Re: TRANS13 , IND$FILE and CA-TPX

2008-12-05 Thread Imler, Steven J
Mike,

 

I just hopped on to TPX (I normally don't go through TPX to access z/VM
... only things that run on z/OS under CICS) and tried a file transfer
here ... it worked without any problem.

 

My emulator sessions is set to 3279-4E ...

 

TPX says:

 

Terminal - A55T2627

Model- 3192-4A

 

Unfortunately at this time I don't know what VTAM logmode is being used.

 

 

JR (Steven) Imler

CA

Senior Sustaining Engineer

Tel: +1 703 708 3479

[EMAIL PROTECTED]

 

 

 

From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Horlick, Michael
Sent: Friday, December 05, 2008 03:18 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: TRANS13 , IND$FILE and CA-TPX

 

Hello Alan et all,

 

Just a little update. I created a 24 record file with 1234567890
repeated for 80 characters and asked the client to test.  

 

This time he says the file transfer doesn't issue messages but also
doesn't upload the file to the host. It completes but the CMS file is
not there.

 

Again, this only happens with the combination of CA-TPX and TCP/IP for
VM. When he tries with CA-TPX and SNA it works. The same settings for
the emulator (same size screen, etc...)

 

How could the same 3270 datastream cause this? 

 

They have their terminal set up as a model 5 

 

My only thought is that it must be how the device appears to VM/VTAM.
For SNA, it is a remote device. When he is on SNA and  TPX and I display
the user I see:

 

Termid:  TX262144

Model:   PC92-5AG

Logmode: SNX32705

 

I have no idea where it gets that PC92-5AG model info from. Would you or
anyone else know?

 

Then when he creates a virtual terminal session on TPX he gets:

 

SessionApplidStatus VTermid--Status
Flags---Appl.Logmode

VM2VM<== ACTIVE TPXGR052    400010C1
T3278M2E 

 

This application logmode of T3278M2E is a CA-TPX one and when I do a 'CP
Q' on his CMS user I see him on TPXGR052. 

 

For TCP/IP for VM, there is a DIAL VTAM and I set the DLOGMOD to
D4B3290.

 

I think I have tried different DLOGMOD's (NSX32705) and even asked them
to configure as a Model 2 but still no go.

 

The SNA DLOG of SNX32705 looks like this:

 

SNX32705 MODEENT LOGMODE=SNX32705,FMPROF=X'03',TSPROF=X'03', 

   PRIPROT=X'B1',SECPROT=X'90',COMPROT=X'3080',  

   RUSIZES=X'87F8',  

   PSERVIC=X'028018501B847F00'   

 

I'm not much of a VTAM maven. Is there anything in that macro related to
file transfer?

 

Is there something I can use to replace IND$FILE with? I suggested
native VM (whick works) and also ftp (but that's a hassle with write
access to their A-disk) but they prefer the way they always work (but
just with TCP/IP).

 

Wednesday, I'll be visiting the client and be screwing around with
DLOGMOD's etc...

 

Regards,

 

Mike

 

   

 

 



Re: SMSG Authorization

2008-12-05 Thread Howard Rifkind
Thanks all,
 
Yes, my manager doesn't want the operators to get into this so it has
to be all hands on.
 
I got something like you are talking about here now working.

>>> Ed Zell <[EMAIL PROTECTED]> 12/5/2008 12:41 PM >>>

Howard,

   Are you by chance trying to run your EREP stuff without actually
logging on
   to the virtual machine?   If so, you might want to look at   CP
SEND

   I haven’t tried it so I might be all wet, but I think you could

SEND CP EREP EXT
SEND EREP END
SEND EREP EXEC RUNEREP

   or something similar to this.  You might need to be authorized as a
secondary
   console, I can’t remember for sure.  

Ed Zell
Illinois Mutual Life
(309) 636-0107
 


From:The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Friday, December 05, 2008 11:27 AM
To: IBMVM@LISTSERV.UARK.EDU 
Subject: SMSG Authorization

 

I'm trying to SMSG the EREP guest and although I have set SMSG on the
command comes back stating that the EREP guest isn't authorized.

 

Is there anyway around this to get EREP authorized for SMSG?

 

Will IUCV do it? so I can get EREP to execute a REXX exec from a
command issued from a different virtual machine guest.

 

Thanks.

 
Confidentiality:  This e-mail (including any attachments) may contain
confidential, proprietary and privileged information, and unauthorized
disclosure or use is prohibited.  If you receive this e-mail in error,
please notify the sender and delete this e-mail from your system.
_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.


Re: TRANS13 , IND$FILE and CA-TPX

2008-12-05 Thread Edward M Martin
Hello Micheal,

 

 TCP/IP to z/VM and IND$FILE works with a 40/140 connection using
PCOM 5.6.

 

 Do you have to dial to VTAM?   

 

Ed Martin

Aultman Health Foundation

330-588-4723

ext 40441



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Horlick, Michael
Sent: Friday, December 05, 2008 3:18 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: TRANS13 , IND$FILE and CA-TPX

 

Hello Alan et all,

 

Just a little update. I created a 24 record file with 1234567890
repeated for 80 characters and asked the client to test.  

 

This time he says the file transfer doesn't issue messages but also
doesn't upload the file to the host. It completes but the CMS file is
not there.

 

Again, this only happens with the combination of CA-TPX and TCP/IP for
VM. When he tries with CA-TPX and SNA it works. The same settings for
the emulator (same size screen, etc...)

 

How could the same 3270 datastream cause this? 

 

They have their terminal set up as a model 5 

 

My only thought is that it must be how the device appears to VM/VTAM.
For SNA, it is a remote device. When he is on SNA and  TPX and I display
the user I see:

 

Termid:  TX262144

Model:   PC92-5AG

Logmode: SNX32705

 

I have no idea where it gets that PC92-5AG model info from. Would you or
anyone else know?

 

Then when he creates a virtual terminal session on TPX he gets:

 

SessionApplidStatus VTermid--Status
Flags---Appl.Logmode

VM2VM<== ACTIVE TPXGR052    400010C1
T3278M2E 

 

This application logmode of T3278M2E is a CA-TPX one and when I do a 'CP
Q' on his CMS user I see him on TPXGR052. 

 

For TCP/IP for VM, there is a DIAL VTAM and I set the DLOGMOD to
D4B3290.

 

I think I have tried different DLOGMOD's (NSX32705) and even asked them
to configure as a Model 2 but still no go.

 

The SNA DLOG of SNX32705 looks like this:

 

SNX32705 MODEENT LOGMODE=SNX32705,FMPROF=X'03',TSPROF=X'03', 

   PRIPROT=X'B1',SECPROT=X'90',COMPROT=X'3080',  

   RUSIZES=X'87F8',  

   PSERVIC=X'028018501B847F00'   

 

I'm not much of a VTAM maven. Is there anything in that macro related to
file transfer?

 

Is there something I can use to replace IND$FILE with? I suggested
native VM (whick works) and also ftp (but that's a hassle with write
access to their A-disk) but they prefer the way they always work (but
just with TCP/IP).

 

Wednesday, I'll be visiting the client and be screwing around with
DLOGMOD's etc...

 

Regards,

 

Mike

 

   

 

 



Re: perfsvm and reports

2008-12-05 Thread Wilson, Roger
 

Guess I have to locate the subcommands associated with the different
reports.



Re: perfsvm and reports

2008-12-05 Thread Michael Donovan
Roger,

If you are using Performance Toolkit for 5.3.0 or 5.4.0, all the reports
are listed in Chapter 2 of the "Performance Toolkit Reference".  If you are
using Performance Toolkit for 5.2.0, then all the documentation appears in
the book "Performance Toolkit".

 If a given report has a command to match the number, the command appears
at the end of a section heading.   For example, you will see the section
heading

FCX103, Storage Utilization Screen - STORAGE

This tells you that to get report FCX103, issue the subcommand STORAGE from
MONITOR mode (or through VMC).

Cheers!
 Mike





   
 "Wilson, Roger"   
 <[EMAIL PROTECTED] 
 waukee.gov>To 
 Sent by: The IBM  IBMVM@LISTSERV.UARK.EDU 
 z/VM Operating cc 
 System
 <[EMAIL PROTECTED] Subject 
 ARK.EDU>  Re: perfsvm and reports 
   
   
 12/05/2008 04:11  
 PM
   
   
 Please respond to 
   The IBM z/VM
 Operating System  
 <[EMAIL PROTECTED] 
 ARK.EDU>  
   
   




I’ve been going through the manual and cant find the names.

Are there examples?

Sincerely,

Roger Wilson


From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Kris Buelens
Sent: Friday, December 05, 2008 3:08 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: perfsvm and reports

The Perfkit manual lists all reports you can query.
2008/12/5 Roger Wilson <[EMAIL PROTECTED]>
Im attempting to write  some simple rexx execs to perform a
pipe command to PERFSVM to retrieve some reports
Is there a list of reports that I can pulg into the exec?

'PIPE VMC ' WHERE ' CPU',
' | stem results. ',
' | > FCX100 RESULTS A'



--
Kris Buelens,
IBM Belgium, VM customer support

Re: perfsvm and reports

2008-12-05 Thread Wilson, Roger
I've been going through the manual and cant find the names.

 

Are there examples?

 

Sincerely,

 

Roger Wilson

 



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Kris Buelens
Sent: Friday, December 05, 2008 3:08 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: perfsvm and reports

 

The Perfkit manual lists all reports you can query.

2008/12/5 Roger Wilson <[EMAIL PROTECTED]>

Im attempting to write  some simple rexx execs to perform a
pipe command to PERFSVM to retrieve some reports
Is there a list of reports that I can pulg into the exec?

'PIPE VMC ' WHERE ' CPU',
' | stem results. ',
' | > FCX100 RESULTS A'




-- 
Kris Buelens,
IBM Belgium, VM customer support



Re: TRANS13 , IND$FILE and CA-TPX

2008-12-05 Thread Alan Altmark
On Friday, 12/05/2008 at 03:20 EST, "Horlick, Michael" 
<[EMAIL PROTECTED]> wrote:

> I think I have tried different DLOGMOD's (NSX32705) and even asked them 
to 
> configure as a Model 2 but still no go.

I would use D4A3290 to talk to an emulator in an SNA network, but that's 
just me.  The days of needing logmodes that explicitly described the model 
were interesting when there were devices at the other end that would obey 
them.  They don't.  Further, the explicit logmode prevents the host from 
issuing a QUERY.  What this means in the context of CA-TPX, I don't know.

With VM/VTAM in place, CA-TPX app will simply create an LU2 session to 
VSCS on VM.  It doesn't manipulate the data travelling back and forth, but 
simply acts as a proxy between the two LU-LU sessions.  (VM-CA:TPX and 
CA:TPX-workstation)

To use TN3270, CA-TPX has an LU2-TN3270 translator built into it.  It must 
extract the 3270 data stream from one end and repackage it for sending to 
the other.  This means that CA-TPX itself it the telnet client and is 
simply getting the data stream from the SNA 3270 emulator.  But CA-TPX is 
responsible to connect to the VM telnet server and negotiate the TN3270 
session.  This includes any TN3270E issues.

So, while the *emulator* may be sending the same things, CA-TPX may not. 
You need to compare the 3270 data stream that CA-TPX is sending to and 
receiving from VM.  (Getting the trace from CA-TPX is probably best.)

Alan Altmark
z/VM Development
IBM Endicott


Re: perfsvm and reports

2008-12-05 Thread Kris Buelens
The Perfkit manual lists all reports you can query.

2008/12/5 Roger Wilson <[EMAIL PROTECTED]>

> Im attempting to write  some simple rexx execs to perform a
> pipe command to PERFSVM to retrieve some reports
> Is there a list of reports that I can pulg into the exec?
>
> 'PIPE VMC ' WHERE ' CPU',
> ' | stem results. ',
> ' | > FCX100 RESULTS A'
>



-- 
Kris Buelens,
IBM Belgium, VM customer support


Re: Starting an exec on a remote machine

2008-12-05 Thread O'Brien, Dennis L
CA ARCServe Backup for Mainframe Linux works with VM:Tape, but not
VM:Backup.  I'm not allowed to endorse products (or unendorse them?).  I
can say that we don't use the product.

A reliable product that works with VM:Backup would at least get looked
at here.  Our current plan is to back z/VM up with VM:Backup, and back
Linux guests up with the same product that we use for midrange Linux.

   Dennis 

"We have awakened a sleeping giant, and we have instilled in him a
terrible resolve."  -- Admiral Yamamoto, following the attack on Pearl
Harbor

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Marcy Cortes
Sent: Thursday, December 04, 2008 17:33
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: [IBMVM] Starting an exec on a remote machine

>Personally, I'd like that product to work hand-in-hand with our
existing VM:Backup product which we z/VM'ers control on our own.
(Anyone at CA listening)

Yes, what he said!



Marcy 

"This message may contain confidential and/or privileged information. If
you are not the addressee or authorized to receive this for the
addressee, you must not use, copy, disclose, or take any action based on
this message or any information herein. If you have received this
message in error, please advise the sender immediately by reply e-mail
and delete this message. Thank you for your cooperation."


perfsvm and reports

2008-12-05 Thread Roger Wilson
Im attempting to write  some simple rexx execs to perform a 
pipe command to PERFSVM to retrieve some reports
Is there a list of reports that I can pulg into the exec?

'PIPE VMC ' WHERE ' CPU',
  
' | stem results. ',  
 
' | > FCX100 RESULTS A' 
   


Re: TRANS13 , IND$FILE and CA-TPX

2008-12-05 Thread Fred Hoffman
To all,
 
Some time ago I had a mysterious problem dealing with IND$FILE with symptoms 
similar to what you are having, although, mine was with CICS also.  The problem 
that I encountered was with a getmain for storage to build additional messages. 
 It turned out that the getmain was for 0 bytes and that wouldn't work.  I had 
the source at the
time and inserted my own check for 0 bytes and bypassed the getmain which 
allowed it to go to EOJ.  I don't know whether this is the same, but that 
problem exhibited no symptoms at all and it was just plain luck that I found 
the error.  I don't know if this is germane to the subject, but it was an 
undiscovered bug with the product.  Even
though it's been around a long time, you may be encountering a problem that 
heretofore has gone unreported.
 
Just trying to help.
 
Fred Hoffman

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] Behalf Of 
Horlick, Michael
Sent: Friday, December 05, 2008 2:18 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: TRANS13 , IND$FILE and CA-TPX



Hello Alan et all,

 

Just a little update. I created a 24 record file with 1234567890 repeated for 
80 characters and asked the client to test.  

 

This time he says the file transfer doesn't issue messages but also doesn't 
upload the file to the host. It completes but the CMS file is not there.

 

Again, this only happens with the combination of CA-TPX and TCP/IP for VM. When 
he tries with CA-TPX and SNA it works. The same settings for the emulator (same 
size screen, etc...)

 

How could the same 3270 datastream cause this? 

 

They have their terminal set up as a model 5 

 

My only thought is that it must be how the device appears to VM/VTAM. For SNA, 
it is a remote device. When he is on SNA and  TPX and I display the user I see:

 

Termid:  TX262144

Model:   PC92-5AG

Logmode: SNX32705

 

I have no idea where it gets that PC92-5AG model info from. Would you or anyone 
else know?

 

Then when he creates a virtual terminal session on TPX he gets:

 

SessionApplidStatus VTermid--Status Flags---Appl.Logmode

VM2VM<== ACTIVE TPXGR052    400010C1   T3278M2E 

 

This application logmode of T3278M2E is a CA-TPX one and when I do a 'CP Q' on 
his CMS user I see him on TPXGR052. 

 

For TCP/IP for VM, there is a DIAL VTAM and I set the DLOGMOD to D4B3290.

 

I think I have tried different DLOGMOD's (NSX32705) and even asked them to 
configure as a Model 2 but still no go.

 

The SNA DLOG of SNX32705 looks like this:

 

SNX32705 MODEENT LOGMODE=SNX32705,FMPROF=X'03',TSPROF=X'03', 

   PRIPROT=X'B1',SECPROT=X'90',COMPROT=X'3080',  

   RUSIZES=X'87F8',  

   PSERVIC=X'028018501B847F00'   

 

I'm not much of a VTAM maven. Is there anything in that macro related to file 
transfer?

 

Is there something I can use to replace IND$FILE with? I suggested native VM 
(whick works) and also ftp (but that's a hassle with write access to their 
A-disk) but they prefer the way they always work (but just with TCP/IP).

 

Wednesday, I'll be visiting the client and be screwing around with DLOGMOD's 
etc...

 

Regards,

 

Mike

 

   

 

 



Re: SMSG Authorization

2008-12-05 Thread Alan Altmark
On Friday, 12/05/2008 at 12:44 EST, "Huegel, Thomas" <[EMAIL PROTECTED]> 
wrote:
> I  think you are correct Rob, an application program (ie WAKEUP) must 
> establish  it's ability to receive SMSG's before anyone can send one. 
Just 
> setting SMSG ON  is not enough.

The message
  HCPMFS057I  not receiving; not authorized
can be misleading, though it's obvious once someone tells you the answer! 
The message description isn't overly helpful (and an RCF would be nice).

HCP057Iuserid not receiving; text 
Explanation:  The user ID specified in the MESSAGE, WARNING, MSGNOH, or 
SMSG
command is not receiving.  
 
text in this message identifies the reason why the user ID is not 
receiving.
  
TextExplanation of text  
: 
not authorized  The user is not authorized. 
:

It refers to the VMCF AUTHORIZE function (via diagnose 0x68) that must be 
issued by a server in order for users to send it SMSGs and it has SET SMSG 
ON.  VMCF AUTHORIZE is not required if the server has an IUCV connection 
to *MSG and has SET SMSG IUCV.

Alan Altmark
z/VM Development
IBM Endicott


Re: TRANS13 , IND$FILE and CA-TPX

2008-12-05 Thread Horlick, Michael
Hello Alan et all,

 

Just a little update. I created a 24 record file with 1234567890
repeated for 80 characters and asked the client to test.  

 

This time he says the file transfer doesn't issue messages but also
doesn't upload the file to the host. It completes but the CMS file is
not there.

 

Again, this only happens with the combination of CA-TPX and TCP/IP for
VM. When he tries with CA-TPX and SNA it works. The same settings for
the emulator (same size screen, etc...)

 

How could the same 3270 datastream cause this? 

 

They have their terminal set up as a model 5 

 

My only thought is that it must be how the device appears to VM/VTAM.
For SNA, it is a remote device. When he is on SNA and  TPX and I display
the user I see:

 

Termid:  TX262144

Model:   PC92-5AG

Logmode: SNX32705

 

I have no idea where it gets that PC92-5AG model info from. Would you or
anyone else know?

 

Then when he creates a virtual terminal session on TPX he gets:

 

SessionApplidStatus VTermid--Status
Flags---Appl.Logmode

VM2VM<== ACTIVE TPXGR052    400010C1
T3278M2E 

 

This application logmode of T3278M2E is a CA-TPX one and when I do a 'CP
Q' on his CMS user I see him on TPXGR052. 

 

For TCP/IP for VM, there is a DIAL VTAM and I set the DLOGMOD to
D4B3290.

 

I think I have tried different DLOGMOD's (NSX32705) and even asked them
to configure as a Model 2 but still no go.

 

The SNA DLOG of SNX32705 looks like this:

 

SNX32705 MODEENT LOGMODE=SNX32705,FMPROF=X'03',TSPROF=X'03', 

   PRIPROT=X'B1',SECPROT=X'90',COMPROT=X'3080',  

   RUSIZES=X'87F8',  

   PSERVIC=X'028018501B847F00'   

 

I'm not much of a VTAM maven. Is there anything in that macro related to
file transfer?

 

Is there something I can use to replace IND$FILE with? I suggested
native VM (whick works) and also ftp (but that's a hassle with write
access to their A-disk) but they prefer the way they always work (but
just with TCP/IP).

 

Wednesday, I'll be visiting the client and be screwing around with
DLOGMOD's etc...

 

Regards,

 

Mike

 

   

 

 



Re: SMSG Authorization

2008-12-05 Thread Kris Buelens
A class G user can only use CP SEND if he is secondary user of the
target virtual machine
A class C user can use SEND to any target, but he'll only see console
response when he is secondary user (or OBSERVER)

Newer is CP FOR:  "CP FOR EREP CMD some-CP-command"
But, as my sample indicates, FOR can only be used to send CP commands
to a target, and you'll get the response back.

SMSG is indeed to send a message a program that enables itself to get
SMSGs, what the program does with the message depends on the program.
It might interpret the message as a CP/CMS command, but it doesn't
have to.  WAKEUP is just a general program that amongst other things
can react to SMSGs.  But even WAKEUP doesn't execute SMSGs it gets as
commands, that depends on the REXX EXEC that uses WAKEUP.

2008/12/5 Ed Zell <[EMAIL PROTECTED]>:
> Howard,
>
>Are you by chance trying to run your EREP stuff without actually logging
> on
>to the virtual machine?   If so, you might want to look at   CP SEND
>
>I haven't tried it so I might be all wet, but I think you could
>
> SEND CP EREP EXT
> SEND EREP END
> SEND EREP EXEC RUNEREP
>
>or something similar to this.  You might need to be authorized as a
> secondary
>console, I can't remember for sure.
>
> Ed Zell
> Illinois Mutual Life
> (309) 636-0107
>
>
>
> 
>
> From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
> Behalf Of Howard Rifkind
> Sent: Friday, December 05, 2008 11:27 AM
> To: IBMVM@LISTSERV.UARK.EDU
> Subject: SMSG Authorization
>
>
>
> I'm trying to SMSG the EREP guest and although I have set SMSG on the
> command comes back stating that the EREP guest isn't authorized.
>
>
>
> Is there anyway around this to get EREP authorized for SMSG?
>
>
>
> Will IUCV do it? so I can get EREP to execute a REXX exec from a command
> issued from a different virtual machine guest.
>
>
>
> Thanks.
>
>
>
> Confidentiality:  This e-mail (including any attachments) may contain
> confidential, proprietary and privileged information, and unauthorized
> disclosure or use is prohibited.  If you receive this e-mail in error,
> please notify the sender and delete this e-mail from your system.



-- 
Kris Buelens,
IBM Belgium, VM customer support


Re: Back to the Future at IBM

2008-12-05 Thread Bill Munson
ohhh

nevermind





Mark Post <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
12/05/2008 02:49 PM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Re: Back to the Future at IBM






>>> On 12/5/2008 at  2:15 PM, Bill Munson <[EMAIL PROTECTED]> wrote: 
> http://online.wsj.com/article/SB122834959883677705.html
> 
> Applications running on a backroom server (maybe a Mainframe) 

As it turns out, no, it's not a mainframe.  This is an Intel/AMD 
architecture.  IBM is working with a number of Linux distribution 
providers on this, and they don't have mainframe products.


Mark Post



*** IMPORTANT
NOTE* The opinions expressed in this
message and/or any attachments are those of the author and not
necessarily those of Brown Brothers Harriman & Co., its
subsidiaries and affiliates ("BBH"). There is no guarantee that
this message is either private or confidential, and it may have
been altered by unauthorized sources without your or our knowledge.
Nothing in the message is capable or intended to create any legally
binding obligations on either party and it is not intended to
provide legal advice. BBH accepts no responsibility for loss or
damage from its use, including damage from virus.


Re: Back to the Future at IBM

2008-12-05 Thread Mark Post
>>> On 12/5/2008 at  2:15 PM, Bill Munson <[EMAIL PROTECTED]> wrote: 
> http://online.wsj.com/article/SB122834959883677705.html
> 
> Applications running on a backroom server (maybe a Mainframe) 

As it turns out, no, it's not a mainframe.  This is an Intel/AMD architecture.  
IBM is working with a number of Linux distribution providers on this, and they 
don't have mainframe products.


Mark Post


Back to the Future at IBM

2008-12-05 Thread Bill Munson
http://online.wsj.com/article/SB122834959883677705.html

Applications running on a backroom server (maybe a Mainframe) 
The Software package uses the LINUX operating system (FOCUS on VM, CICS on 
VSE or MVS come to mind?) 
Can be displayed on a Thin Client which does not have processing units or 
disk drives (like a Dumb Terminal)

The new "Virtual LINUX Desktop"


Bill Munson
Brown Brothers Harriman
Sr. z/VM Systems Programmer
201-418-7588

President MVMUA
http://www2.marist.edu/~mvmua/



*** IMPORTANT
NOTE* The opinions expressed in this
message and/or any attachments are those of the author and not
necessarily those of Brown Brothers Harriman & Co., its
subsidiaries and affiliates ("BBH"). There is no guarantee that
this message is either private or confidential, and it may have
been altered by unauthorized sources without your or our knowledge.
Nothing in the message is capable or intended to create any legally
binding obligations on either party and it is not intended to
provide legal advice. BBH accepts no responsibility for loss or
damage from its use, including damage from virus.


Re: SMTRAP Program

2008-12-05 Thread Mike Harding
The IBM z/VM Operating System  wrote on 
12/05/2008 10:16:33 AM:

> In researching an answer to another posting, I stumbled upon what I had 
o
> nce
> used to automate EREP. It is the SMTRAP MODULE that would be loaded in 
th
> e
> EREP PROFILE EXEC. It would establish the SMSG/IUVC waiting 
configuration
> 
> and would stop the EREP collection program when my VMUTIL server issued 
t
> he
> CP SMSG EREP END command. 
> 
> What I cannot find in my archives now, is the source for this nice 
little
> 
> program. Does anyone remember it?
> 
> /Tom Kern 

I believe I might be the guilty party.  I'll see if I can find it, wrote 
it a couple of jobs back.


SMTRAP Program

2008-12-05 Thread Thomas Kern
In researching an answer to another posting, I stumbled upon what I had o
nce
used to automate EREP. It is the SMTRAP MODULE that would be loaded in th
e
EREP PROFILE EXEC. It would establish the SMSG/IUVC waiting configuration

and would stop the EREP collection program when my VMUTIL server issued t
he
CP SMSG EREP END command. 
 
What I cannot find in my archives now, is the source for this nice little

program. Does anyone remember it?

/Tom Kern


Re: SMSG Authorization

2008-12-05 Thread Dave Jones

Howard,

in order for EREP to receive SMSG from any other user id, you must do the SET SMSG ON (or, 
for IUCV connections, SET SMSG IUCV) command on the EREP user id itself.


Howard Rifkind wrote:

I'm trying to SMSG the EREP guest and although I have set SMSG on the command 
comes
back stating that the EREP guest isn't authorized.

Is there anyway around this to get EREP authorized for SMSG?

Will IUCV do it? so I can get EREP to execute a REXX exec from a command issued 
from a
different virtual machine guest.

Thanks. _ LEGAL NOTICE Unless expressly stated otherwise, this 
message is
confidential and may be privileged. It is intended for the addressee(s) only. 
Access to
this E-mail by anyone else is unauthorized. If you are not an addressee, any 
disclosure
or copying of the contents of this E-mail or any action taken (or not taken) in 
reliance on it is unauthorized and may be unlawful. If you are not an addressee, please

inform the sender immediately, then delete this message and empty from your 
trash.



--
DJ

V/Soft
  z/VM and mainframe Linux expertise, training,
  consulting, and software development
www.vsoft-software.com


Re: Configuartion question

2008-12-05 Thread Martin, Terry R. (CMS/CTR) (CTR)
Hi Alan,

Yes, sorry it should have been EAL 5!

Thank You,
 
Terry Martin
Lockheed Martin - Information Technology
z/OS & z/VM Systems - Performance and Tuning
Cell - 443 632-4191
Work - 410 786-0386
[EMAIL PROTECTED]

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Friday, December 05, 2008 9:15 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Configuartion question

On Thursday, 12/04/2008 at 09:00 EST, "Martin, Terry R. (CMS/CTR) (CTR)"

<[EMAIL PROTECTED]> wrote:

> We are moving toward taking our POC into production. This workload is 
moving 
> from Solaris running UNIX. The environment is 3 zone architecture. Our

client?s 
> business requirements calls for this 3 zone environment to remain 
separated. It 
> requires UAL5 security level.

Did you mean Common Criteria EAL 5?  (I can't find any relevant
reference 
to "UAL".)  If you actually meant "UAL5", can you point me to a
reference?

Alan Altmark
z/VM Development
IBM Endicott


Re: SMSG Authorization

2008-12-05 Thread Huegel, Thomas
I think you are correct Rob, an application program (ie WAKEUP) must establish 
it's ability to receive SMSG's before anyone can send one. Just setting SMSG ON 
is not enough.

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] Behalf Of RPN01
Sent: Friday, December 05, 2008 11:34 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: SMSG Authorization


Wouldn't the EREP program actually have to be waiting and understand SMSG 
messages, otherwise, what do you expect it to do with the message once received?

Of course, I could be blowing smoke, and EREP does indeed have features to do 
this that I'm unaware of or have forgotten. (Getting old is such a pain...)

--
Robert P. Nix  Mayo Foundation.~.
RO-OE-5-55 200 First Street SW/V\
507-284-0844   Rochester, MN 55905  /( )\
-^^-^^
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 12/5/08 11:26 AM, "Howard Rifkind" <[EMAIL PROTECTED]> wrote:



I'm trying to SMSG the EREP guest and although I have set SMSG on the command 
comes back stating that the EREP guest isn't authorized.

Is there anyway around this to get EREP authorized for SMSG?

Will IUCV do it? so I can get EREP to execute a REXX exec from a command issued 
from a different virtual machine guest.

Thanks.



_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.








Re: SMSG Authorization

2008-12-05 Thread Ed Zell
Howard,

   Are you by chance trying to run your EREP stuff without actually
logging on
   to the virtual machine?   If so, you might want to look at   CP SEND

   I haven't tried it so I might be all wet, but I think you could

SEND CP EREP EXT
SEND EREP END
SEND EREP EXEC RUNEREP

   or something similar to this.  You might need to be authorized as a
secondary
   console, I can't remember for sure.  

Ed Zell
Illinois Mutual Life
(309) 636-0107

 



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Friday, December 05, 2008 11:27 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: SMSG Authorization

 

I'm trying to SMSG the EREP guest and although I have set SMSG on the
command comes back stating that the EREP guest isn't authorized.

 

Is there anyway around this to get EREP authorized for SMSG?

 

Will IUCV do it? so I can get EREP to execute a REXX exec from a command
issued from a different virtual machine guest.

 

Thanks.


.


CONFIDENTIALITY: This e-mail (including any attachments) may contain 
confidential, proprietary and privileged information, and unauthorized 
disclosure or use is prohibited.  If you receive this e-mail in error, notify 
the sender and delete this e-mail from your system.


Re: SMSG Authorization

2008-12-05 Thread RPN01
Wouldn¹t the EREP program actually have to be waiting and understand SMSG
messages, otherwise, what do you expect it to do with the message once
received?

Of course, I could be blowing smoke, and EREP does indeed have features to
do this that I¹m unaware of or have forgotten. (Getting old is such a
pain...)

-- 
Robert P. Nix  Mayo Foundation.~.
RO-OE-5-55 200 First Street SW/V\
507-284-0844   Rochester, MN 55905   /( )\
-^^-^^
"In theory, theory and practice are the same, but
 in practice, theory and practice are different."




On 12/5/08 11:26 AM, "Howard Rifkind" <[EMAIL PROTECTED]> wrote:

> I'm trying to SMSG the EREP guest and although I have set SMSG on the command
> comes back stating that the EREP guest isn't authorized.
>  
> Is there anyway around this to get EREP authorized for SMSG?
>  
> Will IUCV do it? so I can get EREP to execute a REXX exec from a command
> issued from a different virtual machine guest.
>  
> Thanks.
> 
> 
> 
> _
> LEGAL NOTICE
> Unless expressly stated otherwise, this message is confidential
> and may be privileged. It is intended for the addressee(s) only.
> Access to this E-mail by anyone else is unauthorized.
> If you are not an addressee, any disclosure or copying of the
> contents of this E-mail or any action taken (or not taken) in
> reliance on it is unauthorized and may be unlawful. If you are not an
> addressee, please inform the sender immediately, then delete this
> message and empty from your trash.
> 




Re: Configuartion question

2008-12-05 Thread Martin, Terry R. (CMS/CTR) (CTR)
Thanks Alan!

This is really what I was looking for. The customer has the EAL 5
requirement and is set up with this requirement in mind in the current
Solaris environment (Separate servers for each zone). So I guess
regardless of what we can do with VM in terms of running multiple guests
and such in this case we are bound by the requirement.

Thanks for all of the information from everyone I learned some other
interesting things from this!

As usual the LIST is a great reference for people like me and I
appreciate all who take the time to answer so thoughtfully! 

Thank You,
 
Terry Martin
Lockheed Martin - Information Technology
z/OS & z/VM Systems - Performance and Tuning
Cell - 443 632-4191
Work - 410 786-0386
[EMAIL PROTECTED]

-Original Message-
From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Alan Altmark
Sent: Friday, December 05, 2008 11:53 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Configuartion question

On Friday, 12/05/2008 at 08:34 EST, Rick Troth <[EMAIL PROTECTED]> wrote:

> You've already gotten great advice.
> I would add that you do NOT need to split your workload
> between the tiers or zones.  It was not completely clear to me,
> but it sounded like that was one of your expected LPAR splits.
> 
> 
> You can achieve isolation of the zones without having to run
> yet more VM partitions.  You DO want to partionally isolate your
> production and test/dev, but you don't need that added complexity
> to defend a multi-tier architecture.  VM insulates virtual machines
> nicely along zone boundaries.  HOWEVER, selling this to your
> directors, developers, and security people might be difficult.

(Assumption: Terry was actually referring to "EAL5" when he said "UAL5")

Only LPARs provide that level of separation.  EAL 5 is a reference to
the 
quantity and quality of evidence that IBM has provided to evaluators for

the separation of LPARs.  In the evaluated configuration, that means no 
HiperSockets, no shared chpids, and no dynamic I/O.

If, rather than discussing assurance levels, we move the discussion to 
capability, then, yes, z/VM is capable of separating the users.
However, 
the issue inevitably turns to enforcement.  (It has each time I have had

this same discussion with customers.)

That is, how do you ENFORCE the rule that you cannot connect the db
server 
directly to the Internet?  Or prevent the servers in tier 1 (Apache) to 
get to the inTRAnet?  The only answer I have found that will
consistently 
satisfy the Chief Security Weasel is one that says:

1. Dynamic I/O SHALL NOT be permitted to any z/VM or z/OS LPAR that is 
running workload.  I/O SHALL be managed from a separate partition.  The 
sysprogs may or may not have access to that partition, depending on the 
policy of Separation of Duties.  (E.g. Only "the hardware people" can 
change the hardware I/O config)

2. Internet traffic SHALL be on a separate cable (because it goes to a 
separate switch).  You SHALL NOT use VLANs to separate Internet and 
Intranet traffic.

3. All traffic between zones SHALL travel via a firewall that is under 
Network Security management control.  This will typically preclude the
use 
of IPtables on Linux and the use of HiperSockets for access to the 
database server.  It also means that for an the web server to talk to
the 
app server the traffic leaves the box, goes throught the firewall, and 
re-enters.  (If you feel faint, sit with your head between your knees. 
Breathe.  This is normal.  You'll be fine in a few minutes.)  It's ok.

4. Resource access (disks, users, spool, networks,...) SHALL be under
the 
control of a security subsystem that implements mandatory access
controls 
with security labels.  This is required to avoid accidental
authorization 
or collusion.  This establishes the controls needed to stop, for
example, 
User A (color code 'purple') and User B (color code 'mauve') from 
establishing any unauthorized communications path with each other (e.g. 
virtual CTC, IUCV, Guest LAN, VSWITCH, VMCF, shared DCSS, spool,
secuser, 
...)   Only users and resources of the same 'color' can be connected.
This 
mechanism (provided by RACF) has been certified on z/VM to EAL 4+.

5. The sysprog MAY (or may not!) be authorized to manage the security 
subsystem or the LPAR's settings in the HMC (based, again, on Separation

of Duties).

This is a subject I spoke on at the zExpo, and will be speaking about 
again at SHARE in March.  Look for "Security Zones on z/VM".

Alan Altmark
z/VM Development
IBM Endicott


SMSG Authorization

2008-12-05 Thread Howard Rifkind
I'm trying to SMSG the EREP guest and although I have set SMSG on the command 
comes back stating that the EREP guest isn't authorized.
 
Is there anyway around this to get EREP authorized for SMSG?
 
Will IUCV do it? so I can get EREP to execute a REXX exec from a command issued 
from a different virtual machine guest.
 
Thanks.
_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.


Re: EREP process question.

2008-12-05 Thread Schuh, Richard
Having LRECL change does not imply that every record will change to that
length. The LRECL of a V format file it the length of the longest record
written. There may be only one record of length 256 in your example.
 

Regards, 
Richard Schuh 

 

 




From: The IBM z/VM Operating System
[mailto:[EMAIL PROTECTED] On Behalf Of Ray Waters
Sent: Friday, December 05, 2008 5:37 AM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: EREP process question.



Howard,

Even if you clear the EREP file, or erase it, then once EREP
start accumulating data in XAEREPIO RECORD on his A disk, the records
are variable length and will start to grow in length.

For example, if I clear EREP, the max record size usually start
s out at 114, then will grow to Max of 256 in my shop.

Ray 





From: The IBM z/VM Operating System
[mailto:[EMAIL PROTECTED] On Behalf Of Howard Rifkind
Sent: Thursday, December 04, 2008 3:32 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: EREP process question.

 

I'm using the EREP parameter below to go against the z/VM EREP
machine.

 

The file XAEREPIO RECORD is out there and is some what larger
then yesterday.

 

Shouldn't the above file be deleted by these parameter?

 

SYSUM   
ACC=Y   
ZERO=Y  
ENDPARM 

 


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.

 




NOTICE:
This e-mail is intended solely for the use of the individual to
whom it is addressed and may contain information that is privileged,
confidential or otherwise exempt from disclosure. If the reader of this
e-mail is not the intended recipient or the employee or agent
responsible for delivering the message to the intended recipient, you
are hereby notified that any dissemination, distribution, or copying of
this communication is strictly prohibited. If you have received this
communication in error, please immediately notify us by replying to the
original message at the listed email address. Thank You.




Re: Configuartion question

2008-12-05 Thread Alan Altmark
On Friday, 12/05/2008 at 08:34 EST, Rick Troth <[EMAIL PROTECTED]> wrote:

> You've already gotten great advice.
> I would add that you do NOT need to split your workload
> between the tiers or zones.  It was not completely clear to me,
> but it sounded like that was one of your expected LPAR splits.
> 
> 
> You can achieve isolation of the zones without having to run
> yet more VM partitions.  You DO want to partionally isolate your
> production and test/dev, but you don't need that added complexity
> to defend a multi-tier architecture.  VM insulates virtual machines
> nicely along zone boundaries.  HOWEVER, selling this to your
> directors, developers, and security people might be difficult.

(Assumption: Terry was actually referring to "EAL5" when he said "UAL5")

Only LPARs provide that level of separation.  EAL 5 is a reference to the 
quantity and quality of evidence that IBM has provided to evaluators for 
the separation of LPARs.  In the evaluated configuration, that means no 
HiperSockets, no shared chpids, and no dynamic I/O.

If, rather than discussing assurance levels, we move the discussion to 
capability, then, yes, z/VM is capable of separating the users.  However, 
the issue inevitably turns to enforcement.  (It has each time I have had 
this same discussion with customers.)

That is, how do you ENFORCE the rule that you cannot connect the db server 
directly to the Internet?  Or prevent the servers in tier 1 (Apache) to 
get to the inTRAnet?  The only answer I have found that will consistently 
satisfy the Chief Security Weasel is one that says:

1. Dynamic I/O SHALL NOT be permitted to any z/VM or z/OS LPAR that is 
running workload.  I/O SHALL be managed from a separate partition.  The 
sysprogs may or may not have access to that partition, depending on the 
policy of Separation of Duties.  (E.g. Only "the hardware people" can 
change the hardware I/O config)

2. Internet traffic SHALL be on a separate cable (because it goes to a 
separate switch).  You SHALL NOT use VLANs to separate Internet and 
Intranet traffic.

3. All traffic between zones SHALL travel via a firewall that is under 
Network Security management control.  This will typically preclude the use 
of IPtables on Linux and the use of HiperSockets for access to the 
database server.  It also means that for an the web server to talk to the 
app server the traffic leaves the box, goes throught the firewall, and 
re-enters.  (If you feel faint, sit with your head between your knees. 
Breathe.  This is normal.  You'll be fine in a few minutes.)  It's ok.

4. Resource access (disks, users, spool, networks,...) SHALL be under the 
control of a security subsystem that implements mandatory access controls 
with security labels.  This is required to avoid accidental authorization 
or collusion.  This establishes the controls needed to stop, for example, 
User A (color code 'purple') and User B (color code 'mauve') from 
establishing any unauthorized communications path with each other (e.g. 
virtual CTC, IUCV, Guest LAN, VSWITCH, VMCF, shared DCSS, spool, secuser, 
...)   Only users and resources of the same 'color' can be connected. This 
mechanism (provided by RACF) has been certified on z/VM to EAL 4+.

5. The sysprog MAY (or may not!) be authorized to manage the security 
subsystem or the LPAR's settings in the HMC (based, again, on Separation 
of Duties).

This is a subject I spoke on at the zExpo, and will be speaking about 
again at SHARE in March.  Look for "Security Zones on z/VM".

Alan Altmark
z/VM Development
IBM Endicott


Re: Starting an exec on a remote machine

2008-12-05 Thread Dave Jones
Kris, the QDEMO/QCLIENT/QSERVER demo package of Brian's can be downloaded off of his VM 
web page here:


http://www.vm.ibm.com/devpages/BKW/

Look for the IPCSAMP package.

BTW, that's an intriguing idea to use CMS multitaskings queues as the transport 
mechanism


Kris Buelens wrote:

One could also use the CMS Multitasking queues as mechanism.  For the
exec logic itself it would be transparent if the both users are on
different systems or not.
For cross-system, non SNA, support this would be required:
  TCP/IP line driver for CMS distributed queues.
  http://www.vm.ibm.com/download/packages/descript.cgi?TLD
Instead of sockets, one'd code things like at the client:
 call csl 'QueueOpen mtrc mtre qn qnl sv svl qh el'
 
 call csl 'QueueSend mtrc mtre qh cmscmd cmdlen ko kl'
and at the server;
 call csl 'QueueCreate mtrc mtre qn qnl vm_ipc_nlevel qh'
 
 call csl 'QueueReceiveBlock mtrc mtre qh ',
  'matchkey matchkeylen timeout ',
  'cmscmd rcvbuflen cmdlen ',
  'ko kl suid spid rt'

I've got a QDEMO/QCLIENT/QSERVER example created by Brian Wade that
sends a CMS command for execution, but I no longer remember where I
got them from. I can send them.

2008/12/5 Rempel, Horst <[EMAIL PROTECTED]>:

Hello Howard,
I use execa in usera that will start an execb in cms-userb or a shellscript
in Linux.
When you do it in a pipe the execa will wait until the end of execb (or
shellscript) before continuing.
The pipe will write the output of execb in a file.
So execa can continue depending on the content of this file.

|
 'pipe cms rexec ...   !',
   'console !',
   '>> 'remote_exec' output a'
|

This logic works well for me every night.
If execb is a long running exec its possible that you have to code a timeout
for rexec.
But plan carefully ! REXEC can be a security risk !
I do it in a completly isolated network.

Von: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] Im
Auftrag von Howard Rifkind
Gesendet: Freitag, 5. Dezember 2008 00:52
An: IBMVM@LISTSERV.UARK.EDU
Betreff: Starting an exec on a remote machine

I'm running exec X on cms user 'A'

I exec X has to start exec Y running on cms user 'B' and after exec Y
terminates it has to return control to the exec on cms user 'A'

I could use some suggestions as to the best way to do this.

Thanks


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.







--
DJ

V/Soft
  z/VM and mainframe Linux expertise, training,
  consulting, and software development
www.vsoft-software.com


Re: Starting an exec on a remote machine

2008-12-05 Thread Howard Rifkind
Thanks Alan,
 
After spending some time last night I found some processess, like you suggest 
below, which are run daily on our system to drag output from z/VM Rexx execs 
over to z/OS.
 
Thanks again...

>>> Alan Altmark <[EMAIL PROTECTED]> 12/5/2008 9:34 AM >>>
On Thursday, 12/04/2008 at 06:54 EST, Howard Rifkind 
<[EMAIL PROTECTED]> wrote:
> I'm running exec X on cms user 'A' 
>  
> I exec X has to start exec Y running on cms user 'B' and after exec Y 
> terminates it has to return control to the exec on cms user 'A'
>  
> I could use some suggestions as to the best way to do this.

If you're on the same VM system, REXEC is the best way to do that, 
assuming that user 'B' is not already logged on.  REXEC has all the 
function to autolog a user, run a command, watch the console for output, 
send the output back to user A (as output from the 'rexec' command, 
trappable by a Pipe), and then logoff the user B.  Use LOGON BY support so 
that User A doesn't have to know User B's password, just his own.  (You 
can't do it using rexec without authentication.  Well, you can, but then 
anyone could run the program in User B, not just User A.)

If you're not on the same system, life gets more difficult since rexec 
isn't appropriate for open network connections as it isn't encrypted.  One 
might be tempted to rexec into a local Linux guest that uses ssh to reach 
the remote system and use rexec over there, piping the response all the 
way back to you.

This all assumes you're not wanting to write a remote execution solution 
yourself. If you do, just remember that you will need some sort of 
authentication and authorization.

Alan Altmark
z/VM Development
IBM Endicott

_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.


Re: EREP process question.

2008-12-05 Thread Howard Rifkind
Thanks Ed.

>>> Ed Zell <[EMAIL PROTECTED]> 12/5/2008 8:31 AM >>>

Hi Howard,

  That file is just a “print header” file that we use to separate the
reports.  Since
  I use ‘CP SPOOL PRT CONT’ everything comes out in one spool file.  I
wanted 
  some kind of header to show me where one ended and the next began. 
You
  can either remove these lines, or create file with those names for
separator
  pages.


 ' PRINT SYSEXN RPT-HDR (CC'   
 ' PRINT SUMMARY  RPT-HDR (CC '  
 ' PRINT CLEARIT  RPT-HDR (CC '
 
   

  Here is what one of them looks like:



1  
  
 *
 **   
**
 **   
**
 **  SYSTEM EXCEPTION REPORT  **
 **   
**
 **   
**
 **


Ed Zell
Illinois Mutual Life
(309) 636-0107




From:The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Thursday, December 04, 2008 5:19 PM
To: IBMVM@LISTSERV.UARK.EDU 
Subject: Re: EREP process question.

 

Ed, Once again thanks,

 

The RUNEREP exec, when it gets to the following statement:

 

'PRINT SYSEXN RPT-HDR (CC'

states that it can't find file SYSEXN RPT-HDR 

 

Is this really a separate file or something else.

 

If separate could you forward a sample of the file.

 

 

Thanks


>>> Ed Zell <[EMAIL PROTECTED]> 12/4/2008 4:55 PM >>>

Howard,

Here is how we process EREP.

   Operator logs on to EREP and issues#CP EXTand then responds 
  END   to the prompt.

   Operator types   RUNEREP   to fire up the EXEC to process the data
and then clear it out

   After it runs, Operator typesPROFILE   to start EREP back up
again and then  #CP DISC

  

/* RUNEREP EXEC   PROCESS EREP DATA */
' ACC 201 C/A'
‘ CP SPOOL PRINTER TO SPOOLER CLASS Z NOHOLD CONT' 
' PRINT SYSEXN RPT-HDR (CC'
' EXEC SYSEXN   '  
' PRINT SUMMARY  RPT-HDR (CC ' 
' EXEC SUMMARY  '  
' PRINT CLEARIT  RPT-HDR (CC ' 
' EXEC CLEARIT'
' CP SPOOL PRINTER CLOSE NAME EREP 12345'  
‘ REL C’


/*  SYSEXN EXEC  SYSTEM EXCEPTION REPORT  */ 
MAKEBUF 
QUEUE 'SYSEXN,TABSIZE=512K,ACC=N  ' 
QUEUE   
'CPEREP'


/* SUMMARY EXEC   PRODUCE SUMMARY REPORT  */
MAKEBUF 
QUEUE 'PRINT=SU,ACC=N,TABSIZE=100K,LINECT=60 '  
QUEUE   
'CPEREP'


/* CLEARIT EXECCLEAR OUT THE FILE  */
MAKEBUF   
QUEUE 'PRINT=AL,ACC=N,TABSIZE=100K,LINECT=60,ZERO=Y ' 
QUEUE 
'CPEREP'  



Ed Zell
Illinois Mutual Life
(309) 636-0107





From:The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Thursday, December 04, 2008 3:32 PM
To: IBMVM@LISTSERV.UARK.EDU 
Subject: EREP process question.

 

I'm using the EREP parameter below to go against the z/VM EREP
machine.

 

The file XAEREPIO RECORD is out there and is some what larger then
yesterday.

 

Shouldn't the above file be deleted by these parameter?

 

SYSUM   
ACC=Y   
ZERO=Y  
ENDPARM 

 


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.

 

 
Confidentiality:  This e-mail (including any attachments) may contain
confidential, proprietary and privileged information, and unauthorized
disclosure or use is prohibited.  If you receive this e-mail in error,
please notify the sender and delete this e-mail from your system.
 


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlaw

Re: Starting an exec on a remote machine

2008-12-05 Thread Alan Altmark
On Thursday, 12/04/2008 at 06:54 EST, Howard Rifkind 
<[EMAIL PROTECTED]> wrote:
> I'm running exec X on cms user 'A' 
>  
> I exec X has to start exec Y running on cms user 'B' and after exec Y 
> terminates it has to return control to the exec on cms user 'A'
>  
> I could use some suggestions as to the best way to do this.

If you're on the same VM system, REXEC is the best way to do that, 
assuming that user 'B' is not already logged on.  REXEC has all the 
function to autolog a user, run a command, watch the console for output, 
send the output back to user A (as output from the 'rexec' command, 
trappable by a Pipe), and then logoff the user B.  Use LOGON BY support so 
that User A doesn't have to know User B's password, just his own.  (You 
can't do it using rexec without authentication.  Well, you can, but then 
anyone could run the program in User B, not just User A.)

If you're not on the same system, life gets more difficult since rexec 
isn't appropriate for open network connections as it isn't encrypted.  One 
might be tempted to rexec into a local Linux guest that uses ssh to reach 
the remote system and use rexec over there, piping the response all the 
way back to you.

This all assumes you're not wanting to write a remote execution solution 
yourself. If you do, just remember that you will need some sort of 
authentication and authorization.

Alan Altmark
z/VM Development
IBM Endicott


Re: Configuartion question

2008-12-05 Thread Alan Altmark
On Thursday, 12/04/2008 at 09:00 EST, "Martin, Terry R. (CMS/CTR) (CTR)" 
<[EMAIL PROTECTED]> wrote:

> We are moving toward taking our POC into production. This workload is 
moving 
> from Solaris running UNIX. The environment is 3 zone architecture. Our 
client?s 
> business requirements calls for this 3 zone environment to remain 
separated. It 
> requires UAL5 security level.

Did you mean Common Criteria EAL 5?  (I can't find any relevant reference 
to "UAL".)  If you actually meant "UAL5", can you point me to a reference?

Alan Altmark
z/VM Development
IBM Endicott


Re: Configuration question

2008-12-05 Thread Bill Munson
Terry,

I am pretty sure the Shop I work for now talked to Marcy.

We have 2 Production z/VM Lpars with 20 Production LINUX guests
We have 1 Development z/VM lpar with 60 Test/Development LINUX guests
We have 1 Play Ground z/VM lpar with 5 LINUX guests - 
where a 2nd level z/VM runs for upgrades and maintenance
 and where LINUX upgrades and patches are applied and first tested
along with 3 z/OS LPARS's Prod, Dev, and Test

It works very nicely for us
 
Bill Munson
Brown Brothers Harriman
Sr. z/VM Systems Programmer
201-418-7588

President MVMUA
http://www2.marist.edu/~mvmua/





Marcy Cortes <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
12/04/2008 09:22 PM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Re: Configuartion question






Terry wrote:
"We are moving toward taking our POC into production."

Good job!
 
If I had my druthers and had only 1 box, I would have a systems
programmers LPAR  (mine mine mine), a LPAR that ran all of test/dev
linuxen, and 1 prod LPAR that ran all of prod. If you do have
servers that can't go down very often, run 2 prod lpars, make them
acquire a server on each (at least) and figure how some failover
(active-active or active-standby).   Better if that 2nd prod lpar can be
on another box entirely, but if it can't, you'll still have all your
capacity if you lose 1 VM lpar due to some VM error (or VM person's
error).

I'm not sure how your EUAL5 requirements fit in, but you can do lots of
things with multiple OSAs, VSWITCHs, VLAN tagging, firewalls, etc.


Marcy (with too many LPARs)


"This message may contain confidential and/or privileged information. If
you are not the addressee or authorized to receive this for the
addressee, you must not use, copy, disclose, or take any action based on
this message or any information herein. If you have received this
message in error, please advise the sender immediately by reply e-mail
and delete this message. Thank you for your cooperation."

 



From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Martin, Terry R. (CMS/CTR) (CTR)
Sent: Thursday, December 04, 2008 5:57 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: [IBMVM] Configuartion question



Hi 

 

We are moving toward taking our POC into production. This workload is
moving from Solaris running UNIX. The environment is 3 zone
architecture. Our client's business requirements calls for this 3 zone
environment to remain separated. It requires UAL5 security level.

 

To this end we have six LPARS each sharing 7 IFLS with plenty of real
memory on each. One of the six LPARS is our test LPAR that will have
multiple levels of VM for testing and such.

 

My question: some of our folks believe that this is an excessive number
of LPARS and that it defeats the purpose of VM. Now I understand how VM
works and its' ability to virtualize reducing the need for large LPAR
configurations. I know that we could, lets' say combine our PROD and
VAL/DEV environments that are currently running in separate LPARS into
one LPAR and run a second LEVEL VM for the VAL/DEV.   My contention is
that if it is what is needed to fit the business requirements of the
client then having six LPARS is not catastrophic. We have plans for
another 16 z/Linux guests to run in the existing configuration in the
next few months not requiring additional LPARS. I am not an LPAR bigot. 

 

Can anyone comment in general on the pros and cons of running LPARS as
opposed to running the multiple environments under one LPAR and getting
separation logically by having multi levels of VM rather then physical
separation by having the environments running under a single level of
VM? 

 

In the end it probably will not matter if the client insists that we
need to proceed as we are. Just trying to get a prospective of those who
are more experienced then myself!!

 

Thanks,

 

Terry 



*** IMPORTANT
NOTE* The opinions expressed in this
message and/or any attachments are those of the author and not
necessarily those of Brown Brothers Harriman & Co., its
subsidiaries and affiliates ("BBH"). There is no guarantee that
this message is either private or confidential, and it may have
been altered by unauthorized sources without your or our knowledge.
Nothing in the message is capable or intended to create any legally
binding obligations on either party and it is not intended to
provide legal advice. BBH accepts no responsibility for loss or
damage from its use, including damage from virus.


Re: EREP process question.

2008-12-05 Thread Ray Waters
Howard,
Even if you clear the EREP file, or erase it, then once EREP start accumulating 
data in XAEREPIO RECORD on his A disk, the records are variable length and will 
start to grow in length.
For example, if I clear EREP, the max record size usually start s out at 114, 
then will grow to Max of 256 in my shop.
Ray

From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On Behalf Of 
Howard Rifkind
Sent: Thursday, December 04, 2008 3:32 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: EREP process question.

I'm using the EREP parameter below to go against the z/VM EREP machine.

The file XAEREPIO RECORD is out there and is some what larger then yesterday.

Shouldn't the above file be deleted by these parameter?

SYSUM
ACC=Y
ZERO=Y
ENDPARM


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.




NOTICE:
This e-mail is intended solely for the use of the individual to whom it is 
addressed and may contain information that is privileged, confidential or 
otherwise exempt from disclosure. If the reader of this e-mail is not the 
intended recipient or the employee or agent responsible for delivering the 
message to the intended recipient, you are hereby notified that any 
dissemination, distribution, or copying of this communication is strictly 
prohibited. If you have received this communication in error, please 
immediately notify us by replying to the original message at the listed email 
address. Thank You.


Re: Configuartion question

2008-12-05 Thread Rick Troth
Terry --


You've already gotten great advice.
I would add that you do NOT need to split your workload
between the tiers or zones.  It was not completely clear to me,
but it sounded like that was one of your expected LPAR splits.


You can achieve isolation of the zones without having to run
yet more VM partitions.  You DO want to partionally isolate your
production and test/dev, but you don't need that added complexity
to defend a multi-tier architecture.  VM insulates virtual machines
nicely along zone boundaries.  HOWEVER, selling this to your
directors, developers, and security people might be difficult.


-- Rick;   <><


Re: EREP process question.

2008-12-05 Thread Ed Zell
Hi Howard,

  That file is just a "print header" file that we use to separate the
reports.  Since
  I use 'CP SPOOL PRT CONT' everything comes out in one spool file.  I
wanted 
  some kind of header to show me where one ended and the next began.
You
  can either remove these lines, or create file with those names for
separator
  pages.



 ' PRINT SYSEXN RPT-HDR (CC'   
 ' PRINT SUMMARY  RPT-HDR (CC '  
 ' PRINT CLEARIT  RPT-HDR (CC '

   

  Here is what one of them looks like:



1

 *
 **
**
 **
**
 **  SYSTEM EXCEPTION REPORT  **
 **
**
 **
**
 **


Ed Zell
Illinois Mutual Life
(309) 636-0107





From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Thursday, December 04, 2008 5:19 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: EREP process question.

 

Ed, Once again thanks,

 

The RUNEREP exec, when it gets to the following statement:

 

'PRINT SYSEXN RPT-HDR (CC'

states that it can't find file SYSEXN RPT-HDR 

 

Is this really a separate file or something else.

 

If separate could you forward a sample of the file.

 

 

Thanks


>>> Ed Zell <[EMAIL PROTECTED]> 12/4/2008 4:55 PM >>>

Howard,

Here is how we process EREP.

   Operator logs on to EREP and issues#CP EXTand then responds
END   to the prompt.

   Operator types   RUNEREP   to fire up the EXEC to process the data
and then clear it out

   After it runs, Operator typesPROFILE   to start EREP back up
again and then  #CP DISC

  

/* RUNEREP EXEC   PROCESS EREP DATA */
' ACC 201 C/A'
' CP SPOOL PRINTER TO SPOOLER CLASS Z NOHOLD CONT' 
' PRINT SYSEXN RPT-HDR (CC'
' EXEC SYSEXN   '  
' PRINT SUMMARY  RPT-HDR (CC ' 
' EXEC SUMMARY  '  
' PRINT CLEARIT  RPT-HDR (CC ' 
' EXEC CLEARIT'
' CP SPOOL PRINTER CLOSE NAME EREP 12345'  
' REL C'


/*  SYSEXN EXEC  SYSTEM EXCEPTION REPORT  */ 
MAKEBUF 
QUEUE 'SYSEXN,TABSIZE=512K,ACC=N  ' 
QUEUE   
'CPEREP'


/* SUMMARY EXEC   PRODUCE SUMMARY REPORT  */
MAKEBUF 
QUEUE 'PRINT=SU,ACC=N,TABSIZE=100K,LINECT=60 '  
QUEUE   
'CPEREP'


/* CLEARIT EXECCLEAR OUT THE FILE  */
MAKEBUF   
QUEUE 'PRINT=AL,ACC=N,TABSIZE=100K,LINECT=60,ZERO=Y ' 
QUEUE 
'CPEREP'  




Ed Zell
Illinois Mutual Life
(309) 636-0107






From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On
Behalf Of Howard Rifkind
Sent: Thursday, December 04, 2008 3:32 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: EREP process question.

 

I'm using the EREP parameter below to go against the z/VM EREP machine.

 

The file XAEREPIO RECORD is out there and is some what larger then
yesterday.

 

Shouldn't the above file be deleted by these parameter?

 

SYSUM   
ACC=Y   
ZERO=Y  
ENDPARM 

 


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.

 

 

Confidentiality:  This e-mail (including any attachments) may contain
confidential, proprietary and privileged information, and unauthorized
disclosure or use is prohibited.  If you receive this e-mail in error,
please notify the sender and delete this e-mail from your system.

 


_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.

 


.


CONFIDENTIALITY: This e-mail (including any attachments) may contain 
confidential, proprietary and privileged information, and unauthorized 
disclosure or use is prohibited.  If you receive this e-mail in error, notify 
the sender and delete th

Re: Starting an exec on a remote machine

2008-12-05 Thread Kris Buelens
One could also use the CMS Multitasking queues as mechanism.  For the
exec logic itself it would be transparent if the both users are on
different systems or not.
For cross-system, non SNA, support this would be required:
  TCP/IP line driver for CMS distributed queues.
  http://www.vm.ibm.com/download/packages/descript.cgi?TLD
Instead of sockets, one'd code things like at the client:
 call csl 'QueueOpen mtrc mtre qn qnl sv svl qh el'
 
 call csl 'QueueSend mtrc mtre qh cmscmd cmdlen ko kl'
and at the server;
 call csl 'QueueCreate mtrc mtre qn qnl vm_ipc_nlevel qh'
 
 call csl 'QueueReceiveBlock mtrc mtre qh ',
  'matchkey matchkeylen timeout ',
  'cmscmd rcvbuflen cmdlen ',
  'ko kl suid spid rt'

I've got a QDEMO/QCLIENT/QSERVER example created by Brian Wade that
sends a CMS command for execution, but I no longer remember where I
got them from. I can send them.

2008/12/5 Rempel, Horst <[EMAIL PROTECTED]>:
> Hello Howard,
> I use execa in usera that will start an execb in cms-userb or a shellscript
> in Linux.
> When you do it in a pipe the execa will wait until the end of execb (or
> shellscript) before continuing.
> The pipe will write the output of execb in a file.
> So execa can continue depending on the content of this file.
>
> |
>  'pipe cms rexec ...   !',
>'console !',
>'>> 'remote_exec' output a'
> |
>
> This logic works well for me every night.
> If execb is a long running exec its possible that you have to code a timeout
> for rexec.
> But plan carefully ! REXEC can be a security risk !
> I do it in a completly isolated network.
> 
> Von: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] Im
> Auftrag von Howard Rifkind
> Gesendet: Freitag, 5. Dezember 2008 00:52
> An: IBMVM@LISTSERV.UARK.EDU
> Betreff: Starting an exec on a remote machine
>
> I'm running exec X on cms user 'A'
>
> I exec X has to start exec Y running on cms user 'B' and after exec Y
> terminates it has to return control to the exec on cms user 'A'
>
> I could use some suggestions as to the best way to do this.
>
> Thanks
>
>
> _
> LEGAL NOTICE
> Unless expressly stated otherwise, this message is confidential
> and may be privileged. It is intended for the addressee(s) only.
> Access to this E-mail by anyone else is unauthorized.
> If you are not an addressee, any disclosure or copying of the
> contents of this E-mail or any action taken (or not taken) in
> reliance on it is unauthorized and may be unlawful. If you are not an
> addressee, please inform the sender immediately, then delete this
> message and empty from your trash.
>



-- 
Kris Buelens,
IBM Belgium, VM customer support


AW: Starting an exec on a remote machine

2008-12-05 Thread Rempel, Horst
Hello Howard,
I use execa in usera that will start an execb in cms-userb or a
shellscript in Linux.
When you do it in a pipe the execa will wait until the end of execb (or
shellscript) before continuing.  
The pipe will write the output of execb in a file.
So execa can continue depending on the content of this file.
 
|
 'pipe cms rexec ...   !',  
   'console !',  
   '>> 'remote_exec' output a'   
|
 
This logic works well for me every night.
If execb is a long running exec its possible that you have to code a
timeout for rexec.
But plan carefully ! REXEC can be a security risk !
I do it in a completly isolated network.  



Von: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] Im
Auftrag von Howard Rifkind
Gesendet: Freitag, 5. Dezember 2008 00:52
An: IBMVM@LISTSERV.UARK.EDU
Betreff: Starting an exec on a remote machine


I'm running exec X on cms user 'A' 
 
I exec X has to start exec Y running on cms user 'B' and after exec Y
terminates it has to return control to the exec on cms user 'A'
 
I could use some suggestions as to the best way to do this.
 
Thanks



_
LEGAL NOTICE
Unless expressly stated otherwise, this message is confidential
and may be privileged. It is intended for the addressee(s) only.
Access to this E-mail by anyone else is unauthorized.
If you are not an addressee, any disclosure or copying of the
contents of this E-mail or any action taken (or not taken) in
reliance on it is unauthorized and may be unlawful. If you are not an
addressee, please inform the sender immediately, then delete this
message and empty from your trash.



Re: Configuartion question

2008-12-05 Thread Kris Buelens
To test/install a new VM level, I'd use a secondlevel VM system, no
need to devote an LPAR to it.  I still find it easier that one can use
the host level VM; the main reasons::
- to provide the network to be able to log on to the second-level VM:
  -- no access to the HMC required to start it up
  -- even if TCP/IP in the secondlevel fails, I have access
- the secondlevel system can easily get (R/O) access to selected
  minidisks of the host VM with a simple CP LINK command
  what enables fixing errors in the seciondlevel, and facilitates
  preparing put in production.

However, testing Linuxes (or other guests) in a secondlevel VM system,
would incur high CPU overhead.

I used such a setup the 20 years I spend with my customer, but I
didn't have anything else than CMS users, my SW test & installation VM
system ran as guest under the main VM production system.  It never
caused problems.  All sysprogs used this test system to install SW.

-- 
Kris Buelens,
IBM Belgium, VM customer support