Contents

Preface
What this book is about
Who should read this book
What you need to know to understand this book
How to use this book
Summary of changes
Changes for CICS Transaction Server for z/OS Version 3 Release 1
Changes for CICS Transaction Server for z/OS Version 2 Release 3
Changes for CICS Transaction Server for z/OS Version 2 Release 2
Changes for CICS Transaction Server for z/OS Version 2 Release 1
Changes for CICS Transaction Server for OS/390 Version 1 Release 3
Changes for CICS Transaction Server for OS/390 Version 1 Release 2
Changes for CICS Transaction Server for OS/390 Version 1 Release 1
Figures
Tables
CICS recovery and restart concepts
Introduction
Faults and their effects
Comparison of batch and online systems
Recovery requirements in a transaction processing system
Maintaining the integrity of data
Minimizing the effect of failures
The role of CICS
Recoverable resources
CICS backward recovery (backout)
Dynamic transaction backout
Emergency restart backout
CICS forward recovery
Forward recovery of CICS data sets
Forward recovery of other (non-VSAM) resources
Failures that require CICS recovery processing
CICS recovery processing following a communication failure
CICS recovery processing following a transaction failure
CICS recovery processing following a system failure
Resource recovery in CICS
Unit of work concepts
Unit of work
Unit of work states
Synchronization points
CICS recovery manager
Managing the state of each unit of work
Coordinating updates to local resources
Coordinating updates in distributed units of work
Resynchronization after system or connection failure
CICS system log
Information recorded on the system log
System activity keypoints
Forward recovery logs
User journals and automatic journaling
Shutdown and restart recovery
Shutdown
Normal shutdown processing
Immediate shutdown processing (PERFORM SHUTDOWN IMMEDIATE)
Shutdown requested by the operating system
Uncontrolled termination
The shutdown assist transaction
Cataloging CICS resources
Global catalog
Local catalog
Shutdown initiated by CICS log manager
Effect of problems with the system log
Reconstructing the state of the CICS region
Overriding the type of start indicator
Warm restart
Emergency restart
Cold start
Dynamic RLS restart
VTAM persistent sessions recovery
Multi-node persistent sessions
Single-node persistent sessions
Recovery and restart processes
CICS cold start
Starting CICS with the START=COLD parameter
A local cold start (START=COLD)
Starting CICS with the START=INITIAL parameter
CICS warm restart
Rebuilding the CICS state after a normal shutdown
Files
Temporary storage
Transient data
Transactions
Programs
Start requests
Monitoring and statistics
Journal names and journal models
Terminal control resources
Distributed transaction resources
URIMAP definitions and virtual hosts
CICS emergency restart
Recovering after a CICS failure
Overview
Rebuilding the CICS state after an abnormal termination
Files
Temporary storage
Transient data
Transactions
Programs
Start requests
Monitoring and statistics
Journal names and journal models
Terminal control resources
Distributed transaction resources
URIMAP definitions and virtual hosts
Automatic restart management
Overview
CICS ARM processing
Registering with ARM
Waiting for predecessor subsystems
De-registering from ARM
Failing to register
ARM couple data sets
CICS restart JCL and parameters
CICS START options
Workload policies
MVS automatic restart management definitions
Connecting to VTAM
The COVR transaction
Messages associated with automatic restart
Automatic restart of CICS data-sharing servers
Server ARM processing
Unit of work recovery and abend processing
Unit of work recovery
Transaction backout
Backout-failed recovery
Commit-failed recovery
In-doubt failure recovery
Investigating an in-doubt failure
Recovery from failures associated with the coupling facility
Cache failure support
Lost locks recovery
Connection failure to a coupling facility cache structure
Connection failure to a coupling facility lock structure
MVS system recovery and sysplex recovery
Transaction abend processing
How CICS handles transaction abends
Exit code
Abnormal termination of a task
Actions taken at transaction failure
Processing operating system abends and program checks
Communication error processing
Terminal error processing
Node error program (DFHZNEP)
Terminal error program (DFHTEP)
Intersystem communication failures
Implementing recovery and restart
Planning considerations
Application design considerations
Questions relating to recovery requirements
Validate the recovery requirements statement
Designing the end user’s restart procedure
End user’s standby procedures
Communications between application and user
Security
System definitions for recovery-related functions
System recovery table (SRT)
CICS-required resource definitions
Definition of system log streams and general log streams
System initialization parameters
Files
Transient data queues
Temporary storage table (TST)
Program list table (PLT)
Transaction list table (XLT)
Documentation and test plans
Defining system and general log streams
MVS log streams
Defining system log streams
Specifying a JOURNALMODEL resource definition
Model log streams for CICS system logs
Activity keypointing
Defining forward recovery log streams
Defining recoverable data sets
Model log streams for CICS general logs
Merging data on shared general log streams
Defining the log of logs
Log of logs failure
Reading log streams offline
Effect of day-light saving time changes
Adjusting local time
Time stamping log and journal records
Defining recoverability for CICS-managed resources
Recovery for transactions
Defining transaction recovery attributes
Recovery for files
VSAM files
Basic direct access method (BDAM)
Defining files as recoverable resources
File recovery attribute consistency checking (non-RLS)
Implementing forward recovery with user-written utilities
Implementing forward recovery with CICS VSAM Recovery MVS/ESA
Recovery for intrapartition transient data
Backward recovery
Forward recovery
Recovery for extrapartition transient data
Input extrapartition data sets
Output extrapartition data sets
Using post-initialization (PLTPI) programs
Recovery for temporary storage
Backward recovery
Forward recovery
Recovery for Web services
Persistent message processing
Programming considerations
Application design
Splitting the application into transactions
SAA-compatible applications
Program design
Dividing transactions into units of work
Processing dialogs with users
Mechanisms for passing data between transactions
Designing to avoid transaction deadlock
Implications of interval control START requests
Implications of automatic task initiation (TD trigger level)
Implications of presenting large amounts of data to the user
Managing transaction and system failures
Transaction failures
System failures
Handling abends and program level abend exits
Processing the IOERR condition
START TRANSID commands
PL/I programs and error handling
Locking (enqueuing on) resources in application programs
Implicit locking for files
Implicit enqueuing on logically recoverable TD destinations
Implicit enqueuing on recoverable temporary storage queues
Implicit enqueuing on DL/I databases with DBCTL
Explicit enqueuing (by the application programmer)
Possibility of transaction deadlock
User exits for transaction backout
Where you can add your own code
Exit details
Coding transaction backout exits
Using a program error program (PEP)
The CICS-supplied PEP
Your own PEP
Omitting the PEP
Resolving retained locks on recoverable resources
Quiescing RLS data sets
The RLS quiesce and unquiesce functions
The CICS RLS quiesce support
Switching from RLS to non-RLS access mode
Exception for read-only operations
What can prevent a switch to non-RLS access mode?
Resolving retained locks before opening data sets in non-RLS mode
Resolving retained locks and preserving data integrity
Choosing data availability over data integrity
The batch-enabling sample programs
CEMT command examples
A special case: lost locks
Overriding retained locks
Coupling facility data table retained locks
Moving recoverable data sets that have retained locks
Procedure for moving a data set with retained locks
Using the REPRO method
Using the EXPORT and IMPORT functions
Rebuilding alternate indexes
Forward recovery procedures
Forward recovery of data sets accessed in RLS mode
Recovery of data set with volume still available
Recovery of data set with loss of volume
Forward recovery of data sets accessed in non-RLS mode
Procedure for failed RLS mode forward recovery operation
Procedure for failed non-RLS mode forward recovery operation
Forward recovery with CICSVR
Why should you have a forward recovery utility?
CICSVR features
CICSVR benefits
How CICSVR protects your data
Storing information in the recovery control data set
Automated job creation
CICSVR and 24-hour CICS availability
Planning for CICSVR
Establishing backup procedures
Journaling considerations
Which VSAM spheres to protect
CICSVR exit considerations
Considerations for operational procedures and responsibilities
Running CICSVR
Using the main menu
Selecting from the VSAM sphere list
Using the VSAM sphere list Utilities pull-down
CICSVR reports
Forward recovery reports
Archive reports
Backup-while-open (BWO)
Benefits of BWO
BWO and concurrent copy
What is needed to use BWO
Hardware requirements
Which data sets are eligible for BWO
How you request BWO
Specifying BWO using access method services
Specifying BWO on CICS file resource definitions
Systems administration
BWO processing
File opening
File closing (non-RLS mode)
Shutdown and restart
Data set backup and restore
Forward recovery logging
Forward recovery
Recovering VSAM spheres with AIXs
An assembler program that calls DFSMS callable services
Disaster recovery
Why have a disaster recovery plan?
Disaster recovery testing
Six tiers of solutions for off-site recovery
Tier 0--no off-site data
Tier 1--physical removal
Tier 2--physical removal with hot site
Tier 3--electronic vaulting
Tier 0-3 solutions
Tier 4--active secondary site
Tier 5--two-site, two-phase commit
Tier 6--minimal to zero data loss
Tier 4-6 solutions
Disaster recovery and high availability
Peer-to-peer remote copy (PPRC) and extended remote copy (XRC)
Remote Recovery Data Facility
Choosing between RRDF and 3990-6 solutions
Disaster recovery personnel considerations
Returning to your primary site
Disaster recovery further information
Disaster recovery facilities
MVS system logger recovery support
CICS VSAM Recovery QSAM copy
Remote Recovery Data Facility support
CICSVR 2.3 shadowing
CICS emergency restart considerations
In-doubt and backout failure support
Remote site recovery for RLS-mode data sets
Final summary
Glossary
Bibliography
The CICS Transaction Server for z/OS library
The entitlement set
PDF-only books
Other CICS books
Accessibility
Index
Notices
Trademarks
[[ Contents Previous Page | Next Page Index ]]