



Title: Utilities Reference: System
Document Number: SC26-9441-01
Build Date: 04/20/01 13:06:22 Build Version: 1.3.0 of BUILD/VM Version: UG03902 DropDate: Wednesday, July 12, 2000
Document Path: /home/webapps/epubs/htdocs/book/dfsu30e1.boo
CONTENTS Table of Contents
Summarize
COVER Book Cover
NOTICES Notices
EDITION Edition Notice
CONTENTS Table of Contents
FIGURES Figures
TABLES Tables
FRONT_1 Notices
FRONT_1.1 Programming Interface Information
FRONT_1.2 Trademarks
FRONT_1.3 Product Names
FRONT_2 Preface
FRONT_2.1 Organization of This Book
FRONT_2.2 Prerequisite Knowledge
FRONT_2.3 Organization of Utility Descriptions
FRONT_2.4 Syntax Diagrams
FRONT_2.5 CICS, DBCTL, and DCCTL
FRONT_2.6 Linking to Related Information in IMS Publications
FRONT_2.7 Supported Environments for Various Utilities
FRONT_2.8 How to Send Your Comments
CHANGES Summary of Changes
CHANGES.1 Changes to The Current Edition of This Book for IMS Version 7
CHANGES.2 Changes to This Book for IMS Version 7
CHANGES.3 Library Changes for IMS Version 7
1.0 Generation Utilities
1.1 Database Description (DBD) Generation.
1.1.1 Information Specified in DBD Generation
1.1.2 DBD Generation for Database Types
1.1.2.1 HSAM DBD Generation
1.1.2.2 GSAM DBD Generation
1.1.2.3 HISAM DBD Generation
1.1.2.4 HDAM and PHDAM DBD Generation
1.1.2.5 HIDAM and PHIDAM DBD Generation
1.1.2.6 MSDB DBD Generation
1.1.2.7 DEDB DBD Generation
1.1.2.8 Index and PSINDEX DBD Generation
1.1.2.9 Logical DBD Generation
1.1.2.10 DBD Generation Input Record Structure (Except for DEDB DBDs)
1.1.2.11 DEDB DBD Generation Input Record Structure
1.1.2.12 DBD Generation Coding Conventions
1.1.3 DBDGEN Procedure
1.1.3.1 PROC Statement
1.1.3.2 JCL Parameters
1.1.4 DBDGEN Statements
1.1.4.1 DBD Statement
1.1.4.2 DBD Statement Parameter Descriptions
1.1.4.3 DATASET Statements
1.1.4.4 DATASET Statement Parameter Description
1.1.4.5 Data Sets in IMS Data Set Groups
1.1.4.6 AREA Statement
1.1.4.7 AREA Statement Parameter Description
1.1.4.8 SEGM Statement
1.1.4.9 SEGM Statement for PSINDEX Databases
1.1.4.10 LCHILD Statement
1.1.4.11 LCHILD Statement Parameter Description
1.1.4.12 FIELD Statement
1.1.4.13 FIELD Statement Parameter Description
1.1.4.14 XDFLD Statement
1.1.4.15 XDFLD Statement Parameter Description
1.1.4.16 DBDGEN, FINISH, and END Statements
1.1.5 Output
1.1.5.1 Control Statement Listing
1.1.5.2 DBD Generation Error Conditions
1.1.6 Examples
1.1.6.1 Examples without Secondary Index or Logical Relationships
1.1.6.2 Summary of Physical Database Description Examples
1.1.6.3 Examples with Logical Relationships
1.1.6.4 Examples with Secondary Indexes
1.2 Program Specification Block (PSB) Generation
1.2.1 Input and Output
1.2.2 PSBGEN Procedure
1.2.2.1 PROC Statement
1.2.2.2 Step C
1.2.2.3 Step L
1.2.2.4 Invoking the Procedure
1.2.3 Utility Control Statements
1.2.3.1 Alternate PCB Statement
1.2.3.2 DL/I or Fast Path Database PCB Statement
1.2.3.3 GSAM PCB Statement
1.2.3.4 SENSEG Statement
1.2.3.5 SENFLD Statement
1.2.3.6 PSBGEN Statement
1.2.3.7 END Statement
1.2.4 Output Messages and Statistics
1.2.5 Examples
1.2.5.1 PSB Generation Examples
1.2.5.2 Field Level Sensitivity PSB Generation Example
1.2.5.3 Fast Path PSB Generation Examples
1.2.5.4 Additional PSB Generation Examples
1.2.5.5 Examples of a Sample Problem with an Application Database
1.2.5.6 Example of a Shared Secondary Index
1.3 Application Control Blocks Maintenance Utility
1.3.1 Restrictions
1.3.2 Input and Output
1.3.2.1 ACBGEN Procedure
1.3.2.2 EXEC Statement
1.3.2.3 DD Statements
1.3.2.4 DFSACBCP Control Statement
1.3.3 Utility Control Statements
1.3.3.1 Managing Dynamic Option (DOPT) PSBs
1.3.4 Error Processing
1.3.5 Examples
1.3.5.1 Example 1
1.3.5.2 Example 2
1.3.5.3 Example 3
2.0 Service Utilities
2.1 Dynamic Allocation Macro (DFSMDA)
2.1.1 Restrictions
2.1.2 Input and Output
2.1.3 IMSDALOC Procedure
2.1.3.1 PROC Statement
2.1.3.2 JCL Parameter Description
2.1.3.3 Step ASSEM
2.1.3.4 Step BLDMBR
2.1.3.5 Step LNKEDT
2.1.3.6 Invoking the Procedure
2.1.4 Macro Statements
2.1.5 Examples
2.1.5.1 Example 1
2.1.5.2 Example 2
2.1.5.3 Example 3
2.1.5.4 Example 4
2.1.5.5 Example 5
2.2 Security Maintenance Utility (DFSISMP0)
2.2.1 Input and Output Flow
2.2.2 Restrictions
2.2.3 Security Options
2.2.3.1 LTERM Security
2.2.3.2 Password Security
2.2.3.3 Transaction Command Security
2.2.3.4 IMS Resource Access Security
2.2.3.5 Sign-on Verification Security
2.2.4 Resource Access Control Facility (RACF)
2.2.5 Command Authorization Exit Routine
2.2.6 IMS Application Resource Access Security
2.2.7 SECURITY Procedure
2.2.7.1 PROC Statement.
2.2.7.2 JCL Parameter Description
2.2.7.3 Step S EXEC Statement
2.2.7.4 DD Statements
2.2.7.5 Step C
2.2.7.6 Step L
2.2.7.7 Invoking the Procedure
2.2.8 Utility Control Statements
2.2.9 Output
2.2.9.1 Security-Status Reports
2.2.10 Examples
2.2.10.1 Example 1
2.2.10.2 Example 2
2.2.10.3 Example 3
2.2.10.4 Example 4
2.2.10.5 Example 5
2.2.10.6 Example 6
2.2.10.7 Example 7
2.2.10.8 Example 8
2.3 Online Change Utility (DFSUOCU0)
2.3.1 Restrictions
2.3.2 INITMOD Procedure
2.3.2.1 PROC Statement
2.3.2.2 DFSMREC Control Statement
2.3.3 OLCUTL Procedure
2.3.3.1 PROC Statement
2.3.3.2 EXEC Statement
2.3.3.3 DD Statements
2.3.3.4 Invoking the Procedure
2.4 Dynamic SVC Utility (DFSUSVC0).
2.4.1 Restrictions
2.4.2 Input and Output
2.4.3 Error Processing
2.4.4 JCL Requirements
2.4.4.1 DD Statements
2.4.5 Example
3.0 Log Utilities
3.1 Log Archive Utility (DFSUARC0).
3.1.1 OLDS Archive
3.1.2 Batch DASD Log Data Set Archive
3.1.3 Optional Functions
3.1.3.1 Creating an RLDS (Recovery Log Data Set)
3.1.3.2 Omitting Log Records on SLDS
3.1.3.3 Copying Log Records into User Data Sets
3.1.3.4 Specifying User Exit Routines
3.1.3.5 Specifying Forced End of Volume (EOV)
3.1.4 Utility Input
3.1.4.1 OLDS Input
3.1.4.2 SLDS Input
3.1.5 Utility Output
3.1.6 JCL Requirements
3.1.6.1 DD Statements
3.1.7 Utility Control Statements
3.1.7.1 SLDS Statement
3.1.7.2 COPY Statement
3.1.7.3 EXIT Statement
3.1.8 Error Processing
3.1.9 Examples
3.1.9.1 Example 1
3.1.9.2 Example 2
3.2 Log Merge Utility (DFSLTMG0).
3.2.1 Restrictions
3.2.2 Input and Output.
3.2.2.1 Controlling the Log Merge.
3.2.2.2 Control Statement Format
3.2.3 JCL Requirements
3.2.3.1 DD Statements
3.3 Log Recovery Utility (DFSULTR0).
3.3.1 OLDS Recovery
3.3.2 SLDS Recovery
3.3.3 Input
3.3.3.1 Single Log Input
3.3.3.2 Dual Log Input
3.3.4 Output
3.3.4.1 Interim Log Error ID Record
3.3.4.2 Error Block Listing (SYSPRINT)
3.3.4.3 REP Mode Verification Messages
3.3.4.4 Dump of Data Record
3.3.4.5 Active Region Messages
3.3.5 JCL Requirements
3.3.5.1 DD Statements
3.3.6 Utility Control Statements
3.3.6.1 CLS Mode-Close an OLDS from the WADS or NEXT OLDS
3.3.6.2 DUP Mode-Recover an OLDS or SLDS (Create an Interim Log)
3.3.6.3 REP Mode-Recover an OLDS or SLDS (Create a New Log)
3.3.6.4 PSB Mode--Print "Active PSBs" Report
3.3.7 Error Processing
3.3.8 Examples
3.3.8.1 Example 1
3.3.8.2 Example 2
3.3.8.3 Example 3
3.3.8.4 Example 4
3.3.8.5 Example 5
3.3.8.6 Example 6
3.3.8.7 Example 7
3.3.8.8 Example 8
3.3.8.9 Example 9
4.0 Analysis Utilities and Reports
4.1 IMS Monitor Report Print Utility (DFSUTR20).
4.1.1 Restrictions
4.1.2 Input and Output.
4.1.3 JCL Requirements
4.1.3.1 DD Statements
4.1.3.2 Analysis Control Data Set
4.1.3.3 Specifying Distribution Redefinition
4.1.4 Example.
4.2 File Select and Formatting Print Utility (DFSERA10)
4.2.1 Input and Output
4.2.2 JCL Requirements.
4.2.2.1 DD Statements
4.2.3 Utility Control Statements.
4.2.3.1 CONTROL Statement
4.2.3.2 OPTION Statement
4.2.3.3 Keywords
4.2.3.4 END Statement
4.2.3.5 COMMENTS Statement
4.2.4 Examples
4.2.4.1 Example 1
4.2.4.2 Example 2
4.2.4.3 Example 3
4.2.4.4 Example 4
4.2.4.5 Example 5
4.2.4.6 Example 6
4.2.4.7 Example 7
4.2.4.8 Example 8
4.2.4.9 Example 9
4.2.5 Record Format and Print Module (DFSERA30).
4.2.5.1 The Deadlock Report.
4.2.5.2 Utility Control Statements
4.2.6 Program Isolation Trace Record Format and Print Module (DFSERA40).
4.2.6.1 DFSERA40 Utility Control Statements
4.2.6.2 Output
4.2.7 DL/I Call Image Capture Module (DFSERA50)
4.2.7.1 Utility Control Statements
4.2.8 IMS Trace Table Record Format and Print Module (DFSERA60)
4.2.8.1 Utility Control Statements
4.2.9 Enhanced Select Exit Routine (DFSERA70)
4.2.10 Examples of Using the Enhanced Select Exit Routine (DFSERA70)
4.2.10.1 Example 1
4.2.10.2 Example 2
4.2.10.3 Example 3
4.2.10.4 Example 4
4.2.10.5 Example 5
4.2.10.6 Example 6
4.2.10.7 Example 7
4.2.10.8 Example 8
4.2.10.9 Example 9
4.2.10.10 Example 10
4.3 Fast Path Log Analysis Utility (DBFULTA0).
4.3.1 Restrictions
4.3.2 Input and Output
4.3.2.1 Format of Total Traffic and Exception Traffic Data Sets
4.3.3 Detail-Listing-of-Exception-Transactions Report.
4.3.4 Summary-of-Exception-Detail-by-Transaction-Code (for IFP Regions) Report
4.3.5 Overall-Summary-of-Transit-Times-by-Transaction-Code (for IFP-Regions) Report
4.3.6 Overall Summary of Resource Usage and Contentions for All Transaction Codes and PSBs Report
4.3.7 Summary-of-Region-Occupancy Report
4.3.8 Summary-of-VSO-Activity Report
4.3.9 Recapitulation-of-the-Analysis Report
4.3.10 JCL Requirements
4.3.10.1 DD Statements
4.3.11 Utility Control Statements
4.3.11.1 Transit Time Exception Specification
4.3.11.2 Analysis Parameter Statement Formats
4.3.11.3 Starting Date Specification (STARTDAY)
4.3.11.4 Ending Date Specification (ENDDAY)
4.3.11.5 Starting Time Specification (START)
4.3.11.6 Ending Time Specification (END)
4.3.11.7 Exceptional Transit Time Specification (TT)
4.3.11.8 Not Message-Driven Option (NON-MESSAGE or NOT-MESSAGE)
4.3.11.9 Detail-Listing-of-Exception-Transactions Report Size Limitation (MAXDETAIL)
4.3.11.10 DL/I Call Specification (CALLS)
4.3.11.11 Buffer Use Specification (BUFFER)
4.3.11.12 Data Space Use Specification (VSO)
4.3.11.13 Printed Page Line Count Specification (LINECNT)
4.3.12 Error Processing
4.4 Offline Dump Formatter Utility (DFSOFMD0).
4.4.1 Interactive Dump Formatter
4.4.2 Migration Considerations
4.4.3 Restrictions
4.4.4 Environments
4.4.4.1 IMS Online Environments
4.4.4.2 IMS Batch Environments
4.4.5 Input and Output
4.4.6 IPCS Execution
4.4.6.1 DD Statements
4.5 Log Transaction Analysis Utility (DFSILTA0).
4.5.1 Restrictions
4.5.2 Input and Output
4.5.3 JCL Requirements.
4.5.3.1 DD Statements
4.6 Statistical Analysis Utility (DFSISTS0)
4.6.1 Restrictions
4.6.2 Input and Output
4.6.2.1 Log Records
4.6.2.2 SORT and EDIT PASS1 (DFSISTS0)
4.6.2.3 EDIT PASS2 (DFSIST20)
4.6.2.4 Report Writer (DFSIST30)
4.6.2.5 Message Select and Copy or List (DFSIST40)
4.6.3 Examples
4.6.3.1 Report Writer (DFSIST30) Output
4.6.3.2 Message Select and Copy or List (DFSIST40) Output
4.6.4 JCL Requirements
4.6.4.1 DD Statements
4.6.5 Utility Control Statements
4.6.5.1 Transaction Code Control Statement
4.6.5.2 Symbolic Terminal Name Control Statement
4.6.5.3 Hardware Terminal Address Control Statement
4.6.5.4 VTAM Terminal Name Control Statement
4.6.5.5 Time Control Statement
4.6.5.6 Nonprintable Character Control Statement
5.0 Interpreting IMS Reports
5.1 Interpreting IMS Monitor Reports
5.1.1 Transaction Flow and IMS Monitor Events
5.1.2 IMS Monitor Trace Event Intervals
5.1.3 Overview of IMS Monitor Reports
5.1.3.1 Sequence of Report Output
5.1.3.2 Units of Measure in IMS Monitor Reports
5.1.4 Documenting the Monitoring Run
5.1.4.1 Adding to the System-Configuration Report Data
5.1.4.2 Recording the Monitor Trace Interval
5.1.4.3 Completing the Monitor Run Profile
5.1.4.4 Verifying IMS Monitor Report Occurrences
5.1.5 Monitoring Activity in Dependent Regions.
5.1.5.1 Detecting Database Processing Intent Conflicts
5.1.5.2 Examining the Effects of Checkpoints
5.1.5.3 Measuring Region Occupancy
5.1.6 Monitoring Application Program Elapsed Time
5.1.7 Monitoring I/O for Application Program DL/I Calls
5.1.8 Monitoring MFS Activity.
5.1.9 Monitoring Message Queue Handling.
5.1.9.1 Detecting Checkpoint Effects
5.1.9.2 Transaction Queueing Report
5.1.10 Monitoring Database Buffers.
5.1.11 Monitoring Line Activity.
5.1.12 Monitoring Message Handling Efficiency.
5.1.13 IMS Internal Resource Usage.
5.1.13.1 Pool Space Failure
5.1.13.2 Programs Experiencing Deadlock
5.1.13.3 IMS Latch Conflict
5.1.14 Using Frequency Distributions from IMS Monitor Output
5.1.14.1 How to Get a Frequency Distribution Output
5.1.14.2 How Frequency Distribution Ranges Are Defined
5.1.14.3 Interpreting Distribution Appendix Output
5.1.15 Interpreting IMS Monitor MSC Reports.
5.1.15.1 Determining Cross-System Queuing
5.1.15.2 Assessing the Effect of Link Loading
5.1.15.3 Assessing Link Queuing Times
5.1.16 Extracting Multiple System Transaction Statistics
5.1.16.1 Controlling the Log Merge
5.1.16.2 Interpreting the Transaction Analysis Report
5.2 Interpreting IMS Monitor Reports for DBCTL
5.2.1 IMS Monitor Trace Event Intervals
5.2.2 Overview of IMS Monitor Reports
5.2.2.1 Sequence of Report Output
5.2.2.2 Units of Measure in IMS Monitor Reports
5.2.3 Documenting the Monitoring Run
5.2.3.1 Adding to the System Configuration Report Data
5.2.3.2 Recording the Monitor Trace Interval
5.2.3.3 Completing the Monitor Run Profile
5.2.3.4 Verifying IMS Monitor Report Occurrences
5.2.4 Monitoring Activity in Dependent Regions.
5.2.4.1 Detecting Database Processing Intent Conflicts
5.2.4.2 Examining the Effects of Checkpoints
5.2.4.3 Measuring Region Occupancy
5.2.5 Monitoring Application Program Elapsed Time
5.2.5.1 Monitoring I/O for Application Program DL/I Calls.
5.2.5.2 Transaction Queuing Report
5.2.6 Monitoring Database Buffers.
5.2.7 IMS Internal Resource Usage.
5.2.7.1 Pool Space Failure
5.2.7.2 Programs Experiencing Deadlock
5.2.7.3 IMS Latch Conflict
5.2.8 Using Frequency Distributions from IMS Monitor Output
5.2.8.1 How to Get a Frequency Distribution Output
5.2.8.2 How Frequency Distribution Ranges Are Defined
5.2.8.3 Interpreting Distribution Appendix Output
5.3 Interpreting IMS Monitor Reports for DCCTL
5.3.1 IMS Monitor Trace Event Intervals
5.3.2 Overview of IMS Monitor reports
5.3.2.1 Sequence of Report Output
5.3.2.2 Summary of IMS Monitor Reports in Output Sequence
5.3.2.3 Units of Measure in IMS Monitor Reports
5.3.3 Documenting the Monitoring Run
5.3.3.1 Adding to the System Configuration Report Data
5.3.3.2 Recording the Monitor Trace Interval
5.3.3.3 Completing the Monitor Run Profile
5.3.3.4 Verifying IMS Monitor Report Occurrences
5.3.4 Monitoring Activity in Dependent Regions
5.3.4.1 Examining the Effects of Checkpoints
5.3.4.2 Measuring Region Occupancy
5.3.5 Monitoring Application Program Elapsed Time.
5.3.6 Monitoring I/O for Application Program DL/I Calls.
5.3.7 Monitoring MFS Activity.
5.3.8 Monitoring Message Queue Handling.
5.3.8.1 Detecting Checkpoint Effects
5.3.8.2 Transaction Queuing Report
5.3.9 Monitoring Line Activity.
5.3.10 Monitoring Message Handling Efficiency.
5.3.11 IMS Internal Resource Usage.
5.3.11.1 Pool Space Contention
5.3.11.2 IMS Latch Conflict
5.3.12 Using Frequency Distributions from IMS Monitor Output.
5.3.12.1 How to Get a Frequency Distribution Output
5.3.12.2 How Frequency Distribution Ranges Are Defined
5.3.12.3 Interpreting Distribution Appendix Output
5.3.13 Interpreting IMS Monitor MSC Reports
5.3.13.1 Determining Cross System Queuing
5.3.13.2 Assessing the Effect of Link Loading
5.3.13.3 Assessing Link Queuing Times
5.3.14 Extracting Multiple System Transaction Statistics
5.3.14.1 Controlling the Log Merge
5.3.14.2 Interpreting the Transaction Analysis Report
5.4 Interpreting //DFSSTAT Reports
5.4.1 JCL Description
5.4.2 Report Descriptions
5.4.2.1 PST-Accounting Report
5.4.2.2 VSAM-Buffer-Pool Report
5.4.2.3 OSAM-Buffer-Pool Report
5.4.2.4 Sequential-Buffering-Summary Report
5.4.2.5 Sequential-Buffering-Detail Report
5.5 Interpreting Statistical-Analysis and Log-Transaction Reports
5.5.1 Statistical Analysis Utility Reports
5.5.2 Calculating Transaction Loads
5.5.2.1 Assessing Program-to-Program Traffic
5.5.2.2 Obtaining Counts of Unsent Messages
5.5.3 Auditing Critical Transactions
5.5.4 Log Transaction Analysis Utility Reports
5.5.5 Examining Scheduling Activity
5.5.6 IMS Accounting Information
5.5.6.1 Using the Application-Accounting Report
5.5.6.2 Using IMS Transaction Profiles
BIBLIOGRAPHY Bibliography
BIBLIOGRAPHY.1 IMS Version 7 Library
INDEX Index
BACK_1 We'd Like to Hear from You
COMMENTS Readers' Comments
© Copyright IBM Corp. 1974, 2001
IBM Library Server Copyright 1989, 2005 IBM Corporation. All rights reserved.