CICS ADMINISTRATION1

download CICS ADMINISTRATION1

of 22

Transcript of CICS ADMINISTRATION1

  • 8/4/2019 CICS ADMINISTRATION1

    1/22

    CICS ADMINISTRATION

    TABLE OF CONTENTS

    1. ABOUT THIS BOOK

    2. CICS ADMINISTRATOR TASK

    2.1 Monitoring CICS log

  • 8/4/2019 CICS ADMINISTRATION1

    2/22

    2.2 Defining and installing various IDs

    2.3 CICS SIT Parameters

    2.4 CICS TRANSACTIONS

    2.5 CICS Start up and shutdown

    3. CICS UTILITITES

    4. CICS INSTALLATION

    5. CICS errors

    1 ABOUT THIS BOOK

    This book will explain the various tasks of CICS administrator and solutions for the problems which we will

    face commonly and also it explains about the various transaction and parameters which is used in CICS.

    2. CICS ADMINISTRATOR TASK

  • 8/4/2019 CICS ADMINISTRATION1

    3/22

    Monitoring CICS log

    Defining and installing various IDS to user like program-id,Trans-id,file-id,Mapset,Db2 Entries and

    maintaining those IDS

    Adding SIT (system initialization parameters) if needed

    CICS Startup and shut down

    Knowledge of Various Transaction

    Knowledge of CICS startup procedure

    2.1 MONITORING CICS LOG

    The CICS log is monitored by using following command

    CEMT INQUIRE TASK

    It shows the various tasks that are being executed in CICS along with the priority. Task which is having 001

    can be purged if it exists for more time. It shows along with the transaction that is being executed with the

    CICS. We can purge by using.Priority varies from 001-255 where 255 is the highest priority.

    CEMT INQUIRE TASK F

    This manual purging can be avoided if we set the ICVR parameter in CICS

    2.2 DEFINING AND INSTALLING VARIOUS IDs

    Mainly in CICS we have to give the user Program-id, Transid, db2Entry, File Entry, Mapset Entry, TDQ entryand we have monitor the CICS jobs .If it is in loop we have to purge the Job.

    This can be defined and installed in two ways:

    1. Manually defining thru CICS.

    2. Through submitting JCLS present in (sysadm.cics.jcls)

    Manually Defining:

    1. Enter into CICS region specify the following command:

    CEDA DEF PROG

  • 8/4/2019 CICS ADMINISTRATION1

    4/22

    Specify the program name to be -> user-id P

    Specify the Group name to be -> DEVP

    Specify the language which user uses -> COBOL, Assembler etc

    After giving all these entries press enter so that you will be getting define successful.

    CEDA DEF TRANS -> T o define transaction

  • 8/4/2019 CICS ADMINISTRATION1

    5/22

    Specify Transaction id: First 3 letters of the user-id (e12345): Trans-id: E123

    (Maximum of 4 characters)

    Specify Program name: User-id P

    Specify Group: DEVP

    CEDA DEF DB2 ENTRY:

    Specify db2 entry: User-id P

    Plan Name: User-id p

    Trans-id: E

    Like wise look into JCLs present in sysadm.cics.jcls and specify all the other entries.

    Installation of the entries:

    CEDA DIS GROUP (DEVP)

    Place I to install the entries.

  • 8/4/2019 CICS ADMINISTRATION1

    6/22

    Submitting through JCLS:

    We can use the JCLS which is present in SYSADM.CICS .JCLS.

    Install the entries by the above way.

    Purge the CICS Task :

    Whenever CICS seems to be slow, it may be due to CICS jobs in loop

    The Priority which is in 255 is completed .The job which is in 001 is in loop .So we can purge that job by

    specify fnear that.

    2.3 CICS SIT PARAMETERS:

  • 8/4/2019 CICS ADMINISTRATION1

    7/22

    SIT is the System Initialization Parameters. During the start up of CICS, it reads the dataset

    CICSTS22.CICS.SYSIN (DFHSIP1).Depending on these parameters only we can able to perform various

    operations:

    The following are the SIT parameters defined in our system.

    XRF: (Extended Recovery Feature option)

    Options: XRF=YES/NO

    Description: If this parameter is defined as YES then there are two CICS regions and CICS system definition file

    should be shared with both the regions. However, when you run CICS with XRF, CICS always ensures (except for

    the CSD) that there is no conflicting concurrent use of data sets by an active CICS region and its alternate CICS

    region, even though they are running in different MVS images.

    Our Current Config: As for as now we are having only one region CICS1.So

    XRF=NO

    EDSALIM: (Extended Dynamic Storage Areas)

    Options: EDSALIM ={20M|number}

    Descriptions:Specifies the upper limit of the total amount of storage within which CICS can allocate the

    individual extended dynamic storage areas (EDSAs) that reside above the 16MB boundary.

    20M The default EDSA limit is 20MB (20 971 520 bytes).

    Number Specify number as a value in the range 10MB to 2047MB, in multiples of 1MB. If the size

    specified is not a multiple of 1MB, CICS rounds the value up to the next multiple. You can specify number

    in bytes (for example, 33 554 432), or as a whole number of kilobytes (for example, 32 768K), or a whole

    number of megabytes (for example, 32M).

  • 8/4/2019 CICS ADMINISTRATION1

    8/22

    Our Current Config: This extended storage is specified as 60Mas our configuration.

    GMTRAN :( Good Morning Transaction)

    Options : GMTRAN=( Some transaction Name )

    Description: This is the transaction which is going to be executed when we SIGNON in CICS region.

    Our Current Config : GMTRAN=CESN

    GMTEXT: (Good Morning Text)

    APPLID: (Application ID)

    Options: APPLID=

    Options : GMTEXT=ANY TEXT

    Descriptions: Text which is going to be executed while signon to the CICS

    Our system config: GMTEXT= WELCOME TO IFLEX CICS

  • 8/4/2019 CICS ADMINISTRATION1

    9/22

    Description: ID for CICS. This ID should match with the VTAM ACBNAME Parameter which is in

    SYS1.VTAMLIST

    Our system config : CICS1

    MXT : (Maximum Number of Concurrent Task in CICS)

    Option: MXT={5|number}

    Description: Maximum number of user task that can be executed at a time .The Number can vary from 1

    thru 999.It does not include CICS system Task.

    Our system Config: MXT=60

    SEC: (Security)

    Option : SEC=YES/NO

  • 8/4/2019 CICS ADMINISTRATION1

    10/22

    Description: Specifies what level of external security you want CICS to use.

    YES You want to use full external security. CICS requires the appropriate level of authorization for the

    access intent: a minimum of READ permission for read intent, and a minimum of UPDATE permission for

    update intent.

    No: Security is not implemented

    Our system Config: SEC=YES

    GRPLIST: (Group List)

    AUXTR: (Auxiliary Trace)

    Options : GRPLIST={DFHLIST |name|(name[,name2][,name3][,name4])

    Description: specifies the names (each 1 through 8 characters) of up to four lists of resource definition groups

    on the CICS system definition (CSD) file. The resource definitions in all the groups in the specified lists are

    loaded during initialization when CICS performs a cold start. If a warm or emergency start is performed, the

    resource definitions are derived from the global catalog, and the GRPLIST parameter is ignored. Any duplicate

    resource definitions in later group lists override those in earlier group lists.Do not code GRPLIST=NO unless

    you have a group list named NO.

    Our system Config : GRPLIST=IVPLIST (view the group in the list by CEDA DIS LIST(*))

  • 8/4/2019 CICS ADMINISTRATION1

    11/22

    Options: AUXTR ={OFF|ON}

    Descriptions: You may need to use auxiliary trace data sets to avoid the loss of diagnostic information,

    because internal trace table entries wrap around. When the end of the internal trace table is reached,

    subsequent entries overwrite those at the start of the table. To get a trace of CICS activity in which trace

    entries are not overwritten, use the auxiliary trace data sets. This can be particularly useful if you are using

    CICS trace during startup, because of the high volume of trace entries written when CICS is initializing.

    Specifies whether the auxiliary trace destination is to be activated at system initialization. This parameter

    controls whether any of the three types of CICS trace entry are written to the auxiliary trace data set. The

    three types are: CICS system trace (see the SYSTR parameter), user trace (see the USERTR parameter), and

    exception trace entries (that are always made and are not controlled by a system initialization parameter).

    OFF Do not activate auxiliary trace.

    ON Activate auxiliary trace.

    Our System Config: AUXTR=ON

    Datasets are: CICSTS22.CICS.CICSHW61.DFHAUXTCICSTS22.CICS.CICSHW61.DFHBUXT

    AUXTRSW: (Auxiliary Trace switch)

    Options: AUXTRSW ={NO|ALL|NEXT}

    Descriptions: specifies whether you want the auxiliary trace autoswitch facility.

    NO Disables the autoswitch facility.

    NEXT Enables the autoswitch facility to switch to the next data set at end of file of the first data set used for

    auxiliary trace. Coding NEXT permits one switch only, and when the second data set is full, auxiliary trace is

    switched off.

  • 8/4/2019 CICS ADMINISTRATION1

    12/22

    DB2CONN: (Db2 Connection)

    MQCONN: (MQ series Connection)

    Options: MQCONN=YES/NO

    ALL Enable the autoswitch facility to switch to the inactive data set at every end of file. Coding ALL permits

    continuous switching between the two auxiliary trace data sets, DFHAUXT and DFHBUXT, and whenever a

    data set is full, it is closed and the other data set is opened.

    Our System Config: AUXTR=NEXT

    Options: DB2CONN=YES/NO

    Descriptions:specifies whether you want CICS to start the DB2 connection automatically during

    initialization.

    NO Do not automatically invoke DFHD2CM0, the CICS DB2 attach program, during initialization.

    YES Invoke the CICS DB2 attach program, DFHD2CM0, automatically during CICS initialization

    .Specifying DB2CONN=YES is the recommended

    Our System Config : DB2CONN=YES

  • 8/4/2019 CICS ADMINISTRATION1

    13/22

    Descriptions: specifies whether you want CICS to start the MQSeries for MVS/ESA connection

    automatically during initialization.

    NO Do not automatically invoke CSQCCODF, the MQSeries attach program, during initialization.

    YES Invoke the MQSeries attach program, CSQCCODF, automatically during CICS initialization.

    Our system Config: MQCONN=YES

    XCMD: (External command security)

    Options: XCMD ={YES|name|NO}

    Descriptions: This is the External command security checking. If Yes is specified then if anyone trying to use

    a CICS resource ,it will check for RACF protection with that user-id and proceed if the user is authorized

    No: It wont check for security

    Our System Config: Initially it was set to XCMD=NO, But now it is XCMD=yes

    XDB2: (External Db2 security)

    Options: {NO|name}

    Descriptions: specifies whether you want CICS to perform DB2ENTRY security checking.

    NO CICS does not perform any DB2 resource security checks.

    Name CICS calls RACF, using the specified general resource class name, to check whether the userid associated

  • 8/4/2019 CICS ADMINISTRATION1

    14/22

    with the CICS DB2 transaction is authorized to access the DB2ENTRY referenced by the transaction.

    Our system Config :XDB2=NO

    Like wise we are having some parameters for external security

    XTRAN (External Transaction security):

    It is defined as YES in our system.

    Define whether to use RACF for resource level checking by using the XDCT, XFCT, XJCT, XPCT, XPPT,

    XPSB, and XTST system initialization parameters. Define whether to use RACF for transaction-attach security

    checking by using the XTRAN system initialization parameter .XUSER is for surrogate user.

    INITPARM: (Initialization Parameter)

    Options : INITPARM =(pgmname_1='parmstring_1'[, .... ,pgmname_n='parmstring_n'])

    Descriptions:

    Specifies that parameters are to be passed to application programs that use the ASSIGN

    INITPARM command.

    Our system config: INITPARM=(CSQCPARM='SN=CSQ1,TN=001,IQ=CICS1.INITQ')

  • 8/4/2019 CICS ADMINISTRATION1

    15/22

    SYSIDNT: (System Identification)

    This for indentification of system subsystem.It is defined as SYSIDNT=1 in our system

    Apart from this there are parameters for the BMS (Basic Mapping support) operations

    1. PGRET =/P for BMS retrieval command2 PGPURGE=T/, for BMS purge commands command3. PGCOPY=C/, for BMS copy4 PGCHAIN=X/, FOR BMS chaining command

    CICS START UP AND SHUT DOWN PROCEDURE:

    There are 3 types of start in CICS

    1. COLD START2. EMERGENCY START3. WARM START

    COLD START: /S CICS1 START=COLD

    Log records for local resources are purged and resource definitions rebuilt from the CSD or CICS control tables.Units of work on other systems are resynchronized with this system, as described under START=COLD.

    WARM START: /S CICS1 START=WARM

    A warm start restores CICS to the state it was in at the previous shutdown.

    START: /S CICS1 START=INITIAL

    You should rarely need to specify START=INITIAL; if you simply want to reinstall definitions of localresources from the CSD, use START=COLD instead.

    Examples of times when an initial start is necessary are:

    When bringing up a new CICS system for the first time. After a serious software failure, when the system log has been corrupted. If the global catalog is cleared or reinitialized.

    When you want to run CICS with a dummy system log. (If the system log is defined as a dummy, it is ignored.)

    If it is necessary to perform an initial start of CICS, you can do so in two ways:

    By specifying START=INITIAL.

    By using the recovery manager utility program, DFHRMUTL, to set the auto start override record toAUTOINIT, and specifying START=AUTO.

  • 8/4/2019 CICS ADMINISTRATION1

    16/22

    CICS UTILITIES:

    1. DFHLSCL

    DFHLSCU is a migration utility that helps you to define your CICS Transaction Server for OS/390 Release 3

    log streams, based on your CICS/ESA 4.1 or CICS/ESA 3.3 journaling activity. It examines one or moreCICS/ESA 4.1 or CICS/ESA 3.3 journal data sets, and produces a report

    Note: As of now it is not needed to use this utility. For further information refer IBM manual CICS operations

    and utility guide

    2 DFHSTUP

    The statistics utility program, DFHSTUP, prepares and prints reports offline, using the CICS statistics datarecorded on the MVS system management facilities (SMF) SYS1.MANx data sets. To enable the CICS statistics

    domain to record interval statistics on these SMF data sets, you must specify the STATRCD=ON system

    initialization parameter.

    Refer to the JCL:

    SYSADM.CICS .SMF.JCL

    Various steps to be performed

    1. RUN THE SMF JCL

    2. FROM THE OUTPUT FOR EX: SMFDUMPS.Y04.OCT WE HAVE TO RETREIVE ONLY

    RECORD TYPE 110 WHICH IS THE CICS RELATED TYPE

    3. FOR THE ABOVE OPERATION SUBMIT SYSADM.CICS.SMF.JCL BY MAKING CHANGES IN

    INPUT

    4. WE CAN ABLE TO SEE THE OUTPUT REPORT IN SPOOL

    Various Information that is being collected for this report is:

    AUTOINSTALL

    CONNECTION

    DBCTL

    DB2

    DISPATCHER

    ENQUEUE

    FEPI

    FILE JOURNAL

  • 8/4/2019 CICS ADMINISTRATION1

    17/22

    LOGSTREAM

    LSRPOOL

    MONITOR

    PROGAUTO

    PROGRAM RECOVERY

    STATS

    STORAGE

    SYSDUMP

    TCPIPSERV

    TABLEMGR

    TDQUEUE

    TERMINAL

    TRANCLASS or TCLASS

    TRANDUMP

    TRANSACTION

    TSQUEUE

    USER

    VTAM

    You can select the particular type to get the particular information by giving SELECT TYPE=< > in SYSIN of

    the JCL and also you can ignore the particular type by giving IGNORE TYPE=< > .

    There is another option called COLLECTION TYPE = which you can code

    to get the information in interval basis or all or End of Day, or Format requested statistics for all of the selected

    APPLIDs, orRRT Format requested reset statistics for all of the selected APPLIDs, or USS Format unsolicited

    statistics for all of the selected APPLIDs

    DFHTU530

    It is a Trace utility program

    There are three destinations for CICS region trace data:

    A table in main storage, when you specify INTTR=ON and SYSTR=ON as system initialization

    parameters

    The CICS auxiliary trace data sets, when you specify AUXTR=ON and SYSTR=ON as system

    initialization parameters

    The MVS generalized trace facility (GTF) data sets, when you specify GTFTR=ON and SYSTR=ON

    as system initialization parameters.

  • 8/4/2019 CICS ADMINISTRATION1

    18/22

    In our system we storing in the trace at only AUXULIARY datataset CICSTS22.CICS.CICS1.AUXT and

    CICSTS22.CICS .CICS1.BUXT since we have specified the auto switching option the trace activities will be

    automatically switch between these once one of the dataset becomes full

    The Utility DFHTU530 is not used in this case.

    Note : In our system since DFHT5U30 is not installed we can use DFHTU620 for taking the trace

    actibities

    There are several other utility program in CICS which is used in multiple regions and During initialization of

    CICS.

    DFHLSCU Log stream and coupling facility| sizing utility

    DFHJUP Journal select, print, and copy

    DFH$STER Recovery Statistics Program

    DFHMNDUP Monitoring dictionary record Creation

    DFH$MOLS Sample Monitoring Formatting

    DFHCSDUP System Definition Dataset Utility

    DFHMSCAN Macro-level programs Identification

    DFHEISUP Load Module Scanner

    DFHSNMIG SIGN on table to RACF migration

    DFH$STED Sample stagger end of day

    DFHMEU Message Editing

    DFHCESD Sample shutdown assist program

    DFHRMUTL Recovery Manager Batch utility

    DFHRMUTL BMS Macro Generation Utility program

  • 8/4/2019 CICS ADMINISTRATION1

    19/22

    DFH$OFAR Offsite Automatic Reply program

    DFHSMUTL Local catalog storage manager domain subpool record manipulation

    Refer to the below website:

    http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/dfhqat38/CCONTENTS\

    More common CICS abends

    ASRA

    This is the most common abend in CICS. It indicates a Program Check Exception,roughly equivalent to having an S0C7 in a batch program. Check for spaces in a packeddecimal numeric field and changes to the file and record layouts.

    AEIx and AEYx

    There are numerous abends that start with AEI or AEY. They indicate that an exception hasoccurred, and RESP (or NOHANDLE) is not is use. The last character indicates the exacterror.

    AEI0 indicates a PGMIDERR.

    AEI9 is a MAPFAIL condition.

    AEIO indicates a duplicate key (DUPKEY) condition.

    AEINindicates a duplicate record (DUPREC) condition.

    AEID indicates an End of file condition.

    AEIS indicates that a file is not open (NOTOPEN)

    http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/dfhqat38/CCONTENTS/http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/dfhqat38/CCONTENTS/http://publibfp.boulder.ibm.com/cgi-bin/bookmgr/BOOKS/dfhqat38/CCONTENTS/
  • 8/4/2019 CICS ADMINISTRATION1

    20/22

    AEIP indicates an invalid request condition (INVREQ)

    AEY7 indicates that you are not authorized to use a resource (NOTAUTH)

    AICA

    This abend usually occurs if your program is looping.

    There are CICS parameters that determine how long a task can run without giving upcontrol. The ICVR parameter in the CICS SIT table can be used to specify a value for alltasks running in CICS, or you can specify a RUNAWAY value when you define atransaction. If a program is looping then you may not get an AICA abend, because the timercan be reset when certain events occur, e.g. some EXEC CICS commands may reset the timerto zero.

    AEY9

    W i t h C I C S / E S A V e r s i o n 3 , y o u c a n u s e t h e f o l l o w i n g C I C S c o m m a n d t o d e t e c tW h e t h e r t h e C I C S a t t a c h m e n t f a c i l i t y i s e n a b l e d :

    E X E C C I C S E X T R A C T E X I T P R O G R A M ( D S N C E X T 1 )E N T R Y ( D S N C S Q L )G A S E T ( n a m e 1 )G A L E N G T H ( n a m e 2 )

    I f y o u g e t t h e I N V E X I T R E Q c o n d i t i o n , t h e n t h e C I C S a t t a c h m e n t f a c i l i t y i s n o tE n a b l e d . H o w e v e r , t h e r e i s a s h o r t w i n d o w b e t w e e n t h e C I C S a t t a c h m e n tF a c i l i t y s e n a b l e a n d t h e e n a b l e s t a r t w h e r e t h e C I C S a t t a c h m e n t f a c i l i t y i s s t i l ln o t a v a i l a b l e . D u r i n g t h a t p e r i o d , y o u c a n g e t a n A E Y 9 A B E N D .

    I N Q U I R E E X I T P R O G R A M i s a n e w c o m m a n d t h a t C I C S / E S A V e r s i o n 4 p r o v i d e s .Y o u c a n u s e i t i n p l a c e o f t h e E X T R A C T E X I T c o m m a n d t o d e t e r m i n e w h e t h e rt h e C I C S a t t a c h m e n t f a c i l i t y i s e n a b l e - s t a r t e d , e n a b l e d , o r d i s a b l e d . I f t h e a t t a c hi s e n a b l e d w i t h o u t b e i n g e n a b l e - s t a r t e d , y o u c a n s t i l l g e t a n A E Y 9 a b e n d , a n d t h eE X T R A C T E X I T c o m m a n d c a n t e l l y o u o n l y i f t h e C I C S a t t a c h m e n t f a c i l i t y i se n a b l e d .

    PQ54479: ABEND AEY9 DURING CONCURRENT DL/I ABNORMAL TASKTERMINATION

    Message 'DFHTD0001 .... An abend (code ---/AEY9) has occurred at offsetX'085E' in module DFHAPTD' is issued, then CICS comes

    http://www-1.ibm.com/support/docview.wss?rs=112&context=SWG90&context=SWGA0&context=SWGB0&context=SWG80&q1=PQ54479&uid=isg1PQ54479&loc=en_US&cs=utf-8&lang=enhttp://www-1.ibm.com/support/docview.wss?rs=112&context=SWG90&context=SWGA0&context=SWGB0&context=SWG80&q1=PQ54479&uid=isg1PQ54479&loc=en_US&cs=utf-8&lang=enhttp://www-1.ibm.com/support/docview.wss?rs=112&context=SWG90&context=SWGA0&context=SWGB0&context=SWG80&q1=PQ54479&uid=isg1PQ54479&loc=en_US&cs=utf-8&lang=enhttp://www-1.ibm.com/support/docview.wss?rs=112&context=SWG90&context=SWGA0&context=SWGB0&context=SWG80&q1=PQ54479&uid=isg1PQ54479&loc=en_US&cs=utf-8&lang=enhttp://www-1.ibm.com/support/docview.wss?rs=112&context=SWG90&context=SWGA0&context=SWGB0&context=SWG80&q1=PQ54479&uid=isg1PQ54479&loc=en_US&cs=utf-8&lang=en
  • 8/4/2019 CICS ADMINISTRATION1

    21/22

    Shut down cics and restart again.

    ATCH and ATCI

    These abends indicates that the task was purged.

    The task may have been purged by someone issuing a CEMT command to purge the task, orby CICS because the Deadlock timeout limit has been exceeded or because there was notenough virtual storage available to run all the tasks in CICS (Short on Storage)

    APCT

    A program was not found or was disabled.

    Check the transaction definition to see if the program name was misspelled. Check that the

    program is enabled. Check that the program is in an appropriate Load Library (i.e. onedefined to the current CICS system).

    AKCP and AKCT

    These abends indicate that a timeout of the task occurred. This may be due to adeadlock.

    AFCA

    A dataset could not be accessed because it was disabled.

    ABM0

    The specified map was not found in the specified mapset. Check that you have notmisspelled the map name.

  • 8/4/2019 CICS ADMINISTRATION1

    22/22