IBM SC34-6814-04 User Manual
Page 15
![background image](/manuals/129742/15/background.png)
. . . . . . . . . . . . . . . . . . 743
Introduction to CICS monitoring . . . . . . . . . . . . . . . . . . 743
How CICS monitoring data is passed to SMF . . . . . . . . . . . . 743
Coding additional event-monitoring points
Application naming event monitoring points . . . . . . . . . . . . . 744
The monitoring control table (MCT) . . . . . . . . . . . . . . . . 747
CICS monitoring record formats . . . . . . . . . . . . . . . . . . 750
SMF header and SMF product section . . . . . . . . . . . . . . . 750
CICS data section . . . . . . . . . . . . . . . . . . . . . . 754
Background information . . . . . . . . . . . . . . . . . . . . 769
Resetting statistics counters
. . . . . . . . . . . . . . . . . . 770
Using the EXEC CICS COLLECT and EXTRACT STATISTICS commands
CICS statistics record format . . . . . . . . . . . . . . . . . . . 771
SMF header and SMF product section . . . . . . . . . . . . . . . 771
CICS statistics data section . . . . . . . . . . . . . . . . . . . 773
Using an XSTOUT global user exit program to filter statistics records . . . . 776
Processing the output from CICS statistics . . . . . . . . . . . . . . 777
Part 6. Customizing CICS compatibility interfaces . . . . . . . . . . . . . . 779
Using the dynamic allocation program’s Help feature
The dynamic allocation program—values . . . . . . . . . . . . . . . 783
. . . . . . . . . . . . . . . 784
The flow of control when a DYNALLOC request is issued . . . . . . . . . 784
Part 7. Customizing CICS security processing . . . . . . . . . . . . . . . . 787
. . . . . . . . . . . . . . . . . . . . . 789
Using ESM exit programs to access CICS-related information . . . . . . . 791
For non-RACF users — the ESM parameter list . . . . . . . . . . . 792
For RACF users — the RACF user exit parameter list . . . . . . . . . 792
The installation data parameter list . . . . . . . . . . . . . . . . 793
CICS security control points. . . . . . . . . . . . . . . . . . . . 796
Using early verification processing . . . . . . . . . . . . . . . . . 797
Writing an early verification routine . . . . . . . . . . . . . . . . 798
Using CICS API commands in an early verification routine
Return and reason codes from the early verification routine . . . . . . . 799
Chapter 32. Writing a “good night” program
The communications area of the “good night” program . . . . . . . . . . 801
The sample “good night” program, DFH0GNIT . . . . . . . . . . . . . 803
What the sample program does . . . . . . . . . . . . . . . . . 803
Customizing the sample “good night” program . . . . . . . . . . . . . 804
Contents
xiii