
CICS Transaction Server for z/OS 5.5 Troubleshooting CICS IBM Note Before using this information and the product it supports, read the information in “Notices” on page 317. This edition applies to the IBM® CICS® Transaction Server for z/OS® Version 5 Release 5 (product number 5655-Y04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1974, 2020. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this PDF.....................................................................................................vii Chapter 1. Preliminary checks............................................................................... 1 Chapter 2. Classifying the problem.........................................................................5 Using symptom keywords to classify problems..........................................................................................5 Using the symptoms to classify the problem.............................................................................................. 6 CICS has stopped running......................................................................................................................6 CICS is running slowly............................................................................................................................ 7 A task fails to start..................................................................................................................................7 A task is running slowly.......................................................................................................................... 7 A task stops running at a terminal......................................................................................................... 8 A transaction has abended.....................................................................................................................8 You have obtained some incorrect output.............................................................................................8 A storage violation has occurred............................................................................................................9 Chapter 3. Distinguishing between waits, loops, and poor performance................ 11 Waits...........................................................................................................................................................11 Loops.......................................................................................................................................................... 12 Poor performance...................................................................................................................................... 13 Poor application design............................................................................................................................. 13 Chapter 4. Classifying problems by functional area...............................................15 Chapter 5. Diagnostic tools and information......................................................... 17 Documentation.......................................................................................................................................... 17 Source listings and link-edit maps............................................................................................................ 17 Abend codes and error messages............................................................................................................. 17 Symptom strings........................................................................................................................................ 18 Change log..................................................................................................................................................18 Using dumps in problem determination....................................................................................................18 Setting up the dumping environment.................................................................................................. 18 Where dumps are written.....................................................................................................................19 Events that can cause dumps to be taken...........................................................................................20 CICS dumps in a sysplex...................................................................................................................... 22 Enabling system dumps for some CICS messages............................................................................. 28 The dump code options you can specify............................................................................................. 29 Dump table statistics........................................................................................................................... 30 The transaction dump table.................................................................................................................32 The system dump table........................................................................................................................34 Dumping a CFDT list structure ............................................................................................................ 35 Dumping a named counter list structure............................................................................................. 36 Dumping a shared temporary storage list structure ...........................................................................36 The CSFE ZCQTRACE facility................................................................................................................37 Formatting and interpreting dumps.....................................................................................................38 Statistics.....................................................................................................................................................62 Monitoring.................................................................................................................................................. 62 Transaction inputs and outputs.................................................................................................................62 Terminal data........................................................................................................................................63 Transient data and temporary storage................................................................................................ 63 iii Passed information.............................................................................................................................. 63 Files and databases..............................................................................................................................64 Investigating interval control waits...........................................................................................................64 Using CICS trace ....................................................................................................................................... 65 Trace levels...........................................................................................................................................66 Trace destinations................................................................................................................................ 66 CICS exception tracing.........................................................................................................................68 Program check and abend tracing....................................................................................................... 69 z/OS Communications Server exit tracing........................................................................................... 69 z/OS Communications Server buffer tracing....................................................................................... 70 Selecting tracing by transaction.......................................................................................................... 71 Selecting tracing by component.......................................................................................................... 73 Setting trace destinations and tracing status......................................................................................77 Formatting and interpreting trace entries........................................................................................... 78 Chapter 6. Dealing with the problem.................................................................... 87 Dealing with transaction abend codes...................................................................................................... 87 Collecting the evidence........................................................................................................................87 What the abend code can tell you........................................................................................................88 Transaction abend codes: AEYD, AICA, ASRA, ASRB, and ASRD....................................................... 88 Finding where a program check occurred..........................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages352 Page
-
File Size-