用户手册目录Contents5Preface9What this book is about9Who should read this book9What you need to know to understand this book9How to use this book9Changes in CICS Transaction Server for z/OS, Version 4 Release 111Part 1. CICS recovery and restart concepts13Chapter 1. Recovery and restart facilities15Maintaining the integrity of data15Minimizing the effect of failures16The role of CICS16Recoverable resources17CICS backward recovery (backout)17Dynamic transaction backout18Emergency restart backout18CICS forward recovery19Forward recovery of CICS data sets19Failures that require CICS recovery processing20CICS recovery processing following a communication failure20XCF/MRO partner failures21CICS recovery processing following a transaction failure22CICS recovery processing following a system failure22Chapter 2. Resource recovery in CICS25Units of work25Shunted units of work25Locks26Synchronization points27Examples of synchronization points28CICS recovery manager29Managing the state of each unit of work30Coordinating updates to local resources31Coordinating updates in distributed units of work32Managing indoubt units of work32Resynchronization after system or connection failure33CICS system log33Information recorded on the system log33System activity keypoints34Forward recovery logs34User journals and automatic journaling34Chapter 3. Shutdown and restart recovery37Normal shutdown processing37First quiesce stage37Second quiesce stage38Third quiesce stage38Warm keypoints39Shunted units of work at shutdown39Flushing journal buffers40Immediate shutdown processing (PERFORM SHUTDOWN IMMEDIATE)40Shutdown requested by the operating system41Uncontrolled termination42The shutdown assist transaction42Cataloging CICS resources43Global catalog43Local catalog44Shutdown initiated by CICS log manager45Effect of problems with the system log45How the state of the CICS region is reconstructed46Overriding the type of start indicator47Warm restart47Emergency restart47Cold start48An initial start of CICS48Dynamic RLS restart49Recovery with VTAM persistent sessions50Running with persistent sessions support50Situations in which sessions are not reestablished51Situations in which VTAM does not retain sessions52Running without persistent sessions support52Part 2. Recovery and restart processes55Chapter 4. CICS cold start57Starting CICS with the START=COLD parameter57Files58Temporary storage59Temporary storage data sharing server59Transient data59Transactions60Journal names and journal models60LIBRARY resources60Programs60Start requests (with and without a terminal)60Resource definitions dynamically installed60Monitoring and statistics61Terminal control resources61Committing and cataloging resources installed from the CSD61Distributed transaction resources62Dump table62Starting CICS with the START=INITIAL parameter62Chapter 5. CICS warm restart65Rebuilding the CICS state after a normal shutdown65Files66Data set name blocks66Reconnecting to SMSVSAM for RLS access66Recreating non-RLS retained locks66Temporary storage67Temporary storage data sharing server67Transient data67TDINTRA=NOEMPTY (the default)67TDINTRA=EMPTY67Transactions68LIBRARY resources68Programs68No autoinstall for programs68Autoinstall for programs69Start requests69Monitoring and statistics69Journal names and journal models70Terminal control resources70CSD-defined resource definitions70TCAM and sequential (BSAM) devices70Distributed transaction resources71URIMAP definitions and virtual hosts71Chapter 6. CICS emergency restart73Recovering after a CICS failure73Recovering information from the system log73Driving backout processing for in-flight units of work73Concurrent processing of new work and backout73Effect of delayed recovery on PLTPI processing74Other backout processing74Rebuilding the CICS state after an abnormal termination74Files74Temporary storage75Transient data75Start requests76Terminal control resources76Distributed transaction resources77Chapter 7. Automatic restart management79CICS ARM processing79Registering with ARM80Waiting for predecessor subsystems80De-registering from ARM80Failing to register81ARM couple data sets81CICS restart JCL and parameters81Workload policies82Connecting to VTAM82The COVR transaction83Messages associated with automatic restart83Automatic restart of CICS data-sharing servers83Server ARM processing83Waiting on events during initialization84Server initialization parameters for ARM support84Server commands for ARM support84Chapter 8. Unit of work recovery and abend processing85Unit of work recovery85Transaction backout86Files87Intrapartition transient data88Auxiliary temporary storage88START requests88EXEC CICS CANCEL requests90Basic mapping support (BMS) messages90Backout-failed recovery91Retrying backout-failed units of work92Disposition of data sets after backout failures92Possible reasons for VSAM backout failure92Commit-failed recovery95Indoubt failure recovery96Files96Intrapartition transient data97Auxiliary temporary storage97Investigating an indoubt failure97Recovery from failures associated with the coupling facility100Cache failure support100Lost locks recovery101Rebuilding the lock structure101Notifying CICS of SMSVSAM restart101Performing lost locks recovery for failed units of work102Connection failure to a coupling facility cache structure103Connection failure to a coupling facility lock structure103MVS system recovery and sysplex recovery103Transaction abend processing104Exit code104Abnormal termination of a task105Transaction restart105Actions taken at transaction failure106Processing operating system abends and program checks106Chapter 9. Communication error processing109Terminal error processing109Node error program (DFHZNEP)109Terminal error program (DFHTEP)109Intersystem communication failures110Part 3. Implementing recovery and restart111Chapter 10. Planning aspects of recovery113Application design considerations113Questions relating to recovery requirements113Validate the recovery requirements statement114Designing the end user’s restart procedure115End user’s standby procedures115Communications between application and user115Security116System definitions for recovery-related functions116Documentation and test plans117Chapter 11. Defining system and general log streams119Defining log streams to MVS120Defining system log streams120Specifying a JOURNALMODEL resource definition121Model log streams for CICS system logs122Recovery considerations122Activity keypointing124Keeping system log data to a minimum125Log-tail deletion126Writing user-recovery data127Avoiding retention periods on the system log127Long-running transactions128Defining forward recovery log streams128Model log streams for CICS general logs129Merging data on shared general log streams130Defining the log of logs130Log of logs failure131Reading log streams offline131Effect of daylight saving time changes132Adjusting local time132Time stamping log and journal records132Offline utility program, DFHJUP133Chapter 12. Defining recoverability for CICS-managed resources135Recovery for transactions135Defining transaction recovery attributes135Indoubt options for distributed transactions136Recovery for files137VSAM files137Basic direct access method (BDAM)138Defining files as recoverable resources138VSAM files accessed in non-RLS mode139VSAM files accessed in RLS mode140BDAM files141The CSD data set141File recovery attribute consistency checking (non-RLS)141Overriding open failures at the XFCNREC global user exit141CICS responses to file open requests142Implementing forward recovery with user-written utilities143Implementing forward recovery with CICS VSAM Recovery MVS/ESA143Recovery for intrapartition transient data143Backward recovery143Logical recovery144Physical recovery144No recovery145Forward recovery145Recovery for extrapartition transient data146Input extrapartition data sets146Output extrapartition data sets147Using post-initialization (PLTPI) programs147Recovery for temporary storage147Backward recovery147Forward recovery148Recovery for Web services148Configuring CICS to support persistent messages148Defining local queues in a service provider149Persistent message processing150Chapter 13. Programming for recovery153Designing applications for recovery153Splitting the application into transactions153Relationships between processing units154SAA-compatible applications155Program design155Dividing transactions into units of work155Processing dialogs with users156Conversational processing156Pseudoconversational processing156Mechanisms for passing data between transactions157Temporary storage (auxiliary)158Transient data queues158User files and DL/I and DB2 databases158User-maintained data tables158Coupling facility data tables158Designing to avoid transaction deadlocks158Implications of interval control START requests159Implications of automatic task initiation (TD trigger level)160Implications of presenting large amounts of data to the user160Terminal paging through BMS160Using transient data queues160Managing transaction and system failures161Transaction failures161System failures163Handling abends and program level abend exits163Processing the IOERR condition164START TRANSID commands165PL/I programs and error handling165Locking (enqueuing on) resources in application programs165Implicit locking for files166Nonrecoverable files166Recoverable files167Implicit enqueuing on logically recoverable TD destinations169Implicit enqueuing on recoverable temporary storage queues169Implicit enqueuing on DL/I databases with DBCTL170Explicit enqueuing (by the application programmer)170Possibility of transaction deadlock171User exits for transaction backout172Where you can add your own code172XRCINIT exit173XRCINPT exit173XFCBFAIL global user exit173XFCLDEL global user exit174XFCBOVER global user exit174XFCBOUT global user exit174Coding transaction backout exits174Chapter 14. Using a program error program (PEP)175The CICS-supplied PEP175Your own PEP176Omitting the PEP177Chapter 15. Resolving retained locks on recoverable resources179Quiescing RLS data sets179The RLS quiesce and unquiesce functions180Illustration of the quiesce flow across two CICS regions180Other quiesce interface functions182Switching from RLS to non-RLS access mode184Exception for read-only operations184What can prevent a switch to non-RLS access mode?185Resolving retained locks before opening data sets in non-RLS mode186Investigating which retained locks are held and why186INQUIRE DSNAME187INQUIRE UOWDSNFAIL187SHCDS LIST subcommands188Resolving retained locks and preserving data integrity188Choosing data availability over data integrity189The batch-enabling sample programs190CEMT command examples190A special case: lost locks192Overriding retained locks192The PERMITNONRLSUPDATE subcommand192The DENYNONRLSUPDATE subcommand192Post-batch processing193Coupling facility data table retained locks194Chapter 16. Moving recoverable data sets that have retained locks195Procedure for moving a data set with retained locks195Using the REPRO method195Using the EXPORT and IMPORT functions197Rebuilding alternate indexes198Chapter 17. Forward recovery procedures199Forward recovery of data sets accessed in RLS mode199Recovery of data set with volume still available200Recovery of data set with loss of volume201Volume recovery procedure using CFVOL QUIESCE202Catalog recovery209Forward recovery of data sets accessed in non-RLS mode210Procedure for failed RLS mode forward recovery operation210Procedure for failed non-RLS mode forward recovery operation213Chapter 18. Backup-while-open (BWO)215BWO and concurrent copy215BWO and backups215BWO requirements216Hardware requirements217Which data sets are eligible for BWO217How you request BWO218Specifying BWO using access method services218Specifying BWO on CICS file resource definitions219Removing BWO attributes220Systems administration220BWO processing221File opening222First file opened in non-RLS mode against a cluster222Subsequent files opened when use count is not zero223Subsequent files opened when use count is zero223File closing (non-RLS mode)224Shutdown and restart225Controlled shutdown225Immediate or uncontrolled shutdown225Restart225Data set backup and restore225VSAM access method services226Invalid state changes for BWO attributes226Data set restore227Forward recovery logging227Data sets227Recovery point (non-RLS mode)228Forward recovery228Recovering VSAM spheres with AIXs229An assembler program that calls DFSMS callable services230Chapter 19. Disaster recovery235Why have a disaster recovery plan?235Disaster recovery testing236Six tiers of solutions for off-site recovery237Tier 0: no off-site data237Tier 1 - physical removal237Tier 2 - physical removal with hot site239Tier 3 - electronic vaulting239Tier 0–3 solutions240Tier 4 - active secondary site241Tier 5 - two-site, two-phase commit243Tier 6 - minimal to zero data loss243Tier 4–6 solutions245Disaster recovery and high availability246Peer-to-peer remote copy (PPRC) and extended remote copy (XRC)246PPRC or XRC?247Other benefits of PPRC and XRC248Forward recovery248Remote Recovery Data Facility248Choosing between RRDF and 3990-6 solutions249Disaster recovery personnel considerations249Returning to your primary site250Disaster recovery facilities250MVS system logger recovery support250CICS VSAM Recovery QSAM copy251Remote Recovery Data Facility support251CICS VR shadowing251CICS emergency restart considerations251Indoubt and backout failure support251Remote site recovery for RLS-mode data sets251Final summary252Part 4. Appendixes253Notices255Trademarks256Bibliography257CICS books for CICS Transaction Server for z/OS257CICSPlex SM books for CICS Transaction Server for z/OS258Other CICS publications258Accessibility259Index261A261B261C261D261E262F262G262H262I262J262K262L262M263N263O263P263Q263R263S263T264U264V264W264X264Readers’ Comments — We'd Like to Hear from You265文件大小: 1.1 MB页数: 268Language: English打开用户手册