options. v At point 3, EDF displays the same as at point 2, plus the response from command running. You can modify certain argument values and the response code. v At points 6 and 7, EDF displays the values of the elds in the EIB and the abnormal termination code. You can interact with EDF in the following ways: v Display the values of the elds in the EIB associated with the program. v Modify most elds of the EIB. (See the CICS Application Programming Referencefor a complete list of elds). You cannot modify the following elds: EIBTASKN EIBFN EIBRCODE EIBRSRCE EIBSYNC
317
CEDF
v v v v Display the programs working storage in hexadecimal and character form. Switch off debug mode and continue running the application normally. Force an ABEND. Request that command displays are suppressed until one or more of a set of specic conditions is fullled. These conditions are: EDF encounters a specic named command. EDF encounters any error condition for which the system action is to abnormally terminate the task. EDF encounters a specic exceptional condition. EDF encounters the command at a specic line number (assuming the program had been translated using the cicstran command with the -d option). EDF encounters an abnormal termination. The task terminates normally. The task terminates abnormally. Stopping the application run: When you request stop conditions, the Execution Diagnostic Facility (EDF) displays a skeleton menu, as shown in the following gure. After you have suppressed displays with the SUPPRESS DISPLAYS function, you can use this menu to specify one or more conditions that cause EDF to stop your transaction and start redisplaying commands.
TRANSACTION: ABCD PROGRAM: ABCDPROG TASK DISPLAY: 00 STATUS: DISPLAY ON CONDITIONS COMMAND: EXEC CICS LINE NUMBER: CICS EXCEPTIONAL CONDITION: ANY CICS ERROR CONDITION YES TRANSACTION ABEND YES NORMAL TASK TERMINATION YES ABNORMAL TASK TERMINATION YES ENTER: CURRENT DISPLAY PF1 : HELP PF2 : UNDEFINED PF4 : SUPPRESS DISPLAYS PF5 : WORKING STORAGE PF7 : UNDEFINED PF8 : UNDEFINED PF10: UNDEFINED PF11: UNDEFINED NUMBER: 0000000098
EDF uses the functions in this menu to reduce the amount that you need to intervene when you check a partly working program. You can stop the transaction: v When a specied command is encountered v When a specied exceptional condition occurs while performing a command
318
CEDF
v v v v When any error condition occurs while performing a command When a transaction abend occurs while performing a command At normal task termination At abnormal task termination
You can also stop the transaction on a specied line. You can only do this if you specied the -d ag when you used the cicstran or cicstcl command to translate the program. Note: If you have link-edited two or more objects to form one CICS program, and each has been translated with the -d ag, there may be several source les with CICS statements at the line you specify. EDF stops at the rst line that you specied that has a CICS statement, which might not be the source le that you intended. In this situation, continue to use the same stop condition until EDF stops at the specied line in the source le you wanted. While you are debugging a transaction originating from a remote system, the transaction has its own set of stop conditions that apply only to that transaction. However, when a transaction ends and you choose to continue the EDF session, typically when debugging a pseudoconversational sequence of transactions, CICS maintains the current stop conditions against the Communications Denitions (CD) entry for the remote system. Any subsequent transaction originating from the remote region inherits these stop conditions. This continues until CICS maintains a new set of stop conditions against the same CD entry. The new set of stop conditions overwrites the previous ones. For example, two users are running EDF to debug two transactions, A and B, originating from the same remote system. Transaction A ends, and the rst EDF user chooses to continue the EDF session. CICS maintains the stop conditions that were in force for transaction A against the CD entry for the remote system. Then transaction B terminates, and the second EDF user chooses to continue the EDF session. CICS maintains the stop conditions that were in force for transaction B against the same CD entry for the remote system. These stop conditions replace those from transaction A (which CICS loses). Any further transactions originating from the remote system begin with the stop conditions from transaction B. Running CEDF: You must specify the same TSLCheck value in the Transaction Denitions (TD) entry for the CEDF transaction as that specied for the user transaction. Therefore, to use internal security, both must be set to internal, or to use an External Security Manager (ESM), both must be set to external.
Chapter 3. CICS-supplied transactions
319
CEDF
To invoke EDF, you must have a TSLKey that matches the TSLKey dened for the CEDF transaction in the TD. In addition, to test a particular transaction, you must have a TSLKey that matches the TSLKey for that transaction. If this condition is not satised, CICS terminates the EDF session immediately and the following message is displayed:
Security violation: Security check does not allow debug access
By default, CICS makes resource level security checks when running the transaction under test, unless you redene the CEDF transaction as not requiring these checks. To redene the CEDF transaction, edit the TD for CEDF. If a transaction has no resource level security checks, and you do not redene the CEDF transaction, the default resource level security checks will cause a security violation, the CEDF transaction will fail, and an error message is written to CSMT. If security checks indicate that you are not allowed access to the resource, your transaction raises the NOTAUTH condition. Unless you choose to handle this condition, CICS abnormally terminates your transaction. If a transaction that can be run under EDF is already running on the specied terminal or is inbound from the system, EDF associates itself with that transaction. Otherwise, EDF associates itself with the next transaction that can be run under EDF. When an application program running under EDF ends, the following message is displayed on screen:
Continue this EDF session?: YES/NO?
If you choose no, the EDF session on the terminal ends. If you choose yes, EDF associates itself with the next possible transaction on the specied terminal. Note that, if you are running an EDF session on a terminal and another user tries to run an EDF session on the same terminal, the EDF session transfers to the new user for the next transaction, even though you can request to continue the EDF session and will get the conrmation message:
EDF SESSION CONTINUED
You run EDF on a different physical terminal, or window, to the transaction to be tested. See the CICS Application Programming Guide for related information.
320
321
CEMT
Table 8. The CEMT extended parameters used with INQUIRE and SET (continued)
Extended parameter NETNAME(netname) Description of extended parameter Inquire upon certain network name attributes. Network name attributes cannot be SET. See CEMT INQ/SET NETNAME on page 340 for complete details. Inquire upon and set certain program and map attributes in the runtime database. See CEMT INQ/SET PROGRAM on page 342 for complete details. Inquire upon and set runtime task attributes. See CEMT INQ/SET TASK on page 344 for complete details. Inquire upon and set runtime task class attributes. See CEMT INQ/SET TCLASS on page 347 for complete details. Inquire upon and set certain transient data queue attributes in the runtime database. See CEMT INQ/SET TDQUEUE on page 348 for complete details. Inquire upon and set runtime terminal attributes. See CEMT INQ SET TERMINAL on page 351 for complete details. Inquire upon and set whether the trace facility is on or off. See CEMT INQ/SET TRACE on page 353 for complete details. Inquire upon and set runtime transaction attributes. See CEMT INQ/SET TRANSACTION on page 354 for complete details.
PROGRAM
Read also Concepts of Inquire and Set Operations on page 328. INQUIRE As described in Inquiring upon CICS system parameters using CEMT on page 355, you can inquire about the following system parameters:
Table 9. The CEMT extended parameters used with INQUIRE only
Extended parameter AKP APPLID DATEFORM INTROINTVL LOCALE Description of extended parameter How often CICS writes checkpoint records. The eight-character name that identies the CICS region. The date format used by the EXEC CICS FORMATTIME command. The number of minutes between invocations of the CICS private transaction that checks the integrity of the region. The value of the region-wide locale. The term locale is used to refer to a subset of a users environment that denes conventions for a specied culture, such as time formatting, numeric formatting, monetary formatting, and character classication, conversion, and collation. Refer to your operating system documentation for more information about locales and how they are used.
322
CEMT
Table 9. The CEMT extended parameters used with INQUIRE only (continued)
Extended parameter MAXREGIONPOOL MAXTASKSHPOOL OPREL OPSYS REGIONTHRESH RELEASE SYSID TASKSHTHRESH Description of extended parameter The maximum region pool size required by CICS. The maximum task shared pool size required by CICS. The operating system release number. A one-character abbreviation of the operating system. When CICS should report that it is running out of Region Pool storage. The CICS release level. The four-character CICS region identier. When CICS should report that it is running out of Task Pool storage.
2. If you want to inquire about a resource, enter INQUIRE (or a suitable abbreviation) on the command line. If you want to perform a function that is not concerned with resource status, enter PERFORM (or a suitable abbreviation) on the command line. The only function available in CICS is PERFORM SNAP. If you want to set, or change, the value of a resource, enter SET (or a suitable abbreviation) on the command line.
323
CEMT
Entering any of the three keywords cause CICS to display a screen detailing the options available with the command. Each option is displayed with its minimum permitted abbreviation in uppercase characters and the remainder in lowercase. For example, if you enter INQ, you get the following screen:
I STATUS:
AUTInstmode TClass AUXtrace TRACe DUMP TRANsaction DUMPOptions FEConnection FENode FEPOol FEPRopset FETarget FIle TDqueue TErminal Netname Program TAsk APPLID=region7 PF 1 HELP 3 END 9 MSG
You can inquire upon any of the displayed options by typing its keyword after INQ on the command line. For example,
CEMT INQ PROGRAM
tells you the name of each program, what language it is written in, and whether it is enabled or disabled. System parameters The CICS system parameters are a subset of the attributes that are dened in the Region Denitions (RD). You can use CEMT to nd out the values of these parameters. For further information, see Inquiring upon CICS system parameters using CEMT on page 355. See the CICS Administration Guide for information about the CICS resource level security checking mechanism.
324
CEMT
v Information (19 lines on a 24 x 80 screen) v PF Key Values (the last line of the screen). Command input This is the rst line of the screen. You use this line to enter any of the CEMT commands described in Concepts of Inquire and Set Operations on page 328 and CEMT PERFORM SNAP on page 330, for example:
INQ FILE(*)
Information This is the main area of the screen between the command input area at the top and PF key values at the bottom of the screen. CICS uses this area to display options that you can use in the current command context, or information that you have requested about a set of resources. Program function (PF) key values The following list explains the meanings of the program function (PF) keys, which appear on the bottom line of the CEMT screen. If your keyboard does not have PF keys, you can position the cursor under the required instruction on the screen using the tab keys, and press the ENTER key. PF1 PF3 displays help. exits from CEMT, so requests that CICS terminates your CEMT transaction and ends the session. However, if you use this key when modifying your screen, for example, by keying in a new command, or by overtyping an old command, CICS ignores the request and does not end your session. scrolls back half a page. scrolls forward half a page. expands messages. If CICS generates more than one message in response to your request, CICS displays a message near the bottom of the screen telling you how many messages have been generated. The PF9 key allows you to display all the messages on a separate screen. To go back to your original screen, press the ENTER key. scrolls back a whole page. scrolls forward a whole page.
PF10 PF11
325
CEMT
Scrolling symbol (+ sign) A plus (+) sign on the rst or last line of a screen tells you that there is more data preceding or following the current screen. Scrolling backward reveals data above, and scrolling forward reveals data below. All parameter Many of the request formats contain the ALL parameter. For INQ this is a default which CEMT assumes if you do not specify an alternative. For example: INQ TERMINAL shows the attributes of all terminals (default is ALL). INQ TERMINAL ALL shows the attributes of all terminals. SET TERMINAL PRI(4) is an invalid command (default is not ALL). SET TERMINAL ALL PRI(4) sets the priority of all terminals to 4. Family of resources (using asterisk and plus symbols) You can use the symbols asterisk (*) and plus (+) as part of an identier to specify a family of resources. * represents any number of characters (including none), and + represents a single character. For example: v A* species all identiers beginning with A. v TERM00+ species all seven-character identiers beginning with TERM00. Subdening resource groups When you make an inquiry, you can subdene a resource group by specifying one or more attributes of the group, for example:
INQ TERMINAL ALL INSERVICE
displays the status of all terminals that are in service. You cannot subdene a resource group by specifying the attributes of a group by using SET. For example:
SET TERMINAL ALL INSERVICE PRIORITY(4)
puts all terminals in service and sets the priority to 4. However, you can manage such groups of resources by specifying INQ, and modifying the screen produced.
326
CEMT
Inquiry When you make an inquiry, you get a screen that consists of at least one line of status information for each resource in the specied group. CICS displays the status information as a list of abbreviated keywords. Overtyping You can move the cursor to any alterable eld in a line and change its contents by overtyping. When you press the ENTER key again, CICS reads the contents of all elds that you have changed, and performs any valid operations implied by the changes. If you make an invalid change, CICS displays an error message and does not change the eld. The values for each eld are not case sensitive, so you can overtype elds with lowercase or uppercase characters. CEMT accepts an abbreviation in elds that allow only certain values, such as the READABLE and NOTREADABLE eld. Examples: 1. If you overtype the READABLE and NOTREADABLE eld with the character R (in uppercase or lowercase) followed by any other character (or no character at all), CEMT allocates the value READABLE to the eld. 2. If you overtype the READABLE and NOTREADABLE eld with the character N (in uppercase or lowercase) followed by any other character (or no character at all), CEMT allocates the value NOTREADABLE to the eld. 3. If you overtype the ON and OFF eld with the characters OF (in uppercase or lowercase), CEMT allocates the value OFF to the eld. If the eld allows the values "value" and "NOTvalue" and you overtype the eld with spaces, CEMT allocates the default value to the eld. If the original value of the eld is "NOTvalue", CEMT displays the eld as a blank eld. For example, if you overtype the READABLE and NOTREADABLE eld with spaces, CEMT allocates the value NOTREADABLE to the eld. Whenever you overtype a screen, CICS takes that particular action and also refreshes all the status information. You can avoid the associated overheads either by using the SET command, or by limiting your inquiry to a specic number of resources.
327
CEMT
Tab key The elds you can change are different in each screen, but you can detect them by pressing the Tab key repeatedly. This moves the cursor from one eld to the next, and you can then overtype the eld with the appropriate information. Although you can move to the PF key elds at the bottom of the screen by pressing the Tab key, overtyping these elds has no effect. If you press the Enter key when you are in one of these elds, the result is the action of that PF key. Blank elds Some screens contain blank elds that allow you to specify parameters, such as NEWCOPY and PURGE, that are not part of the status of a resource. A status, such as NOREAD, that begins with NO is also represented by a blank eld. You can use the Tab key to detect these elds.
328
CEMT
STATUS: RESULTS - OVERTYPE TO MODIFY fil(file1 ) Sfs Clo Ena Rea Upd Add Bro Del bas( sfs2 ) idx( index2 ) fsc( /.:/cics/sfs/server1 )
For SET, you must specify a resource identier as an argument, a generic argument, or ALL. ALL is not a default. For example: SET TERMINAL INSERVICE produces an error because there is no resource identier. SET TERMINAL(TRM1) INSERVICE sets TRM1 in service. SET TERMINAL(TRM*) INSERVICE sets all terminals in service whose identiers start with TRM. SET TERMINAL ALL INSERVICE sets all terminals in service. You can specify a list of resource identiers, rather than a single one. Separate the items in the list by blanks. If you do not specify a parameter, for example, inservice, the resource takes the default attributes that have been set in the region denitions for that resource. In the preceding example, this is the Terminal Denitions (WD).
329
Options DUMP species that CICS produce a dump. DUMP is the default, so you do not have to specify this parameter. To obtain a dump and continue running CICS, use the PERFORM SNAP command. In effect, you obtain a snapshot of the CICS region. CICS always returns a response code 0 (NORMAL), whether or not the dump is successful. Note: The use of CEMT PERFORM SNAP prevents all other tasks from running, so other terminal users can experience long delays in response. On CICS for AIX only: A CICS SNAP DUMP cannot be taken when the IBM Application Debugging Program is active. If you do take a dump with IBM Application Debugging Program switched on, the dump does not complete. To turn the IBM Application Debugging Program on and off, use Application Diagnosis Conguration (CDCN).
330
Options PROGRAM(programName) is used to specify the name of the autoinstall user program. A default program is supplied. You use this transaction to inquire upon and set the name of the terminal autoinstall program. For guidance information about the automatic installation of terminals (autoinstall), see Terminal autoinstall user program on page 390. Examples To set the name of the autoinstall program to AUTOINST:
CEMT SET AUTOINSTALL PROGRAM(AUTOINST)
331
Options OFF stops recording entries in the auxiliary trace le and closes the le. ON opens the auxiliary trace le if it was not previously opened, and starts recording entries in that le. CICS does not record auxiliary trace entries, however, unless internal trace is active at the same time. In this way, you can control auxiliary tracing by activating and deactivating internal trace. SWITCH closes the current auxiliary trace le, then opens the alternate trace le. The status of auxiliary trace (on or off) remains as it was before the switch request, unless the second le cannot be opened. If the second le cannot be opened, CICS turns off auxiliary trace. CICS writes trace entries to the auxiliary trace le if both internal tracing and auxiliary tracing are in effect. Internal tracing can be started and stopped using the CEMT SET TRACE command. This transaction allows you to inquire whether auxiliary tracing is on or off, set auxiliary tracing on or off, and inquire which auxiliary trace le is active. See the CICS Application Programming Guide for related information.
332
Options OFF sets the system dump ag off. ON sets the system dump ag on. This transaction allows you to inquire upon and set the system dump ag. This ag controls whether a system dump is produced or suppressed. The default setting is obtained from the SysDump attribute in the Region Denitions (RD). Examples To set the system dump ag on:
CEMT SET DUMP ON
333
Options ABDUMP selects a CICS system dump if a transaction abnormally terminates with code ASRB (system call abnormal termination). This is the default. NOABDUMP selects no CICS system dump for ASRB transaction abnormal terminations. A transaction dump might still be produced, depending on the TransDump attribute in the Transaction Denitions (TD). NOPCDUMP selects no CICS system dump if a transaction abnormally terminates with code ASRA (signal or exception). A transaction dump might still be produced, depending on the TransDump attribute in the Transaction Denitions (TD). PCDUMP selects a CICS system dump for ASRA transaction abnormal terminations. This is the default. This command allows you to select whether a system dump is required in some situations. This command updates the ABDump, or PCDump attributes, or both, in the runtime Region Denitions (RD). PCDump and ABDump take effect only if the system dump ag is set to yes in the runtime RD. The system dump ag is the SysDump attribute in the RD. Examples To request a CICS system dump if a transaction abnormally terminates with code ASRB, but no CICS system dump if a transaction abnormally terminates with code ASRA:
CEMT SET DUMPOPTIONS ABDUMP NOPCDUMP
334
CEMT INQ FILE[(leName)] [SFS | REMOTE ] [UNENABLED] where: Options ADD means records can be added to the le. BASENAME (baseName) species the Structured File Server Denitions (SSD) name for the le. BROWSE means records in the le can be browsed. CLOSED means the le is closed; the access method does not allow accesses to the data until the le is opened. The le may be opened either explicitly by you, or, if the le has the ENABLED attribute, implicitly by CICS on the next reference to the data. When used with SET, the le is closed and also disabled. (The le is disabled to prevent access requests from implicitly opening the le again.) The close is effected at the time of the command only if there are no tasks currently accessing the le. If there are current users, the screen indicates CLOSE requested. This means that when the last user completes his use of the le, it effects the close. Note that a le that has been disabled by means of a SET CLOSED command becomes enabled again by a subsequent SET OPEN command. To distinguish between a le that is disabled in this way from one that is disabled by means of a SET DISABLED command, CICS displays the former with the UNENABLED attribute.
335
336
2. To set le FILE1 to have read and write permission, but no update permission:
CEMT SET FILE(FILE1) READ ADD NOUPDATE
337
Options journalNumber is the journal number. This number can be in the range 1 to 99. CLOSED closes the journal. The journal can now be read by an offline program. DATASET(suffix) shows the status of the disk le associated with the journal. suffix can be A or B, and species the disk le DISKA or DISKB. The status can be CURRENT, showing that the specied disk le is currently active, or READY, showing that the specied disk le is not active. OUTPUT opens the journal for output. The journal must be closed before it can be read by an offline program. SWITCH switches between the two disk les, DISKA or DISKB, associated with each journal. This transaction allows you to inquire upon and set whether the journal can be read by an offline program. You can switch a journal between disk les, so it remains available to CICS, but its contents are moved offline for further processing, for example, archiving or deleting. Examples 1. To inquire about the status of all journals:
CEMT INQUIRE JOURNAL ALL
338
Options OFF switches monitoring off. ON switches monitoring on. Examples To switch performance monitoring off:
CEMT SET MONITOR OFF
This transaction allows you to inquire upon and set whether performance monitoring is on or off. See the CICS Administration Guide for related information.
339
Options netName is the name by which a terminal is known to the network. Wildcards are not accepted for this command. The remaining parameters are identical to those for INQ TERMINAL. ATI means the terminal is available for use by transactions that are initiated automatically from within CICS. INSERVICE means the terminal is available for use. NOATI means the terminal is not available for use by transactions that are initiated automatically from within CICS. You cannot specify both NOATI and NOTTI. NOTTI means the terminal is not available for use by transactions that are initiated from this terminal. You cannot specify both NOTTI and NOATI. OUTSERVICE means the terminal is not available for use. PRIORITY(value) is the priority of a terminal relative to other terminals. The priority of a task is the sum of the transaction priority, the terminal priority, and the user priority. The value is in the range from 0 to 255, where 255 is the highest priority. TERMINAL(termId) is the name by which the terminal is dened in the Terminal Denitions (WD). TRANSACTION(transId) is the name of the transaction currently running with this terminal as its principal facility.
340
If the response screen shows TTI, the terminal is available for use by transactions initiated from the terminal.
341
COBOL means the program is written in COBOL. DISABLED means the program is not available for use. You cannot disable programs whose names begin with DFH, because these are reserved for use by CICS. ENABLED means the program is available for use. NEWCOPY allows you to get an updated version of a program or a map, or to restore a map that has been overwritten in main storage. When NEWCOPY is not used, CICS will only recognize new versions of programs when they are not in a program cache or in Micro Focus COBOL runtime memory. If this is the case, use NEWCOPY to get the updated version. The loading of Micro Focus COBOL programs is controlled by the environment variable COBSW. The new version of the program may not be available immediately after NEWCOPY is issued: v In the case of a C program, the new version will not be loaded while the version in the application servers C program cache is still being used. v In the case of a COBOL program, the new version will not be loaded while any COBOL application programs are still being used, as the COBOL runtime must be reloaded to remove the old version of the program. Reloading the runtime will then cause all COBOL programs to be refreshed.
342
343
Options taskNumber is the CICS-generated task number. You cannot use an asterisk (*), or a plus sign (+). If you do not specify a task number, the command applies to all tasks.You cannot display or change system task attributes. System tasks are those tasks started (and used internally) by CICS, not as a result of a user transaction. DEST means the task has been initiated by a transient data queue trigger level. DISPATCHABLE means the task is ready to run. FACILITY(facilityId) returns a four-character string representing the name of the facility associated with the named task. If the task was initiated from a terminal (FACILITYTYPE of TERM), FACILITY returns the name of the terminal. If the task was initiated by a destination trigger level as dened in the Transient Data Denitions (TDD) (FACILITYTYPE of DEST), FACILITY returns the name of the associated transient data queue. Otherwise, a null value (blanks) is returned. INDOUBT means that the task is in the in doubt state during syncpoint processing. INFLIGHT means that CICS has initiated the task, but no attempt has yet been made to commit any changes that may have been made to recoverable resources during the current unit of work. PROCESSID(processId) the process id of the process running the transaction associated with the task. PURGE | FORCEPURGE means CICS abnormally terminates the task:
344
345
346
Options classId identies the class to which the task belongs. In CICS on Open Systems or CICS for Windows NT, this value can only be 1.If you specify the special characters + or *, the value is set to 1. MAXSERVERS (numServers) is the maximum number of application servers permitted to implement tasks for the classId specied in TCLASS. MINSERVERS (numServers) is the minimum number of application servers required to implement tasks for the classId specied in TCLASS. Note: If you increase MAXSERVERS to a number greater than the number of actual application servers running, the extra servers will be started automatically. Similarly, if you decrease MINSERVERS below the actual number running, the extra servers will be stopped. Examples 1. To inquire upon all runtime task classes with a maximum number of servers set at 10:
CEMT INQ TCLASS MAXSERVERS(10)
347
Options TDQname is a four-character name dened in the TDD. On a SET, the destId cannot relate to a REMOTE or INDIRECT queue. CLOSED means the TD queue is closed. The access method does not allow accesses to the data until the queue is opened. The queue must be opened explicitly by you using CEMT. When used with SET, the queue is closed and also disabled. (The queue is disabled to prevent access requests from implicitly opening the queue again.) The close occurs at the time of the command only if there are no tasks currently accessing the queue. If there are current users, the screen shows CLOSING. This means that when the last user no longer requires the queue, CEMT effects the close. DISABLED means the queue is not available for use by applications except for those that are already using it. If there are any such users, CICS also displays DISABLING. When used with SET, this command has no effect on existing users, but it prevents new users accessing the queue. The queue can be re-enabled by SET ENABLED. ENABLED means the queue is available for use by applications and, if closed, it is opened in the rst request. EXTRA means the queue is dened as extrapartition. Note: The term extrapartition transient data is used to describe a CICS facility that temporarily saves data in the form of queues, called destinations. Extrapartition destinations are used for data that is
348
349
350
If you are familiar with network names, you may prefer to use CEMT INQ/SET NETNAME on page 340, which uses these names. Options termId is the four-character identier. ATI means the terminal is available for use by transactions that are initiated automatically from within CICS. INSERVICE means the terminal is available for use. NETNAME(netName) is the name by which the terminal is known to the network. NOATI means the terminal is not available for use by transactions that are initiated automatically from within CICS. You cannot specify both NOATI and NOTTI. NOTTI means the terminal is not available for use by transactions that are initiated from this terminal. You cannot specify both NOTTI and NOATI. OUTSERVICE means the terminal is not available for use. If you set a terminal to OUTSERVICE, transactions can no longer use the terminal and CICS releases the terminal and signs the user off, either immediately or when the current transaction terminates. If you also specify PURGE, CICS abnormally terminates any transaction using the terminal. If you do not specify PURGE, CICS allows the transaction to terminate normally, but does not allow further transactions to use the terminal.
351
2. To set the terminal named TRM6 out of service, and abnormally terminate any transactions currently using the terminal:
CEMT SET TERMINAL(TRM6) OUTSERVICE PURGE
This transaction allows you to inquire upon and set runtime terminal attributes. Unless the termId contains the special * and + characters, it must be dened in the Transaction Denitions (TD).
352
Options OFF switches trace off. ON switches trace on. Note: You must set this facility ON if you want to use auxiliary trace. Examples To switch trace off:
CEMT SET TRACE OFF
353
Options where: transId is the four-character transaction identier. DISABLED means the transaction is not available for use. You cannot disable transactions that have identiers beginning with C because these are reserved for use by CICS. ENABLED means the transaction is available for use. PRIORITY (value) is the priority of a transaction relative to other transactions. When a transaction is running as a CICS task, the priority of a task is the sum of the transaction priority, the terminal priority, and the operator priority. The value must be in the range from 0 to 255, where 255 is the highest priority. Note: Unless the transId contains the special * and + characters, it must be dened in the Transaction Denitions (TD). Examples 1. To inquire upon all disabled transactions:
CEMT INQUIRE TRANSACTION DISABLED
354
Inquiring upon CICS system parameters using CEMT Inquiring upon CICS system parameters using CEMT
To inquire upon CICS runtime system parameters. Syntax
CEMT INQUIRE
Description To inquire upon CICS runtime system parameters, type CEMT INQ. When the panel shown in Figure 1 on page 324 is displayed press ENTER again to display the system parameters. The meaning of these parameters is as follows: Options AKP is how often CICS writes checkpoint records. The value is the cumulative number of writes to the log made across all CICS application servers in the region. APPLID is the eight-character name that identies the CICS region uniquely across all CICS regions. DATEFORM is the date format used by the EXEC CICS FORMATTIME command. The three possible values are: mmddyy is the date in the form month-day-year. ddmmyy is the date in the form day-month-year. yymmdd is the date in the form year-month-day. INTROINTVL is the number of minutes between invocations of the CICS private transaction that checks the integrity of the region. LOCALE is the value of the region-wide locale. Note: The term locale is used to refer to a subset of a users environment that denes conventions for a specied culture, such as time formatting, numeric formatting, monetary formatting, and character classication, conversion, and collation. Refer to your operating system documentation for more information about locales and how they are used.
Chapter 3. CICS-supplied transactions
355
N Windows NT REGIONTHRESH is when CICS should report that it is running out of Region Pool storage. The threshold is a percentage value of the total allocation. RELEASE is the CICS release level. For example, the value 0210 indicates version 2, release 1, modication level 0. SYSID is the four-character CICS region identier. TASKSHTHRESH is when CICS should report that it is running out of Task Pool storage. The threshold is a percentage value of the total allocation. You can view, but not modify, CICS runtime system parameters. Type CEMT INQ (without a keyword), press the ENTER key twice, and follow the screen prompts. CICS displays a screen showing a subset of the system parameters, dened and managed using the CICS resource denition online (RDO) facility.
356
Syntax
CSSF [EXIT | GOODNIGHT] CESF [EXIT | GOODNIGHT]
Description
When you run CESF or CSSF the following occurs: v If you are attached to a local region (not as a part of a transaction routing session), the connection between you and CICS is broken and a signoff message is written to the terminal. v If you are attached to a remote region through the CICS 3270 Terminal Emulator, cicsterm, you are returned to the parent process. v If you are attached to a remote region through transaction routing (CRTE), you remain attached to the remote region, but your userid becomes the default user of the remote region. (Refer to CRTE (Routing Transaction) on page 364). v If you used CESN to change your userid on the local region, the connection between you and CICS is broken, but you remain logged in to the same DCE userid as you were in before entering CICS. Note: The TSLKey should not be changed in the Transaction Denitions (TD) entries for either CESF or the CSSF as they should always have public access. Starting and ending CESF and CSSF: You start the CESF or CSSF transaction directly by entering the tranid CESF or CSSF. The transaction ends when you are logged off.
Options
EXIT causes CICS to sign you off the terminal, but does not set the terminal out of service. This is the default option. GOODNIGHT causes CICS to sign you off the terminal and sets the terminal out of service (disabled) and unavailable for further CICS use. This option is ignored when the terminal is remote or when the terminal is
357
Examples
v To sign off and leave the terminal in service:
CSSF
v To sign off and set the terminal out of service (for local terminals that are not autoinstalled):
CSSF GOODNIGHT
358
Description
CESN is the CICS signon transaction. When you use the CESN transaction, the following is displayed:
CESN - CICS SIGNON APPLID applId Type your userid and password, then press ENTER: Userid . . . . ________ Password . . . ________ New Password . . . ________ Please type your userid. F3=Exit
When you see this screen: 1. Enter a userid. If you are using DCE authentication, CICS establishes a corresponding DCE principal from this userid. If a User Denitions (UD) entry exists for this userid, the DCE principal is specied in the UD entry with the Principal attribute. If no UD entry corresponds to this userid, or if no value is specied with the Principal attribute of the UD entry, then the userid is passed to DCE as the DCE principal. If you are not using DCE authentication, the userid and password must match those stored in a User Denition. 2. Enter the password corresponding to the DCE principal established in Step 1. The password cannot be more than eight characters, nor can it be all blanks or spaces. 3. (optional) Enter a new password to replace the one entered in Step 2. You will be prompted to enter the new password a second time for verication. If you want to exit the signon panel immediately, press F3. If verication of the DCE principal and password succeed, you are logged in as the CICS userid that you entered. (If no UD key exists for that userid, you will become the regions default userid.) If DCE does not verify the principal and password (if no DCE principal exists or if the password is not correct), the terminal session defaults to the regions
Chapter 3. CICS-supplied transactions
359
CESN
default userid and you are given access to those transactions and resources with TSL and RSL keys that match those listed in the UD entry for the regions default userid. You may use CESN to change the userid you are signed on as. For example, if you are signed on as BERT, you may use CESN to sign on as ERNIE. However, CICS signons are not nested. If the signon as ERNIE fails, or if you sign off using CESF while using CRTE, your userid reverts to the regions default userid rather than BERT. When you use CESN to sign on as a different user from a CICS client (for example, on Open Systems use cicsterm, and for Windows NT use cicslterm, the DCE context of the client is not affected. This means that CICS does not change the ticket limit and ticket expiry refresh limit account information for the CICS client that you are using. For example, if user BERT (who has a ticket of one hour) accesses CICS using cicsterm, and uses CESN to sign on as ERNIE (who has a ticket of eight hours), the original ticket being used by cicsterm remains unchanged. BERTs ticket expires after its one hour life and his network authentication expires and the user can no longer access the region even though CESN was used to use ERNIEs userid. All that really changes when you use CESN to change your userid is the specics dened for the UD entry, such as the transactions and resources you are given access to. To regain the original userid after having changed it with CESN (whether or not you were able to log on to a valid CICS userid) either sign on again using CESN, or use the sign off transaction, CSSF, and restart your terminal session. The same userid can be signed on at more than one terminal concurrently. CICS does not check to see if a particular userid and password have been used in a previous signon request. CICS writes messages to CSMT as a record of your signon. The CESN transaction is pseudo-conversational. You should never change the TSLKey attribute of the Transaction Denition for CESN. Starting and ending CESN: You start the CESN transaction directly by entering the tranid CESN. The transaction ends when you have successfully logged on or when the logon is rejected.
360
CESN
See the CICS Intercommunication Guide for information about the security considerations when signing on to a CICS system during transaction routing.
361
Syntax
CMLV
Description
CMLV is a CICS-supplied transaction that seamlessly browses the console.nnnnnn les for the region in which it is running. It can be used to browse the console message log for another region by running it remotely using CRTE. The name of the region for which the console message log is being displayed is shown in the top left hand corner of the CMLV map in the APPLID eld. When CMLV is invoked it makes a copy of the console log and browses the copy. Any changes to the original le cannot be seen unless the refresh function (PF9) is used. CMLV displays 160 characters per logical line. Any messages that exceed this length are split onto 2 or more lines. In order to maximise the number of messages displayed, only 80 characters of each line are displayed at any one time. Scrolling functions are available to scroll to the end of a line. Using CMLV: The program function keys have the following functions: PF1 PF3 PF4 PF5 PF7 PF8 PF9 displays the help information for the console message log viewer transaction. exits from the log viewer and clears the screen. displays the rst page of the le. displays the last page of the le. scrolls backwards. scrolls forwards. closes the le and reopens it. This allows any changes since CMLV was invoked to be displayed. The refresh operation returns the display to the start of the le. scrolls the display left by 40 characters. scrolls the display right by 40 characters.
PF11 PF12
362
CMLV
CLEAR exits from the log viewer and clears the screen.
363
Syntax
CRTE SYSID{=sysId | (sysId) }
Options
sysId is the four-character key of the Communications Denitions (CD) entry that denes the remote region where the transaction is to run. Example: To route to the remote region whose local CD denition is called REG1:
CRTE SYSID=REG1
Description
You can use CRTE to run transactions that reside on a connected remote CICS system, instead of dening these transactions as remote in the local system. CRTE is particularly useful for infrequently used transactions, or for transactions such as CEMT that reside on all systems. It avoids the necessity of dening the remote CEMT in the local system with a different name. The transactions run can include pseudoconversational transactions as well as CRTE itself. The terminal through which CRTE is run must be dened on the remote system (the application-owning region) or it must be shipped from the local region (the terminal-owning region). See the CICS Intercommunication Guide for additional information. The routing transaction veries that the specied remote region is known and is available. If it is, a message displays conrming that a routing session to the required region is started. You can then clear the screen and enter the transaction code for the transaction to be run on that system, and you enter input of the form: yyyyzzzzzz... where yyyy is the name by which the required remote transaction is known on the remote region, and zzzzzz... is the initial input to that transaction. Subsequently, you can use the remote transaction as if you have dened it
364
CRTE
locally and run it in the ordinary way. In fact, you use the terminal as if it were connected directly to the remote region. When using CRTE, security checking on the remote system is not affected by the userid you used to sign on to the local system. Instead, security checking depends on whether or not you sign on using CESN while using CRTE. v If you do not sign on (if you do not use CESN), you are given the remote regions default userid. When a transaction is run, the security checks are carried out against this default user. A check is also done against the link userid to see whether the remote system itself has authority to access the resource. Thus, access is granted to those resources dened for the default userid that are also dened for the link userid. If a link userid is not specied, then access is granted to those resources dened for the default userid that are also dened in the Communications Denitions (CD) entry TSLKeyMask and RSLKeyMask attributes. v If you do sign on to the remote region while running CRTE (using CESN), access is granted to those resources dened for the signed on userid that are also dened for the link userid. If a link userid is not specied, then access is granted to those resources dened for the default userid that are also dened in the Communications Denitions (CD) entry TSLKeyMask and RSLKeyMask attributes. You end a routing session by entering the CANCEL keyword. This keyword automatically signs you off from the connected region (assuming you were signed on in that region). When a routing session is ended, CICS displays the message:
ROUTING SESSION TO SYSTEM sysId TERMINATED
If you have used CRTE to route transactions through more than one system, you must enter CANCEL the same number of times as you entered CRTE to end the routing session. Note: In a chain of CRTE sessions, different systems may be in different locales. The term locale is used to refer to a subset of a users environment that denes conventions for a specied culture, such as time formatting, numeric formatting, monetary formatting, and character classication, conversion, and collation. Refer to your operating system documentation for more information about locales and how they are used. Although the routing transaction is implemented as a pseudoconversational transaction, CICS holds the terminal from which the transaction is run until CICS terminates the routing session.
365
CRTE
While a terminal is in a routing session with another region (that is, during the period between entering CRTE and CANCEL) the terminal cannot receive messages delivered by automatic transaction initiation (ATI). Starting and ending CRTE: You start the CRTE transaction directly by entering the tranid CRTE. The transaction ends when the CANCEL keyword is used. See CESN (Signon) on page 359 for information about what userid is used and what level of security you are given when using CRTE to change userids after you have used CRTE. See also the CICS Intercommunication Guide for related information.
366
Syntax
CSTD
Description
CSTD is a CICS-supplied transaction that displays statistics information for: v Temporary storage and transient data v Storage pools v Tasks v Intersystem communication v Files v Terminals v Transactions v Programs To gather these statistics, CSTD uses the EXEC CICS COLLECT STATISTICS command (see the CICS Application Programming Reference for information on this command). Using CSTD: When you enter CSTD the following screen is displayed:
CSTD 01/17/96 11:02:09 CICS Statistics Display Option ===> 1 3 5 7 9 11 TS and TD Statistics Miscellaneous Statistics File Statistics Program Statistics Class Max Task Statistics Transaction/Program Rates 2 4 6 8 10 12 Pool Storage Statistics ISC Details Statistics Terminal Statistics Transaction Statistics ISC Summary Statistics Set/Display Statistics
Select the statistics you want by entering the relevant number and pressing Enter. Program function (PF) key values:
367
CSTD
The program function keys have the following functions: Enter Clear PF3 PF5 PF6 refreshes the display exits from CSTD Returns to the main CSTD menu Stop auto update Start auto update
PF7 (when displayed) moves to the next screen of statistics PF8 (when displayed) moves to the previous screen of statistics Running CSTD: Choose the statistics you want to see by entering CSTD and selecting a category as shown in The CSTD screen on page 367. The statistics are then displayed. Setting Display inactive les to N causes CSTD not to display les that have zero values. Placing characters in the Start display with le: eld causes the display to start with the indicated characters. The terminal on which CSTD is running should be set to ATI. See the CICS Administration Guide for related information.
368
CICS/ESA only You can also use VTAM commands to manage communication with target systems. FEPI application programs, and the CICS resources they use, are controlled just like other CICS applications and resources.
369
Syntax
Press the Clear key to clear the screen. Type CEMT DISCARD (the minimum abbreviation is CEMT D), followed by any one of: FENODE(nodename) FEPOOL(poolname) FEPROPSET(propsetname) FETARGET(targetname). For example, cemt d fen(fepnode1) removes the node fepnode1 from FEPI. Typing ? at the beginning of either the rst or second line gives a syntax prompt.
CEMT DISCARD
CEMT Discard FENode(nodename) FEPOol(poolname) FEPRopset(propsetname) FETarget(targetname)
Options
FENode(nodename) The name of the FEPI node to be discarded. FEPOol(poolname) The name of the FEPI pool to be discarded. FEPRopset(propsetname) The name of the FEPI property set to be discarded. FETarget(targetname) The name of the FEPI target to be discarded.
370
Context
INQUIRE FECONNECTION displays information about the state of FEPI connections. A connection is identied by specifying the target and node. The results are given in order of target within the node. Family selection can be used for TARGET and NODE, but list selection cannot be used.
Syntax
Press the Clear key to clear the screen. There are two ways of commencing this transaction: v Type CEMT INQUIRE FECONNECTION (the minimum abbreviation is CEMT I FEC). You get a display that lists the current status. v Type CEMT INQUIRE FECONNECTION (CEMT I FEC) followed by as many of the other attributes as are necessary to limit the range of information that you require. For example, if you enter cemt i fec p(pool5) acq, the resulting display will show you the details of all FEPI connections in pool5 on which sessions are bound. You can tab to the highlighted elds and overtype them with new values. CICS/ESA only:
CEMT INQUIRE FECONNECTION
ALl CEMT Inquire FEConnection NODe(nodename) Target(targetname)
Pool(poolname)
INSTalled NOTinstalled
INSErvice Outservice
ACquired Released
State(value)
Waitconvnum(value)
Lacqcode(value)
371
Pool(poolname)
INSTalled NOTinstalled
State(value)
Waitconvnum(value)
Lacqcode(value)
Options
ALl is the default. Information about all connections is given, unless you specify a selection. NODe(nodename) is the 8-character name of a node. Information is restricted to connections of which this node forms part. Target(targetname) is the 8-character name of a target. Information is restricted to connections of which this target forms part.
Examples
CEMT IN FEC STATUS: RESULTS - OVERTYPE TO MODIFY Node(NODE1 ) Targ(TARGETA ) Pool(POOL5 ) Inst Inse Rele Stat(NOCONV ) Wait(00000) Lacq(X'08570002') Node(NODE1 ) Targ(TARGETB ) Pool(POOL5 ) Inst Inse Rele Stat(NOCONV ) Wait(00000) Lacq(X'08570002') Node(NODE1 ) Targ(TARGET3 ) Pool(POOL3 ) Inst Inse Rele Stat(NOCONV ) Wait(00000) Lacq(X'08570002')
Options
Node(value) displays the 8-character name of a node identifying a connection. Target(value) displays the 8-character name of a target identifying a connection.
372
CICS/ESA only If OUTSERVICE state has been requested but has not yet completed, a GOING OUT message is shown. Outservice The connection is out of service and cannot be used for any conversation. Goingout
CICS for OS/2 and CICS for Windows NT The connection is being put out of service. Acquired|Released|Obtaining|Freeing displays a value identifying whether a session on the connection is bound. The values are: Acquired A session is bound on the connection.
CICS/ESA only If RELEASED state has been requested but has not yet completed, a BEING RELEASED message is shown.
373
CICS for OS/2 and CICS for Windows NT A session is being bound on the connection. The connection remains in the OBTAINING state until all the criteria for ACQUIRED have been met. Freeing
CICS for OS/2 and CICS for Windows NT The session involving the connection is being unbound. State(value) displays a 12-character value identifying the state of the conversation using the connection. The values are: APPLICATION A normal application task owns the conversation BEGINSESSION A begin-session handling task owns the conversation FREE An end-session handling task owns the conversation, following a FEPI FREE command
NOCONV No conversation is active on the connection PENDBEGIN A begin-session handling task has been scheduled PENDDATA FEPI is waiting for inbound data, following a FEPI START command PENDFREE An end-session handling task has been scheduled, following a FEPI FREE command PENDPASS The conversation is unowned, following a FEPI FREE PASS command
374
CICS/ESA only displays a hexadecimal value indicating the result of the last acquire request for the node; that is, the sense code from the last VTAM REQSESS, a zero indicating success. For information about VTAM sense codes, see either the VTAM Messages and Codes or the SNA Formats manual.
375
CICS for OS/2 and CICS for Windows NT displays a hexadecimal value indicating the result of the last acquire request for the node; zero indicating success. For information about sense codes, see either the Conventional LUA Programming Reference manual or the SNA Formats manual.
376
Syntax
Press the Clear key to clear the screen. There are two ways of commencing this transaction: v Type CEMT INQUIRE FENODE (the minimum abbreviation is CEMT I FEN). You get a display that lists the current status. v Type CEMT INQUIRE FENODE (CEMT I FEN) followed by as many of the other attributes as are necessary to limit the range of information that you require. For example, if you enter cemt i fen inst, the resulting display will show you the details of all FEPI nodes that have been installed and are ready for use. You can tab to the highlighted elds and overtype them with new values. CICS/ESA only:
CEMT INQUIRE FENODE
ALl CEMT Inquire FENode (nodename) INSTalled Notinstalled INSErvice Outservice
ACquired Released
Lacqcode(value)
Lacqcode(value)
377
Examples
CEMT IN FEN STATUS: RESULTS - OVERTYPE TO Feno(NODE1 ) Inst Inse Acqu Feno(NODE2 ) Inst Inse Acqu Feno(NODE3 ) Inst Inse Acqu Feno(NODE4 ) Inst Inse Acqu
Options
Feno indicates that this panel relates to an FENODE inquiry. (value) displays the 8-character name of a node. Installed|Notinstalled displays a value identifying the install state of the node. The values are: Installed The node has been dened by INSTALL and is available for use. Notinstalled The node is being discarded, but is still in use. Inservice|Outservice|Goingout displays a value identifying the service state of the node. The values are: Inservice The node is in service and can be used in a conversation.
CICS/ESA only If OUTSERVICE state has been requested but has not yet completed, a GOING OUT message is shown.
378
CICS for OS/2 and CICS for Windows NT The node is being put out of service. Acquired|Released|Obtaihp0.ining|Freeing displays a value identifying the acquire state of the node. The values are: Acquired
CICS/ESA only The VTAM ACB for the node is open and the VTAM set logon start command has completed. If RELEASED state has been requested but has not yet completed, a BEING RELEASED message is shown. If this persists, you might need to use VTAM commands to recover the node.
CICS for OS/2 and CICS for Windows NT The node is acquired and, if in service, can be used in a conversation. Released
CICS/ESA only The VTAM ACB is closed. If ACQUIRED state has been requested but has not yet completed, a BEING ACQUIRED message is shown. If this persists, you might need to use VTAM commands to recover the node.
CICS for Windows NT The node is released and can not be used for any conversation. OBTAining
379
CICS for Windows NT The node is being acquired. The node remains in the OBTAINING state until all the criteria for ACQUIRED have been met. FREEing
CICS/ESA only displays a hexadecimal value indicating the result of the last acquire request for the node; that is, the sense code from the last VTAM OPEN ACB, a zero indicating success. For information about VTAM sense codes, see either the VTAM Messages and Codes or the SNA Formats manual.
CICS for Windows NT displays a hexadecimal value indicating the result of the last acquire request for the node; zero indicating success. For information about IBM Communications Servers sense codes, see either the Conventional LUA Programming Reference manual or the SNA Formats manual.
380
Syntax
Press the Clear key to clear the screen. There are two ways of commencing this transaction: v Type CEMT INQUIRE FEPOOL (the minimum abbreviation is CEMT I FEPO). You get a display that lists the current status. v Type CEMT INQUIRE FEPOOL (CEMT I FEPO) followed by as many of the other attributes as are necessary to limit the range of information that you require. For example, if you enter cemt i fepo inse, the resulting display will show you the details of all FEPI pools that are in service and can be used by conversations. You can tab to the highlighted service state eld and overtype it with a new value. CICS/ESA only:
CEMT Inquire FEPOol
All CEMT Inquire FEPOol (poolname) INSTalled Notinstalled INSErvice Outservice
Device(value)
Waitconvnum(value)
Device(value)
Waitconvnum(value)
381
Examples
CEMT IN FEPO STATUS: RESULTS - OVERTYPE TO MODIFY Fepo(POOL3 ) Inst Inse Devi(T3278M4 ) Wait(00000) Fepo(POOL5 ) Inst Inse Devi(T3278M2 ) Wait(00000)
Options
Fepo indicates that this panel relates to an FEPOOL inquiry. (value) displays the 8-character name of a pool of connections. Installed|Notinstalled displays a value identifying the install state of the pool. The values are: Installed The pool has been dened by INSTALL and is available for use. Notinstalled The pool is being discarded, but is still in use. Inservice|Outservice|Goingout displays a value identifying the service state of the pool. The values are: Inservice The pool is in service and can be used in a conversation.
CICS/ESA only If OUTSERVICE state has been requested but has not yet completed, a GOING OUT message is shown.
382
CICS for Windows NT The pool is being out put of service. Device(value) displays a value identifying the mode of conversation and the type of device. The values are: T3278M2 SLU2 mode, 3278 Model 2 T3278M3 SLU2 mode, 3278 Model 3 T3278M4 SLU2 mode, 3278 Model 4 T3278M5 SLU2 mode, 3278 Model 5 T3279M2 SLU2 mode, 3279 Model 2B T3279M3 SLU2 mode, 3279 Model 3B T3279M4 SLU2 mode, 3279 Model 4B T3279M5 SLU2 mode, 3279 Model 5B TPS55M2 SLU2 mode, PS/55, 24 lines TPS55M3 SLU2 mode, PS/55, 32 lines TPS55M4 SLU2 mode, PS/55, 43 lines LUP SLU P mode, all cases
Waitconvnum(value) displays a value identifying the number of conversations that are waiting to start using a connection in the pool.
383
Syntax
CEMT INQUIRE FEPROPSET
All CEMT Inquire FEPRopset (propsetname)
Options
All is the default. Information about all property sets is given, unless you specify a particular one. propsetname is the name of the property set to be queried.
Examples
CEMT IN FEPR STATUS: RESULTS Fepr(PROP1 ) Fepr(PROP2 ) Fepr(PROP3 ) Fepr(PROP4 )
Options
Fepr indicates that this panel relates to an FEPROPSET inquiry.
384
385
Syntax
Press the Clear key to clear the screen. There are two ways of commencing this transaction: v Type CEMT INQUIRE FETARGET (the minimum abbreviation is CEMT I FET). You get a display that lists the current status. v Type CEMT INQUIRE FETARGET (CEMT I FET) followed by as many of the other attributes as are necessary to limit the range of information that you require. For example, if you enter cemt i fet inse, the resulting display will show you the details of all FEPI targets that are in service. You can tab to the highlighted service state eld and overtype it with a new value. CICS/ESA only:
CEMT INQUIRE FETARGET
ALl CEMT Inquire FETarget (targetname) APpl(applname) INSTalled Notinstalled
INSErvice Outservice
386
Examples
CEMT IN FET STATUS: RESULTS - OVERTYPE Feta(TARGETA ) Appl(APPL5 Feta(TARGETB ) Appl(APPL6 Feta(TARGET1 ) Appl(APPL1 Feta(TARGET2 ) Appl(APPL2 Feta(TARGET3 ) Appl(APPL3 Feta(TARGET4 ) Appl(APPL4
TO ) ) ) ) ) )
MODIFY Inst Inse Inst Inse Inst Inse Inst Inse Inst Inse Inst Inse
Options
Feta indicates that this panel relates to an FETARGET inquiry. (value) displays the 8-character name identifying a target. Appl(applname) displays the 8-character VTAM application name of the back-end system that the target represents. Installed|Notinstalled displays a value identifying the install state of the target. The values are: Installed The target has been dened by INSTALL and is available for use. Notinstalled The target is being discarded, but is still in use. Inservice|Outservice|Goingout displays a value identifying the service state of the target. The values are: Inservice The target is in service and can be used in a conversation.
387
CICS/ESA only If OUTSERVICE state has been requested but has not yet completed, a GOING OUT message is shown. Outservice The target is out of service and cannot be used for any conversation. Goingout
388
389
390
CICS-supplied programs
checking takes place, and how it is done. The user terminal autoinstall program provides you with the means of implementing your decision. An autoinstall model is a terminal denition that you use as a model when you attempt to invoke a session and dene your autoinstallable terminal to your CICS system. The default terminal autoinstall program, DFHCHATX, is a C program supplied to you as part of CICS. The sample source code, cics_aut.ccs is in prodDir/src/samples/install, together with a makele makefile. You also need the le cics_aut.h, which is in the header les. You can install DFHCHATX in its unmodied form, or you can customize it to meet the particular requirements of your organization. Before you change DFHCHATX, try the default autoinstall program rst. If you decide to alter the functionality of the default autoinstall program, take a backup copy of the program source rst, in case you encounter problems and need to revert to the original version. After modication, you must place the generated executable load module into the required directory so that it is available for use by your CICS system. For information about the CICS directory structure, see the Planning and Installation Guide book. You can write the program in either C or COBOL, and you can use EXEC CICS commands. You must dene the program in the Program Denitions (PD). You can customize the default terminal autoinstall program to carry out any processing required by your installation. Here are some customization suggestions. Your user terminal autoinstall program could: v Control the allocation of terminal identiers. v Count and limit the total number of logged on terminals. v Count and limit the number of autoinstalled terminals. v Keep utilization information about autoinstalled terminals. v Assign the terminal name. v Carry out general logging. v Handle special cases, for example, always allow certain terminals to log on. v Exercise network wide control over autoinstall. A network wide, global user terminal autoinstall program may reside on one CICS system. When a user terminal autoinstall program on a remote CICS system receives an
Chapter 5. CICS-supplied programs
391
CICS-supplied programs
autoinstall request, the request may involve the global user terminal autoinstall program, and data can be transferred from one user terminal autoinstall program to another. Each time the terminal autoinstall program is invoked, CICS passes a parameter list to the program using the COMMAREA mechanism of the EXEC CICS LINK command. The contents of the parameter list dene which function to perform (INSTALL or UNINSTALL) and provide data relevant to the particular event. If the user terminal autoinstall program decides that the autoinstall request can proceed, the program must return the name of the autoinstall model to CICS , together with an associated terminal identier, by storing the required values in the COMMAREA return information eld. Subsequently, CICS uses the returned values to install the terminal in the WD. In addition, the user terminal autoinstall program must indicate in the returned status byte whether or not the event is to proceed. If the autoinstall is to proceed, it sets the status eld set to binary zeros. The model name is selected from the array of model names passed to the autoinstall program in the parameter list. CICS uses this model so that it can recognize the terminal. CICS selects the autoinstall models in the array from the complete list of terminal models according to their compatibility with the system information describing the resource. The default user terminal autoinstall program selects the rst model from the list. CICS uses this model to build the Terminal Denitions (WD) entry and determine the CICS attributes of the automatically installed terminal. The default user terminal autoinstall program generates the terminal identier from the rst two and the last two characters of the name by which the terminal is known to the network. CICS passes this netname to the default program, using the COMMAREA. If the user terminal autoinstall program returns a model name that is not in the list passed to the user terminal autoinstall program, CICS generates an ABEND and will not install the terminal. If the user terminal autoinstall program decides that the autoinstall request is to be rejected, it must set the status byte in the COMMAREA to be not equal to binary zeros. When processing is complete, the user terminal autoinstall program must return to CICS by issuing an EXEC CICS RETURN command. When you write the user terminal autoinstall program, the processing required for the UNINSTALL function does not depend upon whether the
392
CICS-supplied programs
program received control because a previously autoinstalled resource is no longer required, or because a previous INSTALL process failed for some reason. The processing you need to perform may be considered identical for the two events; there is no difference in the environment or in the actions that your program needs to perform. Invoking the user terminal autoinstall program to perform the UNINSTALL function enables you to reverse the processes carried out at the INSTALL event. For example, if your user terminal autoinstall program increments a count of the total number of automatically installed resources at INSTALL time, your program can decrement the count at UNINSTALL time.
393
CICS-supplied programs
the number of elements in the array; followed by the array containing eight-byte name elements. If the array is empty, the number eld is set to zero. Parameter 4 This is a pointer to the 21-byte return information eld, set to blanks on input. You can use it to return the following information to the calling program. The rst eight bytes contain the autoinstall model name, the next four-bytes contain the terminal name, the next eight bytes are blank, and the last byte is a status-byte used to indicate whether or not the terminal installation event is to proceed. Parameter 5 This area is not relevant to CICS and is set to zero. The parameters which CICS passes in the COMMAREA to the user terminal autoinstall program when reversing the autoinstall process are: Parameter 1 This is a four-byte eld. The rst byte is set to 1 to indicate an UNINSTALL request. Parameter 2 This is a pointer to a four-byte eld containing the terminal identier of the deleted resource.
394
CICS-supplied programs
v An autoinstall UNINSTALL request is being processed. The user program receives control automatically at INSTALL when: v A logon request is received from a resource that does not supply a NetName, and v Autoinstall processing has completed to a point where information (a terminal identier and autoinstall model name) from the user program is required in order to proceed. To provide symmetry of user control over the autoinstall process, the user program also receives control automatically when a session with a previously automatically installed terminal has ended, or an autoinstall request was previously accepted by the user program but the subsequent INSTALL process failed for some reason.
395
CICS-supplied programs
MONITOR transaction to set the MonitorStatus attribute. You use the RDO facility to specify the name of the Performance Monitoring user program in the UserMonitorModule attribute in the Monitoring Denitions (MD). CICS calls the program: v During task startup v During task exit v To process the EXEC CICS ENTER command v To stop the user clocks and return the user data to be written to the monitoring transient data queue v To restart the user clocks v At the end of a task, to clean up the user data. You can customize the default program to carry out any processing that you require. See the CICS Administration Guide for related information.
396
CICS-supplied programs
Allocate task's data area space (malloc) IF the malloc fails Return CICS_EMP_RETURN_FAIL to disable user program ELSE Set up the return values Return CICS_EMP_RETURN_OK END-IF.
2. EnterAPI This function processes the EXEC CICS ENTER command. CICS passes the information from the EXEC CICS ENTER command parameters. The functionality of the function is entirely user-dened. The function processes the request and returns instructions to CICS on what to perform next at completion. If the function encounters an error, an error code is returned for CICS to write as part of a message. The default EnterAPI function uses the algorithm:
IF the data area (from Initialization) is invalid Return CICS_EMP_RETURN_FAIL to disable user program END-IF. Switch on the TRACEID from the EXEC CICS ENTER API CASE 1: Return CICS_EMP_RETURN_WRITE to Write a monitoring record. CASE 2: IF ENTRYNAME is START Start clock 1 Mark clock 1 active ELSE IF ENTRYNAME is STOP Stop clock 1 Mark clock 1 inactive ELSE No action taken END-IF END-IF. Return CICS_EMP_RETURN_OK. CASE 3: Add DATA1 to counter 1 Return CICS_EMP_RETURN_OK. CASE 4: Set counter 2 to DATA2 Return CICS_EMP_RETURN_OK. CASE 5: Increment counter 3 Return CICS_EMP_RETURN_OK. CASE 6: Disable all monitoring for this task Release data space (free) Return CICS_EMP_RETURN_DISABLE. CASE 7: Time a write to the monitoring TD Queue Start clock 2 Return CICS_EMP_RETURN_WRITE
397
CICS-supplied programs
CASE 8: Disable the user program for this task Release data space (free) Return CICS_EMP_RETURN_FAIL. DEFAULT: Return CICS_EMP_RETURN_OK.
3. WriteRecord This function returns the address of the User Data buffer which CICS appends to a monitoring record. If the address of the buffer is NULL or the length is zero, CICS does not append any user monitoring data to the system information. The functionality of this function is entirely user-dened, it should however, stop clocks if appropriate. If the function encounters an error, an error code is returned for CICS to write as part of a message. The default WriteRecord function uses the algorithm:
IF record type NOT ULM Requested or End of Task Disable all monitoring for this task Release data space (free) Return CICS_EMP_RETURN_DISABLE ELSE IF Operator ID is zero OR Data area (from Initialization) invalid Disable user program for task Release data space (free) Return CICS_EMP_RETURN_FAIL END-IF END-IF Stop clock 1 Move counters and times into target record Return the record address and length.
4. Restart This function releases any resources acquired by the Initialization function. CICS passes the address of the user programs private data. If the function encounters an error, an error code is returned for CICS to write as part of a message. The default Restart function uses the algorithm:
IF the data area (from Initialization) is invalid Return CICS_EMP_RETURN_FAIL to disable user program END-IF. Switch on the action request from CICS CASE CICS_EMP_FINISH_RESTART: Reset all 3 counters Stop clock 2 IF clock 1 is marked as active Start clock 1 END_IF Return CICS_EMP_RETURN_OK.
398
CICS-supplied programs
CASE CICS_EMP_FINISH_CLEANUP: Release data space (free) IF memory freed successfully Return CICS_EMP_RETURN_OK ELSE Return CICS_EMP_RETURN_FAIL END-IF
Functions Available to the User Program Four CICS functions are available to the user program: 1. CICS_EMP_StartClock Provides you with the necessary functionality to start monitoring clocks. Synopsis
CICS_EMP_ClockReturn_t CICS_EMP_StartClock(CICS_EMP_EventTime_t *Timer, enum CICS_EMP_ClockType ClockType);
Your program must pass one of the following clock type values to the function: CICS_EMP_CLOCK_TYPE_ELAPSED Record elapsed time. CICS_EMP_CLOCK_TYPE_SYSTEM Record system time. CICS_EMP_CLOCK_TYPE_USER Record user time. CICS_EMP_CLOCK_TYPE_BOTH Record both system and user time. The function returns one of the following return values to your program: CICS_EMP_CLOCK_RETURN_OK The clock started successfully. CICS_EMP_CLOCK_RETURN_PHASE The clock started out of phase. CICS_EMP_CLOCK_RETURN_INVALID The clock type is invalid. CICS_EMP_CLOCK_RETURN_FAILURE Cannot obtain system or user times. If the function returns CICS_EMP_CLOCK_RETURN_OK, the function also updates the Timer parameter. 2. CICS_EMP_StopClock
399
CICS-supplied programs
Provides you with the necessary functionality to stop monitoring clocks, and accumulate the time recorded by that clock, passed in the Timer data area. Note: The Timer data area must be initially set to nulls, because this is where the timer functions CICS_EMP_StartClock and CICS_EMP_StopClock accumulate clock information. Synopsis
CICS_EMP_ClockReturn_t CICS_EMP_StopClock(CICS_EMP_EventTime_t *Timer);
The function returns one of the following return values to your program: CICS_EMP_CLOCK_RETURN_OK The clock stopped successfully. CICS_EMP_CLOCK_RETURN_PHASE The clock stopped out of phase. CICS_EMP_CLOCK_RETURN_INVALID The clock type is invalid. CICS_EMP_CLOCK_RETURN_FAILURE Cannot obtain system or user times. If the function returns CICS_EMP_CLOCK_RETURN_OK, the function also updates the Timer parameter. 3. CICS_EMP_GetTime Provides you with the necessary functionality to get the current time in a CICS_EMP_Time_t data area. Synopsis
void CICS_EMP_GetTime(CICS_EMP_Time_t *CurrentTime);
4. CICS_EMP_SubtractTime Provides you with the necessary functionality to calculate the difference between two times of type CICS_EMP_Time_t. Synopsis
void CICS_EMP_SubtractTime(CICS_EMP_Time_t *Time1, CICS_EMP_Time_t *Time2, CICS_EMP_Time_t *Result);
400
CICS-supplied programs
1. The initialization function Function prototype
#include <cics_emp.h> CICS_EMP_Return_t CICS_EMP_Init (IN struct CICS_EMP_RegionData ,INOUT struct CICS_EMP_Functions ,INOUT void ,INOUT int ,IN struct CICS_EMP_PerformanceClass ,IN struct cics_eib ,IN const struct CICS_EMP_Map ); *RegionData *Functions **SaveSpace *ErrorCode *SystemData *EIB *Dictionary
The parameter passed by CICS to this function is: RegionData This is a pointer to data describing the CICS region. The parameters contained within this data are: Region_Id The eight-character name of the region. ReleaseId The four-character release number. Transaction Id The four-character transaction identier. The parameters returned by this function are: Return_Code This is the return code returned by the function. It is one of: CICS_EMP_RETURN_OK The initialization completed successfully. CICS_EMP_RETURN_FAIL The initialization detected an error. CICS disables user EMPs for this region. CICS_EMP_RETURN_DISABLE The initialization completed successfully, but CICS is to disable monitoring for this task. Functions If the Return_Code=CICS_EMP_RETURN_OK, this is a pointer to a buffer that contains the Event Monitoring Point (EMP) function addresses. The addresses contained in the buffer are: EnterAPI Process the EXEC CICS ENTER command.
401
CICS-supplied programs
WriteRecord Return user data to write to the performance le. ReStart Allow the user to restart any clocks following the write of a monitoring record. SaveSpace This is the address of the user programs private data for the task. ErrorCode If the Return_Code is not CICS_EMP_RETURN_OK, this is a pointer to an error code which CICS writes as part of a message. SystemData This is a pointer to the performance class monitoring structure. The address of the SystemData is constant for the life of the transaction. The Monitor Field Table details this. EIB The Execution Interface Block for the transaction.
Dictionary This contains information on how to interpret the SystemData. The address of the Dictionary is constant for the life of the CICS region. The mask denitions used to extract data from the Dictionary CICS_EMP_Map structure are: v CICS_EMP_CLOCK_TYPE_MASK v CICS_EMP_GROUP_MASK v CICS_EMP_TDQ_DETAIL_TYPE_MASK v CICS_EMP_FID_MASK Note: Dictionary, EIB, and SystemData must be treated as read-only by the user exit functions. 2. The enter API function Function prototype
#include <cics_emp.h> CICS_EMP_Return_t CICS_EMP_EnterAPI (IN struct CICS_EMP_ENTER_API_Data *EnterData ,INOUT void **SaveSpace ,INOUT int *ErrorCode );
402
CICS-supplied programs
SaveSpace This is the address of the user programs private data for the task. EnterData This is a pointer to the information from the EXEC CICS ENTER command. The information is: ID The 16-bit EMP identication number in the range 0 through 255.
EntryName The eight-character ENTRYNAME parameter of the EXEC CICS ENTER command. Data1 The DATA1 eld from the EXEC CICS ENTER command. This is the most signicant 32 bits from the FROM parameter. Data2 The DATA1 eld from the EXEC CICS ENTER command. This is the least signicant 32 bits from the FROM parameter. The parameters returned by this function are: Error Code If the Return_Code is not CICS_EMP_RETURN_OK or CICS_EMP_RETURN_WRITE, this is a pointer to an error code which CICS writes as part of a message. Return_Code This is the return code returned by the function. It is one of: CICS_EMP_RETURN_OK The function completed successfully. CICS_EMP_RETURN_FAIL The function detected an error. CICS will disable user EMPs for this region. CICS_EMP_RETURN_DISABLE The function completed successfully but CICS will disable monitoring for this task. CICS_EMP_RETURN_WRITE The function completed successfully. CICS writes a monitoring record at this point. This return value causes CICS to call WriteRecord to obtain the user data record. 3. The writerecord function Function prototype
#include <cics_emp.h> CICS_EMP_Return_t CICS_EMP_WriteRecord ( OUT void **UserData, OUT short *UserDataLength, IN struct CICS_EMP_PerformanceClass *SystemData,
Chapter 5. CICS-supplied programs
403
CICS-supplied programs
IN INOUT OUT IN ); int *UnSupportedFlds, void **SaveSpace, int *ErrorCode, const struct CICS_EMP_Map *Dictionary
The parameters passed by CICS to this function are: SystemData This is a pointer to the performance class monitoring structure. The address of the SystemData is constant for the life of the transaction. The Monitor Field Table details this. SaveSpace This is the address of the user programs private data for the task. The parameters returned by this function are: Return_Code This is the return code returned by the function. It is one of: CICS_EMP_RETURN_OK The function completed successfully. CICS_EMP_RETURN_FAIL The function detected an error. CICS will disable user EMPs for this region. CICS_EMP_RETURN_DISABLE The function completed successfully but CICS will disable monitoring for this task. UserData If the function returns CICS_EMP_RETURN_OK, this parameter contains a pointer to the User Data record which CICS writes to the monitoring Transient Data (TD) Queue. If this parameter is null, CICS writes only the system monitoring data to the TD Queue. UserDataLength If the function returns CICS_EMP_RETURN_OK, this 16-bit parameter contains the length of the User Data record which CICS writes to the monitoring TD Queue. If this parameter is null, CICS only writes the system monitoring data to the TD Queue. Error Code If the Return_Code is not CICS_EMP_RETURN_OK, this is a pointer to an error code which CICS writes as part of a message.
404
CICS-supplied programs
Dictionary This contains information on how to interpret the SystemData. The address of the Dictionary is constant for the life of the CICS region. The mask denitions used to extract data from the Dictionary CICS_EMP_Map structure are: v CICS_EMP_CLOCK_TYPE_MASK v CICS_EMP_GROUP_MASK v CICS_EMP_TDQ_DETAIL_TYPE_MASK v CICS_EMP_FID_MASK Note: Dictionary, SystemData, and UnsupportedFlds must be treated as read only by the user exit functions. 4. The restart function Function prototype
#include <cics_emp.h> CICS_EMP_Return_t CICS_EMP_Restart (IN enum CICS_EMP_Finish Action ,INOUT void **SaveSpace ,INOUT int *ErrorCode );
The parameters passed by CICS to this function are: SaveSpace This is the address of the user programs private data for the task. FinishAction CICS passes one of two possible values to the function to indicate the functionality required: CICS_EMP_FINISH_RESTART Restart any clocks or counters stopped by the preceding WriteRecord call. CICS_EMP_FINISH_CLEANUP Perform any cleanup functions required to terminate the task. The parameters returned by this function are: Error Code If the Return_Code is not CICS_EMP_RETURN_OK, this is a pointer to an error code which CICS writes as part of a message. Return_Code This is the return code returned by the function. It is one of:
Chapter 5. CICS-supplied programs
405
CICS-supplied programs
CICS_EMP_RETURN_OK The function completed successfully. CICS_EMP_RETURN_FAIL The function detected an error. CICS will disable user EMPs for this region. CICS_EMP_RETURN_DISABLE The function completed successfully but CICS will disable monitoring for this task. See the CICS Administration Guide for related information.
406
where ccc is the module identier of the CICS component that invokes the user exit program and nnn is the user exit number, padded to a length of three characters with leading zeroes. The following table shows the numbers and names of the user exits:
User Exit Number 15 17 25 50 51 52 53 31 User Exit Name UE014015 UE052017 UE014025 UE015050 UE016051 UE115052 UE115053 UEI09031 Description Task termination Dump request Dynamic transaction routing Dynamic distributed program link Syncpoint IIOP security exit IIOP certicate exit FEPI data conversion
For more information on how to make use of user exits, and the rules governing the writing of user exit programs, see the CICS Administration Guide. For information about the IIOP user exits, see the CICS IIOP ORB Programming Guide.
Copyright IBM Corp. 1999
407
Constants
The following constants are dened for user exits
#define #define #define #define #define #define #define #define #define cics_UE_NAME_MAX 8 /* max length of UE name */ cics_UE_TRAN_MAX 4 /* transaction name max length */ cics_UE_USER_MAX 8 /* userid max length */ cics_UE_TERM_MAX 4 /* termid max length */ cics_UE_PROG_MAX 8 /* application program name max length */ cics_UE_SYSID_MAX 4 /* Max length of a sysid */ cics_UE_APPL_MAX 8 /* Max length of a region name */ cics_UE_HEADER_VERSION 1 /* all version number start at 1 */ cics_UE_WORKAREA_SIZE 128 /* fixed size for this version */
The denition of each user exit species which return codes are supported and the subsequent behavior for each. The following values are provided for cics_UE_Return_t
#define #define #define #define #define #define #define #define #define UE_Normal UE_Bypass UE_Abend UE_Shortonstorage UE_Term_Abend UE_Terminate UE_ProgramNotKnown UE_HeaderVersion UE_SpecificVersion (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) (cics_UE_Return_t) 0 1 2 3 4 5 6 7 8
408
User exits
cics_ulong_t cics_ushort_t cics_char_t cics_char_t cics_ulong_t cics_char_t cics_ushort_t cics_UE_YesNo_t cics_char_t cics_UE_Header_t; UE_Thread; UE_Number; UE_Name[cics_UE_NAME_MAX+1]; UE_TransId[cics_UE_TRAN_MAX+1]; UE_TaskNo; UE_Workarea; UE_WorkareaSize; UE_TraceOnExit; UE_RegionName[cics_UE_APPL_MAX+1];
The elds in cics_UE_Header_t are dened as follows: UE_Version is the version number for this structure and takes the value dened in cics_UE_HEADER_VERSION. It is advisable to check this in user exit programs to ensure that the version number passed when the user exit is called is the same as that contained in the version of cicsue.h used when the program was generated. If a mismatch is detected then contents of elds are unpredictable and the UE program should be regenerated using the correct version of cicsue.h. UE_ProcessId is the id of the process which has invoked the user exit. UE_Thread is the id of the thread in which the user exit is invoked. UE_Number is a number which uniquely identies the user exit which has been invoked. Refer to the denition for that user exit in order to determine the name of the exit-specic structure which is passed to the user exit and the name of the function which the associated user exit program must contain. UE_Name is the name of the user exit as it appears in dumps, traces, and the exit-specic structure. UE_Transid is the transaction which was active when the user exit was invoked. All user exits have an associated transaction. UE_TaskNo provides a unique number for the task associated with the user exit. All user exits have an associated task number. UE_Workarea is a pointer to the workarea associated with user exits for this task. It can be used to pass information between user exits for the same task and is also useful when debugging user exit programs. The workarea is located in storage immediately after the cics_UE_header storage;
Chapter 6. User exits
409
User exits
both areas are traced when an A15Z abend is issued, if trace is active for the component which called the user exit at which the A15Z was caught. It can also be traced based on the setting of UE_TraceOnExit. All user exits have an associated task. The workarea will be reinitialized between tasks. You must control the usage of this workarea between user exits. It can be used creatively when debugging user exit programs. UE_WorkareaSize is the size of the user exit workarea. This is a xed length of 128 bytes. UE_TraceOnExit On entry to a user exit this eld is set to UE_No. It can be altered by the user exit program to UE_Yes, which will cause the header and specic parameter lists to be traced on exit (if product trace is active). UE_RegionName The name of the CICS region.
Function prototype
cics_UE_return_t UE014015( /*IN*/ cics_UE_Header_t *cics_UE_Header, /*IN*/ cics_UE014015_t *cics_UE_Specific );
Exit-specic constants
#define cics_UE014015_VERSION 2 /* all version numbers start at 2 */ typedef enum { UE_Normaltermination, UE_Abnormaltermination } cics_UE_Terminationtype_t;
Exit-specic structure
typedef struct { cics_ushort_t UE_Version; cics_UE_Terminationtype_t UE_Terminationtype; } cics_UE014015_t;
410
Return codes
UE_Normal Continue processing. other Continue processing; this cannot be guaranteed in future releases.
Function prototype
cics_UE_Return_t UE052017 ( ); /*IN*/ cics_UE_Header_t *cics_UE_Header, /*IN*/ cics_UE052017_t *cics_UE_Specific
Exit-specic constants
#define cics_UE_DUMP_MAX 4 /* max length of dump code name */ #define cics_UE052017_VERSION 1 /* all version numbers start at 1 */ typedef enum UE_DumpReason { UE_DUMP_USER, /* UE_DUMP_ABEN, /* UE_DUMP_ASRA, /* UE_DUMP_ASRB, /*
EXEC CICS DUMP issued Transaction abend occurred Transaction abend ASRA occurred not issued currently
*/ */ */ */
411
Exit-specic structure
typedef struct { cics_ushort_t UE_Version; cics_char_t UE_User[cics_UE_USER_MAX+1]; cics_char_t UE_Term[cics_UE_TERM_MAX+1]; cics_char_t UE_Prog[cics_UE_PROG_MAX+1]; cics_char_t UE_Dumpcode[cics_UE_DUMP_MAX+1]; cics_UE_DumpReason_t UE_DumpReason; cics_char_t *UE_CWA; cics_ushort_t UE_CWALEN; cics_char_t *UE_TCATWA; cics_ushort_t UE_TCATWA_LEN; cics_UE_YesNo_t UE_TransDump; } cics_UE052017_t;
412
Return codes
UE_normal Continue processing. UE_bypass Suppress dump. other Continue processing; this cannot be guaranteed for future releases.
Function Prototype
cics_UE_return_t UE014025 ( ); /*IN*/ UE_header_t /*INOUT*/ UE014025_t *UE_header, *UE_specific
Exit-specic constants
Constants used in declaring the exit-specic structure:
#define cics_UE_ABND_MAX 4 /* Max length of an abend code */ #define cics_UE_USERAREA_SIZE 128 /* User Exit user area size */ #define cics_UE014025_VERSION 1 /* All version numbers start at 1 */
413
Route selection */ Error in route selection */ Successful end of dynamic route */ Not used */ The transaction has abended locally, or some failure occurred during the routing of the transaction to a remote system */
Exit-specic structure
typedef struct { cics_ushort_t cics_UE_Func_t cics_ushort_t cics_char_t cics_ubyte_t cics_ushort_t cics_char_t cics_ushort_t cics_char_t cics_char_t cics_UE_YesNo_t cics_UE_YesNo_t cics_UE_Error_t cics_char_t cics_char_t cics_char_t cics_char_t cics_ushort_t cics_char_t cics_ushort_t } cics_UE014025_t; UE_Version; UE_Dyrfunc; UE_Dyrcount; UE_Dyrsysid[cics_UE_SYSID_MAX+1]; *UE_Dyrtptr; UE_Dyrtlgth; *UE_Dyrcwaptr; UE_Dyrcwalgth; UE_Dyrlclsys[cics_UE_SYSID_MAX+1]; UE_Dyrlclapl[cics_UE_APPL_MAX+1]; UE_Dyropter; UE_Dyrretry; UE_Dyrerror; UE_Dyrtran[cics_UE_TRAN_MAX+1]; UE_Dyrprog[cics_UE_PROG_MAX+1]; UE_Dyrabcde[cics_UE_ABND_MAX+1]; *UE_Dyruser; UE_Dyrusersize; *UE_Dyrcomptr; UE_Dyrcomlgth;
414
415
UE_Yes The dynamic transaction routing program is to be reinvoked. If you wish UE014025 to be reinvoked then UE_Dyropter must be set to UE_Yes on the initial invocation of the user exit. UE_Dyrretry indicates whether the dynamic transaction routing program should be reinvoked if a route selection error occurs. The possible values are:
416
UE_Yes The dynamic transaction routing program is to be reinvoked. UE_Dyrerror (Input parameter only) is relevant only when UE_Dyrfunc is set to UE_RTESELERR. It indicates the type of error that occurred during the last attempt to route a transaction. The possible values are: UE_SYSID_UNKNOWN The selected system is unknown. UE_SYSID_OUT_SRV The selected system is out-of-service. UE_CON_FAILURE Unable to connect to remote system, or connection failure. UE_NO_ERROR No connection failure has occurred. UE_Dyrtran contains the remote transaction name. When UE_Dyrfunc is set to UE_ROUTESEL, UE_Dyrtran contains the remote transaction name specied in the RemoteName attribute of the installed Transaction Denition. Your dynamic transaction routing program can accept this remote transaction name, or supply a different transaction name for forwarding to the remote CICS system. You can change UE_Dyrtran on any call to the dynamic transaction routing program, though it is effective only when UE_Dyrfunc is set to UE_ROUTESEL, or UE_RTESELERR. If the transaction is to be routed to a remote system, and UE_Dyrtran is set to a null string, then the local transaction name is used as the remote transaction name. UE_Dyrprog is the name of the initial program associated with the transaction for which the dynamic transaction routing program is invoked, if the transaction is dened for dynamic routing. You can use this eld to specify the name of an alternative program to be run if the transaction is routed locally. For example, if all remote CICS systems are unavailable, and the transaction cannot be routed, you may want to run a program in the local system to send an appropriate message to the user. This defaults to the ProgName attribute dened in the Transaction Denition for the transaction. Note: UE_Dyrprog should never be returned containing a null string. If a null string is found when the parameter list is passed back to CICS then an abend and message will be issued.
417
Return Codes
UE_Normal Continue processing with parameters returned from the user exit program. UE_Terminate Terminate the dynamic transaction routing request. UE_Term_Abend Terminate the routing request with an abend and a message.
418
Function prototype
cics_UE_return_t UE015050 ( ); /*IN*/ UE_header_t /*INOUT*/ UE015050_t *UE_header, *UE_specific
Exit-specic constants
#define cics_UE_DPLAREA_SIZE 128 /* User Exit user area size */ #define cics_UE015050_VERSION 1 /* All version numbers start at 1 */
Denitions: UE_LINKSEL Indicates that this is the initial invocation of the user exit program. The user exit program can make decisions about which system or program to link to. UE_LINKUNKNOWN Indicates that this is the initial invocation of the user exit program for a program to link to which does not have a Program Denition (PD). The user exit program can make decisions about which system or program to link to. UE_LINKTERM Indicates that the linked-to program completed successfully. UE_LINKABEND Indicates that the linked-to program did not complete successfully.
Exit-specic structure
typedef struct { cics_ushort_t UE_Version;
Chapter 6. User exits
419
420
UE_Yes The user exit program is to be reinvoked. If you wish UE15050 to be reinvoked then UE_Dplopter must be set to UE_Yes on the initial invocation of the user exit program. UE_Dplmirtran contains the name of the mirror transaction on the remote system. See the CICS Administration Guide for a full description of this parameter. UE_Dplprog is the name of the program to be started by the EXEC CICS LINK. This eld can be used to change the name of the program on the local or the remote system. UE_Dplcomptr (Input parameter only) is a pointer to the COMMAREA. UE_Dplcomlgth (Input parameter only) is the length of the COMMAREA. UE_Dpluser is a pointer to a user area of length UE_Dplusersize. CICS initializes this user area to zeros before invoking the dynamic DPL user exit program for a given DPL request. This user area can be modied by the user exit program. It is then passed to the nal invocation of the user exit program for a given DPL request.
421
Return codes
UE_Normal Continue processing with parameters returned from the user exit program. UE_ProgramNotKnown Indicates that the program name passed to the user exit program is not valid and the linking program must be abended with an APCT abend. This will be most useful when the user exit program is called as CICS is about to link to a program which does not have a Program Denition (PD), and the user exit program cannot determine which program or system to link to.
Function prototype
cics_UE_return_t UE016051 ( /*IN*/ UE_header_t /*INOUT*/ UE016051_t ); *UE_header, *UE_specific
Exit-specic constants
Constants used in declaring the user exit specic structure:
#define cics_UE016051_VERSION 1 /* All version numbers start at 1 */
422
Constants indicating the value of the Syncpoint attribute in the transactions Transaction Denition.
typedef enum UE_SyncTRPrompt { UE_PROMPT_FINISH, UE_NO_PROMPT_FINISH } cics_UE_SyncTRPrompt_t;
Exit-specic structure
typedef struct { cics_ushort_t cics_UE_SyncType_t cics_UE_SyncResp_t cics_UE_SyncTRPrompt_t } cics_UE016051_t; UE_Version; UE_SyncType; UE_SyncResp; UE_SyncTRPrompt;
423
Return codes
UE_Normal Continue processing.
424
425
Syntax
#include <cicsmfmt.h> CICS_MFMT_Stream_t * CICS_MFMT_OpenMonitorFile(cics_char_t *FileName, enum CICS_MFMT_Status *Status); int CICS_MFMT_CloseMonitorFile (CICS_MFMT_Stream_t *Stream);
CICS_MFMT_OpenMonitorFile opens the Monitoring Data le, FileName, and reads in the rst record. It returns a pointer to identify the Monitoring File Stream in subsequent operations (see CICS_MFMT_ReadNext on page 427). If CICS_MFMT_OpenMonitorFile cannot open the le specied or the le does not contain monitoring data, it returns NULL and the Status parameter is set to indicate the cause of the failure. If this eld is set to CICS_MFMT_STATUS_SYS_ERROR, the environment variable errno contains the error code returned by the operating system. Note that variable length records written by CICS to an extrapartition Transient Data Queue have the record length in the rst four bytes. This is in addition to the record length and signature which start the Monitoring record, as dened by CICS_EMP_MonitoringRecord. CICS_MFMT_CloseMonitorFile closes the Monitoring Data le stream identied by Stream and releases any memory buffers associated with the stream.
Return codes
Upon successful completion, CICS_MFMT_OpenMonitorFile returns a pointer to a CICS_MFMT_Stream_t object, which is used to access the le via the CICS_MFMT_ReadNext and CICS_MFMT_FindField functions. CICS_MFMT_OpenMonitorFile returns a value of NULL if an error is detected or the le does not contain monitoring data. The Status parameter indicates the cause of the failure to open the le: CICS_MFMT_STATUS_SYS_ERROR CICS_MFMT_OpenMonitor File detected an error and the global variable errno contains the operating system error code.
426
CICS_MFMT_ReadNext
Syntax
#include <cicsmfmt.h> enum CICS_MFMT_Status CICS_MFMT_ReadNext (CICS_MFMT_Stream_t *Stream);
CICS_MFMT_ReadNext reads the next record from the Monitoring Data le specied by Stream into the FileBuffer member of the structure.
Return codes
CICS_MFMT_STATUS_OK The read succeeded. CICS_MFMT_STATUS_EOF The end of the le was reached. CICS_MFMT_STATUS_SYS_ERROR CICS_MFMT_ReadNext detected an error and the global variable errno contains the operating system error code. CICS_MFMT_STATUS_FILE_EOF CICS_MFMT_ReadNext detected an unexpected EOF. CICS_MFMT_STATUS_FILE_ERROR A corrupt Monitoring record was detected. See the CICS Administration Guide for related information.
427
CICS_MFMT_FindField CICS_MFMT_FindField
Syntax
#include <cicsmfmt.h> CICS_EMP_TDQ_RecordDetails_t * CICS_MFMT_FindField (cics_ulong_t FieldID ,CICS_MFMT_Stream_t *Stream );
CICS_MFMT_FindField searches the Monitoring record given by the Monitoring File Stream (Stream) for the detail sub-record whose ID matches that specied by FieldID.
Return codes
Upon successful completion, CICS_MFMT_FindField returns a pointer to the CICS_EMP_TDQ_RecordDetails_t object containing the data for the specied eld ID. A value of NULL is returned if no eld matching the specied ID is found in the record. See the CICS Administration Guide for related information.
Syntax
#include <cicsmfmt.h> char void void *CICS_MFMT_GetMessage (int MessageNumber, int SetNumber); CICS_MFMT_FreeMessage (char *Message); CICS_MFMT_ReleaseCatalogue (void);
These functions support the message catalog for cicsmfmt. CICS_MFMT_GetMessage retrieves a message from the cicsmfmt message catalog and returns a copy of the message text in a string allocated by the malloc command. MessageNumber gives the message number and SetNumber gives the message set number. If the function cannot nd one of the InfEV error messages, a copy of the US English message is returned.
428
Return codes
Upon successful completion, CICS_MFMT_GetMessage returns a pointer to the malloced space containing the text of the message. If CICS_MFMT_GetMessage cannot open the message catalogue, cannot allocate space using the malloc command for the message, or cannot nd the message, it returns NULL. There is no return value from CICS_MFMT_ReleaseCatalogue. See the CICS Administration Guide for related information.
429
Syntax
#include <cicssfmt.h> enum CICS_SFMT_Status CICS_SFMT_OpenStatsFile (cics_char_t *FileName ,CICS_SFMT_File_t *StatsFileRecord ); enum CICS_SFMT_Status CICS_SFMT_CloseStatsFile (CICS_SFMT_File_t *StatsFileRecord);
CICS_SFMT_OpenStatsFile opens the statistics le, FileName sets the FileHandle and initializes the Record eld of the StatsFileRecord structure to zero if successful, or NULL if the open failed. CICS_SFMT_CloseStatsFile closes the statistics le, using the FileHandle from the StatsFileRecord.
Return codes
CICS_SFMT_STATUS_OK CICS_SFMT_OpenStatsFile opened the statistics le successfully. CICS_SFMT_FILE_ERR CICS_SFMT_OpenStatsFile detected an error attempting to open the statistics le. The global variable errno contains the operating system error code. CICS_SFMT_STATUS_OK CICS_SFMT_CloseStatsFile closed the statistics le successfully. CICS_SFMT_FILE_ERR CICS_SFMT_CloseStatsFile detected an error attempting to close the statistics le. The global variable errno contains the operating system error code.
430
CICS_SFMT_FindRecord CICS_SFMT_FindRecord
Syntax
#include <cicssfmt.h> enum CICS_SFMT_Status CICS_SFMT_FindRecord (time_t StartTime ,time_t EndTime ,CICS_SFMT_File_t *StatsFileRecord );
CICS_SFMT_FindRecord searches the statistics le specied by the FileHandle in the StatsFileRecord structure, to obtain the record that indicates the start of statistics collection in the time interval specied by StartTime and EndTime. It uses CICS_SFMT_ReadRecord to read records from the statistics le.
Return codes
CICS_SFMT_STATUS_OK CICS_SFMT_FindRecord has located the statistics record successfully. CICS_SFMT_FILE_ERR CICS_SFMT_FindRecord detected an invalid statistics record. CICS_SFMT_FILE_SHORT_READ CICS_SFMT_FindRecord detected an unexpected EOF. CICS_SFMT_REC_NOT_FOUND CICS_SFMT_FindRecord was unable to nd the specied record in the le.
CICS_SFMT_ReadRecord
Syntax
#include <cicssfmt.h> enum CICS_SFMT_Status CICS_SFMT_ReadRecord (CICS_SFMT_File_t *StatsFileRecord);
CICS_SFMT_ReadRecord reads the next record from the Statistics le specied by the FileHandle member of the StatsFileRecord into the Record member of the structure.
431
CICS_SFMT_Msg2Int
Syntax
#include <cicssfmt.h> void CICS_SFMT_Msg2Int(CICSSTAT_Mesg_t MsgIndex ,int MsgNumber ,int MsgSet );
CICS_SFMT_Msg2Int obtains the NLS format of MsgNumber and the MsgSet based on the MsgIndex, for example, the Category or the Description elds of the CICS_SFMT_StatsRecord_t structure.
Return codes
None.
432
433
v Temporary storage Message The statistic message is a default message from the main CICS message catalog, which a statistics formatter can use to describe the contents of the statistic. The sample program cicssfmt provides its own message catalog containing statistic messages, accessed with the statistic ID, but the default can be used if another catalog cannot be found. The message is detail is not used for general statistics. Explanation Explains what this statistic is used for.
General statistics
Table 10 lists the general statistic categories. Table 11 on page 438 lists the statistic types.
Table 10. Statistic categories
Statistic ID 010000 High-level language names, statistic category, explanation C COBOL CS-CATID-DUMP Category Dump Explanation: This is used as part of a statistics record to indicate that the record contains the statistics for the dump category. See Dump statistics on page 441. 020000 C COBOL CS-CATID-FILE Category File Explanation: This is used as part of a statistics record to indicate that the record contains the statistics for the le category. See File statistics on page 442. CICSSTAT_CATID_FILE CICSSTAT_CATID_DUMP
434
435
436
437
438
439
440
Dump statistics
Dump statistics records number of dumps written and number of dump directory write errors.
Table 12. Dump statistics
Statistic ID 010000 High-level language names, statistic message, explanation C COBOL CS-DUMP-DUMPS-WRITTEN Message Number of dumps written Explanation: This is used in the statistics record to indicate the number of dumps that were written. 010001 C COBOL CS-DUMP-WRITE-ERRORS Message Number of dump directory write errors Explanation: Used in the statistics record to indicate the number of write errors that occurred while dumps were being taken. CICSSTAT_DUMP_WRITE_ERRORS CICSSTAT_DUMP_DUMPS_WRITTEN
441
File statistics
You can use le statistics to monitor input and output activity of application requests against your les. File statistics indicate the number of service requests that CICS processes against each le. If CICS totals the number of requests on every CICS invocation, you can monitor any changes that occur in the input and output activity for each le. Because these le statistics might have been reset during the day, see the summary report to obtain a gure of total activity against a particular le during the day. The statistics do not tell you directly how many input and output accesses CICS has performed for each transaction. You require a single-transaction measurement for this. Nevertheless, by regularly totalling the service requests against individual les, you can anticipate le problems that might occur when input and output activity increases. The statistical information provided by CICS for les lists the number of service requests processed against each le dened in the File Denitions (FD). The information is dependent on the types of request allowed on the le.
Table 13. File statistics
Statistic ID 020000 High-level language names, statistic message, explanation C COBOL CS-FILE-NOREADS Message Number of le control reads Explanation: This is used in the statistic record label to indicate the number of reads performed by le control. 020001 C COBOL CS-FILE-NOWRITES Message Number of le control writes Explanation: This is used in the statistic record label to indicate the number of writes performed by le control. CICSSTAT_FILE_NOWRITES CICSSTAT_FILE_NOREADS
442
443
444
445
446
447
448
449
450
451
452
453
Journal statistics
CICS produces statistical information for every journal dened to a CICS region.
Table 15. Journal statistics
Statistic ID 040000 High-level language names, statistic message, explanation C COBOL CS-JOUR-CALLBACK-COUNT Message Number of requests to perform system log archive management Explanation: This is used in the statistic record to indicate the number of times the Log Service has called CICS with an archive management request during the selected period. 040001 C COBOL CS-JOUR-NOSPACE-TOTAL Message Number of journal NOSPACE conditions Explanation: This is used in the statistic record to indicate the total number of journal NOSPACE conditions arising during the selected period. These conditions arise when CICS is unable to write to a user journal because there is insufficient space available in the relevant le system. 040002 C COBOL CS-JOUR-NOSPACE-ITERATIONS-TTL Message Number of journal write retries attempted Explanation: This is used in the statistic record to indicate the number of unsuccessful attempts to write a record to a user journal due to NOSPACE conditions during the selected period. When a journal write fails because of a NOSPACE condition, the write is retried at intervals until space becomes available. CICSSTAT_JOUR_NOSPACE_ITERATIONS_TOTAL CICSSTAT_JOUR_NOSPACE_TOTAL CICSSTAT_JOUR_CALLBACK_COUNT
454
455
456
457
Program statistics
CICS produces statistical information for all programs dened in the Program Denitions (PD). You can use these statistics to assist in tuning the system and for accounting purposes. You can also use them to calculate the average interval between uses of a program by dividing the statistics interval time by the number of times a program is used.
458
459
460
461
462
463
Storage statistics
CICS provides statistical information relating to three distinct storage areas: v Region pool v Task-shared pool v Task-private pool Task-private pool statistics are also included in the CICS Administration Guide.
Table 19. Region pool statistics
Statistic ID 080000 High-level language names, statistic message, explanation C COBOL CS-STOR-RPOOL-SIZE Message The region pool size (in bytes) Explanation: This statistic records the congured size of the region storage pool as taken from the Region Denition or start up parameters for the region. 080001 C COBOL CS-STOR-RPOOL-THRESH Message The region pool storage stress threshold Explanation: This statistic records the percentage of the region pool which must be allocated from the region pool before it is considered to be under stress. The storage stress threshold is set as a warning marker to highlight that some transactions and CICS processes may start to abnormally terminate because there is not enough region pool storage to satisfy requests for control blocks. 080002 C COBOL CS-STOR-RBYTES-USED Message The number of bytes allocated from region pool Explanation: This statistic records the number of bytes currently allocated from the region pool during the selected period. This value reects activity in the region pool since the last statistics collection run. CICSSTAT_STOR_RBYTES_USED CICSSTAT_STOR_RPOOL_THRESH CICSSTAT_STOR_RPOOL_SIZE
464
465
466
467
468
469
470
471
472
Task statistics
CICS produces accumulated statistical information relating to all tasks.
Table 22. Task statistics
Statistic ID 0A0000 High-level language names, statistic message, explanation C COBOL CS-TASK-NUM-TRANS Message Total number of transactions started Explanation: This is used in the statistic record, to indicate the total number of transactions run in the region during the selected period. 0A0001 C COBOL CS-TASK-NUM-TRANS-ABENDED Message Total number of transactions which abnormally terminated Explanation: This is used in the statistic record, to indicate the total number of transactions abnormally terminated in the region during the selected period. 0A0002 C COBOL CS-TASK-NUM-INVALID-ADDRESS Message Total number of exceptions raised due to invalid memory addresses Explanation: This is used in the statistic record, to indicate the total number of exceptions raised in the region, due to invalid memory addresses, during the selected period. 0A0003 C COBOL CS-TASK-NUM-PROT-VIOLATION Message Total number of exceptions raised due to protection violations Explanation: This is used in the statistic record, to indicate the total number of exceptions raised in the region, due to protection violations, during the selected period. CICSSTAT_TASK_NUM_PROT_VIOLATION CICSSTAT_TASK_NUM_INVALID_ADDRESS CICSSTAT_TASK_NUM_TRANS_ABENDED CICSSTAT_TASK_NUM_TRANS
473
474
475
Terminal statistics
Terminal statistics are important for performance analysis for several reasons. The number of inputs and outputs can show the loading of the system by end-users. The statistics also show transmission faults. Both these factors have a negative inuence on system performance. The number of messages received and sent by a terminal represents the amount of message activity for that terminal. These numbers represent the message traffic between CICS and terminals. Input traffic is the result of user initiated input, which is initial transaction input or input as a result of a conversational read to the terminal. Output messages are written by the application program or sent by CICS. These messages can vary because of differences in the application programs being used on different terminals. Transactions initiated by automatic task initiation (ATI) usually do not have terminal input but can generate one, or many, output messages. CICS provides global statistical information relating to all terminals that are dened in the Terminal Denitions (WD). CICS also provides statistics information for each individual terminal.
476
477
478
479
480
481
482
Transaction statistics
CICS provides statistical information for all transactions dened in the Transaction Denitions (TD).
Table 25. Transaction statistics
Statistic ID 0D0000 High-level language names, statistic message, explanation C COBOL CS-TRAN-TRAN-STARTS Message Total number of times transaction started Explanation: Statistic record label. CICSSTAT_TRAN_TRAN_STARTS
483
484
485
486
487
488
489
490
CICSECIANIMATE
CICSEPIANIMATE
491
CICSEXTERNALTRACE
CICSKEY CICSPATH
CICS_BROWSE_CACHE CICS_HOSTS
CICS_CST_HTML
CICS_IBMC_FLAGS
CICS_IBMCOB_FLAGS
CICS_IBMPLI_FLAGS
492
CICS_PPCGWY_SERVER
CICS_SFS_DATA_VG
CICS_SFS_LOG_SIZE
CICS_SFS_LOG_VG
CICS_SUPPRESS_XAOPEN_STRING
493
CICS_XFH_DBNAME
CICS_XFH_ COMMITINTERVAL
CICS_XFH_LOCAL_ INDEXED (CICS for Windows On the Windows NT platform where CICS is NT) using DB2 for its le manager, set this variable equal to 1, if the user wants an external le of indexed type to be handled by MF COBOL, instead of DB2. CICS_XFH_LOCAL_RELATIVE (CICS for Windows On the Windows NT platform where CICS is NT) using DB2 for its le manager, set this variable equal to 1, if the user wants an external le of relative type to be handled by MF COBOL, instead of DB2.
494
CICS_XFH_TRANMODE
CICS_XFH_USERNAME
CICS_XFH_USERPASS
COBDIR
COBLIB COBOPTS
495
DB2DBDFT ENCINA_AUTHN
ENCINA_AUTHZ
ENCINA_BINDING_FILE
ENCINA_CDS_ROOT
ENCINA_GWY_SERVER
ENCINA_KEY_FILE
496
LANG
497
TERM
CICS does not allow you to use absolute or relative paths when specifying locale names. Locale names must not be larger than 32 bytes in length.
Environment variables for Micro Focus COBOL and Net Express compiler options
Table 28. Environment variables for Micro Focus COBOL compiler options
Option VSC2 OSVS ANS85 IBMCOMP NOALTER NOTRUNC NOBOUND WARNING=2 ANIM DEFAULTBYTE=0 Note Required for COBOL II (CICS for AIX) or HP COBOL/HPUX (CICS for HP-UX). The default value is NOVSC2. Recommended. The default value is NOOSVS. The default value is ANS85. Recommended. The default value is NOIBMCOMP. Recommended. The default value is ALTER. Recommended USAGE COMP truncation behavior. The default value is TRUNC=ANSI. Recommended no check on OCCURS limits at runtime. The default value is NOBOUND. Default gives informational messages. The default value is WARNING=3. Required for ANIMATOR debugging. The default value is NOANIM. Recommended initializes data division entries to low-values instead of spaces. The default value is DEFAULTBYTE=32.
498
499
500
501
See the example model for Sun command tool and Table 33 on page 504. shell tool
Table 30. Terminal MD05 and MD06 Attribute Permanent ModelId DevType
Denition attributes for autoinstall models MDCL, MDCI, MD01, MD02, MD03, MD04,
MDCI yes cicseci ibmcics-eci no yes no 0 no no none none yes 145 10 0 no no no no no no no no no no no no 24 80 none yes MD01 yes vt100 vt100 MD02 yes aixterm aixterm MD03 MD04 yes yes aix-m ibm3151 aixterm-m ibm3151 MD05 yes ibm3161 ibm3161 MD06 yes ibm3164 ibm3164
MDCL yes cicscli ibmcicsclient CanStartATIs yes CanStartTTIs yes UCTranFlag no TCTUALen 0 Katakana no IsPrinter no TSLKeyList none RSLKeyList none IsShippable yes TermType 145 TermSubType 10 Priority 0 ErrLastLine yes ERRIntensify yes ErrColor no ERRHilight no OutService no Highlight yes Foreground yes ProgramSymbols no SOSI no Outline no Validation no ExtDS yes NumLines 24 NumColumns 80 TerminalProtection none RecoverTerminal yes
yes yes no 0 no no none none yes 145 10 0 yes yes no no no yes no no no no no yes 24 80 none yes
yes yes no 0 no no none none yes 145 10 0 yes yes red no no yes yes no no no no yes 24 80 none yes
yes yes no 0 no no none none yes 145 10 0 yes yes no no no yes no no no no no yes 24 80 none yes
yes yes no 0 no no none none yes 145 10 0 yes yes no no no yes no no no no no yes 24 80 none yes
yes yes no 0 no no none none yes 145 10 0 yes yes no no no yes no no no no no yes 24 80 none yes
yes yes no 0 no no none none yes 145 10 0 yes yes no no no yes no no no no no yes 24 80 none yes
Table 31. Terminal Denition attributes for autoinstall models MD07, MD08, MD09, MD10, MD11, MD12, MD13 and MD14 Attribute MD07 MD08 MD09 MD10 MD11 MD12 MD13 MD14 Permanent yes yes yes yes yes yes yes yes
502
Table 31. Terminal Denition attributes for autoinstall models MD07, MD08, MD09, MD10, MD11, MD12, MD13 and MD14 (continued) Attribute MD07 MD08 MD09 MD10 MD11 MD12 MD13 MD14 ModelId hft-mb hft mft-mb mft lft-mb lft hp hpterm DevType hft-mb hft mft-mb mft lft-mb lft hp hpterm CanStartATIs yes yes yes yes yes yes yes yes CanStartTTIs yes yes yes yes yes yes yes yes UCTranFlag no no no no no no no no TCTUALen 0 0 0 0 0 0 0 0 Katakana no no no no no no no no IsPrinter no no no no no no no no TSLKeyList none none none none none none none none RSLKeyList none none none none none none none none IsShippable yes yes yes yes yes yes yes yes TermType 145 145 145 145 145 145 145 145 TermSubType 10 10 10 10 10 10 10 10 Priority 0 0 0 0 0 0 0 0 ERRLastLine yes yes yes yes yes yes yes yes ERRIntensify yes yes yes yes yes yes yes yes ERRCOlor red red no no no no no no ERRHilight no no no no no no no reverse OutService no no no no no no no no Highlight yes yes yes yes no no no yes Foreground yes yes no no no no no no ProgramSymbols yes no yes no yes no no no SOSI yes no yes no yes no no no Outline yes no yes no no no no no Validation no no no no no no no no ExtDS yes yes yes yes yes no no yes NumLines 24 24 24 24 24 24 24 24 NumColumns 80 80 80 80 80 80 80 80 TerminalProtection none none none none none none none none RecoverTerminal yes yes yes yes yes yes yes yes Table 32. Terminal MD21 and MD22 Attribute Permanent ModelId DevType CanStartATIs CanStartTTIs UCTranFlag TCTUALen Katakana IsPrinter Denition attributes for autoinstall models MD15, MD16, MD17, MD18, MD19, MD20,
MD15 yes xterm xterm yes yes no 0 no no MD16 yes 3270C 3270C yes yes no 0 no no MD17 yes 3270M 3270M yes yes no 0 no no MD18 yes vt220 vt220 yes yes no 0 no no MD19 yes vt300 vt300 yes yes no 0 no no MD20 yes dtterm dtterm yes yes no 0 no no MD21 yes 3270C-3 3270C-3 yes yes no 0 no no MD22 yes 3270M-3 3270M-3 yes yes no 0 no no
503
Table 32. Terminal Denition attributes for autoinstall models MD15, MD16, MD17, MD18, MD19, MD20, MD21 and MD22 (continued) Attribute MD15 MD16 MD17 MD18 MD19 MD20 MD21 MD22 TSLKeyList none none none none none none none none RSLKeyList none none none none none none none none IsShippable yes yes yes yes yes yes yes yes TermType 145 145 145 145 145 145 145 145 TermSubType 10 10 10 10 10 10 10 10 Priority 0 0 0 0 0 0 0 0 ERRLastLine yes yes yes yes yes yes yes yes ERRIntensify yes yes yes yes yes yes yes yes ERRCOlor red red no no red red red no ERRHilight no no no no no no no no OutService no no no no no no no no Highlight yes yes no yes yes yes yes no Foreground yes yes no no yes yes yes no ProgramSymbols no no no no no no no no SOSI no no no no no no no no Outline no no no no no no no no Validation no no no no no no no no ExtDS yes yes no yes yes yes yes no NumLines 24 24 24 24 24 24 32 32 NumColumns 80 80 80 80 80 80 80 80 TerminalProtection none none none none none none none none RecoverTerminal yes yes yes yes yes yes yes yes Table 33. Terminal MD28 Attribute Permanent ModelId
DevType CanStartATIs CanStartTTIs UCTranFlag TCTUALen Katakana IsPrinter TSLKeyList RSLKeyList IsShippable TermType TermSubType Priority
Denition attributes for autoinstall models MD23, MD24, MD25, MD26, MD27 and
MD23 MD24 MD25 MD26 MD27 yes yes yes yes yes 3270C-4 3270M-4 3270C-5 3270M-5 97801 3270C-4 3270M-4 3270C-5 3270M-5 97801 yes yes no 0 no no none none yes 145 10 0 yes yes no 0 no no none none yes 145 10 0 yes yes no 0 no no none none yes 145 10 0 yes yes no 0 no no none none yes 145 10 0 yes yes no 0 no no none none yes 145 10 0 MD28 yes suncmd suncmd yes yes no 0 no no none none yes 145 10 0
504
Table 33. Terminal Denition attributes for autoinstall models MD23, MD24, MD25, MD26, MD27 and MD28 (continued) Attribute MD23 MD24 MD25 MD26 MD27 MD28 ERRLastLine yes yes yes yes yes yes ERRIntensify yes yes yes yes yes yes ERRCOlor red no red no red red ERRHilight no no no no no no OutService no no no no no no Highlight yes no yes no yes yes Foreground yes no yes no yes yes ProgramSymbols no no no no no no SOSI no no no no no no Outline no no no no no no Validation no no no no no no ExtDS yes no yes no yes yes NumLines 43 43 27 27 24 24 NumColumns 80 80 132 132 80 80 TerminalProtection none none none none none none RecoverTerminal yes yes yes yes yes yes
505
506
507
508
509
510
511
512
513
514
515
516
Attribute name GroupName ActivateOnStartup ResourceDescription AmendCounter Permanent RemoteSysId RemoteName RSLKey DestType IOMode ExtrapartitionFile WhenOpened OpenMode RecordType RecordLen RecordTerminator IndirectQueueId FacilityType RecoveryType TriggeredTransId TriggerLevel FacilityId TemplateDened Attribute name GroupName ActivateOnStartup ResourceDescription AmendCounter Permanent TSLKeyList RSLKeyList Principal Priority TraceFile OpID DCECell
517
CD, TD, Activate the resource at cold start? TDD, TSD, UD, WD AddOpt AllocateTimeout AllowDebugging AmendCounter FD CD RD Add access status Timeout on allocate (in seconds) Allow use of the application debugging tool
Number of updates CD, FD, GD, GSD, JD, LD, MD, PD, RD, SCD, SSD, TD, TDD, TSD, UD, WD, XAD RD RD RD FD FD SSD WD WD RD SSD RD UD Userid authentication performed by DCE or CICS? CICS on Open Systems Mode for autoinstallation of terminals Server lename Browse access status Buffer pool size in Kbytes Is terminal available for ATI requests? Can transactions be initiated from this terminal? ATI purge interval (hours) Number of Log writes per checkpoint interval Number of records logged between checkpoints Encrypted password
AuthenticationService AutoDCELogin AutoInstallMode BaseName BrowseOpt BufferPoolSize CanStartATIs CanStartTTIs CARPDelayHours Checkpoint CheckpointInterval CICSPassword
518
519
520
CD, FD, Group to which resource belongs GD, JD, LD, PD, TD, TDD, TSD, UD, WD, XAD RD WD RD SSD MD SCD SCD SCD SCD FD SCD SCD SCD SCD SCD SCD SCD SCD TDD TD JD CD RD RD TD TDD Startup groups Does terminal support highlighting? HTML Browser for help text Idle timeout Monitoring identiers to be included Secondary Index 1 - Descending Fields Secondary Index 10 - Descending Fields Secondary Index 1 - Field Names Secondary Index 10 - Field Names Server Index Name Secondary Index 1 - Name Secondary Index 10 - Name SFS ONLY: Secondary Index 1 - Preallocated Pages SFS ONLY: Secondary Index 10 - Preallocated Pages Secondary Index 1 - Is it Unique? Secondary Index 10 - Is it Unique? SFS ONLY: Secondary Index 1 - Volume Name SFS ONLY: Secondary Index 10 - Volume Name Indirect Queue Name Effect of FORCEPURGE for InDoubt transactions Open journal on region startup? Set connection in service? Interval between region consistency checks (mins) Level of checking to perform on region Contexts in which transaction can START Input/Output Mode of EP Queue
Groups Highlight HTMLBrowser IdleTimeout Include IndexFieldDescenders1 IndexFieldDescenders10 IndexFieldNames1 IndexFieldNames10 IndexName IndexName1 IndexName10 IndexPreallocatePages1 IndexPreallocatePages10 IndexUnique1 IndexUnique10 IndexVolumeName1 IndexVolumeName10 IndirectQueueId InDoubt InitialOpenFlag InService IntrospectInterval IntrospectLevel InvocationMode IOMode
521
522
GSD, SSD AIX logical volume for logging RD SCD RD RD RD TD RD TD RD RD RD WD RD MD Maximum Console size SFS ONLY: Maximum Number of Records Region Pool Storage Size (bytes) Maximum number of Application Servers to maintain CICS on Open Systems CICS on Open Systems Task-private Storage Size (bytes) Task Shared Pool Storage Size (bytes) Minimum number of Application Servers to maintain Autoinstall Model Identier Protect resource from modication? Protect the resource from modication? Set monitoring on? Enable MRA Archiving? local Named Pipe name
MD SSD LD
GSD, SSD Name Service for advertising server RD Use DCE Name Service (CDS) to locate CICS and Encina servers? NetName of the shell terminal SFS le storing Non-Recoverable TDQs SFS Index for Non-Recoverable TDQs Maximum number of records for Non-recoverable TDQs Number of pages to preallocate for NonRecTDQFile Min protect level for non-recoverable TDQs Non-recoverable TDQ Volume Name SFS le storing Non-Recoverable Auxiliary TSQs SFS Index for Non-Recoverable Auxiliary TSQs Maximum number of records for Non-recoverable TSQs Number of pages to preallocate for NonRecTSQFile
NetName NonRecTDQFile NonRecTDQIndex NonRecTDQMaxRecs NonRecTDQPrePages NonRecTDQProtection NonRecTDQVol NonRecTSQFile NonRecTSQIndex NonRecTSQMaxRecs NonRecTSQPrePages
WD RD RD RD RD RD RD RD RD RD RD
523
Protect resource from modication? CD, FD, GD, GSD, JD, LD, PD, SCD, SSD, TD, TDD, TSD, UD, WD, XAD
PhysicalTDQFile PhysicalTDQIndex PhysicalTDQMaxRecs PhysicalTDQPrePages PhysicalTDQProtection PhysicalTDQVol PreallocatePages PrePages PrimaryIndexDescenders PrimaryIndexFields PrimaryIndexName
SFS le storing Physically Recoverable TDQs SFS Index for Physically Recoverable TDQs Maximum number of records for Physically Recoverable TDQs Number of pages to preallocate for PhysicalTDQFile Min protect level for physical TDQs Physically Recoverable TDQ Volume Name SFS ONLY: Number of Pages to Preallocate Number of pages to preallocate Descending Field Names for Primary Index Field Names for Primary Index Primary Index Name
524
GSD, SSD Protection level RD LD RD TD RD RD FD TDD FD TDD TDD TSD FD TDD RD RD RD RD RD RD Purge delay period for PROTECT requests (hours) Protocol type User Trace le or path for guest logins Transaction purgeability Purge delay period for no PROTECT requests (hours) The RDBMS Instance name Read access status Record length for xed length EP queue Record length to use with remote requests ASCII value of terminator for xed length queue Record organization for EP queue data le Is queue recoverable? Recoverability status Recoverability type of IP queue SFS le storing Recoverable Auxiliary TSQs SFS Index for Recoverable Auxiliary TSQs Maximum number of records for Recoverable Auxiliary TSQs Number of pages to preallocate for RecTSQFile Min protect level for recoverable TSQs Recoverable Auxiliary TSQ Volume Name
525
TD, TDD, Remote System Identier TSD FD PD WD Remote System Name Remote system on which to run program System to which terminal belongs Security level for inbound requests TCP address for the remote system TCP port number for the remote system Is this a program that should be cached?
CD CD CD PD
Resource description CD, FD, GD, GSD, JD, LD, MD, PD, RD, SCD, SSD, TD, TDD, TSD, UD, WD, XAD SSD RD TD Number of threads devoted to resource operations Number of threads for RPC requests Type of RSL Checks
526
RSLKeyList
RSLKeyMask RuntimeProtection SafetyLevel ServerIdleLimit ServerSideTran ShortName ShutdownProgList1 ShutdownProgList2 SNAConnectName SNADefaultModeName SNAModeName SNAServerNodeName SOSI StartType
CD RD RD RD RD
Resource Security Level (RSL) Key Mask Min protect level used when accepting RPCs Level of protection against user corruption Time before Application Servers terminate (secs) Server side transactions only ?
GSD, SSD Short name used for SRC RD RD CD GSD TD LD WD Programs to execute at phase 1 of shutdown Programs to execute at phase 2 of shutdown SNA prole describing the remote system SNA default mode name (HP only) SNA modename for this transaction local SNA Node Name Does terminal support SOSI
GSD, SSD Cold or auto start? RD Startup type Programs to execute at startup File or path for statistics Should stats be recorded at every interval? Should map names be suffixed? Switch Load File Path Name Type of Syncpoint Flows System dump on shutdown, SNAP dumps, ASRx abends? System trace buffer size Task Shared Pool base register Number of Task Shared Pool Address Hash Buckets Threshold for TSH Pool short on storage (%age) The class of transaction
StartupProgList StatFile StatsRecord SufficesSupported SwitchLoadFile Syncpoint SysDump SysTraceBufferSize TaskSharedPoolBase TaskSHNumBuckets TaskShPoolThreshold TClass
RD RD RD RD XAD TD RD RD RD RD RD TD
527
TDQ TemplateDened
MD
TemporaryStorageRSLCheck TerminalProtection TermSubType TermType ThreadPoolSize Timeout TPNSNAProle Trace TraceFile TraceFileA TraceFileB TraceFileSize TraceModules TransactionRSLCheck TransDump TransDumpTrace TransId TransientDataRSLCheck TriggeredTransId TriggerLevel TSLCheck TSLKey
Type of RSL checking for TSQs Protection level Terminal subtype Terminal type Number of threads for RPC requests Conversational timeout value (mins) SNA TPN prole for APPC listener program Modules to trace User Trace lename File or path (A) for system trace File or path (B) for system trace Maximum system trace le size Module list for partial trace Type of RSL checking for Transactions Should transaction be dumped on an abend? Transaction Dump Trace Transaction name on remote system for program Type of RSL checking for TDQs Triggered Transaction Identier Trigger Level Type of TSL Checks Transaction Level Security Key
528
CD RD TD TD WD
Transaction Security Level (TSL) Key Mask Expiry limit for unaccessed TSQs (days) Transaction Work Area Size Should data be converted to uppercase? Should terminal convert data to uppercase? Update access status User Exit number
UpdateOpt UserExitNumber UserID UserMonitorModule UserTraceDirectory Validation VariableFieldLength VariableFieldName VariableFieldType VolumeName WhenOpened XAClose XAOpen XASerialize
FD PD
GSD, SSD AIX user ID for server MD RD WD SCD SCD SCD SCD TDD XAD XAD XAD File or path of user monitoring program User trace directory Does terminal support eld validation? Variable Field - Length Variable Field - Name Variable Field - Type SFS ONLY: Volume Name Time at which queue is to be opened Resource Manager Termination String Resource Manager Initialization String Resource Manager Serialization Attribute
529
530
Bibliography
v CICS Administration Guide v CICS Intercommunication Guide, SC09-4462 v CICS Application Programming Guide, SC09-4460 v CICS Problem Determination Guide, SC09-4465 v Encina Administration Guide Volume 2: Server Administration, SC09-4474 v Concepts and Facilities, SC09-4455 v CICS Application Programming Reference, SC09-4461 v Planning and Installation Guide v CICS Clients: Administration, SC33-1792 v Encina Administration Guide Volume 1: Basic Administration, SC09-4473 v Using IBM Communications Server for AIX with CICS, SC09-4469 v Using IBM Communications Server for Windows NT with CICS, SC09-4470 v Using Microsoft SNA Server with CICS, SC09-4471 v Using SNAP-IX for Solaris with CICS, SC09-4472 v Using HP-UX SNAplus2 with CICS v VTAM Messages and Codes v SNA Formats v v v v v v v Conventional LUA Programming Reference SNA Formats VTAM Messages and Codes SNA Formats Conventional LUA Programming Reference SNA Formats CICS IIOP ORB Programming Guide, SC09-4467 v CICS Administration Reference, SC09-4459 v CICS Family: Client/Server Programming, SC33-1435
531
532
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the users responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS DOCUMENT AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the document. IBM may make
Copyright IBM Corp. 1999
533
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: For Component Broker: IBM Corporation Department LZKS 11400 Burnet Road Austin, TX 78758 U.S.A. For TXSeries: IBM Corporation ATTN: Software Licensing 11 Stanwix Street Pittsburgh, PA 15222 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM International Program License Agreement or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary signicantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specic environment. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available
534
sources. IBM has not tested those products and cannot conrm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. All statements regarding IBMs future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples may include the names of individuals, companies, brands, and products. All of these names are ctitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. If you are viewing this information softcopy, the photographs and color illustrations may not appear.
Microsoft, Windows, Windows NT, and the Windows 95 logo are trademarks of Microsoft Corporation in the United States and/or other countries. Oracle and Oracle8 are registered trademarks of the Oracle Corporation in the United States and/or other countries.
Notices
535
UNIX is a registered trademark of The Open Group in the United States and/or other countries licensed exclusively through X/Open Company Limited. OSF and Open Software Foundation are registered trademarks of the Open Software Foundation, Inc. * HP-UX is a Hewlett-Packard branded product. HP, Hewlett-Packard, and HP-UX are registered trademarks of Hewlett-Packard Company. Orbix is a registered trademark and OrbixWeb is a trademark of IONA Technologies Ltd. Sun, SunLink, Solaris, SunOS, Java, all Java-based trademarks and logos, NFS, and Sun Microsystems are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Some of this documentation is based on material from Object Management Group bearing the following copyright notices: Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright 1995, 1996 AT&T/NCR 1995, 1996 BNR Europe Ltd. 1991, 1992, 1995, 1996 by Digital Equipment Corporation 1996 Gradient Technologies, Inc. 1995, 1996 Groupe Bull 1995, 1996 Expersoft Corporation 1996 FUJITSU LIMITED 1996 Genesis Development Corporation 1989, 1990, 1991, 1992, 1995, 1996 by Hewlett-Packard Company 1991, 1992, 1995, 1996 by HyperDesk Corporation 1995, 1996 IBM Corporation 1995, 1996 ICL, plc 1995, 1996 Ing. C. Olivetti &C.Sp 1997 International Computers Limited 1995, 1996 IONA Technologies, Ltd. 1995, 1996 Itasca Systems, Inc. 1991, 1992, 1995, 1996 by NCR Corporation 1997 Netscape Communications Corporation 1997 Northern Telecom Limited 1995, 1996 Novell USG 1995, 1996 02 Technolgies 1991, 1992, 1995, 1996 by Object Design, Inc. 1991, 1992, 1995, 1996 Object Management Group, Inc. 1995, 1996 Objectivity, Inc. 1995, 1996 Oracle Corporation 1995, 1996 Persistence Software
536
Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright Copyright
1995, 1996 Servio, Corp. 1996 Siemens Nixdorf Informationssysteme AG 1991, 1992, 1995, 1996 by Sun Microsystems, Inc. 1995, 1996 SunSoft, Inc. 1996 Sybase, Inc. 1996 Taligent, Inc. 1995, 1996 Tandem Computers, Inc. 1995, 1996 Teknekron Software Systems, Inc. 1995, 1996 Tivoli Systems, Inc. 1995, 1996 Transarc Corporation 1995, 1996 Versant Object Technology Corporation 1997 Visigenic Software, Inc. 1996 Visual Edge Software, Ltd.
Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specication set forth herein or having conformed any computer software to the specication. WHILE THE INFORMATION IN THIS PUBLICATION IS BELIEVED TO BE ACCURATE, THE OBJECT MANAGEMENT GROUP, AND THE COMPANIES LISTED ABOVE MAKE NO WARRANTY OF ANY KIND WITH REGARDS TO THIS MATERIAL INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The Object Management Group and the companies listed above shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Other company, product, and service names may be trademarks or service marks of others.
Notices
537
538
Index
Special Characters
? (CECI) 308 & (CECI) 302 ? (CEMT) 323 ! (DDT command) 137 ? (DDT command) 138 ! (SDT command) 211 ? (SDT command) 212 + character (CEMT) 326 <Key> restrictions on use of characters 1 Acquired (continued) CEMT INQUIRE FENODE 379 ActivateOnStartup attribute communications denitions 2 le denitions 9 gateway denitions 12 journal denitions 16 listener denitions 19 object denitions 24 product denitions 25 program denitions 27 temporary storage denitions 64 terminal denitions 66 transaction denitions 74 transient data denitions 81 user denitions 86 ADD parameter CEMT inquire/set le 335 addindex (DDT command) 135 addindex (SDT command) 209 AddOpt attribute le denitions 9 aixterm autoinstall model 502 aixterm-m autoinstall model 502 AKP parameter CEMT inquire 355 ALL parameter CEMT 326 CEMT inquire/set le 335 CEMT inquire/set journal 338 CEMT inquire/set monitor 339 CEMT inquire/set program 342 CEMT inquire/set task 344 CEMT inquire/set tclass 347 CEMT inquire/set tdqueue 348 CEMT inquire/set terminal 351 CEMT inquire/set transaction 354 AllocateTimeout attribute communications denitions 2 AllowDebugging region denitions 33 AmendCounter attribute le denitions 9 gateway denitions 13 gateway server denitions 15 journal denitions 17 listener denitions 19 monitoring denitions 22 AmendCounter attribute (continued) object denitions 24 product denitions 25 program denitions 27 region denitions 33 schema le denitions 58 SFS denitions 61 temporary storage denitions 64 terminal denitions 67 transaction denitions 74 transient data denitions 81 user denitions 86 ampersand (CECI) 302 Appl CEMT INQUIRE FETARGET 387 Application Diagnosis Conguration (CDCN) data entry elds 289 description of 287 overview 273 PF (program function) key values 289 reference 287 screen layout 288 syntax 287 APPLID parameter CEMT inquire 355 archive copying resource denitions 153 restoring resource denitions 166 ASCII multi-byte monochrome autoinstall model 503 ASCII single-byte monochrome autoinstall model 503 ASRA dump 334 ASRB dump 334 asterisk character (CEMT) 326 ATI parameter CEMT inquire netname 340 CEMT inquire/set terminal 351 attribute name attribute description cross-reference 507 AuthenticationService attribute region denitions 33 AutoDCELogin attribute region denitions 33
Numerics
327x-3 autoinstall model for cicsteld 504 327x-3-E autoinstall model for cicsteld 504 327x-4 autoinstall model for cicsteld 507 327x-4-E autoinstall model for cicsteld 507 327x-5 autoinstall model for cicsteld 507 327x-5-E autoinstall model for cicsteld 507 327x-x-E for cicsteld autoinstall model 504 327x-x for cicsteld autoinstall model 504 97801 autoinstall model 507
A
abbreviations for keywords 276 ABDump attribute region denitions 32 ABDUMP parameter CEMT inquire/set dumpoptions 334 abnormal termination dump 334 abnormally terminate user task (EDF) 315 about to execute command CECI or CECS information 301 ACL set for CICS directories and groups 219 Acquired CEMT INQUIRE FECONNECTION 373 Copyright IBM Corp. 1999
539
autoinstall autoinstall program parameters 393 terminal Autoinstall user program 390 the supplied program 390 when the program is accessed 394 autoinstall models 501 327x-3-E for cicsteld 504 327x-3 for cicsteld 504 327x-4-E for cicsteld 507 327x-4 for cicsteld 507 327x-5-E for cicsteld 507 327x-5 for cicsteld 507 327x-x-E for cicsteld 504 327x-x for cicsteld 504 97801 507 aixterm 502 aixterm-m 502 ASCII multi-byte monochrome 503 ASCII single-byte monochrome 503 dtterm 504 dxterm (vt300) 504 hp terminal denition 503 hpterm denition 503 IBM CICS Client 502 IBM CICS ECI 502 ibm3151 502 ibm3161 502 ibm3164 502 Sun command tool and shell tool 507 vt100 502 vt220 504 Windowed multi-byte color 503 Windowed multi-byte monochrome 503 Windowed single-byte color 503 Windowed single-byte monochrome 503 xterm 504 AUTOINSTALL parameter CEMT inquire/set 331 AutoinstallMode attribute region denitions 33 automatic transaction initiation restriction with routing transaction 365 Automatic Transaction Initiation (ATI) 340, 351 auxiliary trace CEMT inquire/set 332, 353
B
BaseName attribute le denitions 9 BASENAME parameter CEMT FILE 335 binding strings 159 blank elds in a screen CEMT 328 BROWSE parameter CEMT inquire/set le BrowseOpt attribute le denitions 9 BufferPoolSize attribute SFS denitions 61
335
C
C programs caches 31, 45 Cached attribute object denitions 25 CALF transaction data entry elds 283 description of 281 error screen layout 282 information elds 284 overview 273 PF (program function) key values 285 reference 281 screen layout 281, 282, 289 status information 285 syntax 281 CanStartATIs attribute terminal denitions 67 CanStartTTIs attribute terminal denitions 67 CARPDelayHours attribute region denitions 33 CD (Communications Denitions) CDCN transaction data entry elds 289 description of 287 overview 273 PF (program function) key values 289 reference 287 screen layout 288 syntax 287 CEBR transaction command input area 293 description of 292 information area 295
CEBR transaction (continued) overview 273 PF(program function) key values 295 reference 292 screen layout 293 syntax 292 using the transaction 292 CECI transaction command input 299 description of 298 information area 300 invoking 306 overview 273 PF (program function) key values 304 reference 298 screen layout 299, 306, 307 security rules 298 status area 299 syntax 298 CECS 298 CECS transaction command input 299 description of 298 information area 300 invoking 306 overview 273 PF (program function) key values 304 reference 298 screen layout 299, 306 security rules 298 status area 299 syntax 298 CEDF transaction 310 description of 309 information area 312 interception points 316 invoking EDF 310 overtyping 315 overview 273 parameters 309 PF (program function) key values 313 reference 309 screen layout 310, 318 security 310 status area 312 stopping the application run 318 syntax 309 cell_admin_pw environment variable 98, 100, 101, 103, 107, 110, 115, 117, 119, 122
540
Cell Directory Service congure for CICS 218 directories for CICS 218 CEMT INQUIRE 328 CEMT SET 329 CEMT transaction 369 ? character 323 + character 326 AKP parameter 355 APPLID parameter 355 AUTOINSTALL parameter 331 auxiliary trace 353 AUXTRACE parameter 332 blank elds in a screen 328 command line request 323 DATEFORM parameter 355 description of 321 DISCARD 370 DUMP parameter 333 DUMPOPTIONS parameter 334 FILE parameter 335 INQUIRE 323 INQUIRE FECONNECTION 371 INQUIRE FENODE 377 INQUIRE FEPOOL 381 INQUIRE FEPROPSET 384 INQUIRE FETARGET 386 inquire/set overview 328 inquiring about a resource 327 INTROINTVL parameter 355 invoking 323 JOURNAL parameter 338 LOCALE parameter 355 MAXREGIONPOOL parameter 356 MAXTASKSHPOOL parameter 356 MONITOR parameter 339 NETNAME parameter 340 OPREL parameter 356 OPSYS parameter 356 overtyping a screen 327 overview 273 parameters, overview of 321 PERFORM 323 PERFORM SNAP 330 PF (program function) key values 325 PROGRAM parameter 342 prompting for options 323 reference 321 REGIONTHRESH parameter 356 RELEASE parameter 356
CEMT transaction 369 (continued) request formats 324 screen layout 324 scrolling a screen 326 SET 323 syntax 321 SYSID parameter 356 system parameters 355 tab key 328 TASK parameter 344 TASKTHRESH parameter 356 TCLASS parameter 347 TDQUEUE parameter 348 TERMINAL parameter 351 TRACE parameter 353 TRANSACTION parameter 354 using with CRTE 366 CESF transaction 357 description of 357 overview 273 reference 357 syntax 357 CESN transaction description of 359 overview 274 reference 359 security 359 syntax 359 use as initial transaction 248 character restrictions 1 Checkpoint attribute SFS denitions 61 CheckpointInterval attribute region denitions 33 CICS (Customer Information Control System) CICS-supplied transactions 369 CICS client cicsmigrateclients command 186 cicssetupclients command 216 CICS Client Autoinstall 389 CICS control program cicscp command 97 CICS_HOSTS environment variable 122, 159, 228, 250, 253, 256 CICS_PPCGWY_SERVER environment variable 192 CICS_PPCGWY_SIZE environment variable 106 CICS_PPCGWY_VG environment variable 106 CICS_SFS_DATA_SIZE environment variable 114
CICS_SFS_DATA_VG environment variable 114 CICS_SFS_LOG_SIZE environment variable 114 CICS_SFS_LOG_VG environment variable 114 CICS_SFS_SERVER environment variable 203, 227, 494 CICS_SFS_SIZE environment variable 114, 493 CICS_SFS_VG environment variable 114, 493 CICS-supplied programs CICS Client Autoinstall 389 External Security Manager (ESM) 389 function shipping 389 Overview 389 performance monitoring user program 389 Terminal Autoinstall 389 transaction routing 389 user conversion programs 389 CICS-supplied transactions complete list 278 CICS_SUPPRESS_XAOPEN_STRING environment variable 26, 493 cics_UE_Return_t 408 cics_UE014015_t 411 cics_UE052017_t 411 CICS_XDT_SERVER environment variable 131, 203 cicsadd command 91 cicscleandce command 94 CICSCOL environment variable 176 cicscopystanza command 96 cicscp all options 100 cicscp COBOL commands 101 cicscp command 97 cicscp commands all option 100 COBOL commands 101 DCE commands 102 PPC Gateway server commands 105 region commands 109 sfs_server commands 113 SNA commands 117 SNA link commands 119 telnet server commands 121 cicscp DCE commands 102 cicscp PPC Gateway server commands 105 cicscp region commands 109 cicscp sfs_server commands 113 Index
541
cicscp SNA commands 117 cicsmfmt functions 425 (continued) cicsstart command 240 cicscp SNA link commands 119 CICS_MFMT_ReleaseCatalogue 428 cicsstop command 242 cicscp telnet server commands 121 cicsmigrate command 181 cicstail command 243 cicscvt command 124 cicsmigrateclass command 184 cicstcpnetname command 245 cicsdb2conf command 46, 126 cicsmigrateclients command 186 cicsteld command 247 CICSDB2CONF_CONNECT_USER cicsmkcobol 187 cicsterm command 251 environment variable 491 cicsnetdata program 138, 212 CICSTERM environment CICSDB2CONF_CONNECT_USING running 140, 213 variable 254 environment variable 491 cicsnotify 190 cicstermp command 255 cicsdb2import command 129 cicsnotify command 190 cicstfmt 258 cicsddt command 131 CICSPassword attribute cicstracelter 261 cicsddt commands user denitions 86 cicsupdate command 263 ! 137 cicsppcgwy command 191 cicsupdateclass command 267 addindex 135 cicsppcgwycreate command 193 cicsusedceservers command 270 create 133 cicsppcgwydestroy command 195 CICSUserId attribute database 136 cicsppcgwylock command 197 listener denitions 19 delete 135 cicsppcgwyshut command 199 ClassMaxTaskLim attribute delindex 135 cicsprCOBOL 187 region denitions 34 dtof 137 CICSREGION environment ClassMaxTasks attribute empty 135 variable 92, 146, 151, 154, 157, region denitions 34 ftod 137 161, 169, 201, 241, 242, 259, 264 ClassTableSize attribute help (?) 138 cicsremovelv command 200 region denitions 35 info 136 cicsrlck 201 CLINTCP option on DFHCNV list 132 cicssdt command 203 macro 249 qtod 136 cicssdt commands CLOSED parameter quit 138 CEMT inquire/set le 335 ! 211 read 133 CEMT inquire/set journal 338 addindex 209 user 136 CEMT inquire/set tdqueue 348 create 205 write 134 CMLV transaction delete 208 cicsdefault command 142 delindex 209 description of 362 cicsdefaultservers 144 empty 208 overview 274 cicsdelete command 145 free 208 PF (program function) key cicsdestroy command 148 ftos 211 values 362 cicsdfmt 150 help (?) 212 reference 362 cicsexport command 153 info 209 syntax 362 cicsget command 156 list 205 COBDIR environment variable 188 cicsgetbindingstring command 159 qtos 210 COBLIB environment variable 188 cicsgpid 161 quit 212 COBOL read 206 cicshpterm command 162 setting up for Micro Focus server 210 cicsimport command 166 COBOL 187 setopen 205 cicsimportl 167 COBSW environment variable 342 stof 210 cicsinstall command 169 code page, specifying 247 write 207 cicsivp command 171 CollatingLanguage attribute cicssetupclients command 216 CICSKEY environment variable 176 SFS denitions 61 cicssetupdce command 218 cicslssrc command 173 command execution complete cicssfmt 221 cicslterm command 175 CECI or CECS information 302 cicssfmt functions 429 cicsmakelv command 178 Command Level Interpreter (CECI) cicssfs command 225 cicsmfmt 179 command input 299 cicssfsconf command 228 cicsmfmt functions 425 description of 298 CICS_MFMT_CloseMonitorFile 426 cicssfscreate command 230 information area 300 cicssfsdestroy command 233 CICS_MFMT_FindField 428 invoking 306 cicssfsimport command 235 CICS_MFMT_FreeMessage 428 overview 273 cicssfslock 237 CICS_MFMT_GetMessage 428 PF (program function) key CICS_MFMT_OpenMonitorFile 426 cicssfsshut command 238 values 304 CICS_MFMT_ReadNext 427 cicssrcdestroy command 148 reference 298
542
Command Level Interpreter (CECI) (continued) screen layout 299, 306, 307 security rules 298 status area 299 syntax 298 command syntax check CECI or CECS information 301 commandName parameter CECI and CECS transactions 298 commands 3270 terminal emulation 175, 251 CEMT DISCARD 370 cicsadd 91 cicscleandce 94 cicscp 97 cicscp all 100 cicscp COBOL 101 cicscp DCE 102 cicscp PPC Gateway server 105 cicscp region 109 cicscp sfs_server 113 cicscp SNA 117 cicscp SNA link 119 cicscp telnet server 121 cicscvt 124 cicsdb2conf 126 cicsdb2import 129 cicsddt 131 cicsdefault 142 cicsdelete 145 cicsdestroy 148 cicsdfmt 150 cicsexport 153 cicsget 156 cicsgetbindingstring 159 cicsgpid 161 cicsimport 166 cicsinstall 169 cicsivp 171 cicslssrc 173 cicslterm 175 cicsmakelv 178 cicsmfmt 179 cicsmkcobol 187 cicsnotify 190 cicsppcgwy 191 cicsppcgwycreate 193 cicsppcgwydestroy 195 cicsppcgwyshut 199 cicsremovelv 200 cicssdt 203 cicssetupdce 218
commands (continued) cicssfmt 221 cicssfs 225 cicssfsconf 228 cicssfscreate 230 cicssfsdestroy 233 cicssfsimport 235 cicssfslock 237 cicssfsshut 238 cicsstart 240 cicsstop 242 cicstail 243 cicstcpnetname 245 cicsteld 247 cicsterm 251 cicstfmt 258 cicstracelter 261 cicsupdate 263 cicsusedceservers 270 Commands 3270 terminal emulation 162 cicshpterm 162 cicsppcgwylock 197 Communications Denitions (CD) 1 conguring DB2 cicsdb2conf command 126 conguring SFS cicssfsconf command 228 ConnectionType attribute communications denitions 2 Console Message Log Viewer (CMLV) description of 362 overview 274 reference 362 syntax 362 constants for user exits 408 Control Panel Language setting 248 Conversational attribute monitoring denitions 22 copying a region 153 CoreDumpName attribute region denitions 35 create (DDT command) 133 create (SDT command) 205 CRTE transaction automatic transaction initiation 365 description of 364 overview 274 reference 364 syntax 364 SYSID parameter 364 using with CEMT 366
CrucialFlag attribute journal denitions 17 CSSF 357 CSSF transaction 357 description of 357 overview 274 reference 357 syntax 357 CSTD transaction description of 367 overview 274 PF (program function) key values 368 reference 367 screen layout 367 syntax 367 CUBSDelayMinutes attribute region denitions 35 CWASize attribute region denitions 35
D
Data Conversion (CALF) data entry elds 283 description of 281 error screen layout 282 information elds 284 overview 273 PF (program function) key values 285 reference 281 screen layout 281, 282, 289 status information 285 syntax 281 database (DDT command) 136 DATASET parameter CEMT inquire/set journal 338 DataVolume attribute SFS denitions 61 DateForm attribute region denitions 35 DATEFORM parameter CEMT inquire 355 DB2 Diagnostic Tool cicsddt command 131 DB2DBDFT environment variable 129, 131 DB2INSTANCE environment variable 46 DCE CDS 270 congure for CICS 218 DCE client 186 deleting CICS directories and groups 94 Index
543
DCE (continued) directory service 159 security services 270 DCECell attribute communications denitions 3 gateway denitions 13 user denitions 86 DDT commands ! 137 addindex 135 create 133 database 136 delete 135 delindex 135 dtof 137 empty 135 ftod 137 help (?) 138 info 136 list 132 QSAM to DB2 le transfer 138 qtod 136 quit 138 read 133 user 136 write 134 DeadLockTimeout attribute transaction denitions 74 deallocating resources 190 debugging a remote transaction 310 debugging tool EDF 309 default region copying 142 dump directory 150 DefaultFileServer attribute region denitions 54 DefaultSNAModeName communications denitions 3 DefaultUserId attribute region denitions 35 dening and managing resources Communications Denitions (CD) 1 File Denitions (FD) 8 Gateway Denitions (GD) 12 Gateway Server Denitions (GSD) 14 Journal Denitions (JD) 16 Listener Denitions (LD) 19 Monitoring Denitions (MD) 21 object denitions 24 Product Denitions (XAD) 25 Program Denitions (PD) 27 Region Denitions (RD) 32
dening and managing resources (continued) Region Denitions for le server (RD) 54 Temporary Storage Denitions (TSD) 64 Terminal Denitions (WD) 66 Transaction Denitions (TD) 73 Transient Data Denitions (TDD) 81 User Denitions (UD) 85 denition les used by qtod 140 denition les used by qtos 214 delete (DDT command) 135 delete (SDT command) 208 DELETE parameter CEMT inquire/set le 336 DeleteOpt attribute le denitions 9 delindex (DDT command) 135 delindex (SDT command) 209 DEST parameter CEMT inquire/set task 344 destid parameter CEMT inquire/set tdqueue 348 DestType attribute transient data denitions 81 Device CEMT INQUIRE FEPOOL 383 DevType attribute terminal denitions 67 DFHCHATX, terminal autoinstall program 391 DFHCNV macro CLINTCP option 249 conversion by cicscvt 124 SRVERCP option 249 DISABLED parameter CEMT inquire/set le 336 CEMT inquire/set tdqueue 348 CEMT inquire/set transaction 354 DiskA attribute journal denitions 17 DiskAStatus attribute journal denitions 17 DiskB attribute journal denitions 17 DiskBStatus attribute journal denitions 18 DISPATCHABLE parameter CEMT inquire/set task 344 dtof (DDT command) 137 dtterm autoinstall model 504 dual screen mode (EDF) 320
dump CEMT 334 CEMT requests 330 dump formatter command 150 DUMP parameter CEMT 330 CEMT inquire/set 333 dump request user exit (17) 411 dump statistics 441 DumpName attribute region denitions 36 DUMPOPTIONS parameter CEMT inquire/set 334 dxterm (vt300) autoinstall model 504 Dynamic attribute transaction denitions 74 dynamic distributed program link user exit (50) 418 dynamic transaction routing user exit (25) 413
E
ECIPasswordCacheSeconds region denitions 36 EDF 309, 310 dual screen mode 320 information area 312 interception points 316 invoking 310 overtyping 315 parameters 309 PF (program function) key values 313 screen layout 310, 318 security 310 status area 312 stopping the application run 318 empty (DDT command) 135 empty (SDT command) 208 emptying journals 17 emptying transient data queues 83 EmptyOpt attribute le denitions 9 ENABLED parameter CEMT inquire/set le 336 CEMT inquire/set tdqueue 348 CEMT inquire/set transaction 354 EnableStatus attribute le denitions 9 program denitions 28 transaction denitions 75 ENCINA_BINDING_FILE environment variable 159, 203
544
Encina SFS 159, 270 ErrorIsolation attribute le denitions 9 ENCINA_SFS_SERVER environment variable 493 ESM (External Security Manager) 389 encryption 5 ESMLoad attribute environment variables 491 region denitions 37 cell_admin_pw 98, 100, 101, 103, ESMModule attribute 107, 110, 115, 117, 119, 122 region denitions 37 CICS_HOSTS 122, 159, 228, 250, Exclude attribute 253, 256 monitoring denitions 22 CICS_PPCGWY_SERVER 192 CICS_PPCGWY_SIZE 106 exec interface block CICS_PPCGWY_VG 106 CECI or CECS information 302 CICS_SFS_DATA_SIZE 114 Execution Diagnostic Facility (CEDF) CICS_SFS_DATA_VG 114 description of 309 CICS_SFS_LOG_SIZE 114 information area 312 CICS_SFS_LOG_VG 114 interception points 316 CICS_SFS_SERVER 203, 227, 494 invoking EDF 310 CICS_SFS_SIZE 114, 493 overtyping 315 CICS_SFS_VG 114, 493 overview 273 CICS_SUPPRESS_XAOPEN_STRING 26, parameters 309 493 PF (program function) key CICS_XDT_SERVER 131, 203 values 313 CICSCOL 176 reference 309 CICSDB2CONF_CONNECT_USER 491 screen layout 310, 318 CICSDB2CONF_CONNECT_USING 491 security 310 CICSKEY 176 status area 312 CICSREGION 92, 146, 151, 154, stopping the application 157, 161, 169, 201, 241, 242, 259, run 318 264 syntax 309 CICSTERM 254 Execution Diagnostic Facility (EDF) COBDIR 188 dual screen mode 320 COBLIB 188 information area 312 COBSW 342 interception points 316 DB2DBDFT 129, 131 invoking 310 DB2INSTANCE 46 overtyping 315 ENCINA_BINDING_FILE 159, parameters 309 203 PF (program function) key ENCINA_SFS_SERVER 493 values 313 LANG 248, 254 screen layout 310, 318 LD_LIBRARY_PATH 188 security 310 LIBPATH 188 security rules 310 LOGNAME 259 status area 312 PATH 188 stopping the application SHLIB_PATH 188 run 318 TERM 254 EXIT parameter 357 XID_NODE_ID 119 expansion of ERRColor attribute CECI or CECS information 304 terminal denitions 67 ExtDS attribute ERRHilight attribute terminal denitions 68 terminal denitions 67 External Security Manager ERRIntensify attribute (ESM) 389 terminal denitions 68 The supplied program 395 ERRLastLine attribute ExternalTrace attribute terminal denitions 68 region denitions 37
EXTRA parameter CEMT inquire/set tdqueue 348 ExtrapartitionFile attribute transient data denitions 81
F
FACILITY parameter CEMT inquire/set task 344 FacilityId attribute transient data denitions 81 FacilityType attribute transient data denitions 82 FD (File Denitions) 8 Feno CEMT INQUIRE FENODE 378 FENODE option CEMT DISCARD command 370 FEPI CICS-supplied transactions 369 operator control 369 Fepo CEMT INQUIRE FEPOOL 382 FEPOOL option CEMT DISCARD 370 Fepr CEMT INQUIRE FEPROPSET 384 FEPROPSET option CEMT DISCARD 370 CEMT INQUIRE FEPROPSET 385 Feta CEMT INQUIRE FETARGET 387 FETARGET option CEMT DISCARD 370 FieldLength1 attribute schema le denitions 58 FieldName1 attribute schema le denitions 58 FieldType1 attribute schema le denitions 58 le statistics 442 File Denitions (FD) 8 FILE parameter CEMT inquire/set 335 lename parameter CEMT FILE 335 FileProtection attribute le denitions 10 FileRSLCheck attribute region denitions 37 les CEMT inquire/set 335 Index
545
FileServer attribute le denitions 10 FILESERVER parameter CEMT inquire/set le 336 FileSystemType attribute region denitions 37 FileType attribute schema le denitions 58 FORCEPURGE parameter CEMT inquire/set task 345 Foreground attribute terminal denitions 68 free (SDT command) 208 Freeing CEMT INQUIRE FECONNECTION 374 CEMT INQUIRE FENODE 380 ftod (DDT command) 137 ftos (SDT command) 211
H
help (DDT command) 138 help (SDT command) 212 Highlight attribute terminal denitions 68 hp terminal denition autoinstall model 503 hpterm denition autoinstall model 503 HTMLBrowser attribute region denitions 37
I
IBM CICS Client autoinstall model 502 IBM CICS ECI autoinstall model 502 IBM COBOL programs caches 31, 45 ibm3151 autoinstall model 502 ibm3161 autoinstall model 502 ibm3164 autoinstall model 502 IdleTimeout attribute SFS denitions 61 IIOP resource denitions 24 IIOPGroupHost attribute region denitions 38 IIOPGroupPort attribute region denitions 38 IIOPGroupSSLPort attribute region denitions 38 IIOPGroupUUID attribute region denitions 38 IIOPObjrefsVersion attribute region denitions 38 IIOPRequestTimeout attribute region denitions 39 ImplementationLanguage attribute object denitions 25 importing DB2 cicsdb2import command 129 Include attribute monitoring denitions 22 IndexFieldDescenders1 attribute schema le denitions 58 IndexFieldNames1 attribute schema le denitions 59 IndexName attribute le denitions 10 INDEXNAME parameter CEMT inquire/set le 336
G
Gateway Denitions (GD) 12 Gateway Server Denitions (GSD) 14 GatewayCDSName attribute gateway denitions 13 GatewayLUName attribute gateway denitions 13 GatewayName attribute communications denitions 3 GatewayPrincipal attribute gateway denitions 14 GD (Gateway Denitions) 12 Goingout CEMT INQUIRE FECONNECTION 373 CEMT INQUIRE FENODE 379 CEMT INQUIRE FEPOOL 383 CEMT INQUIRE FETARGET 388 GOODNIGHT parameter 357 GroupName attribute communications denitions 3 le denitions 10 gateway denitions 14 journal denitions 18 listener denitions 19 object denitions 24 product denitions 25 program denitions 28 temporary storage denitions 64 terminal denitions 68 transaction denitions 75 transient data denitions 82 user denitions 86
IndexName1 attribute schema le denitions 59 IndexPreallocatePages attribute schema le denitions 59 IndexUnique1 attribute schema le denitions 59 INDIRECT parameter CEMT inquire/set tdqueue 349 IndirectQueueId attribute transient data denitions 82 InDoubt attribute transaction denitions 75 INDOUBT parameter CEMT inquire/set task 344 INFLIGHT parameter CEMT inquire/set task 344 info (DDT command) 136 info (SDT command) 209 InitialOpenFlag attribute journal denitions 18 INQUIRE, CEMT FECONNECTION 371 FENODE 377 FEPOOL 381 FEPROPSET 384 FETARGET 386 INQUIRE (CEMT transaction) 328 AUTOINSTALL parameter 331 AUXTRACE parameter 332 DUMP parameter 333 DUMPOPTIONS parameter 334 FILE parameter 335 JOURNAL parameter 338 MONITOR parameter 339 NETNAME parameter 340 overview 321 PROGRAM parameter 342 system parameters 355 task parameter 344 TCLASS parameter 347 TDQUEUE parameter 348 TERMINAL parameter 351 TRACE parameter 353 TRANSACTION parameter 354 inquire about resource 323 INQUIRE keyword, CEMT 323 Inservice CEMT INQUIRE FECONNECTION 373 CEMT INQUIRE FENODE 378 CEMT INQUIRE FEPOOL 382 CEMT INQUIRE FETARGET 387
546
InService attribute communications denitions 3 INSERVICE parameter CEMT inquire netname 340 CEMT inquire/set terminal 351 installation verication program cicsivp command 171 Installed CEMT INQUIRE FECONNECTION 373 CEMT INQUIRE FENODE 378 CEMT INQUIRE FEPOOL 382 CEMT INQUIRE FETARGET 387 intercepting a transaction 316 Interface attribute object denitions 24 intersystem communication (CRTE) 364 intersystem communication (ISC) statistics 445 INTRA parameter CEMT inquire/set tdqueue 349 INTROINTVL parameter CEMT inquire 355 IntrospectInterval attribute region denitions 38 IntrospectLevel attribute region denitions 38 InvocationMode attribute transaction denitions 75 invoking CEMT 323 invoking a supplied transaction 274 invoking a transaction 274 IOMode attribute transient data denitions 82 IsBackEndDTP attribute transaction denitions 76 ISCDelayMinutes attribute region denitions 39 IsPrinter attribute terminal denitions 68 IsShippable attribute terminal denitions 68
K
Katakana attribute terminal denitions key, tab CEMT 328 KeyLen attribute le denitions 11 keytab le 186, 251 keyword, minimum abbreviation 276 69
L
Lacqcode CEMT INQUIRE FECONNECTION 375 CEMT INQUIRE FENODE 380 LANG environment variable 248, 254 Language setting 248 LD (Listener Denitions) 19 LD_LIBRARY_PATH environment variable 188 LIBPATH environment variable 188 link security 6 LinkUserId attribute communications denitions 3 list (DDT command) 132 list (SDT command) 205 Listener Denitions (LD) 19 ListenerName attribute communications denitions 4 LoadDataNumBuckets attribute region denitions 39 locale, specifying 247 LOCALE parameter CEMT inquire 355 LocalLUName attribute region denitions 39 LocalNetworkName attribute region denitions 40 LocalQ attribute transaction denitions 76 LocalQFile attribute region denitions 54 LocalQIndex attribute region denitions 54 LocalQMaxRecs attribute region denitions 54 LocalQPrePages attribute region denitions 54 LocalQProtectFile attribute region denitions 54
LocalQProtectIndex attribute region denitions 54 LocalQProtection attribute region denitions 40 LocalQProtectMaxRecs attribute region denitions 55 LocalQProtectPrePages attribute region denitions 55 LocalQProtectProtection attribute region denitions 40 LocalQProtectVol attribute region denitions 55 LocalQVol attribute region denitions 55 LocalSysId attribute region denitions 41 LogFile attribute SFS denitions 61 Logical Unit name 245 LogicalTDQFile attribute region denitions 55 LogicalTDQIndex attribute region denitions 55 LogicalTDQMaxRecs attribute region denitions 55 LogicalTDQPrePages attribute region denitions 55 LogicalTDQProtection attribute region denitions 41 LogicalTDQVol attribute region denitions 55 LOGNAME environment variable 259 LogVolume attribute gateway server denitions 15 SFS denitions 61 LU name 245 LUW statistics 457
M
makele 179 Managed attribute object denitions 24 managing DB2 databases Schema File Denitions (SCD) 57 managing le servers Region Denitions for le server (RD) 54 managing resources using RDO cicsadd command 91 cicsdefault command 142 cicsdestroy command 148 cicsexport command 153 cicsget command 156 cicsimport command 166 Index
J
JD (Journal Denitions) 16 Journal Denitions (JD) 16 JOURNAL parameter CEMT inquire/set 338 journal statistics 454 JournalRSLCheck attribute region denitions 39 journals 17
547
managing resources using RDO (continued) cicsinstall command 169 cicsupdate command 263 Managing resources using RDO cicsdelete command 145 cicsppcgwy command 191 managing SFS cicssfscreate command 230 cicssfsdestroy command 233 cicssfsimport command 235 Structured File Server Denitions (SSD) 61 Managing SFSs cicssfsshut command 238 MapColumn attribute terminal denitions 69 MapHeight attribute terminal denitions 69 MapLine attribute terminal denitions 69 MapWidth attribute terminal denitions 69 master terminal operator CEMT transaction 324 MaxConsoleSize attribute region denitions 41 MaxRecords attribute schema le denitions 60 MaxRegionPool attribute region denitions 42 MAXREGIONPOOL parameter CEMT inquire 356 MaxServer attribute region denitions 42 MAXSERVERS parameter CEMT inquire/set system 356 CEMT inquire/set tclass 347 MaxTaskCPU attribute region denitions 42 transaction denitions 76 MaxTaskCPUAction attribute region denitions 42 MaxTaskPrivatePool attribute region denitions 43 MAXTASKSHPOOL parameter CEMT inquire 356 MaxTSHPool attribute region denitions 43 MD (Monitoring Denitions) 21 Micro Focus COBOL versions supported by CICS 187 migrating a region 184, 267 migrating a region database 181 migrating a server database 181
MinServer attribute region denitions 43 MINSERVERS parameter CEMT inquire/set system 356 CEMT inquire/set tclass 347 model type, specifying 247 ModelId attribute terminal denitions 69 Modiable attribute monitoring denitions 23 region denitions 43 Module attribute object denitions 24 MONITOR parameter 339 CEMT inquire/set 339 monitoring data formatter 179 Monitoring Denitions (MD) 21 MonitorStatus attribute monitoring denitions 23 MRAArchivingEnabled attribute SFS denitions 62
N
NamedPipeName attribute listener denitions 19 NAMEIND parameter CEMT inquire/set tdqueue 349 NameService attribute region denitions 44 SFS denitions 15, 62 netdata format records 138, 212 NETNAME 245 NetName attribute terminal denitions 69 NETNAME parameter CEMT inquire 340 CEMT inquire/set terminal 351 network CEMT inquire 340 NOABDUMP parameter CEMT inquire/set dumpoptions 334 NOADD parameter CEMT inquire/set le 336 NOATI parameter CEMT inquire netname 340 CEMT inquire/set terminal 351 NOBROWSE parameter CEMT inquire/set le 336 Node CEMT INQUIRE FECONNECTION 372 CEMT INQUIRE FENODE 378 NODELETE parameter CEMT inquire/set le 336
NonRecTDQFile attribute region denitions 55 NonRecTDQIndex attribute region denitions 56 NonRecTDQMaxRecs attribute region denitions 56 NonRecTDQPrePages attribute region denitions 56 NonRecTDQProtection attribute region denitions 44 NonRecTDQVol attribute region denitions 56 NonRecTSQFile attribute region denitions 56 NonRecTSQIndex attribute region denitions 56 NonRecTSQMaxRecs attribute region denitions 56 NonRecTSQPrePages attribute region denitions 56 NonRecTSQProtection attribute region denitions 44 NonRecTSQVol attribute region denitions 56 NOPCDUMP parameter CEMT inquire/set dumpoptions 334 NOREAD parameter CEMT inquire/set le 336 Notinstalled CEMT INQUIRE FECONNECTION 373 CEMT INQUIRE FENODE 378 CEMT INQUIRE FEPOOL 382 CEMT INQUIRE FETARGET 387 NOTTI parameter CEMT inquire netname 340 CEMT inquire/set terminal 351 NOUPDATE parameter CEMT inquire/set le 336 NumColumns attribute terminal denitions 70 NumLines attribute terminal denitions 70
O
Object denitions CICS IIOP ORB resource denition 24 Obtaining CEMT INQUIRE FECONNECTION 374 CEMT INQUIRE FENODE
379
548
OFF parameter CEDF 309 CEMT inquire/set AUXTRACE 332 CEMT inquire/set dump 333 CEMT inquire/set monitor 339 CEMT inquire/set trace 353 offline utilities cicsdfmt 150 cicsgpid 161 cicsmfmt 179 cicsrlck 201 cicssfmt 221 cicssfslock 237 cicstfmt 258 cicstracelter 261 ON parameter CEDF 309 CEMT inquire/set AUXTRACE 332 CEMT inquire/set dump 333 CEMT inquire/set monitor 339 CEMT inquire/set trace 353 OPEN parameter CEMT inquire/set le 336 CEMT inquire/set tdqueue 349 open string suppressing 26 OpenMode attribute transient data denitions 82 OpenStatus attribute le denitions 11 Operation attribute object denitions 24 operator control commands 369 OpID attribute user denitions 86 OPREL parameter CEMT inquire 356 OPSYS parameter CEMT inquire 356 OpThreadPoolSize attribute SFS denitions 62 OrbAdapterDllName attribute object denitions 24 OutboundUserIds attribute communications denitions 4 Outline attribute terminal denitions 70 OUTPUT parameter CEMT inquire/set journal 338 Outservice CEMT INQUIRE FECONNECTION 373
Outservice (continued) CEMT INQUIRE FENODE 379 CEMT INQUIRE FEPOOL 383 CEMT INQUIRE FETARGET 388 OutService attribute terminal denitions 70 OUTSERVICE parameter CEMT inquire netname 340 CEMT inquire/set terminal 351 overtyping CEDF screen 315 CEMT screen 327 EDF screen 315
P
PATH environment variable 188 PathName attribute program denitions 28 PCDump attribute region denitions 44 PCDUMP parameter CEMT inquire/set dumpoptions 334 PD (Program Denitions) 27 PERFORM SNAP CEMT 330 performance monitoring user program 389 default performance monitoring user program 396 overview 395 program parameters 400 when the program is accessed 406 Permanent attribute communications denitions 4 le denitions 11 gateway denitions 14 gateway server denitions 15 journal denitions 18 listener denitions 19 object denitions 24 product denitions 25 program denitions 30 schema le denitions 60 SFS denitions 62 temporary storage denitions 65 terminal denitions 70 transaction denitions 76 transient data denitions 83 user denitions 87 PF (program function) key values CALF 285 CDCN 289
PF (program function) key values (continued) CEBR 295 CECI 304 CECS 304 CEDF 313 CEMT 325 CMLV 362 CSTD 368 EDF 313 PhysicalTDQFile attribute region denitions 56 PhysicalTDQIndex attribute region denitions 56 PhysicalTDQMaxRecs attribute region denitions 57 PhysicalTDQPrePages attribute region denitions 57 PhysicalTDQProtection attribute region denitions 45 PhysicalTDQVol attribute region denitions 57 plus character (CEMT) 326 Pool CEMT INQUIRE FECONNECTION 373 CEMT INQUIRE FEPOOL 382 PostScanInterval attribute region denitions 45 PPC Gateway 159, 270 PreallocatePages attribute schema le denitions 60 PrePages attribute le denitions 11 PrimaryIndexDescenders attribute schema le denitions 60 PrimaryIndexFields attribute schema le denitions 60 PrimaryIndexName attribute schema le denitions 60 PrimaryIndexUnique attribute schema le denitions 60 Principal attribute user denitions 87 Printer CICS 3270 Terminal Emulator 255 Priority attribute terminal denitions 70 transaction denitions 76 user denitions 87 PRIORITY parameter CEMT inquire netname 340 CEMT inquire/set terminal 352 CEMT inquire/set transaction 354 Index
549
process identier 161 PROCESSID parameter CEMT inquire/set task 344 Product Denitions (XAD) 25 ProgName attribute transaction denitions 77 Program Denitions (PD) 27 PROGRAM parameter CEMT inquire/set 342 program statistics 458 program testing EDF 309 ProgramCacheSize attribute region denitions 45 ProgramRSLCheck attribute region denitions 46 programs CEMT inquire/set 342 ProgramSymbols attribute terminal denitions 71 ProgType attribute program denitions 31 ProtectionLevel attribute gateway server denitions 15 SFS denitions 62 ProtectPurgeDelayPeriod attribute region denitions 46 Protocol attribute listener denitions 20 PublicUserTraceFile attribute region denitions 46 PURGE parameter CEMT inquire/set task 345 CEMT inquire/set terminal 352 Purgeability attribute transaction denitions 77 PurgeDelayPeriod attribute region denitions 46
Q
QSAM to DB2 le transfer 138 QSAM to SFS le transfer 212 qtod (DDT command) 136 denition les 140 running 141 qtos (SDT command) 210 denition les 214 running 214 question mark (CECI) 308 question mark (CEMT) 323 quit (DDT command) 138 quit (SDT command) 212
R
RD (Region Denitions) 32
RDBMSInstance attribute region denitions 46 read (DDT command) 133 read (SDT command) 206 READ parameter CEMT inquire/set le 336 ReadOpt attribute le denitions 11 RecordLen attribute transient data denitions 83 RecordSize attribute le denitions 11 RecordTerminator attribute transient data denitions 83 RecordType attribute transient data denitions 83 RecoverFlag attribute temporary storage denitions 65 RecoverStatus attribute le denitions 11 RecoverTerminal attribute terminal denitions 71 RecoveryType attribute transient data denitions 83 RecTSQFile attribute region denitions 57 RecTSQIndex attribute region denitions 57 RecTSQMaxRecs attribute region denitions 57 RecTSQPrePages attribute region denitions 57 RecTSQProtection attribute region denitions 46 RecTSQVol attribute region denitions 57 reference section operator commands 369 region copying the default region 142 destroying 148 migrating 184 process identier 161 Region Denitions (RD) 32 RegionPoolBase attribute region denitions 47 RegionPoolThreshold attribute region denitions 47 REGIONTHRESH parameter CEMT inquire 356 RELEASE parameter CEMT inquire 356 Released CEMT INQUIRE FECONNECTION 374
Released (continued) CEMT INQUIRE FENODE 379 ReleaseNum attribute region denitions 47 Reloadable attribute object denitions 25 REMOTE parameter CEMT inquire/set le 337 CEMT inquire/set tdqueue 349 RemoteCodePageTR attribute communications denitions 5 RemoteLUName attribute communications 5 RemoteName attribute le denitions 11 program denitions 31 temporary storage denition 65 terminal denitions 71 transaction denitions 77 transient data denitions 84 RemoteNetworkName attribute communications denitions 5 RemoteSysEncrypt attribute communications denitions 5 RemoteSysId attribute le denitions 11 program denitions 31 temporary storage denition 65 terminal denitions 71 transaction denitions 77 transient data denitions 84 RemoteSysSecurity attribute communications denitions 6 link security 6 user security 6 RemoteTCPAddress attribute communications denitions 6 RemoteTCPPort attribute communications denitions 7 Resident attribute program denitions 31 resource deallocation 190 resource attributes name description cross-reference 507 resource denitions shorthand notation 1 resource les creating default 144 ResourceDescription attribute communications denitions 7 le denitions 12 gateway denitions 14 gateway server denitions 15
550
ResourceDescription attribute (continued) journal denitions 18 listener denitions 20 monitoring denitions 23 object denitions 24 product denitions 26 program denitions 31 region denitions 48 schema le denitions 60 SFS denitions 63 temporary storage denitions 65 terminal denitions 71 transaction denitions 77 transient data denitions 84 user denitions 87 ResThreadPoolSize attribute SFS denitions 63 restoring a region 166 restrictions on use of characters for <Key> 1 Routing Transaction (CRTE) automatic transaction initiation 365 description of 364 overview 274 reference 364 syntax 364 using with CEMT 366 RPCListenerThreads attribute region denitions 48 RSLCheck attribute transaction denitions 77 RSLKey attribute le denitions 12 journal denitions 18 program denitions 31 temporary storage denition 65 transaction denitions 78 transient data denitions 84 RSLKeyList attribute terminal denitions 71 user denitions 87 RSLKeyMask attribute communications denitions 7 running cicsnetdata 140, 213 RUNNING parameter CEMT inquire/set task 345 running programs Micro Focus COBOL 187 running qtod 141 running qtos 214 runtime database statistics 459
runtime resource management (CEMT) ? character 323 + character 326 blank elds in a screen 328 command line request 323 INQUIRE 323 inquire/set overview 328 inquiring about a resource 327 invoking 323 overtyping a screen 327 PERFORM 323 PF (program function) key values 325 prompting for options 323 request formats 324 screen layout 324 scrolling a screen 326 SET 323 tab key 328 Runtime Resource Management (CEMT) AKP parameter 355 APPLID parameter 355 AUTOINSTALL parameter 331 auxiliary trace 353 AUXTRACE parameter 332 DATEFORM parameter 355 description of 321 DUMP parameter 333 DUMPOPTIONS parameter 334 FILE parameter 335 INTROINTVL parameter 355 JOURNAL parameter 338 LOCALE parameter 355 MAXREGIONPOOL parameter 356 MAXTASKSHPOOL parameter 356 MONITOR parameter 339 NETNAME parameter 340 OPREL parameter 356 OPSYS parameter 356 overview 273 parameters, overview of 321 PERFORM SNAP 330 PROGRAM parameter 342 reference 321 REGIONTHRESH parameter 356 RELEASE parameter 356 syntax 321 SYSID parameter 356 system parameters 355 TASK parameter 344
Runtime Resource Management (CEMT) (continued) TASKTHRESH parameter 356 TCLASS parameter 347 TDQUEUE parameter 348 TERMINAL parameter 351 TRACE parameter 353 TRANSACTION parameter 354 using with CRTE 366 runtime terminal attributes CEMT inquire/set 351 RuntimeProtection attribute region denitions 48
S
SafetyLevel attribute region denitions 49 SCD (Schema File Denitions) 57 Schema File Denitions (SCD) 57 screen layout CALF 281, 282 CDCN 288 CEBR 292, 293 CECI 299, 306, 307 CECS 299, 306 CEDF 311, 318 CEMT 324 CEMT inquire 328 CSTD 367 EDF 311, 318 syntax notation 276 scrolling a screen CEMT 326 SDT command 203 SDT commands ! 211 addindex 209 create 205 delete 208 delindex 209 empty 208 free 208 ftos 211 help (?) 212 info 209 list 205 QSAM to SFS le transfer 212 qtos 210 quit 212 read 206 server 210 setopen 205 stof 210 write 207 Index
551
security CESN 359 external 389 signon 359 security rules CECI 298 CECS 298 EDF 310 server (SDT command) 210 server status cicslssrc command 173 cicsmakelv command 178 cicsremovelv command 200 cicstail command 243 ServerIdleLimit attribute region denitions 49 ServerSideTran attribute region denitions 49 SET (CEMT transaction) 329 AUTOINSTALL parameter 331 AUXTRACE parameter 332 DUMP parameter 333 DUMPOPTIONS parameter 334 FILE parameter 335 JOURNAL parameter 338 MONITOR parameter 339 overview 321 PROGRAM parameter 342 TASK parameter 344 TCLASS parameter 347 TDQUEUE parameter 348 TERMINAL parameter 351 TRACE parameter 353 TRANSACTION parameter 354 setopen (SDT command) 205 SFS cicssfs command 225 SFS diagnostic tool cicssdt command 203 SFS parameter CEMT inquire/set le 337 SHLIB_PATH environment variable 188 shorthand notation 1 ShortName attribute gateway server denitions 15 SFS denitions 63 shutdown 190 cicsnotify command 190 ShutdownProgList1 attribute region denitions 49 ShutdownProgList2 attribute region denitions 49 Signoff (CESF) description of 357
Signoff (CESF) (continued) overview 273 reference 357 syntax 357 Signoff (CSSF) description of 357 overview 274 reference 357 syntax 357 signoff transactions (CESF and CSSF) 357 Signon (CESN) description of 359 overview 274 reference 359 security 359 syntax 359 SMIT CICS resource cross reference 507 SNAConnectName attribute communications denitions 7 SNADefaultModeName attribute gateway server denitions 16 SNAModeName attribute transaction denitions 78 SNAP CEMT PERFORM 330 SNAServerNodeName attribute (CICS for Solaris only) listener denitions 20 SOSI attribute terminal denitions 72 SRVERCP option on DFHCNV macro 249 SSD (Structured File Server Denitions) 61 SSLAuthentication attribute listener denitions 20 SSLCerticate attribute listener denitions 21 SSLEncryption attribute listener denitions 20 SSLKeyFile attribute listener denitions 20 SSLKeyPassword attribute listener denitions 20 SSLSession attribute listener denitions 21 standard data types for user exits 408 standard header structure for user exits 408 StartType attribute gateway server denitions 16 region denitions 49
StartType attribute (continued) SFS denitions 63 StartupProgList attribute region denitions 50 State CEMT INQUIRE FECONNECTION 374 StatFile attribute region denitions 50 statistics dump statistics 441 le statistics 442 general 434 intersystem communication (ISC) statistics 445 journal statistics 454 LUW statistics 457 monitoring 339 program statistics 458 runtime database statistics 459 storage statistics 464 task statistics 473 temporary storage statistics 485 terminal statistics 476 transaction statistics 483 transient data statistics 480 Statistics (CSTD) description of 367 overview 274 reference 367 syntax 367 StatsRecord attribute region denitions 50 stof (SDT command) 210 stop conditions, EDF 318 storage statistics 464 Structured File Server Denitions (SSD) 61 SufficesSupported attribute region denitions 50 Sun command tool and shell tool autoinstall model 507 supplied programs CICS Client Autoinstall 389 External Security Manager (ESM) 389 function shipping 389 performance monitoring user program 389 Terminal Autoinstall 389 transaction routing 389 user conversion programs 389 SUSPENDED parameter CEMT inquire/set task 346
552
SWITCH parameter CEMT inquire/set AUXTRACE 332 CEMT inquire/set journal 338 SwitchLoadFile attribute product denitions 26 symbols used in manual 275 symbols used on screen displays 276 Syncpoint attribute transaction denitions 78 syncpoint user exit (51) 422 Syntax Checker (CECS) command input 299 description of 298 information area 300 invoking 306 overview 273 PF (program function) key values 304 reference 298 screen layout 299, 306 security rules 298 status area 299 syntax 298 syntax messages CECI or CECS information 304 syntax notation 275 syntax notation on screen displays 276 SysDump attribute region denitions 50 sysid parameter 364 CEDF 287, 309 SYSID parameter CEMT inquire 356 CRTE transaction 364 system dump ag 333 system parameters CEMT inquire 355 SysTraceBufferSize attribute region denitions 50
T
tab key CEMT 328 Target CEMT INQUIRE FECONNECTION 372 task classes CEMT inquire/set 347 task monitoring 339 TASK parameter CEMT inquire/set 344 CEMT inquire/set task 346
task statistics 473 task termination user exit (15) 410 tasks CEMT inquire/set 344 TaskSharedPoolBase attribute region denitions 51 TaskSHNumBuckets attribute region denitions 51 TaskShPoolThreshold attribute region denitions 51 TASKSHTHRESH parameter CEMT inquire 356 TClass attribute transaction denitions 79 TCLASS parameter CEMT inquire/set 347 CEMT inquire/set task 346 TCPAddress attribute listener denitions 21 TCPService attribute listener denitions 21 TCTUALen attribute terminal denitions 72 TD (Transaction Denitions) 73 TD queues CEMT inquire/set 348 TDD (Transient Data Denitions) 81 TDPurgeInterval attribute region denitions 51 TDQ attribute monitoring denitions 23 TDQUEUE parameter CEMT inquire/set 348 telnet cicsteld command 247 code page, specifying 247 locale, specifying 247 model type, specifying 247 terminal type, specifying 247 TemplateDened attribute le denitions 12 program denitions 32 temporary storage denitions 66 transaction denitions 79 transient data denitions 84 Temporary Storage Browse (CEBR) command input area 293 description of 292 information area 295 overview 273 PF (program function) key values 295 reference 292 screen layout 293
Temporary Storage Browse (CEBR) (continued) syntax 292 using the transaction 292 Temporary Storage Denitions (TSD) 64 temporary storage statistics 485 TemporaryStorageRSLCheck attribute region denitions 52 TERM environment variable 254 TERM parameter CEMT inquire/set task 346 termid parameter CDCN 287 CEDF 309 TERMID parameter CEMT inquire/set tdqueue 349 Terminal Autoinstall 389 terminal autoinstall program CEMT inquire/set 331 terminal autoinstall user exit when the program is accessed 394 terminal autoinstall user program DFHCHATX 391 overview 390 program parameters 393 the supplied program 390 Terminal Denitions (WD) 66 TERMINAL parameter CEMT inquire netname 340 CEMT inquire/set 351 terminal statistics 476 terminal type, specifying 247 TerminalProtection attribute terminal denitions 72 terminals CEMT inquire/set 351 TermSubType attribute terminal denitions 72 TermType attribute terminal denitions 72 ThreadPoolSize attribute gateway server denitions 16 timeout DeadlockTimeout attribute 74 Timeout attribute transaction denitions 79 TPNSNAProle attribute transaction denitions 79 Trace attribute region denitions 52 trace facility CEMT inquire/set 353 Index
553
TRACE parameter CEMT inquire/set 353 TraceFile attribute user denitions 88 TraceFileA attribute region denitions 52 TraceFileB attribute region denitions 52 TraceFileSize attribute region denitions 52 TraceModules attribute region denitions 52 TRANID parameter CEMT inquire/set task 346 CEMT inquire/set tdqueue 349 Transaction Denitions (TD) 73 TRANSACTION parameter CEMT inquire netname 340 CEMT inquire/set 354 CEMT inquire/set terminal 352 CEMT TRANSACTION 354 transaction statistics 483 TransactionRSLCheck attribute region denitions 53 transactions CALF 281 CDCN 287 CEBR 292 CECI 298 CECS 298 CEDF 309, 310 CEMT inquire/set 354 CESF 357 CESN 359 CMLV 362 CRTE 364 CSSF 357 CSTD 367 invocation of 274 routing 364 TransDump attribute transaction denitions 79 TransDumpTrace attribute region denitions 53 TransId attribute object denitions 24 program denitions 32 Transient Data Denitions (TDD) 81 transient data queues CEMT inquire/set 348 emptying 83 extracting data from 179 transient data statistics 480
TransientDataRSLCheck attribute region denitions 53 transmit a le from CMS 139, 213 transmit a le from TSO 138, 212 TriggeredTransId attribute transient data denitions 85 TriggerLevel attribute transient data denitions 85 TRIGGERLEVEL parameter CEMT inquire/set tdqueue 349 TSD (Temporary Storage Denitions) 64 TSLCheck attribute transaction denitions 80 TSLKey attribute transaction denitions 80 TSLKeyList attribute terminal denitions 73 user denitions 88 TSLKeyMask attribute communications denitions 8 TSQAgeLimit attribute region denitions 53 TTI parameter CEMT inquire netname 341 CEMT inquire/set terminal 352 TWASize attribute transaction denitions 80
U
UCTranFlag attribute terminal denitions 73 transaction denitions 80 UD (User Denitions) 85 UE014015 (task termination user exit) 410 UE014025 (dynamic transaction routing user exit) 413 UE015050 (dynamic distributed program link user exit) 418 UE016051 (syncpoint user exit) 422 UE052017 (dump request user exit) 411 UNENABLED parameter CEMT inquire/set le 337 UPDATE parameter CEMT inquire/set le 337 UpdateOpt attribute le denitions 12 user (DDT command) 136 user conversion programs function Shipping 389 transaction routing 389 User Denitions (UD) 85 user exit numbers 407
user exits 15 - task termination 410 17 - dump request 411 25 - dynamic transaction routing 413 50 - dynamic distributed program link 418 51 - syncpoint 422 constants 408 External Security Manager (ESM) 395 standard data types 408 standard header structure 408 user exit numbers 407 what is a user exit? 407 user programs terminal autoinstall 390 user security 6 UserExitNumber attribute program denitions 32 UserID attribute gateway server denitions 16 SFS denitions 63 USERID parameter CEMT inquire/set task 346 UserMonitorModule attribute monitoring denitions 23 UserTraceDirectory attribute region denitions 53
V
Validation attribute terminal denitions 73 VariableFieldLength attribute schema le denitions 60 VariableFieldName attribute schema le denitions 60 VariableFieldType attribute schema le denitions 60 variables CECI or CECS information VolumeName attribute schema le denitions 61 vt100 autoinstall model 502 vt220 autoinstall model 504
302
W
Waitconvnum CEMT INQUIRE FECONNECTION 375 CEMT INQUIRE FEPOOL 383 WAITFORGET parameter CEMT inquire/set task 346 WD (Terminal Denitions) 66 WhenOpened attribute transient data denitions 85
554
Windowed multi-byte color autoinstall model 503 Windowed multi-byte monochrome autoinstall model 503 Windowed single-byte color autoinstall model 503 Windowed single-byte monochrome autoinstall model 503 write (DDT command) write (SDT command) 134 207
X
XAClose attribute product denitions XAOpen attribute product denitions XASerialize attribute product denitions 26 XID_NODE_ID environment variable 119 XPRecvTimeout attribute region denitions 53 504 xterm autoinstall model 26 26 25 XAD (Product Denitions)
Index
555
556
557
Program Number: 5765-E27 5639-I07 5765-E28 5765-E29 5639-I09 5639-I11 5765-E31 5765-E30
Printed in the United States of America on recycled paper containing 10% recovered post-consumer ber.
SC09-4459-00
Spine information:
WebSphere
Version 3.0