IBM Health Checker for Z/OS User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

IBM Health Checker for Z/OS User's Guide z/OS Version 2 Release 3 IBM Health Checker for z/OS User's Guide IBM SC23-6843-30 Note Before using this information and the product it supports, read the information in “Notices” on page 681. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-06-24 © Copyright International Business Machines Corporation 2006, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................ xv Tables................................................................................................................xvii About this information........................................................................................ xxi Who should use this document.................................................................................................................xxi How to send your comments to IBM................................................................... xxiii If you have a technical problem.............................................................................................................. xxiii Summary of changes.......................................................................................... xxv Summary of changes for z/OS V2R3........................................................................................................ xxv Summary of changes for z/OS V2R2 as updated September 2016....................................................... xxvi Summary of changes for z/OS V2R2....................................................................................................... xxvi Summary of changes for z/OS V2R2 as updated March 2016.............................................................. xxvii Summary of changes for z/OS V2R2...................................................................................................... xxvii Summary of changes for z/OS V2R1 as updated September 2014....................................................... xxix Summary of changes for z/OS V2R1 as updated March 2014............................................................... xxix Summary of changes for z/OS V2R1 ....................................................................................................... xxx Exploitation of the Flash Express feature..........................................................................................xxxi Part 1. Using IBM Health Checker for z/OS.............................................................1 Chapter 1. Introduction............................................................................................................................... 3 What is a check?..................................................................................................................................... 4 For more information, see our IBM Redpaper publication....................................................................5 Background for IBM's checks.................................................................................................................5 Chapter 2. Setting up IBM Health Checker for z/OS................................................................................... 7 Stopping and starting IBM Health Checker for z/OS manually............................................................. 7 Sharing critical IBM Health Checker for z/OS information between systems at different levels.........7 Sharing IEASYSxx..............................................................................................................................8 Sharing the HZSPROC procedure..................................................................................................... 8 Sharing HZSPRMxx............................................................................................................................8 Steps for optimizing IBM Health Checker for z/OS................................................................................8 In a rush? Use these basic steps...................................................................................................... 9 Software requirements...........................................................................................................................9 Software requirement for running REXX checks..............................................................................9 Customizing the IBM Health Checker for z/OS procedure ................................................................. 10 Allocate the HZSPDATA data set to save check data between restarts............................................. 10 Monitoring and sizing the HZSPDATA data set...............................................................................11 Optionally set up the HZSPRINT utility............................................................................................... 11 Optionally define log streams to keep a record of the check output..................................................11 Create security definitions................................................................................................................... 13 Setting up security for the IBM Health Checker for z/OS started task..........................................14 Setting up security for the HZSPRINT utility..................................................................................16 Setting up security for IBM Health Checker for SDSF support......................................................19 Create multilevel security definitions.................................................................................................. 19 Create HZSPRMxx parmlib members.................................................................................................. 20 iii Tell the system which HZSPRMxx members you want to use.......................................................20 Assign IBM Health Checker for z/OS to a WLM service class..............................................................22 Obtain checks for IBM Health Checker for z/OS..................................................................................22 Chapter 3. Working with check output ..................................................................................................... 23 Hey! My system has been configured like this for years, and now I'm receiving exceptions!........... 24 Understanding system data issued with the check messages........................................................... 25 Understanding exception messages....................................................................................................26 Evaluating check output and resolving exceptions............................................................................. 27 Customizing check exceptions with dynamically varying severity..................................................... 28 Approaches to automation with IBM Health Checker for z/OS...........................................................29 More automation ideas...................................................................................................................29 Using HZS exception messages for automation............................................................................ 30 Understanding check state and status................................................................................................ 31 User controlled states.....................................................................................................................32 IBM Health Checker for z/OS controlled states............................................................................. 32 Understanding check state combinations: ACTIVE(DISABLED) and INACTIVE(ENABLED)........ 33 Check status....................................................................................................................................34 Using the HZSPRINT utility.................................................................................................................. 34 Example of HZSPRINT output........................................................................................................ 36 HZSPRINT utility completion codes...............................................................................................36 Chapter 4. Managing checks......................................................................................................................39 Making dynamic, temporary changes to checks .................................................................................40 Using SDSF to manage checks....................................................................................................... 41 Managing checks with the MODIFY hzsproc command.................................................................42 Making persistent changes to checks..................................................................................................48 Using WHEN to apply statements conditionally............................................................................ 48 Creating and maintaining IBM Health Checker for z/OS policies........................................................50 How IBM Health Checker for z/OS builds policies from policy statements..................................52 Can I create policy statements
Recommended publications
  • Data ONTAP® 8.2 Commands: Manual Page Reference for 7-Mode, Volume 1
    Data ONTAP® 8.2 Commands: Manual Page Reference For 7-Mode, Volume 1 NetApp, Inc. Telephone: +1 (888) 463-8277 Part Number: 215-07976_A0 495 East Java Drive Fax: +1(408) 822-4501 May 2013 Sunnyvale, CA 94089 Support telephone: +1(888) 4-NETAPP U.S. Web: www.netapp.com Feedback: [email protected] Table of Contents ...................... 1 About the Data ONTAP Commands: Manual Page Reference, Volume 1 .3.... Manual Pages by Section in This Volume and Complete Index of Both Volumes .5.. acpadmin ................... 18 aggr ..................... 20 arp ..................... 41 autosupport ................... 43 backup .................... 53 bmc ..................... 55 bootfs .................... 57 cdpd ..................... 58 cf ..................... 61 charmap .................... 64 cifs ..................... 66 cifs_access ................... 68 cifs_adupdate .................. 70 cifs_audit ................... 71 cifs_branchcache .................. 72 cifs_broadcast .................. 74 cifs_changefilerpwd .7................ 5 cifs_comment ............. ..... 76 cifs_domaininfo .................. 77 cifs_help .................... 79 cifs_homedir ................... 80 cifs_lookup ................... 81 cifs_nbalias ................... 82 cifs_prefdc ................... 83 cifs_resetdc ................... 85 cifs_restart ................... 86 cifs_sessions ................... 87 cifs_setup ................... 91 cifs_shares ................... 93 cifs_sidcache ................... 102 cifs_stat .................... 104 cifs_terminate
    [Show full text]
  • For the Abstract.The-Revision Deletion, Orcreation,Of Sentences Is
    DOCUMENT REBUKE ED 071 886 LI.004 082 AUTHOR Mathis, Betty. Ann TITLE Techniques for the Evaluation and IMprovement of Computer-Produced Abstracts. INSTITUTION Ohio State Univ".Colulbus..Computer and Information Science, Research.Center.. SPONS AGENCY National Science Foundation, Washington, D.C. REPORT NO OSU-CISRC-TR-15 . PUB DATE Dec 72 NOTE 275p.;(202 References) EDRS PRICE MF-30.65 HC-49.87 DESCRIPTORS *Abstracting;,,Abstracts; Algorithms; *Automation; CoMputers; *Electrohit Data Processing; Evaluation; Periodicals IDENTIFIERS *Automatic Abstracting ABSTRACT An automatic abstracting system, named ADAM, implemented on the IBM 370, receives journal.articles as input and produces abstracts as output. An algorithm has- been.developed which considers every sentence in the input text and rejects sentences which, are not suitable for inclusion in the abstract. All sentences which are not rejected are included in the set of sentences which are candidates for inclusion in the abstract.,The quality of the abstracts can be evaluated by means of a two -step evaluation procedUre.,The 'first step determines the conforMity of the abstracts to the defined criteria for an acceptable abstract The aecond step provides an objective evaluation criterion for abstract quality based on a.compsrison of the abstract with 'its parent documere,-. Based on the results of this evaluation, several techniques have been developed to improve the quality of the abstracts. These procedures -modify the form, arrangement, and content of the sentences selected for the abstract.The-revision deletion, orcreation,of sentences is perfOrmed according to a number of generalized ruletwhich are based on the structural characteriitics of the sentences.. This modification produces' abstracts in which the flow of ideas is improved and which represent a more nearly cohcrent:whole..(AuthorISJ) - - TECIfigICAL REPORT SERIES 4 CO1PUTE13 1r1fiFilliTTO S.
    [Show full text]
  • EM316LNXNM-OT Network Manager with Linux
    EM316LNXNM-OT Network Manager with Linux Fiber Driver Optical Multi-Service Platform Published 2012/10/17 15:28:24 P/N 1275005-100 Revision E6 ( -build r21138- ) For EM316LNXNM v4.7 fdr 39 built Oct 16 2012 - 19:07:17 EM316LNXNM-OT Preface Copyright © 2012 MRV Communications, Inc. All rights reserved. No part of the contents of this document may be reproduced in any form or by any other means without written permission from the publisher. Fiber Driver, Media Cross Connect, MegaVision, and other MRV product names and terms belong to MRV Communications or affiliates. All other brand names or trademarks referenced are the property of their respective owners. This document includes electronic links and URLs that may require internet access. Some references may not be obvious on printed pages. The user assumes sole responsibility for applying the information supplied in product documents. MRV Communications reserves the right to make changes to technical specifications and documentation without notice. This document represents the most recent product versions at the time of writing, which may differ from previous releases. To ensure maximum functionality, use the latest software updates and documents. Contact customer support regarding previous product revisions and documents. PN 1275005-100 Rev E6 intro- 2 EM316LNXNM-OT Preface Table of Contents 1. Support and Safety .......................................................................................................... 1 1.1. Customer Support ................................................................................................
    [Show full text]
  • Scripting in Axis Network Cameras and Video Servers
    Scripting in Axis Network Cameras and Video Servers Table of Contents 1 INTRODUCTION .............................................................................................................5 2 EMBEDDED SCRIPTS ....................................................................................................6 2.1 PHP .....................................................................................................................................6 2.2 SHELL ..................................................................................................................................7 3 USING SCRIPTS IN AXIS CAMERA/VIDEO PRODUCTS ......................................8 3.1 UPLOADING SCRIPTS TO THE CAMERA/VIDEO SERVER:...................................................8 3.2 RUNNING SCRIPTS WITH THE TASK SCHEDULER...............................................................8 3.2.1 Syntax for /etc/task.list.....................................................................................................9 3.3 RUNNING SCRIPTS VIA A WEB SERVER..............................................................................11 3.3.1 To enable Telnet support ...............................................................................................12 3.4 INCLUDED HELPER APPLICATIONS ..................................................................................13 3.4.1 The image buffer - bufferd........................................................................................13 3.4.2 sftpclient.........................................................................................................................16
    [Show full text]
  • Managing Clock Synchronization in Oracle® Solaris 11.4
    Managing Clock Synchronization in ® Oracle Solaris 11.4 Part No: E61003 January 2019 Managing Clock Synchronization in Oracle Solaris 11.4 Part No: E61003 Copyright © 2002, 2019, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • OEP User's Manual
    Omni-EP JK microsystems Omni-EP Manual Unless otherwise noted, this document and the information herein disclosed are proprietary to JK microsystems, Inc. Any person or entity to whom this document is furnished or having possession thereof, by acceptance, assumes custody thereof and agrees that the document is given in confidence and will not be copied or reproduced in whole or in part to meet the pur- poses for which it was delivered. The information in this document is subject to change without notice, and should not be con- strued as a commitment by JK microsystems, Inc. JK microsystems, Inc. will make every effort to inform users of substantive errors. JK microsystems, Inc. disclaims all liability for any loss or damage resulting from the use of this manual or any software described herein, including without limitation contingent, special, or incidental liability. JK microsystems, Inc. recognizes our customer‘s need for a consistent product and will make every effort to provide one. In order to provide the best possible product for all of our custom- ers, we reserve the right to make incremental improvements in our product designs. Omni-EP is a trademark of JK microsystems, Inc. All other brand and product names are trade- marks or registered trademarks of their respective companies. Omni-EP User‘s Manual Version 1.0 Copyright © JK microsystems, Inc. All rights reserved Printed in U.S.A. Document Part No. 94-0034 Published September 2005 2 JK microsystems Omni-EP Manual Limited Warranty JK microsystems, Inc. warrants each Omni-EP to be free from defects in material and work- manship for a period of 90 days from the date of purchase.
    [Show full text]
  • Command Map for 7-Mode Administrators ONTAP 7-Mode Transition Netapp September 12, 2021
    Command map for 7-Mode administrators ONTAP 7-Mode Transition NetApp September 12, 2021 This PDF was generated from https://docs.netapp.com/us-en/ontap-7mode-transition/command- map/reference_how_7_mode_commands_map_to_clustered_ontap_commands.html on September 12, 2021. Always check docs.netapp.com for the latest. Table of Contents Command Map for 7-Mode Administrators. 1 How 7-Mode commands map to ONTAP commands . 1 How 7-Mode options map to ONTAP commands . 37 How 7-Mode configuration files map to clustered Data ONTAP commands . 69 How to interpret the clustered Data ONTAP commands, options, and configuration files maps for 7-Mode administrators. 70 Command Map for 7-Mode Administrators This guide maps 7-Mode commands to their equivalents in ONTAP. How 7-Mode commands map to ONTAP commands You can use the tables provided to find the ONTAP equivalents of 7-Mode commands, with the exception of the options command. The following tables list the ONTAP equivalents of the 7-Mode options command. Information about understanding these tables is also provided. Understanding the 7-Mode to clustered Data ONTAP command map A-E A 7-Mode command ONTAP command acpadmin configure system node run -node {nodename|local} acpadmin configure acpadmin list_all system node run -node {nodename|local} acpadmin list_all acpadmin stats system node run -node {nodename|local} acpadmin stats aggr add aggr add aggr add-disks storage aggregate add-disks aggr create aggr create storage aggregate create aggr destroy aggr delete storage aggregate delete aggr media_scrub
    [Show full text]
  • Sun Blade 6000 Ethernet Switched NEM 24P 10Gbe Program Documentation
    Sun Blade 6000 Ethernet Switched NEM 24p 10GbE Program Documentation Third Party Licenses and Notices Part No.: E26812-01 November 2011 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS. Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Oracle Utilities Network Management System Installation Guide Release 2.4.0.1.0 F17283-01
    Oracle Utilities Network Management System Installation Guide Release 2.4.0.1.0 F17283-01 September 2019 Oracle Utilities Network Management System Installation Guide, Release 2.4.0.1.0 F17283-01 Copyright © 1991, 2019 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/ or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Learning Embedded Linux Through the File System: a Top-Down Approach
    Learning embedded Linux through the file system: A top-down approach Jason Kridner, [email protected] June 8, 2011, 10:10AM ESC Chicago room 34 http://beagleboard.org/linux_education Abstract Typical introductions to embedded Linux focus on complex tasks, like building device drivers, that are highly desired by at least some people working on your Linux product team. What about the rest of us that simply want to build a quick understanding of how to do some of the simple tasks that are trivial in microcontrollers without using operating systems, like accessing GPIO pins and performing I2C or SPI serial communications? This class takes a quick tops-down overview from the perspective of an electrical engineer looking to take advantage of the latest in GUI building technologies, like Android, Qt, and HTML5, without completely losing access to the underlying hardware for simple system integration tasks. Getting started Much to learn ◦ I‟m used to microcontrollers: just give me the datasheet with register definitions and set me free! Training on boot & device drivers useful ◦ Often geared more at system bring-up ◦ What about the everyday user? ◦ Where is that abstraction benefit? Let‟s just walk a working system Kernel.org documentation http://www.kernel.org/doc/ Documentation extracted from the Linux kernel and mirrored on the web where Google can find it: ◦ Documentation - Text files in the kernel source tarball's Documentation subdirectory. ◦ htmldocs - Kernel Documentation maintained in docbook format (output of "make htmldocs"). ◦ Menuconfig - help text for each kernel configuration option (from kconfig source). ◦ README various README files scattered around Linux kernel source ◦ RFC - List of IETF RFCs referred to by kernel source files.
    [Show full text]
  • Linux, Shell Programming and Perl As Pdf File
    Linux, Shell Programing and Perl by Willi-Hans Steeb, Gert Cronje and Yorick Hardy International School for Scientific Computing Contents 1 Linux Basics 1 1.1 Some Basic Commands . 1 1.2 Working with Files and Directories . 10 1.2.1 Introduction . 10 1.2.2 The Home Directory and Path Names . 11 1.2.3 Important Directories in the Linux File System . 13 1.2.4 Basic Files and Directories Commands . 14 1.2.5 File Name Substitution . 31 1.3 Standard Input/Output, and I/O Redirection . 35 2 Linux Commands 43 3 Advanced Linux 73 3.1 The Unix File System . 73 3.2 Mounting and Unmounting . 76 3.3 MTools Package . 81 3.4 Swap Space and the Loopback Device . 82 3.5 Network File-System . 83 3.6 Linuxconf . 84 3.7 Compressed Files . 85 3.8 The vi and emacs Editors . 88 3.8.1 vi Editor . 88 3.8.2 emacs Editor . 96 3.9 Programming Languages . 99 3.9.1 C and C++ Compiler . 99 3.9.2 Perl . 101 3.9.3 Lisp . 102 3.9.4 Java . 103 4 Linux and Networking 105 4.1 Introduction . 105 4.2 Basic Commands . 106 4.3 email . 116 4.4 ftp Commands . 122 4.5 Telnet . 125 i 4.6 Remote Shell . 127 4.7 Web . 128 4.8 INETD and Socket Programming . 129 5 Shell Programming 133 5.1 What is a shell . 133 5.2 The Shell as a Programming Language . 137 5.2.1 Creating a Script . 138 5.2.2 Making a Script executable .
    [Show full text]
  • Scripting in Axis Network Cameras and Video Servers
    Scripting in Axis Network Cameras and Video Servers Table of Contents 1 INTRODUCTION .............................................................................................................5 2 EMBEDDED SCRIPTS ....................................................................................................6 2.1 PHP .....................................................................................................................................6 2.2 SHELL ..................................................................................................................................7 3 USING SCRIPTS IN AXIS CAMERA/VIDEO PRODUCTS ......................................8 3.1 UPLOADING SCRIPTS TO THE CAMERA/VIDEO SERVER:...................................................8 3.2 RUNNING SCRIPTS WITH THE TASK SCHEDULER...............................................................8 3.2.1 Syntax for /etc/task.list.....................................................................................................9 3.3 RUNNING SCRIPTS VIA A WEB SERVER..............................................................................11 3.3.1 To enable Telnet support ...............................................................................................12 3.4 INCLUDED HELPER APPLICATIONS ..................................................................................13 3.4.1 The image buffer - bufferd........................................................................................13 3.4.2 sftpclient.........................................................................................................................16
    [Show full text]