CICS TS for Z/OS: Troubleshooting CICS Chapter 1

CICS TS for Z/OS: Troubleshooting CICS Chapter 1

CICS Transaction Server for z/OS 5.5 Troubleshooting CICS IBM Note Before using this information and the product it supports, read the information in “Notices” on page 317. This edition applies to the IBM® CICS® Transaction Server for z/OS® Version 5 Release 5 (product number 5655-Y04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1974, 2020. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this PDF.....................................................................................................vii Chapter 1. Preliminary checks............................................................................... 1 Chapter 2. Classifying the problem.........................................................................5 Using symptom keywords to classify problems..........................................................................................5 Using the symptoms to classify the problem.............................................................................................. 6 CICS has stopped running......................................................................................................................6 CICS is running slowly............................................................................................................................ 7 A task fails to start..................................................................................................................................7 A task is running slowly.......................................................................................................................... 7 A task stops running at a terminal......................................................................................................... 8 A transaction has abended.....................................................................................................................8 You have obtained some incorrect output.............................................................................................8 A storage violation has occurred............................................................................................................9 Chapter 3. Distinguishing between waits, loops, and poor performance................ 11 Waits...........................................................................................................................................................11 Loops.......................................................................................................................................................... 12 Poor performance...................................................................................................................................... 13 Poor application design............................................................................................................................. 13 Chapter 4. Classifying problems by functional area...............................................15 Chapter 5. Diagnostic tools and information......................................................... 17 Documentation.......................................................................................................................................... 17 Source listings and link-edit maps............................................................................................................ 17 Abend codes and error messages............................................................................................................. 17 Symptom strings........................................................................................................................................ 18 Change log..................................................................................................................................................18 Using dumps in problem determination....................................................................................................18 Setting up the dumping environment.................................................................................................. 18 Where dumps are written.....................................................................................................................19 Events that can cause dumps to be taken...........................................................................................20 CICS dumps in a sysplex...................................................................................................................... 22 Enabling system dumps for some CICS messages............................................................................. 28 The dump code options you can specify............................................................................................. 29 Dump table statistics........................................................................................................................... 30 The transaction dump table.................................................................................................................32 The system dump table........................................................................................................................34 Dumping a CFDT list structure ............................................................................................................ 35 Dumping a named counter list structure............................................................................................. 36 Dumping a shared temporary storage list structure ...........................................................................36 The CSFE ZCQTRACE facility................................................................................................................37 Formatting and interpreting dumps.....................................................................................................38 Statistics.....................................................................................................................................................62 Monitoring.................................................................................................................................................. 62 Transaction inputs and outputs.................................................................................................................62 Terminal data........................................................................................................................................63 Transient data and temporary storage................................................................................................ 63 iii Passed information.............................................................................................................................. 63 Files and databases..............................................................................................................................64 Investigating interval control waits...........................................................................................................64 Using CICS trace ....................................................................................................................................... 65 Trace levels...........................................................................................................................................66 Trace destinations................................................................................................................................ 66 CICS exception tracing.........................................................................................................................68 Program check and abend tracing....................................................................................................... 69 z/OS Communications Server exit tracing........................................................................................... 69 z/OS Communications Server buffer tracing....................................................................................... 70 Selecting tracing by transaction.......................................................................................................... 71 Selecting tracing by component.......................................................................................................... 73 Setting trace destinations and tracing status......................................................................................77 Formatting and interpreting trace entries........................................................................................... 78 Chapter 6. Dealing with the problem.................................................................... 87 Dealing with transaction abend codes...................................................................................................... 87 Collecting the evidence........................................................................................................................87 What the abend code can tell you........................................................................................................88 Transaction abend codes: AEYD, AICA, ASRA, ASRB, and ASRD....................................................... 88 Finding where a program check occurred..........................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    352 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us