CICS Supplied Transactions
Total Page:16
File Type:pdf, Size:1020Kb
CICS Transaction Server for z/OS CICS Supplied Transactions Version 3 Release 2 SC34-6817-03 CICS Transaction Server for z/OS CICS Supplied Transactions Version 3 Release 2 SC34-6817-03 Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page 615. This edition applies to Version 3 Release 2 of CICS Transaction Server for z/OS, program number 5655-M15, and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1982, 2011. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface............................xi What this book is about ......................xi Who should read this book ....................xi What you need to know to understand this book ............xi How to use this book ......................xi Summary of changes ......................xiii Changes for CICS Transaction Server for z/OS, Version 3 Release 2 .....xiii Changes for CICS Transaction Server for z/OS, Version 3 Release 1 .....xiii Changes for CICS Transaction Server for z/OS, Version 2 Release 3 .....xiv Changes for CICS Transaction Server for z/OS, Version 2 Release 2 .....xiv Changes for CICS Transaction Server for z/OS, Version 2 Release 1 .....xv Chapter 1. Using CICS supplied transactions .............1 How to start or stop a transaction ..................3 Syntax notation and conventions used.................3 Minimum abbreviation of keywords .................4 Uppercase input to transactions ..................4 Terminal operation ........................5 $ (the dollar symbol) ......................5 Operator security .......................5 Terminal operator .......................6 Supervisory terminal operator ...................6 Master terminal operator .....................7 MRO and ISC support......................8 BMS partitions ........................8 Using the system console .....................10 Rules for console entry .....................10 MODIFY command ......................11 REPLY command .......................12 Example of a conversation using CONVERSE ............12 Example of a conversation using WRITE/READ ............12 Using TSO consoles .......................13 Using the KILL option for purging transactions .............13 Using CEMT to terminate a task .................14 Using the console to terminate a task ...............14 Consequences of using KILL...................15 Chapter 2. The application debugging profile manager .........17 Using the application debugging profile manager Web interface .......17 Configuring access to the application debugging profile manager Web interface .........................17 Using the application debugging profile manager 3270 interface .......37 Chapter 3. CBAM - BTS browser..................57 Chapter 4. CCRL - certificate revocation lists transaction ........59 Chapter 5. CDBC - database control menu..............61 Connecting CICS to DBCTL ....................62 Disconnecting CICS from DBCTL ..................62 Specifying a DBCTL system identifier (DBCTLID) ...........63 Using the HELP panel ......................63 © Copyright IBM Corp. 1982, 2011 iii Chapter 6. CDBI - database control inquiry .............65 Using the CDBI HELP panel ....................65 Chapter 7. CDBM - database control interface ............67 Using CDBM Syntax .......................67 Using DFHDBFK - The CDBM GROUP command file ..........69 Record layout in the CDBM GROUP command file...........70 The MAINTENANCE panel for DFHDBFK ..............70 Using the CDBM HELP panels ...................72 Chapter 8. CEBR - temporary storage browse ............75 Using the CEBR HELP panel ...................77 Chapter 9. CEBT - master terminal (alternate CICS) ..........79 Minimum abbreviation of keywords .................79 CEBT INQUIRE and SET commands.................79 CEBT INQUIRE AUXTRACE ...................79 CEBT INQUIRE DUMP ......................80 CEBT INQUIRE GTFTRACE ...................81 CEBT INQUIRE INTTRACE .....................82 CEBT INQUIRE SURVEILLANCE ...................82 CEBT INQUIRE TAKEOVER .....................83 CEBT SET AUXTRACE.....................83 CEBT SET DUMP.......................84 CEBT SET GTFTRACE.....................85 CEBT SET INTTRACE .....................86 CEBT SET SURVEILLANCE ...................86 CEBT SET TAKEOVER.....................87 CEBT PERFORM commands ...................88 CEBT PERFORM SHUTDOWN .....................88 CEBT PERFORM SNAP ......................88 CEBT PERFORM TAKEOVER ..................88 Chapter 10. CECI - command-level interpreter ............91 Using the CECI HELP panel ....................92 Command-level syntax-checking transaction (CECS) ...........93 Chapter 11. CEDA - resource definition online ............95 Command syntax ........................95 CSD compatibility panel .....................101 Security checking .......................103 CEDA HELP panels ......................103 CEDB and CEDC .......................107 Chapter 12. CEDF and CEDX - the execution diagnostic facility .....109 Using the CEDF transaction ...................109 Command syntax ......................109 Command options ......................109 Beginning an EDF session (single-screen mode) ...........110 Beginning an EDF session (dual-screen mode)............111 Monitoring remote transactions..................111 Invoking CEBR and CECI from CEDF ...............111 Using the CEDX transaction ...................112 Command syntax ......................113 Command options ......................113 iv CICS Supplied Transactions Chapter 13. CEKL—master terminal (emergency use) .........115 Minimum abbreviation of keywords .................115 CEKL INQUIRE TASK ......................115 CEKL SET TASK........................118 Chapter 14. CEMN - CICS monitoring facility ............121 Chapter 15. CEMT—master terminal ................123 Starting the CEMT transaction ...................123 System parameters ......................126 Program function (PF) keys ...................126 Minimum abbreviation of keywords ................127 ALL option .........................127 CLASS option ........................127 Family of resources (using * and + symbols) ............127 Subdefining resource groups ..................128 Overtyping a display .....................128 Tabkey..........................129 Scrolling symbol (+ sign) ....................129 Blank fields in a display ....................129 Using the ? key .......................129 Expanded panels ......................130 Hexadecimal values .....................131 Variables..........................131 Invoking CEMT from an application program ............132 Security checking ......................132 CEMT DISCARD commands ...................132 CEMT DISCARD.......................134 CEMT INQUIRE commands ...................138 CEMT INQUIRE AUTINSTMODEL ................139 CEMT INQUIRE AUTOINSTALL .................140 CEMT INQUIRE AUXTRACE ..................142 CEMT INQUIRE BEAN ....................144 CEMT INQUIRE BRFACILITY ..................146 CEMT INQUIRE CFDTPOOL ..................150 CEMT INQUIRE CLASSCACHE .................151 CEMT INQUIRE CONNECTION .................154 CEMT INQUIRE CORBASERVER ................163 CEMT INQUIRE DB2CONN ..................167 CEMT INQUIRE DB2ENTRY ..................174 CEMT INQUIRE DB2TRAN ...................178 CEMT INQUIRE DELETSHIPPED ................179 CEMT INQUIRE DISPATCHER .................181 CEMT INQUIRE DJAR ....................183 CEMT INQUIRE DOCTEMPLATE ................186 CEMT INQUIRE DSAS ....................188 CEMT INQUIRE DSNAME ...................191 CEMT INQUIRE DUMPDS ...................199 CEMT INQUIRE ENQ .....................200 CEMT INQUIRE ENQMODEL ..................204 CEMT INQUIRE EXCI.....................206 CEMT INQUIRE FEPI .....................208 CEMT INQUIRE FILE .....................208 CEMT INQUIRE GTFTRACE ..................215 CEMT INQUIRE HOST ....................216 CEMT INQUIRE INTTRACE ..................218 Contents v CEMT INQUIRE IPCONN ...................219 CEMT INQUIRE IRBATCH ...................223 CEMT INQUIRE IRC .....................224 CEMT INQUIRE JMODEL ...................225 CEMT INQUIRE JOURNALNAME ................227 CEMT INQUIRE JVM .....................229 CEMT INQUIRE JVMPOOL...................231 CEMT INQUIRE LIBRARY ...................232 CEMT INQUIRE LINE .....................235 CEMT INQUIRE MODENAME ..................236 CEMT INQUIRE MONITOR ...................238 CEMT INQUIRE NETNAME ..................241 CEMT INQUIRE PARTNER ...................247 CEMT INQUIRE PIPELINE ....................249 CEMT INQUIRE PROCESSTYPE ................251 CEMT INQUIRE PROFILE ...................253 CEMT INQUIRE PROGRAM ..................254 CEMT INQUIRE REQUESTMODEL................262 CEMT INQUIRE RRMS ....................264 CEMT INQUIRE STATISTICS ..................265 CEMT INQUIRE STREAMNAME .................268 CEMT INQUIRE SYDUMPCODE.................270 CEMT INQUIRE SYSTEM ...................274 CEMT INQUIRE TASK ....................280 CEMT INQUIRE TCLASS ...................287 CEMT INQUIRE TCPIP ....................288 CEMT INQUIRE TCPIPSERVICE ................289 CEMT INQUIRE TDQUEUE ..................295 CEMT INQUIRE TERMINAL ..................300 CEMT INQUIRE TRANSACTION.................307 CEMT INQUIRE TRDUMPCODE.................312 CEMT INQUIRE TSMODEL...................315