Dfha1f00 PDF
Dfha1f00 PDF
Installation Guide
GC34-2857-00
CICS Transaction Server for z/OS
Version 5 Release 1
Installation Guide
GC34-2857-00
Note
Before using this information and the product it supports, read the information in “Notices” on page 441.
This edition applies to Version 5 Release 1 of CICS Transaction Server for z/OS (product number 5655-Y04) and to
all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 1989, 2012.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Preface . . . . . . . . . . . . . . . ix First-time user of the CustomPac dialog for
What this book is about . . . . . . . . . . ix ServerPac . . . . . . . . . . . . . . 23
Who is this book for? . . . . . . . . . . . ix Existing user of the CustomPac dialog for
What you need to know to understand this book . . ix ServerPac . . . . . . . . . . . . . . 23
Location of topics in the information center . . . . x Summary of the ServerPac installation steps . . . 24
How to use this book . . . . . . . . . . . x
For planning . . . . . . . . . . . . . x Chapter 7. Installing CICS TS using
Methods of delivery for installation. . . . . . x DFHISTAR . . . . . . . . . . . . . 25
Notes on terminology . . . . . . . . . . . xi Editing the DFHISTAR job . . . . . . . . . 25
CICS system connectivity. . . . . . . . . . xii Specifying the CICS Transaction Server
temporary installation libraries . . . . . . . 30
Changes in CICS Transaction Server Specifying the JOB parameters for installation
for z/OS, Version 5 Release 1 . . . . . xiii jobs . . . . . . . . . . . . . . . . 30
Specifying the scope of the installation . . . . 31
Specifying the type of JES to be used . . . . . 31
Part 1. Planning for installation . . . 1 Specifying the utilities . . . . . . . . . . 31
Specifying the prefix of CICS Transaction Server
Chapter 1. Introduction to CICS TS jobs . . . . . . . . . . . . . . . . 32
installation . . . . . . . . . . . . . 3 Specifying the indexes of CICS Transaction
Installation methods for CICS TS . . . . . . . 3 Server data sets . . . . . . . . . . . . 32
Specifying extra qualifiers . . . . . . . . 33
Chapter 2. Requirements for CICS TS . . 5 Specifying the CICS TS z/OS UNIX directories
and data sets . . . . . . . . . . . . . 33
Hardware and storage requirements for installing
Specifying the installation directory for Java
CICS TS . . . . . . . . . . . . . . . . 5
support. . . . . . . . . . . . . . . 34
Software requirements for installing CICS TS . . . 5
Specifying block sizes . . . . . . . . . . 34
z/OS UNIX file system and PDSE requirements . . 5
Specifying the disk unit for work data sets . . . 34
Specifying the SMS option for DASD allocations 35
Chapter 3. CICS Explorer planning . . . 7 Specifying disk volumes . . . . . . . . . 35
CICS Explorer prerequisites . . . . . . . . . 7 Specifying attributes of the temporary SMP/E
CICS Explorer installation options . . . . . . . 8 work data sets . . . . . . . . . . . . 39
Specifying attributes of the permanent SMP/E
Chapter 4. CICSPlex SM planning . . . 11 data sets . . . . . . . . . . . . . . 39
CICSPlex SM setup checklist and worksheets . . . 11 Specifying SMP/E zone attributes . . . . . . 40
MVS installation and setup checklist . . . . . 11 Specifying the distribution tape device type . . 43
System worksheet . . . . . . . . . . . 13 Specifying attributes of the CICS Transaction
CMAS worksheet . . . . . . . . . . . 14 Server system data sets . . . . . . . . . 43
MAS worksheet . . . . . . . . . . . . 15 Specifying attributes of any additional target
WUI server worksheet . . . . . . . . . . 16 libraries . . . . . . . . . . . . . . 44
IVP planning worksheet . . . . . . . . . 16 Specifying the library data set names . . . . . 45
Planning for a CICSPlex SM upgrade . . . . . . 17 Specifying log stream and log stream structure
attributes . . . . . . . . . . . . . . 49
Specifying attributes specific to CICSPlex SM . . 50
Part 2. Installing CICS TS . . . . . 19
Creating RACF profiles for the CICS Transaction
Server data sets . . . . . . . . . . . . . 52
Chapter 5. Installing CICS TS using Running the DFHISTAR job . . . . . . . . . 52
CBPDO . . . . . . . . . . . . . . 21 Checking the output from the DFHISTAR job . . 53
Using the SMP/E RECEIVE, APPLY, and ACCEPT Checking that you are ready to run the installation
commands. . . . . . . . . . . . . . . 21 jobs . . . . . . . . . . . . . . . . . 53
Using DFHISTAR process . . . . . . . . . 21 Running the installation jobs . . . . . . . . 54
Run times of the installation jobs . . . . . . 55
Chapter 6. Installing CICS TS using Running the DFHIHFS0 job . . . . . . . . 55
ServerPac . . . . . . . . . . . . . 23 Running the DFHIHFS1 job . . . . . . . . 56
Running the DFHISMKD job . . . . . . . 56
Resources to install the ServerPac . . . . . . . 23
Running the DFHINST1 job . . . . . . . . 56
Contents v
Sizing for DASD-only log streams . . . . . 222 Language Environment support for COBOL . . 256
Converting a DASD-only log stream to use a Language Environment support for C and C++ 257
coupling facility . . . . . . . . . . . 225 Language Environment support for PL/I . . . 257
Analyzing system logger data (SMF Type 88 Language Environment support for Java . . . 258
records) . . . . . . . . . . . . . . . 225
Managing secondary storage . . . . . . . . 226 Chapter 40. Enabling TCP/IP in a CICS
region . . . . . . . . . . . . . . 259
Chapter 34. Enabling Unicode data Using TCP/IP in a CICS region . . . . . . . 260
conversion by z/OS . . . . . . . . . 229
Chapter 41. Installing MRO, IPIC, and
Chapter 35. Applying service to CICS ISC support . . . . . . . . . . . . 263
Transaction Server for z/OS . . . . . 231 Installing MRO support . . . . . . . . . . 263
Load library secondary extents . . . . . . . 231 Installing the modules DFHIRP and DFHCSVC
The CICS TS-supplied SMP/E procedure . . . . 232 in the LPA . . . . . . . . . . . . . 264
APARs and PTFs . . . . . . . . . . . . 232 Installation requirements for XCF/MRO . . . 264
Applying service to CICS modules . . . . . . 233 Defining z/OS images as systems in an XCF
sysplex . . . . . . . . . . . . . . 266
Chapter 36. Applying service to Enabling MRO for CICS startup . . . . . . 266
CICSPlex SM . . . . . . . . . . . 235 Adding communications support between systems 266
Activating intersystem communication over
CICS Transaction Server for z/OS-supplied SMP/E
z/OS Communications Server . . . . . . . 266
procedure . . . . . . . . . . . . . . 235
Activating IP interconnectivity (IPIC)
Applying PTFs to CICSplexes running CICS
connections . . . . . . . . . . . . . 272
Transaction Server for z/OS, Version 3 Release 2
and later . . . . . . . . . . . . . . . 235
Applying service CICSPlex SM modules . . . . 236 Chapter 42. Verifying your Java
components . . . . . . . . . . . . 275
Verifying Java components checklist . . . . . . 275
Part 5. Getting ready to run CICS 237
Authorizing the hlq.SDFJAUTH library. . . . . 276
Chapter 37. Tailoring the Chapter 43. Defining DL/I support . . 279
CICS-supplied skeleton jobs . . . . . 239 Program specification blocks (PDIR) . . . . . . 279
The CICS installation libraries . . . . . . . . 239 Adding remote DL/I support . . . . . . . . 279
Running DFHISTAR . . . . . . . . . . . 240
CICSPlex SM postinstallation members . . . . . 240
Chapter 44. Enabling REXX for CICS 283
Customization information for REXX . . . . . 283
Chapter 38. Jobs for creating the Changing supplied CICS transaction codes . . 283
CICS data sets . . . . . . . . . . . 243 Defining RFS filepools . . . . . . . . . 284
Data set naming conventions . . . . . . . . 243 Modifying TD queues for IMPORT and
DFHCOMDS job for common data sets . . . . . 244 EXPORT commands . . . . . . . . . . 285
Creating several copies of the DFHCSD and Modifying SQL definitions used for authorizing
SYSIN data sets . . . . . . . . . . . 245 transactions to use DB2 . . . . . . . . . 285
DFHDEFDS job for CICS region data sets . . . . 245 Concatenating special exec data sets used by the
DFHCMACI job for creating the messages data set 247 REXX Development System . . . . . . . 286
Defining the sample applications data sets . . . 247 Identifying special user IDs and their usage . . 287
The CUA text-level application . . . . . . 247 Customizing the CICSTART member . . . . 287
The FILEA sample application programs . . . 248 Formatting the RFS filepools . . . . . . . 288
The CICS Application Programming Primer Activating the online HELP facility and
sample application . . . . . . . . . . 248 accessing documentation . . . . . . . . 288
CICS resource definitions for CICSPlex SM . . . 250
Dynamic creation of CICS resource definitions 250 Chapter 45. Setting up a CICSPlex SM
Overriding the dynamically created CICS
address space (CMAS) . . . . . . . 291
resource definitions for CICSPlex SM . . . . 250
Before you set up a CMAS . . . . . . . . . 291
Amending log stream names in a CMAS . . . 253
CICSPlex SM auxiliary storage usage . . . . . 291
Preparing to transmit generic alerts to IBM Tivoli
Chapter 39. Adding CICS support for NetView . . . . . . . . . . . . . . . 292
programming languages . . . . . . 255 Preparing to start a CMAS . . . . . . . . . 293
Installing Language Environment support . . . . 255 Creating and managing the CICSPlex SM data
Installing CICS support for Language repository . . . . . . . . . . . . . . 295
Environment . . . . . . . . . . . . 255 Creating the CICSPlex SM data repository . . 295
Contents vii
Chapter 59. Using the Web User Appendix. Default CICS resource
Interface to define a CICSplex and a definitions for CICSPlex SM . . . . . 433
MAS . . . . . . . . . . . . . . . 421
Notices . . . . . . . . . . . . . . 441
Chapter 60. Creating a CICSPlex SM Trademarks . . . . . . . . . . . . . . 442
managed CICS system (MAS) . . . . 423
Bibliography . . . . . . . . . . . . 443
Chapter 61. Verifying your CICSPlex CICS books for CICS Transaction Server for z/OS 443
CICSPlex SM books for CICS Transaction Server
SM environment using the WUI. . . . 425
for z/OS . . . . . . . . . . . . . . . 444
Other CICS publications . . . . . . . . . . 444
Chapter 62. Shutting down the MAS, Other IBM publications . . . . . . . . . . 444
WUI server, and CMAS . . . . . . . 427
Accessibility . . . . . . . . . . . . 447
Chapter 63. Setting up a more
complex configuration . . . . . . . 429 Index . . . . . . . . . . . . . . . 449
It contains guidance about tailoring CICS for use in your systems environment:
v Describing the content of CICS TS and the two delivery methods—ServerPac
and CBPDO
v Explaining the method of installing CICS TS (with either ServerPac or CBPDO),
and provides references to the required sources of information. In this book,
“installing” means loading the code into the libraries in preparation for the
migration and customizing tasks.
v Listing the hardware and software you must have to run the CICS TS product
elements and exploit the function provided by CICS TS.
v Covering installation, and verification of that installation, for both CICS and
CICSPlex® SM.
v Telling you about installing the workstation-based components of CICS TS.
The book assumes that you are upgrading to CICS TS levels of all the product
elements in the Server.
Planning the migration to CICS TS requires that you understand the function
provided by the CICS TS product set. You can learn about the function in the
various product libraries of the individual elements that comprise the product set.
Always check the product libraries, for example, Upgrading, for changes that
might affect CICS TS elements.
This book is also for system programmers who are responsible for installing and
tailoring CICS and CICSPlex SM.
The information center content types are generally task-oriented, for example;
upgrading, configuring, and installing. Other content types include reference,
overview and scenario or tutorial-based information. The following mapping
shows the relationship between topics in this publication and the information
center content types, with links to the external information center:
Table 1. Mapping of PDF topics to information center content types. This table lists the
relationship between topics in the PDF and topics in the content types in the information
center
Set of topics in this publication Location in the information center
Installing v Installing
v Getting started
v Configuring
For planning
Read through the sections of this book that tell you about the products and
hardware you need to support the function that comes with CICS TS and the
pointers to migration and installation information that is in the product libraries
that you receive with CICS TS.
Once you have identified the actions you need to take to complete your migration,
write a plan describing the steps your installation will take. Include your estimate
of how much time each step requires and who will do it.
For information about these two methods of delivery of the CICS Transaction
Server, see Part 2, “Installing CICS TS,” on page 19.
To install the CICS Transaction Server using the CBPDO method, use the , together
with the instructions contained in the Memo to Users Extension, to load the
software from the tape DASD. For the ServerPac method, follow the supplied set
of ISPF dialogs and the accompanying documentation.
After you have loaded the CICS Transaction Server elements to DASD, you should
then use this information to tailor CICS to your environment; that is to:
v Integrate CICS with MVS and ACF/VTAM
v Apply service to CICS (if required)
Note:
1. “LPA-required and LPA-eligible modules” on page 151 gives details of the CICS
modules that are needed in, and eligible for, the MVS link pack area.
2. If you installed CICS from CBPDO, you do not need to run the DFHISTAR job
again to specify the post-installation parameters. However, if you want to
create several copies of the post-installation jobs (for example to create several
copies of the DFHDEFDS job to define CICS data sets unique to several CICS
regions), you can edit and run the DFHISTAR job as many times as required.
Some of the information in this book is also of interest if you have installed CICS
Transaction Server using the ServerPac method of delivery.
In particular, you should edit and run the DFHISTAR job, specifying the keyword
POST, to define parameters needed to tailor your CICS environment.
Notes on terminology
CICS is used throughout this book to mean the CICS element of the IBM CICS
Transaction Server for z/OS, Version 5 Release 1.
CICS TS Version 2 region is used to refer to a CICS region running under CICS
TS Version 2.
MVS is used throughout this book to mean the operating system MVS, or the Base
Control Program (BCP) element of z/OS.
RACF® is used throughout this book to mean the MVS Resource Access Control
Facility (RACF) or any other external security manager that provides equivalent
function.
The term CICS TS 3.2 region is used to refer to a CICS region running under CICS
Transaction Server for z/OS, Version 3 Release 2.
$ In the programming examples in this book, the dollar symbol ($,) is used as a
national currency symbol and is assumed to be assigned the EBCDIC code point
X'5B'. In some countries a different currency symbol, for example the pound
symbol (£), or the yen symbol (¥), is assigned the same EBCDIC code point. In
these countries, the appropriate currency symbol should be used instead of the
dollar symbol.
hlq Throughout this book, the term hlq is used to denote the high-level qualifier of
the CICS TS data sets; for example, CICSTS51.CICS for CICS data sets and
CICSTS51.CPSM for CICSPlex SM data sets. The CICSTS51 part of the high-level
qualifier is defined by the LINDEX parameter in the DFHISTAR installation job.
Preface xi
IMS™ library names
The IMS libraries referred to in this section are identified by IMS.libnam (for
example, IMS.SDFSRESL). If you are using your own naming conventions, change
the IMS prefix to match those naming conventions.
For this release of CICSPlex SM, the connectable CICS systems are:
v CICS Transaction Server for z/OS, Version 3 Release 2
v CICS Transaction Server for z/OS, Version 3 Release 1
v CICS Transaction Server for z/OS, Version 2 Release 3
v CICS Transaction Server for z/OS, Version 2 Release 2
You can use this release of CICSPlex SM to control systems running supported
releases of CICS that are connected to, and managed by, your previous release of
CICSPlex SM. However, if you have any directly-connectable release levels of
CICS, as listed above, that are connected to a previous release of CICSPlex SM, you
are strongly recommended to migrate them to the current release of CICSPlex SM,
to take full advantage of the enhanced management services. See the relevant CICS
Transaction Server for z/OS Migration Guide for information on how to do this.
Table 2 shows which supported CICS systems can be directly connected to which
releases of CICSPlex SM.
Table 2. Directly-connectable CICS systems by CICSPlex SM release
CICS system CICSPlex SM CICSPlex SM CICSPlex SM CICSPlex SM
component of CICS component of CICS component of CICS component of CICS
TS 5.1 TS 3.1 TS 2.3 TS 2.2
CICS TS 3.2 Yes No No No
CICS TS 3.1 Yes Yes No No
CICS TS 2.3 Yes Yes Yes No
CICS TS 2.2 Yes Yes Yes Yes
TXSeries 4.3.0.4 No No Yes Yes
TXSeries 5.0 No No Yes Yes
Any technical changes that are made to the text after release are indicated by a
vertical bar (|) to the left of each new or changed line of information.
Generally, large online CICS applications run on an MVS operating system with a
collection of other supporting software products, some provided by IBM and
others by independent software vendors (ISVs). Functional additions include
distributed CICS software on alternative platforms, enabling you to distribute
transaction processing, with CICS on the MVS host acting as a large database
server.
In CICS TS, the levels of all products reflect the level of the CICS TS product itself.
The products that make up the base of CICS TS are called elements.
Because the elements and features of CICS TS are integrated into a single package
with compatible service levels, you are expected to upgrade all elements of CICS
TS at the same time.
CICS Transaction Server for z/OS does not include the CICS Universal Clients or
the CICS Transaction Gateway. You require additional licenses to use these
products.
CICS TS does not have a stand-alone product tape or Custom Built Installation
Process Offering (CBIPO).
Figure 1 illustrates the content differences between the ServerPac method and the
CBPDO method of installing CICS TS.
ServerPac CBPDO
Integration- Integration-
tested code tested code
and PTFs in RELFILE
format
IBM
recommends
you install
this code.
Integration-
Integrated tested PTFs
into
libraries
Hipers Hipers
PE fixes PE fixes
PTFs required
for new products Uninstalled
PTFs based
on your
Other IBM customer
products profile
you might
have ordered
.
.
.
All service in both deliverables is
PTFs not current to within a week of order.
integrated
and available
for preventive
maintenance
You require a hardware configuration that runs the required levels of MVS,
provided that the configuration has a terminal and a tape device capable of
reading one of the following types of tape on which CICS TS is supplied:
v 6250 bpi 9-track reels
v 3480 cartridges
v 4MM DAT cartridges
You must install z/OS, Version 1 Release 13 or a later release on the system that
you use to install both the ServerPac and the CBPDO.
z/OS includes the following elements that are required for installing CICS TS:
v Interactive System Productivity Facility (ISPF)
v Time Sharing Option/Extended (TSO/E)
v DFSMS/MVS
v Language Environment®
v Two components of z/OS Communications Server: SNA and IP (previously
VTAM® and TCP/IP)
v z/OS UNIX System Services
If you are installing CICS TS using the CBPDO method, you also require:
v System Modification Program/Extended (SMP/E)
v High Level Assembler/MVS & VM & VSE.
For information about optional supported software and the service that you must
apply to ensure that CICS TS installs correctly, see CICS Transaction Server for
z/OS V5.1 detailed system requirements.
In the set of installation jobs, some initial jobs create the z/OS UNIX files and the
directories shown in Figure 2. Run these jobs before any of the normal DFHINSTn
jobs. The user ID running these jobs requires superuser authority.
/pathprefix
/lpp
/cicsts
Figure 2. The z/OS UNIX directory structure for CICS Java files
To use the CICS Explorer with CICS TS for z/OS, Version 5.1, you must download
and install CICS Explorer Version 1.1.
The CICS Explorer prerequisites are listed on the CICS Explorer System
Prerequisites web page.
Note: For a successful system connection, CICS Explorer must determine the
CICSPlex SM topology. To determine the topology, CICS Explorer requires at least
READ access to the following CICSPlex SM resource tables:
v CMAS resource table
v CICSplex configuration definition resource table
v CICS region data operations resource table
You must ensure that your security manager configuration provides this minimum
level of access to the function and type combinations CONFIG.DEF,
TOPOLOGY.DEF, and OPERATE.REGION.
You must configure CICSPlex SM or your CICS regions before you can connect to
them with the CICS Explorer. You can connect the CICS Explorer to the following
systems:
v To a CICS TS for z/OS, Version 3 system through a CICSPlex SM WUI server.
This option provides the ability only to view CICS resources in the CICSplex.
v To a CICS TS for z/OS, Version 4 system through a CICSPlex SM WUI server or
a CICSPlex SM MAS. This option provides the ability to view, change, and
perform actions against CICS resources in the CICSplex.
v To a single CICS TS for z/OS, Version 4 CICS region. This option provides the
ability to view, change, and perform actions against CICS resources in that
region.
To connect to a CICS TS for z/OS, Version 4 or later system you can configure
CICSPlex SM or your CICS region to use the CICS management client interface.
When the CICS Explorer is started for the first time, it creates a workspace folder.
The folder contains the following configuration information:
v Connection details for connecting to CICS systems or CICSPlex SM WUI servers
v User IDs and passwords (encrypted) for accessing CICS systems or CICSPlex SM
v User-customized view and perspective information
By default, the workspace is stored in a directory on the local workstation. You can
provide an option when starting the CICS Explorer so that it uses a different
workspace location, but, because the workspace contains user IDs and passwords,
you must ensure that the workspace can be accessed only by the owning user.
Three main options satisfy this criterion:
A local workstation
If the user has sole use of a workstation, the CICS Explorer can be saved
on the local workstation in the default location.
A private USB flash drive
If the user is using a shared workstation, you can provide an option when
starting CICS Explorer to save the workspace on a USB flash drive which
can be removed when the user logs off.
A secure remote network drive
If a remote network drive with adequate security is available, you can
provide an option when starting CICS Explorer to save the workspace in
the user's area on the drive.
Like all applications run on the Eclipse platform, the online documentation for
CICS Explorer uses the Eclipse help system. This help system runs on a web server
which listens only on localhost and does not run as a privileged user, so the
content is not accessible externally.
For more information on using Eclipse, see the Eclipse Workbench User Guide, or
you can visit the Eclipse website eclipse.org.
When deciding where to install the CICS Explorer code you have three main
choices. The table in this section identifies the three choices and the advantages
and disadvantages of each:
When you have decided where to install CICS Explorer and how to manage the
users's workspace, you can begin the installation.
System worksheet
A worksheet is provided to help you to setup your CICSPlex SM system.
System: _______
CMAS worksheet
A worksheet is provided to help you to setup your CMAS.
SYS1.PARMLIB(IEASYSxx) values:
Links to MASs:
MAS worksheet
A worksheet is provided to help you to setup your MAS.
The first three of these are entitled offerings and are the subject of this information.
IBM customized packages are fee-based and are not discussed except for the
following summary information. Depending on the country in which you order,
you can purchase one of the following customized packages:
v A SystemPac®, which tailors CICS TS to your environment, such as DASD layout
and naming conventions, based on information provided to IBM
v Other fee-based services and customized offerings
Both the ServerPac and CBPDO methods of delivering CICS TS come with
documentation that you use when you install the product. To help you plan ahead,
this section gives you a preview of some of this information, such as the
information contained in the Program Directory for CICS Transaction Server for z/OS,
which is available regardless of the delivery method you choose.
These topics also help you with other planning steps you must take:
v Ensuring you have the required hardware and software to install and run CICS
TS; see Chapter 2, “Requirements for CICS TS,” on page 5.
v Ensuring you have enough storage space for CICS TS; see “Hardware and
storage requirements for installing CICS TS” on page 5.
v Outlining the installation steps for CBPDO; see Chapter 5, “Installing CICS TS
using CBPDO,” on page 21
The CBPDO Memo to Users Extension contains information about the CBPDO you
ordered and the features and service it includes. It also contains CBPDO
installation information.
Read the Memo to Users Extension thoroughly before starting any of the installation
tasks. If you are a new user of CBPDO, you must also read the IBM publication,
MVS Custom-Built Offerings Planning and Installation, SC23-0352.
The Program Directory for CICS Transaction Server for z/OS gives a sample IEBCOPY
job that you can customize to copy RELFILE(2) from the CICS TS CBPDO tape.
1. Modify the LABEL=3 parameter to reference the file number of RELFILE(2) as
supplied on the CBPDO tape.
2. When you have copied RELFILE(2) to DASD, you generate a single set of
installation jobs using the CICS TS job generator, DFHISTAR.
3. This generates the following set of customized installation jobs, based on the
parameters you specify to DFHISTAR:
v DFHIHFS0, DFHIHFS1, DFHIHFSA, and DFHISMKD, the z/OS UNIX-related
jobs
v DFHINST1 through DFHINST6
To enable you to customize the z/OS UNIX-related jobs, the DFHISTAR job
provides the following parameters:
“Editing the DFHISTAR job” on page 25 describes all the parameters that you can
specify to customize the installation jobs, and explains the jobs that are generated.
If you already have printed copies of the ServerPac manuals, use these to guide
you through the installation process. If you do not have copies, download and
print the manuals from the first ServerPac tape. A sample job in member PRTDOC
on the RIM tape enables you to print the manuals.
The ServerPac: Using the Installation Dialog manual in “Chapter 2. Installing and
Starting the Dialogs” describes how to install the CustomPac dialog.
The INVOCATION topic in the ServerPac: Using the Installation Dialog manual
explains how to invoke the dialog.
As an existing user of the CustomPac dialog, you can begin at the step described
in the ServerPac: Using the Installation Dialog manual, in Chapter 2. Receive a New
Order.
You can do the following tasks from the primary option menu:
v Receive the order (option R)
v Install the order (option I)
The primary menu also enables you to display information about orders.
The following tasks are described, with illustrations of the various panels, in the
ServerPac: Using the Installation Dialog manual:
Receive the order
This step is described in section “6.0 Receive an Order”.
The “Order Receive” panels enable you enter your CICS TS order information
and to complete the job card information required to generate the order-receive
job. The final phase of this step presents you with the generated JCL in an edit
session, from which you can submit the job to receive the installation material
(RIM) files to your DASD.
Install orders
This step is described in section “7.0 Installation Menu”.
The “Installation Menu” panels enable you to perform the following tasks:
v Configure the order control information tables
v Define values for the installation variables used in skeleton batch jobs
v Define the names of the SMP/E zones into which you want to install CICS
TS
v Modify data set profiles and DASD allocation for the order
v Define catalog data set names and the aliases associated with them
v Define system-specific aliases (where applicable)
v Select and submit the installation jobs
v Save the installation work configuration for use with future CICS TS orders
v Update the order inventory status
The DFHISTAR job is in the TDFHINST library when you copy RELFILE(2) from
the distribution tape. You can either edit the DFHISTAR job directly or copy the
DFHISTAR job to preserve the IBM supplied values and edit your copy.
To help you look up details about a particular parameter, Table 5 lists the
DFHISTAR parameters, in alphabetical order, with their predefined values. The
parameters in the DFHISTAR job itself are listed in associated groups. The table
also indicates whether a parameter is relevant to CICS, or CICSPlex SM, or both.
The default values of the parameters are the same as the IBM supplied values. You
can use the IBM supplied values, define your own values, or let the CICS
Transaction Server installation process determine default values for you.
Enter your values for parameters of the DFHISTAR job in lowercase. Except for the
z/OS UNIX parameters USSDIR, USSDIRA, and JAVADIR, the values are translated
into uppercase when you run the DFHISTAR job.
Table 5. Alphabetical list of parameters for the DFHISTAR job
Parameter CICS CICSPlex Supplied value Refer to
SM
LOGGER-INFO X 001 500 4096 64000 2048 MVSX XXXXXXXX “Specifying log stream and log stream
XXXXXXXX structure attributes” on page 49
The High Level Assembler either must be in the LINKLST concatenation or you
must add a STEPLIB DD statement that points to the library containing the High
Level Assembler in any jobs that invoke SMP/E.
For example, PREFIX USERID changes the job name DFHINST1 to USERIDT1.
PREFIX prefix
The 1- to 6-character prefix to be added to the CICS jobs generated by the
DFHISTAR job.
The JAVADIR parameter specifies the location of the SDK on z/OS UNIX. The
supplied value java/J7.0_64 points to the default installation directory for Version
7 of the IBM 64-bit SDK for z/OS, Java Technology Edition. This value of this
parameter is appended to /pathprefix/usr/lpp/, giving a full path name of
/pathprefix/usr/lpp/javadir.
Some CICS TS data sets are installed in PDSE data sets. These are the following
data sets:
v The SMP/E SMPLTS data set.
v The distribution library, ADFJMOD.
v The target library, SDFJAUTH.
See Program Directory for CICS Transaction Server for z/OS for information about
these data sets.
SMS YES | NO
If you specify SMS YES, the VOLUME parameter is omitted from the
generated installation jobs and all data set allocations are handled by SMS.
If you specify SMS NO, the VOLUME parameter is included on the generated
installation jobs, and is recognized according to your SMS configuration. The
VOLUME parameters used are those specified on the ADDTVOL, DEFVOL,
DISTVOL, CMACVOL, OPTVOL, SMPVOL, and TARGVOL parameters.
If you intend to install CICS Transaction Server into disk space managed by the
storage management subsystem (SMS) component of MVS/DFP, you do not have
to specify your own disk volumes; SMS can determine device assignment. In this
case, proceed to “Specifying SMP/E zone attributes” on page 40. For further
information about installing system-managed storage and about planning for and
migrating storage to an SMS-managed environment, see the MVS Storage
Management Library: Storage Management Subsystem Migration Planning Guide,
SC26-4406.
You can specify your own disk details using the following parameters:
DEFVOL volume disktype
Defines the default disk on which the contents of the disk volumes
CMACVOL, DISTVOL, OPTVOL, SMPVOL, and TARGVOL resides if the
appropriate parameter is not coded in the DFHISTAR job. For example, if you
do not code the DISTVOL parameter, the CICS Transaction Server distribution
libraries resides on the disk defined by DEFVOL.
volume
Is one of the following entries:
v The volume serial identifier, in the range 1 through 6 characters, of the
default volume.
v A period (.) if all volumes other than CMACVOL and SMPVOL that are
not specifically defined by the appropriate parameter of the DFHISTAR
job are put onto any available volume. The CMACVOL and SMPVOL
volumes are put onto the same volume as the library specified by the
TEMPLIB parameter.
If you omit the DEFVOL parameter, all volumes that are not specifically
defined by the appropriate parameter of the DFHISTAR job are put onto the
same volume as the library specified by the TEMPLIB parameter.
DISTVOL volume disktype
Defines the disk on which the CICS Transaction Server distribution libraries
resides.
volume
Is one of the following entries:
v The volume serial identifier, in the range 1 through 6 characters, of the
volume on which the distribution libraries resides.
v A period (.) if the CICS Transaction Server libraries are to be put onto
any available volume.
disktype
Is the UNIT parameter of the volume.
If you omit the DISTVOL parameter, the distribution libraries are put on the
volume specified by the DEFVOL parameter. If the DEFVOL parameter is
omitted, or if a period (.) is specified for its volume operand, the distribution
libraries are put onto any available volume.
TARGVOL volume disktype
Specifies details of the disk containing the CICS Transaction Server target
libraries.
volume
Is one of the following entries:
v The volume serial identifier, in the range 1 through 6 characters, of the
volume on which the CICS Transaction Server target libraries are to
reside.
v A period (.) if the CICS Transaction Server target libraries are to be put
onto any available volume.
disktype
Is the UNIT parameter for the volume.
If you omit the TARGVOL parameter, the CICS Transaction Server target
libraries are put onto the volume specified by the DEFVOL parameter. If the
DEFVOL parameter is omitted, or if a period (.) is specified for its volume
operand, the CICS Transaction Server target libraries are put onto any available
volume.
SMPVOL volume disktype
Specifies the disk that contains the permanent, non-VSAM SMP/E data sets for
CICS Transaction Server that are associated with global or distribution zones
and are therefore unique.
volume
Is one of the following entries:
v The volume serial identifier, in the range 1 through 6 characters, of the
volume on which the permanent non-VSAM SMP/E data sets are to
reside.
If you omit the SMPVOL parameter, the permanent non-VSAM SMP/E data
sets for CICS Transaction Server are put on the volume specified by the
DEFVOL parameter. If the DEFVOL parameter is omitted, or if a period (.) is
specified for its volume operand, the data sets are put onto the same volume as
the library specified by the TEMPLIB parameter.
OPTVOL volume disktype
Specifies details of the disk onto which the optional source material is copied.
volume
Is one of the following entries:
v The volume serial identifier, in the range 1 through 6 characters, of the
volume on which the optional source material is to reside.
v A period (.) if the optional source material is to be put on any available
volume.
disktype
Is the UNIT parameter of the volume. This is required only if volume is
specified.
If you omit the OPTVOL parameter, the optional source material is put on the
volume specified by the DEFVOL parameter. If the DEFVOL parameter is
omitted, or if a period (.) is specified for its volume operand, the optional
source material is put onto any available volume.
CMACVOL volume
Defines the disk on which the VSAM KSDS, DFHCMACD, resides. This data
set is used for the CICS Transaction Server messages facility (CICS-supplied
transaction CMAC).
volume
Is one of the following entries:
v The volume serial identifier, in the range 1 through 6 characters, of the
volume on which the VSAM KSDS, DFHCMACD, is to reside.
v A period (.) if the DFHCMACD data set is to be put onto the same
volume as the library specified by the TEMPLIB parameter.
If you omit the CMACVOL parameter, the DFHCMACD data set is put onto
the volume specified by the DEFVOL parameter. If the DEFVOL parameter is
omitted, or if a period (.) is specified for its volume operand, the DFHCMACD
data set is put onto the same volume as the library specified by the TEMPLIB
parameter.
1
The entries for xZONECSI parameters are also for the associated xZONE
parameters.
You require the RELFILE data sets on SMPVOL during installation only.
You require SMPVOL, DISTVOL, TARGVOL, DZONE, TZONE, and GZONE when
you apply service or customize your CICS Transaction Server programs. You
require SMPVOL and GZONE when you apply service or customize your
alternative libraries for use with the extended recovery facility.
You require SMPVOL, TARGVOL, TZONE, and GZONE when you assemble your
CICS Transaction Server tables. You require SMPVOL and GZONE when you
assemble CICS Transaction Server tables for the second (alternate) CICS
Transaction Server region.
The space required by the installation jobs on these volumes depends on the type
of disk you intend to use. The number of tracks required on the different types of
DASD are given in Table 6. The Program Directory for CICS Transaction Server for
z/OS describes the size of the CICS Transaction Server distribution and target
libraries.
Table 6. Number of tracks required for CICS Transaction Server
Identification 3380 3390
CICSTS51.TDFHINST 15 15
CICSTS51.XDFHINST 15 15
Relfile data sets on SMPVOL 4875 4500
SMP/E non-VSAM data sets on SMPVOL 390 375
DISTVOL 4680 4320
TARGVOL 11235 10848
DZONE 165 165
TZONE 165 165
GZONE 165 165
Total during installation 21705 19905
If you intend to store other IBM software or your own application programs in
these libraries, you must modify the generated jobs accordingly.
Define the attributes of those SMP/E data sets on the SMPWORK parameter:
The CICS Transaction Server jobs used to install CICS Transaction Server for z/OS
have DD statements for the SMP/E data sets that they must know about.
SMPWORK disktype
The UNIT parameter for the disk that is to contain the temporary SMP/E work
data sets, SMPWRK1, SMPWRK2, SMPWRK3, SMPWRK4, and SMPWRK6,
required to install CICS Transaction Server.
Do not allocate the SMPWRK6 data set to Virtual I/O (VIO). If you specify a
value for disktype, ensure that SMPWRK6 cannot be allocated to VIO.
If you specify a value for disktype, or omit the SMPWORK parameter
altogether, //SMPWRKn DD statements are added to the following jobs generated
by the DFHISTAR job:
v DFHINSTJ
v DFHLPUMD
v DFHSMPE
If you specify NO, a period (.), or a null string, CICS Transaction Server
assumes that SMP/E knows about the temporary SMP/E work data sets. To
define the attributes of the SMP/E work data sets, you must do one of the
following tasks:
v Provide appropriate DDDEFS for the temporary SMP/E work data sets.
v Apply the SMP/E sample usermod (SMP0001) that contains superzap
statements for updating the default attributes of the SMP/E data sets in the
GIMMPDFT module.
The GIMMPDFT module, which is part of SMP/E, defines the default
attributes of SMP/E data sets, and can be used to dynamically allocate data
sets to be used by all zones. For more information about the entries in the
GIMMPDFT module and the sample entry values in the usermod SMP0001,
see System Modification Program Extended: Referencel, SA22–7772.
The CICS Transaction Server jobs that must know the attributes of the SMP/E data
sets have DD statements for them.
The CICS DB2 attachment facility contains modules named with the DSN prefix.
Therefore, to prevent existing DB2 modules with the same DSNxxxxx names from
being overwritten, do not install CICS Transaction Server into the same target and
distribution zones as DB2.
the DFHINST3 job deletes any existing SMP/E global zone log with the name
CICSTS51.GZONE.SMPLOG before defining a new SMP/E global zone log with
that name.
Further, if you specify different dispositions for a zone parameter and its
associated zone log parameter, they are both given the default disposition NEW, to
ensure that both a zone and its zone log have the same disposition.
If you intend to install CICS Transaction Server using one new CSI for all zones,
you must specify the disposition NEW on all three CSI parameters of the
DFHISTAR job. For example:
DZONE DZONE
DZONECSI CICSTS51.SMPZONE NEW CICSTS51 SYSALLDA
DZONELOG CICSTS51.DZONE.SMPLOG NEW
GZONE NEW CICSOPT
GZONECSI CICSTS51.SMPZONE NEW CICSTS51 SYSALLDA
GZONELOG CICSTS51.GZONE.SMPLOG NEW
TZONE TZONE
TZONECSI CICSTS51.SMPZONE NEW CICSTS51 SYSALLDA
TZONELOG CICSTS51.TZONE.SMPLOG NEW
Note:
1. The high-level index for the additional SDFHLINK and SDFHLPA libraries
is defined by the ALINDEX parameter.
2. The high-level index for the data sets created by the jobs DFHCOMDS and
DFHDEFDS is defined by the dsindex operand of the DSINFO parameter.
The AINDEX value must be unique; for example, it must be different from the
INDEX value. It must not be longer than 26 characters, and the leading
character must be alphabetic. If you specify more than one level of index, the
names must be separated by a period; for example, AINDEX CICSTS51.A.TEST.
ALINDEX library_prefix
Assigns a high-level index to the additional SDFHLPA and SDFHLINK
libraries allocated by running a version of the DFHINSTA job.
The library_prefix value must not be longer than 26 characters and the leading
character must be alphabetic. If you specify more than one level of index, the
names must be separated by a period; for example, ALINDEX
SYS1.CICSTS51.A.TEST.
AZONELOG dsname
Specifies details of the SMP/E log for the additional target zone CSI.
dsname
The name of the additional target zone log to be used by SMP/E.
AZONECSI cluster
Specifies details of the additional target zone CSI. The CSI data set is created
on the volume and unit specified by the ADDTVOL parameter.
cluster
The VSAM cluster name, without the qualifier .CSI.
AZONE zonename
Specifies the name of the additional target zone, to be used for the set of CICS
Transaction Server target libraries copied by a version of the DFHINSTA job.
Specify the full data set name, up to 44 characters, of the library that contains
ISPLINK; SISPLOAD for ISPF Version 4 and above, or ISPLOAD for ISPF version 3
and below. For example, SISPLOAD SYS1.USERID.SISPLOAD changes the SISPLOAD
library name to SYS1.USERID.SISPLOAD. This library is accessed, as read-only,
during the installation of CICS Transaction Server.
SISPLOAD dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the CSSLIB library. For
example, CSSLIB SYS1.USERID.CSSLIB changes the CSSLIB library name to
SYS1.USERID.CSSLIB. This library is accessed, as read-only, during the installation
of CICS Transaction Server.
Specify the full data set name, up to 44 characters, of the SCEELKED library. For
example, SCEELKED SYS1.USERID.SCEELKED changes the SCEELKED library name to
SYS1.USERID.SCEELKED. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEELKED dsname
Up to 44 characters.
Specify the full data set names, up to 44 characters, of the SCEELIB library. For
example, SCEELIB SYS1.USERID.SCEELIB changes the SCEELIB library name to
SYS1.USERID.SCEELIB. The library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEELIB dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCEEBND2 library. For
example, SCEEBND2 SYS1.USERID.SCEEBND2 changes the SCEEBND2 library to
SYS1.USERID.SCEEBND2. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEEBND2 dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCEELKEX library. For
example, SCEELKEX SYS1.USERID.SCEELKEX changes the SCEELKEX library name to
SYS1.USERID.SCEELKEX. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEELKEX dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCEEOBJ library. For
example, SCEEOBJ SYS1.USERID.SCEEOBJ changes the SCEEOBJ library name to
SYS1.USERID.SCEEOBJ. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEEOBJ dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCEECPP library. For
example, SCEECPP SYS1.USERID.SCEECPP changes the SCEECPP library name to
SYS1.USERID.SCEECPP. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEECPP dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCLBSID library. For
example, SCLBSID SYS1.USERID.SCLBSID changes the SCLBSID library name to
SYS1.USERID.SCLBSID. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCLBSID dsname
Up to 44 characters.
Specify the full data set names, up to 44 characters, of the SEZARPCL and
SEZACMTX libraries. For example, SEZARPCL SYS1.USERID.SEZARPCL changes the
SEZARPCL library to SYS1.USERID.SEZARPCL and SEZACMTX
SYS1.USERID.SEZACMTX changes the SEZACMTX library name to
SYS1.USERID.SEZACMTX. These libraries are accessed, as read-only, during the
installation of CICS Transaction Server.
SEZARPCL dsname
Up to 44 characters.
SEZACMTX dsname
Up to 44 characters.
Specify the full data set names, up to 44 characters, of the SCEECICS & SCEERUN
libraries. For example, SCEECICS SYS1.USERID.SCEECICS changes the SCEECICS
library to SYS1.USERID.SCEECICS and SCEERUN SYS1.USERID.SCEERUN changes the
SCEERUN library name to SYS1.USERID.SCEERUN. These libraries are accessed,
as read-only, during the installation of CICS Transaction Server.
SCEECICS dsname
Up to 44 characters.
SCEERUN dsname
Up to 44 characters.
Specify the full data set names, up to 44 characters, of the SCEERUN2 library. For
example, SCEERUN2 SYS1.USERID.SCEERUN2 changes the SCEERUN2 library to
SYS1.USERID.SCEERUN2. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
Specify the full data set name, up to 44 characters, of the SCEESAMP library. For
example, SCEESAMP SYS1.USERID.SCEESAMP changes the SCEESAMP library name to
SYS1.USERID.SCEESAMP. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCEESAMP dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the DB2 SDSNLOAD library.
For example, SDSNLOAD SYS1.USERID.SDSNLOAD changes the SDSNLOAD library
name to SYS1.USERID.SDSNLOAD. This library is accessed, as read-only, during
the installation of CICS Transaction Server.
The REXX for CICS element contains some modules that are link-edited against the
DB2 load library, SDSNLOAD. If you do not have DB2 installed, the DFHINST6
job fails because SDSNLOAD cannot be allocated to the job. To avoid this problem,
define a dummy SDSNLOAD data set, with LRECL=0 and RECFM=U, and specify
the name of this empty data set on the SDSNLOAD parameter.
SDSNLOAD dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCSQLOAD library. For
example, SCSQLOAD SYS1.USERID.SCSQLOAD changes the SCSQLOAD library name to
SYS1.USERID.SCSQLOAD. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCSQLOAD dsname
Up to 44 characters.
Specify the full data set name, up to 44 characters, of the SCSQANLE library. For
example, SCSQANLE SYS1.USERID.SCSQANLE changes the SCSQANLE library name to
SYS1.USERID.SCSQANLE. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCSQANLE dsname
Up to 44 characters.
If you want to run the WebSphere® MQ for z/OS sample programs, specify the full
data set name, up to 44 characters, of the SCSQCICS library. For example, SCSQCICS
SYS1.USERID.SCSQCICS changes the SCSQCICS library name to
SYS1.USERID.SCSQCICS. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
Specify the full data set name, up to 44 characters, of the SCSQAUTH library. For
example, SCSQAUTH SYS1.USERID.SCSQAUTH changes the SCSQAUTH library name to
SYS1.USERID.SCSQAUTH. This library is accessed, as read-only, during the
installation of CICS Transaction Server.
SCSQAUTH dsname
Up to 44 characters.
Specify the full data set names, up to 44 characters, of the SCSFMOD0 and
SIXMEXP libraries. For example, SCSFMOD0 SYS1.SCSFMOD0 changes the SCSFMOD0
library to SYS1.SCSFMOD0. These libraries are accessed, as read-only, during the
installation of CICS Transaction Server.
SCSFMOD0 dsname
Up to 44 characters.
SIXMEXP dsname
Up to 44 characters.
For more information about these postinstallation jobs, see Chapter 33, “Defining
the logger environment for CICS,” on page 195.
LOGGER-INFO strsfx logsz shuntsz jnlsz gensz sysname loghlq logmodel
Defines the following attributes of CICS Transaction Server system data sets:
strsfx
The last part of the coupling facility structure names, can be any three
characters allowed in a structure name. The default is 001. It is used in
DFHILG1, DFHILG2, DFHILG3, and DFHILG4.
logsz
The average buffer size for system log streams in the LOG_DFHLOG_strsfx
structure. The default is 500. It is used in DFHILG1.
shuntsz
The average buffer size for shunted system log streams in the
LOG_DFHSHUNT_strsfx structure. The default is 4096. It is used in
DFHILG1.
jnlsz
The average buffer size for unforced user journal log streams in the
LOG_USERJRNL_strsfx structure. The default is 64000. It is used in
DFHILG1.
This JCL is used in the installation verification procedure for CICSPlex SM, as
described in Part 7, “Getting started with CICSPlex SM,” on page 405.
All attributes specific to CICSPlex SM have defaults. If you do not want to use
CICSPlex SM, you can run DFHISTAR without providing overrides for any of the
following CICSPlex SM specific parameters:
CMASNAME value
Specifies the 1- to 8-character name to be allocated to a CMAS. The name can
contain alphabetic, national, and numeric characters. However, the first
character must be alphabetic or national. The default is CMAS01.
The name of a CMAS must be unique in the CICSPlex SM environment. It
must not be the same as the name of another CMAS, a CICSplex, a CICS
system, or a CICS system group.
CMCIPORT value
Specifies the numeric identifier allocated to the TCP/IP port number for the
CICS management client interface (CMCI) on the WUI server. The identifier
can contain numeric characters only, in the range 1 to 65535. The default is
12346.
CMSSYSID value
Specifies the 4-character system identifier of the CMAS. This identifier can
contain alphabetic, national, and numeric characters. It must match the
SYSIDNT system initialization parameter for the CMAS. The default is CM01.
WUISYSID name
Specifies the 1- to 4-character name allocated to a WUI system identifier. The
name can contain alphabetic, national, and numeric characters. However, the
first character must be alphabetic or national. The default value is WU01.
CSYSYSID value
Specifies the 1- to 4-character system identifier for the managed CICS system.
This identifier can contain alphabetic, national, and numeric characters. The
default is CS01.
Use a period (the default value) to have an empty data repository created
for CICS TS for z/OS, Version 5.1.
NEWDREP dsname
Specifies a new data repository that is being used by CICSPlex SM.
dsname
The VSAM cluster name of the existing data repository.
The new CICS TS for z/OS, Version 4.1 data repository has the name:
dsinfo.EYUDREP.cmasname
Where:
dsinfo
Is the index specified with the DSINFO parameter.
cmasname
Is the name specified with the CMASNAME parameter.
Use a period (the default value) to have an empty data repository created
for CICS TS for z/OS, Version 5.1.
Creating RACF profiles for the CICS Transaction Server data sets
Your Security Administrator creates appropriate RACF profiles for the CICS
Transaction Server data sets.
At this stage, you require authority to access only the data set qualifiers specified
on the TEMPLIB and LIB parameters of the DFHISTAR job. DFHISTAR uses a
temporary sequential data set, with the high-level qualifier specified on the INDEX
parameter, to resolve the parameters to be substituted into the jobs being tailored.
However, consider coordinating the access authority for all the CICS Transaction
Server data sets at the same time.
The DFHISTAR job produces a job log and, if necessary, an error code:
v The output job log lists the values that were used for the parameters of the
DFHISTAR job.
v If any error occurs when running the DFHISTAR job, a warning code of 4 or an
error code of 12 is returned. For error code 4, the skeleton jobs are tailored and
added to the CICSTS51.XDFHINST library. For error code 12, the skeleton jobs
are not tailored or copied. To resolve the cause of either error code, examine the
output job log and, if necessary, edit and submit the DFHISTAR job again.
You can run the DFHISTAR job any number of times to alter the attributes of the
jobs that it creates.
When running the DFHISTAR job after the first time, you can select specific jobs to
be created by using the SCOPE or SELECT parameter:
SCOPE ALL|BASE|POST
Specifies whether you want to generate all the CICS Transaction Server
installation and postinstallation jobs, or only the postinstallation jobs. When
you install CICS Transaction Server from the distribution tape, specify the
default, SCOPE ALL. Code the other options, if necessary, during postinstallation
tasks.
ALL
Specifies that you want to generate all the CICS Transaction Server
installation jobs and all the postinstallation jobs.
BASE
Specifies that you want to generate only the installation jobs (DFHINST1
through DFHINST6, DFHIHFS0, DFHIHFS1, and DFHISMKD) that you
use to install CICS Transaction Server from the distribution tape.
POST
Specifies that you want to generate only the postinstallation jobs that you
can use to create the CICS Transaction Server data sets, and run the IVPs.
Before you run the installation jobs, ensure the following settings are in place:
v The MVS image was IPLed with OMVS in full-function mode.
v The user ID under which you are running the jobs has superuser authority.
After you have run the DFHISTAR job to create the installation jobs, submit those
jobs in sequence to install CICS Transaction Server. The following topics describe
the CICS Transaction Server installation jobs, and give guidance on how to use
them.
Run these jobs one at a time. Before you run a job, read the information about it,
starting with “Running the DFHIHFS0 job” on page 55.
After you have run a job, check its output before proceeding to the next job. If a
job ends abnormally, find out why it failed by looking at the job log, which lists
the error messages produced on each run. Correct the error and then proceed as
advised in the job description. Do not attempt to run the next job until the
previous job has run successfully.
These time values are suitable to run the installation jobs on an IBM 2084 D32 or
bigger system. If you have a system smaller than an IBM 2084 D32, review these
values.
All steps of DFHIHFS1 must end with return code zero for the job to be successful.
CICS requires the MOUNT issued by DFHIHFS1 to access files stored in the z/OS
UNIX file system, but the MOUNT command is lost when you re-IPL MVS.
SDFHINST member DFHBPXP1 contains a MOUNT command for
/pathprefix/usr/lpp/cicstsussdir, where ussdir is the name of the directory
specified in the ussdir parameter in the DFHISTAR job. Copy this command into a
BPXPRMxx member of the SYS1.PARMLIB data set to ensure the mount is restored
when MVS is IPLed.
You must run this job before any of the other installation jobs.
To ensure that you can rerun this job, it deletes and uncatalogs the data sets that
are allocated in the second step of the job.
If the DFHINST1 job ends abnormally, examine the job log to determine the cause,
correct the problem, and then rerun the job.
To ensure that you can rerun this job, it deletes and uncatalogs the data sets, if
they exist, that it allocates later.
If the DFHINST2 job ends abnormally, examine the job log to determine the cause,
correct the problem, and then rerun the job.
Caution: If you intend to use an existing target or distribution zone that contains
an earlier release of CICS Transaction Server elements, be aware that any earlier
release of CICS is cleared before being replaced by CICS Transaction Server.
Before you run the DFHINST3 job, if you intend to install CICS Transaction Server
using both existing and new CSIs, make sure any new CSIs have the same control
interval size as the existing CSIs.
If your existing CSIs do not have a control interval size of 4096 bytes, edit the
DFHINST3 job before running it to change the CONTROLINTERVALSIZE(4096)
parameter on the commands used to create the VSAM data sets for the new CSIs,
to specify the same control interval size as the existing CSIs.
For further information about allocating CSI data sets, see the System Modification
Program Extended: Reference manual, SA22–7772.
To ensure that you can rerun this job, it deletes and uncatalogs the data sets, if
they exist, that it allocates later.
This job also sets up the global, target, and distribution zones, depending on the
parameters that you specified to the DFHISTAR job:
1. If you specified NEW for GZONE, the global zone is deleted and redefined.
2. The distribution zone is deleted and redefined.
3. The target zone is deleted and redefined.
4. Member GIMZPOOL from SYS1.MACLIB is copied using the REPRO command
into the zones redefined in the previous steps.
5. If you specified OLD for GZONE, the entries for the DZONE and TZONE
names are removed from the global zone.
If the DFHINST3 job ends abnormally, examine the job log to find the cause,
correct the problem, and then rerun the job.
If the DFHINST4 job ends abnormally, examine the job log to determine the cause,
correct the problem, and then repeat all jobs, beginning with DFHINST1. This
correction avoids SMP/E space problems, and consequent X37 stops with an abend
message, during reruns of these SMP/E jobs.
The highest expected return code is 0, if you install into new zones, and 8, if you
are installing into existing zones.
If the DFHINST5 job ends abnormally, examine the job log to determine the cause,
correct the problem, and then repeat all jobs, beginning with DFHINST1. This
correction avoids SMP/E space problems, and consequent X37 stops with an abend
message, during reruns of these SMP/E jobs.
The DFHINST6 job is the longest running of all the installation jobs; see “Run
times of the installation jobs” on page 55. It produces a large amount of printed
output. The region size for the DFHINST6 job is currently set to 'REGION=0M',
because this job requires more memory than the other installation jobs. Adjust your
JES parameters (for example, with a JES2 /*JOBPARM LINES=99 statement) to
avoid a system abend 722.
If successful, this job gives a return code of 4. See the “GIM23903W - LINK
SUCCESSFUL . . ” message, listed in the report that is output by the apply job.
DFHINST6 job issues messages GIM23903W and GIM23913W depending on the
execution environment of the installer. Both messages are acceptable.
When you have run the DFHINST6 job, the following SMP/E message is produced
from the job:
GIM20502I GIMSMP PROCESSING IS COMPLETE - THE HIGHEST RETURN CODE WAS 04 -
If any other SMP/E messages appear, see the SMP/E: Messages & Codes manual for
guidance information about their meaning and take the appropriate action.
If the DFHINST6 job finishes abnormally, examine the job log to determine the
cause, correct the problem, and then repeat all the jobs, beginning with DFHINST1.
This correction avoids SMP/E space problems, and consequent X37 abends, during
reruns of these SMP/E jobs.
If the DFHINST6 job fails and you are using an existing global zone (that is, you
specified the GZONE parameter of the DFHISTAR job with the disposition
parameter OLD), perform the following steps:
1. REJECT the CICS Transaction Server base-level function SYSMOD.
2. Rerun the DFHINST1 job. When you rerun the installation jobs, some steps that
were successfully completed in the previous run produce return codes with a
value of 8.
DFHIJVMJ reads the supplied JVM profiles in the partitioned data set SDFHENV.
It replaces the symbol &JAVA_HOME in the files with the value you specify on the
JAVADIR parameter in the DFHISTAR installation job. The extra // characters on
each side of the symbol in the supplied files are removed during symbol
substitution.
The customized JVM profiles are then written as z/OS UNIX files in the directories
listed in “Verifying Java components checklist” on page 275.
| Note: You can use the DFHCSVCU utility program only if you have been
| provided with the required authorization.
| SETPROG LPA,ADD,MODNAME=module,DSNAME=dataset
| Where:
| v module is the module to be invoked by the SVC and
| v dataset is the load library where the module resides.
| Because this utility issues SVCs (supervisor calls) it must be invoked from an
| authorized library by an operator who has sufficient authority to run the program.
| The SVCnnn=module parameter identifies the number of the SVC to be modified and
| the program to be invoked by the SVC. The following checks are made by the
| utility program before any update is attempted:
| 1. A PARM statement is specified on the EXEC JCL card.
| 2. The PARM statement contains an SVCnnn= keyword statement.
| 3. The number specified is greater than 199 and less than 256.
| 4. The SVC type for the specified SVC number is 3 or 4.
| 5. The module name is less than or equal to 8 characters in length.
| If any of these checks fail, the utility ends with the return code set to 12.
| When an existing SVC is to be updated the utility asks the operator to confirm that
| the SVC update is to proceed. Any response other than Yes results in the utility
| ending with the return code set to 12.
| Note: Updates made by the DFHCSVCU utility are temporary, and are only valid
| until the system is restarted or another instance of the utility program is executed.
| For the updates to be permanent, member IEASVCxx in SYS1.PARMLIB must be
| updated with the changes.
You now have CICS Transaction Server installed on your DASD. Back up the
volume on which CICS Transaction Server resides. If any errors occur during
customization later, you do not have to re-run the installation jobs.
Postinstallation activities
Copy the CICS Transaction Server procedures into a cataloged procedure library,
load any CICS features that you have, and tailor the CICS Transaction Server.
For information about tailoring CICS Transaction Server, see Chapter 37, “Tailoring
the CICS-supplied skeleton jobs,” on page 239.
Copy all these procedures into a cataloged procedure library; for example,
SYS1.PROCLIB. Before you copy the procedures, read the following instructions:
1. Your procedure library might already contain procedures, supplied with an
earlier release of CICS, that have the same names as the new procedures but
are, in fact, different. If so, you must find some way of selecting the right
release. Here are some ways of using the new versions:
a. For the time being, rename either set of procedures and modify the
appropriate jobs to use the new names.
b. Insert the new procedures into the job streams that use them and use the
procedures as in-stream procedures. Place the inserted procedures between
the JOB statement and the first EXEC statement. You must insert a // PEND
statement after the inserted procedures. When the new release becomes the
production system, you can copy the new procedures into your procedure
library.
c. Indicate the DDNAME of the cataloged procedure library that is to be used
to convert the JCL for the job. For example, you could use the JES2
/*JOBPARM PROCLIB=xxxxxxxx. For more information about specifying
DDNAMEs in JCL, see the z/OS MVS JCL Reference.
d. Specify, in the JCLLIB statement, the name of the procedure libraries that
you want to search for the named procedure or procedures. For more
information about JCLLIB, see the z/OS MVS JCL Reference.
2. If service is applied to the CICS Transaction Server procedures, the versions in
the libraries CICSTS51.CICS.SDFHINST and CICSTS51.CICS.SDFHPROC are
updated by SMP/E. You must then copy the updated procedures into your
procedure library.
3. The default for the symbolic parameter GZONE in the procedures DFHSMPE
and DFHAUPLE is taken from the value that you specified by the GZONE
parameter of the DFHISTAR job.
4. The default for the ZNAME symbolic parameter in the procedures DFHSMPE
and DFHAUPLE is taken from the value that you specified by the TZONE
parameter of the DFHISTAR job. For a description of how the ZNAME
parameter is used, see the SMPCNTL DD statement in The CICS TS-supplied
SMP/E procedure.
5. Change the OUTC parameter as required.
When you have read these instructions, and acted on them as necessary, copy the
procedures into a cataloged procedure library. The CICS Transaction
Server-supplied procedures are listed in Table 7 on page 62.
CICS-supplied procedures
The CICS-supplied procedures and their descriptions are listed in an alphabetical
table. Copy the procedures from the SDFHPROC library, unless the procedure
specifies a different library.
For further information about using the DFHSMPE and DFHSTART procedures,
see “The CICS TS-supplied SMP/E procedure” on page 232.
You can use the DFHINSTA job, generated by the DFHISTAR job, to create extra
sets of CICS Transaction Server target libraries fully under the control of SMP/E.
Each time you run the DFHINSTA job, you can generate only one extra set of
target libraries.
To create an extra sets of target libraries, complete the following steps. You can
repeat the steps to create more sets of target libraries.
1. Edit the DFHISTAR job to specify values:
v The ADDTVOL, AINDEX, ASMPSCDS, AZONE, AZONECSI, AZONELOG,
and USSDIRA parameters, for the new set of target libraries.
v The INDEX, TZONE, TZONECSI, and TZONELOG parameters, for the
primary target libraries you want to copy from. The TZONE, TZONECSI,
and TZONELOG parameters must specify the target zone that contains the
CICS Transaction Server target libraries defined with the high-level qualifier
provided by the INDEX parameter.
v The DZONE, DZONECSI, and DZONELOG parameters, for the distribution
libraries to be associated with the new set of target libraries.
v The SELECT parameter, to specify DFHINSTA, which you want to copy, and
the member name you want the generated version of DFHINSTA to be
stored as in the CICSTS51.XDFHINST library. For example,
SELECT DFHINSTA INSTA111
stores the generated version of DFHINSTA into member INSTA111 of the
CICSTS51.XDFHINST library when you submit the DFHISTAR job.
Each time you copy DFHINSTA to create a new set of target libraries, specify
a new name on the SELECT parameter to save each copy with a different
name in case you require it again.
For further information about editing the DFHISTAR job and about the
parameters of the DFHISTAR job, see “Editing the DFHISTAR job” on page 25.
Do not change the other parameters in the DFHISTAR job.
2. Submit the DFHISTAR job.
When you run the DFHISTAR job, it saves the generated version of the
DFHINSTA job in the CICSTS51.XDFHINST library with the member name
| Note: optional source material is not supplied with CICS Transaction Server V4.2
In previous releases, the sample job DFH0PSRC was used to load optional source
material from the distribution tapes. DFH0PSRC was generated when the
DFHISTAR job was run. This is no longer available, as optional source material is
not supplied.
The readme file contains a complete list of all the plug-ins that are provided, and
you can select which plug-ins to install based on your CICS environment. If you
already have an Eclipse help system, or an Eclipse-based IDE such as WebSphere
Studio Enterprise Developer, you can opt to install only the CICS documentation
plug-ins. You can run the information center locally on a workstation, or as a
server with remote access. Before you begin to install the information center, read
the following topics:
v “Requirements”
v “Installing the information center on a workstation”
v “Installing the information center on a server” on page 72
v “Installing the CICS plug-in in an Eclipse IDE or help system” on page 73
Requirements
The information center is supported on a range of platforms.
v Windows 2000
v Windows XP
v AIX® 5.2 and 5.3
v Linux RedHat Enterprise 3.0
v Linux SuSE Enterprise 3.0
v Linux RedHat Enterprise 8 and 9 for System z
v Linux SuSE Enterprise 8 and 9 for System z
v z/OS 1.13 or later
Please note that support for the information center on Linux for System z and
z/OS is only offered in server mode for remote access using a Web browser.
The information center uses a JRE. A JRE for each platform is provided with the
information center, except for z/OS. If you want to run an information center on
z/OS, you need to use the JRE provided with the operating system.
To get the best results when viewing the information center, it is recommended
that you use one of the following Web browsers:
v Microsoft Internet Explorer 6.0
v Mozilla 1.7
To view PDF documents within the information center, you require Adobe Acrobat
Reader 4.05 or higher installed, and the Acrobat Web plug-in installed in your Web
browser.
You can run the information center in server mode on any of the supported
platforms listed in “Requirements” on page 71. If you already have a help system
installed, see “Installing the CICS plug-in in an Eclipse IDE or help system” on
page 73 for information on how to install just the CICS documentation plug-ins. To
install the information center on UNIX, Linux and Windows servers, follow these
steps:
1. Select the appropriate folder for your operating system on the CD-ROM. This
folder contains a zip file of the Eclipse help system.
2. FTP the zip file to an appropriate directory on your server and then unzip it.
This creates a help system on your server.
3. Select the plug-ins folder on the CD-ROM. This folder contains all of the
documentation plug-ins.
4. Use the readme file on the CD-ROM to select which documentation plug-ins
you want to install. Copy the required plug-ins to the eclipse\plugins directory
of the help system that you unzipped. It is recommended that you copy the
CICS TS plug-in com.ibm.cics.ts.doc, the CICS support plug-in
com.ibm.cicsts.doc, and associated support plug-
ins com.ibm.support.core.doc and com.ibm.support.core.doc.nl.
5. At the highest directory level in your Eclipse help system, edit the file
IC_server_start to specify the port number that you want the information center
to use. The default is 29127. If your company allows you to reserve ports, you
can ask your TCP/IP system programmer to reserve this port or the port
number of your choice
6. Execute the file IC_server_start to start the information center in server mode.
7. To verify that you can access the information center, start up a Web browser
and type the web address http:\\servername:port , where servername is the
The information center runs in the UNIX System Services (USS) component of
z/OS. To install the information center on z/OS, follow these steps:
1. Select the z/OS folder on the CD-ROM, which contains a tar file of the Eclipse
help system.
2. FTP the tar file to a suitable z/OS UNIX directory in USS. Ensure you mount
the z/OS UNIX file containing this directory through the BPXPRMxx member
of SYS1.PARMLIB.
3. Un-tar the file using the command tar -xvf filename. This creates a help
system on your server.
4. Select the plugins folder on the CD-ROM. This folder contains all of the
documentation plug-ins.
5. Use the readme file on the CD-ROM to select which documentation plug-ins
you want to install. FTP the required plug-ins to the eclipse\plugins directory
of the help system that you unzipped. It is recommended that you copy the
CICS TS plug-in com.ibm.cics.ts.doc, the CICS support plug-in
com.ibm.cicsts.doc, and associated support plug-
ins com.ibm.support.core.doc and com.ibm.support.core.doc.nl.
6. At the highest directory level in your Eclipse help system, edit the file
IC_server_start to specify the directory path of a Java Runtime Environment
(JRE) at 1.4.2 that you want the information center to use. You can also change
the port number from the default of 29127. Use the command vi
IC_server_start.sh to open the file to edit it, or if connected through TSO you
can use the command oedit IC_server_start.sh. Add the following command
to the beginning of the file, using the appropriate path to the JRE. For example,
you could specify:
export PATH=/u/lpp/java142/J1.4/bin:$PATH
7. Execute the start file using the command ./IC_server_start.sh &. The &
indicates that the information center should run as a background task. This
means that if you log off, the information center will continue to run on the
server.
8. To verify that you can access the information center, start a Web browser and
type the Web address http:\\servername:port , where servername is the name
of the server where you installed the information center and port is the port
number that you specified in the start file.
Ensure that you shut down your help system or product before adding the CICS
documentation plug-ins, otherwise Eclipse will not recognize the newly added
plug-ins. Follow these steps:
1. Select the plugins folder on the CD-ROM. This folder contains all of the
documentation plug-ins.
2. Use the readme file on the CD-ROM to select which documentation plug-ins
you want to install. It is recommended that you copy the CICS TS plug-in
CICS also provides a CICS Explorer SDK that application developers can install
into an existing Eclipse IDE. The SDK provides support for developing and
deploying Java applications in CICS.
This task describes how to install the CICS Explorer on a user's local workstation.
Procedure
1. Download the CICS Explorer .zip file (a .tar.gz file on Linux) from the
download site to your local workstation.
2. Extract the contents to a new directory on your local workstation. For example,
C:\Program Files\Explorer\ on a Windows operating system, or ~/Explorer/
on a Linux operating system
3. When the extract has completed, open the CICS_Explorer directory in your new
Explorer directory. Locate the cicsexplorer.exe file (cicsexplorer on Linux)
and create a shortcut on the desktop.
Results
This task describes how to install the CICS Explorer on a remote network drive.
The person doing the installation must have write access to the network drive.
Procedure
1. Download the CICS Explorer .zip file from the download site to your local
workstation.
2. Extract the contents to a new directory on the remote network drive.
3. When the extract is complete, open the CICS_Explorer directory in the new
directory on the remote network drive. Locate the cicsexplorer.exe file and
create a shortcut on your local workstation.
4. Right-click the shortcut and click Properties. The Target field displays the path
to the CICS Explorer executable file on the remote network drive. You must
distribute the shortcut to all users who will run CICS Explorer. If the path from
their workstations to the remote server is different from the one already there,
you must change the path in the shortcut.
Results
The CICS Explorer is now installed on the remote network drive. The users start
the CICS Explorer by double-clicking the shortcut icon that you distributed. To
change the location of the CICS Explorer user workspace, see “Changing the CICS
Explorer workspace location” using the related link at the bottom of this topic.
Related reference:
“CICS Explorer installation options” on page 8
You have several options for installing the CICS Explorer, depending on how you
decide to use it in your organization. Understanding how the CICS Explorer runs,
and how it stores its configuration information, will help you to decide which
installation option to choose.
This task describes how to install CICS Explorer on a shared Linux server. The
person doing the installation must have write access to the server.
Procedure
1. Download the CICS Explorer .tar.gz file from the download site to your local
workstation.
2. Log in to the Linux server and create a new directory for the CICS Explorer, for
example; /opt/Explorer
3. Extract the contents of the .tar.gz file to the new directory.
Results
CICS Explorer is now installed on the shared server. Users can use SSH tunnelling
to access the CICS Explorer client, and display the output on the local terminal.
When a user starts CICS Explorer for the first time, a workspace is created on the
local file system, for example; /home/username/.cicsexplorer. To change the
location of the CICS Explorer user workspace, see “Changing the CICS Explorer
workspace location” using the related link at the bottom of this topic.
Related tasks:
“Changing the CICS Explorer workspace location” on page 83
The CICS Explorer workspace contains connection and configuration information.
Because the workspace contains user IDs and passwords, you must ensure that the
workspace can be accessed only by the owning user. You can change the location
where the CICS Explorer saves the user's workspace.
Related reference:
“CICS Explorer installation options” on page 8
You have several options for installing the CICS Explorer, depending on how you
decide to use it in your organization. Understanding how the CICS Explorer runs,
and how it stores its configuration information, will help you to decide which
installation option to choose.
This task describes how to check the JESINTERFACELEVEL in the FTP server.
Procedure
1. Start an FTP client and run a quote stat command.
2. Check the output to determine the JESINTERFACELEVEL. For example:
230 userid is logged on. Working directory is "/u/<userid>".
ftp> quote stat
211-Server FTP talking to host 10.10.10.10, port 1087
211-User: USERID Working directory: /u/<userid>
211-The control connection has transferred 1360 bytes
....
211-Truncated records will not be treated as an error
211-JESLRECL is 80
211-JESRECFM is Fixed
211-JESINTERFACELEVEL is 2
211-Server site variable JESTRAILINGBLANKS is set to TRUE
....
211 *** end of status ***
ftp> quit
221 Quit command received. Goodbye.
3. Optional: (Optional) Change the FTP.DATA configuration file for the Server to
specify JESINTERFACELEVEL 2.
What to do next
When you have configured the FTP server you can configure the CICS Explorer.
You must first create a shortcut to the CICS Explorer executable file that you are
using.
This task describes how to modify the target path in a shortcut to save the CICS
Explorer workspace at a different location from the default.
Procedure
1. Right-click the shortcut and click Properties. The Target field in the Properties
dialog displays the path to the CICS Explorer executable file.
2. Append the text below to the Target path, ensuring that you leave a space
between the existing path and the new text, and retain the quotes:
v On a Windows operating system, append: -data "newdirectorypath\
workspacename", including the quotation marks, where
newdirectorypath
Is the directory path to the location of the new workspace
workspacename
Is the name for the new workspace file.
v On a Linux operating system append: -data ~/workspacename, where
workspacename
Is the name for the new workspace file.
For example: C:\Explorer\CICS_Explorer\cicsexplorer.exe -data
"C:\Documents and Settings\Administrator\Desktop\new_workspace"
3. Save and close the shortcut.
Results
When you next start the CICS Explorer using the shortcut created above, the CICS
Explorer workspace is created in the new location. You must always start the CICS
Explorer from the new shortcut to use the new workspace.
Procedure
1. On the workbench menu bar click Window > Manage Connections. The Host
Connections view opens. The following example shows the Host Connections
view from the CICS Explorer, showing the CICS System Management and
z/OS connection categories. The categories available depends on the Explorer
being used.
2. Click Add on the Credentials section to add a new credential. The New
Credentials window opens.
3. Enter your credential details and provide a credentials name. The name can be
anything you like and is used only to help you distinguish between different
credentials. Select the Save Password checkbox to save the password.
Note: You might have a single user ID but use different passwords for different
systems. If you have, you can define multiple credentials, each one having the
same user ID but with different credential name and password or pass phrase.
Alternatively you can choose to define one credential, but not to save the
password or pass phrase, in which case you are required to enter them when
you connect to a system.
4. Click OK to save the credential or Cancel to cancel the process and close the
window without saving the new credential.
You can now click Add in the Connections section of the Host Connections view to
configure a system connection. For more information about configuring system
connections see the related links, or specific Help topics in your Explorer user
guide.
Related tasks:
“Configuring a CICS system connection”
Before you can view any information, you must establish a connection between
CICS Explorer and your CICS systems by providing details about the system
connection, its location, and authentication requirements. By default, CICS Explorer
attempts to connect using the SSL protocol. If the SSL connection is not successful,
the connection will be retried without SSL.
If you are connecting to a CICS version 4 or later system you can connect either to
a CICSPlex SM WUI server using the "CICSPlex SM Data Interface" read-only
connection, or, if you want update capability, you can use the CICS management
client interface (CMCI) connection. If you are using the CMCI connection, the CICS
system must be set up to use CMCI. See the topic Setting up the CICS
management client interface in the CICS Transaction Server for z/OS version 4
information center for instructions on how to do this.
If you are connecting to a CICS TS for VSE/ESA 1.1.1 system, you can use the
CICS management client interface (CMCI) read-only connection.
If CICS Explorer is not configured, or you want to add a connection, perform these
steps:
Procedure
1. On the workbench menu bar click Window > Manage Connections. The Host
Connections view is displayed. If your connections are pre-configured, you see
the connections listed under the categories in the view. If not, the categories are
empty. The following example screen capture shows the Host Connections view
with one connection defined in each category type. Each connection is
associated with a credential, with the exception of the z/OS FTP connection.
The credential is shown in parenthesis after the connection name.
3. Enter the TCP/IP host name of your server in the Host Name field. As you
type, the characters up to the end of the first qualifier are inserted in the Name
field. So if your host name is myserver.example.ibm.com then the name would
display as myserver. You can type over the name to be anything you want.
4. Enter the port number. As you type, the port number is also appended to the
name field, so the name is displayed something like myserver:20332. You can
type over the name to change it to anything you want.
5. Click OK to save the connection. The connection is saved and is shown in the
Connections section.
6. Optional: You can choose to associate a credential with the connection at this
time. Right-click the connection name and hover over Set Credentials to show
the credentials available. Click the credential you want to use for the
connection.
The connection and associated credential are shown in the Host Connections view.
You can now connect to the system by right-clicking the connection name and
clicking Connect. Alternatively select the connection name and click the Connect
button. If the connection is not already associated with a credential, you can
choose an existing credential or create one at this time.
You must have at least one connection “credential” before you can configure a
system connection. A credential is a repository for a user ID and password
combination. See the topic “Defining connection credentials” on page 84 for further
information.
Note: For z/OS Explorer to successfully obtain the required spool files, the
FTP.DATA configuration file for the Server must specify JESINTERFACELEVEL 2.
For more information about the JESINTERFACELEVEL parameter, see your System
z/OS documentation.
Procedure
1. Click Window > Manage Connections from the workbench menu bar. The
Host Connections view is displayed. If your connections are pre-configured,
you see the connections listed under the categories in the view. If not, the
categories are empty. The following example screen capture shows the Host
Connections view in the CICS Explorer. One connection is defined in each
category type. Each connection is associated with a credential, with the
exception of the z/OS FTP connection. The credential is shown in parenthesis
after the connection name.
2. In the Connections section select the System z FTP category and click Add. The
Add System z - FTP Connection dialog opens.
Results
The connection and associated credential are shown in the Host Connections view.
You can now connect to the system by right-clicking the connection name and
clicking Connect. Alternatively select the connection name and click Connect. If
the connection is not already associated with a credential, you can choose an
existing credential or create one at this time.
You should have at least one connection “credential” before you can configure a
system connection. A credential is a repository for a user ID and password
combination. For more information see Defining connection credentials .
Procedure
1. Click Window > Manage Connections from the workbench menu bar. The
Host Connections view is displayed. If your connections are pre-configured,
you see the connections listed under the categories in the view. If not, the
categories are empty. The following example screen capture shows the Host
Connections view in the CICS Explorer. One connection is defined in each
category type. Each connection is associated with a credential, with the
exception of the z/OS FTP connection. The credential is shown in parenthesis
after the connection name.
2. In the Connections section select the z/OSMF category and click Add. The Add
Connection window opens.
Results
The connection and associated credential are shown in the Host Connections view.
You can now connect to the system by right-clicking the connection name and
You must have the required software installed on your workstation, including an
Eclipse IDE at the correct version. The list of supported operating systems and
required software are described on the CICS Explorer website.
Procedure
1. If you do not have an Eclipse IDE installed, go to the Eclipse website to
download and install an IDE. You must install the Eclipse Classic IDE or
Eclipse IDE for Java EE developers. The downloads are available from the
Eclipse version 3.6.2 (Helios) downloads or Eclipse version 3.7 (Indigo)
downloads websites.
v If you want to develop web applications in a Liberty profile and Java
applications, download the Eclipse IDE for Java developers.
v If you want to develop only Java applications, download the Eclipse Classic
IDE.
2. To download the CICS Explorer SDK, go to the CICS Explorer website.
3. Select the Download site link and enter your IBM ID and password.
4. Select CICS Explorer from the list and click Continue.
5. Read and accept the license.
6. Select the CICS Explorer SDK from the list to download the compressed file to
a directory on your workstation.
7. Open the Eclipse IDE and click Help > Install new software.
Note: Make sure that the option Contact all update sites during install to
find required software is selected. The CICS Explorer SDK has dependencies
on other Eclipse components, so you must ensure the update manager
downloads and installs those dependencies.
8. Click Add. In the "Add site" dialog box, click Archive.
9. Browse to the downloaded file and click Open.
Results
The CICS Explorer SDK is installed in your Eclipse IDE. You might need to accept
a security warning and restart the IDE to pick up the new software.
What to do next
You can work with the CICS samples provided by the CICS Explorer SDK to
become familiar with the Java and web application support.
The term “RACF” is used throughout this information to mean the MVS Resource
Access Control Facility (RACF) or any other external security manager that
provides equivalent function.
Although, in general, CICS runs in problem state, the CICS initialization program,
DFHSIP, must run in supervisor state for part of its execution. The CMAS startup
program, EYU9XECS, also requires APF authorization.
For information about maintaining lists of APF-authorized libraries, see the z/OS
MVS Initialization and Tuning Guide.
For information about authorizing access to CICS data sets, see the CICS RACF
Security Guide.
Without protection, the integrity and security of your MVS system are at risk.
Additionally, if you require protection against the unauthorized use of DFHSIP, do
not place this module in the LPA and do not include hlq.SDFHAUTH in the MVS
LNKLST unless DFHSIP is RACF-protected as a controlled program with a profile
in the RACF PROGRAM resource class.
For information about authorizing access to CICS data sets, see Implementing
RACF protection in a single CICS region in Securing.
CICS also checks the DFSMSdss or DFDSS release level by linking to the module
ADRRELVL. If access to this data set services module is controlled by means of
RACF PROGRAM general resource profiles, security violation messages are issued
against the CICS region user ID, unless the user ID is authorized to access
ADR-prefixed module names.
You can avoid security violation messages against the CICS region user IDs, and
still control access to data set services:
v If you have generic PROGRAM profiles protecting access to ADR modules,
create specific PROGRAM profiles for the ADDRELVL module and ensure that
your CICS region user IDs have READ access to these specific profiles.
v Instead of using PROGRAM profiles to protect access to data set services, use
one of the following methods:
– Define suitable profiles in the DASDVOL general resource class.
– Define profiles in the FACILITY general resource class that are supported by
DFSMS to control access to data set services.
For information about using DASDVOL and FACILITY class profiles to control
the uses of data set services, see the DFSMS/MVS DFSMSdss Storage
Administration Reference, SC26-4929, and the DFSMS/MVS DFSMSdss Storage
Administration Guide, SC26-4930.
Control ensures that only authorized CICS regions can present themselves as z/OS
Communications Server applications that provide services with this applid, thus
preventing unauthorized users from impersonating real CICS regions. The CICS
region user ID requires the OPEN access, not the issuer of the z/OS
Communications Server SET VTAM OPEN command.
1. To enable CICS to start up with external security, authorize the CICS region
user ID to open the CICS region's z/OS Communications Server ACB with the
applid specified on the APPLID system initialization parameter.
2. For each applid, create an z/OS Communications Server APPL profile, and give
the CICS region user ID READ access. For example:
RDEFINE VTAMAPPL applid UACC(NONE) NOTIFY(userid)
PERMIT applid CLASS(VTAMAPPL) ID(cics_region_userid) ACCESS(READ)
For information about creating z/OS Communications Server APPL profiles for
CICS region applids, see the CICS system resource security in Securing. For
information about the XXRSTAT exit, see the .
To give the region user ID the authority to access the category 1 system
transactions, edit and submit the sample job stream in Figure 3 to run the
CICS-supplied sample CLIST, DFH$CAT1. This job uses the RACF commands in
the CLIST to update the RACF database.
Only a user with the RACF authority SPECIAL can run the CLIST to update the
RACF database.
In a test environment you might wish to use the default action and allow any CICS
region using VSAM RLS to connect to an SMSVSAM server. If you wish to protect
this access, the RACF SUBSYSNM general resource class must be active and you
must authorize each CICS region that connects to an SMSVSAM server to have
access to that server. This means granting access to the appropriate profile in the
RACF SUBSYSNM general resource class. You define profiles in the SUBSYSNM
resource class to control access by subsystems like CICS that want to connect to
SMSVSAM.
When CICS attempts to register the control ACB during CICS initialization,
SMSVSAM calls RACF to check that the CICS region user ID is authorized to a
profile name in the SUBSYSNM class that matches the CICS applid. If the CICS
region user ID does not have READ authority, the register fails.
For example, if the applid of a CICS AOR is CICSDAA1, and the CICS region user
ID (shared by a number of AORs) is CICSDA# # , define and authorize the profile:
RDEFINE SUBSYSNM CICSDAA1 UACC(NONE) NOTIFY(userid)
You can use wildcard characters on the applid to specify more than one CICS
region, for example:
PERMIT CICSD%%% CLASS(SUBSYSNM) ID(CICSDGRP) ACCESS(READ)
Users of the IXCMIAPU administrative data utility and CICS regions both require
appropriate authorizations to log streams and IXLSTR coupling facility structures.
Use the following RACF commands to give your user ID the required
authorizations to these two profiles:
PERMIT log_stream_profile CLASS(LOGSTRM) ACCESS(ALTER) ID(your_userid)
PERMIT IXLSTR.structure_name_a CLASS(FACILITY) ACCESS(UPDATE) ID(your_userid)
Ensure that the CICS region user ID is authorized to write to, and create if
necessary, the log streams and log stream data sets that are used for its system log
and general logs. See Chapter 33, “Defining the logger environment for CICS,” on
page 195. You do this by granting the appropriate access authorization to log
stream profiles in the RACF LOGSTRM general resource class:
v If CICS is expected to create log streams dynamically, CICS must have ALTER
authority to the relevant log stream (LOGSTRM) profiles, and UPDATE authority
to the relevant coupling facility structure (IXLSTR and IXGLOGR) profiles. Here
is an example:
PERMIT region_userid.applid.* CLASS(LOGSTRM) ACCESS(ALTER)
ID(region_userid)
PERMIT IXLSTR.structurename CLASS(FACILITY) ACCESS(UPDATE)
ID(region_userid)
PERMIT IXGLOGR.region_userid.* CLASS(DATASET) ACCESS(UPDATE)
ID(region_userid)
v If all the log streams to which CICS writes are already defined to MVS, CICS
requires only UPDATE authority to the log stream profiles:
PERMIT region_userid.applid* CLASS(LOGSTRM) ACCESS(UPDATE)
ID(region_userid)
PERMIT IXGLOGR.region_userid.* CLASS(DATASET) ACCESS(UPDATE)
ID(region_userid)
In the above examples, region_userid.applid.* is the generic profile name of the log
stream resource. These examples illustrate a resource name prefixed by the region
user ID and applid. region_userid is the CICS region user ID under which CICS is
running, either as a started task or batch job.
Permit READ access to those users who read the CICS log streams. You must
permit UPDATE access to those users who update journals by granting the user
the appropriate authority to the log stream, in the LOGSTRM resource class, and to
The user ID for the JCICSJCT is the logon user ID, not the CICS region user ID.
The example shows how to define it:
PERMIT journal_name CLASS(JCICSJCT) ACCESS(UPDATE)ID(logon_userid)
You can define the generic profile in the following example to cover all the log
streams referenced by the CICS region identified by its region user ID and applid:
RDEFINE LOGSTRM region_userid.** UACC(NONE)
If, however, you have multiple CICS systems sharing the same region user ID, but
with differing security requirements, include the applid in the generic profile:
RDEFINE LOGSTRM region_userid.applid.* UACC(NONE)
The following example allows the CICS region user ID under which CICS is
running to write journal and log records to log streams in the named coupling
facility structure:
PERMIT IXLSTR.structurename CLASS(FACILITY) ACCESS(UPDATE)
ID(region_userid)
If several CICS regions share the same CICS region user ID, you can make profiles
more generic by specifying * for the applid qualifier.
The number of profiles you define depends on the naming conventions of the logs
and to what extent you can use generic profiling.
You must set up z/OS UNIX System Services, as described in z/OS UNIX System
Services Planning.
To satisfy a CICS region request for a z/OS UNIX function for the first time, RACF
does the following actions:
Follow the steps listed to ensure that each CICS region meets the security
requirements:
1. Choose a RACF group that all your CICS regions can use to access z/OS UNIX
and give a z/OS UNIX group identifier (GID) to this RACF group.
2. Give a z/OS UNIX user identifier (UID) to each CICS region user ID.
3. Make sure that each CICS region user ID connects to the RACF group that you
chose.
4. Set up a home directory on z/OS UNIX for each of your CICS regions.
The UID and GID are numbers that can be in the range 0 to 16 777 216. 0 is a
superuser ID. Give some thought to naming conventions and to any existing UIDs
and GIDs in your z/OS UNIX system. For information on how to manage the
UIDs and GIDs for your z/OS UNIX system, see z/OS UNIX System Services
Planning.
To assign a z/OS UNIX UID and GID for your CICS regions and set up a home
directory:
Procedure
1. Choose a RACF group that can be used by all your CICS regions. For example,
you might use a RACF group that is defined as the default group of your CICS
region user IDs, or you could set up a RACF group to be used only for access
to z/OS UNIX System Services. When you are setting up facilities such as Java
support or CICS Web support, you might want to use this RACF group for
giving file access permissions on z/OS UNIX, in which case the RACF group's
z/OS UNIX group identifier (GID) is associated with these directories and files.
This association means that the owner of these directories and files, and anyone
who is not the owner but has to carry out operations with these files, must
have this group as their group or one of their supplementary groups. The
RACF profiles in Securing explains how RACF groups work.
2. Choose a suitable z/OS UNIX group identifier (GID) for the RACF group, and
assign the GID to the RACF group. To assign a GID, specify the GID value in
the OMVS segment of the RACF group profile. For example, if the RACF group
is CICSTSAB, and the GID you want to assign is 9, use the command:
ALTGROUP CICSTSAB OMVS(GID(9))
3. Choose a suitable z/OS UNIX user identifier (UID) for each CICS region.
Implementing security for z/OS UNIX files in Securing explains how the region
user ID under which CICS runs is specified when CICS is run as a started task,
as a started job, or as a job.
a. Assign your chosen UIDs to each of your CICS region user IDs. To assign
UIDs, specify the UID value in the OMVS segment of the RACF user profile
for each CICS region user ID.
b. Also specify the name of a home directory for each CICS region using the
HOME option. The directory name format is /u/CICS region user ID.
RACF security overview in Securing tells you how to update a RACF user
profile using the ALTUSER command. For example, if the CICS region user ID is
CICSHAA1, and the UID you want to assign is 2001, use the command:
ALTUSER CICSHAA1 OMVS(UID(2001) HOME(’/u/cicshaa1’))
Creates the z/OS UNIX directory /u/cicshaa1. If you are using the TSO
command, enclose the directory name in single quotation marks.
b. Whether or not you are using an automount facility, allocate a z/OS UNIX
data set for each directory.
c. If you are not using an automount facility, mount the data set that you have
allocated.
The z/OS UNIX data set that you allocate for a CICS region's home directory
has a finite size. If a particular CICS region is using the home directory
extensively, you might have to increase the amount of space that the region has
available.
5. Verify that the permission defined for the /etc directory is set to 755, so that
CICS can access the files. The /etc directory provides a symbolic link to the
/SYSTEM/etc directory. The /SYSTEM/etc directory is created with a permission
of 700, so you need to check that the /SYSTEM/etc directory permission is set to
755.
a. Check the permission set in the /SYSTEM/etc directory, from the Unix shell:
ls -ld /SYSTEM/etc
b. If the permission is not drwxr-xr-x, issue the following Unix shell command
to set permission to 755:
chmod 755 /SYSTEM/etc
If permission is not set to 755, you might receive a RACF error indicating
that you have insufficient authority for CICS to access the files.
6. Make sure that each of your CICS region user IDs connects to the RACF group
to which you assigned a z/OS UNIX group identifier (GID). If your CICS
region user IDs connect to more than one RACF group, a RACF list of groups
must be active in your system.
Your CICS regions now have access to z/OS UNIX System Services. When you set
up facilities such as Java support or CICS Web support, use the UIDs or GIDs to
give the CICS regions permission to access directories and files on z/OS UNIX.
To check the UID and GID details for a user, use the id command in the UNIX
environment. For example, issuing the id command for our example CICS region
user ID CICSHAA1 gives the following result:
uid=2001(CICSHAA1) gid=9(CICSTSAB)
For more general information about RACF facilities for controlling access to z/OS
UNIX System Services, see z/OS Security Server RACF Security Administrator's
Guide.
To run the CICS-supplied IVPs with external security, you must activate the
resource classes for CICS resources.
To use your own user-defined resources with external security in your CICS
environment:
v Define resource classes for your resources.
v Activate the resource classes.
v Optionally apply the RACLIST option to the resource classes to be used for
QUERY SECURITY commands, to build in storage profiles for those resource
classes.
For information about RACF resource classes, see the RACF classes for CICS
resources in Securing.
This default user ID assigns the security attributes to be used for all CICS terminal
users who do not sign on with the CESN transaction or a user-written equivalent.
During startup, CICS tries to sign on the default user ID. If it is not signed on,
perhaps because it is not defined, CICS issues message DFHSN0701 and stops
CICS initialization. After the valid default CICS user ID is signed on, its security
attributes are used for all CICS terminal users who do not sign on with the CESN
transaction. If the default user ID is defined to RACF with a CICS segment, the
operator attributes in that segment are also used for users who do not sign on.
For information about defining the user ID to RACF, see the CICS installation
requirements for RACF in Securing.
Look through the subtopics in this section and select the ones that are relevant to
your installation. Work through these topics to create your customized MVS
linklist.
Ensure the modules supplied in SDFHLINK and SEYULINK are available from an
APF-authorized library in the MVS linklist:
v Add these modules, as required, to an existing APF-authorized library defined in
the MVS linklist
or
v Define SDFHLINK and SEYULINK as APF-authorized libraries and include
them in the MVS linklist
Unless otherwise stated, the CICS Transaction Server for z/OS, Version 5 Release 1
levels of the modules in SDFHLINK are compatible with earlier releases of CICS.
The CICSPlex SM modules in SEYULINK are not compatible with earlier releases.
CICSPlex SM modules in SEYULINK are release specific. If you plan to run
multiple releases of CICSPlex SM on the same MVS image, you must have the
equivalent modules specific to the releases you are running.
If you intend using shared data tables, ensure that these modules are available in
the MVS linklist or the MVS link pack area:
v DFHDTSVC and DFHDTCV, because all regions using shared data tables must
use the same level of SVC code.
v DFHMVRMS, the RESMGR exit stub, because JOBLIB and STEPLIB data sets are
unavailable at end-of-memory.
In addition, any application that calls the API must be link-edited with one of the
following stub routine modules, regardless of what programming language is used:
The interface consists of a single load module that contains two entry points:
EYU9AR00
The function package
EYU9AR01
The host command
For a REXX program to access the function package, the module EYU9AR00, with
its alternate entry point EYU9AR01, and its alias IRXFLOC, must be in an
authorized library in one of these places:
v The MVS linklist
v The STEPLIB concatenation of the application that calls the API
For a REXX program to access the function package from NetView, the EYU9AR00
module must also be aliased to DSIRXLFP and placed in an authorized library in
either the MVS linklist or the STEPLIB concatenation for the NetView system.
The following members contain SMP/E user modification control statements that
you can use to move the necessary API load modules to the
SYS1.CICSTS51.CPSM.SEYULINK library. These members are supplied in
CICSTS51.CPSM.SEYUSAMP.
If you use the IRXFLOC or DSIRXLFP aliases to provide access to the REXX
function package, you must place them ahead of any other IRXFLOC or DSIRXLFP
modules in the STEPLIB or MVS linklist concatenation.
If you do not want to use the aliases for the REXX function package, you must
modify your REXX parameter modules IRXPARMS, IRXTSPRM, and IRXISPRM. If
you do this, do the following actions:
CICS initialization fails if CICS cannot load this callable services module.
For more information about the subsystem interface, see the z/OS MVS Using the
Subsystem Interface manual.
For more information about these parameters, see the z/OS Initialization and Tuning
Reference manual.
For more information about this parameter, see the z/OS Initialization and Tuning
Reference manual.
If you want to use the console message handling facility or to change the number
of pipes that can be allocated in an EXCI address space, code the entry by using
one of the following methods:
CICS,DFHSSIN,DFHSSIyy
or
SUBSYS SUBNAME(CICS)
INITRTN(DFHSSIN)
INITPARM(DFHSSIyy)
This entry is used for every CICS region that runs under MVS that you have IPLed
with this version of the IEFSSN member. You do not have to specify both
DFHSSIN and DFHSSIyy, however apart from the suffix yy, you must code the
entry for each parameter using the exact format given in the example. The terms
have the following meanings:
CICS The name of the CICS subsystem.
DFHSSIN
The name of the CICS subsystem routine that initializes the console
message-handling facilities and the number of pipes that can be allocated
in an EXCI address space. If you omit this name, CICS is defined as an
MVS subsystem, but none of the console message-handling facilities are
enabled, and the default number of pipes that can be allocated in an EXCI
address space is used. That default is 100.
DFHSSIyy
The name of a SYS1.PARMLIB member in which you have defined
initialization parameters for message formatting and EXCI pipe allocation
for the CICS subsystem. If you specify DFHSSIN but omit DFHSSIyy, the
DFHSSIN routine tries to use the parameters that are defined in member
DFHSSI00.
If the DFHSSI00 member does not exist, the routine uses the default
values:
The IEFSSNaa member in the SYS1.PARMLIB library also contains the definitions
for all the other subsystems required for this IPL of MVS; for example, JES2, IRLM
and DB2.
You must review the default options for the following functions:
v C and C++ programs compiled using the XPLINK compiler option
v Programs that run on open TCBs and use APIs other than the CICS API
v SSL TCBs specified by the MAXSSLTCBS system initialization parameters
v Java programs running in JVM servers
If you use XPLINK or non-CICS APIs, you must increase the MAXPROCUSER and
MAXPROCSYS values. See “Sizing MAXPROCSYS” for guidance.
If CICS is configured to use SSL, you might have to increase the MAXTHREADS
and MAXTHREADTASKS values.
If CICS is configured to use JVM servers, you might have to increase the total
THREADLIMIT value in each JVMSERVER.
If your system uses two or more of these facilities, corresponding further increases
in the values for these parameters is appropriate.
Sizing MAXPROCSYS
CICS uses at least two processes for each CICS region. If you have many CICS
regions, you must set your system limit to handle these processes. The following
table explains which TCBs become processes, depending on the CICS system:
Table 9. TCBs that become processes
Is the TCB
always a
TCB process? Description
Jobstep Yes The jobstep TCB is always created.
SO Yes The SO TCB is always created.
In summary, there is always a minimum of two processes for each CICS region, up
to a maximum of six processes for each region, depending on which additional
TCBs you are running.
You can issue the following command to give you a list of the processes that are
running on your system:
D OMVS, A=addressspaceid
If you run this command at system startup, and again when your system is stable,
you can calculate the most appropriate number for MAXPROCSYS.
The console message-handling facility affects the messages that are displayed on
MVS system consoles in the following ways:
v The subsystem tries to ensure that all console messages issued by all CICS
regions have a standard format. The format is:
+DFHnnnn APPLID MESSAGE-TEXT
In this message:
+DFHnnnn
– Begins in column 1
For more information about these routing codes, see the z/OS MVS Initialization
and Tuning Reference manual for your version of MVS.
If you specify DFHSSIyy but it does not exist, the DFHSSIN routine uses the
default message-formatting initialization parameters that are defined in the
DFHSSIN routine.
If you do not specify DFHSSIN in the IEFSSNaa entry that defines CICS, the
message handling facilities are not enabled. Also, if you run CICS as a started task,
you cannot use the name “CICS” for the procedure name.
These modules must reside in the LPA or in an APF-authorized library in the MVS
linklist:
v The modules DFHSSIN and DFHSSMGT, installed in the hlq.SDFHLINK library,
must reside in an APF-authorized library in the MVS linklist.
v The DFHSSEN module, installed in the hlq.SDFHLPA library, must reside in the
LPA.
v The modules DFHSSGC and DFHSSWT, installed in the hlq.SDFHLPA library,
must reside either in the LPA or in an APF-authorized library in the MVS
linklist.
The LINDEX parameter in the DFHISTAR installation job defines hlq.
The current versions of these modules are compatible with earlier CICS releases
that support console message handling.
For information about adding modules that are installed in the hlq.SDFHLINK
library to the MVS linklist, see Chapter 16, “Installing CICS-required modules in
the MVS linklist,” on page 111.
For information about adding modules installed in the hlq.SDFHLPA library to the
LPA, see Chapter 21, “Installing CICS modules in the MVS link pack area,” on
page 147.
If you have defined the message-handling facility has been defined to MVS (by the
CICS entry in the IEFSSNaa member of the SYS1.PARMLIB library), CICS regions
running earlier releases of CICS in the same MVS image have the full benefit of the
message handling that has been defined if either of the following cases is true:
v An automated-operation program, such as NetView, is active in the MVS image.
v A CICS region that supports message handling (see “The console
message-handling facility” on page 121 for a list) is running in the same MVS
image.
A consequence of the standard format console messages is that they no longer
include date, time, and informational messages or information. If you use this kind
of information as a token, you must make a change to the code so that it looks for
a different token.
This programming interface allows a user to allocate and open sessions or pipes
which operate in "half-duplex", flip-flop" mode, to a CICS region and to pass
distributed program link requests over them. The multiregion operation facility of
CICS interregion communication supports these requests, and each pipe maps onto
one MRO session, in which the client program represents the sending process and
the CICS server region represents the receiving process. A default limit of 100 pipes
for each EXCI address space applies.
Code the parameter in columns 1 through 71 of the DFHSSIyy member, like this:
LOGONLIM=200
LOGONLIM=nn
The minimum and maximum values that can be specified for nn are 100
and 250.
If you omit the parameter or the value specified lies outside the allowed
range, CICS assumes a limit of 100.
You can use the callable service, IEANTRT, to retrieve the token. Invoke IEANTRT
with level IEANT_SYSTEM_LEVEL (EQU 4). The return code is interpreted in the
following way:
0 The name and token pair exists and the token has been retrieved. The logon
limit can be extracted from the token.
4 The name and token pair does not exist. The logon limit is assumed to be 100.
Any other value indicates that the callable service has detected an error.
Define the EXCI pipe allocation limit parameter for the CICS subsystem in a
member DFHSSIyy of the SYS1.PARMLIB library.
If IBM changes the Type 3 SVC, for example at a new release or because of a
service update, you must reinstall the current level of the CICS Type 3 SVC into
the link pack area (LPA) and perform an IPL with the CLPA option.
To install the CICS Type 3 SVC, define the CICS SVCs to z/OS, install the
DFHCSVC module into the LPA, and specify the DFHCSVC number on the
CICSSVC system initialization parameter.
| Alternatively, if you have the required authorization, you can use the DFHCSVCU
| utility program to install the CICS Type 3 SVC dynamically, without the need to
| perform an IPL of the z/OS system. For further information about running
| programs that require APF authorization, see What is the authorized program
| facility in z/OS Basic Skills. For further information about the DFHCSVCU utility
| program, see DFHCSVCU in Reference -> Diagnostics.
Use the following guidelines when you install the DFHCSVC module into the LPA:
v Do not change DFHCSVC attributes.
For further information about installing the DFHCSVC module in the LPA, see
Chapter 21, “Installing CICS modules in the MVS link pack area,” on page 147.
The current version of the CICS SVC module is compatible with all earlier releases
of CICS, which enables you to run your earlier CICS regions with current regions
in the same MVS image.
CICS contains a test to verify that it is using the correct level of the CICS
DFHCSVC module. If CICS calls an SVC module using the SVC number specified
on the CICSSVC system initialization parameter and that module is not at the
current level, CICS issues message DFHKE0104. As a result of this message, CICS
either abends with a system dump or prompts the operator to enter an alternative
SVC number, depending on the option specified on the PARMERR system
initialization parameter.
You can run several CICS regions, at different release levels, in the same MVS
image, with each region using its own version of the CICS SVC. However, if some
of those regions use MRO, all regions that use MRO must use the latest CICS Type
3 SVC (DFHCSVC module) and the latest DFHIRP module. For information about
using the latest SVC with earlier releases of CICS, see “MRO between different
CICS releases with a changed SVC number” on page 131.
| To use more than one version of the CICS SVC, either use the DFHCSVCU utility
program, or rename the new SVC module in the LPA, and then respecify the SVC
in the SVCPARM statements.
| You must have authorization to use the DFHCSVCU utility program. For more
information about this program, see Chapter 18, “Installing the CICS SVCs,” on
page 129.
To rename the new CICS SVC module, use the renaming facility of ISPF or
IEBCOPY, or the TSO command RENAME, renaming the module to a unique
name of your choice. Use SMP/E to rename the CICS SVC module in the
SDFHLPA library. Use the SMP/E RENAME command to inform SMP/E of the
change to the name of the CICS SVC module. Therefore, if you later use SMP/E to
apply service to that module, the service is applied to the renamed module in the
LPA, and not the DFHCSVC module.
For example, you might want to use an SVC number 255 for a test CICS region,
and the default CICS SVC number 216 for your production system:
The EPNAME parameter for the new CICS SVC specifies the module name, not
the CSECT name, for the new CICS SVC module.
All the SVCPARM statements apply to the same IEASVCxx member of the
SYS1.PARMLIB library.
3. Perform another IPL of MVS to enable all the SVC versions specified in the
SVCPARM statements. After you perform another IPL of MVS, you can use
both versions of the CICS SVC, provided that both regions do not use MRO
concurrently. If both systems use MRO, only the new, latest version of the SVC
and the latest DFHIRP module are used by both regions.
4. In your production system, specify the number of the current CICS SVC in the
CICSSVC system initialization parameter. Similarly, in the test system, specify the
number of the new CICS SVC version.
If, when you install the CICS TS 5.1 SVC in the LPA, you give the SVC a number
different from the number defined to the earlier CICS regions, you must respecify
the SVC number. On each CICS region from an earlier release that will use the
CICS TS 5.1 SVC, specify the new SVC number on the CICSSVC system
initialization parameter.
Use of HPO potentially allows CICS application programs to bypass all MVS
integrity controls. If you decide to use HPO, ensure that the application programs
used on your CICS system meet your own installation's integrity requirements.The
code to support the SNA authorized path feature of HPO, which is the improved
path through SNA, is in CICS.
Define the DFHHPSVC module to MVS as a Type 6 SVC; the default HPO SVC
number defined in the DFHSIT module is 215.
If you are not using HPO, do not load the DFHHPSVC module into the MVS
nucleus. You choose to use HPO explicitly by coding HPO=YES in the system
initialization table.
Before you can use HPO, ensure that the HPO SVC module is included in the MVS
nucleus.
nnn is the number of the CICS NML, in the range 001 through 256. Choose the
value of nnn to be unique in your MVS nucleus.
If you have a version of the DFHHPSVC module from an earlier release of CICS
already installed in your MVS nucleus, you do not have to replace it with the
latest version. Versions of the DFHHPSVC module from earlier releases of CICS are
compatible with the current release.
However, you can remove a link-edited version of the DFHHPSVC module from
the MVS nucleus by running a link-edit job to replace the existing version of the
nucleus with one that does not contain the module to be removed, in one of the
following ways:
v If the existing nucleus-resident DFHHPSVC module is known to SMP/E, use the
SMP/E UCLIN statement to remove the module entry.
v You must link-edit the nucleus module, IEANUC0x, with the scatter (SCTR)
attribute. If you do not do this, MVS enters a non-restartable wait state at system
initialization.
v
For further information about defining SNA resources, see the z/OS Communications
Server: SNA Network Implementation Guide and z/OS Communications Server: SNA
Resource Definition Reference manuals.
The following topics provide more detailed information on defining your CICS
regions to SNA.
For example, you might use the following definition for the CICS region to be
identified as CICSHTH1:
**********************************************************************
* Specific APPL definition for CICS region CICSHTH1
**********************************************************************
CICSHTH1 APPL AUTH=(ACQ,VPACE,PASS),VPACING=0,EAS=5000,PARSESS=YES X
SONSCIP=YES,LUAPFX=XX
********************************************************************
v Code CICSHTH1 on the CICS system initialization parameter APPLID to define the
SNA application identifier to CICS.
v
v See “Data set naming conventions” on page 243 for information about the
naming convention that is used for the CICSHTH1 applid.
You can use any release of z/OS Communication Server. For details of the
minimum level of products that you can use with the current release, see
http://www.ibm.com/software/htp/cics/tserver/sysreqs/.
CICS can communicate with different levels of z/OS Communication Server. It can
find out which level you are using and the level of function that is available. So
you can upgrade CICS and z/OS Communication Server at different times. CICS
finds out whether extra function is available when a new version of z/OS
Communication Server is installed, and produces a message if the function is not
being exploited fully.
The same message is sent there if the ACB is opened automatically during
initialization, rather than by CEMT.
For example, to be able to use an SNA APPC connection between a CICS region
(applid CICSHTH1) on MVS image MVSH and a CICS region (applid CICSHAJ1)
on MVS image MVSJ:
1. Define the cross-domain services (CDRSC) for accessing CICSHAJ1 in a
member of the SYS1.VTAMLST library, or your own user.VTAMLST library, for
MVSH.
2. Issue a VARY ACT command on MVSH to activate the CDRSC definition for
accessing CICSHAJ1.
3. Define the cross-domain services (CDRSC) for accessing CICSHTH1 in a
member of the SYS1.VTAMLST library, or your own user.VTAMLST library, for
MVSJ.
4. Issue a VARY ACT command on MVSJ to activate the CDRSC definition for
accessing CICSHTH1.
Here is an example:
In this way, CICS can use an LU alias for autoinstalled terminals and workstations
and ensure unique names in a CICSplex comprising terminal-owning and
application-owning regions. SNA generates the LUALIAS names dynamically.
CICS supports both the predefined and dynamic forms of the SNA alias function
only where shown in the following table:
CICS-to-CICS APPC APPC devices (LU definitions)
connections (APPL
definitions) Terminals
v The LU alias is used as the NETNAME for terminals and workstations that log
on to a CICS region.
v CICS does not support LU alias for synclevel 2 connections (LUTYPE 6.1 and
6.2), ignores any LU alias for these LU types, and continues to use the network
name defined in the SNA APPL statement.
Use dynamic LU alias when you are using autoinstalled cross-network terminals or
duplicate network names. For example, in the following circumstances:
v Your cross-network terminals and workstations that log on to CICS are mainly
autoinstalled.
The CICS region receives logons from terminals and synclevel 1 connections
(both parallel and single sessions) and those logons (or binds) are from
cross-network resources that might have duplicate network names.
However, be aware that synclevel 1 connections can become synclevel 2 in the
future. For example, if you have a connection between a TXSeries and CICS TS,
the connection is synclevel 1; but, if you change to using TXSeries with a PPC
gateway, synclevel 2 is used. CICS does not support dynamic LU aliases for
synclevel 2 APPC connections.
v An AOR receives shipped terminals or connections with duplicate network
names from different TORs.
You can also use a predefined LU alias for CICS regions that communicate using
CICS intersystem communication. You enable predefined alias support by
specifying LUALIAS=alias on any cross-domain resource (CDRSC) that requires a
specific alias. A terminal or APPC synclevel 1 workstation that is defined to CICS
on an explicit resource definition (that is, it is not autoinstalled) and is in a
different network, requires a CDRSC definition with a specific alias on the
LUALIAS parameter. This alias overrides the dynamic generation of an alias where
LUAPFX is specified on the CICS region's APPL statement. To ensure that CICS
can match the SNA LU alias with the installed terminal definition, the LUALIAS
value must match the NETNAME specified on the CICS TERMINAL resource
definition.
Use predefined LU alias where you do not have dynamic LU alias enabled or
where you want to override dynamic LU aliases.
v Dynamic LU alias is in operation in a CICS region and your terminals or
workstations are explicitly defined on CICS terminal resource definitions with
explicit terminal identifiers. In this case, you use predefined LU aliases to
override the generation of dynamic LU aliases, which CICS fails to match with
any installed resource definition.
v Dynamic LU alias is not in operation in a CICS region, to avoid any conflict
with duplicate network names.
It is important that all CICS regions across all connected networks use unique
APPLIDs. This requirement is true whether or not dynamic LUALIASs are used; it
is more important with dynamic LUALIASs.
To ensure that all SNA resources in a CICSplex have unique network names, use
the LUAPFX prefix:
v Specify LUAPFX on terminal-owning regions (TORs) only.
v Use the same LUAPFX value for all the CICS TORs in the same MVS image
(that is, for all the TORs that are connected to the same SNA), but ensure the
LUAPFX is different in each MVS image in the sysplex..
If the LUAPFX values are not the same throughout an MVS image, you risk one
resource having two different network names in the CICS regions in that image.
If the LUAPFX values are not unique to each MVS image in the sysplex, you
risk two resources attempting to install in a TOR with the same dynamic
LUALIAS, or having two resources with the same network name in an AOR.
To ensure the uniqueness of the LU prefix in each MVS, use model APPL
definitions, and in these use an MVS system symbol (&SYSCLONE) as
suggested in the z/OS Communications Server: SNA Resource Definition Reference. If
you use SNA generic resources and your CICS TORs are spread across different
MVS images, be aware that if a resource with a dynamically allocated LU alias
logs off and then logs on again, and SNA switches the resource to an SNA in
another MVS image, a different LUALIAS is assigned because of the different
LUAPFX value.
v Avoid using an LUAPFX value that corresponds to the first two characters of
CICS RDO-defined terminal names or connection names installed in the
CICSplex.
Using LU aliases
Factors to consider when you are planning to use SNA LU aliases with CDRSC
resources.
Predictable TERMIDs
If your autoinstalled terminal resources must have a predictable and
reproducible TERMID for such things as temporary storage queue names and
START requests, you can modify your autoinstall user-replaceable module
(URM) to select a reproducible TERMID from the network qualified name,
NQNAME, supplied in the CINIT or the BIND.
The sample autoinstall URM contains an example of such code
(commented-out), which extracts the network qualified name from the CINIT
and BIND. The example illustrates how to create a TERMID from the last
nonblank character of the NETID and the last 3 nonblank characters of the real
network name (NETNAME).
MVS workload management
If your MVS workload policies specify LU name classifications, remove the LU
name for any cross-network resources that are autoinstalled by CICS.
Recovery and persistent sessions support
Resources for which CICS uses any SNA LU alias, predefined or dynamic, and
which come from a different network are not cataloged by a CICS region that
where:
name A 1-character to 8-character unique name.
acbname
The node name of this CMAS. This name must be unique in the domain. If
you omit this parameter, the name of the SNA APPL statement is used.
vpacing
The maximum number of normal-flow requests that another logical unit
can send on an intersystem session before waiting to receive a pacing
response. Start with a value of five.
You require the same type of definition for each CMAS you use.
To establish a CDRSC definition, you must either create a new member or access
an existing member in the SYS1.VTAMLST library. In the new or existing member,
specify the following CDRSC statement for each CMAS that you want to
communicate with:
VBUILD TYPE=CDRSC
name CDRSC CDRM=cdrm
For example, to allow the CMAS on SYSA to communicate with the CMASs on
SYSB and SYSC, you might create the member CDRCMS1 in the SYS1.VTAMLST
library, that contains the CDRSC statements:
VBUILD TYPE=CDRSC
CMS2 CDRSC CDRM=VTAMB
CMS3 CDRSC CDRM=VTAMC
where VTAMB and VTAMC are the cross-domain resource manager names that are
assigned to SYSB and SYSC respectively.
You also require the same types of definitions for the CMASs on SYSB and SYSC.
That is, for the CMAS on SYSB, you might create a member CDRCMS2, that
contains the CDRSC statements:
VBUILD TYPE=CDRSC
CMS1 CDRSC CDRM=VTAMA
CMS3 CDRSC CDRM=VTAMC
To make these updates, add the new member names to the end of the
configuration list in the appropriate ATCCONxx member of the SYS1.VTAMLST
library. To find the suffix of the ATCCONxx member:
v Get the suffix of the COMMNDxx member from the CMD= parameter in the
IEASYSxx member in SYS1.PARMLIB.
v Get the suffix of the ATCSTRxx member from the LIST= parameter on the
command that is used to start SNA in the COMMNDxx member in
SYS1.PARMLIB. If you do not start SNA from the COMMNDxx member, get the
suffix from the LIST= parameter of the command that you use to start SNA.
v Get the suffix of the ATCCONxx member from the CONFIG= parameter in the
ATCSTRxx member in SYS1.VTAMLST.
As an illustration, the examples shown in Steps 1 and 2 assume that the members
APCMAS1 and CDRCMS1 exist. To add these members to the end of the
configuration list in ATCCONxx, specify:
APCMAS1, x
CDRCMS1
To ensure that the major node has been activated, issue this command:
D NET,ID=name
For example, to activate the member APCMAS1 and then ensure that it has been
activated, issue these commands:
VARY NET,INACT,ID=APCMAS1
VARY NET,ACT,ID=APCMAS1
D NET,ID=APCMAS1
Perform the preceding steps for each CMAS you are using.
The MVS link pack area has both pageable and fixed parts. Although you can
install CICS modules into the fixed parts, use the pageable areas for performance
reasons.
If you install a module into the LPA or ELPA, that module cannot be retrieved
from the MVS link pack area until you re-IPL your MVS with CLPA specified. To
use the new module and avoid an IPL, you can use the MVS dynamic LPA in one
of the following ways:
v With the SETPROG LPA command
v With an LPA statement in a PROGxx member of PARMLIB, which specifies the
SET PROG=xx command
| Note: You should not use dynamic LPA with the 8 CICS modules that must be
| installed in the MVS link pack area, except for DFH99SVC and except for when
| you use the DFHCSVCU utility program to dynamically update the CICS SVC. For
| details about the DFHCSVCU utility program, see “Running the DFHCSVCU job”
| on page 59.
Load modules used from the LPA might be at a lower service level than the rest of
your CICS region in any of the following circumstances:
v You are running CICS from libraries that belong to a target zone currently at a
higher service level than the LPA zone.
v You have applied service to the LPA zone since the last IPL of MVS.
v You are not using the MLPA to replace service-updated load modules, but have
applied service to the LPA zone since the last IPL of MVS for which CLPA
(create link pack area) was specified.
Thus, if you have applied service to a load module in your CICS libraries, you
must also apply the service to the LPA version of the module, if one exists, so that
the MVS link pack area always contains tested load modules.
Use the SMP/E RESTORE function to remove the USERMOD before the LPA zone
is updated or copied. Then apply the USERMOD again.
If you have used a copy of the CICS-supplied USERMODs to install modules into
the MVS link pack area, and the original USERMOD is serviced, you can reflect the
changes in your version of the USERMOD.
Although it is possible for CICS PTFs to make changes to the CICS modules which
must reside in the MVS link pack area, in reality it is a fairly rare event. The
modules have to be downwardly compatible with lower releases, and applies to
any code changes made to them by PTFs, as well as to the code at base level.
1. The module can be used only from the MVS link pack area and you must
install it there before CICS can be started.
2. You must always install the latest service level of the modules DFHCSVC,
DFHIRP (if required), and DFHSSEN.
3. The version of this module that is supplied with the current release is
downward-compatible with earlier releases of CICS. It works correctly with
CICS regions running earlier releases. Therefore, if you are running different
releases of CICS on the same MVS image, use the latest version of this module.
4. You must define the DFHCSVC module to MVS as a Type 3 SVC. The default
SVC number is 216. If you use a nondefault SVC number, you must define it to
CICS on the CICSSVC system initialization parameter.
Do not use the link editor to install the CICS SVC module into a library in the
MVS link pack area. To copy or move the module from the hlq.SDFHAUTH
library to the nominated library in the MVS link pack area, use either a suitable
copy utility program, such as IEBCOPY, or an SMP/E USERMOD with ++MOVE
statements.
5. If you are running earlier releases of CICS with the latest version, ensure that
the latest version of the DFHDSPEX module is installed in the MVS link pack
area. The DFHDSPEX module must be in the MVS link pack area for integrity
reasons, but the postexit routine, DFHDSAUT, can be either in the MVS link
pack area or in the CICS address space. This choice enables you to use different
levels of the DFHDSAUT module in different CICS regions running in the same
MVS image, because the DFHDSAUT module might not be compatible between
CICS versions.
Chapter 21. Installing CICS modules in the MVS link pack area 149
6. To communicate by MRO, all CICS regions in the same MVS image must use
the latest level of the modules DFHCSVC, DFHIRP, and DFHSSEN in the MVS
link pack area.
If a region detects that DFHIRP is at a lower level when it attempts to open
interregion communication, it issues message DFHIR3799 and interregion
communication fails to open.
7. To use console message-handling, these modules must be either in the MVS
link pack area or in an APF-authorized library in the MVS linklist.
If an LPA module is only ever referred to by name, then refreshing it in the LPA is
valid. That is, if each time it is used, a new reference to it is obtained by using an
MVS LOAD macro. However, most references to LPA modules do not work this
way. The address of an LPA module could be saved into a control block after the
initial LOAD of the module. The implication is that this address remains
unchanged without a CLPA IPL. If dynamic LPA is used to pick up a change to an
LPA module, then the address saved in the control block is no longer valid. Of the
8 CICS modules which must be installed in the LPA, only DFH99SVC is eligible to
be refreshed in this way.
CICS modules
The following CICS modules can be installed in the MVS link pack area:
v Modules that can reside above 16 MB (for example, the CICS message table,
DFHMGT). You can also install these modules in the extended link pack area
(ELPA).
v Modules that are optionally installed in the MVS link pack area; that is, a
module that is not required in the MVS link pack area can be used only by the
release of CICS to which it relates.
v Modules that are eligible to be used from the MVS link pack area are listed in
the CICS-supplied USERMODs. The USERMOD member for base CICS modules
is DFH$UMOD, which is in the hlq.SDFHSAMP library. Refer to DFH$UMOD
for a list of these modules, and to the details in “LPA-required and LPA-eligible
modules” on page 151, to help you select the CICS modules that you want to
install in the MVS link pack area.
You can use user application programs from the MVS link pack area if they are
read-only and meet one of the following criteria:
v They are written in COBOL, do not overwrite WORKING STORAGE, and are
compiled using VS COBOL II, or a later version. The CICS translator generates a
CBL statement with the required compiler options.
v They are written in PL/I (so they do not overwrite STATIC storage) and are
compiled using one of the versions of PL/I for z/OS listed in High-level
language support. The CICS translator inserts the required REENTRANT option
into the PROCEDURE statement.
v They are written in C/370, compiled with the RENT option, and link-edited
with the RENT option.
A read-only module that can be above 16 MB is also eligible for the ELPA.
To find the size of each module, check the load library directory information.
LPA-required modules
All LPA-required modules are loaded into the part of the MVS link pack area that
is above 16 MB (ELPA).
Table 11. LPA-required modules, supplied in hlq.SDFHLPA
Name Description Notes
Notes:
1. You must always install the latest service level of the CICS SVC module,
DFHCSVC. Install the DFHCSVC module into the MVS link pack area before
you run the CICS installation verification procedures.
You must define the DFHCSVC module in an IEASVCxx member of the
SYS1.PARMLIB library with SVCPARM statements. You select the required
Chapter 21. Installing CICS modules in the MVS link pack area 151
IEASVCxx member by coding the SVC parameter (SVC=xx) in a
SYS1.PARMLIB member (IEASYSyy), which you use to IPL your MVS.
You can run several CICS regions, at different release levels, in the same MVS
image. Each region uses its own version of the DFHCSVC module. If some
regions use MRO, all regions that use MRO must use the latest DFHCSVC
module and the latest DFHIRP module.
If some regions use the DFHCSVC module, and you allocate to the SVC a
number different from the SVC number used by the regions, you must generate
a new version of the DFHCRC program on the regions.
For more information about the DFHCSVC module, see .
2. All LPA-required modules are compatible with earlier releases of CICS. If you
are running earlier releases of CICS, you must ensure that the correct version is
installed in the LPA. The module must be in the LPA for integrity reasons, but
the post exit routine itself can stay in the LPA or in the CICS address space.
You can then use different versions of the DFHDSAUT module in different
CICS regions running in the same MVS image, because the DFHDSAUT
module might not be compatible with all releases.
3. The DFHIRP module must be in the MVS link pack area only if you are using
MRO, CICS shared database, or the console message-handling facility. If you
install the DFHIRP module in the MVS link pack area, you must also install
DFHSSEN if you are using the console message-handling facility.
You must always install the latest service level of the DFHIRP (if required) and
DFHSSEN.
If you are running CICS with MRO at different release levels, all regions in the
same MVS image must use the latest DFHIRP module.
4. To use the console message formatting facility of the MVS subsystem interface,
you must install the modules DFHSSGC and DFHSSWT either in the MVS link
pack area or in an APF-authorized library in the MVS link list. These modules
are used by the subsystem interface and not directly by CICS. Therefore, the
use of these modules from the MVS link pack area is not controlled by CICS
parameters or options.
For information about enabling the console message-formatting facility, and
about the other modules it requires, see “Modules required to use the console
message-handling facilities” on page 125.
LPA-eligible modules
Table 12 on page 153 shows the LPA-eligible modules that require associated
system initialization parameters, or that are affected by an option in the resource
definition of the program.
v If an LPA-eligible module requires an associated system initialization parameter,
you must specify this parameter to use the function associated with that module.
For more information about the system initialization parameters, see System
initialization parameter descriptions and summary in Reference -> System
definition -> System definition.
v Some LPA-eligible modules are affected by the USELPACOPY option of the
resource definition of the program. If USELPACOPY=NO, you do not need to
include that module in the MVS link pack area. For more information about the
USELPACOPY option, see PROGRAM attributes in Reference -> System
definition.
DFHCMAC ME domain - CICS messages and codes transaction (CMAC) 1 on page 158
DFHCRT Transaction routing relay program for APPC devices 1 on page 158
Chapter 21. Installing CICS modules in the MVS link pack area 153
Table 12. LPA-eligible modules that require an associated parameter or option (continued)
Name Description System initialization
parameter or note
DFHFCD2 File control shared data tables record request handler FCT=YES/xx
DFHMQBAS BMS program that handles the base panel 1 on page 158
DFHMQCON Back-end module that issues a connection request to the Websphere 1 on page 158
MQ subsystem
DFHMQCTL First level transaction for operations. This program handles text 1 on page 158
mode operation only
DFHMQDCI Data conversion exit for inbound data to the MQ-CICS bridge, for 1 on page 158
use in the CICS environment
DFHMQDCO Data conversion exit for outbound data from the MQ-CICS bridge 1 on page 158
DFHMQDSC Back-end module that issues a disconnect request to the Websphere 1 on page 158
MQ subsystem
Chapter 21. Installing CICS modules in the MVS link pack area 155
Table 12. LPA-eligible modules that require an associated parameter or option (continued)
Name Description System initialization
parameter or note
DFHMQPOP BMS program that handles all pull-down maps 1 on page 158
DFHMQPUL BMS program which handles all pull-down maps 1 on page 158
DFHMQRET BMS program that handles the final screen, including scrolling 1 on page 158
DFHMQSSQ Back-end module to service start and stop CKTI requests 1 on page 158
DFHMQTRU CICS task-related user exit program for Websphere MQ 1 on page 158
Chapter 21. Installing CICS modules in the MVS link pack area 157
Table 12. LPA-eligible modules that require an associated parameter or option (continued)
Name Description System initialization
parameter or note
Notes:
1. The program is used from the MVS link pack area only if you set the
USELPACOPY option of its program resource definition to YES.
2. All LPA-required modules are compatible with earlier releases of CICS. If you
are running earlier releases of CICS, you must ensure that the correct version is
installed in the LPA. The module must be in the LPA for integrity reasons, but
the post exit routine itself can stay in the LPA or in the CICS address space.
You can then use different versions of the DFHDSAUT module in different
CICS regions running in the same MVS image, because the DFHDSAUT
module might not be compatible with all releases.
3. You can set the system tracing status by coding appropriate system
initialization parameters, and you can also set it dynamically by using the
CETR transaction.
You can use the following system initialization parameters:
AUXTR
Activate auxiliary trace.
AUXTRSW
Define the auxiliary switch status.
GTFTR
Enable CICS to use MVS GTF tracing.
INTTR
Activate CICS internal tracing.
TRTABSZ
Specify the size of the internal trace table.
USERTR
Set the master user trace flag on or off.
For information about using CICS trace and controlling the tracing status with
the CETR transaction, see Setting trace destinations and tracing status in
Troubleshooting.
Space requirements for CICS modules in the MVS link pack area
Allow enough space in the MVS link pack area for you to install those CICS
modules that you intend using from there.
Remember also to allow space for any of your user application programs that you
intend using from the MVS link pack area. The total space required depends on
how the operating system packages the modules into the MVS link pack area.
When you have determined the space you require in the MVS link pack area,
create a library with enough space and define it to your MVS. See “Defining the
CICS LPA library to your MVS” on page 160 for more information.
Chapter 21. Installing CICS modules in the MVS link pack area 159
Defining the CICS LPA library to your MVS
CICS supplies the library hlq.SDFHLPA. This library contains the modules that
must be in the LPA. You can also use this library to install other CICS modules or
application programs that you want to use from the LPA.
You can give the hlq.SDFHLPA library your own index, but, if you do, you must
specify the new index on the LINDEX parameter of the DFHISTAR job.
You can install into the hlq.SDFHLPA library the CICS modules to be used from the
MVS link pack area. See “Installing CICS modules in the LPA.”
In the context of the LPA, install means to move or copy a module into a suitable
LPA library by using SMP/E, or by using a copying method that re-blocks the
copied modules when the target data set has a smaller block size than the data set
you copy from. For example, you can use the COPYMOD function of the IEBCOPY
program.
Do not relink-edit the modules to put them into the LPA library. CICS modules are
supplied with the necessary attributes such that MVS loads them automatically
above the 16 MB line into the ELPA.
The following steps summarize the procedure to install modules in the CICS LPA
library, and to ensure that SMP/E can continue to service them. Further
information explains these steps in more detail.
1. Select those modules that you want to use from the MVS link pack area and
specify them in the SMP/E USERMOD to be used to install the modules in the
MVS link pack area.
For a list of CICS-supplied modules eligible for the MVS link pack area, see the
CICS-supplied sample DFH$UMOD.
To install modules in the MVS link pack area, use one of the following
methods:
v Use an SMP/E USERMOD that contains ++MOVE statements for only the
modules to be installed in the MVS link pack area.
CICS supplies an SMP/E USERMOD called DFHUMOD in member
DFH$UMOD in the hlq.SDFHSAMP library. This USERMOD contains ++MOVE
statements for all CICS modules, in the hlq.SDFHAUTH and hlq.SDFHLOAD
libraries, that are eligible for the MVS link pack area. The USERMOD also
indicates whether each module is LPA- or ELPA-eligible. You can choose
Controlling the use of modules from the MVS link pack area
Using customizable options, CICS allows you to control which of the eligible
modules are executed from the MVS link pack area.
The methods for controlling the use of modules from the MVS link pack area do
not apply to the modules DFHCSVC, DFHDSPEX, and DFHIRP. These modules are
used only from the MVS link pack area.
That is, such a module is used from the first of the following locations where it is
found:
Chapter 21. Installing CICS modules in the MVS link pack area 161
1. STEPLIB concatenation
2. MVS link pack area
3. MVS LNKLST
To use any of the CICS modules installed in the MVS link pack area from the
hlq.SDFHAUTH library, you must remove any version of the module from the
hlq.SDFHAUTH library or any other library in the STEPLIB concatenation.
You can prevent CICS using modules installed in the MVS link pack area from the
hlq.SDFHAUTH library by installing versions of those modules in a library in the
STEPLIB concatenation.
CICS then uses the versions of the modules from the STEPLIB concatenation into
the CICS address space, rather than any versions that might be in the MVS link
pack area.
The hlq.SDFHLOAD library is used for non-nucleus CICS modules, and some CICS
nucleus modules. You can also use the library for your own user application
programs.
Specifying USELPACOPY(YES)
For every non-nucleus CICS module or user application program that you have
moved to the MVS link pack area, that is, have removed from the DFHRPL
concatenation, ensure that you have specified USELPACOPY(YES) on the
associated PROGRAM resource definition. Otherwise, CICS cannot find the module
Chapter 21. Installing CICS modules in the MVS link pack area 163
and might fail to start up successfully. See “Sample DFHCSDUP job to specify
USELPACOPY(YES)” on page 166 for a sample job to specify USELPACOPY(YES).
For further information about these options, see “Using modules from DFHRPL”
on page 164
In all cases, you must install the new versions of the modules into the
hlq.SDFHLOAD library or another library in the DFHRPL concatenation.
If you are verifying many CICS LPA-eligible modules, you might choose to add the
hlq.SDFHLPA library to the DFHRPL concatenation, allowing you to check that the
modules you have installed in the MVS link pack area are being loaded from there.
After you have installed and verified the use of modules from the MVS link pack
area, remove the versions of the modules from the DFHRPL concatenation of your
CICS startup job.
You can find out whether CICS is loading modules from the MVS link pack area or
the DFHRPL concatenation by reviewing the index of a system dump for the CICS
region started with the system initialization parameter LPA=YES. Modules loaded
from the MVS link pack area have the dump option LD=3.
If you see the module-not-found warning message, check that you have specified
USELPACOPY(YES) on the associated PROGRAM resource definition, if applicable.
For further information about using modules loaded in the MVS link pack area
from the hlq.SDFHLOAD library, see “Modules in the MVS link pack area from
hlq.SDFHLOAD” on page 162.
CICS uses console routing code 11 for this particular message, which allows you to
control the output of this message. For example, you can perform these actions:
1. Exclude, as required, routing code 11 from specific MVS console definitions in
the CONSOLxx member of SYS1.PARMLIB.
2. Use the MVS VARY command to prevent this message from appearing on
specified consoles by omitting route code 11 from a VARY command that
defines which routing codes go to specified devices:
VARY devnum,CONSOLE,ROUT=(rtcode,rtcode,.,.,.)
Alternatively, you can remove route code 11 from those already defined by
using the following VARY command:
VARY devnum,CONSOLE,DROUT=(11)
Chapter 21. Installing CICS modules in the MVS link pack area 165
3. Use the MVS message processing facility (MPF) to inhibit the message. To use
MPF, code an entry specifying the CICS message number in the MPFLSTxx
member of SYS1.PARMLIB.
CICS assumes that the following PL/I modules are LPA eligible and issues
message DFHLD0109I if it fails to find them there:
v IBMBPSLA
v IBMBPSMA
Every CICSPlex SM module installed in the LPA can be used only by the release of
CICSPlex SM to which it relates.
These USERMODs contain ++MOVE statements for each module that is eligible for
the extended link pack area (ELPA). A read-only module that can reside above 16
MB is eligible for the ELPA.
Space requirements
Allow enough space in the link pack area for the installation of the selected
CICSPlex SM modules.
The total space depends on how the modules are packaged into the link pack area
by the operating system.
If you specify LPA=YES but have not moved the modules to the LPA, message
DFHLD0109I is issued for each module. If you specify LPA=YES and have moved
these modules to the LPA, you can use the PRVMOD system initialization
parameter to control which modules are to be used from the LPA. See “Using
modules from DFHRPL” on page 164 for more information.
The MVS link pack area has both pageable and fixed areas. Although you can
install CICSPlex SM modules into the fixed areas, for performance reasons, use the
pageable areas.
Modules to be loaded into the MVS pageable link pack area (PLPA) must have
been link-edited with the RENT attribute. The library that contains these modules
must be named in an LPALSTxx member of the SYS1.PARMLIB library.
To install modules in the CICSPlex SM LPA library, and to ensure that SMP/E can
continue to service them, complete the following steps for one or both of the
CICSPlex SM-supplied USERMODs:
1. Receive the USERMOD into the CICSPlex SM global zone and apply it to the
CICSPlex SM target zone.
2. Define the SYS1.CICSTS51.CPSM.SEYULPA library to your MVS.
Receive the USERMOD into the CICSPlex SM global zone and apply it to the
CICSPlex SM target zone. This causes SMP/E to move those load modules you
have specified from the named CICSPlex SM target library (either
CICSTS51.CPSM.SEYUAUTH or CICSTS51.CPSM.SEYULOAD) into the
SYS1.CICSTS51.CPSM.SEYULPA library.
When the USERMOD is applied, the corresponding LMOD entries in the target
zone SMP CSI are updated. Either or both USERMODs can be applied depending
on your enterprise's requirements.
Do not accept the USERMOD into the distribution zone, and, for the time being,
do not apply it to any other target zone.
Use the USERMOD EYU$UM01, supplied in the SEYUSAMP library, to move the
LPA-eligible modules into the SEYULPA library. These modules are listed in
“CICSPlex SM modules eligible for the MVS link pack area.”
The following table lists the CICSPlex SM modules that are eligible for inclusion in
the LPA. The versions of these modules with the prefixes CJA, CJB, CJC, and CJD,
in place of the prefix EYU, are also eligible for inclusion in the LPA. For example,
modules CJA9BA01, CJB9BA01, CJC9BA01, and CJD9BA01, as well as EYU9BA01,
are eligible. The prefix relates to the CICS release specific agent code of the
underlying module.
You must allow enough space in the link pack area for the installation of the
selected CICSPlex SM modules. The total space you require depends on how the
modules are packaged into the link pack area by the operating system and a local
MAS requires approximately 2034KB.
All CICSPlex SM modules are installed in the LOAD library and loaded in the
ELPA.
Table 14. CICSPlex SM modules eligible for the LPA
Module Description
EYU9BA01 BAS MAS object
EYU9CM01 MAS communications
EYU9MN01 MAS monitor
EYU9NA01 MAS agents
EYU9PS01 MAS real-time analysis
EYU9TS01 MAS topology
EYU9WM01 MAS workload management
EYU9XC01 MAS cache
EYU9XD01 MAS data repository
EYU9XL01 MAS kernel linkage
Chapter 22. Installing CICSPlex SM modules in the MVS link pack area 169
Table 14. CICSPlex SM modules eligible for the LPA (continued)
Module Description
EYU9XM01 MAS message format
EYU9XQ01 MAS queue manager
EYU9XS01 MAS common services
EYU9XZ01 MAS trace
The formatting routine for use under IPCS has the release identifier as part of its
name; that is, DFHPD680. You define this formatting routine to IPCS when
formatting system dumps. The CICS formatting routine is release-specific, so, if
you run more than one release of CICS, ensure that you use the correct version for
the system dump you are formatting.
The IPCS default table, BLSCECT, normally in the SYS1.PARMLIB library, has the
following entry for CICS:
IMBED MEMBER(DFHIPCSP) ENVIRONMENT(ALL) /* CICS */
Ensure that your IPCS job can find the CICS-supplied DFHIPCSP module. The
DFHIPCSP module is in the hlq.SDFHPARM library. You can either copy the
DFHIPCSP module into SYS1.PARMLIB, so that it is in the same default library as
BLSCECT, or provide an IPCSPARM DD statement to specify the library containing
the IPCS control tables:
//IPCSPARM DD DSN=SYS1.PARMLIB,DISP=SHR For BLSCECT
// DD DSN=CICSTS51.CICS.SDFHPARM,DISP=SHR For DFHIPCSP
The following code example shows the release-specific entries that are specified in
DFHIPCSP.
For information about using IPCS to format CICS system dumps, see the CICS
Operations and Utilities Guide.
Implementing changes
Re-IPL MVS to bring the changes that are described here into effect before you
attempt to run the IVPs.
You can use IPCS to format and analyze SDUMPs produced by CICSPlex SM or
stand-alone dumps obtained while CICSPlex SM was active in the system being
dumped. You can either view the dumps at your terminal or print them.
CICSPlex SM provides a dump formatting routine that you can use with the
VERBEXIT subcommand to format CMAS, MAS, WUI server, or SMSS dumps.
v For more information about IPCS, see the z/OS MVS Interactive Problem Control
System IPCS) User's Guide.
v For information about using IPCS to format CICSPlex SM system dumps, sees
the CICS Operations and Utilities Guide.
v For information about displaying and formatting dumps with IPCS, see the
CICSPlex System Manager Problem Determination guide.
Updating BLSCECT
IPCS provides an exit control table, BLSCECT, which is normally in
SYS1.PARMLIB. This table contains imbed statements that you can update to
enable other products to supply exit control information.
/*****************************************************************/
/* Program Properties table addition */
/* for the CICS program, DFHSIP */
/* */
/* The following defaults apply to this CICS entry: */
/* */
/* No affinity to a particular processor (AFF(NONE)) */
/* Can be canceled (CANCEL) */
/* Requires data set integrity (DSI) */
/* Not a privileged job (NOPRIV) */
/* Password protection is required (PASS) */
/* Not a system task (NOSYST) */
/* Protection key 8 (KEY(8)) */
PPT PGMNAME(DFHSIP) /* Add program name DFHSIP to the PPT*/
NOSWAP /* Non-swappable */
NOPREF /* No preferred storage required */
/* */
For information about defining options in the PPT, see the z/OS MVS Initialization
and Tuning Guide.
If your installation has an MVS program properties table (PPT) entry for the
DFHSIP program, ensure that the NOPASS option is not set in the PPT because this
option bypasses password and RACF authorization checking.
For information about defining PPT entries for CICS in the SCHEDxx member of
the SYS1.PARMLIB library, see the z/OS MVS Initialization and Tuning Reference
manual.
If you specify NOPASS on the MVS PPT entry in the SCHEDxx member of
SYS1.PARMLIB, PTNPAS is set to ON in the PPT internal control block.
To use the storage protection facility of CICS, you must specify the system
initialization parameter STGPROT=YES and must have the required hardware and
For information about z/OS workload management, see z/OS MVS Planning
Workload Management.
The following topics discuss how you can implement workload management on
the z/OS images that the CICS workload is to run on, and how to ensure that
CICS performance parameters correspond to the policies defined for z/OS
workload management.
In general, define CICS performance objectives to the MVS workload manager first
and observe the effect on CICS performance. When the MVS workload manager
definitions are working correctly, then consider tuning the CICS parameters to
further enhance CICS performance. However, use CICS performance parameters as
little as possible.
To use the MVS automatic restart manager facility, follow these steps:
1. Implement automatic restart management on the MVS images on which the
CICS workload is to run.
2. Ensure that CICS startup JCL used to restart CICS regions is suitable for MVS
automatic restart management.
3. Specify appropriate CICS START options.
4. Specify appropriate MVS workload policies.
Implementing MVS automatic restart management for CICS generally involves the
following steps:
v Ensure that the MVS images available for automatic restarts have access to the
databases, logs, and program libraries required for the workload.
v Identify those CICS regions for which you want to use automatic restart
management.
v Define restart processes for the candidate CICS regions.
v Define ARM policies for the candidate CICS regions.
For information about MVS automatic restart management, see Automatic restart
management in Administering and z/OS MVS Setting Up a Sysplex.
IRC exploits the cross-system coupling facility (XCF) of MVS and removes the
need for z/OS Communications Server to communicate between MVS images in
the same sysplex.
In a sysplex, you must install DFHIRP from the highest release of CICS running in
that MVS image.
Sysplex overview
To use XCF to communicate in a sysplex, you specify the XCF group name to CICS
using the SIT XCFGROUP parameter. The default name is DFHIR000. If you
specify a different group name, only members that specify that same group name
can communicate using XCF. For more information about XCFGROUP, see
XCFGROUP system initialization parameter in Reference -> System definition.
When you format the primary and alternate couple data sets used by the XCF
component of MVS, make sure that the following conditions are met:
v The value specified for the MAXMEMBER parameter must be large enough to
handle the number of CICS regions and users of the EXCI in the CICS XCF
group.
In a single sysplex, a theoretical maximum number of 1023 CICS regions can
participate in XCF/MRO using the same XCF group. However, the maximum
size of the XCF group is reduced if you set the MVS MAXMEMBER parameter,
used to define XCF couple data sets, to a lower limit. When you calculate the
maximum number of members in the CICS XCF group, allow one member for
each of these items:
– Each CICS region to run on an MVS image in the sysplex.
– Each pipe that is allocated by a user of the external CICS interface (EXCI). For
information about EXCI users and pipes, see The EXCI CALL interface in
Developing applications.
To list the members in the CICS XCF group, you can use the MVS DISPLAY
command. The name of the CICS group is always DFHIR000, so you can use
this MVS command:
DISPLAY XCF,GROUP,DFHIR000,ALL
v The value specified for the MAXGROUP parameter must be large enough for
the CICS XCF group to be established.
You must also define to PR/SM the authorization for each LPAR to cause reset or
deactivation of another LPAR.
The SYMREC authorization exit, ASREXIT, must be in effect to allow CICS to use
the SYMREC macro call; otherwise, the call fails with return code 12, reason code
3868 (X'F1C').
When SYMREC is called by CICS, the ASREXIT routine issues a return code that
permits the SYMREC to be successfully written.
If you choose this method, code your ASREXIT routine to allow for these
exceptions.
See the z/OS DFSMSdfp Storage Administration Reference manual for information
about calculating the size you require for the lock structure.
You define the lock structure in the CFRM policy with the IXCMIAPU utility.
See the z/OS DFSMSdfp Storage Administration Reference manual for information
about calculating the amount of space you require for the cache structures. If you
have previously used data sets in LSR mode, the total amount of coupling facility
space allocated to cache structures will not be less than the amount of storage you
were using for LSR pools, including any hiperspace buffers.
You define cache structures in the CFRM policy with the IXCMIAPU utility.
You define cache sets with the ISMF control data set (CDS) application. A cache set
maps onto one or more cache structures. If you specify more than one cache set,
the data sets can be rebound to another cache structure in the set if a cache
structure fails.
See the z/OS DFSMSdfp Storage Administration Reference manual for more
information about cache sets.
Before you can use VSAM RLS, you require one or more storage classes that
specify a non-blank cache set name. Use the ISMF storage class application to
specify a cache set name when you define or alter a storage class, together with
weighting parameters for tuning, such as CF DIRECT WEIGHT and CF
SEQUENTIAL WEIGHT. See the z/OS DFSMSdfp Storage Administration Reference
manual for more information about defining SMS storage classes.
Before you can use a data set in RLS access mode, you must ensure that it is
eligible.
Two active, and at least one spare, sharing control data sets must be available at all
times.
The size of these data sets depends on the number of MVS images in the sysplex
and on the number of files that are expected to be open concurrently. The z/OS
DFSMSdfp Storage Administration Reference manual gives information about
calculating the amount of space that is required for the sharing control data sets.
Sharing control data sets are VSAM linear data sets that must be on volumes that
have global connectivity. The data sets can have multiple extents, but only on the
same volume. You define them using standard techniques for defining data sets.
The names must have SYS1.DFPSHCDS as the first and second qualifiers. See the
z/OS DFSMSdfp Storage Administration Reference manual for other rules relating to
the definition of sharing control data sets.
You must not issue RESERVEs on any volumes that contain sharing control data
sets. Convert any such RESERVEs to enqueues.
You can check that the data sets are available to the sysplex with the MVS
DISPLAY SMS command, on any MVS image:
D SMS,SHCDS
This command shows the names of the two active data sets and the spare data set
as shown in the following example:
The DISPLAY command shows only the third and fourth qualifiers of the sharing
control data set names; the first and second qualifiers are always SYS1.DFPSHCDS.
The first time an SMSVSAM server is started in the sysplex, you vary online the
sharing control data sets with this command for the active data sets:
V SMS,SHCDS,NEW
Use this command for the spare data set or data sets.
V SMS,SHCDS,NEWSPARE
for the spare data set (or data sets). The server cannot start properly if you do not
issue these commands.
You can restrict user access to the access method services SHCDS subcommands,
AMS SHCDS LIST and REMOVE. The z/OS DFSMS: Access Method Services for ICF
manual gives information about using these commands.
See the z/OS DFSMSdfp Storage Administration Reference manual for information
about these parameters.
CICS issues other messages (of the form DFHnnnn) with either no route code or
route codes other than 2 and 11.
Using services provided by the MVS system logger, the CICS log manager
supports these logs:
v The CICS system log, which is used for these purposes:
– Dynamic transaction backout
– Warm and emergency restarts
– Cold starts, but only if the log contains information required for
resynchronizing indoubt units of work
v Forward recovery logs, autojournals, and user journals.
The procedure includes tasks for MVS system programmers, CICS system
programmers, and security administrators, and close cooperation between all
groups is required.
v Plan the logger environment.
Consider the possible storage options, and choose which of the three available
hardware options to use:
– Nonvolatile coupling facility, where log stream data is duplexed in the MVS
logger data space. Nonvolatile storage involves the use of battery backup or
an uninterruptible power supply (UPS):
- When using a UPS, you use a hardware console command to update
coupling facility status.
- When using battery backup, batteries must be online and charged.
– Volatile coupling facility, where log stream data is duplexed to a staging data
set.
– DASD-only, where log stream data is duplexed in the MVS logger data space.
Each log stream is a sequence of blocks of data, which the MVS system logger
internally partitions over three different types of storage:
See the different levels of log stream storage in Figure 8 on page 201 and Figure 9
on page 202.
Coupling
Facility Secondary storage
Log
Structures LSN1
LSN1
Current
LSN2 Data Set
LSNn
LSN1
MVS1
Full
Data Set
System Logger Data Space
Staging
Data Sets
DFHSM
Storage
Tertiary storage
Figure 8. The types of storage used by the MVS system logger. This diagram shows a log stream that uses a coupling
facility. Primary storage consists of space in a structure in the coupling facility and either space in a staging data set or
a data space in the same MVS image as the system logger. Secondary storage consists of a series of data sets on
disk storage to which the elements of the log structure in the coupling facility are mapped. Tertiary storage is the
DFHSM storage, holding older levels of the secondary storage data sets.
LSN1
MVS1
Full
Data Set
Staging
Data Sets
DFHSM
Storage
Tertiary storage
Figure 9. The types of storage used by the MVS system logger. This diagram shows a log stream that uses
DASD-only logging. Primary storage consists of a data space in the same MVS image as the system logger and a
single staging data set. Secondary storage consists of a series of data sets on disk storage, which hold successive
copies of the single staging data set. Tertiary storage is the DFHSM storage holding older levels of the secondary
storage data sets.
Take the following points into account when deciding which log streams you
define to use the coupling facility and which to use DASD-only:
v A coupling facility log stream must be used if you want to allow simultaneous
access from CICS regions running in different MVS images. (Simultaneous access
to a DASD-only log stream is limited to CICS regions in the same MVS image.)
For example, assume that you are using RLS and have several CICS
application-owning regions (AORs) running on different MVS images. Because
the forward recovery log must be accessible from all the AORs, it must be
Note that you can define a single-system sysplex, which must use a sysplex couple
data set, with PLEXCFG=MONOPLEX. This definition is required for stand-alone
MVS systems that use MVS system logger facilities. Also, define sysplexes that
have two or more MVS images with PLEXCFG=MULTISYSTEM.
If you cannot devote two coupling facilities for the purposes of the MVS system
logger, the next most robust environment is provided by one dedicated coupling
facility for normal logger and lock structure use, with a coupling facility LPAR.
This environment has the same advantages of rebuilding and affects running CICS
systems only minimally. Furthermore, MVS detects that the LPAR coupling facility
is not in a failure-independent domain, and causes the system logger to write log
stream data to staging data sets for extra security.
Do not run with a single coupling facility because its failure can cause the MVS
system logger, and any other users of the coupling facility, to suspend normal
operation until access to the coupling facility is restored. CICS is effectively
unusable in such a situation.
Unless you specify that the system logger is to use staging data sets, the recovery
of log stream data depends on the MVS images remaining active so that the
system loggers can use copies of log records held in storage to repopulate the
coupling facility when it is again available. If you must run with a single coupling
facility, specify DUPLEXMODE(UNCOND) to force the use of staging data sets.
Before attempting to run any of the IXCMIAPU jobs, ensure that the MVS system
logger, IXGLOGR, is running. If IXGLOGR is not running, for example, if MVS is
running in LOCAL mode, logstream definition jobs fail with rc=0814.
Figure 10. Sample policy job to define logger structures to CFRM 1/2
Multiple log streams can write data to a single coupling facility structure. The log
data is not merged; the log data stays segregated according to log stream. You can
Each log stream is allocated a proportion of the structure space based on the
number of currently connected log streams, up to the limit specified in
LOGSNUM.
For example, you might define a structure to contain a maximum of, say, 30 log
streams. If only 10 log streams are connected, each log stream can use one tenth of
the space in the structure. As other log streams are connected and disconnected,
the MVS system logger adjusts the proportion of space to be used by each log
stream.
You must plan carefully before specifying a value for LOGSNUM, because this
parameter determines how much storage space in the structure is available to each
log stream. A number in the range 10 to 20 is optimum in many environments.
The JCL in Figure 11 defines log stream coupling facility structures to the MVS
system logger. It is meant for guidance only and you must substitute values
appropriate to your requirements.
/* System logs */
DEFINE STRUCTURE NAME(LOG_DFHLOG_001) LOGSNUM(10)
MAXBUFSIZE(64000) AVGBUFSIZE(500)
/*
//
Figure 11. Sample JCL to define coupling facility structures to MVS system logger
See the z/OS MVS Programming: Assembler Services Guide for information on
planning coupling facility configurations.
4-Way Sysplex
LOG_DFHLOG_001
MVSA MVSB
(on CF1)
LOG_DFHLOG_002
MVSC MVSD
(on CF2)
Important:
1. z/OS dynamically tunes the element and entry ratio, so the value you
specify for AVGBUFSIZE is less important than it was on earlier releases of
MVS.
2. You cannot update AVGBUFSIZE, like other structure definition attributes
such as MAXBUFSIZE and LOGSNUM, unless you first delete the log
streams in the structure definition.
v Set MAXBUFSIZE to slightly less than 64 KB; for example, 64 000 is suitable.
This number allows CICS to write the maximum size user record and allows
coupling facility storage to be allocated in 256-byte units. If you allow
MAXBUFSIZE to default, coupling facility storage is allocated in 512-byte units.
This size can be wasteful of storage.
If you set MAXBUFSIZE lower than 64 000 you gain no significant advantage as
far as the use of storage is concerned.
v Set a low value for the REBUILDPERCENT parameter in the CFRM policy for
log structures used for CICS system logs.
See also “Develop a naming convention for system logger resources” in the z/OS
MVS Setting Up a Sysplex manual.
The following code sample shows the basic syntax to define a coupling facility log
stream:
DEFINE LOGSTREAM NAME(log_stream_name)
STRUCTNAME(structure_name)
LOWOFFLOAD(low_offload) HIGHOFFLOAD(high_offload)
STG_DUPLEX(YES|NO) DUPLEXMODE(COND|UNCOND)
For detailed information about the full range of log stream attributes, see the z/OS
MVS Setting Up a Sysplex manual.
Figure 13 shows example definitions for a pair of coupling facility log streams
associated with a CICS system log. The definitions are for the CICS primary and
secondary system log streams. The region_userid value is the RACF user ID under
which the CICS address space is running. The applid value is the z/OS
Communications Server APPL name of the CICS region (taken from the APPLID
system initialization parameter).
The primary and secondary log streams are placed in different structures because
of the large disparity in data volumes written to the primary and secondary
system logs.
Using models, log streams are defined to MVS dynamically, on their first usage.
Figure 14 on page 210 shows an example of coupling facility model definitions for
CICS primary and secondary system log streams.
Figure 14. Example model definitions for coupling facility system log streams. The value sysname is the sysid of the
MVS image in which the CICS region or regions are running.
For detailed information about using model log streams, see Model log streams for
CICS general logs. For information about the mapping of CICS journal definitions
to log stream names, see Mapping of general log streams.
You can use the System z Coupling Facility Structure Sizer tool (CFSizer) to
calculate storage requirements for coupling facility log streams. CFSizer is a
web-based application that communicates with a coupling facility at a current
CFLEVEL to calculate storage requirements. See CFSizer.
You can use the CFSizer tool to calculate the following values:
v INITSIZE
v SIZE
For more information, see Structure size for system log usage.
For information about the CPC support for different CFLEVELs and the function in
each CFLEVEL, see CF levels. For more information about the storage increments
for different CFLEVELs, see the information about coupling facility control code
support in System z10® Processor Resource/Systems Manager Planning Guide.
You can use the formulas provided in Structure size for system log usage to
calculate the following values:
v INITSIZE
v AVGBUFSIZE
v SIZE
v LOWOFFLOAD
You can use the formula provided in Staging data set size calculation to calculate
the following value:
v STG_SIZE
Table 15 on page 212 summarizes how you decide on the values for various
attributes on the structure definition, log stream definition, and system definition.
Startup might take longer than you experienced when using earlier releases. This is
partly caused by the allocation and formatting of the staging data sets. Increased
startup time depends on factors that include the following:
v Size of staging data set (STG_SIZE)
v DASD speed
v DASD contention
You can reduce startup time by avoiding large staging data sets.
The CFSizer calculations assume that the coupling facility is at the current
CFLEVEL. The formulas provided assume the coupling facility is at CFLEVEL 11.
You use the results of these calculations to set the coupling facility resource
manager (CFRM) INITSIZE and SIZE parameters in the CRFM policy.
The primary and secondary log streams must be placed in different structures
because of the large disparity in data volumes written to the primary and
secondary system logs.
Generally, the volume of data that CICS keeps in the primary system log at any
one time is slightly greater than the amount written during one activity keypoint
interval. This volume is determined by the activity keypoint frequency, which is
measured in the number of write requests to the CICS system logstream output
buffer, and defined on the AKPFREQ system initialization parameter. When you plan
coupling facility structure sizes, review the value specified for the AKPFREQ
parameter.
To use CFSizer to calculate storage requirements for system logs, enter the
following information:
Maximum buffer size
The size, in bytes, of the largest log block that can be written to a
logstream. The value must be between 1 and 65532. This value corresponds
to the MAXBUFSIZE value in the definition of the logstream coupling
facility structure. See “Defining coupling facility structures” on page 203.
Average buffer size
The average size in bytes of log blocks written to all logstreams. This input
is used to determine the initial entry to element ratio of the list structure.
This value corresponds to the AVGBUFSIZE value in the definition of the
logstream coupling facility structure. See “Defining coupling facility
structures” on page 203.
Also, this value is available in the system logger reports produced by
IXGRPT1 and IXGRPT1J. See “Analyzing system logger data (SMF Type 88
records)” on page 225.
Highoffload
The high offload threshold of the logstream. When this percentage of the
coupling facility structure is full, the system logger begins to offload data
from primary storage to offload data sets. For CICS logstreams, this value
is usually between 80 and 85. See Checking logstream status and
LOWOFFLOAD and HIGHOFFLOAD parameters on log stream definition
in CICS Performance Guide.
For more information about the offload threshold parameter, see z/OS MVS
Setting Up a Sysplex.
Number of write requests per interval
The number of log blocks written to the logstream (the total from all
systems that use the logstream) during the data collection interval. This
value is available in the CICS statistics reports. See Logstream statistics and
Logstreams reports in CICS Performance Guide.
Also, this value is available in the #WRITES INVOKED data in the system
logger reports produced by IXGRPT1 and IXGRPT1J. See “Analyzing
system logger data (SMF Type 88 records)” on page 225.
Length of interval in seconds
The time interval in seconds over which the number of writes was
collected. This value is available in the CICS statistics reports. See Statistics
domain: Summary global statistics in CICS Performance Guide
Longest running task in seconds
The duration in seconds of the longest running transaction during the data
collection interval. This is not the average response time.
Log tail deletes
The number of times CICS performed log tail deletion during the data
collection interval. This value is available in the CICS statistics reports. See
delete requests, stream deletes or logstream deletes in Logstream statistics
To calculate the INITSIZE value to use in the CFRM policy for the primary system
log, use the following formula:
INITSIZE = 310 + ( LOGSNUM * A * B / 1024)
where:
v A = 2000 + (number_of_entries + 5)
v B = (AVGBUFSIZE * 1.1289) + 195
where:
v akpintvl is the interval between activity key points, which varies with
workload. Calculate it as follows:
akpintvl = AKPFREQ / ((N1 * R1) + (N2 * R2) + (Nn * Rn) )
where:
– N1, N2 .... Nn is the transaction rate for each transaction (transactions per
second).
– R1, R2 .... Rn is the number of log records written by each transaction.
v trandur is the execution time (between sync points) of the longest-running
transaction that runs as part of the normal workload.
If this duration is longer than the akpintvl value, you have the following
choices:
– Increase the value of the AKPFREQ parameter, thus increasing the value of
akpintvl, provided that the value does not result in an unacceptably large
coupling facility structure size.
– Change the application logic to cause more frequent sync points.
– Calculate a structure size based on a shorter transaction duration, and accept
that DASD offloading occurs when the long-running transaction is used.
v writespersec = lesser of 25 or ((N1 * R1) + ... (Nn * Rn)), where:
– N1, N2 .... Nn are the transaction frequencies (transactions per second) of
the most frequently run transactions.
– R1, R2 .... Rn is the number of log records written by each transaction.
To calculate the value of AVGBUFSIZE for the primary system log, DFHLOG, you can
use the weighted average of the data logged by the most frequently run
transactions in the system:
AVGBUFSIZE = (bytespersec / writespersec) + 48
where:
v bytespersec = (N1 * D1) + (N2 * D2) + ... (Nn * Dn)
– N1, N2 .... Nn are the transaction frequencies (transactions per second) of
the most frequently run transactions.
– D1, D2 .... Dn are the bytes of data logged by each transaction.
where:
- Ns is the number of sync points per transaction; usually 1.
- synreclen is the sync point record length.
- Nfc, fcrechdr, fcreclen are the number of recoverable updates made, the
length of the record headers, and the length of the records for file control,
respectively.
Count only READ UPDATE and WRITE ADD records. fcrechdr is 144 (136
bytes of record header plus 8 bytes of file name).
- Nts, tsrechdr, tsreclen are for recoverable temporary storage updates.
Count only TS PUT and TS UPDATE records. For TS PUT records,
tsrechdr is 108, and tsreclen is 88. For TS UPDATE records, tsrechdr is
108, and tsreclen is 52.
- Ntd, tdtrechdr, tdreclen are for recoverable transient data updates.
tdrechdr is 108, and tdreclen is 380.
- Nur, urrechdr, urreclen are for user records written to DFHLOG.
urrechdr is 125.
v See Writes per second calculation for details of how to calculate writespersec.
If the result of the calculation shows a value for AVGBUFSIZE that is greater than the
value defined for MAXBUFSIZE, the value defined for MAXBUFSIZE is taken as
the value for AVGBUFSIZE, and writespersec is calculated as follows:
writespersec = bytespersec / (MAXBUFSIZE - 48)
Round the final result of the INITSIZE formula up to the next multiple of 256.
To calculate the SIZE value to use in the CFRM policy for the primary system log,
use the following formula:
SIZE = 480 + ( LOGSNUM * A * B / 1024)
where:
v A = 2500 + (number_of_entries + 5)
v B = (AVGBUFSIZE * 1.6821) + 289
Round the final result of the SIZE formula up to the next multiple of 256. The
formula for SIZE gives a result that is approximately fifty percent greater that the
INITSIZE value.
You can calculate a suitable value for LOWOFFLOAD for DFHLOG using one of
the following formulas:
For a description of the low offload threshold for a logstream, see LOWOFFLOAD
and HIGHOFFLOAD parameters on log stream definition in CICS Performance
Guide.
Generally, the secondary system logstream is only a fraction of the size of the
primary logstream. To calculate coupling facility space for DFHSHUNT, use the
following formulas:
v INITSIZE = (150 * LOGSNUM) + 310
v SIZE = (230 * LOGSNUM) + 480
where LOGSNUM is number of logstreams that can write data to the secondary
logstream.
You can calculate a value for number of entries for the INITSIZE and SIZE
attributes in the following way:
no. entries = writespersec * 12.5
where:
writespersec = lesser of 25 or (N1 + ... + Nn)
where N1 .... Nn is the number of transactions per second writing to each data
set.
where:
v bytespersec = (N1 * Wr1 * (D1 + rechdr) +.. (Nn * Wrn * (Dn + rechdr)))
v writespersec = lesser of 25 or (N1 + ... + Nn), where:
If the records are WRITE ADD, WRITE ADD COMPLETE, or WRITE ADD
DELETE records, rechdr is 84 and is followed by the record key and the record
data (including its key).
If the result of the calculation shows a value for AVGBUFSIZE that is greater than the
value defined for MAXBUFSIZE, the value defined for MAXBUFSIZE is taken as
the value for AVGBUFSIZE, and writespersec is calculated:
writespersec = bytespersec / (MAXBUFSIZE - 36)
The CFSizer calculations assume that the coupling facility is at the current
CFLEVEL. The formulas provided assume the coupling facility is at CFLEVEL 11.
To use CFSizer to calculate storage requirements for the user journal and
autojournal, enter the following information:
Writes per second
The number of log blocks written to the log stream per second from a
single system. This value is available in the CICS statistics reports. See
Logstreams reports in CICS Performance Guide.
Maximum buffer size
The size, in bytes, of the largest log block that can be written to a
logstream. The value must be between 1 and 65532. This value corresponds
to the MAXBUFSIZE value in the definition of the logstream coupling
facility structure. See “Defining coupling facility structures” on page 203.
Average buffer size
The average size in bytes of log blocks written to all logstreams. This input
is used to determine the initial entry to element ratio of the structure. This
value corresponds to the AVGBUFSIZE value in the definition of the
logstream coupling facility structure. See “Defining coupling facility
structures” on page 203.
Number of logstreams
The number of logstreams allocated to a structure. This must be a value
from 0 to 512. In a CICS environment, the number of logstreams should be
between 10 and 20.
For the user journal and autojournal, CFSizer uses the following default values:
Calculate values for the INITSIZE and SIZE attributes. See “Calculation of
INITSIZE for DFHLOG” on page 214 and “Calculation of SIZE for DFHLOG” on
page 215.
For journals with log blocks that are not forced to the log stream, the average block
size tends to be slightly less than the MAXBUFSIZE value defined for the coupling
facility structure.
For journals with log blocks that are forced to the log, using the EXEC CICS WAIT
JOURNALNAME or EXEC CICS WAIT JOURNALNUM commands, or using the WAIT option
of the EXEC CICS WRITE JOURNALNAME or EXEC CICS WRITE JOURNALNUM commands,
you can calculate AVGBUFSIZE from the weighted average of the data logged for
each journal logging to the same log stream for a given CICS system.
AVGBUFSIZE = (bytespersec / (writespersec) + 36
where:
v bytespersec = (N1 * Wr1 * (D1 + rechdr) + ... (Nn *Wrn * (Dn + rechdr)))
v writespersec = lesser of 25 or ((N1 * Wa1) + ... + (Nn * Wan)) where:
– N1, .... Nn is the number of transactions per second writing to the journal.
– Wr1 .... Wrn is the number of write requests per transaction.
– Wa1 .... Wan is the number of wait requests per transaction.
– D1 .... Dn is the average record length of each journal record.
– rechdr is the record header length of each record.
Autojournal records are issued from file control. They might be DATA SET NAME
records, which consist of a 204-byte record header, and no further data.
Alternatively, they might be READ ONLY, READ UPDATE, WRITE UPDATE,
WRITE ADD, or WRITE ADD COMPLETE records. In this case, rechdr is 84 bytes
and is followed by the file control record itself.
User journal records consist of a 68-byte record header, followed by the user prefix
and the user data.
If the result of the calculation shows a value for AVGBUFSIZE that is greater than the
value defined for MAXBUFSIZE, the value defined for MAXBUFSIZE is taken as
the value for AVGBUFSIZE, and writespersec is calculated as follows:
writespersec = bytespersec / (MAXBUFSIZE - 36)
Use the following formulae to calculate the avgbufsize, number of entries and
akpintvl values for the AORs in the new RLS environment.
Calculate the AOR AVGBUFSIZE value required by the INITSIZE and SIZE
formulae:
AOR AVGBUFSIZE = ( AOR_bytes + (FOR_bytes / no. of AORs) ) / (intvlen * 25)
where:
v AOR_bytes is the number of bytes written to the system log by an AOR in the
sampling interval.
v FOR_bytes is the number of bytes written to the system log by an FOR in the
sampling interval.
v no of AORs is the number of cloned AORs using the FOR.
v intvlen is the length in seconds of the sampling interval.
Calculate the AOR no. entries value required by the INITSIZE and SIZE formulae:
AOR no. entries = ((AOR_akpintvl + trandur) * 25) / 0.9
where:
v
AOR_akpintvl = ( AKPFREQ * intvlen ) / ( AOR_recs + (FOR_recs / no. of AORs) )
where:
– intvlen is the length in seconds of the sampling interval.
– AOR_recs is the number of records written to the system log by an AOR in the
sampling interval.
– FOR_recs is the number of records written to the system log by an FOR in the
sampling interval.
– no of AORs is the number of cloned AORs using the FOR.
v trandur is the execution time between sync points of the longest-running
transaction that runs as part of the normal workload.
If this value is greater than AOR_akpintvl, use AOR_akpintvl as the duration or
consider increasing AKPFREQ.
After you calculate the values for AOR AVGBUFSIZE and AOR no. entries, determine
the values of INITSIZE and SIZE, as described in “Structure size for system log
usage” on page 212.
Use the reports produced from the log stream statistics from CICS Transaction
Server for z/OS that occur in a reporting interval for the AORs and the FOR to
calculate the values:
v The number of log write operations
v The amount of data written
When the coupling facility is in the same CPC, or uses volatile storage, the MVS
system logger supports staging data sets for copies of logstream data that might
otherwise be vulnerable to failures that affect both the coupling facility and the
MVS images.
Individual CICS log streams can use either coupling facility log structures or
DASD-only logging. You might define a log stream to use DASD-only logging for
these reasons:
v You do not have a coupling facility.
v You want to preserve coupling facility space for other uses.
v You do not require the log stream to be shared across MVS systems. (The CICS
system log can never be shared.)
See Setting up the environment for CICS log manager for advice about defining
individual log streams to use coupling facility or DASD-only logging, based on
their usage.
The following code sample shows the basic syntax to define a DASD-only log
stream:
DEFINE LOGSTREAM NAME(log stream_name)
DASDONLY(YES)
MAXBUFSIZE(max_bufsize)
STG_SIZE(stg_size)
HIGHOFFLOAD(high_offload)
LOWOFFLOAD(low_offload)
Figure 15 shows example definitions for a pair of log streams associated with a
DASD-only system log.
Figure 15. Example definitions of DASD-only log streams. The definitions are for the CICS primary and secondary
system log streams. The value region_userid is the RACF user ID under which the CICS address space is running;
applid is the CICS region's SNA APPL name, taken from the APPLID system initialization parameter.
Using models, log streams are defined to MVS dynamically, on their first usage.
Figure 16 shows example DASD-only model definitions for CICS primary and
secondary system log streams.
Figure 16. Example model definitions for DASD-only system log streams. The value sysname is the sysid of the MVS
image in which the CICS region or regions are running.
For information about the mapping of CICS journal definitions to log stream
names, see Setting up CICS log streams in Configuring.
When using model log streams, note that, if you specify a STG_SIZE on the model
definition, all new log streams created from the model have the same-sized staging
data set.
Sizing DFHLOG
To size the CICS primary system log stream, DFHLOG:
v Minimize the amount of data that is offloaded to secondary storage
The MVS system logger begins the offload process when the high offload
threshold (HIGHOFFLOAD) of the log stream is reached. The offload process
consists of two steps:
1. The MVS logger physically deletes the data in the log stream that has been
marked for deletion by the CICS log-tail deletion process.
Sizing DFHSHUNT
You must size the secondary system log stream, DFHSHUNT, to avoid
staging-data-set-full events. However, typically some data is offloaded from
DFHSHUNT to secondary storage.
You must size forward recovery logs, user journals, and autojournals to avoid
staging-data-set-full events. However, because CICS does not delete data from
these log streams, data is typically offloaded to secondary storage.
Table 16 summarizes how you decide on the values for various attributes on the
log stream definition, and system definition.
Table 16. How to decide on the values of attributes
Facility Attribute Method or Value
Primary system log HIGHOFFLOAD 80
stream (DFHLOG)
LOWOFFLOAD Use the formula in “Sizing your DASD log
streams” on page 224 to calculate a suitable
value.
MAXBUFSIZE 64000
STG_SIZE Use the formula in “Sizing your DASD log
streams” on page 224 to calculate a suitable
value.
Secondary system HIGHOFFLOAD 80
log stream
LOWOFFLOAD 40 – 60
(DFHSHUNT)
MAXBUFSIZE 64 000
STG_SIZE 500 (4 KB blocks)
Startup might take longer than you experienced when using earlier releases. This is
caused in part by the allocation and formatting of the staging data sets. Increased
startup time depends on factors like these:
v Size of staging data set (STG_SIZE)
v DASD speed
v DASD contention
You can reduce startup time by avoiding large staging data sets.
The formulae provided help you to calculate values for LOWOFFLOAD and
STG_SIZE.
You can calculate LOWOFFLOAD for DFHLOG using the following formula:
LOWOFFLOAD = (trandur * 90) / (akpintvl + trandur) + 10 (where RETPD=0 specified)
or
LOWOFFLOAD = (trandur * 90) / (akpintvl + trandur) (where RETPD=dddd specified)
where:
v akpintvl is the interval between activity key points. Calculate it using the
following formula:
akpintvl = AKPFREQ / ( (N1 * R1) + (N2 * R2) + (Nn * Rn) )
where:
– N1, N2 .... Nn is the transaction rate for each transaction (transactions per
second).
– R1, R2 .... Rn is the number of log records written by each transaction.
v trandur is the execution time (between sync points) of the longest-running
transaction that runs as part of the normal workload.
If this duration is longer than the akpintvl value, you have these choices:
– Increase the value of AKPFREQ, thus increasing the value of akpintvl,
provided that this value does not result in an unacceptably large staging data
set size.
You can calculate STG_SIZE for DFHLOG using the following formula:
Staging DS size = (AKP duration) * No. of log writes per second
for system log (no. of 4k blocks)
where AKP duration = (CICS TS 390 AKPFREQ)/(No. buffers per second)
You can take the values for the number of log writes per second and buffer puts
per second from your statistics. The value for log writes per second must not
exceed 30.
Figure 17. Converting a DASD-only log stream to use a coupling facility structure. This example shows the CICS
primary system log stream. The value region_userid is the RACF user ID under which the CICS address space is
running; applid is the CICS region's SNA APPL name, taken from the APPLID system initialization parameter.
1. To upgrade a DASD-only log stream to a coupling facility log stream that does
not use a staging data set, you must explicitly specify STG_DUPLEX(NO),
because the DASD-only log stream by definition uses a staging data set; unless
you specify STG_DUPLEX(NO), this storage data set is retained by the
coupling facility log stream.
2. You cannot use UPDATE LOGSTREAM to convert a log stream that uses a
coupling facility structure to one that uses DASD-only. To do that, you must
delete and redefine the log stream.
For more information about managing log data sets, see the z/OS MVS Setting Up a
Sysplex manual.
CICS manages the system log by deleting records, for completed units of work,
during activity keypoint processing (log-tail deletion). With an appropriately sized
log stream, the system log data remains in primary storage, thus avoiding data
spilling to DASD.
Note that:
v The CICS system log must be used only for short-lived data required for
recovery purposes. For example, do not write audit trail user records to the
system log.
v Allow CICS to manage the size of the system log.
However, if historically you have used the system log for such things as audit
trails, you might want to preserve system log data beyond the time it is typically
deleted by CICS. You can use the RETPD MVS parameter to preserve system log
data. Define DFHLOG and DFHSHUNT to MVS with AUTODELETE(NO) and
RETPD(dddd). The default values are AUTODELETE(NO) and RETPD(0). By
specifying AUTODELETE(NO), CICS, rather than MVS, retains control of the
log-tail trimming process; dddd is the number of days for which data is to be
retained. In this way, the MVS logger physically deletes an entire log data set when
all of the data in the data set has been marked for deletion by the CICS log-tail
trimming process and is older than the retention period specified for the log
stream.
You can view log data that has been marked for deletion by CICS, but not yet
physically deleted by MVS, with the DFHJUP utility program or the VIEW=ALL
option of the MVS IXGBRWSE macro.
The number of data sets per log stream recognized by the MVS logger is several
million. Therefore, in general, do not be concerned about the limit being reached.
You can cause redundant data to be deleted from log streams automatically, after a
specified period. To arrange deletion for general log streams, define the logs to
MVS with AUTODELETE(YES) and RETPD(dddd), where dddd is the number of
To use this support, you must enable the z/OS conversion services and install a
conversion image that specifies the conversions that you want CICS to perform.
You must activate z/OS Support for Unicode before you start CICS.
For instructions to set up your system and configure a suitable conversion image,
see z/OS Unicode Services User's Guide and Reference.
If z/OS conversion services are not enabled, CICS issues a message. If you start a
CICS region that is expected to use the z/OS conversion services, and such a
message is issued, an IPL is necessary to enable these services. If you do not
require the conversion services, you can suppress the message.
To discover the status of z/OS conversion services after an IPL, use one of the
following commands from an MVS console:
v D UNI
This command shows whether z/OS conversion services are enabled.
v D UNI, ALL
This command shows whether z/OS conversion services are enabled, and which
conversions the system supports.
If you want to enter the command from SDSF, add a / to the beginning of the
command.
CICS uses the z/OS conversion services to support character conversions. For a list
of supported conversions, see the relevant appendix in z/OS Unicode Services
User's Guide and Reference. The conversions entries that you select must not
specify type ER.
The z/OS conversion services support big-endian byte ordered data (UTF-16BE).
They do not support little-endian byte ordered data (UTF-16LE). When asked to
convert UTF-16LE source data to another CCSID, CICS transforms the data to the
big-endian form of UTF-16 before calling the z/OS conversion services. When the
target data is identified as UTF-16 (CCSID 1200), CICS receives the converted data
from the z/OS services in big-endian byte order, and returns it in this form.
When handling CCSID 1200, CICS respects the byte order marker for inbound
conversions, but cannot retain that information when handling a related outbound
An APAR (Authorized Program Analysis Report) is raised when you and your IBM
programming service representative agree that a CICS problem exists. You might
be given an APAR fix. When the problem has been analyzed, all users are sent a
PTF (Program Temporary Fix) to correct the problem permanently on the current
release. PTFs are incorporated into any future CICS release.Both types of change
are called SYSMODs (system modifications).
Using SMP/E control statements, you can process SYSMODs in three stages:
1. The RECEIVE control statement moves the SYSMOD into the PTF temporary
store (PTS) data set. This operation is reversed by the REJECT control
statement.
2. The APPLY control statement moves the SYSMOD into the target libraries. This
operation is reversed by the RESTORE control statement.
At this point you can test the modified system.
3. The ACCEPT control statement moves the SYSMOD into the distribution
libraries. This operation is not easily reversed.
When you are dealing with APAR fixes, apply the SYSMOD, but do not accept it.
If you later obtain a PTF that solves the problem in a different way, you might be
asked to restore (that is, remove) the APAR fix and apply the PTF instead.
When you are dealing with PTFs, apply the SYSMOD and then test it. Afterward
you can accept it.
For background information about SMP/E operations, see the SMP/E User's Guide
manual. For more detailed information, see the SMP/E Reference manual.
However, do not attempt to apply service to data sets that are used by CICS TS
components that are running.
For information about how to apply corrective service with SMP/E, see the System
Modification Program Extended: User's Guide.
The ZNAME parameter also generates a SET BDY command in DFHAUPLE, the
CICS TS procedure supplied for assembling and link-editing CICS control tables.
If you supply an override SMPCNTL DD statement in the job that runs DFHSMPE,
it must come before any DD statements that are additional to the procedure.
Furthermore, if you provide an override, you receive the following MVS system
message:
IEF686I DDNAME REFERRED TO ON DDNAME KEYWORD IN PRIOR STEP WAS NOT RESOLVED
You receive this message because the DD statement for DFHSMPIN is missing
because of the SMPCNTL DD override. However, the message is not a JCL error,
and does not prevent the step from running successfully with a return code of 0.
If you supply any SMP/E control statements in your job using the DFHSMPIN
ddname, they are prefixed by a SET BDY command for the zone that you specify
on the ZNAME parameter. If you run SMP/E with a command that does not
require this SET BDY statement, the way your job runs is not affected.
APARs
Generally, do not ACCEPT APAR fixes into distribution libraries. Subsequent PTFs
might not include the APAR fix, and you might be required to reapply the APAR
fix.
PTFs
A PTF can contain fixes for several different problems, so several APAR fixes
reported in RETAIN® might be superseded by the more permanent PTF:
v A PTF provides card-image changes that are functionally equivalent to those in
the APAR fix.
v A PTF contains object-module replacements for preassembled CICS TS programs.
For further information about using SMP/E to apply service, see the System
Modification Program Extended: User's Guide.
After you have installed CICS, and before you start the postinstallation tasks,
change the TEMPLIB parameter and the SYSPROC DD statement of the DFHISTAR
job to refer to the hlq.SDFHINST library. This reference ensures that, if you apply
service to any of the skeleton jobs, the changes applied to the hlq.SDFHINST
library are used in subsequent runs of DFHISTAR. In any such subsequent runs of
DFHISTAR, you can use the SELECT parameter to select any jobs that are affected
by service.
1. If DFHISTAR is serviced, add the service changes to your DFHISTAR module
in the hlq.TDFHINST library to preserve your current installation parameters,
or respecify your current installation parameters in the serviced DFHISTAR
module, which you can copy from the hlq.SDFHINST library to the
hlq.TDFHINST library.
2. Linkage editor messages IEW0461, IEW2454, IEW2646, IEW2651, and IEW2689
are produced during the APPLY stage for unresolved external references. These
messages are issued, giving a return code of 4, when some CICS load modules
are link-edited during PTF installation. You can ignore these IEWxxxx messages
because they are produced for component object modules of executable CICS
load modules.
3. JCI680D and JCI680E PTFs to ship Java service are often significantly larger
than those for the base CICS product and might require more system resources
during APPLY processing. To avoid errors caused by insufficient storage, do not
restrict the region size for the SMP/E APPLY step for such PTFs. If a region
size limit is used and the APPLY fails with errors relating to insufficient
storage, it might be necessary to increase or remove the limit for the SMP/E
job. In some cases, you might require a region size of 500 MB or more.
Chapter 35. Applying service to CICS Transaction Server for z/OS 233
234 CICS TS for z/OS 5.1: Installation Guide
Chapter 36. Applying service to CICSPlex SM
Service material for CICSPlex SM is distributed as corrective or preventive service.
Both types of changes are called system modifications (SYSMODs). SYSMODs are
processed using SMP/E control statements.
You can customize this procedure with the DFHISTAR job that is stored in the
CICSTS51.CICS.XDFHINST library.
For full details about applying service to the CICSPlex SM component of CICS TS,
see Chapter 35, “Applying service to CICS Transaction Server for z/OS,” on page
231.
| If you have multiple CMASes connected together in a network with more than one
| CMAS being a Maintenance Point for different CICSplexes, you must apply PTFs
| to all CMASes simultaneously which function as a Maintenance Point.
If you are applying PTF maintenance to CMAS1, you must also apply it to CMAS2
at the same time, because both CMASes function as MPs for various CICSplexes.
Failure to do so results in CMAS isolation.
After you have applied CICSPlex SM service, ensure that all CICSPlex SM regions
are running with a consistent set of CICSPlex SM libraries. Failure to do so can
cause unpredictable results.
For more information about applying service to CICSPlex SM, see “CICS
Transaction Server for z/OS-supplied SMP/E procedure” on page 235.
For detailed information on configuring CICS, including setting up the data sets,
connectivity, and configuring CICSPlex SM see Configuring .
If you used CBPDO or the ServerPac to install CICS TS, edit and run DFHISTAR to
tailor the CICS-supplied skeleton jobs that create the CICS TS data sets and run the
CICS TS IVPs.
If you used the distribution tape to install CICS TS, as described in the Program
Directory for CICS Transaction Server for z/OS, you have typically tailored the
skeleton jobs already, and you can now start Chapter 38, “Jobs for creating the
CICS data sets,” on page 243.
Whichever method you used to install CICS TS, you can edit and run DFHISTAR
several times, to create different copies of the skeleton jobs or subsequently change
them. For example, to create several copies of DFHDEFDS to define data sets
unique to several CICS regions, or if you have to apply service to any of the
installation-related jobs. In this way, you can tailor the jobs to your CICS
environment after you have loaded the CICS software into the SMP/E-supported
CICS libraries.
(1)
TDFHINST (2)
ADFHINST
(3)
(5)
SDFHINST
XDFHINST
The names of the CICS installation libraries in Figure 18 and their use is explained
in the following notes which refer to the numbers in the figure:
1. Skeleton installation-related jobs are copied from data set HCI 640.F2 on the
distribution tape into hlq.TDFHINST. hlq.TDFHINST is used to store the
DFHISTAR that you edit and run to tailor the skeleton installation-related jobs
Running DFHISTAR
When you have edited DFHISTAR with the values for installation parameters for
your CICS environment, submit DFHISTAR.
When you run DFHISTAR, it tailors the skeleton jobs selected by the SCOPE or
SELECT parameter in the DFHISTAR input to your environment and adds them to
the library that you specified on the LIB parameter (by default, hlq.XDFHINST). If
necessary, DFHISTAR creates the library that is specified on the LIB parameter.
A table in section 6.4 of Program Directory for CICS Transaction Server for z/OS lists
those skeleton jobs installed in the hlq.SDFHINST library that you can tailor by
running DFHISTAR.
You must specify the full name of the installation library from which the skeleton
jobs are obtained, on the TEMPLIB parameter and SYSPROC DD statement of
DFHISTAR (by default, hlq.TDFHINST). For the postinstallation tasks that are
described, specify TEMPLIB SDFHINST.
Postinstallation members are split into three areas as shown in Table 17, Table 18,
and Table 19.
Table 17. Postinstallation members for a CMAS
Member Description
EYUCMASJ JCL to start a CMAS. It runs EYUCMASP.
EYUCMASP Starts a CMAS. This CMAS uses the CICS-supplied
sample table, DFHSIT6$, but appropriate override values
are supplied in the job.
EYUCMS0P EYUPARM parameters for a CMAS.
EYUCMSDS JCL to create and initialize the data sets for a CMAS.
EYUCMSSP CICS SIT overrides for a CMAS.
For more information on CMAS data set customization, see “Creating and
customizing CMAS data sets” on page 306.
Table 18. Postinstallation members for a WUI
Member Description
EYUJWREP JCL to delete and define a WUI data repository. This
function is also included in EYUWUIDS.
EYUWUI0P EYUPARM parameters for a WUI.
EYUWUIDS JCL to create and initialize the data sets for a WUI.
EYUWUIIN EYUWUI parameters for a WUI.
EYUWUIJ JCL to start a WUI. It runs EYUWUIP.
EYUWUIP Starts a WUI. This WUI uses the CICS-supplied sample
system initialization table, DFHSIT6$, but appropriate
override values are supplied in the job.
EYUWUISP CICS SIT overrides for a WUI.
For more information on WUI customization, see “Creating and customizing the
WUI data set” on page 320.
Table 19. Postinstallation members for a managed CICS system (MAS)
Member Description
EYUCSYDS JCL to create and initialize the data sets for a managed
CICS system.
EYUCSYSJ JCL to start a managed CICS system. It runs EYUCSYSP.
EYUCSYSP Procedure to start a managed CICS system. The MAS
uses the CICS-supplied sample system initialization
table, DFHSIT6$, but appropriate override values are
supplied in the job.
EYUJHIST JCL to delete and define a pair of history data sets.
EYULMS0P EYUPARM parameters for a managed CICS system.
EYULMSSP CICS SIT overrides for a managed CICS system.
EYULPMOD JCL to apply the USERMOD function, EYU$UM01, that
moves some MAS load modules to a link pack area
(LPA) library.
When you run DFHISTAR, these jobs are tailored to your environment and stored
in the library that you specify on the LIB parameter of DFHISTAR (by default,
hlq.XDFHINST). If you have not yet run DFHISTAR, do so before running any of
the CICS postinstallation jobs.
You can generate several copies of these jobs by rerunning DFHISTAR, selecting
the jobs that you want to copy. To generate new copies of these jobs, edit
DFHISTAR to specify new values for the DSINFO and SELECT parameters. Only
those jobs that you name in the SELECT parameter are regenerated.
The supplied level of DFSMS changes the way that the index control interval size
(CISIZE) is calculated for the VSAM data sets that have index components. As a
result, expect a large default CISIZE, which can cause open errors during CICS
startup. The change in CISIZE applies to both CICS data sets and your own
application data sets.
CICS supplies the following jobs to create the required data sets:
DFHCOMDS
Deletes and re-creates data sets common to all CICS regions.
DFHDEFDS
Deletes and re-creates copies of data sets that are used only by one CICS
region. You can run a separate copy of this job to create the data sets for
each CICS region.
DFHCMACI
Deletes and re-creates the CICS messages data set, dsindex.DFHCMACD,
and loads it with the data from the CICS-supplied file, DFHCMACD, in
the hlq.SDFHMSGS target library.
DFH0JCUS
Deletes and re-creates the sample applications details data set,
dsindex.SAMPLE.DFHCTCUS and its associated alternate index and path,
and loads it with the data from the CICS-supplied file, DFH0DCUS, in the
hlq.ADFHAPD2 library.
DFH0JHLP
Deletes and re-creates the sample applications help data set,
dsindex.SAMPLE.DFHCTHLP, and loads it with the data from the
CICS-supplied file, DFH0DHLP, in the hlq.ADFHAPD1 library.
Use the CTGI naming convention is an example of a naming convention that you
can use for CICS 4-character names, and is based on the 4-character CTGI symbol:
v C identifies an entire CICSplex.
v T identifies the type of region.
v G identifies a group of regions.
v I identifies iterations of regions in a group.
Use the CTGI naming convention. For example, if CICSHTH1 is the APPLID, the
following data set name for the CSD is correct:
DFHCSD DD DSN=CICSTS51.CICS.CICSHTH1.DFHCSD,DISP=SHR
Where names are allowed to be up to eight characters long, as for CICS APPLIDs,
the letters CICS are used for the first four characters, particularly for production
regions.
For detailed information on creating these data sets for your CICS regions, see
Setting up the CICS system definition data set in Configuring.
The DFHCOMDS job creates one of each of these data sets common to all CICS
regions. If you use separate copies of any of these data sets for each CICS region,
move and edit the appropriate statements into the DFHDEFDS job. For further
information about creating multiple copies of these data sets, see “Creating several
copies of the DFHCSD and SYSIN data sets” on page 245.
To use separate copies of any of these data sets for each CICS region:
v Move the statements that define the data set from the DFHCOMDS job to the
DFHDEFDS job.
v Edit the statements in the DFHDEFDS job to specify the symbol ®NAME
for the region qualifier in the name of the data set.
Move and edit the appropriate data set statements before you create copies of the
DFHDEFDS job for each CICS region. When you run DFHISTAR to create the new
copies of the DFHDEFDS job, it substitutes your values for the CICS region
qualifier (®NAME) and index (&INDEX) into the data set names.
For example: If you intend using a copy of the DFHCSD data set for each CICS
region, copy the job steps DELCSD, DEFCSD, and INITCSD from the DFHCOMDS
job to the DFHDEFDS job. Also, add the symbol ®NAME for the qualifier to
the name of the DFHCSD data set to give &DSINDEX.CICS®NAME.DFHCSD. If you
edit DFHISTAR to select the DFHDEFDS job to be copied, and specify the
following DSINFO parameter:
DSINFO userid.CICSTS51.CICS H3P060 3390 IDA .
when you run the DFHDEFDS job, it creates the DFHCSD data set called
userid.CICSTS51.CICS.CICSIDA.DFHCSD for the CICS region identified by the
qualifier IDA. If you change the SELECT and DSINFO parameters of DFHISTAR,
to specify an appropriate new job name and qualifier for another CICS region, you
can create several copies of the DFHDEFDS job to create DFHCSD and SYSIN data
sets for each CICS region.
For details on creating these data sets, see Defining data sets in Configuring.
Chapter 38. Jobs for creating the CICS data sets 245
Data set Description
DFHLRQ BTS local request queue
DFHPIDIR WS-AT directory data set
DFHTEMP Temporary storage data set
FILEA Sample program file
Use DFHISTAR to create a copy of the DFHDEFDS job for each CICS region. Edit
DFHISTAR, specifying the parameters DSINFO and SELECT, and run it once for each
region.
For example, the default name for the CICS local catalog is hlq.CICS.DFHLCD.
These programs are in the CICS 4.1 Sample Applications Guide and the Designing and
Programming CICS Applications.
Before you can use some of these samples, you must create the data sets that they
use, and make them available to your CICS region, as described in these topics. Do
not create these data sets, unless you intend using the associated sample
applications.
To create the data sets that the CUA text-level application requires, submit the
DFH0JCUS and DFH0JHLP jobs, which are installed in the hlq.XDFHINST library.
You can cause CICS to dynamically allocate the files for these data sets and open
them after CICS initialization by installing the sample resource definitions in the
group DFH$CTXT.
If no DD statement exists for these data sets in the CICS startup job stream, the
files are allocated to the data sets with DSNAMEs that are specified in the resource
definitions: hlq.SAMPLE.DFHCTCUS, hlq.SAMPLE.DFHCTHLP, and
hlq.SAMPLE.DFHCTAIX, for the data sets and the alternate index. Alternatively,
you can add DD statements for the data sets to your CICS startup job, which
causes CICS to use the DSNAMEs specified on the DD statements instead of those
in the resource definitions.
Chapter 38. Jobs for creating the CICS data sets 247
For information about this sample application, see the CICS Sample Applications
Guide.
When you submit the DFHDEFDS job, a copy of the data set that the FILEA
application requires is created. This data set is installed in the hlq.XDFHINST
library.
When you tailor the CICS installation-related jobs, a DD statement for the FILEA
data set is added to the CICS IVP jobs and the DFHSTART procedure. If you want
CICS to dynamically allocate the data set and open the file, remove the DD
statement and install a FILE resource definition with an appropriate DSNAME; for
example, as supplied in the group DFH$FILA. For more information about CICS
installation-related jobs, see Chapter 37, “Tailoring the CICS-supplied skeleton
jobs,” on page 239.
It provides online inquiry and maintenance for a sample customer credit file in a
department store. The application uses VSAM files and 3270 display and printer
terminals. It was written before publication of the Common User Access
guidelines, and provides similar function, without CUA support, as the CUA
sample application.
To create the data sets that the Primer sample application requires, edit and submit
the sample job.
Figure 19. Example JCL to create the Primer sample data sets
You can cause CICS to dynamically allocate the files for these data sets and open
them on first reference by installing the sample resource definitions in the group
DFH$ACCT.
Chapter 38. Jobs for creating the CICS data sets 249
If no DD statement exists for these data sets in the CICS startup job stream, the
files are allocated to the data sets with DSNAMEs that are specified in the resource
definitions: hlq.ACCTFILE and hlq.ACIXFILE. Alternatively, you can add DD
statements for the data sets to your CICS startup job, which causes CICS to use the
DSNAMEs specified on the DD statements instead of those in the resource
definitions.
For information about this sample application, see the CICS Application
Programming Primer.
This includes the COLM and COVC transactions. If these transactions are invoked,
or the equivalent CPSMCONN system initialization parameter is set, CICSPlex SM
dynamically creates further definitions as required.
The dynamically created resource definitions and their attributes can be found in
the following members of the SEYUSAMP sample library:
v EYU$CDEF contains the default resource definitions for a CMAS.
v EYU$MDEF contains the default resource definitions for a MAS.
v EYU$WDEF contains the default resource definitions for a WUI server.
The CSD in use needs to be appropriate for the release of CICS in use. For
example, upgrade the CSD to the latest release and depending on the CICS release
of the region, add the CICS DFHCOMPx CSD compatibility groups to the CICS
group list as necessary. See the appropriate CICS Upgrading documentation for
details.
You do not typically run user transactions in a CMAS. However, if you do choose
to define your own transactions to the CMAS, be aware that transaction IDs used
by CICSPlex SM in the CMAS have no specific format. To avoid conflict between
your names and those that are used by CICSPlex SM, review the transactions that
are defined in EYU$CDEF. For a list of these transactions, see “Default CICS
resource definitions for CICSPlex SM,” on page 433.
If you do want to modify a definition, you can do so using the required definition
from the EYU$CDEF (CMAS), or EYU$WDEF (WUI) samples.
Copy the required definitions from the appropriate sample into a DFHCSDUP job,
and make the required changes, including specifying a CSD group. Specify this
CSD group in an appropriate GRPLIST for the CMAS, MAS, or WUI server. The
region is then COLD or INITIAL started, as required, to process the change.
You can update the CSD for CICSPlex SM if CMAS journaling is required; see
“CMAS journaling” on page 309.
Another reason you might want to update the CSD for CICSPlex SM is if your
WUI servers require additional import or export TDQs to make copying WUI view
or menu definitions easier. You can use the COVI and COVE definitions from
EYU$WDEF as a model. For example, if the WUI servers can access the same MVS
data sets, make your updates in this way:
1. Copy the COVI and COVE definitions from EYU$WDEF into a DFHCSD job.
2. Rename the COVE TDQ; for example, to MYEX. This TDQ definition must
have the data set name specified. Also, this data set must be preallocated using
data set characteristics.
3. Include the MYEX definition in a group that is to be used by the exporting
WUI.
4. Install the MYEX TDQ, after the definition has been made on the CSD in one of
these ways:
v A COLD start of the exporting WUI, if the group is in the exporting WUI's
group list, or
v CEDA INSTALL, if the WUI server is running.
5. Rename the COVI TDQ; for example, to MYIM. This TDQ definition must have
the same data set name specified on the MYEX TDQ definition.
6. Include the MYIM definition in a group that is to be used by the importing
WUI.
7. Install the MYIM TDQ, after the definition has been made on the CSD in one of
these ways:
v A COLD start of the importing WUI, if the group is in the importing WUI's
group list, or
v CEDA INSTALL, if the WUI server is running.
8. Use COVC, on the exporting WUI, to export the required definitions to the
MYEX TDQ. Wait for the Export to complete.
9. Use COVC, on the importing WUI, to import the required definitions to the
MYIM TDQ.
Chapter 38. Jobs for creating the CICS data sets 251
If the WUI servers cannot access the same data sets, the export data set must be
copied from the exporting system (after the COVC Export is complete) to the
importing system (before the COVC Import is run).
where:
STEPLIB
Identifies cics.index.SDFHLOAD as the CICS load library that contains the
DFHCSDUP module.
DFHCSD Identifies cics.dfhcsd as the CICS CSD file to be updated.
SYSIN Shows the SYSIN input for import and export transient data queues.
group_name
Identifies the name of your group.
list_name
Identifies the name of a CSD list, which you include on the GRPLIST
system initialization parameter for WUI server WUI A.
For information about TD queue definitions see “Transient data queue definitions
for the WUI” on page 330.
A return code of 4 is expected from this run of DFHCSDUP because, before adding
the designated group to the CSD, the job attempts to delete any group with the
same name.
You can amend the supplied definitions for a CMAS and MAS in the same way.
Run DFHCSDUP including the modified resource definition from the sample
EYU$CDEF, for a CMAS, or EYU$MDEF, for a MAS, in a CSD list that you use
when starting your system.
See Chapter 33, “Defining the logger environment for CICS,” on page 195 for
details on how to define log streams.
Do not operate the CMAS with log streams that are defined as DUMMY. Dummy
log streams can cause problems when recovering the CSD or CICSPlex SM data
repository (EYUDREP). See “CMAS journaling” on page 309 for details about the
various CMAS journaling options that you can activate.
Chapter 38. Jobs for creating the CICS data sets 253
254 CICS TS for z/OS 5.1: Installation Guide
Chapter 39. Adding CICS support for programming languages
You must add runtime support for the programming languages used with the
CICS command level (EXEC) programming interface before you can install your
application programs.
To write CICS application programs that request CICS services through the
command-level application programming interface (API), you can use Assembler
language, C and C++, COBOL, or PL/I.
The programming guidance documentation expects that your CICS system is using
the services of Language Environment, which provides a common runtime
environment for IBM implementations of Assembler and those high-level
languages (HLLs) supported by CICS, namely COBOL, PL/I, C, and C++.
Supported compilers are listed in High-level language support in What's new.
Language Environment initialization takes place during CICS startup, when CICS
issues the message DFHAP1203I applid Language Environment is being
initialized. The CEECCICS module is loaded, followed by a partition
initialization call, before the start of second phase PLT processing. If Language
Environment cannot successfully complete the initialization of all languages
supported by CICS, or can initialize only some of them, it issues messages to the
MVS console. If Language Environment initialization fails completely, it might be
because the CEECCICS module was not loaded, or something failed during the
loading of a particular language routine.
Use only these Language Environment runtime libraries for all your high-level
language application programs.
For your application programs, CICS can create and install program resource
definitions automatically, or you can create them specifically in the CSD, and
install them by using the GRPLIST system initialization parameter or CEDA INSTALL
command. For more information about installing program resource definitions, see
Resource management transaction CEDA commands in Reference -> System
definition.
For information about Language Environment, see the z/OS Language Environment
Customization manual.
CICS supports application programs written in C++ that meet these requirements:
v Are compiled using the IBM C/C++ for MVS compiler (5655-121)
v Run with the Language Environment runtime libraries
If you use Version 3 Release 2, or later, of the C/C++ compiler to compile a C++
program, specify the CXX parameter when options are passed to the compiler;
otherwise, the C compiler is invoked. Do not specify CXX if a C program is to be
compiled. See the C/C++ for MVS Compiler and Run-Time Migration Guide Version 3
Release 2 for further information.
PL/I support is also required if you use the web services support in CICS; in
particular, it is required if you use the supplied SOAP 1.1 and SOAP 1.2 message
handler programs.
Java programs run with Language Environment support using MVS services, not
CICS services. Java programs require the Language Environment support provided
by the SCEERUN and SCEERUN2 libraries only, which can either be defined in the
CICS STEPLIB or included in the MVS linklist. The SCEERUN and SCEERUN2
libraries must also be added to DFHRPL.
The sockets domain provides listener support and outbound sockets support.
The listener
The listener monitors specified TCP/IP ports for incoming requests. You
configure the listener with a TCPIPSERVICE resource definition to listen on
a specific TCP/IP port and to attach a specified request receiver transaction
to handle each connection. When the connection has been established
between a client program and a particular request receiver, all subsequent
requests from the client program over that connection flow to the same
request receiver. The listener supports user applications initiated by
TCP/IP services for the following protocols:
External Call Interface (ECI)
The ECI allows client applications to use a TCP/IP connection
directly to a CICS region. The External Presentation Interface (EPI)
and External Security Interface (ESI) are not supported.
See Using CICS Transaction Gateway resource adapters to call
CICS server programs for information about the External Call
Interface.
Hypertext Transfer Protocol (HTTP)
HTTP messages are received and sent over the Internet, using CICS
web support. See HTTP request and response processing for
CICS(r) as an HTTP client for information about the transmission
of HTTP messages on the web.
IP interconnectivity protocol (IPIC)
IPIC supports the following types of intercommunication functions
for their respective product releases:
v Distributed program link (DPL) calls between CICS TS 3.2 or
later regions.
v Distributed program link (DPL) calls between CICS TS and
TXSeries Version 7.1 or later.
v Asynchronous processing of EXEC CICS START, START CHANNEL,
and CANCEL commands, between CICS TS 4.1 or later regions.
v Transaction routing of 3270 terminals, where the
terminal-owning region (TOR) is uniquely identified by an
APPLID between CICS TS 4.1 or later regions.
v Enhanced method of routing transactions that are invoked by
EXEC CICS START commands between CICS TS 4.2 or later
regions.
v ECI requests from CICS Transaction Gateway Version 7.1 or later.
| v Function shipping of all file control, transient data, and
| temporary storage requests between CICS TS 4.2 or later regions.
| Function shipping of file control and temporary storage requests
NSINTERADDR n.n.n.n
where n.n.n.n is the dotted decimal address of the name server to be used.
If you do not include the DD name in the startup JCL, a number of system files
are searched until one is found.
The TCPIPSERVICE resource definitions are for use only with the CICS-provided
TCP/IP services, and are not related to the z/OS Communications Server IP CICS
TCP/IP connection balancing, for example TCP/IP port sharing, is not supported
using IPIC and can produce unexpected results when you are attempting to
acquire an IPIC connection.
Related information:
The external CICS interface (EXCI) uses a specialized form of MRO link to support
DCE remote procedure calls to CICS programs, and communication between z/OS
batch programs and CICS .
Provided you complete these steps, you can use MRO to communicate with all
supported levels of CICS.
For the hardware and software that are required for z/OS systems in a sysplex, see
.
For information about installing and managing MVS systems in a sysplex, see
z/OS MVS Setting Up a Sysplex.
DISPLAY XCF,GROUP,DFHIR001,ALL
Do not rely on the default value of MAXMEMBER, which might be too low to allow
all the CICS regions and EXCI users in the largest XCF group to join the group.
This is especially important if you have only a few CICS XCF groups.
Likewise, do not set a value much larger than you need, because this results in
large couple data sets for XCF. The larger the data set, the longer it takes to
locate entries.
Make the value of MAXMEMBER 10-15 greater than the combined number of CICS
regions and EXCI users in the largest CICS XCF group.
Results
Each CICS region joins an XCF group when it logs on to DFHIRP. Its member
name is its APPLID (NETNAME) used for MRO partners. The XCF group name is
specified on the XCFGROUP system initialization parameter. If XCFGROUP is not
specified, the XCF group name defaults to DFHIR000.
At connect time, CICS invokes the IXCQUERY macro to determine whether the
CICS region being connected to resides in the same MVS image. If it does, CICS
uses IRC or XM as the MRO access method, as defined in the connection
definition. If the partner resides in a different MVS image, CICS uses XCF as the
access method, regardless of the access method defined in the connection
definition.
CICS regions can use MRO or XCF/MRO to communicate only with regions in the
same XCF group. Members of different XCF groups cannot communicate using
MRO, or XCF/MRO, even if they are in the same MVS image.
For more information, see Chapter 28, “MVS cross-system MRO definitions,” on
page 181.
If you want a CICS region to establish MRO communication during startup, also
specify YES on the IRCSTART system initialization parameter.
Alternatively, after your CICS region is running, you can establish MRO
communication by using the CEMT SET IRC OPEN command or the EXEC CICS
SET IRC OPENSTATUS(cvda) command.
Either method establishes MRO communication with every CICS region that meets
the following criteria:
1. The MRO connection is currently active.
2. The MRO connection is defined to your region by CONNECTION and
SESSIONS definitions that are installed from the CSD. To establish MRO
communication between two CICS regions, the installed CONNECTION
definition must specify INSERVICE(YES) in both regions.
MRO can be used only for CICS-to-CICS connections in the same z/OS image or
z/OS sysplex. If you connect CICS to both CICS and non-CICS systems, and the
remote systems can be inside or outside the local z/OS sysplex, CICS offers
intersystem communication over SNA (ISC over SNA) and intersystem
communication over TCP/IP. Intersystem communication over TCP/IP is known as
IP interconnectivity (IPIC).
You must include the following management programs in your CICS regions, by
specifying the system initialization parameters that are given in parentheses:
v DFHISC – the intersystem communication program (ISC=YES).
v DFHTCP – the terminal control program (TCP=YES is the default).
If the z/OS Communications Server is started after CICS, opening the z/OS
Communications Server ACB fails, and you must open it using the z/OS
Communications Server CEMT SET VTAM OPEN command when the z/OS
Communications Server is available.
For more information about the SNA APPL statement, refer to the z/OS
Communications Server: SNA Resource Definition Reference.
For APPC sessions, you can use the MODENAME option of the CICS DEFINE SESSIONS
command to identify a z/OS Communications Server logmode entry that in turn
identifies the required entry in the z/OS Communications Server class-of-service
table.
Every modename that you supply, when you define a group of APPC sessions to
CICS, must be matched by a z/OS Communications Server LOGMODE name. You
need to create entries in the z/OS Communications Server LOGMODE table using
the following format:
MODEENT LOGMODE=modename
MODEEND
For CICS-to-IMS links that are cross-domain, you must associate the IMS
LOGMODE entry with the CICS APPLID, using the DLOGMOD or MODETAB
parameters.
IMS allows the user to specify some BIND parameters in a z/OS Communications
Server logmode table entry. The CICS logmode table entry must match that of the
IMS system.
IMS uses, in order of priority, the mode table entry specified in the following
places:
1. The MODETBL parameter of the TERMINAL macro
2. The mode table entry specified in CINIT
3. The DLOGMODE parameter in the VTAMLST APPL statement or the MODE
parameter in the IMS /OPNDST command
4. The ACF/SNA defaults.
The NAME macro defines the logical terminal names associated with the subpool.
Multiple LTERMs can be defined per subpool.
COMPT={1|2|3|4}
Specifies the output component associated with this session. The component
specified determines the protocol that IMS ISC uses to process messages. An
output component defined as SINGLE1 is strongly recommended.
ICOMPT={1|2|3|4}
Specifies the input component associated with this session. When IMS receives
a message, it determines the input source terminal by finding the NAME
macro that has the matching input component number. A COMPT1 input
component must be defined for each session that CICS uses to send START
commands.
EDIT=[{NO|YES}][,{ULC|UC}]
The first parameter specifies whether the user-supplied logical terminal edit
routine (DFSCNTEO) is to be used.
The second parameter specifies whether the output is to be translated to
uppercase (UC) or not (ULC) before transmission.
The TERMINAL macro identifies the remote CICS system to IMS. It is comparable
to DEFINE CONNECTION in CICS.
TRANSRESP is recommended.
OPTIONS=[OPNDST|NOPNDST]
Specifies whether sessions can be established from this IMS system. OPNDST
is recommended.
{COMPT1|COMPT2|COMPT3|COMPT4}={SINGLEn|MULTn}
Specifies the IMS components for the IMS ISC node. Up to four components
The TYPE macro specifies the terminal type. Parameters of the TERMINAL macro
can also be specified in the TYPE macro if they are common to all the terminals
defined for this type.
UNITYPE=LUTYPE6
Must be specified for ISC.
The VTAMPOOL macro heads the list of SUBPOOL macros that define the
individual sessions to the remote system.
Procedure
1. Ensure that all of the required Java components are installed in the correct
locations on your CICS system. You can use the checklist in “Verifying Java
components checklist.”
2. Authorize the hlq.SDFJAUTH library, as described in “Authorizing the
hlq.SDFJAUTH library” on page 276.
What to do next
When you have verified that your Java components are correctly installed, set up
your Java environment for CICS as described in Setting up Java support in
Configuring.
Check that the IBM 64-bit SDK for z/OS, Java Technology Edition is installed in
z/OS UNIX. CICS Transaction Server for z/OS, Version 5 Release 1 uses Version 7
of the IBM 64-bit SDK for z/OS, Java Technology Edition for Java support. CICS
TS for z/OS, Version 5.1 supports only the 64-bit version of the SDK and not the
31-bit version.
The JAVADIR parameter of the DFHISTAR installation job for CICS specifies the
location for the IBM SDK for z/OS. This parameter is used to customize the
sample JVM profiles and Java security policy, so that they point to the SDK
installation. The value in the JVM profiles determines the SDK that is used for Java
support in a CICS region.
The default for the JAVADIR parameter is java/J7.0_64. This value is appended to
/pathprefix/usr/lpp/ to specify the default location for Version 7 of the IBM
64-bit SDK for z/OS, Java Technology Edition.
The CICS components for Java are installed during the installation process.
Confirm that they are all present in the specified locations. z/OS UNIX System
Services must be active in full function mode during the installation process to
enable files to be stored in its file system.
For all z/OS UNIX files, case is important. CICS does not automatically convert
the name of these files to uppercase. When you use the name of a JVM profile
anywhere in CICS, you must enter it using the same combination of uppercase and
lowercase characters that is present in the z/OS UNIX file name.
A separate library is required because these components are built using XPLINK
(Extra Performance Linkage).
The procedure for authorizing the SDFHAUTH library is described in Chapter 13,
“Authorizing the CICS and CICSPlex SM libraries,” on page 97. Follow the same
procedure to authorize the SDFJAUTH library.
For information about appropriate versions and releases, see Overview of Database
Control (DBCTL) in Product overview. As they become available, versions of IMS
newer than those versions listed are also compatible.
You can use DL/I support with CICS through these methods:
v Database control (DBCTL)
v CICS remote DL/I support, also known as function shipping
The IMS libraries referred to in the job streams are identified by IMS.libnam; for
example, IMS.PGMLIB. If you use your own naming convention for IMS libraries,
rename the IMS libraries accordingly.
CICS support for access to DL/I databases using the IBM Information
Management System (IMS) product is included in the base product. No specific
installation is required.
For information about adding system and resource definitions for use with DBCTL,
see the CICS IMS Database Control Guide.
Your CICS region requires a PDIR to access a database owned by a remote CICS
region. Your CICS region does not require a PDIR to access a DL/I database
owned by DBCTL. For information about accessing DL/I databases owned by
DBCTL, see the CICS IMS Database Control Guide.
The modules that provide remote DL/I support are automatically loaded by CICS
during startup when a DL/I PSB directory is specified with the PDIR= system
initialization parameter.
Usually, you use remote DL/I support, with either MRO or ISC connections, to
access databases owned by another CICS region. You can also use CICS remote
DL/I support to access, through another CICS region connected to DBCTL,
databases owned by DBCTL. CICS regions accessing databases owned by DBCTL
(that is, connected to DBCTL) must be running on the same MVS image as the
DBCTL system. An overview is given in Figure 21.
Figure 21. Using CICS remote DL/I support to access DBCTL databases
For information about accessing DL/I databases owned by DBCTL, see the CICS
IMS Database Control Guide.
You code entries in a program specification block directory (PDIR), to indicate the
identity of the remote CICS region, or regions, to which you want CICS to function
ship DL/I requests.
The following summary of the DL/I parameters specifies the parameters that you
can, or must, code as CICS system initialization parameters:
v PDIR={YES|xx} Suffix of PSB directory (mandatory for remote DL/I)
v PSBCHK={NO|YES} Security check on remote terminals starting transactions
These programs have access to most EXEC CICS commands, the CICS CEDA and
CEMT transactions, and DB2 databases through the EXEC SQL interface.
The next topics explain how you can customize your information for REXX and
configure your CICS system to provide the facilities of REXX for CICS.
The CICRDOR job, for the Runtime Facility, or the CICRDOD job, for Development
System, in the CICSTS51.REXX.SCICJCL data set adds the entries that the product
requires, including REXX/CICS profiles, VSAM files, programs, transactions, and
transient data queues.
The transient data queues are used for REXX/CICS IMPORT and EXPORT
commands. The jobs also contain the definitions for the REXX/CICS SQL interface
that authorize the transactions to the DB2 plan.
1. Review “Changing supplied CICS transaction codes” if you plan to modify the
transaction IDs and also review “Defining RFS filepools” on page 284 if you
plan to change the REXX file system (RFS) pool names or the number of pools
to install.
2. Edit the JCL, ensuring that you uncomment the entries as explained in
comments at the beginning of the JCL, and run the job.
When you have completed these steps, you can verify that the installation has been
successful, by entering CALL CICIVP1 from the interactive REXX environment. The
exec indicates what is happening.
You can change the names of the supplied transaction IDs, and you can add
additional transactions that call your own EXEC commands.
v The DEFTRNID commands in the CICSTART member, in the
CICSTS51.REXX.SCICEXEC data set, define the supplied transaction IDs REXX,
EDIT, and FLST, and associate them with their EXEC commands.
If you choose to change the supplied entries, make sure that you update the
resource definitions to match your changes. If you do not want users to call the
editor or file list EXEC commands directly from CICS, you can delete the
DEFTRNID commands, for either or both of them, from CICSTART and also
from the resource definitions. Users are not allowed access to these commands
directly from CICS. Ensure that you do not remove the DEFTRNID statement for
the CICRXTRY command.
v If you want to add additional transactions that call your own EXEC commands
directly from CICS, add resource definitions for the transaction IDs and add
further DEFTRNID commands to your CICSTART command. Your newly
defined transactions become available to your users when you restart your CICS
system. An authorized user can enter the DEFTRNID command directly to give
immediate availability, but, until the CICSTART member is changed, these
definitions are lost when CICS is restarted.
If you want to add additional RFS filepools to your system, you must add resource
definitions and add FILEPOOL DEFINE commands to your CICSTART member. If
you intend to allow users to add RFS files to the new filepool, you must define the
filepool to include a \USERS directory.
To make these new filepools available for use, restart CICS. However, you can also
add filepools while your CICS system is active:
1. Add the RDS definitions for the new files and define them using a batch job.
2. Get an authorized user to enter the FILEPOOL DEFINE command and the
FILEPOOL FORMAT command.
3. Modify CICSTART or you will lose your new definitions when you restart your
CICS system.
You receive a condition code of 8 for the delete control statements if the VSAM
data sets do not exist. You receive a condition code of 0 for the define cluster
control statements if the job runs correctly.
Modify the number of TDQ entries to suit your requirements, but allow for at least
one input and one output entry. The TDQUEUE NAME must begin with REX and
be suffixed with a valid character. Do not have other applications using TDQUEUE
names that begin with REX, because IMPORT and EXPORT use them and can
cause files to become corrupted.
The first three of these transactions are REXX for CICS transactions and the DXB0
transaction is added if you have OfficeVision/MVS and want to use DB2 interface
If you implement new transactions that use the DB2 interface code, also add these
DB2 entry definitions to your resource definition group.
The CICBIND job in the CICSTS51.REXX.SCICJCL data set binds CICSQL to the
correct DB2 plan. Edit and run the job.
You might receive condition code 4 for the job depending on the level of DB2
being used.
The facilities used to access these data set concatenations use CICS WAIT
EXTERNAL capabilities to avoid placing the CICS region into a wait.
Each user must be uniquely identified and each user must be signed on to the
REXX Development System only once. Two users with the same user ID operating
at the same time can create unusual results.
If a user is not signed on to the CICS region, then the special user ID of
“*RCUSER*” is used to access the RLS and RFS facilities.
Authorized users are identified to the REXX Development System through the
AUTHUSER command. This command is an authorized command and can be used
only by an authorized user or an exec that is authorized to use authorized
commands. CICSTART is such an exec because it is in the CICEXEC DD name
concatenation.
You can also call another exec, in the CICEXEC concatenation, which can contain
the user IDs of the authorized users.
With the REXX Development System, you can run programs in either
pseudo-conversational or conversational mode. The system default for
conversational mode is specified by the SETSYS PSEUDO statement in the
CICSTART member, in the CICSTS51.REXX.SCICEXEC data set. The default
supplied allows you to use the pseudo-conversational mode. CICSTART must run
in conversational mode because the system has not yet been fully initialized to
ensure correct operation.
The CICSTART member also contains EXECLOAD commands that are commented
as shipped. Execs using EXECLOAD reduce the amount of storage used by the
REXX Development System because users share the same exec. Performance might
improve because these execs are not loaded into CICS memory each time they are
run. Execs using EXECLOAD are always used before other execs. Name your
programs carefully because, if you have two execs with the same name, one which
resides in your RFS current directory, and one of which uses EXECLOAD, you
In these steps, if PTF maintenance has been applied that affects data sets for this
procedure, use the target library. Otherwise, use the distribution library.
1. Modify the CICSTART member in the CICSTS51.REXX.SCICEXEC data set to
reflect the correct RFS filepool and path where the online help files are. If you
choose to use the default, no changes to CICSTART are necessary.
2. Copy the supplied CICSTS51.REXX.SCICDOC data set to a data set with a
highest level data set qualifier that matches the user ID of the user who runs
the CICHPREP exec. The reason for this is that the supplied security exit for
the REXX/CICS IMPORT and EXPORT commands checks the highest level
qualifier and it must match the user ID for the user who issues the IMPORT
command.
3. Copy the supplied CICSTS51.REXX.SCICPNL data set to a data set with a
highest level data set qualifier that matches the user ID of the user who runs
For a summary of the CMAS setup tasks that you use while performing them, see
“CICSPlex SM setup checklist and worksheets” on page 11.
Check the IEASYSxx member of SYS1.PARMLIB that you use for MVS initialization
and make note of the initialization values that are referenced during installation.
For details about the initialization values, see “Noting IEASYSxx values for
CICSPlex SM” on page 117.
A CICSPlex SM CMAS runs only in a CICS system at the same release level. For
example, a CICS TS 5.1 CMAS runs only in a CICS TS 5.1 region. During startup,
the CMAS checks the CICS release level and ends with message EYUXL0142 if the
releases do not match. Managed CICS CICS systems do not have the same
restriction.
CICSPlex SM uses these dataspaces to allow quick access to data from a CMAS
and the MASs attached to it. Although the data spaces are logically owned by the
CMAS, they are physically owned by the ESSS address space (EYUX510). The data
spaces are deleted when the CMAS, which logically owns the data spaces, and all
local MASs that are attached to that CMAS are stopped. The data spaces are
re-created when the CMAS is initialized again.
The size of the data spaces depends on the amount of work (such as end-user
interface, workload management, MAS resource monitoring, and real-time analysis
processing) that the CMAS is performing and the number of MASs connected to
the CMAS. The size ranges from 20 MB of storage in a relatively idle CICSPlex SM
configuration to well over 100 MB of storage in a configuration that is complex in
both the number of MASs and the amount of work requested. If you do not
prepare for such an increase in storage usage, you might encounter auxiliary
storage shortages when you first start to use CICSPlex SM.
If you contact IBM support personnel because of auxiliary storage shortages, you
might be asked to use CICSPlex SM online debugging transactions (COD0 and
CODB) to evaluate the storage use of EYUX510. For information about the COD0
and CODB transactions, see Using the interactive debugging transactions (COD0
and CODB)l.
If auxiliary storage shortages do occur, you can alleviate the problem by either
dynamically increasing your auxiliary storage capability or by causing
CICSPlex SM to free the allocated data spaces:
1. To dynamically increase auxiliary storage capacity, allocate an additional page
data set, and then use the MVS console command PAGEADD to make the new
page data set available.
2. To cause CICSPlex SM to free the allocated data spaces, first stop the
CICSPlex SM agent in all local MASs connected to the CMAS. To stop the
agent, use the COSH transaction for each MAS or, if the MAS is a WUI server,
use the COVC and COSH transactions.
If a local MAS is acting as a CICSPlex SM WLM TOR, and the DTR program is
specified as EYU9XLOP for that MAS, you must change the DTR program from
EYU9XLOP before you can use the COSH transaction against that MAS. For
example, you can change it to the IBM default program DFHDYP.
3. After the CICSPlex SM agent is stopped in all local MASs, stop the CMAS
itself using the COSD transaction.
4. After the auxiliary storage capability is increased, you can restart the CMAS. To
reconnect any local MASs that remained active after the CICSPlex SM agent
was stopped, run the COLM transaction in those CICS regions.
You can run COLM using a modify command from the CONSOLE.
To be sure that an IBM Tivoli NetView system is ready to receive the alerts, use the
NPDA command:
DFILTER AREC
This command verifies that the Event Type record IMPD is being passed to the
IBM Tivoli NetView database in the IBM Tivoli NetView system.
The resulting list shows an ACTION of PASS for ETYPES of IMPD and RSLV.
If you need to add these record types to the filter, you can issue the following
NPDA commands:
SRFILTER AREC PASS E IMPD
SRFILTER AREC PASS E RSLV
If the name of the IBM Tivoli NetView Alert Receiver has been changed from the
default value (NETVALRT), you can use the CICSPlex SM system parameter
Whichever method you use to start a CMAS, you must verify that the procedure
references the appropriate parameters:
v CICS SIT parameters, as described in “CMAS-related CICS system initialization
parameters” on page 303.
v CICSPlex SM startup parameters, as described in Chapter 48, “CICSPlex SM
system parameters,” on page 347.
After you start a CMAS for the first time, you must configure the CMAS to your
environment. This configuration includes establishing the CICSplexes that the
CMAS is to manage, and any communication links that are required between this
CMAS and another CMAS.
You must create the data sets for this CICS region. JCL to create the CICS region
data sets for the CMAS is supplied in the EYUCMSDS member of
CICSTS51.CPSM.XDFHINST. This member was generated when you ran the
DFHISTAR job.
Review the following statements in the sample JCL that are illustrated in Figure 22.
Verify that the JCL has been modified as follows:
EXEC PGM=EYU9XECS statement
Starts the CMAS and either verifies the existence of, or creates, the ESSS.
EYU9XECS, the CMAS startup program, must be run so that the CMAS
initializes.
STEPLIB DD statement
Includes the CICSTS51.CPSM.SEYUAUTH authorized load library.
DFHRPL DD statement
Includes the CICSTS51.CPSM.SEYULOAD load library. Include the load
library that contains the CICS resource definition table load modules.
These must be link-edited into a user-supplied load library, which you
specify in the DFHRPL concatenation.
Do not include application load libraries in the DFHRPL concatenation.
SYSIN DD statement
Identifies the library member that contains the CICS system initialization
override parameters.
| The alternate data repository file definition, EYUDREPN, is used by the CMAS in
| situations where logging are not needed. The current functions that bypass logging
| are importing or adding a CICSplex, and removing or deleting a CICSplex. In
| these situations, no backout is necessary, therefore no logging is required. Do not
| modify the recovery attributes of the EYUDREPN file definition.
The data repository is defined to CICS as being a recoverable file that participates
in SYNCPOINT and SYNCPOINT ROLLBACK operations. The CMAS must have a
CICS system log so that these operations work correctly. Do not, therefore, run a
CMAS with a system log that is defined as type DUMMY because you will
compromise data integrity on the CICSPlex SM data repository.
To create the data set that contains the data repository, you can use the
EYUCMSDS postinstallation job.
To ensure that you do not overwrite your existing customized jobs, you can use
the SELECT parameter, as described in Chapter 45, “Setting up a CICSPlex SM
address space (CMAS),” on page 291. Alternatively, if you prefer not to resubmit
DFHISTAR, you can edit the EYUCMSDS job, giving the SYSIDNT and
CMASNAME parameters unique names each time you run the job.
The EYUCMSDS job includes the following steps relating to the creation of the
data repository:
DELDREP
This step deletes the data repository set. It allows you to resubmit the job.
DEFDREP
This step allocates the VSAM KSDS cluster for the data repository data set:
dsindex.EYUDREP.cmasname
dsindex
Is defined by the DSINFO parameter of the DFHISTAR job.
cmasname
Is defined by the CMASNAME parameter of the DFHISTAR job.
CICSPlex SM does not support VSAM records that span control intervals.
Make sure that the IDCAMS job that you use to create a CICSPlex SM data
repository does not specify the SPANNED parameter. Accept the IDCAMS
default of nonspanned records.
DREPINIT
This step is used to set up the data repository for a CICS TS for z/OS,
Version 5.1 CMAS.
The DREPINIT step is generated in the EYUCMSDS job if you did not
specify a value with the OLDDREP parameter when you ran the
DFHISTAR job. This step runs EYU9XDUT to initialize the new data
repository that was allocated by step DREPALOC. The new data repository
does not contain any records from a previous version of CICSPlex SM. The
EYU9XDUT utility uses the following parameters for step DREPINIT:
CMASNAME=xxxxxxxx
v You cannot change this name after the data repository is
initialized.
v This name must be unique in the CICSPlex SM environment. Do
not use the same name as that of another CMAS, a CICSplex, a
CICS system, or a CICS system group.
v Position 1 must be alphabetic or national, and cannot be
numeric.
v Positions 2 through 8 can be alphabetic, national, or numeric.
SYSID=xxxx
v You cannot change this identifier after the data repository is
initialized.
v This value must match the SYSIDNT (SIT parameter) for the
CMAS; see “CMAS-related CICS system initialization
parameters” on page 303.
The first time that you start a CMAS, ensure the CICS
global and local catalog data sets are newly initialized.
Use DFHRMUTL and DFHCCUTL respectively, with
AUTOINIT on the SET_AUTO_START parameter of
DFHRMUTL, to make sure that the CMAS performs an
initial start, which installs the necessary CICS resource
definitions and establishes CMAS-to-CMAS connections.
You can use the following techniques for taking copies of the data repository and
for restoring the data repository after a data set failure.
v Use HSM, or DSS, or other utilities to take copies while the associated CMAS is
not running, possibly using the Concurrent Copy technique to reduce the time
during which the repository is unavailable.
v Use HSM or DSS to take copies while the associated CMAS is running using the
Backup While Open technique, and possibly also using the Concurrent Copy
technique, which improves the ease of use of Backup While Open. This
procedure requires a forward recovery log; see “Defining a forward recovery log
for the data repository.”
v Use HSM or DSS to restore the data set after a data set failure.
v Use a Forward Recovery product, such as CICS VSAM Recovery (CICS/VR), to
reapply updates that were made to the data set after the most recent copy was
taken. This procedure requires a forward recovery log.
v Use remote site recovery techniques if you require an up-to-date copy of the
data set at a remote site for disaster recovery purposes. This requires a forward
recovery log.
The CICS Recovery and Restart Guide provides information on all the terms referred
to above. In particular, it provides information about forward recovery logs,
forward recovery, the CICS/VR product, Backup While Open, Concurrent Copy
and its associated hardware prerequisites, taking backups of data sets, restoring
data sets from backup copies, and remote site recovery.
If you use forward recovery, you require a journal logstream. Defining and setting
up CICS log streams is described in Planning log streams for use by your forward
recovery logs.
If you want to use forward recovery, Backup While Open, or remote site recovery,
change the definition of EYUDREP. Specify the following keywords on the
definition of EYUDREP to define it as having a forward recovery log:
See “Overriding the dynamically created CICS resource definitions for CICSPlex
SM” on page 250 for an example of how to do this.
The default definition of EYUDREP also does not define the repository as being
eligible for Backup While Open. To make the repository eligible for Backup While
Open, specify the following keywords:
RECOVERY(ALL)
FWDRECOVLOG(nn)
BACKUPTYPE(DYNAMIC)
When the CMAS is to connect to a MAS for which security is active (the CICS
system initialization parameter for the MAS is SEC=YES), the CMAS must have
CICSPlex SM security active. When CICSPlex SM security is not activated in the
CMAS, the connection between the CMAS and the MAS cannot be established. If
the connection is attempted, the following message is issued to the console, the
CMAS joblog, and the CMAS EYULOG:
EYUCR0007E Security mismatch between CMAS cmasname and
MAS masname. Connection terminating.
The first time that you start a CMAS, ensure the CICS
global and local catalog data sets are newly initialized.
Use DFHRMUTL and DFHCCUTL respectively, with
AUTOINIT on the SET_AUTO_START parameter of
DFHRMUTL, to make sure that the CMAS performs an
initial start, which installs the necessary CICS resource
definitions and establishes CMAS-to-CMAS connections.
Although a CMAS can self-regulate its tasking model and has tolerance of delayed
requests and responses through timeout mechanisms, maximum user tasks (MXT)
does not apply to controlling an interdependent multitasked asynchronous tasking
model. Set inappropriately, you might also experience WUI hanging for long
durations if one or more of the asynchronous tasks required to run the requested
function is delayed waiting for an MXT slot. Set MXT to avoid delays in task
attachment.
As task usage in a CMAS grows with the additional requirements that are placed
on it, for example, increased use of the API, more CMASs, more MASs, and new
function use, set the MXT value to a level that continues to avoid MXT delays.
Monitor any MXT value for its relationship against the task activity in each CMAS
at regular intervals. If the CMAS is starting to experience MXT delays, adjust the
MXT value to avoid these delays.
To monitor the tasking activity in an individual CMAS, collect and study the
statistics generated by the CICS system that underlies the CMAS that it hosts. CICS
transaction manager global statistics contain information on the effect the MXT
value has on task attachment.
When you run DFHISTAR, with a SCOPE of POST or ALL, it creates the following
postinstallation members for a CMAS in the XDFHINST library:
v EYUCMSDS – creates and initializes all the data sets for a CMAS. EYUCMSDS
includes steps to delete the data sets so that you can rerun the job, if required.
These deletions are expected to fail the first time you run the job. EYUCMSDS
contains the following steps:
1. DELDREP and DEFDREP delete and define a new CMAS data repository.
2. DREPINIT is included if you do not specify the DFHISTAR OLDDREP
parameter. It initializes the new CMAS data repository using the
EYU9XDUT utility. EYU9XDUT creates records on the data repository to
define the CMAS and, by default, a WUI CICSplex. A WUI CICSplex is not
created if you specify the DFHISTAR WUI=NO option.
3. DREPCNVT is included if you specify the name of an existing data
repository using the DFHISTAR OLDDREP parameter. It copies all the
records from the existing repository to the new data repository, upgrading
them to a format suitable for the CICS TS for z/OS, Version 5.1 release.
4. DELREGDS deletes the CICS data sets.
5. DEFTRACE defines the CICS auxiliary trace data sets, DFHAUXT and
DFHBUXT.
6. DEFHTML defines the CICS DFHHTML data set.
If you use the default values for the CICSPlex SM parameters, the EYUCMASP
PROC statement is shown in the following code sample:
EYUCMASP PROC DSNCSD=’CICSTS51.CPSM.CMAS01.DFHCSD’,
RGNHLQ=’CICSTS51.CPSM.CMAS01’,
CICSHLQ=’CICSTS51.CICS’,
CPSMHLQ=’CICSTS51.CPSM’,
PRMLIB=’CICSTS51.XDFHINST’
CICSPRM=EYUCMSSP, CICS Parameters
CPSMPRM=EYUCMS0P CPSM Parameters
You can use DFHISTAR to generate copies of the CMAS postinstallation jobs for a
different CMAS. DFHISTAR has a SELECT parameter that allows you to specify a
new name for a copy of a postinstallation job. It has the format:
SELECT jobname newname
jobname
Is the name of the job you want to regenerate.
newname
Is the name for the new copy.
You can specify more than one SELECT parameter to select multiple jobs to be
regenerated in a single run of the DFHISTAR job. When you include a SELECT
parameter in the DFHISTAR job, only those jobs specified by the SELECT are
generated.
For a CMAS with the name CMAS02 and a CICS system identifier of CM02, you
can change your DFHISTAR parameters to specify the following values:
CMASNAME CMAS02
CMSSYSID CM02
WUI YES
WUIPLEX WUIPCM02
Using these parameters, CM02CMDS includes a step to initialize the CMAS data
repository with the definitions for a WUI called WUINCM02, in a CICSplex called
WUIPCM02. You can then start CMAS CMAS02, using the procedure EYUCMASP,
to specify these parameters:
START EYUCMASP, DSNCSD=’CICSTS51.CPSM.CMAS02.DFHCSD’,
RGNHLQ=’CICSTS51.CPSM.CMAS02’, CICSHLQ=’CICSTS51.CICS’,
CPSMHLQ=’CICSTS51.CPSM’, PRMLIB=’CICSTS51.XDFHINST’
CICSPRM=CM02CMSP, CPSMPRM=CM02CM0P
If you are using EYUCMASJ to start the WUI, edit it to specify these values:
CICSPRM=CM02CMSP, CPSMPRM=CM02CM0P
CICS storage use in a CMAS grows with the additional requirements that are
placed on it. For example, CICS storage use increases with increased use of the
API, more CMASs, more MASs, increased CMAS-to-CMAS network traffic, and
new function uses.
The overall limit for the extended dynamic storage area (EDSA) is specified by the
EDSALIM value. Set EDSALIM to a value that provides the CMAS with enough
storage to operate unimpeded. In particular, sufficient storage for CMAS-to-CMAS
and CMAS-to-MAS network traffic is critical to WUI response times, because large
amounts of data might be awaiting shipment on any of the links on which a
CMAS communicates.
Monitor any EDSALIM value for its effect on the storage use in each CMAS at
regular intervals. If the CMAS experiences short on storage (SOS) conditions or
storage fragmentation, or there is a trend towards such conditions, consider
increasing the EDSALIM value to meet the storage requirements of the CMAS.
Storage fragmentation below a largest free area of 64 KB can adversely affect
throughput and response times.
CMAS journaling
A CMAS can produce CICS journal records to track a variety of activities in the
CICSplex. These journal records provide an audit trail that can aid in the recovery
of data or the reconstruction of events that affected the CICSplex.
To force the buffer to be flushed to a log stream when the CICS region is still
active, you can specify the WAIT option on the WRITE JOURNALNAME
command using EXEC CICS or the CECI transaction.
To request one or more of the record types, specify the appropriate CICSPlex SM
system parameters in the startup JCL of a CMAS:
JRNLDEFCH(YES)
For data repository definition changes
JRNLOPACT(YES)
For operations actions
JRNLRTAEV(YES)
For real-time analysis events
For more information on these parameters, see Chapter 48, “CICSPlex SM system
parameters,” on page 347.
If you do not want to use the default log stream name of EYUJRNL, define a
JOURNALMODEL resource in the CSD that has the desired log stream name.
v To make the JOURNALMODEL resource definition available during CMAS
initialization, include the JOURNALMODEL resource definition in a CSD group
list. Include this group list in your CMAS startup using the system initialization
GRPLIST parameter.
v To add the JOURNALMODEL resource to the CSD, either edit and run the JCL
contained in sample member CICSTS51.CPSM.SEYUSAMP(EYUJRNE$) to run
batch utility DFHCSDUP or use the CICS CEDA transaction.
v You must also update the CICS system initialization parameters used to start the
CMAS by setting the GRPLIST parameter to reference the new group list.
The journal records produced by a CMAS contain data mapped by a DSECT called
EYUBCPJR. Each record consists of a standard prefix and a variable data area. The
contents of the data area are specific to the type of journal record being written.
*---------------------------------------------------------------------*
* Data record for RTA Events *
*---------------------------------------------------------------------*
CPJR_RTA_DATA DS 0H
CPJR_RTA_TYPE DS X Record type
CPJR_RTATYPE_CRT EQU 0001 Event Created
CPJR_RTATYPE_REM EQU 0002 Event Removed
CPJR_RTATYPE_UPD EQU 0003 Event Updated
CPJR_RTATYPE_RES EQU 0004 Event Resolved
CPJR_RTA_GTYPE DS X Generated by type
CPJR_RTAGTYPE_SAM EQU 0001 Event produced by Sam
CPJR_RTAGTYPE_APM EQU 0002 Event produced by Apm
CPJR_RTAGTYPE_MRM EQU 0003 Event produced by Mrm
CPJR_RTA_EVENT DS CL8 Event Name
CPJR_RTA_MSGSTRT DS CL30 External Entry Message
CPJR_RTA_MSGEND DS CL30 External Exit Message
CPJR_RTA_EVENTXT DS CL30 Event Text
CPJR_RTA_SEVERITY DS CL3 Severity Level
CPJR_RTA_DATA_L EQU *-CPJR_RTA_DATA Length of the record
CPJR_DEF_DATA DS 0H
CPJR_DEF_TYPE DS X Record type
CPJR_DEFTYPE_ADD EQU 0001 Definition Added
CPJR_DEFTYPE_DEL EQU 0002 Definition Deleted
CPJR_DEFTYPE_UPD EQU 0003 Definition Update
DS X Reserved
CPJR_DEF_MAJORNM DS CL8 Major Name
CPJR_DEF_MAJORID DS CL8 ADMIN Restype
CPJR_DEF_MAJORVR DS XL4 Major Version
CPJR_DEF_MAJORVR_NONE EQU -1 Major Version None
CPJR_DEF_MINORNM DS CL8 Minor Name
CPJR_DEF_MINORID DS CL8 ADMIN Restype
CPJR_DEF_MINORVR DS XL4 Minor Version
CPJR_DEF_MINORVR_NONE EQU -1 Minor Version None
CPJR_DEF_SYSID DS CL8 System Id where change x
was originated
CPJR_DEF_DATA_L EQU *-CPJR_DEF_DATA Length of the record
*---------------------------------------------------------------------*
* Data record for Operation commands *
*---------------------------------------------------------------------*
CPJR_OPS_DATA DS 0H
CPJR_OPS_LENGTH DS H Length of fixed and variable x
portion of data area
CPJR_OPS_NUMFLDS DS H Number of fields
CPJR_ACTION DS CL12 Name of action
For information about writing a program to access and format CICS journal
records, see The CICS log manager.
You can use the CMASSTOP command of the CODB system-level debugging
transaction to shut down the CMAS, but CODB is restricted and must be used
only at the request of IBM customer support personnel. Do not attempt to shut
down a CMAS in these ways:
v Issue the CEMT PERFORM SHUTDOWN command against a CMAS
v Cancel the CMAS job from MVS
If you take either of these actions, the CMAS cannot shut itself down properly.
You can issue the transaction ID, COSD, from any terminal, including an MVS
console:
COSD
Restarting a CMAS
You can restart a CMAS automatically, by performing a cold restart, or by doing an
emergency restart.
Automatic restart
You can perform an automatic restart for a CMAS that you stopped normally
either with the COSD transaction, or the WUI SHUTDOWN button. Automated
restart is the preferred way of restarting a CMAS because it delegates the decision
on whether to do an initial, cold, warm or emergency restart to CICS. CICS makes
the decision by inspecting two records in the global catalog: the recovery manager
control record, and the recovery manager autostart override record.
To do an automatic restart:
v Specify the AUTO option on the START system initialization parameter.
Cold restart
A manual cold restart is necessary if you have modified any of the CICS resource
definitions that are used by the CMAS. You must also perform a manual cold
restart if you have added or removed any of the CMAS-to-CMAS (CMTCMDEF)
connection definitions.
To do a cold restart:
v Specify the COLD option on the START system initialization parameter.
A manual emergency restart is necessary if a CMAS ends abnormally (in any way
other than from the COSD transaction, or from using the WUI SHUTDOWN
button). During an emergency restart, CICS performs essential backout processing.
If the CMAS is registered with the MVS automatic restart manager (ARM), an
emergency restart occurs automatically. If the CMAS is not registered with ARM
you must perform the emergency restart yourself.
To do an emergency restart:
v Specify the AUTO option on the START system initialization parameter.
If you have made changes since the last run of the CMAS (that is, the run that
ended abnormally), the CMAS might not function properly. In this situation, you
must shut down the CMAS using either the COSD transaction, or the
WUI SHUTDOWN button and restart the CMAS, specifying the START=COLD
option. For information about shutting down a CMAS, see “Shutting down a
CMAS” on page 312.
To set up your CICS system to act as a Web User Interface server, follow these
steps:
1. Create the CICS system and confirm that it is operational using the
CICS-supplied installation verification procedures.
2. Configure a separate CICSplex for your Web User Interface servers.
3. Ensure that the CMAS to which the Web User Interface connects is managing
all CICSplexes to which the Web User Interface server requires access, because
the Web User Interface server acts as an CICSPlex SM API application.
However, the CMAS, to which the Web User Interface connects, does not have
to manage any of the MASs in these CICSplexes.
Configuring CICS to use SSL explains the additional configuration that is required
if you want to use the secure sockets layer (SSL).
Code EYU9VKEC to represent the language of the Web User Interface server and
EYU9VWAN to represent the code page of the client on the INITPARM parameter.
You can select the server language and the client code page from Table 23 and
specify them on the INITPARM parameter:
INITPARM=(EYU9VKEC=’xxx’,EYU9VWAN=’yyyy’)
xxx is the language identifier of the Web User Interface server and yyyy is the code
page identifier of the client.
Table 23. Language and code page identifiers for INITPARM
Language identifier Default client code
(EYU9VKEC) page identifier
Language Client code page (EYU9VWAN)
US English ENU ISO-8859-1 (819) ENU1
Japanese JPN Shift-JIS (943) JPN1
Simplified Chinese CHS GB2312 (1381) CHS1
Simplified Chinese CHS GB18030 (05488) CHS2
For example, if your chosen language is English, code the INITPARM parameter:
INITPARM=(EYU9VKEC=’ENU’,EYU9VWAN=’ENU1’)
1. You can override the code page identifier for individual user requests by
placing it in the web address used to access the Web User Interface, as shown
in this example:
http://hostname:port/CICSPlexSM/codepage
If you use your own version of the DFHCNV source module, assemble and
link-edit it using the CICS procedures for maintaining conversion table load
modules.
You do not have to include a copy statement for EYU$CNV1 in the DFHCNV
source.
Note: You should use the DFHCNVW $ sample not the EYU$CNV1 sample. The
EYU$CNV1 sample is included just to show what the CPSM conversion definitions
are, however the definitions are generated automatically by the DFHCNV macro
and do not have to be explicitly added to any DFHCNV table. The DFHCNV table
included with CICS also contains entries for DFHWBUD and DFHWBHH, but the
only time you should modify these particular entries is when using different code
pages.
You can use the IDCAMS utility to create a VSAM file for these definitions:
DEFINE CLUSTER ( -
NAME( dsname ) -
VOLUMES( dsvol ) -
RECORDS( 5000 5000 ) -
RECORDSIZE( 8192 32000 ) -
CONTROLINTERVALSIZE( 8192 ) -
SPANNED -
INDEXED -
KEYS( 20 20 ) -
SHAREOPTIONS( 2 ) -
)
By default, each Web User Interface server has its own Web User Interface server
repository that is not shared with any other Web User Interface server.
Upgrade definitions using the import and export functions. For information, see
the Web User Interface administration topic in the CICSPlex System Manager Web User
Interface Guide.
Back up the Web User Interface server repository data as the repository is updated
whenever changes are made using the View Editor or when definitions are
imported using the COVC transaction. You can back up the Web User Interface
repository by using IDCAMS, DFSMSdss, or an equivalent utility.
Sample JCL, EYUJWREP, creates the Web User Interface repository. The sample JCL
is provided, uncustomized, in TDFHINST and customized by DFHISTAR in
XDFHINST.
The Web User Interface server repository can be shared across WUI servers
running at the same CICSPlex SM release, if the repository is accessed using
VSAM RLS. Follow these steps to allow sharing of the WUI server repository:
1. Add the parameter RLS=YES to the DFHSIT table or when you override system
initialization parameters.
2. Add the LOG(UNDO) parameter to the repository file definition when you use the
IDCAMS facility to create the VSAM file.
During initialization, the Web User Interface server determines whether RLS
should be enabled for the Web User Interface server repository and sets the
appropriate attributes for the EYUWREP file and enqmodel definition.
The Web User Interface server caches objects in memory to improve performance.
If a user logged on to one server creates or updates an object using the View
Editor, the User Editor, or the Favorites Editor, users logged on to other servers
which share the server repository might not see the changes until their local cache
is reloaded. Cache is reloaded by restarting the server.
When you run DFHISTAR, with a SCOPE of POST or ALL, it creates the following
postinstallation members for a CICSPlex SM Web User Interface (WUI) server in
the XDFHINST library:
v EYUWUIDS – creates and starts all the data sets for a WUI. EYUWUIDS
includes steps to delete the data sets so that you can rerun the job, if required.
These deletions are expected to fail the first time that you run the job.
EYUWUIDS contains the following steps:
– DELWREP deletes the CICSPlex SM WUI data repository, EYUWREP.
– DEFWREP defines the CICSPlex SM WUI data repository, EYUWREP.
– DELCOVDS deletes the WUI import and export data sets, EYUCOVI and
EYUCOVE
– DEFCOVDS defines the WUI import and export data sets, EYUCOVI and
EYUCOVE
– JES3DELA and JES3DEFA are included if you specify the DFHISTAR JES=JES3
option. They delete and define the CICS local catalog, the global catalog, and
the local request queue.
– DELREGDS deletes the CICS data sets.
– DEFTRACE defines the CICS auxiliary trace data sets, DFHAUXT and
DFHBUXT.
– DEFHTML defines the CICS DFHHTML data set.
– DEFDMPS defines the CICS transaction dump data sets, DFHDMPA and
DFHDMPB.
– DEFTSTD defines the CICS auxiliary temporary storage data set, DFHTEMP.
– DEFINTD defines the CICS intrapartition transient data set, DFHINTRA.
– DEFLCD defines the CICS local catalog, DFHLCD.
– INITLCD uses the DFHCCUTL utility to start the CICS local catalog.
– DEFGCD defines the CICS global catalog, DFHGCD.
– INITGCD uses the DFHRMUTL utility to start the CICS global catalog.
– DEFLRQ defines the CICS local request queue data set, DFHLRQ.
– JES3DELA and JES3DELB are included if you specify the DFHISTAR JES=JES3
option. They delete and define the CICS DFHCSD data set.
– DELCSD deletes the CICS DFHCSD data set.
– DEFCSD defines the CICS DFHCSD data set.
– INITCSD uses the DFHCSDUP utility to start the DFHCSD data set.
v EYUJWREP – creates the WUI data repository, EYUWREP. EYUWUIDS includes
steps to delete and define EYUWREP. You can run EYUJWREP if you want to
delete and define only EYUWREP but none of the other data sets for a WUI.
– DELWREP: delete the CICSPlex SM WUI data repository, EYUWREP.
– DEFWREP: define the CICSPlex SM WUI data repository, EYUWREP.
v EYUWUISP – CICS system initialization parameter overrides for a WUI.
v EYUWUI0P – CICSPlex SM EYUPARM parameters for a WUI.
v EYUWUIIN – CICSPlex SM EYUWUI parameters for a WUI.
If you use the default values for the CICSPlex SM parameters, the EYUWUIP
PROC statement is shown in the following code sample:
EYUWUIP PROC DSNCSD=’CICSTS51.CPSM.WUINCM01.DFHCSD’,
RGNHLQ=’CICSTS51.CPSM.WUINCM01’,
CICSHLQ=’CICSTS51.CICS’,
CPSMHLQ=’CICSTS51.CPSM’,
PRMLIB=’CICSTS51.XDFHINST’,
CICSPRM=EYUWUISP, CICS Parameters
CPSMPRM=EYUWUI0P, CPSM Parameters
WUIPRM=EYUWUIIN WUI Parameters
You can use DFHISTAR to generate copies of the WUI postinstallation jobs for a
different CICS region. Use the DFHISTAR SELECT parameter to specify a new
name for a copy of a postinstallation job. It has this format:
SELECT jobname newname
jobname
Is the name of the job you that want to regenerate
newname
Is the name for the new copy.
You can specify more than one SELECT parameter to select multiple jobs to be
regenerated in a single run of the DFHISTAR job. When you include a SELECT
parameter in the DFHISTAR job, only those jobs specified by the SELECT are
generated.
For a WUI with the name WUINCM02 and a CICS system identifier of WU02,
which connects to a CMAS with the name CMAS02 and CICS system identifier
CM02, you can change your DFHISTAR parameters to specify these options:
CMASNAME CMAS02
CMSSYSID CM02
WUIPLEX WUIPCM02
WUINAME WUINCM02
WUISYSID WU02
TCPIPHST TCP/IP host name for this WUI
TCPIPPRT TCPIP port number for this WUI
SELECT EYUWUIDS WU02WUDS JCL to create the data sets for WUINCM02
SELECT EYUWUISP WU02WUSP CICS SIT overrides for WUINCM02
SELECT EYUWUI0P WU02WU0P CICSPlex SM EYUPARM parameters for WUINCM02
SELECT EYUWUIIN WU02WUIN CICSPlex SM EYUWUI parameters for WUINCM02
SELECT EYUWUIJ CW02WUIJ JCL statement
SELECT EYUWUIP CW02WUIP PROC statement
You can then start the WUI WUINCM02, using the procedure EYUWUIP with
these commands:
START EYUWUIP, DSNCSD=’CICSTS51.CPSM.WUINCM02.DFHCSD’,
RGNHLQ=’CICSTS51.CPSM.WUINCM02’, CICSHLQ=’CICSTS51.CICS’,
CPSMHLQ=’CICSTS51.CPSM’, PRMLIB=’CICSTS51’, CICSPRM=WU02WUSP, CPSMPRM=WU02WU0P,
WUIPRM=WU02WUIN
If you are using EYUWUIJ to start the WUI, edit it to specify these values:
CICSPRM=WU02WUSP, CSMPRM=WU02WU0P, WUIPRM=WU02WUIN
This help takes the form of HTML documents that can be served by the Web User
Interface server or by an external server. If the Web User Interface is to serve the
HTML documents, you must provide a partitioned data set to contain the HTML
documents.
You can use the View Editor to customize your views and menus to include a link
to the customizable view and menu help data set. With the View Editor you can
specify these options:
v No help to be available for this view or menu
v Member name of a help page to be served by the Web User Interface from
DFHHTML
v Web address of an external help page to be served by another HTTP server
For information about the View Editor, see Customizing the Web User Interface.
The customizable view and menu help data set (DFHHTML) must be a single data
set and not concatenated with any other data set.
See “Specifying the JCL DD statements for the WUI” on page 331 for the DD
name. All of these parameters are subject to the following conditions unless
otherwise stated:
v Lines with an asterisk in column 1 are comments and are ignored.
v Values must not contain lowercase characters.
v Values must be specified in parentheses immediately following the parameter.
v Values must not be greater than 32 characters.
For example:
* An EYUWUI parameter data set
DEFAULTMENU(OURHOME)
TCPIPHOSTNAME(MVSXX.COMPANY.COM)
TCPIPPORT(4445)
CMCIPORT(4446)
You can specify additional TCP/IP options to configure your TCP/IP connections.
The Web User Interface supports names up to 44 characters in length for all
options:
CMCIPORT(value)
Specifies the TCP/IP port number allocated to the CICS management client
interface (CMCI). This parameter is required so that you can use CMCI in a
CICSPlex SM environment. Specify a number in the range 1 - 65535 but do not
use the same port number as specified for the WUI in the TCPIPPORT
parameter. When you set this parameter, TCPIPSERVICE and URIMAP
definitions are autoinstalled to support CMCI. The level of security for CMCI
is derived from the SEC CICS system initialization parameter and the
TCPIPSSL WUI server initialization parameter.
TCPIPADDRESS(name | INADDR_ANY)
Specifies the dotted decimal or colon hexadecimal IP address on which the
Web User Interface listens for incoming requests. If INADDR_ANY is specified
(the default), the Web User Interface listens on any of the addresses known to
the TCP/IP for z/OS host.
You do not normally have to specify the TCPIPADDRESS option unless the
z/OS host has multiple TCP/IP addresses.
TCPIPHTTPHOST(NO|YES)
Indicates whether you require the TCP/IP host name used to construct Web
addresses to be generated based on the incoming HTTP request for HTTP
version 1.1 requests or later.
This option has no effect on HTTP requests sent before 1.1 to the Web User
Interface server. The Web User Interface server always constructs Web
addresses using the host name specified in the TCPIPHOSTNAME Web User
Interface server parameter for HTTP 1.0 (and earlier) requests.
NO For HTTP 1.1 (or later) requests, the host name used in Web addresses
constructed by the Web User Interface server is based on the value
specified in the TCPIPHOSTNAME Web User Interface server
parameter.
YES For HTTP 1.1 (or later) requests, the host name used in Web addresses
constructed by the Web User Interface server is based on the incoming
URI or HTTP 'Host' header, according to the HTTP 1.1 specification.
When HTTP 1.1 clients are used with a Web User Interface server running
TCPIPHTTPHOST(YES), the IP address or name used on the server, does not
Import options
The import options allow you to automatically import WUI data repository
definitions from the Web User Interface. The WUI data repository includes view
sets and menus, WUI map objects, user objects, and user group profiles.
Definitions can be imported from a specified transient data queue or a data set, or
both.
These options determine how data appears on Web User Interface displays.
CVDASTYLE(MIXED | UPPER)
Indicates whether the CVDAs and EYUDAs are displayed in uppercase or
mixed case characters.
MIXED
Mixed case text, that is, the first character uppercase and the rest
lowercase, for example, 'Enabled'.
UPPER
Text is displayed in uppercase only.
DATEFORMAT (format)
Specifies the format to be used to display the date on Web User Interface
displays:
YYMMDD
DDMMYY
MMDDYY
YYYYMMDD
DDMMYYYY
MMDDYYYY
where:
DD is the day.
MM is the month.
YY and YYYY
are the year in two-digit or four-digit format, respectively.
DATESEPARATOR(character | / )
Specifies the character to be used to separate the date elements on Web User
Interface displays.
Environment options
These options specify the context and scope values, the home menu and navigation
frame, default map objects, and the appearance of newly opened maps.
AUTOREFRESH(YES | NO)
Disables the automatic refresh option for a WUI server. The default setting,
YES, displays automatic refresh control, based on the view definition. When
NO is specified, automatic refresh control is not displayed, even if automatic
refresh control is set on the view definition. For more information about the
automatic refresh option, see Refreshing views in Tutorials and demos.
DEFAULTCMASCTXT(name | EYUCMS1A)
Specifies the CMAS context that is set when the user signs on to the Web User
Interface.
DEFAULTCONTEXT(name | EYUPLX01)
Specifies the context that is set when the user signs on to the Web User
Interface.
DEFAULTMAPBAS(name | EYUSTARTMAPBAS)
Specifies the name of the map object used to generate maps of business
application services definitions.
DEFAULTMAPCOLL(value | 0)
Specifies the number of rows in a generated map below which a map opens in
the expanded state. If the number of rows to be displayed is above this
number, the map opens in a fully collapsed state. The default value of 0 means
that in every generated map all of the rows are visible when opened.
Operation options
These options name the default view set to be used if the Web User Interface
receives an external request that does not specify a view set name but specifies an
object name. The view sets that you name in these options must represent the
objects that can be specified. For more information, see Providing access to WUI
views and menus in Administering.
User options
Accessibility options
These options specify the default colors for the Web User Interface displays.
The accessibility options are not normally changed as they affect all users of the
Web User Interface server. If you want to change these options for reasons of
accessibility, take care to ensure that the Web User Interface displays do not
become unreadable.
Each option specifies a color as six hexadecimal digits. Each pair of digits describes
the red, green, and blue components of the color, respectively. For example, FFFFFF
represents white, 000000 represents black, FF0000 represents bright red, 00FF00
represents bright green, and 0000FF represents bright blue.
This option allows you to specify the level of tracing you require for the Web User
Interface server.
Attention: Only activate trace at the request of IBM Support Center personnel.
WUITRACE(trace levels)
Specifies the level of tracing for the Web User Interface server.
The trace levels that you specify must be separated by a comma, as shown in
this example:
WUITRACE(8,11,13,15,18)
You can define a range of trace levels as shown in these examples:
WUITRACE(1:5)
activates trace levels 1 through 5
WUITRACE(1:5,13,28:31)
activates trace levels 1 through 5, 13, and 28 through 31
The transient data queue (TDQ) definitions are provided in the EYU$WDEF
sample, which is supplied in the SEYUSAMP library. COVI and COVE are
provided as samples that can be used to create additional import and export
transient data queues.
Here is an example:
//*
//DFHHTML DD DISP=SHR,DSN=data set name
//EYUWREP DD DISP=SHR,DSN=data set name
//EYUCOVI DD DISP=SHR,DSN=data set name
//EYULOG DD SYSOUT=*
//EYUWUI DD *
DEFAULTMENU(OURHOME)
TCPIPHOSTNAME(MVSXX.COMPANY.COM)
TCPIPPORT(4445)
/*
Table 24 summarizes the security accesses required by users of the Web User
Interface.
Table 24. Security accesses required by users of the Web User Interface
CICS Web
User Roles Support Administrator User View Editor
Transactions COVP COVE COVG COVC COVA COVA
COVU
CICS surrogate Yes
user security
View Editor Yes
profile
CICSPlex SM As appropriate As appropriate
and CICS for individual for individual
security users users
If your Web User Interface server region is running with CICS security active, you
must define the security access required for the CICS Web Support, by the
administrator and by the users of the View Editor.
You can use CICS transaction security to limit the users who are allowed to control
the Web User Interface server using the COVC transaction.
If CICS transaction security is in use, the CICS DFLTUSER must be given access to
the COVP, COVU, and COVE transactions.
The user ID that starts the Web User Interface (the terminal user of COVC or
PLTPIUSR, if started automatically using PLTPI) must have access to the COVC
and COVG transactions. If CICS surrogate user security checking is active in the
Web User Interface server region, the user ID that started the Web User Interface
(the terminal user of COVC or PLTPIUSR, if started automatically using PLTPI)
must have READ access to wui-userid.DFHSTART in the SURROGAT class for all
Web User Interface users.
Users of the Web User Interface require access to the COVA transaction and
CICSPlex SM. Users of the View Editor require access to the COVA transaction,
CICSPlex SM, and the View Editor profile. For more information about access to
the View Editor, see Security considerations in Administering.
All users who are successfully signed on to the Web User Interface have access to
all of the customizable view and menu help pages, if the customizable view and
menu help is served by the Web User Interface.
You can provide secure connections by using the Secure Sockets Layer (SSL)
support to provide encryption on the connection. For information about SSL
support, see “Web User Interface server initialization parameters” on page 322 for
information about the TCPIPSSL and TCPIPSSLCERT Web User Interface server
initialization parameters that you must specify for SSL support and for more
guidance on SSL, see Configuring CICS to use SSL.
Web User Interface SSL support uses server authentication only. User
authentication is by the external security manager (ESM) user ID and password.
Submit the startup JCL for the Web User Interface server to start it for the first
time.
Messages on the job log are displayed to confirm that the Web User Interface
server has started successfully.
08.52.33 JOB03331 +EYUVS0001I IYCQCTA5 CICSPLEX SM WEB USER INTERFACE INITIALIZATION STARTED.
08.52.37 JOB03331 +EYUVS0002I IYCQCTA5 CICSPlex SM Web User Interface initialization complete.
Check the connection between the Web User Interface and the web browser by
typing in the web address: http://hostname:port/CICSPlexSM.
For information about the Web User Interface server initialization parameters, see
“Web User Interface server initialization parameters” on page 322. You are
presented with the Web User Interface server Welcome panel containing a Begin
Signon button.
You can shut down the Web User Interface server by shutting down the CICS
system in which the Web User Interface server is running, or by using the COVC
transaction. For more information about the COVC transaction, see The CICSPlex
SM Web User Interface transaction (COVC) in Administering.
Check the IEASYSxx member of SYS1.PARMLIB that you use for MVS initialization
and note the initialization values that are referenced during installation. For details
about initialization values, see “Noting IEASYSxx values for CICSPlex SM” on
page 117.
If you are converting your CICSPlex SM system or systems from a previous release
to CICSPlex SM for CICS Transaction Server for z/OS, Version 5 Release 1, read
the upgrading information for your level of CICSPlex SM.
The way these exits are used by CICSPlex SM conforms to the standard described
in Developing system programs. CICSPlex SM uses these exits only to acquire
information; the application environment is not altered.
The XMNOUT and XSTOUT exits are used when monitoring services are enabled
for a managed application system (MAS):
v The XMNOUT exit obtains task and CICS monitoring data. XMNOUT is used
only with a local MAS.
v The XSTOUT exit obtains statistical data before the data is reset by CICS.
These exits obtain monitoring and statistics information and always return a
“continue processing” return code. They are not available when a shutdown
request for the MAS is received.
The XMEOUT, XDUREQ, XDUREQC, XRSINDI, XSNOFF, and XDUOUT exits are
used when topology requests are enabled for a local MAS:
v The XMEOUT exit detects short-on-storage events.
v The XDUREQ exit detects system dump and transaction dump events.
v The XDUREQC exit detects the completion of dump action.
v The XRSINDI exit detects topology resource changes.
v The XSNOFF exit detects user sign-off events.
v The XDUOUT exit detects transaction dump events.
For further information about controlling the use of LPA-eligible modules, see
Chapter 22, “Installing CICSPlex SM modules in the MVS link pack area,” on page
167, taking particular note of information concerning:
v The module-not-found warning message DFHLD0109I
v CICS system initialization parameters related to LPA modules
Start any MASs (that is, the CICS systems the CMAS is to manage) after the
CMAS, because a CICS system is unknown to CICSPlex SM until the CMAS with
which the CICS system is associated is started.
When you run DFHISTAR, with a SCOPE of POST or ALL, it creates the following
postinstallation members for a managed CICS system (MAS) in the XDFHINST
library:
v EYUCSYDS – creates and starts all the data sets for a MAS. EYUCSYDS includes
steps to delete the data sets so that you can rerun the job, if required. These
deletions are expected to fail the first time that you run the job. EYUCSYDS
contains the following steps:
1. DELHIST and DEFHIST delete and define CICSPlex SM history data sets
EYUHISTA and EYUHISTB.
2. HISTINIT uses the EYU9XHID utility to start the history data sets.
3. JES3DELA and JES3DEFA are included if you specify the DFHISTAR
JES=JES3 option. They delete and define the CICS local catalog, the global
catalog, and the local request queue.
If you use the default values for the CICSPlex SM parameters, the EYUCSYSP
PROC statement is shown in the following code sample:
EYUCSYSP PROC DSNCSD=’CICSTS51.CPSM.CSYS01.DFHCSD’,
RGNHLQ=’CICSTS51.CPSM.CSYS01’,
CICSHLQ=’CICSTS51.CICS’,
CPSMHLQ=’CICSTS51.CPSM’,
PRMLIB=’CICSTS51.XDFHINST’,
CICSPRM=EYULMSSP, CICS Parameters
CPSMPRM=EYULMS0P CPSM Parameters
You can use DFHISTAR to generate copies of the managed CICS system
postinstallation jobs for a different CICS region. Use the DFHISTAR SELECT
parameter to specify a new name for a copy of a postinstallation job. It has this
format:
SELECT jobname newname
jobname
Is the name of the job that you want to regenerate
You can specify more than one SELECT parameter to select multiple jobs to be
regenerated in a single run of the DFHISTAR job. When you include a SELECT
parameter in the DFHISTAR job, only those jobs specified by the SELECT are
generated.
For a MAS with the name CSYS02 and a CICS system identifier of CS02, you can
change your DFHISTAR parameters to specify these options:
CMASNAME name of the CMAS to which this managed system connects
CMSSYSID CICS system identifier of the CMAS to which this managed system connects
CSYSPLEX name of the CICSplex to which this managed system is to be associated
CSYSNAME CSYS02
CSYSYSID CS02
SELECT EYUCSYDS CS02CSDS JCL to create the data sets for CSYS02
SELECT EYULMSSP CS02CSSP CICS system initialization overrides for CSYS02
SELECT EYULMS0P CS02CS0P CICSPlex SM EYUPARM parameters for CSYS02
You can then start the managed CICS system, CSYS02, using the procedure
EYUCSYSP:
START EYUCSYSP, DSNCSD=’CICSTS51.CPSM.CSYS02.DFHCSD’,
RGNHLQ=’CICSTS51.CPSM.CSYS02’, CICSHLQ=’CICSTS51.CICS’,
CPSMHLQ=’CICSTS51.CPSM’, PRMLIB=’CICSTS51.XDFHINST’
CICSPRM=CM02CSSP, CPSMPRM=CM02CS0P
If you are using EYUCSYSJ to start the WUI, edit it to specify these options:
CICSPRM=CS02CSSP, CPSMPRM=CS02CS0P
The DD statements that you must modify are shown in Figure 25.
...
//STEPLIB DD DSN=CICSTS51.CPSM.SEYUAUTH,DISP=SHR
//DFHRPL DD DSN=CICSTS51.CPSM.SEYULOAD,DISP=SHR
//EYUPARM DD DSN=(Any PO or PS data set with LRECL=80)
//EYUHISTA DD DSN=(Optional 1st history dataset)
//EYUHISTB DD DSN=(Optional 2nd history dataset)
//EYUHISTn DD DSN=(Optional nth history dataset)
...
When you change these DD statements in the startup JCL for a CICS system, code
these statements as follows:
STEPLIB DD statement
Includes the CICSTS51.CPSM.SEYUAUTH authorized load library.
DFHRPL DD statement
Includes the CICSTS51.CPSM.SEYULOAD load library.
EYUPARM DD statement
Identifies the library containing the CICSPlex SM parameters.
v Member EYULMS0P, in the CICSTS51.CPSM.SEYUPARM data set,
contains sample system parameters for a local MAS; you must edit this
DB2 connections
When you use CICS Transaction Server for z/OS, Version 5 Release 1 CICS systems
with the CICS DB2 attachment facility, you make special arrangements when you
use BAS to install a DB2 connection defined to CICSPlex SM. When BAS is used to
define and then install a DB2 connection, the connection starts in
NOTCONNECTED status. You can use the WUI to cause the connection to the DB2
subsystem to be activated in the following way:
1. From the WUI Main menu, click CICS operations views > DB2, DBCTL and
WebSphere MQ operations views > Connections (under DB2 operations
views).
2. Select the objects to change.
3. Click the Connect button.
In a test environment, you might be able to wait for the MAS to start and then
install the BAS definition. Then issue a CONNECT command against the resulting
DB2CONN.
Websphere MQ connections
You cannot use BAS to define and install a WebSphere MQ for z/OS connection
before the CICSPlex SM environment has been initialized.
Review all of the listed parameters for each MAS, to ensure that the values
specified are appropriate. When you specify YES for a specific resource type
(XCMD, XFCT, XPCT, or XPPT), a CICSPlex SM security profile must exist for that
resource type. See the CICSPlex SM security in Securing for information about
creating security profiles.
Note: To get all data available for the TASK and MLOCTRAN views, MCT must
have a value specified, CICS monitoring for performance classes must be activated,
and you must be collecting performance class data. See the note for MCT,
MONITOR, MN, and MNPER parameters in the following table .
Table 26. CICS system initialization parameters for a z/OS MAS
Parameter Explanation
APPLID= z/OS Communications Server application ID for this CICS system. Used
as MAS name when NAME(value) is not specified as a CICSPlex SM
system parameter.
AIEXIT=DFHZATDX z/OS Communications Server terminal autoinstall program.
AUTORESETTIME=YES Time-of-day synchronization.
AUXTR=ON Auxiliary trace - exception records.
AUXTRSW=NEXT No continuous auxiliary trace switching.
CPSMCONN=LMAS Initialize the region as a local MAS.
DFLTUSER=userid Specify the user identifier that is to be used for security checking when a
user is not defined to the ESM.
DSALIM=5M Limit of DSA storage in 24-bit (below-the-line) storage. Set this value to at
least 5 MB.
| EDSALIM=800M Limit of EDSA storage in 31-bit (above-the-line) storage.
DSRTPGM=EYU9XLOP Distributed START routing program.
DTRPGM=EYU9XLOP Dynamic routing program.
DUMPDS=A Transaction dump data set.
If you do not want this data written to an SMF data set, you can suppress the monitor records. See the description
of the SUPPRESSCMF parameter in Chapter 48, “CICSPlex SM system parameters,” on page 347.
MXT=500 Maximum tasks. Increase by 20 from your normal value for the CICS
region to accommodate the CICSPlex SM MAS tasks. CICSPlex SM rarely
uses all 20 of these additional tasks. If you are using the MXT value alone
to control application transactions, increasing this value can allow more
application transactions to run concurrently. To prevent this situation from
occurring, you can define a transaction class for the application. Then, set
a class maximum task (CMXT) value that limits the number of concurrent
transactions.
When an active task completes, its data is stored in a historical data store. The data
store is made up of a number of VSAM KSDS data sets. You need a minimum of
two data sets and a maximum of twenty six data sets.
Each MAS must have its own set of CICSPlex SM history data sets. Allocate the
data sets to the MAS region by means of DD cards in the JCL with DD names of
the form EYUHISTx, where x is a character suffix taking values A through Z.
Dynamic allocation is not supported. Allocate the data sets with a disposition of
OLD. Use the suffix letters in ascending sequence with no letters omitted. For
example, if four history data sets are required, use DD names EYUHISTA,
EYUHISTB, EYUHISTC, and EYUHISTD.
Define the CICSPlex SM history data sets with the REUSE keyword. Task history
recording uses the least recently used data set, or, when starting for the first time,
EYUHISTA. When EYUHISTA becomes full, it switches to use EYUHISTB and so
on in sequence. Each full data set remains open with its data available until the
history recorder has filled all data sets and starts reusing the data sets. At this
time, EYUHISTA is set closed, emptied, reopened, and reused first, followed by
EYUHISTB and so on in sequence. If a data set is reused, its previous contents are
destroyed.
Until the history recorder has to empty a data set to reuse it, the historical task
data is available for use. The data is maintained across CMAS and MAS restarts.
You do not have to define the history data sets as recoverable because unit-of-work
recoverability is not required. However, the CICSPlex SM history recorder does
require files to be defined as nonrecoverable to avoid unnecessary logging in the
MAS region.
In addition, do not define the history data sets to use VSAM compression. The
CPSM history function initializes the data sets to calculate how many records fit in
the data set, so that it can safely use sequential writes to the data set, thereby
reducing I/O use. Use of VSAM compression spoils that calculation and causes
data to be lost when the data set becomes full and a data set switch is required.
CICSPlex SM provides a sample job, EYUJHIST, for defining and initializing two
history data sets. It is supplied, uncustomized, in TDFHINST and customized by
DFHISTAR in XDFHINST.
You can stop the MAS agent code in an active CICS system in two ways:
v From the WUI Main menu, click CICSPlex SM operations views > MASs
known to CICSplex > , select the CICS systems and click Stop, or
v Run transaction COSH in the MAS. You start COSH at a 3270 terminal, at a
console, or using ATI.
When you stop the MAS agent, CICSPlex SM cannot access the MAS until either
the CICS system is restarted (see “Preparing to start a z/OS MAS” on page 336) or
the COLM or CORM transaction is issued.
To reactivate a running CICS system as a MAS, issue the CICS COLM transaction.
Terminating a MAS
Alternate LRTs, which run under the CONA transaction, can be requested by
specifying a non-zero value for the MASALTLRTCNT EYUPARM. If activated, the
alternate LRTs handle the API, WUI, and RTA requests normally handled by the
primary LRT. Only one alternate LRT is active at a given time. If the active
alternate LRT becomes busy for longer than the value specified by the
MASALTLRTTIM EYUPARM, subsequent API, WUI, and RTA requests directed to
the MAS are directed to another CONA task.
Note: Specifying different values for MASALTLRTCNT for multiple WLM target
regions might result in an uneven distribution of transactions to those regions
because of differing long running task counts.
You can assign these parameters to a DD * file, sequential data set, or a partitioned
data set member. The DD name for the extrapartition transient data queue is
EYUPARM.
Code the system parameters as 80-byte records. You can specify multiple system
parameters on a single record if they are separated by commas and do not exceed
a total of 71 characters in length. The format of the system parameters is as
follows:
keyword(v)
keyword
The name of a CICSPlex SM system parameter.
v An alphanumeric data value that you can specify with the system
parameter.
Table 27 identifies the CICSPlex SM parameters used in the CMAS and MAS and
indicates whether these parameters are required or optional.
For CMASs, MASs, and WUI servers, the following members of the TDFHINST
and XDFHINST libraries contain samples of these parameters:
EYUCMS0P
CMAS parameters
EYULMS0P
Local MAS parameters
512 (CMAS)
| Note: The SECRPTLVL parameter controls the response from the CMAS
| in which it is processed even though the API request might have
| originated in a different CMAS. Thus a CMAS which manages MASes
| containing sensitive resources can be started with SECRPTLVL(NONE),
| while other CMASes managing MASes with lower sensitivity can be
| started with SECRPTLVL(RESPONSE) or SECRPTLVL(DETAIL).
SECTIMEOUT(value | 30)
Specifies the time in minutes, in the range of 1 through 1440 (1 day), that
idle user IDs are to remain signed on in the CMAS before being considered
for timeout.
You can also use this value to control how often the CMAS checks for idle
users to timeout. For example, with the default value of 30, the CMAS
checks every 30 minutes for users who have not used the CMAS for 30
minutes. However, because the times are not synchronized the user ID
might not be timed out for up to double the SECTIMEOUT value. Setting a
low value increases the number of calls to the External Security Manager
(ESM). Setting a high value means that users might have to wait a long
time before automatically picking up security changes that affect the user
ID (for example, adding the user to a new group).
You can use the CMAS or CMASLIST PURGE request, available from the
API and WUI, to force a CMAS to check for users to time out immediately.
You can use the CMAS or CMASLIST RESET USERID request, available
from the API and WUI, to force the CMAS to rebuild the user's security
information the next time it is used. This request is used after adding or
removing a user ID to or from a group, and the user does not want to wait
to be timed out to pick up the change.
SPOOLCLASS(class | P)
| Specifies a SYSOUT class value, from A to Z or 0 to 9, that identifies where
CICSPlex SM spool output is to be sent.
Spool output can be generated by these CICSPlex SM functions:
v The online utility transaction COLU
EYUPNxxxx messages are issued when a stall condition occurs that generates a
real-time analysis system availability monitoring (SAM) event.
SUPPRESSCMF(YES | NO)
For a local MAS, indicates whether the records collected by the CICS
Monitor Facility are written to SMF.
The parameter suppresses only CICS type 3 performance class records.
Type 4 exception records and type 5 transaction resource records are not
suppressed. The type 3 performance records are suppressed only if the
CICS region has an active CICSPlex SM monitor definition installed for the
MTRAN monitoring class. You can verify which CICS regions have active
monitoring for the MTRAN class by using the WUI Active monitor
specifications (POLMON) tabular view.
TOBATCHREQ(value | 0)
Specifies the time in seconds before a batch request directed to a MAS is
timed out. This time includes RTA requests and API requests initiated from
non-CICS programs. Specify zero or a value in the range 10 - 1800.
v If you specify zero, the default value of 240 seconds (4 minutes) is
applied. This value is then doubled when the request is transmitted to
the MAS.
v If you specify a non-zero value in the range 10 - 1800, that value is used.
v If you specify a non-zero value less than 10, TOBATCHREQ is set to 10.
Depending on the value specified for TOBATCHREQ, more timeouts can
be received. You can check in the following ways:
RTA requests
No data is processed for any MAS that times out and no external
message is displayed. This occurrence might mean that an event is
not created or might lead to premature termination of existing
events.
API requests initiated from non-CICS programs
All API requests initiated from non-CICS programs receive a
RESPONSE of ENVIRONERROR (1030) and REASON of
REQTIMEOUT (1342) and no data records are returned, regardless
of the CONTEXT and SCOPE of the request.
TOONLINEREQ(value | 0)
Specifies the time in seconds before an online request directed to a MAS is
Before you run the IVP jobs, prepare your system. The steps to do this are
described in Chapter 49, “Preparing to run the IVPs,” on page 365.
Before you can run any of the CICS-suppled IVP jobs, create the data sets that they
use. For further information about creating the data sets for the IVP jobs, see
Chapter 38, “Jobs for creating the CICS data sets,” on page 243.
All the IVP jobs require the CICS Type 3 SVC, which must be installed in the LPA.
If you have not already installed the CICS SVC in the LPA, described in
Chapter 21, “Installing CICS modules in the MVS link pack area,” on page 147, do
so now before you attempt to run any of the IVP jobs. The IVP jobs do not use the
Type 6 SVC (DFHHPSVC).
If you want to use SNA with a CICS region started by any of the CICS IVP jobs,
create and activate an SNA APPL definition for the CICS region application
identifier (applid).
The applid defined to SNA must match the applid that is specified on the APPLID
system initialization parameter that is used by the IVP job. For example, to be able
to log on to the CICS region that is started by the DFHIVPOL job, you must
perform one of the following actions:
v Create and activate an APPL definition for your own applid, which you specify
on the APPLID parameter of the DFH$SIP1 member of the SYSIN data set.
v Define and activate an APPL definition for the default applid DBDCCICS, which
you specify on the APPLID parameter of the DFH$SIP1 member of the SYSIN
data set.
For more information about creating and activating SNA APPL definitions for
CICS, see Chapter 20, “Defining CICS regions as applications to SNA,” on page 135
and “Data set naming conventions” on page 243.
CICS automatically attempts to connect to its system log stream, unless you define
a journal model resource definition to define the log stream as TYPE(DUMMY).
You decide whether you want to run the IVPs with system logs or to run with
dummy logging.
If you decide to run with real log streams, see Chapter 33, “Defining the logger
environment for CICS,” on page 195 for information about defining log streams.
Figure 26. Sample job to define DUMMY JOURNALMODELs for CICS system logs
As supplied, the DFH$SIP2 member of the SYSIN data set used by the DFHIVPBT
job specifies SEC=NO, so that you can run this job without external security.
You must also give the IVP user ID sufficient authority to use transactions and
resources that are required to run the IVP jobs:
1. Authorize the IVP user ID to run the transactions that are used as part of the
IVP jobs. (See Table 29 on page 368.) To do so, add the IVP user ID, with READ
access, to the access list of the RACF profiles for the transaction member class
(TCICSTRN) or the transaction group class (GCICSTRN).
2. If you define the transactions as prefixed resources, you must also specify the
system initialization parameter SECPRFX={YES |prefix} for the IVP jobs.
3. Authorize the IVP user ID to access the resources that are used by the
transactions. To do so, you add the IVP user ID, with appropriate authority, to
the access list for the resource class profiles.
4. Authorize the IVP user ID to issue SP-type commands using the CEMT master
terminal transaction. To do so, you add the IVP user ID, with appropriate
authority, to the access list of the RACF profiles for the resource member class
(CCICSCMD) or the resource group class (VCICSCMD). You must give the IVP
user ID UPDATE access for the SHUTDOWN resource class; otherwise, the
user ID cannot end the IVP jobs. Give the IVP user ID UPDATE access for the
DUMPDS and SYSTEM resource classes, if the DFHIVPBT job is to be run with
external security.
For information about implementing external security, see RACF security overview
in Securing. Alternatively, you can run the IVP jobs with limited security, for
example:
v Without command security (XCMD=NO), the IVP user ID runs the IVP jobs
without requiring authority to use the CEMT SP-type commands and the
resources that they access.
v With transaction security only (Xyyy=NO including XCMD=NO), the IVP user
ID runs the IVP jobs if authorized to use only the transactions used as part of
the IVP jobs.
To run the IVP jobs with external security, you must define to RACF an IVP
default CICS user ID that has authority to run the transactions used as part of the
IVP jobs.
These transactions include the CICS-supplied transactions that are listed in Table 29
on page 368. The level of authority that is required by the IVP user ID depends on
the security that you want to use for the IVP jobs. On a production system, the
default user must not have access to any CICS-supplied transactions except those
that you require in your CICS environment. Make the resource access
authorizations that you give to the default user clearly limited to those resources
that you intend to be universally available, and therefore not restricted in any way.
FILEA samples
DFH$ALL
AINQ, INQY, PINQ, DINQ
AADD, ADDS, PADD, DADD
AUPD, UPDT, PUPD, DUPD
The DFH$SIPn members of the SYSIN data set also contain some system
initialization parameters to exclude CICS resources that are not required by the IVP
jobs, or to include some not specified by the default system initialization
parameters.
One such parameter is TCT=5$, specifying the CICS sample LU control table, in
the hlq.SDFHLOAD library. This LU control table defines the pair of sequential
input and output devices, CARDIN and PRINTER. (These are the only devices that
are defined in DFHTCT5$.)
You can edit the DFH$SIPn members of the SYSIN data set to make these changes:
v The default SVC number is 216. To use a different SVC number, specify
CICSSVC=nnn as a parameter to the DFHSTART proc in the appropriate IVP
job. For more information about defining CICS SVCs, see Chapter 18, “Installing
the CICS SVCs,” on page 129.
The IVP jobs do not require the Type 6 SVC.
v The applid used is CICSIVP1. To use a different applid, change the
APPLID=CICSIVP1 system initialization parameter in the appropriate DFH$SIPn
member.
v The IVP jobs have external security switched off. To run with security
(SEC=YES), define a suitable default user ID (for example, IVPUSER) with the
required authority to run the IVP transactions. Add DFLTUSER=IVPUSER in the
For information about creating and initializing the DFHCMACD data set, see
“DFHCMACI job for creating the messages data set” on page 247.
The file DFHCMACD, managed by CICS file control, accesses the DFHCMACD
data set. You must create a definition for this file in the CSD. The CICS-supplied
definition for the DFHCMACD file and other resources that are required by the
CICS messages facility are in the CSD group DFHCMAC. The CICS startup
procedure (in the IVP jobs) has a DD statement for the CMAC file, but for dynamic
allocation copy the supplied resource definition for the DFHCMACD file and add
the DSNAME option.
Specify the DFHCMAC group of resources for the CICS messages facility only in
those CICS regions that use the facility; for example, on some terminal-owning
regions, but perhaps not on data-owning regions.
When you run the DFHISTAR job, it overrides the default values in the IVP jobs
with the values you specified in the DFHISTAR job.
The auxiliary trace data sets, DFHAUXT and DFHBUXT, are required
because the IVP jobs run with auxiliary trace switched on, and the
auxiliary trace data set switching facility is set to switch once only.
DFHLCD (Mandatory) CICS local catalog data set (VSAM), used by the CICS
domains to save some of their information between CICS runs, and to
preserve this information across a cold start.
DFHGCD (Mandatory) CICS global catalog data set (VSAM) has a variety of uses,
including: during a CICS run, holding resource definitions that are
installed; and, during a controlled shutdown, recording part of the warm
keypoint information.
DFHCXRF Transient data extrapartition data set, used by CICS as the target for
messages sent to any transient data destination before CICS has completed
intrapartition transient data initialization. Use of this DDname is optional,
but if it is not used, any messages that are written here are lost.
DFHLRQ The local request queue data set is used to store pending BTS requests;for
example, timer requests or requests to run activities. It is recoverable and
used to ensure that, if CICS fails, no pending requests are lost. For more
information, see the CICS Business Transaction Services.
LOGUSR Data set for the extrapartition transient data destination, LOGA, used by
the CICS sample programs.
MSGUSR Data set for the extrapartition transient data destination, CSSL, used by a
number of CICS services.
COUT Data set for the extrapartition transient data destinations used by C/370
application programs. This data set is the destination for the C/370 output
data streams, stdout (CCSO) and, indirectly, stderr (CCSE).
DFHDMPA First transaction dump (A) data set. Second transaction dump (B) data set.
DFHDMPB The dump data sets are included because CICS always tries to open a
transaction dump data set, and issues a warning message if it is unable to
do so for any reason.
DFHCSD (Mandatory) CICS system definition data set (VSAM).
For more information about installing CICS using DFHISTAR, see Installing CICS
TS using DFHISTAR.
1. For information about the system initialization parameters used by the IVP
jobs, see “Specifying system initialization parameters for the IVP jobs” on page
368. See also 2 in this list.
2. The DFHSM0122 and DFHSM0123 messages show the limits available for the
dynamic storage areas below 16 MB, and above 16 MB but below 2 GB. For
information about these storage areas, see CICS dynamic storage areas in
Improving performance. Storage for the extended read-only DSA, ERDSA, is
obtained from read-only key 0 protected storage, because the default system
initialization parameter is RENTPGM=PROTECT.
3. The DFHIVPBT job was run without external security active, because SEC=NO is
specified as a system initialization override parameter.
4. VTAM is the previous name for z/OS Communications Server.
5. The default group list, DFHLIST, is used for this run of the DFHIVPBT job.
Non-default functions (for example, the CICS online messages facility) are not
available, because their CICS resources are not defined in this group list.
6. These messages are issued when CICS is initialized and the log streams do not
exist. CICS issues a request to create the log stream dynamically using MVS
define log stream services.
7. If system log initialization fails, CICS abends. See also 1 in “Output from the
DFHIVPBT job.”
8. If you want COBOL, C, C++, and PL/I languages, remove the comment marks
from the SCEERUN and SCEERUN2 libraries, and increase the memory size for
the job.
DFHPG0101 24/04/2007 16:24:22 CICSIVP1 CICSUSER CSSY PPT entry for IIGZMSGT has been added.
DFHXM0101 24/04/2007 16:24:22 CICSIVP1 CICSUSER CSSY TRANSACTION definition entry for CLER has been added.
DFHAM4893 I 24/04/2007 16:24:22 CICSIVP1 Install for group CEE has completed successfully.
DFHFC0204 24/04/2007 16:24:22 CICSIVP1 CICSUSER CSSY FCT entry for DFHCSD has been updated.
DFHLG0502 24/04/2007 16:24:23 CICSIVP1 Log stream CICINST.CICSIVP1.DFHLOG defined to MVS using model stream 1
MV26.DFHLOG.MODEL.
DFHLG0302 24/04/2007 16:24:24 CICSIVP1 Journal name DFHLOG has been installed. Journal type: MVS 2
CICINST.CICSIVP1.DFHLOG.
DFHLG0502 24/04/2007 16:24:25 CICSIVP1 Log stream CICINST.CICSIVP1.DFHSHUNT defined to MVS using model stream 1
MV26.DFHSHUNT.MODEL.
DFHLG0302 24/04/2007 16:24:27 CICSIVP1 Journal name DFHSHUNT has been installed. Journal type: MVS 2
CICINST.CICSIVP1.DFHSHUNT.
DFHLG0744 24/04/2007 16:24:27 CICSIVP1 All records in log stream CICINST.CICSIVP1.DFHLOG have been deleted.
DFHLG0744 24/04/2007 16:24:27 CICSIVP1 All records in log stream CICINST.CICSIVP1.DFHSHUNT have been deleted.
DFHRM0205 24/04/2007 16:24:37 CICSIVP1 An activity keypoint has been successfully taken.
DFHLG0743 24/04/2007 16:24:37 CICSIVP1 Tail of log stream CICINST.CICSIVP1.DFHLOG deleted at block id
X’0000000000000001’.
Aging( 32768 )
Akp( 04000 )
Cicstslevel(030100)
Cmdprotect(Cmdprot)
Db2conn()
Debugtool( Nodebug )
Dfltuser(CICSUSER)
Dsalimit( 05242880 )
Dsrtprogram( NONE )
Dumpds
Currentdds(B)
Openstatus( Open )
Switchstatus( Noautoswitch )
NORMAL
RESPONSE: NORMAL TIME: 16.24.30 DATE: 24.04.07
SYSID=CICS APPLID=CICSIVP1
You can use the DFHIVPOL job to start up a CICS region to try out some
functions, for example:
v Use the master LU transaction, CEMT. You can also use CEMT from the MVS
system console. For information about CEMT, see CEMT - master terminal in
Reference > System definition.
v Use the resource definition online transaction, CEDA. For information about
using CEDA, see Resource management transaction CEDA commands in
Reference -> System definition.
v Use the sample application transaction AMNU, to access the sample VSAM file,
FILEA.
From a console device, the CEDA transaction can be used only to INSTALL
resource definitions. The sample programs cannot be run from a console device.
When using autoinstall, be aware that when CICS processes an autoinstall request,
it uses data from the SNA logmode table. Be aware of this important consideration.
An autoinstall request succeeds only when the logmode data, which is passed to
CICS in the BIND image, matches one of the model terminal definitions recorded
in the autoinstall model table (AMT) from the CSD. Before attempting to start
CICS and autoinstall a LU for this IVP, check your SNA definitions with those
given in Coding entries in the z/OS Communications Server LOGON mode table.
If CICS fails to match model and logmode data, you receive message DFHZC6987I.
The CSD is defined and initialized for all the IVP jobs when you run the
DFHCOMDS job and includes some IBM-supplied definitions for use with
autoinstall. These definitions are defined in the following groups:
DFHTERM
Model LU definitions for use with autoinstall. For example, two of the
TERMINAL definitions are 3270 and LU2.
DFHTYPE
Partial LU definitions (TYPETERMs) defining common LU properties, or
attributes. For example, two of the TYPETERM definitions are DFH3270 (to
define a non-SNA 3270 LU) and DFHLU2E2 (to define an SNA 3270 model
2 LU). The DFHLU2E2 resource definition matches the SNA-supplied
logmode SNX32702.
The DFHTERM and DFHTYPE groups are included in the CICS-defined group list
called DFHLIST, which is defined in the GRPLIST operand. If the CICS-supplied
definitions are not suitable for your installation, you can create additional
TYPETERM and model TERMINAL definitions in the CSD, but without a LU you
must do this offline, using the DFHCSDUP utility program. For information about
autoinstall definitions, see Autoinstall in Configuring.
If you want to use an explicitly defined LU, rather than allow CICS to autoinstall a
LU, define it offline using the DFHCSDUP utility program.
The normal way to create resource definitions in the CSD is to use the CEDA
DEFINE command from a CICS master LU, but without a LU you can only do this
using the DFHCSDUP utility program. For an example of a DFHCSDUP job to
define an SNA LU in the CSD, see Figure 30.
*
ADD GROUP(grpname) LIST(yourlist)
*
LIST LIST(yourlist) OBJECTS
/*
//
GROUP(name)
Code a unique name for the group to which the LU resource definition is
to belong.
NETNAME(name)
Code the 8-character SNA name that identifies this LU to your SNA
system.
TERMINAL(name)
Code a unique 4-character LU identifier as the name by which CICS is to
know the LU.
TO(yourlist) and LIST(yourlist)
Code a unique name for yourlist. If your new group list does not include
all the CICS-supplied resources as well as your own, you must specify
DFHLIST and yourlist on the GRPLIST system initialization parameter of
your CICS startup job.
TYPETERM(name)
Specify a unique name to identify the resource definition that matches the
properties of the type of LU you are using. For example, to define an SNA
3270 model 2 LU, specify the CICS-supplied TYPETERM definition
DFHLU2E2.
To include the CICS-supplied list of resources in a new group list, create a new list
by copying the CICS-supplied list, DFHLIST, using the APPEND command. The
Ensure that either SNA knows the CICS application identifier (APPLID) or you
change the CICS APPLID to one that is already known to your SNA system.
If you use the default APPLID (DBDCCICS), define this to SNA as described in
“Defining specific APPL definitions and APPL parameters to SNA” on page 135,
before starting the DFHIVPOL job.
If you want to communicate with CICS from an MVS console, you must define a
console in the CSD before starting the IVP. You cannot define a console in the TCT.
For more information about defining consoles, see Defining console devices to
CICS in Configuring.
If you want to communicate with CICS from a TSO session, you must define the
TSO user as a console device in the CSD before starting the IVP. For more
information, see Defining console devices to CICS in Configuring.
When you have successfully logged on to CICS, you can carry out any of the
interactive operations described in “Verifying SNA LU operations” on page 385.
While logged on to CICS, perform a CEMT SET DUMPDS SWITCH to ensure that
both dump data sets are initialized, before the dump utility program is run when
you shut down CICS.
When you run the DFHIVPOL job, your job log looks similar to the sample log
shown.
Logging on to a SNA LU
When the DFHIVPOL job displays the console message CONTROL IS BEING GIVEN
TO CICS, you can log on to CICS using an IBM 3270 Information Display system
terminal.
Use the CICS application identifier that you specified when you started CICS to
log on through your SNA LU. For example, unless you changed the APPLID as
specified as at system initialization (CICSIVP1), enter LOGON APPLID(CICSIVP1).
If you are using autoinstall, your logon request is passed to CICS and, if all the
autoinstall requirements described in Autoinstall in Configuring have been met,
CICS installs your LU. It does so by creating a TCT terminal entry (TCTTE) using
If you are using a LU defined in the CSD explicitly, and included in the group list
specified in the startup job stream, CICS identifies the installed resource definitions
by the SNA net name and creates the required TCTTE.
When you log on to CICS, your LU can display a “good morning” message as
specified on the GMTRAN system initialization parameter. The default transaction,
CSGM, displays a welcome message as defined by the GMTEXT system
initialization parameter.
For information about the CICS transactions that you can try with the DFHIVPOL
job, and about the message-switching responses to those transactions, see
Administering with CICS supplied transactions in Adminstering.
Table 31. Typical terminal interactions
Operator Input System Response
I
Status: ENTER ONE OF THE FOLLOWING
OR PRESS ENTER FOR DEFAULT
(Followed by a list of options)
Press F3 key
Press CLEAR key
CEMT PERFORM
STATISTICS
SESSION ENDED
Press F3 key
Press CLEAR key
CETR
SESSION ENDED
Press F3 key
Press CLEAR key
SESSION ENDED
Press F3 key
Press CLEAR key
CEOT Ter (tmid) Tra (CEOT) Pri (nnn) Pag Ins Ati Tti
(Inquire about this (Remember 'tmid' for use in next transaction, CMSG)
terminal)
SESSION ENDED
Press F3 key
Press CLEAR key
CMSG 'HELLO',R=tmid,S
(Send the message 'HELLO' to your terminal)
MRS OK MESSAGE HAS BEEN ROUTED
(briefly at lower right of screen)
HELLO
(at upper left of screen)
You can enter your CEMT input in either uppercase or lowercase, because the
master terminal transaction translates all input to uppercase. Use the CLEAR key
and the F3 key as indicated.
If you enter the CETR transaction, CICS displays the status of the various trace
options.
You can alter the status of any of the trace options by over typing the current
value, indicated by ===> on the CETR display.
You can see which resources are included in DFHLIST by using the CEDA
transaction; for example, by using the CEDA EXPAND LIST(DFHLIST) command.
Press F8 to see the continuation of the list. If you started the DFHIVPOL job with
your own group list specified instead of the DFHLIST group list, specify the name
The DFHLIST group list does not include any of the sample applications groups,
the group names of which all begin with “DFH$”. To use the sample programs,
therefore, you must first install the resource definitions for the required samples.
For example, to use the FILEA sample application:
1. Install the sample programs that are required for the FILEA applications. Use
this command:
CEDA INSTALL GROUP(DFH$AFLA)
2. Make the FILEA data set available to CICS, by performing one of the following
tasks:
v Install a FILE resource definition for the FILEA data set:
CEDA INSTALL GROUP(DFH$FILA)
v Provide a DD statement for the FILEA data set in your CICS startup JCL. For
example,
//FILEA DD DISP=SHR,DSN=CICSTS51.CICS.CICSHTH1.FILEA
To try the assembler language version of the FILEA sample application, install
group DFH$AFLA and then enter the AMNU transaction.
You can invoke CICS transactions other than CECI from a console device, and
other CICS operators can communicate with the console operator. In particular,
you can use the console device for CICS master terminal functions to control CICS
terminals or to control several CICS regions with multiregion operation.
Normal operating-system use of the console device is not inhibited, and CICS
supports multiple console devices where present.
v The CEDA transaction can be used from a console device only to INSTALL
resource definitions.
v The CECI transaction and the sample programs cannot be used from a console
device.
If you issue the MVS command d consoles, a list of console devices is displayed.
This list identifies the console devices by name.
You can use a console device to submit MODIFY commands from your job stream
if you define a console device in your CSD as CONSNAME(INTERNAL).
For further information about defining consoles, see Defining console devices to
CICS in Configuring.
where:
You can use the commands shown in Figure 32 to verify the CEMT and CEOT
transactions from the MVS console.
A TSO user can enter CICS commands after invoking the TSO command
CONSOLE, in either of two formats.
CONSOLE {MODIFY|F} cicsid,[’]command[’]
CONSOLE
{MODIFY|F} cicsid,[’]command[’]
END
When the TSO CONSOLE command is used, TSO checks the user for authority to
issue console commands. Further, if console operator command security is active,
the TSO user must be specifically authorized to issue MODIFY cicsid.
The TSO user can interact with an alternate CICS by using the command CONSOLE
MODIFY altcics,CEBT.
You can also use TSO CLIST processing to issue sequences of CICS commands.
Stopping CICS
To stop CICS, enter CEMT P SHUT from the SNA LU or MVS console. CEMT P
SHUT is a short form of CEMT PERFORM SHUTDOWN.
To verify that the cross-memory services of shared data tables are working:
1. Start up a second CICS region (the requester) that has an interregion
communication connection to the first CICS region (the server, which contains
the user-maintained data table and source data set).
2. On the requester CICS region, do the following tasks:
a. Define and install a remote file referring to (associated with) the
user-maintained data table on the server CICS region.
b. Close the interregion communication connection between the two CICS
regions so that function shipping is impossible; that is, only the
cross-memory services of shared data tables can be used to access the
shared data table from the requester CICS region. To close the connection,
you can enter the command:
CEMT SET IRC CLOSED
To verify that function shipping cannot work, try a remote READ of a file
(not a data table) on the server CICS region; you get a SYSIDERR response.
c. Try a generic read command on your data table, using the CECI transaction.
If the cross-memory services of shared data tables can be used, you see a
normal response.
3. To restore interregion communication between the two CICS regions, open the
connection again. To do this, you can enter the command:
CEMT SET IRC OPEN
The following steps were completed to verify the cross-memory services of shared
data tables:
1. A second CICS region, CICSIDA, is started with support for shared data tables.
CICSIDA is the requester CICS region in this example.
2. The following IRC connections and sessions are defined and installed on the
associated CICS regions:
See Figure 38 on page 395 and Figure 39 on page 396 for the CICA and ATOC
resource definitions attributes. The attributes for the CICC and CTOA resource
definitions are similar.
3. On CICSIDA, the following steps are completed:
a. The file, REMSDT, is defined and installed as remote, referring to the
MYSDT data table on CICSIDC. See Figure 40 on page 396 for the
parameters used for the REMSDT resource definition.
b. The file, REMFIL, is defined and installed as remote, referring to the FILEA
sample file on CICSIDC.
c. The CEMT SET IRC CLOSED command is used to close the IRC connection
to CICSIDC.
d. The following generic READ command is entered at a terminal:
CECI READ FILE(REMFIL) RIDFLD(00092) KEYLENGTH(5)
LENGTH(80) GE GTEQ
Figure 36 on page 394 shows the SYSIDERR response, because the remote
file cannot be accessed by function-shipping. You also see this response for
the remote data table, REMSDT, if the IRC connection is closed.
e. The following generic READ command is entered at a terminal:
CECI READ FILE(REMSDT) RIDFLD(00092) KEYLENGTH(5)
LENGTH(80) GE GTEQ
Figure 37 on page 395 shows the NORMAL response. You receive a
NORMAL response only if MYSDT is already open on CICSIDC, as
achieved in step 2b.
DATA
SPACE data table
Figure 33. CICS environment for example verification of shared data tables.
Figure 34. On CICSIDC, response to initial CECI generic READ FILE command with SDT support.. The data table is
loaded on first reference, and generic READ commands are not allowed for a user-maintained data table while it is
loading.
Figure 35. On CICSIDC, response to CECI generic READ FILE command with SDT support.. Normal response.
Figure 36. On CICSIDA, response to remote CECI generic READ FILE command, with IRC closed.. SYSIDERR
response for file, REMFIL, attempting to use function shipping for associated file, FILEA, on CICSIDC.
Figure 37. On CICSIDA, response to remote CECI generic READ FILE command, with IRC closed.. Normal response
for file, REMSDT, using cross-memory services for associated shared data table, MYSDT, on CICSIDC.
Connection : CICA
Group : CICAGRP
DEscription : MRO CONNECTION CICSIDA TO CICSIDC
CONNECTION IDENTIFIERS
Netname : CICSIDC
INDsys :
REMOTE ATTRIBUTES
REMOTESystem :
REMOTEName :
CONNECTION PROPERTIES
ACcessmethod : IRc Vtam | IRc | INdirect | Xm
Protocol : Appc | Lu61
SInglesess : No No | Yes
DAtastream : User User | 3270 | SCs | STrfield | Lms
RECordformat : U U | Vb
OPERATIONAL PROPERTIES
AUtoconnect : No No | Yes | All
INService : Yes Yes | No
Figure 38. Example CONNECTION resource definition, CICA, installed on CICSIDA.. Only relevant parameters are
shown; other parameters are allowed to default.
Sessions : ATOC
Group : CICAGRP
DEscription : SESSION FOR MRO CICA TO CICC
SESSION IDENTIFIERS
Connection : CICA
SESSName :
NETnameq :
MOdename :
SESSION PROPERTIES
Protocol : Lu61 Appc | Lu61
MAximum : 000 , 000 0-999
RECEIVEPfx : RB
RECEIVECount : 005 1-999
SENDPfx : SB
SENDCount : 003 1-999
SENDSize : 04096 1-30720
RECEIVESize : 04096 1-30720
SESSPriority : 100 0-255
Figure 39. Example SESSION resource definition, ATOC, associated with connection, CICA.. Only relevant parameters
are shown; other parameters are allowed to default.
File : REMSDT
Group : CICCGRP
DEScription :
VSAM PARAMETERS
DSNAme :
Password : PASSWORD NOT SPECIFIED
RLsaccess : No No | Yes
Lsrpoolid : 1 1-8 | None
READInteg : Uncommitted Uncommitted | Consistent | Repeat
DSNSharing : Allreqs Allreqs | Modifyreqs
STRings : 001 1-255
Nsrgroup :
REMOTE ATTRIBUTES
REMOTESystem : CICC
REMOTEName : MYSDT
RECORDSize : 1-32767
Keylength : 1-255
INITIAL STATUS
STAtus : Enabled Enabled | Disabled | Unenabled
Figure 40. Example remote FILE resource definition, REMSDT, installed on CICSIDA.. Only relevant parameters are
shown; other parameters are allowed to default.
The following assumptions about the IMS INSTALL/IVP process are made:
1. The IMS sample database, DI21PART, has been successfully defined. This
database comprises two data sets:
v DI21PART
v DI21PARO
2. The DI21PART database has been loaded with the IMS-supplied sample data.
3. The following IMS-supplied procedures have been installed in an executable
procedure library:
v ACBGEN
v PSBGEN
4. The sample DRA startup table, DFSPZPIV, has been built and installed in the
IMS.SDFSRESL library, previously called IMS.RESLIB.
5. The sample DBCTL system, IVP3, is available.
For information about installing IMS, the INSTALL/IVP process, and running the
IMS IVPs, see the IMS Installation Guide.
If you want to examine the sample members used by this IVP, here is a list of
them, indicating where you can find each one:
DFHIVPDB
This IVP contains some explanatory comments, and was installed in the
hlq.XDFHINST library when you ran the DFHISTAR job. For details of the
DFHISTAR job, see Chapter 37, “Tailoring the CICS-supplied skeleton
jobs,” on page 239.
DFH$SIP5
DFH$SIP5 is the member of the hlq.SYSIN data set that contains the system
initialization parameter overrides specific to the DFHIVPDB job. You can
specify other system initialization parameters (for example, APPLID,
CICSSVC, and DFLTUSER) for the DFHIVPDB job; the DFH$SIP5 member
of the hlq.SYSIN data set is a convenient place to do so.
DFHTCT5$
DFHTCT5$ is the sample TCT that specifies the sequential devices that
CICS uses in this IVP as a simulated terminal, with a terminal name of
SAMA. The source statements are in the DFH$TCTS member of the
hlq.SDFHSAMP library.
When you are satisfied that you have made all the necessary preparations, and that
all the prerequisite jobs have been run, submit the DFHIVPDB job. The job loads
the DL/I transactions into CARDIN. CICS reads the transactions, and sends the
output to the PRINTER sequential data set. The process is as follows:
v The first transaction copied from the DFH$DBAN member of the
hlq.SDFHSAMP library to CARDIN is CDBC CONNECT SUFFIX(IV). This
transaction connects CICS to DBCTL, using the sample DRA startup table,
DFSPZPIV.
v The final transaction copied from the DFH$DBAN member of the
hlq.SDFHSAMP library to CARDIN is CEMT PERFORM SHUT.
v If you want to use some commands online before CICS shuts down, delete the
CEMT command before you run the job. You can then issue CEMT, CEDA, and
other CICS-supplied transactions, and initiate a shutdown either from a CICS
terminal or through an MVS console.
v If you want to communicate with CICS through an MVS console, you must
define a console to CICS before you start DFHIVPDB, as described in Defining
console devices to CICS in Configuring.
v If you want to enter MODIFY commands from terminals connected to TSO, you
must define the TSO users as console devices, as described in Defining console
devices to CICS in Configuring.
A sample job log from a run of the DFHIVPDB job is given in Figure 41 on page
401. The results you get from the transaction processing are similar to those shown
in Figure 41 on page 401, Figure 42 on page 402, and Figure 43 on page 402.
Figure 41. Sample job log output from the DFHIVPDB job
v The DFHIVPDB job uses some system initialization parameters included in the
DFH$SIP5 member of the SYSIN data set, to override default system
initialization parameters. Further, the DFH$SIP5 member was edited to specify
other system initialization parameters to create the DFHIVPDB job log shown.
For information about these extra system initialization parameters used by the
IVP jobs, see “Specifying system initialization parameters for the IVP jobs” on
page 368.
v If you want COBOL, C, C++, and PL/I languages, remove the comment marks
from the SCEERUN and SCEERUN2 libraries, and increase the memory size for
the job.
You see messages similar to those in Figure 42 on page 402 at the end of the
MSGUSER section of the job output.
Figure 42. Sample job log output from the end of the MSGUSER section of the DFHIVPDB job
You see messages similar to those in Figure 43 in the Printer section of the job
output.
INPUT: ASMCDPA02MS16995-28
PART=02MS16995-28 DESC= SCREW
AREA INV PROJ DIV UNIT CURRENT ON IN TOTAL COUNT BACK
DEPT CD PRICE REQMTS ORDER STOCK DISBURSE TAKEN ORDR
1. AA 165 11 0.152 260 0 300 4030 N 0
2. BA 165 15 0.069 60 0 80 5000 N 0
3. FF 554 6D 0.069 440 0 430 5000 N 0
4. 2 59 109 26 6.980 950 0 1000 5000 N 0
INPUT: ASMCDPA02JAN1N976B
PART=02JAN1N976B DESC= DIODE CODE-A
AREA INV PROJ DIV UNIT CURRENT ON IN TOTAL COUNT BACK
DEPT CD PRICE REQMTS ORDER STOCK DISBURSE TAKEN ORDR
1. 2 55 091 26 0.000 170 2000 170 4710 N 0
Figure 43. Sample job log output from the Printer section of the output of the DFHIVPDB job
To use the DB2 installation verification procedure, and Phase 5 in particular, see
the DB2 administration documentation, which gives information about the
procedure and describes the steps involved.
To prepare the sample applications to be used in a CICS DB2 environment, run the
DSNTEJ5C and DSNTEJ5P jobs supplied with DB2.
DSNTEJ5C installs the sample application transactions in COBOL and prepares the
organization application. DSNTEJ5P installs the transactions in PL/I and prepares
the organization, project, and phone applications.
If you enter one of these transaction codes, the panels shown in Figure 44 or
Figure 45 on page 404 are displayed.
ACTION SELECTION
MAJOR SYSTEM ...: O ORGANIZATION
ACTION .........:
OBJECT .........:
SEARCH CRITERIA.:
DATA ...........:
SELECT AN ACTION FROM FOLLOWING LIST
A ADD (INSERT)
D DISPLAY (SHOW)
E ERASE (REMOVE)
U UPDATE (CHANGE)
Figure 44. Initial panel for the DB2 project application in CICS
A ADD (INSERT)
D DISPLAY (SHOW)
E ERASE (REMOVE)
U UPDATE (CHANGE)
Figure 45. Initial panel for the DB2 project application in CICS
For detailed information about running the organization and project applications,
see Overview of the CICS DB2 interface in Product overview.
To start the phone application, clear the screen and type in the transaction code
D8PT. You can change the transaction codes when you install DB2. Check with your
system administrator to find out if they have been changed from those shown.
CICSPlex SM provides different features for managing your CICS regions, but you
do not have to set up everything straight away. Instead you can adopt the features
in a staged approach, gradually improving your environment until you have a
highly available system. The following roadmap outlines the different stages for
system management:
Stage 1 - Single system image (SSI)
Create a single system image, also called a topology, for some or all of your
CICS regions. CICSPlex SM can manage regions across logical partitions
and provides a single point of management for your regions. Group your
regions into a CICSplex to manage them together. The samples provided
with CICS help you to set up the CMAS region, the management point for
the CICS regions, and a WUI server, a region that you use to access the
CMAS from CICS Explorer or Web User Interface. You can also create a
MAS, a CICS region that can be managed by CICSPlex SM.
A single system image is a prerequisite for other CICS features, such as
providing a platform. For more information about planning your CICSPlex
SM environment, see Designing your CICSPlex SM environment in
Configuring.
Stage 2 - Workload management (WLM)
Create workload specifications that dynamically route transactions to
whichever CICS region is the most appropriate, based on its availability or
specific criteria. Workload management removes the need to code specific
links and routing between regions and optimizes a workload across your
CICS regions. For more information about workload management, see
Configuring workload management in Configuring.
Stage 3 - Business application services (BAS)
Move CICS resources from CSD files to the CICSPlex SM data repository.
The data repository already contains definitions for the topology and
workload management. By moving all resource definition to a central
location, you can install a definition across many CICS regions. BAS
provides other useful features such as saving different versions of a
resource, and producing both local and remote instances of a resource from
a single definition. For more information about BAS, see Administering
BAS in Administering.
Stage 4 - Real-time analysis (RTA)
Create RTA specifications to monitor and analyze the status of CICS
regions and generate notifications when a condition occurs. CICSPlex SM
can issue warnings when a problem occurs in a CICS region, for example
the region is short on storage, or when a particular resource is in the
Web User
Interface user
MVS
WUI
Data server
repository
CICSplex: WUIPCM01
CICSplex definitions
Names:
WUIPCM01 CMAS MP
CYSPLX01 CMAS01
Maintenance point:
CMAS01
WUI: WUINCM01
MAS
CICS region: CSYS01
CSYS01
CICSplex: CYSPLX01
The CICSPlex SM members that provide the samples are supplied in the
TDFHINST library. For a list of the members, see “CICSPlex SM postinstallation
members” on page 240.
Procedure
1. Ensure that the CICSPlex SM SEYUAUTH library is defined to MVS as an
APF-authorized library.
2. Ensure that the CICSPlex SM SEYULINK library is included in the MVS link
list.
3. The number of linkage indexes increases by 1 for CICSPlex SM. Define it with
the MVS NSYSLX parameter in IEASYSxx, which increases by one.
4. The number of common MVS data spaces increases by adding 6 for each
CMAS. Define it with the MVS MAXCAD parameter in IEASYSxx.
5. Check the IEASYSxx member of SYS1.PARMLIB that you use for MVS
initialization and make a note of the initialization values. These values are
referenced during the installation of a CMAS. For a detailed description of
these values, see “Noting IEASYSxx values for CICSPlex SM” on page 117.
6. Ensure that enough MVS auxiliary storage is available to support the data
spaces used by each CMAS. A CMAS uses up to nine MVS data spaces, which
can increase auxiliary storage by as much as 100 MB. For details on how to
increase auxiliary storage, see the z/OS Initialization and Tuning Guide.
7. Assign an SNA APPLID and SYSID for each of the CMAS, MAS, and Web User
Interface regions. The SEYUDEF library members, EYUDVTIA and EYUDVTIB,
contain sample SNA APPL statements that you can use and modify. See
Chapter 20, “Defining CICS regions as applications to SNA,” on page 135 for
more information about SNA and CICS. You can record the APPLID and SYSID
values on the planning worksheet.
8. Reserve a TCP/IP port for the Web User Interface server. You can record the
port number on the planning worksheet.
The minimum subset of parameters to tailor are shown in the following steps, but
you can tailor any of the parameters mentioned on the IVP planning worksheet.
You can record your values in the IVP planning worksheet; see “IVP planning
worksheet” on page 16.
Procedure
1. Edit the LIB parameter to specify where you want to add the customized
members generated by the DFHISTAR job. You can specify a 1- to 44-character
name of a library. The default is CICSTS51.XDFHINST.
2. Edit the SCOPE parameter to specify POST.
3. Edit the TCPIPHST parameter to specify the address of the host server; for
example, MVSXX.COMPANY.COM.
4. Edit the TCPIPPRT parameter to specify the port number to be used by the Web
User Interface server.
5. Edit the CMCIPORT parameter to specify the port number to be used by the CICS
management client interface (CMCI).
6. Edit the TIMEZONE parameter to specify which time zone is used for the data
repository. For a full list of time zones, see CICSPlex SM Administration.
7. Run the tailored DFHISTAR job.
Results
v DFHISTAR creates the high-level qualifiers for the CICS and CICSPlex SM load
libraries using two parameters:
– TINDEX provides the highest-level index.
– XTRAQUAL is an optional lower-level index.
v The index ‘CICS' or ‘CPSM' appears after the TINDEX and before the
XTRAQUAL.
v DFHISTAR uses the same parameter for the system name and the applid.
Procedure
1. EYUCMSDS. This job creates the CICS and CICSPlex SM data sets for a CMAS.
By default, DFHISTAR customizes the DREPINIT job step, in EYUCMSDS, to
create a CMAS data repository and add definitions for the CMAS, a WUI
server, and a CICSplex for that WUI server.
2. EYUWUIDS. This creates the CICS and CICSPlex SM data sets for a WUI
server.
3. EYUCSYDS. This creates the CICS and CICSPlex SM data sets for a MAS.
Procedure
1. Review and edit the EYUCMSSP sample member system initialization
parameter. Edit the CICS SVC number (CICSSVC) if you use a number other
than the CICS default SVC number.
2. Run the EYUCMASJ sample member to start the CMAS.
Results
The CICS region starts and the CMAS initializes. Check the job log for message:
EYUXL0010I applid CMAS initialization complete
For a complete list of Web User Interface server initialization parameters, see “Web
User Interface server initialization parameters” on page 322.
Procedure
1. Review and edit the WUI-related CICS system initialization parameters in
sample member EYUWUISP.
v Edit the CICS SVC number (CICSSVC) if you use a number other than the
CICS default SVC number.
where xxx represents the language of the Web User Interface server and yyyy
represents the code page of the client. For example, if your chosen language
is Japanese, code:
INITPARM=(EYU9VKEC=’JPN’,EYU9VWAN=’JPN1’).
For a list of language and code page identifiers, see “Specifying language
and code page information for the WUI” on page 317.
2. Prepare the code page conversion table DFHCNV, described in “Preparing the
code page conversion table for the WUI” on page 318.
3. Run the EYUWUIJ sample member to start the WUI.
Results
EYUWUIJ automatically imports the Web User Interface views into the server
repository. Check the EYULOG for messages:
EYUVS0002I CICSPlex SM Web User Interface initialization complete.
Procedure
1. Enter the following web address: http://hostname:portnumber
v hostname is the TCP/IP host name on the TCPIPHOSTNAME parameter in
the EYUWIIN member (specified as TCPIPHST for DFHISTAR).
v portnumber is the TCP/IP port number on the TCPIPPORT parameter in the
EYUWUIIN member (specified as TCPIPPRT for DFHISTAR).
After you have signed on to your system, you see the main menu for the Web
User Interface.
2. From the main menu, select the CICS regions option. Details of the WUI server
region are displayed. By default, DFHISTAR customizes EYUWUIIN to set the
DEFAULTCONTEXT and DEFAULTSCOPE to the name of the CICSplex
defined for the WUI.
Procedure
1. Define a CICSplex for your MAS, starting from the WUI main menu:
v Click Administration views > CMAS configuration administration views >
CICSplex definitions
v Create a CICSplex definition:
– Click Create.
– Specify CICSplex using the name specified in the CICSPLEX parameter in
the EYULMS0P member. You can leave the default values in the other
fields.
– Click Yes.
2. Add a MAS to your newly defined CICSplex, starting from the WUI main
menu:
v Change the Context and Scope fields to the name of the CICSplex and click
Set. The name matches the CICSPLEX parameter in the EYULMS0P member.
v Click CICSPlex SM operations views > CICS system definitions.
v Click Create to create a CICS system definition.
v Set the CICS system definition name using the NAME parameter from
EYULMS0P.
v Set the Primary CMAS name using the NAME parameter from EYUCMS0P.
v You can leave the Period definition name blank. A PERIODEF is required to
set time periods for the CICSPlex SM system availability resource monitoring
(SAM). SAM is not activated in this IVP.
v Set the MAS Application ID using the APPLID parameter from EYULMSSP.
v Set the MAS System ID using the SYSIDNT parameter from EYULMSSP.
Procedure
1. Review and edit the MAS-related CICS system initialization parameters in the
EYULMSSP sample member. Edit the CICS SVC number (CICSSVC) if you use
a number other than the CICS default SVC number.
2. Run the EYUCSYSJ sample member to start the MAS.
Results
The CICS region starts and the MAS initializes. Check the MAS job log for these
messages:
EYUNL0099I LMAS LRT initialization complete.
EYUTS0003I Topology event for sysname Complete - APPLID (applid) CICSplex (plexname)
Procedure
1. Click CICS regions from the WUI main menu. Ensure the Context and Scope
fields are set to the CICSplex name used as the CICSPLEX parameter in
EYULMS0P. Details of your managed CICS system are displayed.
2. Click Administration views > CMAS configuration administration >
CICSplex definitions. Two CICSplexes are shown, one created by the
EYU9XDUT step in the EYUCMSDS job and the other by you using the WUI.
Results
You have now completed the setup of your small CICSPlex SM environment. If
you have been using these tasks as an installation verification procedure, the IVP is
now complete.
Procedure
v To shut down the MAS, see “Stopping and restarting management of a CICS
system” on page 344.
v To shut down the WUI server, see “Starting and stopping the Web User
Interface” on page 333.
v To shut down the CMAS, see “Shutting down a CMAS” on page 312.
You can continue to define more managed CICS systems and add them to your
CICSplex. In a larger configuration, you might have several CMASs. A CMAS that
is specified as the context when you create a CICSplex definition is the
maintenance point CMAS for that CICSplex. When applying service to CICSPlex
SM, you must apply some PTFs to the maintenance points first, before the other
regions are updated. For this reason, keep the number of maintenance point
CMASs to a minimum.
When you connect a WUI to a CMAS, you can link the CMAS to others in your
network. After building your CMAS-to-CMAS links, you can remove the WUIs
and their CICSplex definitions from some of your CMASs to reduce the number of
maintenance point CMASs.
The default CICS resource definitions supplied for CICSPlex SM to start a CMAS,
MAS, and WUI. These are supplied in samples EYU$CDEF, EYU$MDEF, and
EYU$WDEF in the SEYUSAMP library.
| Important: Do not change the recovery options of the EYUDREPN FILE definition.
| This definition is used when CPSM determines that Data Repository file operations
| do not require logging. It is usual to receive LSR pool messages for EYUDREPN
| during CMAS initialization and ignore them. Make sure that the CICS JCL does
| not have a DD statement for EYUDREPN, and do not associate EYUDREPN with a
| data set name.
Table 32. Sample resource definitions supplied in EYU$CDEF (Part 1)
Resource type Name Description
File EYUDREP CICSPlex SM data repository
EYUDREPN CICSPlex SM data repository, alternate definition
Profile EYUCICSD CICSPlex SM debugger
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply in the United Kingdom or any other
country where such provisions are inconsistent with local law:
Licensees of this program who want to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact IBM United Kingdom
Laboratories, MP151, Hursley Park, Winchester, Hampshire, England, SO21 2JN.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Programming License Agreement, or any equivalent agreement
between us.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at Copyright and
trademark information at www.ibm.com/legal/copytrade.shtml.
Adobe and the Adobe logo are either registered trademarks or trademarks of
Adobe Systems Incorporated in the United States, and/or other countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Access to CICS
CICS Internet Guide, SC34-7173
CICS Web Services Guide, SC34-7191
Administration
CICS System Definition Guide, SC34-7185
CICS Customization Guide, SC34-7161
CICS Resource Definition Guide, SC34-7181
CICS Operations and Utilities Guide, SC34-7213
CICS RACF Security Guide, SC34-7179
CICS Supplied Transactions, SC34-7184
Programming
CICS Application Programming Guide, SC34-7158
CICS Application Programming Reference, SC34-7159
CICS System Programming Reference, SC34-7186
CICS Front End Programming Interface User's Guide, SC34-7169
CICS C++ OO Class Libraries, SC34-7162
CICS Distributed Transaction Programming Guide, SC34-7167
CICS Business Transaction Services, SC34-7160
Java Applications in CICS, SC34-7174
Diagnosis
CICS Problem Determination Guide, GC34-7178
CICS Performance Guide, SC34-7177
CICS Messages and Codes Vol 1, GC34-7175
CICS Messages and Codes Vol 2, GC34-7176
CICS Diagnosis Reference, GC34-7166
CICS Recovery and Restart Guide, SC34-7180
CICS Data Areas, GC34-7163
CICS Trace Entries, SC34-7187
CICS Debugging Tools Interfaces Reference, GC34-7165
Communication
CICS Intercommunication Guide, SC34-7172
CICS External Interfaces Guide, SC34-7168
Databases
CICS DB2 Guide, SC34-7164
CICS IMS Database Control Guide, SC34-7170
Programming
CICSPlex SM Application Programming Guide, SC34-7194
CICSPlex SM Application Programming Reference, SC34-7195
Diagnosis
CICSPlex SM Resource Tables Reference Vol 1, SC34-7204
CICSPlex SM Resource Tables Reference Vol 2, SC34-7205
CICSPlex SM Messages and Codes, GC34-7201
CICSPlex SM Problem Determination, GC34-7203
DATABASE 2 (DB2)
IBM DATABASE 2 Administration Guide, SC26-4888
IBM DATABASE 2 Application Programming and SQL Guide, SC26-4889
IBM DATABASE 2 Command and Utility Reference, SC26-4891.
Bibliography 445
Sysplex planning
System/390 MVS Sysplex Application Migration, GC28-1211
DFSMS/MVS
z/OS DFSMSdfp Storage Administration Reference, SC26-7402
DFSMS/MVS Access Method Services for ICF, SC26-4906
MVS
z/OS MVS Assembler Services Guide, SA22-7605
z/OS MVS Assembler Services Reference, Volume 1, SA22-7606
z/OS MVS Assembler Services Reference, Volume 2, SA22-7607
z/OS MVS Setting Up a Sysplex, SA22-7625
z/OS MVS Using the Subsystem Interface, SA22-7642
z/OS MVS Installation Exits, SA22-7593
z/OS MVS Programming: Authorized Assembler Services Reference Vol 1, SA22-7609
z/OS MVS Programming: Authorized Assembler Services Reference Vol 2, SA22-7610
z/OS MVS Programming: Authorized Assembler Services Reference Vol 3, SA22-7611
z/OS MVS Programming: Authorized Assembler Services Reference Vol 4, SA22-7612
z/OS MVS Planning: Workload Management, SA22-7602.
z/OS MVS Initialization and Tuning Guide, SA22-7591
z/OS MVS Initialization and Tuning Reference, SA22-7592
z/OS MVS Routing and Descriptor Codes, SA22-7624
z/OS Program Directory, GI10-6730
z/OS UNIX System Services Planning, GA22-7800
You can perform most tasks required to set up, run, and maintain your CICS
system in one of these ways:
v using a 3270 emulator logged on to CICS
v using a 3270 emulator logged on to TSO
v using a 3270 emulator as an MVS system console
Index 451
DFHCSVC, the CICS type 3 SVC DFHIRP, interregion communication DFHISTAR, job to define
(continued) program (continued) installation-related jobs (continued)
using more than one version 130 MRO requirement 264 SCLBSID parameter 47
DFHCSVCU utility program 129 DFHISMKD, installation job 56 SCOPE parameter 31, 53
DFHCTAIX, sample application alternate DFHISTAR SCSFMOD0 dsname 49
index 247 CMASNAME parameter 296 SCSQAU parameter 49
DFHCTCUS, sample application details customizing CMAS postinstallation SCSQCI parameter 49
data set 247 jobs 307 SCSQL parameter 48
DFHCTHLP, sample application help customizing MAS postinstallation SCSQLE parameter 48
data set 247 jobs 337 SEZACMTX dsname 47
DFHCXRF, transient data extrapartition customizing WUI postinstallation SEZARPCL dsname 47
data set jobs 321 SISPLOAD parameter 45
DD statement in IVP startup DSINFO 296 SIXMEXP dsname 49
procedure 371 editing 64 SMP/E zone and zone log
local request queue data set 371 postinstallation members for a dispositions 43
DFHDEFDS, job to create data sets for CMAS 306 SMPLTS parameter 40
each region 245 postinstallation members for a SMPMTS parameter 40
DFHDLPSB TYPE=ENTRY macro (remote MAS 336 SMPPTS parameter 40
DL/I) 280 postinstallation members for a SMPSCDS parameter 40
DFHDMPA data set, dump WUI 320 SMPSTS parameter 40
creating for a CICS region 245 submitting 64 SMPVOL parameter 36
DD statement in IVP startup DFHISTAR, creating postinstallation SMPWORK parameter 39
procedure 371 jobs 240 SMS parameter 35
DFHDMPB data set, dump DFHISTAR, job to define TAPEUNIT parameter 43
creating for a CICS region 245 installation-related jobs 30 TARGVOL parameter 36
DD statement in IVP startup BLKFB80 parameter 34 TCPIPHST parameter 51
procedure 371 BLKU parameter 34 TCPIPPRT parameter 51
DFHDPFMB debugging profiles alternate CMACVOL parameter 37 TEMPLIB parameter 30
index data set CMASNAME parameter 50 TIMEZONE parameter 51
creating for each CICS region 245 CMCIPORT parameter 50 TINDEX parameter 32
DFHDPFMB debugging profiles base CMSSYSID parameter 50 TZONE parameter 42
data set CSSLIB parameter 46 TZONECSI parameter 41
creating for each CICS region 245 CSYSNAME parameter 51 TZONELOG parameter 40
DFHDPFMB debugging profiles path CSYSPLEX parameter 51 UTILITIES parameter 31
data set CSYSYSID parameter 50 WORKUNIT parameter 34
creating for each CICS region 245 DEFVOL parameter 35 WUI parameter 51
DFHDSPEX, CICS post exit stub 149 DINDEX parameter 32 WUINAME parameter 51
DFHDUMPX, CICS dump query exit DISTVOL parameter 36 WUIPLEX parameter 51
LPA (link pack area) 149 DSINFO parameter 43 WUISYSID parameter 50
DFHEBTAL, -supplied procedure 62 DZONE parameter 42 DFHIVPBT, batch IVP 363, 372
DFHEITAL, -supplied procedure 62 DZONECSI parameter 41 DFH$BTCH input 372
DFHEXTAL, -supplied procedure 62 DZONELOG parameter 41 expected output 375
DFHGCD data set, global catalog GINDEX parameter 32 DFHIVPOL, interactive IVP 379
creating for a CICS region 245 GZONE parameter 42 CICS-supplied transactions 385
DD statement in IVP startup GZONECSI parameter 41 sample programs 385
procedure 371 GZONELOG parameter 40 terminating CICS 389
DFHHPSVC, SNA authorized path SVC JAVADIR parameter 34 transactions 385
loading into the MVS nucleus 133 JES parameter 31 DFHLCD data set, CICS local catalog
DFHHTML 322, 331, 333 JOB parameter 30 creating for each CICS region 245
DFHHTML data set for HTML templates LIB parameter 30 DD statement in IVP startup
creating for a CICS region 245 LINDEX parameter 32 procedure 371
DFHIJVMJ 59, 275 LOGGER-INFO parameter 49 DFHLNKVS, -supplied procedure 62
DFHINST1, installation job 56 NEWDREP parameter 52 DFHMAPS, -supplied procedure 62
DFHINST2, installation job 57 OLDDREP parameter 51 DFHMAPT, -supplied procedure 62
DFHINST3, installation job 57 OPTVOL parameter 37 DFHRPL (dynamic transaction routing
DFHINST4, installation job 58 parameter default values 25 exit)
DFHINST5, installation job 58 PREFIX parameter 32 in CMAS startup JCL 293
DFHINST6, installation job 58 SCEEBND2 dsname 46 in MAS startup JCL 338
DFHINSTA SCEECICS dsname 47 DFHSMPE, -supplied procedure 62
submitting 65 SCEECPP parameter 47 DFHSMPE, cataloged procedure 232
DFHINTRA data set, intapartition SCEELIB dsname 46 DFHSSEN, subsystem interface
transient data SCEELKED parameter 46 end-of-memory / end-of-task clean up
creating for a CICS region 245 SCEELKEX parameter 46 routine 149
DD statement in IVP startup SCEEOBJ parameter 46 DFHSSGC, connect module 149
procedure 371 SCEERUN dsname 47 DFHSSIyy, message-formatting
DFHIRP, interregion communication SCEERUN2 dsname 48 initialization member 122
program 149 SCEESAM parameter 48 DFHSSWT, WTO router 149
Index 453
GMMTEXTMSG 326 IMS, database control (DBCTL) 279 installation verification procedure (IVP)
group identifier (GID) 104 INACTIVETIMEOUT 328 (continued)
GRPLIST information center x transient data extrapartition data set,
z/OS MAS parameter 341 information center content types x DFHLRQ 371
GZONE parameter of the DFHISTAR initialize CMAS 293 transient data extrapartition data set,
job 42 initialize data repository 296 LOGUSR 371
GZONECSI parameter of the DFHISTAR initialize z/OS MAS 336, 338 transient data extrapartition data set,
job 41 INITPARM 317 MSGUSR 371
GZONELOG parameter of the DFHISTAR EYU9VKEC 317 transient data intrapartition data set,
job 40 EYU9VWAN 317 DFHINTRA 371
installation using the CEDA transaction 385
ACF/Communications Server using transactions from console
H definition for CICS
LOGMODE entries 268
device 385
installing CICS Explorer SDK 93
hardware requirements
ACF/Communications Server installing CICSPlex modules in MVS link
installing CICS TS 5
definition for IMS 268 pack area 167
HAVAIL, parameter of SNA APPL
ACF/SNA definition for CICS 267 eligible modules 168
statement 136
ACF/SNA definition for IMS installing Language Environment
help
LOGMODE entries 269 support 256
customizable view and menu
of CICS sample programs 385 Installing modules in the MVS link pack
help 322
type 3 SVC routine 264 area 160
HFS0DSN parameter of the DFHISTAR
installation jobs installing support for programming
job 33
elapsed time 55 languages 255
HFS1DSN parameter of the DFHISTAR
messages 58 installing system
job 33
restarting 54 software requirements 5
HFSADSN parameter of the DFHISTAR
running 54 InstallShield
job
installation verification procedure installing CICS Information
HFSADSN parameter 33
(IVP) 363 Center 71
HIDEPASSWORD, parameter of
applids, defining and activating 366 interface modules
DFHSSIyy 123
auxiliary temporary storage data set, CEECICS 255
high-performance option (HPO) 129,
DFHTEMP 371 Language Environment 255
133
auxiliary trace data set (A), interregion communication (IRC) 263
defining the CICS SVCs to MVS 129
DFHAUXT 371 intersystem communication over TCP/IP
DFHHPSVC, SNA authorized path
auxiliary trace data set (B), (IPIC)
SVC 133
DFHBUXT 371 defining connections 272
SNA authorized path,
batch IVP, DFHIVPBT 372 intrapartition transient data data set,
DFHHPSVC 133
CICS region definition data set 371 DFHINTRA
system initialization parameter 133
CICS startup procedure, creating for a CICS region 245
history recording 343
DFHSTART 369 DD statement in IVP startup
HISTRECSMSG 343
CMAC resources 369 procedure 371
hostname 317, 334
DFH$SIP2 member of SYSIN data IPCS tools
HTML template data set, DFHHTML
set 368 preparing to use 173
creating for a CICS region 245
DFHIVPBT, batch IVP updating library allocations 173
http 317, 334
system initialization IPIC
HTTP 259
parameters 368 TCPIP initialization parameter 272
FILEA data set, sample application ISC 259
data 371 ISMF storage class application 188
I global catalog data set,
IBM Tivoli NetView DFHGCD 371
sending generic alerts to 292
ICCFCC, -supplied procedure 63
interactive IVP, DFHIVPOL 379
defining a LU for 380
J
Java
ICCFCCL, -supplied procedure 63 local catalog data set, DFHLCD 371
components 275
ICCFCGL, -supplied procedure 63 messages data set, DFHCMACD 371
JVM 275
ICCFCL, -supplied procedure 63 RACF user ID authority 366
samples 276
IEASYSxx, MVS initialization member security 366
verifying installation 275
establishing requirements 119 SYSIN data set 371
z/OS UNIX files 275
noting values in 118 system definition data set 371
JAVADIR 59, 275
updating system initialization parameters 368
JAVADIR parameter of the DFHISTAR
for a CMAS 119 transaction dump (A) data set,
job 34
IEFSSNaa, MVS subsystem initialization DFHDMPA 371
JES parameter of the DFHISTAR job 31
member 119 transaction dump (B) data set,
JOB parameter of the DFHISTAR job 30
IEW0461 message from the binder 59 DFHDMPB 371
journal records, CMAS 309
IEW2646 message from the binder 59 transient data extrapartition data set,
journalmodels, CMAS 253
IEW2651 message from the binder 59 COUT 371
JPN 317
implementing MVS workload transient data extrapartition data set,
JPN1 317
management 177 DFHCXRF 371
JRNLDEFCH system parameter 353
import options 324
JRNLOPACT system parameter 353
Index 455
OPTVOL parameter of the DFHISTAR PTF temporary store (PTS) 40 sample JCL
job 37 PTS (PTF temporary store) 40 CMAS 293
MAS 338
to modify CICSPlex SM supplied
P R CICS resource definitions 252
sample program data, FILEA
parameters RACF (resource access control facility)
creating for each CICS region 245
CICS system initialization activating resource classes 107
DD statement in IVP startup
for z/OS MAS 340 authorizing the region user ID for
procedure 371
CICS system initialization parameters category 1 transactions 101
sample programs
for CMAS 298, 303 authorizing the region user ID to open
EYU$CNV1 318
CICSPlex SM system 347 a region's z/OS Communications
EYUJWREP 319
in CMAS startup JCL 347 Server ACB 100
sample programs in interactive IVP 385
in MAS startup JCL 347 authorizing the region user ID to use
sample programs, installing 385
PARSESS, parameter of SNA APPL MVS log streams 102
saved control data set (SCDS) 40
statement 136 defining the default CICS user
SCDS (saved control data set) 40
PASS option of SNA APPL parameter ID 109
SCEEBND2 parameter of the DFHISTAR
AUTH 143 installing the interface routines 113
job 46
PDIR (PSB directory) 279 IVP user ID authority 366
SCEECICS parameter of the DFHISTAR
PDSE 6 LOGSTRM general resource
job 47
performance definitions for MVS 177 class 102
SCEECPP parameter of the DFHISTAR
performance parameters (CICS), matching protecting CICS load libraries 99
job 47
to service policies 178 RECEIVE, function of SMP/E 231
SCEELIB parameter of the DFHISTAR
PERSIST, parameter of SNA APPL references, unresolved 58, 59
job 46
statement 136 region user ID, authorizing for category 1
SCEELKED parameter of the DFHISTAR
port 317, 334 transactions 101
job 46
postinstallation jobs region user ID, authorizing to OPEN a
SCEELKEX parameter of the DFHISTAR
EYUCMASP 293 region's ACB 100
job 46
postinstallation member 241 release synchronization of CMAS and
SCEEOBJ parameter of the DFHISTAR
postinstallation members CICS 291
job 46
EYUCMASJ 241 RELFILE data sets
SCEERUN parameter of the DFHISTAR
EYUCMASP 241 allocating 57
job 47
EYUCMS0P 241 requirements for CICS TS
SCEERUN2 parameter of the DFHISTAR
EYUCMSDS 241 hardware 5
job 48
EYUCMSSP 241 software 5
SCEESAMP parameter of the DFHISTAR
EYUCSYDS 242 resource classes, activating 107
job 48
EYUCSYSJ 242 resource definitions
SCLBSID parameter of the DFHISTAR
EYUCSYSP 242 dynamic creation during CICSPlex SM
job 47
EYUJHIST 242 initialization 250
SCOPE parameter of the DFHISTAR
EYUJWREP 241 RESOURCELIMIT 327
job 31, 53
EYULMS0P 242 RESSTATUS system parameter 355
SCSFMOD0 parameter of the DFHISTAR
EYULMSSP 242 restarting CMAS 313
job 49
EYULPMOD 242 restarting MVS MAS 344
SCSQANLE parameter of the DFHISTAR
EYUWUI0P 241 RESTORE, function of SMP/E 231
job 48
EYUWUIDS 241 REXX function package, installing 114
SCSQAUTH parameter of the DFHISTAR
EYUWUIIN 241 routecodes, generic 123
job 49
EYUWUIJ 241 ROUTECODES, parameter of
SCSQCICS parameter of the DFHISTAR
EYUWUIP 241 DFHSSIyy 123
job 49
EYUWUISP 241 RSVNONR, MVS initialization parameter
SCSQLOAD parameter of the DFHISTAR
predefined LU alias 139 IEASYSxx value 118
job 48
PREFIX parameter of the DFHISTAR RSVSTRT, MVS initialization parameter
SDFHENV 59, 275
job 32 IEASYSxx value 118
SDFHPL1 target library 36
problem state 97 run times of installation jobs 55
SDFJAUTH 276
procedures, copying into a procedure
SDSNLOAD parameter
library 61
SDSNLOAD parameter 48
PROG, MVS initialization parameter
IEASYSxx value 118
S SDSNLOAD parameter of the DFHISTAR
sample applications data sets, creating job 48
program temporary fix (PTF) 232
ACCTFILE, primer sample application SDUMP options 175
properties files
accounts 247 SEC system parameter 356
samples 275
ACIXFILE, primer sample application secondary extents, load libraries 231
protecting CICS load libraries 99
index 247 SECRPTLVL system parameter 357
PRTAUXT step of IVP jobs 370
DFHCTAIX, sample application SECTIMEOUT system parameter 357
PRTBUXT step of IVP jobs 370
alternate index 247 security 332
PRTDMPA step of IVP jobs 370
DFHCTCUS, sample application COVA 332
PRTDMPB step of IVP jobs 370
details 247 COVC 332
PRVMOD, system initialization
DFHCTHLP, sample application COVE 332
parameter 164
help 247 COVG 332
PTF (program temporary fix) 231, 232
Index 457
TCP/IP (continued)
ISC 259
TZONECSI parameter of the DFHISTAR
job 41
W
listener 259 TZONELOG parameter of the DFHISTAR web browser connection 334
SSL 260 job 40 Web User Interface server 315
TCPIP, system initialization create data sets 320
parameter 272 customize data sets 320
Web User Interface Server
TCPIPADDRESS 323
TCPIPHOSTNAME 317, 322, 334
U setup worksheet 16
UID 104 Web User Interface server initialization
TCPIPHST parameter of the DFHISTAR
UNIX System Services 275 optional parameters 323
job 51
UNIX System Services access Web User Interface server initialization
TCPIPHTTPHOST 323
MAXPROCUSER 104 parameters 322
TCPIPPORT 317, 323, 334
unresolved references 58, 59 AUTOREFRESH 326
TCPIPPRT parameter of the DFHISTAR
updating CICSplex definition CMCIPORT 323
job 51
BLSCECT 173 COLORINK 330
TCPIPSSL 324
CSD files using DFHCSDUP 250 COLORINKBANNER 330
TCPIPSSLCERT 324
user identifier (UID) 104 COLORINKLINK 330
TCPIPSSLCIPHERS 324
USERTR 317 COLORINKVLINK 330
TEMPLIB parameter of the DFHISTAR
USSDIR 59, 275 COLORPAPER 330
job 30
USSDIRA, parameter of DFHISTAR 34 COLORPAPERALT 330
temporary storage data set, DFHTEMP
UTILITIES parameter of the DFHISTAR COLORPAPERERROR 330
creating for each CICS region 245
job 31 COLORPAPERHEAVY 330
DD statement in IVP startup
procedure 371 COLORPAPERLIGHT 330
THOUSNDSEPARATOR 326 COLORPAPERRULE 330
times taken to run the installation V COLORPAPERWARN 330
jobs 55 VARY NET command 145 CVDASTYLE 325
TIMESEPARATOR 326 verification tests, running IVP jobs 363 DATEFORMAT 325
TIMEZONE parameter verify batch job, DFHIVPBT 372 DATESEPARATOR 325
EYUINST EXEC 297 DFH$BTCH input 372 DECIMALSEPARATOR 326
TIMEZONE parameter of the DFHISTAR expected output 375 DEFAULTCICSPLEX 328
job 51 verify interactive job, DFHIVPOL 379 DEFAULTCICSRGN 328
TINDEX parameter of the DFHISTAR invoking and running sample DEFAULTCMASCTXT 326
job 32 programs 385 DEFAULTCONNECT 328
TOBATCHREQ terminating CICS 389 DEFAULTCONTEXT 326
CICSPlex SM system parameter 360 using transactions 385 DEFAULTCSYSGRP 328
TOONLINEREQ verify interactive job, DFHIVPOLSNA LU DEFAULTDB2SS 328
CICSPlex SM system parameter 360 Verify DEFAULTEJCOBEAN 328
TOPOLLINT using CICS-supplied terminal DEFAULTEJDJBEAN 328
CICSPlex SM system parameter 361 transactions 385 DEFAULTEVENT 328
trademarks 442 verify interactive job, DFHIVPOLVTAM DEFAULTLOCFILE 328
transaction dump data sets DFHIVPOL 385 DEFAULTLOCTRAN 328
dump (A) data set, DFHDMPA 371 VPACE option of SNA APPL parameter DEFAULTMAPBAS 326
dump (B) data set, DFHDMPB 371 AUTH 136 DEFAULTMAPCOLL 326
transient data destination CSNE 137 VPACING, parameter of SNA APPL DEFAULTMAPMON 327
transient data extrapartition data sets statement 137 DEFAULTMAPRTA 327
destination before transient data VSAM RLS DEFAULTMAPWLM 327
initialization, DFHCXRF 371 activating the coupling facility DEFAULTMENU 327
destination before transient data structures 193 DEFAULTNAVIGATE 327
initialization, DFHLRQ 371 adding new parameters to DEFAULTPROGRAM 328
destination used by C/370 application SYS1.PARMLIB 190 DEFAULTREMFILE 328
programs 371 amending parameters in DEFAULTREMTRAN 328
destination used by CICS SYS1.PARMLIB(BPXPRMxx) 120 DEFAULTSCOPE 327
services 371 authorizing CICS user IDs 190 DEFAULTTASK 328
destination, LOGA, used by CICS CFRM policy 187 DEFAULTWARNCNT 327
sample programs 371 defining coupling facility cache GLOBALPREFILTER 327
transient data queue definitions 331 structures 187 GMMTEXTMSG 326
COLG 331 defining sharing control data INACTIVETIMEOUT 328
COVE 331 sets 189 MAXUSERS 328
COVI 331 defining SMS storage classes for RLS RESOURCELIMIT 327
COVP 331 access 188 SIGNONPANEL 328
type 3 SVC routine defining the coupling facility lock TCPIPADDRESS 323
in LPA 264 structure 187 TCPIPHOSTNAME 317, 322, 334
used for interregion definitions, required 187 TCPIPHTTPHOST 323
communication 263 establishing new procedures 190 TCPIPPORT 317, 323, 334
TZONE parameter of the DFHISTAR ISMF storage class application 188 TCPIPSSL 324
job 42 IXCMIAPU utility 187 TCPIPSSLCERT 324
VTAM LU alias 138 TCPIPSSLCIPHERS 324
THOUSNDSEPARATOR 326
X
XCF (cross-system coupling facility)
for cross-system MRO 264
XCF/MRO (cross-system MRO)
generating support for 265
XRF (extended recovery facility)
sessions, HAVAIL, parameter of SNA
APPL 136
XTRAQUAL parameter
XTRAQUAL parameter 33
XTRAQUAL parameter of the DFHISTAR
job 33
XXRSTAT exit, effect on takeover of an
SNA ACB 100
Z
z/OS Communication Server
version, release, and modification
level indicator 137
z/OS Communications Server
LOGMODE entries 268
Index 459
460 CICS TS for z/OS 5.1: Installation Guide
Readers’ Comments — We'd Like to Hear from You
CICS Transaction Server for z/OS
Version 5 Release 1
Installation Guide
We appreciate your comments about this publication. Please comment on specific errors or omissions, accuracy,
organization, subject matter, or completeness of this book. The comments you send should pertain to only the
information in this manual or product and the way in which the information is presented.
For technical questions and information about products and prices, please contact your IBM branch office, your
IBM business partner, or your authorized remarketer.
When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any
way it believes appropriate without incurring any obligation to you. IBM or any other organizations will only use
the personal information that you supply to contact you about the issues that you state on this form.
Comments:
If you would like a response from IBM, please fill in the following information:
Name Address
Company or Organization
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ do
_ _ not
_ _ _staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
PLACE
POSTAGE
STAMP
HERE
________________________________________________________________________________________
Fold and Tape Please do not staple Fold and Tape
Cut or Fold
GC34-2857-00 Along Line
GC34-2857-00