Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Excellent, thanks Wally! On Fri, Sep 14, 2012 at 9:23 PM, Wally Terhune wterh...@rocketsoftware.comwrote: https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf Wally Terhune Technical Support Engineer Rocket Software 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2 -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto: u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King Sent: Friday, September 14, 2012 8:37 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users
Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Wally, This reference is very helpful. Is it true, then, that the number of true Phantoms (not iPhantoms) allowed at any one time is unlimited, regardless of the number of licenses purchased, or is there still some limit to the number of Phantoms allowed? Thanks, Dave https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf Wally Terhune Technical Support Engineer Rocket Software 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2 -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King Sent: Friday, September 14, 2012 8:37 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users
Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
There is no specific limit on phantom use. However, if you use phantom processes in a home-grown connection pooling style application architecture, you may need to purchase connection pooling licenses to support that. You should validate your license needs with your U2 provider, though. Regards, Wally Terhune Technical Support Engineer Rocket Software 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2 -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of David Taylor Sent: Saturday, September 15, 2012 11:15 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Wally, This reference is very helpful. Is it true, then, that the number of true Phantoms (not iPhantoms) allowed at any one time is unlimited, regardless of the number of licenses purchased, or is there still some limit to the number of Phantoms allowed? Thanks, Dave https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf Wally Terhune Technical Support Engineer Rocket Software 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2 -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King Sent: Friday, September 14, 2012 8:37 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users
Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
iPhantoms are any background that perform interactive operations, such as opening a socket or device. They consume a licence. FWIH some time back a couple of naughty sites were buying small numbers of users and opening ttys directly with phantoms so IBM blocked that. Now it catches all of us who legitimately want to make a web service or similar call in the background. Brian -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of dean.armbrus...@ferguson.com Sent: 13 September 2012 23:32 To: u2-users@listserver.u2ug.org Subject: [U2] [UD] LISTUSER output: phantom vs. iphantm What is the difference between LISTUSER USRTYPEs phantom and iphantm? On our systems, we will have 100 to 200 phantom processes, i.e. background processes, running at any given moment. When I look at them via LISTUSER, they will be split approximately 60/40 between phantom and iphantm. All were started using the PHANTOM verb. I can't discern a difference, and I can't find anything about it in the 7.3 UniData documents. A search for iphantm has no hits. This comes into play because it seems that SYSTEM(514) includes iphantm sessions in the count, but not phantom sessions. We have a monitoring program that warns us if the number of users approaches the configured license limit, and it uses SYSTEM(514). We built in for it to allow for a configurable amount of phantom processes. If phantom processes may or may not be included in SYSTEM(514), our monitor program isn't as accurate as it could be. It seems to me that neither phantom nor iphantm should be included in SYSTEM(514). HELP for SYSTEM(514) states that it returns the number users currently logged in and does not include phantoms. Presumably, this is the number of licenses in use. Do iphantm sessions use a license? UniData 7.3.1 HPUX 11.31 Dean Armbruster Information Technology, System Analyst Ferguson Enterprises, Inc. 12500 Jefferson Avenue * Newport News * VA * 23602-4314 T: +1 (757) 989 2839 * F: +1 (757) 989 2801 www.ferguson.comhttp://www.wolseley.com/ ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users
Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? On Fri, Sep 14, 2012 at 1:26 AM, Brian Leach br...@brianleach.co.uk wrote: iPhantoms are any background that perform interactive operations, such as opening a socket or device. They consume a licence. FWIH some time back a couple of naughty sites were buying small numbers of users and opening ttys directly with phantoms so IBM blocked that. Now it catches all of us who legitimately want to make a web service or similar call in the background. Brian -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of dean.armbrus...@ferguson.com Sent: 13 September 2012 23:32 To: u2-users@listserver.u2ug.org Subject: [U2] [UD] LISTUSER output: phantom vs. iphantm What is the difference between LISTUSER USRTYPEs phantom and iphantm? On our systems, we will have 100 to 200 phantom processes, i.e. background processes, running at any given moment. When I look at them via LISTUSER, they will be split approximately 60/40 between phantom and iphantm. All were started using the PHANTOM verb. I can't discern a difference, and I can't find anything about it in the 7.3 UniData documents. A search for iphantm has no hits. This comes into play because it seems that SYSTEM(514) includes iphantm sessions in the count, but not phantom sessions. We have a monitoring program that warns us if the number of users approaches the configured license limit, and it uses SYSTEM(514). We built in for it to allow for a configurable amount of phantom processes. If phantom processes may or may not be included in SYSTEM(514), our monitor program isn't as accurate as it could be. It seems to me that neither phantom nor iphantm should be included in SYSTEM(514). HELP for SYSTEM(514) states that it returns the number users currently logged in and does not include phantoms. Presumably, this is the number of licenses in use. Do iphantm sessions use a license? UniData 7.3.1 HPUX 11.31 Dean Armbruster Information Technology, System Analyst Ferguson Enterprises, Inc. 12500 Jefferson Avenue * Newport News * VA * 23602-4314 T: +1 (757) 989 2839 * F: +1 (757) 989 2801 www.ferguson.comhttp://www.wolseley.com/ ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users
Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
https://u2tc.rocketsoftware.com/documentation/PDF/1177927.pdf Wally Terhune Technical Support Engineer Rocket Software 4600 South Ulster Street, Suite 1100 **Denver, CO 80237 **USA t: +1 720 475 8055 **e: wterh...@rocketsoftware.com **w: rocketsoftware.com/u2 -Original Message- From: u2-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King Sent: Friday, September 14, 2012 8:37 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users
Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Dean: iphanotm processes, I believe, stand for interactive phantoms. Therefore, iphantoms are counted as users because of using interactive processes like callhttp. Regards, Doug www.u2logic.com Rocket Software VAR ___ U2-Users mailing list U2-Users@listserver.u2ug.org http://listserver.u2ug.org/mailman/listinfo/u2-users