ページ1に含まれる内容の要旨
CICS Transaction Server for z/OS
Customization Guide
Version 3 Release 2
SC34-6814-04
ページ2に含まれる内容の要旨
ページ3に含まれる内容の要旨
CICS Transaction Server for z/OS Customization Guide Version 3 Release 2 SC34-6814-04
ページ4に含まれる内容の要旨
Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page 923. This edition applies to Version 3 Release 2 of CICS Transaction Server for z/OS, program number 5655-M15, and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1977, 2011. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with I
ページ5に含まれる内容の要旨
Contents Preface........................... xvii What this book is about ..................... xvii Who this book is for....................... xvii What you need to know to understand this book ............ xvii How to use this book ...................... xvii Notes on terminology ...................... xvii Syntax notation and conventions used in this book ........... xviii Summary of changes...................... xix Changes for CICS Transaction Server for z/OS, Version 3 Release 2.....xix Ch
ページ6に含まれる内容の要旨
File control EXEC interface API exits XFCREQ and XFCREQC......85 File control EXEC interface SPI exits XFCAREQ and XFCAREQC.....98 File control file state program exits XFCSREQ and XFCSREQC .....111 File control open/close program exit XFCNREC ...........121 File control quiesce receive exit, XFCVSDS.............122 File control quiesce send exit XFCQUIS ..............124 File control recovery program exits XFCBFAIL, XFCBOUT, XFCBOVER, and XFCLDEL ........................126 Front End Programmin
ページ7に含まれる内容の要旨
Recursion within a task-related user exit program...........290 Purging tasks........................290 Using CICS services in your task-related user exit program.......291 Using channels and containers .................292 Assembler programs and LEASM ................292 Wait states in your task-related user exit program ..........292 Work areas.........................292 Coding a program to be invoked by the CICS SPI ..........293 Coding a program to be invoked by the CICS syncpoint manager.
ページ8に含まれる内容の要旨
The DEFINE_PROGRAM call..................353 The ACQUIRE_PROGRAM call .................356 The RELEASE_PROGRAM call .................358 The DELETE_PROGRAM call..................359 Log manager XPI functions....................360 The INQUIRE_PARAMETERS call ................360 The SET_PARAMETERS call..................361 Monitoring XPI functions.....................361 The MONITOR call......................362 The INQUIRE_MONITORING_DATA call..............364 Program management XPI functions ..
ページ9に含まれる内容の要旨
Storage keys for PLT programs .................430 Part 3. Customizing with user-replaceable programs ............. 433 Chapter 5. General notes about user-replaceable programs ......435 Rewriting user-replaceable programs ................435 Assembling and link-editing user-replaceable programs .........436 User-replaceable programs and the storage protection facility .......437 Execution key for user-replaceable programs ............437 Data storage key for user-replaceable programs ..........
ページ10に含まれる内容の要旨
Coding for specific VTAM sense codes ..............508 Writing multiple NEPs.....................508 DFHZNEPI macros......................508 Handling shutdown hung terminals in the node error program ......510 Using the node error program with XRF or persistent sessions.......510 The node error program in an XRF environment ...........510 The node error program with persistent session support ........511 Changing the recovery notification ................511 Changing the recovery message.......
ページ11に含まれる内容の要旨
The sample autoinstall control program for APPC connections.......550 Default actions of the sample program...............550 Resource definitions .....................551 Chapter 13. Writing a program to control autoinstall of IPIC connections 553 Autoinstalling IPIC connections: preliminary considerations ........553 The autoinstall user program at INSTALL...............555 The autoinstall user program at DELETE...............556 When autoinstalled IPCONNs are deleted .............557 The samp
ページ12に含まれる内容の要旨
Routing transactions dynamically..................590 Dynamic transactions.....................590 When the dynamic routing program is invoked............590 Information passed to the dynamic routing program..........591 Changing the target CICS region.................592 Changing the program name ..................593 Telling CICS whether to route or terminate a transaction ........593 If the system is unavailable or unknown ..............594 Invoking the dynamic routing program at end of route
ページ13に含まれる内容の要旨
When the distributed routing program is invoked...........632 Changing the target CICS region.................633 Telling CICS whether to route the method request ..........634 If an error occurs in route selection................634 Invoking the distributed routing program on the target region ......634 Dealing with a disabled CorbaServer ...............635 Performing a rolling upgrade of an EJB/CORBA server.........637 Routing non-terminal-related START requests.............637 Which requests
ページ14に含まれる内容の要旨
Event codes .........................681 The EJB event sample program ..................682 Actions of the default program..................682 Writing your own EJB event program ...............682 Chapter 25. Writing programs to customize Language Environment run-time options for XPLink programs..............685 DFHAPXPO .........................685 Defining run-time options....................685 Part 4. Customizing the XRF overseer program................ 687 Chapter 26. The extended recovery
ページ15に含まれる内容の要旨
Chapter 28. CICS monitoring ..................743 Introduction to CICS monitoring ..................743 How CICS monitoring data is passed to SMF ............743 Coding additional event-monitoring points .............744 Application naming event monitoring points.............744 The monitoring control table (MCT)................747 CICS monitoring record formats ..................750 SMF header and SMF product section...............750 CICS data section ......................754 Chapter 29. Writ
ページ16に含まれる内容の要旨
Part 8. Examining and modifying resource attributes............. 807 Chapter 33. Using the programmable interface to CEDA........809 When to use the programmable interface...............810 Using DFHEDAP in a DTP environment ...............810 Chapter 34. User programs for the system definition utility program (DFHCSDUP)........................813 An overview of DFHCSDUP ...................813 Invoking a user program from DFHCSDUP..............814 Writing a program to be invoked during EXTRACT p
ページ17に含まれる内容の要旨
Appendix F. The example program for the XTSEREQ global user exit, DFH$XTSE.........................877 Appendix G. Threadsafe XPI commands..............893 Bibliography.........................895 The CICS Transaction Server for z/OS library.............895 The entitlement set......................895 PDF-only books.......................895 Other CICS books .......................897 Books from related libraries....................897 MVS books.........................897 VTAM books ...........
ページ18に含まれる内容の要旨
xvi Customization Guide
ページ19に含まれる内容の要旨
Preface What this book is about ® ® This book provides the information needed to extend and modify an IBM CICS ® Transaction Server for z/OS system to match your requirements. It describes how you can tailor your system by coding exit programs, by replacing specific CICS-supplied default programs with versions that you write yourself, and by adapting sample programs. Who this book is for This book is for those responsible for extending and enhancing a CICS system to meet the special processing n
ページ20に含まれる内容の要旨
v C v COBOL v PL/I. In this book, the phrase “the languages supported by CICS” refers to the above languages. Syntax notation and conventions used in this book The symbols { }, [ ], and | are used in the syntax descriptions of the EXEC CICS commands and macros referred to in this book. They are not part of the command and you should not include them in your code. Their meanings are as follows: v Braces { } enclose two or more alternatives, one of which you must code. v Square brackets [ ] tell y