Chapter 28. CICS monitoring ..................743
Introduction to CICS monitoring ..................743
How CICS monitoring data is passed to SMF ............743
Coding additional event-monitoring points .............744
Application naming event monitoring points .............744
The monitoring control table (MCT) ................747
CICS monitoring record formats ..................750
SMF header and SMF product section...............750
CICS data section ......................754
Chapter 29. Writing statistics collection and analysis programs .....769
Writing a program to collect CICS statistics ..............769
Background information ....................769
Resetting statistics counters ..................770
Using the EXEC CICS COLLECT and EXTRACT STATISTICS commands 770
CICS statistics record format ...................771
SMF header and SMF product section...............771
CICS statistics data section ...................773
Using an XSTOUT global user exit program to filter statistics records ....776
Processing the output from CICS statistics ..............777
Part 6. Customizing CICS compatibility interfaces ..............779
Chapter 30. The dynamic allocation sample program .........781
Overview of the dynamic allocation program .............781
Installing the program and transaction definitions ............782
The dynamic allocation program—terminal operation ..........782
Using the dynamic allocation program’s Help feature ..........782
The dynamic allocation program—values ...............783
Abbreviation rules for keywords .................784
System programming considerations ...............784
The flow of control when a DYNALLOC request is issued.........784
Part 7. Customizing CICS security processing ................787
Chapter 31. Invoking an external security manager ..........789
An overview of the CICS-ESM interface ...............789
The MVS router ........................789
The MVS router exit .....................789
Using ESM exit programs to access CICS-related information .......791
For non-RACF users — the ESM parameter list ...........792
For RACF users — the RACF user exit parameter list .........792
The installation data parameter list ................793
CICS security control points....................796
Using early verification processing .................797
Writing an early verification routine ................798
Using CICS API commands in an early verification routine .......799
Return and reason codes from the early verification routine .......799
Chapter 32. Writing a “good night” program ............801
The communications area of the “good night” program ..........801
The sample “good night” program, DFH0GNIT .............803
What the sample program does .................803
Customizing the sample “good night” program .............804
Contents xiii