IBM SC34-6814-04 User Manual

Page 15

Advertising
background image

Chapter 28. CICS monitoring

. . . . . . . . . . . . . . . . . . 743

Introduction to CICS monitoring . . . . . . . . . . . . . . . . . . 743

How CICS monitoring data is passed to SMF . . . . . . . . . . . . 743
Coding additional event-monitoring points

. . . . . . . . . . . . . 744

Application naming event monitoring points . . . . . . . . . . . . . 744
The monitoring control table (MCT) . . . . . . . . . . . . . . . . 747

CICS monitoring record formats . . . . . . . . . . . . . . . . . . 750

SMF header and SMF product section . . . . . . . . . . . . . . . 750
CICS data section . . . . . . . . . . . . . . . . . . . . . . 754

Chapter 29. Writing statistics collection and analysis programs . . . . . 769
Writing a program to collect CICS statistics . . . . . . . . . . . . . . 769

Background information . . . . . . . . . . . . . . . . . . . . 769
Resetting statistics counters

. . . . . . . . . . . . . . . . . . 770

Using the EXEC CICS COLLECT and EXTRACT STATISTICS commands

770

CICS statistics record format . . . . . . . . . . . . . . . . . . . 771

SMF header and SMF product section . . . . . . . . . . . . . . . 771
CICS statistics data section . . . . . . . . . . . . . . . . . . . 773

Using an XSTOUT global user exit program to filter statistics records . . . . 776
Processing the output from CICS statistics . . . . . . . . . . . . . . 777

Part 6. Customizing CICS compatibility interfaces . . . . . . . . . . . . . . 779

Chapter 30. The dynamic allocation sample program . . . . . . . . . 781
Overview of the dynamic allocation program

. . . . . . . . . . . . . 781

Installing the program and transaction definitions . . . . . . . . . . . . 782
The dynamic allocation program—terminal operation

. . . . . . . . . . 782

Using the dynamic allocation program’s Help feature

. . . . . . . . . . 782

The dynamic allocation program—values . . . . . . . . . . . . . . . 783

Abbreviation rules for keywords . . . . . . . . . . . . . . . . . 784
System programming considerations

. . . . . . . . . . . . . . . 784

The flow of control when a DYNALLOC request is issued . . . . . . . . . 784

Part 7. Customizing CICS security processing . . . . . . . . . . . . . . . . 787

Chapter 31. Invoking an external security manager . . . . . . . . . . 789
An overview of the CICS-ESM interface . . . . . . . . . . . . . . . 789
The MVS router . . . . . . . . . . . . . . . . . . . . . . . . 789

The MVS router exit

. . . . . . . . . . . . . . . . . . . . . 789

Using ESM exit programs to access CICS-related information . . . . . . . 791

For non-RACF users — the ESM parameter list . . . . . . . . . . . 792
For RACF users — the RACF user exit parameter list . . . . . . . . . 792
The installation data parameter list . . . . . . . . . . . . . . . . 793

CICS security control points. . . . . . . . . . . . . . . . . . . . 796
Using early verification processing . . . . . . . . . . . . . . . . . 797

Writing an early verification routine . . . . . . . . . . . . . . . . 798
Using CICS API commands in an early verification routine

. . . . . . . 799

Return and reason codes from the early verification routine . . . . . . . 799

Chapter 32. Writing a “good night” program

. . . . . . . . . . . . 801

The communications area of the “good night” program . . . . . . . . . . 801
The sample “good night” program, DFH0GNIT . . . . . . . . . . . . . 803

What the sample program does . . . . . . . . . . . . . . . . . 803

Customizing the sample “good night” program . . . . . . . . . . . . . 804

Contents

xiii

Advertising