ebook img

CICS Transaction Affinities Utility Guide PDF

103 Pages·1999·0.43 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview CICS Transaction Affinities Utility Guide

IBM CICS® Transaction Server for OS/390® CICS Transaction Affinities Utility Guide Release 3 SC33-1777-02 IBM CICS® Transaction Server for OS/390® CICS Transaction Affinities Utility Guide Release 3 SC33-1777-02 Note! Beforeusingthisinformationandtheproductitsupports,besuretoreadthegeneralinformationunder“Notices”onpagevii. Thirdedition(March1999) ThiseditionappliestoRelease 3ofCICSTransactionServerforOS/390,programnumber5655-147,andtoall subsequentversions,releases,andmodificationsuntilotherwiseindicatedinneweditions.Makesureyouareusing thecorrecteditionfortheleveloftheproduct. Thiseditionreplacesandmakesobsoletethepreviousedition,SC33-1777-01.Thetechnicalchangesforthisedition aresummarizedunder†Summaryofchanges†andareindicatedbyaverticalbartotheleftofachange. OrderpublicationsthroughyourIBMrepresentativeortheIBMbranchofficeservingyourlocality.Publicationsare notstockedattheaddressgivenbelow. Atthebackofthispublicationisapageentitled“SendingyourcommentstoIBM”.Ifyouwanttomakecomments, butthemethodsdescribedarenotavailabletoyou,pleaseaddressthemto: IBM United Kingdom Laboratories, Information Development, Mail Point 095, Hursley Park, Winchester, Hampshire, England, SO21 2JN. WhenyousendinformationtoIBM,yougrantIBManonexclusiverighttouseordistributetheinformationinany wayitbelievesappropriatewithoutincurringanyobligationtoyou. ©CopyrightInternationalBusinessMachinesCorporation1994,1999.Allrightsreserved. NotetoU.S.GovernmentUsers—Documentationrelatedtorestrictedrights—Use,duplicationordisclosureis subjecttorestrictionssetforthinGSAADPScheduleContractwithIBMCorp. Contents Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Trademarks. . . . . . . . . . . . . . . . . . . . . . . . . . viii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . ix What this book is about . . . . . . . . . . . . . . . . . . . . . ix Who this book is for. . . . . . . . . . . . . . . . . . . . . . ix What you need to know to understand this book . . . . . . . . . . . ix How to use this book . . . . . . . . . . . . . . . . . . . . . ix Determining if a publication is current . . . . . . . . . . . . . . . ix Notes on terminology . . . . . . . . . . . . . . . . . . . . . x Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . xi CICS Transaction Server for OS/390 . . . . . . . . . . . . . . . . xi CICS books for CICS Transaction Server for OS/390 . . . . . . . . . xi CICSPlex SM books for CICS Transaction Server for OS/390 . . . . . . xii Other CICS books . . . . . . . . . . . . . . . . . . . . . . xii Summary of changes. . . . . . . . . . . . . . . . . . . . . . xiii Changes for the CICS Transaction Server for OS/390 Release 3 edition . . . xiii Changes for the CICS Transaction Server for OS/390 Release 2 edition . . . xiii Changes for the CICS Transaction Server for OS/390 Release 1 edition . . . xiii Chapter1. Introducing transaction affinities. . . . . . . . . . . . . 1 The benefits of dynamic routing . . . . . . . . . . . . . . . . . . 3 What does dynamic routing cost?. . . . . . . . . . . . . . . . . 3 Transaction affinities . . . . . . . . . . . . . . . . . . . . . . 3 Inter-transaction affinity . . . . . . . . . . . . . . . . . . . . 4 Transaction-system affinity . . . . . . . . . . . . . . . . . . . 4 Affinity relations . . . . . . . . . . . . . . . . . . . . . . . 4 Affinity lifetimes . . . . . . . . . . . . . . . . . . . . . . . 5 CICS programming techniques for transaction affinity . . . . . . . . . . 5 Safe programming techniques . . . . . . . . . . . . . . . . . . 6 Unsafe programming techniques . . . . . . . . . . . . . . . . . 6 Suspect programming techniques. . . . . . . . . . . . . . . . . 6 Avoiding the effects of transaction affinity. . . . . . . . . . . . . . . 6 Protecting applications from one another . . . . . . . . . . . . . . . 7 Chapter2. Introducing the TransactionAffinities Utility . . . . . . . . 9 Commands detected by the TransactionAffinities Utility . . . . . . . . . 11 The Scanner component . . . . . . . . . . . . . . . . . . . . . 12 The Detector component . . . . . . . . . . . . . . . . . . . . . 12 What is detected. . . . . . . . . . . . . . . . . . . . . . . 13 What is not detected . . . . . . . . . . . . . . . . . . . . . 14 Controlling the Detector . . . . . . . . . . . . . . . . . . . . 15 How the affinity data is collected . . . . . . . . . . . . . . . . . 15 Saving affinity data . . . . . . . . . . . . . . . . . . . . . . 16 The affinity data VSAM files. . . . . . . . . . . . . . . . . . . 17 The control record VSAM file . . . . . . . . . . . . . . . . . . 17 Detector performance . . . . . . . . . . . . . . . . . . . . . 18 The Reporter component. . . . . . . . . . . . . . . . . . . . . 18 The Builder component . . . . . . . . . . . . . . . . . . . . . 18 Chapter3. Preparing to use the affinity utility program . . . . . . . . 21 © Copyright IBM Corp. 1994, 1999 iii Creating the VSAM files . . . . . . . . . . . . . . . . . . . . . 21 Estimating the size of the MVS data space and VSAM files . . . . . . . . 21 Defining the VSAM files to CICS . . . . . . . . . . . . . . . . . . 22 Tailoring your CICS startup job. . . . . . . . . . . . . . . . . . . 23 Restarting your CICS region . . . . . . . . . . . . . . . . . . . 23 Chapter4. Running the Scanner . . . . . . . . . . . . . . . . . 25 Creating a summary report . . . . . . . . . . . . . . . . . . . . 25 Creating a detailed report . . . . . . . . . . . . . . . . . . . . 27 Contents of a detailed report . . . . . . . . . . . . . . . . . . 28 Chapter5. Running the Detector . . . . . . . . . . . . . . . . . 31 Displaying the Detector control screen . . . . . . . . . . . . . . . . 32 Starting the collection of affinity data . . . . . . . . . . . . . . . . 33 Pausing the collection of affinity data . . . . . . . . . . . . . . . . 34 Resuming the collection of affinity data. . . . . . . . . . . . . . . . 34 Stopping the collection of affinity data . . . . . . . . . . . . . . . . 35 Changing the Detector options. . . . . . . . . . . . . . . . . . . 36 Detector errors . . . . . . . . . . . . . . . . . . . . . . . . 39 Chapter6. Running the Reporter . . . . . . . . . . . . . . . . . 41 Requesting a report from the Reporter. . . . . . . . . . . . . . . . 41 Output from the Reporter. . . . . . . . . . . . . . . . . . . . . 42 Affinity report . . . . . . . . . . . . . . . . . . . . . . . . 43 Producing affinity transaction group definitions . . . . . . . . . . . . 46 Using the affinity report . . . . . . . . . . . . . . . . . . . . . 47 Understanding the affinities . . . . . . . . . . . . . . . . . . . 48 Modifying affinity transaction groups. . . . . . . . . . . . . . . . 48 Compressing affinity data. . . . . . . . . . . . . . . . . . . . . 49 Using the IBM Cross System Product . . . . . . . . . . . . . . . . 50 Affinity analysis for a CICS region containing CSP 3.3 applications . . . . 50 Detailed affinity analysis . . . . . . . . . . . . . . . . . . . . 51 Chapter7. Running the Builder. . . . . . . . . . . . . . . . . . 55 Syntax for input to the Builder . . . . . . . . . . . . . . . . . . . 56 HEADER statements . . . . . . . . . . . . . . . . . . . . . 58 Output from the Builder . . . . . . . . . . . . . . . . . . . . . 58 Combined affinity transaction group definitions . . . . . . . . . . . . 58 Data sets processed report . . . . . . . . . . . . . . . . . . . 61 Empty transaction groups report . . . . . . . . . . . . . . . . . 61 Group merge report. . . . . . . . . . . . . . . . . . . . . . 61 Error report. . . . . . . . . . . . . . . . . . . . . . . . . 62 AppendixA. Details of what is detected . . . . . . . . . . . . . . 65 ENQ/DEQ . . . . . . . . . . . . . . . . . . . . . . . . . . 65 TS commands. . . . . . . . . . . . . . . . . . . . . . . . . 66 LOAD HOLD/RELEASE . . . . . . . . . . . . . . . . . . . . . 66 RETRIEVE WAIT/START. . . . . . . . . . . . . . . . . . . . . 66 ADDRESS CWA . . . . . . . . . . . . . . . . . . . . . . . . 67 GETMAIN SHARED/FREEMAIN . . . . . . . . . . . . . . . . . . 67 LOAD/FREEMAIN . . . . . . . . . . . . . . . . . . . . . . . 67 CANCEL/DELAY/POST/START . . . . . . . . . . . . . . . . . . 68 SPI commands . . . . . . . . . . . . . . . . . . . . . . . . 69 WAIT commands. . . . . . . . . . . . . . . . . . . . . . . . 69 AppendixB. Correlating Scanner and Reporter output to source . . . . 71 iv CICSTransactionAffinitiesUtilityGuide Reporter output . . . . . . . . . . . . . . . . . . . . . . . . 71 Scanner output . . . . . . . . . . . . . . . . . . . . . . . . 71 Examples . . . . . . . . . . . . . . . . . . . . . . . . . 71 AppendixC. Useful tips when analyzing TransactionAffinities Utility reports . . . . . . . . . . . . . . . . . . . . . . . . . . 75 COBOLaffinities . . . . . . . . . . . . . . . . . . . . . . . . 75 LOGON or SYSTEM when PCONV expected . . . . . . . . . . . . . 75 Unrecognized Transids . . . . . . . . . . . . . . . . . . . . . 75 AppendixD. Diagnostics . . . . . . . . . . . . . . . . . . . . 77 Detector table manager diagnostics . . . . . . . . . . . . . . . . . 77 Function code values . . . . . . . . . . . . . . . . . . . . . 77 Detector CAFB request queue manager diagnostics. . . . . . . . . . . 80 Function code values . . . . . . . . . . . . . . . . . . . . . 80 Date formatter diagnostics . . . . . . . . . . . . . . . . . . . . 80 Reason code values . . . . . . . . . . . . . . . . . . . . . 80 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Sending your comments to IBM . . . . . . . . . . . . . . . . . 85 Contents v vi CICSTransactionAffinitiesUtilityGuide Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area.Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used.Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106, Japan The following paragraph does not apply in the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONALBUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OFANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FORA PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact IBM United Kingdom Laboratories, MP151, Hursley Park, Winchester, Hampshire, England, SO21 2JN. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. © Copyright IBM Corp. 1994, 1999 vii The licensed program described in this document and all licensed material available for it are provided by IBM under terms of the IBM CustomerAgreement, IBM International Programming LicenseAgreement, or any equivalent agreement between us. Trademarks The following terms are trademarks of International Business Machines Corporation in the United States, or other countries, or both: BookManager DB2 CICS IBM CICS/ESA LanguageEnvironment CICSPlex VTAM Other company, product, and service names may be trademarks or service marks of others. viii CICSTransactionAffinitiesUtilityGuide

Description:
Introducing transaction affinities . Commands detected by the Transaction Affinities Utility . This book describes the affinity utility program.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.