Without wishing to open a can of worms, I can say there are several
program-related items I’d love to see in SMF 30 (or similar).
For example, today we have the Top TCB Program Name and Percent in SMF 30.
I’d love to have “top 3” or “top 5”.
But I digress... :-)
Sent from my iPad
> On 7 Apr 20
Hi,
Before I go into a viper pit for telling the boss and his boss and his boss and
be asked many questions that I am nowhere near qualified to answer. Is there an
IBM book/manual or SHARE presentation that I can show to the management what
will be needed, hardware (software) wise to be able to
If I understand the question, I think that the BPAM access method already
does what you are asking for.
If you concatenate partitioned datasets and then OPEN, BLDL, FIND, POINT,
READ... then you can read the member found first in the concatenation.
See "DFSMS Using Data Sets" / "Processing a PDS
On 4/6/2018 10:51 PM, Brian Peterson wrote:
Tom, good points.
However, I've been working with the SMF data, and have to say it's not very
helpful. Similar in fact to the system-level health check. The SMF record only
says that User Key common storage was allocated by some program in this addre
>RAX_SMF30_SAPFlags
This information is captured in the SMF30 records as of the APAR that
introduced this health check (OA53355), in the byte at offset 178 (x'B2')
in the Storage and Paging section of the SMF 30 record mapped by DSECT
SMF30SAP in macro IFASMFR3.
And information about that app
On my system, JES2AUX and DEVMAN are both flagged. "I" suspect they are
innocent, but perhaps I should just open PMRs and have those components prove
it.
--
For IBM-MAIN subscribe / signoff / archive access instructions,
send e
On 4/7/2018 1:35 PM, Brian Peterson wrote:
On my system, JES2AUX and DEVMAN are both flagged. "I" suspect they are
innocent, but perhaps I should just open PMRs and have those components prove it.
If I wasn't laughin', I'd be cryin'.
--
I hope folks don't misunderstand my point. User Key Common is a scurge and we
can't be rid of it soon enough.
However, IBM needs to understand that their current offering of a PER IF SLIP
trap / GTF trace is not a user-friendly way to identify the culprit.
---
You are correct that the input data sets cannot be concatenated, but I might
give an update to the solution in that you can specify multiple input DD's on
the copy statement.
From the examples for merging 4 data sets into one single one, but with an
addition of the select statement:
//SYSPRINT
On Sat, 7 Apr 2018 20:33:01 +, Nims,Alva John (Al) wrote:
>You are correct that the input data sets cannot be concatenated, but I might
>give an update to the solution in that you can specify multiple input DD's on
>the copy statement.
>From the examples for merging 4 data sets into one sing
10 matches
Mail list logo