Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Introduction to System Logger
Figure 1-1: Logical and physical views of System Logger-maintained log data
Chapter 2: System Logger Fundamentals
Figure 2-1: System Logger spanning different levels of storage
Figure 2-2: Writing to a System Logger log stream
Figure 2-3: Storage levels for a CF-Structure based log stream
Figure 2-4: Entries and elements divided among connected log streams
Figure 2-5: Mixing different profile log streams in the same structure
Figure 2-6: Entry/element usage at time=0
Figure 2-7: Entry/element usage at time=1
Figure 2-8: Entry/element usage at time=2
Figure 2-9: System Logger duplexing combinations
Figure 2-10: DASD-only log stream spanning two levels of storage
Figure 2-11: Offload overview (example is a CF-Structure based log stream)
Figure 2-12: Offload from HIGHOFFLOAD to LOWOFFLOAD
Figure 2-13: Offload data set LSN.A0000001 cannot be deleted
Figure 2-14: A single point of failure exists between Sys1 and the CF
Figure 2-15: Structure A has peer connectors
Figure 2-16: Recovery delayed for some data
Chapter 3: DFSMStvs and Logger
Figure 3-1: VSAM data sharing before Record Level Sharing (RLS)
Figure 3-2: CICS/VSAM Record Level Sharing
Figure 3-3: Transactional VSAM and CICS
Chapter 4: IMS Common Queue Server and the System Logger
Figure 4-1: IMSplex shared queues component architecture
Figure 4-2: Where is the log stream?
Figure 4-3: Flow of message and log traffic
Figure 4-4: Shared log stream,
Figure 4-5: Reading the log stream
Figure 4-6: Offloading the log stream
Chapter 5: CICS and System Logger
Figure 5-1: How CICS decides which log stream name to use
Figure 5-2: Overview of CICS logging
Figure 5-3: System Logger-related definitions
Figure 5-4: Sample CICS JOURNALMODEL
Figure 5-5: Defining structure in CFRM policy
Figure 5-6: Example of Auto Alter messages
Figure 5-7: Defining a structure for CF-Structure log streams in the System Logger policy
Figure 5-8: Using IXCMIAPU report to get Effective Average Buffer Size
Figure 5-9: CF-Structure log stream definition
Figure 5-10: Displaying if staging data sets are in use
Figure 5-11: Defining a DASD-only log stream
Figure 5-12: Defining a MODEL log stream for DFHLOG
Figure 5-13: Defining a MODEL log stream for a user journal
Figure 5-14: Staging and offload data sets for IYOT1.DFHLOG log stream
Figure 5-15: Offload data set deletion
Figure 5-16: RMF Report Class for the JOR* Transactions in a R410 region
Figure 5-17: Sample Journals statistics for a CICS V4.1 region
Figure 5-18: Sample IXGRPT1 report for a DASD-only User Journal
Figure 5-19: Sample IXGRPT1 report for a DASD-only Auto Journal log stream
Figure 5-20: Sample IXGRPT1 report for a DASD-only Forward recovery log
Figure 5-21: Sample Report Class output
Figure 5-22: Sample DFH0STAT output
Figure 5-23: DFH0STAT for CICS TS 22 - part 1
Figure 5-24: DFH0STAT for CICS TS 2.2 - part 2
Figure 5-25: Sample DFHSTUP End of Day report
Figure 5-26: CICS Performance Analyzer Log stream Summary
Figure 5-27: Sample IXGRPT1 Report
Figure 5-28: Sample of the hand crafted reports
Figure 5-29: Log Defer Sample 1
Figure 5-30: Log Defer sample 2
Figure 5-31: Log Defer sample 3
Figure 5-32: Example 4 - AKPFREQ set to 7500
Figure 5-33: Example 5 - AKPFREQ set to 4000
Figure 5-34: Example 6 - AKPFREQ set to 2500
Figure 5-35: User Journal - STG_SIZE 25000, single region
Figure 5-36: User Journal - STG_SIZE 2549, single region
Chapter 6: Other Logger Exploiters
Figure 6-1: Log stream rebuild processing
Figure 6-2: Display Logger, Connection
Figure 6-3: Sample ISPF dialog to input variables to define log stream
Chapter 8: System Logger Performance and Tuning
Figure 8-1: Calculating High Threshold value
Figure 8-2: RMF Coupling Facility Activity report
Figure 8-3: Sample JCL to produce an RMF CF Activity Report
Figure 8-4: JCL to produce RMF Workload Activity report
Figure 8-5: Sample Workload Activity report
Figure 8-6: Sample IXGRPT1 output
Figure 8-7: Sample report from step SHOWALL
Figure 8-8: Sample log stream attribute report from step SHOWDEF1
Figure 8-9: Sample events report from step SHOWDEF1
Figure 8-10: Sample interim storage report from step SHOWDEF1
Figure 8-11: Sample key indicator report from step SHOWDEF1
< Day Day Up >
Previous page
Table of content
Next page
ASP.NET for Web Designers
ISBN: 738489433
EAN: 2147483647
Year: 2002
Pages: 99
Authors:
Peter Ladka
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Snort Cookbook
Monitoring Multiple Network Interfaces
Reading a Saved Capture File
Blocking Attacks in Real Time
Monitoring Network Performance
Monitoring a Network Using Policy-Based IDS
Java How to Program (6th Edition) (How to Program (Deitel))
Introduction
Decision Making: Equality and Relational Operators
Wrap-Up
Terminology
Internet and Web Resources
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
Partial Page Rendering
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Getting Started with Quartz
Why RMI with Quartz?
Brief Overview of Java RMI
Working with the Scheduler
Configuring the Quartz ThreadPool
Java All-In-One Desk Reference For Dummies
Using Eclipse
Working with Numbers and Expressions
Using Inner Classes
Using Arrays
Working with Files
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies