Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-15 Thread Kevin King
Excellent, thanks Wally!

On Fri, Sep 14, 2012 at 9:23 PM, Wally Terhune
wterh...@rocketsoftware.comwrote:

 https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf

 Wally Terhune
 Technical Support Engineer
 Rocket Software
 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA
 t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w:
 rocketsoftware.com/u2


 -Original Message-
 From: u2-users-boun...@listserver.u2ug.org [mailto:
 u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
 Sent: Friday, September 14, 2012 8:37 AM
 To: U2 Users List
 Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

 Is there a definitive list of operations that makes something an iPhantom
 vs. a phantom?  I know about sockets, but presume there is more, right?

 ___
 U2-Users mailing list
 U2-Users@listserver.u2ug.org
 http://listserver.u2ug.org/mailman/listinfo/u2-users

___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-15 Thread David Taylor
Wally,

This reference is very helpful.

Is it true, then, that the number of true Phantoms (not iPhantoms) allowed
at any one time is unlimited, regardless of the number of licenses
purchased, or is there still some limit to the number of Phantoms allowed?

Thanks,

Dave


 https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf

 Wally Terhune
 Technical Support Engineer
 Rocket Software
 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA
 t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w:
 rocketsoftware.com/u2


 -Original Message-
 From: u2-users-boun...@listserver.u2ug.org
 [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
 Sent: Friday, September 14, 2012 8:37 AM
 To: U2 Users List
 Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

 Is there a definitive list of operations that makes something an iPhantom
 vs. a phantom?  I know about sockets, but presume there is more, right?

 ___
 U2-Users mailing list
 U2-Users@listserver.u2ug.org
 http://listserver.u2ug.org/mailman/listinfo/u2-users



___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-15 Thread Wally Terhune
There is no specific limit on phantom use.
However, if you use phantom processes in a home-grown connection pooling style 
application architecture, you may need to purchase connection pooling licenses 
to support that. You should validate your license needs with your U2 provider, 
though. 
Regards,

Wally Terhune
Technical Support Engineer
Rocket Software
4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA
t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2



-Original Message-
From: u2-users-boun...@listserver.u2ug.org 
[mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of David Taylor
Sent: Saturday, September 15, 2012 11:15 AM
To: U2 Users List
Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

Wally,

This reference is very helpful.

Is it true, then, that the number of true Phantoms (not iPhantoms) allowed at 
any one time is unlimited, regardless of the number of licenses purchased, or 
is there still some limit to the number of Phantoms allowed?

Thanks,

Dave


 https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf

 Wally Terhune
 Technical Support Engineer
 Rocket Software
 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA
 t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w:
 rocketsoftware.com/u2


 -Original Message-
 From: u2-users-boun...@listserver.u2ug.org
 [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
 Sent: Friday, September 14, 2012 8:37 AM
 To: U2 Users List
 Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

 Is there a definitive list of operations that makes something an 
 iPhantom vs. a phantom?  I know about sockets, but presume there is more, 
 right?

 ___
 U2-Users mailing list
 U2-Users@listserver.u2ug.org
 http://listserver.u2ug.org/mailman/listinfo/u2-users



___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users
___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-14 Thread Brian Leach
iPhantoms are any background that perform interactive operations, such as
opening a socket or device. They consume a licence.

FWIH some time back a couple of naughty sites were buying small numbers of
users and opening ttys directly with phantoms so IBM blocked that. Now it
catches all of us who legitimately want to make a web service or similar
call in the background.

Brian

-Original Message-
From: u2-users-boun...@listserver.u2ug.org
[mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of
dean.armbrus...@ferguson.com
Sent: 13 September 2012 23:32
To: u2-users@listserver.u2ug.org
Subject: [U2] [UD] LISTUSER output: phantom vs. iphantm

What is the difference between LISTUSER USRTYPEs phantom and iphantm?

On our systems, we will have 100 to 200 phantom processes, i.e. background
processes, running at any given moment.  When I look at them via LISTUSER,
they will be split approximately 60/40 between phantom and iphantm.  All
were started using the PHANTOM verb.

I can't discern a difference, and I can't find anything about it in the 7.3
UniData documents.  A search for iphantm has no hits.

This comes into play because it seems that SYSTEM(514) includes iphantm
sessions in the count, but not phantom sessions.  We have a monitoring
program that warns us if the number of users approaches the configured
license limit, and it uses SYSTEM(514).  We built in for it to allow for a
configurable amount of phantom processes.  If phantom processes may or may
not be included in SYSTEM(514), our monitor program isn't as accurate as it
could be.

It seems to me that neither phantom nor iphantm should be included in
SYSTEM(514).  HELP for SYSTEM(514) states that it returns the number users
currently logged in and does not include phantoms.  Presumably, this is the
number of licenses in use.  Do iphantm sessions use a license?


UniData 7.3.1
HPUX 11.31

Dean Armbruster
Information Technology, System Analyst
Ferguson Enterprises, Inc.
12500 Jefferson Avenue * Newport News * VA * 23602-4314
T: +1 (757) 989 2839 * F: +1 (757) 989 2801
www.ferguson.comhttp://www.wolseley.com/

___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-14 Thread Kevin King
Is there a definitive list of operations that makes something an iPhantom
vs. a phantom?  I know about sockets, but presume there is more, right?

On Fri, Sep 14, 2012 at 1:26 AM, Brian Leach br...@brianleach.co.uk wrote:

 iPhantoms are any background that perform interactive operations, such as
 opening a socket or device. They consume a licence.

 FWIH some time back a couple of naughty sites were buying small numbers of
 users and opening ttys directly with phantoms so IBM blocked that. Now it
 catches all of us who legitimately want to make a web service or similar
 call in the background.

 Brian

 -Original Message-
 From: u2-users-boun...@listserver.u2ug.org
 [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of
 dean.armbrus...@ferguson.com
 Sent: 13 September 2012 23:32
 To: u2-users@listserver.u2ug.org
 Subject: [U2] [UD] LISTUSER output: phantom vs. iphantm

 What is the difference between LISTUSER USRTYPEs phantom and iphantm?

 On our systems, we will have 100 to 200 phantom processes, i.e. background
 processes, running at any given moment.  When I look at them via LISTUSER,
 they will be split approximately 60/40 between phantom and iphantm.  All
 were started using the PHANTOM verb.

 I can't discern a difference, and I can't find anything about it in the 7.3
 UniData documents.  A search for iphantm has no hits.

 This comes into play because it seems that SYSTEM(514) includes iphantm
 sessions in the count, but not phantom sessions.  We have a monitoring
 program that warns us if the number of users approaches the configured
 license limit, and it uses SYSTEM(514).  We built in for it to allow for a
 configurable amount of phantom processes.  If phantom processes may or may
 not be included in SYSTEM(514), our monitor program isn't as accurate as it
 could be.

 It seems to me that neither phantom nor iphantm should be included in
 SYSTEM(514).  HELP for SYSTEM(514) states that it returns the number users
 currently logged in and does not include phantoms.  Presumably, this is the
 number of licenses in use.  Do iphantm sessions use a license?


 UniData 7.3.1
 HPUX 11.31

 Dean Armbruster
 Information Technology, System Analyst
 Ferguson Enterprises, Inc.
 12500 Jefferson Avenue * Newport News * VA * 23602-4314
 T: +1 (757) 989 2839 * F: +1 (757) 989 2801
 www.ferguson.comhttp://www.wolseley.com/

 ___
 U2-Users mailing list
 U2-Users@listserver.u2ug.org
 http://listserver.u2ug.org/mailman/listinfo/u2-users


 ___
 U2-Users mailing list
 U2-Users@listserver.u2ug.org
 http://listserver.u2ug.org/mailman/listinfo/u2-users

___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-14 Thread Wally Terhune
https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf

Wally Terhune
Technical Support Engineer
Rocket Software
4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA
t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2


-Original Message-
From: u2-users-boun...@listserver.u2ug.org 
[mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
Sent: Friday, September 14, 2012 8:37 AM
To: U2 Users List
Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

Is there a definitive list of operations that makes something an iPhantom vs. a 
phantom?  I know about sockets, but presume there is more, right?

___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users


Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-13 Thread Doug Averch
Dean:

iphanotm processes, I believe, stand for interactive phantoms.  Therefore,
iphantoms are counted as users because of using interactive processes like
callhttp.

Regards,
Doug
www.u2logic.com
Rocket Software VAR
___
U2-Users mailing list
U2-Users@listserver.u2ug.org
http://listserver.u2ug.org/mailman/listinfo/u2-users