IBM SC34-7012-01 User Manual
Recovery and restart guide
Table of contents
Document Outline
- Contents
- Preface
- Changes in CICS Transaction Server for z/OS, Version 4 Release 1
- Part 1. CICS recovery and restart concepts
- Chapter 1. Recovery and restart facilities
- Chapter 2. Resource recovery in CICS
- Chapter 3. Shutdown and restart recovery
- Normal shutdown processing
- Immediate shutdown processing (PERFORM SHUTDOWN IMMEDIATE)
- Shutdown requested by the operating system
- Uncontrolled termination
- The shutdown assist transaction
- Cataloging CICS resources
- Shutdown initiated by CICS log manager
- How the state of the CICS region is reconstructed
- Recovery with VTAM persistent sessions
- Part 2. Recovery and restart processes
- Chapter 4. CICS cold start
- Starting CICS with the START=COLD parameter
- Starting CICS with the START=INITIAL parameter
- Chapter 5. CICS warm restart
- Chapter 6. CICS emergency restart
- Chapter 7. Automatic restart management
- Chapter 8. Unit of work recovery and abend processing
- Unit of work recovery
- Investigating an indoubt failure
- Recovery from failures associated with the coupling facility
- Transaction abend processing
- Actions taken at transaction failure
- Processing operating system abends and program checks
- Chapter 9. Communication error processing
- Part 3. Implementing recovery and restart
- Chapter 10. Planning aspects of recovery
- Chapter 11. Defining system and general log streams
- Chapter 12. Defining recoverability for CICS-managed resources
- Recovery for transactions
- Recovery for files
- Recovery for intrapartition transient data
- Recovery for extrapartition transient data
- Recovery for temporary storage
- Recovery for Web services
- Chapter 13. Programming for recovery
- Designing applications for recovery
- Program design
- Dividing transactions into units of work
- Processing dialogs with users
- Mechanisms for passing data between transactions
- Designing to avoid transaction deadlocks
- Implications of interval control START requests
- Implications of automatic task initiation (TD trigger level)
- Implications of presenting large amounts of data to the user
- Managing transaction and system failures
- Locking (enqueuing on) resources in application programs
- User exits for transaction backout
- Chapter 14. Using a program error program (PEP)
- Chapter 15. Resolving retained locks on recoverable resources
- Quiescing RLS data sets
- Switching from RLS to non-RLS access mode
- Exception for read-only operations
- What can prevent a switch to non-RLS access mode?
- Resolving retained locks before opening data sets in non-RLS mode
- Resolving retained locks and preserving data integrity
- Choosing data availability over data integrity
- The batch-enabling sample programs
- CEMT command examples
- A special case: lost locks
- Overriding retained locks
- Coupling facility data table retained locks
- Chapter 16. Moving recoverable data sets that have retained locks
- Chapter 17. Forward recovery procedures
- Chapter 18. Backup-while-open (BWO)
- BWO and concurrent copy
- BWO requirements
- Which data sets are eligible for BWO
- How you request BWO
- Removing BWO attributes
- Systems administration
- BWO processing
- An assembler program that calls DFSMS callable services
- Chapter 19. Disaster recovery
- Part 4. Appendixes
- Notices
- Bibliography
- Accessibility
- Index
- Readers’ Comments — We'd Like to Hear from You