TSO/E User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

TSO/E User's Guide z/OS Version 2 Release 3 TSO/E User's Guide IBM SA32-0971-30 Note Before using this information and the product it supports, read the information in “Notices” on page 213. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1988, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should use this document.................................................................................................................xiii How this document is organized............................................................................................................... xiii How to use this document.........................................................................................................................xiii Where to find more information................................................................................................................ xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv Summary of changes...........................................................................................xvi Summary of changes for z/OS Version 2 Release 3 (V2R3)..................................................................... xvi z/OS Version 2 Release 1 summary of changes....................................................................................... xvi Part 1. General TSO/E Functions............................................................................ 1 Chapter 1. Beginning a TSO/E Session........................................................................................................3 Learning About Your Terminal................................................................................................................3 Logging On With the LOGON Command.................................................................................................3 Issuing the LOGON Command..........................................................................................................3 Interacting With TSO/E...........................................................................................................................5 Messages...........................................................................................................................................5 Interrupting a Process...................................................................................................................... 7 Ending a TSO/E Session..........................................................................................................................8 Chapter 2. Basic Concepts.........................................................................................................................11 Communicating With MVS....................................................................................................................11 Using TSO/E Commands...................................................................................................................... 12 Using Command Operands.............................................................................................................12 Abbreviating Commands and Keyword Operands......................................................................... 13 Separating Words in a Command................................................................................................... 14 Continuing a Command on Another Line........................................................................................14 Including Comments...................................................................................................................... 15 Using Subcommands...................................................................................................................... 15 Issuing TSO/E Commands..............................................................................................................16 Getting Help for Commands........................................................................................................... 17 Listing All TSO/E Commands.......................................................................................................... 17 List of TSO/E Commands................................................................................................................ 19 Using Data Sets.................................................................................................................................... 20 TSO/E Data Set Naming Rules and Conventions............................................................................20 Entering Data Set Names................................................................................................................22 Chapter 3. Communicating With Other Users...........................................................................................25 Sending Short Messages - SEND Command........................................................................................25 Sending a Message to Specific Users.............................................................................................25 Specifying When a User Will Receive a Message........................................................................... 26 Sending a Message to the Master Console Operator.....................................................................27 Sending Messages to a Specific Operator or Operator Console....................................................27 Security Considerations When Sending Messages........................................................................ 28 Displaying System Messages - LISTBC Command..............................................................................28 iii Sending Messages with the TRANSMIT Command.............................................................................29 Transmitting a Message..................................................................................................................29 Transmitting to More than One Person.......................................................................................... 30 Using Nicknames and the Names Data Set......................................................................................... 30 Example of a Names Data Set........................................................................................................ 32 Receiving Transmitted Messages with the RECEIVE Command.........................................................33 Storing Transmitted Data in a Log........................................................................................................34 Part 2. Using Data Sets........................................................................................ 37 Chapter 4. Allocating Data Sets.................................................................................................................39 What is Allocation?...............................................................................................................................39 Security Considerations When Allocating Data Sets..................................................................... 39 Deallocating Data Sets....................................................................................................................39 Explicit and Implicit Allocation.......................................................................................................40 Using the ALLOCATE Command...........................................................................................................40 Providing Input to a Program..........................................................................................................40 Accessing an Existing Data Set.......................................................................................................41 Accessing More Than One Data Set - Concatenation.................................................................... 42 Allocating and Accessing UNIX Files..............................................................................................44 Directing Output From a Program.................................................................................................. 46 Creating a Non-VSAM Data Set.......................................................................................................48 Example of Allocating Data Sets to a Utility Program....................................................................51 Using ISPF/PDF to Allocate Data Sets................................................................................................. 53 Specifying a Data Set Name..........................................................................................................
Recommended publications
  • Z/OS ISPF Services Guide COMMAND NAME
    z/OS 2.4 ISPF Services Guide IBM SC19-3626-40 Note Before using this information and the product it supports, read the information in “Notices” on page 399. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-06-22 © Copyright International Business Machines Corporation 1980, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................ xv Tables................................................................................................................xvii Preface...............................................................................................................xix Who should use this document?............................................................................................................... xix What is in this document?......................................................................................................................... xix How to read the syntax diagrams..............................................................................................................xix z/OS information...............................................................................................xxiii How to send your comments to IBM...................................................................
    [Show full text]
  • Job Scheduling for SAP® Contents at a Glance
    Kees Verruijt, Arnoud Roebers, Anjo de Heus Job Scheduling for SAP® Contents at a Glance Foreword ............................................................................ 13 Preface ............................................................................... 15 1 General Job Scheduling ...................................................... 19 2 Decentralized SAP Job Scheduling .................................... 61 3 SAP Job Scheduling Interfaces .......................................... 111 4 Centralized SAP Job Scheduling ........................................ 125 5 Introduction to SAP Central Job Scheduling by Redwood ... 163 6Installation......................................................................... 183 7 Principles and Processes .................................................... 199 8Operation........................................................................... 237 9Customer Cases................................................................. 281 The Authors ........................................................................ 295 Index .................................................................................. 297 Contents Foreword ............................................................................................... 13 Preface ................................................................................................... 15 1 General Job Scheduling ...................................................... 19 1.1 Organizational Uses of Job Scheduling ..................................
    [Show full text]
  • TSO/E Programming Guide
    z/OS Version 2 Release 3 TSO/E Programming Guide IBM SA32-0981-30 Note Before using this information and the product it supports, read the information in “Notices” on page 137. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1988, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should use this document.................................................................................................................xiii How this document is organized............................................................................................................... xiii How to use this document.........................................................................................................................xiii Where to find more information................................................................................................................ xiii How to send your comments to IBM......................................................................xv
    [Show full text]
  • JES3 Commands
    z/OS Version 2 Release 3 JES3 Commands IBM SA32-1008-30 Note Before using this information and the product it supports, read the information in “Notices” on page 431. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1997, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures....................................................................................................... ix List of Tables........................................................................................................ xi About this document...........................................................................................xiii Who should use this document.................................................................................................................xiii Where to find more information................................................................................................................ xiii How to send your comments to IBM......................................................................xv If you have a technical problem.................................................................................................................xv Summary of changes...........................................................................................xvi
    [Show full text]
  • TECHNOLOGY LIST - ISSUE DATE: March 18, 2019 Technology Definition: a Set of Knowledge, Skills And/Or Abilities, Taking a Significant Time (E.G
    IT CLASSIFICATION TECHNOLOGY LIST - ISSUE DATE: March 18, 2019 Technology Definition: A set of knowledge, skills and/or abilities, taking a significant time (e.g. 6 months) to learn, and applicable to the defined classification specification assigned. Example of Tools: These are examples only for illustration purposes and are not meant to constitute a full and/or comprehensive list. Classification Discipline Technology Definition Example of Tools The relational database management system provided by IBM that runs on Unix, Omegamon, IBM Admin Tools, Log Analyzer, Database Management Linux, Windows and z/OS platforms DB2 Compare, Nsynch, TSM, Universal DBA System DB2 including DB2 Connect and related tools Command, SQL SQL Server Mgmt Studio, Red Gate, The relational database management Vantage, Tivoli, Snap Manager, Toad, system and related tools provided by Enterprise Manager, SQL, Azure SQL SQL Server Microsoft Corp Database The relational database management Oracle enterprise manager, application system and related tools provided by Oracle express, RMAN, PL SQL, SQL developer, ORACLE Corp Toad, SQL The relational database management SYBASE system and related tools provided by Sybase ASE, OEM, RAC, Partioning, Encryption Cincom SUPRA SQL – Cincom's relational database management system provides access to data in open and proprietary environments through industry-standard SQL for standalone and client/server application Supra 2.X solutions. phpadmin, mysqladmin, MySql, Vertica, Open Source Open Source database management system SQLite, Hadoop The hierarchical database management system provided by IBM that runs on z/OS Hierarchical Database IMS mainframe platform including related tools BMC IMS Utilities, Strobe, Omegamon Cincom SUPRA® PDM – Cincom's networked, hierarchical database management system provides access to your data through a Physical Data Manager (PDM) that manages the data structures of the physical files that store the data.
    [Show full text]
  • Computer Performance Evaluation Users Group (CPEUG)
    COMPUTER SCIENCE & TECHNOLOGY: National Bureau of Standards Library, E-01 Admin. Bidg. OCT 1 1981 19105^1 QC / 00 COMPUTER PERFORMANCE EVALUATION USERS GROUP CPEUG 13th Meeting NBS Special Publication 500-18 U.S. DEPARTMENT OF COMMERCE National Bureau of Standards 3-18 NATIONAL BUREAU OF STANDARDS The National Bureau of Standards^ was established by an act of Congress March 3, 1901. The Bureau's overall goal is to strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and technological services for industry and government, (3) a technical basis for equity in trade, and (4) technical services to pro- mote public safety. The Bureau consists of the Institute for Basic Standards, the Institute for Materials Research, the Institute for Applied Technology, the Institute for Computer Sciences and Technology, the Office for Information Programs, and the Office of Experimental Technology Incentives Program. THE INSTITUTE FOR BASIC STANDARDS provides the central basis within the United States of a complete and consist- ent system of physical measurement; coordinates that system with measurement systems of other nations; and furnishes essen- tial services leading to accurate and uniform physical measurements throughout the Nation's scientific community, industry, and commerce. The Institute consists of the Office of Measurement Services, and the following
    [Show full text]
  • IBM Workload Automation: Glossary Scheduler
    IBM Workload Automation IBM Glossary Version 9 Release 5 IBM Workload Automation IBM Glossary Version 9 Release 5 Note Before using this information and the product it supports, read the information in “Notices” on page 31. This edition applies to version 9, release 5, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1999, 2016. © Copyright HCL Technologies Limited 2016, 2019 Glossary Use the glossary to find terms and definitions for the IBM Workload Automation products. The following cross-references are used: v See refers you from a term to a preferred synonym, or from an acronym or abbreviation to the defined full form. v See also refers you to a related or contrasting term. To view glossaries for other IBM products, go to www.ibm.com/software/ globalization/terminology. “A” “B” on page 3 “C” on page 4 “D” on page 6 “E” on page 9 “F” on page 11 “G” on page 12 “H” on page 13 “I” on page 13 “J” on page 14 “L” on page 16 “M” on page 17 “N” on page 18 “O” on page 19 “P” on page 20 “Q” on page 22 “R” on page 22 “S” on page 24 “T” on page 26“U” on page 27 “V” on page 28 “W” on page 28 “X” on page 29“Z” on page 30 A access method An executable file used by extended agents to connect to and control jobs on other operating systems (for example, z/OS®) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3).
    [Show full text]
  • Resource Measurement Facility User's Guide
    z/OS Version 2 Release 3 Resource Measurement Facility User's Guide IBM SC34-2664-30 Note Before using this information and the product it supports, read the information in “Notices” on page 381. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1990, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures..................................................................................................... xiii List of Tables........................................................................................................xv About this document.......................................................................................... xvii Who should use this document................................................................................................................xvii How this document is organized.............................................................................................................. xvii z/OS information...................................................................................................................................... xviii How to read syntax diagrams.................................................................................................................. xviii Symbols................................................................................................................................................xix
    [Show full text]
  • Job Control Profile
    1 Job Control Profile 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Document Number: DCIM1034 24 Document Type: Specification Document Status: Published 25 Document Language: E 26 Date: 2012-03-08 27 Version: 1.2.0 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 THIS PROFILE IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL 52 ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT 53 EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. ABSENT A SEPARATE AGREEMENT 54 BETWEEN YOU AND DELL™ WITH REGARD TO FEEDBACK TO DELL ON THIS PROFILE 55 SPECIFICATION, YOU AGREE ANY FEEDBACK YOU PROVIDE TO DELL REGARDING THIS 56 PROFILE SPECIFICATION WILL BE OWNED AND CAN BE FREELY USED BY DELL. 57 58 © 2010 - 2012 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the express 59 written permission of Dell, Inc. is strictly forbidden. For more information, contact Dell. 60 61 Dell and the DELL logo are trademarks of Dell Inc. Microsoft and WinRM are either trademarks or 62 registered trademarks of Microsoft Corporation in the United States and/or other countries. Other 63 trademarks and trade names may be used in this document to refer to either the entities claiming the 64 marks and names or their products. Dell disclaims proprietary interest in the marks and names of others. 65 2 Version 1.2.0 66 CONTENTS 67 1 Scope ...................................................................................................................................................
    [Show full text]
  • System Automation for Z/OS: User S Guide
    System Automation for z/OS IBM User’s Guide Version 3 Release 5 SC34-2718-00 System Automation for z/OS IBM User’s Guide Version 3 Release 5 SC34-2718-00 Note Before using this information and the product it supports, be sure to read the general information under Appendix E, “Notices,” on page 263. Editions This edition applies to IBM Tivoli System Automation for z/OS (Program Number 5698-SA3) Version 3 Release 5, an IBM licensed program, and to all subsequent releases and modifications until otherwise indicated in new editions or technical newsletters. This edition replaces SC34-2647-00. © Copyright IBM Corporation 1996, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures .............. vii | Operating Groups ........... 29 | Moving MOVE Groups ......... 29 Tables ............... ix Controlling Application Move and Server Management .............. 29 Move Functions ............ 29 Accessibility ............ xi Controlling Application Move with Preference Using assistive technologies ......... xi Values ............... 31 Keyboard navigation of the user interface .... xi SA z/OS Automation Flags ......... 40 Automation Agent Flags ......... 40 Dotted decimal syntax diagrams ... xiii The Automation Manager Global Automation Flag ................ 42 How to send your comments to IBM .. xv Setting Automation Flags ......... 43 Relationship Between Automation Flags and About this publication ....... xvii Resource Status ............ 43 Automation Flags and Minor Resource Flags .. 44 Who Should Use This Publication ...... xvii Statuses Supplied by the Automation Manager .. 44 Where to Find More Information....... xvii Observed Status ............ 46 The System Automation for z/OS Library... xvii Automation Status ........... 47 Related Product Information ....... xviii Desired Status ............ 48 Related Online Information .......
    [Show full text]
  • Unisys IBM Mainframe Security - Part 2
    ProTech Professional Technical Services, Inc. Unisys IBM Mainframe Security - Part 2 Course Summary Description This course is intended for individuals who need an initial, introductory understanding of IBM's mainframe operating system z/OS and the mainframe security software product Resource Access Control Facility (RACF). It is specifically designed to give attendees a solid foundation in z/OS and RACF without overloading them with advanced technical topics, yet it also serves as the ideal springboard for acquiring Course Outline Course further skills and knowledge. Attendees will gain a fundamental understanding of the components and functions of z/OS and RACF. Objectives After taking this course, students will be able to understand: What z/OS is and what functions it performs The software components of z/OS How to use TSO and ISPF Coding and submitting batch jobs What RACF is and what functions it performs The contents of each type of RACF profile What groups are and how they are used Protecting datasets and general resources How RACF decides whether to grant access Topics Introduction to z/OS Groups Time Sharing Option (TSO) Resource Protection Batch Job Control Language (JCL) Datasets Introduction to RACF General Resources Users RACF Administration Audience This course is designed for anyone requiring general, introductory knowledge of z/OS and RACF. Including; Entry-level security administrators Compliance staff Non-mainframe IT security administrators IT Auditors IT Security Supervisors Prerequisites There are no prerequisites for this course. Duration Two days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names.
    [Show full text]
  • Using Sas Software to Compare Strings of Volsers in a Jcl Job and a Tso Clist
    USING SAS SOFTWARE TO COMPARE STRINGS OF VOLSERS IN A JCL JOB AND A TSO CLIST RANDALL M NICHOLS, Mississippi Dept of ITS, Jackson, MS ABSTRACT become more saturated with data and more tapes are needed for the dump. The TRANSLATE function of SAS can be Sometimes re-running a particular step is used to strip out punctuation and other necessary for the operators or the on-call unwanted characters resulting in a string person. To simplify this process a TSO of words separated by blanks which can CLIST was written that can be invoked to then be compared word by word. This build and submit the JCL to back up one process is generally considered a word disk pack at a time. processing function and at first might not seem relevant or appropriate to working Different personnel maintain the FDR with JCL, SYSLOGS, CLISTS, or other backup JCL and the TSO CLIST, so a system related files and records. process was needed to simplify keeping the FDR JCL and the CLIST in sync as Nevertheless, these types of files and VOLSERS were added and removed from records can be visualized as a series of the backup JCL JOBS. To do this words rather than individual bytes. The manually was a time consuming and third generation language model would be error prone process. to do a byte by byte comparison, build tables, make comparisons, keep or reject, write the record. Although SAS THE SOLUTION can be used to do a byte by byte comparison, it also allows us to consider a different solution that in fact might be A solution was to write a SAS program to more intuitive and easy to code.
    [Show full text]