Sign In
Upload
Manuals
Brands
IBM Manuals
Server
SC34-7012-01
User Manuals: IBM SC34-7012-01 Recovery and Restart
Manuals and User Guides for IBM SC34-7012-01 Recovery and Restart. We have
1
IBM SC34-7012-01 Recovery and Restart manual available for free PDF download: Recovery And Restart Manual
IBM SC34-7012-01 Recovery And Restart Manual (268 pages)
CICS Transaction Server for z/OS
Brand:
IBM
| Category:
Server
| Size: 1 MB
Table of Contents
Table of Contents
5
Programs
5
Rebuilding the CICS State
5
Shunt
5
Shutdown
5
Transient Data
5
Communication
6
Transaction)
6
Unit of Work Recovery
6
URIMAP Definition
6
Systems Administration
7
Transaction
7
Xrc
7
Trademarks
8
How to Use this Book
9
Preface
9
What this Book Is about
9
What You Need to Know to Understand this Book
9
Who Should Read this Book
9
Part 1. CICS Recovery and Restart Concepts
13
Chapter 1. Recovery and Restart Facilities
15
Maintaining the Integrity of Data
15
Minimizing the Effect of Failures
16
The Role of CICS
16
Recoverable Resources
17
CICS Backward Recovery (Backout)
17
Dynamic Transaction Backout
18
Emergency Restart Backout
18
CICS Forward Recovery
19
Forward Recovery of CICS Data Sets
19
Failures that Require CICS Recovery Processing
20
CICS Recovery Processing Following a Communication Failure
20
CICS Recovery Processing Following a Transaction Failure
22
CICS Recovery Processing Following a System Failure
22
Chapter 2. Resource Recovery in CICS
25
Units of Work
25
Shunted Units of Work
25
Locks
26
Synchronization Points
27
Unit of Work
28
CICS Recovery Manager
29
Backout
29
Managing the State of each Unit of Work
30
Coordinating Updates to Local Resources
31
Coordinating Updates in Distributed Units of Work
32
Resynchronization after System or Connection Failure
33
CICS System Log
33
Information Recorded on the System Log
33
System Activity Keypoints
34
Forward Recovery Logs
34
User Journals and Automatic Journaling
34
Chapter 3. Shutdown and Restart Recovery
37
Normal Shutdown Processing
37
First Quiesce Stage
37
Second Quiesce Stage
38
Third Quiesce Stage
38
Warm Keypoints
39
Shunted Units of Work at Shutdown
39
Flushing Journal Buffers
40
Immediate Shutdown Processing (PERFORM SHUTDOWN IMMEDIATE)
40
Shutdown Requested by the Operating System
41
Uncontrolled Termination
42
The Shutdown Assist Transaction
42
Cataloging CICS Resources
43
Global Catalog
43
Local Catalog
44
Shutdown Initiated by CICS Log Manager
45
Effect of Problems with the System Log
45
How the State of the CICS Region Is Reconstructed
46
Overriding the Type of Start Indicator
47
Warm Restart
47
Emergency Restart
47
Cold Start
48
Emergency Restart
48
Dynamic RLS Restart
49
Recovery with VTAM Persistent Sessions
50
Running with Persistent Sessions Support
50
Running Without Persistent Sessions Support
52
Part 2. Recovery and Restart Processes
55
Communication
55
Chapter 4. CICS Cold Start
57
Starting CICS with the START=COLD Parameter
57
Chapter 4, "CICS Cold Start
57
Files
58
Temporary Storage
59
Transient Data
59
Transactions
60
Journal Names and Journal Models
60
LIBRARY Resources
60
Programs
60
Start Requests (with and Without a Terminal)
60
Resource Definitions Dynamically Installed
60
Monitoring and Statistics
61
Terminal Control Resources
61
Distributed Transaction Resources
62
Dump Table
62
Starting CICS with the START=INITIAL Parameter
62
User Journals
63
Chapter 5. CICS Warm Restart
65
Rebuilding the CICS State after a Normal Shutdown
65
Chapter 5, "CICS Warm Restart
65
Warm Restart
65
Files
66
For Recovery
66
Temporary Storage
67
Transient Data
67
Transactions
68
LIBRARY Resources
68
Programs
68
Start Requests
69
Monitoring and Statistics
69
Journal Names and Journal Models
70
Terminal Control Resources
70
Distributed Transaction Resources
71
URIMAP Definitions and Virtual Hosts
71
Chapter 6. CICS Emergency Restart
73
Recovering after a CICS Failure
73
Recovering Information from the System Log
73
Driving Backout Processing for In-Flight Units of Work
73
Concurrent Processing of New Work and Backout
73
Chapter 6, "CICS Emergency Restart
73
Effect of Delayed Recovery on PLTPI Processing
74
Other Backout Processing
74
Rebuilding the CICS State after an Abnormal Termination
74
Files
74
Temporary Storage
75
Transient Data
75
Start Requests
76
Terminal Control Resources
76
Distributed Transaction Resources
77
Chapter 7. Automatic Restart Management
79
CICS ARM Processing
79
Chapter 7, "Automatic Restart Management
79
Registering with ARM
80
Waiting for Predecessor Subsystems
80
De-Registering from ARM
80
Start=Auto
80
Failing to Register
81
ARM Couple Data Sets
81
CICS Restart JCL and Parameters
81
Workload Policies
82
Connecting to VTAM
82
The COVR Transaction
83
Messages Associated with Automatic Restart
83
Automatic Restart of CICS Data-Sharing Servers
83
Server ARM Processing
83
Chapter 8. Unit of Work Recovery and Abend Processing
85
Unit of Work Recovery
85
Chapter 8, "Unit of Work Recovery and Abend Processing
85
Transaction Backout
86
Backout-Failed Recovery
91
Commit-Failed Recovery
95
Indoubt Failure Recovery
96
Investigating an Indoubt Failure
97
Recovery from Failures Associated with the Coupling Facility
100
Cache Failure Support
100
Lost Locks Recovery
101
Connection Failure to a Coupling Facility Cache Structure
103
Connection Failure to a Coupling Facility Lock Structure
103
MVS System Recovery and Sysplex Recovery
103
Transaction Abend Processing
104
Exit Code
104
Abnormal Termination of a Task
105
Transaction Restart
105
Actions Taken at Transaction Failure
106
Processing Operating System Abends and Program Checks
106
Chapter 9. Communication Error Processing
109
Terminal Error Processing
109
Node Error Program (DFHZNEP)
109
Terminal Error Program (DFHTEP)
109
Intersystem Communication Failures
110
Part 3. Implementing Recovery and Restart
111
Chapter 10. Planning Aspects of Recovery
113
Application Design Considerations
113
Questions Relating to Recovery Requirements
113
Validate the Recovery Requirements Statement
114
Designing the End User's Restart Procedure
115
End User's Standby Procedures
115
Communications between Application and User
115
Security
116
System Definitions for Recovery-Related Functions
116
System Log Stream
116
System Recovery Table (SRT)
116
Documentation and Test Plans
117
Transaction List Table (XLT)
117
Chapter 11. Defining System and General Log Streams
119
Defining Log Streams to MVS
120
Defining System Log Streams
120
Specifying a JOURNALMODEL Resource Definition
121
Model Log Streams for CICS System Logs
122
Recovery Considerations
122
Activity Keypointing
124
System Logs
125
Log-Tail Deletion
126
Defining Forward Recovery Log Streams
128
Model Log Streams for CICS General Logs
129
Merging Data on Shared General Log Streams
130
Defining the Log of Logs
130
Log of Logs Failure
131
Reading Log Streams Offline
131
Effect of Daylight Saving Time Changes
132
Adjusting Local Time
132
Time Stamping Log and Journal Records
132
Chapter 12. Defining Recoverability for CICS-Managed Resources
135
Recovery for Transactions
135
Defining Transaction Recovery Attributes
135
Recovery for Files
137
VSAM Files
137
Basic Direct Access Method (BDAM)
138
Defining Files as Recoverable Resources
138
VSAM Files
140
File Recovery Attribute Consistency Checking (Non-RLS)
141
Overriding Open Failures
141
Implementing Forward Recovery with User-Written Utilities
143
Implementing Forward Recovery with CICS VSAM Recovery MVS/ESA
143
Recovery for Intrapartition Transient Data
143
Backward Recovery
143
Forward Recovery
145
Transient Data Queues
145
Recovery for Extrapartition Transient Data
146
Input Extrapartition Data Sets
146
Output Extrapartition Data Sets
147
Using Post-Initialization (PLTPI) Programs
147
Recovery for Temporary Storage
147
Backward Recovery
147
Forward Recovery
148
Recovery for Web Services
148
Configuring CICS to Support Persistent Messages
148
Defining Local Queues in a Service Provider
149
Persistent Message Processing
150
Error Processing
150
Chapter 13. Programming for Recovery
153
Designing Applications for Recovery
153
Splitting the Application into Transactions
153
SAA-Compatible Applications
155
Program Design
155
Dividing Transactions into Units of Work
155
Processing Dialogs with Users
156
Mechanisms for Passing Data between Transactions
157
Designing to Avoid Transaction Deadlocks
158
Implications of Interval Control START Requests
159
Implications of Automatic Task Initiation (TD Trigger Level)
160
Implications of Presenting Large Amounts of Data to the User
160
Terminal Paging through BMS
160
Managing Transaction and System Failures
161
Transaction Failures
161
Transaction Restart
161
System Failures
163
Handling Abends and Program Level Abend Exits
163
Use of
163
User Exits
163
Processing the IOERR Condition
165
START TRANSID Commands
165
PL/I Programs and Error Handling
165
Locking (Enqueuing On) Resources in Application Programs
166
Implicit Locking for Files
166
VSAM Exclusive Control
168
Implicit Enqueuing on Logically Recoverable TD Destinations
169
Implicit Enqueuing on Recoverable Temporary Storage Queues
169
Implicit Enqueuing on DL/I Databases with DBCTL
170
Explicit Enqueuing (by the Application Programmer)
170
Possibility of Transaction Deadlock
171
Vsam Rls
171
User Exits for Transaction Backout
172
Where You Can Add Your Own Code
172
XRCINIT Exit
173
XRCINPT Exit
173
XFCBFAIL Global User Exit
173
XFCLDEL Global User Exit
174
XFCBOVER Global User Exit
174
XFCBOUT Global User Exit
174
Coding Transaction Backout Exits
174
Chapter 14. Using a Program Error Program (PEP)
175
The CICS-Supplied PEP
175
Your Own PEP
176
Omitting the PEP
177
Chapter 15. Resolving Retained Locks on Recoverable Resources
179
Quiescing RLS Data Sets
179
The RLS Quiesce and Unquiesce Functions
180
Switching from RLS to Non-RLS Access Mode
184
Exception for Read-Only Operations
184
What Can Prevent a Switch to Non-RLS Access Mode
185
Resolving Retained Locks before Opening Data Sets in Non-RLS Mode
186
Resolving Retained Locks and Preserving Data Integrity
188
Choosing Data Availability over Data Integrity
189
The Batch-Enabling Sample Programs
190
CEMT Command Examples
190
A Special Case: Lost Locks
192
Overriding Retained Locks
192
Coupling Facility Data Table Retained Locks
194
Chapter 16. Moving Recoverable Data Sets that Have Retained Locks
195
Procedure for Moving a Data Set with Retained Locks
195
Using the REPRO Method
195
Using the EXPORT and IMPORT Functions
197
Rebuilding Alternate Indexes
198
Chapter 17. Forward Recovery Procedures
199
Forward Recovery of Data Sets Accessed in RLS Mode
199
Recovery of Data Set with Volume Still Available
200
Recovery of Data Set with Loss of Volume
201
Forward Recovery of Data Sets Accessed in Non-RLS Mode
210
Procedure for Failed RLS Mode Forward Recovery Operation
210
Procedure for Failed Non-RLS Mode Forward Recovery Operation
213
Chapter 18. Backup-While-Open (BWO)
215
BWO and Concurrent Copy
215
BWO and Backups
215
BWO Requirements
216
Hardware Requirements
217
Which Data Sets Are Eligible for BWO
217
How You Request BWO
218
Specifying BWO Using Access Method Services
218
Specifying BWO on CICS File Resource Definitions
219
About this Task
219
Removing BWO Attributes
220
Systems Administration
220
BWO Processing
221
File Opening
222
File Closing (Non-RLS Mode)
224
Shutdown and Restart
225
Controlled Shutdown
225
Data Set Backup and Restore
225
Forward Recovery Logging
227
Forward Recovery
228
For BWO
228
Recovering VSAM Spheres with Aixs
229
An Assembler Program that Calls DFSMS Callable Services
230
Chapter 19. Disaster Recovery
235
Why Have a Disaster Recovery Plan
235
Disaster Recovery Testing
236
Six Tiers of Solutions for Off-Site Recovery
237
Tier 0: no Off-Site Data
237
Tier 1 - Physical Removal
237
Tier 2 - Physical Removal with Hot Site
239
Tier 3 - Electronic Vaulting
239
Tier 0-3 Solutions
240
Tier 4 - Active Secondary Site
241
Tier 5 - Two-Site, Two-Phase Commit
243
Tier 6 - Minimal to Zero Data Loss
243
Tier 4-6 Solutions
245
Disaster Recovery and High Availability
246
Peer-To-Peer Remote Copy (PPRC) and Extended Remote Copy (XRC)
246
Remote Recovery Data Facility
248
Choosing between RRDF and 3990-6 Solutions
249
Disaster Recovery Personnel Considerations
249
Returning to Your Primary Site
250
Disaster Recovery Facilities
250
MVS System Logger Recovery Support
250
CICS VSAM Recovery QSAM Copy
251
Remote Recovery Data Facility Support
251
CICS VR Shadowing
251
CICS Emergency Restart Considerations
251
Indoubt and Backout Failure Support
251
Remote Site Recovery for RLS-Mode Data Sets
251
Final Summary
252
Part 4. Appendixes
253
Notices
255
Operation of
255
Trademarks
256
Bibliography
257
CICS Books for CICS Transaction Server for Z/Os
257
Cicsplex SM Books for CICS Transaction Server for Z/Os
258
Administration and Management
258
Other CICS Publications
258
Accessibility
259
Index
261
Readers' Comments - We'D Like to Hear from You
265
Advertisement
Advertisement
Related Products
IBM SC41-5420-04
IBM SC34-6814-04
IBM SCOD-3ZVQ5W
IBM ISERIES SC41-5210-04
IBM SC25-R345-20
IBM SC88-P919-40
IBM S/390 Multiprise 3000
IBM @server iSeries
IBM iSeries SB2
IBM Power System S922 9009-22A
IBM Categories
Server
Desktop
Storage
Laptop
Monitor
More IBM Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL