Re: Catch-22 question on SMP/E receive fromnts command
On Tue, 19 Feb 2008 10:10:38 -0600, Mark Zelden wrote: > >Update us when you get some feedback from IBM. > APAR IO08492. I've updated the PMR to suggest additions to the Problem Description. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
On Mon, 25 Feb 2008 13:08:53 -0600, Dave Kopischke wrote: > >We have a JCL checker application that verifies dataset access for a JOB. >Through routine use of this product, we end up with thousands of access >warnings on our daily RACF reports. This is not a hacking attempt. If there >were hacking attempts occuring, it would be tough to see them through the >noise though. > I wonder that you get "thousands of access warnings ... daily". Are your programmers commiting so many potential access errors in the course of coding their JCL? How many programmers does it take to do that? And my thanks to Randy Evans for reminding us that design of interactive systems imposes requirements that are not encountered in batch jobs. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
> -Original Message- > From: IBM Mainframe Discussion List On Behalf Of Wayne Driscoll > > One major difference. In CICS, the query security is for a > subset of RACF information, and is already running in the > proper environment, ie CICS, and is using the logged on > userid's ACEE. You cannot issue a query security to see if > another user has the authority, ... True. > ... and you also cannot check for > access to non-CICS resources. Check out the RESCLASS keyword on QUERY SECURITY: http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/DFHP4C00/1.16 8 "RESCLASS(data-value) specifies an 8-character field identifying the name of a valid resource class, that could be non-CICS, in the ESM. The class name identified by RESCLASS is treated literally with no translation." -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
PR: IBM Announces the System z10 for the Next Generation Data Center
Good (late) evening to everyone in the U.S. It's early afternoon on Tuesday here in Japan. If you read Japanese (or use an online translator), then you can get a headstart on the big news here: http://www.ibm.com/jp/press/2008/02/2601.html For those of you who prefer English, please watch here: http://www.ibm.com/press and you should see a press release at a more reasonable hour on Tuesday, New York time. Much more news and many more details to follow, I'm sure. - - - - - Timothy Sipples IBM Consulting Enterprise Software Architect Specializing in Software Architectures Related to System z Based in Tokyo, Serving IBM Japan and IBM Asia-Pacific E-Mail: [EMAIL PROTECTED] -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: New version of TSSO under zOS v1.8
On Mon, 25 Feb 2008 20:09:38 -0600, Marty French <[EMAIL PROTECTED]> wrote: >Can I bump this since I'm having the same problem going from 1.7 to >1.9. We just have SUBSYSTEM consoles. What a pain. I don't see an >answer to the questionhelp please. > The question was answered. Check the CBT updates page. The main page is http://www.cbttape.org Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:[EMAIL PROTECTED] z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
We get EDG6502W and EDG6521W message when we run the MEND function on merged RMM CDS.
Dear all and Mike Wood We get EDG6502W and EDG6521W message when we run the MEND function on merged RMM CDS. The message is shown blow: STARTING VERIFICATION OF OWNERRECORDS EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05188 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05275 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05279 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05282 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05283 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05284 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05364 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q05396 DOES NOT EXIST EDG6502W OWNER ENTRY ALSU001 POINTED TO BY VOLUME ENTRY Q07370 DOES NOT EXIST EDG6521W OWNER ALSU001 VOLUME COUNT INCONSISTENT How to solve this problem? We merged the three CDS following the DFSMSrmm Primer redbook,We don't know why there are many warning message EDG6521W OWNER * VOLUME COUNT INCONSISTENT Any suggestions are appreciated! Jason Cai -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: New version of TSSO under zOS v1.8
Can I bump this since I'm having the same problem going from 1.7 to 1.9. We just have SUBSYSTEM consoles. What a pain. I don't see an answer to the questionhelp please. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Is IBM/Tivoli turning into CA?
On Mon, 25 Feb 2008 07:00:14 -0600, Patrick O'Keefe <[EMAIL PROTECTED]> wrote: >... >On the good side, there are Omegamon project managers attending > SHARE that are aware of this thread and are interested in getting >specific information. Any significant results coming from their interest >will be a long time coming, but I suggest you get in touch with your >(mythical?) local IBM rep to see if your complaints can get known. >... OK. That was a pretty useless post. Here's something better (I hope). The Omegafolks say this thread has generated a lot of email within IBM. It is definitely being watched. Post details about you problems here or (if you think it would be cluttering up the forum) say you will provide details off-list. Either way, you will be contacted off list. BTW, they know that "marketing" responses are not going to be helpful. It sounds like they are serious about this. Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
Don't know too much about portmap but it seems like a candidate for SYSSTC. Have you encountered problems that make you reluctant to put it there. Check the link. IBM's sample policy has it defined there. http://www-03.ibm.com/servers/eserver/zseries/zos/wlm/documents/sample/samplepol.html "Leitner, Timothy" <[EMAIL PROTECTED]> wrote: Portmap runs in class stclo - discretionary. I just changed it to stcmd - imp 3 vel 30. Will see if that makes a difference. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Monday, February 25, 2008 2:27 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, > Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Creating AWSTAPEs on MVS
On Mon, 25 Feb 2008 10:58:55 +0200, G+D+J+ B+N% #B+J+ wrote: > >We currently send physical 3480's to an external customer. > >The customer has asked if we could send them the tapes as AWStape files. > >They are evaluating a product called VTA (Virtual Tape Appliance) from a >company called Universal Software. > >I've looked at CBT file 533, but I'm not sure which program to use. > >What program would i use to convert a physical 3480 to an AWSTape file that >can be used by VTA. > I looked at this a while ago, and was somewhat disappointed. I know it's uncharitable, and if I had the assembler skills, resources, and motivation, I'd attempt repairs instead of complaining. But I noticed: o The distribution includes a C program, "STRIPPAD.c" to deal with a problem that the last block is sometimes incorrectly terminated. This would better be incorporated into the mainline code rather than in a separate utility. o There's a data areas macro that appears as a PDS member, and again instream in the program that calls it; a hazard to orderly maintenance. My assembler skill is sufficient that I was able to replace the inline with a COPY from SYSLIB with no apparent ill effects. o The "strippad" problem might be fixed with support for RECFM=VB output -- no padding, then. But here my assembler skills are insufficient. o I'd like to be able to write/read UNIX files directly. There might be no obstacle; DD PATH= might suffice; I haven't tried it. But I'd prefer to have RECFM=VB before the attempt. And my failure in motivation arises because our recipient, unlike Gadi's is not crying out for AWSTAPE -- I'd need to sell them on the idea, and motivate them ($$ -- they're a contractor, not a customer) to convert to ASWTAPE format. Too many obstacles; I can't justify it internally. An alternative might be the CMS PIPELINES BLOCK ASWTAPE stage. My pipedream would be a subsystem that would mount AWSTAPE archives directly, instead of copying them to physical tapes. CMS PIPELINES actually comes closer to this. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Getting detailed DB2 maintenance level info
there is also an IPCS command that will find the equivalent information in a dump or even on live DB2 subsystem. Mike On Mon, Feb 25, 2008 at 2:55 PM, Paul Peplinski <[EMAIL PROTECTED]> wrote: > On Mon, 25 Feb 2008 13:43:01 -0600, Mike Bell <[EMAIL PROTECTED]> wrote: > > >You mean > >//DB2UTIL EXEC PGM=DSNUTILB,PARM='DB7G,REPAIR' > >//STEPLIB DD DSN=DSN710.SDSNEXIT,DISP=SHR > >// DD DSN=DSN710.SDSNLOAD,DISP=SHR > >//SYSPRINT DD SYSOUT=* > >//UTPRINT DD SYSOUT=* > >//SYSIN DD * > >DIAGNOSE DISPLAY MEPL > > > >Mike > > Thanks Mike, > > What I remember seemed to be a command (perhaps undocumented) that showed > the date (or last PTF) for a series of DB2 load modules. That is how we > determined that I was running a back-level DSNXGRDS in an hourglass > loadlib > concatenated into my DBM1 address space. > > Paul > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > -- Mike -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
One major difference. In CICS, the query security is for a subset of RACF information, and is already running in the proper environment, ie CICS, and is using the logged on userid's ACEE. You cannot issue a query security to see if another user has the authority, and you also cannot check for access to non-CICS resources. Because of things like PADS or WHEN() processing, it is hard to guarantee that you can get the same answer if the environment is different. Wayne Driscoll Product Developer [EMAIL PROTECTED] (Direct) (630) 663-0719 (Mobile) (630) 247-1632 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Randy Evans Sent: Monday, February 25, 2008 9:05 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Newbie RACROUTE question: how to *test* authorization? >> >>>One could argue that letting you determine your access to resources >>>without actually trying to use them (and thus without causing audit >>>records) is a form of hacking. >> >>Perhaps, but some IBM code does exactly that, and for what seems to be >>good cause. I don't recall the details, but it was discussed here in the >>last few years. >> > >You may be thinking of ISPF 3.4 and data set name hiding or may be >thinking of ISPF 3.4 checking for ALTER access to the catalog. > Following extracted from the CICS/TS RACF Security Guide: "2.7.6.2 Checking which transactions to offer a user You can use the QUERY SECURITY command to check whether a user is authorized to use a particular transaction before displaying the transaction code as part of an introductory menu. When you use the command for this purpose, you will probably want to avoid logging the checks for users who are not allowed to use certain transactions. To do this, use the NOLOG option." ...and the QUERY SECURITY command invokes a RACROUTE to perform this function. So CICS is documenting use of preemptive RACROUTE requests as reasonable design in presenting usable options on a user's menu. Randy Evans, Viaserv, Inc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
Our veritas support guys must be related to your veritas support guys. Your comment fits them to a T. "but we could never get our Unix/Veritas team to bother looking for the problem" Thanks for your input. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Pat Mihalec Sent: Monday, February 25, 2008 3:40 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task I don't think the problem is in Libstation. I think it is a Veritas problem, but we could never get our Unix/Veritas team to bother looking for the problem. The answer has been that it must be a mainframe problem. It does not occur on a regular basis. Only once in 3 to 4 months. We do not stop/start Portmap, just Libstation. Since we could not get anyone on the Veritas group to look at it this has been our resolution. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 03:35 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task Pat, What's weird is that we have a NonStop (Tandem) and a Siemens PACS system that get their mounts through libstation even when Veritas does not. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Pat Mihalec Sent: Monday, February 25, 2008 3:15 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task We have been running it at stcmed, but still have the problem of Vertias loosing the connection sometimes. The resolution is to stop/start Libstation and Veritas is able to connect again. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 03:05 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task Portmap runs in class stclo - discretionary. I just changed it to stcmd - imp 3 vel 30. Will see if that makes a difference. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Monday, February 25, 2008 2:27 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, >Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have receiv
Re: Portmap start task
I don't think the problem is in Libstation. I think it is a Veritas problem, but we could never get our Unix/Veritas team to bother looking for the problem. The answer has been that it must be a mainframe problem. It does not occur on a regular basis. Only once in 3 to 4 months. We do not stop/start Portmap, just Libstation. Since we could not get anyone on the Veritas group to look at it this has been our resolution. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 03:35 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task Pat, What's weird is that we have a NonStop (Tandem) and a Siemens PACS system that get their mounts through libstation even when Veritas does not. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Pat Mihalec Sent: Monday, February 25, 2008 3:15 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task We have been running it at stcmed, but still have the problem of Vertias loosing the connection sometimes. The resolution is to stop/start Libstation and Veritas is able to connect again. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 03:05 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task Portmap runs in class stclo - discretionary. I just changed it to stcmd - imp 3 vel 30. Will see if that makes a difference. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Monday, February 25, 2008 2:27 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, >Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html == The information in this message is confidential and may be legally privileged. Access to this message by anyone other than the addressee is not authorized. If you are not the intended recipient, or an agent of the intended recipient, any disclos
Re: Portmap start task
Pat, What's weird is that we have a NonStop (Tandem) and a Siemens PACS system that get their mounts through libstation even when Veritas does not. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Pat Mihalec Sent: Monday, February 25, 2008 3:15 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task We have been running it at stcmed, but still have the problem of Vertias loosing the connection sometimes. The resolution is to stop/start Libstation and Veritas is able to connect again. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 03:05 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task Portmap runs in class stclo - discretionary. I just changed it to stcmd - imp 3 vel 30. Will see if that makes a difference. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Monday, February 25, 2008 2:27 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, >Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html == The information in this message is confidential and may be legally privileged. Access to this message by anyone other than the addressee is not authorized. If you are not the intended recipient, or an agent of the intended recipient, any disclosure, copying, or distribution of the message or any action or omission taken by you in reliance on it, is prohibited and may be unlawful. If you have received this message in error, please contact the sender immediately and permanently delete the original e-mail, attachment(s), and any copies. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / a
Re: Interesting, to me, observation.
I have this happen quite frequently. The reason is that the HLQ(s) already exist in the master catalog, so having an ALIAS pointing them to another catalog would cause the existing entries to become "non-existent". I view this as a "failsafe" by VSAM catalog management. On Mon, 25 Feb 2008 14:30:28 -0600, McKown, John <[EMAIL PROTECTED]> wrote: >> -Original Message- >> From: IBM Mainframe Discussion List >> [mailto:[EMAIL PROTECTED] On Behalf Of Schwarz, Barry A >> Sent: Monday, February 25, 2008 2:23 PM >> To: IBM-MAIN@BAMA.UA.EDU >> Subject: Re: Interesting, to me, observation. >> >> >> When you reverse them, does the USERCAT entry for VBV0001 get >> created in >> MCAT as directed or in VTSTH01 per the already defined alias? >> >> In the first case, you are trying to create an alias in a catalog when >> there is already a "real" entry with the same hlq in the catalog. >> >> In the second, you are creating a real entry in a catalog with >> instructions to ignore normal alias processing, including >> potential name >> conflicts. >> >> Both seem pathological. > >The ucat is created in the master cat, not in the catalog pointed to by >the alias. I do have a CAT parameter on the IMPORT CONNECT to force it >into the master cat. > >This came up and bit me because our storage admin created a UCAT with a >bad name. I don't know why. All catalogs are supposed to start with >CATALOG. For some reason, this one catalog starts with TSSTV. I consider >this a bad mistake because that is a test DSN and is not protected by >RACF from some programmer deleting it. > >-- >John McKown -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
We have been running it at stcmed, but still have the problem of Vertias loosing the connection sometimes. The resolution is to stop/start Libstation and Veritas is able to connect again. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 03:05 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task Portmap runs in class stclo - discretionary. I just changed it to stcmd - imp 3 vel 30. Will see if that makes a difference. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Monday, February 25, 2008 2:27 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, >Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html == The information in this message is confidential and may be legally privileged. Access to this message by anyone other than the addressee is not authorized. If you are not the intended recipient, or an agent of the intended recipient, any disclosure, copying, or distribution of the message or any action or omission taken by you in reliance on it, is prohibited and may be unlawful. If you have received this message in error, please contact the sender immediately and permanently delete the original e-mail, attachment(s), and any copies. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
Portmap runs in class stclo - discretionary. I just changed it to stcmd - imp 3 vel 30. Will see if that makes a difference. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of McKown, John Sent: Monday, February 25, 2008 2:27 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, > Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html == The information in this message is confidential and may be legally privileged. Access to this message by anyone other than the addressee is not authorized. If you are not the intended recipient, or an agent of the intended recipient, any disclosure, copying, or distribution of the message or any action or omission taken by you in reliance on it, is prohibited and may be unlawful. If you have received this message in error, please contact the sender immediately and permanently delete the original e-mail, attachment(s), and any copies. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Richard Pinion > Sent: Monday, February 25, 2008 2:32 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Re: Portmap start task > > > I'm sorry but I can't resist. You might be a redneck if you > call your service names "bubba"! Or if they all end with -bob (john-bob, billy-bob, etc-bob). -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
I'm sorry but I can't resist. You might be a redneck if you call your service names "bubba"! --- [EMAIL PROTECTED] wrote: From: "McKown, John" <[EMAIL PROTECTED]> To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Portmap start task Date: Mon, 25 Feb 2008 14:27:05 -0600 > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, > Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology _ Netscape. Just the Net You Need. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Getting detailed DB2 maintenance level info
On Mon, 25 Feb 2008 13:43:01 -0600, Mike Bell <[EMAIL PROTECTED]> wrote: >You mean >//DB2UTIL EXEC PGM=DSNUTILB,PARM='DB7G,REPAIR' >//STEPLIB DD DSN=DSN710.SDSNEXIT,DISP=SHR >// DD DSN=DSN710.SDSNLOAD,DISP=SHR >//SYSPRINT DD SYSOUT=* >//UTPRINT DD SYSOUT=* >//SYSIN DD * >DIAGNOSE DISPLAY MEPL > >Mike Thanks Mike, What I remember seemed to be a command (perhaps undocumented) that showed the date (or last PTF) for a series of DB2 load modules. That is how we determined that I was running a back-level DSNXGRDS in an hourglass loadlib concatenated into my DBM1 address space. Paul -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SPAM: Re: RACF callable service to check (new) password
--- RACF itself has practically all the functionality built-in that you are looking for. If I remember correctly, - RACF Configuration options allow the retention of (x) previous passwords within the RACF database. - password syntax options (length, valid characters, repeat strings, etc.) - a password validation exit that allows you to perform additional checks above and beyond those provided by RACF Once the rules (and/or exit) have been set up, a user who changes the password will not be able to create a new password that violates these rules. No need for a homegrown application ... --- This is quite correct. If more restrictive password rules are desired, you can also write a password validation exit, wherein you can impose any other rules you like. Look in the RACF System Programmers Guide for more information. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
It is the standard Portmap. The only thing we had to do was to start PORTMAP in TCP. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "McKown, John" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 02:27 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Portmap start task > -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, >Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting, to me, observation.
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Schwarz, Barry A > Sent: Monday, February 25, 2008 2:23 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Re: Interesting, to me, observation. > > > When you reverse them, does the USERCAT entry for VBV0001 get > created in > MCAT as directed or in VTSTH01 per the already defined alias? > > In the first case, you are trying to create an alias in a catalog when > there is already a "real" entry with the same hlq in the catalog. > > In the second, you are creating a real entry in a catalog with > instructions to ignore normal alias processing, including > potential name > conflicts. > > Both seem pathological. The ucat is created in the master cat, not in the catalog pointed to by the alias. I do have a CAT parameter on the IMPORT CONNECT to force it into the master cat. This came up and bit me because our storage admin created a UCAT with a bad name. I don't know why. All catalogs are supposed to start with CATALOG. For some reason, this one catalog starts with TSSTV. I consider this a bad mistake because that is a test DSN and is not protected by RACF from some programmer deleting it. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
> -Original Message- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Leitner, Timothy > Sent: Monday, February 25, 2008 1:43 PM > To: IBM-MAIN@BAMA.UA.EDU > Subject: Portmap start task > > > All, > Has anybody run into an issue with the portmap started task > running in a default service class rather than sysstc like > tcpip? We use > STK (SUN) HSC and libstation and have had some odd things > happening with > our Veritas system. We have found that there will be a number (20-30) > connections in TCPIP left for long periods of time all > pointing back to > the Veritas environment. We can drop the connections and things will > clear up. > Any ideas? > Thanks. > > Tim Leitner We run PORTMAP in a service class called DAEMON. Its WLM classification is Importance=1, velocity=50. I have __no__ idea how this relates to Libstation, HSC, et al. The only thing that I know of that uses this is NFS. Perhaps your "portmap" is not the standard "portmap"? The standard portmap simply keeps track of port names with their associated logical names. That way, a client can ask portmap: "What port should I connect to in order to access service bubba?". The bubba service, running on the z/OS system, would have previously sent a request to portmap on the order of: "Hey! This here is bubba, what port do you want me to listen on for work?". Portmap would then tell bubba what port to listen on. A client would ask portmap what port bubba was listening on and connect to that port in order to talk to bubba. Portmap sees very little use around here. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Interesting, to me, observation.
When you reverse them, does the USERCAT entry for VBV0001 get created in MCAT as directed or in VTSTH01 per the already defined alias? In the first case, you are trying to create an alias in a catalog when there is already a "real" entry with the same hlq in the catalog. In the second, you are creating a real entry in a catalog with instructions to ignore normal alias processing, including potential name conflicts. Both seem pathological. -Original Message- From: McKown, John Sent: Monday, February 25, 2008 11:57 AM To: IBM-MAIN@BAMA.UA.EDU Subject: Interesting, to me, observation. If I run a job with the following two IDCAMS commands, the second command, DEF ALIAS, fails with IDC3013I DUPLICATE DATA SET NAME IMPORT CONNECT - OBJECTS (( - TSSTV.ICF.VBV0001 - VOL(BV1075) DEVT(3390) - )) CAT(CATALOG.ICF.VI24CAT.MCAT) DEF ALIAS(NAME(TSSTV) RELATE(CATALOG.ICF.VTSTH01)) - CAT(CATALOG.ICF.VI24CAT.MCAT) However, if I run the DEF ALIAS followed by the IMPORT CONNECT, all is wonderful. Does this seem inconsistent to anybody else? I do have the multilevel alias active, with a level of 2. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ZPDFSEND - An application that converts a z/OS FCFC print file to a PDF file and emails the PDF file
I coulda swore that I saw a thread about printing or handling PDFs on one of these lists, but I can't find it now. But someone may find this use of Kirk's baby interesting and useful. ZPDFSEND - An application that converts a z/OS FCFC print file to a PDF file and emails the PDF file http://www-03.ibm.com/support/techdocs/atsmastr.nsf/WebIndex/TD104449 Abstract: This Techdoc provides two Java programs and sample JCL to run the programs using the JZOS Java batch launcher. The first program, Zpdf.java, converts ANS FCFC (American National Standard first-character forms-control) print files to PDF files. The second program, Zmail.java, emails a USS file (such as the PDF file created by Zpdf.java) using SMTP. The two Java programs can be used together or independently. The ZPDFSEND file contains a batch job that runs the Zpdf and Zmail programs using the JZOS batch launcher. As with any Java program running on a z/OS system, Zpdf.java and Zmail.java will run on a zAAP processor if one is present on the system Aaron -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
On Mon, 25 Feb 2008 13:42:48 -0600, Leitner, Timothy <[EMAIL PROTECTED]> wrote: >All, > Has anybody run into an issue with the portmap started task >running in a default service class rather than sysstc like tcpip? We use >STK (SUN) HSC and libstation and have had some odd things happening with >our Veritas system. We have found that there will be a number (20-30) >connections in TCPIP left for long periods of time all pointing back to >the Veritas environment. We can drop the connections and things will >clear up. >Any ideas? >Thanks. > Who's default, STC or OMVS? Did you try and classify it? TCPIP may be classified or may be getting SYSSTC via PPT HIDP attribute. Or perhaps it needs to be classified under OMVS. We don't run it here so I am not sure how it runs (and didn't research). Mark -- Mark Zelden Sr. Software and Systems Architect - z/OS Team Lead Zurich North America / Farmers Insurance Group - ZFUS G-ITO mailto:[EMAIL PROTECTED] z/OS Systems Programming expert at http://expertanswercenter.techtarget.com/ Mark's MVS Utilities: http://home.flash.net/~mzelden/mvsutil.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Portmap start task
I also run libstation. We have hangs from the Veritas side. We have to stop/start Libstation to get things flowing again. It is a problem that we have never been able to resolve. At this time we are running an old release of HSC/Libstation but we have had this problem in more than one release. We have not been able to find any problems on the HSC side. It appears to be a Veritas problem, but we have not been able to confirm this. Pat Mihalec Rush University Medical Center Senior System Programmer (312) 942-8386 [EMAIL PROTECTED] "Leitner, Timothy" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 01:42 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Portmap start task All, Has anybody run into an issue with the portmap started task running in a default service class rather than sysstc like tcpip? We use STK (SUN) HSC and libstation and have had some odd things happening with our Veritas system. We have found that there will be a number (20-30) connections in TCPIP left for long periods of time all pointing back to the Veritas environment. We can drop the connections and things will clear up. Any ideas? Thanks. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 == The information in this message is confidential and may be legally privileged. Access to this message by anyone other than the addressee is not authorized. If you are not the intended recipient, or an agent of the intended recipient, any disclosure, copying, or distribution of the message or any action or omission taken by you in reliance on it, is prohibited and may be unlawful. If you have received this message in error, please contact the sender immediately and permanently delete the original e-mail, attachment(s), and any copies. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HTTPD Roots (was: Linux zSeries questions)
On Mon, 25 Feb 2008 14:22:51 +0100, Ulrich Boche <[EMAIL PROTECTED]> wrote: > >And, of course, WAS is not only J2EE, that's only the business logic >part of WAS. For the presentation logic portion of WAS you'll need a web >server (if you want to run it on z/OS, for that matter). You seem to be suggesting that WAS does not handle static content. You don't need a HTTP server (on z/OS or otherwise) if you have WAS for z/OS. WAS handles static content just fine, if much more expensively than an HTTP server. You are highly recommended, though, to use an HTTP server (if you are running a web-app) on the front-end for just that reason. Well, now come to think of it, I'm not sure which would be more expensive in a TCO-sort of way. WAS would be using your zAAPs, while HTTP server would be using the regular CPs. Aaron -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Interesting, to me, observation.
If I run a job with the following two IDCAMS commands, the second command, DEF ALIAS, fails with IDC3013I DUPLICATE DATA SET NAME IMPORT CONNECT - OBJECTS (( - TSSTV.ICF.VBV0001 - VOL(BV1075) DEVT(3390) - )) CAT(CATALOG.ICF.VI24CAT.MCAT) DEF ALIAS(NAME(TSSTV) RELATE(CATALOG.ICF.VTSTH01)) - CAT(CATALOG.ICF.VI24CAT.MCAT) However, if I run the DEF ALIAS followed by the IMPORT CONNECT, all is wonderful. Does this seem inconsistent to anybody else? I do have the multilevel alias active, with a level of 2. -- John McKown Senior Systems Programmer HealthMarkets Keeping the Promise of Affordable Coverage Administrative Services Group Information Technology The information contained in this e-mail message may be privileged and/or confidential. It is for intended addressee(s) only. If you are not the intended recipient, you are hereby notified that any disclosure, reproduction, distribution or other use of this communication is strictly prohibited and could, in certain circumstances, be a criminal offense. If you have received this e-mail in error, please notify the sender by reply and delete this message without copying or disclosing it. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Getting detailed DB2 maintenance level info
You mean //DB2UTIL EXEC PGM=DSNUTILB,PARM='DB7G,REPAIR' //STEPLIB DD DSN=DSN710.SDSNEXIT,DISP=SHR // DD DSN=DSN710.SDSNLOAD,DISP=SHR //SYSPRINT DD SYSOUT=* //UTPRINT DD SYSOUT=* //SYSIN DD * DIAGNOSE DISPLAY MEPL Mike On Mon, Feb 25, 2008 at 1:28 PM, Paul Peplinski <[EMAIL PROTECTED]> wrote: > Hey all, > > I recall seeing something that gives the maintenance or PTF level of > several > DB2 modules. I cannot remember if it was a command, SQL or a stored > procedure but I cannot find it right now. This is for z/OS DB2 V8. > > Paul Peplinski > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > -- Mike -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Portmap start task
All, Has anybody run into an issue with the portmap started task running in a default service class rather than sysstc like tcpip? We use STK (SUN) HSC and libstation and have had some odd things happening with our Veritas system. We have found that there will be a number (20-30) connections in TCPIP left for long periods of time all pointing back to the Veritas environment. We can drop the connections and things will clear up. Any ideas? Thanks. Tim Leitner OSF Healthcare System Manager, Technical Services 309-683-7452 == The information in this message is confidential and may be legally privileged. Access to this message by anyone other than the addressee is not authorized. If you are not the intended recipient, or an agent of the intended recipient, any disclosure, copying, or distribution of the message or any action or omission taken by you in reliance on it, is prohibited and may be unlawful. If you have received this message in error, please contact the sender immediately and permanently delete the original e-mail, attachment(s), and any copies. == -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/os shop starting to deal with Z/vm
Len, Thanks very much. You may have made my life much easier. From: Rugen, Len [mailto:[EMAIL PROTECTED] Sent: Mon 2/25/2008 2:26 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Z/os shop starting to deal with Z/vm In the past, we had a popular non IBM disk backup utility. It would dump VM volumes under MVS so you can use your existing tape vaulting process. If you have to do a stand alone restore, it really doesn't matter if you boot the vm backup program or FDR's... Oops -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Prevent IEW2456E error with cmd in SYSLIN
Gilbert Saint-Flour wrote: > > Hello! > > The job below gets an IEW2456E error (and RC=8) because > the PROG222 program contains EXTRN XX which is not available. > The XX module is sometimes needed, but not in this case. > > It would be better if PROG222 defined XX with WXTRN instead of EXTRN, > but this is not an option because it's not an assembler module ! I could add > the NOCALL option to the PARM, but I have a good reason to NOT do that. > > So my question is this: is there a command I can code in SYSLIN to avoid > getting the IEW2456E error and RC=8 ? I looked in the doc but wasn't able to > find it, although I vaguely remember that I found one in the past. > > Thank you for your help. I don't know of one in SYSLIN, but you can code LET as a parm and the program will be marked executable. I don't see how NOCALL will help here as if the symbol can't be resolved through direct includes, stopping it from autoincluding doesn't make matters better. > > -- > Gilbert Saint-Flour > GSF Software > http://gsf-soft.com/ > > //LKED EXEC PGM=IEWL,PARM=(LIST,MAP,RENT) > //SYSPRINT DD SYSOUT=* > //SYSLIB DD DSN=IBMUSER.LOAD222,DISP=SHR > //SYSLMOD DD DSN=IBMUSER.LOAD,DISP=SHR > //SYSLIN DD * > INCLUDE SYSLIB(PROG222) > NAME PROG222(R) > /* -- Don Poitras - zSeries R & D - SAS Institute Inc. - SAS Campus Drive mailto:[EMAIL PROTECTED] (919)531-5637 Fax:677- Cary, NC 27513 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
On Mon, Feb 25, 2008 at 2:08 PM, Dave Kopischke <[EMAIL PROTECTED]> wrote: > On Sat, 23 Feb 2008 10:07:24 -0600, Walt Farrell wrote: > > > >One could argue that letting you determine your access to resources without > >actually trying to use them (and thus without causing audit records) is a > > >form of hacking. You're looking around trying to figure out what you can > >do, rather than simply doing your job. > > > > We have a JCL checker application that verifies dataset access for a JOB. > Through routine use of this product, we end up with thousands of access > warnings on our daily RACF reports. This is not a hacking attempt. If there > were hacking attempts occuring, it would be tough to see them through the > noise though. > > I'm going to try to see if I can have this product changed to use a > non-logged > access check. > Another legitimate (IMO) use of this sort of function is a to automatically convert an ISPF Edit request to View in the event that the user does not have UPDATE access to the requested data set. This helps to reduce accidental violations. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Getting detailed DB2 maintenance level info
Hey all, I recall seeing something that gives the maintenance or PTF level of several DB2 modules. I cannot remember if it was a command, SQL or a stored procedure but I cannot find it right now. This is for z/OS DB2 V8. Paul Peplinski -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/os shop starting to deal with Z/vm
In the past, we had a popular non IBM disk backup utility. It would dump VM volumes under MVS so you can use your existing tape vaulting process. If you have to do a stand alone restore, it really doesn't matter if you boot the vm backup program or FDR's... Oops -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/os shop starting to deal with Z/vm
http://listserv.uark.edu/scripts/wa.exe?A0=ibmvm After you get on that list ([EMAIL PROTECTED]), then you can get more information about the standard VMUTIL service machine that is used for initiating system timer events. /Tom Kern /301-903-2211 (Office) /301-905-6427 (Mobile) On Mon, 25 Feb 2008 13:04:31 -0500, O'Brien, David W. (NIH/CIT) [C] <[EMAIL PROTECTED]> wrote: >Can someone point me to Listserv for Z/VM and Linux? > >I'm trying to set up DDR for Disaster Recovery purposes. I think I've got the required commands but haven't a clue how to run backups on a scheduled basis. > >Regards, >Dave O'Brien -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
On Sat, 23 Feb 2008 10:07:24 -0600, Walt Farrell wrote: >One could argue that letting you determine your access to resources without >actually trying to use them (and thus without causing audit records) is a >form of hacking. You're looking around trying to figure out what you can >do, rather than simply doing your job. > We have a JCL checker application that verifies dataset access for a JOB. Through routine use of this product, we end up with thousands of access warnings on our daily RACF reports. This is not a hacking attempt. If there were hacking attempts occuring, it would be tough to see them through the noise though. I'm going to try to see if I can have this product changed to use a non-logged access check. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/os shop starting to deal with Z/vm
No problem David. I would give you some tips (you'll probably need to use WAKEUP/VMUTIL if you don't have VMSCHEDULE or something like that, PROP could handle too), but I'm sure you'll get better ones from others on the IBMVM list. Larry Brown "O'Brien, David W. (NIH/CIT) [C]" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 12:38 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Re: Z/os shop starting to deal with Z/vm Thanks Larry [EMAIL PROTECTED] and [EMAIL PROTECTED] Larry Brown Subject Z/os shop starting to deal with Z/vm Can someone point me to Listserv for Z/VM and Linux? I'm trying to set up DDR for Disaster Recovery purposes. I think I've got the required commands but haven't a clue how to run backups on a scheduled basis. Regards, Dave O'Brien This e-mail is intended only for its addressee and may contain information that is privileged, confidential, or otherwise protected from disclosure. If you have received this communication in error, please notify us immediately by e-mailing [EMAIL PROTECTED]; then delete the original message. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/os shop starting to deal with Z/vm
Thanks Larry From: Larry J Brown [mailto:[EMAIL PROTECTED] Sent: Mon 2/25/2008 1:35 PM To: IBM-MAIN@BAMA.UA.EDU Subject: Re: Z/os shop starting to deal with Z/vm [EMAIL PROTECTED] and [EMAIL PROTECTED] Larry Brown "O'Brien, David W. (NIH/CIT) [C]" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 12:17 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Z/os shop starting to deal with Z/vm Can someone point me to Listserv for Z/VM and Linux? I'm trying to set up DDR for Disaster Recovery purposes. I think I've got the required commands but haven't a clue how to run backups on a scheduled basis. Regards, Dave O'Brien -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html This e-mail is intended only for its addressee and may contain information that is privileged, confidential, or otherwise protected from disclosure. If you have received this communication in error, please notify us immediately by e-mailing [EMAIL PROTECTED]; then delete the original message. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Z/os shop starting to deal with Z/vm
[EMAIL PROTECTED] and [EMAIL PROTECTED] Larry Brown "O'Brien, David W. (NIH/CIT) [C]" <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 12:17 PM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject Z/os shop starting to deal with Z/vm Can someone point me to Listserv for Z/VM and Linux? I'm trying to set up DDR for Disaster Recovery purposes. I think I've got the required commands but haven't a clue how to run backups on a scheduled basis. Regards, Dave O'Brien -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html This e-mail is intended only for its addressee and may contain information that is privileged, confidential, or otherwise protected from disclosure. If you have received this communication in error, please notify us immediately by e-mailing [EMAIL PROTECTED]; then delete the original message. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 256 bytes again
As do I >>> Jim McAlpine <[EMAIL PROTECTED]> 2/25/2008 4:08 AM >>> Sorry, the pedantry remark wasn't aimed at you. BTW I agree with you that 256 bytes is the correct value. Jim McAlpine Note that my email domain has changed from jo-annstores.com to joann.com. Please update your address book and other records to reflect this change. CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains confidential and privileged information intended only for the addressee. If you are not the intended recipient, please be advised that you have received this material in error and that any forwarding, copying, printing, distribution, use or disclosure of the material is strictly prohibited. If you have received this material in error, please (i) do not read it, (ii) reply to the sender that you received the message in error, and (iii) erase or destroy the material. Emails are not secure and can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by email. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
- Following extracted from the CICS/TS RACF Security Guide: "2.7.6.2 Checking which transactions to offer a user You can use the QUERY SECURITY command to check whether a user is authorized to use a particular transaction before displaying the transaction code as part of an introductory menu. When you use the command for this purpose, you will probably want to avoid logging the checks for users who are not allowed to use certain transactions. To do this, use the NOLOG option." ...and the QUERY SECURITY command invokes a RACROUTE to perform this function. So CICS is documenting use of preemptive RACROUTE requests as reasonable design in presenting usable options on a user's menu. - IIRC, under this particular set of circumstances, RACROUTE will do the equivalent of a FRACHECK, which does no logging. Has to do with the resource definitions for CICS transactions. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Prevent IEW2456E error with cmd in SYSLIN
Gilbert Saint-Flour wrote: Hello! The job below gets an IEW2456E error (and RC=8) because the PROG222 program contains EXTRN XX which is not available. The XX module is sometimes needed, but not in this case. It would be better if PROG222 defined XX with WXTRN instead of EXTRN, but this is not an option because it's not an assembler module ! I could add the NOCALL option to the PARM, but I have a good reason to NOT do that. So my question is this: is there a command I can code in SYSLIN to avoid getting the IEW2456E error and RC=8 ? I looked in the doc but wasn't able to find it, although I vaguely remember that I found one in the past. Thank you for your help. Try using " REPLACE UNRESLVD " -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Z/os shop starting to deal with Z/vm
Can someone point me to Listserv for Z/VM and Linux? I'm trying to set up DDR for Disaster Recovery purposes. I think I've got the required commands but haven't a clue how to run backups on a scheduled basis. Regards, Dave O'Brien -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Fw: DFH-Logic error-z/OS1.9-TS2.3
thought I'd also post here...never know - Forwarded by Ron Wells/AGFS/AGFin on 02/25/2008 12:16 PM - Ron Wells/AGFS/AGFin 02/25/2008 09:56 AM To CICS List <[EMAIL PROTECTED]> cc Subject DFH-Logic error-z/OS1.9-TS2.3 sorry---wrong subject line entered.. - Forwarded by Ron Wells/AGFS/AGFin on 02/25/2008 09:55 AM - Ron Wells/AGFS/AGFin 02/25/2008 09:35 AM To CICS List <[EMAIL PROTECTED]> cc Subject Re: CICSPlex configuration question anyone on z/OS 1.9cics tran server 2.3 ever get following msg.. DFHZC2404 > CSNE VTAM Detected Logice Error DFHZLEX) we went back to z/OS1.7 and all is working ..??? -- Email Disclaimer This E-mail contains confidential information belonging to the sender, which may be legally privileged information. This information is intended only for the use of the individual or entity addressed above. If you are not the intended recipient, or an employee or agent responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution, or the taking of any action in reliance on the contents of the E-mail or attached files is strictly prohibited. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SPAM: ACBUSER
Has anyone ever encountered use of (or indeed had cause to use) the ACBUSER field in a VSAM ACB? Just curious. --- I've used it, in the distant past, to point to a VTAM terminal message queue. I also used it once in a VSAM application to track a queue of buffers to be written to a VSAM cluster. IIRC, the application separated records from a single input file to an indeterminate number of output files. VSAM I/O was handled in a subtask and there was a WAIT/POST mechanism to tell the VSAM subtask that another buffer was ready to write. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Prevent IEW2456E error with cmd in SYSLIN
On 25/02/2008, Gilbert Saint-Flour <[EMAIL PROTECTED]> wrote: > The job below gets an IEW2456E error (and RC=8) because > the PROG222 program contains EXTRN XX which is not available. > The XX module is sometimes needed, but not in this case. > > It would be better if PROG222 defined XX with WXTRN instead of EXTRN, > but this is not an option because it's not an assembler module ! I could add > the NOCALL option to the PARM, but I have a good reason to NOT do that. > > So my question is this: is there a command I can code in SYSLIN to avoid > getting the IEW2456E error and RC=8 ? I looked in the doc but wasn't able to > find it, although I vaguely remember that I found one in the past. Could you include, say, IEFBR14, and use a CHANGE statement to turn it into XX ? The order of things for CHANGE is tricky, and I see they have recently introduced an -IMMED option that makes it apply to what comes before, rather than what comes after, the CHANGE. Or does the program check the value of the external adcon at runtime, and do different processing if XX is present? Tony H. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Creating AWSTAPEs on MVS
âãé áï àáé wrote: Hi, We currently send physical 3480's to an external customer. The customer has asked if we could send them the tapes as AWStape files. They are evaluating a product called VTA (Virtual Tape Appliance) from a company called Universal Software. I've looked at CBT file 533, but I'm not sure which program to use. What program would i use to convert a physical 3480 to an AWSTape file that can be used by VTA. TIA Gadi - Based on my long friendship, I would guess that Sam Golob would be more than happy to help you. You can contact him via the CBT website. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SPAM: Re: LZW Compression/Expansion
Edward Jaffe wrote: Rick Fochtman wrote: I can't say for sure what compression algorithm I'll use in the updated ARCHIVER; overall performance and some of the technical details will still need exploration but I've got some starting points now. Remember that there are high-performance, hardware-assisted compression and expansion services available in z/OS. http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/iea2a670/23.0 I'm well aware of that, and it's a serious consideration. I need to explore, and understand, how those facilities are used. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: RACF callable service to check (new) password
Andreas, RACF itself has practically all the functionality built-in that you are looking for. If I remember correctly, - RACF Configuration options allow the retention of (x) previous passwords within the RACF database. - password syntax options (length, valid characters, repeat strings, etc.) - a password validation exit that allows you to perform additional checks above and beyond those provided by RACF Once the rules (and/or exit) have been set up, a user who changes the password will not be able to create a new password that violates these rules. No need for a homegrown application ... Regards, Ulrich Krueger P.S.: Herzliche Grüsse aus Kalifornien -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Andreas Lerch Sent: Monday, February 25, 2008 09:21 To: IBM-MAIN@BAMA.UA.EDU Subject: RACF callable service to check (new) password Dear MVS Team main: RACF sub: password verification Hi - i am looking for a callable service to verify a new password against the currntly given RACF-roules without a valid userid. My company would change the administation of users. They take a lot of $ to administrate users of their system. To reduce the costs and to use the affort of RACF, i am looking for a callable (COBOL) service, to verify the new password in the rules of RACF. We use CICS with a self made login panel. To restrickt the new password, we use a VSAM-dataset for the last ?? passwords - MD5 hashes - for new passwords we want to delete such formats like keyboard repeats: i.e. asdfg or sdfgh and words like: may, jun and any more. RACF does this simple check, but nowadays my only knowlage is, that i must have a real, RACF-defined userid. Can i use the RACF-rules for new passwords without to have a RACF-defined userid? thank you for your help einen schoenen Tag Andreas Lerch -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Prevent IEW2456E error with cmd in SYSLIN
On Mon, 25 Feb 2008 07:09:15 -0700, Steve Comstock wrote: > >I would try > > LIBRARY (XX) > >my understanding this format of LIBRARY identifies >external references that might not be resolvable >and it's OK if they are not resolved. > >Might return RC of 4, though; not sure. Let me >know if it works for you. > Alas, and verily: IEW2278I B352 INVOCATION PARAMETERS - MAP,LIST,XREF,LET IEW2322I 1220 1 LIBRARY (FOOBAR) IEW2322I 1220 2 INCLUDE SYSOBJ IEW2322I 1220 3 NAMEWHATEVER(R) IEW2455W 9205 SYMBOL FOOBAR UNRESOLVED. NOCALL OR NEVERCALL SPECIFIED. ... after a brief diversion with an unintelligible error message when I tried to allocate SYSLMOD to UNIT=VIO,DSNTYPE=LIBRARY. M&C says: IGD17040I ERROR IN DADSM PROCESSING FOR DATA SET dsname HISTORIC RETURN CODE IS rc DIAGNOSTIC INFORMATION IS cde ... Application Programmer Response: Use the record in the logrec data set, the return code and the diagnostic information to determine the error. Use z/OS DFSMSdfp Diagnosis to determine the meaning of the DADSM historic return code and the DADSM diagnostic information. Sheesh! I'd prefer a "self-explanatory" message. E.g.: "requested DSNTYPE is incompatible with requested UNIT." This does not seem to be suitable action to expect of an "Application Programmer". And why, in the first place, shouldn't VIO support PDSE? VIO is just a RAM disk emulating a hard drive. The emulation is deficient. -- gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: CSVDYLPA DCBPTR=CVTLINK
On Sun, 24 Feb 2008 14:23:31 -0500, Peter Relson wrote: >>Of course, an LLA REFRESH (or UPDATE) is also needed to find the new >>member. This could be very useful when a product data set in the linklist >goes >>into another extent, especially if it is a product that can be stopped and > >>restarted. or one that is not constantly in use, such as, for example, a >>compiler. > >In the case I was referring to, namely a new LNKLST set activate, LLA is >automatically updated so that fetches coming from a space using that new >LNKLST set will get the right data. That's what I thought you were suggesting in your first post in this thread, and it comes as a surprise to me. It means that LLA is not simply managing data sets, as I thought I understood it to do. Rather, it must be managing data sets within linklist sets. As a result, if SYS1.USERLINK is in the LNKLST and I replace a module in it, then create and activate a new linklist set, any new address space referencing that module through the LNKLST will get the new module by virtue of using the new LNKLST. Still, a long running job will continue to get the old copy of the module because it is using the old LNKLST. AFAIK, there is no way for me to tell that this is happening. D LLA does not tell me which LNKLST a library is associated with. When issuing F LLA,UPDATE, to remove a data set from LLA management, there is no way to selectively remove only the one for a particular LNKLST set. Nevertheless, I tested and found that it does behave as you've described. On our sandbox system, I defined a new LNKLST set with my load library at the top. The program that I used to test was SHOWMVS, because I have a couple of releases around and can easily tell which I am running. When I activated the LNKLST, and logged off and back on, I got the module from my library as expected. I then replaced that module with a different release of SHOWMVS, copied the LNKLST set and activated it. I verified that my current TSO session was still picking up the old copy, as expected, then logged off and on again so that I'd be using the new LNKLST set. This time I got the new copy of the module, just as you have described. In these tests, I did not go to additional extents, nor did I want to. Certainly, it sounds safer to define and activate a new LNKLST set when updating a LNKLST library than to perform a REFRESH or UPDATE. Thanks for the tip. -- Tom Marchant -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Batch job to perform sftp transfer
Betsy , You don't need to run the sshd daemon to use the sftp client from z/OS. Also, even though OpenSSH is open source, it is licensed under a BSD license. IBM is free to modify it as they wish (which they have) and not redistribute their patches. Kirk Wolf On Mon, Feb 25, 2008 at 9:41 AM, Betsy Jeffery <[EMAIL PROTECTED]> wrote: > To execute sftp on z/OS using USS, you will need to install IBM Ported > Tools. > This is a no cost feature available on the IBM website > http://www-03.ibm.com/servers/eserver/zseries/zos/unix/port_tools.html > The ssh daemon has to be running. > > I have recently set this up at our shop. sftp itself will not work under > OMVS > just as ssh won't. These are open source commands, not TSO/OMVS. > Therefore, sftp does not (and should not if it is to remain open source) > recognize MVS data set structures. You can use sftp in batch but you need > extra steps. First you copy the data, the commands, then execute the > transfer with those 2 files. Here is an example of going from z/OS to > Unix: > > // JOB (33000),'sftp batch', > //NOTIFY=&SYSUID, > //CLASS=2,MSGCLASS=X,MSGLEVEL=1 > //* > //* INITIATE script via ssh, copy to omvs > //* > //JS010EXEC PGM=IKJEFT01 > //INMVS DD DSN=YOUR.MVS.INPUT.FILE, > //DISP=SHR > //OUTHFS DD FILEDATA=TEXT, > //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), > //PATHMODE=SIRWXU, > //PATH='/u/omvs.file' > //SYSTSIN DD * > OCOPY IND(INMVS) OUTDD(OUTHFS) > /* > //SYSTSPRT DD SYSOUT=* > //SYSPRINT DD SYSOUT=* > //* > //JS020EXEC PGM=IKJEFT01 > //INMVSDD DSN=your.sftp.commands, > //DISP=SHR > //OUTHFS DD FILEDATA=TEXT, > //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), > //PATHMODE=SIRWXU, > //PATH='/u/sftp.cmds' > //SYSTSIN DD * > OCOPY IND(INMVS) OUTDD(OUTHFS) > /* > //SYSTSPRT DD SYSOUT=* > //SYSPRINT DD SYSOUT=* > //* > //JS030EXEC PGM=BPXBATCH, > // PARM='sh sftp -b /u/sftp.cmds [EMAIL PROTECTED] name' > //STDOUT DD PATH='/u/sftp.stdout', > //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), > //PATHMODE=SIRWXU > //STDERR DD PATH='/u/sftp.stderr', > //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), > //PATHMODE=SIRWXU > //SYSOUT DD SYSOUT=* > //SYSPRINT DD SYSOUT=* > > within the sftp.commands file are your login information and the copy > commands > > Apologies to anyone who has already sent this information - didn't read > through all the posts on this question. > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
RACF callable service to check (new) password
Dear MVS Team main: RACF sub: password verification Hi - i am looking for a callable service to verify a new password against the currntly given RACF-roules without a valid userid. My company would change the administation of users. They take a lot of $ to administrate users of their system. To reduce the costs and to use the affort of RACF, i am looking for a callable (COBOL) service, to verify the new password in the rules of RACF. We use CICS with a self made login panel. To restrickt the new password, we use a VSAM-dataset for the last ?? passwords - MD5 hashes - for new passwords we want to delete such formats like keyboard repeats: i.e. asdfg or sdfgh and words like: may, jun and any more. RACF does this simple check, but nowadays my only knowlage is, that i must have a real, RACF-defined userid. Can i use the RACF-rules for new passwords without to have a RACF-defined userid? thank you for your help einen schoenen Tag Andreas Lerch -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ACF2 vs RACF
Jim, Are you saying that the job sent from system C (ACF2) contains USER= and PASSWORD= in the jobcard, followed by a "/*XEQ SYSF" card (or whatever your System F is named)? The "SUBMITTER()" in the ICH408I message leads me to believe that either JES2/NJE or ACF2 do not pass the userID and password to the RACF system. Search the JES2/NJE configuration manuals and ACF2 manuals under the buzzword "NJE password inheritance". Perhaps a quick call to CA-ACF2 Support might help you find the solution. I know, it's got something to do with "which system validates the password" and how NJE sends that information across. Regards, Ulrich Krueger -Original Message- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of James Chappell Sent: Monday, February 25, 2008 08:02 To: IBM-MAIN@BAMA.UA.EDU Subject: ACF2 vs RACF SYSTEM C is z/OS 1.7 and ACF2 1.9 SYSTEM F is z/OS 1.7 and RACF. I can NJE work from SYSTEM F to SYSTEM C with a USERID/PASSWORD that is known to each and it works as desired. But when I attempt to NJE work from SYSTEM C to SYSTEM F using the same USERID/PASSWORD the JOB fails ICH408I USER(SOFTAM ) GROUP(SYSPROG ) NAME(TECH: CHAPPELL, J SUBMITTER() LOGON/JOB INITIATION - SUBMITTER IS NOT AUTHORIZED BY USER Any ideas on what I might need to do? Jim Chappell 503 745-7841 503 349-5603(Cell) [EMAIL PROTECTED] "Not everything that can be counted counts, and not everything that counts can be counted." - Albert Einstein "If you don't change your direction, you'll end up where you're going" -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Batch job to perform sftp transfer
On Mon, 25 Feb 2008 09:41:26 -0600, Betsy Jeffery wrote: > >recognize MVS data set structures. You can use sftp in batch but you need >extra steps. First you copy the data, the commands, then execute the >transfer with those 2 files. Here is an example of going from z/OS to Unix: > Lots of comments on this: >// JOB (33000),'sftp batch', >//NOTIFY=&SYSUID, >//CLASS=2,MSGCLASS=X,MSGLEVEL=1 >//* >//* INITIATE script via ssh, copy to omvs >//* >//JS010EXEC PGM=IKJEFT01 >//INMVS DD DSN=YOUR.MVS.INPUT.FILE, >//DISP=SHR >//OUTHFS DD FILEDATA=TEXT, >//PATHOPTS=(OWRONLY,OCREAT,OTRUNC), >//PATHMODE=SIRWXU, >//PATH='/u/omvs.file' >//SYSTSIN DD * > OCOPY IND(INMVS) OUTDD(OUTHFS) >/* >//SYSTSPRT DD SYSOUT=* >//SYSPRINT DD SYSOUT=* >//* >//JS020EXEC PGM=IKJEFT01 >//INMVSDD DSN=your.sftp.commands, >//DISP=SHR >//OUTHFS DD FILEDATA=TEXT, >//PATHOPTS=(OWRONLY,OCREAT,OTRUNC), >//PATHMODE=SIRWXU, >//PATH='/u/sftp.cmds' >//SYSTSIN DD * > OCOPY IND(INMVS) OUTDD(OUTHFS) >/* >//SYSTSPRT DD SYSOUT=* >//SYSPRINT DD SYSOUT=* >//* o You could use IEBGENER and avoid the OCOPY lines. o Or, better, put two OCOPY commands in a single IKJEFT01 step. o Or, best, keep your.sftp.commands in HFS and entirely avoid copying them. o In the customary OMVS setup, a nonprivileged user might be unable to create files in /u. o What use is SYSPRINT in an IKJEFT01 step? >//JS030EXEC PGM=BPXBATCH, >// PARM='sh sftp -b /u/sftp.cmds [EMAIL PROTECTED] name' >//STDOUT DD PATH='/u/sftp.stdout', >//PATHOPTS=(OWRONLY,OCREAT,OTRUNC), >//PATHMODE=SIRWXU >//STDERR DD PATH='/u/sftp.stderr', >//PATHOPTS=(OWRONLY,OCREAT,OTRUNC), >//PATHMODE=SIRWXU >//SYSOUT DD SYSOUT=* >//SYSPRINT DD SYSOUT=* > o Nowadays, BPXBATCH can use JES data sets for STDOUT and STDERR (but, alas, not STDIN). o What use is SYSPRINT in a BPXBATCH step? --gil -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ACF2 vs RACF
James Chappell wrote: SYSTEM C is z/OS 1.7 and ACF2 1.9 SYSTEM F is z/OS 1.7 and RACF. I can NJE work from SYSTEM F to SYSTEM C with a USERID/PASSWORD that is known to each and it works as desired. But when I attempt to NJE work from SYSTEM C to SYSTEM F using the same USERID/PASSWORD the JOB fails ICH408I USER(SOFTAM ) GROUP(SYSPROG ) NAME(TECH: CHAPPELL, J SUBMITTER() LOGON/JOB INITIATION - SUBMITTER IS NOT AUTHORIZED BY USER Any ideas on what I might need to do? I don't know ACF2, but the same problem can arise when using RACF-only environment. You have to care about symmetric RACF definitions (if you want symmetric behaviour). So, I would check: - user existence - group assigment of given user - NODES class - the most important. BTW: Maybe this definition is intentionally left assymetric ? Sometimes we want to submit job A -> B, but *not* the opposite direction. -- Radoslaw Skorupka Lodz, Poland -- BRE Bank SA ul. Senatorska 18 00-950 Warszawa www.brebank.pl Sd Rejonowy dla m. st. Warszawy XII Wydzia Gospodarczy Krajowego Rejestru Sdowego, nr rejestru przedsibiorców KRS 025237 NIP: 526-021-50-88 Wedug stanu na dzie 01.01.2008 r. kapita zakadowy BRE Banku SA wynosi 118.642.672 zote i zosta w caoci wpacony. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
ACF2 vs RACF
SYSTEM C is z/OS 1.7 and ACF2 1.9 SYSTEM F is z/OS 1.7 and RACF. I can NJE work from SYSTEM F to SYSTEM C with a USERID/PASSWORD that is known to each and it works as desired. But when I attempt to NJE work from SYSTEM C to SYSTEM F using the same USERID/PASSWORD the JOB fails ICH408I USER(SOFTAM ) GROUP(SYSPROG ) NAME(TECH: CHAPPELL, J SUBMITTER() LOGON/JOB INITIATION - SUBMITTER IS NOT AUTHORIZED BY USER Any ideas on what I might need to do? Jim Chappell 503 745-7841 503 349-5603(Cell) [EMAIL PROTECTED] "Not everything that can be counted counts, and not everything that counts can be counted." - Albert Einstein "If you don't change your direction, you'll end up where you're going" -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Time Zone and Change Management Implementation Start Times
We have over 30 LPARs in the same physical location. Some are running EST, 4 are running CST and 1 is running JST (Japan time). Our management made the decision that all times in the change records will be EST. So, if a change is scheduled for 3:00 am EST and is supposed to happen on a CST LPAR, the change happens at 2:00 CST, 3:00 EST. Mark T. Regan, K8MTR wrote: I'm thinking that too, but I was wondering if anyone else had encountered this issue too? I'm sure people have, due to all the data center consolations that have taken place. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Batch job to perform sftp transfer
To execute sftp on z/OS using USS, you will need to install IBM Ported Tools. This is a no cost feature available on the IBM website http://www-03.ibm.com/servers/eserver/zseries/zos/unix/port_tools.html The ssh daemon has to be running. I have recently set this up at our shop. sftp itself will not work under OMVS just as ssh won't. These are open source commands, not TSO/OMVS. Therefore, sftp does not (and should not if it is to remain open source) recognize MVS data set structures. You can use sftp in batch but you need extra steps. First you copy the data, the commands, then execute the transfer with those 2 files. Here is an example of going from z/OS to Unix: // JOB (33000),'sftp batch', //NOTIFY=&SYSUID, //CLASS=2,MSGCLASS=X,MSGLEVEL=1 //* //* INITIATE script via ssh, copy to omvs //* //JS010EXEC PGM=IKJEFT01 //INMVS DD DSN=YOUR.MVS.INPUT.FILE, //DISP=SHR //OUTHFS DD FILEDATA=TEXT, //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), //PATHMODE=SIRWXU, //PATH='/u/omvs.file' //SYSTSIN DD * OCOPY IND(INMVS) OUTDD(OUTHFS) /* //SYSTSPRT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //* //JS020EXEC PGM=IKJEFT01 //INMVSDD DSN=your.sftp.commands, //DISP=SHR //OUTHFS DD FILEDATA=TEXT, //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), //PATHMODE=SIRWXU, //PATH='/u/sftp.cmds' //SYSTSIN DD * OCOPY IND(INMVS) OUTDD(OUTHFS) /* //SYSTSPRT DD SYSOUT=* //SYSPRINT DD SYSOUT=* //* //JS030EXEC PGM=BPXBATCH, // PARM='sh sftp -b /u/sftp.cmds [EMAIL PROTECTED] name' //STDOUT DD PATH='/u/sftp.stdout', //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), //PATHMODE=SIRWXU //STDERR DD PATH='/u/sftp.stderr', //PATHOPTS=(OWRONLY,OCREAT,OTRUNC), //PATHMODE=SIRWXU //SYSOUT DD SYSOUT=* //SYSPRINT DD SYSOUT=* within the sftp.commands file are your login information and the copy commands Apologies to anyone who has already sent this information - didn't read through all the posts on this question. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Announcing XMITIP version 08.02 Available
XMITIP version 08.02 is now available at http://www.lbdsoftware.com The updates for this release include: V08.02 - 02/20/08 - exec updates TXT2HTML- Minor update for message qualifier and set default setting for JavaScript to No TXT2RTF - Remove extraneous Trace XMITIP - Correction to allow &userid when used in FROM to carry over to the SENDER SMTP tag. - Other minor cleanup XMITIPCU - Minor updates/corrections XMITIPI - version change only XMITZEX1 - Minor update XMITZQEN - Minor update Lionel B. Dyck, Consultant/Specialist Enterprise Platform Services, Mainframe Engineering KP-IT Enterprise Engineering 925-926-5332 (8-473-5332) | E-Mail: [EMAIL PROTECTED] AIM: lbdyck | Yahoo IM: lbdyck Kaiser Service Credo: "Our cause is health. Our passion is service. We're here to make lives better." I never guess. It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts. - Sir Arthur Conan Doyle NOTICE TO RECIPIENT: If you are not the intended recipient of this e-mail, you are prohibited from sharing, copying, or otherwise using or disclosing its contents. If you have received this e-mail in error, please notify the sender immediately by reply e-mail and permanently delete this e-mail and any attachments without reading, forwarding or saving them. Thank you. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
>>I can't find anything about a & as masking character. I should have spelled it out. It should have been % and *. sorry - ddk ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Price of CPU seconds
On 24 Feb 2008 11:37:54 -0800, [EMAIL PROTECTED] (Gerhard Adam) wrote: >I agree, however I'm surprised that no one has mentioned the obvious point >that needs to be considered. Chargeback shouldn't be based on usage, but >rather on the capacity that has been reserved for the anticipated load. >Every application ultimately contributes to the size of the configuration, >and serves as the basis for the capacity installed. Therefore, whether that >capacity is used or not, it indicates the resources that have been set aside >for a particular application and represents the resources which should be >charged. That is true - unless that capacity is sub-let to other processes. Which means that processes with higher priority should be charged more than background processes. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
> -Original Message- > From: IBM Mainframe Discussion List On Behalf Of Randy Evans > > >> > >>>One could argue that letting you determine your access to > resources > >>>without actually trying to use them (and thus without causing audit > >>>records) is a form of hacking. > >> > >>Perhaps, but some IBM code does exactly that, and for what > seems to be > >>good cause. I don't recall the details, but it was discussed here in > the > >>last few years. > >> > > > >You may be thinking of ISPF 3.4 and data set name hiding or may be > >thinking of ISPF 3.4 checking for ALTER access to the catalog. > > > > Following extracted from the CICS/TS RACF Security Guide: > > "2.7.6.2 Checking which transactions to offer a user > You can use the QUERY SECURITY command to check whether a > user is authorized to use a particular transaction before > displaying the transaction code as part of an introductory > menu. When you use the command for this purpose, you will > probably want to avoid logging the checks for users who are > not allowed to use certain transactions. To do this, use the > NOLOG option." > > ...and the QUERY SECURITY command invokes a RACROUTE to > perform this function. So CICS is documenting use of > preemptive RACROUTE requests as reasonable design in > presenting usable options on a user's menu. I've "heard" that CICS issues RACROUTE REQUEST=FASTAUTH "under the covers" to do that. CICS also issues RACROUTE REQUEST=LIST,GLOBAL=YES during its startup for each of the "CICS-related" classes "activated" via the DFHSIT Xyyy parms, so RACLISTing of one sort or another may be a "pre-req" for FASTAUTH. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
"Darth Keller" <[EMAIL PROTECTED]> wrote in message news:<[EMAIL PROTECTED] .com>... > From the DFSMSdss Storage Admin Guide: > The percent sing (%) is used as an ignore character. Each % sign > represents one character in the name being filtered, and any character in > that position is ignored. > IIRC, % & * are the only masking characters you get. There isn't one > specifically for numbers like a lot of languages have. > > So I'd say that %* is redundant and won't really accomplish what you > want. Off the top of my head, the only way I can see to do this is to > code the filter list. > > AM2.DE1*.HESD.SOR1*.**, > > HTH- ddk >From my SMS course (I didn't check it with the latest manual): % represent a single character * represents zero or more characters or one dataset name qualifier ** represents zero or more qualifiers I can't find anything about a & as masking character. In this scenario there is a difference between AM1.DE%* and AM1.DE*. The first requires at least one charachter after '.DE' the second does not. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
>> >>>One could argue that letting you determine your access to resources >>>without actually trying to use them (and thus without causing audit >>>records) is a form of hacking. >> >>Perhaps, but some IBM code does exactly that, and for what seems to be >>good cause. I don't recall the details, but it was discussed here in the >>last few years. >> > >You may be thinking of ISPF 3.4 and data set name hiding or may be >thinking of ISPF 3.4 checking for ALTER access to the catalog. > Following extracted from the CICS/TS RACF Security Guide: "2.7.6.2 Checking which transactions to offer a user You can use the QUERY SECURITY command to check whether a user is authorized to use a particular transaction before displaying the transaction code as part of an introductory menu. When you use the command for this purpose, you will probably want to avoid logging the checks for users who are not allowed to use certain transactions. To do this, use the NOLOG option." ...and the QUERY SECURITY command invokes a RACROUTE to perform this function. So CICS is documenting use of preemptive RACROUTE requests as reasonable design in presenting usable options on a user's menu. Randy Evans, Viaserv, Inc. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
"Darth Keller" <[EMAIL PROTECTED]> wrote in message news:<[EMAIL PROTECTED] .com>... > When in doubt, set up a test case & try it. Naviquest is a great tool. > > From the DFSMSdss Storage Admin Guide: > The percent sing (%) is used as an ignore character. Each % sign > represents one character in the name being filtered, and any character in > that position is ignored. > IIRC, % & * are the only masking characters you get. There isn't one > specifically for numbers like a lot of languages have. > > So I'd say that %* is redundant and won't really accomplish what you > want. Off the top of my head, the only way I can see to do this is to > code the filter list. > > AM2.DE1*.HESD.SOR1*.**, > AM2.DE1*.HESD.SOR2*.**, > AM2.DE1*.HESD.SOR3*.**, > and on and on and on > AM2.DE9*.HESD.SOR8*.**, > AM2.DE9*.HESD.SOR9*.** > > If I did the math right, it's 90 entries, which isn't that big a filter > list. > > HTH- ddk >From my SMS course (I didn't check it with the latest manual): % represent a single character * represents zero or more characters or one dataset name qualifier ** represents zero or more qualifiers I can't find anything about a & as masking character. In this scenario there is a difference between AM1.DE%* and AM1.DE*. The first requires at least one charachter after '.DE' the second does not. Kees. ** For information, services and offers, please visit our web site: http://www.klm.com. This e-mail and any attachment may contain confidential and privileged material intended for the addressee only. If you are not the addressee, you are notified that no part of the e-mail or any attachment may be disclosed, copied or distributed, and that any other action related to this e-mail or attachment is strictly prohibited, and may be unlawful. If you have received this e-mail by error, please notify the sender immediately by return e-mail, and delete this message. Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its employees shall not be liable for the incorrect or incomplete transmission of this e-mail or any attachments, nor responsible for any delay in receipt. Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch Airlines) is registered in Amstelveen, The Netherlands, with registered number 33014286 ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Linux zSeries questions
The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well. Anne & Lynn Wheeler <[EMAIL PROTECTED]> writes: > vulnerability database ... and having difficulty categorizing exploits > ... and lobbying the CVE interests to improve the strucuture/nature of > CVE reports. > http://www.garlic.com/~lynn/2004e.html#43 security taxonomy and CVE > http://www.garlic.com/~lynn/2005c.html#28 [Lit.] Buffer overruns > http://www.garlic.com/~lynn/2005c.html#32 [Lit.] Buffer overruns > http://www.garlic.com/~lynn/2007q.html#20 Hackers Attack Apps While Still in > Development re: http://www.garlic.com/~lynn/2008d.html#58 Linux zSeries questions and past posts mentioning c-language programming environment proclivity for buffer overflows http://www.garlic.com/~lynn/subintegrity.html#overflow The common cold of IT security http://www.gcn.com/online/vol1_no1/45864-1.html from above: IT security experts are not ready to admit defeat by one of the most common types of exploits, but the battle against buffer overflows so far has produced about the same results as medical science has against the common cold: We can treat it, but we haven’t found a way to cure it. “It’s the same problem over and over again,” independent security consultant Shawn Moyer said Thursday at the Black Hat Federal Briefings in Washington. “We patch, we scan, we patch, we scan, and the cycles get shorter and shorter and the problem is worse.” The result, he said, is a “flailing death spiral of updates and patches.” ... snip ... we had done quite a bit of implementations using vs/pascal ... including the original mainframe tcp/ip implementation ... w/o having any buffer length problems (not that they couldn't happen ... but it took quite a bit more effort in pascal to have a buffer length problem ... compared to c language programming environment). for other drift ... the original base tcp/ip implementation had 44kbytes/sec thruput consuming a full 3090 processor ... in large part because of the characteristics of the controller used to interface to LANs. i had done the rfc 1044 enhancements (to support a controller box from another vendor) and in some tuning tests at cray research between a cray and 4341 clone ... was getting 1mbyte/sec using only a modest amount of the 4341 processor (approx. three orders of magnitude improvement in bytes transfered per instruction executed) http://www.garlic.com/~lynn/subnetwork.html#1044 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
Very elegant! I like it. ddk >>FILTLST NUMA INCLUDE(%%1,%%2,%%3,%%4,%%5,%%6,%%7,%%8,%%9) >>FILTLST NUMB INCLUDE(%%%1,%%%2,%%%3,%%%4,%%%5,%%%6,%%%7,%%%8,%%%9) >>IF &DSN EQ AM2.DE%.HESD.SOR%.** && &DSN(2) EQ &NUMA && >>&DSN(4) EQ &NUMB THEN DO >> >> END ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
John, FILTLST NUMA INCLUDE(%%1,%%2,%%3,%%4,%%5,%%6,%%7,%%8,%%9) FILTLST NUMB INCLUDE(%%%1,%%%2,%%%3,%%%4,%%%5,%%%6,%%%7,%%%8,%%%9) IF &DSN EQ AM2.DE%.HESD.SOR%.** && &DSN(2) EQ &NUMA && &DSN(4) EQ &NUMB THEN DO END This is assuming that there is only one numeric character following the letters in the second and fourth node. If there is a possibility of more characters after the numeric value, you can add * after each value in the filter lists. Regards, John > Thanks Darth, > > I looked at the list that needs to be added and it amounts to 731. > Which means I will have to create a few more FILTLISTS. > > Darth Keller <[EMAIL PROTECTED]> wrote: > When in doubt, set up a test case & try it. Naviquest is a great tool. > > From the DFSMSdss Storage Admin Guide: > The percent sing (%) is used as an ignore character. Each % sign > represents one character in the name being filtered, and any character in > that position is ignored. > IIRC, % & * are the only masking characters you get. There isn't one > specifically for numbers like a lot of languages have. > > So I'd say that %* is redundant and won't really accomplish what you > want. Off the top of my head, the only way I can see to do this is to > code the filter list. > > AM2.DE1*.HESD.SOR1*.**, > AM2.DE1*.HESD.SOR2*.**, > AM2.DE1*.HESD.SOR3*.**, > and on and on and on > AM2.DE9*.HESD.SOR8*.**, > AM2.DE9*.HESD.SOR9*.** > > If I did the math right, it's 90 entries, which isn't that big a filter > list. > > HTH- ddk > > > > > > John Dawes > Sent by: IBM Mainframe Discussion List > 02/25/2008 05:50 AM > Please respond to > IBM Mainframe Discussion List > > > To > IBM-MAIN@BAMA.UA.EDU > cc > > Subject > SMS : WILD CARD USE IN FILTLIST > > > > > > > Hallo All, > > Can I use the following wild card attribute in a SMS FILTLIST: > > AM2.DE%*.HESD.SOR%*.** > > In the case of DE%* I would like to trap any numeric value (0 to 9) > which follose DE. > > In the case if SOR%* I would like again to trap any numeric (0 to 9) > after SOR. > > This would save a log of lines of code. > > If this will not work could you please suggest something else that I > could try? > > Thanks > > > - > Get the name you always wanted with the new y7mail email address. > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > > ** > This e-mail message and all attachments transmitted with it may > contain legally privileged and/or confidential information intended > solely for the use of the addressee(s). If the reader of this > message is not the intended recipient, you are hereby notified that > any reading, dissemination, distribution, copying, forwarding or > other use of this message or its attachments is strictly prohibited. > If you have received this message in error, please notify the sender > immediately and delete this message and all copies and backups thereof. > > Thank you. > ** > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > > > > - > Get the name you always wanted with the new y7mail email address. > > -- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Prevent IEW2456E error with cmd in SYSLIN
Gilbert Saint-Flour wrote: Hello! The job below gets an IEW2456E error (and RC=8) because the PROG222 program contains EXTRN XX which is not available. The XX module is sometimes needed, but not in this case. It would be better if PROG222 defined XX with WXTRN instead of EXTRN, but this is not an option because it's not an assembler module ! I could add the NOCALL option to the PARM, but I have a good reason to NOT do that. So my question is this: is there a command I can code in SYSLIN to avoid getting the IEW2456E error and RC=8 ? I looked in the doc but wasn't able to find it, although I vaguely remember that I found one in the past. Thank you for your help. Hi, Gilbert, I would try LIBRARY (XX) my understanding this format of LIBRARY identifies external references that might not be resolvable and it's OK if they are not resolved. Might return RC of 4, though; not sure. Let me know if it works for you. Kind regards, -Steve Comstock The Trainer's Friend, Inc. 303-393-8716 http://www.trainersfriend.com z/OS Application development made easier * Our classes include + How things work + Programming examples with realistic applications + Starter / skeleton code + Complete working programs + Useful utilities and subroutines + Tips and techniques -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Prevent IEW2456E error with cmd in SYSLIN
Hello! The job below gets an IEW2456E error (and RC=8) because the PROG222 program contains EXTRN XX which is not available. The XX module is sometimes needed, but not in this case. It would be better if PROG222 defined XX with WXTRN instead of EXTRN, but this is not an option because it's not an assembler module ! I could add the NOCALL option to the PARM, but I have a good reason to NOT do that. So my question is this: is there a command I can code in SYSLIN to avoid getting the IEW2456E error and RC=8 ? I looked in the doc but wasn't able to find it, although I vaguely remember that I found one in the past. Thank you for your help. -- Gilbert Saint-Flour GSF Software http://gsf-soft.com/ //LKED EXEC PGM=IEWL,PARM=(LIST,MAP,RENT) //SYSPRINT DD SYSOUT=* //SYSLIB DD DSN=IBMUSER.LOAD222,DISP=SHR //SYSLMOD DD DSN=IBMUSER.LOAD,DISP=SHR //SYSLIN DD * INCLUDE SYSLIB(PROG222) NAME PROG222(R) /* -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
Thanks Darth, I looked at the list that needs to be added and it amounts to 731. Which means I will have to create a few more FILTLISTS. Darth Keller <[EMAIL PROTECTED]> wrote: When in doubt, set up a test case & try it. Naviquest is a great tool. >From the DFSMSdss Storage Admin Guide: The percent sing (%) is used as an ignore character. Each % sign represents one character in the name being filtered, and any character in that position is ignored. IIRC, % & * are the only masking characters you get. There isn't one specifically for numbers like a lot of languages have. So I'd say that %* is redundant and won't really accomplish what you want. Off the top of my head, the only way I can see to do this is to code the filter list. AM2.DE1*.HESD.SOR1*.**, AM2.DE1*.HESD.SOR2*.**, AM2.DE1*.HESD.SOR3*.**, and on and on and on AM2.DE9*.HESD.SOR8*.**, AM2.DE9*.HESD.SOR9*.** If I did the math right, it's 90 entries, which isn't that big a filter list. HTH- ddk John Dawes Sent by: IBM Mainframe Discussion List 02/25/2008 05:50 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject SMS : WILD CARD USE IN FILTLIST Hallo All, Can I use the following wild card attribute in a SMS FILTLIST: AM2.DE%*.HESD.SOR%*.** In the case of DE%* I would like to trap any numeric value (0 to 9) which follose DE. In the case if SOR%* I would like again to trap any numeric (0 to 9) after SOR. This would save a log of lines of code. If this will not work could you please suggest something else that I could try? Thanks - Get the name you always wanted with the new y7mail email address. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html - Get the name you always wanted with the new y7mail email address. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: SMS : WILD CARD USE IN FILTLIST
When in doubt, set up a test case & try it. Naviquest is a great tool. >From the DFSMSdss Storage Admin Guide: The percent sing (%) is used as an ignore character. Each % sign represents one character in the name being filtered, and any character in that position is ignored. IIRC, % & * are the only masking characters you get. There isn't one specifically for numbers like a lot of languages have. So I'd say that %* is redundant and won't really accomplish what you want. Off the top of my head, the only way I can see to do this is to code the filter list. AM2.DE1*.HESD.SOR1*.**, AM2.DE1*.HESD.SOR2*.**, AM2.DE1*.HESD.SOR3*.**, and on and on and on AM2.DE9*.HESD.SOR8*.**, AM2.DE9*.HESD.SOR9*.** If I did the math right, it's 90 entries, which isn't that big a filter list. HTH- ddk John Dawes <[EMAIL PROTECTED]> Sent by: IBM Mainframe Discussion List 02/25/2008 05:50 AM Please respond to IBM Mainframe Discussion List To IBM-MAIN@BAMA.UA.EDU cc Subject SMS : WILD CARD USE IN FILTLIST Hallo All, Can I use the following wild card attribute in a SMS FILTLIST: AM2.DE%*.HESD.SOR%*.** In the case of DE%* I would like to trap any numeric value (0 to 9) which follose DE. In the case if SOR%* I would like again to trap any numeric (0 to 9) after SOR. This would save a log of lines of code. If this will not work could you please suggest something else that I could try? Thanks - Get the name you always wanted with the new y7mail email address. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ** This e-mail message and all attachments transmitted with it may contain legally privileged and/or confidential information intended solely for the use of the addressee(s). If the reader of this message is not the intended recipient, you are hereby notified that any reading, dissemination, distribution, copying, forwarding or other use of this message or its attachments is strictly prohibited. If you have received this message in error, please notify the sender immediately and delete this message and all copies and backups thereof. Thank you. ** -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: ACBUSER
On Mon, 25 Feb 2008 11:41:56 - Mike Kerford-Byrnes <[EMAIL PROTECTED]> wrote: :>Has anyone ever encountered use of (or indeed had cause to use) the ACBUSER :>field in a VSAM ACB? Isn't that a VTAM field? -- Binyamin Dissen <[EMAIL PROTECTED]> http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: HTTPD Roots (was: Linux zSeries questions)
Mark Post wrote: On Tue, Feb 19, 2008 at 8:37 AM, in message <[EMAIL PROTECTED]>, Paul Gilmartin <[EMAIL PROTECTED]> wrote: -snip- Now I'm confused. I've seen flat denials among these lists from IBM employees that IBM's HTTPD is Apache-derived. But which HTTPD? So: o How many HTTP servers does IBM supply for z/OS? Currently, only one: IBM HTTP Server (IHS). WAS is not a web server, it is a Web Application Server, i.e., a J2EE monster. o Which one(s) are Apache-derived? Since there's only one, all of them. :) If you go back and do some Google searches, you'll likely find the various stories of how IBM got involved with open source software to start with. To summarize, they decided it was silly to continue to develop/maintain an IBM web server when Apache was already being used by 60% of the world. The Apache license allows you to take their source, modify it, and turn around and license the package for profit, which is what they've done. They think of it as their mods adding value to the whole package, making it worth people paying for. I assume this is in addition to the customers' building pure Apache for z/OS. Right. The IBM HTTP Server for z/OS (current version is 5.3) that comes with z/OS is definitely not Apache based. Its basis is the old CERN web server. Just look at the httpd.conf file format and you will see. I've been told by reliable IBM sources that an IBM port of the Apache web server is delivered with WebSphere Application Server V.6. I'd like to know if that one can be obtained/installed without WAS but I Haven't been able to find reliable information about that. In any case, WAS is big enough that a little web server such as Apache can hide within it :-) And, of course, WAS is not only J2EE, that's only the business logic part of WAS. For the presentation logic portion of WAS you'll need a web server (if you want to run it on z/OS, for that matter). -- Ulrich Boche SVA GmbH, Germany IBM Premier Business Partner -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Newbie RACROUTE question: how to *test* authorization?
> -Original Message- > From: IBM Mainframe Discussion List On Behalf Of Shmuel Metz (Seymour J.) > > In <[EMAIL PROTECTED]>, on 02/23/2008 >at 10:07 AM, Walt Farrell said: > > >One could argue that letting you determine your access to resources > >without actually trying to use them (and thus without causing audit > >records) is a form of hacking. > > Perhaps, but some IBM code does exactly that, and for what > seems to be good cause. I don't recall the details, but it > was discussed here in the last few years. CICS offers the EXEC CICS QUERY SECURITY command as a supported API. -jc- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: Is IBM/Tivoli turning into CA?
On Fri, 22 Feb 2008 10:34:52 -0500, Joseph H Winterton <[EMAIL PROTECTED]> wrote: >... >IBM did not publish new customization and configuration information for >V550 due to the small amount of change from V520 to V550 in this area. Doc >is available at this link: >http://publib.boulder.ibm.com/infocenter/tivihelp/v15r1/index.jsp?toc, >including backlevel doc for reference purposes. However for the next >product release, there will be new and updated doc for the Classic >interface and configuration doc appropriately titled to the release. ... I think it's important to note that it is not just the doc that prompts customers to find alternate products. On the good side, there are Omegamon project managers attending SHARE that are aware of this thread and are interested in getting specific information. Any significant results coming from their interest will be a long time coming, but I suggest you get in touch with your (mythical?) local IBM rep to see if your complaints can get known. I definitely think that submitting . Requirements is not the way to go in cases like this. Pat O'Keefe -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 256 bytes again
In a message dated 2/25/2008 1:52:25 A.M. Central Standard Time, [EMAIL PROTECTED] writes: >No. First - when you calculate number of blocks, you have to take into consideration many physical aspects of data storing, like Count field, gaps, data cell size, data cell existence, track size, R0, etc. I don't know TRKALC The hardware engineers who invent the new type of disk track, decide what its length will be, determine the size of the various gaps, produce the control unit microcode to implement and enforce these decisions, etc., provide a set of constants that can be plugged into generic formulas that are used by TRKCALC to calculate the effective size on the track of a new "record" (also called "block" by some) on that track and/or how many exactly like that will fit on the track. These constants are made available to the operating system by returning them in response to the Read Device Characteristics CCW command code, and the format of these constants is documented in the various control unit reference books. The operating system reads the device characteristics data when a DASD device is varied online. Also some of these constants are stored in the Format 4 DSCB (keyed record overhead, e.g.). The Format 4 DSCB also contains the number of DSCBs per track and the number of PDS directory blocks per track. These two values were computed based on the constants found in the device characteristics data. Typically, programmers do not need to concern themselves with these constants nor with the formulas for computing the effective size on the track of a block with key length X and data length Y. The formula has grown increasingly convoluted (my opinion) over the years as new device types have been devised. All a programmer usually needs to do is to set up the parameter list correctly and invoke the TRKCALC service. One way to see how many directory blocks fit on a track is to dump the Format 4 DSCB with AMASPZAP. Another way is to allocate a PDS with a large number of directory blocks and do an AMASPZAP dump of the first few tracks of the data set. You can then vary downwards the number of directory blocks to be allocated and see if there is also room on the track for an EOF record after the end of the directory or not, if you are interested in that. The bottom line is that a PDS directory block has had a constant key length of 8 and data area of 256 since day one of Version 1 of OS/360 back in the mid-1960s. The only variable has been how many fit on a track of each different DASD device type. The guy who precipitated all this extra discussion was trying to get the thread oriented to remembering that the key length must be considered when determining how many blocks will fit on the track. At least I think that was his intent. I also don't think that the thread had gone astray in that area, so I believe that this whole extra detailed discussion has been unnecessary and a molehill has been turned into a Mount Everest. The fact that two different IBM books describe the same entity or concept with slightly different terms does not necessarily mean that either of the books is incorrect. It means that they were written by different people, or perhaps by the same person at different times. Hardware-oriented people typically speak of a CKD thing that is recorded on a DASD track as a "record", whereas software-oriented people typically speak of that same thing as a "block". The term "block size" might be used by some in certain contexts to mean only the length of the data field of the CKD thing, or it might be used by some other people (or even by those same people in a different context) to mean the effective size on the track of the entire CKD thing, which would include the count field, the gap after the count field, the key field (if any), the gap after the key field (only present if there is a key field), the data field (if any), and the gap after the data field. So you are correct that the "block size" is 256. And that guy is also correct in saying that the "block size" is not 256. Both of you were thinking of different contexts when using the words "block" and "size". The "Using Data Sets" book says "PDS member entries ... are blocked into 256-byte blocks." If that is the only context you care about, then the block size is 256. But on that same page in the book is a diagram showing that the "PDS Directory Block" (the title of the diagram) has a count field and also an 8-byte key. So, according to this diagram, the key is part of the directory "block". When you allocate a new PDS, you specify the number of directory "blocks", and each such block, when written on the track, has an 8-byte key field in it. The term "block size" is used throughout many IBM books to mean only the length of the data field of a DASD CKD thing. But underlying all allo
ACBUSER
Has anyone ever encountered use of (or indeed had cause to use) the ACBUSER field in a VSAM ACB? Just curious. Mike Kerford-Byrnes No virus found in this outgoing message. Checked by AVG Free Edition. Version: 7.5.516 / Virus Database: 269.21.0/1296 - Release Date: 24/02/2008 12:19 -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
SMS : WILD CARD USE IN FILTLIST
Hallo All, Can I use the following wild card attribute in a SMS FILTLIST: AM2.DE%*.HESD.SOR%*.** In the case of DE%* I would like to trap any numeric value (0 to 9) which follose DE. In the case if SOR%* I would like again to trap any numeric (0 to 9) after SOR. This would save a log of lines of code. If this will not work could you please suggest something else that I could try? Thanks - Get the name you always wanted with the new y7mail email address. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
256 byte durectory Size
analyzing log provide a autodiscover Setup a metmeeting no more -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: WD4Z log and trace analyzer
Hi In the WebShpere developer for system Z, there is a number samples for SYSLOG JOBLOG CTRACE etc (ascii text files) , and defined adapters to import this log's. Till no the imported log's and traces are not very nice in the log viewer Miklos Szigetvari wrote: Hi If someone has some experience with the WebSphere Developer for system Z I see in the LOG import, that I can import SYSTEM trace GTF or component trace etc etc, but I don't know how. -- Miklos Szigetvari Development Team ISIS Information Systems Gmbh tel: (+43) 2236 27551 570 Fax: (+43) 2236 21081 E-mail: [EMAIL PROTECTED] Info: [EMAIL PROTECTED] Hotline: +43-2236-27551-111 Visit our Website: http://www.isis-papyrus.com --- This e-mail is only intended for the recipient and not legally binding. Unauthorised use, publication, reproduction or disclosure of the content of this e-mail is not permitted. This email has been checked for known viruses, but ISIS accepts no responsibility for malicious or inappropriate content. --- -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Re: 256 bytes again
On 2/24/08, R.S. <[EMAIL PROTECTED]> wrote: > > Disclaimer: maybe it's boring, but at least it is on-topic. Apologize > for pedantry. > > I just thought about 256 bytes as PDS directory block size. > It was commented as wrong value. > However the same value is mentioned in IBM documentation. OK, > documenation can be wrong (recently I submitted RCF for ugly errror in > RDF description of "Using Data Sets"). > However ...it's not. The documentation is correct. Sorry, the pedantry remark wasn't aimed at you. BTW I agree with you that 256 bytes is the correct value. Jim McAlpine -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html
Creating AWSTAPEs on MVS
Hi, We currently send physical 3480's to an external customer. The customer has asked if we could send them the tapes as AWStape files. They are evaluating a product called VTA (Virtual Tape Appliance) from a company called Universal Software. I've looked at CBT file 533, but I'm not sure which program to use. What program would i use to convert a physical 3480 to an AWSTape file that can be used by VTA. TIA Gadi -- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html