Reliant for VSE CSI-RECOV

Size: px
Start display at page:

Download "Reliant for VSE CSI-RECOV"

Transcription

1 Reliant for VSE CSI-RECOV CICS VSAM RECOVERY INSTALLATION AND OPERATIONS GUIDE Release 4.0 (COPYRIGHT 2003, CSI INTERNATIONAL, INC.) CSI-RECOV is a proprietary product of CSI International, Inc. It cannot be reproduced, changed, copied, or stored in any form (including, but not limited to, copies on magnetic media) without the express prior written.

2 Original Printing...04/01/2003 Last Revised...04/01/2003

3 TABLE OF CONTENTS GETTING STARTED...1 Preface...3 How Should I Use This Manual?...3 Disclaimer...3 Introduction...5 What is Recovery?...7 What Part is provided by CICS?...7 What Part is provided by CSI-JOURNAL?...7 What Part is provided by CSI-RECOV?...7 What Part is provided by CSI-ARMAN?...7 What Part is provided by DL/I?...8 Will the Process work when I need it?...8 Features of CSI-RECOV...9 Terminology...11 Migration Requirements...13 Installation...16 Customizing CSI-RECOV...19 CSIRECDJ (Default CICS Journal I/O module)...20 CSIRECDB (Default Journal Backup I/O module)...21 CSIRECDD (Default DL/I Log I/O module)...22 Generating a Custom I/O Module...23 PREPARING CICS FOR RECOVERY...27 Overview of CICS Journaling...29 Journal Functions of CICS...30 Journal File Alternatives...30 One Journal Dataset vs Two...31 Disk vs Tape Journals...32 One Journal vs Many...33 CICS Journal Recommendations...34 Installing Journaling in your System...36 Defining your Journal Control Table (JCT)...36 Initializing your Journal File for CICS...40 Activating Automatic Journaling (CICS FCT)...42 Add Journal Support to the CICS PCT, PPT and SIT Tables...43 Add Journal File JCL to your CICS Startup Jobstream...44 Writing an EOF Mark on Tape Journals...46 USING CSI-RECOV...47 Considerations...49 Accumulating Journal Data...49 A Typical Failure/Recovery Cycle...50 Recovery with Non-journaled Batch Updates...51 VSAM Share Option Coordination of Data File Backups and Journal Files...52 VSAM Recovery Scenario (Manual)...53 VSAM Recovery Scenario (Using CSI-ARMAN)...54 DL/I Recovery Scenario...55

4 TABLE OF CONTENTS Journal Backup JCL Recovery JCL Commands and Operands Syntax Commands INPUT Command OUTPUT Command SELECT Command SORTOPTION Command ATTRIBUTE Command AUTO Command Reports generated by CSIRECOV Parameter Edit Report Output Print Report Summary Reports VSAM Output Error Report VERIFICATION SYSTEM System Components Compiling the Verification Programs Modifying CICS Tables for Verification Testing Modifying CICS Startup JCL Modifying Verification JCL Run Jobstream CSIRECV Run On-line Verification Program Run Jobstream CSIRECV Problem Determination for Verification System MESSAGES APPENDIX A How To Code Commands (Syntax) APPENDIX B Journal Backup Record Formats

5 GETTING STARTED Page 1

6

7 Preface This manual is written to help you install, verify, and implement CSI-RECOV, the CICS VSAM Recovery System from CSI International, Inc. How Should I Use This Manual? If you already have CICS Journaling installed you can skip the section "Preparing CICS for Recovery". However, we feel that it would be to your advantage to quickly review this section. If you are now using a previous release of CSI-RECOV, please refer to the section "Migration Requirements". To implement the enhancements provided in this release, you may need to change some of your existing JCL. Once CICS journaling has been installed you may install and customize CSI- RECOV. This is covered in the section "Installation". Once CICS journaling and CSI-RECOV have been installed, we strongly suggest that you verify the entire process, as explained in the section "Verification and Testing". Then prepare a recovery Jobstream as outlined in the section "Using CSI- RECOV" so that you will be prepared for recovery of one or more files when necessary. Disclaimer The techniques and procedures outlined in this manual have been thoroughly tested on our development site. However, you should check all procedures in depth and modify them as needed for your own installation. Preface Page 3

8

9 Introduction CSI-RECOV is a system designed to recover VSAM files updated by CICS/VS or batch applications, if VSAM changes are journaled. Journal files created by CICS/VS (SMF or standard format) or CSI-JOURNAL, the VSAM Batch Journaling system from CSI International, Inc. can be used as input to CSI- RECOV. This system can be used to recreate a file's condition prior to a disk failure, head crash or file deletion, using a file backup and the appropriate journals. CSI-RECOV can also be used to manage DL/I journal records. DL/I journal records from your CICS System Journal and batch DL/I journal logs from batch DL/I programs can be combined with VSAM journal records and maintained on a single journal backup file until such time as a DL/I recovery or "changeaccum" process is required. CSI-RECOV can then generate a single DL/I log dataset that can be input to your standard DL/I utilities. CICS JOURNALS JOURNAL BACKUPS JOURNAL BACKUPS JOURNAL REPORTS CSI-RECOV BATCH JOURNALS VSAM DATASETS DL/I LOGS DL/I LOGS Overview of CSI-RECOV Introduction Page 5

10 These are the benefits that you get from using CSI-RECOV: You do not have to code custom recovery routines. CSI-RECOV will recreate any VSAM file, provided that a current backup and journal are available. Users will not have to re-enter data after a failure. One or more VSAM files can be recovered at the same time. Complete reporting ensures accuracy and verification. CSI-RECOV can be used in conjunction with CSI-ARMAN, the Automated Recovery Manager from CSI International, Inc. to provide integrated control of your VSAM Backup and Recovery processing. The application programmers need not include specialized "change-log" logic in their CICS/VS programs if the IBM-supplied automatic journaling feature of CICS is used. This feature, along with CSI-RECOV, is all that is needed to provide VSAM file recovery. If you have both VSAM and DL/I datasets, you can backup and manage all journal records for both your VSAM and DL/I datasets in a single CSI- RECOV Journal Backup dataset. In summary, CSI-RECOV can save your company time and money when a VSAM dataset is lost or damaged. Recovery can be a manageable process, when it is planned for, and CSI-RECOV makes the process easy. Page 6 Introduction

11 What is Recovery? Recovery is a process that restores a damaged file to the state it was in prior to the point of damage. Damage may be caused by hardware or software failure, or by human error, and the extent of the file damage can vary from a single record in one file to many files in several systems. Accordingly, the recovery process could be different each time a failure occurs. What Part is provided by CICS? CICS provides the facility to record file change data in separate datasets called journals. The section "Preparing CICS for Recovery" will give you detailed instructions on how to prepare your CICS system for this facility. A companion product, CSI-JMASTER, from CSI International, Inc. can be used to provide automatic backup, and overwrite protection for your CICS journals. What Part is provided by CSI-JOURNAL? CSI-JOURNAL provides a batch journaling facility that is analogous to CICS journaling. It allows you to recover the VSAM updates made in a batch environment without re-running the batch jobs. Refer to the CSI-JOURNAL Installation and Operations Guide for more information. What Part is provided by CSI-RECOV? CICS will not use these journal records to re-apply changes when a file has been destroyed. This is where CSI-RECOV comes in. After you have restored the VSAM file (or files) from the latest backup tape, CSI-RECOV will re-apply changes made since the latest backup. What Part is provided by CSI-ARMAN? CSI-ARMAN maintains a "Recovery Control File", containing all of the information necessary to generate the jobstreams required to perform the following: Introduction Page 7

12 VSAM backups CICS journal backups Journal accumulations VSAM Recoveries The companion products; CSI-RECOV, CSI-JOURNAL, and CSI-JMASTER communicate with CSI-ARMAN, providing the the necessary information to the Recovery Control File, to enable the required jobstreams to be generated. Together, these four products provide an integrated, and automated VSAM Recovery System. What Part is provided by DL/I? CSI-RECOV can be used to backup and managed journal records generated by DL/I, however, CSI-RECOV does not perform the actual recovery of your DL/I datasets. You still use the standard DL/I recovery utilities. When a DL/I recovery is required, you use CSI-RECOV to extract the required DL/I journal records from your CSI-RECOV Journal Backup dataset to a separate DL/I log dataset that can be used by your DL/I recovery and/or "change-accum" utilities. Will the Process work when I need it? After you have installed CSI-RECOV it may be a long time before you need to use it, if ever, and you may therefore not get around to testing CSI-RECOV or the CICS journaling process. To help you verify that the entire recovery process will work, we have provided you with software and procedures that will ensure the correct execution of all the steps involved in this recovery process: the CICS journaling, your backup and restore system, and the CSI-RECOV software. This verification process should be run after you have installed CSI-RECOV, and whenever a new release of CICS is installed. The section "Verification and Testing" describes this process in detail. Page 8 Introduction

13 Features of CSI-RECOV Single program execution for all CSI-RECOV functions. Any number of CICS journals or journal backups can be input to CSI- RECOV. Sorting requirements can be specified for any combination of inputs. The sort is invoked from within CSI-RECOV reducing I/O to journal files. Any or all input journal records can be printed, written to journal backup file(s) or used to recover VSAM datasets during a single execution of CSI- RECOV. CSI-RECOV provides comprehensive journal management support, including: printing, copying, merging, and automatic aging/purging of journal records. Multiple journal records for the same VSAM key are logically combined during recovery to reduce I/O to your VSAM datasets. CICS journals can be in standard or SMF format. If SMF format is used, the CICS release and APPLID will automatically be extracted by CSI-RECOV. Backward or 'BACKOUT' recovery can be specified to replace the 'before' images on your VSAM datasets. A 'NOUPDATE' mode can be used to simulate a recovery without actually updating your VSAM datasets. Forward, Backout and Noupdate recovery can all be performed against different VSAM datasets during a single execution. All types of VSAM datasets can be processed, KSDS, RRDS, ESDS, including Empty files. Complete selection control over which journal records will be processed. CSI-RECOV can be used in conjunction with CSI-ARMAN, the Automated Recovery Manager from CSI International, Inc. to provide integrated control of your VSAM Backup and Recovery processing. Introduction Page 9

14 Journal records generated by DL/I can be backed up and managed by CSI- RECOV. When a DL/I recovery or "change-accum" is required, a DL/I log dataset can be generated by CSI-RECOV to be used by your standard DL/I recovery utilities. Batch DL/I logs can be standard sequential, VSAMmanaged-SAM, or VSAM ESDS datasets. CSI-RECOV provides extensive statistical and error reporting for all of its Journal Management and VSAM Recovery functions. CSI-RECOV can generate a "reduced" Journal Backup format containing only the data changed in the "before" and "after" image journal records. This feature is intended to improve journal transmission efficiency for off-site archiving or simply to save disk space. A complete verification system is supplied with CSI-RECOV to test your CICS journaling installation and VSAM file Backup/Restore processing. It will give you the confidence that recovery WILL work when it is needed. Step by step instructions are provided in the CSI-RECOV documentation to assist you in adding journaling support to your CICS systems. Page 10 Introduction

15 Terminology The following terms are used throughout this documentation to define specific items or processes. CICS Journal Any Journal dataset created by CICS in either standard or SMF format. This can also be a copied image of a CICS Journal dataset as long as its format is the same as that created by CICS. These datasets are input to CSI- RECOV via an INPUT JOURNAL Command. Batch Journal A Journal dataset created by CSI-JOURNAL. These datasets have the same format as OUTPUT BACKUP files created by CSI-RECOV. Therefore, Batch Journals are input to CSI-RECOV via an INPUT BACKUP Command. DL/I Log Any dataset created by CSI-RECOV by the use of an OUTPUT DLILOG Command, or by a batch DL/I program. This does not have the same format as a CICS Journal dataset, and can only be used as input to CSI- RECOV via an INPUT DLILOG Command. A DL/I Log generated by CSI-RECOV can be used as input to any of your standard DL/I recovery utilities. Journal Backup Any dataset created by CSI-RECOV by the use of an OUTPUT BACKUP Command. This does not have the same format as a CICS Journal dataset, and can only be used as input via an INPUT BACKUP Command. Forward Recovery The process of updating one or more VSAM datasets with the 'after' images created by CICS automatic journaling. The purpose of Forward Recovery is to return a VSAM file to the state is was in prior to a Disk loss. Introduction Page 11

16 Backout Recovery The process of updating one or more VSAM datasets with the 'before' images created by CICS automatic journaling. The purpose of Backout Recovery is to return a VSAM file to the state is was in prior to the updating performed by one or more CICS transactions. This process is NOT the same as CICS dynamic transaction backout. This process will NOT automatically determine 'inflight' transactions. Page 12 Introduction

17 Migration Requirements This section describes the changes you need to consider if you are migrating from an earlier release of CSI-RECOV. The changes are grouped by release level. You will not need to consider the changes for releases older than the one you are currently using. You will need to consider changes for all releases since the release you are currently using. Changes from Release 3.0 The load module names have been changed to a CSI prefix. Changes from Release 2.6 The INPUT JOURNAL Command default for the CICS release has been changed from 1.6 to 1.7. This new default will work correctly for all releases of CICS from 1.7 and above. If you are using CICS release 1.6 or below, you must change you INPUT JOURNAL Commands to include the 1.6 Operand. CSI-RECOV contains an integrated interface to CSI-ARMAN, the Automated Recovery Manager from CSI International, Inc. to provide integrated control of your VSAM Backup and Recovery processing. A new Command, AUTO has been added. This is used to activate the interface to CSI-ARMAN. New Operands have also been added to the INPUT and OUTPUT Commands to support this new interface. New Operands have been added to the SORTOPTION Command to specify the desired sorting sequence. These new Operands can be used for DL/I recovery, and for VSAM recovery that includes updates through a path or an alternate index. Migration Requirements Page 13

18 Changes from Release 2.5 CSI-RECOV can now generate a "reduced" format of the OUTPUT BACKUP dataset. The "reduced" record format contains only those bytes of data that were different between the "before" and "after" image journal record. This feature can provide as much as a 30% space reduction. During recovery, CSI- RECOV automatically detects whether you are using "full" or "reduced" formats and proceeds accordingly. Refer to the FORMAT Operand of the OUTPUT BACKUP Command for more information. CSI-RECOV can now support VSAM ESDS DL/I log files. A new Operand, ESDS has been added to the INPUT DLILOG Command. You must specify ESDS for each DL/I log that is VSAM ESDS. This Operand is required because CSI-RECOV cannot distinguish between VSAM ESDS and VSAMmanaged-SAM datasets. A new SELECT Operand, DATETIME has been added to simplify the specification of starting and/or ending ranges that involve both a Date and a Time. Changes from Release 2.4 The format of the Journal Backup dataset created using an OUTPUT BACKUP Command has changed. CSI-RECOV will accept Journal Backup datasets from all earlier releases, however, Journal Backups created by this release of CSI-RECOV cannot be read by earlier releases. CSI-RECOV can now manage DL/I journal records. If you are using CSI- RECOV to backup VSAM journal records from a CICS System Journal that also contains DL/I journal records, you may need to review your SELECT Commands to make sure that only the records you want are backed up by CSI-RECOV. CSI-RECOV will automatically read and select all VSAM and DL/I journal records found on a CICS System Journal unless specifically excluded via a SELECT or EXCLUDE Command or Operand. Refer to section "Commands and Operands" for more information. Two new Commands have been added to support DL/I Journal management. The INPUT DLILOG Command can be used to read DL/I logs created by batch DL/I programs. The OUTPUT DLILOG Command can be used to create a DL/I log for use by any of DL/I's standard recovery utilities. Page 14 Migration Requirements

19 A new Operand (WRAP) has been added to the INPUT JOURNAL Command. This new Operand specifies whether or not CSI-RECOV should extract journal records from beyond the "wrap-point" of a CICS Journal. The default is to not extract journal records from beyond the "wrap-point". If you have CICS Journals that can wrap, and you need CSI-RECOV to extract all journal records from those journals, you must specify the WRAP Operand. The default for Operand (MAXKEY) of the SORTOPTION Command has been changed from 234 to 232. Refer to the SORTOPTION Command to determine if you need to specify this Operand. Migration Requirements Page 15

20 Installation The CSI-RECOV programs described in this manual run under VSE, and are distributed on a 1600 BPI tape. When this tape is loaded into your Reader Queue, there will be one POWER job which will catalog the following modules to your libraries: Source Library Modules: E.CSIIOGEN A.CSIRECDB A.CSIRECDD A.CSIRECDJ C.CSIRECVI C.CSIRECVU C.CSIRECVC A.CSIRECV0 A.CSIRECV1 A.CSIRECV2 A.CSIRECV3 A.CSIRECJ1 I/O Module Customization Macro Backup I/O Module Sample Macro Call DLILOG I/O Module Sample Macro Call Journal I/O Module Sample Macro Call Verification Program Source to Initialize Files Verification Program Source to Update Files Verification Program Source to Check Files Verification CICS FCT Entries Verification CICS JCT Entries Verification JCL to Create Files Verification JCL to Recover Files Prototype Recovery JCL Note: In a VSE-SP library, these members are named member.sublib (eg. CSIIOGEN.E). Core Image Library: CSIRECOV CSIRECDB CSIRECDD CSIRECDJ CSIRECVI CSIRECVU CSIRECVC Forward Recovery Module Default Backup I/O Access Module Default DLILOG I/O Access Module Default Journal I/O Access Module Verification Program to Initialize Files Verification Program to Update Files Verification Program to Check Files Page 16 Installation

21 Minimum library space required: Source Statement Library: FBA Blocks = 380 LIBR Blocks = 190 Core Image Library: FBA Blocks = 560 LIBR Blocks = 280 Installation Step 1 Mount the distribution tape on a tape drive and enter the following POWER Command on the console: S RDR,cuu (cuu = tape drive address) This will load the POWER job CSIRECOV into your Reader Queue. Installation Step 2 Alter the POWER job (CSIRECOV) that was loaded in the reader queue to run in a partition that has labels established for linkediting. This job has a pause statement that allows you to enter a "LIBDEF" statement if necessary. A RDR,CSIRECOV,DISP=D,CLASS=? Installation Step 3 When job CSIRECOV starts up, it will pause allowing you to enter "// LIBDEF" statements. You must enter a "// LIBDEF" statement with the "TO=" option for a core image and source statement libraries unless they have already been set using permanent LIBDEFs. Installation Page 17

22 The following LIBDEF prompts are displayed on the System console: * <<<< FOR VSE 1.3.X USE THE FOLLOWING LIBDEFS >>>> * // LIBDEF CL,TO=USRCL? * // LIBDEF SL,TO=USRSL? * * <<<< FOR VSE 2.1.X USE THE FOLLOWING LIBDEF >>>> * // LIBDEF *,CATALOG=LIB?.SUBLIB?,SEARCH=LIB?.SUBLIB? * * RE-ENTER LIB?.SUBLIB? IN RESPONSE TO VSE MESSAGES * L032I LIBDEF MISSING FOR TO LIBRARY... * L146I ENTER THE LIBRARY.SUBLIBRARY... // PAUSE ENTER ABOVE LIBDEFS AS REQUIRED When the installation job is complete, review the printed output for errors. Common problems that may occur during the installation job are: One of the libraries has filled up and requires condensing. A LIBDEF statement was omitted or improperly declared. Install job was run in a partition not set up for Link Editing. Installation Step 4 Review the section "Customizing CSI-RECOV" to determine if the object modules cataloged in the Core Image Library in step 3 are suitable for your environment. If they are not, make the necessary changes. Installation Step 5 Verify the entire Journaling and Recovery process, as described in the section "Verification and Testing". Page 18 Installation

23 Customizing CSI-RECOV CSI-RECOV uses customizable I/O modules to access CICS journals, to read and write Journal Backup files and to read and write DL/I log files. Default I/O modules have been provided in both source and object form. Customization of these modules may be required to change Device types, Blocksizes, or other options defined below. Macro CSIIOGEN has been provided to customize the Default I/O modules or to generate additional I/O modules to be used for varying the formats of Journals and Journal backups created by CSI-RECOV. If you are generating your own I/O modules for multiple formats of journals or journal backups, the names used for your I/O modules should NOT begin with the letters CSI. If they do, CSI- RECOV may mistake your module name for one if its internal modules and error message CSIRECOV-13 or CSIRECOV-23 will result. Customization Page 19

24 CSIRECDJ (Default CICS Journal I/O module) Module CSIRECDJ is the default I/O module used by CSI-RECOV to access CICS journal files. The MODNAME Operand of the INPUT Command can be used to provide the name of a different I/O module. The default I/O module provided on the installation tape may not be suitable for your system. For example, the block size may be too large for the type of DASD you have, or your CICS journals may be on tape. To change the default I/O module, generate a custom module and catalog it as CSIRECDJ. Listed below are the Operands that were used to generate module CSIRECDJ: CSIIOGEN, X OPSYS=VSE, X BLKSIZE=32767, X IOAREAS=YES, X DEVICE=DISK, X SYSNBRI=SYS004, X LABEL=NO, X REWINDI=UNLOAD This macro call and its associated JCL are supplied in member A.CSIRECDJ. You may move this member to your text editor or code it manually as shown in the example later on. If you use the prototype in A.CSIRECDJ, be sure to change the default values as required for your system. Page 20 Customization

25 CSIRECDB (Default Journal Backup I/O module) Module CSIRECDB is the default I/O module used by CSI-RECOV to create and access journal backup files. The MODNAME Operand of the INPUT and OUTPUT Commands can be used to provide the names of different I/O modules. The default I/O module provided on the installation tape may not be suitable for your system. For example, the block size may be too large for the type of DASD you have, or you may decide to write your Journal Backup files to disk. To change the default I/O module, generate a custom module and catalog it as CSIRECDB Listed below are the Operands that were used to generate module CSIRECDB: CSIIOGEN, X OPSYS=VSE, X BLKSIZE=32767, X IOAREAS=YES, X DEVICE=TAPE, X SYSNBRI=SYS004, X SYSNBRO=SYS005, X LABEL=STD, X REWINDI=UNLOAD, X REWINDO=UNLOAD This macro call and its associated JCL are supplied in member A.CSIRECDB. You may move this member to your text editor or code it manually as shown in the example later on. If you use the prototype in A.CSIRECDB, be sure to change the default values as required for your system. Customization Page 21

26 CSIRECDD (Default DL/I Log I/O module) Module CSIRECDD is the default I/O module used by CSI-RECOV to create and access DL/I log files. The MODNAME Operand of the INPUT DLILOG Command can be used to provide the name of a different I/O module. This module is not required for VSAM ESDS DL/I log files. The default I/O module provided on the installation tape may not be suitable for your system. For example, the block size may be too large for the type of DASD you have, or you may decide to write your DL/I log files to disk. To change the default I/O module, generate a custom module and catalog it as CSIRECDD Listed below are the Operands that were used to generate module CSIRECDD: CSIIOGEN, X OPSYS=VSE, X BLKSIZE=32767, X IOAREAS=YES, X DEVICE=TAPE, X SYSNBRI=SYS004, X SYSNBRO=SYS005, X LABEL=STD, X REWINDI=UNLOAD, X REWINDO=UNLOAD This macro call and its associated JCL are supplied in member A.CSIRECDD. You may move this member to your text editor or code it manually as shown in the example later on. If you use the prototype in A.CSIRECDD, be sure to change the default values as required for your system. Page 22 Customization

27 Generating a Custom I/O Module To generate an I/O module, use the CSIIOGEN macro described below. An example of a job to generate and catalog an I/O module is shown at the end of this section. The following pages provide a detailed explanation of the CSIIOGEN macro and its Operands. How to enter CSIIOGEN, X OPSYS=VSE, X BLKSIZE=32767 nnnnn, X IOAREAS=NO YES, X DEVICE=DISK TAPE, X SYSNBRI=SYS004 SYSnnn, X SYSNBRO=SYS005 SYSnnn, X LABEL=NO STD, X REWINDI=UNLOAD REWIND NORWD, X REWINDO=UNLOAD REWIND NORWD NOTE: If you use a Disk/Tape Management System, you may be able to specify some of the CSIIOGEN options via the Management System's JCL. Customization Page 23

28 Explanation: OPSYS=VSE Must be set to the Operating System in use (in this case VSE). BLKSIZE=32767 nnnnn Maximum Blocksize of the dataset. This can be any value up to the track capacity of your device, (if CKD). The maximum that can be specified for any device type is For CICS journals, this field must contain the largest "BUFSIZE" value specified in the CICS JCT for the journal(s) to be processed by this I/O module. CSI- RECOV creates its journal backup datasets in VBS format (variable blocked spanned) which allows logical records to span multiple blocks. The record format in the DTF is "undefined", and CSI-RECOV does its own blocking. IOAREAS=NO YES Specifies whether or not to generate internal I/O areas. For VSE or later, specify "NO" for DISK and "YES" for TAPE. Prior to VSE 1.3.5, specify "YES" for both DISK and TAPE devices. If you are using the MVT Operating System from Software Persuits, specify "YES" for both DISK and TAPE devices. DEVICE=DISK TAPE Specifies the type of device containing the journal file. SYSNBRI=SYS004 SYSnnn For tape datasets. This is the SYSnnn to be used for accessing the tape drive during Input operations. This value can be overridden by the INPUT Command. Page 24 Customization

29 SYSNBRO=SYS005 SYSnnn For tape datasets. This is the SYSnnn to be used for accessing the tape drive during Output operations. This value can be overridden by the OUTPUT Command. LABEL=NO STD For tape datasets. This option defines whether or not the tape is labeled (specify STD for standard labeled tapes and NO for unlabeled tapes). REWINDI=UNLOAD REWIND NORWD For tape datasets. This option defines the action to occur when the tape is closed after Input operations. UNLOAD will rewind and unload the tape. REWIND will rewind the tape without unloading it. NORWD will leave the tape positioned as is. REWINDO=UNLOAD REWIND NORWD For tape datasets. This option defines the action to occur when the tape is closed after Output operations. UNLOAD will rewind and unload the tape. REWIND will rewind the tape without unloading it. NORWD will leave the tape positioned as is. Customization Page 25

30 EXAMPLE: The following example can be used to customize CSIRECDJ for VSE: // JOB jobname // OPTION CATAL PHASE CSIRECDJ,* // EXEC ASSEMBLY CSIRECDJ CSIIOGEN, OPSYS=VSE, DEVICE=TAPE, BLKSIZE=32767 END /* // EXEC LNKEDT /& X X X A complete macro prototype is provided in member A.CSIRECDJ. Page 26 Customization

31 PREPARING CICS FOR RECOVERY Page 27

32

33 Overview of CICS Journaling The points covered in this section are: Journaling Description and Considerations CICS Journal Recommendations Installing Journaling in your System The information in this section has been summarized from the following manuals. You may want to refer to these manuals for further information. CICS Resource Definition Guide - Journal Control Table CICS Resource Definition Guide - File Control Table CICS Resource Definition Guide - System Initialization Table CICS Installation and Operations Guide - Journal Data Sets CICS Performance Guide - Logging and Journaling. Note: The information presented in the following pages deal mostly with Disk Journals. If you choose to use Tape Journals, please refer to the IBM Manuals listed above. Preparing CICS for Recovery Page 29

34 Journal Functions of CICS CICS provides three types of Journaling functions: 1. Automatic Logging 2. Automatic Journaling 3. User Journaling Automatic Logging means logging done to the System Log, Journal ID is "01". This logging is for the Emergency Restart processing performed by CICS after a system abend. The log records, generated by Automatic Logging, are not used for Forward Recovery processing. Automatic Logging is specified via the "LOG" Operand of the CICS FCT. Automatic Journaling is a function of CICS File Control that creates "Before and/or After Images" of all records added, updated, or deleted. These journal records are written to any CICS Journal Although the System Log (journal 01) can be used for Automatic Journaling, we recommend that a separate journal be used (02-99). The following sections will explain why. The records created by Automatic Journaling are the input to CSI-RECOV processing. Automatic Journaling is specified via the "JREQ" and "JID" Operands of the CICS FCT. User Journaling refers to journal records formatted, written, and used by application programs. User journal records are not used by CSI-RECOV, although they may be written to the same CICS journal as the Automatic Journaling records if desired. Journal File Alternatives CICS provides a few basic alternatives when defining journal files, to allow you to tailor individual journals according to their use. Page 30 Preparing CICS for Recovery

35 One Journal Dataset vs Two Each logical journal file (01-99) can be defined as having either one or two journal datasets, each referenced with a unique Dataset Name. A journal dataset must consist of a single extent, and may not be defined as a VSAM Managed SAM data set. With One Journal Dataset - If the journal becomes full, CICS will start over at the beginning, overwriting the data at the beginning of the journal. For the System Log, this is not a problem as long as the journal is large enough to contain all records required to recover from an abend of the longest running task that updates "protected resources". For journals required for Forward Recovery, this overwriting may not be a problem either, as long as the journal is large enough to contain all file updates since the previous backup of your dataset. Since the Forward Recovery Process normally involves a larger number of records, the option for two journal datasets is usually a better choice. You must specify the WRAP Operand on all INPUT JOURNAL Commands that are accessing CICS Journals that may have wrapped. If you do not specify the WRAP Operand, CSI-RECOV will stop reading the CICS Journal when the "wrap-point" is reached. Note: For journals on FBA devices, using a single journal dataset is not an option, because an end-of-file record is always written after each block of journal records, making the remainder of the file inaccessible. With Two Journal Datasets - When one journal dataset becomes full, CICS will switch to the beginning of the other dataset. This gives you the opportunity to backup the first dataset prior to the second dataset becoming full. When the second dataset becomes full, CICS will switch back to the first dataset. For Forward Recovery Journals, we recommend you define two journal datasets with the first dataset large enough to hold 1.5 times the number of updates created between dataset backups, with a second smaller dataset as a "Safety Net". This second dataset should be large enough to allow CICS to continue functioning without filling the dataset while the first dataset is being backed up and initialized. After CICS switches back to the first dataset, backup and initialize the second dataset. The first dataset should be maintained at a size that requires the second dataset to be rarely used. Preparing CICS for Recovery Page 31

36 Disk vs Tape Journals The first decision you will need to make is whether to use disk or tape journals. The following points should be considered: The System Log (Journal 01) is used for CICS Emergency Restart. This means that when CICS restarts after an abend, the log is read backwards to find all changes made by the tasks that were in-flight. The relatively slow speed of tape processing would thus delay the availability of CICS after a system abend. Tape is infinitely large. The journal can extend from volume to volume without overwriting any data. If you are expecting large amounts of journaled updates and have a limited amount of disk space, this may be important. A "one-dataset" tape journal implies a single drive, not a single volume. However, when a volume is filled, CICS update activity is suspended while the tape rewinds so that another volume can be mounted. You should never use a single tape journal if all your updates cannot fit on a single tape volume. A "two-dataset" tape journal implies that two tape drives are dedicated to the journal. When the first volume becomes full, CICS switches to the second drive and rewinds/unloads the first so that a new volume can be mounted. This is more efficient than the one-dataset tape, but requires two tape drives. Reliability of the device or media is also an important consideration. Tapes are not always as reliable as disks. Space utilization characteristics of some disk drives make them not very suitable for journals. A system log with its typically short blocks can require almost twice the disk space on a 3380 disk drive as it would on a 3350 disk drive. This is because a 3380 has a large overhead associated with each physical block that makes it very wasteful for small block sizes. Page 32 Preparing CICS for Recovery

37 One Journal vs Many CICS Emergency Restart requires the definition of a system log (Journal ID 01). The system log can also be used for journaling, but the following points should be considered: If journaling is combined with logging, Emergency Restart times can be increased due to the journal records that must be skipped to find the log records. Forward Recovery Journals are easier to keep in sync with dataset backups if they are reinitialized each time a backup is done. If system logs are initialized, CICS WARM STARTS and EMERGENCY RESTARTS cannot be performed. Preparing CICS for Recovery Page 33

38 CICS Journal Recommendations The following recommendations are based on the assumption that you will be using Automatic Logging for CICS Emergency Restart, and Automatic Journaling for forward recovery. They are also based on experience with many different systems, and will suit the requirements of most installations. Special situations (such as extremely high transaction rates) may require different techniques. These recommendations are intended to be used as a starting point, to be fine tuned as needed. The System Log If you are not using DL/I, we recommend defining a single dataset for the System Log. This should be initialized when first defined and then never reinitialized unless it is being moved or changed in size. This provides the most stable environment for CICS Warm Starts and Emergency Restarts. If you are using DL/I, refer to the CICS Installation and Operations Guide for instructions for creating and initializing the appropriate journaling environment for DL/I. Separate Journals for Forward Recovery The journal(s) used for Automatic Journaling should be separate from the system log. If you are using a disk, you should have two journal datasets (JTYPE=DISK2), with the first dataset large enough to hold 1.5 times the number of updates created between dataset backups. The second dataset can be smaller, and is a "safety net" to allow the primary dataset to be backed up and initialized if it becomes full. A Tape Journal Can be OK For Forward Recovery Journals Under The Following Conditions: All journaled activity can be contained on a single volume, or two drives can be allocated to the journal to allow switching to occur without causing performance problems. Page 34 Preparing CICS for Recovery

39 Placement of Journal Datasets: Since recovery may be required due to a DASD failure, we recommend that the journal datasets and the VSAM files reside on two different physical devices. VSAM DATASETS VSAM DATASETS JOURNALS JOURNALS If all of your disk devices have VSAM files requiring journaling, you must have multiple journal datasets to ensure that a VSAM file can be recovered after a DASD failure. Preparing CICS for Recovery Page 35

40 Installing Journaling in your System The steps covered in this section are the following: 1. Defining your Journal Control Table (JCT) 2. Initializing your Journal File for CICS 3. Activating Automatic Journaling (CICS FCT) 4. Adding Journal Support to the CICS PCT, PPT and SIT Tables 5. Adding Journal File JCL to your CICS startup Jobstream 6. Writing EOF Mark on Tape Journals Defining your Journal Control Table (JCT) The CICS Journal Control Table (JCT) is the means by which you describe the physical journal files and their characteristics to CICS. The JCT is defined with three macro types: DFHJCT TYPE=INITIAL First Section of Table DFHJCT TYPE=ENTRY Occurs once for each journal file DFHJCT TYPE=FINAL Last Section of Table DFHJCT TYPE=INITIAL,SUFFIX=xx: Defines this table to CICS. The Value "xx" is specified in the System Initialization Table (SIT) on the "JCT=xx" Keyword. This allows multiple JCTs to exist on the same Load Library. Page 36 Preparing CICS for Recovery

41 DFHJCT TYPE=ENTRY: Defines each logical journal file to CICS. JFILEID=NN Gives a unique "ID" to each journal (02-99). JFILEID=SYSTEM is specified for Journal 01. This "ID" is used in the File Control Table (FCT) to designate which files should be logged to which journal. This "ID" is also used by CICS to form the DLBL for the JCL. JTYPE=DISK2 Defines type of Journal: - DISK or TAPE - ONE FILE or TWO FILES (for example: DISK1, DISK2, TAPE1, TAPE2) If only one disk file is used, CICS will wrap the file when full, overwriting the old journal records. However, for journals on FBA devices, using one disk file only is not an option, because an end-of-file record is always written after each journal record. If two disk files are used, CICS will flip/flop between them allowing your operators time to backup one file while the other is being used by CICS. Preparing CICS for Recovery Page 37

42 BUFSIZE=4089 Defines the largest block that can be written to this journal. This size must be determined by you, using the following criteria: (The minimum you can specify is): 80 + Largest Record Key + Largest Data Record for CICS 1.5 and Largest Record Key + Largest Data Record starting with CICS 1.7 The largest size is: for tape for FBA Tracksize or for CKD (whichever is smaller) For FBA devices the CISIZE for the journal must be at least 7 bytes larger than this value and must be a multiple of 512 if less than 8193 or a multiple of 2048 if greater than The recommended size is 2 to 2.5 times the average journal record, as long as this would provide room for the minimum (see above). The average size for a journal record is: 80 + average record key + average data record for CICS 1.5 and average record key + average data record starting with CICS 1.7 BUFSUV=4089 Normally not needed for Recovery Journals. If omitted, will default to value specified for "BUFSIZE". Page 38 Preparing CICS for Recovery

43 JOUROPT=RETRY Defines the actions taken by CICS upon encountering an error or a FULL condition on this journal. Any or all of the following options may be coded (in parentheses if more than one is specified): PAUSE Should be specified cautiously. It makes CICS wait for an Operator response prior to overwriting a journal. RETRY CRUCIAL INPUT Causes CICS to switch journal datasets if an I/O error occurs. Causes CICS to abend if an I/O error occurs and: this is a single dataset journal retry was not specified, or an I/O error also occurred on the other dataset Is required for Dynamic Transaction Backout and Emergency Restart. This specifies that input operations are allowed. OPEN=INITIAL Specifies that this journal should be opened at startup. DEVADDR=(SYSnnn,SYSmmm) Specifies the logical units for the first and second journal files DFHJCT TYPE=FINAL Defines the end of the JCT Table. Preparing CICS for Recovery Page 39

44 Initializing your Journal File for CICS Each journal file must be initialized before CICS can use it. This function is only required prior to the first use, but we recommend that it be done after each backup of the journal so that the contents of the journal will not be duplicated between journal backups. If "DISK2" or "TAPE2" is specified for "JTYPE", both journal files must be initialized. Disk Journals The JCL needed for initializing disk journals is as follows: // JOB INIT // DLBL JOURNAL,'your.journal.name',0,SD,CISIZE=ccccc // EXTENT SYSnnn,vol-id,1,0,rel-trk/blk,nbr-trks/blks // ASSGN SYSnnn,DISK,VOL=vol-id,SHR // LIBDEF CL,SEARCH=PRDCLB // EXEC DFHJCJFP,SIZE=AUTO /& NOTES: For FBA devices, the CISIZE must be at least 7 bytes larger than the JCT BUFSIZE and must be a multiple of 512 if less than 8193, or a multiple of 2048 if greater than For CKD devices, omit the CISIZE Operand. Page 40 Preparing CICS for Recovery

45 Tape Journals The JCL needed for initializing tape journals is as follows: // JOB INIT // ASSGN SYS010,CUU TAPE DRIVE // LIBDEF CL,SEARCH=PRDCLB // EXEC DFHFTAP /& Preparing CICS for Recovery Page 41

46 Activating Automatic Journaling (CICS FCT) You can activate automatic journaling by specifying the following Operands in the File Control Table (DFHFCT TYPE=DATASET) for each file that is to have Forward Recovery Support: JID=nn Where nn is the 'JFILEID' value of the journal file to be used for this dataset. Multiple files can share the same journal. The choice of how many journals to use should be based on the amount of update activity occurring and the resulting loss of performance from the contentions of too many updates being funnelled to the same journal. JREQ=(ASY,RU,WU,WN) Specifies the type of file operations to be written to the journal. Only the Update (WU) and Add (WN) functions are required for forward recovery. They cause the "after" images to be journaled. The (RU) option causes the "before" images to be journaled. This option is only required if you intend to use the FORMAT(REDUCED) Operand of the OUTPUT BACKUP Command, or if you want to be able to perform BACKOUT Recovery. The (ASY) option will cause the journal records only to be written when the buffer is full. This reduces the overhead related to journaling, but does not ensure that all updates are journaled prior to the dataset being altered. Omitting the (ASY) will guarantee that all updates will be written to the journal first, but will cause longer response times, and shorter journal blocks. (ASY should be used only for very high activity journals). Page 42 Preparing CICS for Recovery

47 Add Journal Support to the CICS PCT, PPT and SIT Tables Make sure that the following entries are in your CICS PCT and PPT.: DFHPCT TYPE=GROUP,FN=JOURNAL DFHPPT TYPE=GROUP,FN=JOURNAL If you are using the CICS RDO facility, the above definitions are contained in GROUP DFHJRNL. The following entry must be added to your CICS SIT. The "xx" is the value specified for the SUFFIX=xx in the DFHJCT TYPE=INITIAL macro entry: DFHSIT JCT=xx, The following entries are only required in your CICS SIT if you are running CICS release 1.6 or earlier: DFHSIT JCP=1$, DFHSIT FCP=A$, 'AUTOJRN' support 'AUTOJRN' support Preparing CICS for Recovery Page 43

48 Add Journal File JCL to your CICS Startup Jobstream The Journal File JCL that you need to add to your CICS startup jobstream is shown below. // DLBL DFHJnnA,'your.journal.diska',0,SD,CISIZE=nnnn // EXTENT SYSnnn,vvvvvv,... // DLBL DFHJnnB,'your.journal.diskb',0,SD,CISIZE=nnnn // EXTENT SYSmmm,vvvvvv,... NOTES: nn in DFHJnnA is the two digit number from 'JFILEID=' in JCT'. DFHJnnB is only required if 'DISK2' is specified for 'JTYPE' in the JCT. For FBA devices, CISIZE must be at least 7 bytes larger than JCT BUFSIZE and must be a multiple of 512 if less than 8193, or a multiple of 2048 if greater than Page 44 Preparing CICS for Recovery

49 For Tape Journals // ASSGN SYSnnn,CUU First dataset drive // ASSGN SYSmmm,CUU Second dataset drive NOTES: SYSnnn and SYSmmm are the values specified in 'DEVADDR' in the JCT. SYSmmm is only required if 'TAPE2' is specified in 'JTYPE'. Preparing CICS for Recovery Page 45

50 Writing an EOF Mark on Tape Journals If a CICS abend or system failure should cause a non-system log journal tape to not be closed properly, a special CICS supplied program must be used to find the end of the journal and write an ending EOF mark. If this is not done, an I/O error or invalid data could be input to the Forward Recovery Program. The JCL to use to write EOF mark is shown below: // JOB EOFTAPE // ASSGN SYS010,CUU TAPE DRIVE // LIBDEF CL,SEARCH=PRDCLB // EXEC DFHTEOF /& Page 46 Preparing CICS for Recovery

51 USING CSI-RECOV Page 47

52

53 Considerations Before the description of the actual Recovery process, we have listed a number of issues to consider. Some of these issues may influence your approach to recovery, and we strongly recommend that you read the following section before setting up your Recovery JCL. Advance Preparations Recovering a lost file requires that you are prepared in advance. This means that CICS Journaling and CSI-RECOV have already been installed and tested, and that you have Recovery JCL ready before it is needed. Accumulating Journal Data The recovery process uses all journal records that were created after the time of the last VSAM file backup or DL/I image copy. The journal files themselves may be defined to be large enough to contain all of the update activity for this period of time, but if this is not feasible, each time CICS fills a journal file, the journal data must be archived to another dataset before it is overwritten. CICS journals can be backed up by CSI-RECOV by using the INPUT JOURNAL and OUTPUT BACKUP Commands. A companion product, CSI-JMASTER, from CSI, can be used to automatically submit the backup JCL each time CICS fills a journal file. CSI-JMASTER will also protect your journal data from being overwritten by CICS prior to the backup completing. If your CICS journal contains DL/I records that you want backed up, you either use the OUTPUT BACKUP Command or the OUTPUT DLILOG Command for generating your journal backup. The OUTPUT DLILOG Command generates a DL/I log dataset that can be read by any of the DL/I recovery utilities. The OUTPUT BACKUP Command generates a CSI-RECOV journal backup that can contain both VSAM and DL/I journal records. You can use the OUTPUT BACKUP dataset to manage all of your journal records until they are needed for a VSAM recovery or a DL/I change-accum process. Using CSI-RECOV (Considerations) Page 49

54 A Typical Failure/Recovery Cycle A complete cycle of events would often look like this: 1. Backup of data files 2. Journaled CICS updates 3. File damage (At this point, the recovery process would begin) 4. Restore files from backup 5. Use CSI-RECOV to re-apply journaled updates to your damaged VSAM dataset(s) The file has now been restored to the condition it was in just before damage occurred (point 3. above). Page 50 (Considerations) Using CSI-RECOV

55 Recovery with Non-journaled Batch Updates The recovery process gets more extensive if the journals do not include all updates to the files needing recovery. This could happen if non-journaled batch updates are involved. The cycle of events would look as follows: 1. Data files are backed up 2a. Journaled CICS updates 2b. Batch updates (not journaled) 2c. More journaled CICS updates 3. ***** File damage ***** 4. Restore files from backup 5a. Use CSI-RECOV to re-apply journaled updates from 2a. above 5b. Re-run batch updates 5c. Use CSI-RECOV to re-apply journaled updates from 2c. above. The file has now been restored to the condition it was in just before damage occurred (point 3. above). The above process can be simplified by journaling the VSAM updates made by batch programs. CSI International has a companion product, CSI-JOURNAL, that provides the Batch Journaling function without modification to any of your application programs. Contact us for more information if you have a need for this capability. Using CSI-RECOV (Considerations) Page 51

VSAM Management. Overview. CSI International 8120 State Route 138 Williamsport, OH

VSAM Management. Overview. CSI International 8120 State Route 138 Williamsport, OH VSAM Management Overview CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

CSI-QCOPY The VM/POWER Report Utility

CSI-QCOPY The VM/POWER Report Utility The VM/POWER Report Utility Installation and Operations Guide Release 1.4 CSI-QCOPY CSI-QCOPY is a comprehensive report utility that can be used in almost limitless ways. A powerful yet simpleto-use set

More information

VSAM Management. Overview. z/os. CSI International 8120 State Route 138 Williamsport, OH

VSAM Management. Overview. z/os. CSI International 8120 State Route 138 Williamsport, OH VSAM Management Overview z/os CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

z/os CSI International 8120 State Route 138 Williamsport, OH

z/os CSI International 8120 State Route 138 Williamsport, OH z/os Software Solutions CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile

More information

CA-Explore Performance Management for CICS

CA-Explore Performance Management for CICS Unicenter CA-Explore Performance Management for CICS Getting Started Guide Release 7.0 K01098-1E This documentation and related computer software program (hereinafter referred to as the Documentation )

More information

CA EPIC for z/vse. Release Notes. r5.2

CA EPIC for z/vse. Release Notes. r5.2 CA EPIC for z/vse Release Notes r5.2 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

AllFusion CA-Vollie. Systems Programmer Guide 5.0 VSE F E

AllFusion CA-Vollie. Systems Programmer Guide 5.0 VSE F E AllFusion CA-Vollie Systems Programmer Guide 5.0 VSE F15805 1E This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user's informational

More information

z/os Introduction and Workshop Data Sets

z/os Introduction and Workshop Data Sets z/os Introduction and Workshop Data Sets 2009 IBM Corporation Unit Objectives After completing this unit, you should be able to: Describe data set naming rules Describe a partitioned data set Describe

More information

BIM-PC/TRANSFER HOST TO PC FILE TRANSFER UTILITY INSTALLATION AND OPERATIONS GUIDE. Release 1.7 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.

BIM-PC/TRANSFER HOST TO PC FILE TRANSFER UTILITY INSTALLATION AND OPERATIONS GUIDE. Release 1.7 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC. HOST TO PC FILE TRANSFER UTILITY INSTALLATION AND OPERATIONS GUIDE Release 1.7 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-PC/TRANSFER is a proprietary product of B I Moyle Associates, Inc. It cannot

More information

BIM-ALERT CICS AND VSE SECURITY SYSTEM INSTALLATION AND OPERATIONS GUIDE. Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.)

BIM-ALERT CICS AND VSE SECURITY SYSTEM INSTALLATION AND OPERATIONS GUIDE. Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-ALERT CICS AND VSE SECURITY SYSTEM INSTALLATION AND OPERATIONS GUIDE Release 5.0 (COPYRIGHT 1998, B I MOYLE ASSOCIATES, INC.) BIM-ALERT is a proprietary product of B I Moyle Associates, Inc. It cannot

More information

CA IDMS Using VSAM Transparency

CA IDMS Using VSAM Transparency Using VSAM Transparency Date: 16-Jan-2018 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

BIM-FAQS (ASO & PCS)

BIM-FAQS (ASO & PCS) BIM-FAQS (ASO & PCS) AUTOMATED OPERATIONS INSTALLATION AND INITIALIZATION GUIDE Release 5.2 (COPYRIGHT 2000, B I MOYLE ASSOCIATES, INC.) BIM-FAQS is a proprietary product of B I Moyle Associates, Inc.

More information

CA Software Change Manager for Mainframe

CA Software Change Manager for Mainframe CA Software Change Manager for Mainframe Reports Guide r12 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

CA Datacom Core Recovering Data--CA Datacom Fast Restore

CA Datacom Core Recovering Data--CA Datacom Fast Restore CA Datacom Core - 15.0 Recovering Data--CA Datacom Fast Restore Date: 05-Mar-2018 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

CA IDMS VSAM Transparency

CA IDMS VSAM Transparency CA IDMS VSAM Transparency VSAM Transparency User Guide Release 18.5.00, 2nd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

What s New in SYSTEM 2000 Software for Version 1

What s New in SYSTEM 2000 Software for Version 1 What s New in SYSTEM 2000 Software for Version 1 SYSTEM 2000 Development and Technical Support E-mail: s2k@sas.com SAS Publishing The correct bibliographic citation for this manual is as follows: SAS Institute

More information

JCL Utilities. A Access Method Services... 4:8 Alternate Indexes and Paths... 4:5 AMS Commands... 4:8 anyname DD Statement... 9:5

JCL Utilities. A Access Method Services... 4:8 Alternate Indexes and Paths... 4:5 AMS Commands... 4:8 anyname DD Statement... 9:5 A Access Method Services... 4:8 Alternate es and Paths... 4:5 AMS Commands... 4:8 anyname DD Statement... 9:5 B Backing Up Data Sets... 3:2 Batch Submit Batch Data Set Compare... 10:21 Binary Zeros: Placing

More information

JCL JOB CONTROL LANGUAGE

JCL JOB CONTROL LANGUAGE Mainframe Concepts:- What is Mainframe Difference between Open source Applications and Mainframe Application Where do we use Mainframe Applications Operating System information Resource Access Control

More information

XFRAME Rehosting Platform Version 4.2

XFRAME Rehosting Platform Version 4.2 XFRAME Rehosting Platform Version 4.2 Product Datasheet Page 1/8 Product components On-line Transaction Server (TP Monitor) BATCH runtime system JCL migration tool VSAM subsystem SORT utility Scheduler

More information

CA EPIC for z/vse. Message Reference Guide. r5.2

CA EPIC for z/vse. Message Reference Guide. r5.2 CA EPIC for z/vse Message Reference Guide r5.2 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

Maximizing IMS Database Availability

Maximizing IMS Database Availability Maximizing IMS Database Availability Rich Lewis IBM August 3, 2010 Session 7853 Agenda Why are databases unavailable We will discuss the reasons What can we do about it We will see how we can eliminate

More information

The Google File System

The Google File System October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single

More information

ALCS Online Communication Table Maintenance (OCTM) User Guide

ALCS Online Communication Table Maintenance (OCTM) User Guide ALCS Online Communication Table Maintenance (OCTM) User Guide November 2011 ALCS Technical Support alcs@uk.ibm.com ii ALCS Online Communication Table Maintenance (OCTM) User Guide Contents Introduction

More information

For TCP/IP for VSE and its related components, use the Product Key installation procedure found in the TCP/IP installation manual.

For TCP/IP for VSE and its related components, use the Product Key installation procedure found in the TCP/IP installation manual. June 10, 2008 CSI Product Keys in VSE All of the Software Products from CSI International are protected by a Product Key. For TCP/IP for VSE and its related components, use the Product Key installation

More information

Coordinated IMS and DB2 Disaster Recovery Session Number #10806

Coordinated IMS and DB2 Disaster Recovery Session Number #10806 Coordinated IMS and DB2 Disaster Recovery Session Number #10806 GLENN GALLER Certified S/W IT Specialist IBM Advanced Technical Skills Ann Arbor, Michigan gallerg@us.ibm.com IBM Disaster Recovery Solutions

More information

MQSeries for OS/390 - Log extract program

MQSeries for OS/390 - Log extract program Version 2.3 June, 2004 Colin Paice (PAICE@UK.IBM.COM) Arndt Eade (ARNDT.EADE@UK.IBM.COM) IBM Hursley Property of IBM Take Note! Before using this report be sure to read the general information under "Notices".

More information

CA Vantage Storage Resource Manager CA RS 1509 Service List

CA Vantage Storage Resource Manager CA RS 1509 Service List CA Vantage Storage Resource Manager 12.6 1 CA RS 1509 Service List Release Service Description Type 12.6 RO80191 SUPPORT OF ZEDC IBM COMPRESSION PTF RO80937 HNODE HSM HISTORY %CACHE INCORRECT PTF RO81333

More information

Chapter 2 ACCESS METHOD SERVICES. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 ACCESS METHOD SERVICES. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 ACCESS METHOD SERVICES SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Definitions: cluster, KSDS, and ESDS. How data resides in the CI. DEFINE CLUSTER parameters. SHAREOPTIONS.

More information

BIM-ALERT/VSE provides comprehensive security for your z/vse batch environment

BIM-ALERT/VSE provides comprehensive security for your z/vse batch environment BIM-ALERT/VSE VSE External Resource Security Manager Security Administrator s Guide Release 5.1 BIM-ALERT/VSE provides comprehensive security for your z/vse batch environment BIM-ALERT/VSE allows you to

More information

QTOS DATABASE QTOS TAPE LIBRARIANS GUIDE. Copyright 2017 QSA Enterprises, LLC

QTOS DATABASE QTOS TAPE LIBRARIANS GUIDE. Copyright 2017 QSA Enterprises, LLC QTOS DATABASE QTOS TAPE LIBRARIANS GUIDE 1 QSA Enterprises, LLC 100 Dry Mill Road Ste 101 Leesburg, VA 20151 Phone 703 771 9447 Fax 703 771 9448 PREFACE This book is intended for the Tape Librarian who's

More information

Improving VSAM Application Performance with IAM

Improving VSAM Application Performance with IAM Improving VSAM Application Performance with IAM Richard Morse Innovation Data Processing August 16, 2004 Session 8422 This session presents at the technical concept level, how IAM improves the performance

More information

CICS TS for VSE/ESA Virtual Storage Management and Tuning

CICS TS for VSE/ESA Virtual Storage Management and Tuning CICS TS for VSE/ESA Virtual Storage Management and Tuning John Lawson 1950 Stemmons Frwy. Suite 5001 Dallas, Texas 75207 Phone: 214-800-8900 Email: info@illustro.com or http://www.illustro.com WAVV2004-1

More information

CA Database Management Solutions for IMS for z/os. Product Information Bulletin

CA Database Management Solutions for IMS for z/os. Product Information Bulletin CA Database Management Solutions for IMS for z/os Product Information Bulletin Version 15.0.00 General Availability (GA) I150SP0 This documentation and related computer software program (hereinafter referred

More information

RUNNING and EXTERNALIZING IMS TRACES

RUNNING and EXTERNALIZING IMS TRACES BACKGROUND Logging DLI and LOCK trace data to an external dataset will cause a minimal system performance impact due to a small increase in the instruction path and the I/O writing the x 67FA records to

More information

The Web Version of this chapter is split into 4 pages - this is page 2 - page contents are as follows:

The Web Version of this chapter is split into 4 pages - this is page 2 - page contents are as follows: http://wwwmvsbookfsnetcouk/chap03bhtm 1 of 6 11/2/2001 1:47 PM MVS Systems Programming Home Chapter 3b - MVS Internals Contents The Web Version of this chapter is split into 4 pages - this is page 2 -

More information

BIM-Dr.DITTO DISK UTILITY SYSTEM USERS GUIDE. Release 6.6 (COPYRIGHT 2000 B I MOYLE ASSOCIATES, INC.)

BIM-Dr.DITTO DISK UTILITY SYSTEM USERS GUIDE. Release 6.6 (COPYRIGHT 2000 B I MOYLE ASSOCIATES, INC.) DISK UTILITY SYSTEM Release 6.6 (COPYRIGHT 2000 B I MOYLE ASSOCIATES, INC.) is a proprietary product of B I Moyle Associates, Inc. It cannot be reproduced, changed, copied, or stored in any form (including,

More information

CA VM:Backup for z/vm

CA VM:Backup for z/vm CA VM:Backup for z/vm Installation Guide Release 3.5 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

ISPF Users Boot Camp - Part 2 of 2

ISPF Users Boot Camp - Part 2 of 2 Interactive System Productivity Facility (ISPF) ISPF Users Boot Camp - Part 2 of 2 SHARE 116 Session 8677 Peter Van Dyke IBM Australia SHARE 116, Winter 2011 pvandyke@au1.ibm.com Introduction Our jobs

More information

CA Allocate DASD Space and Placement CA RS 1610 Service List

CA Allocate DASD Space and Placement CA RS 1610 Service List CA Allocate DASD Space and Placement 12.5 1 CA RS 1610 Service List Description Type 12.5 RO90756 POSSIBLE CATALOG HANG VSAM EXTEND AFTER RO77668 APPLIED ** PRP ** RO91005 V37SMST DUMP >25 VOLUMES >1 DD

More information

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC

IBM. Candle OMEGAMON Platform. Configuring IBM Tivoli Candle Management Server on z/os. Tivoli. Version 360 GC Tivoli Candle OMEGAMON Platform IBM Version 360 Configuring IBM Tivoli Candle Management Server on z/os GC32-9414-02 12 1 2 Tivoli Candle OMEGAMON Platform IBM Version 360 Configuring IBM Tivoli Candle

More information

INTRODUCTION. José Luis Calva 1. José Luis Calva Martínez

INTRODUCTION. José Luis Calva 1. José Luis Calva Martínez USING DATA SETS José Luis Calva Martínez Email: jose.luis.calva@rav.com.mx rav.jlcm@prodigy.net.mx INTRODUCTION In working with the z/os operating system, you must understand data sets, the files that

More information

IBM. DFSMStvs Planning and Operating Guide. z/os. Version 2 Release 3 SC

IBM. DFSMStvs Planning and Operating Guide. z/os. Version 2 Release 3 SC z/os IBM Planning and Operating Guide Version 2 Release 3 SC23-6877-30 Note Before using this information and the product it supports, read the information in Notices on page 127. This edition applies

More information

IBM Tivoli OMEGAMON XE for Storage on z/os Version Tuning Guide SC

IBM Tivoli OMEGAMON XE for Storage on z/os Version Tuning Guide SC IBM Tivoli OMEGAMON XE for Storage on z/os Version 5.1.0 Tuning Guide SC27-4380-00 IBM Tivoli OMEGAMON XE for Storage on z/os Version 5.1.0 Tuning Guide SC27-4380-00 Note Before using this information

More information

XAOperator Automated XA Operations!

XAOperator Automated XA Operations! XAOperator Automated XA Operations! Belinda Daub, Senior Consultant Technical Services belinda.daub@cistech.net 704-814-0004 Agenda XAO Overview Automated Backups and Operations Verification Recovery Process

More information

Mainframe Developer NO.2/29, South Dhandapani St, Burkit road, T.nagar, Chennai-17. Telephone: Website:

Mainframe Developer NO.2/29, South Dhandapani St, Burkit road, T.nagar, Chennai-17. Telephone: Website: Mainframe Developer Mainframe Developer Training Syllabus: IBM Mainframe Concepts Architecture Input/output Devices JCL Course Syllabus INTRODUCTION TO JCL JOB STATEMENT CLASS PRTY MSGCLASS MSGLEVEL TYPRUN

More information

Uni Hamburg Mainframe Summit z/os The Mainframe Operating. Part 3 z/os data sets. Introduction to the new mainframe. Chapter 5: Working with data sets

Uni Hamburg Mainframe Summit z/os The Mainframe Operating. Part 3 z/os data sets. Introduction to the new mainframe. Chapter 5: Working with data sets Uni Hamburg Mainframe Summit z/os The Mainframe Operating Chapter 5: Working with data sets Part 3 z/os data sets Michael Großmann IBM Technical Sales Mainframe Systems grossman@de.ibm.com Copyright IBM

More information

SQL Data Synchronization Facility

SQL Data Synchronization Facility SQL Data Synchronization Facility Software Product Research SQL/Data Synchronization Facility for VSE Version 1.1 Copyright Software Product Research 2003 SQL/Monitoring Facility and SQL/Auditing Facility

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED

More information

PDSUPDTE. 4. When the length of STRING2 is less than that of STRING1, blanks are inserted after the next pool of two blanks following STRING1.

PDSUPDTE. 4. When the length of STRING2 is less than that of STRING1, blanks are inserted after the next pool of two blanks following STRING1. PDSUPDTE PDSUPDTE is a batch card image tailoring procedure and is designed to change selected fields in JCL and control statements contained in libraries (Partitioned Datasets). Control statements can

More information

IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC

IBM. DFSMS Using the Interactive Storage Management Facility. z/os. Version 2 Release 3 SC z/os IBM DFSMS Using the Interactive Storage Management Facility Version 2 Release 3 SC23-656-30 Note Before using this information and the product it supports, read the information in Notices on page

More information

INNOVATION TECHSUPPORT

INNOVATION TECHSUPPORT INNOVATION TECHSUPPORT VOLUME 3.1 Welcome to the third issue of INNOVATION TECH SUPPORT. TECHSUPPORT is intended as INNOVATION s communication vehicle to those responsible for the use of INNOVATION s products.

More information

Chapter 2 TSO COMMANDS. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TSO COMMANDS. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TSO COMMANDS SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Executing TSO commands in READY mode or ISPF. The format of a TSO command - syntax and usage. Allocating a

More information

CA MII Data Sharing for z/os

CA MII Data Sharing for z/os CA MII Data Sharing for z/os CA MII Programming Guide Release 12.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries

The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries 1 2 The SMF recovery analysis report (SRSSMF) formats SMF records produced by SRS and provides totals for the successful and unsuccessful recoveries performed by SRS. Oops, the wrong SRS! OK, the Real

More information

- - - ) _ I BM System/38. IBM System/3S Control Program Facility Concepts Manual GC Ie No Program Number

- - - ) _ I BM System/38. IBM System/3S Control Program Facility Concepts Manual GC Ie No Program Number - - - - GC21-7729-0 ) - - - - _.- Fi - --- - Ie No. 538-36 I BM System/38 IBM System/3S Control Program Facility Concepts Manual Program Number 5714-881 ( \ First Edition (October 1978) Changes are periodically

More information

IMS HALDB Database Administration

IMS HALDB Database Administration Session: J09 IMS HALDB Database Administration Rich Lewis IBM May 21, 2008 09:45 a.m. 10:45 a.m. Platform: IMS IMS High Availability Large Database (HALDB) provides increased flexibility with IMS databases.

More information

Chapter 1: Messages and Codes

Chapter 1: Messages and Codes 5 Chapter 1: Messages and Codes QUEST Processor Messages... 5 CONTROL Processor Messages... 5 SYSTEM 2000 Interface Messages... 6 System-Wide and Multi-User Messages... 7 SYSTEM 2000 Error Codes... 7 WTO

More information

EMC Disk Library Automated Tape Caching Feature

EMC Disk Library Automated Tape Caching Feature EMC Disk Library Automated Tape Caching Feature A Detailed Review Abstract This white paper details the EMC Disk Library configuration and best practices when using the EMC Disk Library Automated Tape

More information

CA Panvalet. Compare Reference Guide. r14.6

CA Panvalet. Compare Reference Guide. r14.6 CA Panvalet Compare Reference Guide r14.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

CSC 553 Operating Systems

CSC 553 Operating Systems CSC 553 Operating Systems Lecture 12 - File Management Files Data collections created by users The File System is one of the most important parts of the OS to a user Desirable properties of files: Long-term

More information

Chapter 13. Synchronizing secondary index databases with a DEDB with FPA

Chapter 13. Synchronizing secondary index databases with a DEDB with FPA Chapter 13. Synchronizing secondary index databases with a DEDB with FPA Use the Resync function of FPA to synchronize secondary index databases with their primary DEDB database. Topics: v Functions of

More information

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas NetBackup for Lotus Notes Administrator's Guide Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

for Mainstar MXI G2 Session 8962 Speaker: Shari Killion

for Mainstar MXI G2 Session 8962 Speaker: Shari Killion The New Storage Manager Plug-in for Mainstar MXI G2 Session 8962 Speaker: Shari Killion About Mainstar MXI G2 Provides ready access to critical information about your z/os system Offers a fast and easy-to-use

More information

CA Dynam /T Tape Management for z/vse

CA Dynam /T Tape Management for z/vse PRODUCT SHEET CA Dynam/T Tape Management for z/vse CA Dynam /T Tape Management for z/vse CA Dynam /T Tape Management for z/vse (CA Dynam/T) is a tape library management solution providing a single point

More information

With Tivoli Advanced Catalog

With Tivoli Advanced Catalog Simplifying ICF Catalog Management With Tivoli Advanced Catalog Management for z/os Janet Sun Rocket Mainstar jsun@mainstar.com Session 8964 Agenda Why Are ICF Catalogs Important? Catalog Management Activities

More information

SAS File Management. Improving Performance CHAPTER 37

SAS File Management. Improving Performance CHAPTER 37 519 CHAPTER 37 SAS File Management Improving Performance 519 Moving SAS Files Between Operating Environments 520 Converting SAS Files 520 Repairing Damaged Files 520 Recovering SAS Data Files 521 Recovering

More information

User Guide - Exchange Mailbox Archiver Agent

User Guide - Exchange Mailbox Archiver Agent Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT

More information

CA OPS/MVS Event Management and Automation

CA OPS/MVS Event Management and Automation CA OPS/MVS Event Management and Automation Release Notes Release 12.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

IBM. DFSMS Implementing System-Managed Storage. z/os. Version 2 Release 3 SC

IBM. DFSMS Implementing System-Managed Storage. z/os. Version 2 Release 3 SC z/os IBM DFSMS Implementing System-Managed Storage Version 2 Release 3 SC23-6849-30 Note Before using this information and the product it supports, read the information in Notices on page 267. This edition

More information

IBM Tivoli Storage Manager HSM for Windows Version 7.1. Messages

IBM Tivoli Storage Manager HSM for Windows Version 7.1. Messages IBM Tivoli Storage Manager HSM for Windows Version 7.1 Messages IBM Tivoli Storage Manager HSM for Windows Version 7.1 Messages Note: Before using this information and the product it supports, read the

More information

06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016

06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016 06 May 2011 CS 200 System Management 1 Let s discuss the facts of life... You will die. Your disk will die. Your disk will die first. 2 The user, manually at day s end, make copies on... Who does them?

More information

CA-MetaCOBOL + Online Programming Language Guide. Release 1.1 R203M+11DRP

CA-MetaCOBOL + Online Programming Language Guide. Release 1.1 R203M+11DRP CA-MetaCOBOL + Online Programming Language Guide Release 1.1 R203M+11DRP -- PROPRIETARY AND CONFIDENTIAL INFORMATION -- This material contains, and is part of a computer software program which is, proprietary

More information

Chapter 29: Operating Systems

Chapter 29: Operating Systems Author s Note: Chapter 29: Operating Systems This chapter is copied almost verbatim from the material in Chapter 21 of the textbook by Peter Abel. It is used by permission. This chapter introduces material

More information

Quick Start - OnePass Agent for Windows File System

Quick Start - OnePass Agent for Windows File System Page 1 of 23 Quick Start - OnePass Agent for Windows File System TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install

More information

IBM Tivoli Decision Support for z/os Version Messages and Problem Determination IBM SH

IBM Tivoli Decision Support for z/os Version Messages and Problem Determination IBM SH IBM Tivoli Decision Support for z/os Version 1.8.2 Messages and Problem Determination IBM SH19-6902-15 IBM Tivoli Decision Support for z/os Version 1.8.2 Messages and Problem Determination IBM SH19-6902-15

More information

IBM. User s Guide. NetView File Transfer Program Version 2 for MVS. Release 2.1 SH

IBM. User s Guide. NetView File Transfer Program Version 2 for MVS. Release 2.1 SH NetView File Transfer Program Version 2 for MVS IBM User s Guide Release 2.1 SH12-5656-04 NetView File Transfer Program Version 2 for MVS IBM User s Guide Release 2.1 SH12-5656-04 Note! Before using this

More information

Paradigm Shifts in How Tape is Viewed and Being Used on the Mainframe

Paradigm Shifts in How Tape is Viewed and Being Used on the Mainframe Paradigm Shifts in How Tape is Viewed and Being Used on the Mainframe Ralph Armstrong EMC Corporation February 5, 2013 Session 13152 2 Conventional Outlook Mainframe Tape Use Cases BACKUP SPACE MGMT DATA

More information

OPERATING SYSTEM SUPPORT (Part 1)

OPERATING SYSTEM SUPPORT (Part 1) Eastern Mediterranean University School of Computing and Technology ITEC255 Computer Organization & Architecture OPERATING SYSTEM SUPPORT (Part 1) Introduction The operating system (OS) is the software

More information

Failures under MVS p. 67 General p. 67 JCL Errors p. 68 Syntactical JCL Errors p. 68 Allocation JCL Errors p. 69 ABEND Failures p.

Failures under MVS p. 67 General p. 67 JCL Errors p. 68 Syntactical JCL Errors p. 68 Allocation JCL Errors p. 69 ABEND Failures p. About the Author p. vii Preface p. xv Acknowledgments p. xix Introduction p. 1 Historical Perspective p. 1 JCL Complexity p. 3 Multiprogramming and Virtual Storage p. 4 Data Set Organizations p. 8 Non-VSAM

More information

How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server

How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server How to Setup MTO/JCL Spooler Housekeeping Facility for Enterprise Server Overview You can configure your enterprise server so when your region starts a CICS transaction called JCL1 runs automatically to

More information

COMPUTER EDUCATION TECHNIQUES, INC. (JCL ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (JCL ) SA: In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers

More information

Vendor: IBM. Exam Code: C Exam Name: DB2 10 System Administrator for z/os. Version: Demo

Vendor: IBM. Exam Code: C Exam Name: DB2 10 System Administrator for z/os. Version: Demo Vendor: IBM Exam Code: C2090-617 Exam Name: DB2 10 System Administrator for z/os Version: Demo QUESTION 1 Assume that you have implemented identity propagation and that the distributed user name is 'MARY'.

More information

Copyright by Connectivity Systems, Inc. All Rights Reserved

Copyright by Connectivity Systems, Inc. All Rights Reserved All Rights Reserved RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the Government is subject to the restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and

More information

* Parameter... 1:18. B Backward References... 5:8 Blocksize: Choosing... 3:19

* Parameter... 1:18. B Backward References... 5:8 Blocksize: Choosing... 3:19 * Parameter... 1:18 A Abnormal Disposition... 2:7 ACB: Access Method Control Block... 11:7 Accounting Information... 1:9, 8:15 ACCT Parameter - Account... 1:15 Allocation and Termination Messages... 1:25

More information

CALL CLICK FAX MAIL P.O. Box 1213, New York, NY 10156

CALL CLICK FAX MAIL P.O. Box 1213, New York, NY 10156 File-AID s Microsoft Systems courses include: Programming Skills PC Emulation of Mainframe Software Telecommunications VSAM Database: IMS Client/Server for MVS Programming Languages Utilities & Development

More information

What's Different in Backup Exec 2012

What's Different in Backup Exec 2012 What's Different in Backup Exec 2012 What's different in Backup Exec 2012 This document includes the following topics: Changes to the user interface for Backup Exec 2012 Changes to terminology for Backup

More information

VSHARE FOR Z/OS. Installation and Operations Guide. VSHARE allows multiple programs to access and. simultaneously by giving batch jobs the ability to

VSHARE FOR Z/OS. Installation and Operations Guide. VSHARE allows multiple programs to access and. simultaneously by giving batch jobs the ability to VSHARE FOR Z/OS Installation and Operations Guide Multiple Region VSAM File Sharing Product Release 3 Version 0D VSHARE allows multiple programs to access and update the same VSAM file simultaneously by

More information

Configuring ISPF for Fun and Profit

Configuring ISPF for Fun and Profit Configuring ISPF for Fun and Profit Session 10948 Wednesday, March 14, 2012 Thomas Conley Pinnacle Consulting Group, Inc. (PCG) 59 Applewood Drive Rochester, NY 14612-3501 P: (585)720-0012 F: (585)723-3713

More information

Using Magnetic Tapes at EI&O

Using Magnetic Tapes at EI&O UFIT EI&O Document ID: D0017 Last Updated: 08/28/2002 This document describes the use of magnetic tapes at EI&O. Topics covered include tape hardware and facilities, purchase and maintenance, converting

More information

Implementing Data Masking and Data Subset with Sequential or VSAM Sources

Implementing Data Masking and Data Subset with Sequential or VSAM Sources Implementing Data Masking and Data Subset with Sequential or VSAM Sources 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,

More information

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address

B. the address of the data is supplied by the users C. there is no need for an address i.e. the data is used as an address 1. The part of machine level instruction, which tells the central processor what has to be done, is A. Operation code B. Address C. Locator D. Flip-Flop 2. Which of the following refers to the associative

More information

Introduction to the SAS/ACCESS Interface to IMS

Introduction to the SAS/ACCESS Interface to IMS 3 CHAPTER 1 Overview of the SAS/ACCESS Interface to IMS Introduction to the SAS/ACCESS Interface to IMS 3 Purpose of the SAS/ACCESS Interface to IMS 3 Using the SAS/ACCESS Interface to IMS 4 How the IMS

More information

CA FAVER VSAM Data Protection

CA FAVER VSAM Data Protection CA FAVER VSAM Data Protection Installation Guide r4.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation )

More information

IMS/DB Introduction and Structure

IMS/DB Introduction and Structure and Structure Introduction 2 Before databases 3 Database Requirements 6 IMS objectives 7 IMS features 8 Converting from VSAM to IMS 10 How is the database created? 12 PCBs and PSBs 13 Database structuring

More information

Routing Journal Operations on Disks Using Striping With Parity 1

Routing Journal Operations on Disks Using Striping With Parity 1 Routing Journal Operations on Disks Using Striping With Parity 1 ABSTRACT Ramzi Haraty and Fadi Yamout Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty@beirut.lau.edu.lb, fadiyam@inco.com.lb

More information

C A S P E R USER GUIDE V ERSION 10

C A S P E R USER GUIDE V ERSION 10 TM C A S P E R TM USER GUIDE V ERSION 10 Copyright and Trademark Information Information in this document is subject to change without notice. Federal law prohibits unauthorized use, duplication, and distribution

More information

Server Edition USER MANUAL. For Mac OS X

Server Edition USER MANUAL. For Mac OS X Server Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion are registered

More information

CA IDMS DLI Transparency

CA IDMS DLI Transparency CA IDMS DLI Transparency DLI Transparency User Guide Release 18.5.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

ISPF at EI&O UFIT. UF Information Technology. EI&O Document ID: D0040 Last Updated: 06/28/2002

ISPF at EI&O UFIT. UF Information Technology. EI&O Document ID: D0040 Last Updated: 06/28/2002 UFIT ISPF at EI&O EI&O Document ID: D0040 Last Updated: 06/28/2002 The Interactive System Productivity Facility (ISPF) and the Program Development Facility (PDF) are available in TSO. This document briefly

More information