Installation Guide: DB2 Universal Database For OS/390
Installation Guide: DB2 Universal Database For OS/390
Installation Guide: DB2 Universal Database For OS/390
IBM
Installation Guide
Version 6
GC26-9008-01
Note! Before using this information and the product it supports, be sure to read the general information under Appendix B, Notices on page 511.
Contents
Section 1. Introduction
1 3 3 3 4 4 5 8 9 13
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
| |
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library Who should read this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How this book is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Product terminology and citations . . . . . . . . . . . . . . . . . . . . . . . . . . . How to read the syntax diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . How to use the DB2 library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to obtain DB2 information . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary of changes to DB2 UDB for OS/390 Version 6 . . . . . . . . . . . . . Summary of changes to this book . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17 25 25 25 27 28 28 29 30 32 32 35 35 45 49 60 63 63 64 67 75 76 77 77 78 79 79 80 80 80 80
Chapter 2-1. Introduction to installation and migration Installing other features of the DB2 UDB Server for OS/390 Installation features . . . . . . . . . . . . . . . . . . . . . . . Installation and migration steps overview . . . . . . . . . . Planning for migration incompatibilities . . . . . . . . . . . . SMP/E steps summary . . . . . . . . . . . . . . . . . . . . . Installation steps summary . . . . . . . . . . . . . . . . . . . Migration steps summary . . . . . . . . . . . . . . . . . . . . Fallback steps summary . . . . . . . . . . . . . . . . . . . . Remigration steps summary . . . . . . . . . . . . . . . . . . Chapter 2-2. Estimating DB2 storage needs . . . . DASD Storage for DB2 Subsystem . . . . . . . . . . . Virtual storage for address spaces . . . . . . . . . . . Virtual storage for storage pools and working storage Real storage . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
| | |
| | | | |
Chapter 2-3. Loading DB2 libraries . . . . . . . . . . . . . . . . . . . . . What IBM sends you . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What you produce . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SMP/E step 1: Copy and edit the SMP/E jobs . . . . . . . . . . . . . . . . SMP/E step 2: Allocate the SMP/E CSI file and SMP/E control data sets: DSNTIJAA (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SMP/E step 3: Allocate distribution and target libraries: DSNTIJAE . . . SMP/E step 4: Run the receive job: DSNTIJRC . . . . . . . . . . . . . . . SMP/E step 5: Cleanup job for migration: DSNTIJUD (optional) . . . . . SMP/E step 6: Run the apply job: DSNTIJAP . . . . . . . . . . . . . . . . SMP/E step 7: Run the accept job: DSNTIJAC . . . . . . . . . . . . . . . SMP/E step 8: Unload the jobs for the Kanji DB2I panels (optional) . . . SMP/E step 9: Allocate libraries for Kanji DB2I panels (optional) . . . . . SMP/E step 10: Run the receive job for the Kanji DB2I panels (optional) SMP/E step 11: Run the apply job for the Kanji DB2I panels (optional) . SMP/E step 12: Run the accept job for the Kanji DB2I panels (optional) .
iii
# # # # #
SMP/E step 13: Copy and edit the SMP/E jobs for DB2 REXX Language Support (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SMP/E step 14: Run the RECEIVE job for DB2 REXX Language Support SMP/E step 15: Run the APPLY job for DB2 REXX Language Support . SMP/E step 16: Run the ACCEPT job for DB2 REXX Language Support SMP/E step 17: Ensure installation of proper maintenance . . . . . . . . . Finishing SMP/E processing . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2-4. Setting up and using DB2 Online Help . . . . . Copying the bookshelf list, index, and books . . . . . . . . . . . Changing online help book data set names (optional) . . . . . . Customizing BookManager READ/MVS for online help (optional) Verifying online help and setting exit options . . . . . . . . . . . Making online help accessible from installation and DB2I panels Using online help . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . .
80 81 81 81 81 82 83 83 83 84 86 87 87 91 91 109 114 116 120 125 133 136 139 142 148 150 155 157 159 161 168 175 183 188 194 199 203 207 209 215 217 222 226 229 232 235 239 239 246 251
| | | | | | |
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
| |
Chapter 2-5. Installing, migrating, and updating system parameters Running the installation CLIST . . . . . . . . . . . . . . . . . . . . . . . . Data parameters panel: DSNTIPA2 . . . . . . . . . . . . . . . . . . . . . . Define group or member panel: DSNTIPK . . . . . . . . . . . . . . . . . . System resource data set names: DSNTIPH . . . . . . . . . . . . . . . . Data set names panel 1: DSNTIPT . . . . . . . . . . . . . . . . . . . . . . Data set names panel 2: DSNTIPU . . . . . . . . . . . . . . . . . . . . . . Data set names panel 3: DSNTIPQ . . . . . . . . . . . . . . . . . . . . . . Data set names panel 4: DSNTIPG . . . . . . . . . . . . . . . . . . . . . . Data set names panel 5: DSNTIPW . . . . . . . . . . . . . . . . . . . . . Sizes panel 1: DSNTIPD . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sizes panel 2: DSNTIP7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Thread management panel: DSNTIPE . . . . . . . . . . . . . . . . . . . . Buffer pool sizes panel 1: DSNTIP1 . . . . . . . . . . . . . . . . . . . . . Buffer pool sizes panel 2: DSNTIP2 . . . . . . . . . . . . . . . . . . . . . Buffer pool sizes panel 3: DSNTIP6 . . . . . . . . . . . . . . . . . . . . . Tracing and checkpoints panel: DSNTIPN . . . . . . . . . . . . . . . . . . Operator functions panel: DSNTIPO . . . . . . . . . . . . . . . . . . . . . Application programming defaults panel 1: DSNTIPF . . . . . . . . . . . Application programming defaults panel 2: DSNTIP4 . . . . . . . . . . . IRLM panel 1: DSNTIPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . IRLM panel 2: DSNTIPJ . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protection panel: DSNTIPP . . . . . . . . . . . . . . . . . . . . . . . . . . MVS parmlib updates panel: DSNTIPM . . . . . . . . . . . . . . . . . . . Active log data set parameters: DSNTIPL . . . . . . . . . . . . . . . . . . Archive log data set parameters: DSNTIPA . . . . . . . . . . . . . . . . . Databases and spaces to start automatically panel: DSNTIPS . . . . . . Distributed data facility: DSNTIPR . . . . . . . . . . . . . . . . . . . . . . Distributed data facility panel: DSNTIP5 . . . . . . . . . . . . . . . . . . . Routine parameters panel: DSNTIPX . . . . . . . . . . . . . . . . . . . . . Data definition control support panel: DSNTIPZ . . . . . . . . . . . . . . . Job editing panel: DSNTIPY . . . . . . . . . . . . . . . . . . . . . . . . . . Install DB2 - CLIST calculations panel 1: DSNTIPC . . . . . . . . . . . . Install DB2 - CLIST calculations panel 2: DSNTIPC1 . . . . . . . . . . . Completing the CLIST processing . . . . . . . . . . . . . . . . . . . . . . The update process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2-6. Installing the DB2 subsystem
. . . . . . . . . . . . . . . . . . . .
iv
Installation Guide
# #
Installation step 1: Define DB2 to MVS: DSNTIJMV . . . . . . . . . . . . Installation step 2: Define the integrated catalog facility catalog and Alias: DSNTIJCA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 3: Define system data sets: DSNTIJIN . . . . . . . . . . Installation step 4: Initialize system data sets: DSNTIJID . . . . . . . . . Installation step 5: Define DB2 initialization parameters: DSNTIJUZ . . . Installation step 6: Define user authorization exit routines: DSNTIJEX (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 7: Record DB2 data to SMF (optional) . . . . . . . . . . . Installation step 8: Establish subsystem security (optional) . . . . . . . . . Installation Step 9: Connect DB2 to TSO . . . . . . . . . . . . . . . . . . . Installation step 10: Connect IMS to DB2 (optional) . . . . . . . . . . . . . Installation step 11: Connect CICS to DB2 (optional) . . . . . . . . . . . . Installation step 12: IPL MVS . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 13: Start the DB2 subsystem . . . . . . . . . . . . . . . . Installation step 14: Define temporary work files: DSNTIJTM . . . . . . . Installation Step 15: Define and bind DB2 objects and user-maintained databases: DSNTIJSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 16: Populate the user-maintained databases (optional) . Installation step 17: Bind the packages for DB2 REXX Language Support: DSNTIJRX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation Step 18: Back up the DB2 directory and catalog: DSNTIJIC . Installation step 19: Verify the installation . . . . . . . . . . . . . . . . . . . Installing support for a communications network . . . . . . . . . . . . . . . Installing a second DB2 on the same operating system . . . . . . . . . . . Considerations for using shared DASD . . . . . . . . . . . . . . . . . . . . Enabling stored procedures after installation . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
251 256 256 257 258 260 261 262 262 269 269 270 270 271 273 275 275 275 276 276 277 282 283 287 287 292 300 301 302 302 303 306 306 306 307 308 309 309 312 312 313 313 314 315 316
Chapter 2-7. Migrating the DB2 subsystem . . . . . . . . . . . . . . . . . . . Migration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 1: Premigration activities . . . . . . . . . . . . . . . . . . . . . . . Migration Step 2: Run link checker on DB2 for OS/390 Version 5 table spaces (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 3: Determine which plans and packages are invalid after migration (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 4: Check for consistency between catalog tables (optional) . . . Migration step 5: Image copy directory and catalog in case of fallback: DSNTIJIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 6: Connect DB2 to TSO . . . . . . . . . . . . . . . . . . . . . . . Migration step 7: Connect IMS to DB2 (optional) . . . . . . . . . . . . . . . . . Migration step 8: Connect CICS to DB2 (optional) . . . . . . . . . . . . . . . . . Migration step 9: Stop DB2 for OS/390 Version 5 activity . . . . . . . . . . . . Migration step 10: Back up your DB2 for OS/390 Version 5 volumes (optional) Migration step 11: Define DB2 initialization parameters: DSNTIJUZ . . . . . . Migration step 12: Establish subsystem security (optional) . . . . . . . . . . . . Migration step 13: Define DB2 Version 6 to MVS: DSNTIJMV . . . . . . . . . Migration step 14: Define system data sets: DSNTIJIN . . . . . . . . . . . . . Migration step 15: Define user authorization exit routines: DSNTIJEX . . . . . Migration step 16: IPL MVS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 17: Start DB2 for OS/390 Version 6 . . . . . . . . . . . . . . . . Migration step 18: Tailor DB2 for OS/390 Version 6 catalog: DSNTIJTC . . . Migration step 19: Ensure there are no problems with the catalog (optional) . Migration step 20: Prepare dynamic SQL program: DSNTIJTM . . . . . . . . .
Contents
# #
Migration step 21: Bind SPUFI and DCLGEN and user maintained database activity: DSNTIJSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 22: Bind the packages for DB2 REXX Language Support: DSNTIJRX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 23: Image copy DB2 for OS/390 Version 6 catalog: DSNTIJIC Migration step 24: Verify your DB2 for OS/390 Version 6 system . . . . . . . . Chapter 2-8. Falling back and remigrating Falling back . . . . . . . . . . . . . . . . . . . Remigrating . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
316 317 317 317 319 319 327 329 330 334 335 337 339 339 340 344 349 353 357 361 371 373 377 399 399 400 400 402 403 403 404 409 411 411 412 414 414 420 421 421 422
Chapter 2-9. Verifying with the sample applications . . . . . . Installation verification phases and programs . . . . . . . . . . . . Planning for verification . . . . . . . . . . . . . . . . . . . . . . . . . Special considerations for COBOL programs . . . . . . . . . . . . Special considerations for C and C++ programs . . . . . . . . . . . Special considerations for PL/I programs . . . . . . . . . . . . . . Phase 0: Deleting the sample objects (DSNTEJ0) . . . . . . . . . Phase 1: Creating and loading sample tables . . . . . . . . . . . Phase 2: Testing the batch environment . . . . . . . . . . . . . . Phase 3: Testing SPUFI, DRDA Access, dynamic SQL, and TSO Phase 4: Testing the IMS environment . . . . . . . . . . . . . . . Phase 5: Testing the CICS environment . . . . . . . . . . . . . . Phase 6: Accessing data at a remote site . . . . . . . . . . . . . Phase 7: Accessing LOB Data . . . . . . . . . . . . . . . . . . . . The sample applications . . . . . . . . . . . . . . . . . . . . . . . . Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit exit routine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Huffman compression exit routine . . . . . . . . . . . . . . . . . . . Sample field procedure . . . . . . . . . . . . . . . . . . . . . . . . . Dynamic SQL statements (DSNTESA, DSNTESQ) . . . . . . . . . Dynamic SQL programs (DSNTIAD, DSNTEP2, DSNTIAUL) . . . Chapter 2-10. Connecting the IMS attachment facility Making DB2 load modules available to IMS . . . . . . . . Defining DB2 to IMS . . . . . . . . . . . . . . . . . . . . . IMS attachment facility macro (DSNMAPN) . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2-11. Connecting the CICS attachment facility . . . . . . . . . Using the attachment facility for CICS Version 4 and CICS TS Version 1.1 Calculating space requirements for the CICS attachment facility . . . . . . Defining the DB2 to CICS connection using the RCT . . . . . . . . . . . . Updating the CICS system tables . . . . . . . . . . . . . . . . . . . . . . . . Updating CICS initialization JCL . . . . . . . . . . . . . . . . . . . . . . . . . Coordinating DB2 and CICS security . . . . . . . . . . . . . . . . . . . . . . Preparing CICS applications for DB2 . . . . . . . . . . . . . . . . . . . . . . CICS attachment facility macro (DSNCRCT) . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 3-1. Connecting distributed database systems The database protocols (DRDA vs private) . . . . . . . . . The communications protocols . . . . . . . . . . . . . . . .
vi
Installation Guide
The role of the communications database (CDB) Enhancements in Version 6 . . . . . . . . . . . . DB2 installation considerations . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
444 445 446 447 449 449 451 458 462 462 478 485 487 488 489 490 490 493 496 496
Chapter 3-2. Connecting systems with VTAM . . . . . Step 1: Customize VTAM for DB2 . . . . . . . . . . . . . Step 2: Choose names and a password . . . . . . . . . Step 3: Define the DB2 subsystem to VTAM . . . . . . . Step 4: Populate the communications database . . . . . Step 5: Start VTAM to use DB2 . . . . . . . . . . . . . . Step 6: Tune the system . . . . . . . . . . . . . . . . . . Sample VTAM definitions to connect two DB2s . . . . . . Using the change log inventory utility to update the BSDS Chapter 3-3. Connecting systems with TCP/IP Enabling TCP/IP communication . . . . . . . . . . Step 1: Prepare the LE/370 runtime library . . . . Step 2: Enable DDF for OpenEdition . . . . . . . Step 3: Define the DB2 subsystem to TCP/IP . . Step 4: Populate the communications database . Step 5: Start TCP/IP support . . . . . . . . . . . . Step 6: Tuning TCP/IP . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendixes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
497 499 499 500 506 506 509 511 512 514 517 537 543
Appendix A. Appendix A. Character conversion Understanding character conversion . . . . . . . . . Specifying a system coded character set identifier . Specifying locales . . . . . . . . . . . . . . . . . . . . Customizing character conversion . . . . . . . . . . When remote packages should be rebound . . . . . Appendix B. Notices . . . . . . . Programming interface information Trademarks . . . . . . . . . . . . . Glossary
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Bibliography Index
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
vii
viii
Installation Guide
Section 1. Introduction
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library Who should read this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How this book is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Product terminology and citations . . . . . . . . . . . . . . . . . . . . . . . . . . . How to read the syntax diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . How to use the DB2 library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to obtain DB2 information . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to order the DB2 library . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary of changes to DB2 UDB for OS/390 Version 6 . . . . . . . . . . . . . Capacity improvements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Performance and availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data sharing enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . User productivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object-relational extensions and active data . . . . . . . . . . . . . . . . . . . More function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Features of DB2 for OS/390 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary of changes to this book . . . . . . . . . . . . . . . . . . . . . . . . . . Section 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Section 2. Planning and Installing DB2 . . . . . . . . . . . . . . . . . . . . . . Section 3. Communicating with Other Systems . . . . . . . . . . . . . . . . . Appendixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . .
| | | | | | | | | | | | | | | |
3 3 3 4 4 5 8 8 8 9 9 9 9 9 11 11 11 12 13 13 13 13 13 14 14 15
Installation Guide
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
This chapter contains specific information about this book and a general overview of the DB2 Universal Database for OS/390 library.
This describes how DB2 handles character conversion for distributed data.
C and C language Represent the C programming language. CICS IMS MVS Represents CICS/ESA and CICS Transaction Server for OS/390 Release 1. Represents IMS/ESA. Represents the MVS element of OS/390.
The symbol indicates that the statement syntax is continued on the next line. The symbol indicates that a statement is continued from the previous line. The symbol indicates the end of a statement.
Diagrams of syntactical units other than complete statements start with the symbol and end with the symbol. Required items appear on the horizontal line (the main path). required_item Optional items appear below the main path. required_item optional_item If an optional item appears above the main path, that item has no effect on the execution of the statement and is used only for readability.
Installation Guide
optional_item required_item If you can choose from two or more items, they appear vertically, in a stack. If you must choose one of the items, one item of the stack appears on the main path. required_itemrequired_choice1 required_choice2 If choosing one of the items is optional, the entire stack appears below the main path. required_item optional_choice1 optional_choice2 If one of the items is the default, it appears above the main path and the remaining choices are shown below. default_choice required_item optional_choice optional_choice An arrow returning to the left, above the main line, indicates an item that can be repeated. required_itemrepeatable_item If the repeat arrow contains a comma, you must separate repeated items with a comma. , required_itemrepeatable_item A repeat arrow above a stack indicates that you can repeat the items in the stack. Keywords appear in uppercase (for example, FROM). They must be spelled exactly as shown. Variables appear in all lowercase letters (for example, column-name). They represent user-supplied names or values. If punctuation marks, parentheses, arithmetic operators, or other such symbols are shown, you must enter them as part of the syntax.
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
Throughout the library, the DB2 for OS/390 licensed program and a particular DB2 for MVS/ESA subsystem are each referred to as DB2. In each case, the context makes the meaning clear. The most rewarding task associated with a database management system is asking questions of it and getting answers, the task called end use. Other tasks are also necessarydefining the parameters of the system, putting the data in place, and so on. The tasks associated with DB2 are grouped into the following major categories (but supplemental information relating to all of the below tasks for new releases of DB2 can be found in DB2 Release Guide): Installation: If you are involved with DB2 only to install the system, this book might be all you need. If you will be using data sharing then you also need DB2 Data Sharing: Planning and Administration, which describes installation considerations for data sharing. End use: End users issue SQL statements to retrieve data. They can also insert, update, or delete data, with SQL statements. They might need an introduction to SQL, detailed instructions for using SPUFI, and an alphabetized reference to the types of SQL statements. This information is found in DB2 Application Programming and SQL Guide and DB2 SQL Reference. End users can also issue SQL statements through the Query Management Facility (QMF) or some other program, and the library for that program might provide all the instruction or reference material they need. For a list of the titles in the QMF library, see the bibliography at the end of this book. Application Programming: Some users access DB2 without knowing it, using programs that contain SQL statements. DB2 application programmers write those programs. Because they write SQL statements, they need DB2 Application Programming and SQL Guide, DB2 SQL Reference, and DB2 ODBC Guide and Reference just as end users do. Application programmers also need instructions on many other topics: How to transfer data between DB2 and a host programwritten in COBOL, C, or FORTRAN, for example How to prepare to compile a program that embeds SQL statements How to process data from two systems simultaneously, say DB2 and IMS or DB2 and CICS How to write distributed applications across platforms How to write applications that use DB2 ODBC to access DB2 servers How to write applications that use Open Database Connectivity (ODBC) to access DB2 servers How to write applications in the Java programming language to access DB2 servers The material needed for writing a host program containing SQL is in DB2 Application Programming and SQL Guide and in DB2 Application Programming Guide and Reference for Java. The material needed for writing applications that
Installation Guide
use DB2 ODBC or ODBC to access DB2 servers is in DB2 ODBC Guide and Reference. For handling errors, see DB2 Messages and Codes . Information about writing applications across platforms can be found in Distributed Relational Database Architecture: Application Programming Guide. System and Database Administration: Administration covers almost everything else. DB2 Administration Guide divides those tasks among the following sections: Section 2 (Volume 1) of DB2 Administration Guide discusses the decisions that must be made when designing a database and tells how to bring the design into being by creating DB2 objects, loading data, and adjusting to changes. Section 3 (Volume 1) of DB2 Administration Guide describes ways of controlling access to the DB2 system and to data within DB2, to audit aspects of DB2 usage, and to answer other security and auditing concerns. Section 4 (Volume 1) of DB2 Administration Guide describes the steps in normal day-to-day operation and discusses the steps one should take to prepare for recovery in the event of some failure. Section 5 (Volume 2) of DB2 Administration Guide explains how to monitor the performance of the DB2 system and its parts. It also lists things that can be done to make some parts run faster. In addition, the appendixes in DB2 Administration Guide contain valuable information on DB2 sample tables, National Language Support (NLS), writing exit routines, interpreting DB2 trace output, and character conversion for distributed data. If you are involved with DB2 only to design the database, or plan operational procedures, you need DB2 Administration Guide. If you also want to carry out your own plans by creating DB2 objects, granting privileges, running utility jobs, and so on, then you also need: DB2 SQL Reference, which describes the SQL statements you use to create, alter, and drop objects and grant and revoke privileges DB2 Utility Guide and Reference, which explains how to run utilities DB2 Command Reference, which explains how to run commands If you will be using data sharing, then you need DB2 Data Sharing: Planning and Administration, which describes how to plan for and implement data sharing. Additional information about system and database administration can be found in DB2 Messages and Codes, which lists messages and codes issued by DB2, with explanations and suggested responses. Diagnosis: Diagnosticians detect and describe errors in the DB2 program. They might also recommend or apply a remedy. The documentation for this task is in DB2 Diagnosis Guide and Reference and DB2 Messages and Codes.
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
DB2 publications
The DB2 publications for DB2 Universal Database Server for OS/390 are available in both hardcopy and softcopy format.
BookManager format
Using online books on CD-ROM, you can read, search across books, print portions of the text, and make notes in these BookManager books. With the appropriate BookManager READ product or IBM Library Readers, you can view these books in the OS/390, VM, OS/2, DOS, AIX, and Windows environments. You can also view many of the DB2 BookManager books on the Web.
PDF format
Many of the DB2 books are available in Portable Document Format (PDF) for viewing or printing from CD-ROM or the Web. Download the PDF books to your intranet for distribution throughout your enterprise.
CD-ROMs
Books for Version 6 of DB2 Universal Database Server for OS/390 are available on CD-ROMs: DB2 UDB for OS/390 Version 6 Licensed Online Book, LK3T-3519, containing DB2 UDB for OS/390 Version 6 Diagnosis Guide and Reference in BookManager format, for ordering with the product. DB2 UDB Server for OS/390 Version 6 Online and PDF Library, SK3T-3518, a collection of books for the DB2 server in BookManager and PDF formats. Periodically, the books will be refreshed on subsequent editions of these CD-ROMs. The books for Version 6 of DB2 UDB Server for OS/390 are also available on the following collection kits that contain online books for many IBM products: Online Library Omnibus Edition OS/390 Collection, SK2T-6700, in English IBM Online Library MVS Collection Kit, SK88-8002, in Japanese, for viewing on DOS and Windows operating systems.
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | |
DB2 education
IBM Education and Training offers a wide variety of classroom courses to help you quickly and efficiently gain DB2 expertise. Classes are scheduled in cities all over the world. You can find class information, by country, at the IBM Learning Services Web site: http://www.ibm.com/services/learning/ For more information, including the current local schedule, please contact your IBM representative. Classes can also be taught at your location, at a time that suits your needs. Courses can even be customized to meet your exact requirements. The All-in-One Education and Training Catalog describes the DB2 curriculum in the United States. You can inquire about or enroll in these courses by calling 1-800-IBM-TEACH (1-800-426-8322).
| | | | | | | | | | | | | | | |
Capacity improvements
16-terabyte tables provide a significant increase to table capacity for partitioned and LOB table spaces and indexes, and for nonpartitioning indexes. Buffer pools in data spaces provide virtual storage constraint relief for the ssnmDBM1 address space, and data spaces increase the maximum amount of virtual buffer pool space allowed.
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
You can change checkpoint frequency dynamically using the new SET LOG command and initiate checkpoints any time while your subsystem remains available. Utilities that are faster, more parallel, easier to use: Faster backup and recovery enables COPY and RECOVER to process a list of objects in parallel, and recover indexes and table spaces at the same time from image copies and the log. Parallel index build reduces the elapsed time of LOAD and REORG jobs of table spaces, or partitions of table spaces, that have more than one index; the elapsed time of REBUILD INDEX jobs is also reduced. Tests show decreased elapsed and processor time for online REORG. Inline statistics embeds statistics collection into utility jobs, making table spaces available sooner. You can determine when to run REORG by specifying threshold limits for relevant statistics from the DB2 catalog. Query performance enhancements include: Query parallelism extensions for complex queries, such as outer joins and queries that use nonpartitioned tables Improved workload balancing in a Parallel Sysplex that reduces elapsed time for a single query that is split across active DB2 members Improved data transfer that lets you request multiple DRDA query blocks when performing high-volume operations The ability to use an index to access predicates with noncorrelated IN subqueries Faster query processing of queries that include join operations More performance and availability enhancements include: Faster restart and recovery with the ability to postpone backout work during restart, and a faster log apply process Increased flexibility with 8-KB and 16-KB page sizes for balancing different workload requirements more efficiently, and for controlling traffic to the coupling facility for some workloads Direct-row access using the new ROWID data type to re-access a row directly without using the index or scanning the table Ability to retain prior access path when you rebind a statement. You almost always get the same or a better access path. For the exceptional cases, Version 6 of DB2 for OS/390 lets you retain the access path from a prior BIND by using rows in an Explain table as input to optimization. An increased log output buffer size (from 1000 4-KB to 100000 4-KB buffers) that improves log read and write performance
10
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
User productivity
Predictive governing capabilities enhance the resource limit facility to help evaluate resource consumption for queries that run against large volumes of data. Statement cost estimation of processing resource that is needed for an SQL statement helps you to determine error and warning thresholds for governing, and to decide which statements need tuning. A default buffer pool for user data and indexes isolates user data from the DB2 catalog and directory, and separating user data from system data helps you make better tuning decisions. More information available for monitoring DB2 includes data set I/O activity in traces, both for batch reporting and online monitors. Better integration of DB2 and Workload Manager delay reporting enables DB2 to notify Workload Manager about the current state of a work request. More tables are allowed in SQL statements SELECT, UPDATE, INSERT, and DELETE, and in views. DB2 increases the limit from 15 to 225 tables. The number of tables and views in a subselect is not changed. Improved DB2 UDB family compatibility includes SQL extensions, such as: A VALUES clause of INSERT that supports any expression A new VALUES INTO statement Easier recovery management lets you achieve a single point of recovery and recover data at a remote site more easily. Enhanced database commands extend support for pattern-matching characters (*) and let you filter display output. You can easily process dynamic SQL in batch mode with the new object form of DSNTEP2 shipped with DB2 for OS/390.
Network computing
SQLJ, the newest Java implementation for the OS/390 environment, supports SQL embedded in the Java programming language. With SQLJ, your Java programs benefit from the superior performance, manageability, and authorization available to static SQL, and they are easy to write. DRDA support for three-part names offers more functionality to applications using three-part names for remote access and improves the performance of client/server applications.
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Stored procedure enhancements include the ability to create and modify stored procedure definitions, make nested calls for stored procedures and user-defined functions, and imbed CALL statements in application programs or dynamically invoke CALL statements from IBM's ODBC and CLI drivers. DB2 ODBC extensions include new and modified APIs and new data types to support the object-relational extensions. ODBC access to DB2 for OS/390 catalog data improves the performance of your ODBC catalog queries by redirecting them to shadow copies of DB2 catalog tables. Better performance for ODBC applications reduces the number of network messages that are exchanged when an application executes dynamic SQL. Improvements for dynamically prepared SQL statements include a new special register that you use to implicitly qualify names of distinct types, user-defined functions, and stored procedures. DDF connection pooling uses a new type of inactive thread that improves performance for large volumes of inbound DDF connections.
12
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
You can use the DB2 Extenders feature of DB2 for OS/390 to store and manipulate image, audio, video, and text objects. The extenders automatically capture and maintain object information and provide a rich body of APIs.
More function
Some function and capability is available to both Version 6 and Version 5 users. Learn how to obtain these functions now, prior to migrating to Version 6, by visiting the following Web site: http://www.software.ibm.com/data/db2/os390/v5apar.html
Net.Data for OS/390 You can install and use these features in a Try and Buy program for up to 90 days without paying license charges: Query Management Facility DB2 DataPropagator DB2 Performance Monitor DB2 Buffer Pool Tool DB2 Administration Tool
Migration considerations
Migration to Version 6 eliminates all type 1 indexes, shared read-only data, data set passwords, use of host variables without the colon, and RECOVER INDEX usage. You can migrate to Version 6 only from a Version 5 subsystem.
Section 1. Introduction
This section has the following changes: DB2 introduces large objects (LOBs), user-defined functions, and user-defined distinct types. Complementing these extensions is a powerful tool, triggers, that changes DB2 from a passive to an active database. Enhancements to buffer pools include the size of buffer pools, where they can reside, and what is stored in the buffer pools.
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
13
| | | |
New parameters improve availability in the backup, recovery, and restart areas. DB2 data set passwords have been removed. Resource Recovery Services (RRS) coordinates two-phase commit processing of recoverable resources for DB2 applications.
14
Installation Guide
Chapter 3-3. Connecting systems with TCP/IP has minor changes for customizing VTAM.
Appendixes
| | | Output from the sample applications has been removed from the appendix and is now in data set prefix.SDSNIVPD. The CCSID tables have been updated to include the Euro symbol in Appendix A. The notices have been moved to Appendix B.
Chapter 1-1. Introduction to this book and the DB2 for OS/390 library
15
16
Installation Guide
25 25 25 27 28 28 29 30 32 32 35 35 36 38 38 39 41 41 44 44 44 44 45 45 46 46 46 46 47 47 48 49 49 50 51 52 53 57 58 59 60 63 63 64 67 68 68
Chapter 2-2. Estimating DB2 storage needs . . . . . . . . . . . . DASD Storage for DB2 Subsystem . . . . . . . . . . . . . . . . . . . DASD requirements for the DB2 libraries and SMP/E data sets . DASD requirements for the DB2 catalog . . . . . . . . . . . . . . DASD requirements for the DB2 directory . . . . . . . . . . . . . DASD requirements for the active log data sets . . . . . . . . . . DASD requirements for the bootstrap data sets . . . . . . . . . . DASD requirements for the work file database . . . . . . . . . . . DASD requirements for the default database . . . . . . . . . . . . DASD requirements for the dump data set size . . . . . . . . . . DASD requirements for the system databases . . . . . . . . . . . DASD requirements for the archive log data sets . . . . . . . . . Using the installation CLIST to calculate storage . . . . . . . . . Virtual storage for address spaces . . . . . . . . . . . . . . . . . . . DB2 distributed data facility address space (DSN1DIST) . . . . . IRLM address space (IRLMPROC) . . . . . . . . . . . . . . . . . DB2 system services address space (DSN1MSTR) . . . . . . . . DB2 database services address space (DSN1DBM1) . . . . . . . Allied agent address space . . . . . . . . . . . . . . . . . . . . . . Common service area . . . . . . . . . . . . . . . . . . . . . . . . . DB2-Established stored procedures address space (DSN1SPAS) WLM-Established stored procedures address spaces . . . . . . . Virtual storage for storage pools and working storage . . . . . . . . Buffer pool size calculation . . . . . . . . . . . . . . . . . . . . . . Sort pool size calculation . . . . . . . . . . . . . . . . . . . . . . . RID pool size calculation . . . . . . . . . . . . . . . . . . . . . . . EDM pool size calculation . . . . . . . . . . . . . . . . . . . . . . . Data set control block storage size calculation . . . . . . . . . . . Working storage calculation . . . . . . . . . . . . . . . . . . . . . . Virtual storage below the 16MB line . . . . . . . . . . . . . . . . . Real storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2-3. Loading DB2 libraries . . . . . What IBM sends you . . . . . . . . . . . . . . . What you produce . . . . . . . . . . . . . . . . . SMP/E step 1: Copy and edit the SMP/E jobs Copying the SMP/E jobs . . . . . . . . . . . Editing the SMP/E jobs . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17
| | |
| | | | | # # # # #
SMP/E step 2: Allocate the SMP/E CSI file and SMP/E control data sets: DSNTIJAA (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SMP/E step 3: Allocate distribution and target libraries: DSNTIJAE . . . SMP/E step 4: Run the receive job: DSNTIJRC . . . . . . . . . . . . . . . SMP/E step 5: Cleanup job for migration: DSNTIJUD (optional) . . . . . SMP/E step 6: Run the apply job: DSNTIJAP . . . . . . . . . . . . . . . . SMP/E step 7: Run the accept job: DSNTIJAC . . . . . . . . . . . . . . . SMP/E step 8: Unload the jobs for the Kanji DB2I panels (optional) . . . SMP/E step 9: Allocate libraries for Kanji DB2I panels (optional) . . . . . SMP/E step 10: Run the receive job for the Kanji DB2I panels (optional) SMP/E step 11: Run the apply job for the Kanji DB2I panels (optional) . SMP/E step 12: Run the accept job for the Kanji DB2I panels (optional) . SMP/E step 13: Copy and edit the SMP/E jobs for DB2 REXX Language Support (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SMP/E step 14: Run the RECEIVE job for DB2 REXX Language Support SMP/E step 15: Run the APPLY job for DB2 REXX Language Support . SMP/E step 16: Run the ACCEPT job for DB2 REXX Language Support SMP/E step 17: Ensure installation of proper maintenance . . . . . . . . . Finishing SMP/E processing . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2-4. Setting up and using DB2 Online Help . . . . . Copying the bookshelf list, index, and books . . . . . . . . . . . Changing online help book data set names (optional) . . . . . . Customizing BookManager READ/MVS for online help (optional) Verifying online help and setting exit options . . . . . . . . . . . Making online help accessible from installation and DB2I panels Using online help . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing help with DB2 online help . . . . . . . . . . . . . . Moving around in the DB2 online help . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
75 76 77 77 78 79 79 80 80 80 80 80 81 81 81 81 82 83 83 83 84 86 87 87 87 87 91 91 91 92 92 96 97 102 103 108 109 114 116 120 125 133 136 139 142 148 150 155 157 159
| | | | | | | | |
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2-5. Installing, migrating, and updating system parameters Running the installation CLIST . . . . . . . . . . . . . . . . . . . . . . . . Making the DB2 ISPF libraries available to TSO . . . . . . . . . . . . . Invoking the CLIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Directory of panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Directory of panel field names . . . . . . . . . . . . . . . . . . . . . . . Online book data set names panel: DSNTIPA0 . . . . . . . . . . . . . Main panel: DSNTIPA1 . . . . . . . . . . . . . . . . . . . . . . . . . . . Recommended approach for a new installer . . . . . . . . . . . . . . . Data parameters panel: DSNTIPA2 . . . . . . . . . . . . . . . . . . . . . . Define group or member panel: DSNTIPK . . . . . . . . . . . . . . . . . . System resource data set names: DSNTIPH . . . . . . . . . . . . . . . . Data set names panel 1: DSNTIPT . . . . . . . . . . . . . . . . . . . . . . Data set names panel 2: DSNTIPU . . . . . . . . . . . . . . . . . . . . . . Data set names panel 3: DSNTIPQ . . . . . . . . . . . . . . . . . . . . . . Data set names panel 4: DSNTIPG . . . . . . . . . . . . . . . . . . . . . . Data set names panel 5: DSNTIPW . . . . . . . . . . . . . . . . . . . . . Sizes panel 1: DSNTIPD . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sizes panel 2: DSNTIP7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Thread management panel: DSNTIPE . . . . . . . . . . . . . . . . . . . . Buffer pool sizes panel 1: DSNTIP1 . . . . . . . . . . . . . . . . . . . . . Buffer pool sizes panel 2: DSNTIP2 . . . . . . . . . . . . . . . . . . . . . Buffer pool sizes panel 3: DSNTIP6 . . . . . . . . . . . . . . . . . . . . .
18
Installation Guide
| |
Tracing and checkpoints panel: DSNTIPN . . . . . . . . . . . . . . . . . . . . . Operator functions panel: DSNTIPO . . . . . . . . . . . . . . . . . . . . . . . . Application programming defaults panel 1: DSNTIPF . . . . . . . . . . . . . . Application programming defaults panel 2: DSNTIP4 . . . . . . . . . . . . . . IRLM panel 1: DSNTIPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IRLM panel 2: DSNTIPJ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protection panel: DSNTIPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MVS parmlib updates panel: DSNTIPM . . . . . . . . . . . . . . . . . . . . . . Active log data set parameters: DSNTIPL . . . . . . . . . . . . . . . . . . . . . Archive log data set parameters: DSNTIPA . . . . . . . . . . . . . . . . . . . . Databases and spaces to start automatically panel: DSNTIPS . . . . . . . . . Distributed data facility: DSNTIPR . . . . . . . . . . . . . . . . . . . . . . . . . Distributed data facility panel: DSNTIP5 . . . . . . . . . . . . . . . . . . . . . . Routine parameters panel: DSNTIPX . . . . . . . . . . . . . . . . . . . . . . . . Data definition control support panel: DSNTIPZ . . . . . . . . . . . . . . . . . . Job editing panel: DSNTIPY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install DB2 - CLIST calculations panel 1: DSNTIPC . . . . . . . . . . . . . . . Install DB2 - CLIST calculations panel 2: DSNTIPC1 . . . . . . . . . . . . . . Completing the CLIST processing . . . . . . . . . . . . . . . . . . . . . . . . . Responding to messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tailoring the installation jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . Editing the subsystem parameters and DSNHDECP values . . . . . . . . . Directory of subsystem parameters and DSNHDECP values . . . . . . . . The update process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Updating parameters through the update selection menu panel: DSNTIPB Updating other parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2-6. Installing the DB2 subsystem . . . . . . . . . . . . . . . . . . Installation step 1: Define DB2 to MVS: DSNTIJMV . . . . . . . . . . . . . DSNTIJMV updates to SYS1.PARMLIB . . . . . . . . . . . . . . . . . . . . DSNTIJMV updates to SYS1.PROCLIB . . . . . . . . . . . . . . . . . . . . Installation step 2: Define the integrated catalog facility catalog and Alias: DSNTIJCA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 3: Define system data sets: DSNTIJIN . . . . . . . . . . . Installation step 4: Initialize system data sets: DSNTIJID . . . . . . . . . . Installation step 5: Define DB2 initialization parameters: DSNTIJUZ . . . . Installation step 6: Define user authorization exit routines: DSNTIJEX (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 7: Record DB2 data to SMF (optional) . . . . . . . . . . . . Installation step 8: Establish subsystem security (optional) . . . . . . . . . . Installation Step 9: Connect DB2 to TSO . . . . . . . . . . . . . . . . . . . . Making DB2 load modules available to TSO and batch users . . . . . . . Making DB2 CLISTs available to TSO and batch users: DSNTIJVC . . . Ensuring that PL/I options are available . . . . . . . . . . . . . . . . . . . . Making panels, messages, and load modules available to ISPF and TSO Connecting DB2I panels to the ISPF main panel . . . . . . . . . . . . . . Establishing DB2 authorization IDs in TSO and RACF . . . . . . . . . . . Installation step 10: Connect IMS to DB2 (optional) . . . . . . . . . . . . . . Installation step 11: Connect CICS to DB2 (optional) . . . . . . . . . . . . . Installation step 12: IPL MVS . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 13: Start the DB2 subsystem . . . . . . . . . . . . . . . . . Installation step 14: Define temporary work files: DSNTIJTM . . . . . . . . Installation Step 15: Define and bind DB2 objects and user-maintained databases: DSNTIJSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . .
161 168 175 183 188 194 199 203 207 209 215 217 222 226 229 232 235 239 239 239 240 243 243 246 247 248 251 251 252 255 256 256 257 258 260 261 262 262 262 263 263 264 265 269 269 269 270 270 271 273
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19
# #
# # #
Installation step 16: Populate the user-maintained databases (optional) . Installation step 17: Bind the packages for DB2 REXX Language Support: DSNTIJRX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation Step 18: Back up the DB2 directory and catalog: DSNTIJIC . Authorizing DB2 users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation step 19: Verify the installation . . . . . . . . . . . . . . . . . . . Installing support for a communications network . . . . . . . . . . . . . . . Installing a second DB2 on the same operating system . . . . . . . . . . . Planning considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Considerations for using shared DASD . . . . . . . . . . . . . . . . . . . . Enabling stored procedures after installation . . . . . . . . . . . . . . . . . Enabling DB2-supplied stored procedures . . . . . . . . . . . . . . . . . Enabling Control Center procedures . . . . . . . . . . . . . . . . . . . . . Enabling SQL procedure support . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
275 275 275 276 276 276 277 277 278 282 283 284 284 285 287 287 287 287 288 288 288 288 288 288 289 289 289 289 290 290 291 292 292 293 294 294 294 300 301 302 302 303 304 304 305 306 306 306 307
| | | | | | | | | | | | | | | | | | |
Chapter 2-7. Migrating the DB2 subsystem . . . . . . . . . . . . . . . . . . . Migration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Type 2 indexes are required . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data set password protection is removed . . . . . . . . . . . . . . . . . . . . . Shared read-only data is removed . . . . . . . . . . . . . . . . . . . . . . . . . Private protocol function not enhanced . . . . . . . . . . . . . . . . . . . . . . More than 32 K databases are supported . . . . . . . . . . . . . . . . . . . . Log buffer size increased . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Consider enlarging BSDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Increase maximum number of data sets open . . . . . . . . . . . . . . . . . . Customized DB2I defaults can be migrated . . . . . . . . . . . . . . . . . . . Stored procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ALTER TABLE changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Work file database size calculations . . . . . . . . . . . . . . . . . . . . . . . . Utility enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migrating a data sharing group . . . . . . . . . . . . . . . . . . . . . . . . . . . Release coexistence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 1: Premigration activities . . . . . . . . . . . . . . . . . . . . . . . Identify unsupported objects (DSNTIJPM) . . . . . . . . . . . . . . . . . . . . Save critical access paths (optional) . . . . . . . . . . . . . . . . . . . . . . . . DRDA support for three-part names (optional) . . . . . . . . . . . . . . . . . . Examine all new and changed values for DB2I panels . . . . . . . . . . . . . Make adjustments for release incompatibilities . . . . . . . . . . . . . . . . . . Migration Step 2: Run link checker on DB2 for OS/390 Version 5 table spaces (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 3: Determine which plans and packages are invalid after migration (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 4: Check for consistency between catalog tables (optional) . . . Migration step 5: Image copy directory and catalog in case of fallback: DSNTIJIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 6: Connect DB2 to TSO . . . . . . . . . . . . . . . . . . . . . . . Making DB2 load modules available to TSO and batch users . . . . . . . . . Making DB2 CLISTs available to TSO and batch users: DSNTIJVC . . . . . Making panels, messages, and load modules available to ISPF and TSO . . Migration step 7: Connect IMS to DB2 (optional) . . . . . . . . . . . . . . . . . Migration step 8: Connect CICS to DB2 (optional) . . . . . . . . . . . . . . . . . Migration step 9: Stop DB2 for OS/390 Version 5 activity . . . . . . . . . . . . Migration step 10: Back up your DB2 for OS/390 Version 5 volumes (optional)
20
Installation Guide
# #
Migration step 11: Define DB2 initialization parameters: DSNTIJUZ . . . . . . DSNTIJUZ actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Additional steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Considerations for the BSDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 12: Establish subsystem security (optional) . . . . . . . . . . . . Migration step 13: Define DB2 Version 6 to MVS: DSNTIJMV . . . . . . . . . DSNTIJMV actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Completing the step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 14: Define system data sets: DSNTIJIN . . . . . . . . . . . . . Migration step 15: Define user authorization exit routines: DSNTIJEX . . . . . Migration step 16: IPL MVS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 17: Start DB2 for OS/390 Version 6 . . . . . . . . . . . . . . . . Migration step 18: Tailor DB2 for OS/390 Version 6 catalog: DSNTIJTC . . . Migration step 19: Ensure there are no problems with the catalog (optional) . Migration step 20: Prepare dynamic SQL program: DSNTIJTM . . . . . . . . . Migration step 21: Bind SPUFI and DCLGEN and user maintained database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . activity: DSNTIJSG Migration step 22: Bind the packages for DB2 REXX Language Support: DSNTIJRX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration step 23: Image copy DB2 for OS/390 Version 6 catalog: DSNTIJIC Migration step 24: Verify your DB2 for OS/390 Version 6 system . . . . . . . . Running the DB2 for OS/390 Version 5 sample jobs . . . . . . . . . . . . . . Running the Version 6 sample jobs . . . . . . . . . . . . . . . . . . . . . . . . Testing Version 6 with your application test cases . . . . . . . . . . . . . . . Chapter 2-8. Falling back and remigrating . . . . . . . . . . . . . . . . . . . . Falling back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fallback considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fallback Step 1: Run phase 0 of the DB2 for OS/390 Version 6 installation verification procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fallback Step 2: Stop DB2 for OS/390 Version 6 activity . . . . . . . . . . . Fallback Step 3: Reactivate DB2 for OS/390 Version 5 code: DSNTIJFV . Fallback Step 4: Reconnect TSO, IMS, and CICS to DB2 for OS/390 Version 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Fallback Step 5: Start DB2 for OS/390 Version 5 . . . . . . . . . . . . . . . . Fallback Step 6: Verify fallback . . . . . . . . . . . . . . . . . . . . . . . . . . Remigrating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2-9. Verifying with the sample applications Installation verification phases and programs . . . . . . Planning for verification . . . . . . . . . . . . . . . . . . . Special considerations for COBOL programs . . . . . . Special considerations for C and C++ programs . . . . . Special considerations for PL/I programs . . . . . . . . Phase 0: Deleting the sample objects (DSNTEJ0) . . . Phase 1: Creating and loading sample tables . . . . . Job DSNTEJ1 . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ1L . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ1P . . . . . . . . . . . . . . . . . . . . . . Phase 2: Testing the batch environment . . . . . . . . Job DSNTEJ2A . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ2C . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ2D . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ2E . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
308 308 308 309 309 309 310 311 312 312 313 313 314 315 316 316 317 317 317 317 318 318 319 319 319 323 323 324 325 325 326 327 329 330 334 335 337 339 339 340 340 342 343 344 344 344 345 345
| | | | | | | |
21
| | | | | # # # # | | | | | |
Job DSNTEJ2F . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ2P . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ2U . . . . . . . . . . . . . . . . . . . . . . . . . . . Phase 3: Testing SPUFI, DRDA Access, dynamic SQL, and TSO Testing SPUFI . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running SPUFI at remote non-DB2 systems . . . . . . . . . . . Running dynamic SQL and the ISPF/CAF application . . . . . Jobs DSNTEJ3C and DSNTEJ3P: . . . . . . . . . . . . . . . . . Starting an application in an ISPF/TSO environment . . . . . . Phase 4: Testing the IMS environment . . . . . . . . . . . . . . . Jobs DSNTEJ4C and DSNTEJ4P . . . . . . . . . . . . . . . . . Starting an application in an IMS environment . . . . . . . . . . Using the phone application in IMS . . . . . . . . . . . . . . . . Phase 5: Testing the CICS environment . . . . . . . . . . . . . . Job DSNTEJ5A . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jobs DSNTEJ5C and DSNTEJ5P . . . . . . . . . . . . . . . . . Starting an application in a CICS environment . . . . . . . . . . Using the phone application in CICS . . . . . . . . . . . . . . . Using CICS storage-handling facilities . . . . . . . . . . . . . . Phase 6: Accessing data at a remote site . . . . . . . . . . . . . DRDA Access sample . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Private Protocol Access sample . . . . . . . . . . . . . . . Stored procedure samples . . . . . . . . . . . . . . . . . . . . . Stored procedure sample without result set . . . . . . . . . . . Job DSNTEJ6S . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ6P . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stored procedure sample with result set . . . . . . . . . . . . . Job DSNTEJ6T . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ6D . . . . . . . . . . . . . . . . . . . . . . . . . . . Sample utilities stored procedure . . . . . . . . . . . . . . . . . Job DSNTEJ6U . . . . . . . . . . . . . . . . . . . . . . . . . . . Sample ODBA stored procedure . . . . . . . . . . . . . . . . . . Job DSNTEJ61 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ62 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sample SQL procedures . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ63 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ64 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ65 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting an application in an ISPF/TSO environment in phase 6 Phase 7: Accessing LOB Data . . . . . . . . . . . . . . . . . . . . Job DSNTEJ7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ71 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ73 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Job DSNTEJ75 . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting an application in an ISPF/TSO environment in phase 7 The sample applications . . . . . . . . . . . . . . . . . . . . . . . . Printing the sample application listings . . . . . . . . . . . . . . Specifying values in the sample application panels . . . . . . . Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The project application scenario . . . . . . . . . . . . . . . . . . The organization application scenario . . . . . . . . . . . . . . . The phone application scenario . . . . . . . . . . . . . . . . . . The distributed organization application scenario . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
346 346 347 349 349 350 351 351 352 353 353 356 356 357 357 357 359 360 360 361 362 362 363 364 364 365 365 365 366 366 367 367 367 368 368 368 369 369 370 370 371 371 372 372 373 373 373 374 374 377 377 379 384 388
22
Installation Guide
Employee resume and photo scenarios . . . . . . . . . . . Edit exit routine . . . . . . . . . . . . . . . . . . . . . . . . . . Huffman compression exit routine . . . . . . . . . . . . . . . . Sample field procedure . . . . . . . . . . . . . . . . . . . . . . Dynamic SQL statements (DSNTESA, DSNTESQ) . . . . . . DSNTESA . . . . . . . . . . . . . . . . . . . . . . . . . . . . DSNTESQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dynamic SQL programs (DSNTIAD, DSNTEP2, DSNTIAUL) Chapter 2-10. Connecting the IMS attachment facility Making DB2 load modules available to IMS . . . . . . . . Defining DB2 to IMS . . . . . . . . . . . . . . . . . . . . . Defining new programs and transactions to IMS . . . . Defining DB2 plans for IMS applications (optional) . . Generating a user language interface (optional) . . . . IMS attachment facility macro (DSNMAPN) . . . . . . . . Description . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
396 399 399 400 400 400 402 402 403 403 404 407 408 408 409 409 411 411 412 412 413 414 414 415 416 418 419 420 420 421 421 422 423 429 430 432 439 440
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2-11. Connecting the CICS attachment facility . . . . . . . . . Using the attachment facility for CICS Version 4 and CICS TS Version 1.1 Calculating space requirements for the CICS attachment facility . . . . . . CICS Version 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Estimating storage needed for CICS attachment threads . . . . . . . . . Defining the DB2 to CICS connection using the RCT . . . . . . . . . . . . Updating the CICS system tables . . . . . . . . . . . . . . . . . . . . . . . . System initialization table entries . . . . . . . . . . . . . . . . . . . . . . Transaction entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Program entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PLT processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Providing CICS support for DB2 commands . . . . . . . . . . . . . . . . Updating CICS initialization JCL . . . . . . . . . . . . . . . . . . . . . . . . . Coordinating DB2 and CICS security . . . . . . . . . . . . . . . . . . . . . . Preparing CICS applications for DB2 . . . . . . . . . . . . . . . . . . . . . . CICS attachment facility macro (DSNCRCT) . . . . . . . . . . . . . . . . . DSNCRCT TYPE=INIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . DSNCRCT TYPE=COMD . . . . . . . . . . . . . . . . . . . . . . . . . . . DSNCRCT TYPE=POOL . . . . . . . . . . . . . . . . . . . . . . . . . . . DSNCRCT TYPE=ENTRY . . . . . . . . . . . . . . . . . . . . . . . . . . DSNCRCT TYPE=FINAL . . . . . . . . . . . . . . . . . . . . . . . . . . . DSNCRCT TYPE=DSECT . . . . . . . . . . . . . . . . . . . . . . . . . .
23
24
Installation Guide
| |
| | |
Installation features
DB2 includes several features to help you perform the steps involved in installing or migrating to Version 6: Installation and migration tools: DB2 provides a set of tools that automate the process of installing or migrating. These tools include: Most of the job control language (JCL) needed to install and migrate the product This JCL constitutes the installation and migration jobs. Each of these jobs helps you perform a task when installing or migrating.
Copyright IBM Corp. 1982, 1999
25
Begin planning Chapter 2-1 Using this book to guide you through an installation or a migration Estimate DB2 storage needs Chapter 2-2
Yes
Setup online help ? Load DB2 SMP/E steps 1-17 Chapter 2-4
No
Install
Install or migrate ?
Migrate
Yes
Connect IMS attachment facility ? Connect CICS attachment facility ? Completed installation or migration
No
Yes
No
The installation CLIST (command list) to help tailor the installation and migration jobs This CLIST is also called the migration CLIST, or simply the CLIST. It contains the code necessary to tailor the jobs to your needs. A series of ISPF panels that you can use to pass information to the CLIST
26
Installation Guide
With the Interactive Systems Productivity Facility (ISPF) and Interactive Systems Productivity Facility/Program Development Facility (ISPF/PDF), you can use a series of ISPF panels to pass parameter values to the CLIST. The CLIST uses these values to tailor the installation and migration jobs. This process is called the ISPF tailoring session. Sample applications to help determine if you installed or migrated DB2 correctly. DB2 provides a set of sample programs and procedures that help you determine if DB2 is functioning correctly. Minimal assemblies: Because it is distributed as object code, DB2 requires few assemblies. You must perform an assembly to specify DB2 initialization parameters, but this requires only a few seconds. Ability to defer decisions about DB2 characteristics: DB2 allows you to specify many subsystem characteristics during DB2 operation. You can authorize users, define databases and tables, and tune DB2. Therefore, you can defer many decisions until after you finish installing or migrating DB2. Ability to update installation and migration options: During the process of installing and migrating, DB2 uses ISPF panels to prompt you for many options. DB2 allows you to update most of these options without requiring you to reinstall or remigrate. You can accept the default for certain options and, after acquiring experience with DB2, tailor them to your needs.
27
Remigrate to DB2 for OS/390 Version 6 After you have completed migration, it is recommended that you avoid using new Version 6 facilities until you are certain that you will not need to fall back.
| | | | |
28
Installation Guide
Table 1. Overview of SMP/E steps Step 1 Description Copy and edit the SMP/E jobs Initialize SMP/E environment for DB2 (optional) Allocate the libraries Run the RECEIVE job Run the clean-up job (optional) Run the APPLY job Run the ACCEPT job Unload the SMP/E jobs for the Kanji DB2I panels Allocate the libraries for the Kanji DB2I panels Run the RECEIVE job for the Kanji DB2I panels Run the APPLY job for the Kanji DB2I panels Run the ACCEPT job for the Kanji DB2I panels Copy and edit the SMP/E jobs for DB2 REXX Language Support. Run the RECEIVE job for DB2 REXX Language Support. Run the APPLY job for DB2 REXX Language Support. Run the ACCEPT job for DB2 REXX Language Support. Receive and apply any maintenance shipped with the product. Job IEBCOPY DSNTIJAA DSNTIJAE DSNTIJRC DSNTIJUD DSNTIJAP DSNTIJAC IEBCOPY DSNTNJAE DSNTNJRC DSNTNJAP DSNTNJAC IEBCOPY DSNTTJRC DSNTTJAP DSNTTJAC
| | | | | | | | | | | | # # # # # # # # |
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
29
Table 2. Overview of steps for installing DB2 Version 6 Step 1 2 3 4 5 6 7 8 9 10 11 12 Description Define DB2 Version 6 to MVS, and build cataloged procedures Optionally, define a new integrated catalog facility catalog and alias Define DB2 data sets Initialize DB2 data sets Define DB2 initialization parameters Optionally, prepare authorization exit routines Optionally, set up for SMF recording Optionally, establish subsystem security Establish the DB2/TSO environment Optionally, connect IMS to DB2 IPL MVS Start DB2 Version 6 Define temporary work file table spaces, initial buffer pool sizes, and initial hiperpool sizes Define and bind DB2 objects and user-maintained databases Optionally, populate the user-maintained databases and if you are using DDF populate the communications database (within the DB2 catalog) Bind the packages for DB2 REXX Language Support, if you have installed DB2 REXX Language Support. Image copy the DB2 catalog and directory Run the installation verification procedure Job DSNTIJMV DSNTIJCA DSNTIJIN DSNTIJID DSNTIJUZ DSNTIJEX DSNTIJVC DSNTIJTM DSNTIJSG
# |
13 14 15
# # #
16
DSNTIJRX
17 18
DSNTIJIC DSNTEJxx
For a detailed description of the installation procedure, see Chapter 2-6. Installing the DB2 subsystem on page 251.
30
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # # # | | | | | |
Table 3. Overview of steps for migrating to DB2 Version 6 Step 1 2 Description Premigration activities to determine unsupported objects Run DSN1COPY with the CHECK option on the catalog table spaces and invoke the link checker (DSN1CHKR) to check for broken links on your Version 5 subsystem. Optionally, determine which plans and packages will be invalid after migration Optionally, check for consistency between catalog tables Image copy your Version 5 catalog Establish the DB2/TSO environment Optionally, connect IMS to DB2 Stop DB2 Version 5 Back up Version 5 volumes Define DB2 initialization parameters Optionally, establish subsystem security Define DB2 Version 6 to MVS and build cataloged procedures Define system data sets Optionally, prepare authorization exit routines IPL MVS Start DB2 Version 6 Tailor the DB2 Version 6 catalog Optionally, invoke the link checker (DSN1CHKR) to check for broken links on Version 6. Optionally, run job DSNTIJCX for checking indexes in the catalog and directory. Prepare the dynamic SQL program and define initial buffer pool sizes and inital hiperpool sizes Bind SPUFI and DCLGEN Bind the packages for DB2 REXX Language Support, if you have installed DB2 REXX Language Support. Image copy the Version 6 catalog Run Version 5 verification jobs Run Version 6 verification jobs Make adjustments for release incompatibilities Job DSNTIJPM
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
19 20 21
22 23 24 Note:
DSNTIJIC DSNTEJxx
31
2 3 4 5 6 7 8
DSNTEJxx
32
Installation Guide
In addition, you must perform some tasks manually. These tasks, as well as the tasks performed by the jobs listed above, are explained in Remigrating on page 327.
33
34
Installation Guide
| |
35
To determine the storage requirements based on your DASD device model, check the values listed in Table 6 on page 36. The space requirements do not include space for user databases, image copies, archive logs, or temporary data sets that you create while installing or migrating.
Table 6. Estimated space requirements (in cylinders) for DB2 by site size Site Size Small Medium Large Extra Large 3380 800 1217 5178 9277 3390 689 1035 4334 7750 9340 784 1160 4757 8485
Table 7 provides estimated storage requirements in megabytes (MB) for DB2 data sets. The calculations were done with more precision than is shown in the figure; this accounts for the discrepancy between individual amounts and totals. The estimated space requirements apply to 3380, 3390, and 9340 device typesthere is no significant difference between the space requirements for the DB2 data sets on these device types. The DB2 libraries require a fixed amount of space, regardless of the size of your site. On the other hand, the DASD requirements for active logs and the DB2 catalog increase significantly as the size requirements for your site increase. You need additional space for archive logs, image copies, user databases, and other working data sets. Device-specific estimates in cylinders for items in Table 7 begin with Table 8.
Table 7. Estimated space requirements (in megabytes) for DB2 data sets by site size Site Size Small Medium Large Extra Large DB2 Libraries 316 316 316 316 DB2 Catalog 61 180 344 509 Directory 27 72 136 200 Active Logs 20 40 392 784 BSDS 1 1 1 1 Temp Database 24 24 372 580 Total 449 633 1561 2390
DASD requirements for the DB2 libraries and SMP/E data sets
Storage requirements for the DB2 libraries and SMP/E data sets, shown here in Table 8, Table 9 on page 37, and Table 10 on page 38, are also found in the DB2 Program Directory.
Table 8 (Page 1 of 2). Estimated space requirements (in cylinders) for DB2 distribution libraries DB2 Distribution Libraries prefix.ADSNLOAD prefix.ADSNMACS prefix.ADSNENU1 prefix.ADSNDKF1 3380 81 76 5 3 16 2 3390 71 67 5 3 14 2 9340 81 76 5 3 16 2
prefix.ADSNIVPD prefix.ADXRLOAD
36
Installation Guide
Table 8 (Page 2 of 2). Estimated space requirements (in cylinders) for DB2 distribution libraries DB2 Distribution Libraries prefix.ADXRSAMP 3380 1 15 8 1 1 209 3390 1 12 7 1 1 184 9340 1 15 8 1 1 209
| | | | |
1The totals are actually dependent on whether you have selected to use both the English and the Kanji distribution libraries.
Table 9. Estimated space requirements (in cylinders) for DB2 target libraries DB2 Target Libraries 3380 1 5 2 1 49 15 48 1 4 1 5 3 1 1 1 1 5 1 1 15 8 1 1 171 3390 1 4 2 1 43 13 42 1 4 1 5 3 1 1 1 1 5 1 1 12 7 1 1 152 9340 1 5 2 1 49 15 48 1 4 1 5 3 1 1 1 1 5 1 1 15 8 1 1 171
prefix.SDSNC.H prefix.SDSNCLST prefix.SDSNEXIT prefix.SDSNLINK prefix.SDSNLOAD prefix.SDSNMACS prefix.SDSNSAMP prefix.SDSNSPFM prefix.SDSNSPFP prefix.SDSNSPFT prefix.SDSNPFPE1 prefix.SDSNPFPK1 prefix.SDSNENU1 prefix.SDSNDKF1 prefix.SDSNSPFS prefix.SDSNDBRM
| | | | |
1The actual totals depend on whether you have selected to use both the English and the Kanji target libraries.
37
Table 10. Estimated space requirements (in cylinders) for SMP/E data sets SMP/E Data Sets SMPCSI SMPLOGA SMPMTS SMPPTS SMPSCDS SMPSTS SMPLTS SMPTLIB SMP/E TOTAL 3380 10 31 16 1 3 41 11 49 165 3390 10 27 14 1 2 36 10 37 139 9340 12 29 15 1 2 38 10 66 175
| |
These values are for the initial allocation of the data sets. Some data sets grow with SMP activity, so your values could be much larger.
For information about how to change the size of catalog data sets after you install or migrate DB2, see Section 5 (Volume 2) of DB2 Administration Guide.
38
Installation Guide
39
| |
logged for DELETEs. With LOG(NO), only internal control information is logged. The formula is: MAX (5 bytes, .1 (size of LOB))
If you enabled data sharing, you generally need to have more DASD for the active log and archive the logs more frequently. See Chapter 6 of DB2 Data Sharing: Planning and Administration for more information. If you accept the defaults of three active log data sets and dual logging, DB2 creates six active log data sets. For a typical production DB2 subsystem, you should have more than three active logs and dual logs. Other choices can lead to degraded performance when you encounter an IO error. You get better performance with larger active logs for other common problems, such as long running updates. You can avoid some outages by having an adequate number of active logs for several hours of batch update processing. | | | | Table 13 shows estimated storage requirements for active log data sets assuming dual logging. Table 14 shows the amount of space required for active log data sets on various IBM DASD devices. The estimates in both of these tables include DASD track overhead.
Table 13. Estimated space requirements (in megabytes) for active log data sets by site size Site Size Archive Period (Hours) 24 24 24 24 Data Change Rate (Per Hour) 1800 3600 36000 72000 Space for Each Active Log Data Set (MB) 20 40 392 784 Total Space for Six Active Log Data Sets (MB) 120 240 2352 4704
Table 14. Estimated space requirements (in cylinders) for the active log by site size Site Size Small Medium Large Extra Large 3380 174 348 3462 6918 3390 150 294 2886 5766 9340 162 318 3144 6288
Some other considerations for the size of your active log data sets include: Tape utilization | | | When you archive to a media type described in Table 15, the planning size numbers are suggested sizes for your active logs. If the size of an active log data set is small compared to the size of a tape, the tape utilization is fairly low.
Table 15 (Page 1 of 2). Estimated active log planning size Log Media 6250 BPI tape 3590 High-Performance Tape Subsystem Estimated Planning Size 100MB 10GB
40
Installation Guide
Table 15 (Page 2 of 2). Estimated active log planning size Log Media 3480 cartridge 4mm cartridge (60m) 4mm cartridge (90m) 4mm cartridge (120m) Estimated Planning Size 200MB or more 1.3GB 2.0GB 4.0GB
| | | | | | |
Using larger block sizes for archive logs can increase the estimated planning sizes by up to 40%. You specify block size for archive logs with the BLOCK SIZE field on installation panel DSNTIPA. Compression on the newer cartridge units can also increase the estimated planning sizes substantially. Using compression on the tape units will encourage you to have larger active logs, controls for long-running updates, and to archive to disk with DFSMShsm migration to tape. Checkpoint frequency The CHECKPOINT FREQ field on panel DSNTIPN specifies the number of consecutive log records written between DB2 system checkpoints. It balances between the overhead needed for frequent subsystem checkpoints and the time to restart a DB2 subsystem after a termination without a quiesce. If the checkpoint value is more than 300 000, then the time needed to restart DB2 after a termination without a quiesce can grow to over 30 minutes. The recommended values for the checkpoint frequency are in the range of 25 000 to 500 000. Number of tables defined for data capture When tables are defined with DATA CAPTURE CHANGES, the entire before-image of an updated row is captured on the log. This can represent an increase in log data compared to tables that are not defined with DATA CAPTURE CHANGES, depending on whether the table contains fixed or variable length rows. For information on what is logged for updated rows in both data-capture and non-data-capture tables, see Appendix C (Volume 2) of DB2 Administration Guide.
41
Table 16. Estimated space requirements (in cylinders) for the work file database by site size Site Size Small Medium Large Extra Large 3380 35 35 547 854 3390 29 29 456 712 9340 32 32 497 776
You might need more storage for the work file database if you have a great amount of data to sort and a great amount of concurrent sort activity. If you are sorting compressed data, allow for the same amount of storage that you would need if the data were not compressed. The maximum amount of storage you would need is enough to satisfy the requirements of the largest combination of concurrent activities that use the work file database. The amount of storage required for a sort depends on the following variables: Data size Sort key size You can estimate the total amount of work file space needed to perform the sort as follows: Let MIN be the operation of selecting the lowest value from a set of values. Let FLOOR be the operation of discarding the decimal portion of a real number. Let CEILING be the operation of rounding a real number up to the next highest integer. Let data be the total data length in bytes. Let key be the total length of the sort key. Let prefix be the 6 byte header. Let rows be the total number of rows being sorted. Then calculate as follows: Records per page = MIN(MAXROWS, FLOOR (4 76 / (data + key + prefix))), but cannot exceed 255 (the value of MAXROWS) Total pages = CEILING (rows / Records per page) Total segments = CEILING (Total pages / 24) This tells you how much storage is needed in the work file database after sort processing. However, if a merge phase was required during sort processing, an additional intermediate copy of the records might exist at any given time. For most subsystems, it is safe to assume that about half of the records involved in a sort have two copies. Therefore, a multiplier value of 1.5 is safe. If you want to be conservative, choose 2 for your multiplier value. Therefore, the amount of storage used in the work file database during sort processing can vary from 1 to 2 times the storage needed after sort processing. The actual storage used might also increase if you have little buffer pool storage available. | | When a large object (LOB ) column is part of a result table, and the result table must be placed in a work file for sorting, the actual LOB column data is not placed
42
Installation Guide
| | |
in the work file. Therefore, LOB columns do not require large increases in the amount of work file space that DB2 requires. For work file calculations, users should allow 51 bytes of storage per LOB column needed by the work file. To determine the number of tracks needed, convert the number of pages into bytes and divide the result by the number of bytes per unit. Let r be the number of 4096 byte records per track and safety_factor anywhere from 1.5 to 2.0. For 3390 DASD, r is 12. For 3380 and 9340, r is 10. Tracks = CEILING (Total pages / r) safety_factor Example 1: Consider a table (TABLE1) containing 45327 rows, for which you want to create a nonunique index on COL1 CHAR(3) NOT NULL, COL2 CHAR(4), COL3 VARCHAR(20), and COL4 SMALLINT. Determine the amount of temporary storage needed to create this index as follows: Data = 3 + (4 + 1) + (20 + 1) + (2 + 1) + 4 = 36 Key = 36 (data plus RID is key for CREATE INDEX) Rows = 45327 Records per page = MIN(MAXROWS, FLOOR (4076 / (36 + 36 + 6))) = 52 Total pages = CEILING (45327 / 52) = 872 Segments = CEILING (872 / 24) = 37 Tracks = CEILING (872 / 12) 1.5 = 111 Example 1 is a data page calculation for storing index keys in the work file database. For this example, 111 tracks of a 3390 storage device are needed. The 2-byte length field of a VARCHAR column is not a part of data for CREATE INDEX, the RID field is a part of data, and the key includes the entire data portion, including the RID. Example 2: Consider TABLE1 again and the following SQL query: SELECT COL1,COL2,COL3,COL4 FROM TABLE1 ORDER BY COL2,COL3,COL1; This query requires a sort. Determine the amount of temporary storage required for this table as follows: Data = 3 + (4 + 1) + (20 + 2 + 1) + (2 + 1) = 34 Key = (4 + 1) + (20 + 1) + 3 = 29 Rows = 45327 Records per page = MIN(MAXROWS, FLOOR (4076 / (34 + 29 + 6))) = 59 Total pages (final result) = CEILING (45327 / 59) = 769 Segments (final result) = CEILING (769 / 24) = 33 Total pages (during processing) = CEILING (1.5 769) = 1154 Segments (during processing) = CEILING (1.5 35) = 53 Tracks = CEILING (1238 / 12) = 104 For this example which is a table calculation, 104 tracks of a 3390 storage device are needed. The 2- byte length field of a VARCHAR column is a part of data for CREATE INDEX, the RID field is not a part of data, and the key does not include the entire data portion. The sort summary trace record, IFCID 0096, can be used to simplify some of the calculations. This record shows the number of records sorted, the sort record size (data + key), and whether or not a merge phase was required for an individual sort
Chapter 2-2. Estimating DB2 storage needs
43
request. For information on the trace facility of DB2, see Section 5 (Volume 2) of DB2 Administration Guide.
44
Installation Guide
combined is found in the messages for Volume Serial 5 (DSNV05) and Volume Serial 6 (DSNV06). The installation CLIST uses the amount of space computed for the active log data sets for archive primary and secondary space. This size is computed by taking the active log data sets in bytes and dividing this number by the block size specified on installation panel DSNTIPA. Primary space for the archive log is the same as for the active log. Secondary space is small and is used if it is needed for cylinder rounding differences on different devices. Attention: Do not specify DFSMS compression for archive logs on DASD. If you do, you may receive log read failures when attempting to recover from the archive logs.
45
| |
46
Installation Guide
Most modules, control blocks, and buffers reside in the extended private area. A DB2 subsystem with 200 concurrent users and 2000 open data sets should need less than 2MB of virtual storage below the 16MB line.
47
| | | | | | | | |
2 KB for each thread that uses distributed processing, plus 1 KB for each DB2 site in your network, plus 40 KB for code that relates to distributed processing Your virtual storage needs under normal conditions will probably not increase in the CSA below the 16MB line. In a data sharing environment, if an IRLM performs member recovery or structure rebuild additional virtual storage is required. Any other increase in the amount of virtual storage needed occurs within the extended private area of the DB2 database address space and the extended private area of the distributed data address space. Specify this sum or a value larger than this sum as the second value of the CSA parameter of the IEASYSxx MVS SYS1.PARMLIB member. It is better to specify values that are too high rather than too low; making your values too low can result in your having to IPL MVS. For example, if the ECSA size is too small, MVS places DB2's global load modules and control blocks in CSA below the 16MB line instead of above it. This can cause problems with coexisting MVS subsystems. Monitor your use of CSA and ECSA, and increase those values if necessary. Monitoring CSA below the 16MB line can indicate whether or not you need to increase the size of the ECSA. When you IPL MVS, you can override the CSA size with this syntax: CSA=(a,b) where: a is the number of kilobytes of CSA storage below the 16MB line b is the number of kilobytes of CSA storage above the 16MB line These values are rounded down (CSA) or up (ECSA) to the next 1MB boundary. For more information, see OS/390 MVS Initialization and Tuning Guide.
48
Installation Guide
49
Of these values, the sum of the buffer pool size, sort pool size, RID pool size, EDM pool size, data set control block storage size (for your table spaces and indexes), and working storage size must fit the region size that is permitted for DB2. This sum is important because most of the space is allocated above the 16MB line of virtual storage. After you specify the values listed above, the CLIST calculates the EDM pool size and the size needed for the data set control blocks. The CLIST adds in the buffer pool size, the sort pool size, the RID pool size, the working storage size, and the fixed code size to update the region size used in the DB2 start procedures. The CLIST also displays this information on installation panel DSNTIPC, which is described on page 235. Use the formulas in this section to estimate your storage needs. For your reference, the default values are included where appropriate.
| |
50
Installation Guide
Table 17 (Page 2 of 2). Virtual buffer pool size calculation Virtual Buffer Pool Calculation . Buffers for BP16K0 Buffers for BP16K1 . . Buffers for BP32K . . Buffers for BP32K9 +___ x 16KB = ____ +___ x 16KB = ____ Default + 0 x 16KB + 0 x 16KB = 0KB = 0KB
+24 x 32KB
= 768KB = 8768KB
+ 0 x 32KB
= 0KB = 8768KB
Hiperpools: A hiperpool is an extension to a virtual buffer pool. It is a second level cache using expanded storage for data that is not accessed frequently enough to stay in the virtual buffer pool. You can use hiperpools if your system meets the requirements described under "Buffer Pools in Section 1 (Volume 1) of DB2 Administration Guide. | | | | | | | | Hiperpool sizes for each virtual buffer pool are specified during installation. If you do not specify a size, the hiperpool is not created. A hiperpool cannot exist unless it is associated with a virtual buffer pool. See Buffer pool sizes panel 1: DSNTIP1 on page 155, Buffer pool sizes panel 2: DSNTIP2 on page 157, and Buffer pool sizes panel 3: DSNTIP6 on page 159 for details about the installation options for hiperpool sizes. Your hiperpool sizes are not committed during installation. You can change the size at any time with the ALTER BUFFERPOOL command, even while DB2 is running. DB2 can use up to 8GB of expanded storage for hiperpools. Hiperpools can span up to four 2GB expanded storage areas known as hiperspaces. Hiperpools fully use a 2GB hiperspace before creating another one. For each 2GB used by data in hiperpools, DB2 needs about 28MB of central virtual storage. Therefore, the most central virtual storage you need to support hiperpools, even if you used them to capacity, would be about 112MB.
51
16 (12 + sort key length + sort data length + 4 (if ESA hardware sort assist)) See Section 5 (Volume 2) of DB2 Administration Guide for instructions on choosing sizes for optimal performance. Sort storage in the DB2 buffer pools: Sort processing uses pages in the DB2 buffer pool for its initial input, for work files that contain intermediate results, and for the final output. The buffer pools are not always dedicated to sort work files; the amount of sort activity determines how much the buffer pools are used. If there is heavy sort activity, sort records that have been written to the work files are temporarily written to DASD until buffer pool space becomes available. The buffers that are used for work files are considered as sequentially accessed pages. The percentage of the buffer pool used for work files can be adjusted by using the VPSEQT parameter of the command -ALTER BUFFERPOOL. If a buffer pool is used only for work files, you might set VPSEQT to 100%. If there is not enough storage allocated to complete sort processing, you must allocate more DASD space for the work file database. For more information, see DASD requirements for the work file database on page 41.
52
Installation Guide
Calculating the EDM pool space needed for plans and packages
The first part of the EDM pool calculation involves the space for plans and packages. Plans and packages are very different, but they are treated similarly for storage planning. To estimate the EDM pool space needed for plans, use the following variables: Let concplans be the number of concurrently executing plans. This is the value specified as MAX USERS on installation panel DSNTIPE. Let maxplans be the maximum number of unique plans you want in the EDM pool at any given time. Estimate this by taking one fourth of the total plans you have. Let statsize be the average statement size. To calculate the average statement size, add 1.4KB for each single table statement and 0.2KB for each additional table in the statement. For example, if you estimate one table for each statement, multiply the number of SQL statements by 1.4KB; if you estimate three tables per statement, multiply the number of statements by 1.8KB (1.4KB + 0.2KB + 0.2KB). Let statexec be the average number of statements executed. The CLIST uses the value in EXECUTED STMTS on installation panel DSNTIPD. Then calculate as follows: (concplans + maxplans) (statsize statexec) The average plan size changes in proportion to the increase in the number and complexity of SQL statements. The complexity of the access path for SQL statements can also affect plan size. To calculate your average plan size, you need to allow 1KB to 4KB for control blocks for caching, depending on your BIND option. Let cntrlblk be the number of kilobytes allocated for caching. Then, calculate the average plan size with the following formula: (statsize statexec) + cntrlblk If you have accepted the defaults, the CLIST makes the following calculations. 1.4KB is added for the single table and 0.2KB for the additional table, making statsize = 1.6KB. 1.6KB is multiplied by 15, the default for statexec. 1KB is added to the product, and the result is 25KB. | The size of a plan during execution is typically 12KB.
53
The ACQUIRE option of the BIND command affects the plan size. ACQUIRE(ALLOCATE) results in a larger plan size than ACQUIRE(USE), thus affecting the amount of EDM pool storage the plan consumes. ACQUIRE(ALLOCATE) causes items to be stored with the plan to enhance performance. The RELEASE option of the BIND command can also affect the plan size. RELEASE(DEALLOCATE) can result in a larger plan size than RELEASE(COMMIT), thus affecting the amount of EDM pool storage that the plan consumes. RELEASE(DEALLOCATE) causes items to remain stored with the plan to enhance performance. The increase in plan size is determined by the number of database objects (databases, table spaces, and tables) used by the plan. In CICS and IMS environments, thread reuse tends to increase the number of database objects used by the plan when the RELEASE(DEALLOCATE) BIND option is used. General-use Programming Interface After you bind a plan or package, you can check the size by querying the SYSPLAN and SYSPACKAGE catalog tables. PLSIZE or PKSIZE is the size of the base segment of the plan or package. AVGSIZE is the average size for each section. CACHESIZE is the cache size you specify for the authorization ID cache for the plan. To find the plan or package sizes and the size of the authorization ID cache, use the appropriate SQL statement: For a plan: SELECT NAME, PLSIZE, AVGSIZE, CACHESIZE FROM SYSIBM.SYSPLAN ORDER BY NAME; For a package: SELECT NAME, PKSIZE, AVGSIZE FROM SYSIBM.SYSPACKAGE ORDER BY NAME; | | | | | | | | | | | | | | To find the number of sections for each DBRM bound with each plan, use the following SQL statement. Add the number of sections per DBRM by plan to find the number of sections per plan. SELECT PLNAME, NAME, CASE WHEN MAX(SECTNOI) <> THEN MAX(SECTNOI) ELSE MAX(SECTNO) END AS SECTNUM FROM SYSIBM.SYSSTMT GROUP BY PLNAME, NAME ORDER BY PLNAME, NAME; To find the number of sections for each DBRM bound with each package, use the following SQL statement. Add the number of sections per DBRM by package to find the number of sections per package.
54
Installation Guide
| | | | | | | |
SELECT COLLID, NAME, VERSION, CASE WHEN MAX(SECTNOI) <> THEN MAX(SECTNOI) ELSE MAX(SECTNO) END AS SECTNUM FROM SYSIBM.SYSPACKSTMT GROUP BY COLLID, NAME, VERSION ORDER BY COLLID, NAME, VERSION; End of General-use Programming Interface You can also use similar statements with WHERE clauses to specify the plans or packages you want. The number of sections executed per plan or package can be estimated only from the execution of the application that uses the particular plan or package. Consequently, the amount of storage needed during execution of the application is the base segment size of the plan or package plus the size for the sections being executed. The storage needed for a plan is the sum of the base size and the size of the executed sections. The storage needed for a package is the sum of the base size, the base size of the package, and the size of the executed sections.
Calculating the EDM pool space for the prepared statement cache
If you choose to enable the prepared statement cache for dynamic SQL programs, you must increase the size of your EDM pool or the performance of static plans and packages can be adversely affected. When you use the cache, prepared statements are stored in the EDM pool, the same as static SQL. The number of prepared statements that are stored in the cache depends on the characteristics of the dynamic SQL your application executes. One type typically benefits from caching prepared statements, while the other type usually does not. The first type of applications use dynamic SQL that is embedded in an application and is used repeatedly. Applications with this type of SQL benefit most from caching prepared statements because the statement can be used from the cache. On the other hand, applications that contain SQL statements that are seldom used pay the cost of being added to the cache with few benefits. For example, queries from QMF are likely to be prepared and executed only once. Caching prepared statements does not benefit applications that extensively use this kind of SQL. Estimate the storage needed for the prepared statement cache using these variables. Let maxdynplans be the maximum number of unique plans containing embedded dynamic SQL that you expect to be running in the system at any given time. Let dynstatsize be the average statement size of a prepared statement in the cache. To calculate the average prepared statement size, add 1.8KB for each single table statement and 0.2KB for each additional table in the statement. For example, if you assume an average of three tables per statement, the average statement size is 2.2KB (1.8KB + 0.2 + 0.2).
55
Let dynstatexec be the average number of different dynamic SQL statements that are executed by plans containing dynamic SQL that are likely to be used repeatedly. Let adhocexec be the maximum number of unique SQL statements that are likely to be used only once that are executed by all users at any given time. You can estimate this by multiplying the maximum number of users running ad hoc SQL programs and multiplying by 5. Then calculate the size needed for the Prepared Statement Cache as follows: (maxdynplans (dynstatsize + dynstatexec) + (adhocexec dynstatsize)) The installation CLIST does not attempt to calculate this when calculating the estimated EDM Pool size because it does not have all the information provided by the variables. | | | | | | | | | | | |
Calculating the EDM pool data space for cached dynamic statements
To relieve storage constraints in the DBM1 address space, you can choose to have the part of your EDM pool that contains cached dynamic statements in a data space. Data spaces are only used when you specify YES for CACHE DYNAMIC SQL on installation panel DSNTIP4. DB2 determines the default size of the data space as follows: If the EDM pool storage size is less than or equal to 40 MB, the EDM data space is 40 MB. If the EDM pool storage size is larger than 40 MB, the EDM data space size equals the EDM pool size. You can override this value on installation panel DSNTIPC.
56
Installation Guide
These values are the defaults built into the CLIST and are reasonably typical for databases.
Table 18. DBD sizes for ranges of columns and tables Columns per Table 10 20 30 40 50 75 100 200 300 10 Tables per Database 12KB 12KB 16KB 16KB 16KB 20KB 20KB 32KB 40KB 20 Tables per Database 24KB 24KB 28KB 28KB 32KB 36KB 40KB 60KB 80KB 30 Tables per Database 32KB 36KB 40KB 44KB 44KB 52KB 60KB 88KB 120KB 40 Tables per Database 44KB 48KB 52KB 56KB 60KB 60KB 80KB 120KB 156KB 50 Tables per Database 56KB 60KB 64KB 68KB 76KB 88KB 100KB 148KB 196KB
57
Let indexes be the number of indexes per table. The installation CLIST sets this variable to 2. Let tblspaces be the number of table spaces per database specified on installation panel DSNTIPD. Let partts be the average number of partitioned table spaces per database. Let avgpart be the average number of partitions per partitioned table space. Then calculate the number of open data sets with the following formula: concdb (((tables indexes) + tblspaces) + ((2 partts avgpart) - (2 partts))) | | | | | You can modify DSMAX by editing job DSNTIJUZ. The maximum number of concurrently open data sets is: 32 767 if you are running on OS/390 Version 2 Release 6 or later 10 000 if you are running on a level of OS/390 that is earlier than Version 2 Release 6 See Section 5 (Volume 2) of DB2 Administration Guide for information on tailoring DSMAX for performance. Your DSMAX calculations might be different for LARGE table spaces. Nonpartitioned indexes on a LARGE partitioned table space can have up to 128 data sets. To calculate the main storage required for your data set control blocks, use the following formula: DSMAX 1.8KB | | The default, as calculated by the DSNTINST CLIST, is 3600KB 1.8KB, or 5400KB. This method of calculation ignores partitioned table spaces and partitioned index spaces. It also assumes that all data sets in the database are open if the database is in use. You could enter a smaller value for the number of concurrent databases if typically only a few of the data sets in a database are opened. The larger the value of DSMAX, the longer CLOSE YES data sets stay open. DB2 recommends that you move the scheduler work area (SWA) above the 16MB line of MVS virtual storage by using JES initialization statements, JES exits, or the SMF exit (IEFUJV). This way, you can save approximately 600 bytes per open data set in virtual storage below the 16MB line and avoid potential storage errors. To determine the amount of storage needed below the 16MB line, use 0.3KB for the multiplication factor if the scheduler work area (SWA) is above the line or 0.9KB for the multiplication factor if the SWA is below the line. The calculations in the CLIST presume that SWA is above the line. See Improving Resource Utilization in Section 5 (Volume 2) of DB2 Administration Guide for more information.
58
Installation Guide
6 KB + (MAX USERS + MAX REMOTE ACTIVE) 4 + (MAX REMOTE CONNECTED - MAX REMOTE ACTIVE) 4 The default, as calculated by the DSNTINST CLIST, is: 6 KB + (7 + 64) 4 + (64 - 64) 4, or 596
If you use dynamic SQL, you need more working storage and less EDM pool space than if you use static SQL. QMF users have a very small plan in EDM pool, usually 12KB. Users of static SQL have larger plan sizes as noted above, typically varying from 10KB to 80KB. Typical sites would use about 76KB per thread (a structure that describes an application connection to DB2) of working storage for dynamic SQL users, and 24KB per thread for static SQL users. For information about thread creation, see Section 5 (Volume 2) of DB2 Administration Guide. The CLIST does not include information about open compressed table spaces. Therefore, if you use compressed table spaces, you need additional storage. See Section 1 of DB2 Administration Guide for storage information about compressed table spaces.
The default, as calculated by the DSNTINST CLIST, is 600KB + 70 + 64 + (3000 0.3KB), or 1634KB. If the scheduler work area (SWA) is above the 16MB line, multiply the number of data sets by 0.3KB; if the SWA is below the 16MB line, multiply the number of data sets by 0.9KB. Table 19 shows total main storage calculation. Place your estimates in the spaces provided and make the indicated calculations.
Table 19. Main storage size calculation Category Your Size Default 14812KB + + + + +4300KB + = +8768KB +1000KB +4000KB +5400KB +4300KB +5960KB =44240KB 1634KB
| | | |
EDM pool storage size Buffer pool size Sort pool size RID pool size Data set control block storage size Code storage size Working storage size
| |
Total main storage size (above 16MB line) Region Size (below 16MB line) (assume SWA above the line)
59
The CLIST Calculations Panel, DSNTIPC, displays storage sizes calculated by the DSNTINST CLIST. For more information, see Install DB2 - CLIST calculations panel 1: DSNTIPC on page 235.
Real storage
DB2 can use real storage, which includes both central and expanded storage, to reduce I/O and processor times and to improve response time and throughput. The amount of real storage DB2 needs varies greatly. Some customers find that they need several times the estimates listed below, while others need less. The amount of storage is an important parameter in DB2 performance. Performance monitoring programs give you a more accurate estimate of your storage requirements than the formulas in this section. For the DB2 buffer pools, the EDM pool, and working storage, the amount of real storage must be the same as the amount of virtual storage. Paging activity in the buffers is an indication of a problem. If there is not enough real storage to hold the buffers, then the buffers need to be reduced. This might mean fewer concurrent users. Additional space is needed to contain locks, the working set of code in all address spaces, log buffers, and ECSA and CSA space. Because some of the figures used in virtual storage calculations are maximums, while the real storage figures typically use activity for the peak, changes are needed in the calculations. The virtual storage figures concentrate on the most constrained address space, but real storage work must include them all. For more information on each category, see the pages specified in Table 20 and Table 21.
Table 20. Real storage size calculation Category Default 8768KB 1000KB 4000KB 14812KB 5400KB 5400KB 6960KB 400KB 5000KB 2160KB Virtual Size Factor _______ _______ _______ _______ _______ 5400KB _______ _______ _______ _______ 1.0 0.5 0.5 1.0 0.6 0.5 1.0 0.8 0.4 0.4 = Real Size _______ _______ + _______ + _______ + _______ + 2700KB + _______ + _______ + _______ + _______ _______ See Page Note 51 52 53 57
1
| | | |
Buffer pools Sort pool RID pool EDM pool Data set size Code size + 1100 (4 address spaces) Working storage + (DSCF + DDF) Log buffers Lock space CSA/ECSA
58 Note Note 47
1 1
Total default real storage size = = _______ Note: 1 See Section 5 (Volume 2) of DB2 Administration Guide Table 21 (Page 1 of 2). Default real storage size calculation Category Buffer pools Sort pool RID pool EDM pool Data set size Code size + 1100 (4 address spaces) Virtual Size 8768KB 876KB 4384KB 7562KB 3600KB 5400KB Factor 1.0 0.5 0.5 1.0 0.6 0.5 = Real Size 8768KB 438KB 2192KB 7562KB 2160KB 2700KB
60
Installation Guide
Table 21 (Page 2 of 2). Default real storage size calculation Category Working storage + (DSCF + DDF) Log buffers Lock space CSA/ECSA Total real storage size = Virtual Size 6960KB 400KB 5000KB 2160KB Factor 1.0 0.8 0.4 0.4 = Real Size 6960KB 320KB 2000KB 864KB ---------= 31714KB
Using rough estimates, Table 22 shows estimates of the amount of additional real storage needed by several kinds of users. If you have more concurrent users, plan to add real storage.
Table 22. Additional real storage for more users Type of User Transaction Query Batch Additional Real Storage 150KB 400KB 700KB
61
62
Installation Guide
# # | | | |
# # # # #
63
Each tape or cartridge has one or more function modification identifiers (FMIDs) that SMP/E uses to distinguish separate parts of DB2. This arrangement simplifies shipping and service. IRLM, for example, is distributed with both IMS and DB2, and therefore has a separate FMID. Even though your site might not use every module, you must load each FMID. Along with these tapes or cartridges, you receive a set of documents. One of these documents is IBM DATABASE 2 Universal Database Server for OS/390 Program Directory. Read the DB2 Program Directory before installing or migrating DB2. It identifies and describes the contents of FMIDs for each tape or cartridge. It also describes any additional service that needs to be applied to DB2. You also receive several Program Directories for elements of the DB2 server. Read these directories before installing any of the DB2 elements. If you plan to use DB2's callable SQL interface (DB2 ODBC), there are additional installation jobs that you need to run. See DB2 ODBC Guide and Reference for more information. | | | If you plan to use DB2 for OS/390 Java Edition, see DB2 Application Programming Guide and Reference for Java for additional installation jobs that you need to run. Before installing DB2, use Information/Access or the ServiceLink facility of IBMLink to check for PSP updates to the information contained in both the DB2 Program Directory and this book. Refer to DB2 Program Directory for PSP keyword specifications. Be sure that you apply all necessary corrective service to your DB2 system before migrating. It is also a good idea to check monthly for PSP updates. This way, you get the most current information about DB2. Contact the IBM Support Center if you do not have access to IBMLink.
| | |
# #
64
Installation Guide
Table 23. DB2 distribution libraries Distribution Libraries Description This library contains an individual object module for every DB2 load module. It contains the IRLM load modules if you choose to install IRLM into the same distribution libraries as DB2. This library contains the DB2 macros, sample programs, sample data, initialization data, TSO CLISTs, ISPF panels, and ISPF messages. This library contains the DB2 English or Kanji task panels. This library contains the IVP input data and expected output for sample applications. This library contains an individual object module for every IRLM load module. This library contains the installation procedures for installing IRLM Version 2. This library contains the data to be copied into the MVS/Open Edition HFS.
# # # # # # # # # # # # # # # # # | | | | | | |
prefix.ADSNLOAD
prefix.ADSNMACS
prefix.ADSNENU or ADSNDKF prefix.ADSNIVPD prefix.ADXRLOAD prefix.ADXRSAMP prefix.ADSNHFS prefix.ADSNBKS prefix.ADSNINDX prefix.ADSNINST prefix.ADSNSHLF prefix.AIHSCLSB prefix.AIHSMODB prefix.AIHSSMPB
Table 24 (Page 1 of 2). DB2 target libraries Target Libraries Description This library contains the BookManager books that are used for DB2 online help. See Chapter 2-4. Setting up and using DB2 Online Help on page 83 for more information. This TSO CLIST library contains code used to simplify the process of installing and migrating, to aid program preparation and the use of DB2 utilities, and to allow the use of DB2 Interactive (DB2I). This library contains the system DBRMs for DB2 Version 6. This program library is empty when first created. The installation jobs put DSNHDECP, the DSNZPxxx subsystem parameters load module, and user exit modules into this library. This library contains the BookManager index for the books in prefix.SDSNINST. See Chapter 2-4. Setting up and using DB2 Online Help on page 83 for more information. This library contains jobs that are used to install DB2 online help. See Chapter 2-4. Setting up and using DB2 Online Help on page 83 for more information. This library contains ERLY code of Version 6.
| | | |
prefix.SDSNBKS
prefix.SDSNCLST
| | # # # # | | | | | | | |
prefix.SDSNDBRM prefix.SDSNEXIT
prefix.SDSNINDX
prefix.SDSNINST
prefix.SDSNLINK
65
Table 24 (Page 2 of 2). DB2 target libraries Target Libraries Description This library contains Version 6 load modules. This macro library contains macros needed for the CICS and IMS attachment facilities, the initialization parameter macros, and some data mapping macros needed for some applications. This initialization library contains the sample applications and data, the jobs for installing and migrating, the default installation and migration parameters, and catalog initialization data for DB2. The JCLIN for each FMID is stored in this library. This library contains the BookManager bookshelf for the books in prefix.SDSNINST. See Chapter 2-4. Setting up and using DB2 Online Help on page 83 for more information. This DB2 ISPF message library contains messages issued during install or migrate processing. This is the DB2 ISPF library for installation task and help routing panels. This is the DB2 ISPF skeleton library used to produce EDITJCL. This is the DB2 ISPF command table library. prefix.SDSNPFPE contains the English task and help panels, and prefix.SDSNPFPK contains the Kanji task and help panels. prefix.SDSNENU is currently unused, and prefix.SDSNDKF contains the installation procedures for installing the Kanji task and help panels. This contains the header files. CLI requires header files. C language application programs can use header files. This contains the IVP input data and the expected output for sample applications. IRLM samples library. This library may be empty if you chose to install IRLM elsewhere. This library contains the IRLM load modules. This library may be empty if you chose to install IRLM elsewhere. This library is used by the Tivoli GEM DB2 of OS/390 Instrumentation element. This library is used by the Tivoli GEM DB2 of OS/390 Instrumentation element. This library is used by the Tivoli GEM DB2 of OS/390 Instrumentation element.
prefix.SDSNLOAD prefix.SDSNMACS
prefix.SDSNSAMP
| | | |
prefix.SDSNSHLF
| | | | | | | # # # # # | | | | | |
The remainder of this chapter explains how to edit and run the SMP/E jobs that DB2 provides. These jobs allocate the DB2 libraries and load them with the data from the installation tapes or cartridges. For a description of each job, see Table 25 on page 67.
66
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | # # # # # # # # | |
Table 25. List of SMP/E jobs Job Name DSNTIJAA Description This job creates the DB2 target and distribution zones. DSNTIJAA defines the SMP/E control data sets in these zones and in the SMP/E global zone. This job invokes SMP/E to accept all the FMIDs into the DB2 distribution libraries (DLIBs). This is the SMP/E allocation job. It creates the DB2 target and distribution libraries and defines the libraries in the SMP/E target and distribution zones for DB2. This job invokes SMP/E to apply all the FMIDs to the DB2 target libraries. This job invokes SMP/E to receive all the FMIDs (from both tapes or cartridges) into the SMP/E control data sets. These jobs invoke SMP/E to accept all the FMIDs for the Kanji DB2I panels into the DB2 distribution libraries (DLIBs). This SMP/E allocation job creates and catalogs the SMP/E control data sets and the DB2 target and distribution libraries for the Kanji DB2I panels. This job invokes SMP/E to apply all the FMIDs for the Kanji DB2I panels to the DB2 target libraries. This job invokes SMP/E to receive all the FMIDs (from both tapes or cartridges) for the Kanji DB2I panels into the SMP/E control data sets. These jobs invoke SMP/E to accept all the FMIDs for DB2 REXX Language Support into the DB2 distribution libraries (DLIBs). This job invokes SMP/E to apply all the FMIDs for DB2 REXX Language Support to the DB2 target libraries. This job invokes SMP/E to receive all the FMIDs (from both tapes or cartridges) for DB2 REXX Language Support into the SMP/E control data sets. Job DSNTIJUD invokes SMP/E to delete all Version 5 entries from the SMP/E libraries.
DSNTIJAC DSNTIJAE
DSNTNJAP DSNTNJRC
DSNTTJAC
DSNTTJAP DSNTTJRC
DSNTIJUD
67
If you are using a 3480 cartridge, remove the DCB parameter and change UNIT=TAPE to the appropriate device type. Also, the job assumes that the data set SYSADM.JCL.CNTL is new. Finally, tailor the JCL to reflect the unit names and volume serial numbers that your site uses. If this job fails or abends, correct the job and rerun it.
This JCL copies and prints five members. These jobs currently exist as members of the partitioned data set IBM.HDB6610.F2 on tape VOLSER=DB6610. After running the copy job, edit and run jobs DSNTIJAE, DSNTIJUD (optional), DSNTIJRC, DSNTIJAP, and DSNTIJAC. See the header notes within each job for information on how to customize the job for your particular installation.
68
Installation Guide
Item JOB Statements Link List Options DB2 Program Library DB2 Library Naming Considerations SMP/E Data Set Options IRLM Options
Page 69 69 71 73 74 75
When you are ready to submit a job, use a command like the following: SUBMIT (JCL(J) JCL(DSNTIJxx)) where xx are the last two characters of the SMP/E job name. This command submits the JOB statement along with the job.
69
that are not recognized by MVS until the next IPL. Changes that DSNTIJMV makes to the SYS1.PARMLIB affect the following: New subsystem definitions in IEFSSNxx New APF libraries in IEAAPFxx New load module libraries in LNKLSTxx. prefix.SDSNLINK: Contains early code Is shareable by multiple subsystems and releases of DB2 Is APF-authorized prefix.SDSNLOAD: Contains modules that you can place in the MVS link list Is a main load module repository Is shareable by multiple subsystems at same release level Allows only DB2 to modify code Holds default exits Is APF-authorized prefix.SDSNEXIT: Contains modules that you can place in the link list Holds the subsystem parameter module, DSNHDECP, and user-written exits Is modified by user Is APF-authorized Libraries prefix.SDSNLOAD and prefix.SDSNEXIT are separate to allow users who are supporting two levels of DB2 to access modules from either level by using STEPLIB and JOBLIB statements. This also minimizes the number of IPLs required by corrective service to DB2 load modules, and it reduces the size of the LNKLST lookaside (LLA) list. When prefix.SDSNLOAD and prefix.SDSNEXIT are used together, list prefix.SDSNEXIT first to override the IBM defaults in prefix.SDSNLOAD. # # # # IRLM link list requirement: You must add the IRLM load module DXRRL183 to the link list. This requires that you copy the module into another library. After you apply maintenance to IRLM that affects DXRRL183, remember to copy the updated module to the link list. Supporting one DB2 subsystem: There are several methods of maintaining a single DB2 subsystem. The following steps describe what is probably the easiest method for most sites: 1. Change the SMP/E procedure DSNTIJAE to assign all load modules to prefix.SDSNLOAD. You can do this by changing the data set name for DDDEF (SDSNLINK) from prefix.SDSNLINK to prefix.SDSNLOAD. 2. Remove the allocation for prefix.SDSNLINK from the allocation job DSNTIJAE. 3. Include prefix.SDSNLOAD (instead of prefix.SDSNLINK) in the LNKLSTxx member of SYS1.PARMLIB. Supporting multiple DB2 subsystems: Supporting multiple subsystems can mean several things. You can have two or more DB2 subsystems at the same release and service level (for instance, two DB2 Version 6 subsystems ). If this is the case,
70
Installation Guide
read the suggestions on page 70. In addition, create separate libraries for DSNHDECP and user-written exits of each DB2 subsystem. For considerations in data sharing environments, see DB2 Data Sharing: Planning and Administration. You can also have two or more DB2 subsystems at the same release level, but at different service levels. For instance, you can have a DB2 Version 6 production subsystem and a DB2 Version 6 test subsystem at different service levels. Or, you can have two DB2 subsystems at different release levels. For instance, you can have a Version 6 subsystem and a Version 5 subsystem. In either of these cases, you can assign the DB2 modules that must be in the link list libraries to an existing link list data set. To do this, change the data set name for DDDEF (SDSNLINK) in the DSNTIJAE procedure to the name of an existing entry in the LNKLSTxx member of SYS1.PARMLIB. You might still want to have the prefix.SDSNLOAD data set listed once in the link list to permit fewer STEPLIB statements. With different SDSNEXIT data sets, you can easily have different subsystem parameter or DSNHDECP members for each subsystem.
71
DD statement also be referred to by the DFSESL DD statement, as in the following: //DFSESL // DD DD DSN=ims_reslib,DISP=SHR DSN=prefix.SDSNLOAD,DISP=SHR
CICS procedures, including the CICS initialization JCL, also need to include DB2 libraries. See Updating CICS initialization JCL on page 420 for more information. The migration jobs include a step to rename old procedures before adding new ones. Before renaming the jobs, check existing ones so you do not overwrite them. After renaming the jobs, update the procedures to include STEPLIB or JOBLIB statements to use the appropriate load module libraries.
Performance considerations
This section discusses performance considerations for including modules in the libraries that are included in the link list and presents some suggestions on the strategies you might want to pursue. These general suggestions might not match the specific needs of your site. Adding many modules to the libraries included in the link list can reduce system performance. However, adding only a few modules to the libraries requires additional STEPLIB or JOBLIB statements. Because these STEPLIB or JOBLIB statements must be searched before the link list is searched, this approach can also reduce system performance. The approach that produces the best performance for your site depends on the environment in which you use DB2. Regardless of which attachment facilities you use, the modules in prefix.SDSNLINK must always be in the link library list. If you are using DB2 with IMS, you probably want to include prefix.SDSNLINK, not prefix.SDSNLOAD, in the LNKLSTxx member of SYS1.PARMLIB, because both the IMS RESLIB and prefix.SDSNLOAD have the DSNHLI alias. Place the needed STEPLIB or JOBLIB statements in the IMS procedures. If you are using DB2 with IMS and you want prefix.SDSNLOAD (in addition to prefix.SDSNLINK) in the LNKLSTxx member of SYS1.PARMLIB, be sure that the library concatenation for prefix.SDSNLOAD and the IMS RESLIB are correct for your site, because both libraries have the DSNHLI alias. If you are using DB2 with CICS, you probably want to put prefix.SDSNLINK, not prefix.SDSNLOAD, in the LNKLSTxx member of SYS1.PARMLIB. Then place the needed STEPLIB or JOBLIB statements in the CICS procedures. The approach for using the TSO and call attachment facilities involves the following considerations: If you use the DSN command and its subcommands infrequently, place only prefix.SDSNLINK in the LNKLSTxx member of SYS1.PARMLIB. Provide the necessary STEPLIB or JOBLIB statements in your TSO logon procedures or in your JCL if you are using batch. If you use the DSN command and its subcommands frequently, you might also want to move the TSO attach load modules to a library defined in the LNKLSTxx. The TSO attach modules are DSNECP00, DSNECP10, DSNESM00, and DSNELI.
72
Installation Guide
If you use the call attachment facility (CAF) frequently, move the CAF load modules (DSNACAB, DSNACAF, and DSNALI) to a library defined in the LNKLSTxx. If you use the CAF or the DSN command and its subcommands frequently, you might also want to move the eligible load modules to a library defined in the link pack area (LPA), IEALPAxx member of SYS1.PARMLIB. The CAF and DSN load modules must reside below the 16MB line of MVS virtual storage. The TSO load modules that you can place in the LPA are DSNECP00, DSNECP10, DSNESM00, and DSNELI. If you include these modules in the LPA, do not forget to include the appropriate aliases for DSNECP00 (DSN) and DSNELI (DSNHLI). The CAF load modules that you can place in the LPA are DSNACAF and DSNALI. If you include these modules in the LPA, do not forget to include the appropriate alias for DSNALI (DSNHLI2). Do not include DSNACAB in the LPA because it is a data-area-only, non-executable load module. Attention: If modules are moved or copied from one library to another, changes must be made to SMP/E control data to reflect the movement. If you do not make these changes, future service or changes to the modules will not be processed correctly.
73
Document any changes you make to the library names in the SMP/E jobs. You must specify these library names again during the ISPF tailoring session.
74
Installation Guide
Establishing SMP/E data sets for two releases: A single set of SMP/E zone structures can record only one release of DB2. We strongly recommend that you maintain separate zone structures for both Version 5 and DB2 for OS/390 Version 6 until you are sure that you will not fall back. The SMP/E jobs provided with DB2 assume that you will allocate a new set of SMP/E data sets for the new release. When you run your allocation job (DSNTIJAE), it creates a set of SMP/E data sets. If you choose to reuse your Version 5 zone structure, you can run job DSNTIJUD to delete SMP/E data for Version 5. However, after you run this job, you cannot fall back. You can create an additional set of SMP/E data sets either by copying them from a prior release of DB2 or by allocating a new set. Allocating a new set is faster because no data must be deleted. Recommendation: Copy a prior set because it allows you to perform service regression checking.
IRLM options
The SMP/E prefix in the SMP/E jobs is the same for the new IRLM as for the old IRLM. Consequently, if you do not change the SMP/E prefix, the jobs will overwrite your old IRLM. If you do not want to do this, edit the jobs accordingly.
| | | | | | | | | | | | | | | | | | | | | | | | | |
SMP/E step 2: Allocate the SMP/E CSI file and SMP/E control data sets: DSNTIJAA (optional)
This job creates the SMP/E consolidate software inventory (CSI) file and SMP/E data sets and allocates them to SMP/E. DSNTIJAA also creates the DB2 target and distribution zones. DSNTIJAA is required only if these objects are not created and allocated to the SMP/E global zone. Depending on how your systems are set up, you might need to contact an MVS system programmer to help you manage some of the SMP/E data sets. For each group of data sets, DSNTIJAA requires a data set prefix and a volume name on which to allocate the data sets. These names are called the allocation job parameters. Change the allocation parameters according to the decisions you made regarding the SMP/E data set options. Table 26 lists the allocation job parameters (prefix and volume) for each of the three groups of data sets.
Table 26. Allocation job parameters for SMP/E control data sets Parameter Type Prefix TLIB Prefix Volume TLIB Volume Middle-level Qualifier Search Strings ?SMPPRE? ?TLIBPRE? ?SMPVOL? ?TLIBVOL? ?SMPMLQ?
If you are using JES3, you must split job DSNTIJAE into two jobs. A comment line in the code indicates where to split the job. Examine the following items in the job you are using, and make any necessary modifications:
75
| | | | | | | | | | | | | | | | | | | |
Space allocations: The space allocated for the SMP/E history log data sets is rather large. The ddname for this data set is SMPLOG; its default name is IMSVS.HLDS. If you do not want to retain this log information, remove the data set allocations for ddnames SMPLOG and SMPLOGA from steps ALLOC and INITSMP of job DSNTIJAA. In step INITSMP, you will also need to specify DA(NULLFILE) in the DDDEF's for SMPLOG and SMPLOGA. The ?TLIBVOL? parameter defines the location of the SMPTLIB data sets. The volume on which these data sets reside must have at least 35MB (1MB=1048576B) of free space. That is about 37 cylinders on a 3390 and 49 cylinders on a 3380. The block size is specified as 19069 for unformatted data sets and is determined by the system for other data sets. Important: AVGREC requires that SMS be active however the data sets don't have to be allocated on SMS-managed storage devices. The space allocations in DSNTIJAA for the CSI assume that you are using a 3380. SREL and DSSPACE: The allocation jobs specify an SREL of P115 for the SMP/E data sets. Do not change this. They also specify DSSPACE to be (200,200,500). This is a minimum; change it only to increase it. SMP/E zone structure: SMP/E zone structures are discussed in the OS/390 SMP/E User's Guide. You can choose to use a different zone structure from the one shown in DSNTIJAA.
| | | | | | | | | | | | | | | | | | | | |
76
Installation Guide
| | | | | |
Table 27 (Page 2 of 2). Allocation job parameters for DB2 distribution and target libraries Data Sets DB2 Target Libraries Parameter Type Prefix Volume Search Strings ?TARGPRE? ?TARGVOL?
If you do not want Tivoli GEM DB2 of OS/390 Instrumentation, FMID H0AL211, delete all lines containing the string 'H0AL211' from DSNTIJAE.
77
| | | | | | | |
However, this job does not clean up the global zone. Issue the SMP/E REJECT command to remove entries from and clean up the global zone. Use the IRLM (FMID HIR2101), which is shipped as part of DB2 Version 6, unless you have a higher maintenance level of IRLM already installed on your system. If you want to use a different levels of IRLM for your IMS and DB2 subsystems, you must have different IRLM levels in different SMP/E zones or SMP/E control data sets. Using the down-level IRLM increases your IRLM service activity and is not recommended. Examine the job before you run it. The ?SMPPRE? and ?SMPMLQ? parameters must have the same definition as in the allocation job. The SYSOUT class is defined as the same class as the job's MSGCLASS parameter. Attention:
| | | | | | | |
If DB2 shares the same CSI with any CICS or ISPF products, delete the following statement from this job before executing: DEL MOD(DFHEAI) DEL MOD(DFHEAIO) DEL MOD(ISPLINK) Job DSNTIJUD should be run before the SMP/E APPLY (job DSNTIJAP). Running job DSNTIJUD is not necessary if you are installing DB2 for the first time. If you accidentally run it, it will have no adverse effect.
78
Installation Guide
| | | | | |
one shipped with DB2, remove FMID HIR2101 from the APPLY step of job DSNTIJAP. If you do not want DB2 Online Help, remove FMID HDB661A from the list of FMIDs to be applied by DSNTIJAP. If you do not want Tivoli GEM DB2 of OS/390 Instrumentation, remove FMID H0AL211 from the APPLY SELECT list in job DSNTIJAP.
| | |
SMP/E step 8: Unload the jobs for the Kanji DB2I panels (optional)
This step is optional unless you plan to use the Kanji DB2I panels. To use Kanji DB2I panels, you need a terminal that can handle DBCS data. Use the packaging information in Table 28 and the sample JCL in Figure 3 on page 80 as a guide. Make sure you specify the correct VOLSER, LABEL information, and data set names.
| | | | |
Table 28. Packaging information for the Kanji panels Kanji Panels VOLSER LABEL Data set name DB6611 (2,SL) IBM.JDB6611.F1
79
| | | | | | | | | | | | | | | | |
// COMPID: DB2,574 XYR // DOC: LOAD KANJI SMP INSTALLATION JCL FROM TAPE FOR DB2 //LOAD EXEC PGM=IEBCOPY //SYSPRINT DD SYSOUT= //JCLTAPE DD DSN=IBM.JDB6611.F1,VOL=(PRIVATE,,SER=DB6611), // UNIT=TAPE,LABEL=(18,SL),DISP=(OLD,PASS) // //JCLDISK DD DSN=SYSADM.JCL.CNTL,VOL=SER=USER 1,UNIT=SYSDA, // DISP=OLD //SYSUT3 DD UNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT4 DD UNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSIN DD COPY I=JCLTAPE,O=JCLDISK SELECT MEMBER=(DSNTNJAE) SELECT MEMBER=(DSNTNJAC,DSNTNJAP,DSNTNJRC) //
Figure 3. Sample JCL for copying Kanji jobs to DASD
| | | |
| | | | |
SMP/E step 10: Run the receive job for the Kanji DB2I panels (optional)
This step is optional unless you plan to use the Kanji DB2I panels. To use Kanji DB2I panels, run job DSNTNJRC. Use SMP/E step 4: Run the receive job: DSNTIJRC on page 77 as a guide to help you with this job.
| | | |
SMP/E step 11: Run the apply job for the Kanji DB2I panels (optional)
This step is optional unless you plan to use the Kanji DB2I panels. To use Kanji DB2I panels, run job DSNTNJAP. Use SMP/E step 6: Run the apply job: DSNTIJAP on page 78 as a guide to help you with this job.
| | | | |
SMP/E step 12: Run the accept job for the Kanji DB2I panels (optional)
This step is optional unless you plan to use the Kanji DB2I panels. To use Kanji DB2I panels, run job DSNTNJAC. Use SMP/E step 7: Run the accept job: DSNTIJAC on page 79 as a guide to help you with this job.
# # # #
SMP/E step 13: Copy and edit the SMP/E jobs for DB2 REXX Language Support (optional)
You need to perform this step and the following three steps only if you are installing the DB2 REXX Language Support feature.
80
Installation Guide
# # # # # # # # # # # # # # # # # # # # # # # #
Use the sample JCL shown in Figure 4 on page 81 to invoke the MVS utility IEBCOPY to copy the SMP/E jobs to DASD. // COMPID: DB2,574 XYR // DOC: LOAD REXX SMP INSTALLATION JCL FROM TAPE FOR DB2 //LOAD EXEC PGM=IEBCOPY //SYSPRINT DD SYSOUT= //JCLTAPE DD DSN=IBM.JDB661H.F1,VOL=(PRIVATE,,SER=DB661H), // UNIT=TAPE,LABEL=(2,SL),DISP=(OLD,PASS) // //JCLDISK DD DSN=SYSADM.JCL.CNTL,VOL=SER=USER 1,UNIT=SYSDA, // DISP=OLD //SYSUT3 DD UNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSUT4 DD UNIT=SYSDA,SPACE=(CYL,(1,1)) //SYSIN DD COPY I=JCLTAPE,O=JCLDISK SELECT MEMBER=(DSNTTJAC,DSNTTJAP,DSNTTJRC) //
Figure 4. Sample JCL to Copy SMP/E jobs to DASD
After you have copied the SMP/E jobs to DASD, add a job statement to each job and customize the jobs to specify the unit names and volume serial numbers that your site uses. The SMP/E jobs move all files for DB2 REXX Language Support to the target and distribution libraries for the DB2 base product. Therefore, you do not need to set up target and distribution libraries for DB2 REXX Language Support.
# # # #
SMP/E step 14: Run the RECEIVE job for DB2 REXX Language Support
DSNTTJRC invokes SMP/E to receive the FMIDs for DB2 REXX Language Support into the SMP/E control data sets.
# # #
SMP/E step 15: Run the APPLY job for DB2 REXX Language Support
DSNTTJAP invokes SMP/E to apply the FMIDs for DB2 REXX Language Support to the DB2 target libraries.
# # #
SMP/E step 16: Run the ACCEPT job for DB2 REXX Language Support
DSNTTJAC invokes SMP/E to accept the FMIDs for DB2 REXX Language Support into the DB2 distribution libraries.
81
Language-switching CLISTs: An ordinary CLIST can be used (outside of ISPF) to free and reallocate ISPPLIB. Following is an example of a CLIST: / Execute this CLIST outside of ISPF / PROC LANGUAGE(E) FREE DD(ISPPLIB) WRITE DO YOU WANT ENGLISH OR JAPANESE PANELS: Enter E or J. READ &LANGUAGE; IF &LANGUAGE = E + THEN ALLOC DD(ISPPLIB) DS('DSN61 .SDSNSPFP' 'DSN61 .SDSNPFPE') + SHR / ENGLISH / ELSE ALLOC DD(ISPPLIB) DS('DSN61 .SDSNSPFP' 'DSN61 .SDSNPFPK') + SHR / JAPANESE / END Some users allocate the ISPF panel library from their DEFAULT CLIST. Allocation of ddname ISPPLIB controls the current language just as it does for the LOGON procedure. If you are falling back to Version 5, change your logon procedures or CLISTs that use the Kanji feature to point to the Version 5 libraries.
| | | |
82
Installation Guide
| | | | | | | | | | | | | | | | | |
| | | | | |
| | | | | | | | | | | |
83
| | | | | | | | | | | |
For installation, start the installation procedure by running CLIST DSNTINS0. See Chapter 2-5. Installing, migrating, and updating system parameters on page 91 for more information. For DB2I, specify YES in field CHANGE HELP BOOK NAMES? in the DB2I Defaults panel. See Section 6 of DB2 Application Programming and SQL Guide for more information. After you enter the data set names in panel DSNTIPA0 or DSNEIPA0, DB2 saves them so that you need to modify the panel again only if you change the data set names. For example, if you want DB2 Online Help to access the latest versions of the DB2 books, you can copy those books from the DB2 for OS/390 Version 6 Licensed Online Library CD-ROM to MVS sequential data sets, then access DSNTIPA0 or DSNEIPA0 and enter the new book data set names.
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
84
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
The bookshelf shipped on the tape is not enabled for cross-book searches. To build a searchable bookshelf: 1. From the bookshelf list, open the DSNSHnnn bookshelf. A list of DB2 books is displayed. 2. Select SEARCH on the action bar. The SEARCH menu is displayed. 3. Select option 2 'Set up search ...'. The following error message is displayed:
Books View Search Group Options Help ---------------------------------------------------------------------Severe Read or Search Error A serious BookManager error has occurred while reading or searching the current bookshelf or book. Processing for the current bookshelf or book is terminated. Reason . Data set Routine Code . . . . . . : : : : Bookshelf does not match bookshelf search index 'DSNHELP.DSNSHnnn.BKSHELF' EOXMPLSH:plsh_get_string 9
Books View Search Group Options Help ---------------------------------------------------------------------Rebuild Bookshelf The bookshelf does not match its bookshelf search index. Select one of the following actions, and then press ENTER. 1 1. 2. Rebuild the bookshelf Do not rebuild the bookshelf . : 'DSNHELP.DSNSHnnn.BKSHELF'
| | |
F1=Help F12=Cancel
85
| | | | |
The bookshelf data set 'DSNHELP.DSNSHnnn.BKSHELF' has been updated to correspond with its search index. You must refresh the bookshelf to use it.
| | | | | | | | | | | | | | | | |
Books View Options Help ------------------------------------------------------------------------Command ===> ________________________________________________ SCROLL ===> Bookshelf List Shelves 1 to 1 Shelf Name Description __ DSNSHnnn DB2 V6 BOOKS FOR ONLINE HELP
| | | | | | |
If the BOOKMGR command abends, verify that you have concatenated the BookManager data sets correctly in the LINKLIST, in the TSO logon procedure, and in any user-supplied ISPF start-up CLISTs. To set the exit options: 1. Select Options on the action bar. The Options pull-down is displayed. 2. Select Set exit options. The Set Exit Options window is displayed. 3. Turn off the exit confirmations and bookmarks, as in this example:
86
Installation Guide
| | | | | | | | | | | | | | | | |
Exit from book
Set Exit Options . . . . . 2 1. 2. 1. 2. 3. Confirm exit Do not confirm exit Keep current closing bookmark Place the closing bookmark Exit without closing bookmark
Setting of bookmark . . . 3
---------------------------------------------------------------Exit from bookshelf and bookshelf list . . . . . 2 1. 2. Confirm exit Do not confirm exit
4. Press ENTER to save the changes. 5. Press the exit key (F3) to exit online help.
| | | | |
| | | | | | | | | | | | | | | |
87
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Graphics have a PICTURE label with a number. Move the cursor to the label and press Enter to display the graphic. Press F3 to return to the text. If you do not have GDDM installed, you cannot view graphics. Figures and tables may be wider than the display screen. Type RIGHT on the command line to scroll to the right of the figure or table; type LEFT to return to the left margin. See Searching for additional information for additional navigation information.
88
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
To add words to your search request, type a slash (/) next to each word you want to include and press F4. To replace a word in your search request, type a slash (/) next to the word you want to use and press F5 4. Press Enter to search the book To search for synonyms: 1. Type your search request in the Set up search window 2. Move the cursor to a word in the request and press F5 3. You see a list of synonyms for that word in the Synonyms window. To add words to your search request, type a slash (/) next to each word you want to include and press F4. To replace a word in your search request, type a slash (/) next to the word you want to use and press F5 4. Press Enter to search the book Working with your search matches: When you search a book, DB2 Online Help displays a list of the topics containing information that matches your search request. Online help displays the topics in the list by location, frequency and size, exactness, uniqueness, and similarity. The topics that appear first on the list are those with the highest ranking. To see the context of the match, press F4 to see a line of text beneath each topic entry that shows where the best search match in the topic occurred. To see an explanation for why a topic matches your search request, move the cursor to the topic identifier and press F6. To view a topic with a search match, move the cursor to the topic identifier and press Enter. You go to the first occurrence of the search word or phrase in the selected topic. To bring up your search list again, select List all topics with matches from the Search pull-down. Other options from the Search pull-down include Go to next match, Go to next best topic, and Emphasize matches (to highlight matching text in the book).
89
90
Installation Guide
91
PROFILE WTP MSGID ALLOCATE DDNAME(ISPMLIB) 'ISP.V3R5M .ISPMENU' ALLOCATE DDNAME(ISPPLIB) 'ISP.V3R5M .ISPPENU' ALLOCATE DDNAME(ISPSLIB) 'ISP.V3R5M .ISPSLIB' ALLOCATE DDNAME(ISPTLIB) 'ISP.V3R5M .ISPTLIB' # #
DSN('prefix.SDSNSPFM' 'ISR.V3R5M .ISRMENU') DSN('prefix.SDSNSPFP' 'ISR.V3R5M .ISRPENU') DSN('prefix.SDSNSPFS' 'ISR.V3R5M .ISRSENU') DSN('prefix.SDSNSPFT' 'ISR.V3R3M .ISRTLIB')
The PROFILE command provides complete error messages. DB2 does not support using LIBDEFs for the installation CLIST DSNTINS0 and online help. The ALLOCATE command uses the default names of the libraries containing the ISPF panels. These ISPF library names might be different at your site. To concatenate or merge existing libraries with them, put the library names in the list of names in parentheses after DSN with the largest block size first. (If two or more libraries have the same block size, it does not matter which comes first.)
General instructions
The CLIST reads a set of default values and displays them on the panels. The values can be either the original default values supplied by IBM or a set of values created by you in a previous CLIST run. The installation CLIST saves the panel input into your DSNTIDxx output member just before the CLIST issues this message: DSNT4781 BEGINNING EDITED DATA SET OUTPUT.
92
Installation Guide
A new data set, prefix.NEW.SDSNTEMP, containing tailored CLISTs for input to job DSNTIJVC, which is run during installation or migration Figure 5 on page 94 illustrates by examples how the CLIST functions. Use job DSNTIJVC to combine the CLISTs into a common data set. If you are installing DB2, see Making DB2 CLISTs available to TSO and batch users: DSNTIJVC on page 263 for more information. If you are migrating, see Making DB2 CLISTs available to TSO and batch users: DSNTIJVC on page 304. Some validity checking of the values you enter is done during the panel sessions. If you get an ISPF error message, press the HELP key for additional information.
93
94
Installation Guide
# # #
95
DSNHDECP names: These are the names of the parameters in the data-only load module DSNHDECP. Subsystem parameter names: These are the names of the parameters in the data-only load module DSNZPxxx. Acceptable values: This part of the description gives you the range of allowable values or the list of allowable choices for an installation panel field not necessarily the value associated with that field. If the maximum allowable value is over 1024, in most cases you can use the equivalent K value . (The CLIST automatically multiplies the K value by 1024.) If the maximum allowable value is over 1 048 576, in most cases you can use the equivalent M value . (The CLIST automatically multiplies the M value by 1 048 576.) The maximum acceptable values might be too large for smaller systems; therefore, make certain that the values you enter are valid for the size of your system. Update: This information identifies a corresponding field on the update panel or refers to a page giving update instructions. When an option is specified, it refers to the option on the Update Selection Panel (DSNTIPB). Your installation options are described in the sequence that DB2 presents the panels to you:
| | | |
Directory of panels
Table 29 (Page 1 of 2). Panel identifiers
Panel ID DSNTIPA0 DSNTIPA1 DSNTIPA2 DSNTIPK DSNTIPH DSNTIPT DSNTIPU DSNTIPQ DSNTIPG DSNTIPW DSNTIPD DSNTIP7 DSNTIPE DSNTIP1 DSNTIP2 DSNTIP6 DSNTIPN DSNTIPO DSNTIPF DSNTIP4 DSNTIPI DSNTIPJ DSNTIPP DSNTIPM DSNTIPL DSNTIPA DSNTIPS DSNTIPR DSNTIP5 DSNTIPX DSNTIPZ DSNTIPY DSNTIPC DSNTIPC1 Panel Title Online Book Data Set Names Main Panel Data Parameters Define Group or Member System Resource Data Set Names Data Set Names Panel 1 Data Set Names Panel 2 Data Set Names Panel 3 Data Set Names Panel 4 Data Set Names Panel 5 Sizes Panel 1 Sizes Panel 2 Thread Management Buffer Pool Sizes Panel 1 Buffer Pool Sizes Panel 2 Buffer Pool Sizes Panel 3 Tracing and Checkpoint Parameters Operator Functions Application Programming Defaults Panel 1 Application Programming Defaults Panel 2 IRLM Panel 1 IRLM Panel 2 Protection MVS PARMLIB Updates Active Log Data Set Parameters Archive Log Data Set Parameters Databases and Spaces to Start Automatically Distributed Data Facility Panel 1 Distributed Data Facility Panel 2 Routine Parameters Data Definition Control Support Job Editing CLIST Calculations Panel 1 CLIST Calculations Panel 2 Page 102 103 109 114 116 120 125 133 136 139 142 148 150 155 157 159 161 168 175 183 188 194 199 203 207 209 215 217 222 226 229 232 235 239
| | | | | | | | | | | | | | | | | | | | | | |
96
Installation Guide
DSNTIPB
| | |
97
| | |
| |
| | | |
98
Installation Guide
| |
| | |
| |
99
| | |
100
Installation Guide
101
PRESS:
RETURN to exit
2. COMMAND REFERENCE
Acceptable values: Default: DSNZPARM: Valid data set name ending in .BOOK. See page 105. DSNHELP.DSNCR0G1.BOOK none
3. INSTALLATION GUIDE
Acceptable values: Default: DSNZPARM: Valid data set name ending in .BOOK. See page 105. DSNHELP.DSNIG0G1.BOOK none
102
Installation Guide
DSNTIPA1 ===> _
Check parameters and reenter to change: 1 2 INSTALL TYPE DATA SHARING ===> INSTALL ===> NO Install, Update, or Migrate Yes, No, or blank for Update
Enter the following value for migration only: 3 DATA SET NAME(MEMBER)===> Enter name of your input data sets (SDSNLOAD, SDSNMACS, SDSNSAMP, SDSNCLST): 4 PREFIX ===> DSN61 5 SUFFIX ===> Enter to set or save panel values (by reading or writing the named members): 6 7 INPUT MEMBER NAME OUTPUT MEMBER NAME ===> DSNTIDXA ===> Enter to read old panel values Enter to write new panel values
PRESS:
ENTER to continue
RETURN to exit
1. INSTALL TYPE
Acceptable values: Default: DSNZPxxx: Install, Update, Migrate INSTALL none
Choose whether you are installing, updating, or migrating. Use Install to install DB2 for the first time. This is the default for the first run of the CLIST. Use Update to update parameters for an existing DB2 subsystem. Use Migrate to migrate from Version 5 to DB2 for OS/390 Version 6. You are required to fill in field 3 (DATA SET NAME(MEMBER)) when you are migrating. If you are updating or migrating, you use the same set of panels you use for installation. Each panel displays all fields; however, the fields that cannot be changed in update or migrate mode are protected. This way, you can see the values related to ones that you wish to change.
Chapter 2-5. Installing, migrating, and updating system parameters
103
You can also choose either INSTALL or UPDATE to recheck values you chose before. | | | | Certain fields cannot be changed during a migration. See Figure 12 on page 116, Figure 18 on page 143, Figure 19 on page 148, and Figure 30 on page 199 for more information. Be sure those fields are correct in the data set member you provide. 2. DATA SHARING
Acceptable values: Default: DSNZPxxx: Yes, No, or blank for Update No DSN6GRP DSHARE
Specify whether you want to use the data sharing function. Choose NO if you are not using data sharing. If you choose YES, you will continue to panel DSNTIPK after completing panel DSNTIPA2. If you specify YES during installation, this window appears: .-------------------------------. | DSNTIPP1 | | | | DATA SHARING FUNCTION: | | | | Select one. | | _ 1. Group | | 2. Member | | 3. Enable | | | | PRESS: ENTER to continue | | RETURN to exit | | | | | | | '-------------------------------'
Figure 8. DSNTIPP1
Specify a data sharing function. A value is required. After entering a value, you proceed to panels DSNTIPA2 and DSNTIPK. See DB2 Data Sharing: Planning and Administration for more information about the Group, Member, and Enable functions. If you specify Yes during migration, a window displays asking if the current member is the first to migrate.
104
Installation Guide
.-------------------------------------. | DSNTIPP2 | | | | FIRST MEMBER OF GROUP TO MIGRATE? | | | | Select one. | | _ 1. Yes | | 2. No | | | | PRESS: ENTER to continue | | RETURN to exit | | | | | '-------------------------------------'
Figure 9. DSNTIPP2
Specify Yes if this is the first member of a data sharing group to migrate. A value is required. After entering a value, you proceed to panels DSNTIPA2 and DSNTIPK. 3. DATA SET NAME(MEMBER)
Acceptable values: Default: DSNZPxxx: 1-44 alphanumeric characters NULL none
Specify the name of the input data set to use for migrating from DB2 for OS/390 Version 5. The member named contains the output parameters produced when you last installed, updated, or migrated DB2. Give the fully qualified data set name in the form: any.data.set.name(member) This is an example of an actual data set name: DSN51 .SDSNSAMP(DSNTIDXA) If you no longer have this data set member, or the one you have is incorrect, use the installation or update process from your previous release to re-create or correct the member. Enter the correct values on the panels, and save them under a new output member name. Discard the JCL created by this process; use the newly created member for migration. If you are installing or updating, the field must remain blank. Valid Data Set Name: There are two forms of a valid data set name: Unqualified Name: 1 to 8 alphanumeric or national characters, a hyphen, or the character X'C0'. The first character must be alphabetic or national. Do not use hyphens in data set names for RACF-protected data sets. For example, ALPHA is an unqualified data set name.
Chapter 2-5. Installing, migrating, and updating system parameters
105
Qualified Name: Multiple names joined by periods. Each name is coded like an unqualified name. Therefore, the name must contain a period every eight characters or less. For example, ALPHA.PGM is a qualified data set name. The maximum length of a qualified data set name is: 44 characters if you use the TSO PROFILE setting NOPREFIX. 42 characters if you use the TSO PROFILE setting PREFIX. For an output tape data set, 17 characters, including periods. If the name is longer than 17 characters, only the rightmost 17 characters are written to the tape header label. 4. PREFIX
Acceptable values: Default: DSNZPxxx: 1-18 characters DSN610 none
Specify the input prefix for the SDSNLOAD, SDSNMACS, SDSNSAMP, SDSNDBRM and SDSNCLST libraries. The prefix must be the same as the name you specified for the symbolic parameter TARGPRE in SMP/E job DSNTIJAE. This is also the prefix for several partitioned data sets which are deleted if they exist, and are created during the tailoring session. If you use the default DSNTIDXA in field 6 (INPUT MEMBER NAME), the prefix for fields 1, 2, 3, and the prefix and suffix for fields 4 through 11 on installation panel DSNTIPT on page 120 are set. If all these data sets do not have the same prefix and suffix, you can change them on installation panel DSNTIPT. 5. SUFFIX
Acceptable values: Default: DSNZPxxx: 0-17 characters NULL none
Specify a suffix to the names listed below. The fully qualified data set name cannot exceed 44 characters. Names exceeding eight characters must be in groups of no more than eight characters, separated by periods. Use a suffix only if you have added a common suffix to the following libraries when you created them in job DSNTIJAE:
prefix.ADSNLOAD prefix.SDSNLOAD prefix.SDSNCLST prefix.SDXRRESL prefix.SDSNLINK prefix.SDSNEXIT prefix.SDSNSAMP prefix.SDSNMACS prefix.ADSNMACS prefix.SDSNDBRM
If you did not add a common suffix to these libraries, be sure to enter their correct data set names on panel DSNTIPT. To use the default DB2 data set names, use DSN610 in field 4, and leave field 5 blank. 6. INPUT MEMBER NAME
Acceptable values: Default: DSNZPxxx: 1-8 characters DSNTIDXA none
106
Installation Guide
Specify the input member name of the data set that contains the default parameter values for installing and migrating, as in prefix.SDSNSAMP.suffix. To install DB2 for the first time, use the IBM-supplied defaults in member DSNTIDXA. If you process the panels several times within a single run of the CLIST, all the previous values entered, except edited output data sets, will remain the same. For migration, give two member names for input values: one in the INPUT MEMBER NAME field, and one in the DATA SET NAME(MEMBER) (field 3). The INPUT MEMBER NAME must specify a member that contains the default parameter values for the new release (usually DSNTIDXA) and is applied first to establish the CLIST parameters. However, if you are migrating a second or subsequent data sharing member to Version 6 then the INPUT MEMBER NAME is the OUTPUT MEMBER NAME used when migrating the first member of the data sharing group to Version 6. The DATA SET NAME(MEMBER) field must specify a member containing the DB2 for OS/390 Version 5 values at your site. This member is applied last and overrides the CLIST values established by the member specified in field 6. To install DB2 using parameters from a previous run as defaults, you must supply the member that contains the output from the previous run. It was the OUTPUT MEMBER NAME (field 7) last time. The following data set names are generated with the prefix and suffix values from fields 4 and 5 only when the input member name for field 6 is DSNTIDXA.
Table 31. Resulting data set names when using prefix and suffix parameters Default Library Name prefix.DBRMLIB.DATA prefix.RUNLIB.LOAD prefix.SRCLIB.DATA prefix.SDSNDBRM prefix.SDSNLINK prefix.SDSNLOAD prefix.SDSNMACS prefix.ADSNLOAD prefix.ADSNMACS prefix.SDSNSAMP prefix.SDSNCLST prefix.SDSNIVPD prefix.SDSNC.H prefix.SDXRRESL. CLIST Edited Library Name prefix.DBRMLIB.DATA.suffix prefix.RUNLIB.LOAD.suffix prefix.SRCLIB.DATA.suffix prefix.SDSNDBRM.suffix prefix.SDSNLINK.suffix prefix.SDSNLOAD.suffix prefix.SDSNMACS.suffix prefix.ADSNLOAD.suffix prefix.SDSNMACS.suffix prefix.SDSNSAMP.suffix prefix.SDSNCLST.suffix prefix.SDSNIVPD.suffix prefix.SDSNC.H prefix.SDXRRESL.suffix
| |
Specify the member name of the output data set in which to save the values you enter on the panels. If you give no name, the values are lost when you leave the installation CLIST. This member is stored in prefix.SDSNSAMP (not the one created by the DSNTINST CLIST). To avoid replacing any members of prefix.SDSNSAMP that were shipped with the product, specify DSNTIDxx as the value of OUTPUT MEMBER NAME, where xx is any alphanumeric value except XA or VB.
107
Always give a new value in the OUTPUT MEMBER NAME field for a new panel session. You supply the name from your current session in the INPUT MEMBER NAME field for your next session. You should not use the same member name for output as for input. You could find it convenient to write down the output member name entered here for reference during future sessions.
108
Installation Guide
DSNTIPA2 ===> _
Check parameters and reenter to change: 1 2 3 4 5 6 7 8 9 1 11 CATALOG ALIAS DEFINE VOLUME VOLUME VOLUME CATALOG SERIAL 1 SERIAL 2 SERIAL 3 ===> DSNCAT ===> ===> ===> ===> YES DSNV 1 DSNV 1 DSNV 2 Alias of VSAM catalog for DB2 subsystem data sets YES or NO CLIST allocation Non-VSAM data VSAM catalog, default, and work file database Directory, catalog data Directory, catalog indexes Log copy 1, BSDS 2 Log copy 2, BSDS 1 Device type for MVS catalog and partitioned data sets Device type for temporary data sets HELP for more information
VOLUME SERIAL 4 VOLUME SERIAL 5 VOLUME SERIAL 6 VOLUME SERIAL 7 PERMANENT UNIT NAME
PRESS:
ENTER to continue
RETURN to exit
1. CATALOG ALIAS
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters DSNCAT see Section 2 (Volume 1) of DB2 Administration Guide DSN6SPRM CATALOG
Specify the alias of the VSAM integrated catalog facility user catalog or the name of the VSAM integrated catalog facility master catalog in which to catalog the DB2 VSAM data sets created during installation. VSAM data set cataloging options: The installation jobs catalog the DB2 VSAM data sets. This includes recovery log, subsystem, and user data sets. You must create the catalog that defines these data sets through the VSAM integrated catalog facility. Recommendation: Use an integrated catalog facility user catalog to catalog all DB2 objects because you can use aliases for user catalogs. When you use the CREATE STOGROUP statement, you might need to use an alias for the VCAT option, which must be a single-level 1 to 8 character name. You can use a master catalog, but only if the name of the master catalog is a single-level name of 1 to 8 characters.
109
Be sure that your alias conforms to your local naming conventions. To change this parameter for a previously installed DB2 subsystem, see Section 2 (Volume 1) of DB2 Administration Guide. It is best to use the same integrated catalog facility catalog alias for DB2 for OS/390 Version 6 that you used for Version 5 because Version 6 uses many of your Version 5 data sets that are already cataloged. Whether you are installing or migrating, DB2 does not require you to catalog all DB2 VSAM data sets in the same integrated catalog facility catalog. We call the catalog that you create when installing, the primary integrated catalog facility catalog. You must catalog some data sets in the primary catalog. You can catalog other data sets elsewhere, and some data sets need not be cataloged at all. See Table 32 for a list of available options.
Table 32. DB2 data sets integrated catalog facility catalog options DB2 Data Sets DB2 directory (DSNDB01) (VSAM) DB2 catalog (DSNDB06) (VSAM) Default database (DSNDB04) (VSAM) Work file database (VSAM) Active logs (VSAM) Bootstrap data set (VSAM) Options You must catalog these data sets in the primary integrated catalog facility catalog.
You can catalog these in a different integrated catalog facility catalog and give them a prefix different from those in the primary catalog. If the archive log data set is allocated on DASD, then the data set must be cataloged. If the archive log data set is allocated on a tape device, you have the option to catalog the data set. You need not put these in the primary catalog. You can put different user spaces in different integrated catalog facility catalogs.
You must provide any catalog connections for log and bootstrap data sets that you do not catalog on the primary DB2 integrated catalog facility catalog. We suggest that you add an alias for the proper catalog. Although you can catalog the two DB2 subsystems on the same integrated catalog facility catalog, they must not share the same integrated catalog facility catalog alias, because this is the only parameter that makes the data set names unique. Data Set Naming Conventions: The value you specify as the MVS catalog alias is also used as the high-level qualifier for DB2 VSAM data sets. The data sets for the DB2 directory and catalog databases, the default database, and the temporary database are all VSAM linear data sets (LDSs). Their data set names have the following format:
dddddddd.DSNDBn.bbbbbbbb.xxxxxxxx.I0001.Accc where: dddddddd Is the high-level qualifier, the value you supply for this field.
110
Installation Guide
DSNDBn bbbbbbbb
Is a constant identifying this as a DB2 data set; n is C for a cluster name or D for a data component name. Is the database name. The system database names are: DSNDB01 DSNDB04 DSNDB06 DSNDB07 The The The The DB2 directory database default database DB2 catalog database work file database
xxxxxxxx I0001.Accc
Is the name of the individual table space or index space. Identifies the data set. ccc is the partition number of a partitioned table space or index space, or the relative data set number of a simple or segmented table space or index space.
For example, if the catalog alias is DSNCAT, one of the DB2 directory data sets is named: DSNCAT.DSNDBD.DSNDB 1.DBD 1.I 1.A 1
Similarly, one of the DB2 catalog data sets is named: DSNCAT.DSNDBD.DSNDB 6.SYSDBASE.I 2. DEFINE CATALOG
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES see Section 2 (Volume 1) of DB2 Administration Guide none
1.A
Specify whether you want to create a new integrated catalog facility catalog. YES builds a new integrated catalog facility catalog using the alias you gave in field 1. NO signals that the catalog named by field 1 already exists; the CLIST does not create a new one. If you specify YES, DB2 creates a user catalog and an alias for that catalog. DB2 creates the high-level qualifier of the catalog name by adding a number to the end of the alias you defined in field 1. If the alias has less than eight characters, DB2 appends a 1 to the end. For example, if you accepted the default of DSNCAT for field 1, the catalog created is named DSNCAT1.USER.CATALOG. If the alias has eight characters, DB2 changes the last character into a 1. If the last character is already a 1, DB2 changes the 1 into a 2. 3-9. VOLUME SERIAL 1 VOLUME SERIAL 7
Acceptable values: Default: Update: DSNZPxxx: any valid MVS volume serial name DSNV01DSNV02 see Update on page 246 none
Specify the volume serial numbers for the data sets defined by installation or migration. You cannot use an asterisk (*) as a pattern-matching character in this fieldyou must use a volume serial number. Specifying more than one volume for VOLUME SERIAL 1 through VOLUME SERIAL 7 helps recovery and performance. A series of messages are produced that estimate space distribution on the volumes specified. If you specify fewer than
Chapter 2-5. Installing, migrating, and updating system parameters
111
six volumes, data is combined on them. If you specify six volumes, data is distributed as follows: Field (VOLUME SERIAL 1) (Field 3 on Panel DSNTIPA2) Is used for ... CLIST allocation. Only this volume is required for the tailoring session. VOLUME SERIAL 1 through VOLUME SERIAL 7 are not required until you begin running the tailored jobs. The default is DSNV01. This volume is used for prefix.NEW.SDSNTEMP and prefix.NEW.SDSNSAMP. Non-VSAM data. It is used for prefix.DBRMLIB.DATA, prefix.RUNLIB.LOAD, and prefix.SRCLIB.DATA. The default is DSNV01. The temporary data sets, the default and sample storage group, and the VSAM catalog (if a new one is created). The default is DSNV02. DB2 catalog and directory. If you leave this field blank, it is set to the value you gave for field 4. DB2 catalog indexes and directory indexes. If you leave this field blank, it is set to the value you gave for field 5. The first copy of the active log and the second copy of the bootstrap data set (BSDS). If you leave this field blank, it is set to the value you gave for field 6. The second copy of the active log and the first copy of the BSDS. If you leave this field blank, it is set to the value you gave for field 7 on this panel.
If you accept the default for dual active logging, give different volume serials for field 8 and field 9. That places the active logs on different DASD devices. During migration you can change volume serial 1, but you cannot change volume serials 2-7. 10. PERMANENT UNIT NAME
Acceptable values: Default: Update: DSNZPxxx: valid device type or unit name 3390 see Update on page 246 none
112
Installation Guide
Specify the device type or unit name that will be used to allocate the following data sets: Integrated catalog facility catalog prefix.DBRMLIB.DATA.suffix prefix.RUNLIB.LOAD.suffix prefix.SRCLIB.DATA.suffix The two data sets generated by the DSNTINST CLIST prefix.NEW.SDSNTEMP prefix.NEW.SDSNSAMP The value identifies a direct access unit name for partitioned data sets and the integrated catalog facility catalog. If you want to use different device types for different data sets, edit the installation or migration jobs after you complete the tailoring session. Some common device types are 3380, 3390, and 9340. The value is sometimes used during IVP processing to place output (from COPY TABLESPACE, for example) on the device type specified here. A change to this parameter during migration does not affect the integrated catalog facility catalog, DB2 catalog, directory, or logs. The new value is used for data sets created during migration. 11. TEMPORARY UNIT NAME
Acceptable values: Default: Update: DSNZPxxx: valid device type or unit name SYSDA see Update on page 246 none
Specify the device type or unit name for allocating temporary data sets. It is the direct access or disk unit name used for the precompiler, compiler, assembler, sort, linkage editor, and utility work files in the tailored jobs and CLISTs.
113
DSNTIPK ===> _
Check parameters and reenter to change: 1 2 3 4 5 6 GROUP NAME MEMBER NAME WORK FILE DB GROUP ATTACH COORDINATOR ASSISTANT ===> ===> ===> ===> ===> DSNCAT DSN1 DSN1 NO Name of the DB2 group Name of DB2 member in group Work file database name for this member Group attach name for TSO, batch, utilities NO or YES. Allow this member to coordinate parallel processing on other members. NO or YES. Allow this member to assist with parallel processing.
===> NO
PRESS:
ENTER to continue
RETURN to exit
1. GROUP NAME
Acceptable values: Default: DSNZPxxx: 1-8 characters made up of A-Z, 0-9, $, #, @ DSNCAT DSN6GRP GRPNAME
Specify the name of a new or existing DB2 data sharing group. The group name encompasses the entire data sharing group and forms the basis for the coupling facility structure names. To avoid names that IBM uses for its MVS cross-system coupling facility (XCF) groups, the first character must be an upper-case letter J-Z unless the name begins with DSN. Do not use SYS as the first three characters, and do not use UNDESIG as the group name. 2. MEMBER NAME
Acceptable values: Default: DSNZPxxx: 1-8 characters DSN1 DSN6GRP MEMBNAME
Specify the name of a new or existing DB2 data sharing member. Recommendation: Use the MVS subsystem name. DB2 uses this name as its
114
Installation Guide
XCF member name. An example of a member name is DB1G. The member name can consist of the characters A-Z, 0-9, $, #, and @. 3. WORK FILE DB
Acceptable values: Default: DSNZPxxx: 1-8 characters DSN1 none
Specify the name of the work file database for the DB2 member. Each DB2 member has its own work file database (called DSNDB07 in a non-data-sharing environment). One member of the data sharing group can have the name DSNDB07, but the recommendation is that you use a more meaningful name, such as WRKDSN1. You cannot specify a name that begins with DSNDB unless the name is DSNDB07. 4. GROUP ATTACH
Acceptable values: Default: DSNZPxxx: 1-4 characters none none
Specify a generic group attachment name for batch programs, the call attachment facility (CAF), and utilities. An example of a group attachment name is DB0G. See DB2 Data Sharing: Planning and Administration for information about using the group attachment name. 5. COORDINATOR
Acceptable values: Default: DSNZPxxx: YES, NO NO DSN6GRP COORDNTR
Specify whether this DB2 member can coordinate parallel processing on other members of the group. If you specify NO, then a query can be processed by this DB2 member only. If you specify YES, then a read-only query running on this DB2 member can be processed in part on other members of the group. 6. ASSISTANT
Acceptable values: Default: DSNZPxxx: YES, NO NO DSN6GRP ASSIST
Specify whether this DB2 member can assist a parallelism coordinator with parallel processing. If you specify NO, this member is not considered as an assistant at either bind time or run time. If you specify YES, this member is considered at both bind time and run time. To qualify as an assistant at run time, the VPPSEQT and VPXPSEQT buffer pool thresholds of this member must each be greater than zero.
115
DSNTIPH INSTALL DB2 - SYSTEM RESOURCE DATA SET NAMES ===> DSNT443I Values marked with an asterisk have been updated Enter data below: Bootstrap Data Sets (BSDS): 1 COPY 1 NAME 2 COPY 2 NAME Active Logs: 3 NUMBER OF COPIES 4 COPY 1 PREFIX 5 COPY 2 PREFIX Archive Logs: 6 NUMBER OF COPIES 7 COPY 1 PREFIX 8 COPY 2 PREFIX 9 TIMESTAMP ARCHIVES ===> DSNCAT.BSDS 1 ===> DSNCAT.BSDS 2 ===> 2 2 or 1. ===> DSNCAT.LOGCOPY1 ===> DSNCAT.LOGCOPY2 ===> ===> ===> ===> Number of active log copies
2 2 or 1. Number of archive log copies DSNCAT.ARCHLOG1 DSNCAT.ARCHLOG2 NO NO, YES or EXT (Extended date format)
PRESS:
ENTER to continue
RETURN to exit
116
Installation Guide
1. COPY 1 NAME
Acceptable values: Default: Update: DSNZPxxx: valid data set name; 1-33 characters DSNCAT.BSDS01 or DSNCAT.DSN1.BSDS01 see Update on page 246; not during migration none
Specify the fully qualified name of the first copy of the bootstrap data set. For non-data-sharing environments, the default prefix is DSNCAT.BSDSxx. For data sharing environments, the default prefix is DSNCAT.DSN1.BSDSxx. The resulting data set name is DSNCAT.BSDSxx.Annnnnnn or DSNCAT.DSN1.BSDSx.Annnnnnn where: DSNCAT is the value you specified for CATALOG ALIAS (field 1 on installation panel DSNTIPA2). You can change this portion of the data set prefix on this panel. If you change it, then another catalog alias is needed. This additional catalog alias will not be automatically defined by the installation process. DSN1 is the value you specified for MEMBER NAME on panel DSNTIPK. xx is 01 for the first copy of the logs and 02 for the second copy. Annnnnnn is generated internally. For the definition of a valid data set name, see page 105. 2. COPY 2 NAME
Acceptable values: Default: Update: DSNZPxxx: valid data set name; 1-33 characters DSNCAT.BSDS02 or DSNCAT.DSN1.BSDS02 see Update on page 246; not during migration none
Specify the fully qualified name of the second copy of the bootstrap data set. For the definition of a valid data set name, see page 105. 3. NUMBER OF COPIES
Acceptable values: Default: Update: DSNZPxxx: 1-2 2 see Update on page 246; not during migration DSN6LOGP TWOACTV
Specify the number of copies of the active log to be maintained: 2 (dual logging) or 1 (single logging). Dual logging increases reliability of recovery. If your DB2 subsystem creates copies of the archive log on tape, two tape drives must be available during the off-load process. 4. COPY 1 PREFIX
Acceptable values: Default: Update: DSNZPxxx: valid data set name prefix; 1-30 characters DSNCAT.LOGCOPY1 or DSNCAT.DSN1.LOGCOPY1 see Update on page 246; not during migration none
Specify the prefix for the first copy of the active log data sets. For non-data-sharing environments, the default prefix is DSNCAT.LOGCOPYx. For data sharing environments, the default prefix is DSNCAT.DSN1.LOGCOPYx. The resulting data
117
set name is DSNCAT.LOGCOPYx.Annnnnnn or DSNCAT.DSN1.LOGCOPYx.Annnnnnn where: DSNCAT is the value you specified for CATALOG ALIAS (field 1 on installation panel DSNTIPA2). You can change this portion of the data set prefix on this panel. If you change it, then another catalog alias is needed. This additional catalog alias will not be automatically defined by the installation process. DSN1 is the value you specified for MEMBER NAME on panel DSNTIPK. LOGCOPY is part of the data set prefix that you can change on this panel. x is 1 for the first copy of the logs and 2 for the second copy. nn is the data set number. For information on valid data set names, see page 105. 5. COPY 2 PREFIX
Acceptable values: Default: Update: DSNZPxxx: valid data set name prefix; 1-30 characters DSNCAT.LOGCOPY2 or DSNCAT.DSN1.LOGCOPY2 see Update on page 246; not during migration none
Specify the prefix for the second copy of the active log data sets. See the description in field 4. If you are using single logging, accept the default value. Do not leave the entry blank. 6. NUMBER OF COPIES
Acceptable values: Default: Update: DSNZPxxx: 1-2 2 option 3 on panel DSNTIPB DSN6LOGP TWOARCH
Specify the number of copies of the archive log to be produced during off-loading: 2 (dual logging) or 1 (single logging). Dual logging increases reliability of recovery. 7. COPY 1 PREFIX
Acceptable values: Default: Update: DSNZPxxx: valid data set name prefix; 1-35 characters DSNCAT.ARCHLOG1 or DSNCAT.DSN1.ARCLG1 option 3 on panel DSNTIPB DSN6ARVP ARCPFX1
Specify the prefixes of the first and second copies of archive log data sets. For definitions of valid data set names, see page 105. 8. COPY 2 PREFIX
Acceptable values: Default: Update: DSNZPxxx: valid data set name prefix; 1-35 characters DSNCAT.ARCHLOG2 or DSNCAT.DSN1.ARCLG2 option 3 on panel DSNTIPB DSN6ARVP ARCPFX2
See the description of field 7. If you are using single logging, accept the default value. Do not leave the entry blank.
118
Installation Guide
9. TIMESTAMP ARCHIVES |
Acceptable values: Default: Update: DSNZPxxx: NO, YES, EXT NO option 3 on panel DSNTIPB DSN6ARVP TSTAMP
Specify whether or not the date and time of creation of the DB2 archive log data set is placed in the archive log data set name. | If you specify NO, the archive data set name should not contain a timestamp. If you specify YES, the maximum allowable length of the user-controlled portion of the archive log prefix is reduced from 35 characters to 19 characters. This reduction in size permits the 16-character date and time qualifiers (timestamp) to be added to the archive log data set prefix. The timestamp format is as follows: .Dyyddd.Thhmmsst, where: D yy ddd T hh mm ss t | | | | | | is the letter D are the last two digits of the year is the day of the year is the letter T is the hour are the minutes are the seconds are tenths of a second
If you specify EXT, the archive data set name should contain a timestamp with an extended date component in the format: .Dyyyyddd. A value of EXT in this field causes the lengths of the values entered for field COPY 1 PREFIX and field COPY 2 PREFIX to be audited to ensure that neither exceeds 17 bytes (19 bytes for other settings of TIMESTAMP ARCHIVES).
119
The following warning message is displayed for any output data set that already exists: DSNT434I WARNING, DATA SETS MARKED WITH ASTERISKS EXIST AND WILL BE OVERWRITTEN In order to avoid deleting these data sets, do one of the following: Press RETURN to leave the installation process. Change the data set names. Press ENTER again if you want to continue; this overwrites your data sets. When you are in update mode, this panel is displayed immediately after panel DSNTIPA1. This allows you to check the SDSNSAMP data set name to see if it is the one you want to use for the DSNTIJUZ job. Data sets are not deleted or reallocated if you use the same name. Instead, the data set is compressed, and only the DSNTIJUZ member is replaced within the data set. Other members in the data set are left unchanged.
120
Installation Guide
DSNTIPT ===> _
| |
Data sets allocated by the installation CLIST for edited output: 1 TEMP CLIST LIBRARY ===> prefix.NEW.SDSNTEMP 2 SAMPLE LIBRARY ===> prefix.NEW.SDSNSAMP Data sets allocated by the installation jobs: 3 CLIST LIBRARY ===> prefix.NEW.SDSNCLST 4 APPLICATION DBRM ===> prefix.DBRMLIB.DATA.suffix 5 APPLICATION LOAD ===> prefix.RUNLIB.LOAD.suffix 6 DECLARATION LIBRARY===> prefix.SRCLIB.DATA.suffix Data sets allocated by SMP/E and other methods: 7 LINK LIST LIBRARY ===> prefix.SDSNLINK.suffix 8 LOAD LIBRARY ===> prefix.SDSNLOAD.suffix 9 MACRO LIBRARY ===> prefix.SDSNMACS.suffix 1 LOAD DISTRIBUTION ===> prefix.ADSNLOAD.suffix 11 EXIT LIBRARY ===> prefix.SDSNEXIT.suffix 12 DBRM LIBRARY ===> prefix.SDSNDBRM.suffix 13 IRLM LOAD LIBRARY ===> prefix.SDXRRESL.suffix 14 IVP DATA LIBRARY ===> prefix.SDSNIVPD.suffix 15 INCLUDE LIBRARY ===> prefix.SDSNC.H PRESS: ENTER to continue RETURN to exit HELP for more information
Fields 1 and 2 are data sets allocated by the installation CLIST for edited output. Field 3 is allocated by DSNTIJVC. If the input member is DSNTIDXA (field 6 on installation panel DSNTIPA1 on page 103), the three data sets default to prefix.NEW.SDSNTEMP, prefix.NEW.SDSNCLST, and prefix.NEW.SDSNSAMP respectively, where prefix is the value entered for field 4 on installation panel DSNTIPA1.
Table 34. Job tailoring fields Mode Installing Migrating Updating Tailored output All three fields entered All three fields entered SAMPLE LIBRARY entered No tailored output All three fields blank All three fields blank SAMPLE LIBRARY blank
These fields are blanked after a successful tailoring session to avoid writing over the tailored output. 1. TEMP CLIST LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.NEW.SDSNTEMP cannot change during update none
Specify the data set name where edited CLISTs are placed. This field must not be blank if tailoring is wanted.
121
2. SAMPLE LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.NEW.SDSNSAMP option 4 on panel DSNTIPB none
Specify the name of the edited JCL library. In Update mode, the new sample library data set is not reallocated. It is compressed and member DSNTIJUZ is overwritten. This field must not be blank if tailoring is wanted. 3. CLIST LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.NEW.SDSNCLST cannot change during update none
Specify the data set name that job DSNTIJVC loads all CLISTs into. This field must not be blank if tailoring is wanted. Fields 4, 5, and 6 are for DB2 provided sample applications. The names of your own development libraries most likely are different from the defaults shown here. Job DSNTIJMV references another set of DBRMLIB, RUNLIB, and SRCLIB data sets for SYS1.PROCLIB. See Installation step 1: Define DB2 to MVS: DSNTIJMV on page 251 for more information. These fields must not be blank. 4. APPLICATION DBRM
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.DBRMLIB.DATA.suffix cannot change during update none
Specify the name of the library for DB2 sample application DBRMs. 5. APPLICATION LOAD
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.RUNLIB.LOAD.suffix cannot change during update none
Specify the name of the DB2 sample application load module library. 6. DECLARATION LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SRCLIB.DATA.suffix cannot change during update none
Specify the name of the DB2 declaration library for sample application include files. Fields 7 through 13 specify the names of data sets allocated during SMP processing. These fields must not be blank.
122
Installation Guide
Specify the name of the APF-authorized DB2 early code library. 8. LOAD LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SDSNLOAD.suffix cannot change during update none
Specify the name of the main APF-authorized DB2 load module library. 9. MACRO LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SDSNMACS.suffix cannot change during update none
Specify the name of the library that contains the CICS and IMS attachment facility macros, the initialization parameter macros, and some data mapping macros needed for some applications. 10. LOAD DISTRIBUTION
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.ADSNLOAD.suffix cannot change during update none
Specify the name of the distribution load module library. 11. EXIT LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SDSNEXIT.suffix cannot change during update none
Specify the name of the library where your DSNZPxxx module, DSNHDECP module, and exit routines are placed. When prefix.SDSNLOAD and prefix.SDSNEXIT are used together, list prefix.SDSNEXIT first to override the IBM defaults in prefix.SDSNLOAD. 12. DBRM LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SDSNDBRM.suffix cannot change during update none
Specify the name of the library where the DBRMs shipped with DB2 are placed.
Chapter 2-5. Installing, migrating, and updating system parameters
123
Specify the name of the IRLM load library data set to use in the IRLM procedure. | | | | | | | | | | | | | | | 14. IVP DATA LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SDSNIVPD.suffix cannot change during update none
The IVP DATA LIBRARY indicates the data set name of SDSNIVPD which is the SMP/E target library for the DB2 installation verification procedure (IVP) input data and the expected output from the sample applications. 15. INCLUDE LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 prefix.SDSNC.H cannot change during update none
Specify the name of the Include library data set. This libary is used in the DB2 language PROCS for C and C++.
124
Installation Guide
DSNTEJ1L DSNTEJ1P DSNTEJ2A DSNTEJ2C DSNTEJ2D DSNTEJ2E DSNTEJ2F DSNTEJ2P DSNTEJ3C DSNTEJ3P DSNTEJ4C DSNTEJ4P
DSNTEJ5A
DSNTEJ5C
DSNTEJ5P
CICS410.SDFHLOAD CICS410.SDFHPLI CEE.SCEELKED SYS1.SIBMBASE CEE.SCEERUN CEE.SCEERUN CEE.SCEERUN CEE.SCEERUN CEE.SCEERUN CEE.SCEERUN CEE.SCEERUN CEE.SCEERUN
125
| Table 35 (Page 2 of 2). Data set names used in jobs for products | # | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Job DSNTEJ65 DSNTEJ75 DSNTIJMV 1 Data Set Name CEE.SCEERUN GDDM.SADMSAM GDDM.SADMMOD SYS1.MACLIB CBC.SCBCCMP EDCDC120 EDC.SEDCDMSG(EDCMSGE) CEE.SCEERUN(EDCPRLK) CEE.SCEELKED CEE.SCEEMSGP(EDCPMSGE) CEE.SCEECPP CBC.V3R1M1.SCBC3CPP CBC.SCLBCPP CEE.SCEERUN CBC.SCLBH.HPP CEE.SCEEH.H CEE.SCEEMSGP CICS410.SDFHCOB SYS1.COB2CICS CICS410.SDFHLOAD prefix.SDSNLOAD(DSNHPC) prefix.SDSNLOAD SYS1.COBLIB IKFCBL00 SYS1.COB2COMP SYS1.COB2LIB IGY.V1R2M0.SIGYCOMP(IGYCRCTL) CEE.SCEELKED CEE.SCEEMSGP CEE.SCEERUN SOMMVS.V1R1M0.SGOSPLKD IMSVS.RESLIB ISP.SISPLOAD IEL0AA CEE.SCEERUN SYS1.SIBMLINK CEE.SCEELKED SYS1.SIBMBASE IEL.SIELCOMP(IEL1AA) Function Language Environment dynamic runtime library GDDM macro library GDDM load module library Assembler macro library C compiler library C compiler load module C compiler message file C compiler prelink load module Language Environment linkage editor library C prelink message file C++ autolink library C++ compiler messages C++ class library Language Environment dynamic runtime library C++ library headers C++ C library headers Language Environment prelink editor messages CICS library for OS/VS COBOL CICS COBOL II library CICS command translator and linkage editor DB2 precompiler DB2 linkage editor library OS/VS COBOL linkage editor library OS/VS COBOL compiler load module COBOL II compiler load module COBOL II linkage editor library IBM COBOL for MVS & VM (V1R2) compiler load module Language Environment linkage editor library Language Environment prelink editor messages Language Environment runtime library SOMobjects for MVS library IMS linkage editor library ISPF ISPLINK module PL/I compiler load module PL/I dynamic runtime base library PL/I dynamic runtime common library PL/I linkage editor base library PL/I linkage editor common library PL/I for MVS & VM
When the compiler fields are left blank, the DSNH CLIST and the provided JCL procedures operate differently. The DSNH CLIST issues a specific call statement, using the default load module data set name as the argument of the call. The JCL procedures use the MVS link list to find the data set in which the load module resides. | | | | | | | | | | | Use this panel to define the data set names of your C or C/C++ program product libraries. The fields can be used to define AD/Cycle C/370 V3R2 (C only) or C/C++ for MVS/ESA V3R1, C/C++ for MVS/ESA V3R2, or C/C++ for OS/390. Even though C and C++ share libraries in some versions of the products, DB2 requires that you define the data set names separately, depending on your need for C or C++. For more information about these libraries, consult the C or C++ program product documentation. Data sets specified on this panel are used by the DB2 installation process to tailor three C/C++ language procedures that are generated by installation job DSNTIJMV: DSNHC can be used to prepare DB2 programs using C DSNHCPP can be used to prepare DB2 programs using C++
126
Installation Guide
| | | | | | | # # | | | | | | | | | | | | | | | | | | | | | | | | | | |
DSNHCPP2 can be used to prepare a class and a client for a DB2 object-oriented program using C++ DSNHCPPS contains the header file search path to be used by DSNHCPP and DSNHCPP2. Data sets specified on this panel are used by the DB2 installation process to tailor the DB2 Interactive (DB2I) program preparation CLIST, DSNH. If C is not installed on your system, accept the default values for fields 1-7 and do not run IVP jobs DSNTEJ2D, DSNTEJ2U, DSNTEJ6D, DSNTEJ6T, DSNTEJ63, DSNTEJ64, DSNTEJ65, DSNTEJ71, DSNTEJ73, and DSNTEJ75. You should remove the DSNHC language proc from job DSNTIJMV. If you are migrating from DB2 for OS/390 Version 5, remove the statement that renames DSNHC from the DSNTIJFV job. If C++ is not installed on your system, accept the default values for fields 8-17 and do not run IVP jobs DSNTEJ2E or DSNTEJ2U.
DSNTIPU ===>
Enter data set names below: 1 C COMPILER ===> 2 C COMPILER MESSAGES ===> 3 C PRE-LINK MESSAGES ===> 4 C LIBRARY HEADERS ===> 5 C LINK EDIT STUBS ===> 6 C DYNAMIC RUNTIME ===> 7 C PROGRAM NAME ===> 8 CPP COMPILER ===> 9 CPP COMPILER MESSAGES ===> 1 CPP PRE-LINK MESSAGES ===> 11 CPP LINK EDIT STUBS ===> 12 CPP DYNAMIC RUNTIME ===> 13 CPP PROGRAM NAME ===> 14 CPP STANDARD HEADERS ===> 15 CPP CLASS LIB HEADERS ===> 16 CPP AUTO CALL LIBRARY ===> 17 CPP CLASS LIBRARY ===> PRESS: ENTER to continue
CBC.SCBCCMP CEE.SCEEMSGP CEE.SCEEH.H CEE.SCEELKED CEE.SCEERUN CBCDRVR CBC.SCBCCMP CEE.SCEEMSGP CEE.SCEELKED CEE.SCEERUN CBCDRVR CEE.SCEEH.H CBC.SCLBH.HPP CEE.SCEECPP CBC.SCLBCPP HELP for more information
RETURN to exit
1. C COMPILER |
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 CBC.SCBCCMP cannot change during update none
Specify the data set name of the C compiler library. | | | | For AD/Cycle C/370 V3R2, the SMP/E target data set name typically includes the qualifier SEDCDCMP. For C/C++ for MVS/ESA, the SMP/E target data set name typically includes the qualifier SCBC3CMP.
127
| | | | |
For C/C++ for OS/390, the SMP/E target data set name typically includes the qualifier SCBCCMP. If you specify a name in this field, a STEPLIB is added to each job provided by DB2 that uses this compiler. This field can be left blank if the compiler library is in the link list. 2. C COMPILER MESSAGES
blank, or valid data set name: see page 105 none cannot change during update none
| | | | |
Specify the data set name of the C compiler message file. For AD/CYCLE C/370 V3R2 and for C/C++ for MVS/ESA V3R1, the SMP/E target data set name typically includes the qualifier SEDCDMSG. For C/C++ for MVS/ESA V3R2 and for C/C++ for OS/390, the compiler messages reside elsewhere and this field should be left blank. 3. C PRE-LINK MESSAGES
blank, or valid data set name: see page 105 CEE.SCEEMSGP cannot change during update none
| | | |
Specify the data set name for message issued by the IBM Language Environment pre-linkage editor (EDCPRLK). The SMP/E target data set name typically includes the qualifier SCEEMSGP. Do not specify this value if you are using the IBM C/370 compiler. 4. C LIBRARY HEADERS
blank, or valid data set name: see page 105 CEE.SCEEH.H cannot change during update none
| | | | | | |
Specify the data set name of the C language standard header files (for #INCLUDEs for facilities such as I/O or math functions). For AD/Cycle C/370 V3R2, the SMP/E target data set name typically includes the qualifier SEDCDHDR For C/C++ for MVS/ESA and for C/C++ for OS/390, these header files reside in the IBM Language Environment standard header file. The SMP/E target data set name typically includes the qualifier SCEEH.H. 5. C LINK EDIT STUBS
blank, or valid data set name: see page 105 CEE.SCEELKED cannot change during update none
128
Installation Guide
| |
Specify the data set name for objects required to link-edit C programs. The SMP/E target data set name typically includes the qualifier SCEELKED. 6. C DYNAMIC RUNTIME
blank, or valid data set name: see page 105 CEE.SCEERUN cannot change during update none
| | |
Specify the data set name of the C runtime library that contains the LE runtime modules. The SMP/E target data set name typically includes the qualifier SCEERUN. 7. C PROGRAM NAME
blank, or valid load module name: see page 105 CBCDRVR cannot change during update none
| | | | | | | | |
Specify the load module name for the compiler for your C program. Valid names are: For AD/Cycle C/370 V3R2, the compiler name is EDCDC120 For C/C++ for MVS/ESA V3R1, the compiler name is CBC310 For C/C++ for MVS/ESA V3R2, the compiler name is CBC320PP For C/C++ for OS/390, the compiler name alias is CBCDRVR The name of the compiler will be used to configure your DSNHC language proc, the DSNH CLIST, and IVP jobs DSNTEJ2D, DSNTEJ2U, DSNTEJ6D, DSNTEJ6T, DSNTEJ71, DSNTEJ73, and DSNTEJ75. 8. CPP COMPILER
blank, or valid data set name: see page 105 CBC.SCBCCMP cannot change during update none
Specify the data set name of the C++ compiler library. | | | | For C/C++ for MVS/ESA, the data set name typically includes the qualifier SCBC3CMP. For C/C++ for OS/390, the data set name typically includes the qualifier SCBCCMP. You can specify C/C++ for MVS/ESA V3R1, or C/C++ for MVS/ESA V3R2. These are shipped as single products, but it is necessary to define them separately on this line and on line 1 depending on your need for C or C++. If you specify a name in this field, a STEPLIB is added to the compile step of the DSNHCPP and DSNHCPP2 procs in job DSNTIJMV, and to the C++ portion of the DSNH CLIST. This field can be left blank if the compiler library is in the link list.
| | | |
129
Specify the data set name for C++ compiler messages file. | | | | For C/C++ for MVS/ESA V3R1, the data set name typically includes the qualifier SEDCDMSG. For C/C++ for MVS/ESA V3R2 and C++ for OS/390, the field should be left blank because the messages reside elsewhere. If you specify a name in this field, a STEPLIB is added to each job provided by DB2 that uses this compiler. If C++ is not installed, skip sample job DSNTEJ2E. If you specify C/C++ for MVS/ESA V3R2 on line 8, you do not need to specify anything on this line. 10. CPP PRE-LINK MESSAGES |
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 CEE.SCEEMSGP cannot change during update none
| |
Specify the data set name for C++ pre-link messages file. The data set name typically includes the qualifier SCEEMSGP. 11. CPP LINK EDIT STUBS
blank, or valid data set name: see page 105 CEE.SCEELKED cannot change during update none
| |
Specify the data set name of the C++ linkage editor library. The data set name typically includes the qualifier SCEELKED. 12. CPP DYNAMIC RUNTIME
blank, or valid data set name: see page 105 CEE.SCEERUN cannot change during update none
| |
Specify the data set name for the C++ runtime library. The data set name typically includes the qualifier SCEERUN. 13. CPP PROGRAM NAME
blank, or valid data set name: see page 105 CBCDRVR cannot change during update none
Specify the C++ program name. The following are valid data set names:
130
Installation Guide
| | | | | |
For C/C++ for MVS/ESA V3R1, the compiler name is CBC310PP For C/C++ for MVS/ESA V3R2, the compiler name is CBC320PP For C/C++ for OS/390, the compiler name alias is CBCDRVR The compiler name will be used in the language procs, DSNHCPP and DSNHCPP2; the DSNHCPPS searchlist member; the DSNH CLIST; and IVP job DSNTEJ2E. 14. CPP STANDARD HEADERS
blank, or valid data set name: see page 105 CEE.SCEEH.H cannot change during update none
| | |
Specify the data set name of the C++ standard header files (for #INCLUDEs of facilities such as I/O and math functions). The data set name typically includes the qualifier SCEEH.H. 15. CPP CLASS LIB HEADERS
blank, or valid data set name: see page 105 CBC.SCLBH.H cannot change during update none
| | | | | |
Specify the data set name of the C++ class library header files (for object-oriented programming). For C/C++ for MVS/ESA, the data set name typically includes the qualifier SCLB3H.H For C/C++ for OS/390, the data set name typically includes the qualifier SCLBH.H 16. CPP AUTO CALL LIBRARY
blank, or valid data set name: see page 105 CEE.SCEECPP cannot change during update none
| |
Specify the data set name of the C++ auto call library or LE pre-linkage editor (EDCPRLK). This data set name typically includes the qualifier SCEECPP. 17. CPP CLASS LIBRARY
blank, or valid data set name: see page 105 CBC.SCLBCPP cannot change during update none
| | | |
Specify the data set name of the C++ class library (for object-oriented programming) required during pre-linkedit processing. For C/C++ for MVS/ESA, the data set name typically includes the qualifier SCLB3CPP
131
| |
For C/C++ for OS/390, the data set name typically includes the qualifier SCLBCPP
132
Installation Guide
DSNTIPQ ===>
| | | |
Enter data set names below: 1 VS COBOL COMPILER 2 VS COBOL LINK EDIT 3 VS COBOL II COMPILER 4 VS COBOL II LINK EDIT 5 IBM COBOL COMPILER 6 IBM COBOL RUNTIME 7 IBM COBOL PRE-LINK MSGS 8 IBM COBOL LINK EDIT 9 SOM DLL IMPORT LIBRARY
PRESS:
ENTER to continue
RETURN to exit
| |
If COBOL is not installed on your system, do not run jobs DSNTEJ2C, DSNTEJ3C, DSNTEJ4C, DSNTEJ5C, or DSNTEJ6. If IBM COBOL is not installed on your system, do not run jobs DSNTEJ61 and DSNTEJ62. 1. VS COBOL COMPILER
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 none cannot change during update none
Specify the data set name of the COBOL compiler library. If you specify a name in this field, a STEPLIB is added to each DB2 job that uses this compiler. The current default for DB2 is IBM COBOL for MVS and VM. If you do not have OS/VS COBOL at your site, remove the DSNHCOB procedure from job DSNTIJMV and the statement that renames the procedure from job DSNTIJFV. See Special considerations for COBOL programs on page 335 for the specific changes. 2. VS COBOL LINK EDIT
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.COBLIB cannot change during update none
133
Specify the data set name of the COBOL linkage library. The current default for DB2 is IBM COBOL for MVS and VM. 3.VS COBOL II COMPILER
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 none cannot change during update none
Specify the data set name of the COBOL II compiler library. If you specify a name in this field, a STEPLIB is added to each DB2 job that uses this compiler. If you have VS COBOL II, you can use the COBOL samples. If you do not have VS COBOL II at your site, remove the DSNHCOB2 procedure from job DSNTIJMV and the statement that renames the procedure from jobs DSNTIJFV and DSNTIJMV. 4. VS COBOL II LINK EDIT
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.V1R4.COB2LIB cannot change during update none
Specify the data set name of the COBOL II linkage editor library. 5. IBM COBOL COMPILER
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 none cannot change during update none
Specify the data set name of the COBOL compiler load module library. 6. IBM COBOL RUNTIME |
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 CEE.SCEERUN cannot change during update none
Specify the data set name of the COBOL runtime library. 7. IBM COBOL PRELINK MSGS |
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 CEE.SCEEMSGP cannot change during update none
134
Installation Guide
Specify the data set name of the COBOL link edit library. | | | | | | | | | | 9. SOM DLL IMPORT LIBRARY
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 SOM.SGOSIMP cannot change during update none
Specify the data set name of the SOM DLL import library. This data set name is valid only with IBM COBOL for OS/390 & VM Version 2 Release 1. To use IBM COBOL for MVS & VM Version 1 Release 2 or IBM COBOL Verion 2 Release 1 for preparing non-object-oriented application programs, blank out the data set name of the SOM DLL import library.
135
DSNTIPG ===>
| | | | | | |
Enter data set names below: 1 ASSEMBLER 2 FORTRAN COMPILER 3 FORTRAN LINK EDIT 4 PL/I COMPILER 5 PL/I LINK EDIT BASE 6 PL/I LINK EDIT COMMON 7 PL/I DYN RUNTIME BASE 8 PL/I DYN RUNTIME COMMON 9 CPP PROCEDURE LIBRARY 1 LE/37 RUNTIME LIBRARY 11 LE/37 LINK EDIT LIB
===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===>
PRESS:
ENTER to continue
RETURN to exit
1. ASSEMBLER
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 none cannot change during update none
Specify the data set name of the assembler load module library. If you specify a value for this field, a STEPLIB is added to each job provided by DB2 that uses the assembler. This field can be left blank if the library is in the link list.
136
Installation Guide
2. FORTRAN COMPILER
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 none cannot change during update none
Specify the data set name of the Fortran compiler invocation load module library. If you specify a name in this field, a STEPLIB is added to each job provided by DB2 that uses this compiler. If VS Fortran is not installed on your system, do not run job DSNTEJ2F. Remove the DSNHFOR procedure from job DSNTIJMV and the statement that renames the procedure from job DSNTIJFV. 3. FORTRAN LINK EDIT
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.VSF2FORT cannot change during update none
Specify the data set name of the Fortran linkage editor library. 4. PL/I COMPILER
Acceptable values: Default: Update: DSNZPxxx: blank, or valid data set name: see page 105 none cannot change during update none
Specify the data set name of the PL/I compiler load module library. If you specify this option, a STEPLIB is added to each job provided by DB2 that uses this compiler. If PL/I is not installed on your system, do not run jobs DSNTEJ1P, DSNTEJ2P, DSNTEJ3P, DSNTEJ4P, DSNTEJ5P, DSNTEJ6P, DSNTEJ6S, or DSNTEJ6U. You can use SPUFI or QMF to provide the listings of the sample tables and dynamic SQL examples that are provided in jobs DSNTEJ1P and DSNTEJ3P. Remove the DSNHPLI procedure from job DSNTIJMV and the statement that renames the procedure from jobs DSNTIJFV and DSNTIJMV. 5. PL/I LINK EDIT BASE |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CEE.SCEELKED cannot change during update none
Specify the data set name of the PL/I linkage editor base library. 6. PL/I LINK EDIT COMMON |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 none cannot change during update none
137
Specify the data set name of the PL/I linkage editor common library. 7. PL/I DYN RUNTIME BASE |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CEE.SCEERUN cannot change during update none
Specify the data set name of the PL/I run-time base library. 8. PL/I DYN RUNTIME COMMON |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 none cannot change during update none
Specify the data set name of the PL/I run-time common library. 9. CPP PROCEDURE LIBRARY |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CBC.SCBCUTL cannot change during update none
Specify the data set name containing procedures to set up and invoke the C++ compiler. 10. LE/370 RUN TIME LIBRARY |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CEE.SCEERUN cannot change during update none
This field is used to tailor the JCL procedure that starts the stored procedures address space. Be aware that if you are using OS/390 Release 3, you must use the Language Environment Version 1 Release 7 data set (CEE.V1R7M0.SCEERUN). | | | | | | | 11. LE/370 LINK EDIT LIB
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CEE.SCEELKED cannot change during update none
This field is used to tailor the sample job DSNTEJ1L which is used to create a DSNTEP2 load module.
138
Installation Guide
DSNTIPW ===>
| | | | | | | |
Enter data set names below: 1 SYSTEM MACLIB ===> 2 SYSTEM PROCEDURES ===> 3 SORT LIBRARY ===> 4 IMS RESLIB ===> 5 ISPF ISPLINK MODULE ===> 6 GDDM MACLIB ===> 7 GDDM LOAD MODULES ===> 8 CICS LOAD LIBRARY ===> 9 CICS MACRO LIBRARY ===> 1 CICS COBOL LIBRARY ===> 11 CICS COBOL II LIBRARY===> 12 CICS PL/I LIBRARY ===>
SYS1.MACLIB SYS1.PROCLIB SYS1.SORTLIB ISP.SISPLOAD GDDM.SADMSAM GDDM.SADMMOD CICS41 .SDFHLOAD CICS41 .SDFHMAC CICS41 .SDFHCOB SYS1.COB2CICS CICS41 .SDFHPL1
PRESS:
ENTER to continue
RETURN to exit
1. SYSTEM MACLIB
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.MACLIB cannot change during update none
Specify the data set name of the assembler macro library. 2. SYSTEM PROCEDURES
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.PROCLIB cannot change during update none
139
3. SORT LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.SORTLIB cannot change during update none
Specify the data set name where the DFSORT load module resides. If you do not have DFSORT, an equivalent product is required. If your load library is not in the link list, you can change the DSNUPROC JCL procedure in job DSNTIJMV. 4. IMS RESLIB
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 none cannot change during update none
Specify the data set name of the IMS linkage editor library. If you do not have IMS, you can skip connecting DB2 to IMS and the Phase 4 sample application jobs DSNTEJ4C and DSNTEJ4P. 5. ISPF ISPLINK MODULE |
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 ISP.SISPLOAD cannot change during update none
Specify the data set name of the ISPF load module library. | | | | | | | | | | | | | | | | | | | 6. GDDM MACLIB
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 GDDM.SADMSAM cannot change during update none
Specify the data set name of the GDDM macro library. This field and GDDM LOAD MODULES must both have a valid data set name or both be blank. The data set name specified in this field is included in the compile step SYSLIB DD concatenations of DSNHASM, DSNHC, DSNHCOB, DSNHCOB2, DSNHICOB, DSNHICB2, and DSNHPLI. The installation CLIST will only generate sample job DSNTEJ75 if you specify a GDDM MACLIB name. 7. GDDM LOAD MODULES
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 GDDM.SADMMOD cannot change during update none
Specify the data set name of the GDDM load module library. This field and GDDM MACLIB must both have a valid data set name or both be blank. The data set name specified in this field is included in the link-edit SYSLIB concatenations of
140
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
DSNHASM, DSNHC, DSNHCOB, DSNHCOB2, DSNHICOB, DSNHICB2, and DSNHPLI. 8. CICS LOAD LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CICS410.SDFHLOAD cannot change during update none
Specify the data set name for the CICS load module library. If CICS is not used, blank out the CICS LOAD LIBRARY field. 9. CICS MACRO LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CICS410.SDFHMAC cannot change during update none
Specify the data set name for the CICS macro library. 10. CICS COBOL LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CICS410.SDFHCOB cannot change during update none
Specify the data set name for the CICS library for use by the COBOL programs. 11. CICS COBOL II LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 SYS1.COB2CICS cannot change during update none
Specify the data set name for the CICS library shipped with COBOL II or COBOL/370. 12. CICS PL/I LIBRARY
Acceptable values: Default: Update: DSNZPxxx: valid data set name: see page 105 CICS410.SDFHPLI cannot change during update none
Specify the data set name for the CICS library for use by the PL/I programs.
141
142
Installation Guide
DSNTIPD ===> _
Check numbers and reenter to change: 1 2 3 4 5 6 7 8 9 1 11 12 13 14 15 16 DATABASES TABLES COLUMNS VIEWS TABLE SPACES PLANS PLAN STATEMENTS PACKAGES PACKAGE STATEMENTS PACKAGE LISTS EXECUTED STMTS TABLES IN STMT TEMP 4K SPACE TEMP 4K DATA SETS TEMP 32K SPACE TEMP 32K DATA SETS ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> 2 1 1 3 1 2 3 3 1 2 15 2 16 1 4 1 In this subsystem Per database (average) Per table (average) Per table (average) Per database (average) In this subsystem SQL statements per plan (average) In this subsystem SQL statements per package (average) Package lists per plan (average) SQL statements executed (average) Tables per SQL statement (average) Size of 4K-page work space (megabytes) Number of data sets for 4K data Size of 32K-page work space (megabytes) Number of data sets for 32K data HELP for more information
| |
PRESS:
ENTER to continue
RETURN to exit
1. DATABASES
Acceptable values: Default: Update: DSNZPxxx: 1-64000 200 see Update on page 246; not during migration none
Estimate the average number of tables per database in your subsystem. 3. COLUMNS
Acceptable values: Default: Update: DSNZPxxx: 1-750 10 see Update on page 246; not during migration none
Estimate the average number of columns per table in your subsystem. 4. VIEWS
Acceptable values: Default: Update: DSNZPxxx: 1-200 3 see Update on page 246 none
143
Estimate the average number of views per table in your subsystem. 5. TABLE SPACES
Acceptable values: Default: Update: DSNZPxxx: 1-400 10 see Update on page 246; not during migration none
Estimate the average number of table spaces per database in your subsystem. 6. PLANS
Acceptable values: Default: Update: DSNZPxxx: 1-32000 200 see Update on page 246; not during migration none
Estimate the number of application plans in your subsystem. Each program requires a separate application plan. 7. PLAN STATEMENTS
Acceptable values: Default: Update: DSNZPxxx: 1-32000 30 see Update on page 246; not during migration none
Estimate the average number of SQL statements per application plan. 8. PACKAGES
Acceptable values: Default: Update: DSNZPxxx: 1-256000 300 see Update on page 246; not during migration none
Estimate the number of individual SQL statements per package. 10. PACKAGE LISTS
Acceptable values: Default: Update: DSNZPxxx: 1-32000 2 see Update on page 246; not during migration none
144
Installation Guide
Estimate the average number of SQL statements executed per plan. The number of SQL statements executed can be less than the number written. 12. TABLES IN STMT
Acceptable values: Default: Update: DSNZPxxx: 1-16 2 see Update on page 246; not during migration none
Estimate the average number of tables used per SQL statement. Some SQL statements use more than one tablefor example, those using joins, unions, or subselect clauses. Consider how often you expect to use such statements when choosing a value for this parameter. 13. TEMP 4K SPACE | |
Acceptable values: Default: Update: DSNZPxxx: 1-2000000 16 see below; not during migration none
Specify in megabytes the total size of the 4KB table spaces in the work file database. Database DSNDB07 is used as temporary space for SQL statements and triggers that require working storage. In particular, this includes statements that use:
GROUP BY or HAVING (without index) ORDER BY (without index) DISTINCT (without index) UNION (except UNION ALL) EXISTS (subselect) IN (subselect) ANY (subselect) SOME (subselect) ALL (subselect) Some joins
Fields 13 and 15 allow you to create two kinds of table spaces within the work file database: one for 4KB pages and one for 32KB pages. The names of the data sets for these table spaces are: DSNCAT.DSNDBD.DSNDB07.DSN4Kxx.I0001.A001 for 4KB pages DSNCAT.DSNDBD.DSNDB07.DSN32Kxx.I0001.A001 for 32KB pages where xx is the number of the table space. The space specified on this parameter is divided equally among each of the temporary 4KB table spaces. For example, if you specify 16 for the TEMP 4K SPACE field and 4 for the TEMP 4K DATA SETS field, then each 4KB temporary data set is allocated 4MB of space. Because device characteristics differ, the actual amount of space may vary.
145
All DB2 users share those table spaces. Utilities cannot be used on them. # You can create additional temporary work file table spaces at any time except during migration. This improves DB2 performance by reducing device contention among applications that require working storage. You can also concatenate temporary work file table spaces to support large temporary files. For information about creating additional temporary work file table spaces, see Section 5 (Volume 2) of DB2 Administration Guide. Updating: You can change the size of the data sets by deleting and redefining them when DB2 is not running or when the work file database is stopped. Job DSNTIJTM is a useful example. For information on job DSNTIJTM, see page 271. 14. TEMP 4K DATA SETS
Acceptable values: Default: Update: DSNZPxxx: 1-99 1 see field 13; not during migration none
# #
Estimate the number of temporary data sets for 4KB pages. 15. TEMP 32K SPACE | |
Acceptable values: Default: Update: DSNZPxxx: 0-2000000 4 see field 11 or see below; not during migration none
Specify in megabytes the total size of the 32KB table spaces in the work file database. If you do not use 32KB buffers, enter 0. Then, enter 0 for the BP32Kn fields on the Buffer Pool Sizes Panel 3 (DSNTIP6). Because device characteristics differ, the actual amount of space Updating: To update this field, create a 32KB table space for the work file database. To create a 32KB table space, follow these steps: 1. Stop DB2.
| |
| | |
2. Run the CLIST in install mode. Be sure you enter positive values for fields TEMP 32K SPACE, TEMP 32K DATA SETS, and BP32K on the Buffer Pool Sizes Panel 3 (DSNTIP6). 3. Run job DSNTIJUZ to update the subsystem parameter values. 4. Start DB2. Make sure you do not access the 32KB table space until you complete the next step. To control access, use the following command: -DSN1 START DB2 ACCESS(MAINT) 5. Edit the DSNTIJTM job as follows: Delete everything except the DSNTIC procedure and steps DSNTTMP and DSNTIST. Delete the control statements that define the 4KB data set in DSNTTMP.
146
Installation Guide
Delete the control statements that define the 4KB table space in step DSNTIST. Remove the step names that do not apply from the COND statements in the JCL. Execute the job. 16. TEMP 32K DATA SETS
Acceptable values: Default: Update: DSNZPxxx: 0-99 1 see fields 13 or 15; not during migration none
147
| | | | | | | | | | | |
DSNTIP7 ===> _
Check numbers and reenter to change: 1 2 3 USER LOB VALUE STORAGE SYSTEM LOB VALUE STORAGE MAXIMUM LE TOKENS ===> 2 48 ===> 2 48 ===> 2 Max storage per user for LOB values in kilobytes Max storage per system for LOB values in megabytes Maximum tokens at any time. -5
| | | | | | # | | | | | | | # | | | | | | | # | | | |
PRESS:
ENTER to continue
RETURN to exit
The value in this field establishes an upper limit for the amount of storage each user can have for storing LOB values. The value specified gives the numbers of kilobytes. 2. SYSTEM LOB VALUE STORAGE
Acceptable values: Default: Update: DSNZPxxx: 1-51200 2048 option 10 on panel DSNTIPB DSN6SYSP LOBVALS
The value in this field establishes an upper limit for the amount of storage per system that can be used for storing LOB values. The value specified gives the numbers of megabytes. 3. MAXIMUM LE TOKENS
Acceptable values: Default: Update: DSNZPxxx: 0-50 20 option 10 on panel DSNTIPB DSN6SPRM LEMAX
This number represents the maximum number of LE tokens that are active at any time. If the value is zero, no tokens are available. A token is used each time one of the following functions is used:
148
Installation Guide
| | | | | | | | | | | | |
trigonometry functions (sin, sinh, asin, cos, cosh, acos, tan, tanh, atanh, atan, and atan2) degrees radians rand exp power log functions (log, and log10) upper lower translate For details on these functions, see DB2 SQL Reference. DB2 may use a LE token to perform conversion from one CCSID to another CCSID.
149
DSNTIPE ===> _
Check numbers and reenter to change: 1 2 3 4 5 6 7 8 9 DATABASES MAX USERS MAX REMOTE ACTIVE MAX REMOTE CONNECTED MAX TSO CONNECT MAX BATCH CONNECT SEQUENTIAL CACHE UTILITY CACHE OPTION MAX KEPT DYN STMTS CONTRACT THREAD STG ===> 1 ===> 7 ===> 64 ===> 64 ===> 4 ===> 2 ===> BYPASS ===> NO ===> 5 ===> NO Concurrently in use Concurrently running in DB2 Maximum number of active database access threads Maximum number of remote DDF connections that are supported Users on QMF or in DSN command Users in DSN command or utilities 399 Storage for sequential IO Values are SEQ or BYPASS 399 storage for DB2 utility IO Maximum number of prepared dynamic statements saved past commit points Periodically free unused thread stg
PRESS:
ENTER to continue
RETURN to exit
1. DATABASES
Acceptable values: Default: Update: DSNZPxxx: 1-800 100 option 11 on panel DSNTIPB none
Specify the maximum number of databases that can be open at one time. The number is affected primarily by DSMAX on panel DSNTIPC, which specifies the number of open datasets. See Install DB2 - CLIST calculations panel 1: DSNTIPC on page 235 for more information about DSMAX. The number is also affected by the CLOSE clause of CREATE TABLESPACE and CREATE INDEX statements, as well as by START and STOP commands. For instance, you might want to specify a smaller value if you use CLOSE YES extensively. For performance considerations, see Section 5 (Volume 2) of DB2 Administration Guide. 2. MAX USERS
Acceptable values: Default: Update: DSNZPxxx: 1-2000 70 option 11 on panel DSNTIPB DSN6SYSP CTHREAD
150
Installation Guide
Specify the maximum number of allied threads (threads started at the local subsystem) that can be allocated concurrently. Count the following as separate users: Each TSO user (whether running a DSN command or a DB2 request from QMF) Each batch job (whether running a DSN command or a DB2 utility) Each IMS region that can access DB2 Each active CICS transaction that can access DB2 Each task connected to DB2 through the call attachment facility. The total number of threads accessing data that can be allocated concurrently is the sum of the MAX USERS value and field 3, MAX REMOTE ACTIVE. The maximum allowable value for this sum is 2000. When the number of users attempting to access DB2 exceeds the number you specify, excess plan allocation requests are queued. 3. MAX REMOTE ACTIVE
Acceptable values: Default: Update: DSNZPxxx: 0-1999 64 option 11 on panel DSNTIPB DSN6SYSP MAXDBAT
| | | | | | | | | | | | | | |
Specify the maximum number of database access threads (DBATs) that can be active concurrently. The total number of threads accessing data concurrently is the sum of field 2, MAX USERS, and this field, MAX REMOTE ACTIVE. The maximum allowable value for this sum is 2000. The action taken when a request for a new connection to DB2 is received and MAX REMOTE ACTIVE has been reached depends on whether ACTIVE or INACTIVE is specified for option DDF THREADS on panel DSNTIPR. If DDF THREADS is... Action taken is.. ACTIVE If MAX REMOTE CONNECTED has not been reached, the allocation request is allowed but any further processing for the connection is queued waiting for an active database access thread to terminate. If MAX REMOTE CONNECTED has not been reached, the allocation request is allowed and is processed when DB2 can assign an unused database access thread slot to the connection.
INACTIVE
Setting max remote active to zero: You can use a zero in this field to restrict DDF server activity on a member of a data sharing group. When this field is zero, expect the following: DDF does not register the member's LU name with the VTAM generic LU name during DDF startup. This causes VTAM generic resource connections to be directed to DB2 members that specify a MAX REMOTE ACTIVE value of greater than zero. DDF does not register the member with WLM for member-specific sysplex routing. This does not prevent the member from using WLM for enclave prioritization, but it prevents WLM from including this member in the sysplex routing data sent to remote sites.
151
DDF does not listen on the DRDA SQL port. This means TCP/IP SQL connections can only be accepted by members that specify MAX REMOTE ACTIVE greater than zero. DDF rejects requests for the Sysplex Routing TPN with a SNA TPN not available sense code. In a non-data- sharing environment, when MAX REMOTE ACTIVE is zero, DB2 rejects server connection requests unless the connection request is for resynchronizing existing indoubt units of recovery. 4. MAX REMOTE CONNECTED | |
Acceptable values: Default: Update: DSNZPxxx: 0-150000 64 option 11 on panel DSNTIPB DSN6SYSP CONDBAT
| | | | | |
This field limits the total number of inbound DDF connections. Specify the maximum number of concurrent remote connections. This value must be greater than or equal to MAX REMOTE ACTIVE. When a request to allocate a new connection to DB2 is received, and MAX REMOTE CONNECTED has been reached, the connection request is rejected. See Section 5 (Volume 2) of DB2 Administration Guide for more information. 5. MAX TSO CONNECT
Acceptable values: Default: Update: DSNZPxxx: 1-2000 40 option 11 on panel DSNTIPB DSN6SYSP IDFORE
Specify the maximum number of users allowed to be identified to DB2 from TSO foreground at the same time. Count each of the following as a separate user: Each TSO foreground user executing a DSN command. Each TSO foreground user connected to DB2 through the call attachment facility (CAF). This can include QMF users running in TSO foreground or user-written CAF applications running in TSO foreground. When the number of TSO users attempting to access DB2 exceeds the number you specify, excess connection requests are rejected. There is no subsystem parameter that controls the maximum concurrent connections for IMS and CICS. You can control those limits by using IMS and CICS facilities. For the CICS attachment, the maximum number of connections to DB2 can be controlled using the resource control table (RCT) TYPE=INIT THRDMAX value. 6. MAX BATCH CONNECT | |
Acceptable values: Default: Update: DSNZPxxx: 1-2000 20 option 11 on panel DSNTIPB DSN6SYSP IDBACK
Specify the maximum number of concurrent connections identified to DB2 from batch. Count each of the following as a separate connection:
152
Installation Guide
Each batch job using QMF Each batch job using the DSN command processor. Each task connected to DB2 through the call attach facility running in batch. Among others, this can include: Batch jobs using QMF APPC applications TCP/IP FTP connections Requests to access DB2 by batch jobs that exceed this limit are rejected. 7. SEQUENTIAL CACHE
Acceptable values: Default: Update: DSNZPxxx: BYPASS, SEQ BYPASS option 11 on panel DSNTIPB DSN6SPRM SEQCACH
Specify whether to use the sequential mode to read cached data from a 3990 controller. If you accept the default, BYPASS, DB2 prefetch bypasses the cache. If you specify SEQ, DB2 prefetch uses sequential access for read activity. Many sites gain a performance benefit by specifying SEQ and using DFSMS or DFP controls with newer 3990 caches. See Section 5 (Volume 2) of DB2 Administration Guide for a discussion of these considerations. | | | | Recommendation: If you have a cached 9343, 3990 Model 3 with the extended platform, or 3990 Model 6, specify SEQ. This option can improve performance because 3990 extended platform caching can transfer data between DASD and cache by the cylinder rather than by the track. 8. UTILITY CACHE OPTION
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 11 on panel DSNTIPB DSN6SPRM SEQPRES
Specify whether utilities that do a scan of a nonpartitioned index followed by an update of a subset of the pages in the index allow data to remain in 3990 cache longer when reading data. If you specify YES, these DB2 utility prefetch reads remain in cache longer, possibly improving performance of subsequent writes in the following cases for a table with very large nonpartitioned indexes: LOAD PART integer RESUME REORG TABLESPACE PART This option is useful only with RAMAC DASD attached to the 3990 Model 6. If you specify NO, DB2 utilities use the 3990 cache the same way as any other application (as you specified in the SEQUENTIAL CACHE option).
153
# # | # # # # # # # # # # # # # # # | | | | | | | | | | | | |
Specify the total number of prepared, dynamic SQL statements that can be saved past a commit point by applications running with the KEEPDYNAMIC(YES) bind option. This is a system-wide limit. This parameter does not limit the size of the dynamic cache itself. When many applications bound with KEEPDYNAMIC(YES) are run in a system that has the dynamic statement cache active, they can use a considerable amount of storage in the DBM1 address space. This parameter helps limit the amount of storage used by these applications by limiting the total number of prepared statements held by these applications past a commit point. If this limit is exceeded, the KEEPDYNAMIC(YES) behavior will be honored by DB2, but "implicit" prepares may be necessary to rebuild the executable version of some SQL statements when they are executed after a commit. For more information about the interaction of the KEEPDYNAMIC(YES) bind option and the dynamic statement cache, refer to Section 7 of DB2 Application Programming and SQL Guide. When you enter 0, DB2 can not keep the executable version of dynamic SQL statements past commit points. To retain the KEEPDYNAMIC(YES) behavior after a commit point, DB2 performs "implicit" prepares to rebuild the executable version of the dynamic SQL statements. 10. CONTRACT THREAD STG
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 11 on panel DSNTIPB DSN6SPRM CONTSTOR
Specifies whether DB2 will periodically "contract" each thread's working storage area. Storage acquired by a thread is normally allocated to that thread until deallocation. If YES is specified for this parameter, DB2 will examine threads at commit points and periodically return storage to the operating system that is no longer in use. For best performance, this parameter should be NO. For subsystems that have many long-running threads and that are constrained on storage in the DBM1 address space, specifying YES can reduce the total storage used in the DBM1 address space.
154
Installation Guide
DSNTIP1 ===> _
| | | | | | | | | | | | | | | | | |
1 DEFAULT BUFFER POOL FOR USER DATA ===> BP 2 DEFAULT BUFFER POOL FOR USER INDEXES ===> BP
BP -BP49 BP -BP49
Enter sizes in number of pages, and D (Dataspace) or P (Primary) for VPTYPE. BUFFERPOOL Hiperpool VPTYPE BUFFERPOOL Hiperpool VPTYPE 3 BP ==> 2 ==> ==> P 16 BP13 ==> ==> ==> P 4 BP1 ==> ==> ==> P 17 BP14 ==> ==> ==> P 5 BP2 ==> ==> ==> P 18 BP15 ==> ==> ==> P 6 BP3 ==> ==> ==> P 19 BP16 ==> ==> ==> P 7 BP4 ==> ==> ==> P 2 BP17 ==> ==> ==> P 8 BP5 ==> ==> ==> P 21 BP18 ==> ==> ==> P 9 BP6 ==> ==> ==> P 22 BP19 ==> ==> ==> P 1 BP7 ==> ==> ==> P 23 BP2 ==> ==> ==> P 11 BP8 ==> ==> ==> P 24 BP21 ==> ==> ==> P 12 BP9 ==> ==> ==> P 25 BP22 ==> ==> ==> P 13 BP1 ==> ==> ==> P 26 BP23 ==> ==> ==> P 14 BP11 ==> ==> ==> P 27 BP24 ==> ==> ==> P 15 BP12 ==> ==> ==> P 28 BP25 ==> ==> ==> P PRESS: ENTER to continue RETURN to exit HELP for more information
| | | | | | # # | | | | |
Specify the default buffer pool to use for user table spaces. This must be a 4KB buffer pool. 2.DEFAULT BUFFER POOL FOR USER INDEXES
Acceptable values: Default: Update: DSNZPxxx: Any 4KB buffer pool names BP0 see below DSN6SYSP IDXBPOOL
155
# #
Specify the default buffer pool to use for indexes on user data. This must be a 4KB buffer pool. 3-28. BUFFERPOOL
| | |
Acceptable values:
If VPTYPE=P: for BP0, 56-400000; for BP1-BP25, 0-400000. If VPTYPE=D: for BP0, 56-8000000; for BP1-BP25, 0-8000000. for BP0, 2000; for BP1-BP25, 0 ALTER BUFFERPOOL command none
Specify the total number of 4KB buffers in the given virtual buffer pool (BP0-BP25). 3-28. Hiperpool
Acceptable values: Default: Update: DSNZPxxx: 0-2097152 0 ALTER BUFFERPOOL command none
Specify the size (in number of pages) of the hiperpool associated with the given virtual buffer pool (BP0-BP25). If you specify a size in this field, a hiperpool will be created as an extension to that virtual buffer pool. If the size of a given hiperpool is greater than zero, the size of its corresponding buffer pool must also be greater than zero. The total size of all hiperpools must not exceed 8GB. | | | | | | | | | | | | | | | | | | | | 3-28. VPTYPE
Acceptable values: Default: Update: DSNZPxxx: P, D P ALTER BUFFERPOOL command none
Specify the type of virtual buffer pool to be allocated. P indicates that the virtual buffer pool is to be allocated in the DB2 database services address space. D indicates that the virtual buffer pool is to be allocated in one or more data spaces associated with DB2. The VPTYPE specification becomes effective the next time the virtual buffer pool is allocated. If you have already allocated the virtual buffer pool and later change the VPTYPE attribute, the new VPTYPE specification becomes pending until the next time the virtual buffer pool is allocated. The Effect of Allocating a Buffer Pool before Running DSNTIJTM: If you specify that you want a buffer pool to be allocated in a data space and if the buffer pool gets allocated before you run job DSNTIJTM, the data space attribute is made pending and you will have to reallocate the buffer pool to get the data space attribute to take effect. This is likely to be a consideration only for BP0, which is always allocated during DB2 restart.
156
Installation Guide
DSNTIP2 ===> _
Enter sizes (in number of pages), and D (Dataspace) or P (Primary) for VPTYPE. BP26 BP27 BP28 BP29 BP3 BP31 BP32 BP33 BP34 1 BP35 11 BP36 12 BP37 PRESS: 1 2 3 4 5 6 7 8 9 BUFFERPOOL ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> Hiperpool ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> VPTYPE ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P 13 14 15 16 17 18 19 2 21 22 23 24 BP38 BP39 BP4 BP41 BP42 BP43 BP44 BP45 BP46 BP47 BP48 BP49 BUFFERPOOL ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> Hiperpool ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> VPTYPE ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P
ENTER to continue
RETURN to exit
1-24. BUFFERPOOL |
Acceptable values: Default: Update: DSNZPxxx: If VPTYPE=P: 0-400000. If VPTYPE=D: 0-8000000 0 ALTER BUFFERPOOL command none
| |
Specify the total number or 4KB buffers in the given virtual buffer pool (BP26-BP49). 1-24. Hiperpool
Acceptable values: Default: Update: DSNZPxxx: 0-2097152 0 ALTER BUFFERPOOL command none
| | |
Specify the size (in number of pages) of the hiperpool associated with the given virtual buffer pool (BP26-BP49). If you specify a size in this field, a hiperpool is created as an extension to that virtual buffer pool. If the size of a given hiperpool is
157
| | | | | | | | | | | | | | | |
greater than zero, the size of its corresponding buffer pool must also be greater than zero. The total size of all hiperpools must not exceed 8GB. 1-24. VPTYPE
Acceptable values: Default: Update: DSNZPxxx: P, D P ALTER BUFFERPOOL command none
Specify the type of virtual buffer pool to be allocated. 'P' indicates that the virtual buffer pool is to be allocated in the DB2 database services address space. 'D' indicates that the virtual buffer pool is to be allocated in one or more data spaces associated with DB2. The VPTYPE specification becomes effective the next time the virtual buffer pool is allocated. If you have already allocated the virtual buffer pool and later change the VPTYPE attribute, the new VPTYPE specification becomes "pending" until the next time the virtual buffer pool is allocated.
158
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
DSNTIP6 ===> _
Enter sizes in number of pages, and D (Dataspace) or P (Primary) for VPTYPE. 1 2 3 4 5 6 7 8 9 1 11 12 13 14 15 BUFFERPOOL BP8K ==> BP8K1 ==> BP8K2 ==> BP8K3 ==> BP8K4 ==> BP8K5 ==> BP8K6 ==> BP8K7 ==> BP8K8 ==> BP8K9 ==> BP16K ==> BP16K1 ==> BP16K2 ==> BP16K3 ==> BP16K4 ==> Hiperpool ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> VPTYPE ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P 16 17 18 19 2 21 22 23 24 25 26 27 28 29 3 BP16K5 BP16K6 BP16K7 BP16K8 BP16K9 BP32K BP32K1 BP32K2 BP32K3 BP32K4 BP32K5 BP32K6 BP32K7 BP32K8 BP32K9 BUFFERPOOL ==> ==> ==> ==> ==> ==> 24 ==> ==> ==> ==> ==> ==> ==> ==> ==> Hiperpool ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> VPTYPE ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P ==> P
PRESS:
ENTER to continue
RETURN to exit
1-30. BUFFERPOOL
Acceptable values: If VPTYPE=P: for BP8K0-BP8K9, 0-200000;BP16K0-BP16K9, 0-100000; for BP32K-BP32K9, 0-50000. If VPTYPE=D, maximum values are 8000000. for BP8K0-BP8K9, 0; for BP16K0-BP16K9, 0;for BP32K, 24; for BP32K1-BP32K9, 0 ALTER BUFFERPOOL command none
Specify the total number or 8KB, 16KB, or 32KB buffers in the given virtual buffer pool (BP8K0-BP8K9, BP16K0-BP16K9, or BP32K-BP32K9).
159
| | | | | | | | | | | | | | | | | | | | | | | | | |
1-30. Hiperpool
Acceptable values: Default: Update: DSNZPxxx: 0-1048576 for 8KB hiperpools, 0-524288 for 16KB hiperpools, 0-262144 for 32KB hiperpools 0 ALTER BUFFERPOOL command none
Specify the size (in number of pages) of the hiperpool associated with the given virtual buffer pool (BP8K0-BP8K9, BP16K0-BP16K9, or BP32K-BP32K9). If you specify a size in this field, a hiperpool will be created as an extension to that virtual buffer pool. If the size of a given hiperpool is greater than zero, the size of its corresponding buffer pool must also be greater than zero. The total size of all hiperpools must not exceed 8GB. 1-30. VPTYPE
Acceptable values: Default: Update: DSNZPxxx: P, D P ALTER BUFFERPOOL command none
Specify the type of virtual buffer pool to be allocated. 'D' indicates that the virtual buffer pool is to be allocated in one or more dataspaces associated with DB2. 'P' indicates that the virtual buffer pool is to be allocated in the DB2 database services address space. The VPTYPE specification becomes effective the next time the virtual buffer pool is allocated. If you have already allocated the virtual buffer pool and later change the VPTYPE attribute, the new VPTYPE specification becomes "pending" until the next time the virtual buffer pool is allocated.
160
Installation Guide
DSNTIPN ===> _
Enter data below: Audit classes to start. NO,YES,list Global classes to start. YES,NO,list Trace table size in bytes. 4K-396K Accounting classes to start. NO,YES,list Statistics classes to start. NO,YES,list Time interval in minutes. 1-144 Time interval in minutes. 1-144 Monitor classes to start. NO,YES,list Default monitor buffer size. 8K-1M 1 Number of log records per checkpoint 11 Checkpoints to enable UR check. -255 12 AUTO Limit backout processing. AUTO, YES, NO 13 5 Checkpoints processed during backout if LIMIT BACKOUT = AUTO or YES. -255. 14 RO SWITCH CHKPTS ===> 5 Checkpoints to read-only switch. 1-32767 15 RO SWITCH TIME ===> 1 Minutes to read-only switch. -32767 16 LEVELID UPDATE FREQ===> 5 Checkpoints between updates. -32767 PRESS: ENTER to continue RETURN to exit HELP for more information 1 2 3 4 5 6 7 8 9 AUDIT TRACE TRACE AUTO START TRACE SIZE SMF ACCOUNTING SMF STATISTICS STATISTICS TIME DATASET STATS TIME MONITOR TRACE MONITOR SIZE CHECKPOINT FREQ UR CHECK FREQ LIMIT BACKOUT BACKOUT DURATION ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> NO NO 64K 1 YES 3 5 NO 8K 5
| | | | |
1. AUDIT TRACE
Acceptable values: Default: Update: DSNZPxxx: YES, NO, list of classes, an asterisk (*) NO option 15 on panel DSNTIPB DSN6SYSP AUDITST
Specify whether to start the audit trace automatically when DB2 is started, and specify the classes for which to start it. NO specifies no automatic start; if the audit trace is to be used, it must be started with the START TRACE command. YES starts the trace for the default class (class 1) whenever DB2 is started. To specify other classes for which trace must start automatically, list the numbers (any integer from 1 to 32) separated by commas. Only classes 1-9 are defined by DB2. Enter an asterisk (*) to start audit trace for all classes. For information on audit classes and the effect of the audit trace, see Section 3 (Volume 1) of DB2 Administration Guide.
161
Specify whether to start the global trace automatically when DB2 is started, and specify the classes for which to start it. # # # NO specifies no automatic start; if the trace is to be used, it must be started with a special START TRACE command as documented in DB2 Diagnosis Guide and Reference. YES starts the global trace for the default classes (classes 1, 2, and 3) whenever DB2 is started, and performs additional data consistency checks whenever a data page or index page is modified. To start specific classes, enter a list of class numbers (any integer from 1 to 32) separated by commas. Only classes 1-9 are defined by DB2. Enter an asterisk (*) to start global trace for all classes. The global trace is used to diagnose problems in DB2. Customers with production systems requiring high performance might consider turning off global trace. However, be aware that turning off global trace presents a serviceability exposure. In the event of a system failure, IBM service personnel could request that you turn on global trace and attempt to re-create the problem. For information about the global trace facility, see DB2 Diagnosis Guide and Reference. 3. TRACE SIZE
Acceptable values: Default: Update: DSNZPxxx: 4K-396K 64K option 15 on panel DSNTIPB DSN6SYSP TRACTBL
# #
Specify the size, in bytes, of the RES trace table. This table is the default destination for the global trace records in DB2. Most trace records require 32-byte entries; events with more than three data items require 64-byte entries. You can use the abbreviation K for multiples of 1024 bytes. The actual value is rounded up to a multiple of 4096 bytes. If you use 50K, for example, the actual table size is 52KB. In the subsystem parameter, use a multiple of 4. For example, to get a 64KB table, code TRACTBL=16. 4. SMF ACCOUNTING
Acceptable values: Default: Update: DSNZPxxx: YES, NO, list of classes, an asterisk (*) 1 option 15 on panel DSNTIPB DSN6SYSP SMFACCT
Specify whether DB2 sends accounting data to SMF automatically when DB2 is started. This field also specifies what classes are sent. NO specifies no automatic start. YES starts the trace for the default class (class 1). If you use YES, you can also need to update the SMFPRMxx member of SYS1.PARMLIB to permit SMF to write the records.
162
Installation Guide
To start specific classes, enter a list of class numbers (any integer from 1 to 32) separated by commas. Only classes 1-5 and classes 7,8 are defined by DB2. To start all classes, enter an asterisk (*). For information on accounting classes, see Section 5 (Volume 2) of DB2 Administration Guide. For information on using the trace, see Installation step 7: Record DB2 data to SMF (optional) on page 261. 5. SMF STATISTICS
Acceptable values: Default: Update: DSNZPxxx: YES, NO, list of classes, an asterisk (*) YES option 15 on panel DSNTIPB DSN6SYSP SMFSTAT
Specify whether DB2 sends statistical data to SMF automatically when DB2 is started. This field also specifies what classes are sent. NO specifies no automatic start. YES starts the trace for the default classes (classes 1, 3, 4, and 5). If you specify YES, you might also need to update the SMFPRMxx member of SYS1.PARMLIB to permit SMF to write the records. To start specific classes, enter a list of class numbers (any integer from 1 to 32) separated by commas. Only classes 1-5 are defined by DB2. To start all classes, enter an asterisk (*). For information on statistics classes, see Section 5 (Volume 2) of DB2 Administration Guide. For information on using the trace, see Installation step 7: Record DB2 data to SMF (optional) on page 261. 6. STATISTICS TIME
Acceptable values: Default: Update: DSNZPxxx: 1-1440 30 option 15 on panel DSNTIPB DSN6SYSP STATIME
Specify the time interval, in minutes, between statistics collections. Statistics records are written approximately at the end of this interval. | 7. DATASET STATS TIME
Acceptable values: Default: Update: DSNZPxxx: 1-1440 5 (minutes) option 15 on panel DSNTIPB DSN6SYSP DSSTIME
| | | |
The value in this field specifies the time interval, in minutes, between the resetting of data set statistics for online performance monitors. Online performance monitors can request DB2 data set statistics for the current interval with an IFI READS request for IFCID 0199. 8. MONITOR TRACE
Acceptable values: Default: Update: DSNZPxxx: YES, NO, list of classes, an asterisk (*) NO option 15 on panel DSNTIPB DSN6SYSP MON
Specify whether to start the monitor trace automatically when DB2 is started. This field also specifies what classes are sent.
Chapter 2-5. Installing, migrating, and updating system parameters
163
NO specifies no automatic start. YES starts the trace for the default classes (class 1) whenever DB2 is started. To start the trace automatically for other classes, enter a list of class numbers (any integer from 1 to 32) separated by commas. Only classes 1-8 are defined by DB2. To start all classes, enter an asterisk (*). For information on the monitor trace, see Appendix G (Volume 2) of DB2 Administration Guide. 9. MONITOR SIZE
Acceptable values: Default: Update: DSNZPxxx: 8K-1M 8K option 15 on panel DSNTIPB DSN6SYSP MONSIZE
Specify the default buffer size for monitor trace when sending data to monitor destinations. You can enter the value in bytes (for example, 8192) or use the abbreviation K for kilobytes (for example, 8K). 10. CHECKPOINT FREQ
Acceptable values: Default: Update: DSNZPxxx: 200-16000000 50000 option 15 on panel DSNTIPB DSN6SYSP LOGLOAD
Specify the number of log records that DB2 writes between the start of successive checkpoints. If you accept the default (50 000), DB2 starts a new checkpoint every time 50 000 log records have been written. The number of log records produced depends on several factors, including application mix and complexity, processor and DASD configurations and speeds, and acceptable trade-offs between performance and restart time. | | The SET LOG command can be used to dynamically change the number of log records between checkpoints. 11. UR CHECK FREQ
Acceptable values: Default: Update: DSNZPxxx: 0-255 0 option 15 on panel DSNTIPB DSN6SYSP URCHKTH
Specify the number of checkpoint cycles to complete before DB2 issues a warning message to the console and instrumentation for an uncommitted unit of recovery (UR). Accept the default to disable this option. This option does not affect performance. If you use this option, specify a value that is based on how often a checkpoint occurs in your system and how much time you can allow for a restart or shutdown. For example, if your site's checkpoint interval is 5 minutes and the standard limit for issuing COMMITs with units of recovery is 20 minutes, divide 20 by 5 to determine the best value for your system. | | 12. LIMIT BACKOUT
Acceptable values: AUTO, YES, NO
164
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Specify whether some backward log processing should be postponed. NO specifies that DB2 backward log processing should process all inflight and inabort units of recovery (URs). YES postpones backout processing for some units of work until you issue the command RECOVER POSTPONED. AUTO postpones some backout processing but automatically starts the backout processing when DB2 restarts and begins accepting new work. With YES or AUTO, backout processing runs concurrently with new work. Page sets or partitions with backout work pending are unavailable until their backout work is complete. See the description of field BACKOUT DURATION for information on how you specify the amount of backward log processing that is allowed to complete during restart (when LIMIT BACKOUT is YES or AUTO). The default value, AUTO, introduces a release incompatibility in the sense that upon completing restart, some objects (table spaces, index spaces or partitions) might be unavailable until the automatically started process completes the backout work. In earlier releases, all of DB2 remains unavailable until backout work is complete. This incompatibility offers improved availability as the default. 13. BACKOUT DURATION
Acceptable values: Default: Update: DSNZPxxx: 0-255 5 option 15 on panel DSNTIPB DSN6SYSP BACKODUR
Specify a multiplier to indicate how much log to process for backout when LIMIT BACKOUT = YES or AUTO. During restart, backward log processing continues until both of the following events occur: All inflight and inabort URs with update activity against the catalog or directory are backed out. The number of log records processed is equal to the number you specify in BACKOUT DURATION times the number of log records per checkpoint, which you specified in field CHECKPOINT FREQ. Inflight and inabort URs that are not completely backed out during restart are converted to postponed abort status. Page sets or partitions with postponed backout work are put into restart pending (RESTP). This state blocks all access to the object other than access by the command RECOVER POSTPONED or by automatic backout processing performed by DB2 when LIMITED BACKOUT = AUTO. A table space might be in restart pending mode, without the associated index spaces also in restart pending mode. This happens if a postponed abort UR makes updates only to non-indexed fields of a table in a table space. In this case, the indexes are accessible to SQL (for index-only queries), even though the table space is inaccessible.
165
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Indicates the number of consecutive DB2 checkpoints since a page set or partition was last updated after which DB2 converts the page set or partition from read-write to read-only. This value is used in conjunction with RO SWITCH TIME. If the condition for RO SWITCH TIME or RO SWITCH CHKPTS is met, the page set or partition is converted from read-write to read-only. Having DB2 switch an infrequently-updated page set from read-write to read-only can be a performance benefit for recovery, logging, and for data sharing processing. See Section 5 (Volume 2) of DB2 Administration Guide and DB2 Data Sharing: Planning and Administration for more information about read-only switching. 15. RO SWITCH TIME
Acceptable values: Default: Update: DSNZPxxx: 1-32767 10 (minutes) option 15 on panel DSNTIPB DSN6SYSP PCLOSET
Indicates the number of minutes since a page set or partition was last updated, after which DB2 converts the page set or partition from read-write to read-only. This value is used in conjunction with RO SWITCH CHKPTS. If the condition for RO SWITCH CHKPTS or RO SWITCH TIME is met, the page set or partition is converted from read-write to read-only. Having DB2 switch an infrequently-updated page set from read-write to read-only can be a performance benefit for recovery, logging, and for data sharing processing. See Section 5 (Volume 2) of DB2 Administration Guide and DB2 Data Sharing: Planning and Administration for more information about read-only switching. 16. LEVELID UPDATE FREQ
Acceptable values: Default: Update: DSNZPxxx: 0-32767 5 (checkpoints) option 15 on panel DSNTIPB DSN6SYSP DLDFREQ
Controls how often, in number of checkpoints, the level ID of a page set or partition is updated. A zero (0) disables downlevel detection. Consider the following questions when you choose a value for the frequency of level ID updates: How often do you use backup and restore methods outside of DB2's control (such as DSN1COPY or DFDSS dump and restore)? If you rarely use such methods, there is no need to update the level ID frequently. How many page sets are open for update at the same time? If DB2 updates level IDs frequently, you have extra protection agains downlevel page sets.
166
Installation Guide
| | | | |
However, if the level IDs for many page sets must be set at every checkpoint, you might experience a performance degradation. How often does the subsystem take checkpoints? If your DB2 subsystem takes frequent system checkpoints, you can set the level ID frequency to a higher number.
167
DSNTIPO ===> _
Enter data below: 1 2 3 4 5 6 WTO ROUTE CODES RECALL DATABASE RECALL DELAY RLF AUTO START RLST NAME SUFFIX RLST ACCESS ERROR PARAMETER MODULE AUTO BIND EXPLAIN PROCESSING DPROP SUPPORT SITE TYPE TRACKER SITE READ COPY2 ARCHIVE ===> 1 ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> YES 12 NO 1 NOLIMIT DSNZPARM YES YES 1 LOCALSITE NO NO Routing codes for WTORs Use DFHSM automatic recall. YES or NO Seconds to wait for automatic recall Resource Limit Facility. NO or YES Resource Limit Spec. Table (RLST) Action on RLST access error. Values are: NOLIMIT, NORUN, or 1-5 Name of DB2 subsystem parameter module Use automatic bind. YES, NO, or COEXIST Explain allowed on autobind? YES or NO 1=NO 2=ONLY 3=ANY LOCALSITE or RECOVERYSITE Tracker DB2 system. NO or YES Read COPY2 archives first. NO or YES HELP for more information
| |
7 8 9 1 11 12 13
PRESS:
ENTER to continue
RETURN to exit
Specify the MVS console routing codes assigned to messages that are not solicited from a specific console. You can specify from 1 to 16 route codes. You must use at least one code. Separate codes in a list by commas only, not by blanks; for example: 1,3,5,7,9,10,11. For more information on routing codes, refer to OS/390 MVS Routing and Descriptor Codes. 2. RECALL DATABASE
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES option 16 on panel DSNTIPB DSN6SPRM RECALL
Specify whether DFSMShsm automatic recall is performed for DB2 databases. NO indicates that a DB2 table space that has been migrated is considered to be an unavailable resource. It must be recalled explicitly before it can be used by DB2. YES indicates that DFSMShsm is invoked to recall it automatically.
168
Installation Guide
3. RECALL DELAY
Acceptable values: Default: Update: DSNZPxxx: 0-32767 120 option 16 on panel DSNTIPB DSN6SPRM RECALLD
Specify the maximum length of time in seconds that a program can delay for a DFSMShsm recall. If the recall is not completed within the specified number of seconds, the program receives an error message indicating that the page set is unavailable, but that recall was initiated. If you use 0 and RECALL DATABASE (field 2) is YES, then the recall is performed asynchronously. This field is ignored if the RECALL DATABASE field is NO. The RECALL DELAY option is not used when running a DB2 utility against a DB2 migrated data set. 4. RLF AUTO START
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 16 on panel DSNTIPB DSN6SYSP RLF
Specify whether the resource limit facility (governor) is automatically started each time DB2 is started. For information about using the governor, see Section 5 (Volume 2) of DB2 Administration Guide. 5. RLST NAME SUFFIX
Acceptable values: Default: Update: DSNZPxxx: any 2 alphanumeric characters; national characters are not allowed 01 option 16 on panel DSNTIPB DSN6SYSP RLFTBL
Specify the suffix of the default resource limit specification table (RLST). The default RLST is used when the resource limit facility (governor) is automatically started or when you start the governor without specifying a suffix. 6. RLST ACCESS ERROR
Acceptable values: Default: Update: DSNZPxxx: NOLIMIT, NORUN, 1-5000000 NOLIMIT option 16 on panel DSNTIPB DSN6SYSP RLFERR
Specify what action DB2 takes if the governor encounters a condition that prevents it from accessing the resource limit specification table or if it cannot find a row in the table that applies to the authorization ID, the plan or package name, and the logical unit of work name of the query user. NOLIMIT allows all dynamic SQL statements to run without limit. NORUN terminates all dynamic SQL statements immediately with a SQL error code.
169
A number from 1 to 5000000 is the default limit; if the limit is exceeded, the SQL statement is terminated. For guidelines in choosing the default limit, see Section 5 (Volume 2) of DB2 Administration Guide. 7. PARAMETER MODULE
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters DSNZPARM option 16 on panel DSNTIPB none
Specify the member name of the load module for DB2 subsystem parameters. The module will reside in library prefix.SDSNEXIT. To avoid conflict with members of prefix.SDSNLOAD, use DSNZxxx, where xxx is any set of 3 alphanumeric characters. DB2 puts this name in the startup JCL procedure in SYS1.PROCLIB, but you can override this value using the START DB2 command. 8. AUTO BIND | |
Acceptable values: Default: Update: DSNZPxxx: YES, NO, COEXIST YES option 16 on panel DSNTIPB DSN6SPRM ABIND
| | | | | |
Specify whether plans or packages are automatically rebound (or autobound) at run-time in certain situations. Automatic rebinds can improve availability and administration of plans and packages, because you do not have to explicitly rebind some plans and packages. However, automatic rebinds can also hinder performance because they require access to the DB2 directory and catalog. Specify the AUTO BIND value as YES, NO or COEXIST where,
| | | | | | | | | | | | | | | | | | |
YES
Specifying YES allows automatic rebind operations to be performed at execution time when a plan or package: Is "invalid" (the SYSPLAN or SYSPACKAGE column VALID contains 'N', See Section 5 of DB2 Application Programming and SQL Guide to see why a plan or package becomes invalid.) Was last bound in DB2 Version 6, but is now running on DB2 Version 5. This "Version 6 to Version 5" autobind is performed on DB2 Version 5 because that is where the user is attempting to run the plan or package. This autobind is performed only for the first attempt to run the plan or package on DB2 Version 5. Was last autobound on DB2 Version 5 for the "Version 6 to Version 5" case, but is now running again on DB2 Version 6. This "Version 5 to Version 6" autobind is performed on DB2 Version 6 because that is where the user is attempting to run the plan or package. This autobind is performed only for the first attempt to run the plan/package on Version 6 after a "Version 6 to Version 5" autobind on Version 5. If the plan or
170
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # # # # # # COEXIST NO
package is later run again on Version 5, the autobind process starts again as previously described. Specifying NO for this field prevents DB2 from performing any automatic rebind operations under any circumstances. This means that when the following conditions are true, you must explicitly rebind the plan or package before it can be run again: you want to run a plan or package that is "invalid" (the SYSPLAN or SYSPACKAGE column VALID contains 'N', See Section 5 of DB2 Application Programming and SQL Guide to see why a plan or package becomes invalid.) you are attempting to run a plan or package on Version 5 that was last bound (explicitly or automatically) in DB2 Version 6. you are attempting to run a plan or package on DB2 Version 6 for which DB2 last performed a "Version 6 to Version 5" autobind. If AUTO BIND = NO has always been in effect on Version 5, then the "Version 6 to Version 5" autobind could not have previously been done on Version 5. If you attempt to run any plan or package on DB2 Version 6 in one of the situations described above, you will receive SQLCODE -908 SQLSTATE 23510. Specifying COEXIST allows automatic rebind operations to be performed in a DB2 data sharing coexistence environment only when the plan or package: is marked "invalid" (the SYSPLAN or SYSPACKAGE column VALID contains 'N', See Section 5 of DB2 Application Programming and SQL Guide to see why a plan or package becomes invalid), or was last bound on DB2 Version 6 and is now running on DB2 Version 5. For this case, DB2 will perform a "Version 6 to Version 5" autobind on Version 5 for the plan or package before running it there. This autobind is performed only for the first attempt to run the plan or package on DB2 Version 5. An automatic rebind operation will not be performed on DB2 Version 6 in a data sharing coexistence environment for any Version 6 plan or package for which DB2 last performed a "Version 6 to Version 5" autobind on Version 5 and that plan or package is now run again on Version 6. The plan or package will run on Version 6 as a Version 5 bound plan or package, but no Version 6 only features such as optimization enhancements, improved access paths, or index usage enhancements will be used because the plan or package was not autobound on DB2 Version 6. After all members of a data sharing group have been migrated to the same release level, DB2 interprets a value of COEXIST as YES, which allows all types of autobinds to occur. The value COEXIST is relevant only for DB2 subsystems in data sharing mode. If COEXIST is specified in a non-data-sharing environment, DB2 ignores the value and uses the default value of
171
# # # | | | | | | | | | | |
YES when determining whether an autobind can be done. YES allows a "Version 5 to Version 6" autobind on Version 6 after a previous "Version 6 to Version 5" autobind completed on Version 5. If you have a DB2 data sharing group where some of the DB2 members are at different DB2 release levels, there could be an increase in the rate of automatic rebinds and, subsequently, a degradation in run-time performance for a plan or package if the plan or package was last bound on DB2 Version 6 and is now run on DB2 Version 5 (a "Version 6 to Version 5" autobind occurs on Version 5), or DB2 last performed a "Version 6 to Version 5" autobind for that plan or package on DB2 Version 5, and the plan or package is now run on Version 6 (a "Version 5 to Version 6" autobind occurs on Version 6). To reduce the rate of automatic rebinds in this type of data sharing consider specifying COEXIST for AUTO BIND. 9. EXPLAIN PROCESSING
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES option 16 on panel DSNTIPB DSN6SPRM ABEXP
Specify whether you want EXPLAIN processing to occur during automatic rebind. 'YES' specifies that you want EXPLAIN processing to occur during automatic rebind of a plan or package when the bind option EXPLAIN(YES) is specified. If the PLAN_TABLE does not exist, automatic rebind continues, but there is no EXPLAIN output. If you specified YES in this field, but you have a plan or package with the bind option EXPLAIN(NO), then EXPLAIN processing does not occur during automatic rebind. 'NO' specifies that you do not want EXPLAIN processing to occur during the automatic rebind of a plan or package. 10. DPROP SUPPORT
Acceptable values: Default: Update: DSNZPxxx: 1, 2, 3 1 option 16 on panel DSNTIPB DSN6SPRM EDPROP, DSN6SPRM CHGDC
Specify whether you want to use DataPropagator NonRelational to propagate SQL changes made to tables defined with DATA CAPTURE CHANGES. '1' specifies that you do not intend to propagate changes. '2' specifies that you intend to use DataPropagator NonRelational to propagate SQL changes, and that changes made to tables defined with DATA CAPTURE CHANGES are only allowed when the following conditions are met: Monitor trace class 6 is active DataPropagator NonRelational is installed The DB2 application is running in an IMS environment
172
Installation Guide
If you choose 2 for DataPropagator NonRelational Support and monitor trace class 6 is not active, DataPropagator NonRelational is not installed, or the DataPropagator NonRelational application is not running in an IMS environment, then no changes to the DB2 table are permitted. '3' specifies that data propagation will occur when the following conditions are met: Monitor trace class 6 is active DataPropagator NonRelational is installed The DB2 application is running in an IMS environment The ANY option for DataPropagator NonRelational Support is intended for subsystems that need to propagate some data with DataPropagator NonRelational and need to propagate some data with a different program. If you choose 3 for DataPropagator NonRelational support, an application that is not running in an IMS environment can update DB2 tables defined with DATA CAPTURE CHANGES. However, these changes are not propagated to IMS. You can protect your tables that should only be updated by DB2 applications running in an IMS environment by any of the following methods: Using the ENABLE parameter on BIND to specify a specific attachment facility through which updates to data propagation tables can be made. Defining a validation procedure for data propagation tables to allow only certain plans to update those tables. Using a group authorization ID to allow update authority for data propagation tables to a group of authorization IDs that can only run in the IMS environment. For more information about DataPropagator NonRelational, see DataPropagator NonRelational MVS/ESA Administration Guide. 11. SITE TYPE
Acceptable values: Default: Update: DSNZPxxx: LOCALSITE, RECOVERYSITE LOCALSITE option 16 on panel DSNTIPB DSN6SPRM SITETYP
Specify whether the current system is at a local site or a recovery site. LOCALSITE is defined as the site where the multiple image copies are made and are operational. RECOVERYSITE is defined as the site named as an alternative for recovery purposes. The RECOVER utility looks at this value to determine what site the current system is on and recovers everything from the copies of data registered at that site. The RECOVER and MERGECOPY utilities look at this value to determine whether COPYDDN or RECOVERDDN is allowed with NEWCOPY NO. | | | | | 12. TRACKER SITE
Acceptable values: Default: Update: DSNZPxxx: NO or YES NO option 16 on panel DSNTIPB DSN6SPRM TRKRSITE
173
| | | | | | | | | | |
The value in this field lets you indicate whether the subsystem being installed is to be used as a remote tracker site for another DB2 subsystem to be used in case of a disaster. See Section 4 (Volume 1) of DB2 Administration Guide for more information about disaster recovery using a tracker site. 13. READ COPY2 ARCHIVE
Acceptable values: Default: Update: DSNZPxxx: NO or YES NO option 16 on panel DSNTIPB DSN6SPRM DSN6LOGP.ARC2FRST
The value in this field indicates whether COPY2 archives should be read first when the DB2 subsystem is started.
174
Installation Guide
DSNTIPF ===> _
Enter data below: 1 2 3 4 5 6 7 8 9 1 11 12 13 14 LANGUAGE DEFAULT ===> IBMCOB DECIMAL POINT IS ===> . MINIMUM DIVIDE SCALE ===> NO STRING DELIMITER ===> SQL STRING DELIMITER ===> DIST SQL STR DELIMTR ===> MIXED DATA ===> EBCDIC CODED CHAR SET===> ASCII CODED CHAR SET ===> DEF ENCODING SCHEME ===> DECIMAL ARITHMETIC ===> USE FOR DYNAMICRULES ===> DESCRIBE FOR STATIC ===> LOCALE LC_CTYPE ===> ENTER to continue DEFAULT DEFAULT ' NO EBCDIC DEC15 YES NO ASM,C,CPP,COBOL,COB2,IBMCOB,FORTRAN,PLI . or , NO or YES for a minimum of 3 digits to right of decimal after division DEFAULT, " or ' (COBOL or COB2 only) DEFAULT, " or ' ' or " NO or YES for mixed DBCS data The CCSID of your SBCS or MIXED DATA The CCSID of SBCS or mixed data. -65533. EBCDIC or ASCII DEC15, DEC31, 15, 31 YES or NO Allow DESCRIBE for STATIC SQL. NO or YES. HELP for more information
PRESS:
RETURN to exit
1. LANGUAGE DEFAULT
Acceptable values: Default: Update: DSNHDECP: see below IBMCOB option 17 on panel DSNTIPB DEFLANG
Specify the default programming language for your site. Use any of the following:
Chapter 2-5. Installing, migrating, and updating system parameters
175
ASM for High Level Assembler/MVS C for C Language CPP for C++
COB2 for VS COBOL II IBMCOB for IBM COBOL for MVS & VM FORTRAN for Fortran PLI for PL/I
If you specify C or C++ in this field, you can fold SQL identifiers to upper case. However, this is not a default from any installation panel. For more information on this precompiler option see DB2 Application Programming and SQL Guide . 2. DECIMAL POINT IS
Acceptable values: Default: Update: DSNHDECP: . (period) or , (comma) . (period) recommended only to recover an error DECIMAL
Specify whether the decimal point for numbers is the comma (,) or the period (.). Some nations customarily signify the number one and one-half, for instance, as 1.5; other nations use 1,5 for the same value. # # # # # # This parameter is used for dynamic SQL. When the value of the parameter is COMMA, DB2 recognizes either a comma or a period as the decimal point for numbers. The parameter also specifies the default precompiler option (PERIOD or COMMA) for COBOL programs. When the precompiler option determines the decimal point and the value is COMMA, DB2 recognizes only a comma as the decimal point for numbers. This parameter is the default for binds at this DB2 that are requested by a remote system that does not indicate whether the period or the comma is used to represent a decimal point. In most cases, however, requesting systems give DB2 this information. 3. MINIMUM DIVIDE SCALE
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 17 on panel DSNTIPB DSN6SPRM DECDIV3
Specify YES to retain at least three digits to the right of the decimal point after any decimal division. Certain accounting applications might need this option. Use NO, the default, to accept the usual rules for decimal division in SQL. For more information about decimal division in SQL, see Chapter 3 of DB2 SQL Reference. 4. STRING DELIMITER
Acceptable values: Default: Update: DSNHDECP: DEFAULT, " (quotation mark), ' (apostrophe) DEFAULT option 17 on panel DSNTIPB DELIM
Specify the value of the string delimiter for COBOL. If you specify DEFAULT, the string delimiter is the quotation mark. This option is effective for all varieties of
176
Installation Guide
COBOL. See field 5 for a description of how to use this field with field 5 to get the desired set of character string delimiters for COBOL and SQL. 5. SQL STRING DELIMITER
Acceptable values: Default: Update: DSNHDECP: DEFAULT, " (quotation mark), ' (apostrophe) DEFAULT not recommended SQLDELI
Specify the value of the SQL string delimiter that sets off character strings in dynamic SQL. This option is effective for all varieties of COBOL. The value in this field also determines which character is the escape character for delimited identifiers in dynamic SQL. If you specify an apostrophe in this field, you get a quotation mark for your SQL escape character. If you specify a quotation mark in this field, you get an apostrophe for your SQL escape character. For SQL embedded in COBOL programs, COBOL precompiler options specify which character is the SQL string delimiter and which character is the SQL escape character. If you specify DEFAULT in this field, a quote is passed to the precompiler as the default SQL string delimiter. Some applications might require a particular value for the SQL STRING DELIMITER. Determine the required values for those applications before installing DB2. Table 36 shows you the different combinations of character string delimiters you get by specifying different values in fields 4 and 5.
Table 36. Effect of fields 4 and 5 on SQL and COBOL string delimiters For this combination of character string delimiters... COBOL " ' " " Dynamic SQL ' ' " ' Embedded SQL " ' " ' Specify this in field 4 DEFAULT ' " " Specify this in field 5 DEFAULT ' " '
The values you specify in fields 4 and 5 are also used by the program preparation panels, the DSNH CLIST, and the precompiler. Table 37 on page 178 shows you why you might specify different combinations of values in these fields.
177
Table 37. Effect of fields 4 and 5 on precompiler options Purpose Force APOST default (even in COBOL) and provide a default similar to APOST in SQL/DS Change dynamic query string delimiter to the quote. Helpful if you use COBOL with the quote optionallows queries to be tested with dynamic SQL and moved into the program more easily Compatibility with the SQL/DS QUOTE option Field 4 ' " Field 5 ' "
"
'
Specify whether the apostrophe or the quotation mark is used as the SQL string delimiter for bind operations at this DB2 when the requester does not give DB2 that information. In most cases, requesters tell DB2 whether the apostrophe or the quotation mark is used as the SQL string delimiter 7. MIXED DATA
Acceptable values: Default: Update: DSNHDECP: YES, NO NO not recommended MIXED
Specify whether the code points X'0E' and X'0F' have special meaning as the shift-out and shift-in controls for character strings that include double-byte characters. NO indicates that these code points have no special meaning. Therefore, all character strings are single-byte character set (SBCS) data. YES indicates that these code points have the special meaning described above. Therefore, character strings can be SBCS or MIXED data. 8. EBCDIC CODED CHAR SET
Acceptable values: Default: Update: DSNHDECP: 0-65533 0 (no CCSID is used) not recommended SCCSID (single-byte), MCCSID (mixed), GCCSID (graphic)
If your installation does not use character conversion, accept the default. You must specify a coded character set identifier (CCSID) if you specify any of the following values: AUTO or COMMAND for the DDF STARTUP OPTION field on panel DSNTIPR YES for the MIXED DATA field on panel DSNTIPF To determine what single-byte CCSID to use, see Table 118 on page 500.
178
Installation Guide
To select a CCSID for mixed-data (an MCCSID), see Table 119 on page 502. By specifying a CCSID you also receive system CCSIDs for your SBCS and GRAPHIC data. If you specify either 930 or 5026, Katakana characters are allowed in ordinary identifiers and letters are not changed to upper case. Attention: If MIXED DATA=YES, you must specify a Mixed Data CCSID from Table 119 on page 502 or Table 120 on page 503. An error occurs if you do not specify a CCSID or if the CCSID you specify is not listed in the table. If you specify a CCSID that is not a value in SYSSTRINGS.OUTCCSID, an error occurs when DB2 accesses SYSSTRINGS to determine if a conversion is provided. The CCSID is most likely incorrect and is probably not valid. If it is correct, conversions can be provided by adding rows to SYSSTRINGS as explained in Adding a character conversion procedure to DB2 on page 508. If you specify a CCSID that appears as a value of SYSSTRINGS.OUTCCSID, but the CCSID is incorrect, data can be corrupted. For example, assume the coded character set used at your site is 37, but you specify 500 as the system CCSID. If DB2 receives data with a CCSID of 500, the data can be corrupted because character conversion does not occur. Conversely, if DB2 receives data with a CCSID other than 500 and a conversion is made from that CCSID to 500, the data can be corrupted because character conversion occurs. In both cases, the corruption is usually limited to special characters such as brackets and braces. | | | | If you specify an incorrect CCSID or need to convert to a CCSID that supports Euro symbol, you can correct it by altering the CODED CHAR SET field for your default encoding scheme. See Converting to the Euro symbol on page 504 for the detailed steps. The alteration has no effect on bound SQL statements. Bound statements that refer to string variables include the CCSID of these variables. That CCSID is the system CCSID of the local DB2 at the time the statements were bound. Therefore, if the system CCSID is corrected after programs were bound, the change does not correct the CCSID of their input variables. The only way to correct the CCSID of these variables is to rebind the programs. This requirement is limited to programs that were bound to application servers other than the local DB2. There is no need to rebind local applications after you change the system CCSID because the bound form of their SQL statements indicates that character conversion does not occur. If OS/390 V2R9 is installed, refer to OS/390 C/C++ Programming Guide for additional conversions that are supported. 9. ASCII CODED CHAR SET
Acceptable values: Default: Update: DSNHDECP: 0-65533 0 (no CCSID is used) not recommended ASCCSID (single-byte), AMCCSID (mixed), AGCCSID (graphic)
# #
If your installation does not have any ASCII databases, table spaces, or tables, accept the default. You must specify a coded character set identifier (CCSID) for this field if you have ASCII databases, table spaces, or tables.
179
| | | |
To determine which single-byte ASCII CCSID to use, see Table 118 on page 500. To determine which double-byte ASCII CCSID to use, see Table 120 on page 503. See also the Character Data Representation Architecture Overview and Character Data Representation Architecture Reference and Registry for more information. 10. DEF ENCODING SCHEME
Acceptable values: Default: Update: DSNHDECP: EBCDIC, ASCII EBCDIC not recommended ENSCHEME
Specify the format in which to store data in DB2. If you specify DEF ENCODING SCHEME=ASCII and MIXED DATA=YES, specify a mixed ASCII CCSID for ASCII CODED CHAR SET. | 11. DECIMAL ARITHMETIC
Acceptable values: Default: Update: DSNHDECP: DEC15, DEC31, 15, 31 DEC15 not recommended; cannot be changed during migration DECARTH
Specify the rules to be used when both operands in a decimal operation have precisions of 15 or less. DEC15 specifies the rules which do not allow a precision greater than 15 digits, and DEC31 specifies the rules which allow a precision of up to 31 digits. The rules for DEC31 are always used if either operand has a precision greater than 15. If you chose DEC15 for your previous installation, choosing DEC31 can produce different results for operations on existing data. | | | This installation option applies to dynamic SQL by becoming the initial value for the CURRENT PRECISION special register and it provides the default for the DEC precompiler option. DEC15 is sufficient for most sites. Do not choose DEC31 unless you are certain that you need the extra precision. If you use DEC31, you are more likely to get a bind error, particularly in division operations. See Chapter 3 of DB2 SQL Reference for information about arithmetic with two decimal operands. 12. USE FOR DYNAMICRULES
Acceptable values: Default: Update: DSNHDECP: YES or NO YES option 17 on panel DSNTIPB DYNRULS
| | | | | | | | | | |
Specify whether DB2 should use the application programming defaults specified on this panel or use the values of the DB2 precompiler options for dynamic SQL statements bound using DYNAMICRULES bind, define, or invoke behavior. Specify YES to use the application programming defaults for these fields regardless of the DYNAMICRULES option: DECIMAL POINT IS STRING DELIMITER SQL STRING DELIMITER MIXED DATA
180
Installation Guide
| | | | | | | | | | | | | | | | | | | | | |
DECIMAL ARITHMETIC Specify NO to use the DB2 precompiler values for dynamic SQL statements in plans or packages bound using the DYNAMICRULES bind, define, or invoke behavior. 13. DESCRIBE FOR STATIC
Acceptable values: Default: Update: DSNZPxxx: NO or YES NO option 17 on panel DSNTIPB DSN6SPRM DESCSTAT
This option controls whether DB2 builds a DESCRIBE SQLDA when binding static SQL statements. Normally, a DESCRIBE cannot be issued against a static SQL statement, with the following exceptions: In a distributed environment, where DB2 for OS/390 is the server and the requester supports extended dynamic SQL. In this scenario, a DESCRIBE request that is executed on an SQL statement in the extended dynamic package appears to DB2 as a DESCRIBE on a static SQL statement in the DB2 package. When an application uses a stored procedure result set, the application must allocate a cursor for that result set. The application can describe that cursor using a DESCRIBE CURSOR statement. The SQL statement that is actually described is the one with the cursor declared in the stored procedure. If that statement is static, then this requires that a static SQL statement be described. NO, the default means that DB2 does not generate a DESCRIBE SQLDA at BIND time for static SQL statements. If a DESCRIBE requrest is received at execution time, DB2 generates an error. However, if the describe request comes from a DESCRIBE CURSOR statement, DB2 satisfies the request but is only able to provide data type and length information. Column names are not provided. YES means that DB2 does generate a DESCRIBE SQLDA at BIND time so that DESCRIBE requests for static SQL can be satisfied during execution. You must rebind the package after this value has beeen set to YES. Specifying YES increases the size of some packages because the DESCRIBE SQLDA is now stored with each statically-bound SQL SELECT statement.
| | | | | | | | | | | | |
Specify the system LOCALE LC_CTYPE. A locale is the part of your system environment that depends on language and cultural conventions. An LC_TYPE is a subset of a locale that applies to character functions. The UPPER, LOWER, and TRANSLATE scalar functions use the CURRENT LOCALE LC_CTYPE system default or special register. The results of these functions can vary, depending on the setting of the locale.
Chapter 2-5. Installing, migrating, and updating system parameters
181
| | |
Recommendation: Use the default value for LOCALE LC_CTYPE unless you need to execute the UPPER, LOWER, or TRANSLATE functions for data that must be interpretted using the rules provided by specific locales. Examples: En_US or Fr_CA.
182
Installation Guide
DSNTIP4 ===> _
Enter data below: 1 2 3 4 5 6 7 8 9 1 11 12 DATE FORMAT TIME FORMAT LOCAL DATE LENGTH LOCAL TIME LENGTH STD SQL LANGUAGE CURRENT DEGREE CACHE DYNAMIC SQL OPTIMIZATION HINTS VARCHAR FROM INDEX RELEASE LOCKS MAX DEGREE UPDATE PART KEY COLS ===> ISO ===> ISO ===> ===> ===> NO ===> 1 ===> NO ===> NO ===> NO ===> YES ===> ===> YES ISO, JIS, USA, EUR, LOCAL ISO, JIS, USA, EUR, LOCAL 1 -254 or for no exit 8-254 or for no exit NO or YES 1 or ANY NO or YES Enable optimization hints. NO or YES Get VARCHAR data from index. NO or YES Release cursor with hold locks. YES,NO Maximum degree of parallelism. -254 Allow update of partitioning key columns. YES, NO, SAME HELP for more information
| | | # #
PRESS:
ENTER to continue
RETURN to exit
1. DATE FORMAT
Acceptable values: Default: Update: DSNHDECP: ISO, USA, EUR, JIS, LOCAL ISO not recommended DATE
Specify one of the following abbreviations shown in Table 38 as a default output format to represent dates:
Table 38. Date formats Format Name International Standards Organization IBM USA standard IBM European standard Japanese Industrial Standard Christian Era Locally defined (by an installation exit routine) Abbreviation ISO USA EUR JIS LOCAL Format yyyy-mm-dd mm/dd/yyyy dd.mm.yyyy yyyy-mm-dd your choice Example 1986-12-25 12/25/1986 25.12.1986 1986-12-25
183
DB2 can accept a date in any format as input. It interprets the input date based on its punctuation and then provides date output in the format you specify for this parameter. If you use LOCAL, you must provide a date exit routine to perform date formatting; for information, see Appendixes (Volume 2) of DB2 Administration Guide. 2. TIME FORMAT
Acceptable values: Default: Update: DSNHDECP: ISO, USA, EUR, JIS, LOCAL ISO not recommended TIME
Specify one of the following formats shown in Table 39 as a default output to represent times:
Table 39. Time formats Format Name International Standards Organization IBM USA standard Abbreviation ISO USA Format hh.mm.ss hh:mm AM or hh PM hh.mm.ss hh:mm:ss your choice Example 13.30.05 1:30 PM or 1 PM 13.30.05 13:30:05
IBM European standard Japanese Industrial Standard Christian Era Locally defined (by exit routine)
DB2 can accept a time in any format as input. It interprets the input time based upon its punctuation and then provides time output in the format you specify for this parameter. If you use LOCAL, you must provide a time exit routine to perform time formatting; for information, see Appendix B (Volume 2) of DB2 Administration Guide. 3. LOCAL DATE LENGTH
Acceptable values: Default: Update or migrate: DSNHDECP: 0, 10-254 0 not recommended DATELEN
Accept the default value 0 if you want to use one of the IBM-supplied date formats (ISO, JIS, USA, or EUR). This indicates that no user-defined date format exists in your system. If you use a locally defined date exit routine, enter the length of the longest field required to hold a date. If you want your own date format to be the default, enter LOCAL for field 1 on this panel. 4. LOCAL TIME LENGTH
Acceptable values: Default: Update or migrate: DSNHDECP: 0, 8-254 0 not recommended TIMELEN
184
Installation Guide
Accept the default value 0 if you want to use one of the IBM-supplied time formats (ISO, JIS, USA, or EUR). This indicates that no user-defined time format exists in your system. If you use a locally defined time exit routine, enter the length of the longest field required to hold a time. If you want your own time format to be the default, enter LOCAL for field 2 on this panel. 5. STD SQL LANGUAGE
Acceptable values: Default: Update: DSNHDECP: YES, NO NO option 18 on panel DSNTIPB STDSQL
To specify that the SQL language used in application programs conforms to the portions of the 1986 ANSI SQL standard implemented by DB2, choose YES. If you choose NO, you specify that programs are written in accordance with the SQL language defined by DB2. 6. CURRENT DEGREE
Acceptable values: Default: Update: DSNZPxxx: 1, ANY 1 option 18 on panel DSNTIPB DSN6SPRM CDSSRDEF
Specifies the default for the CURRENT DEGREE special register when no degree is explicitly set using the SQL statement SET CURRENT DEGREE. Accepting the default disables query parallelism. 7. CACHE DYNAMIC SQL
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 18 on panel DSNTIPB DSN6SPRM CACHEDYN
# # # # # | | | | | | | | | |
Specify whether to cache prepared, dynamic SQL statements for later use by eligible application processes. These prepared statements will be cached in the EDM pool. When specifying YES, you should consider this usage when calculating your EDM pool size. See Calculating the EDM pool space for the prepared statement cache on page 55 for storage estimating details. 8. OPTIMIZATION HINTS
Acceptable values: Default: Update: DSNZPxxx: NO or YES NO option 18 on panel DSNTIPB DSN6SPRM OPTHINTS
The value in this field allows you to pass information to DB2 that might influence the access path selected for certain queries. The information that is passed is in the form of rows in the PLAN_TABLE. See Section 5 (Volume 2) of DB2 Administration Guide for more information on the PLAN_TABLE. 9. VARCHAR FROM INDEX
185
| | | | | |
Specify whether the VARCHAR column will be retrieved from the index. The data sharing scope of this parameter is GROUP. If you choose NO, DB2 must go to the data page to retrieve data because index-only access of varying-length column data will not be possible. With a setting of NO, data is retrieved with no padding.
# # # # # # | | | | | | | | |
If you choose YES, better performance will result because index-only access of varying-length column data will be enabled. The data retrieved from the index is padded with blanks to the maximum length of the column. Attention: Applications must be able to handle the padding blanks. If your application is sensitive to these blanks, keep the default value of NO. You must rebind plans and packages to enable the change. 10. RELEASE LOCKS
Acceptable values: Default: Update: DSNZPxxx: YES or NO YES option 18 on panel DSNTIPB DSN6SPRM RELCURHL
Specify whether DB2 should, at commit time, release a data page or row lock on which a cursor defined WITH HOLD is positioned. This lock is not necessary for maintaining cursor position. See Section 5 (Volume 2) of DB2 Administration Guide for more information about locks for cursors defined WITH HOLD. If you choose YES, the default, DB2 releases this data page or row lock after a COMMIT is issued for cursors defined WITH HOLD. Specifying YES can improve concurrency. If you choose NO, DB2 holds the data page or row lock for WITH HOLD cursors after the COMMIT. This option is provided so that existing applications that rely on this lock can continue to work correctly.
# # | # | # | # # # # # # # #
Specify the maximum degree of parallelism for a parallel group if non-zero. When you specify a value, you limit the degree of parallelism so that DB2 can not create too many parallel tasks which use virtual storage. The default value of zero means there is no upper limit for the degree of parallelism. See Section 5 (Volume 2) of DB2 Administration Guide for more information about limiting the degree of parallelism. 12. UPDATE PART KEY COLS
186
Installation Guide
# | # | # | # # # # # # # # # # # # #
Specify whether values in columns that participate in partitioning keys may be updated. The acceptable values mean the following: YES NO SAME Values in columns that participate in partitioning keys may be updated. This is the default. Values in columns that participate in partitioning keys may not be updated. Values in columns that participate in partitioning keys may be updated if and only if the update leaves the row belonging to the same partition.
Attempts to inappropriately update the value in a partitioning key column result in the failure of the SQL statement with a -904 resource unavailable SQL code. The accompanying DSNT501I message identifies the unavailable resource as code (type X'3000'), and uses reason code of 00C90097.
187
| | | | | | | | | | | | | | | | | | | | | | | |
DSNTIPI ===> _
Enter data below: IRLM is required for DB2. Should the IRLM distributed with DB2 be installed? 2 SUBSYSTEM NAME ===> IRLM IRLM MVS subsystem name 3 RESOURCE TIMEOUT ===> 6 Seconds to wait for unavailable resource 4 AUTO START ===> YES Start IRLM if not up. YES or NO 5 PROC NAME ===> IRLMPROC Name of start procedure for IRLM 6 TIME TO AUTOSTART ===> 3 Time DB2 will wait for IRLM autostart 7 UTILITY TIMEOUT ===> 6 Utility wait time multiplier 8 U LOCK FOR RR/RS ===> NO Lock mode for update cursor with RR or RS isolation. YES or NO 9 X LOCK FOR SEARCHED U/D ===> NO Use X lock for serached updates or deletes. NO or YES. 1 START IRLM CTRACE ===> NO Start IRLM component traces at startup? NO or YES 11 IMS BMP TIMEOUT ===> 4 Timeout multiplier for BMP. 1-254 12 DL/I BATCH TIMEOUT ===> 6 Timeout multiplier for DL/I. 1-254 13 RETAINED LOCK TIMEOUT ===> Retained lock timeout multiplier. -254 PRESS: ENTER to continue RETURN to exit HELP for more information 1 INSTALL IRLM ===> YES
1. INSTALL IRLM
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES see note B on page 188 none
Specify whether to provide IRLM subsystem entries in job DSNTIJMV and to build an IRLM procedure. If you specify NO, then no IRLM procedure is produced. On installation panel DSNTIPJ all values are ignored with the exception of fields 3 and 4. If you specify YES, the required entries are provided and the IRLM procedure is built.
188
Installation Guide
2. SUBSYSTEM NAME | |
Acceptable values: Default: Update: DSNZPxxx: 1-4 characters. First must be A-Z, #, $, or @. Others must be A-Z, 1-9, #, $, or @. IRLM see note B on page 188 DSN6SPRM IRLMSID
Specify the name by which MVS knows the IRLM subsystem. The name is used for communication between DB2 and the IRLM. This name is included in the MVS subsystem table IEFSSNxx where xx is the value you supply in field 3 (SUBSYSTEM MEMBER) on installation panel DSNTIPM found on page 203. If you installed the IRLM for IMS, DB2's IRLM name must be different. Two IRLMs residing in the same MVS system must have unique MVS subsystem names. If you already have IRLM Version 2 installed, use the MVS subsystem name for that IRLM. Otherwise, accept the default value, IRLM. For more information, see IMS/ESA Operator's Reference. IRLM PROC parameter: IRLMNM 3. RESOURCE TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 1-3600 60 see note B on page 188 DSN6SPRM IRLMRWT
| |
| | | |
Specify the number of seconds before a time-out is detected. Time-out means that a lock request has waited for a resource (or for claims on a resource for a particular claim class to be released) longer than the number of seconds specified on this option. The value specified for this option must be an integer multiple of the DEADLOCK TIME on installation panel DSNTIPJ because IRLM uses its deadlock timer to initiate time-out detection, as well as deadlock detection. This value is rarely the actual time. For data sharing, the actual timeout period is longer than the timeout value. See Chapter 7 of DB2 Data Sharing: Planning and Administration for an explanation of timeouts. For information about optimizing performance by managing DB2's use of locks, see Section 5 (Volume 2) of DB2 Administration Guide. 4. AUTO START
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES edit job DSNTIJUZ DSN6SPRM IRLMAUT
Specify whether DB2 automatically starts and stops the IRLM. If you specify YES, when DB2 starts, it tries to start the IRLM if the IRLM is not already started. When DB2 stops, IRLM automatically stops if the IRLM was started by DB2. However, IRLM will not automatically terminate if it is defined with "DISCONNECT IRLM = NO" option. Recommendation: Use YES if you use the IRLM only for a single DB2 system.
| | |
189
If you specify NO, DB2 terminates if the IRLM is not started when DB2 comes up. | | | | | | | | | When IRLM initializes, it is registered with the MVS automatic restart manager (ARM). It deregisters from the ARM when the IRLM is shut down normally. When IRLM terminates, it sends DB2 the registration information so that DB2 can determine whether IRLM was terminated normally. DB2 then deregisters from the ARM to prevent unwanted restarts. Otherwise, IRLM might be restarted with DB2, if AUTO START is YES. See Section 4 (Volume 1) of DB2 Administration Guide for information on changing the IRLM policy definition in a non-data sharing environment. See DB2 Data Sharing: Planning and Administration for IRLM policy definitions within a data sharing environment. 5. PROC NAME
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters IRLMPROC see note B on page 188 DSN6SPRM IRLMPRC
Specify the name of the IRLM procedure that MVS invokes if field 4 is YES. The name cannot be the same as the subsystem name given for field 2. The procedure is created during installation or migration by job DSNTIJMV and is placed in SYS1.PROCLIB. You can review it by examining DSNTIJMV. 6. TIME TO AUTOSTART
Acceptable values: Default: Update: DSNZPxxx: 1-3600 300 see note B on page 188 DSN6SPRM IRLMSWT
Specify the IRLM wait time in seconds. This is the time that DB2 waits for the IRLM to start during autostart. If the time expires, DB2 abends. 7. UTILITY TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 1-254 6 option 19 on panel DSNTIPB DSN6SPRM UTIMOUT
This option allows utilities to wait longer than SQL applications to access a resource. Specify the number of resource time-out values (field 3) that a utility or utility command waits for a lock or for all claims on a resource of a particular claim class to be released. For example, if you use the default value, a utility can wait 6 times longer than an SQL application for a resource. For more information, see Section 5 (Volume 2) of DB2 Administration Guide.
190
Installation Guide
Specify whether to use the U (UPDATE) lock when using repeatable read (RR) or read stability (RS) isolation to access a table. If you specify NO, the lock mode for operations with RR or RS is S (SHARE). If the cursor in your applications includes the clause FOR UPDATE OF, but updates are infrequent, S locks generally provide better performance. If you specify YES, the lock mode for operations with RR or RS is U. If your applications make frequent updates with repeatable read isolation, the U lock might provide greater concurrency than the S lock. However, applications that require high concurrency are almost always more efficient if they use cursor stability (CS) isolation. | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 9. X LOCK FOR SEARCHED U/D:
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 19 on panel DSNTIPB DSN6SPRM XLKUPDLT
Specify the locking method used when performing a searched UPDATE or DELETE. A value of NO means DB2 uses an S or U lock when scanning for qualifying rows. For any qualifying rows or pages the lock is upgraded to an X lock before performing the update or delete. For non-qualifying rows or pages the lock is released if using ISOLATION(CS). For ISOLATION(RS) or ISOLATION(RR), an S lock is retained on the rows or pages until the next commit point. Use this option to achieve higher rates of concurrency. A value of YES means DB2 gets an X lock on qualifying rows or pages. For ISOLATION(CS), the lock is released if the rows or pages are not updated or deleted. For ISOLATION(RS) or ISOLATION(RR), an X lock is retained until the next commit point. A value of YES is beneficial in a data sharing environment when most or all searched updates and deletes use an index. If YES is specified and searched updates or deletes result in a table space scan, the likelihood of timeouts and deadlocks greatly increases. 10. START IRLM CTRACE
Acceptable values: Default: Update: DSNZPxxx: NO or YES NO option 19 on panel DSTIPB
Specify whether the IRLM component traces should be activated when IRLM is started. The DB2-provided IRLM proc in DSNTIJMV is tailored according to this value. Specify No if you want IRLM to start only the low-activity subtraces EXP, INT, and XIT.
191
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Specify YES if you want IRLM to start with all its subtraces active. Starting all IRLM subtraces slightly impacts performance demand for ECSA storage, but improves serviceability. 11. IMS BMP TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 1-254 4 option 19 on panel DSNTIPB DSN6SPRM BMPTOUT
Specify the number of resource timeout values (field 3) that an IMS BMP connection waits for a lock to be released. For example, if you use the default value, an IMS BMP connection can wait 4 times the resource timeout value for a resource. This option gives you flexibility in tuning your system to avoid timeouts. For more information, see topic Installation options for wait times in Section 5 (Volume 2) of DB2 Administration Guide . In Version 5, acceptable values were 0-254, with a 0 meaning to use the default value of 4. 12. DL/I BATCH TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 1-254 6 option 19 on panel DSNTIPB DSN6SPRM DLITOUT
Specify the number of resource timeout values (field 3) that a DL/I batch connection waits for a lock to be released. For example, if you use the default value, a DL/I batch application can wait 6 times the resource timeout value for a resource. This option gives you flexibility in tuning your system to avoid timeouts. For more information, see topic Installation options for wait times in Section 5 (Volume 2) of DB2 Administration Guide . In Version 5, acceptable values were 0-254, with a 0 meaning to use the default value of 6. 13. RETAINED LOCK TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 0-254 0 option 19 on panel DSNTIPB DSN6SPRM RETLWAIT
This value is of importance only in a data sharing environment. This value lets you indicate how long a transaction should wait for a lock on a resource if another DB2 in the data sharing group has failed and is holding an incompatible lock on that resource. Locks held by failed DB2 members are called retained locks. For more information, see DB2 Data Sharing: Planning and Administration. The value you use is a multiplier that is applied to the connection's normal timeout value. For example, if the retained lock multiplier is 2, then the timeout period for a call attachment connection that is waiting for a retained lock is 1 2 (1 for the normal CAF timeout period, 2 for the additional time specified for retained locks).
192
Installation Guide
If you use the default, 0, then applications do not wait for incompatible retained locks, but instead the lcok request is immediately rejected and the application receives a resource unavailable SQLCODE. | | In Version 5, acceptable values were YES and NO. YES corresponds to a 1, and NO corresponds to a 0.
193
DSNTIPJ ===> _
Enter data below: 1 2 3 4 5 CROSS MEMORY ===> MAXIMUM ECSA ===> LOCKS PER TABLE(SPACE)===> LOCKS PER USER ===> DEADLOCK TIME ===> NO 6M 1 1 5 Local storage and cross memory use Control block storage (1M-999M) Maximum before lock escalation Maximum before resource unavailable Detection interval in seconds
For DB2 data sharing ONLY enter data below: 6 7 8 9 DEADLOCK CYCLE MEMBER IDENTIFIER IRLM XCF GROUP NAME LOCK ENTRY SIZE DISCONNECT IRLM ENTER to continue ===> ===> ===> ===> ===> 1 1 DXRGROUP 2 YES Number of LOCAL cycles before GLOBAL Member ID for this IRLM (1-255) Name of IRLM XCF group Initial allocation, in bytes (2,4,8) Disconnect automatically (YES, NO) HELP for more information
PRESS:
RETURN to exit
1. CROSS MEMORY
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO edit IRLM start procedure none
| |
Specify whether the IRLM uses the cross-address-space program call. This parameter determines where the IRLM lock control block structure is stored. NO puts the IRLM lock control block structure in the extended common storage area (ECSA). This requires less processor time but can reduce the range of addresses available to private address spaces. With PC=NO, the MAXIMUM ECSA parameter is active and limits the amount of CSA and ECSA used by IRLM for the lock control block structure. YES puts the lock control block structure in the IRLM private address space, and the program call instruction is used to address to the structure. IRLM still uses CSA and ECSA for other purposes. With PC=YES, the MAXIMUM ECSA option is ignored. See Common service area on page 47 for more information about how DB2 uses this field. IRLM PROC parameter: PC
| |
194
Installation Guide
2. MAXIMUM ECSA |
Acceptable values: Default: Update: DSNZPxxx: 1M-999M 6M edit IRLM start procedure none
| |
Specify the maximum amount of common service area (CSA) and extended CSA (ECSA) the IRLM for this DB2 uses for its lock control block structure. IRLM is not prevented from using additional CSA and ECSA for other purposes. You can enter the value in bytes (such as 5242880), or use the abbreviations K for kilobytes and M for megabytes. Make sure you set this value high enough so that IRLM does not reach the limit. IRLM only gets storage as it needs it, so it is better to put a larger value than you think you might need in here. You can also change the value dynamically by using the MVS command MODIFY irlmproc,SET,CSA. See Common service area on page 47 for more information about how IRLM uses storage. IRLM PROC parameter: MAXCSA 3. LOCKS PER TABLE(SPACE)
Acceptable values: Default: Update: DSNZPxxx: 0-50000 1000 field 20 on panel DSNTIPB DSN6SPRM NUMLKTS
This value becomes the default value (SYSTEM) for the LOCKMAX clause of the SQL statements CREATE TABLESPACE and ALTER TABLESPACE. For more information on how this parameter functions, see Section 5 (Volume 2) of DB2 Administration Guide. 4. LOCKS PER USER
Acceptable values: Default: Update: DSNZPxxx: 0-100000 10000 option 20 on panel DSNTIPB DSN6SPRM NUMLKUS
Specify the maximum number of page, row, or LOB locks that a single application can hold concurrently on all table spaces. The maximum includes locks on data pages, index pages, subpages, and rows that the program acquires when it accesses table spaces. The limit applies to all table spaces defined with the LOCKSIZE PAGE, LOCKSIZE ROW, or LOCKSIZE ANY options. 0 means that there is no limit to the number of page and row locks a program can acquire. DB2 assumes that 250 bytes of storage are required for each lock. If you specify NO for field 1, change the default value for this field to consider the available lock space. If you define referential constraints between tables, you might want a higher value for this field. For more information, see Section 5 (Volume 2) of DB2 Administration Guide.
195
5. DEADLOCK TIME |
Acceptable values: Default: Update: DSNZPxxx: 1-5 5 edit IRLM start procedure none
Specify the time, in seconds, of the local deadlock detection cycle. Depending on the value that you enter, IRLM might substitute a smaller maximum value. The value specified for this field must be less than the value specified for RESOURCE TIMEOUT, field 3 on installation panel DSNTIPI. Otherwise, time-out detection supersedes deadlock detection. A deadlock is a situation where two or more requesters are waiting for resources held by the other. Deadlock detection is the procedure by which a deadlock and its participants are identified. IRLM PROC parameter: DEADLOK 6. DEADLOCK CYCLE |
Acceptable values: Default: Update: DSNZPxxx: 1 1 edit IRLM start procedure none
This option is used only for DB2 data sharing. The value is the number of local deadlock cycles that must expire before the IRLM performs global deadlock detection processing. IRLM PROC parameter: DEADLOK 7. MEMBER IDENTIFIER |
Acceptable values: Default: Update: DSNZPxxx: 1-255 1 edit IRLM start procedure none
| |
Specify an ID number that uniquely names this IRLM member within an IRLM data sharing group. Recommendation: Correlate the IRLM member ID with the DB2 member name. For example, for DB2 member DSN1, specify an IRLM member ID of 1. Note that this IRLM ID does not relate directly to the limit of IRLM members that can be in the data sharing group. That limit is determined by the current hardware limits (currently 32). If you edit the irlmproc directly, you can specify a value from 1 to 255. See DB2 Command Reference for the irlmproc command information. This option is used only for DB2 data sharing. IRLM PROC parameter: IRLMID
| | | |
196
Installation Guide
Specify the name of the IRLM group. This name must be different from the DB2 group name. Recommendation: Begin this name with DXR. All members in the DB2 group must have the same IRLM XCF group name. This option is used only for DB2 data sharing. To avoid names that IBM uses for its MVS cross-system coupling facility (XCF) groups, the first character must be an upper-case letter J-Z unless the name begins with DXR . Do not use SYS as the first three characters, and do not use UNDESIG as the group name. IRLM PROC parameter: IRLMGRP 9. LOCK ENTRY SIZE
Acceptable values: Default: Update: DSNZPxxx: 2, 4, 8 2 edit IRLM start procedure none
Specify the initial size, in bytes, of individual lock entries in the lock table portion of the lock structure. To make the most efficient use of coupling lock structure space, use the default value. DB2 converts the value for LOCK ENTRY SIZE to a corresponding value for the IRLM parameter MAXUSRS as shown in Table 40.
Table 40. Converting lock entry size to maxusrs values LOCK ENTRY SIZE 2 4 8 MAXUSRS value 7 23 32
Specify whether IRLM should disconnect automatically from the data sharing group when DB2 is not identified to it. The default, YES, causes IRLM to disconnect from the data sharing group when DB2 is stopped normally or as the result of a DB2 failure. When you specify YES is conjunction with AUTOSTART YES (on panel DSNTIPI), there is no manual intervention required to stop IRLM.
197
If you specify NO, IRLM remains connected to the data sharing group even when DB2 is stopped. You must explicitly stop IRLM to bring it down. With NODISCON, there is less impact on other systems when a DB2 fails because MVS is not required to perform certain recovery actions that it normally performs when IRLM comes down. NODISCON can also mean that DB2 restarts more quickly after a DB2 normal or abnormal termination because it does not have to wait for IRLM to rejoin the IRLM data sharing group. IRLM PROC parameter: SCOPE
198
Installation Guide
DSNTIPP ===> _
Enter data below: 1 2 3 4 5 6 7 8 9 ARCHIVE LOG RACF ===> USE PROTECTION ===> SYSTEM ADMIN 1 ===> SYSTEM ADMIN 2 ===> SYSTEM OPERATOR 1 ===> SYSTEM OPERATOR 2 ===> UNKNOWN AUTHID ===> RESOURCE AUTHID ===> BIND NEW PACKAGE ===> PLAN AUTH CACHE ===> PACKAGE AUTH CACHE===> ROUTINE AUTH CACHE===> ENTER to continue NO YES SYSADM SYSADM SYSOPR SYSOPR IBMUSER SYSIBM BINDADD 1 24 32K 32K RACF protect archive log data sets DB2 authorization enabled. YES or NO Authid of system administrator Authid of system administrator Authid of system operator Authid of system operator Authid of default (unknown) user Authid of Resource Limit Table creator Authority required: BINDADD or BIND Size in bytes per plan ( - 4 96) Global - size in bytes ( -2M) Global - size in bytes ( -2M) HELP for more information
1 11 12
PRESS:
RETURN to exit
Specify whether archive log data sets are to be protected with individual profiles with the Resource Access Control Facility (RACF) when they are created. If you use YES, RACF protection must be active for DB2. However, a value of YES also means that you cannot use RACF generic profiles for archive log data sets. In addition, RACF class TAPEVOL must be active if your archive log is on tape.
199
Otherwise, the off-load will fail. For information about using RACF, see Section 3 (Volume 1) of DB2 Administration Guide. 2. USE PROTECTION
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES option 21 on panel DSNTIPB DSN6SPRM AUTH
Specify whether DB2 will perform authorization checking. NO disables all authorization checking in DB2 and disables the GRANT statement (granting every privilege to PUBLIC); it is not recommended. 3. SYSTEM ADMIN 1
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters, the first a letter SYSADM option 21 in panel DSNTIPB DSN6SPRM SYSADM
Specify the first of two authorization IDs with installation SYSADM authority. The two users with installation SYSADM authority are permitted access to DB2 in all cases. For the implications of this authority, and to understand REVOKE implications when changing this field, see Section 3 (Volume 1) of DB2 Administration Guide. 4. SYSTEM ADMIN 2
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters, the first a letter SYSADM option 21 on panel DSNTIPB DSN6SPRM SYSADM2
Specify the second of two authorization IDs with installation SYSADM authority; see field 8. If blanked, the value is set to the value of field 8. 5. SYSTEM OPERATOR 1
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters, the first a letter SYSOPR option 21 on panel DSNTIPB DSN6SPRM SYSOPR1
Specify the first of two authorization IDs with installation SYSOPR authority. The two users with installation SYSOPR authority are permitted access to DB2 even if the DB2 catalog is unavailable. For the implications of this authority, see Section 3 (Volume 1) of DB2 Administration Guide. If blanked, the value is set to the value of field 8.
200
Installation Guide
6. SYSTEM OPERATOR 2
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters, the first a letter SYSOPR option 21 on panel DSNTIPB DSN6SPRM SYSOPR2
Specify the second of two system operators with installation SYSOPR authority; see field 10. If blanked, the value will be set to the value of field 10. 7. UNKNOWN AUTHID
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters, the first a letter IBMUSER option 21 on panel DSNTIPB DSN6SPRM DEFLTID
Specify the authorization ID used if RACF is not available for batch access and USER= is not specified in the job statement. Null is not a valid value. 8. RESOURCE AUTHID
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters SYSIBM option 21 on panel DSNTIPB DSN6SYSP RLFAUTH
Specify the authorization ID used if you plan to use the resource limit facility (governor). Null is not a valid value. 9. BIND NEW PACKAGE
Acceptable values: Default: Update: DSNZPxxx: BINDADD, BIND BINDADD option 21 on panel DSNTIPB DSN6SPRM BINDNV
Specify whether BIND or BINDADD authority is required to BIND a new version of an existing package. If you accept the default, BINDADD, you allow only users with the BINDADD system privilege to create a new package. If you specify BIND, you allow users with the BIND privilege on a package or collection to create a new version of an existing package when they bind it. You also allow users with PACKADM authority to add a new package or a new version of a package to a collection. See Section 3 (Volume 1) of DB2 Administration Guide for a full description of the privileges needed to bind a new package. 10. PLAN AUTH CACHE
Acceptable values: Default: Update: DSNZPxxx: 0-4096 in multiples of 256 1024 option 21 on panel DSNTIPB DSN6SPRM AUTHCACH
Specify the size of the authorization cache to be used if no CACHESIZE is specified on the BIND PLAN subcommand. Choose 0 if you do not want to use an
201
authorization cache. For an authorization cache, you need 32 bytes of overhead + (8 bytes of storage number of concurrent users). See Section 3 (Volume 1) of DB2 Administration Guide for more information about cache size. 11. PACKAGE AUTH CACHE
Acceptable values: Default: Update: DSNZPxxx: 0-2M 32K option 21 on panel DSNTIPB DSN6SPRM CACHEPAC
Specify how much storage to allocate for the caching of package authorization information for all packages on this DB2 member. 32KB is enough storage for about 375 collection-ID.package-IDs. The cache is stored in the DSN1DBM1 address space. | | | | | | | | | 12. ROUTINE AUTH CACHE
Acceptable values: Default: Update: DSNZPxxx: 0-2M 32K option 21 on panel DSNTIPB DSN6SPRM CACHERAC
Specify how much storage to allocate for the caching of routine authorization information for all routines on this DB2 member. Routines include stored procedures and user-defined functions. 32K bytes is enough storage for about 380 schema.routine.type entries.
202
Installation Guide
DSNTIPM ===>
Check data and reenter to change: 1 2 3 4 5 6 7 8 9 SUBSYSTEM NAME COMMAND PREFIX SUBSYSTEM MEMBER SUBSYSTEM SEQUENCE AUTH MEMBER AUTH SEQUENCE LINK LIST ENTRY LINK LIST SEQUENCE COMMAND SCOPE ===> ===> ===> ===> ===> ===> ===> ===> ===> DSN1 -DSN1 88888888 88888888 88888888 STARTED Name for connecting to DB2 DB2 subsystem command prefix xx in IEFSSNxx Sequence number for insertion xx in IEAAPFxx APF member name Sequence number for insertion xx in LNKLSTxx for DSNLINK Sequence number for insertion SYSTEM, SYSPLEX, or STARTED
PRESS:
ENTER to continue
RETURN to exit
1. SUBSYSTEM NAME
Acceptable values: Default: Update: DSNHDECP: 1-4 characters. First must be A-Z, #, $, or @. Others must be A-Z, 1-9, #, $, or @. DSN1 see above SSID
Specify the MVS subsystem name for DB2. The name is used in member IEFSSNxx of SYS1.PARMLIB.
203
2. COMMAND PREFIX
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters. First one must be a non-alphanumeric character. -DSN1 (hyphen concatenated with subsystem name) see 203 none
Specify the DB2 command prefix. When the prefix appears at the beginning of a command entered at an MVS operator's console, MVS passes the command to DB2 for processing. The command prefix is used in the DB2 entry of member IEFSSNxx of SYS1.PARMLIB. The first character of the command prefix must be a character in Table 41. The remaining characters of the command prefix must be from Table 41, A-Z, or 0-9.
Table 41. Allowable special characters for the command prefix
Name cent sign period less than sign plus sign vertical bar ampersand 1 exclamation point dollar sign asterisk right parenthesis semi-colon hyphen slash percent sign underscore question mark colon number sign at sign apostrophe 2. equal sign quotation marks Character . < + | & ! $ * ) ; / % _ ? : # @ ' = " Hexadecimal Representation X'4A' X'4B' X'4C' X'4E' X'4F' X'50' X'5A' X'5B' X'5C' X'5D' X'5E' X'60' X'61' X'6C' X'6D' X'6F' X'7A' X'7B' X'7C' X'7D' X'7E' X'7F'
1. To use the ampersand (&), accept the default in this field, then edit job DSNTIJMV and specify the ampersand as the command prefix. 2. To use the apostrophe ('), you must code two consecutive apostrophes in your IEFSSNxx member. For example, the entry for subsystem DB2A with a command prefix of 'DB2A and a scope of started looks like this: DB2A,DSN3INI,'DSN3EPX,''DB2A,'
204
Installation Guide
3. To use the equal sign (=), accept the default command prefix, then edit job DSNTIJMV and replace the dash () with the equal sign as the first character of the command prefix. Do not use the JES2 backspace character as a command prefix character. Do not assign a command prefix that is used by another subsystem or that can be interpreted as belonging to more than one subsystem or MVS application. Specifically, do not specify a multiple-character command prefix that is a subset or a superset of another command prefix beginning from the first character. For example, it is invalid to assign '-' to one subsystem and '-DB2A' to another. Similarly, it is also invalid to assign '?DB2' to one subsystem and '?DB2A' to another. It is valid to assign '-DB2A' and '-DB2B' to different DB2 subsystems. To use multiple-character command prefixes, have the system programmer update the IEFSSNxx subsystem definition statements in SYS1.PARMLIB. For more information about the SYS1.PARMLIB IEFSSNxx statement see DSNTIJMV updates to SYS1.PARMLIB on page 252. 3. SUBSYSTEM MEMBER
Acceptable values: Default: Update: DSNZPxxx: 2 alphanumeric characters 00 see page 203 none
# # #
Specify the last two characters (xx) of the name of member IEFSSNxx of SYS1.PARMLIB. The subsystem member name indicates the available MVS subsystems, including DB2 and the IRLM. 4. SUBSYSTEM SEQUENCE
Acceptable values: Default: Update: DSNZPxxx: 1-99999995 88888888 see page 203 none
Specify any number greater than the highest sequence number already used in the IEFSSNxx PARMLIB member. 5. AUTH MEMBER
Acceptable values: Default: Update: DSNZPxxx: 2 alphanumeric characters 00 see page 203 none
Specify the last two characters (xx) of the name of member IEAAPFxx of SYS1.PARMLIB. This member is used for authorized program facility (APF) authorization of the prefix.SDSNLOAD, prefix.SDSNLINK, and prefix.SDSNEXIT libraries. This data set must be APF-authorized. The member name must currently exist for the MVS update job DSNTIJMV to function correctly. If you are using MVS/ESA Version 4 Release 3, you might use the PROGxx member instead of the IEAAPFxx member. In this case, you must manually name the PROGxx member because job DSNTIJMV does not do it for you.
205
6. AUTH SEQUENCE
Acceptable values: Default: Update: DSNZPxxx: 1-99999995 88888888 see page 203 none
Specify any number greater than the highest sequence number already used in the IEAAPFxx PARMLIB member. 7. LINK LIST ENTRY
Acceptable values: Default: Update: DSNZPxxx: 2 alphanumeric characters 00 see page 203 none
Specify the last two characters of LNKLSTxx as needed to include the prefix.SDSNLINK library. 8. LINK LIST SEQUENCE
Acceptable values: Default: Update: DSNZPxxx: 1-99999999 88888888 see page 203 none
Specify any number greater than the highest sequence number already used in the LNKLSTxx PARMLIB member. 9. COMMAND SCOPE
Acceptable values: Default: DSNZPxxx: SYSTEM, SYSPLEX, STARTED STARTED none
Specify the scope of the command prefix. SYSTEM The scope of commands is for one MVS system. The command prefix is registered at MVS IPL. SYSPLEX The scope of commands is for the entire Sysplex. The command prefix is registered at MVS IPL. STARTED The scope of commands is for the entire Sysplex. The command prefix is registered at DB2 startup, and deregistered when DB2 stops. Although STARTED specifies a Sysplex scope, it can be used for a DB2 in a non-data-sharing environment as well. Use STARTED if you intend to use MVS's automatic restart manager, or if you might move this DB2 into a data sharing group.
206
Installation Guide
DSNTIPL ===> _
Enter data below: 1 2 3 4 5 6 NUMBER OF LOGS OUTPUT BUFFER WRITE THRESHOLD ARCHIVE LOG FREQ UPDATE RATE LOG APPLY STORAGE ===> ===> ===> ===> ===> ===> 3 4 2 24 36 M K Number data sets per active log copy (2-31) Size in bytes (4 K-4 K) Buffers filled before write (1-256) Hours per archive run Updates, inserts, and deletes per hour Maximum ssnmDBM1 storage in MB for fast log apply ( -1 M)
| | |
PRESS:
ENTER to continue
RETURN to exit
1. NUMBER OF LOGS
Acceptable values: Default: Update: DSNZPxxx: 2-31 3 cannot change during update none
# # # | | | | |
Specify the number of data sets for each copy of the active log. If you use the DSNJU003 utility to modify the number of logs, your modified value is not reflected on this panel. See Updating other parameters on page 248 for details. 2. OUTPUT BUFFER
Acceptable values: Default: Update: DSNZPxxx: 40K-400000K 4000K option 23 on panel DSNTIPB DSN6LOGP OUTBUFF
Specify the size of the output buffer used for writing active log data sets. You can enter the value in bytes (for example, 40960) or use the abbreviation K for kilobytes (for example, 40K). The larger the output buffer, the more likely a requested RBA can be found without a read request.
207
3. WRITE THRESHOLD
Acceptable values: Default: Update: DSNZPxxx: 1-256 20 option 23 on panel DSNTIPB DSN6LOGP WRTHRSH
Specify the number of buffer pages to be filled before starting a write. The larger the WRITE THRESHOLD value, the less often the contents of the output buffer are written to the active log. Recommendation: Do not exceed 20 percent of the total number of buffer pages so that DB2 will not have to wait for an available buffer. | 4. ARCHIVE LOG FREQ
Acceptable values: Default: Update: DSNZPxxx: 1-200 24 cannot change during update none
Estimate the interval in hours at which the active log is off-loaded to the archive log. If you accept the default value of 24, the active log is off-loaded about once each day. | 5. UPDATE RATE
Acceptable values: Default: Update: DSNZPxxx: 1-16M 3600 cannot change during update none
Estimate the number of inserts, updates, and deletes expected per hour in your subsystem. The size calculations in the DSNTINST CLIST assume that about 400 bytes of data are logged for each insert, update, and delete. The amount of data logged for these changes might be different at your site. Therefore, consider changing the size of the log data sets after you gain some experience with DB2 and have a better idea of how many bytes of data are logged for each change. Generally, if you have a subsystem that is tuned for maximum efficiency, you can expect to log about ten gigabytes of data per hour while processing several millions of updates and inserts. Together, the UPDATE RATE and the ARCHIVE LOG FREQ (field 5) determine the size of the active logs. | | | | | | | | | 6. LOG APPLY STORAGE
Acceptable values: Default: Update: DSNZPxxx: 0-100M 0M option 23 on panel DSNTIPB DSN6SYSP LOGAPSTG
The value in this field represents the maximum ssnmDBM1 storage that can be used by the fast log apply process. The default value is 0 MB, which means that fast log apply is disabled except during DB2 restart. During DB2 restart fast log apply is always enabled.
208
Installation Guide
DSNTIPA INSTALL DB2 - ARCHIVE LOG DATA SET PARAMETERS ===> _ Enter data below: 1 2 3 4 5 6 7 8 9 1 11 12 ALLOCATION UNITS PRIMARY QUANTITY SECONDARY QTY. CATALOG DATA DEVICE TYPE 1 DEVICE TYPE 2 BLOCK SIZE READ TAPE UNITS DEALLOC PERIOD RECORDING MAX WRITE TO OPER WTOR ROUTE CODE ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> ===> BLK NO TAPE 28672 2 1 YES 1,3,4 Blk, Trk, or Cyl Primary space allocation Secondary space allocation YES or NO to catalog archive data sets Unit name for COPY1 archive logs Unit name for COPY2 archive logs Rounded up to 4 96 multiple Maximum allocated read tape units Time interval to deallocate tape units Number of data sets recorded in BSDS Issue WTOR before mount for archive Routing codes for archive WTORs Days to retain archive log data sets Maximum quiesce interval (1-999) YES or NO for data compaction to exit HELP for more information
13 RETENTION PERIOD ===> 9999 14 QUIESCE PERIOD ===> 5 15 COMPACT DATA ===> NO PRESS: ENTER to continue RETURN
1. ALLOCATION UNITS
Acceptable values: Default: Update: DSNZPxxx: Blk, Trk, or Cyl Blk option 24 on panel DSNTIPB DSN6ARVP ALCUNIT
Specify the units in which primary and secondary space allocations are obtained. 2. PRIMARY QUANTITY
Acceptable values: Default: Update: DSNZPxxx: 1-9999999 blank option 24 on panel DSNTIPB DSN6ARVP PRIQTY
Specify the primary space allocation for a DASD data set, in units of ALCUNIT. If you use the default, the CLIST calculates this space using block size and size of the log. 3. SECONDARY QTY.
Acceptable values: Default: Update: DSNZPxxx: 1-9999999 blank option 24 on panel DSNTIPB DSN6ARVP SECQTY
209
Specify the secondary space allocation for a DASD data set, in units of ALCUNIT. If you use the default, the CLIST calculates this space using block size and size of the log. 4. CATALOG DATA
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 24 on panel DSNTIPB DSN6ARVP CATALOG
Specify whether archive log data sets are to be cataloged in the primary integrated catalog facility catalog. This option is only meaningful if you specify tape for the DEVICE TYPE 1 or DEVICE TYPE 2 fields on this panel, because DB2 requires that all archive log data sets allocated on DASD be cataloged. If you choose to archive to DASD, then the catalog option must be set to YES. If the catalog option is set to NO and you decide to place your archive log data sets on DASD, you receive message DSNJ072E each time an archive log data set is allocated, and the DB2 subsystem catalogs the data set. 5. DEVICE TYPE 1
Acceptable values: Default: Update: DSNZPxxx: device type or unit name TAPE option 24 on panel DSNTIPB DSN6ARVP UNIT
Specify the device type or unit name for storing archive log data sets. The value can be any alphanumeric string. If you choose to archive to DASD, you can specify a generic device type with a limited volume range. DB2 requires that all archive log data sets allocated on DASD be cataloged. If the device type specifies DASD, then set field 4 (CATALOG DATA) to YES. | | | | | If the unit name specifies DASD, the archive log data sets can extend to a maximum of 15 volumes. If the unit name specifies a tape device, DB2 can extend to a maximum of 20 volumes. If you chose to use DASD, make the primary and secondary space allocations (fields 2 and 3) large enough to contain all of the data coming from the active log data sets without extending beyond 15 volumes. 6. DEVICE TYPE 2
Acceptable values: Default: Update: DSNZPxxx: device type or unit name none option 24 on panel DSNTIPB DSN6ARVP UNIT2
Specify the device type or unit name for storing the second copy of archive log data sets (COPY2 data sets), as for field 5. 7. BLOCK SIZE
Acceptable values: Default: Update: DSNZPxxx: 8192-28672 28672 option 24 on panel DSNTIPB DSN6ARVP BLKSIZE
210
Installation Guide
Specify the block size of the archive log data set. The block size must be compatible with the device type you use for archive logs. The value is rounded up to the next multiple of 4096 bytes. You can also enter the value with a K; for example, 28K. If the archive log is written to tape, using the largest possible block size improves the speed of reading the archive logs. Use table Table 42 as a guide.
Table 42. Recommended block size values Archive log device Tape 3380 3390 or RAMAC Block size 28672 20480 24576
Specify the maximum number of dedicated tape units that can be allocated to read archive log tape volumes concurrently. This installation option, along with DEALLOC PERIOD, allows DB2 to optimize archive log reading from tape devices. In a data sharing environment the archive tape is not available to other members of the group until the deallocation period expires. You may not want to use this option in a data sharing environment unless all recover jobs are submitted from the same member. Recommendation: Set the READ TAPE UNITS value to be at least one less than the number of tape units available to DB2. If you do otherwise, the OFFLOAD process could be delayed, which would affect the performance of your DB2 subsystem. For maximum through-put during archive log processing, specify the largest value possible for this option keeping in mind that you need at least one tape unit for OFFLOAD processing. You can override this value by using the SET ARCHIVE command. 9. DEALLOC PERIOD
Acceptable values: Default: Update: DSNZPxxx: see below 0 option 24 on panel DSNTIPB DSN6LOGP DEALLCT
Specify the length of time an archive read tape unit is allowed to remain unused before it is deallocated. Use minutes, seconds (blank or 1-1439, blank or 0-59), 1440 (minutes), or NOLIMIT. Specifying NOLIMIT allows maximum optimization opportunities. When archive log data is being read from tape, the recommendation is that you set this value high enough to allow DB2 to optimize tape handling for multiple read applications. When all tape reading is complete, you can update this option with the SET ARCHIVE command.
211
Specify the maximum number of archive log volumes to be recorded in the BSDS. When this number is exceeded, recording resumes at the beginning of the BSDS. You must create image copies of all DB2 objects, probably several times, before the archive log data sets are discarded. If you fail to retain an adequate number of archive log data sets for all the image copies, you might have to cold start or reinstall DB2. In both cases, data is lost. For information about managing the log and determining how long to keep the logs, refer to Section 4 (Volume 1) of DB2 Administration Guide. 11. WRITE TO OPER
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES option 24 on panel DSNTIPB DSN6ARVP ARCWTOR
Specify whether to send a message to the operator and wait for an answer before attempting to mount an archive log data set. Other DB2 users can be forced to wait while the mount is pending. They are not affected while DB2 is waiting for a response to the message. Specify NO if you use a device, such as DASD, that does not have long delays for mounts. Specify YES if you use a device for storing archive log data sets, such as tape, that requires long delays for mounts. Field 5 (DEVICE TYPE 1) specifies the device type or unit name. 12. WTOR ROUTE CODE
Acceptable values: Default: Update: DSNZPxxx: see below 1,3,4 option 24 on panel DSNTIPB DSN6ARVP ARCWRTC
Specify the list of route codes from messages from the archive log data sets to the operator. You can specify from 1 to 16 route codes. Separate numbers in the list by commas only, not by blanks. For descriptions of the routing codes, see OS/390 MVS System Codes. The routing codes are also discussed in the description of the WTO macro in OS/390 MVS Programming: Assembler Services Reference. 13. RETENTION PERIOD
Acceptable values: Default: Update: DSNZPxxx: 0-9999 9999 option 24 on panel DSNTIPB DSN6ARVP ARCRETN
212
Installation Guide
Specify the number of days that DB2 is to retain archive log data sets. The retention period is often used in tape management systems to control the reuse and scratching of data sets and tapes. DB2 uses the value as the value for the dynamic allocation parameter DALRETPD when archive log data sets are created. The retention period set by DFSMSdfp's storage management subsystem (SMS) can be overridden by this DB2 parameter. Typically, the retention period is set to the smaller value specified by either DB2 or SMS. The storage administrator and database administrator should agree on a retention period value that is appropriate for DB2. The retention period is added to the current date to calculate the expiration date. Attention: Due to the wide variety of tape management systems and the opportunity for external manual overrides of retention periods, DB2 does not have an automated method to delete the archive log data sets from the BSDS inventory of archive log data sets. Therefore, the information about an archive log data set might be in the BSDS long after it has been scratched by a tape management system after its retention period expired. Conversely, the maximum number of archive log data sets can have been exceeded (see field 8), and the data from the BSDS dropped long before the data set has reached its expiration data. For information about the archive log data sets and how they can be managed using the change log inventory utility (DSNJU003), refer to Section 4 (Volume 1) of DB2 Administration Guide. 14. QUIESCE PERIOD
Acceptable values: Default: Update: DSNZPxxx: 0-999 5 option 24 on panel DSNTIPB DSN6ARVP QUIESCE
Specify the maximum amount of time (in seconds) DB2 is allowed to attempt a full system quiesce. This parameter requires some tuning. If you specify too short an interval, the quiesce period expires before a full quiesce is accomplished. If you specify too long an interval, the quiesce period could cause unnecessary DB2 lock contention and time-outs. For more information on the quiesce mode of the Archive Log command, see Section 4 (Volume 1) of DB2 Administration Guide. 15. COMPACT DATA
Acceptable values: Default: Update: DSNZPxxx: YES or NO NO option 24 on panel DSNTIPB DSN6ARVP COMPACT
Specify whether data written to archive logs should be compacted. This option only applies to data written to a 3480 device that has the improved data recording capability (IDRC) feature. When this feature is turned on, hardware in the tape control unit writes data at a much higher density than normal, allowing for more
213
data on a volume. Specify NO if you do not use a 3480 device with the IDRC feature or a 3490 base model, with the exception of the 3490E. Specify YES if you want the data to be compacted. If you use compression or auto-blocking on the tape unit, you will need to ensure that you do not read backwards on the tape unit. You can do this by increasing the size and number of active log data sets and by monitoring long running units of recovery with the UR CHECK FREQ (panel DSNTIPN) or another monitor. The alternative to monitoring the units of work and increasing active log space is archiving to disk and then using another facility, such as DFSMShsm to archive the archive log from disk to tape. Be aware that data compressed to tape can only be read using a device that supports the IDRC feature. This could be a concern when you send archive tapes to another site for remote recovery.
214
Installation Guide
DSNTIPS ===> _
Enter data below: 1 ===> RESTART RESTART or DEFER the objects named below. The objects to restart or defer can be ALL in item 2, a database name, or database name.space name. ==> ALL ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ENTER to continue 14 15 16 17 18 19 2 21 22 23 24 25 ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> RETURN to exit 26 27 28 29 3 31 32 33 34 35 36 37 ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==> ==>
2 3 4 5 6 7 8 9 1 11 12 13
PRESS:
1. RESTART OR DEFER
Acceptable values: Default: Update: DSNZPxxx: RESTART, DEFER RESTART option 25 on panel DSNTIPB DSN6SPRM RESTART
Specify whether DB2 will restart or defer processing for the objects listed in fields 2 through 37 when DB2 is started. RESTART causes DB2 to perform restart processing for the objects listed. DEFER causes DB2 not to perform restart processing for the objects. 2 - 37. START NAMES
Acceptable values: Default: Update: DSNZPxxx: ALL, space names ALL option 25 on panel DSNTIPB DSN6SPRM ALL
Specify the names of the databases, table spaces, and index spaces for which you want to control restart processing. Enter one of the following values for these fields: ALL on field 2 (leaving fields 3 - 37 blank) to restart or defer all DB2 databases and spaces. This is the default.
215
DEFER ALL defers recovery of all objects, including DB2 catalog objects. For information about the restart process and the implications of deferring objects at restart time, see Section 4 (Volume 1) of DB2 Administration Guide. Database name to restart or defer all spaces in that database. Table space or index space name in the format database-name.space-name to restart or defer the individual table or index space. You can specify up to 36 object names on this panel. If you want to control restart processing for more than 36 objects, edit job DSNTIJUZ after you run the CLIST and add the object names as ending positional parameters to macro DSN6SPRM. You can add up to 2500 object names in DSNTIJUZ.
216
Installation Guide
DSNTIPR ===> _
DSNT512I WARNING: ENTER UNIQUE NAMES FOR LUNAME AND LOCATION NAME Enter data below: 1 DDF STARTUP OPTION 2 DB2 LOCATION NAME 3 4 5 6 7 DB2 NETWORK LUNAME DB2 NETWORK PASSWORD RLST ACCESS ERROR RESYNC INTERVAL DDF THREADS ===> NO ===> LOC1 ===> ===> ===> ===> ===> ===> ===> ===> ===> NO LU1 NOLIMIT 2 ACTIVE NO, AUTO, or COMMAND The name other systems use to refer to this DB2 The name VTAM uses to refer to this DB2 Password for DB2's VTAM application NOLIMIT, NORUN, or 1-5 Minutes between resynchronization period Status of a qualifying database access thread after commit. ACTIVE or INACTIVE. Max number of type 1 inactive threads. Generic VTAM LU name for this DB2 subsystem or data sharing group. or seconds until dormant server ACTIVE thread will be terminated ( -9999) Allow change password and descriptive security error codes. YES or NO.
11 EXTENDED SECURITY
PRESS:
ENTER to continue
RETURN to exit
Specify whether or not to load DDF, and if DDF is loaded, how to start it. NO signifies that you do not want the DDF loaded at DB2 startup and that it cannot be started with a command. If you specify NO, the remaining fields on this panel are ignored and the stored procedures sample application and DDF sample jobs (DSNTEJ6S, DSNTEJ6P, DSNTEJ6, DSNTEJ6D, DSNTEJ6T, DSNTEJ63, DSNTEJ64, and DSNTEJ65 ) are not edited. AUTO specifies that this facility is automatically initialized and started when the DB2 subsystem is started. The DDF address space is started as part of DDF initialization.
# #
217
COMMAND specifies that the facility is initialized at DB2 startup and is prepared to receive the -DSN1 START DDF command. The DDF address space is started as part of DDF initialization. If AUTO or COMMAND is specified, the remaining fields are mandatory. The repository for the field names (LOCATION, LUNAME, and PASSWORD) is the bootstrap data set (BSDS). 2. DB2 LOCATION NAME
Acceptable values: Default: Update: DSNZPxxx: 1-16 alphanumeric characters LOC1 see Update on page 248 none
Specify the unique name which application requesters use to connect to this DB2 subsystem. The name must begin with a letter and must not contain special characters. Acceptable characters are A-Z, 0-9, and underscore. # You must specify a value, even if you do not use DDF. 3. DB2 NETWORK LUNAME
Acceptable values: Default: Update: DSNZPxxx: 1-8 alphanumeric characters LU1 see Update on page 248 none
Specify the logical unit name (LU name) for this DB2 subsystem. This name uniquely identifies this DB2 subsystem to VTAM. It is also used to uniquely identify logical units of work within DB2 trace records. The name must begin with a letter and must not contain special characters. You must specify a value. 4. DB2 NETWORK PASSWORD
Acceptable values: Default: Update: DSNZPxxx: 1-8 alphanumeric characters none see Update on page 248 none
If provided, this field specifies the password used by VTAM to recognize this DB2 subsystem. This password must then be supplied to VTAM on the VTAM APPL definition statement. The password must begin with a letter and must not contain special characters. 5. RLST ACCESS ERROR
Acceptable values: Default: Update: DSNZPxxx: NOLIMIT, NORUN, 1-5000000 NOLIMIT option 26 on panel DSNTIPB DSN6FAC RLFERRD
Specify what action DB2 takes if the governor encounters a condition that prevents it from accessing the resource limit specification table or if it cannot find a row in
218
Installation Guide
the table that applies to the authorization ID, the plan or package name, and the logical unit of work name of the query user. NOLIMIT allows all dynamic SQL statements to run without limit. NORUN terminates all dynamic SQL statements immediately with a SQL error code. A number from 1 to 5000000 is the default limit; if the limit is exceeded, the SQL statement is terminated. For guidelines in choosing the default limit, see Section 5 (Volume 2) of DB2 Administration Guide. For more information on using the governor for remote queries, see Section 5 (Volume 2) of DB2 Administration Guide. 6. RESYNC INTERVAL
Acceptable values: Default: Update: DSNZPxxx: 1-99 2 option 26 on panel DSNTIPB DSN6FAC RESYNC
Specify the time interval, in minutes, between resynchronization periods. A resynchronization period is the time during which indoubt logical units of work involving this DB2 subsystem and partner logical units are processed. 7. DDF THREADS
Acceptable values: Default: Update: DSNZPxxx: ACTIVE, INACTIVE ACTIVE option 26 on panel DSNTIPB DSN6FAC CMTSTAT
| | | | | | | | | | | | | | | |
Specify whether to make a thread active or inactive after it successfully commits or rolls back and holds no cursors. If you specify ACTIVE, then the thread remains active. This provides the best performance but consumes system resources. If your installation must support a large number of connections, specify INACTIVE. If you specify INACTIVE, then DB2 supports two different types of inactive threads: A type 1 inactive thread, which has the same characteristics as inactive threads available in releases prior to DB2 for OS/390 Version 6. A type 2 inactive thread, which uses less storage than a type 1 inactive thread.. Because they use less storage, type 2 inactive threads are more desirable than type 1 inactive threads. However, not all inactive threads can be of type 2 based on what type of operations the thread is performing, as summarized in Table 43 on page 220. If a thread is to become inactive, DB2 tries to make it a type 2 inactive thread. If DB2 cannot make it a type 2 inactive thread, it tries to make it a type 1 inactive thread. If neither attempt is successful, then the thread remains active.
219
| | | | | | | | | | | | |
Table 43. Requirements for type 1 and type 2 inactive threads If there is... a hop to another location a connection using DB2 private protocols a package bound with RELEASE(COMMIT) a package bound with RELEASE(DEALLOCATE) a held cursor, a held LOB locator, or a package bound with KEEPDYNAMIC(YES) Thread can be type 2 Yes No Yes Yes No Thread can be type 1 Yes Yes Yes No No
See Section 5 (Volume 2) of DB2 Administration Guide for more information about active and inactive threads. | | | | | | | | | | | | | | | | | | | | | 8. MAX TYPE 1 INACTIVE
Acceptable values: Default: Update: DSNZPxxx: 0 - value of MAX REMOTE CONNECTED 0 option 26 on panel DSNTIPB DSN6FAC MAXTYPE1
The value in this field specifies the number of type 1 inactive threads that DB2 allows. This limit is defined because a large number of type 1 inactive threads might adversely affect system performance. Type 1 inactive threads are used for private protocol. DRDA uses type 2 inactive threads. A value of zero indicates that type 1 inactive connections are not allowed. If a thread meets the requirement for being made a type 1 inactive thread and MAX TYPE 1 INACTIVE is zero, the thread remains active. A value of greater than zero indicates that type 1 inactive connections are allowed, but are limited to the spcified number. When a thread meets the requirement for being made a type 1 inactive thread, and MAX TYPE 1 INACTIVE is reached, the remote connection is terminated. If you want type 1 inactive connections to be allowed, set this value to the maximum number of concurrent connections that you want to allow to go inactive that access another remote location with three part names. A value equal to the value in field MAX REMOTE CONNECTED from panel DSNTIPE allows all remote threads to become type 1 inactive threads. 9. DB2 GENERIC LUNAME
Acceptable values: Default: DSNZPxxx: 1-8 alphanumeric characters none none
Specify a generic LUNAME to identify this DB2 subsystem or data sharing group in a network. You can only use a generic LU name if DB2 is running as part of an MVS Sysplex. Using a generic LUNAME helps you control the distributed workload
220
Installation Guide
among the servers in a data sharing group. Previously, you could associate only one LUNAME with a LOCATION name. Now, you can associate multiple NETID.LUNAME values with a single LOCATION name. When an application requests access to a particular LOCATION, DB2 uses the SYSIBM.LOCATIONS and SYSIBM.LULIST tables to find the available network destinations (LUNAMEs) for that LOCATION. See Chapter 3-1. Connecting distributed database systems on page 443 for more information about setting up a generic LU name. 10. IDLE THREAD TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 0-9999 0 option 26 on panel DSNTIPB DSN6FAC IDTHTOIN
Specify the approximate time, in seconds, that an active server thread is allowed to remain idle before it is canceled. The thread is canceled after the timeout value expires, releasing its locks and cursors. Inactive and indoubt threads are not subject to timeout. Because threads are checked every 3 minutes to see if they have exceeded the timeout value, timeout values of less than 3 minutes may not be honored for up to 3 minutes. Specifying 0 disables timeout processing. If you accept the default value, 0, DB2 continues to operate as it did prior to DB2 Version 6 . (Idle server threads remain in the system and continue to hold their resources, if any.) 11. EXTENDED SECURITY
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 26 on panel DSNTIPB DSN6SYSP EXTSEC
This field controls two related security options. If you specify YES: Detailed reason codes are returned to a DRDA level 3 client when a DDF connection request fails because of security errors. When using SNA protocols, the requester must have included a product that supports the extended security sense codes. One such product is DB2 Connect, Version 5 and subsequent releases. RACF users can change their passwords using the DRDA change password function. This support is only for DRDA level 3 requesters that have implemented support for changing passwords. We strongly recommend that you specify a value of YES. This allows properly enabled DRDA clients to determine the cause of security failures without requiring DB2 operator support. It also allows RACF users on properly enabled DB2 clients to change their passwords. Specifying NO returns generic error codes to the clients and prevents RACF users from changing their passwords.
221
DSNTIP5 ===>_
Enter data below: 1 2 3 4 5 6 7 8 9 DRDA PORT ===> TCP/IP port number for DRDA clients. 1-65534 (446 is reserved for DRDA) TCP/IP port for 2-phase commit. 1-65534 Accept requests containing only a userid (no password)? YES or NO Maximum extra query blocks when DB2 acts as a requester. -1 Maximum extra query blocks when DB2 acts as a server. -1 Protocol used for three-part name if not specified on BIND. DRDA or PRIVATE. Authorization at hop site. BOTH or RUNNER. ENABLE, DISABLE, or 1-65534 -9999 seconds HELP for more information
RESYNC PORT ===> TCP/IP ALREADY VERIFIED ===> NO EXTRA BLOCKS REQ EXTRA BLOCKS SRV DATABASE PROTOCOL ===> 1 ===> 1 ===> DRDA
AUTH AT HOP SITE ===> BOTH TCP/IP KEEPALIVE ===> ENABLE POOL THREAD TIMEOUT ===> 12 ENTER to continue
PRESS:
RETURN to exit
1. DRDA PORT
Acceptable values: Default: Update: DSNZPxxx: 1-65534 none option 27 on panel DSNTIPB none
# # # #
Specify the TCP/IP port number used for accepting TCP/IP connection requests from remote DRDA clients. If you are enabling data sharing, each member must have the same DRDA port number. You must specify a value to use TCP/IP. Leaving this field blank means that you are not using TCP/IP. A blank field is equivalent to using 0 in the Change Log Inventory (DSNJU003) utility. See Section 3 of DB2 Utility Guide and Reference for more information about the Change Log Inventory utility. 2. RESYNC PORT
Acceptable values: Default: Update: DSNZPxxx: 1-65534 none option 27 on panel DSNTIPB none
# # # #
Specify the TCP/IP port number used to process requests for 2-phase commit resynchronization. This value must be different than the value specified for DRDA PORT. If you are enabling data sharing, each member must have a unique resyncronization port. Leaving this field blank means that you are not using TCP/IP. A blank field is equivalent to using 0 in the Change Log Inventory (DSNJU003) utility. See Section 3 of DB2 Utility Guide and Reference for more information about the Change Log Inventory utility.
222
Installation Guide
Specify whether TCP/IP connection requests containing only a user ID (no password, RACF PassTicket, or DCE ticket) are accepted by DB2. YES means a connection request is accepted with a user ID only. This value must be the same for all members of a data sharing group. This option applies to all incoming requests using TCP/IP regardless of the requesting location. See Section 3 (Volume 1) of DB2 Administration Guide for more information. | | | | | | | | | | | | | | | | | | | | | | | | | # # # # | | | | 4. EXTRA BLOCKS REQ
Acceptable values: Default: Update: DSNZPxxx: 0-100 100 option 27 on panel DSNTIPB DSN6SYSP EXTRAREQ
The value in this field establishes an upper limit on the number of extra DRDA query blocks DB2 requests from a remote DRDA server. This does not limit the size of the SQL query answer set. It simply controls the total amount of data that can be transmitted on any given network exchange. 5. EXTRA BLOCKS SRV
Acceptable values: Default: Update: DSNZPxxx: 0-100 100 option 27 on panel DSNTIPB DSN6SYSP EXTRASRV
The value in this field establishes an upper limit on the number of extra DRDA query blocks DB2 returns to a DRDA client. This does not limit the size of the SQL query answer set. It simply controls the total amount of data that can be transmitted on any given network exchange. 6. DATABASE PROTOCOL
Acceptable values: Default: Update: DSNZPxxx: DRDA or PRIVATE DRDA option 27 on panel DSNTIPB DSN6SYSP DBPROTCL
The value in this field determines the default protocol (DRDA or PRIVATE) that is to be used when option DBPROTOCOL BIND is not explicitly specified for the bind of a plan or a package. If you selected INSTALL for field INSTALL TYPE on panel DSNTIPA1, the default value for DATABASE PROTOCOL is DRDA. If you selected MIGRATE for field INSTALL TYPE on panel DSNTIPA1, the default value for DATABASE PROTOCOL is PRIVATE. An application program might contain statements with three-part names, or aliases that reference remote objects. At bind or rebind of a plan, a user can specify whether these statements flow to the remote site using DB2 private protocol or DRDA protocol when communicating with the remote server.
223
| # # # # # # # # # # | | | | | | | | # # # # # # # # | | | | | | | | | | | | | | | | | | |
Choose a value of PRIVATE under either of the following conditions: Your DB2 Version 6 subsystem is in a data sharing group with DB2 subsystems that are at previous release levels, and you plan to bind plans or packages on the Version 6 subsystem. If you choose a default value of DRDA for your Version 6 data sharing member, and you use the BIND subcommand to bind plans or packages on the Version 6 member, those plans and packages are implicitly bound with the bind option DBPROTOCOL(DRDA), even though you did not specify that option. Those plans and packages become frozen objects at the DB2 Version 6 level and cannot be run on the DB2 members that are at previous levels. This is true whether or not the application uses three-part names. You do not plan to move applications that use three-part names to DRDA access immediately. To use DRDA access for applications with three-part names, you must bind packages for those applications at each location that the applications access, then bind all packages into a plan. If you cannot perform this activity immediately, and you want your applications to continue to work, you should specify PRIVATE for DATABASE PROTOCOL. See chapter 5 of DB2 Application Programming and SQL Guide for more information on moving applications from DB2 private protocol access to DRDA access. If you choose a value of DRDA, and your DB2 Version 6 subsystem is in a data sharing group with DB2 subsystems that are at previous release levels, you need to bind the plans for DB2-supplied applications such as SPUFI and DCLGEN with the DBPROTOCOL(PRIVATE) option so that those applications are accessible to other members of the data sharing group. The BIND commands for DB2-supplied applications are in job DSNTIJSG. For information on job DSNTIJSG, see Migration step 21: Bind SPUFI and DCLGEN and user maintained database activity: DSNTIJSG on page 316. 7. AUTH AT HOP SITE
Acceptable values: Default: Update: DSNZPxxx: BOTH or RUNNER BOTH option 27 on panel DSNTIPB DSN6SPRM HOPAUTH
The value in this field indicates whose authorization is checked at a second server (sometimes called a hop site) when the request is from a requester that is not DB2 for OS/390. This option applies only when private protocol is used for the hop from the second to third site. See topic Privileges exercised through a plan or package in Section 3 of DB2 Administration Guide for more information about authorization for distributed processing. BOTH, the default, means that the package owner's authorization is checked for static SQL, and the runner's authorization ID is checked for dyamic SQL. (In Version 5, this value was YES.) RUNNER means that both static and dynamic SQL use the runner's authorization. (In Verson 5, this value was NO.) 8. TCP/IP KEEPALIVE
Acceptable values: Default: ENABLE, DISABLE, or 1-65534 ENABLE
224
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Update: DSNZPxxx:
In cases where the TCP/IP KeepAlive value in the TCP/IP configuration is not appropriate for the DB2 subsystem, this field can be used as an override. The following values can be specified: ENABLE Do not override the TCP/IP KeepAlive configuration value. This is the default. DISABLE Disable KeepAlive probing for this subsystem. 1-65534 Override the TCP/IP KeepAlive configuration value with the number entered. This value is specified in seconds. Consider setting this value close to the IDLE THREAD TIMEOUT value on installation panel DSNTIPR or the IRLM RESOURCE TIMEOUT value on installation panel DSNTIPI. Avoid using very small values. KeepAlive detection is accomplished by probing the network based on the time entered in the KeepAlive parameter. A small KeepAlive value can cause excessive network traffic and system resource consumption. Maintain a proper balance that allows network failures to be detected on a timely basis yet does not severely impact system and network performance. See Section 5 (Volume 2) of DB2 Administration Guide for more information. 9. POOL THREAD TIMEOUT
Acceptable values: Default: Update: DSNZPxxx: 0-9999 120 option 27 on panel DSNTIPB DSN6FAC POOLINAC
Specify the approximate time, in seconds that a data base access thread (DBAT) can remain idle in the pool before it is terminated. A data base access thread in the pool counts as an active thread against MAX REMOTE ACTIVE and may hold locks, but does not have any cursors. Because threads are checked every 3 minutes to see if they have remained in the pool past the timeout limit, timeout values of less than 3 minutes may not be honored for up to 3 minutes. Specifying 0 causes a DBAT to terminate rather than go into the pool if there is a sufficient number of threads in the pool to process the number of type 2 inactive threads that currently exist.
225
DSNTIPX ===>_
Enter data below: 1 2 3 4 5 WLM PROC NAME DB2 PROC NAME NUMBER OF TCBS MAX ABEND COUNT TIMEOUT VALUE ===> ===> ===> ===> ===> ===> DSN1WLM DSN1SPAS 8 18 WLM-established stored procedure JCL PROC DB2-established stored procedure JCL PROC Number of concurrent TCBs (1-1 ) Allowable ABENDs for a routine ( -255) Seconds to wait before SQL CALL or function invocation fails (5-18 ,NOLIMIT) Default WLM environment name
6 WLM ENVIRONMENT
PRESS:
ENTER to continue
RETURN to exit
Specify a name for the stored procedures JCL procedure that is generated during installation. This procedure is used for a WLM-established stored procedures address space. If you blank out the name, the JCL procedure is still generated. 2. DB2 PROC NAME
Acceptable values: Default: DSNZPxxx: 1-8 alphanumeric characters ssnSPAS DSN6SYSP STORPROC
# #
Specify a name for the JCL procedure that is used to start the DB2-established address space. If you replace the default value with blanks, you cannot start the DB2-established stored procedures address space until you update the subsystem parameter. In addition, you cannot edit the stored procedures sample jobs, DSNTEJ6S, DSNTEJ6P, DSNTEJ6T, DSNTEJ6D, DSNTEJ63, DSNTEJ64, and DSNTEJ65 . 3. NUMBER OF TCBS
226
Installation Guide
1-100 8 none
| | | | |
Specify how many SQL CALL statements or user-defined invocations can be processed concurrently in one address space. The larger the value, the more stored procedures and user-defined functions you can run concurrently in one address space. For information about how this value affects storage below the 16MB line, see Section 5 (Volume 2) of DB2 Administration Guide. 4. MAX ABEND COUNT
Acceptable values: Default: Update: DSNZPxxx: 0-225 0 option 28 on panel DSNTIPB DSN6SYSP STORMXAB
| | | | | |
Specify the number of times a stored procedure or an invocation of a user-defined function is allowed to terminate abnormally, after which SQL CALL statements for the stored procedure or user defined function are rejected. The default, 0, means that the first abend of a stored procedure or user defined function causes SQL CALLs to that procedure or function to be rejected. For production systems, you should accept the default. 5. TIMEOUT VALUE
Acceptable values: Default: Update: DSNZPxxx: 5-1800 180 option 28 on panel DSNTIPB DSN6SYSP STORTIME
| | | | | | | | | | | | | | | | | | | |
Specify the number of seconds before DB2 ceases to wait for an SQL CALL or invocation of a user-defined function to be assigned to one of the task control blocks (TCBs) in a DB2 stored procedures address space. If the time interval expires, the SQL statement fails. The default is a reasonable waiting time for most sites. You might want to choose a higher value if your system has long queues. You might want to choose a lower value if you want to minimize the waiting time for end-user requests. The NOLIMIT value means that DB2 waits indefinitely for the SQL request to complete, while the thread is active. Generally, you do not want to select the NOLIMIT value because if the stored procedure address space is down for some reason or the user defined function does not complete, your SQL request is hung until the request is satisfied or the thread is canceled. 6. WLM ENVIRONMENT
Acceptable values: Default: Update: DSNZPxxx: Any valid name from 1-18 characters option 28 on panel DSNTIPB DSN6SYSP WLMENV
The value in this field specifies the name of the WLM_ENVIRONMENT to use for a user-defined function or stored procedure when a value is not given for the WLM_ENVIRONMENT option on the CREATE FUNCTION or CREATE PROCEDURE statements.
227
| |
Changing this value does not change existing routines because the value is stored in the catalog when the function or procedure is created.
228
Installation Guide
DSNTIPZ ===>
Enter data below: 1 INSTALL DD CONTROL SUPT. ===> NO 2 CONTROL ALL APPLICATIONS ===> 3 REQUIRE FULL NAMES ===> 4 UNREGISTERED DDL DEFAULT ===> YES - activate the support NO - omit DD control support NO YES or NO YES YES or NO ACCEPT Action for unregistered DDL: ACCEPT - allow it REJECT - prohibit it APPL - consult ART Used in ART/ORT Searches DSNRGCOL Qualifier for ART and ORT DSNRGFDB Database name DSN_REGISTER_APPL Table name DSN_REGISTER_OBJT Table name
5 6 7 8 9
ART/ORT ESCAPE CHARACTER REGISTRATION OWNER REGISTRATION DATABASE APPL REGISTRATION TABLE OBJT REGISTRATION TABLE
Note: ART = Application Registration Table ORT = Object Registration Table PRESS: ENTER to continue RETURN to exit HELP for more information
Specify whether or not to install data definition control support. If NO is specified, DDL statements are not validated by this support. The application registration table and object registration table are still created according to values entered in fields 5 through 8. 2. CONTROL ALL APPLICATIONS
Acceptable values: Default: Update: DSNZPxxx: YES, NO NO option 29 on panel DSNTIPB DSN6SPRM RGFDEDPL
229
Specify whether or not the DB2 subsystem is completely controlled by a set of closed applications whose application identifiers are identified in the application registration table. Closed applications require their DB2 objects to be managed solely through the plans or packages of the closed application registered in the application registration table. 3. REQUIRE FULL NAMES
Acceptable values: Default: Update: DSNZPxxx: YES, NO YES option 29 on panel DSNTIPB DSN6SPRM RGFFULLQ
Specify whether or not registered objects require fully qualified names. 4. UNREGISTERED DDL DEFAULT
Acceptable values: Default: Update: DSNZPxxx: ACCEPT, REJECT, APPL ACCEPT option 29 on panel DSNTIPB DSN6SPRM RGFDEFLT
Specify what action is taken for DDL that names an unregistered object. If the ACCEPT option is specified, the DDL is accepted. If the REJECT option is specified, the DDL is rejected. If APPL is specified, the DDL is rejected if the current application is not registered. 5. ART/ORT ESCAPE CHARACTER
Acceptable values: Default: Update: DSNZPxxx: any non-alphanumeric character none option 29 on panel DSNTIPB DSN6SPRM RGFESCP
Specify the escape character to be used in the application registration table (ART) or object registration table (ORT). Sets of names in the ART and ORT can be represented by patterns that use the underscore(_) and percent sign (%) characters in the same way as in an SQL LIKE predicate. If you enter a character in this field, it can be used in those patterns in the same way as an escape character is used in an SQL LIKE predicate. See Section 3 (Volume 1) of DB2 Administration Guide for examples of using the percent and underscore characters and the escape character. 6. REGISTRATION OWNER
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters DSNRGCOL option 29 on panel DSNTIPB DSN6SPRM RGFCOLID
Specify the owner of the application registration table and the object registration table.
230
Installation Guide
7. REGISTRATION DATABASE
Acceptable values: Default: Update: DSNZPxxx: 1-8 characters DSNRGFDB option 29 on panel DSNTIPB DSN6SPRM RGFDBNAM
Specify the name of the database which contains the registration tables. 8. APPL REGISTRATION TABLE
Acceptable values: Default: Update: DSNZPxxx: 1-17 characters DSN_REGISTER_APPL option 29 on panel DSNTIPB DSN6SPRM RGFNMPRT
Specify the name of the application registration table. 9. OBJT REGISTRATION TABLE
Acceptable values: Default: Update: DSNZPxxx: 1-17 characters DSN_REGISTER_OBJT option 29 on panel DSNTIPB DSN6SPRM RGFNMORT
231
232
Installation Guide
DSNTIPY ===>
Enter data below: 1 2 REMOTE LOCATION COBOL TYPE ===> ===> IBMCOB Remote location for COBOL organization application COBOL for sample applications (COBOL, COB2, or IBMCOB)
Enter job card information for install and sample jobs: 3 4 5 6 7 8 ===> ===> ===> ===> ===> ===>
PRESS:
ENTER to continue
RETURN to exit
1. REMOTE LOCATION
Acceptable values: Default: Update: DSNZPxxx: 1-16 characters none See The update process on page 246 none
Specify the location name of another DB2 for OS/390 to be used by the COBOL preparation sample job (DSNTEJ3C), the DDF remote location update sample job (DSNTEJ6), and the stored procedures sample jobs (DSNTEJ6S, DSNTEJ6P, DSNTEJ6T, DSNTEJ6D, DSNTEJ63, DSNTEJ64, and DSNTEJ65 ). The name must begin with a letter and must not contain special characters. A remote location name is accepted only if you have also entered a DB2 location name for DB2 LOCATION NAME (field 2 on installation panel DSNTIPR). 2. COBOL TYPE
Acceptable values: Default: Update: DSNZPxxx: COBOL, COB2, IBMCOB IBMCOB see Update on page 246 none
Specify which COBOL release to include when editing COBOL sample application jobs (DSNTEJ2C, DSNTEJ3C, DSNTEJ4C, and DSNTEJ5C). See Special considerations for COBOL programs on page 335 for notes on how to convert the tailored sample jobs if you want to test more than one type of COBOL.
233
Specify the job statements used in all the installation and sample application jobs. The job name can be specified in one of two ways: If the job name is member, the job name for each job is the same as its member name. If the job name is any value other than member, the name is truncated to seven characters and one character is added to the end of the name identifying the run order for that job.
234
Installation Guide
The CLIST assumes that the private region available for IRLM locks is estimated as 60000KB, if extended private address space is used or the amount of space specified on parameter MAXIMUM ECSA is the default of 6MB. When using the default in the tailoring session you get: 7 1 25 = 175 KB
This amount is a high-end estimate. It is the amount of storage needed if the maximum number of users are connected and each uses the maximum number of locks. Most users hold only a few locks.
235
DSNTIPC ===>
You may update the DSMAX, EDMPOOL, SORT POOL, and RID POOL sizes if necessary. Calculated 1 DSMAX - MAXIMUM OPEN DATA SETS DSNT485I DSNT485I DSNT485I DSNT485I DSNT485I DSNT485I DSNT485I DSNT485I DSNT486I DSNT448I DSNT487I DSNT438I = 3 14812 8768 1 4 54 43 596 4424 42164 1634 335 Override (1-32767) K K K K K K K K K K K K K K K (WITH SWA ABOVE 16M LINE) K, AVAILABLE = 6144 + K
2 3 4 5 6 7 8 9 1 11 12 13
EDMPOOL STORAGE SIZE = EDMPOOL DATA SPACE SIZE = BUFFER POOL STORAGE SIZE= SORT POOL SIZE = RID POOL SIZE = DATA SET STORAGE SIZE = CODE STORAGE SIZE = WORKING STORAGE SIZE = TOTAL MAIN STORAGE = RECOMMENDED REAL STORAGE= TOTAL STORAGE BELOW 16M = IRLM LOCK MAXIMUM SPACE =
PRESS:
1. DSMAX |
Acceptable values: Default: Update: DSNZPxxx: 1-32767 based on calculations enter a value in the override column DSN6SPRM DSMAX
| |
This field specifies the maximum number of data sets that can be open at one time. The practical limit may be less than 32727, depending on available storage below the line. The value you enter can substantially influence the performance of DB2; see Section 5 (Volume 2) of of DB2 Administration Guide for more information. 2. EDMPOOL STORAGE SIZE
Acceptable values: Default: Update: DSNZPxxx: 1-2097152 based on calculations press ENTER twice on panel DSNTIPB DSN6SPRM EDMPOOL
This field specifies the size of the environmental descriptor manager (EDM) pool calculated by the CLIST in kilobytes. You have a choice of: Accepting the value in the Calculated column; the CLIST calculates this value based on input from previous panels. If there is a value in the Override column, you must erase the override value in order to accept the calculated value. Typing your own value in the Override column. For information on how DB2 calculates the EDM pool size, see EDM pool size calculation on page 53.
236
Installation Guide
This field specifies the size (in kilobytes) of the data space that can be used by the environmental descriptor manager (EDM) pool. The CLIST calculates a data space size only if you specified YES for CACHE DYNAMIC SQL on panel DSNTIP4, otherwise it is zero. You have a choice of: Accepting the value in the Calculated column; the CLIST calculates this value based on input from previous panels. If there is a value in the Override column, you must erase the override value in order to accept the calculated value. Typing your own value in the Override column, unless CACHE DYNAMIC SQL is NO, in which case any value in this column is ignored and is blanked out by the install CLIST. For information on how DB2 calculates the EDM data space pool size, see EDM pool size calculation on page 53. | 4. BUFFER POOL STORAGE SIZE
Acceptable values: Default: Update: DSNZPxxx: none based on calculations run CLIST again none
This field specifies the buffer pool size calculated by the CLIST. This field is protected and cannot be changed during update mode. If you want to change the size of a buffer pool, you must use command -ALTER BUFFERPOOL as described in Chapter 2 of DB2 Command Reference. 5. SORT POOL SIZE |
Acceptable values: Default: Update: DSNZPxxx: 240K-64000K 1MB press ENTER twice on panel DSNTIPB DSN6SPRM SRTPOOL
This field specifies the amount of storage needed for the sort pool. You have a choice of: | | Accepting the default value in the Calculated column. If there is a value in the Override column, you must erase the override value in order to accept the default value. Typing your own value in the Override column. If you decide to change this field, estimate the sort pool value with the following formula: 16 (12 + sort key length + sort data length + 4 (if ESA hardware sort assist))
237
See Section 5 (Volume 2) of DB2 Administration Guide for detailed instructions on choosing sizes for optimal performance. 6. RID POOL SIZE |
Acceptable values: Default: Update: DSNZPxxx: 0, 16K-1000000K 4MB press ENTER twice on panel DSNTIPB DSN6SPRM MAXRBLK
This field specifies the amount of storage needed for the RID pool as calculated by the CLIST. You have a choice of: | | Accepting the default value in the Calculated column. If there is a value in the Override column, you must erase the override value in order to accept the default value. Type in your own value in the Override column. # # # # # # # If you decide to change this field, estimate the storage required for the RID pool with the following formula: Number of concurrent RID processing activities average number of RIDs 2 A (bytes per RID) where A is: 4 for non-large tables 5 for large tables Choosing '0' disables the use of the RID pool. In this case, DB2 does not use access paths or join methods that depend on RID pool storage. See Section 5 (Volume 2) of DB2 Administration Guide for how to choose a RID pool size for optimal performance. 7-11. CLIST messages
Acceptable values: Default: Update: DSNZPxxx: none none run CLIST again none
These fields specify sizes calculated by the CLIST. Fields 6 through 10 are protected and cannot be changed. 12-13. Storage messages
Acceptable values: Default: Update: DSNZPxxx: none none run CLIST again none
These fields are the results of the calculations described on the previous page. These fields are protected and cannot be changed.
238
Installation Guide
INSTALL DB2 - CLIST CALCULATIONS - PANEL 2 VOLUME VOLUME VOLUME VOLUME VOLUME VOLUME VOLUME volser1 volser2 volser3 volser4 volser5 volser6 volser7 WILL WILL WILL WILL WILL WILL WILL REQUIRE REQUIRE REQUIRE REQUIRE REQUIRE REQUIRE REQUIRE AT AT AT AT AT AT AT LEAST LEAST LEAST LEAST LEAST LEAST LEAST 1 4K BLOCKS 1 4K BLOCKS 597 4K BLOCKS 46715 4K BLOCKS 15758 4K BLOCKS 25995 4K BLOCKS 25995 4K BLOCKS
| |
PRESS:
ENTER to select
RETURN to exit
These CLIST messages may or may not appear depending on how many unique volume names you supplied on installation panel DSNTIPA2.
Responding to messages
You first receive the following message: DSNT478I BEGINNING EDITED DATA SET OUTPUT The CLIST is checking the parameter values you entered. If it detects a problem, you receive an error or warning message indicating the name of the parameter and the type of problem. If you receive an error message, the CLIST cannot edit the installation or migration jobs properly. If you receive a warning message, check the conditions. It is possible to receive a warning message when the conditions are normal or acceptable. If you specify several large numbers in the panels, the CLIST might send a message indicating an overflow in CLIST arithmetic. At this point the CLIST displays the Main Panel again. You can proceed through the panels, rechecking or changing parameter values.
239
If the CLIST does not find any errors, you receive messages indicating the amount of disk storage and virtual storage that is needed. For information about installation panel DSNTIPC1, which displays these messages, see Install DB2 - CLIST calculations panel 1: DSNTIPC on page 235. (You might also receive some other information messages.)
240
Installation Guide
| | | | | | |
If you have activated DDF, the CLIST also tailors job DSNTEJ6. If you have activated stored procedures, DSNTEJ6D, DSNTEJ6S, DSNTEJ6P, DSNTEJ6T, DSNTEJ6U, DSNTEJ63, DSNTEJ64, and DSNTEJ65 are edited. If CICS is selected, the CLIST edits DSNTEJ5A, DSNTEJ5C, and DSNTEJ5P. If you are using data sharing, DSNTIJGF and DSNTIJFT are also edited. | | The installation CLIST tailors the DSNHC, DSNH, DSNU, and DSNEMC01 CLISTs for installation. If you are migrating, the CLIST tailors the following jobs: | | | | | | |
DSNTEJ0 DSNTEJ2A DSNTEJ2P DSNTEJ7 DSNTESA DSNTIJFV DSNTIJTC DSNTEJ1 DSNTEJ2C DSNTEJ3C DSNTEJ71 DSNTESC DSNTIJIC DSNTIJTM DSNTEJ1P DSNTEJ2D DSNTEJ3P DSNTEJ73 DSNTESD DSNTIJIN DSNTIJUZ DSNTEJ1S DSNTEJ2E DSNTEJ4C DSNTEJ75 DSNTESE DSNTIJMV DSNTIJVC DSNTEJ1T DSNTEJ2F DSNTEJ4P DSNTEJ2U DSNTIJEX DSNTIJSG DSNTEJ1L
| |
If you have activated DDF, the CLIST also tailors job DSNTEJ6. These tailored CLISTs are found in prefix.NEW.SDSNTEMP. If you have activated stored procedures, DSNTEJ6D, DSNTEJ6S, DSNTEJ6P, DSNTEJ6T, DSNTEJ6U, DSNTEJ63, DSNTEJ64, and DSNTEJ65 are edited. If CICS is selected, DSNTEJ5A, DSNTEJ5C, and DSNTEJ5P are edited. The CLIST also tailors the DSNH, DSNHC, DSNU, and DSNEMC01 CLISTs for migration. If you are updating, the CLIST tailors only one job: DSNTIJUZ. These jobs are described in the following chapters. Recovery information is provided, along with a description of each job. Unless otherwise stated in the job description, a return code of 0 or 4 from any of the jobs indicates successful completion. Some of the jobs contain statements that could fail without causing the job to fail. For instance, delete commands for data sets, drop statements for SQL objects, and stop commands could fail when you first run a job because the data sets or objects do not exist. Unless otherwise stated, you can ignore these failures. The statements are needed to allow you to rerun the job (if necessary) without performing the deletes, drops, and stops manually; they are merely for cleanup or initialization processing.
| |
241
When a job fails, follow the instructions provided in the recovery information for the job. If you need further recovery information, refer to DB2 Messages and Codes and examine the descriptions of the messages that the job generated. Before you begin editing, you might want to print or back up the jobs. You can print the JCL for these jobs using IEBPTPCH or any other print facility available at your site. Consider the following suggestions for possible changes or additions to the jobs: 1. Tailor the jobs to the needs of your site. You should edit the jobs to conform to any unique requirements you might have. Also, you might want to make any minor JCL changes for items that were not handled by the ISPF panels. 2. Examine the volume serial numbers used in the various jobs. The volume serial number fields of installation panel DSNTIPA2 allow you to specify up to seven volumes for the data sets defined during installation or migration. If you want to use more than seven volumes, specify them now. The DSNTINST CLIST spreads the data sets across the volumes you specify. Adding more volumes to provide more separation of data sets can help improve system performance and recoverability. Many of the log data sets are large and easy to place on separate volumes. The CLIST produces a series of messages that estimate space distribution for the volumes specified. For more information, see Install DB2 - CLIST calculations panel 1: DSNTIPC on page 235. 3. Edit the DSNH CLIST if needed. The DSNH CLIST allows you to precompile, compile, prelink-edit, link-edit, bind, and run an application by issuing a single command. You might need to edit the DSNH CLIST to change values for some of the entries. Ensure that all DSNH keyword parameters for all DB2-supported compilers are checked and are correct for your applications. For a description of the parameters, see the DSNH CLIST in Chapter 2 of DB2 Command Reference. Check the default data set names for the licensed programs you have installed. These defaults are in the parameter definitions at the beginning of each program. If the names and prefixes are not correct for your site, change them. Check default library names. If the names and prefixes are not correct for your site, change them. Make sure the data sets exist and are cataloged for BLIB, CLIB, LLIB, and PLIB. When the DSNH CLIST runs, it creates DBRMLIB and LOAD data sets if they do not already exist. The DBRMLIB data set is only created if the DBRMLIB(DEFAULT) is set. The following are the default library names: BLIB(NONE) DBRMLIB(DEFAULT) - Because the DBRM library must be allocated exclusively when the precompiler writes to it, the recommendation is to have a temporary library, or one per user, rather than trying to share libraries. However, if your DB2 subsystem uses DFSMSdfp's partitioned data set extended (PDSE) for managing data sets, access is restricted at member level rather than data set level; this provides another alternative for concurrent access to the DBRM library. CLIB(NONE) LLIB(NONE)
242
Installation Guide
LOAD(RUNLIB.LOAD) - Because this library is allocated exclusively when it is being written, the recommendation is to have a temporary library, or one per user, rather than trying to share libraries. PLIB(NONE) Check default processor options. If you prefer other default options, change them. The following are the default processor options:
CICSOPT(NONE) COPTION(NONE) LOPTION(NONE) PASS(DEFAULT)
Check print and work space defaults. If the default allocation sizes are not acceptable for your site, change them. The following are the print and work space defaults:
PSECSPAC(20) PSPACE(20) WORKUNIT(DEFAULT) WSECSPAC(20) WSPACE(20)
4. Examine the data set names for other products. Many data set names for other products appear in the jobs. These names are shown in Table 35 on page 125. Change them if they are different at your site. |
| | |
The data-only load module DSNHDECP is also generated by job DSNTIJUZ. It contains the application programming defaults.
| | | | | | | | | | | | | | | | |
243
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # | | | | | | | |
244
Installation Guide
| | | | | | | | | | | | | | | | | # | | | | # # | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # # # | |
245
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # # # # # # # #
246
Installation Guide
DSNTIPB ===> _
Select one of the following: 1 2 3 4 5 6 7 8 9 1 11 12 13 14 15 DATA PARAMETERS DEFINE GROUP OR MEMBER SYSTEM RESOURCE DATA SET NAMES DATA SET NAMES PANEL 1 DATA SET NAMES PANEL 2 DATA SET NAMES PANEL 3 DATA SET NAMES PANEL 4 DATA SET NAMES PANEL 5 SIZES SIZES PANEL 2 THREAD MANAGEMENT BUFFER POOL SIZES PANEL 1 BUFFER POOL SIZES PANEL 2 BUFFER POOL SIZES PANEL 3 TRACING AND CHECKPOINT PARAMETERS 16 17 18 19 2 21 22 23 24 25 26 27 28 29 3 OPERATOR FUNCTIONS APPLICATION PROGRAMMING DEFAULTS 1 APPLICATION PROGRAMMING DEFAULTS 2 IRLM PANEL 1 IRLM PANEL 2 PROTECTION MVS PARMLIB UPDATES ACTIVE LOG DATA SET PARAMETERS ARCHIVE LOG DATA SET PARAMETERS DATABASES TO START AUTOMATICALLY DISTRIBUTED DATA FACILITY PANEL DISTRIBUTED DATA FACILITY PANEL 2 ROUTINE PARAMETERS DATA DEFINITION CONTROL SUPPORT JOB EDITING
None of the fields on these panels can be updated. PRESS: ENTER to select RETURN to exit HELP for more information
On the command line, enter a number to select the family of parameters you wish to update. These numbers correspond to the installation panels in Table 45.
Table 45 (Page 1 of 2). Panel identifiers Panel ID 1. DSNTIPA2 2. DSNTIPK Panel Title Data Parameters Define Group or Member Page 109 114
247
Table 45 (Page 2 of 2). Panel identifiers Panel ID 3. DSNTIPH 4. DSNTIPT 5. DSNTIPU 6. DSNTIPQ 7. DSNTIPG 8. DSNTIPW 9. DSNTIPD 10. DSNTIP7 11. DSNTIPE 12. DSNTIP1 13. DSNTIP2 14. DSNTIP6 15. DSNTIPN 16. DSNTIPO 17. DSNTIPF 18. DSNTIP4 19. DSNTIPI 20. DSNTIPJ 21. DSNTIPP 22. DSNTIPM 23. DSNTIPL 24. DSNTIPA 25. DSNTIPS 26. DSNTIPR 27. DSNTIP5 28. DSNTIPX 29. DSNTIPZ 30. DSNTIPY Panel Title System Resource Data Set Names Data Set Names Panel 1 Data Set Names Panel 2 Data Set Names Panel 3 Data Set Names Panel 4 Data Set Names Panel 5 Sizes Sizes Panel 2 Thread Management Buffer Pool Sizes Panel 1 Buffer Pool Sizes Panel 2 Buffer Pool Sizes Panel 3 Tracing and Checkpoint Parameters Operator Functions Application Programming Defaults Panel 1 Application Programming Defaults Panel 2 IRLM Panel 1 IRLM Panel 2 Protection MVS PARMLIB Updates Active Log Data Set Parameters Archive Log Data Set Parameters Databases and Spaces to Start Automatically Distributed Data Facility Distributed Data Facility Panel 2 Stored Procedures Parameters Data Definition Control Support Job Editing Page 116 120 125 133 136 139 142 148 150 155 157 159 161 168 175 183 188 194 199 203 207 209 215 217 222 226 229 232
| |
| |
When the panel you selected is displayed, enter the new parameters; press the ENTER key to return to the Update Selection Menu Panel. Make another panel selection or press ENTER again to process. Press END to leave the Update Selection Menu Panel and return to the Main Panel.
248
Installation Guide
4. Stop and Start DB2. 5. Bind or rebind these plans: BIND PLAN(DSNESPCS) PKLIST( .DSNESPCS.DSNESM68) ISOLATION(CS) ACTION(REPLACE) BIND PLAN(DSNESPRR) PKLIST( .DSNESPRR.DSNESM68) ISOLATION(RR) ACTION(REPLACE) 6. Start DDF if you specified COMMAND instead of AUTO as the DDF STARTUP OPTION on installation panel DSNTIPR. To change the data set sizes for the DB2 catalog and directory: 1. Copy the catalog and directory table spaces. 2. Stop the table spaces or their databases. 3. Delete the data sets and redefine them, using VSAM commands. 4. Use the RECOVER utility to recover the catalog and directory to the new data sets. 5. Start the table spaces or databases again. To change from single to dual logging for the active log: 1. Define the second copy of the log with a VSAM IDCAMS DEFINE statement. Refer to job DSNTIJIN, which contains the DEFINE statement for the first copy of the log. 2. Run the DSNJU003 (change log inventory) utility. This adds the second copy of the log to the BSDS. 3. Update the NUMBER OF COPIES field on installation panel DSNTIPH from 1 to 2. 4. Run job DSNTIJUZ to make the change effective. To move or expand the boot strap data sets, use the IMPORT and EXPORT commands of access method service. The bootstrap data sets are accessed using JCL when DB2 starts. To access the log data sets, you can use stand-alone access macros or the IMPORT and EXPORT commands of access method service. See Section 4 (Volume 1) of DB2 Administration Guide for more information. # # # To change the number of data sets for active logs, you can use the DSNJU003 utility. See Section 4 (Volume 1) of DB2 Administration Guide for details on the system programmer action in recovery scenarios for active log failures.
249
250
Installation Guide
251
IRLM requirements: For later diagnosis of IRLM problems, also ensure that: The IRLM dump formatting module name is in control table BLSCECT in SYS1.PARMLIB. Load modules DXRRL186 and DXRRLFTB, and the print dump formatting module DXRRLM50 is in SYS1.LINKLIB, or the job that prints the dump contains a JOBLIB or STEPLIB statement specifying the library containing the modules. Additional changes to SYS1.PARMLIB and SYS1.PROCLIB: Because different sites have different requirements for identifying DB2 to MVS, it is not possible for job DSNTIJMV to anticipate all the updates necessary. For this reason, the updates that job DSNTIJMV makes to SYS1.PARMLIB and SYS1.PROCLIB might be incomplete. You could have additional procedures of your own to rename. You can complete these updates either by making the updates directly in SYS1.PARMLIB and SYS1.PROCLIB, or by editing DSNTIJMV. Recommendation: Edit the updates directly in SYS1.PARMLIB instead of submitting the updates in the DSNTIJMV step. For SYS1.PROCLIB, submit the procedure-update section of job DSNTIJMV. Before you make the updates, read the following information and examine job DSNTIJMV to study the updates that it makes. Then use an editor such as ISPF/PDF to make the updates to SYS1.PARMLIB.
252
Installation Guide
active or inactive when the requests are received.) This module must be located in a link list data set (or in SYS1.LINKLIB). prefix The 1- to 8-character command prefix. The first character of the command prefix must be one of the following: @ $ # . / ' ) * + - = < | & ! ; % _ ? : ". The remaining characters of the command prefix must be one of the above characters, A-Z, or 0-9. See Table 41 on page 204 more information. Do not use the JES2 backspace character or command prefix character. The default is the hyphen (-). Do not assign a command prefix that is used by another subsystem or that can be interpreted as belonging to more than one subsystem or MVS application. Specifically, do not specify a multiple-character command prefix that is a subset or a superset of another command prefix beginning from the first character. For example, it is invalid to assign '-' to one subsystem and '-DB2A' to another. Similarly, it is also invalid to assign '?DB2' to one subsystem and '?DB2A' to another. It is valid to assign '-DB2A' and '-DB2B' to different DB2 subsystems. # # # # # # # # # # # # # # # # # # M X scope The 1-character scope for the command prefix. DB2 registers its command prefix with MVS. When this is done, the scope of the command prefix is controlled by the value you choose: S Started, and register the prefix with Sysplex scope at DB2 startup instead of during MVS IPL. This is the default. Recommendation: Choose S, which allows you to have a single IEFSSNxx parmlib member to be used by all MVS systems in the Sysplex. It also simplifies the task of moving a DB2 from one system to another; you can stop DB2 on one MVS and start it up on another. There is no need to re-IPL the system. MVS system scope, and register the prefix during MVS IPL. Sysplex scope, and register the prefix during MVS IPL. This means this DB2 cannot be restarted on another MVS without changing the definitions and re-IPLing both MVSs.
For more information about the command prefix facility of MVS, see OS/390 MVS Planning: Operations. group-attach The group attachment name, used for data sharing. You can specify this on installation panel DSNTIPK. IEAAPFxx or PROGxx Job DSNTIJMV updates IEAAPFxx to include the DB2 program libraries (prefix.SDSNEXIT, prefix.SDSNLOAD, prefix.SDXRRESL, and prefix.SDSNLINK) as APF-authorized libraries. If the program library containing DFSORT is not already APF-authorized, you can edit DSNTIJMV to authorize it. To do this, you can include the authorization either in this list or in LNKLSTxx. All libraries concatenated with prefix.SDSNLOAD in STEPLIB and JOBLIB statements must be APF-authorized. Be sure that the volume serial number in this member is the volume on which the data set resides.
Chapter 2-6. Installing the DB2 subsystem
253
If you are using MVS/ESA Version 4 Release 3, you might be using the PROGxx member instead of the IEAAPFxx member. If so, you have to update this member manuallyjob DSNTIJMV does not edit it. LNKLSTxx | | Whether you edit the updates directly or edit DSNTIJMV to make the updates, you might first want to review Choosing link list options on page 69. Job DSNTIJMV updates this member to include the DB2 load module library, prefix.SDSNLINK, in the LNKLSTxx. If you moved the modules from prefix.SDSNLINK into another library, edit DSNTIJMV to include that library in the LNKLSTxx. If you have combined prefix.SDSNLINK and prefix.SDSNLOAD into one library, edit DSNTIJMV to include the combined library in the LNKLSTxx. See OS/390 MVS Initialization and Tuning Guide for restrictions on data sets that are concatenated in LNKLST. Any data set that is added to the LNKLSTxx member must be cataloged in the master catalog of the system. This is normally true of prefix.SDSNLINK; however, if an alias points to a user catalog when you run DSNTIJAE, prefix.SDSNLINK is cataloged in a user catalog. In this case, you must either ensure that prefix.SDSNLINK is also cataloged in the master catalog or give prefix.SDSNLINK a high-level qualifier other than prefix, the high-level qualifier for this release. You must give a high-level qualifier other than prefix to all release-sensitive data sets placed in the LNKLSTxx member. If you do not include the DFSORT library in the LNKLSTxx member, you must provide a JOBLIB or STEPLIB statement for all utility jobs that include the DFSORT program library. You can accomplish this by placing a STEPLIB statement in DSNUPROC, which appears later in this job. If you use customized modules and exits, prefix.SDSNEXIT must precede prefix.SDSNLOAD in JOBLIB and STEPLIB statements. You must do additional editing for the SYS1.PARMLIB updates. If you are editing DSNTIJMV, rather than making the changes directly, you have a choice: either include your additional entries for the SYS1.PARMLIB members (IEAAPFxx and LNKLSTxx) at the end of the existing list of entries, or place them earlier in the list. If you include them at the end of the existing SYS1.PARMLIB entries, make sure there are commas (the continuation character) delimiting each entry except the last. Another SYS1.PARMLIB change to consider at this time is the extended common storage area (ECSA) size, specified in the CSA parameter of the IEASYS00 parameter. Be sure that you have specified an adequate size for this subsystem (generally 2MB plus the MAXIMUM ECSA on installation panel DSNTIPJ if the CROSS MEMORY value is NO). The IOP parameter is another SYS1.PARMLIB change to consider at this time. If you are running with MVS/SP Version 4 Release 3 or later and DFSMS/MVS Version 1 Release 1, DB2 can schedule I/O priority. To enable this, you must: Use the IOP parameter to set the I/O priority for the address space of a performance group. The IOP parameter is in the IEAIPSxx member of SYS1.PARMLIB. Enable MVS I/O priority scheduling by specifying IOQ=PRTY in the IEAIPSxx member of SYS1.PARMLIB.
254
Installation Guide
You must issue an IPL command for MVS for the PARMLIB updates to take effect. To avoid issuing an IPL command for MVS during DB2 installation, you can make these updates and issue the IPL well in advance of your DB2 installation or migration session. See Section 6 of DB2 Administration Guide for more information on I/O priority scheduling.
255
available private address space. For more information about private address spaces, refer to Working storage calculation on page 58.
Installation step 2: Define the integrated catalog facility catalog and Alias: DSNTIJCA
The integrated catalog facility catalog is the VSAM object in which DB2 catalogs the data sets you create during the process of installing. Job DSNTIJCA creates the integrated catalog facility catalog and its alias. DB2 uses the catalog alias as the prefix for your DB2 VSAM data sets. Running DSNTIJCA is optional. If you specified YES for the DEFINE CATALOG option on installation panel DSNTIPA2, you must run this job to create the catalog. Before running this job, examine the DEFINE UCAT statement carefully to be sure that the parameters are appropriate for your needs. Do not run this job if you want to use an existing integrated catalog facility catalog and alias (that is, you specified NO for the DEFINE CATALOG parameter on installation panel DSNTIPA2). However, make sure that the integrated catalog facility catalog you are going to use is created and that you defined an integrated catalog facility catalog alias. If job DSNTIJCA runs successfully, it produces return codes of 0. If DSNTIJCA fails or abends, delete the integrated catalog facility catalog (if it was created) and rerun the job. To delete the integrated catalog facility catalog, run job DSNTIJDE as explained on page257.
256
Installation Guide
Job DSNTIJIN creates and catalogs the DB2 catalog database (DSNDB06). The DB2 catalog contains information about every object that DB2 maintains. Invokes the LISTCAT command of access method service so you can check that the VSAM definitions were successful. Check the DEFINE CLUSTER statements in job DSNTIJIN to ensure that they allocate adequate DASD for your system. See Section 5 (Volume 2) of DB2 Administration Guide for guidance on allocating and extending data sets. Also, for recovery purposes, it is best to place system data sets like the DB2 recovery log and the VSAM catalog on different DASD volumes. Because these data sets are used frequently, do not migrate them with DFSMShsm. If DSNTIJIN runs successfully, it produces return codes of 0 for all DEFINE statements and steps. Check any VSAM messages carefully. If job DSNTIJIN fails or abends, remove the MVS catalog delete statements from job DSNTIJDE, run DSNTIJDE (to delete the data sets created by DSNTIJIN), and rerun DSNTIJIN. Deleting DB2 Data Sets: DSNTIJDE: Job DSNTIJDE is not part of the normal installation process; use this job only for rerunning part of the process. Do not run this job during migration or fallback. This job deletes the previously created data sets for the DB2 directory and DB2 catalog. If a job fails or abends, you might need to run this job before restarting the DB2 installation process. In most cases, you must remove or comment out the delete statement in this job for the integrated catalog facility catalog (if the statement is present). It is likely that the integrated catalog facility catalog does not need to be deleted and redefined. Deletes might fail for data sets that do not exist. This does not necessarily indicate that the job failed. If you receive other messages, check them carefully. Job DSNTIJDE does not work properly if job DSNTIJSG has been executed. This job does not delete the resource limit specification table or the data sets used by the distributed data facility. If job DSNTIJDE fails or abends, correct the error conditions and rerun the job. If you want to delete the integrated catalog facility catalog, first list its contents and delete the data sets cataloged there. This could include sample data sets, user-defined data sets, or subsystem data sets that were not deleted properly. You can use a FORCE command to delete the user catalog. If you delete the catalog using FORCE before deleting all the data sets, you can use the RECATALOG option of DEFINE CLUSTER and delete the data sets.
257
Initializes the DB2 catalog database with data from the untailored prefix.SDSNSAMP. Invokes the DSNJLOGF utility to preformat active log data sets that are created during installation. See DB2 Utility Guide and Reference for more information on DSNJLOGF. If job DSNTIJID runs successfully, it produces return codes of 0. If you receive any VSAM messages, check them carefully. If DSNTIJID fails or abends, remove the catalog delete statements from job DSNTIJDE, run job DSNTIJDE, then rerun DSNTIJIN and DSNTIJID.
258
Installation Guide
| | # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
Recommendation: Use the default value of YES. A value of NO means each parallel task will produce its own accounting trace record. The subsystem parameter, EDMBFIT, in macro DSN6SPRM, is used to adjust the free-chain search algorithm on systems with a large EDM pool that is greater than 40 MB. The possible values are YES or NO. A YES value means DB2 will use a better-fit algorithm. A NO value means DB2 will use a first-fit algorithm. NO is the default value. See Section 5 (Volume 2) of DB2 Administration Guide for more information about EDM pool space utilization and performance. The subsystem parameters, SMSCDFL and SMSCDIX, in macro DSN6SPRM, specify whether SMS data class names are used for table spaces and indexes. SMSCDFL and SMSCDIX are one to eight characters long with a default value of a blank. When you use DFSMShsm and DB2 storage groups, you can use the subsystem parameters SMSDCFL and SMSDCIX to assign table spaces and indexes to different DFSMShsm data classes. SMSDCFL specifies a DFSMShsm data class for table spaces. If you assign a value to SMSDCFL, DB2 specifies that value when it uses Access Method Services to define a data set for a table space. If the value of SMSDCFL is one or more blanks DB2 does not specify a data class when it creates data sets for table spaces. SMSDCIX specifies a DFSMShsm data class for indexes. If you assign a value to SMSDCIX, DB2 specifies that value when it uses Access Method Services to define a data set for an index. If the value for SMSDCIX is one of more blanks, DB2 does not specify a data class when it creates data sets for indexes. The default value for both subsystem parameters is a blank. Before you set the data class system parameters, you need to define the data classes for your table space data sets and index data sets. You also need to code SMS ACS routines to assign indexes to one SMS storage class and table spaces to a different SMS storage class. For more information on creating data classes, see DFSMS/MVS Storage Management Library: Implementing System-Managed Storage. The subsystem parameter NPGTHRSH, in macro DSN6SPRM, lets you specify that DB2 uses special access path selection for tables under a given size. The default value is 0 which means no special access path selection is used. See Section 5 (Volume 2) of DB2 Administration Guide for more information on how to set NPGTHRSH. The subsystem parameter, IMMEDWRI in macro DSN6GRP, controls when DB2 writes updated group buffer pool dependent pages. This option only applies to data sharing environments. The values for IMMEDWRI option are as follows: YES means updated group buffer pool dependent pages are written immediately. PH1 means updated group buffer pool dependent pages are written to the coupling facility at or before phase 1 of commit. NO, which is the default value, means that the updated group buffer pool dependent pages are not written. The IMMEDWRITE option that is specified during bind of the plan or package determines when updated GBP-dependent pages are written.
259
# # # # # # # # # # # # # # #
Table 47 on page 260 illustrates the implied heirarchy when using the IMMEDWRI subsystem parameter and the IMMEDWRITE option of the BIND and REBIND commands.
Table 47. The implied hierarchy of the immediate write option IMMEDWRITE bind option NO NO NO PH1 PH1 PH1 YES YES YES IMMEDWRI subsystem parameter NO PH1 YES NO PH1 YES NO PH1 YES Value at 'run time' NO PH1 YES PH1 PH1 YES YES YES YES
If the DB2 distribution library prefix is different from the target library prefix, edit DSNTIJUZ to correct the data set name for prefix.ADSNLOAD. If you have not run the SMP/E ACCEPT job (DSNTIJAC) of FMID HDB6610, you must edit DSNTIJUZ so that the SMP/E temporary data set (SMPTLIB) is included in the concatenation for the ADSNLOAD DD statement in steps DSNTIZL and DSNTIZQ. You might receive message GIM65001 when you run steps DSNTLOG and DSNTIMQ, or you might receive a return code of 4 when you run step DSNTIMQ. You can ignore these messages. If job DSNTIJUZ fails or abends, correct the problem and rerun the job.
# #
260
Installation Guide
If job DSNTIJEX fails or abends, correct the problem and rerun the job.
If you have DB2 pass data to SMF, you must allocate an adequate supply of SMF buffers. The default buffer settings are probably insufficient. You can specify SMF buffering on the VSAM BUFSP parameter of the access method services DEFINE CLUSTER statement. Do not use the default settings if DB2 data is sent to SMF. Specify CISZ(4096) and BUFSP(81920) on the DEFINE CLUSTER statement for each SMF VSAM data set. These values for CISZ and
261
BUFSP are the minimum requirement for DB2. You might need higher values for CISZ and BUFSP depending on the requirements of all your MVS subsystems. You can also code an IEFU84 SMF exit to process the records that are produced. Detailed information about starting and stopping DB2 traces for performance, accounting, audit, and statistics data is presented in Section 5 (Volume 2) of DB2 Administration Guide . For more information on SMF, refer to OS/390 MVS Initialization and Tuning Reference and OS/390 MVS Initialization and Tuning Guide.
262
Installation Guide
| | | | | |
# #
If the macro pass is used, the following options are needed as well:
MACRO MDECK SYNTAX
263
Making panels, messages, and load modules available to ISPF and TSO
You must concatenate the DB2 ISPF libraries with the ISPPLIB, ISPSLIB, and ISPMLIB DD statements in your logon procedures and in any of your CLISTs where they might be allocated. These libraries are prefix.SDSNSPFP, prefix.SDSNSPFM, prefix.SDSNSPFS, and either prefix.SDSNPFPE or prefix.SDSNPFPK depending on whether you are using English or Kanji DB2I panels. If you are using Online Help, include prefix.SDSNSPFT. DB2I uses the ISPF PROFILE and SHARED variable pools for most panel variable fields. This makes it easier to reenter a panel when panel variables have previously been specified. For the DB2 subcommands that permit LISTS of plan names, package names, DBRMs, and ENABLE and DISABLE statements, DB2I provides ISPF to contain all the user-specified variables for these subcommand keywords. DB2I creates and maintains a set of ISPF tables in a user-defined TSO data set that is allocated to a ddname of DSNETBLS. The DB2I-generated tables in this library are DSNCONNS, DSNDBRMS, and DSNPLPKN. Table 48 shows the library table member names and their contents.
Table 48. The DB2 ISPF table library DSNCONNS DSNDBRMS DSNPLPKN ENABLE/DISABLE connection type and connection name variables that are referenced by plan or package name Subcommand DBRM member and LIBRARY name variables that are referenced by plan name Package list variables that are referenced by package name Schema name variables that are referenced by plan or package name to be included in the PATH keyword
| |
DSNPATHS
When allocating this data set, the following DCB attributes must be assigned: DSORG(PO) RECFM(F B) LRECL(8 ) BLKSIZE(n LRECL) where n is any integer. The following example shows how you might set up an ALLOCATE statement to create the data set: ALLOC DA(DSNSPFT) NEW SP(1 1) TR DIR(1 ) + DSORG(PO) RECFM(F B) LRECL(8 ) BLKSIZE(8 ) F(DSNETBLS) REUSE The following example shows how you might allocate an existing data set to the DSNETBLS ddname: ALLOC DA(DSNSPFT) F(DSNETBLS) REUSE
Add the DSN command to the HELP list of available TSO commands by editing SYS1.HELP(COMMANDS), and add a line indicating that the DSN command allows you to perform DB2 functions from TSO. SYS1.HELP(COMMANDS) is HELP information only. It describes DB2 function; it does not provide that function. DB2I uses ISPF table services to maintain individual ISPF tables within the DSNETBLS data set. For performance reasons, ISPF keeps this table library in an
264
Installation Guide
open state once an individual table has been updated. Attempts to close this data set using the TSO FREE command will result in error message IKJ56861I. For additional information on this TSO error message and how to close this data set, refer to ISPF V4 Messages and Codes. If you want to run the ISPF/CAF sample application provided with DB2, be sure that the data set prefix.RUNLIB.LOAD is included in the logon procedures or in the ISPLLIB concatenation. For more information about the ISPF/CAF sample application, see Running dynamic SQL and the ISPF/CAF application on page 351.
265
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
)ATTR / / / COPYRIGHT = 574 -XYR (C) COPYRIGHT IBM CORP 1982, 1985, 199 , 1999 / / REFER TO COPYRIGHT INSTRUCTIONS FORM NUMBER G12 -2 83 / / STATUS = VERSION 6, LEVEL / / / )BODY %----------------------- ISPF/PDF PRIMARY OPTION MENU -----------------------%OPTION ===>_ZCMD +USERID - &ZUSER . % +ISPF PARMS - Specify terminal and user parameters +TIME - &ZTIME . % 1 +BROWSE - Display source data or output listings +TERMINAL - &ZTERM . % 2 +EDIT - Create or change source data +PF KEYS - &ZKEYS . % 3 +UTILITIES - Perform utility functions % 4 +FOREGROUND - Invoke language processors in foreground % 5 +BATCH - Submit job for language processing % 6 +COMMAND - Enter TSO command or CLIST % 7 +DIALOG TEST - Perform dialog testing % 8 +DB2I - Perform DATABASE 2 Interactive functions % C +CHANGES - Display summary of changes for this release % T +TUTORIAL - Display information about ISPF/PDF % X +EXIT - Terminate ISPF using log and list defaults % +Enter%END+command to terminate ISPF. % )INIT .HELP = ISR 3 &ZPRIM = YES / ALWAYS A PRIMARY OPTION MENU / &ZHTOP = ISR 3 / TUTORIAL TABLE OF CONTENTS / &ZHINDEX = ISR91 / TUTORIAL INDEX - 1ST PAGE / )PROC &ZSEL = TRANS( TRUNC (&ZCMD'.') ,'PANEL(ISPOPTA)' 1,'PGM(ISRBRO)' 2,'PGM(ISREDIT)' 3,'PANEL(ISRUTIL)' 4,'PANEL(ISRFPA)' 5,'PGM(ISRJB1) PARM(ISRJPA) NOCHECK' 6,'PGM(ISRPTC)' 7,'PGM(ISRYXDR) NOCHECK' 8,'CMD(DSNECPRI) NEWAPPL(DSNE)' C,'PGM(ISPTUTOR) PARM(ISR 5)' T,'PGM(ISPTUTOR) PARM(ISR )' ' ',' ' X,'EXIT' ,'?' ) &ZTRAIL = .TRAIL )END
Figure 43. ISPF primary option panel (DSNTIPRM), edited to include DB2I
Panel DSNTIPRM is shown in Figure 43. Notice the added lines in boldface type. Adding these lines allows you to invoke the DB2 Interactive (DB2I) functions. The added lines include one displayed line: % 8 +DB2I - Perform DATABASE 2 Interactive functions
and your choice of one of these undisplayed lines: 8,'CMD(DSNECPRI) NEWAPPL(DSNE)' 8,'CMD(DSNECPRI SSID(xxxx)) NEWAPPL(DSNE)' The displayed line lets the user choose DB2I. Both of the undisplayed lines invoke the DB2I main panel (DSNEPRI). If you use the first undisplayed line, you accept the default for the subsystem identifier (SSID) parameter. If you use the second undisplayed lines, you can specify a different SSID parameter. DSNECPRI is a CLIST and can be invoked directly from another user CLIST. It is an alternative way to invoke DSNEPRI without updating the primary ISPF panel.
266
Installation Guide
| | | | | | | | | | | | | | |
By specifying NEWAPPL(DSNE), you define DSNE as the ISPF application name used by DB2I. ISPF uses the name DSNE to create the ISPF profile pool member name (DSNEPROF) in the TSO_userid.ISPPROF data set, which will contain all ISPF panel variables defined during DB2I execution. Any customized DSNEPROF members can be migrated from Version 5 to Version 6. Recommendation: Examine any new or changed default panel values to ensure that your custom values are still valid, specifically the option values for the subcommands BIND PLAN, REBIND PLAN, BIND PACKAGE, and REBIND PACKAGE. Using a NEWAPPL name other than DSNE: You may define any valid ISPF application name. If you define an application name to be something other than DSNE and you plan to use DB2 online help, you must create a new command table member that corresponds to your application name. You may create a new command table name by using the TSO Command Table Utility and specifying the Verb as Help and the Action as Select Panel(&Helppan) after defining your new ISPF application name.
267
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
)ATTR / / / COPYRIGHT = 574 -XYR (C) COPYRIGHT IBM CORP 1982, 1985, 199 , 1999 / / REFER TO COPYRIGHT INSTRUCTIONS FORM NUMBER G12 -2 83 / / STATUS = VERSION 6, LEVEL / / / )BODY %TUTORIAL -------------------- TABLE OF CONTENTS ------------------ TUTORIAL %OPTION ===>_ZCMD ---------------------------------------------| ISPF PROGRAM DEVELOPMENT FACILITY TUTORIAL | | TABLE OF CONTENTS | ---------------------------------------------The following topics are presented in sequence, or can be selected by entering a one-character selection code in the option field on line 2: %G+ GENERAL - General information about ISPF % + ISPF PARMS - Specify terminal and user parameters %1+ BROWSE - Display source data or output listings %2+ EDIT - Create or change source data %3+ UTILITIES - Perform utility functions %4+ FOREGROUND - Invoke language processors in foreground %5+ BATCH - Submit job for language processing %6+ COMMAND - Enter TSO command or CLIST %7+ DIALOG TEST - Perform dialog testing %8+ DB2 - Information about DB2 %X+ EXIT - Terminate ISPF using log and list defaults The following topics are presented only if explicitly selected: %A+ APPENDIX A - Dynamic allocation interface routine (DAIR) errors %B+ APPENDIX B - ISPF listing formats %I+ INDEX - Alphabetic index of tutorial topics )PROC &ZSEL = TRANS(&ZCMD G,ISR 1 ,ISP 5 1,ISR1 2,ISR2 3,ISR3 4,ISR4 5,ISR5 6,ISR6 1 7,ISR7 8,DSN4V2DB X,ISP9 1 A, ISP93 3 B, ISR95 I, ISR91 ) )END
Figure 44. ISPF program development facility tutorial panel (DSNTIPTU), edited to include DB2 tutorial
The DSNTIPTU panel is shown in Figure 44. Notice the two added lines in boldface type. Adding these lines allows you to invoke the DB2 tutorial panels. The two added lines include one displayed line: %8+ DB2 - Information about DB2
and one undisplayed line: 8,DSN4V2DB The displayed line presents the user with a choice for the DB2 tutorial. The undisplayed line actually invokes the DB2 tutorial menu (DSN4V2DB). For information about ISPF, see ISPF V4 Dialog Developer's Guide and Reference and ISPF V4 User's Guide.
268
Installation Guide
269
270
Installation Guide
and irlmproc, where ssnm is the DB2 subsystem name and irlmproc is the IRLM procedure name. If DB2 starts successfully, the series of RESTART messages you receive concludes with these two messages: DSNR 2I DSN9 22I RESTART COMPLETED DSNYASCP '-DSN1 START DB2' NORMAL COMPLETION
After you start DB2, check outstanding conditions. Identify unusual conditions for databases with the command: -DSN1 DISPLAY DATABASE( ) SPACENAM( ) RESTRICT If DB2 does not start successfully, it usually abends with a reason code indicating where the error occurred. To find the error, check the set of definitions for the associated resource. Be sure that the DSNTIJUZ, DSNTIJIN, and DSNTIJID jobs ran correctly. Also, check that the subsystem parameter member you specified (or allowed to default) when you started DB2 is the one built by job DSNTIJUZ. Check the JCL for the DB2 startup procedure. Note to distributed data facility users: VTAM must be defined before DDF can start. But, you do not need to have TCP/IP configured to start DDF. 3. Optionally, start TSO. If you want to use the TSO SUBMIT command to do housekeeping and installation verification, you must start TSO (if it is not already started).
271
vcatalog.DSNDBC.DSNDB 7.DSNkknn.I
1.A
where vcatalog is the catalog alias name you specified for the CATALOG ALIAS field on installation panel DSNTIPA2, kk is either 4K or 32K, and nn is the number of the data set. For example, if you specify 2 as the number of temporary 4KB data sets and 1 as the number of temporary 32KB data sets, DSNTIJTM defines the following table spaces: vcatalog.DSNDBC.DSNDB 7.DSN4K 1.I vcatalog.DSNDBC.DSNDB 7.DSN4K 2.I vcatalog.DSNDBC.DSNDB 7.DSN32K 1.I 1.A 1 1.A 1 1.A 1
If you do not need working storage for 32KB buffering, you can specify 0 for TEMP 32K SPACE and related options on installation panel DSNTIPD. The TEMP 32K SPACE option determines the total size of all 32KB data sets. If you specify zero for this option, job DSNTIJTM does not contain a statement to create a data set for 32KB buffering. Be aware, however, that joins of smaller tables can produce rows longer than 4KB. For this reason, you might want 32KB data sets. # You can increase the number of additional temporary work file table spaces, increasing the values you specify for the TEMP 4K DATA SETS or TEMP 32K DATA SETS options, particularly if you expect a great deal of sorting at your site. Additional temporary work file table spaces can improve DB2 performance by reducing device contention among applications. These additional work files also can be used for sorting indexes on large tables when creating an index. For more information on adding temporary work files, see DASD requirements for the work file database on page 41. You can choose to have job DSNTIJTM create these additional table spaces, or you can create them after you run the job. To create the temporary work file table spaces after you run job DSNTIJTM, comment out all but steps DSNTTMP and DSNTIST from the job. Remove the COND statements, and change DSN4K01, DSN32K01, or both, to the table space names you want to use. Then, run the edited steps. If job DSNTIJTM runs successfully, it produces the following return codes:
Table 49. DSNTIJTM return codes Step DSNTIAD PROCSTEP PC ASM LKED Return code 0000 0000 0000 0000 0000 or 0012 0000 DSNTIC 0000 0000
The first time you run the DSNTIJTM job, you almost always get a return code of 12 for step DSNTIAS. This is because step DSNTIAS issues a command to stop DSNDB07 (the work file database), which has yet to be defined. A return code of 0 is issued if the job failed the first time and has to be rerun. When migrating, you
272
Installation Guide
also might receive a return code of 12 if the work file database DSNDB07 was dropped before running job DSNTIJTM. Because this is the first use of DB2, errors from earlier steps may be detected here. If you receive an abend reason code from the data manager (X'00C9'xxxx) or buffer manager (X'00C2'xxxx), carefully recheck jobs DSNTIJIN and DSNTIJID.
Installation Step 15: Define and bind DB2 objects and user-maintained databases: DSNTIJSG
The default storage group is for user-defined DB2 tables that are not specifically assigned to a storage group. To create the default storage group and to bind DB2 plans for DCLGEN and SPUFI, run job DSNTIJSG. Before you run this job, you can examine it and change the following items: The volume for the default storage group. The authorization level. You can make it more restrictive. Miscellaneous authorizations. You can add additional authorization to other buffer pools. If you use a product that uses a semicolon as a delimiter: The CLIST adds SQL statements to job DSNTIJSG, but products that use a semicolon as a delimiting character cause semicolons to be removed from the installation CLIST before it is executed. To correct the problem, replace the semicolons at the end of each SQL statement in job DSNTIJSG before you run the job. If you want to use the Data Facility Storage Management Subsystem to control the placement of data across volumes, edit job DSNTIJSG to replace the volume serial with '*', as in the following statement: CREATE STOGROUP SYSDEFLT VOLUMES (' ') ... When you run the DSNTIJSG job, it does the following: # Binds DB2 plans including SPUFI and DCLGEN. Creates the default storage group, which is used for your database, table space, and table definitions that are not related to a specific storage group. Grants use of the default buffer pool and storage group to PUBLIC. Grants use of the SYSDEFLT table space. This table space does not really exist, but this GRANT statement is necessary to give users the ability to implicitly create table spaces in the default database. Grants authority to create tables and table spaces in the default database to PUBLIC. Grants execute privilege on the plans for the SPUFI, DCLGEN, and DSNTIAD sample program to PUBLIC. Grants SELECT authority to the dummy table, SYSIBM.SYSDUMMY1 in the DSNDB06.SYSSTR table space. # Defines the following DB2-supplied stored procedures:
273
# # # # # # # # # # #
SQL procedures processor stored procedure, which is used by the DB2 UDB Stored Procedure Builder Utility invocation stored procedure Subsystem parameter brower stored procedure, which is used by DB2 Visual Explain
See Appendix B of DB2 Utility Guide and Reference for information on stored procedures that perform utility functions. Creates the SQL procedures database, DSNDPSM, which is used by DSNTPSMP and the DB2 UDB Stored Procedure Builder. Stored procedures can be enabled after installation or migration. See Enabling stored procedures after installation on page 283 for the specific required steps. The DSNTIJSG job also does the following for user maintained database activity: Creates the resource limit facility database. See Section 5 (Volume 2) of DB2 Administration Guide for more information. Creates the data definition control support database. For more information, see Section 3 (Volume 1) of DB2 Administration Guide. The DSNTIJSG job inserts a blank row into the communication database (CDB) table SYSIBM.LUNAME. The CDB holds tables containing information about your connection with remote DB2 subsystems. A blank row allows all SNA clients access to DDF. TCP/IP remote clients can not be controlled using the CDB. For more information about starting DDF, see Distributed data facility panel: DSNTIP5 on page 222. Field 3 of panel DSNTIP5, TCP/IP ALREADY VERIFIED, defines the minimum security requirements for all TCP/IP clients because inbound security requirements cannot be established on individual clients. For instructions on how to populate these tables, see Step 4: Populate the communications database on page 458 for VTAM information and Step 4: Populate the communications database on page 493 for TCP/IP information. If the DSNTIJSG job runs successfully, it produces return codes of 0. It can also produce a return code of 4 because a step within this job attempts to delete a row from a table that might not exist at the time this job is run. Expect the following messages from the BIND statement for each object provided by DB2: DSNE932I DSNE932I DSNE932I WARNING, ONLY IBM-SUPPLIED PLAN NAMES SHOULD BEGIN WITH DSN WARNING, ONLY IBM-SUPPLIED PACKAGE-IDS SHOULD BEGIN WITH DSN WARNING, ONLY IBM-SUPPLIED COLLECTION-IDS SHOULD BEGIN WITH DSN
If the DSNTIJSG job fails or abends, be sure that the user specified on the JOB statement is authorized. Use the same name you specified for either the SYSTEM ADMIN 1 option or the SYSTEM ADMIN 2 option on installation panel DSNTIPP. | Correct any other problems with the DSNTIJSG job and rerun it. If there are not enough resources to run the job, review the values you specified for the DB2 installation parameters (see job DSNTIJUZ). Use the standard update procedure to make any necessary modifications. Refer to The update process on page 246 for information on the standard update procedure. Then stop DB2, rerun the DSNTIJUZ job, start DB2, and rerun the DSNTIJSG job.
274
Installation Guide
# # # # # # # # # #
Installation step 17: Bind the packages for DB2 REXX Language Support: DSNTIJRX
Before you can use DB2 REXX Language Support, you must bind DB2 packages that DB2 REXX Language Support uses. Run job DSNTIJRX to do this. Before you run DSNTIJRX, make the following changes: Add a job statement. Change DSN SYSTEM(DSN) to DSN SYSTEM(ssid), where ssid is the name of the DB2 subsystem on which you will use DB2 REXX Language Support. Change all instances of DSN!!0 to your DB2 data set name prefix. Change all instances of DSNTIA!! to the plan name for the DSNTIAD program.
Installation Step 18: Back up the DB2 directory and catalog: DSNTIJIC
Attention: You need to create a backup copy of the DB2 directory and catalog. DB2 starts if you do not have backup copies, but if errors occur in the directory or catalog that require you to reinstall DB2, you lose all your tables and data. Recommendation: Copy the catalog and directory at least daily if you make any changes in them. Recovery for these databases is longer if the copies are not current, and the entire subsystem is affected. For data sharing considerations, see DB2 Data Sharing: Planning and Administration. To create a copy of the DB2 directory and catalog, run the DSNTIJIC job. Before you run the DSNTIJIC job, examine the job for the following: The tape unit name. The job lists the tape unit name as TAPE. If this is incorrect for your site, correct it. The name TAPE is also the unit name for the default archive log data sets. Expiration date or retention period. You can add a retention period or an expiration date to the job. The user on the JOB statement. Make sure the user is authorized. This must be the same user you specified for either the SYSTEM ADMIN 1 option or the SYSTEM ADMIN 2 option on installation panel DSNTIPP.
275
The DSNTIJIC job contains a list of all the DB2 directory and catalog table spaces. When you run job DSNTIJIC, it invokes the DB2 image copy utility to copy these table spaces to tape. The copied table spaces allow you to recover the DB2 catalog and DB2 directory in case of a failure. If the DSNTIJIC job fails or abends, verify that there are no problems with the tape setup for image copy. If this does not fix the problem, examine the utility job output (JOBLOG) or the console log for problems. For instance, make sure there are no incorrect sizes or I/O errors. Run the DSNTIJIC job periodicallyperhaps daily or weekly. This reduces the amount of time required for recovering the directory or catalog. The copied data and log data sets are needed for recovery.
276
Installation Guide
Installing NetView: If you use DDF, you might want to install NetView so that DB2 can send alerts to NetView if DB2 detects security exposures or protocol errors. For information about installing NetView, see NetView Installation and Administration Guide.
Planning considerations
The primary consideration in planning for a second DB2 subsystem is its purpose. Using a second subsystem has a substantial impact on your environment. Second DB2 subsystems are not uncommon; they have been used to: Run separate service levels of the code. This can provide more extensive testing of preventive service before use with a production system. Run separate releases of the code. However, two different releases of DB2 on the same system must have separate libraries. Separate test and production activities. This setup can improve DB2's performance and availability for production. For example, suppose the processor that runs your production subsystem fails. If your test subsystem is on another processor, you can stop the test subsystem and start the production subsystem on that processor. This only works if the requisite DB2 data sets are on shared DASD and you have used global resource serialization (or an equivalent) to protect the production DB2 data sets. Prevent access by one class of users to certain data. If this is your primary purpose, it is probably worthwhile to reconsider the DB2 authorization scheme. Table 50 lists other considerations in planning for a second DB2 subsystem.
Table 50 (Page 1 of 2). Considerations for installing a second DB2 subsystem Where to Find Information Page 278 Note
1
Considerations Libraries RACF protection DB2 logging Database space requirements Performance Distributed data facility requirements
Decisions You Need to Make A single, shared library or separate libraries Resource and ID for the two subsystems BSDS, active, and archive log space requirements DB2 directory, DB2 catalog, and user data Processor and main storage use Coordination of location names, logical unit names, and network passwords with remote DB2 subsystems
Page 443
277
Table 50 (Page 2 of 2). Considerations for installing a second DB2 subsystem Where to Find Information Page 46 Page 278
Decisions You Need to Make DB2 and the IRLM Giving different names to active and archive log data sets, or including those data sets in the GRS inclusion list
Note:
1 2
See Section 3 (Volume 1) of DB2 Administration Guide See Section 5 (Volume 2) of DB2 Administration Guide
Each subsystem must have a separate prefix.SDSNEXIT library. Sharing the prefix.SDSNSAMP library requires coordination to avoid overlaying parameter members. In an environment where DB2 uses shared DASD, use different data set names for the active and archive log data sets if possible. If this is not possible, include those data sets in the global resource serialization (GRS) inclusion list. See Considerations for using shared DASD on page 282 for more details.
Installation procedure
This section describes the principal steps to take when installing a second DB2 subsystem.
278
Installation Guide
Table 51 (Page 2 of 2). Parameters to change when installing the second subsystem Installation Panel DSNTIPT DSNTIPU DSNTIPQ DSNTIPG DSNTIPW DSNTIPV DSNTIP3 DSNTIPD Action Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. You must change SUBSYSTEM NAME. Check all values and make appropriate changes. Change integrated catalog facility catalog to match the new integrated catalog facility catalog. Change all passwords. Change SUBSYSTEM NAME and SUBSYSTEM PREFIX. Check all values and make appropriate changes. You must change data set names and prefixes. Check all values and make appropriate changes. You must change data set names and prefixes. Check all values and make appropriate changes. You must change data set names and prefixes. Check all values and make appropriate changes. You must change names and password. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check all values and make appropriate changes. Check EDMPOOL value; no other changes can be made.
DSNTIPM DSNTIPL DSNTIPA DSNTIPS DSNTIPR DSNTIP5 DSNTIPX DSNTIPZ DSNTIPY DSNTIPC
279
280
Installation Guide
Comments Add STEPLIB statements if you have decided to have a separate library for the second subsystem or manage two different SDSNEXIT data sets. The STEPLIB statement must be authorized using the authorized program facility (APF). A DB2 logon procedure can use only one set of DB2 libraries.
Update the SYSPROC library if you decide to have a separate library for the second subsystem. Update the ISPPLIB library if you decide to have a separate library for the second subsystem. Update the ISPMLIB library if you decide to have a separate library for a second subsystem.
Customize panel
You must update the ISPF primary option panel (ISR@PRIM) if you decide to have a separate library for the second subsystem. Grant authorization on both subsystems as necessary. Specify the new subsystem name as required.
Connecting the IMS Attachment Facility: The following list shows the procedures to follow when connecting a second IMS attachment facility. Procedure STEPLIB DFSESL Subsystem member Language interface Linkage editor JCL Authorize users Comments For separate libraries, change this DD statement to refer to the new libraries. For separate libraries, change this DD statement to refer to the new libraries. Define a new subsystem name, language interface token (LIT), and command recognition character (CRC). Define a new LIT and reassemble. Specify the library containing the new language interface. Perform this procedure.
DSNTIJIC
281
DSNTIJTM DSNTIJSG
Run this job. If you use the same library prefix for both subsystems, then change the name of the data sets listed below, unless you do not need them on the first subsystem. Later jobs write information in them and prevent use of the new load module DSNTIAD with the previously bound plan DSNTEP61 on the first subsystem. prefix.DBRMLIB.DATA prefix.RUNLIB.LOAD
DSNTEJxx
If you use the same library prefix for both subsystems, then change the name of the data sets listed below, unless you do not need them on the first subsystem. Later jobs overwrite information in them and prevent use of the new load modules of sample programs with the previously bound sample plans on the first subsystem. prefix.DBRMLIB.DATA prefix.SRCLIB.DATA prefix.RUNLIB.LOAD
282
Installation Guide
283
Run DSNTIJUZ. Restart DB2 with the new parameters. For DB2-established stored procedures: Generate a ssnmSPAS PROC supplying the pertinent information: PROCNAME, SUBSYS name, NUMTCB, STEPLIB libraries. Use procedure DSNSPAS in DSN610.SDSNSAMP as a model. Authorize the ID associated with the stored procedure to use CAF. For WLM-established stored procedures: Define JCL procedures for the stored procedures address spaces. Member DSNTIJMV of data set DSN610.SDSNSAMP contains sample JCL procedures for starting WLM-established address spaces. Define WLM application environments for groups of stored procedures and associate a JCL startup procedure with each application environment. See Section 5 (Volume 2) of DB2 Administration Guide for information on how to do this. The second method does not give you a migration path because your DSNTIDxx member and DSNTIJUZ parameters are not saved for future input. In addition, this second method does not generate the sample jobs DSNTEJ6S, DSNTEJ6P, DSNTEJ6D, DSNTEJ6T, DSNTEJ61, DSNTEJ62, DSNTEJ63, DSNTEJ64, and DSNTEJ65 becasue you are not running the DSNTINST CLIST. For more information on stored procedures, see Section 7 of DB2 Application Programming and SQL Guide. # # # # # # # # # # # # # # # # # #
| #
For more information on stored procedures, see Section 7 of DB2 Application Programming and SQL Guide. See Appendix B of DB2 Utility Guide and Reference for information on stored procedures that perform utility functions.
284
Installation Guide
# # # # # # # # # # # # # # # # # # # # # # # # # #
Change all instances of DSN!!0.SDSNLOAD to the name of your DB2 load library. Change all instances of DSN!!0.RUNLIB.LOAD to the name of your application load library. Change all instances of DSN!!0.SDSNDBRM to the name of your DB2 DBRM library. Change all instances of DSNTIA!! to the plan name for program DSNTIAD. In all instances of SYSTEM(DSN), change DSN to your DB2 subsystem name. For more information on stored procedures, see Section 7 of DB2 Application Programming and SQL Guide.
285
286
Installation Guide
Migration considerations
# # | | | | | | | | | | Be aware of the following changes that might affect your migration to Version 6. For information on how migration might affect your DB2 operations, see Make adjustments for release incompatibilities on page 294. Subsystem parameter OJPERFEH is no longer used.
287
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
288
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Stored procedures
In earlier releases of DB2, columns AUTHID and LUNAME of catalog table SYSIBM.SYSPROCEDURES were used to uniquely identify multiple instances of a procedure. After migrating to Version 6, use the SCHEMA column in the SYSIBM.SYSROUTINES catalog table, the CURRENT PATH special register, and the PATH bind option to identify multiple instances of a procedure. During migration, DB2 generates CREATE PROCEDURE statements which populate SYSIBM.SYSROUTINES and SYSIBM.SYSPARMS. Rows in SYSIBM.SYSROUTINES that contain non-blank values for columns AUTHID or LUNAME are not used to generate the CREATE PROCEDURE statements. You can identify those rows by using the following statement: SELECT FROM SYSIBM.SYSPROCEDURES WHERE AUTHID <> ' ' OR LUNAME <> ' ';
DB2 also copies rows in SYSIBM.SYSPROCEDURES into table SYSIBM.SYSPARMS and propagates information from the PARMLIST column of SYSIBM.SYSROCEDURES into SYSIBM.SYSROUTINES and SYSIBM.SYSPARMS. Procedures migrated from Version 5 do not have an owner, because they were not created with the CREATE PROCEDURE statement. DB2 authorization treats these migrated procedures differently than procedures created with CREATE PROCEDURE. The authorization for migrated procedures is unchanged. Catalog table SYSIBM.SYSPROCEDURES is not used in Version 6 to define stored procedures to DB2. The SYSCAT.PROCEDURES view of catalog table SYSIBM.SYSPROCEDURES is not used to list the stored procedures registered in DB2. Although these tables are no longer used in Version 6, DB2 does not drop them during migration because they are needed for fall back and data sharing coexistence. For more information, refer to DB2 Application Programming and SQL Guide.
289
begin. See DASD requirements for the work file database on page 41 for information about space requirements. | Table 52 shows the indexes that are new and changed for existing catalog tables.
| Table 52. Indexes added or updated sequentially using the work file database | | | | | | | | | | | | | #
Catalog table name SYSIBM.SYSINDEXPART SYSIBM.SYSCOLUMNS SYSIBM.SYSPACKDEP SYSIBM.SYSTABLEPART SYSIBM.SYSVIEWDEP SYSIBM.SYSTABAUTH Index name SYSIBM.DSNDRX02 SYSIBM.DSNDCX02 SYSIBM.DSNKDX03 SYSIBM.DSNDPX02 SYSIBM.DSNGGX03 SYSIBM.DSNATX02 Column names STORNAME TYPESCHEMA, TYPENAME BQUALIFIER, BNAME, BTYPE, DTYPE STORNAME BSCHEMA, BNAME, BTYPE GRANTEE, TCREATOR, TTNAME, GRANTEETYPE, UPDATECOLS, ALTERAUTH, DELETEAUTH, INDEXAUTH, INSERTAUTH, SELECTAUTH, UPDATEAUTH, CAPTUREAUTH,REFERENCESAUTH, REFCOLS, TRIGGERAUTH GRANTEE, GRANTEDTS DBNAME, INDEXSPACE, COPY, COPYLRSN
SYSIBM.SYSUSERAUTH SYSIBM.SYSINDEXES
SYSIBM.DSNAUH01 SYSIBM.DSNDXX02
| | | | | | |
Utility enhancements
The online REORG performance has been enhanced. The performance improvements are explained in Section 5 (Volume 2) of DB2 Administration Guide. The enhancements use new calculations for the sort and unload data sets. You may need to increase the size of your unload and sort data sets. The new calculations are explained in DB2 Utility Guide and Reference.
| | | | | | | | | | | |
3. Apply the fallback SPE to the Version 5 load library for each member in the data sharing group. For best availability, you can apply the SPE to one member at a time. You can have Version 5 systems with and without the SPE running at the same time. Stop and restart each member to pick up the change. Before migrating the first member of the data sharing group to Version 6, the fallback SPE must be applied to all members in the group. 4. Follow the procedure on migrating the data sharing group in Chapter 4 of DB2 Data Sharing: Planning and Administration. You must complete the migration of the first member of the data sharing group to Version 6 before starting any other members at Version 6. 5. To prepare for fallback, keep the subsystem parameter load module used by Version 5. The CLIST edits different jobs for enabling data sharing and migrating a data sharing member. See Chapter 4 of DB2 Data Sharing: Planning and Administration for the list of jobs that are edited for each case.
290
Installation Guide
Release coexistence
| | | | | | | | This section highlights considerations for coexistence between Version 5 and Version 6 in a data sharing and a distributed environment.
IRLM
As you apply IRLM service to members of a data sharing group, some members run with the newer service level and some with the older service level. Even though each member uses the same release level of IRLM, the different service levels can raise issues you must consider. For more information about IRLM coexistence, see DB2 Data Sharing: Planning and Administration.
Data sharing
| | | | | | | | DB2 can support both Version 5 and Version 6 members in a data sharing group. To support both releases, you must first apply the fallback SPE to all Version 5 members of the group as described in Migrating a data sharing group on page 290. Release coexistence begins when you migrate the first data sharing member to Version 6. You must successfully migrate the first data sharing member to Version 6 before attempting to migrate the other data sharing members. For the best availability, you can migrate the members to the new release one member at a time. When developing your migration plan, keep in mind that new functions introduced in this release are not available to members of the group that have not yet migrated. Thus, it is best to either: Migrate all members to the new release before you use new function. Restrict the execution of packages and plans bound on Version 6 to members of the group that have already migrated. This restriction serves two purposes. First, if new plans or packages use new functions, you avoid the application errors that can occur if the plan or package tries to execute an SQL statement that is not allowed in Version 5. Secondly, you avoid the automatic rebind that occurs when any plan or package that is bound on Version 6 is run on Version 5. It also avoids the automatic rebind that occurs when a Version 6-bound plan or package that was automatically rebound on Version 5 is later run on Version 6. If it is not possible to enforce on which member a plan or package runs, consider how to handle binds and automatic rebinds while two releases are coexisting. For more information, see the description of the AUTOBIND option of installation panel DSNTIPO. For detailed information about data sharing release coexistence considerations, see DB2 Data Sharing: Planning and Administration. TSO and CAF logon procedures: You can attach to either release of DB2 with your existing TSO or CAF logon procedures, without changing the load libraries for your applications. After you migrate completely to the latest level of DB2, you MUST update those procedures and jobs to point to the latest level of DB2 load libraries. If you forget to update those procedures and jobs before migrating to any release subsequent to Version 6, those procedures and jobs will no longer work in that subsequent release. For a detailed list of considersations for a data sharing group with mulitple DB2 releases, see Chapter 4 of DB2 Data Sharing: Planning and Administration.
| | | | | | |
| | |
291
Distributed environment
DB2 for OS/390 communicates in a distributed data environment with DB2 Version 2 Release 3 and later, using either DB2 private protocol access or DRDA access. However, the distributed functions introduced in this release of DB2 for OS/390 can be used only when using DRDA access. | Other DRDA partners at DRDA level 4 can also take advantage of the functions introduced in this release of DB2 for OS/390.
| | | | | | | | | | | | | # # # | | | | | | | | | | | | | | | | |
SELECT NAME, BPOOL, ROSHARE FROM SYSIBM.SYSDATABASE WHERE ROSHARE <> ' ' ; SELECT CREATOR, NAME FROM SYSIBM.SYSINDEXES WHERE DSETPASS <> ' ' ; SELECT DBNAME, NAME FROM SYSIBM.SYSTABLESPACE WHERE DSETPASS <> ' ' ;
292
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
293
| | | | | | | | | | | | | | | | | | | | | | | | | # # # # # # # # # # # # # # # #
APPLNAME or PROGNAME columns of PLAN_TABLE to the correct name. For more information about using access path hints, see Section 5 (Volume 2) of DB2 Administration Guide. To make sure that you do not lose any rows in the current PLAN_TABLE, use ALTER TABLE to add the new Version 6 columns to the existing PLAN_TABLE. See Chapter 6 of DB2 SQL Reference.
294
Installation Guide
# # # # | | | | | | | # # # # # # # # # # # | | | | | | | | | | | | | | | | | | | | | |
For a connection through RRSAF or CAF, after you execute an IDENTIFY call (for RRSAF) or CONNECT call (for CAF), check the RIBCNUMB and RIBCINFO fields in the RIB. RIBCNUMB must be 1 and RIBCINFO must be DSN06011. SQLCODE -101: After migrating to DB2 Version 6, it is possible to receive SQLCODE -101 on long or complicated SQL statements that previously executed successfully. This is possible because SQL statements and DB2 internal structures are buffered in the same local storage, and release changes in the internal structures can result in less storage available for the SQL statements. Rewrite the unsuccessful SQL statements by using correlated references, breaking up UNIONs or using OUTER JOINs. No colon on a host variable is an error: All host variable references must have the leading colon. If you neglect to use a colon to designate a host variable, the precompiler issues a DSNH104I message or interprets the host variable as an unqualified column name, which might lead to unintended results. The host variable without a colon is interpreted as a column name when the host variable is referenced in a context in which a column name can also be referenced. Changed format for DSN messages: The DSN message identifiers can now be 8 or 9 characters long. The message identifier formats are DSNcnnnI and DSNcnnnnI. To accommodate the longer message identifier, the message text will begin in column 13 for all DSN messages. If you have applications that scan the text of DSN messages, you might have to modify them. Changed format for message DSNU050I: Certain formatting problems in message DSNU050I have been corrected in Version 6. The message formats differently in Version 6 than it did in previous versions. If you have applications that scan the text of message DSNU050I, you might have to modify them. SQL reserved words: There are several new SQL reserved words in Version 6. Refer to DB2 SQL Reference for the list and adjust your applications accordingly. Using the Euro symbol: New CCSIDs that support the Euro symbol have been added to DB2. See Appendix A, Appendix A. Character conversion on page 499 for details on the coded character set identifiers. Using aliases: Prior to Version 6, aliases were known locally. Now, if remote aliases are used in SQL, they should be defined at the server site. With SET statements that assign a host variable with the value of a special register, the host variable is only assigned the local value. QUIESCE return code: The QUIESCE utility command produces a return code of 4 for duplicate names in the list of table spaces to be quiesced. This is a change from a return code of 8. The QUIESCE processing continues and the table space is quiesced only once. DSNH message ID lengths: DSNH messages can be 8, 9 or 10 characters long. Existing messages in Version 6 will not be padded with zeroes to 10 characters. Positive SQLCODE from PREPARE: A return code greater than zero can be returned from a PREPARE statement if your migrated application is using predictive governing or optimization hints.
Chapter 2-7. Migrating the DB2 subsystem
295
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Changed SQLSTATEs: For SQLCODE +2000 change the SQLSTATE to 01638. For SQLCODE +655 change the SQLSTATE to 01597. For SQLCODE +466 change the SQLSTATE to 0100D. For SQLCODE +464 change the SQLSTATE to 0100E. For SQLCODE -470 change the SQLSTATE to 39004. For SQLCODE -751 change the SQLSTATE to 38003. For SQLCODE -30081 change the SQLSTATE to 08001. New meaning for SQLCODE: SQLCODE -120 has been expanded to include a WHERE clause, SET clause, VALUES clause, or a SET ASSIGNMENT statement that includes a column function. New DBPROTOCOL option: Applications may be affected by the new DBPROTOCOL option which is both a subsystem parameter and a bind parameter. If the DBPROTOCOL option is not coded on the BIND, the value listed in the subsystem parameter DBPROTCL will be used. For plans and packages to execute the same as they did in Version 5, they may need to be rebound depending on the DBPROTOCOL value selected. In prior releases, remote access by name resulted in the use of DB2 Private Protocol to communicate with a remote DB2 for OS/390 site. Remote access with the CONNECT statement used the DRDA database protocol. Users can now specify which protocol to use when communicating with the remote server. Changed default for RELCURHL subsystem parameter: Use the RELCURHL subsystem parameter to indicate whether you want DB2 to release a data page or row lock at COMMIT for the row on which a cursor defined WITH HOLD is positioned. In Version 5, the default value was NO. Although this particular row or page lock is not necessary for maintaining cursor position, NO was provided as a default for existing applications that relied on that data lock. In Version 6, RELCURHL is a field on installation panel DSNTIP4. The field name is RELEASE LOCKS, and the default is changed to YES to provide for better concurrency (see 186 for more information). If you still require the lock, specify NO for RELEASE LOCKS. Changed default for DYNRULS subsystem parameter: In earlier releases, the default for the DYNRULS subsystem parameter is NO. This means that the values of the precompiler options are used for dynamic SQL statements in plans or packages bound with DYNAMICRULES(BIND). For Version 6, the default is YES. YES means the application programming (DSNHDECP) defaults will be used for dynamic SQL statements in plans or packages bound using DYNAMICRULES bind, define, or invoke behavior. Changed default for PTASKROL subsystem parameter: In Version 5, the default for the PTASKROL subsystem parameter is NO. For Version 6, the default is YES. See Installation step 5: Define DB2 initialization parameters: DSNTIJUZ on page 258 for an explanation of the values for this parameters. Using new column called CLUSTERRATIOF: The CLUSTERRATIOF column has been added to SYSINDEXES and SYSINDEXSTATS. After migration this column will have a default value until it is updated by RUNSTATS or some other application. If the optimizer sees the default value in CLUSTERRATIOF, it will use the value in CLUSTERRATIO. Support for large objects: The following incompatibilities result from the expansion of the SQLDA to support large objects:
296
Installation Guide
| | | | | | | | | | | | | | | | | | | # # # # # # #
Because of the additional data types supported in Version 6, the host language statements generated by the precompiler for each SQL statement include a larger parameter list. As a result, the size of the object code that results from compiling the output of the precompiler increases. This increase varies according to the number of host variables that are specified in an SQL statement. INCLUDE SQLDA generates additional fields for applications written in assembler, PL/I, C, and C++ (see Appendix C of DB2 SQL Reference for descriptions of these fields). If an SQL application program written in one of those languages defines a name that matches any symbol in the additional fields, and the program also uses INCLUDE SQLDA, then that program might not operate, assemble, or compile correctly. A technique for reducing the number of matching columns no longer works: Section 5 (Volume 2) of DB2 Administration Guide formerly described a technique for reducing the number of matching columns for an index by changing equal predicates to BETWEEN predicates. Due to enhancements to BETWEEN predicate processing, this technique no longer reduces the number of matching columns. If you have written queries that use this technique, consider using the alternative technique of discouraging the use of a particular index. New reserved qualifer for tables, SESSION: DB2 uses a new implicit qualifier, SESSION for a declared temporary table. All tables with a high level qualifier of SESSION will be treated as a declared temporary table. You must modify any existing tables with a high level qualifier of SESSION to use another qualifier. Use the following query to identify existing tables, views, aliases, and synonyms that will be inaccessible because of the 'SESSION' qualifier: Product-sensitive Programming Interface SELECT 'TABLE', CREATOR, NAME FROM SYSIBM.SYSTABLES WHERE CREATOR = 'SESSION' AND TYPE IN ('T', 'G', 'X') UNION SELECT 'VIEW', CREATOR, NAME FROM SYSIBM.SYSTABLES WHERE CREATOR = 'SESSION' AND TYPE = 'V' UNION SELECT 'ALIAS', CREATOR, NAME FROM SYSIBM.SYSTABLES WHERE CREATOR = 'SESSION' AND TYPE = 'A' UNION SELECT 'SYNONYM', CREATOR, NAME FROM SYSIBM.SYSSYNONYMS WHERE CREATOR = 'SESSION'; End of Product-sensitive Programming Interface DB2 cannot know during the bind of the plan or package whether the static SQL statement that references a table name qualified by SESSION is for a persistent base table or for a declared temporary table. These static SQL statements will be incrementally bound at run-time when the static SQL statement is issued.
# # # # # # # # # # # # # # # # # # # #
297
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
298
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Index changes
Indexes that have been altered, rebuilt, reorged, or newly created can increase in size by one page per nonpartitioned index or one page per index partition. The leaf distribution column (LEAFDIST) value in SYSINDEXPART may increase for indexes that have been altered, rebuilt, reorged, or newly created.
299
| | | | | | | | | | | |
LOAD REBUILD INDEX REORG The new calculations are explained in DB2 Utility Guide and Reference under the topic for defining work data sets for each utility.
Migration Step 2: Run link checker on DB2 for OS/390 Version 5 table spaces (optional)
DSN1CHKR (link checker) is the utility that verifies the integrity of the DB2 directory and catalog table spaces. DSN1CHKR scans the specified table space for broken links, hash chains, and orphans (records that are not part of any link or chain). You need only run DSN1CHKR on catalog and directory table spaces that contain links or hashes. You must issue the STOP DATABASE command on these table spaces before running DSN1CHKR on them. These table spaces include: DSNDB06.SYSDBASE DSNDB06.SYSDBAUT DSNDB06.SYSGROUP DSNDB06.SYSPLAN DSNDB06.SYSVIEWS DSNDB01.DBD01 In addition, run DSN1COPY with the CHECK option on all of the catalog table spaces. This ensures that the table space pages are physically correct and the catalog table spaces are clustered. When you run this utility on segmented table spaces you might get message DSN1985I. The segmented table spaces in the catalog and directory are: DSNDB06.SYSPACKAGE, DSNDB06.SYSSTR, DSNDB06.SYSSTATS, DSNDB06.SYSDDF, DSNDB01.SYSUTILX, and DSNDB01.SPT01. You can ignore this message, see description of DSN1985I in DB2 Messages and Codes for details. We highly recommend running DSN1COPY and DSN1CHKR with the catalog and the directory table spaces stopped, or with DB2 stopped. We also recommend running the CHECK INDEX utility. For more information on DSN1CHKR and DSN1COPY, see Section 3 of DB2 Utility Guide and Reference. For more information on CHECK INDEX, see Section 2 of DB2 Utility Guide and Reference. You should run the following query on your Version 5 catalog tables to ensure that you do not have a STOGROUP defined with both specific and non-specific volume IDs. If the query returns any rows, the STOGROUPs identified have both specific and non-specific volume IDS. Table spaces in databases that use these STOGROUPs can not be image copied or recovered until ALTER STOGROUP is used to remove volumes so the STOGROUP has either specific or non-specific volume IDs.
| | | | | |
300
Installation Guide
This query is commented out in Version 6 member DSNTESQ of prefix.SDSNSAMP. General-use Programming Interface SELECT FROM SYSIBM.SYSVOLUMES V1 WHERE VOLID = ' ' AND EXISTS (SELECT FROM SYSIBM.SYSVOLUMES V2 WHERE V1.SGNAME = V2.SGNAME AND V2.VOLID = ' ') End of General-use Programming Interface
Migration step 3: Determine which plans and packages are invalid after migration (optional)
Migrating to Version 6 renders some plans and packages invalid. Find out which ones are invalid by running the following queries on your Version 5 subsystem: General-use Programming Interface # # # # # # # # # # # # # SELECT DISTINCT DNAME FROM SYSIBM.SYSPLANDEP WHERE BNAME IN ('DSNATX 2', 'DSNAUHO1', 'DSNDXX 2', 'SYSCOLUMNS', 'SYSPACKAGES', 'SYSPLAN', 'SYSINDEXPART', 'SYSTABLEPART', AND BCREATOR = 'SYSIBM' AND BTYPE IN ('I','T') ORDER BY DNAME;
End of General-use Programming Interface Product-sensitive Programming Interface # # # # # # # # # # # # # # SELECT DISTINCT COLLID, NAME, VERSION FROM SYSIBM.SYSPACKDEP, SYSIBM.SYSPACKAGE WHERE BNAME IN ('DSNATX 2', 'DSNAUH 1', 'DSNDXX 2', 'SYSCOLUMNS', 'DSNDCX 1', 'SYSPACKAGE', 'DSNDKK 1','DSNDKK 'SYSPLAN', 'DSNPPH 1', 'SYSINDEXPART', 'DSNAPH 1','DSNAPX 'SYSRESAUTH', 'DSNAGH 1','DSNAGX 'SYSSTOGROUP', 'DSNSSH 1', 'SYSSYNONYMS', 'DSNDYX 1', 'SYSTABAUTH', 'DSNATX 1','DSNATX 'SYSTABLESPACE','DSNDSX 1',
2',DSNATX 3',
301
# # # # # # # #
'SYSUSERAUTH', 'DSNAUH 1','DSNAUX 2') LOCATION = ' ' BQUALIFIER = 'SYSIBM' BTYPE IN ('I','T') COLLID = DCOLLID NAME = DNAME CONTOKEN = DCONTOKEN BY COLLID, NAME, VERSION; End of Product-sensitive Programming Interface
These two queries are commented out in the Version 6 member DSNTESQ of prefix.SDSNSAMP. You can execute these queries from SPUFI or from a dynamic SQL program like DSNTEP2. After migration, you can explicitly rebind these plans and packages, or let DB2 rebind them automatically. See Section 5 of DB2 Application Programming and SQL Guide for suggestions on rebinding these plans and packages.
Migration step 5: Image copy directory and catalog in case of fallback: DSNTIJIC
Attention: You need to create a copy of your Version 5 catalog and directory for backup purposes. DB2 starts if you do not create this copy, but if errors in the catalog or directory require you to fall back to Version 5, you risk losing some of your tables and data. To create a copy of Version 5 catalog and directory, run Version 5 job DSNTIJIC. Before you run DSNTIJIC, examine the job for the following: The tape unit name. The job lists the tape unit name as TAPE. If this is incorrect for your site, correct it. The name TAPE is also used as the unit name for the default archive log data sets.
302
Installation Guide
Expiration date or retention period. You can add a retention period or an expiration date to the job. The USER option on the JOB statement. Make sure the user is authorized. This must be the same user you specified for either SYSTEM ADMIN 1 or SYSTEM ADMIN 2 on installation panel DSNTIPP. Job DSNTIJIC contains a list of all the DB2 directory and catalog table spaces. When you run DSNTIJIC, it invokes the DB2 image copy utility to copy these table spaces to tape. The copied table spaces allow you to recover the DB2 catalog and directory in case of a failure. If job DSNTIJIC fails or abends, verify that there are no problems with the tape setup for image copy. If this does not fix the problem, examine the log for problems. For instance, be sure that there are no incorrect size or I/O errors. After migration, periodically run the Version 5 job DSNTIJIC against the Version 5 directory and catalogperhaps daily or weekly. This reduces the amount of time required for recovering the DB2 directory or catalog. The copied data and log data sets are needed for recovery. If you are remigrating, you need to do one of the following: Change the names of the data sets in which the new image copies will reside. (Migration image copies use the current data set names.) Run the MODIFY utility to remove the migration image copies. If you select this option, make sure you are familiar with the MODIFY utility. See DB2 Utility Guide and Reference for more information. If DSNTIJIC has been modified to copy table spaces to DASD instead of tape, the job is limited to two DASD volumes. To change the number of DASD volumes, the job needs to be modified again using volume serial numbers instead of using VOL=REF=*.jobstep.
303
304
Installation Guide
prefix.NEW.SDSNCLST. Corrective service (program temporary fixes) for these CLISTs is sent with ++HOLD statements, noting that this additional work can be required.
Making panels, messages, and load modules available to ISPF and TSO
You must concatenate the DB2 ISPF libraries with the ISPPLIB, ISPMLIB, and ISPSLIB DD statements in your logon procedures and in any of your CLISTs where they might be allocated. These libraries are prefix.SDSNSPFP, prefix.SDSNSPFM, and prefix.SDSNSPFS. You must concatenate the DB2 English DB2I panels in prefix.SDSNPFPE or if you are using Kanji panels in prefix.SDSNPFPK to ISPPLIB. If you are using Online Help, include prefix.SDSNSPFT for ISPTLIB. DB2I uses the ISPF PROFILE and SHARED variable pools for most panel variable fields. This makes it easier to reenter a panel when panel variables have previously been specified. For the DB2 subcommands that permit LISTS of plan names, package names, DBRMs, and ENABLE and DISABLE statements, DB2I provides ISPF tables to contain all the user-specified variables for these subcommand keywords. DB2I creates and maintains a set of ISPF tables in a user-defined TSO data set that is allocated to a ddname of DSNETBLS. Table 48 on page 264 shows the library table member names and their contents. When allocating this data set, the following DCB attributes must be assigned: DSORG(PO) RECFM(F B) LRECL(8 ) BLKSIZE(n LRECL) where n is any integer. The following example shows how you might set up an ALLOCATE statement to create the data set: ALLOC DA(DSNSPFT) NEW SP(1 1) TR DIR(1 ) + DSORG(PO) RECFM(F B) LRECL(8 ) BLKSIZE(8 ) F(DSNETBLS) REUSE The following example shows how you might allocate an existing data set to the DSNETBLS ddname: ALLOC DA(DSNSPFT) F(DSNETBLS) REUSE
| |
If you do not allocate the DSNSPFT data set and connect it to ISPF, DB2I allocates a temporary data set for the ISPF table library members at DB2I startup. DB2I deletes this temporary data set when the ISPF session is terminated. DB2I uses ISPF table services to maintain individual ISPF tables within the DSNETBLS data set. For performance reasons, ISPF keeps this table library in an open state once an individual table has been updated. Attempts to close this data set using the TSO FREE command will result in error message IKJ56861I. For additional information on this TSO error message and how to close this data set, refer to ISPF V4 Messages and Codes. If you want to run the ISPF/CAF sample application provided with DB2, be sure that the data set prefix.RUNLIB.LOAD is included in the STEPLIB concatenation of the
305
logon procedure or in the ISPLLIB concatenation list. For more information about the ISPF/CAF sample application, see Running dynamic SQL and the ISPF/CAF application on page 351. Refer to 304 for more information on using your TSO and CAF logon procedures.
306
Installation Guide
The QUIESCE keyword allows DB2 to complete processing of currently executing programs. This can require some processing time. 2. Issue the command: -DSN1 START DB2 ACCESS(MAINT) This allows only the install-defined system administrators and system operators to access DB2. If DB2 does not start properly, it usually abends with a reason code indicating where the error occurred. To find the error, check the set of definitions for the associated resource. For example, if the bootstrap data set (BSDS) does not match the subsystem parameter values, make sure the correct jobs were run for DSNTIJUZ. Make sure you started DB2 with the correct subsystem parameter option. 3. Make sure all work is complete. Make sure no units of recovery remain. Issue the command: -DSN1 DISPLAY THREAD( ) TYPE( ) Then use -DSN1RECOVER INDOUBT for any indoubt threads. Make sure no utility work remains. Issue the command: -DSN1 DISPLAY UTILITY( ) Then, either allow utilities to complete before proceeding, or issue the command: -DSN1 TERM UTILITY( ) to stop all utility processing. Make sure no table spaces and index spaces in the DB2 directory (DSNDB01) or the DB2 catalog (DSNDB06) have write error ranges or deferred restart states. You can determine existing restrictions by issuing this command: -DSN1 DISPLAY DATABASE( ) SPACENAM( ) RESTRICT A user with system administrator or system operator authority specified on installation panel DSNTIPP, must enter this command. Recover any table spaces and index spaces with write error ranges or deferred restart states. 4. To stop DB2, issue the command: -DSN1 STOP DB2 MODE(QUIESCE) A user with install-defined system administrator or system operator authority must enter this command.
Migration step 10: Back up your DB2 for OS/390 Version 5 volumes (optional)
At this point, you can back up your Version 5 subsystem. To do this, take dumps of the DB2 subsystem data sets. You also can take dumps of the SMP/E data sets and the DB2 distribution and target libraries.
307
DSNTIJUZ actions
Besides defining the subsystem parameter module, job DSNTIJUZ does the following: | | Link-edits the assembled subsystem parameter module, DSNZPxxx into the prefix.SDSNEXIT library. Uses the assembler, the DSNHDECM macro, and SMP/E to update values you specified on installation panels DSNTIPF and DSNTIP4 and your subsystem name. The information is placed into a data-only load module, DSNHDECP, which resides in prefix.SDSNEXIT. Uses SMP/E in step DSNTIMQ to read in the edited version of DSNTIJUZ. This is required to pick up the appropriate includes and library names. After the initial run of step DSNTIMQ, it is only required when changes have been made to DSNHDECP. Uses JCLIN to ensure that macro maintenance is placed into all the needed load modules.
Additional steps
1. If you added a STEPLIB statement to the DB2 start procedures ahead of prefix.SDSNEXIT and prefix.SDSNLOAD, you can move the SYSLMOD output to that library. 2. If you changed the prefix for the DB2 distribution libraries, edit DSNTIJUZ to correct the data set names. 3. If you have not run the SMP/E ACCEPT job (DSNTIJAC) of FMID HDB6610, you must edit DSNTIJUZ so that the SMP/E temporary data set (SMPTLIB) is included in the concatenation for the ADSNLOAD DD statement in step DSNTIZQ. This ensures that member DSNARIB is linked with DSNHDECP. The linkage editor issues a return code of 8 along with message IEW0342 for the following CSECTs:
DSNFSYSP DSNVDIR1 DSNJARVP DSNZMSTR DSNJLOGP DSN3DIR1 DSNTSPRM
308
Installation Guide
309
Recommendation: For SYS1.PROCLIB, submit the procedure-update section of DSNTIJMV, as necessary. However, before you make the updates, read this section of the chapter and examine DSNTIJMV to study the updates it makes. Edit the updates directly in SYS1.PARMLIB instead of submitting the updates in the DSNTIJMV step. Whether you make the updates directly or edit DSNTIJMV to make the updates, you might first want to review Choosing link list options on page 69.
DSNTIJMV actions
1. Job DSNTIJMV updates the following SYS1.PARMLIB members: IEFSSNxx This member contains an entry for every MVS subsystem. Unless you change the DB2 subsystem name or the DB2 command prefix, you do not need to change this member. If you change the subsystem name or the command prefix, either change the current member or create a new member. You must place the line describing SMS first (if you are using SMS), followed by the JES subsystem, then the DB2 line anywhere after the JES line. IEAAPFxx or PROGxx Job DSNTIJMV updates IEAAPFxx to include the DB2 program libraries (prefix.SDSNEXIT,prefix.SDSNLOAD, prefix.SDXRRESL, and prefix.SDSNLINK) as libraries authorized using the authorized program facility (APF). | | All libraries concatenated with prefix.SDSNEXIT and prefix.SDSNLOAD in STEPLIB and JOBLIB statements must be APF-authorized. LNKLSTxx Job DSNTIJMV updates this member to include the DB2 load module library, prefix.SDSNLINK, in the LNKLSTxx. If you moved the modules from prefix.SDSNLINK into another library, edit DSNTIJMV to include that library in LNKLSTxx. If you have combined prefix.SDSNLINK and prefix.SDSNLOAD into one library, edit DSNTIJMV to include the combined library in LNKLSTxx. See OS/390 MVS Initialization and Tuning Guide for restrictions on data sets that are concatenated in LNKLST. You can do additional editing for the SYS1.PARMLIB updates. If you are editing DSNTIJMV rather than making the changes directly, you have a choice: You can either include your additional entries for the SYS1.PARMLIB members (IEAAPFxx and LNKLSTxx) at the end of the existing list of entries, or you can place them earlier in the list. If you include these entries at the end of the existing SYS1.PARMLIB list, make sure there are commas (the continuation character) delimiting each entry except the last. ECSA size is another SYS1.PARMLIB change to consider at this time. It is specified in the CSA parameter of the IEASYS00 parameter. Be sure that you have specified an adequate size for this subsystem (generally 2MB plus the MAXIMUM ECSA value on installation panel DSNTIPJ if the CROSS MEMORY value is NO).
310
Installation Guide
| | | | | | | | | |
The IOP parameter is another SYS1.PARMLIB change to consider at this time. DB2 can schedule synchronous read/write I/Os and prefetch read I/Os under the application address space's I/O scheduling priority. See Section 5 (Volume 2) of DB2 Administration Guide for more information about the effects of this type of I/O scheduling. To enable this type of I/O scheduling, you must: Use the IOP parameter to set the I/O priority for the address space of a performance group. The IOP parameter is in the IEAIPSxx member of SYS1.PARMLIB. Enable MVS I/O priority scheduling by specifying IOQ=PRTY in the IEAIPSxx member of SYS1.PARMLIB. 2. Job DSNTIJMV renames your Version 5 procedures so they are not replaced by DB2 for OS/390 Version 6 procedures. 3. DSNTIJMV updates SYS1.PROCLIB to include the following Version 6 procedures: System services address space startup procedure (xxxxMSTR) Database services address space startup procedure (xxxxDBM1) Distributed data facility address space startup procedure (xxxxDIST) Stored procedures address space startup procedure (xxxxSPAS) WLM sample procedure for stored procedures IRLM address space startup procedure (IRLMPROC) Program preparation procedures Utilities procedure (DSNUPROC). If you specified a suffix on panel DSNTIPA1, that suffix is appended to data sets &USER..DBRMLIB.DATA.suffix, &USER..RUNLIB.LOAD.suffix, and &USER..SRCLIB.DATA.suffix. To override these data set names, you must edit the updates to SYS1.PROCLIB.
311
312
Installation Guide
313
If DB2 starts successfully, the series of RESTART messages you receive concludes with these two messages: DSNR 2I DSN9 22I # # # # # # # # # # | RESTART COMPLETED DSNYASCP '-DSN1 START DB2' NORMAL COMPLETION
In the next step you migrate the DB2 catalog. Before the catalog is migrated, some catalog or directory table spaces are restricted. The following messages may occur during startup and can be ignored because the catalog and directory table spaces are restricted: DSNT501I with reason code 00C900A6 DSNL700I with reason code 00C900A6 (if DDF is auto started) abend 04E with reason code 00E70014 (during DDL registration) You can determine existing restrictions by issuing this command after you start DB2: -DSN1 DISPLAY DATABASE(*) SPACENAM(*) RESTRICT The above command might also produce message DSNT501I with reason code 00C900A6 . If DB2 does not start properly, it usually abends with a reason code indicating where the error occurred. To find the error, check the set of definitions for the associated resource. A common cause of startup failure is that the BSDS does not match the subsystem parameter values; be sure that the correct job was run for DSNTIJUZ. Also, check that the subsystem parameter member you specified (or allowed to default) when you started DB2 is the one built by the DSNTIJUZ job. Check the JCL for the DB2 start procedure. 3. Optionally, start TSO. If you want to use the TSO SUBMIT command to do housekeeping and migration verification, you must start TSO (if it is not already started).
Migration step 18: Tailor DB2 for OS/390 Version 6 catalog: DSNTIJTC
DSNTIJTC invokes the CATMAINT utility to migrate your Version 5 catalog to the Version 6 catalog. Before running this job, ensure you have enough DASD space as described in DASD requirements for the work file database on page 41 or the job will fail. See Table 52 on page 290 for a list of new and changed indexes that might affect your work file database space needs. Complete all premigration activities listed under Identify unsupported objects (DSNTIJPM) on page 292 before running this job. CATMAINT will fail if any unsupported objects are found. DSNTIJTC contains two steps. The first step of DSNTIJTC creates new catalog and directory objects, adds columns to existing catalog tables and creates and updates indexes on the catalog tables to accommodate new Version 6 objects. All IBM-supplied indexes are created or updated sequentially during the execution of DSNTIJTC. The second step of DSNTIJTC migrates stored procedures. A new status message, DSNU777I, is issued at several points during the migration process to indicate migration progress. New diagnostic error messages are issued when CATMAINT processing fails. If a problem is found during the SQL processing phase of migration then message DSNU778I is issued. If non-supported functions are encountered such as type 1 indexes then message DSNU776I is issued. All of
| | | |
# | | | | | |
314
Installation Guide
| |
these messages are written to the SYSPRINT data set. See the message descriptions in DB2 Messages and Codes for details. If job DSNTIJTC fails, save the output and verify that you are at the correct maintenance level. If you are not, you need to install the appropriate maintenance. If you are at the correct maintenance level, correct the problem and run the job again. If you run the job again and the job still fails, return to Version 5. Because CATMAINT failures roll back all Version 6 changes, the catalog and directory are in Version 5 format. Altered indexes are not rolled back. Determine if any index is in a pending status by using the CHECK INDEX utility. To return to Version 5 you need to: Rename procedures to use Version 5 libraries. Reconnect TSO, IMS, and CICS to Version 5 libraries. See Chapter 2-8. Falling back and remigrating on page 319 for details on these steps.
# #
# # | | | |
If your Version 5 system is damaged you need to perform a point in time recovery. Follow these step to recover your Version 5 system: Restore Version 5 catalog and directory from image copies. Restore BSDSs from archive logs taken prior to migration. Flush the SCA (for data sharing environments only). Recover the catalog and directory indexes. For more details on recovering data to a prior point of consistence, see Section 4 (Volume 1) of DB2 Administration Guide. When you remigrate, run the job again. To execute DSNTIJTC, you must have installation SYSADM authority.
Migration step 19: Ensure there are no problems with the catalog (optional)
Check the integrity of your DB2 for OS/390 Version 6 catalog and directory by following, in any order, these steps. | | Run CHECK INDEX on all the indexes in the catalog and directory using job DSNTIJCX. Run link checker (DSN1CHKR) to ensure that there are no existing broken links. See Migration Step 2: Run link checker on DB2 for OS/390 Version 5 table spaces (optional) on page 300 for more information. Run the queries in member DSNTESQ of prefix.SDSNSAMP. Because SPUFI is not bound yet, you cannot use SPUFI to run these queries. One alternative is to use the Version 5 DSNTEP2 program to execute the queries. Run the DSN1COPY utility with the CHECK option on the catalog table spaces.
315
Migration step 21: Bind SPUFI and DCLGEN and user maintained database activity: DSNTIJSG
In migration mode, job DSNTIJSG does the following: # # # # # | | # # # # # # # # # rebinds the IBM-defined packages alters the RLST binds the Visual Explain stored procedure redefines the utility stored procedure redefines the DB2 SQL Procedures Processor stored procedure See Appendix B of DB2 Utility Guide and Reference for information about invoking utiltites from a stored procedure. Stored procedures can be enabled after installation or migration. See Enabling stored procedures after installation on page 283 for the specific steps required to accomplish this. If you chose a default value of DRDA for DATABASE PROTOCOL on panel DSNTIP5, and your DB2 Version 6 subsystem is in a data sharing group with DB2 subsystems that are at previous release levels, you need to bind the plans for DB2-supplied applications such as SPUFI and DCLGEN with the DBPROTOCOL(PRIVATE) option so that those applications are accessible to non-Version 6 members of the data sharing group. Edit the BIND commands for DB2-supplied applications in job DSNTIJSG. If DSNTIJSG runs successfully, it produces a return code of 0. It can also produce a return code of 4 since a step within this job attempts to delete a row from a table that might not exist at the time this job is run. If DB2 SQL Procedures support is installed on your Version 5 DB2 subsystem, expect a return code of 8 on step DSNTIJP. Step DSNTIJP generates SQLCODE -601 messages to indicate that the DATABASE, TABLESPACE, TABLEs, and INDEXes for DSNDPSM already exist.There is a bind warning for each plan. Expect the following messages: DSNE932I DSNE932I DSNE932I # # # # # # # WARNING, ONLY IBM-SUPPLIED PLAN NAMES SHOULD BEGIN WITH DSN WARNING, ONLY IBM-SUPPLIED PACKAGE-IDS SHOULD BEGIN WITH DSN WARNING, ONLY IBM-SUPPLIED COLLECTION-IDS SHOULD BEGIN WITH DSN
# # # #
When you migrate the first member of the data sharing group to Version 6, DSNTIJSG rebinds SPUFI in Version 6. The Version 5 members cannot use a Version 6 SPUFI. If you attempt to run an SQL statement in a data sharing member at Version 5 with SPUFI at Version 6, expect the following messages: DSNT4 8I SQLCODE = -9 4, ERROR: UNSUCCESSFUL EXECUTION CAUSED BY AN UNAVAILABLE RESOURCE. REASON E7 9E DSNT418I SQLSTATE = 57 11 SQLSTATE RETURN CODE If job DSNTIJSG fails or abends, be sure that the user specified on the JOB statement is authorized. Use the name you specified for either the SYSTEM ADMIN 1 option or the SYSTEM ADMIN 2 option on installation panel DSNTIPP. (The RESTART parameter on the JOB statement can be useful.)
316
Installation Guide
Correct any other problems and rerun DSNTIJSG . If you encounter resource shortages, review the parameters in job DSNTIJUZ, making any necessary modifications. Then stop DB2, rerun DSNTIJUZ, start DB2, and rerun DSNTIJSG from the last successful step.
# # # # # # # # # #
Migration step 22: Bind the packages for DB2 REXX Language Support: DSNTIJRX
Before you can use DB2 REXX Language Support, you must bind DB2 packages that DB2 REXX Language Support uses. Run job DSNTIJRX to do this. Before you run DSNTIJRX, make the following changes: Add a job statement. Change DSN SYSTEM(DSN) to DSN SYSTEM(ssid), where ssid is the name of the DB2 subsystem on which you will use DB2 REXX Language Support. Change all instances of DSN!!0 to your DB2 data set name prefix. Change all instances of DSNTIA!! to the plan name for the DSNTIAD program.
Migration step 23: Image copy DB2 for OS/390 Version 6 catalog: DSNTIJIC
Create a copy of the Version 6 DB2 for OS/390 catalog and directory for backup purposes. See Migration step 5: Image copy directory and catalog in case of fallback: DSNTIJIC on page 302 for information on job DSNTIJIC.
Migration step 24: Verify your DB2 for OS/390 Version 6 system
| | | | | | Three steps verify your Version 6 subsystem. The first step which is optional, runs selected Version 5 sample jobs. If the DB2 objects from the Version 5 sample jobs exist, you can follow the procedure under Running the DB2 for OS/390 Version 5 sample jobs. If you deleted the Version 5 sample objects continue with step 2 running the Version 6 sample jobs on your Version 6 subsystem. The final step is testing your application test cases.
317
# # # # # # # # # # # # # # # # # # # # # # # #
4. Test migration of the IVP phase 2 applications from Version 5: a. DSNTEJ2A: Perform all but the first two steps of job DSNTEJ2A. Expect a return code of 4 because table spaces DSN8D51U.NEWDEPT and DSN8D51U.NEWPHONE are placed in copy pending states. b. DSNTEJ2C: Execute only the RUN PROGRAM(DSN8BC3) PLAN(DSN8BH51) statement in step PH02CS04. c. DSNTEJ2D: Execute only the RUN PROGRAM(DSN8BD3) PLAN(DSN8BD51) statement in step PH02DS03. d. DSNTEJ2E: Execute only the RUN PROGRAM(DSN8BE3) PLAN(DSN8BE51) statement in step PH02ES04. e. DSNTEJ2F: Execute only the RUN PROGRAM(DSN8BF3) PLAN(DSN8BF51) statement in step PH02FS03. f. DSNTEJ2P: Run only step PH02PS05. 5. Test migration of the IVP phase 3 applications from Version 5: a. Do not run job DSNTEJ3C or DSNTEJ3P. b. If you want to test the DB2 Version 5's ISPF/CAF applications under Version 6, you must place the Version 5 SDSNSPFP panel library ahead of the Version 6 SDSNSPFP panel library in the ISPPLIB concatenation. This is necessary in order for the plans migrated from Version 5 to be used. Be sure to remove the Version 5 SDSNSPFP library from your ISPPLIB concatenation when you are finished testing the Version 5 IVP applications under Version 6. See the Version 5 DB2 Installation Guide for directions on how to start and run the Version 5 ISPF/CAF applications. Do not run any other Version 5 sample jobs.
318
Installation Guide
Falling back
Because the structure of the DB2 for OS/390 Version 6 catalog is used in Version 5 after falling back, the fallback procedure involves only a few steps: 1. 2. 3. 4. 5. 6. Run Phase 0 of the Version 6 installation verification procedure Stop Version 6 activity Reactivate Version 5 Reconnect TSO, IMS, and CICS to Version 5 Start Version 5 Verify fallback.
You can save your Version 6 TSO LOGON procedures and JCL for remigration to Version 6.
Fallback considerations
To avoid complications, do not use the new DB2 for OS/390 Version 6 facilities until you are certain that you will not need to fall back.
Data sharing
There are additional considerations for falling back if any member of a data sharing group falls back. See DB2 Data Sharing: Planning and Administration for these details.
Frozen objects
| | | | # | | Falling back does not undo changes made to the catalog during migration to Version 6. The migrated catalog is used after fallback. Some objects in this catalog that have been affected by Version 6 function might become frozen objects after fallback. Frozen objects are unavailable, and they are marked with the release dependency marker I or J . If an object is marked with a release dependency, it is never unmarked. The release dependency marker is listed in the IBMREQD column of catalog tables. In general, objects that depend on the new facilities of DB2 for OS/390 Version 6 are frozen after you fall back to Version 5 until you remigrate to Version 6. Table 53 on page 320 lists the objects that are frozen when falling back to Version 5. They are marked with the release dependency marker, I or J.
319
| # | | | | | | | | | | | | | # | | | # # # | | | | |
Table 53. Objects frozen when falling back to DB2 for OS/390 Version 5 RELEASE DEPENDENT MARK = I or J Plans that use any new syntax or objects(1) Packages that use any new syntax or objects(1) Tables and views with triggers 8 KB and 16 KB table spaces and associated indexes(2) Plans or packages that reference user-defined functions Plans or packages using any new bind options such as DBPROTOCOL(DRDA)(3) Trigger packages Tables with LOB columns LOB table spaces Auxiliary tables Indexes on auxiliary tables Tables with columns using the ROWID data type Tables defined with a user-defined distinct type Tables defined with identity columns Any table space with a DSSIZE greater that 4GB and their associated partitioning indexes and nonpartitioning indexes with PIECESIZE greater than 4GB Notes: 1. If a plan or package simply references a declared temporary table using the qualifier SESSION., but does not use a DELCARE GLOBAL TEMPORARY TABLE statement, the plan or package does not become frozen. 2. The table spaces are marked with a release dependency. The indexes are not marked with a release dependency but are unavailable after fallback due to their association with the table spaces. 3. The release dependency is marked whether the DBPROTOCOL(DRDA) option is specified on bind, rebind, or is the default defined in the subsystem parameter.
Plans and packages become frozen objects when they use new SQL syntax, new BIND options and attributes, or reference frozen objects. When plans and packages become frozen objects, the automatic rebind process is adversely affected. See Automatic rebind on page 321 for details. General-use Programming Interface While operating in Version 5, you can determine if any of your objects are frozen by issuing the following SELECT statements:
320
Installation Guide
# # # # # # # # # # # #
SELECT NAME FROM SYSIBM.SYSPLAN WHERE IBMREQD = 'I' OR IBMREQD = 'J'; SELECT LOCATION, COLLID, NAME, VERSION FROM SYSIBM.SYSPACKAGE WHERE IBMREQD = 'I' OR IBMREQD = 'J'; SELECT CREATOR, NAME FROM SYSIBM.SYSVIEWS WHERE IBMREQD = 'I' OR IBMREQD = 'J'; SELECT CREATOR, NAME FROM SYSIBM.SYSINDEXES WHERE IBMREQD = 'I' OR IBMREQD = 'J'; SELECT CREATOR, NAME, TYPE FROM SYSIBM.SYSTABLES WHERE IBMREQD = 'I' OR IBMREQD = 'J'; SELECT DBNAME, NAME FROM SYSIBM.SYSTABLESPACE WHERE IBMREQD = 'I' OR IBMREQD = 'J'; End of General-use Programming Interface
Automatic rebind
After fallback to Version 5, plans or packages bound in Version 6 will be automatically rebound on first execution in Version 5. See DB2 Application Programming and SQL Guide for more details on automatic rebind. However, if after fallback, you try to use plans or packages that are frozen, the automatic rebind in Version 5 that takes place the first time you try to run the plan in Version 5 fails. To make the plans and packages that were not automatically rebound on Version 5 available, change the offending SQL statements or remove the reference to a frozen object, precompile the application programs, and explicitly BIND the plans and packages on Version 5.
321
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
LOB considerations: If any log records are found for LOBs, the applicable pages for the LOB table space are placed in the LPL. Optimization hints: You can still use your Version 6 PLAN_TABLE after falling back, but you cannot take advantage of the optimization hints that you have added to the PLAN_TABLE. Utilities COPY, REPORT, and RECOVER: You must use the Version 5 COPY and RECOVER utility jobs for backup and recovery after fallback. You can use utility REBUILD INDEX because of an alias. SYSIBM.SYSCOPY and SYSIBM.SYSLGRNX rows inserted for indexes in Version 6 are ignored by the backup and recovery utilities after fallback. More consistent DB2 restart times: Falling back causes postponed abort units of recovery (URs) to be treated as inabort or inflight. Their backout is performed as part of the first restart in Version 5 and all pagesets are removed from their restart pending (RESTP) state or advisory restart pending (AREST) state. If there is outstanding backout work on the pageset on another data sharing member, the pending states are not removed. Therefore, you should try to resolve postponed abort URs with the command RECOVER POSTPONED before falling back. A Version 5 system cannot request limited backout processing. However, if you enter a DISPLAY DATABASE command on Version 5, it is possible for that display to show the advisory restart pending (AREST) state of page sets that can result when Version 6 uses postponed abort processing. Similarly, if you issue a DISPLAY GROUP command on a Version 5 subsystem, a member that is both active and has indoubt URs is displayed as ACTIVE (in a Version 6 subsystem they are displayed as 'A I'). The 'A I' status means the object is active but has indoubt or postponed abort units of recovery outstanding. On fallback to Version 5, the 'A I' status will be changed to ACTIVE even if indoubts exist. However, on remigration to Version 6, the ACTIVE status will be changed back to 'A I' if the indoubts still exist. New buffer pool sizes: A CREATE or ALTER DATABASE or TABLESPACE that specifies an 8KB or 16KB buffer pool name does not work after falling back. If BUFFERPOOL is not specified on the CREATE TABLESPACE statement and the default buffer pool for the data base was an 8KB or 16KB buffer in Version 6, then SQLCODE -204 is returned. New buffer pool type: If a buffer pool is defined as VPTYPE(DATASPACE) in Version 6, and you fallback to Version 5, this buffer pool becomes a primary type buffer pool and it is allocated with the specified VPSIZE unless the VPSIZE is larger than the allowable 1.6 GB in which case the default VPSIZE is used. The BSDS is not updated during fallback so that the old values can be used on remigration. On remigration to Version 6, the original VPTYPE and VPSIZE will be used. However, if you alter these attributes using ALTER BUFFERPOOL while in fallback mode on Version 5, the BDSD will be updated and the Version 6 attributes will be lost. New CLUSTERRATIOF column: When you fallback to Version 5, the value in CLUSTERRATIO will be used. If you run RUNSTATS on Version 5, the CLUSTERRATIOF column will be reset to the default value. Upon remigration to Version 6, the optimizer will use CLUSTERRATIO until RUNSTATS is run on Version 6.
322
Installation Guide
| | | | | | | | # # # # # # # # # # # # # | | | | | | |
Changing column length in an index: Changing the length of a column of an index in Version 6 may cause an error after falling back to Version 5. A resource unavailable message with RC '00C9009E' occurs if the APAR to enable immediate index access has not been applied. Changes to cascading REVOKE privileges: When you fallback to Version 5 and attempt to revoke SYSADM or SYSCTRL privileges for a grantor and that revoke cascades down to Version 6 objects or new privilege grants on Version 5 objects, the revoke will fail with message DSNT501I. Changes to IMMEDWRITE function: This applies to data sharing environments only. If a Version 6 plan or package bound with IMMEDWRITE(YES | PH1) is executed on a DB2 Version 5 member that does not have support for the IMMEDWRITE (YES | PH1) attribute, the IMMEDWRITE(YES | PH1) attribute is ignored at runtime. The Version 5 plan or package uses the default IMMEDWRITE(NO) behavior without having to be rebound. Table and index spaces with undefined data sets: You can use the DEFINE NO option on the CREATE TABLESPACE or CREATE INDEX statements to defer creating the VSAM data set until it is used. If the underlying VSAM data sets have not been created when you fall back to Version 5, you will receive an -904 SQLCODE for any SQL statements that refer to the table spaces and index spaces with undefined data sets. Do not use the REPAIR DBD or STOSPACE utilities on the undefined data sets.
Fallback Step 1: Run phase 0 of the DB2 for OS/390 Version 6 installation verification procedure
This step removes all the installation verification processing done on DB2 for OS/390 Version 6. When you run this step, all the DB2 for OS/390 Version 6 sample tables and plans are deleted. You re-create these objects when you remigrate to Version 6.
323
3. Make sure all work is complete. Make sure no units of recovery remain. Issue the command: -DSN1 DISPLAY THREAD( ) TYPE( ) Then use -RECOVER INDOUBT for any indoubt threads. Make sure no utility work remains. Issue the command: -DSN1 DISPLAY UTILITY( ) Then, either allow utilities to complete before proceeding, or stop all utility processing with the command: -DSN1 TERM UTILITY( ) Make sure no table spaces and index spaces in the DB2 directory (DSNDB01) or the DB2 catalog (DSNDB06) have write error ranges or deferred restart states. Issue the command: -DSN1 DISPLAY DATABASE(DSNDB 1) SPACENAM( ) RESTRICT -DSN1 DISPLAY DATABASE(DSNDB 6) SPACENAM( ) RESTRICT A user with install-defined system administrator or system operator authority also must enter this command. Recover any table spaces and index spaces with write error range or deferred restart states. 4. To stop DB2, issue the command: -DSN1 STOP DB2 MODE(QUIESCE) A user with install-defined system administrator or system operator authority also must enter this command. If IRLM does not stop automatically when DB2 stops, stop IRLM manually. To stop IRLM, issue the command: STOP irlmproc where irlmproc is the name you assigned to the IRLM startup procedure. | |
324
Installation Guide
| |
Fallback Step 4: Reconnect TSO, IMS, and CICS to DB2 for OS/390 Version 5
Reestablish your Version 5 logon procedures and JCL, as well as the CICS Version 4 and IMS connections. If you overwrote the load module during migration to DB2 for OS/390 Version 6, reassemble the RCT with the Version 5 libraries. If you did not overwrite the load module, change the STEPLIB statements for CICS and IMS jobs so they refer to the Version 5 libraries.
3. If you have done distributed processing with your DB2 for OS/390 Version 6 subsystem, check message DSNR005I for the number of INDOUBT threads after you start DB2. If there are no INDOUBT threads, continue falling back as if you had not done any distributed processing. If there are INDOUBT threads, issue the command: -DSN1 DISPLAY THREAD( ) TYPE(INDOUBT) If the number of INDOUBT threads reported in the DSNV408I messages is equal to the number of threads reported in the DSNR005I message, continue falling back as if you had not done any distributed processing. If there are fewer INDOUBT threads reported by DSNV408I messages than in message DSNR005I, proceed as follows:
325
a. Stop Version 5. b. Determine which units of work are incomplete by scanning the DB2 recovery log with the DB2 for OS/390 Version 6 DSN1LOGP utility. Use the SUMMARY option of this utility. c. Examine the DSN1LOGP output to find all the DSN1162I messages that have a COORDINATOR name in a remote location. Each of these messages identify an INDOUBT DBAT. Record the LUWID displayed in each message. d. Decide whether to COMMIT or ABORT each INDOUBT DBAT. One way to do this is by contacting the COORDINATOR location. If it is another DB2, use the DISPLAY THREAD command to help you decide. e. If you have not already done so during migration, apply the fallback PTF supplied with Version 6. f. Start Version 5 again. g. Issue the RECOVER INDOUBT ACTION(correct decision) LUWID(luwid) command to resolve each INDOUBT DBAT. 4. If you have not done distributed processing with your DB2 for OS/390 Version 6 subsystem, check outstanding restrictions after you start DB2. Identify databases whose uses are restricted with the command: -DSN1 DISPLAY DATABASE( ) SPACENAM( ) RESTRICT You can start some of these databases at this time. For more information on starting restricted databases, see Section 4 (Volume 1) of DB2 Administration Guide. 5. If DB2 does not start properly, it usually abends with a reason code indicating where the error occurred. To find the error, check the set of definitions for the associated resource. A common cause of startup failure is that the BSDS does not match the subsystem parameter values; be sure that the startup procedure is pointing to the correct BSDS and subsystem parameter. Also, check that the subsystem parameter member you specified (or allowed to default) when you started DB2 is the one built by job DSNTIJUZ. Check the JCL for the DB2 startup procedure. 6. Optionally, start TSO. If you want to use the TSO SUBMIT command to do housekeeping and fallback verification, you must start TSO (if it is not already started). |
326
Installation Guide
Remigrating
Migrating after falling back (remigrating) is similar to the normal migrating process. When remigrating, refer to Migration considerations on page 287 because many of those considerations apply to remigrations, too. Which considerations apply depends on the type of activity that took place on your Version 5 subsystem after falling back. A plan or package is automatically rebound in Version 6 when executed for the first time after remigration if it was not explicitly bound in Version 5. However, if you specified NO for the AUTO BIND option on installation panel DSNTIPO, then automatic binds are disabled. This means that the plan or package from your previous release is the one that runs in Version 6. This means the plan or package does not benefit from Version 6 enhancements. When remigrating, you do not have to: Allocate the target and distribution libraries Run the SMP/E jobs Run the installation CLIST IPL MVS. When remigrating, you do have to: 1. Run DSN1COPY with the CHECK option on the Version 5 catalog table spaces. Also, run DSN1CHKR on Version 5. For information on these utilities, see Migration Step 2: Run link checker on DB2 for OS/390 Version 5 table spaces (optional) on page 300. Finally, execute the queries in member DSNTESQ of prefix.SDSNSAMP. 2. Image copy the Version 5 catalog using the DSNTIJIC job. Although this step is not required, it is recommended. See Migration step 5: Image copy directory and catalog in case of fallback: DSNTIJIC on page 302 for more information. 3. Stop Version 5. 4. Reconnect TSO, IMS, and CICS to DB2 for OS/390 Version 6. Reestablish your Version 6 logon procedures and JCL, as well as your Version 6 CICS and IMS connections. 5. Rebuild Version 6 cataloged procedures. Rename the Version 6 procedures that were renamed by job DSNTIJFV during fallback. If job DSNTIJFV was not run, job DSNTIJMV must be re-run. Comment out step 1 (DSNTIMP), which defines Version 6 to MVS, and run the job. (There is no need to define Version 6 to MVS a second time.) 6. Start DB2 for OS/390 Version 6. Make sure you are using your Version 6 subsystem parameter. 7. Image copy the Version 6 catalog using the DSNTIJIC job. For information on job DSNTIJIC, see Migration step 5: Image copy directory and catalog in case of fallback: DSNTIJIC on page 302. 8. Verify your DB2 for OS/390 Version 6 system.
327
For information on this procedure, see Migration step 24: Verify your DB2 for OS/390 Version 6 system on page 317.
328
Installation Guide
329
| | | |
| |
0 1
|
2
330
Installation Guide
Table 54 (Page 2 of 5). Relationship of phases to programs Phase Job DSNTEJ2D Program DSNTIAD DSN8BD3 DSNTEJ2E DSN8MDG DSN8BECL DSNTIAD DSN8BE3 DSNTEJ2F DSNTIAD DSN8BF3 DSNTEJ2P DCLGEN DSNTIAD DSN8BP3 Description Grant execution C phone application Prepare error message routine Prepare classes used by C++ phone application Grant execution C++ phone application Grant execution Fortran phone application Generate declarations Grant execution PL/I phone application Register sample user-defined functions C program for ALTDATE function (current date) C program for ALTDATE function (given date) C program for ALTIME function (current time). C program for ALTTIME function (given time) C program for CURRENCY function C program for TABLE_NAME, TABLE_SCHEMA, and TABLE_LOCATION functions C++ program for DAYNAME function C++ program for MONTHNAME function Dynamic SQL program User defined table function sample C program on client for user defined table function sample Sample SPUFI input Grant execution COBOL interface to call attachment facility COBOL connection manager COBOL phone application COBOL organization application Dynamic SQL application Grant execution
| | | | | | | | | | | | | | | | | # | | |
3
DSNTEJ2U3
DSN8EUDN DSN8EUMN DSNTEP2 DSN8DUWF DSN8DUWC SPUFI DSNTEJ3C DSNTIAD DSN8CC DSN8SCM DSN8SC3 DSN8HC3 DSNTEJ3P DSNTEP2 DSNTIAD
331
Table 54 (Page 3 of 5). Relationship of phases to programs Phase Job Program DSN8SPM DSN8SP3 4 DSNTEJ4C DSNTIAD DSN8ICx DSN8MCx DSNTEJ4P DSNTIAD DSN8IPx DSN8MPx 5 DSNTEJ5A DSNTEJ5C DSNTIAC DSNTIAD DSN8CCx DSN8MCx DSNTEJ5P DSNTIAD DSN8CPx DSN8MPx 6 DSNTEJ6 DSNTIAD Description PL/I connection manager PL/I phone application Grant execution Organization application Copy code Grant execution Organization, project applications Copy code CICS SQLCA formatter front-end Grant execution Organization application Copy code Grant execution Organization, project applications Copy code Update location column in the department table to the sample location entered at installation time Compile, link-edit, bind, and run stored procedure sample application Register, prepare, and bind the stored procedure sample application Invoke the sample stored procedure Create sample stored procedure Compile, link-edit, bind, and run stored procedure to execute a utility Create sample ODBA stored procedure Invoke sample ODBA stored procedure Register, prepare, and bind sample SQL procedure DSN8ES1. Grant execution Call the sample SQL procedure, DSN8ES1 from a client Run sample SQL procedure that calculates employee earnings. Call the SQL procedure processor, DSNTPSMP Run SQL procedure that calculates employee bonuses Call SQL procedure, DSN8ES2
DSNTEJ6D4 DSNTEJ6T4
DSN8ED1 DSN8ED2 DSN8EP1 DSN8EP2 DSN8EPU DSN8EC1 DSN8EC2 DSNTIAD DSNTIAD DSN8ED3 DSN8ES1
| | | | | | | | # # # # # # # # # # # #
DSNTEJ658
332
Installation Guide
Table 54 (Page 4 of 5). Relationship of phases to programs Phase Job DSNTEJ7 Program DSNTIAD DSNTIAD DSNUTILB DSNUTILB DSNTEJ71 DSNTIAD DSN8DLPL DSN8DLTC DSNTEJ73 DSNTIAD DSN8DLRV DSNTEJ759 DSNTIAD DSN8DLPV Description Create sample LOB table Create synonyms, grant access to LOB tables Load sample LOB table Produce statistics for LOB table spaces Grant access to plans Populate sample LOB table with BLOB data Verify contents of LOB table Grant access to plans C employee resume application Grant access to plans C employee photo application
| | | | | | | | | | | | | |
333
Table 54 (Page 5 of 5). Relationship of phases to programs Phase Note: 1. Job DSNTEJ1S, which contains the sample JCL to run the schema processor, is not a part of the sample applications to verify installation. For more information on the schema processor, see Section 2 (Volume 1) of DB2 Administration Guide 2. Job DSNTEJ1T, used for adding rows to SYSIBM.SYSSTRINGS for character conversion purposes, is not a part of the sample applications to verify installation. Job Program Description
| | | | | | # | | | | | # # # # # | | | | | | # # # # | |
3. Job DSNTEJ2U is not created unless you specify C/C++ for OS/390 Version 1 Release 3 or subsequent releases at installation time. 4. Jobs DSNTEJ6T and DSNTEJ6D are not edited by the CLIST unless a REMOTE LOCATION name is entered on panel DSNTIPY, a LOCATION NAME is entered on panel DSNTIPR, a non-blank value is specified for DB2 PROC NAME on panel DSNTIPX, and you specify AUTO or COMMAND for DDF STARTUP OPTION on panel DSNTIPR. 5. Jobs DSNTEJ6P and DSNTEJ6S are not edited by the CLIST unless a REMOTE LOCATION name is entered on panel DSNTIPY, a LOCATION NAME is entered on panel DSNTIPR, a non-blank value is specified for DB2 PROC NAME on panel DSNTIPX, you specify AUTO or COMMAND for DDF STARTUP OPTION on panel DSNTIPR, and you specify PL/I for MVS and VM on panel DSNTIPG. 6. Job DSNTEJ6U is not edited by the CLIST unless a REMOTE LOCATION is entered on panel DSNTIPR, a non-blank value is specified for DB2 PROC NAME on panel DSNTIPX, you specify AUTO or COMMAND for DDF STARTUP OPTION on panel DSNTIPR, and you specify PL/I for MVS and VM on panel DSNTIPG. 7. Jobs DSNTEJ61 and DSNTEJ62 are not edited by the CLIST unless a REMOTE LOCATION name is entered on panel DSNTIPY, a LOCATION NAME is entered on panel DSNTIPR, a non-blank value is specified for WLM PROC NAME on panel DSNTIPX, you specify AUTO or COMMAND for DDF STARTUP OPTION on panel DSNTIPR, and you specify IBM COBOL for MVS and VM on panel DSNTIPQ. 8. Jobs DSNTEJ63, DSNTEJ64, and DSNTEJ65 are not edited by the CLIST unless a LOCATION NAME is entered on panel DSNTIPR, a non-blank value is specified for DB2 PROC NAME on panel DSNTIPX, and you specify AUTO or COMMAND for DDF STARTUP OPTION on panel DSNTIPR. 9. Job DSNTEJ75 is not edited by the CLIST unless the GDDM MACLIB and GDDM LOAD MODULES fields on panel DSNTIPW are non-blank.
334
Installation Guide
the seven phases to your needs. If this is your intent, identify and describe any modifications you plan to make. Establish additional testing steps to complete the verification. The verification phases and the jobs you run to perform them are valuable tools for testing DB2. They are not a substitute for a thorough subsystem test. You must plan and perform your own additional testing to complete the verification. To help you assess which additional tests might be necessary, examine the sample applications provided with DB2. Start any DB2 databases that are not currently started.
NOEXIT NOFASTSRT NOFLAGMIG NOFLAGSTD NOIDLGEN NOLIB NOLIST NOMAP NONAME NONUMBER NOOFFSET NOOPTIMIZE NOSEQUENCE NOSSRANGE NOTERM1 or TERM2 NOTEST
NOTYPECHK NOVBREF NOWORD NOXREF NUMPROC(NOPFD) OBJECT OUTDD(SYSOUT) PGMNAME(LONGUPPER) QUOTE RENT3 RMODE(AUTO) SIZE(MAX) SOURCE SPACE(1) TRUNC(STD) ZWB
Refers to jobs DSNTEJ2C, DSNTEJ3C, and DSNTEJ4C only Refers to job DSNTEJ5C only See the CICS documentation for actual options to use
335
Table 56. COB2 (vs COBOL II) options ADV APOST BUFSIZE(4096) DATA(31) FLAG(I) LANGUAGE(EN) LIB1 or NOLIB2 LINECOUNT(60) NOAWO NOCMPR2 NOCOMPILE(S) NODBCS NODECK NODUMP NODYNAM NOEXIT NOFASTSRT NOFDUMP NOFLAGMIG NOFLAGSAA NOFLAGSTD NOLIST Notes:
1 2 3
NOMAP NONAME NONUMBER NOOFFSET NOOPTIMIZE NOSOURCE1 or SOURCE2 NOSSRANGE NOTERM NOTEST NOVBREF NOWORD NOXREF1 or XREF2 NUMPROC(NOPFD) OBJECT OUTDD(SYSOUT) RENT3 RESIDENT3 SEQUENCE SIZE(MAX) SPACE(1) TRUNC(OPT) ZWB
Refers to job DSNTEJ5C only Refers to jobs DSNTEJ2C, DSNTEJ3C, and DSNTEJ4C only See the CICS documentation for actual options to use
Table 57. COBOL options ADV APOST BUF=122881 BUF=640002 COMPILE=01 DUMP FLAGW LANGLVL(2) LCOL2 LINECNT=57 LOAD LSTCOMP2 L1201 L1322 NOBATCH NOCDECK NOCLIST NOCOUNT Notes:
1 2 3 4 5 6 7
NODECK NODMAP NODYNAM NOENDJOB NOFDECK NOFLOW NOLIB NOLST1 NOLVL NOMIGR NONAME NONUM NOOPTIMIZE NOPMAP NOPRINT NORESIDEN7 NOSTATE NOSUPMAP
NOSYMDMP NOSYNTAX NOTERM NOTEST NOTRUNC NOVBREF NOVBSUM SEQ SOURCE1 or NOSOURCE2 SPACE1 SXREF3 or NOSXREF4 SYST VERB XREF5 or NOXREF6 ZWB
Refers to jobs DSNTEJ2C, DSNTEJ3C, and DSNTEJ4C only Refers to job DSNTEJ5C only Refers to jobs DSNTEJ2C and DSNTEJ4C only Refers to jobs DSNTEJ3C and DSNTEJ5C only Refers to job DSNTEJ3C only Refers to jobs DSNTEJ2C, DSNTEJ4C, and DSNTEJ5C only See the CICS documentation for actual options to use
336
Installation Guide
COBOL programs can use the VS COBOL II (COB2) compiler or the IBM COBOL for MVS & VM (formerly IBM SAA AD/Cycle COBOL/370 (COBOL/370)) compiler and even OS/VS COBOL (though the recommendation is that you use VS COBOL II or IBM COBOL for MVS & VM). If you wish to run your samples applications with IBM COBOL or COB2, but you selected an earlier version of COBOL on install panel DSNTIPF, or you just want to test with an additional version of COBOL, you can do the following to get updated installation verification procedures (IVP): Run the installation CLIST in INSTALL mode On field INPUT MEMBER NAME (field 6) in panel DSNTIPA1, use the name of the defaults file in which the defaults for your existing DB2 are stored View all other installation panels and use default values with the following exceptions: | Change the data set names in fields 1 and 3 on panel DSNTIPT. This prevents the prefix.NEW.SDSNSAMP and prefix.NEW.SDSNTEMP data sets from your original installation from being overwritten. On panel DSNTIPQ, make sure that you have entered the correct data set names for the type of COBOL for which you want new IVP jobs. On panel DSNTIPY, change the value in field COBOL TYPE (field 2) to the type of COBOL for which you want new IVP jobs. | When the installation CLIST completes, the new prefix.NEW.SDSNSAMP data set that you specified on panel DSNTIPT contains the updated IVP jobs If you would like information on the language CLIST (DSNH), refer to the DB2 Command Reference. | | For more detailed instructions, see IBM COBOL for MVS & VM Programming Guide and OS/390 Language Environment for OS/390 & VM Programming Guide.
337
| |
1. 2. 3. 4. 5. 6.
This option is used by IBM C/C++ for MVS/ESA V3R2 and subsequent releases NOPPTRACE, PPCHECK, GOTO, ACCURACY, PARM, NOENUM, NOEXTERN, TRUNC, INIT, NOPORT, GENERAL This option is used by IBM C/C++ for MVS/ESA V3R1 and subsequent releases AUTO, NOREPORT, 100, 1000 This option is used only by IBM AD/Cycle C/370 V1R2 SYM, BLOCK, LINE, NOPATH
2. This option is used by IBM C/C++ for MVS/ESA V3R2 and subsequent releases.
The installation CLIST customizes C++ compiler parameters in sample job DSNTEJ2E if you have specified C++ for MVS/ESA V3R2 or a subsequent release on panel DSNTIPU. If you wish to run your samples applications with C++ for MVS/ESA V3R2 or a subsequent release , but you selected an earlier version of that language on the installation panel, you should make the following changes: In sample job DSNTEJ2E, change all occurrences of PARM.CP='SOURCE XREF,MARGINS', to PARM.CP='/CXX SOURCE XREF,MARGINS', In sample procedure DSNHCPP2, change //CP // to //CP // EXEC PGR=CBC32 PP,COND=((4,LT,PC1),(4,LT,PC2)), REGION=4 96K,PARM='/CXX' EXEC PGR=CBC32 PP,COND=((4,LT,PC1),(4,LT,PC2)), REGION=4 96K
| |
338
Installation Guide
The installation CLIST tailors the PL/I sample programs for either OS PL/I Version 1, OS PL/I Version 2, or IBM PL/I for MVS & VM compilers, depending on the fields you entered in panel DSNTIPG. To use IMS from PL/I Version 2 Release 3 or IBM PL/I for MVS & VM, you must use the SYSTEM(IMS) compile-time option when compiling your application program. In addition, you must also specify entry point PLISTART when your application is link-edited. For more information, see OS PL/I Programming Guide or IBM PL/I MVS & VM Programming Guide as appropriate.
| | | | |
339
If this job fails or abends, be sure that the user specified on the JOB statement is an authorized ID. If the name you specified for either SYSTEM ADMIN 1 or SYSTEM ADMIN 2 on installation panel DSNTIPP is a primary authorization ID, use this name. If the sample authorization exit and RACF are installed, and the SYSTEM ADMIN 1 and SYSTEM ADMIN 2 are known to DB2 as secondary authorization IDs, you can run these jobs under a user ID in either of these RACF groups. Then correct any other problems, and rerun the job from the last successful step. If the subsystem data sets were deleted before the DB2 sample objects are deleted, you must delete the data sets using access method services or TSO commands. In all of the following examples, vcatalog is the catalog alias name you specified for the CATALOG ALIAS field on installation panel DSNTIPA2. The following access method services commands, which can be executed under TSO, delete the Version 6 sample data sets: | | | | | | DELETE DELETE DELETE DELETE DELETE DELETE 'vcatalog.DSNDBD.DSN8D61A. .I 1. ' 'vcatalog.DSNDBC.DSN8D61L. .I 1. ' 'vcatalog.DSNDBD.DSN8D61P. .I 1. ' 'vcatalog.DSNDBC.DSN8D61U. .I 1.A 1' 'vcatalog.DSNDB 4.STAFF.I 1.A 1' 'vcatalog.DSNDB 4.TESTSTUF.I 1.A 1'
| | | |
Job DSNTEJ1
Job DSNTEJ1 consists of the following steps:
Table 62 (Page 1 of 2). Steps in job DSNTEJ1 Step 1-4 5 6 Function Creates all objects (storage group, databases, table spaces, tables, indexes, and views) used by the samples. Drops synonyms Creates synonyms and grants authorization on objects to PUBLIC AT ALL LOCATIONS. This step creates synonyms for the sample tables, indexes, and views, so that the currently running authorization ID can execute the sample application and grant appropriate authority. The sample dynamic SQL program DSNTIAD is used to process the DB2 object definitions in this step and several others. Uses the ASMCL procedure to create DSN8EAE1, an edit exit routine. Does an ASM LKED for DSNHUFF.
7 8
340
Installation Guide
Table 62 (Page 2 of 2). Steps in job DSNTEJ1 Step 9 10 Function Does an ASM LKED for DSN8FPRC, a sample field procedure. Prepares the sample call attachment facility assembler interface. You must link-edit ISPLINK, the ISPF interface module, with this CAF sample load module. To do this, be sure the link-edit SYSLIB statement that gets the ISPF load module library in procedure DSNHASM is not commented out. Loads the programming-related tables using the LOAD utility. Loads the sample tables using the LOAD utility. Checks data for referential integrity. Establishes a quiesce point using both log and image copies. Makes an image copy of all the sample tables using the copy facility. Establishes another quiesce point using only image copies. Reorganizes a table space and compiles statistics on all table spaces using the REORG and RUNSTATS utilities. Performs a REORG TABLESPACE with SHRLEVEL CHANGE Loads the sample tables using the LOAD utility. Set CURRENT RULES register and add a check constraint using ALTER TABLE. Checks data for referential integrity. Checks data for check integrity. Performs the operations in steps 13-16 except for the REORG on partition 3 of the Employee table space.
11 12 13 14 15 16 17 18 19 20 21 22 23-26
If DSNTEJ1 runs successfully, it produces the return codes shown in Table 63.
Table 63 (Page 1 of 2). DSNTEJ1 return codes
Step PH01S01 PH01S02 PH01S03 PH01S04 PH01S05 PH01S06 PH01S07 PH01S08 PH01S09 PH01S10 ASM LKED ASM LKED ASM LKED PC ASM LKED DSNUPROC DSNUPROC PROCSTEP Return Code 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0000 0004 0000 0000 0000 0004
PH01S11 PH01S12
341
PH01S17 PH01S18 PH01S19 PH01S20 PH01S21 PH01S22 PH01S23 PH01S24 PH01S25 PH01S26
for every SQL statement, except for the drop synonym and insert statements. If the synonyms in the drop synonym statements are not defined, SQL return codes of -204 result. The insert statements violate a check constraint on the EMP table. This results in a SQL return code of -545. | | | | | | | | | | | | | | | | | | | | |
Job DSNTEJ1L
DSNTEJ1L link-edits the DSNTEP2 object deck (DSNTEP2L) to create an executable load module DSNTEP2. DSNTEP2 is described in Appendix D of DB2 Utility Guide and Reference. DSNTEJ1L also binds and runs program DSNTEP2. This program is then used to list the sample database tables and views. It is a dynamic PL/I program that accepts SQL statements. It produces a listing of the results of SELECT statements. Job DSNTEJ1L requires the LE link-edit and runtime libraries. DSNTEJ1L does not require the PL/I compiler. If DSNTEJ1L runs successfully, it produces the return codes shown in Table 64.
Table 64. DSNTEJ1L return codes
Step PH01PS01 PH01PS02 PROCSTEP Return code 0000 0000 or 0004
You can compare the output from this job with the sample output for DSNTEJ1L found in member DSN8TJ1L in your prefix.SDSNIVPD data set. If you run DSNTEJ1P before DSNTEJ1L, you can expect PH01PS02 of DSNTEJ1L to produce a return code of 0004 and the following message: SQLWARNING ON GRANT COMMAND, EXECUTE FUNCTION RESULT OF SQL STATEMENT: DSNT4 4I SQLCODE = 562, WARNING: A GRANT OF A PRIVILEGE WAS IGNORED BECAUSE THE GRANTEE ALREADY HAS THE PRIVILEGE FROM THE GRANTOR
342
Installation Guide
| | | | | | | | | |
If either DSNTEJ1 or DSNTEJ1L fails or abends, be sure that the USER specified in the JOB statements is an authorized ID. If the name you specified for either SYSTEM ADMIN 1 or SYSTEM ADMIN 2 on installation panel DSNTIPP is a primary authorization ID, use this name. If the sample authorization exit and RACF are installed, and the SYSTEM ADMIN 1 and SYSTEM ADMIN 2 are known to DB2 as secondary authorization IDs, you can run these jobs under a user ID in either of these RACF groups. Then, correct any other problems. Before rerunning DSNTEJ1, run DSNTEJ0 to drop the sample data. If you rerun DSNTEJ1L, rerun it from the last successful step.
Job DSNTEJ1P
| | | | If you have run DSNTEJ1L, you do not need to run DSNTEJ1P because they produce the same results. The major difference is that DSNTEJ1P uses the PL/I compiler and allows you to customize DSNTEP2. DSNTEP2 is described in Appendix D of DB2 Utility Guide and Reference. DSNTEJ1P precompiles, compiles, and link-edits PL/I program DSNTEP2. This program is then used to list the sample database tables and views. It is a dynamic PL/I program that accepts SQL statements. It produces a listing of the results of SELECT statements. If DSNTEJ1P runs successfully, it produces the return codes shown in Table 65.
Table 65. DSNTEJ1P return codes
Step PH01PS01 PROCSTEP PPLI PC PLI LKED Return code 0000 0000 0004 0000 0000 or 0004
PH01PS02
| |
You can compare the output from this job with the sample output for DSNTEJ1P found in member DSN8TJ1P in your prefix.SDSNIVPD data set. If you run DSNTEJ1L before DSNTEJ1P, you can expect PH01PS02 of DSNTEJ1P to produce a return code of 0004 and the following message: SQLWARNING ON GRANT COMMAND, EXECUTE FUNCTION RESULT OF SQL STATEMENT: DSNT4 4I SQLCODE = 562, WARNING: A GRANT OF A PRIVILEGE WAS IGNORED BECAUSE THE GRANTEE ALREADY HAS THE PRIVILEGE FROM THE GRANTOR If either DSNTEJ1 or DSNTEJ1P fails or abends, be sure that the USER specified in the JOB statements is an authorized ID. If the name you specified for either SYSTEM ADMIN 1 or SYSTEM ADMIN 2 on installation panel DSNTIPP is a primary authorization ID, use this name. If the sample authorization exit and RACF are installed, and the SYSTEM ADMIN 1 and SYSTEM ADMIN 2 are known to DB2 as secondary authorization IDs, you can run these jobs under a user ID in either of these RACF groups. Then, correct any other problems. Before rerunning DSNTEJ1, run DSNTEJ0 to drop the sample data. If you rerun DSNTEJ1P, rerun it from the last successful step.
343
Job DSNTEJ2A
DSNTEJ2A tests the assembler program preparation procedures. This job prepares and invokes program DSNTIAUL, which demonstrates the use of dynamic SQL in assembler to unload the data from tables or views. It also generates LOAD utility statements so the data can be loaded into another table. DSNTEJ2A then uses the LOAD utility to put data into copies of the unloaded tables. DSNTIAUL is described in Appendix D of DB2 Utility Guide and Reference.
Table 66. DSNTEJ2A return codes
Step PREPUNL PROCSTEP PC ASM LKED Return code 0000 0000 0000 0000 0000 0000 0000 0000 DSNUPROC 0004
| |
| |
You can compare the output from this job with the sample output for DSNTEJ2A found in member DSN8TJ2A in your prefix.SDSNIVPD data set.
Job DSNTEJ2C
Job DSNTEJ2C tests the COBOL program preparation procedures. This job runs the phone application. The phone application processes a table of telephone numbers, executing various types of SELECT statements and producing the corresponding listings. It can also update a phone number. This program is discussed in detail in The phone application scenario on page 384. COBOL programs can use the VS COBOL II or IBM COBOL compilers, or even OS/VS COBOL. To run DSNTEJ2C with a type of COBOL other than the one you selected on panel DSNTIPY, see Special considerations for COBOL programs on page 335. Be aware that you must use the same type of COBOL to prepare DSNTEJ2C, DSNTEJ3C, DSNTEJ4C, AND DSNTEJ5C. If DSNTEJ2C runs successfully, it produces the return codes shown in Table 67 on page 345.
344
Installation Guide
PH02CS03
PH02CS04
1Only for IBM COBOL
| |
You can compare the output from this job with the sample output for DSNTEJ2C found in member DSN8TJ2C in your prefix.SDSNIVPD data set.
Job DSNTEJ2D
Job DSNTEJ2D tests the C program preparation procedures. You must have sequence numbering on to run this job from an ISPF session. The C job runs only the phone application. See the phone application description under DSNTEJ2C on page 344. If DSNTEJ2D runs successfully, it produces the return codes shown in Table 68.
Table 68. DSNTE2D return codes
Step PH02DS01 PROCSTEP PC C PLKED LKED PC C PLKED LKED Return code 0004 0000 0000 or 0004 0004 0000 0000 0000 or 0004 0000 or 0004 0000
PH02DS02
PH02DS03
| |
You can compare the output from this job with the sample output for DSNTEJ2D found in member DSN8TJ2D in your prefix.SDSNIVPD data set.
Job DSNTEJ2E
Job DSNTEJ2E tests the C++ program preparation procedures. You must have sequence numbering on to run this job from an ISPF session. The C++ job runs only the phone application, Job DSNTEJ2C on page 344. If DSNTEJ2E runs successfully, it produces the return codes shown in Table 69 on page 346.
345
PH02ES02
PH02ES03
PH02ES04
| |
You can compare the output from this job with the sample output for DSNTEJ2E found in member DSN8TJ2E in your prefix.SDSNIVPD data set.
Job DSNTEJ2F
Job DSNTEJ2F tests the Fortran program preparation procedures. The FORTRAN job runs only the phone application. See the phone application description under DSNTEJ2C on page 344. If DSNTEJ2F runs successfully, it produces the return codes shown in Table 70.
Table 70. DSNTE2F return codes
Step PH02FS01 PROCSTEP PC ASM LKED PC FORT LKED Return code 0004 0000 0004 0000 0000 0000 0000
PH02FS02
PH02FS03
| |
You can compare the output from this job with the sample output for DSNTEJ2F found in member DSN8TJ2F in your prefix.SDSNIVPD data set.
Job DSNTEJ2P
Job DSNTEJ2P tests the PL/I program preparation procedures. The PL/I job runs the phone application. If DSNTEJ2P runs successfully, it produces the return codes shown in Table 71.
Table 71 (Page 1 of 2). DSNTEJ2P return codes
Step PH02PS01 PH02PS02 PPLI PC PLI LKED PROCSTEP Return code 0000 0000 0004 0004 0004
346
Installation Guide
PH02PS04 PH02PS05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
You can compare the output from this job with the sample output for DSNTEJ2P found in member DSN8TJ2P in your prefix.SDSNIVPD data set.
Job DSNTEJ2U
DSNTEJ2U prepares and tests several sample user-defined functions, as well as a driver program to exercise them. In order for the Install CLIST to generate Job DSNTEJ2U, you must complete the following steps during installation: Specify that the host has access to C/C++ for OS/390 Version 1 Release 3 or a subsequent release on Install Panel DSNTIPU Specify the name of the default WLM environment on Install panel DSNTIPX The sample user-defined functions are: Function ALTDATE ALTIME CURRENCY DAYNAME Description Returns the current date in a user-specified format or converts a user-specified date from one format to another. Returns the current time in a user-specified format or converts a user-specified time from one format to another. Formats a floating point number as a currency value. Returns the day of the week for a user-specified date in ISO format.
MONTHNAME Returns the month for a user-specified date in ISO format. TABLE_LOCATION Returns the location name of a table, view, or undefined object found after resolving aliases for a user-specified object. See DB2 SQL Reference for more information. TABLE_NAME Returns the name of a table, view, or undefined object found after resolving aliases for a user-specified object. See DB2 SQL Reference for more information. TABLE_SCHEMA Returns the schema name of a table, view, or undefined object found after resolving aliases for a user-specified object. See DB2 SQL Reference for more information. WEATHER Returns sample weather data obtained from a TSO data set by way of demonstrating the usefulness of a user-defined function table function.
For more information about user-defined functions, see Section 3 of DB2 Application Programming and SQL Guide .
347
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # | | | | | | | | |
3-10 11
12 13 14 15 16
If DSNTEJ2U runs successfully, it produces the return codes shown in Table 73.
Table 73 (Page 1 of 2). DSNTEJ2U return codes
Step PHO2US01 PH02US02 PH02US03 - PH02US07 PC C PLKED LKED PC CP PLKED LKED PC C PLKED LKED PROCSTEP Return code 0000 0000 or 0004 0004 0000 0004 0000 0004 0000 0004 0000 0000 0000 0004 0000 0000 0004 PC C PLKED LKED PC C PLKED LKED 0004 0000 0004 0000 0000 0000 0004 0000 0000 or 0004
PH02US08 - PH02US09
PH02US10
PH02US14
PH02US15
348
Installation Guide
| | | | |
You can compare the output from this job with the sample output for DSNTEJ2U found in member DSN8TJ2U in your prefix.SDSNIVPD data set.
Testing SPUFI
You can test SPUFI by following the steps below: 1. Log on to TSO. 2. Enter ISPF (this might be done for you, depending on your site's standard practice). 3. Select DB2I on the ISPF Primary Option Menu. 4. Select SPUFI on the DB2I menu. 5. Enter the library name prefix.NEW.SDSNSAMP(DSNTESA) as input to SPUFI on line 1, the DATASET NAME parameter. If your site uses the comma as a decimal point, the library name entered must be for the tailored version of job DSNTESA that was modified by the installation CLIST. 6. Define an output data set name on line 4, the output DATASET NAME parameter of the panel. This allows you to review the output. 7. Press ENTER, and examine the results. These SQL statements require a significant amount of DB2 processing; you could have to wait for the output. Run steps 5, 6, and 7 three times: | | | | | | Once with member DSNTESA, which uses a set of SQL statements to create a short-lived table space and table (as discussed in Dynamic SQL statements (DSNTESA, DSNTESQ) on page 400) Once with member DSNTESC, which creates a table space and creates a PLAN_TABLE, DSN_FUNCTION_TABLE, and DSN_STATEMNT_TABLE in that table space (as discussed in Section 5 (Volume 2) of DB2 Administration
349
| | | |
Guide). If migrating from DB2 Version 5, the installation CLIST tailors DSNTESC to migrate your Version 5 PLAN_TABLE to Version 6 using a schema name of DSN8510. If your Version 5 PLAN_TABLE has a different schema name, edit DSNTESC to use your schema name. Once with member DSNTESE, which retrieves the EXPLAIN information. If any step fails or abends, be sure that the DB2 subsystem name is specified in the DB2 NAME field on the DB2I Defaults panel.
| |
If you must drop either a Version 5 or Version 6 PLAN_TABLE, remove the appropriate comments from the job to issue the DROP statements. Also, make sure that the user ID you are using is authorized. If the name you specified for either SYSTEM ADMIN 1 or SYSTEM ADMIN 2 on installation panel DSNTIPP is a primary authorization ID, use this name. If the sample authorization exit and RACF are installed, and both SYSTEM ADMIN 1 and SYSTEM ADMIN 2 are known to DB2 as secondary authorization IDs, you can run these jobs under a user ID in either of these RACF groups. Then correct any other problems and rerun the scenario from the last successful step.
350
Installation Guide
location_name.PRIVATCS.DSNESM68 .DSNESPCS.DSNESM68 The package list for the DSNESPRR plan is as follows: location_name.PRIVATRR.DSNESM68 .DSNESPRR.DSNESM68
| | | | | | | | | | | |
PH03CS01
PH03CS02
PH03CS03
351
| | | |
PH03CS04
PH03CS05 PH03CS06
1Only for IBM COBOL
Step PH03CS06 can give a return code of 0004 if sample job DSNTEJ1 was not run on the remote system. For testing, you should run job DSNTEJ1 on the remote system. If DSNTEJ3P runs successfully, it produces the return codes shown in Table 75.
Table 75. DSNTEJ3P return codes
Step PH03PS01 PROCSTEP PPLI PC PLI LKED PPLI PC PLI LKED Return code 0000 0004 0000 0000 0000 0000 0004 0000 0000
PH03PS02
PH03PS03
| |
The three steps in job DSNTEJ3P, steps PH03PS01, PH03PS02, and PH03PS03, prepare the ISPF/CAF sample application.
352
Installation Guide
DB2 SAMPLE APPLICATIONS MENU ===> Select one of the following options and press enter. 1 2 3 COBOL PHONE SAMPLE PL/I PHONE SAMPLE COBOL ORGANIZATION C C EMPLOYEE RESUME EMPLOYEE PHOTO (DB2 ISPF COBOL Application) (DB2 ISPF PL/I Application) (DB2 ISPF COBOL Application) (DB2 ISPF C Application) (DB2 ISPF & GDDM C Application)
| |
4 5
| | | | |
Choosing option 1 or 2 on the sample applications panel during Phase 3 invokes either the COBOL or the PL/I version of the phone application. For more information about the phone application, see The phone application scenario on page 384. Choosing option 3 on the sample applications panel during Phase 6 invokes the COBOL organization application, which uses DRDA access to distributed data. For more information, see The distributed organization application scenario on page 388. Choosing options 4 and 5 on the sample applications panel during Phase 7 invokes the "Employee Resume" and "Employee Photo" applications, which processes LOB data. You must run the phase 7 sample jobs before you can access options 4 and 5 on the sample applicaitons panel. For more information, see Employee resume and photo scenarios on page 396.
353
Invoke the transaction by using the FORMAT command. The programs accept several lines of input on the first panel and display the results after you press ENTER. COBOL programs can use the VS COBOL II or IBM COBOL for MVS & VM or even OS/VS COBOL compilers. To use a type of COBOL other than the one you specified on field 2 of panel DSNTIPY, see Special considerations for COBOL programs on page 335. Remember, you must use the same type of COBOL to prepare DSNTEJ2C, DSNTEJ3C, DSNTEJ4C, and DSNTEJ5C. If DSNTEJ4C runs successfully, it produces the return codes shown in Table 76.
Table 76. DSNTEJ4C return codes
Step PH04CS01 PROCSTEP PC COB/COB2/IBMCOB PLKED1 LKED PC COB/COB2/IBMCOB PLKED1 LKED PC COB/COB2/IBMCOB PLKED1 LKED Return code 0004 0000 0004 0004 0000 0000 0004 0004 0000 0000 0004 0004 0000 0000 S1 S2 S1 S2 C L G 0000 0004 0000 0004 0000 0000 0000
PH04CS02
PH04CS03
For DSNTEJ4C, the warning code expected from the precompiler step PH04CS01 is: DB2 SQL PRECOMPILER MESSAGES DSNH 531 W NO SQL STATEMENTS WERE FOUND If DSNTEJ4P runs successfully, it produces the return codes shown in Table 77.
Table 77 (Page 1 of 2). DSNTEJ4P return codes
Step PH04PS01 PROCSTEP PPLI PC PLI LKED PPLI PC PLI LKED Return Code 0000 0004 0004 0004 0000 0000 0004 0004
PH04PS02
354
Installation Guide
PH04PS04
PH04PS05
PH04PS06
PH04PS07
PH04PS08 PH04PS09 PH04PS10 PH04PS11 PH04PS12 PH04PS13 PH04PS14 PH04PS15 PH04PS16 PH04PS17 PH04PS18 PH04PS19 PH04PS20 PH04PS21
For DSNTEJ4P, the warning code expected from the precompiler step PH04PS01 is: DB2 SQL PRECOMPILER MESSAGES DSNH 531 W NO SQL STATEMENTS WERE FOUND If either job DSNTEJ4C or job DSNTEJ4P fails or abends, rerun the jobs from the last successful step.
355
MAJOR SYSTEM ...: O ACTION .........: OBJECT .........: SEARCH CRITERIA.: DATA ...........:
ORGANIZATION
When the following command is entered, the panel shown in Figure 47 is displayed. /FORMAT DSN8IPFO, which starts the PL/I projects version.
MAJOR SYSTEM ...: P ACTION .........: OBJECT .........: SEARCH CRITERIA.: DATA ...........:
PROJECTS
FIRST NAME ==> LAST NAME : % % FOR LIST OF ENTIRE DIRECTORY FOR GENERIC LIST (EX. K% = ALL FOR GENERIC LIST
K - NAMES)
FIRST NAME(OPTIONAL):
356
Installation Guide
Job DSNTEJ5A
DSNTEJ5A assembles and link-edits DSNTIAC, the CICS SQLCA formatter front-end. It also assembles and links the RCT and optionally adds the sample definitions to the CSD. Use DSNTIAC as an alternative to DSNTIAR when you want CICS services to do storage handling and program loading. If you are using CICS Version 4 or CICS Transaction Server 1.1, you need to modify job DSNTEJ5A to use steps DSN8FRCT and DSN8FRDO. You may need to tailor step DSN8FRDO for your system.
Table 78. DSNTEJ5A return codes
Step PH05AS01 PH05AS02 PH05AS03 PROCSTEP Return code 0000 0000 0000
| | | |
357
If DSNTEJ5C fails or abends, rerun the job from the last successful step. To receive more prepare-time detail from DSNTEJ5C, change the parameters TERM(LEAVE) and PRINT(LEAVE) to TERM(TERM) and PRINT(TERM). See the discussion of the DSNH CLIST in the Chapter 2 of DB2 Command Referencefor more information. If DSNTEJ5P runs successfully, it produces the return codes shown in Table 80.
Table 80 (Page 1 of 2). DSNTEJ5P return codes
Step PH05PS01 PH05PS02 PH05PS03 PH05PS04 PH05PS05 PH05PS06 PH05PS07 PPLI PC PLI LKED PROCSTEP ASSEM ASSEM ASSEM ASSEM ASSEM Return code 0000 0000 0000 0000 0000 0004 0000 0000 0004 0004 0004 PPLI PC PLI LKED 0000 0000 0004 0004 0004 PPLI PC PLI LKED 0004 0000 0004 0004 0004 PPLI PC PLI LKED ASSEM ASSEM 0000 0000 0004 0004 0000 0000 0004 PPLI PC PLI LKED 0000 0000 0004 0004 0004
PH05PS08 PH05PS09
PH05PS10 PH05PS11
PH05PS12 PH05PS13
PH05PS18
358
Installation Guide
PH05PS20 PH05PS21
PH05PS22 PH05PS23 PH05PS24 PH05PH25 PH05PS26 PH05PH27 PH05PS28 PH05PH29 PH05PS30 PH05PH31 PH05PS32 PH05PH33 PH05PS34 PH05PH35 PH05PS36 PH05PH37
If DSNTEJ5P fails or abends, rerun the job from the last successful step. You might find it convenient to break up DSNTEJ5P and run only the unsuccessful steps.
359
ACTION SELECTION MAJOR SYSTEM ...: O ORGANIZATION ACTION .........: OBJECT .........: SEARCH CRITERIA.: DATA ...........: SELECT AN ACTION FROM FOLLOWING LIST A D E U ADD (INSERT) DISPLAY (SHOW) ERASE (REMOVE) UPDATE (CHANGE)
ACTION SELECTION MAJOR SYSTEM ...: P PROJECTS ACTION .........: OBJECT .........: SEARCH CRITERIA.: DATA ...........: SELECT AN ACTION FROM FOLLOWING LIST A D E U ADD (INSERT) DISPLAY (SHOW) ERASE (REMOVE) UPDATE (CHANGE)
Refer to Specifying values in the sample application panels on page 374 for the criteria you need to enter to run the organization and project applications.
360
Installation Guide
| | | # # | |
| | #
| # | | |
361
designations during your testing, your results will be unpredictable. Verify that your VTAM APPL statement has the parameter SYNCLVL=SYNCPT defined. This allows updates at several locations.
Job DSNTEJ6
Job DSNTEJ6 consists of the following step:
Step 1 Function Updates the location column in the department table to the sample location entered on installation panel DSNTIPY
If DSNTEJ6 runs successfully, it produces the return code shown in Table 81.
Table 81. DSNTEJ6 return codes
Step PH06S01 PROCSTEP Return code 0000
After job DSNTEJ6 has completed successfully, start the distributed application scenario by following the instructions in Starting an application in an ISPF/TSO environment in phase 6 on page 370.
362
Installation Guide
2 Notes:
1. It is assumed that the views DSN8610.VPHONE and DSN8610.VEMPLP and their underlying tables exist at the remote location. If they do not exist, run job DSNTEJ1 to create them. 2. Step 1 always has one set of SQL statements that fail; it either drops the views or the aliases, but not both. 3. If you want to point back to the local sample tables after executing this job, run a job that drops the aliases VPHONE and VEMPLP.
If you specified DRDA as the default database protocol on panel DSNTIP5, you must specify DBPROTOCOL(PRIVATE) to test DB2 private protocol access. After running this job, re-run Phase 2 jobs DSNTEJ2C through DSNTEJ2P. The Phase 2 phone application jobs now reference data at the remote location through aliases. You could use the following sample JCL statements to perform these functions: //JOBLIB DD DISP=SHR, // DSN=prefix.SDSNLOAD // // STEP 1 : SET UP THE SAMPLE TABLE ACCESS // //STEP1 EXEC PGM=IKJEFT 1,DYNAMNBR=2 //SYSTSPRT DD SYSOUT= //SYSPRINT DD SYSOUT= //SYSUDUMP DD SYSOUT= //SYSTSIN DD DSN SYSTEM(DSN) RUN PROGRAM(DSNTIAD) PLAN(DSNTIA61) PARM('RC ') LIB('prefix.RUNLIB.LOAD') END //SYSIN DD DROP VIEW DSN861 .VPHONE; DROP VIEW DSN861 .VEMPLP; COMMIT; DROP ALIAS VPHONE; DROP ALIAS VEMPLP; COMMIT; // // STEP 2 : SET UP THE SAMPLE TABLE ACCESS // //STEP2 EXEC PGM=IKJEFT 1,DYNAMNBR=2 //SYSTSPRT DD SYSOUT= //SYSPRINT DD SYSOUT= //SYSUDUMP DD SYSOUT= //SYSTSIN DD
363
DSN SYSTEM(DSN) RUN PROGRAM(DSNTIAD) PLAN(DSNTIA61) LIB('prefix.RUNLIB.LOAD') END //SYSIN DD CREATE ALIAS VPHONE FOR SAMPLOC.DSN861 .VPHONE; CREATE ALIAS VEMPLP FOR SAMPLOC.DSN861 .VEMPLP; //
# # # # # #
364
Installation Guide
Job DSNTEJ6S
| | | | | Job DSNTEJ6S compiles and link-edits the sample stored procedure DSN8EP2. It also updates the SYSIBM.SYSROUTINES catalog table with information about the stored procedure. If you have SQL statements in your stored procedure, you must remove the comment character in the JCL from the step that binds the stored procedure package. You must run job DSNTEJ6S at the DB2 server location. If DSNTEJ6S runs successfully, it produces the return codes shown in Table 82. | | | | | | | |
Table 82. DSNTEJ6S return codes
Step PH06SS01 PH06SS02 PH06SS03 PPLI PC PLI LKED PROCSTEP Return code 0000 0000 0000 0004 0004 0000
Job DSNTEJ6P
Job DSNTEJ6P compiles, link-edits, binds, and runs a sample program, DSN8EP1, that invokes the sample stored procedure. Before you run DSNTEJ6P, run DSNTEJ6S to create the sample stored procedure. If DSNTEJ6P runs successfully, it produces the return codes shown in Table 83.
Table 83. DSNTEJ6P return codes
Step PH06PS01 PROCSTEP PPLI PC PLI LKED Return code 0000 0000 0004 0000 0004 0000
PH06PS02 PH06PS03
| | | |
Output from a successful execution of DSNTEJ6P lists each DB2 command executed, followed by the messages generated by the DB2 command processor. You can compare the output from this job with the sample output for DSNTEJ6P found in member DSN8TJ6P in your prefix.SDSNIVPD data set.
365
# # #
A client program that receives DB2 command text, calls the stored procedure to issue the commands, receives the responses from the stored procedure in a result set, and prints the results. For concurrent installations at two DB2 locations: Run the server version of job DSNTEJ6T on the server side only; do not run it on the client side Run the client version of job DSNTEJ6D on the client side only; do not run it on the server side
Job DSNTEJ6T
# Job DSNTEJ6T registers, prepares, and binds the sample stored procedure, DSN8ED2, on the server. It also defines a created temporary table to receive the IFI output that is returned as a result set. If DSNTEJ6T runs successfully, it produces the return codes shown in Table 84. | | | | | | | | |
Table 84. DSNTEJ6T return codes
Step PH06TS01 PH06TS02 PH06TS03 PC C PLKED LKED PROCSTEP Return code 0000 0000 0004 0000 0004 0000 0000 or 0004
PH06TS04
Job DSNTEJ6D
Job DSNTEJ6D compiles, link-edits, binds, and runs sample program DSN8ED1, that invokes the sample for using stored procedure result sets. Before you run DSNTEJ6D, run DSNTEJ6T to create the sample stored procedure. If DSNTEJ6D runs successfully, it produces the return codes shown in Table 85.
Table 85. DSNTEJ6D return codes
Step PH06DS01 PROCSTEP PC C PLKED LKED Return code 0000 0000 or 0004 0000 or 0004 0000 0004 0000
PH06DS02 PH06DS03
| |
Output from a successful execution of DSNTEJ6D lists each DB2 command executed, followed by the messages generated by the DB2 command processor. You can compare the output from this job with the sample output for DSNTEJ6D found in member DSN8TJ6D in your prefix.SDSNIVPD data set.
366
Installation Guide
| | | | # | # | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Job DSNTEJ6U
Job DSNTEJ6U compiles, link-edits, binds, and runs sample PL/I program DSN8EPU, which invokes the DSNUTILS stored procedure to execute a utility. Before you run DSNTEJ6U, verify that the DSNUTILS stored procedure was successfully created in job DSNTIJSG. DSNTEJ6U requires a WLM procedure. See Appendix B of DB2 Utility Guide and Reference for an example of how to customize a WLM proc for DSNUTILS.
Table 86. DSNTEJ6U return codes
Step PH06US01 PROCSTEP PC PLI LKED PH06US02 PH06US03 Return code 0000 0004 0000 0004 0000
Output from a successful execution of DSNTEJ6U lists the parameters specified followed by the messages generated by the DB2 DIAGNOSE DISPLAY MEPL utility. For more details on utilities and invoking utilities as a stored procedure, see Appendix B of DB2 Utility Guide and Reference. You can compare the output from this job with the sample output for DSNTEJ6U found in member DSN8TJ6U in your prefix.SDSNIVPD data set.
367
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | # # # # # # # # # #
For more information on the setting up a WLM-established stored procedure address space see DB2 Application Programming and SQL Guide.
Job DSNTEJ61
Job DSNTEJ61 prepares a sample stored procedure DSN8EC1, that uses ODBA. DSN8EC1 can add, update, delete, and display telephone directory records from the IMS sample database, DFSIVD1. DSN8EC1 shows how the AERTDLI API is used to issue IMS DL/I calls. Before running DSNTEJ61, read the Dependencies section of the job prolog to verify that the server site is correctly configured. If DSNTEJ61 runs successfully, it produces the return codes shown in Table 87.
Table 87. DSNTEJ61 return codes
Step PH061S01 PH061S02 PH061S03 PC COB PLKED LKED PROCSTEP Return code 0000 0000 0004 0000 0004 0000
Job DSNTEJ62
Job DSNTEJ62 prepares and invokes the sample client program DSN8EC2, which calls stored procedure DSN8EC1. DSN8EC2 calls the stored procedure DSN8EC1 multiple times to add, delete, and display telephone directory records. Before running DSNTEJ62, perform the manual editing described in the Dependencies section of the job prolog. If DSNTEJ62 runs successfully, it produces the return codes shown in Table 88.
Table 88. DSNTEJ62 return codes
Step PH062S01 PROCSTEP PC COB PLKED LKED Return code 0000 0000 0004 0000 0000 or 0004 0000
PH062S02 PH062S03
368
Installation Guide
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
Prepares a sample SQL procedure. Executes a C program that calls the SQL procedure. Use DSNTEJ65 to verify that the DB2 SQL procedures processor, DSNTPSMP, is working correctly. C and Language Environment are required for jobs DSNTEJ63, DSNTEJ64, and DSNTEJ65. For job DSNTEJ65, you must start a WLM-established stored procedures address space for DSNTPSMP. You must update the start-up procedure for the WLM-established stored procedure address space as listed in the prolog of sample start-up procedure DSN8WLMP. For more information on the setting up a WLM-established stored procedure address space, see Section 7 of DB2 Application Programming and SQL Guide.
Job DSNTEJ63
Job DSNTEJ63 prepares the sample SQL procedure, DSN8ES1, which accepts a department number and returns salary and bonus data. Before running DSNTEJ63, perform the manual editing described in the dependencies section of the job prolog. If DSNTEJ63 runs successfully, it produces the return codes shown in Table 89.
Table 89. DSNTEJ63 return codes
Step PH063S01 PH063S02 PC PCC C PLKED LKED PROCSTEP Return code 0004 0004 0004 0000 0004 0000 0000 or 0004
PH063S03
Job DSNTEJ64
Job DSNTEJ64 prepares and executes DSN8ED3, a sample routine that calls the sample SQL procedure, DSN8ES1. You must run job DSNTEJ63 before running job DSNTEJ64. Before running DSNTEJ64, perform the manual editing described in the dependencies section of the job prolog. If DSNTEJ64 runs successfully, it produces the return codes shown in Table 90.
Table 90. DSNTEJ64 return codes
Step PH064S01 PROCSTEP PC C PLKED LKED Return code 0000 0000 0004 0000 0000 or 0004 0000
PH064S02 PH064S03
You can compare the output from this job to the sample output for DSNTEJ64, which is found in member DSN8TJ64 in data set named prefix.SDSNIVPD.
369
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # #
Job DSNTEJ65
Job DSNTEJ65 demonstrates program preparation of an SQL procedure using the DB2 SQL procedures processor, DSNTPSMP. The major components of job DSNTEJ65 are: DSN8WLMP is a sample start-up procedure for a WLM-established stored procedures address space in which DSNTPSMP runs. DSN8ED4 is a sample C program that calls the DB2 SQL procedures processor. DSN8ES2 is a sample SQL procedure that calculates employee bonuses. DSN8ED5 is a sample C program that calls the SQL procedure DSN8ES2. Before running DSNTEJ65, perform the manual editing described in the dependencies section of the job prolog. You must also manually tailor DSN8WLMP, the sample WLM startup procedure for DSNTPSMP. If DSNTEJ65 runs successfully, it produces the return codes shown in Table 91.
Table 91. DSNTEJ65 return codes
Step PH065S01 PROCSTEP PC C PLKED LKED Return code 0000 0000 0004 0000 0000 or 0004 0000 PC C PLKED LKED 0000 0000 0004 0000 0000 or 0004 0000
PH065S05 PH065S06
You can compare the output from this job to the sample output for DSNTEJ65, which is found in member DSN8TJ65 in the data set named prefix.SDSNIVPD.
370
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Job DSNTEJ7
Job DSNTEJ7 demonstrates how to create a LOB table with all the accompanying LOB table spaces, auxiliary tables, and indexes. It also demonstrates how to use the DB2 LOAD utility to load a CLOB column of fewer than 32 KB. Job DSNTEJ7 consists of the following steps:
Step 1 2 3 4 5 Function Drops sample LOB objects Creates sample Employee Resume and Photo LOB table Creates aliases for the table, then grants access to it Uses the DB2 LOAD utility to load CLOB data Generates run-time statistics on the table
If DSNTEJ7 runs successfully, it produces the return code shown in Table 92.
Table 92. DSNTEJ7 return codes
JOBSTEP PH07S01 PH07S02 PH07S03 PH07S04 PH07S05 DSNUPROC DSNUPROC PROCSTEP Return Code 0000 0000 0000 0000 0000
371
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Job DSNTEJ71
Job DSNTEJ71 compiles, link-edits, and binds two sample applications that manipulate LOB data. The DSN8DLPL sample application demonstrates how to use LOB locators to populate a LOB column larger than 32KB. The DSN8DLTC sample application validates the contents of the LOB table, verifying that it was populated correctly. If DSNTEJ71 runs successfully, it produces the return codes shown in Table 93.
Table 93. DSNTEJ71 return codes
JOBSTEP PH071S01 PROCSTEP PC C PLKED LKED PC C PLKED LKED Return Code 0000 0000 0004 0000 0000 0000 0004 0000 0000 0000 0000
PH071S02
You can compare the output from this job with the sample output for DSNTEJ71 found in member DSN8TJ71 in your prefix.SDSNIVPD data set.
Job DSNTEJ73
Job DSNTEJ73 compiles the DSN8DLRV sample application, which demonstrates how to use built-in functions like POSSTR and SUBSTR in order to traverse a CLOB column and break out data from it. If DSNTEJ73 runs successfully, it produces the return codes shown in Table 94.
Table 94. DSNTEJ73 return codes
JOBSTEP PH073S01 PROCSTEP PC C PLKED LKED PC C PLKED LKED Return Code 0004 0000 0004 0000 0000 0000 0004 0000 0000 or 0004
PH073S02
PH073S03
After running DSNTEJ73, you can view sample employee resumes by invoking DSN8DLRV as described in Starting an application in an ISPF/TSO environment in phase 7 on page 373.
372
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Job DSNTEJ75
Job DSNTEJ75 runs sample program DSN8DLPV, which demonstrates how to manipulate BLOB data (employee photo images). If DSNTEJ75 runs successfully, it produces the return codes shown in Table 95.
Table 95. DSNTEJ75 return codes
JOBSTEP PH075S01 PROCSTEP PC C PLKED LKED Return Code 0000 0000 0004 0000 0000
PH075S02
After running DSNTEJ75, you can view sample employee photo images by invoking DSN8DLPV as described in Starting an application in an ISPF/TSO environment in phase 7.
373
These categories must be regarded as a family of values that, used together, specify the task to be performed. For MAJOR SYSTEM, ACTION, OBJECT, and SEARCH CRITERIA, a character code of one or two characters is used as a form of shorthand to indicate the desired criteria. The system provides a list of these codes with their meanings. A valid location name of 1 to 16 characters is used for location. The value for data must be consistent with the data type and length of search criteria. For information on valid location names, see Chapter 3-1. Connecting distributed database systems on page 443. Major system specifies the major application area. In the sample application, there are two major systems: organization and project. These major systems are implemented in separate transactions to keep the plan sizes reasonable. If you are running the DB2 distributed sample program, organization is the only system; therefore, this criterion is not used. Action specifies what you want to do with the object (specified on another line of the panel). You can display, update, add (insert), or erase (delete) information about the specified object. Object specifies the object about which you want information. Normally, the action is associated with the object. Examples of objects are information about an employee (EM) or information about the relationship among departments (DS). Objects can be specified with the following codes for the organization application: DE Departmentgeneral department and manager information for department specified
374
Installation Guide
DS Department structurehierarchy information for department specified EM Employeeinformation concerning employee specified. Objects can be specified with the following codes for the project application: PS AL PR AS AE Project structureinformation on projects and subprojects Activity listinginformation concerning the different activities that makes up a project Projectgeneral project information Activity staffinginformation about the employees staffed for activities of specified projects Activity estimateinformation concerning the estimated staffing and time requirements of specified projects.
You are able only to add, update, or erase information about the selected object, although you can search and display based on other criteria. Items that are added or updated can be changed on the screen. Other fields are protected. Search criteria helps to locate the specific item of information upon which to act. The following codes can be specified for the search criteria field for the organization application: DI DN EI EN MI MN Department number Department name Employee number Employee name Manager number Manager name.
The following codes can be specified for the search criteria for the project application: DI DN EI EN PI PN RI RN Department number Department name Employee number Employee name Project number Project name Responsible person number Responsible person name.
Location is used only for the distributed application. It describes the location where the action is to take place. If this criterion is left blank, then the local location is assumed. Data further identifies the search criteria target. The data value specified must be consistent with the data type and length of the search criteria code. If the search criterion is an employee name (EN), manager name (MN), or responsible person name (RN), the value of data must be a person's last name. (See Specifying data values for additional information on how data values can be specified.) Data values can be specified using either primary selection or secondary selection. Primary selection is the data value itself. Only one set of data values fulfills the request. Secondary selection allows multiple sets of data values to fulfill the request. A brief summary of the sets of data values appear on the screen. Each summary has an associated line number. To display additional information about a
Chapter 2-9. Verifying with the sample applications
375
certain line, enter the line number in the DATA field. Secondary selection allows the application to display a set of values and then provides a prompt to select a specific DATA value. For example, you can display information about a department (DE) (the OBJECT) with a department number (DI) (the SEARCH CRITERIA) with a DATA value of D11.
Allowable combinations
The codes cannot be combined indiscriminately. For instance, manager number (MI) is a valid search criterion for a department (DE), but employee number (EI) and project number (PI) cannot be used to locate a department. You can retrieve data by having the panels prompt you for the proper values. It is not necessary to enter the values one line at a time. If you already know all the values you want, they can be entered at the same time. If the values are only partially entered, you must start with ACTION and enter each value in sequence, not skipping over any values. For example, if you know all the values except OBJECT, only ACTION can be entered. You are prompted for OBJECT. Then you can enter OBJECT, SEARCH CRITERIA, and DATA.
E_1
DI (Department number)
Any
The values entered on the SEARCH CRITERIA and DATA fields can choose only one item to be displayed. However, the more usual case is that several items are displayed as a list. When this is the case, a secondary selection can be made by choosing the line number of the item of interest.
376
Installation Guide
Function keys
The bottom line of the panel displays the function keys that are active for that panel: Function key 2Resend: If the panel is blanked out (for example, you pressed the CLEAR key) or you want to refresh the panel, press function key 2 to return (resend) the display you were viewing to the terminal. Function key 3End: To terminate the application, press function key 3 to clear the screen and continue with other transactions. Function key 8Next: Sometimes a display of information is too large to fit on one panel. Press function key 8 to scroll forward (the lines move upward). Function key 10Left: Press function key 10 to move the field of vision up one level in the department structure. For instance, in Figure 54 on page 380, Department E01 is shown on the left, and its subdepartments are shown on the right. When you press function key 10, the screen scrolls so that Department E01 is moved from the left side of the panel to the right side and the department to which it reports appears on the left. All other departments that report to the department now on the left also appear along with Department E01 on the right. Function key 10 performs this function only for IMS and CICS samples.
Scenarios
| | | | | | This section discusses five scenarios for using the sample applications: The project application scenario The organization application scenario on page 379 The phone application scenario on page 384 The distributed organization application scenario on page 388 Employee resume and photo scenarios on page 396 How you invoke these applications depends on the environment you are working in; instructions appear in the following places: Starting an application in an ISPF/TSO environment on page 352 and 370 Starting an application in an IMS environment on page 356 Starting an application in a CICS environment on page 359. When an application executes, many areas on the display panel might be highlighted. The data you enter might not be highlighted, depending on the type of panel displayed.
377
On the OBJECT line, enter PS for project structure. On the SEARCH CRITERIA line, enter PI for project ID. On the DATA line, enter MA2100 as the project ID. The panel below shows the selected project along with its corresponding subprojects.
PROJECT STRUCTURE MAJOR SYSTEM ...: P PROJECTS ACTION .........: D DISPLAY (SHOW) OBJECT .........: PS PROJECT STRUCTURE SEARCH CRITERIA.: PI PROJECT ID DATA ...........: MA21 PROJECT ID & NAME RESPONSIBLE ID & NAME MA21 1 WELD LINE AUTOMATION CHRISTINE I HAAS SUBPROJECT ID & NAME RESPONSIBLE ID & NAME MA211 6 PL21 2 PFK: 2=RESEND 3=END 8=NEXT 1 =LEFT W L PROGRAMMING IRVING F STERN WELD LINE PLANNING MICHAEL L THOMPSON
Updating an activity
Suppose you want to update activity information for a project with ID IF1000. Enter the following values: On On On On On the the the the the MAJOR SYSTEM, enter P for project. ACTION line, enter U for update. OBJECT line, enter AE for activity estimate. SEARCH CRITERIA line, enter PI for project ID. DATA line, enter IF1000 as the project ID.
Press the ENTER key, and a list of project IF1000 activities appears on the panel. Next, choose the activity to be updated. For instance, if you want to update the first activity listed, enter 1 as the DATA value and press the ENTER key. The next panel shows information about the estimated mean staffing requirements of this activity as well as the start and completion dates. To change information about the estimated end date, enter data over the existing information displayed on that input line. After you have verified the change, press ENTER. The next panel displays the updated information, as shown in Figure 52 on page 379.
378
Installation Guide
UPDATING OF AN MAJOR SYSTEM ...: P ACTION .........: U OBJECT .........: AE SEARCH CRITERIA : PI DATA ...........: 1 DSN8 24I DSN8MPX - ACTIVITY PROJECT ID NAME ACTIVITY ID KEYWORD DESCRIPTION EST MEAN STAFFING EST START DATE EST END DATE PFK: 2=RESEND 3=END
ACTIVITY ESTIMATE PROJECTS UPDATE (CHANGE) ACTIVITY ESTIMATE PROJECT ID SUCCESSFULLY UPDATED : IF1 : QUERY SERVICES : : : : : : 9 ADMQS ADM QUERY SYSTEM 2. 1982- 1- 1 1983- 4-15
To terminate the project application, press the PF3 key. The APPLICATION TERMINATED message is displayed. If you are using CICS, clear the screen and enter a new transaction code. If you are using IMS, clear the screen and enter a new transaction code or a /FORMAT command.
379
DEPARTMENT ADMINISTRATIVE STRUCTURE SELECTION MAJOR SYSTEM ...: O ORGANIZATION ACTION .........: D DISPLAY (SHOW) OBJECT .........: DS DEPARTMENT STRUCTURE SEARCH CRITERIA.: DI DEPARTMENT ID DATA ...........: % SELECT A DEPARTMENT FROM FOLLOWING LIST BY SPECIFYING THE LINE NUMBER NO D/ID DEPARTMENT NAME M/ID MANAGER NAME 1 A SPIFFY COMPUTER SERVICES DIV. 1 CI HAAS 2 B 1 PLANNING 2 ML THOMPSON 3 C 1 INFORMATION CENTER 3 SA KWAN 4 D 1 DEVELOPMENT CENTER 5 D11 MANUFACTURING SYSTEMS 6 IF STERN 6 D21 ADMINISTRATION SYSTEMS 7 ED PULASKI 7 E 1 SUPPORT SERVICES 5 JB GEYER 8 E11 OPERATIONS 9 EW HENDERSON 9 E21 SOFTWARE SUPPORT 1 TQ SPENSER PFK: 2=RESEND 3=END 8=NEXT Figure 53. Organization applicationviewing a list of departments
To retrieve further information, specify a line number as a data value. This method is called secondary selection. Secondary selection provides prompts to aid in finding the information to be displayed, added, erased, or updated. If only one entry possibility exists, secondary selection is not offered. To view an individual department structure, specify the line entry number (secondary selection) of the department as a new DATA value. For example, to view the structure of Department E01, specify a data value of 7 on the DATA entry line (7 is the line number of the entry for Department E01). The result of entering the data value of 7 is a display of Department E01 and its departments as shown in Figure 54. The department manager for E01 is listed on the left, and the departments of E01 are listed on the right. Employees of E01 are listed below the subdepartments of E01.
DEPARTMENT ADMINISTRATIVE STRUCTURE MAJOR SYSTEM ...: O ORGANIZATION ACTION .........: D DISPLAY (SHOW) OBJECT .........: DS DEPARTMENT STRUCTURE SEARCH CRITERIA.: DI DEPARTMENT ID DATA ...........: 7 DEPARTMENT ID & NAME MANAGER ID & NAME E 1 SUPPORT SERVICES 5 JOHN B GEYER SUBDEPARTMENT ID, NAME & MANAGER EMPLOYEE ID & NAME E11 OPERATIONS 9 EILEEN W HENDERSON E21 1 SOFTWARE SUPPORT THEODORE Q SPENSER 5 PFK: 2=RESEND 3=END 8=NEXT 1 =LEFT JOHN B GEYER
380
Installation Guide
Next, you can enter the details of the new department. The four department fields are department number, department name, manager number, and administration department number. Enter: INFORMATION SERVICES for department name 000130 for manager number C01 for the administration department number. Press ENTER to display the panel shown in Figure 55. The panel shows the successful addition of the new department.
ADDING A NEW DEPARTMENT MAJOR SYSTEM ...: O ORGANIZATION ACTION .........: A ADD (INSERT) OBJECT .........: DE DEPARTMENT SEARCH CRITERIA.: DI DEPARTMENT ID DATA ...........: C11 DSN8 12I DSN8MPE - DEPARTMENT SUCCESSFULLY ADDED DEPARTMENT ID : C11 NAME : INFORMATION SERVICES MANAGER ID : 13 ADMIN DEP ID : C 1 MANAGER ID : 13 FIRST NAME : DOLORES MIDDLE INITIAL : M LAST NAME : QUINTANA WORK DEPT ID : C 1 PFK: 2=RESEND 3=END
381
Deleting an entry
Deleting an entry in the department table is also a function of the organization major system. Following the process outlined in Starting a new operation on page 381, replace the following values on the panel currently displayed on your screen: On On On On On the the the the the MAJOR SYSTEM, enter O for organization. ACTION line, enter E for erase. OBJECT line, enter DE for department. SEARCH CRITERIA line, enter DI for department ID. DATA line, enter C11 for department name.
ERASING A DEPARTMENT MAJOR SYSTEM ...: O ORGANIZATION ACTION .........: E ERASE (REMOVE) OBJECT .........: DE DEPARTMENT SEARCH CRITERIA.: DI DEPARTMENT ID DATA ...........: C11 PRESS ENTER TO ERASE A DEPARTMENT DEPARTMENT ID : C11 NAME : INFORMATION SERVICES MANAGER ID : 13 ADMIN DEP ID : C 1 MANAGER ID : 13 FIRST NAME : DOLORES MIDDLE INITIAL : M LAST NAME : QUINTANA WORK DEPT ID : C 1 PFK: 2=RESEND 3=END
Press ENTER again to verify the erase action. The following message appears on the panel: DSN8 13I csect DEPARTMENT SUCCESSFULLY ERASED
Transferring
The procedure for transferring one employee to another department and replacing that employee involves several steps. In this scenario, John B. Geyer (manager of the department for Support Services) is transferred to the staff of Spiffy Computer Service Division. Bruce Adamson is assigned as manager of Support Services. To move Adamson into his new position as manager of Support Services, you must determine his employee number. Transferring an employee is a function of the organization major system. Start the organization application as described in Starting a new operation on page 381, and enter the following values: On On On On On the the the the the MAJOR SYSTEM, enter O for organization. ACTION line, enter D for display. OBJECT line, enter EM for employee. SEARCH CRITERIA line, enter EN for employee name. DATA line, enter ADAMSON as the specific employee name.
382
Installation Guide
Press ENTER to display the panel showing that Adamson's employee number is 000150. The next step is for you to change the manager number for the Support Services department to Adamson's number, 000150. But first you must find the Support Services department. To do this, change ACTION to U (update), OBJECT to DE (department), and SEARCH CRITERIA to DN (department name). Change DATA to %SUPPORT% to specify any department with the word SUPPORT in it. Press ENTER, and a list of departments with support in their name is displayed. Support Services has line number 01. Enter this number at DATA. (The leading zero is not needed.) Press ENTER to display the next panel. The only values that can be changed are department name, manager ID, and administration department ID. Enter Adamson's employee number in the Support Services department after MANAGER ID. At this point, the data on the manager still pertains to Geyer. Press ENTER to display the panel that shows Adamson as manager of Support Services. The work department ID shown (D11) is still Adamson's old number. To change Adamson's work department ID, enter EM for OBJECT, enter EI for SEARCH CRITERIA, and change the employee number to 000150 for DATA. Press ENTER to display the employee information on Adamson. Now that information on Adamson can be updated. The fields that can be changed are employee first name, middle initial, last name, and work department ID. Enter the middle initial for Adamson, which was not in the database, and the department number E01. Press ENTER, and the information on Adamson is updated, including his new department number. The final step is to move Geyer to the correct department. Change the SEARCH CRITERIA and DATA to EN and GEYER, respectively. Press ENTER to obtain the next panel. The employee ID, name, and work department ID can be changed on this panel. However, the only change necessary in this case is to change Geyer's work department ID to his new one, A00. The panel in Figure 57 on page 384shows the completed entry.
383
UPDATING AN EMPLOYEE MAJOR SYSTEM ...: O ORGANIZATION ACTION .........: U UPDATE (CHANGE) OBJECT .........: EM EMPLOYEE SEARCH CRITERIA.: EN EMPLOYEE NAME DATA ...........: GEYER DSN8 4I DSN8MPF - EMPLOYEE SUCCESSFULLY UPDATED DEPARTMENT ID : A NAME : SPIFFY COMPUTER SERVICE DIV. MANAGER ID : 1 ADMIN DEP ID : A EMPLOYEE ID : 5 FIRST NAME : JOHN MIDDLE INITIAL : B LAST NAME : GEYER WORK DEPT ID : A PFK: 2=RESEND 3=END
To terminate the application and return to the beginning of the operation, press the PF3 key.
384
Installation Guide
LAST
NAME ==> _
FOR LIST OF ENTIRE DIRECTORY FOR GENERIC LIST (EX. K% = ALL FOR GENERIC LIST
K - NAMES)
On this panel, enter the first and last name of the employee whose telephone number you want to view or change. To see an entire listing of employee numbers, put an * next to the LAST NAME input line. If only part of a first or last name is known, use the percent character (%) to qualify the list of names to appear in the directory. For example, entering K% on the LAST NAME input line calls a list of the telephone numbers of all employees whose last name begins with a K. Similarly, the first name can be qualified. To keep this sample program as simple as possible and to allow updating, scrolling is not used with the IMS and CICS versions. Scrolling is used with the ISPF/CAF version. Only the first panel of selected names and phone numbers can be displayed. The second panel is the Telephone Directory itself. The employee telephone number is highlighted. To update an employee telephone number, type over the highlighted number and press ENTER. To update a phone number listed under the name Heather A Nicholls, specify NICHOL% when you are not sure if there are one or two Ls in Nicholls. Press ENTER to display the panel on which the phone number is highlighted. Suppose you want to change the phone number from 1793 to 1795. Just type over the number to be changed. You can type over as many numbers as appear listed in the current display. After you press ENTER, you get a message confirming the updated phone number. The panel in Figure 59 on page 386 shows the updated panel.
385
--------------------------- TELEPHONE DIRECTORY -------------------FIRST NAME MID LAST NAME INIT HEATHER . . . A NICHOLLS PHONE NO 1795 EMPL WORK WORKDEPT NO DEPT NAME 14 C 1 INFORMATION CENTER
The ACTION code in this card image indicates whether an employee number is to be updated (U) or listed (L). When updating an employee phone number, only the employee number and the new phone number are specified in the data set. When listing phone numbers, the last name must be specified. Specifying the first name is optional. The * and % can be used with the ACTION code just as they are used with the panels. Figure 60 on page 387 shows an example of an update data set and a list data set. Each time a number is listed or updated, a new data set is created containing a card image like the one in Figure 60. The first card in the data set shows the phone number of employee number 000140 being updated (U) to 6767. The second card shows a list (L) for Heather Nicholls. The last card shows a list (L) of all employees whose first names begin with the letters MAR. The example shows the letters MAR followed by a % in the first name column to indicate that only those employees whose first names begin with MAR are to be listed.
386
Installation Guide
The other data set that contains the JCL is supplied with DB2 and is contained in DSNTEJ2P, which is part of prefix.SDSNSAMP. Figure 61 shows the data set that contains the JCL with the card image data sets embedded. //PH 2PS 5 EXEC PGM=IKJEFT 1,DYNAMNBR=2 //SYSTSPRT DD SYSOUT= //SYSPRINT DD SYSOUT= //REPORT DD SYSOUT= //SYSUDUMP DD SYSOUT= //CARDIN DD U 14 6767 LNICHOLLS HEATHER L MAR% //SYSTSIN DD DSN SYSTEM(DSN) RUN PROGRAM(DSN8BP3) PLAN(DSN8BP61) LIB('prefix.RUNLIB.LOAD') END
Figure 61. The job control language data set
The complete data set can be submitted to the system either through a card reader or from a terminal through TSO. Figure 62 on page 387 is an example of the batch output.
---------------------------- TELEPHONE DIRECTORY ----------------------LAST NAME FIRST NAME INITIAL PHONE EMPLOYEE WORK WORK NUMBER NUMBER DEPT DEPT NAME QUINTANA NICHOLLS SCOUTTEN PEREZ DOLORES HEATHER MARILYN MARIA M A S L 6767 1793 1682 9 1 13 14 18 27 C 1 C 1 D11 D21 INFORMATION CENTER INFORMATION CENTER MANUFACTURING SYSTEMS ADMINISTRATIVE SYSTEMS
387
DB2 ORGANIZATION APPLICATION ===>_ ACTION .........:d OBJECT .........:ds SEARCH CRITERIA :di A (ADD) D (DISPLAY) DE (DEPARTMENT) DS (DEPT STRUCTURE) E (ERASE) U (UPDATE) EM (EMPLOYEE)
DI (DEPARTMENT ID) MN (MANAGER NAME) DN (DEPARTMENT NAME) EI (EMPLOYEE ID) MI (MANAGER ID) EN (EMPLOYEE NAME) (Blank implies local location)
END to exit
Press the ENTER key. The panel below shows the structure of the department requested.
388
Installation Guide
ROW 1 of 5
DEPARTMENT STRUCTURE FOR: ----- DEPARTMENT ID AND NAME-----A SPIFFY COMPUTER SERVICE DIV. ----- MANAGER ID AND NAME------------1 CHRISTINE I HAAS
SUBDEPARTMENTS: A B C D E 1 1 1 1 SPIFFY COMPUTER SERVICE DIV. PLANNING INFORMATION CENTER DEVELOPMENT CENTER SUPPORT SERVICES 1 2 3 5 CHRISTINE MICHAEL SALLY JOHN I L A B HAAS THOMPSON KWAN GEYER
DB2 ORGANIZATION APPLICATION ===>_ ACTION .........:d OBJECT .........:de SEARCH CRITERIA :di A (ADD) D (DISPLAY) DE (DEPARTMENT) DS (DEPT STRUCTURE) E (ERASE) U (UPDATE) EM (EMPLOYEE)
DI (DEPARTMENT ID) MN (MANAGER NAME) DN (DEPARTMENT NAME) EI (EMPLOYEE ID) MI (MANAGER ID) EN (EMPLOYEE NAME) (Blank implies local location)
END to exit
Press the ENTER key. The panel below shows the department information requested.
389
DB2 ORGANIZATION APPLICATION ===>_ DISPLAY A DEPARTMENT DEPARTMENT ID NAME MANAGER ID ADMIN DEP ID LOCATION MANAGER ID FIRST NAME MIDDLE INITIAL LAST NAME WORK DEPT ID : : : : : : : : : : END TO EXIT A SPIFFY COMPUTER SERVICE DIV. 1 A 1 CHRISTINE I HAAS A
DB2 ORGANIZATION APPLICATION ===>_ ACTION .........:u OBJECT .........:de SEARCH CRITERIA :di A (ADD) D (DISPLAY) DE (DEPARTMENT) DS (DEPT STRUCTURE) E (ERASE) U (UPDATE) EM (EMPLOYEE)
DI (DEPARTMENT ID) MN (MANAGER NAME) DN (DEPARTMENT NAME) EI (EMPLOYEE ID) MI (MANAGER ID) EN (EMPLOYEE NAME) (Blank implies local location)
END to exit
Press the ENTER key. The panel below lists the departments that can be updated. Select the department to be updated by putting an S in the left margin by the department number.
390
Installation Guide
ROW 1 OF 9
TO SELECT FROM THE LIST PLACE AN S NEXT TO THE DEPARTMENT PRESS ENTER TO PROCESS OR END TO EXIT D/ID A B 1 C 1 D 1 D11 D21 E 1 E11 E21 DEPARTMENT NAME SPIFFY COMPUTER SERVICE DIV. PLANNING INFORMATION CENTER DEVELOPMENT CENTER MANUFACTURING SYSTEMS ADMINISTRATION SYSTEMS SUPPORT SERVICES OPERATIONS SOFTWARE SUPPORT M/ID 1 2 3 6 7 5 9 1 MANAGER NAME CI HAAS ML THOMPSON SA KWAN IF ED JB EW TQ STERN PULASKI GEYER HENDERSON SPENSER
Press the ENTER key. The panel below displays the information relevant to the selected department. Enter the information you want to update on this panel; in this case, enter the name of the department.
DB2 ORGANIZATION APPLICATION ===>_ UPDATE A DEPARTMENT DEPARTMENT ID NAME MANAGER ID ADMIN DEP ID LOCATION MANAGER ID FIRST NAME MIDDLE INITIAL LAST NAME WORK DEPT ID : E 1 : hardware support service : 5 : A : : : : : : END TO EXIT 5 JOHN B GEYER E 1
Press the ENTER key to process the updated information. A message appears on this panel that states the update was successful.
391
DB2 ORGANIZATION APPLICATION ===>_ DSN8 14I DSN8HC3-DEPARTMENT SUCCESSFULLY UPDATED UPDATE A DEPARTMENT : : : : : : : : : : END TO EXIT E 1 HARDWARE SUPPORT SERVICE 5 A 5 JOHN B GEYER E 1
DEPARTMENT ID NAME MANAGER ID ADMIN DEP ID LOCATION MANAGER ID FIRST NAME MIDDLE INITIAL LAST NAME WORK DEPT ID
Press ENTER to return to the previous panel or END to exit. If you return to the previous panel, you can now select another department to update, or press ENTER or END to exit. The same message appears on this panel, indicating the update was successful.
DB2 ORGANIZATION APPLICATION ===>_ DSN8 14I DSN8HC3-DEPARTMENT SUCCESSFULLY UPDATED ACTION: UPDATE A DEPARTMENT
ROW 1 OF 9
TO SELECT FROM THE LIST PLACE AN S NEXT TO THE DEPARTMENT PRESS ENTER TO PROCESS OR END TO EXIT D/ID A B 1 C 1 D 1 D11 D21 E 1 E11 E21 DEPARTMENT NAME SPIFFY COMPUTER SERVICE DIV. PLANNING INFORMATION CENTER DEVELOPMENT CENTER MANUFACTURING SYSTEMS ADMINISTRATION SYSTEMS HARDWARE SUPPORT SERVICE OPERATIONS SOFTWARE SUPPORT M/ID 1 2 3 6 7 5 9 1 MANAGER NAME CI HAAS ML THOMPSON SA KWAN IF ED JB EW TQ STERN PULASKI GEYER HENDERSON SPENSER
392
Installation Guide
DB2 ORGANIZATION APPLICATION ===>_ ACTION .........:a OBJECT .........:em SEARCH CRITERIA :ei A (ADD) D (DISPLAY) DE (DEPARTMENT) DS (DEPT STRUCTURE) E (ERASE) U (UPDATE) EM (EMPLOYEE)
DI (DEPARTMENT ID) MN (MANAGER NAME) DN (DEPARTMENT NAME) EI (EMPLOYEE ID) MI (MANAGER ID) EN (EMPLOYEE NAME)
LOCATION .......:your server location (Blank implies local location) DATA ...........:sj 1 PRESS: ENTER to process END to exit
Press the ENTER key. The panel below allows you to only enter information about the employee. The department information on the panel is protected. Enter the necessary information about the employee.
DB2 ORGANIZATION APPLICATION ===>_ ADD DEPARTMENT ID NAME MANAGER ID ADMIN DEP ID LOCATION EMPLOYEE ID FIRST NAME MIDDLE INITIAL LAST NAME WORK DEPT ID AN EMPLOYEE : : : : : : : : : : END TO EXIT SJ 1 W WALTERS F22
Press the ENTER key to process or END to exit. If you press the ENTER key, a message appears on the panel indicating that the employee has been added.
393
DB2 ORGANIZATION APPLICATION ===>_ DSN8 2I DSN8HC3-EMPLOYEE SUCCESSFULLY ADDED ADD AN EMPLOYEE : : : : : : : : : : END TO EXIT F22 SPIFFY COMPUTER SERVICE DIV. E 1 SAN_JOSE SJ 1 W WALTERS F22
DEPARTMENT ID NAME MANAGER ID ADMIN DEP ID LOCATION EMPLOYEE ID FIRST NAME MIDDLE INITIAL LAST NAME WORK DEPT ID
Press the ENTER key to return to the selection panel or END to exit.
DB2 ORGANIZATION APPLICATION ===>_ ACTION .........:e OBJECT .........:em SEARCH CRITERIA :ei A (ADD) D (DISPLAY) DE (DEPARTMENT) DS (DEPT STRUCTURE) E (ERASE) U (UPDATE) EM (EMPLOYEE)
DI (DEPARTMENT ID) MN (MANAGER NAME) DN (DEPARTMENT NAME) EI (EMPLOYEE ID) MI (MANAGER ID) EN (EMPLOYEE NAME)
LOCATION .......:your server location (Blank implies local location) DATA ...........:% PRESS: ENTER to process END to exit
Press the ENTER key. The panel below lists the employees that can be erased. Select the employee to be erased by putting an S in the left margin by the employee ID.
394
Installation Guide
ROW 1 OF 4
LOCATION: SAN_JOSE
TO SELECT FROM THE LIST PLACE AN S NEXT TO THE EMPLOYEE PRESS ENTER TO PROCESS OR END TO EXIT E/ID S SJ 1 SJ 2 SJ 3 SJ 4 SJ 5 EMPLOYEE NAME W S D A L WALTERS O'SHEA COOPER HAYES ASHER D/ID F22 F22 F22 F22 F22 DEPARTMENT NAME BRANCH BRANCH BRANCH BRANCH BRANCH OFFICE OFFICE OFFICE OFFICE OFFICE F22 F22 F22 F22 F22
Press the ENTER key. The panel below displays the information relevant to the selected employee that is to be erased.
DB2 ORGANIZATION APPLICATION ===>_ ERASE DEPARTMENT ID NAME MANAGER ID ADMIN DEP ID LOCATION EMPLOYEE ID FIRST NAME MIDDLE INITIAL LAST NAME WORK DEPT ID AN EMPLOYEE : : : : : : : : : : END TO EXIT F22 BRANCH OFFICE F22 E 1 SAN_JOSE SJ 1 W WALTERS F22
Press the ENTER key to erase the employee information. A message appears on the panel stating the employee has been successfully erased. You can now erase another employee or press ENTER or END to exit.
395
DB2 ORGANIZATION APPLICATION ROW 1 OF 3 ===>_ DSN8 3I DSN8HC3-EMPLOYEE SUCCESSFULLY ERASED ACTION: ERASE AN EMPLOYEE LOCATION: SAN_JOSE TO SELECT FROM THE LIST PLACE AN S NEXT TO THE EMPLOYEE PRESS ENTER TO PROCESS OR END TO EXIT E/ID SJ SJ SJ 2 3 5 EMPLOYEE NAME S D L O'SHEA COOPER ASHER D/ID F22 F22 F22 DEPARTMENT NAME BRANCH OFFICE F22 BRANCH OFFICE F22 BRANCH OFFICE F22
| | | | | | | | | | | | | | | | | | | | | | | | | |
396
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | |
2. Selecting and viewing sample employee resumes by using option 4 of DSN8SSM 3. Selecting and viewing sample employee photo images by using option 5 of DSN8SSM All application programs for the LOB sample are written in C language. The resume viewer requires ISPF. The photo viewer requires ISPF and GDDM.
| | | | | | | |
397
| | |
DSN8SSE ===>_
| | | | | |
SELECT ONE OF THE EMPLOYEES AND PRESS ENTER. 1. 2. 3. 4. PRESS: 13 13 13 13 DELORES M. QUINTANA HEATHER A. NICHOLLS BRUCE ADAMSON JAMES H. WALKER
END TO EXIT
| | | | | | | | | | | | | | | | | | | | | | | | |
The employee serial numbers and names are hard-coded into the panel because the data for this sample is predetermined. Display the formatted resume on ISPF panel DSN8SSR:
DSN8SSR ===>_
DB2 EMPLOYEE RESUME APPLICATION DEPARTMENT INFORMATION: - EMPLOYEE NO. : 13 - DEPARTMENT NO.: C 1 - MANAGER : SALLY KWAN - POSITION : ANALYST - PHONE : (2 8) 555-4578 - HIRE DATE : 1971- 7-28
PERSONAL INFORMATION: - NAME: DELORES M. QUINTANA - HOME: 115 EGLINTON AVE MELLONVILLE, IDAHO 83757 (2 8) 555-9933 - BORN: SEPTEMBER 15, 1925 - SEX: FEMALE HT:5'2" WT:12 LBS. - MARITAL STATUS: MARRIED EDUCATION: 1965 MATH AND ENGLISH B.A. ADELPHI UNIVERSITY
196
WORK HISTORY: 1 /91 - PRESENT ADVISORY SYSTEMS ANALYST PRODUCING DOCUMENTATION TOOLS FOR ENGINEERING DEPARTMENT 12/85 - 9/91 TECHNICAL WRITER WRITER, TEXT PROGRAMMER, AND PLANNER 1/79 - 11/85 COBOL PAYROLL PROGRAMMER WRITING PAYROLL PROGRAMS FOR A DIESEL FUEL COMPANY
| | | | | | | |
This panel is designed around the sample data. It is assumed that all resume information for an employee will fit predictably and no handling for special cases is provided. The "Interests" section of the resume is not presented due to space constraints on the panel. DSN8DLRV is written in C language and linked with ISPF and DB2 Call Attach Facility. The package name and plan name are both DSN8LRvr, where vr is the DB2 version and release.
398
Installation Guide
| | | | | | | | | | | |
DSN8SSE ===>_
| | | | | |
SELECT ONE OF THE EMPLOYEES AND PRESS ENTER. 1. 2. 3. 4. PRESS: 13 13 13 13 DELORES M. QUINTANA HEATHER A. NICHOLLS BRUCE ADAMSON JAMES H. WALKER
END TO EXIT
| | | | | | |
Select END to exit. DSN8DLPV is a C language program linked with ISPF, GDDM and the DB2 Call Attach Facility. The package name and plan name are both DSN8LPvr, where vr is the DB2 version and release. To run DSN8DLPV you must include the GDDM load module library (SADMMOD) in the logon procedure or in the ISPLLIB concatenation.
399
sample, see the comments provided with the code. The routine is called DSN8HUFF and resides in library prefix.SDSNSAMP.
DSNTESA
The SQL statements in DSNTESA are run dynamically by SPUFI. DSNTESA is used in Phase 3 of the verification process. # # The first group of statements in DSNTESA create a temporary work file table space and defines a created temporary table. The INSERT statements fill the table with names, midterm scores, and final examination results, and the SELECT statement then does a check of the averages. The UPDATE statements assign a grade according to the formula in the first UPDATE statement: 60% for the final and 40% for the midterm. The next SELECT statement produces the entire table. The ROLLBACK statement removes the table space and the table within it. General-use Programming Interface The following statements make some administrative queries on the system tables: The following SELECT statements find all the plans and packages that are owned by the current user, and the date they were bound. SELECT NAME, BINDDATE FROM SYSIBM.SYSPLAN WHERE CREATOR = USER; SELECT COLLID, NAME, VERSION, BINDTIME FROM SYSIBM.SYSPACKAGE WHERE OWNER = USER; The following SELECT statements find the plans and packages that require a bind or rebind before they can be run, and the plans and packages that are automatically rebound the next time they are run. SELECT NAME, CREATOR, BINDDATE, VALID, OPERATIVE FROM SYSIBM.SYSPLAN WHERE OPERATIVE = 'N' OR VALID = 'N'; SELECT COLLID, NAME, VERSION, BINDTIME, VALID FROM SYSIBM.SYSPACKAGE WHERE OPERATIVE = 'N' OR VALID = 'N'; The following SELECT statements find all objects required for the current user's programs.
400
Installation Guide
SELECT DNAME, BTYPE, BCREATOR, BNAME FROM SYSIBM.SYSPLANDEP WHERE BCREATOR = USER ORDER BY DNAME, BTYPE, BCREATOR, BNAME; SELECT DCOLLID, DNAME, BTYPE, BQUALIFIER, BNAME FROM SYSIBM.SYSPACKDEP WHERE BQUALIFIER = USER ORDER BY DCOLLID, DNAME, BTYPE, BQUALIFIER, BNAME; The second SELECT from SYSTABLES provides information about all the DEPT tables regardless of the owner. SELECT FROM SYSIBM.SYSTABLES WHERE NAME = 'DEPT'; The SELECT from SYSCOLUMNS supplies a description of the fields of the DSN8610.DEPT table. This information can also be provided by DCLGEN, and, within a program, the DESCRIBE statement gives this same information. | | | | SELECT NAME, COLTYPE, LENGTH, SCALE, NULLS, REMARKS, COLNO FROM SYSIBM.SYSCOLUMNS WHERE TBNAME= 'DEPT' AND TBCREATOR = 'DSN861 ' ORDER BY COLNO; The following SELECT statements find the kinds of authority a user can have. Determining which tables a specific user can access is relatively complicated because of the various authorities. If the user has SYSADM authority, any table can be accessed. SELECT SELECT SELECT SELECT SELECT SELECT SELECT FROM FROM FROM FROM FROM FROM FROM SYSIBM.SYSPLANAUTH WHERE GRANTEE = USER; SYSIBM.SYSPACKAUTH WHERE GRANTEE = USER; SYSIBM.SYSUSERAUTH WHERE GRANTEE = USER; SYSIBM.SYSDBAUTH WHERE GRANTEE = USER; SYSIBM.SYSTABAUTH WHERE GRANTEE = USER; SYSIBM.SYSCOLAUTH WHERE GRANTEE = USER; SYSIBM.SYSRESAUTH WHERE GRANTEE = USER;
The final four SELECT statements show the tables and views that can be accessed directly by the current user, those that can be accessed using a plan, and those that are accessed using the database authority.
401
SELECT TCREATOR, TTNAME, STNAME, GRANTOR FROM SYSIBM.SYSTABAUTH WHERE GRANTEE = USER; SELECT BNAME, BTYPE, GRANTOR, NAME FROM SYSIBM.SYSPLANAUTH, SYSIBM.SYSPLANDEP WHERE GRANTEE = USER AND NAME = DNAME AND EXECUTEAUTH = ' ' AND (BTYPE = 'T' OR BTYPE = 'V'); SELECT DCOLLID, BNAME, BTYPE, BQUALIFIER, BNAME FROM SYSIBM.SYSPACKAUTH, SYSIBM.SYSPACKDEP WHERE GRANTEE = USER AND COLLID = DCOLLID AND NAME = DNAME AND EXECUTEAUTH = ' ' AND (BTYPE = 'T' OR BTYPE = 'V'); SELECT NAME, CREATOR, TYPE, DBNAME, TSNAME FROM SYSIBM.SYSTABLES WHERE DBNAME IN (SELECT NAME FROM SYSIBM.SYSDBAUTH WHERE GRANTEE = USER AND DBADMAUTH = ' '); End of General-use Programming Interface
DSNTESQ
DSNTESQ contains a set of queries to check consistency between catalog tables. The SQL statements are in a format available for input to SPUFI and DSNTEP2. If SPUFI is not bound when you want to execute these queries, you can use the Version 5 DSNTEP2. Before running these queries, you should run the DSN1CHKR utility to make sure the physical structure of the catalog is correct. You should also run the CHECK INDEX utility. DSNTESQ contains SQL that creates copies of the catalog using segmented table spaces. In some cases, the queries in DSNTESQ run faster when run on copies of the catalog instead of the actual catalog because the copies have additional indexes. If you plan to use the copies of the catalog, use the comment lines in DSNTESQ for guidance.
402
Installation Guide
403
404
Installation Guide
See Defining DB2 plans for IMS applications (optional) on page 408 for details on how to generate a resource translation table. REO= is the optional one-character region error option to be used if an IMS application attempts to reference a non-operational external subsystem or if resources are unavailable at create thread time. If DB2 detects the unavailable resource condition during normal SQL processing, a -904 SQLCODE is returned to the application. R passes a SQL return code to the application, indicating that the request for DB2 services failed (default). The most commonly returned SQL codes are -922, -923, and -924. However, there might be other SQL codes returned to the application. When the first connection to DB2 cannot be established, a SQL return code is not returned. Instead, the application is terminated with an abend code U3047. Q abends the application with an abend code U3051, backs out activity to the last commit point, does a PSTOP of the transaction, and requeues the input message. This option only applies when an IMS application attempts to reference a non-operational external subsystem or if the resources are unavailable at create thread time. If DB2 detects the unavailable resource condition during normal SQL processing, a -904 SQLCODE is returned to the application. A abends the application with an abend code of U3047 and discards the input message. This option only applies when an IMS application attempts to reference a non-operational external subsystem or if the resources are unavailable at create thread time. If DB2 detects the unavailable resource condition during normal SQL processing, a -904 SQLCODE is returned to the application. If DB2 is not active or the connection cannot be established when the first SQL call is made from the application program (such as DB2 unavailable, DB2 quiescing, or DB2 terminating), the action you take depends on the region error option specified. SQL codes of -922, -923, or -924 might be returned to the application if option R is specified. You can change the default for an application if a resource translation table entry is generated for that application. See Defining DB2 plans for IMS applications (optional) on page 408. CRC= is a command recognition character used by IMS to identify DB2 commands entered from an IMS terminal with the /SSR command. Any character is valid for the CRC except the period (.), slash (/), or comma (,). The default CRC is the hyphen (-). These options apply to DL/I batch only: CONNECTION_NAME= The connection name is optional. It represents the name of the job step that is the coordinator for DB2 activity. The connection name defaults are:
405
Table 100. Default connection names for DL/I batch Type of Application Batch job Started task TSO user Default Connection Name Job name Started task name TSO authorization ID
If a batch job fails, you must use a separate job to restart the batch job. The connection name used in the restart job must be the same as the name used in the batch job that failed. Or, if the default connection name is used, the restart job must have the same job name as the batch update job that failed. DB2 requires unique connection names for DB2 DL/I batch support. If two applications try to connect with the same connection name, then the second application is not allowed to connect to DB2. CONNECTION_NAME can be 1-8 characters long. PLAN= You can specify a DB2 plan name. If you do not specify a plan name, the application program module name is checked against the optional resource translation table. If a match is found, the translated name is used as the DB2 plan name. If no match is found, the application program module name is used as the plan name. PLAN can be 1-8 characters long. PROG= You must specify the name of the application program to be loaded and to receive control. PROG can be 1-8 characters long. Providing IMS Support for DB2 Commands: You can enter DB2 commands through the /SSR command of IMS. The /SSR command format is: /SSR crc DB2 command as in /SSR -DISPLAY THREAD ( ) IMS supports this command; you must define the CRC in the SSM member of the IMS control region. If the /SSR command is entered through the MVS console, the AUTHID WTOR needs to be granted the appropriate authority. If the /SSR command is entered through an IMS terminal, the IMS LTERM name or the signon ID (if active) needs to be granted the appropriate authority. Specifying the SSM exec parameter: Specify the SSM EXEC parameter in the startup procedure of the IMS control, MPP, BMP, or DL/I batch region. The SSM is concatenated with the IMSID to form a member name in IMS.PROCLIB. The IMSID comes from the IMSID option of the IMSCTRL generation macro or the IMSID option in the control region startup procedure. For DL/I batch regions, you can specify the DB2 connection parameters in the DDITV02 data set instead of an SSM member. The DDITV02 data set and an SSM member have the same format. See Section 5 of DB2 Application Programming and SQL Guide for more information on the DDITV02 data set. If you specify the SSM for the IMS control region, any dependent region running under the control region can attach to the DB2 subsystem named in the IMS.PROCLIB member specified by the SSM parameter. The IMS.PROCLIB
406
Installation Guide
member name is the IMS ID (IMSID=xxxx) concatenated with the one to four characters specified in the SSM EXEC parameter. The IMS ID is the IMSID parameter of the IMSCTRL generation macro. IMS allows you to define as many external subsystem connections as are required. More than one connection can be defined for different DB2 subsystems. All DB2 connections must be within the same MVS system. For a dependent region, you can specify a dependent region SSM or use the one specified for the control region. You can specify different region error options (REOs) in the dependent region SSM member and the control region SSM member. Table 101 shows the different possibilities of SSM specifications.
Table 101. SSM specifications options SSM for Control Region No No Yes SSM for Dependent Region No Yes No Action Comments
No external subsystem can be connected No external subsytem can be connected. Applications scheduled in the region can access external subsystems identified in the control region SSM. Exits and control blocks for each attachment are loaded into the control region address space. Applications scheduled in this region can access DL/I databases only. Exits and control blocks for each attachment are loaded into the control region address space and each dependent region address space. Aplications scheduled in this region can access only external subsystems identified in both SSMs. Exits and control blocks for each attachment are loaded into the control region and the dependent region address space.
Yes
Yes
Yes
Check the dependent region SSM with the control region SSM.
No specific parameter exists to control the maximum number of SSM specification possibilities.
407
This macro is described in more detail in IMS attachment facility macro (DSNMAPN) on page 409.
LIT
408
Installation Guide
When an IMS application issues a DB2 request, IMS knows the target subsystem by the LIT used in the request. For example, consider the case of a dependent region accessing two DB2 subsystems (DSN1 and DSN2): You generate a language interface with LIT=SYS2 (DFSLI001). You define two entries in the SSM member. The first entry points to DSN1 with LIT=SYS1; the second points to DSN2 with LIT=SYS2. You link-edit applications accessing the DSN1 subsystem with the IMS-provided language interface (DFSLI000). You link-edit applications accessing the DSN2 subsystem with the user-generated language interface (DFSLI001). Even though a region can communicate with two or more DB2 subsystems, an IMS application can access only onethe DB2 subsystem referred to in the language interface that is link-edited. You can alter the SSM to route application requests to a different DB2 subsystem.
Notes: 1. The macro name must be followed by one or more blanks before options are coded. 2. Multiple options must be separated by commas (with no blanks).
Description
label DSNMAPN DSNMAPN is the name of the macro. It must be coded exactly as it appears here, and it must be separated from any optional options by one or more blanks. For label, substitute the CSECT name of your module. This name must match the name of the module specified to the linkage editor. Label is optional except
Chapter 2-10. Connecting the IMS attachment facility
409
for the first invocation of the DSNMAPN macro. The last invocation requires END=YES. APN=program-name Specifies the name of an application load module scheduled by IMS. For program-name, substitute an application name of up to eight characters. PLAN=plan-name Specifies an application plan name that is used (instead of the default application name) when a thread is created. For plan-name, substitute an application plan name of up to eight characters. OPTION=R|Q|A Specifies the action taken when an application program call cannot be performed because there is some problem in communication between the application program and the DB2 subsystem or if resources are unavailable. If OPTION is not specified, the region error option (REO) is used. R Q Specifies that a return code is returned to the application to indicate that the request for DB2 services failed. Specifies that the transaction is abnormally terminated with an abend code U3051, activity is backed out to the last commit point, and the input message is requeued. Specifies that the transaction is abended with an abend code of U3047, and the input message is deleted. Default: R END=NO|YES Specifies whether this is the last DSNMAPN macro invocation. NO Specifies that this is not the last DSNMAPN macro invocation. YES Specifies that this is the last DSNMAPN macro invocation. Default: NO The last DSNMAPN macro invocation must be followed by the specification END=YES. Usage notes To enter more than one application name (with its corresponding plan name and OPTION specification), you must use multiple invocations of the DSNMAPN macro. The first invocation requires the label; the last invocation requires END=YES. Invocations must be in ascending order by application name. If they are not, an MNOTE macro error is generated.
410
Installation Guide
| |
Using the attachment facility for CICS Version 4 and CICS TS Version 1.1
| | | The CICS-DB2 attachment facility is provided on the CICS product tape. Each CICS region connecting to DB2 should use the attachment facility provided on the CICS product tape. CICS Version 4 and subsequent releases provides the CICS system definition (CSD) definitions for the attachment facility programs and transactions. If you are sharing the CSD between different releases of CICS, see the CICS for MVS/ESA Installation Guide before deleting program definitions. Check for down-level attachment facility program definitions in your CSD. Delete any of these program definitions:
DSNCCOM0 DSNCEDON DSNCSTOP DSNCCOM1 DSNCEXT1 DSNCSTRT DSNCCOM2 DSNCEXT2 DSNCUEXT DSNCEDF1 DSNCMSG0
Delete any of these transaction definitions if: DSNC any transaction that executes program DSNCCOM0, DSNCCOM1, or DSNCCOM2 Most module names for the attachment facility have been renamed DSN2xxxx.
411
CICS Version 4
EDSA Execution Diagnostic Facility (EDF) information is stored in this area, which is the EDSASZE in the CICS system initialization table (SIT).
MVS Storage This area is the CICS region reserved for non-CICS functions such as DB2 and VSAM. MVS Storage Above Region This area is comparable to the OS Free Storage Above Region area in prior releases of CICS.
Table 104. Virtual storage requested for CICS region
Storage Area MVS storage " Amount 0.7KB 0.5KB Description DB2 CICS Attach Control Blocks DB2 CICS Attach Control Blocks Factor Per TCB Per address space. Notes Above 16M. Varies widely because it is dependent on various RCT settings. See Estimating storage needed for CICS attachment threads on page 413 for more information. Above 16M. Size varies. Check RCT link-edit map. For estimating purposes, a 50-entry RCT was assumed. Below 16M. " " CICS DSA (ERDSA) 0.1KB <0.1KB 28.1KB GETMAINed Work Area INDOUBT Parmlist CICS Attach Modules Per address space Per address space Per address space Above 16M. Above 16M. Only resident DB2 CICS Attach modules are considered here since other are used infrequently and occupied storage is freed. Above 16M. " " 0.8KB 0.6KB CICS Control Block CICS GETMAINed Storage Per active thread Per address space Above 16M. Above 16M.
" "
9.8KB 5.1KB
DB2 CICS Attach MVS Subtask Modules Resource Control Table (RCT)
412
Installation Guide
3KB
For each item in the RCT, perform the following calculation: If THRDM > 0: 1. Determine the following value: 20 THRDM + 44 2. If TWAIT=YES, perform the following calculation, dropping all fractions: THRDM/4 + (THRDM - THRDA)/4 + 6 3. If TWAIT=NO or POOL, use the value of THRDM or 3, whichever is smaller. 4. Multiply the value from either step 2 or step 3 by 4. 5. Add the results of steps 1 and 4. If THRDM=0, use 44.
413
After performing the preceding calculations on every item defined in the RCT, add 276 bytes to the final calculation. This is amount of storage that is allocated for all threads in the RCT.
414
Installation Guide
415
Transaction entries
The attachment facility definitions are supplied automatically. You can use RDO to define sample applications and optional entries. Resource Definition Online (RDO): Tracing Each transaction that you want CICS to trace must have TRACE=YES either specified or selected by default in the transaction entry. TRACE=YES is the CICS default. CICS resource manager interface definitions The CICS-supplied resource group DFHRMI (included in the DFHLIST list) specifies the resource manager interface (RMI). DB2 commands Do not create a transaction entry for transaction DSNC, which is automatically supplied by CICS. You can optionally define one or more DSNC subcommands, or the first four characters of DB2 commands, as transactions that execute DSN2COM1. For more information on DSNC commands, see Providing CICS support for DB2 commands on page 420. DB2 sample applications Phase 5 of installation verification requires that program, mapset, and transaction resources be defined to CICS. See Table 108 on page 417 for a list of required entries. For more information on the verification procedure, see Chapter 2-9. Verifying with the sample applications on page 329. User transactions User transactions accessing DB2 resources must also be defined to CICS. Table 108 on page 417 shows examples of transaction definitions.
416
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
Note: 1. To make the resource definitions available to CICS, issue the following commands: CEDA INSTALL GROUP(DB2-group) CEDA INSTALL GROUP(user) 2. Do not create entries for DSNC commands. These are automatically defined by the attachment facility. 3. Transaction definitions for PROGRAM(DSN2COM1) should include the TASKDATALOC(ANY) parameter, as in the following example: DEFINE TRANSACTION(DISC) PROGRAM(DSN2COM1) GROUP (GROUP) TWASIZE(12 ) TASKDATALOC(ANY) TASKDATAKEY(CICS) 4. These sample entries contain only the minimum options required. However, you might want to consider other options, such as using resource security levels (RSL) or adding the defined GROUPs into a GROUP LIST. For more information on options, see the appropriate CICS Resource Definition Guide. 5. Ensure that you have the proper amount of TWA. If you do not, abend DFH0409 could result when you start up the attachment facility or enter a command through it.
417
Program entries
Ensure that you use the CICS-supplied resource group DFHRMI (included in the DFHLIST list) to specify the resource manager interface (RMI).
Table 109. CICS program and map resource definitions for DB2
Functions Defined to CICS User transactions Resource Definition As many as needed: DEFINE PROGRAM(program-name) GROUP(user-group) LANGUAGE(prog-lang) DEFINE PROGRAM(DSN8CP0) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CP1) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CP2) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CP3) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CP6) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CP7) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CP8) GROUP(DB2-group) LANGUAGE(PLI) DEFINE PROGRAM(DSN8CC0) GROUP(DB2-group) LANGUAGE(COBOL) DEFINE PROGRAM(DSN8CC1) GROUP(DB2-group) LANGUAGE(COBOL) DEFINE PROGRAM(DSN8CC2) GROUP(DB2-group) LANGUAGE(COBOL) DEFINE MAPSET(DSN8CPG) GROUP(DB2-group) DEFINE MAPSET(DSN8CPD) GROUP(DB2-group) DEFINE MAPSET(DSN8CPF) GROUP(DB2-group) DEFINE MAPSET(DSN8CPE) GROUP(DB2-group) DEFINE MAPSET(DSN8CCG) GROUP(DB2-group) DEFINE MAPSET(DSN8CCD) GROUP(DB2-group) DEFINE MAPSET(DSN8CPN) GROUP(DB2-group) DEFINE MAPSET(DSN8CPL) GROUP(DB2-group) DEFINE MAPSET(DSN8CPU) GROUP(DB2-group) Note: 1. To make the resource definitions available to CICS, issue the following install commands: CEDA INSTALL GROUP(DB2-group) CEDA INSTALL GROUP(user-group) 2. These illustrated commands are the minimum options required. However, you might want to consider other options, such as resource security levels (RSL) or adding the defined GROUPs into a GROUP LIST. For more information on options, see the appropriate CICS resource definition guide.
Table 110 on page 419 shows examples of the optional PLT entries that allow automatic initialization of the CICS attachment facility when CICS is brought up and automatic stopping of the CICS attachment facility when CICS is shut down.
418
Installation Guide
PLT processing
The program list table (PLT) can be used to specify a list of programs that are: Executed in the post-initialization phase of CICS startup Executed during controlled shutdown Enabled or disabled as a group by a master terminal ENABLE or DISABLE command. Optionally, you can use PLTs to have CICS automatically bring up the DB2-CICS attachment facility during the post-initialization phase of CICS startup. Similarly, you can have CICS terminate the attachment facility when CICS is brought down. To use PLT processing to bring up the attach during CICS initialization: Create a PLTPI with an entry for PROGRAM=DSN2COM0. Create a PLTPI=xx entry in the SIT, where xx is the suffix of the post-initialization PLT. To use PLT processing to automatically shut down the attach during CICS shutdown: Create a PLTSD with an entry for PROGRAM=DSN2COM2. Create a PLTSD=xx entry in the SIT, where xx is the suffix of the termination PLT. Use separate PLTs for post-initialization and termination because separate DB2 modules are used for starting and stopping the attachment facility. Refer to Transaction entries on page 416 and Program entries on page 418 for more information on required entries for PLT processing. For a list of optional entries on the PLT, refer to Table 110.
Table 110. Optional CICS program list table (PLT) entries for DB2
Functions Defined to CICS Post-initialization attachment program First quiesce stage shutdown program Note: 1. DSN2COM0 must be defined in the last stage of CICS initialization (PLTPI). 2. DSN2COM2 must be defined in the first quiesce stage of CICS shutdown (PLTSD). To ensure that DSN2COM2 executes during the first quiesce stage, be sure that the DSN2COM2 program entry is defined before the DFHDELIM program entry. PLT Entry DFHPLT TYPE=ENTRY,PROGRAM=DFHDELIM . . . DFHPLT TYPE=ENTRY,PROGRAM=DSN2COM0 DFHPLT TYPE=ENTRY,PROGRAM=DSN2COM2 . . . DFHPLT TYPE=ENTRY,PROGRAM=DFHDELIM
You can issue SQL statements from your PLT program. Make sure that the SQL statements are after DSN2COM0 for startup and before DSN2COM2 for shutdown. You cannot start the attachment facility during CICS shutdown.
419
420
Installation Guide
421
| | |
If you want to determine whether the attach facility is available, you can use the INQUIRE EXITPROGRAM. INQUIRE EXITPROGRAM determines whether the global work area exists for program 'DSNCEXT1' with the entry name 'DSNCSQL'. If the command response is an invalid exit request (INVEXITREQ), then the attachment facility is not available. However, a command response of NORMAL does not guarantee that the attachment facility is available because the exit might not have been ENABLE STARTED. Another command which allows you to determine whether the attachment facility has been enable-started: EXEC CICS INQUIRE EXITPROGRAM The INQUIRE EXITPROGRAM CONNECTST parameter should be used to test whether the attachment facility is ready to process SQL statements. If your applications call DSNTIAC, make sure you have made the changes mentioned in Using CICS storage-handling facilities on page 360. For more information about preparing CICS applications for DB2, see Section 5 of DB2 Application Programming and SQL Guide.
This macro supports DSNTEJ5A, which optionally assembles and links a RCT. See Job DSNTEJ5A on page 357 for more information. If you use the CICS-supplied procedures, you must make the following changes: Override the SYSLMOD statement of the link-edit step to point to an APF-authorized library that is available to CICS at execution time. Override the program name for the SMP/E step by specifying the following option when you invoke the procedure: SMPPGM=IEFBR14 The RCT is coded in the format shown below and then assembled. | | The RCT must be reassembled when you migrate from one release of the attachment facility to another. The TYPE=INIT macro must be specified first. If the TYPE=COMD macro is specified, it must be second. If TYPE=POOL is specified, it must be after TYPE=INIT and TYPE=COMD (if there is a COMD) and before TYPE=ENTRY. The TYPE=ENTRY macro can be specified an indefinite number of times to identify specific transactions. The TYPE=FINAL macro is specified last, causing the RCT to be generated. For example:
422
Installation Guide
TYPE=INIT, TYPE=COMD,[optional] TYPE=POOL,[optional] TYPE=ENTRY,[optional] TYPE=ENTRY,[optional] TYPE=FINAL [assembler end statement required]
The RCT must be link-edited into a library that is accessible to MVS through its normal library search order (STEPLIB, JOBLIB, link library), and it must be link-edited below the 16MB line. Do not link the RCT as REENTRANT or REUSABLE because this causes the CICS attachment facility to abend on startup.
DSNCRCT TYPE=INIT
The TYPE=INIT macro allows you to define the information required for CICS to establish its first connection to DB2 and to specify the default options for other types of the macro.
DSNCRCTTYPE=INIT label HIGH ERRDEST=(dest1,dest2,dest3) DPMODI=EQ LOW AEY9 PLANI=plan-name PLNPGMI=default-exit-name PCTEROP=N9 6D N9 6 193 194 PURGEC=minutes, seconds PLNXTR1=value PLNXTR2=value YES sysout-class SQLCODE ROLBI=NO SNAP=NONE STANDBY=ABEND AUTO SUBID=db2id SHDDEST=destination SIGNID=authorization-id STRTWT=NO YES SUFFIX=suffix-id NO THRDMAX=integer 192 TOKENI=YES TRACEID=value YES YES TXIDSO=NO TWAITI=NO POOL
Notes: The STANDBY keyword and the AUTO option of STRTWT are valid for CICS Transaction Server 1.1 and above. STRTWT=YES is the default for CICS Version 4. The macro name must be followed by one or more blanks before options that are optional are coded. Multiple options must be separated by commas (with no blanks).
423
Code a non-blank character in column 72 to indicate that the current statement is continued on the next line. RCT macro continuations should begin in column 16.
Description
DPMODI=HIGH|EQ|LOW Specifies a default for the DPMODE parameter in other TYPES of this macro. The specification (HIGH, EQ, LOW) indicates the priority of thread subtasks relative to CICS main task priority. HIGH Specifies that subtasks can attain a higher priority than the CICS main task from which the subtask was generated. Use this option for high priority and high volume transactions. Specifies that CICS must allow for subtasks to attain equal priority. Specifies that subtasks have a lower priority than the CICS main task priority.
EQ LOW
Default: HIGH ERRDEST=(dest1,dest2,dest3) Specifies up to three CICS transient data destinations to receive unsolicited messages. For dest1,dest2,dest3, specify up to three valid transient data destinations. An asterisk can be specified as a destination. The asterisk acts as a place holder and allows later specification of a destination by the DSNC MODIFY DESTINATION command. Destinations specified by this parameter are verified as valid transient data destinations when the attachment facility is started. Any destinations that are found to be invalid are changed to * (or CSMT, if none are valid). Default: (CSMT,*,*) PCTEROP=AEY9|N906D|N906 Specifies the type of processing that is to occur following a create thread error. The error processing occurs after the SQLCA's SQLCODE field has been updated to reflect the reason for the create thread failure. The PCTEROP parameter allows a user to specify whether a DSNC transaction dump is taken, and whether the DSNCSQL RMI associated with the transaction is disabled. This parameter can be used to allow a transaction to continue processing if a create thread error occurs. A transaction that continues after a create thread error must take corrective action to allow a new thread to be created. A SYNCPOINT ROLLBACK command must be part of the corrective action taken by the transaction before it can continue to issue SQL requests. AEY9 Specifies that a DSNC transaction dump is to be taken and the DSNCSQL RMI associated with the transaction is to be disabled. Disabling the DSNCSQL RMI causes the transaction to receive an AEY9 abend if it attempts to issue another SQL request. The transaction must be terminated and reinitialized before it is allowed to issue another SQL request.
424
Installation Guide
N906D Specifies that a DSNC transaction dump is to be taken and the DSNCSQL RMI associated with the transaction is not to be disabled. The transaction receives a -906 SQLCODE if another SQL is issued, unless the transaction issues SYNCPOINT ROLLBACK. SYNCPOINT without the ROLLBACK option results in an ASP7 abend. N906 Specifies that a DSNC transaction dump is not to be taken and the DSNCSQL RMI associated with the transaction is not to be disabled. The transaction receives a -906 SQLCODE if another SQL request is issued, unless the transaction issues a SYNCPOINT ROLLBACK. SYNCPOINT without the ROLLBACK option results in an ASP7 abend.
Default: AEY9 PLANI=plan-name Specifies the default plan name for any entry in the RCT that does not use dynamic plan selection. The plan-name can have 1-8 characters. Without the PLANI option, the plan name for an entry in the RCT is: The value for PLAN= in the TYPE=ENTRY macro The value for TXID= in the TYPE=ENTRY macro if PLAN= is not specified With the PLANI option, the plan name for an entry in the RCT is: The value for PLAN= in the TYPE=ENTRY macro The value for PLANI= in the TYPE=INIT macro if PLAN= is not specified The value for TXID= in the TYPE=ENTRY macro if neither PLAN= nor PLANI= is specified The PLANI option has no effect on entries that use dynamic plan selection. PLNPGMI=default-exit-name Specifies the name of the default dynamic plan exit. If one of the entries has PLNEXIT=YES, but does not supply a value for PLNPGME, this parameter is used as the exit program name for that entry. Default: DSNCUEXT PLNXTR1=integer Specifies the dynamic plan entry trace ID. Before passing the parameter list to the exit program, the attachment facility generates a CICS trace entry so that the plan name can be recorded in the CICS trace table. For integer, specify a number from 256 to 511. Default: 449 PLNXTR2=integer Specifies the dynamic plan exit trace ID. After returning from the exit program, the attachment facility generates another CICS trace entry. This value is the trace ID assigned to that trace. For integer, specify a number from 256 to 511. Default: 450 PURGEC=minutes,seconds Specifies the length of the protected thread purge cycle. The maximum value for PURGEC is (59,59). The minimum is (0,30). An unprotected thread is terminated as soon as the transaction ends (at SYNCPOINT or EOT). A protected thread is terminated after two purge cycles,
| |
| |
425
which are 30 seconds by default. Normally, a protected thread remains connected for 30-60 seconds after the transaction ends. You can use PURGEC to modify the 'normal purge cycle'. The purge cycle is 5 minutes long when the attachment starts and then PURGEC for the remaining time that the attachment facility operates. For example, if you specify PURGEC=(0,40), protected threads are normally purged 40-80 seconds after the transaction ends. Default: (0,30) ROLBI=YES|NO Specifies a default for the ROLBE parameter in other TYPEs of the DSNCRCT macro. The specification of this parameter determines the disposition of transaction entries in the event a transaction is selected by DB2 as victim in a deadlock resolution. YES Specifies that the attachment facility is to issue a sync point rollback before returning control to the application. A SQL return code of -911 is returned to the program. Specifying YES provides compatibility with SQL/DS. Specifies that the attachment facility is not to initiate a rollback for this transaction. A SQL return code of -913 is returned to the application. It is the responsibility of the application to initiate the rollback.
NO
Default: YES SHDDEST=destination Specifies a transient data destination to receive the statistical report (the same report that is displayed with the DSNC DISP STAT command) during shutdown of the attachment facility. For destination, specify a valid transient data destination. Default: CSSL It might be useful to direct this transient output data to a destination in another partition that is specified as a JES SYSOUT file. SIGNID=authorization ID Specifies the authorization ID to be used by the CICS attachment facility when signing on to DB2. For authorization ID, specify a character string of up to eight characters. The default is the application name of the CICS system, as specified during CICS table generation using the APPLID operand. This name is used when indicated by the AUTH parameter of the TYPE=ENTRY or TYPE=POOL forms of the macro. See the description of the AUTH parameter under DSNCRCT TYPE=ENTRY on page 432. When it is used, the name specified here must be authorized to the resources being accessed. SNAP=sysout-class|NONE Specifies the SYSOUT class that the attachment facility must use for taking a snap dump if a thread subtask fails. For sysout-class, specify any class valid to MVS. NONE Specifies that the snap dump is not taken. However, the SDWA (fixed, base, variable areas, and extensions) is written to SYS1.LOGREC. Default: A
426
Installation Guide
STANDBY=SQLCODE|ABEND Specifies the action to be taken by the attachment facility during the startup process if DB2 is not active. This keyword is valid for CICS Transaction Server 1.1 and above. ABEND Specifies CICS applications using DB2 fail with abend AEY9 issued by CICS when the attachment is not started. SQLCODE Only valid if STRTWT=AUTO is also specified. If an application issues a SQL statement while the attachment facility is standing by, SQLCODE -923 is issued instead of abend AEY9. Default: SQLCODE STRTWT=AUTO|NO|YES Specifies the action to be taken by the attachment facility during the startup process if DB2 is not active. YES Directs the attachment facility to wait for DB2 to start and complete the connection. A CICS task waits to be posted by DB2 when DB2 becomes available. At that time, the initialization of the CICS attach is complete. However, the attachment facility can be terminated by the DSNC STOP command while it is waiting for DB2. The response messages from the attachment are sent to the transient data destination queue specified in the ERRDEST parameter of the RCT. NO Directs the attachment facility to terminate the connection process immediately if DB2 is not already active.
AUTO Specifies to automatically restart the attachment facility if DB2 stops or abends, then restarts. The starting procedures are the same as for YES. If DB2 stops or abends while the attachment facility is up, a message is issued stating the subsystem is not active. The attachment facility goes to standby state and only terminates after the command DSNC STOP is issued or a fatal error is encountered. This keyword is valid for CICS Transaction Server 1.1 and above. Default: AUTO SUBID=DB2-ID Specifies the name of the DB2 subsystem that the attachment facility is to connect with CICS. For DB2 ID, specify a character string of up to four characters. Default: DSN SUFFIX=suffix-ID Specifies the suffix identification character that is to be added to DSNCRCT when the CSECT name is generated. The suffix is two characters for CICS Version 4 and subsequent releases. If it is loaded as a result of this suffix being entered as a parameter using the DSNC STRT command, the table must also be link-edited by this name. For more information on this command, see DB2 Command Reference. You can use the INITPARM command to select the RCF suffix. For example:
427
INITPARM=(DSN2STRT='xx') You can also use the DSNC STRT command. For example: DSNC STRT xx For more information on CICS suffixes, see the appropriate CICS resource definition guide. Default:00 THRDMAX=integer Specifies the maximum number of subtasks that can be active before the attachment facility begins terminating inactive subtasks. The maximum number controls the use of main storage by MVS subtasks created for each active thread. When the number of created subtasks reaches THRDMAX-2, and there is a demand for more subtasks, the attachment facility terminates all the subtasks that are currently inactive. For that reason, the recommended value for THRDMAX is the sum of all values on the THRDA parameters (COMD, ENTRY, and POOL threads) + 3. However, the value you specify for THRDMAX can be less than the sum of all values on the THRDA parameter. The value specified by this parameter must be at least the sum of all values on the THRDS parameters (COMD, ENTRY, and POOL threads). The minimum value is 4. The recommended maximum value is 2000. The value you choose for THRDMAX can be exceeded by increasing THRDA values for selected subtasks. When determining the amount for THRDMAX, be sure to consider the amount you specified for the MAX USERS parameter on installation panel DSNTIPE. MAX USERS is described on page 150. Default: 12 TOKENI=NO|YES Specifies the default TOKENE if TOKENE is not specified on the TYPE=ENTRY statement. For more information on TOKENE, see page 437. TRACEID=trace-ID Specifies the CICS user trace ID that the CICS attachment facility is to use for tracing calls to DB2. Any value, from 256 through 511, that is valid to CICS and that does not conflict with values already in use for CICS trace can be specified. Default: 451 TXIDSO=YES|NO Specifies whether you want to suppress some sign-ons during thread reuse, and thereby avoid extraneous accounting information. The TXIDSO option affects only pool threads and those RCT entry threads with multiple transaction IDs in one entry (for example, TXID=(XC05,XC07). The attach checks for thread reuse only within an entry. TXIDSO has no effect on transactions that specify TOKENE=YES. If the plan name changes, the thread is terminated and re-created. YES Specifies the following rules for thread reuse: 1. A new transaction can reuse an existing thread without a sign-on when:
428
Installation Guide
The authorization ID and transaction ID are the same as the last transaction that used the thread, and TOKENE is set to NO. 2. A new transaction must sign-on before reusing an existing thread when any of these conditions exist: The authorization ID is different from the authorization ID that last used the thread. TOKENE is YES. The transaction ID has changed. NO Specifies the following rules for thread reuse: 1. A new transaction can reuse an existing thread without a sign-on when: The authorization ID is the same as the last transaction that used the thread and TOKENE is set to NO. 2. A new transaction must sign-on before reusing an existing thread when either of these conditions exist: The authorization ID is different from the authorization ID that last used the thread. TOKENE is YES. Default: YES TWAITI=YES|NO|POOL Specifies the default value (YES, NO, or POOL) that is to be created for the TWAIT parameter on other types of the macro. Default: YES For a description of the TWAIT parameter, refer to DSNCRCT TYPE=ENTRY on page 432.
DSNCRCT TYPE=COMD
The TYPE=COMD form of the macro is used to describe DB2 command threads used for processing DB2 commands only. Requests for a DB2 command thread can be diverted to the pool (TWAIT=POOL) if a DB2 command thread is not available. If you code the DSNCRCT TYPE=COMD macro, you must place it immediately following the TYPE=INIT macro and before the TYPE=POOL macro.
DSNCRCTTYPE=COMD label , HIGH USER,TERM, DPMODE=EQ AUTH=(identifier) LOW , YES TASKREQ=(function-key-id) ROLBE=NO THRDM=integer YES THRDA=integer THRDS=integer TWAIT=NO POOL , TXID=(transaction-id)
429
Notes: The macro name must be followed by one or more blanks before optional parameters are coded. Multiple parameters must be separated by commas (with no blanks). Code a non-blank character in column 72 to indicate that the current statement is continued on the next line. RCT macro continuations should begin in column 16.
Description
The TYPE=COMD form of DSNCRCT is optional; if you do not code it, the RCT automatically generates a TYPE=COMD entry with the following parameters: DSNCRCT TYPE=COMD,DPMODE=HIGH,TXID=DSNC, AUTH=(USER,TERM, ), ROLBE=NO, THRDM=1, THRDA=1, THRDS=1, TWAIT=POOL One reason you might want to change this generated default setting is to change the AUTH parameter to reflect the need to give users different responsibilities in operating the DB2 subsystem. The AUTH parameter is described under TYPE=ENTRY on page 433. We strongly recommend the generated values THRDM=1, THRDA=1, THRDS=1, and TWAIT=POOL, because command threads are normally very low use threads. Defining more than one command thread probably unnecessarily wastes resources. In the event a second command thread is needed, it can be diverted to the pool. We also recommend ROLBE=NO for command threads, because rollback is not used for DB2 commands. It is necessary only to specify DSNC (or your user-defined command thread transaction) for the TXID parameter, even if you are using multiple transaction IDs to execute DSN2COM1. For more information on the TYPE=COMD parameters, see the descriptions under TYPE=ENTRY on page 432.
DSNCRCT TYPE=POOL
The TYPE=POOL form of the macro defines threads that can be shared by some or all of the CICS transactions. These threads are allocated to transactions only for a CICS unit of work. They can be considered short-term threads, and they can be used by any RCT entry that is specified to overflow to the pool. The TYPE=POOL form of the macro must be coded before the TYPE=ENTRY form.
430
Installation Guide
DSNCRCTTYPE=POOL label , HIGH USER,TERM,TXID DPMODE=EQ AUTH=(identifier) LOW PLAN=plan-name YES NOPLAN=plan-name ROLBE=NO DSNCUEXT PLNEXIT=YESPLNPGME=exit-program-name 3 3 TOKENE=NO THRDA=integer THRDM=integer THRDS=integer YES YES , TWAIT=NO TXID=(transaction-id)
Notes: The macro name must be followed by one or more blanks before optional parameters are coded. Multiple parameters must be separated by commas (with no blanks). Code a non-blank character in column 72 to indicate that the current statement is continued on the next line. RCT macro continuations should begin in column 16.
Description
DSNCRCT TYPE=POOL This is the name of the macro. It must be coded exactly as it appears here. If the TYPE=POOL form of the macro is not coded, the following default values are assumed: DSNCRCT TYPE=POOL,PLAN=DEFAULT, AUTH=(USER,TERM,TXID), TXID=POOL, THRDM=3, THRDA=3, THRDS=3, TWAIT=YES This default assumes there is a plan named DEFAULT. The rest of the parameters on the TYPE=POOL form of the macro are basically the same as those on the TYPE=ENTRY form of this macro. The only differences for the parameter specifications on TYPE=POOL are: The default for PLAN is DEFAULT. The default for both THRDM and THRDA is 3 (instead of 0 for TYPE=ENTRY). The TWAIT parameter does not include TWAIT=POOL. The default for TXID is POOL. The THRDS parameter specifies the number of MVS subtasks to start when the attachment facility is started, but no pool threads are protected. For a description of the parameters, see DSNCRCT TYPE=ENTRY on page 432.
Chapter 2-11. Connecting the CICS attachment facility
431
Usage notes: When the pool is used to create a thread for a transaction, the thread is terminated when the transaction reaches SYNCPOINT (terminal-driven transactions) or EOT (non-terminal-driven transactions), unless another transaction is queued for the thread with the same plan. The pool provides default processing parameters for transactions that do not have an associated RCT entry. Such transactions are processed according to the specifications of the TYPE=POOL macro; transactions specified with the TYPE=ENTRY form of the macro are processed according to specifications of that macro, even if they overflow to the pool. The THRDM and THRDA parameters must be specified as greater than or equal to 3 for the TYPE=POOL form of the macro. All transactions that do not have an RCT entry must be bound with the plan specified for the pool, unless dynamic plan allocation is specified for the pool entry. The value on the THRDM parameter defaults to 99 if the parameter is coded greater than the allowed maximum (99).
DSNCRCT TYPE=ENTRY
The TYPE=ENTRY form of the macro defines overrides to values set in the TYPE=POOL definition and provides dedicated threads to a transaction or group of transactions. The plan name identifies the DB2 resource being accessed by a CICS application. A dynamic plan exit program is a way of allocating plans to CICS dynamically at execution time. (See Appendixes (Volume 2) of DB2 Administration Guide for more information on dynamic plan exit programs.) In entry threads, all the transactions assigned to the same RCT entry use the plan name or dynamic plan allocation exit program specified for that entry. Allocation deadlocks might occur if more than one thread is allowed for an RCT entry that uses a plan containing exclusive locking (table space locks). (See the THRDA and TWAIT parameters explanations for more information.)
DSNCRCTTYPE=ENTRY label , HIGH USER,TERM,TXID DPMODE=EQ AUTH=(identifier) LOW PLAN=plan-name , NOPLAN=plan-name TASKREQ=(function-key-id) DSNCUEXT PLNEXIT=YESPLNPGME=exit-program-name YES ROLBE=NO THRDA=integer THRDM=integer THRDS=integer TOKENE=NO YES , YES TWAIT=NO TXID=(transaction-id) POOL
Notes:
432
Installation Guide
The macro name must be followed by one or more blanks before optional parameters are coded. Multiple parameters must be separated by commas (with no blanks). Code a non-blank character in column 72 to indicate that the current statement is continued on the next line. RCT macro continuations should begin in column 16.
Description
AUTH=(identifier) Specifies an explicit character string (authorization ID) or directs the attachment facility to use names associated with the CICS transaction. If you do not specify an explicit character string, you can specify up to three positional subparameters. The position of the positional subparameters indicates the order that the attachment facility selects from transaction-related information to form an authorization ID. For identifier, specify either an explicit character string or specify up to three subparameters separated by commas. Subparameters are checked from left to right until one provides a source from which an authorization ID can be obtained. Permissible values for identifier are: character-string Specifies a character string that is used as a DB2 authorization ID. For character-string, specify a character string of no more than eight characters, except for the reserved words USERID, USER, TERM, TXID, and SIGNID If you specify an explicit character string, any subsequent subparameters must be omitted or specified as null (*). GROUP Specifies the RACF sign-on user ID (eight character USERID) and the connected group name as the authorization ID. The following table shows how these two values are interpreted by DB2.
IDs passed to DB2 CICS sign-on user ID (USERID) RACF connected group name How DB2 interprets values Represents the primary DB2 authorization ID. If the RACF list of group options is not active, then DB2uses the connected group name supplied by the CICSattachment facility as the secondary DB2 authorization ID. If the RACF list of group options is active, DB2ignores the connected group name supplied by the CICSattachment facility, but the value appears in the DB2list of secondary DB2 authorization IDs.
To use the GROUP option, you must have the following definitions: The CICS system must have RACF external security (EXTSEC=YES) specified in the CICS system initialization table (SIT). The CICS terminal user's entry in the CICS sign-on table (SNT) must specify EXTSEC=YES.
Chapter 2-11. Connecting the CICS attachment facility
433
If no RACF group ID is available for this USERID, then an eight-character field of blanks is passed to DB2 as the group ID. Null specification (*) Specifies a null value for the second parameter, the third subparameter, or both. (A null specification for the first subparameter is invalid.) If nothing is entered for the second and third subparameters, the asterisk (*) is assumed (unless all three specifications are overridden). SIGNID Specifies the CICS system authorization ID (up to eight characters) as the resource authorization ID. This is the value of the SIGNID keyword in the TYPE=INIT macro. TERM Specifies the terminal identification (four characters padded to eight) as an authorization ID. An authorization ID cannot be obtained in this manner if a terminal is not connected with the transaction. If a transaction is started (using a CICS command) and has no terminal associated with it, the AUTH=TERM parameter does not apply. TXID Specifies the transaction identification (four characters padded to eight) as the authorization ID. USER Specifies the sign-on user operator identification associated with the CICS sign-on facility as the authorization ID (three characters padded to eight). An authorization ID cannot be obtained in this manner if a user is not signed on to the entering terminal. If an operator must be signed on before accessing the DB2 database, USER must be specified in the first position, and the second and third positions must be specified as null (*). For example: AUTH=(USER, , ) This option is mutually exclusive with the USERID option specified on the same RCT entry. USERID Specifies the sign-on user ID (eight-character USERID) associated with the CICS sign-on facility as the authorization ID. An authorization ID cannot be obtained in this manner if a user is not signed on to the entering terminal. If an operator must be signed on before accessing the DB2 database, USERID must be specified in the first position, and the second and third positions must be specified as null (*). For example: AUTH=(USERID, , ) This option is mutually exclusive with the USER option specified on the same RCT entry. When the sample sign-on exit DSN3SSGN is used with AUTH=USERID, the exit sends the user ID to DB2 as the primary authorization ID and the RACF group ID to DB2 as the secondary ID. When the sample sign-on exit is used and the RACF LISTOFGROUPS option is active, AUTH=USERID acts the same as AUTH=GROUP.
434
Installation Guide
Default: (USER,TERM,TXID) Causes the CICS attachment facility to first try using the CICS sign-on identification as an authorization ID. If the terminal operator is not signed on, the terminal identification is used. If the transaction is not connected with a terminal, the transaction identification is used as an authorization ID. DPMODE=HIGH|EQ|LOW Specifies the priority of thread subtasks relative to CICS main task priority. HIGH Specifies that subtasks can attain a higher priority than the CICS main task from which the subtask was generated. Use this option for high priority and high volume transactions. Specifies that CICS must allow for subtasks to attain equal priority. Specifies that subtasks have a lower priority than the CICS main task priority.
EQ LOW
PLNEXIT=NO|YES Specifies whether a dynamic plan allocation exit program is invoked. For more information on dynamic plan allocation, see Appendix B (Volume 2) of DB2 Administration Guide . NO Specifies that this transaction ID entry does not use a plan exit. The CICS attachment facility obtains the plan name using the name specified on the option PLAN=. Specifying NO means you must code the option PLAN=plan-name. Specifies that this transaction ID can dynamically allocate the plan name when the first SQL statement is processed for the application program. This is accomplished by means of the dynamic plan exit specified on the option PLNPGME=. Specifying YES means you must NOT code the option PLAN=.
YES
Default: NO PLAN=plan-name Specifies the plan ID to be associated with this transaction when it is different from the transaction ID. For plan-name, specify a valid application plan name. The PLAN ID specified with a TYPE=ENTRY macro is used even if the POOL provides the thread. The PLAN parameter is a required parameter when the TXID parameter is coded as a list of two or more transaction IDs. If PLAN= is not specified and PLNEXIT=NO, then TXID is the default plan if only one transaction is specified on the TXID keyword. See the description of the TXID parameter on page 438. PLNPGME=exit-program-name Specifies the name of the exit program this entry uses. The default is set by the PLNPGMI parameter on the TYPE=INIT statement. For information on how to write your own exit program, see Appendixes (Volume 2) of DB2 Administration Guide. Default: DSNCUEXT ROLBE=YES|NO Specifies a disposition for transactions defined by this entry in the event a transaction is selected by DB2 as the victim in a deadlock resolution. The
435
specification of ROLBE overrides the specification of the ROLBI parameter on the TYPE=INIT macro. YES Specifies that the attachment facility is to issue a sync point rollback before returning control to the application. A SQL return code of -911 is returned to the program. Specifying YES provides compatibility with SQL/DS. Specifies that the attachment facility is not to initiate a rollback for this transaction. A SQL return code of -913 is returned to the application.
NO
Default: YES TASKREQ=function-key-ID Specifies the transaction identification for this entry when the transaction is started using one of the 3270 function keys. Valid specifications are the same as those supported by the TASKREQ operand in the CICS program control table. The options supported include: PA1, PA2, or PA3 for the PA keys PF1 through PF24 for the PF keys OPID for the operator identification card reader LPA for a light pen detectable field on a 3270 device MSRE for the 10/63 character magnetic slot reader. Refer to the CICS documentation for a more detailed description of possible options. Either TXID or TASKREQ or both parameters are required. Whenever TASKREQ is coded, with or without a TXID operand, a transaction list is generated. The connection to DB2 for all transactions in this list is made as specified by the other parameters associated with the entry. The first or only transaction identifier specified in the TXID operand (or the first or only function-key identifier, if no TXID was specified) is placed into the resource control table entry. Because the hexadecimal identifiers of function-key driven transactions generally consist of undisplayed characters, you could have some difficulty interpreting messages containing them. These identifiers appear in both CICS and DB2 messages. THRDA=integer Specifies the maximum number of threads that the attachment facility allows connected for this transaction, group, or pool before requests are either made to wait or are diverted to the pool. (See the description of the TWAIT parameter.) For integer, specify a value that does not exceed 99 or the THRDM value. The general restriction is (THRDS THRDA THRDM 99). When THRDA=0, TWAIT=YES or TWAIT=POOL causes all threads to be diverted to the pool.
436
Installation Guide
Forcing low-use transactions into the pool this way might save MVS ATTACH overhead if pool threads are available. If the entry has any protected threads (THRDS > 0), you cannot modify THRDA to be 0. In other words, protected threads are not possible if THRDA=0. If a plan specified for an RCT entry has exclusive locking, set the value of the THRDA parameter to 1 and the value of the TWAIT parameter to YES to prevent allocation deadlock. For considerations using threads in conjunction with dynamic plan selection, see Appendix B (Volume 2) of DB2 Administration Guide. Default: 0 THRDM=integer Specifies the maximum number of threads the attachment facility is prepared to connect for this transaction group. For integer, specify an integer value that does not exceed 99. The general restriction is (THRDS THRDA THRDM 99). The value specified for THRDM is the maximum value that can be specified in the DSNC MODIFY TRANSACTION command when using that command to change the value of THRDA. See Section 4 (Volume 1) of DB2 Administration Guide for a description of the DSNC MODIFY TRANSACTION command. You can associate a CICS transaction with a plan name without allocating it to an entry thread by specifying no threads (THRDM=0) and overflow to the pool (TWAIT=POOL). The entry thread uses the plan name associated with its TYPE=ENTRY parameter when it overflows to the pool. For considerations using threads in conjunction with dynamic plan selection, see Appendix B (Volume 2) of DB2 Administration Guide. Default: 0 THRDS=integer Specifies the maximum number of MVS subtasks or threads that must be started when the attachment facility is started. This parameter also specifies the number of protected threads. For integer, specify a value that does not exceed the THRDA value or 99. The general restriction is (THRDS THRDA THRDM 99). For considerations using threads in conjunction with dynamic plan selection, see Appendixes (Volume 2) of DB2 Administration Guide. Default: 0 TOKENE=NO|YES Specifies whether the CICS attachment facility produces a DB2 accounting record for every CICS transaction, even those transactions that are reusing threads. It also specifies whether the CICS attachment facility passes the CICS LU6.2 (protected) token to DB2 for inclusion in the DB2 accounting trace records. You might receive more than one DB2 accounting record for a CICS transaction that has more than one DB2 unit of recovery, but you can correlate the CICS and DB2 records with the matching LU6.2 tokens. Because CICS produces accounting records on a transaction basis, and DB2 produces accounting records on a thread basis, it can be difficult to correlate the two. This parameter gives you the option of producing a DB2 accounting
437
record for each CICS transaction, even for transactions that are reusing threads. If you do not specify YES or NO for TOKENE, then it assumes the value specified in TOKENI on the TYPE=INIT statement. YES Specifies that the CICS attachment facility requests that DB2 (using SIGNON) produce an accounting record after each transaction. It also indicates that the attachment facility passes the CICS LU6.2 token to DB2 for inclusion in the DB2 accounting trace records. Specifying YES makes it easier to correlate DB2 and CICS accounting and trace records. Specifying YES slightly increases the overhead of a SQL request that reuses threads due to additional SIGNON activity. In a thread reuse situation, the transaction rate can degrade by no more than 5%. For additional information on the CICS task scope and DB2 thread scope, see Section 5 (Volume 2) of DB2 Administration Guide. NO Specifies that the CICS attachment facility does not produce a DB2 accounting record during thread reuse. When TOKENE=NO is specified, it is more difficult to correlate DB2 and CICS accounting and trace records.
TWAIT=YES|NO|POOL Specifying TWAIT overrides the value of the TWAITI parameter on the TYPE=INIT macro. YES Specifies that, if all threads are busy, a transaction must wait until one becomes available. A transaction can wait as long as CICS allows it to wait, generally until a thread becomes available. There is a limit to the number of transactions waiting, which is the value specified by CICS MXT (maximum number of tasks) and CMXT (class maximum task). If TWAIT=YES is specified with THRDA=0, the attachment facility routes the transaction to the pool. Otherwise, a DB2 transaction could wait indefinitely for a thread. An alternative to using MAX CLASS (CMXT) is using TWAIT=POOL. The task picks up a pool thread rather than waiting for an entry thread to become available. NO Specifies that, if all threads are busy, a transaction must be terminated with an abend. If NO is specified, or if TWAIT=NO has been specified on the TYPE=POOL macro, you must closely coordinate the number of threads specified with the MAX CLASS (CMXT) of the transactions. This helps to prevent abends when threads are unavailable.
POOL Specifies that, if all threads are busy, a transaction must be diverted to use the pool of threads. If the pool is also busy, and NO has been specified for the TWAIT parameter on the TYPE=POOL form of the macro, a transaction is terminated with an abend. See the description of the TWAIT=NO parameter. Default: YES TXID=(transaction-ID) Specify the transaction identification, or identifications for this entry. For transaction ID, specify the transaction identifications found the CSD transaction
438
Installation Guide
definition. The way you code this option depends on how many transactions you have and on whether: (1) you have different plans for each transaction; (2) you want to use dynamic plan allocation; (3) you want separate statistics for each transaction. 1. If you have several transactions that use the same plan, you can code a list of transaction IDs, to be indexed to the same RCT entry. Code your entry as in this example: DSNCRCT TYPE=ENTRY,TXID=(TXI1,TXI2,TXIn),PLAN=(PLNA) You cannot code more than one plan per entry. To specify a different plan for each transaction, you must code a separate DSNCRCT entry for each plan, as follows: DSNCRCT TYPE=ENTRY,TXID=(TXI1),PLAN=(PLNA) DSNCRCT TYPE=ENTRY,TXID=(TXI2),PLAN=(PLNB) DSNCRCT TYPE=ENTRY,TXID=(TXIn),PLAN=(PLNC) 2. With dynamic plan selection, DB2 selects a plan based on the DBRM of the first SQL statement, or based on a user-defined exit routine for dynamic plan selection. You can use the PLNEXIT and PLNPGME parameters to specify a user-defined exit routine. To use dynamic plan selection for your transactions, code one or more transactions per entry, and optionally add pointers to the PLNEXIT and PLNPGME parameters, as follows: DSNCRCT TYPE=ENTRY,TXID=(TXI1,TXI2,TXIn),PLNEXIT=YES or DSNCRCT TYPE=ENTRY,TXID=(TXI1),PLNEXIT=YES DSNCRCT TYPE=ENTRY,TXID=(TXI2),PLNEXIT=YES DSNCRCT TYPE=ENTRY,TXID=(TXI3),PLNEXIT=YES 3. If you want separate CICS attachment facility statistics for each transaction, you must code a separate entry for each transaction, as in this example: DSNCRCT TYPE=ENTRY,TXID=(TXI1) DSNCRCT TYPE=ENTRY,TXID=(TXI2) DSNCRCT TYPE=ENTRY,TXID=(TXIn) There are two types of entry threads: protected and unprotected. If a thread is protected (THRDS>0), the thread is terminated if unused after two consecutive purge cycles. After a MVS subtask is attached, that MVS subtask remains available until the attachment facility is stopped or the number of active MVS subtasks reaches THRDMAX-2. When the thread is terminated, the associated MVS subtask is not detached. Threads remain assigned to transactions regardless of whether they are driven by a terminal until EOT, regardless of any SYNCPOINT processing.
DSNCRCT TYPE=FINAL
The TYPE=FINAL form of the macro is coded last and results in the generation of the resource control table.
DSNCRCTTYPE=FINAL label
439
Description
DSNCRCT TYPE=FINAL This is the name of the macro. It must be coded exactly as it appears here. The TYPE=FINAL form of the macro has no other parameters.
DSNCRCT TYPE=DSECT
The TYPE=DSECT form of the macro is used to generate a DSECT map of the resource control table. It is the only form of the macro that is required to generate the map.
DSNCRCTTYPE=DSECT label
Description
DSNCRCT TYPE=DSECT This is the name of the macro. It must be coded exactly as it appears here. The TYPE=DSECT form of the macro has no other parameters.
440
Installation Guide
443 443 444 444 445 445 446 447 449 449 449 450 450 451 451 452 456 458 459 460 462 462 462 463 464 466 467 467 471 471 474 476 478 478 481 482 485 487 488 489 489 489 490 490 492 493 493 494
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
441
SYSIBM.IPNAMES table . . SYSIBM.USERNAMES table Step 5: Start TCP/IP support . Step 6: Tuning TCP/IP . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
442
Installation Guide
443
Setting up a network for use by database management systems requires knowledge of both database management and communications. Thus, you must put together a team of people with those skills to plan and implement the network.
444
Installation Guide
If the value in the LINKNAME column is found in the SYSIBM.IPNAMES table, TCP/IP is used for DRDA connections. If the value is found in SYSIBM.LUNAMES table, SNA is used. If the same name is in both SYSIBM.LUNAMES and SYSIBM.IPNAMES, TCP/IP is used to connect to the location. Attention: A requester cannot connect to a given location using both SNA and TCP/IP protocols. For example, if your SYSIBM.LOCATIONS specifies a LINKNAME of LU1, and if LU1 is defined in both the SYSIBM.IPNAMES and SYSIBM.LUNAMES table, TCP/IP is the only protocol used to connect to LU1 from this requester for DRDA connections. For private protocol connections, the SNA protocols are used. If you are using private protocol connections, the SYSIBM.LUNAMES table must be defined for the remote location's LUNAME
| | | | | | |
Enhancements in Version 6
Some of the DRDA enhancements in Version 6 include: Support for returning multiple extra DRDA query blocks on each network transmission. (For details, see the EXTRA BLOCKS REQ and EXTRA BLOCKS SRV fields on Distributed data facility panel: DSNTIP5 on page 222. A new bind option, DBPROTOCOL, which lets you use DRDA protocol even for applications that use 3-part names. This bind option lets your applications that
Chapter 3-1. Connecting distributed database systems
445
| | | | | | | |
currently use private protocol to begin taking advantage of DRDA protocol. If DBPROTOCOL is not specified, the default is the value you entered in the DATABASE PROTOCOL field on Distributed data facility panel: DSNTIP5 on page 222. Recommendation: Move all your distributed applications to DRDA. Private protocol is no longer being enhanced and will be discontinued in a future release. DRDA is strongly recommended for new applications. Consider the impact to existing applications before converting them to DRDA.
446
Installation Guide
447
about using generic resources, see VTAM for MVS/ESA Network Implementation Guide. Step 3: Define the DB2 subsystem to VTAM on page 451 In this section, we tell how to use the VTAM APPL statement to make the DB2 subsystem known to VTAM. You must include the APPL definitions in the VTAM SYS1.VTAMLST library at VTAM startup. We also tell how to use the VTAM MODEENT statement to define default session modes. DB2 uses one default mode for DRDA access conversations and another for DB2 private protocol access conversations. You must include mode tables in the VTAM SYS1.VTAMLIB library at VTAM startup. | | | Sample VTAM definitions are provided in Sample VTAM definitions to connect two DB2s on page 478, in the data set DSN8VTAM in SDSNSAMP, and in examples throughout this chapter. Step 4: Populate the communications database on page 458 The DB2 catalog includes the communications database (CDB), which contains several tables that hold information about your connections with remote systems. You must populate some of these tables before you can request data from those remote systems. If this DB2 system only services data requests, you do not have to populate the CDB; you can use the default values. Step 5: Start VTAM to use DB2 on page 462 When you start VTAM to use DB2, you must be sure that the proper definitions are in the VTAM libraries VTAMLST and VTAMLIB. Step 6: Tune the system on page 462 This is an optional step, which you can do after you have established communications between two or more systems. The procedure outlined up to this point gives you default values for your DB2 modes and your class of service. Although the defaults are probably adequate for your preliminary testing, you can change them to improve performance in the network, or to assign different modes to different application plans. VTAM publications, such as VTAM for MVS/ESA Network Implementation Guide, contain more detailed information about tuning the network. In this section, we discuss session and mode options you can modify. When VTAM links two nodes, it establishes a session. The number of sessions available can have a significant impact on performance; therefore, you might need to modify your session limit values. Calculating session limits on page 471 contains more detailed information about calculating session limits. Also, large amounts of DB2 data travelling through the network can severely affect VTAM storage, and you might need to tune buffer storage. Calculating VTAM I/O buffer pool (IOBUF) storage on page 474 contains more detailed information about calculating VTAM buffer pool storage. You can also tune the system by changing mode options. A mode describes various characteristics of a session, such as the maximum number of bytes sent at one time. Modes can point to a class of service table, which ranks the available virtual routes for this mode with respect to preference of use and paths through the network. Essentially, the class of service table allows you to assign different network priorities to your modes.
448
Installation Guide
"Step 7: Create Aliases" | | | | This is an optional step. Each DB2 location can create aliases for the tables it wants to access, using DB2 private protocol access or DRDA, at the other DB2 locations. For more information about creating aliases, see Section 2 (Volume 1) of DB2 Administration Guide. "Step 8: Provide Authorization for an Appropriate Level of Security" See Section 3 (Volume 1) of DB2 Administration Guide for information about security considerations for distributed data processing.
| | | | | | | | |
449
The next four bytes are the enterprise code of the registering enterprise. This might already be registered with IBM as your SNA NETID. The enterprise code can include the uppercase letters A through Z, the numbers 0 through 9, and the underscore character (_). To register your SNA NETID, see your IBM representative. A name by which VTAM can recognize the local subsystem. It must be either a unique name or in some cases a generic name. The unique name must be unique within the network of connected systems, can have from 1 to 8 characters, and is called the LU name. The LU name and the location name of a subsystem can be identical, but we do not recommend this; LU names are unique only within a network, and networks can change. You must share the LU name with any system that requests data from your local subsystem. Later, you enter this name in the VTAM APPL statement described in Step 3: Define the DB2 subsystem to VTAM on page 451. If the MVS system on which DB2 is running is part of an MVS sysplex, you can use a generic 8-character name to represent a group of VTAM LU names. The generic name might be useful if your network is in a transitional period, and you want to use generic names to reference network nodes. Specify the generic LU name in the field DB2 GENERIC LUNAME on installation panel DSNTIPR. Use column GENERIC of SYSIBM.LUNAMES to indicate that you want to use the generic LU name for CNOS processing and SQL requests to a particular server. See DB2 Data Sharing: Planning and Administration for instructions on setting up a generic LU name for a data sharing group.
450
Installation Guide
names in those cases, the LU name is enclosed in less-than (<) and greater-than (>) brackets. When your systems begin communicating, you and others involved in working with distributed systems need to be aware of the LU name to DRDA RDBNAM mappings. When you have obtained the necessary names, enter them in the CDB as described in Step 4: Populate the communications database on page 458. Transaction program names (tpns): If a server is not a DB2 for OS/390, it might have an additional name that uniquely identifies it.. In LU 6.2, this is known as a transaction program name (TPN), and can be from 1 to 64 characters long. When a DB2 for OS/390 subsystem communicates with other DB2 for OS/390 subsystems, you do not need to supply TPN values. The DB2 subsystems automatically choose the correct TPN values for both DRDA access and DB2 private protocol access. When a TPN is necessary: You might need to supply TPN values when a DB2 subsystem requests data from a server that is not a DB2 for OS/390 subsystem. For cases where the server does not accept the default TPN for DRDA access, enter into your CDB the TPN chosen by that server. For DB2 for VM, for example, the TPN is the SQL database machine ID. TPN values accepted by DB2 for OS/390:A requester that is not DB2 for OS/390 must use either the TPN name X'07F6C4C2' or DB2DRDA, which are the only values DB2 recognizes when it accepts a request from another system. Some requesters enter the TPN as two separate fields: a 1-byte prefix (X'07') and a 3-byte suffix ('6DB').
| | | |
USIBMSTOSQL1 USIBMSTOSQL2
Note: USIBMSTODB21 plans to accept requests from many OS/2 and Windows NT requesters.
451
| |
For your convenience, the APPL statement example is provided in data set DSN8VTAM, in the sample library, SDSNSAMP. The sections that follow describe the APPL options that Spiffy uses and a few more in which you might be interested. There are others you can use; for information about those, see VTAM for MVS/ESA Resource Definition Reference.
AUTOSES
452
Installation Guide
DMINWNL
The minimum number of parallel sessions in which, if there is contention for a conversation, this local DB2 subsystem is the winner. The suggested value is one-half the value of DSESLIM, described below.
DMINWNR
For the same situation as described for DMINWNL, the number of sessions in which the remote system is the winner. The suggested value is one-half the value of DSESLIM, described below. For more information about session negotiations, see Interpreting CNOS messages on page 476.
DSESLIM
The default maximum number of sessions allowed for this DB2 subsystem as it communicates with any other system on a given mode. For performance reasons, the DB2 suggested value for DSESLIM is the maximum number of sessions that can possibly be in use on any mode. For example, assume you have 5 modes for which the following maximum numbers of sessions could be active: 10, 12, 20, 30, 40. In this case, DSESLIM should be 40. Because calculating a precise value for this number can be rather difficult if you do not know exactly how many applications run on a specific mode, Spiffy chooses 50. They can modify this option later if they have problems obtaining enough sessions, or if they find they are requesting sessions that they never need. For information about how to calculate this number, see Calculating session limits on page 471. You can use DSESLIM to control the number of sessions that this subsystem can issue or receive. For example, to avoid overloading this subsystem with requests from remote application processes, you can assign a low number to DSESLIM to limit the number of simultaneous remote requests issued by a given partner and mode. Use the CONVLIMIT column of the LUMODES table in the CDB to override this value for specific cases. See Update SYSIBM.LUMODES with conversation limits on page 468 for information about how to do that.
MODETAB The name of the VTAM logon mode table you use to define DB2 session modes. Only modes defined in this table are eligible for conversations created by the local DB2. If you leave this blank, DB2 uses the default mode table shipped with VTAM (ISTINCLM). Spiffy decides to set up a separate mode table and chooses the name DB2MODES. DB2 cannot use either the default mode table or the one you set up yourself until you make entries into the table as described in The modeent macro on page 456. PRTCT If you decided to use a password, as described in Step 2: Choose names and a password on page 449, this is that password. Later, you must store the same password in the bootstrap dataset (BSDS), entering it through installation panels or the change log inventory utility. If you prefer not to use a password, omit this option. The installation panels and the change log inventory utility do not require you to enter a password. For more information about using the VTAM password, see Section 3 (Volume 1) of DB2 Administration Guide.
453
SECACPT
The level of conversation-level security allowed. Recommendation: Use ALREADYV, which gives you the most flexibility in determining your security. You can use the CDB to determine levels of security on a more granular basis as described in Section 3 (Volume 1) of DB2 Administration Guide. We do not recommend SECACPT=CONV because in many cases, it does not allow already verified conversations for DRDA access. It works for conversations that use only DB2 private protocol access.
VERIFY
Whether you want SNA partner LU verification. The default, VERIFY=NONE, means that any system can connect with yours. Because Spiffy is setting up a small, restricted network, it chooses the default for now. Use VERIFY=REQUIRED to activate partner LU verification. This means that you let RACF and VTAM check the identity of an LU that is attempting to connect with yours. For more information about partner LU verification, see Section 3 (Volume 1) of DB2 Administration Guide and VTAM for MVS/ESA Network Implementation Guide. DB2 has no dependency on the value you choose.
| | | | | |
VPACING
The maximum number of messages that another system can send to this local DB2 subsystem during a conversation before waiting to receive a pacing response. The suggested value is 2. These message sizes are determined by the RUSIZES option of the MODEENT macro. VPACING and RUSIZES, together with some overhead, determine the amount of storage required for the pacing window. For more information about pacing, see Controlling pacing on page 464.
ATNLOSS=ALL Causes VTAM to notify DB2 each time an SNA session terminates. This is important for timely resource recovery in the two-phase commit process. AUTH=(ACQ) SRBEXIT=YES Determines the DB2 system authority to use certain VTAM functions. Tells VTAM that DB2 uses service request block (SRB) processing in its exit routines.
SYNCLVL=SYNCPT Tells VTAM that DB2 supports two-phase commit. Other systems communicating with this DB2 use this indication to determine if DB2 supports the updating of many locations in one unit of work. Coding SYNCLVL=SYNCPT does not preclude the support of partner LUs that do not support two-phase commit. DB2 still supports the non-two-phase process. See Section 5 of DB2 Application Programming and SQL Guide for information about
454
Installation Guide
writing applications that access partners that do not have two-phase commit processing.
PARSESS=YES Specifies that parallel sessions are allowed. This defaults to YES when APPC=YES. ENCR=NONE Specifies information about specific cryptographic requirements. There is no support for encryption in this release of VTAM for LU 6.2 applications; therefore, this must be NONE. Specifies information about SCIP exit routines. DB2 does not have SCIP exit routines; this must be NO. Specifies whether a VTAM functional recovery routine is in effect when control is returned to DB2. DB2 uses its own recovery routines; this must be NO.
SONSCIP=NO VTAMFRR=NO
DDRAINL
DRESPL
EAS
LMDENT
MAXPVT
455
OPERCNOS
The ability to have a VTAM operator display and set VTAM session limits for a given LUNAME and MODENAME. Use ALLOW to enable a VTAM operator to change session limits dynamically without stopping DDF or changing the CONVLIMIT column of the SYSIBM.LUMODES table. Use NALLOW, the default, to make sure VTAM operators are not able to change DB2's session limits dynamically.
Default modes
There are the following default modes: SNASVCMG is an optional mode. It is reserved for use by VTAM for CNOS processing (described in Interpreting CNOS messages on page 476) and exists in the VTAM default log mode table. Because SNASVCMG is reserved for use by VTAM, do not enter it as a mode name in the CDB. If you have decided to set up a separate mode table for DB2, you can, if you choose, copy the SNASVCMG mode entry into your DB2 mode table, or just use it as it exists in the ISTINCLM mode table. See VTAM for MVS/ESA Resource Definition Reference for a description of this mode. IBMRDB is a recommended mode entry because it is used as a default for DRDA access whenever you do not explicitly assign a mode to a session. It does not exist in the default table; to use it as a default you must add it to your mode table. IBMDB2LM is a recommended mode entry because it is used as a default for DB2 private protocol access whenever you do not explicitly assign a mode to a session. It does not exist in the default table; to use it as a default you must add it to your mode table. Use the MODEENT macro to enter each mode into your mode table. When this table is complete, you must assemble and link-edit it into SYS1.VTAMLIB. See
456
Installation Guide
VTAM for MVS/ESA Resource Definition Reference for more information about creating mode tables.
| |
The samples in Figure 85 work for both dependent and independent LUs; however, if you have no dependent LUs, it is not necessary to re-assemble your existing mode table with the above options. For your convenience, a sample MODEENT is included in data set DSN8VTAM, in SDSNSAMP. See Distributed Relational Database Architecture: Connectivity Guide for more information about dependent LUs. The ENCR option is ignored by LU 6.2 and is thus not included in our samples. DB2MODES MODETAB IBMDB2LM MODEENT LOGMODE=IBMDB2LM, DB2 DEFAULT MODE FOR SYS-DIR ACC TYPE= , NEGOTIABLE BIND SSNDPAC=X' 2', SECONDARY SEND PACING COUNT SRCVPAC=X' ', SECONDARY RECEIVE PACING COUNT RUSIZES=X'8989', RUSIZES IN-4 96 OUT-4 96 FMPROF=X'13', LU6.2 FM PROFILE TSPROF=X' 7', LU6.2 TS PROFILE PRIPROT=X'B ', LU6.2 PRIMARY PROTOCOLS SECPROT=X'B ', LU6.2 SECONDARY PROTOCOLS COMPROT=X'5 A5', LU6.2 COMMON PROTOCOLS PSERVIC=X' 6 2 122F ' LU6.2 LU TYPE IBMRDB MODEENT LOGMODE=IBMRDB, DB2 DEFAULT MODE FOR APP-DIR ACC TYPE= , NEGOTIABLE BIND SSNDPAC=X' 2', SECONDARY SEND PACING COUNT SRCVPAC=X' ', SECONDARY RECEIVE PACING COUNT RUSIZES=X'8989', RUSIZES IN-4 96 OUT-4 96 FMPROF=X'13', LU6.2 FM PROFILE TSPROF=X' 7', LU6.2 TS PROFILE PRIPROT=X'B ', LU6.2 PRIMARY PROTOCOLS SECPROT=X'B ', LU6.2 SECONDARY PROTOCOLS COMPROT=X'5 A5', LU6.2 COMMON PROTOCOLS PSERVIC=X' 6 2 122F ' LU6.2 LU TYPE MODEEND END
Figure 85. Sample mode entries
X X X X X X X X X X X X X X X X X X X X
Modeent options
When considering values for modes, realize that the partner system can choose different values. If the partner has different values, VTAM negotiates the values to limits acceptable to both systems when the session is established for the mode. The options used in the MODEENT macro have the following meanings.
457
name
The name option (IBMDB2LM and IBMRDB in the examples) is optional and has no function in the specification of a logon mode table.
LOGMODE Specifies the logon mode name to be used as a key for the session options in this table entry. This logon mode name corresponds to mode name columns in the CDB. TYPE SRCVPAC SSNDPAC TYPE=0 indicates that DB2 is using a negotiable BIND, which is required for communicating with dependent LUs. Specifies the secondary receive pacing count. The DB2 suggested value is X'00'. Specifies the secondary send pacing count. The DB2 suggested value is any nonzero number. Do not use 0; this turns off pacing, which can result in problems with IOBUF storage. Specifies the maximum length of data in bytes that can be sent and received in one request/response unit (RU). It is read as two numbers, each having two hexadecimal digits: the first number for the send amount, the second for the receive amount. The suggested value of X'8989' means that VTAM sends a maximum of 4096 bytes (8 29) across at one time, but there is no limit on how much total information can be sent. This constant specifies the function management profile required for LU 6.2. This constant specifies the transmission services profile required for LU 6.2. This constant specifies the primary LU protocols used in LU 6.2. This constant specifies the secondary LU protocols used in LU 6.2.
RUSIZES
COMPROT This constant specifies the common LU protocols used in LU 6.2. PSERVIC This constant specifies this as an LU type 6.2.
Some of the above options can have a profound effect on performance because of their impact on pacing. For more information about these pacing options, see Controlling pacing on page 464. The ENCR option is ignored by LU 6.2; thus it is not included in the sample above.
458
Installation Guide
Administration for more information. Section 3 (Volume 1) of DB2 Administration Guide discusses the requirements for the other tables. After you populate these tables, you can write queries that access data at a remote system. For instructions on sending SQL statements to other systems, see DB2 Application Programming and SQL Guide. For instructions on granting privileges to users on remote DB2 subsystems, see Section 3 (Volume 1) of DB2 Administration Guide.
SYSIBM.LOCATIONS table
The table LOCATIONS has the following purposes: When you do an SQL CONNECT, the LOCATION column maps the location name (or DRDA RDBNAM) to the VTAM LU name and, if necessary, the transaction program names (TPNs). When your DB2 receives a request from another DB2 site (both DRDA access and DB2 private protocol access), it uses the LOCATION column to validate the requesting site's location name. (Only DB2 sites exchange location names in both directions.) You do not need to populate this table for systems that use only DRDA access and make requests only of your local DB2. LOCATIONS has the following columns relating to VTAM: LOCATION CHAR(16) The unique network location name, or DRDA RDBNAM, assigned to a system, remote or local. You must provide location names for any systems that you request data from. This column is the primary key for this table. LINKNAME CHAR(8) Identifies the VTAM attributes associated with this location. For each LINKNAME specified, you must have a row in SYSIBM.LUNAMES whose LUNAME matches the value specified in this column. Because this table is used for outbound requests, you must provide an LUNAME or your requests fail. Do not enter blanks in this column. TPN VARCHAR(64) This column is used to enter a transaction program name (TPN) for SNA conversations with non-DB2 systems. You only need to use this column if you are sending or receiving SQL requests from systems using non-default TPNs as described in Step 2: Choose names and a password on page 449. Spiffy's USIBMSTODB21 location wants a LOCATIONS table that looks like Table 112.
Table 112. Spiffy's LOCATIONS table LOCATION USIBMSTODB21 USIBMSTODB22 USIBMSTOSQL1 USIBMSTOSQL2 LINKNAME LUDB21 LUDB22 LUSQLDS LUSQLDS TPNSQLDS2 TPNSQLDS1 TPN
459
INSERT INTO SYSIBM.LOCATIONS (LOCATION, LINKNAME) VALUES ('USIBMSTODB22','LUDB22'); A Row for the Local Location: You do not need a row for the local DB2 in the LUNAMES and LOCATIONS tables. For example, Spiffy's USIBMSTODB21 subsystem does not require a row that shows its own LU name and location name. However, for convenience, Spiffy decides to populate one LUNAMES table and one LOCATIONS table and to duplicate them entirely at each location. As a result, each table contains a row for its own LU name or location name.
SYSIBM.LUNAMES table
LUNAMES defines the security and mode requirements for conversations with other systems. Decisions about how to populate this table depend on how you intend to use DB2: If you use this system only as a server, DB2 can use a blank in the LUNAME column as a default. DB2 uses the values in the default row as defaults for LUs that are not explicitly defined in LUNAMES. If you do not have a row with a blank in the LUNAME column, DB2 rejects client connections that do not explicitly state a valid LUNAME. The DSNTIJSG installation job creates the default row in table SYSIBM.LUNAMES. If this DB2 requests data from other systems, you need to provide LU names for those systems. LUNAMES has the following columns: LUNAME CHAR(8) The LU name of the remote system. The default of 8 blanks indicates that this row is used for serving the requests of any system that is not specifically listed in the LUNAMES table. For example, because USIBMSTODB21 acts strictly as a server for many OS/2 requesters, Spiffy leaves the LUNAME column blank for those requesters and uses default values for the entire row. However, you must provide LU names for any remote system that uses different values from the defaults. SYSMODENAME CHAR(8) The mode used to establish system-to-system conversations for DB2 private protocol access. This column is ignored for DRDA access conversations. For now, Spiffy leaves it blank to use the default mode, IBMDB2LM, which they entered in step 3. SECURITY_IN CHAR(1) Defines the security options that are accepted by this DB2 subsystem when an SNA client connects to DB2. The default, A, means that an incoming connection request is accepted if it includes any of these: A user ID A user ID and password A user ID and RACF PassTicket A DCE security ticket. SECURITY_OUT CHAR(1) Defines the security option that is used when local DB2 SQL applications connect to any remote server associated with this
460
Installation Guide
LUNAME. The default, A, means that outgoing connection requests contain an authorization ID without a password. ENCRYPTPSWDS CHAR(1) For now, Spiffy uses a blank to indicate no encryption of passwords. For more information about using this column for security, see Section 3 (Volume 1) of DB2 Administration Guide. MODESELECT CHAR(1) Determines whether to use the default mode or to choose a mode from the MODESELECT table. Spiffy uses a blank to use the default modes: IBMDB2LM for conversations using DB2 private protocol access and IBMRDB for conversations using DRDA access. For more information about this column, and other tables in the CDB, see Associating applications with modes on page 467. USERNAMES CHAR(1) This column is used for inbound and outbound requests to control authorization ID translation. Spiffy uses a blank to indicate that no authorization IDs are translated, and also that no passwords are sent to the server. For more information, see Section 3 (Volume 1) of DB2 Administration Guide. GENERIC CHAR(1) A Y in this column indicates that a generic LU name is to be used for CNOS processing and SQL requests sent to the partner LU. A value of N or a blank indicates that the name specified in the LUNAME column is to be used. See Chapter 4 of DB2 Data Sharing: Planning and Administration for instructions on setting up a generic LU name. Spiffy's USIBMSTODB21 location wants a LUNAMES table that looks like Table 113. | Table 113. Spiffy's SYSIBM.LUNAMES table. The row of blanks is a default row that Spiffy intends to use for | Windows NT and OS/2 requesters in its initial testing.
LUNAME LUDB21 LUDB22 LUSQLDS (blanks) Note:
1
SYSMODENAME
USERSECURITY1
ENCRYPTPSWDS
MODESELECT
USERNAMES
Spiffy can use an SQL INSERT statement to add the appropriate rows. For example, they add the LU name for USIBMSTODB22 with this statement: INSERT INTO SYSIBM.LUNAMES (LUNAME) VALUES ('LUDB22');
461
| | | |
SYSIBM.USERNAMES table
SYSIBM.USERNAMES contains information needed for outbound and inbound ID translation and also for come from checking. See Section 3 (Volume 1) of DB2 Administration Guide for information about populating this table.
462
Installation Guide
Specifying a class of service can help you assign priorities to your network applications. Associating applications with modes on page 467. Tuning the system can require that you add new modes to your log mode table so that there is a greater variety of classes of service available for your sessions. This variety allows you to have more flexibility in tuning the system for specific uses. This section tells you how to associate specific sessions with modes. Before you begin tuning the network, you must understand the relationship between VTAM options and associated values in DB2's CDB. Table 114 summarizes the relationship.
Table 114. Relationship between DB2's CDB and VTAM macros Macro Name APPL Option name CDB table.column LOCATIONS.LINKNAME LUNAMES.LUNAME LUMODES.LUNAME MODESELECT.LUNAME USERNAMES.LINKNAME LULIST.LINKNAME LUMODES.CONVLIMIT Relationship The LU name used in VTAM communication. This name maps 1:1 to the system's location name in LOCATIONS.
APPL
DSESLIM
CONVLIMIT overrides session limits specified with DSESLIM. Session limit values are used in CNOS processing. MODENAME chooses the mode for the system conversation in DB2 private protocol access. LUMODES creates session limits for specific LU name and mode name combinations. MODESELECT maps authorization IDs and plans to specific modes.
MODEENT
LOGMODE
LUNAMES.MODENAME
MODEENT
LOGMODE
LUMODES.MODENAME
MODEENT
LOGMODE
MODESELECT.MODENAME
463
pool buffers, and the storage they use, by using the formula described in Calculating VTAM I/O buffer pool (IOBUF) storage on page 474. The VTAM IOBUF pool is an area of storage that VTAM uses to store messages that are exchanged between network resources. The IOBUF pool is shared among all VTAM resources. When you calculate the IOBUF storage required to satisfy DB2 requirements, keep in mind that the IOBUF pool must have enough space to satisfy requests from other VTAM applications as well, such as TSO, CICS, and IMS. To prevent shortages of these VTAM buffers (IOBUFs), you can do any of the following:
Controlling pacing
Session level pacing is the mechanism by which the receiver of data (DB2 in this case) can control the pace at which the sender sends data (in the form of RUs). The pacing size is the number of RUs VTAM sends across the line at one time, and you set that value using the VPACING option of the VTAM APPL definition statement described in The APPL statement on page 452. You set the RU size in the MODEENT macro described in The modeent macro on page 456. The
464
Installation Guide
receiving VTAM stores these RUs in its IOBUF pool; it uses pacing so that its buffers do not become flooded with data. The pacing process works as shown in Figure 86. The system at the sending side (let's assume it is USIBMSTODB22) passes data to its VTAM. VTAM formats the data into RUs, and sends those RUs across the network. If, for example, the pacing size is 2, then it sends two RUs. A 29-byte network header is sent with each RU. After USIBMSTODB22's VTAM sends the specified number of RUs, it does not send any more data on this session until it receives a pacing response from the VTAM at USIBMSTODB21. USIBMSTODB21's VTAM does not send a response until VTAM transfers the data into DB2's buffers.
Although it is generally true that the receiving system can control inbound pacing, both communicating systems negotiate final pacing values. For more information about pacing negotiation, see VTAM for MVS/ESA Network Implementation Guide.
465
SRCVPAC
466
Installation Guide
467
System conversation: For DB2 private protocol access, the system conversation must be established before any processing can begin. To choose a system mode, DB2 looks in the MODENAME column of the row in the LUNAMES table that corresponds to the target DB2. If MODENAME is blank, then IBMDB2LM is used. If MODENAME contains a mode name, then that mode is used when creating the first conversation between the two DB2 subsystems. SQL processing conversations: For DRDA access, an SQL processing conversation is established. The mode name for SQL processing conversations is determined by the MODESELECT table of the CDB. If the MODESELECT column of LUNAMES table is blank or contains N, then the default mode (IBMRDB) is used. If it contains a Y, then MODESELECT is searched. Spiffy wants to use the mode LOC2MODE for system conversations with USIBMSTODB22's DB2, using DB2 private protocol access. They also want to begin setting up different modes for specific applications to use in conversations with USIBMSTODB22. They enter into their DB2 mode table a mode named LOC2MODE. In a later step, they define LOC2MODE in MODESELECT; for now, they update the LUDB22 row of LUNAMES as shown in Table 115.
Table 115. Spiffy's LUNAMES table, after update
LUNAME LUDB22 SYSMODENAME LOC2MODE USERSECURITY1 ... MODESELECT Y ...
Spiffy can use the UPDATE statement below to make the change, which takes effect the next time DDF is started. (It takes effect immediately if DDF is started but USIBMSTODB22 is not yet accessed.) UPDATE SYSIBM.LUNAMES SET MODENAME='LOC2MODE', MODESELECT='Y' WHERE LUNAME='LUDB22';
468
Installation Guide
key for this table is formed by the LU name and mode name combination. Only one entry with the same LU name and mode name is allowed. LUMODES is accessed for negotiation of session limits with a remote DB2 for a specific mode. This negotiation is called change number of sessions (CNOS), which is discussed in Interpreting CNOS messages on page 476. For example, suppose Spiffy wants to allocate 75 sessions instead of 50 (the value in DSESLIM) for conversations to USIBMSTODB22, using the mode named LOC2MODE. They can use the INSERT statement below to update the value in the CONVLIMIT column to 75. The new session limit takes effect the next time DDF is started, or in the initial connection to this LU for this mode. INSERT INTO SYSIBM.LUMODES VALUES ('LUDB22','LOC2MODE',75,'N'); CNOS processing negotiates a value that is the lesser of the number of sessions available at either system for that mode. Therefore, USIBMSTODB22 must also increase its CONVLIMIT value to derive any benefit from the added sessions. Columns of the LUMODES table: LUNAME CHAR(8) Again, this is the LU name of the other system. This column is a foreign key of the LUNAMES table; thus, all LU names defined in this table must be defined in LUNAMES. When you delete an LU name from the LUNAMES table, all associated rows in LUMODES are deleted. MODENAME CHAR(8) The name of the logon mode description in the VTAM logon mode table that VTAM uses when creating a conversation to support the local DB2's request for data from another system. The mode named here must exist in the mode table used by DB2 before a conversation can be created between USIBMSTODB21 and USIBMSTODB22. CONVLIMIT SMALLINT The maximum number of conversations to be concurrently active between this DB2 subsystem and the other system for this mode. This number is overrides the number in the DSESLIM option of the VTAM APPL definition statement during CNOS processing, as described in Interpreting CNOS messages on page 476.
469
Populating this table is optional. If the remaining columns are blank for any given LU name, then the mode name applies to all authorization IDs for all PLANNAMEs accessing the given LU name. Columns of the MODESELECT table: AUTHID CHAR(8) The authorization ID of the request for data from another system. A blank AUTHID indicates that the specified mode name applies to all authorization IDs. Blank is the default. PLANNAME CHAR(8) The plan name associated with the request for data from another system. A blank plan name indicates that the specified mode name applies to all plan names. Blank is the default. LUNAME CHAR(8) The LU name to which the specific mode name applies. This column is a foreign key of the LUNAMES table; therefore, all LU names defined in this table must be defined in LUNAMES. MODENAME CHAR(8) The name of the logon mode description in the VTAM logon mode table that is used when creating a conversation to support the request for data from another system. If this column is blank, the default mode (IBMDB2LM or IBMRDB) is used. How an SQL Processing Conversation Mode is Chosen: The MODESELECT table of the CDB is used to choose a mode for an SQL processing conversation (if the MODESELECT column of the LUNAMES table contains Y for this LU name). Table 116 shows the search order of the MODESELECT table.
Table 116. Precedence search order for MODESELECT table of CDB AUTHID Name Name Blank Blank PLANNAME Name Blank Name Blank Result The MODENAME applies to the named AUTHID for the named PLANNAME accessing the named LU. The MODENAME applies to the named AUTHID for all PLANNAMEs accessing the named LU. The MODENAME applies to all AUTHIDs for the named PLANNAME accessing the named LU. The MODENAME applies to all AUTHIDs for all PLANNAMEs accessing the named LU.
If the MODESELECT column of the LUNAMES table contains Y for a particular LU name and no row is found for that LU name in the MODESELECT table, then you receive a negative SQL return code when trying to access the system at that LU. Plan name for remote bind operations: If you want to specify a particular mode for remote bind operations, use the plan name DSNBIND in MODESELECT.
470
Installation Guide
471
You can determine the mode limit for Mode2 as follows: 1. Use the directions in step 2 to calculate the number of SQL conversations needed for location A to access location B. This number, LIMIT_A, is 10 (4 + 5 + 1). 2. Because Mode2 is used for the system conversation, add 1 to LIMIT_A, which results in a value of 11 for LIMIT_A. 3. Assume that the value of LIMIT_B is 16. Then, the limit for Mode2 as it accesses location B is 27. This value can be entered as the CONVLIMIT value in location A's LUMODES table. 4. The above steps must be repeated for A's connection to location C through App_2. This gives you the maximum number of sessions for Mode2.
472
Installation Guide
This procedure has to be repeated for every mode to determine which mode uses the greatest number of sessions. This, then, is the value of DSESLIM.
DRDA access
An application uses DRDA access to connect to one location, then drops that connection using SQL RELEASE and COMMIT statements, then uses DB2 private protocol access to access another DB2. (This same method could be used to access the same location; you would still have to drop your DRDA access connection to access DB2 using DB2 private protocol access.) This type of application is shown in Figure 89 on page 474.
473
Time 1
DRDA access
474
Installation Guide
RUSIZE is the length of the RU in bytes. It is assumed to be the same for both session directions. BUFSIZE is the value you specified in the IOBUF pool definition. Assume you have a buffer size of 441 bytes, and an RUSIZE of 4096. With these values, PIUBUF would be 10 ((29+4096) / 441, rounded up). For channel-to-channel (CTC) and NCP connections, you need to be concerned with the VTAM MAXBFRU value (as shown in Channel-connected DB2s on page 481 and NCP-connected DB2s on page 482). For CTC connections, MAXBFRU is the number of 4KB buffers allocated to hold the PIUs sent over the channel. If your RU size is 4096 and you allow 29 bytes for the header, then you need to allocate at least 2 4KB buffers. Thus, you need a MAXBFRU value of at least 2. When you route data through NCP, MAXBFRU is the number of VTAM IOBUF buffers allocated to hold the PIUs sent to the NCP, which means MAXBFRU must be at least as large as PIUBUF. 2. Calculate the maximum number of IOBUF buffers used by a session, and call it SESSBUF. SESSBUF = PACECNT PIUBUF PACECNT stands for pacing count. Pacing is discussed in greater detail in Controlling pacing on page 464, but for this example we assume that pacing is the same in both directions, and it is the same for all modes. If pacing is set to 2, then SESSBUF is 20. 3. Calculate the maximum number of sessions that can be active for all modes to all systems and call it SESCNT. Use the formula outlined in Calculating session limits on page 471 to calculate the maximum for each mode, then add those results to get SESCNT. 4. Calculate the maximum number of VTAM buffers used by DB2, and call this DB2BUF. The formula for DB2BUF is based on a worst case scenario, because it assumes that all sessions are used by concurrent conversations. DB2BUF = SESCNT SESSBUF If we assume that the maximum number of sessions that can be active is 50 (SESCNT), then 1000 is the number of IOBUF entries required by DB2 in a worst case scenario. 5. Calculate actual VTAM buffer storage consumption used by DB2, and call it STORAGE. STORAGE = DB2BUF (BUFSIZE + 71) Each buffer includes 71 bytes for VTAM internal headers. So, to continue the above example, we can estimate an upper value of real storage as follows: 1 (441 + 71) = 5 KB
475
Assume that USIBMSTODB21's DDF is started first. CNOS processing fails because USIBMSTODB22's DDF has not yet started, and you get a message at the console. When USIBMSTODB22's DDF is started, CNOS processing can begin. USIBMSTODB21 sends to USIBMSTODB22 a CNOS value of 80, which is its CONVLIMIT value. However, USIBMSTODB22 replies with a value of 40 (its DSESLIM value), and, as shown in Figure 91 on page 477, that becomes the
476
Installation Guide
negotiated value for the CNOS started by USIBMSTODB21. Both systems begin starting the number of sessions specified in their respective AUTOSES options.
USIBMSTODB21 APPL Values DSESLIM DMINWNL DMINWNR AUTOSES 80* 40* 40* 1 40 is the negotiated value of the CNOS started by USIBMSTODB21 USIBMSTODB22 APPL Values DSESLIM DMINWNL DMINWNR AUTOSES 40 20 20 1
Figure 91. Result of CNOS negotiation started by USIBMSTODB21. Overridden values are noted with asterisks (*).
VTAM does not start all 40 sessions unless the two AUTOSES values total up to 40 or greater. Instead, VTAM delays starting the other sessions until they are needed. Everything up to this point occurred because USIBMSTODB21 issued CNOS. Now, as shown in Figure 92, USIBMSTODB22 starts CNOS processing back to USIBMSTODB21 because its CDB has CNOS limits specified (50 in CONVLIMIT). USIBMSTODB21's VTAM sees that DB2 allows up to 80, so VTAM sends the CNOS reply message back to USIBMSTODB22 unchanged (50). USIBMSTODB22's CONVLIMIT value of 50 is compared with USIBMSTODB21's overridden value of 80 from the previous CNOS, and 50 is chosen as the value.
USIBMSTODB21 APPL Values DSESLIM DMINWNL DMINWNR AUTOSES 80* 40* 40* 1 50 is the negotiated value of the CNOS started by USIBMSTODB22 USIBMSTODB22 APPL Values DSESLIM DMINWNL DMINWNR AUTOSES 50* 25* 25* 1
Figure 92. CNOS negotiation from USIBMSTODB22 to USIBMSTODB21. Overridden values are noted with asterisks (*).
If the new negotiated value is smaller than the number already started by USIBMSTODB21, then VTAM terminates the number of sessions that makes up the difference. If the CONVLIMIT value at USIBMSTODB22 is 20, for example, VTAM terminates 20 sessions on behalf of the request from USIBMSTODB22 because the lowest negotiated value always wins. If a session is currently being used by a conversation, the session is terminated as soon as the conversation is deallocated.
477
Basic definitions
The basic definitions here are required for all VTAM connections. For more information about these definitions, see VTAM for MVS/ESA Resource Definition Reference.
478
Installation Guide
APPL STATEMENT FOR SYSTEM 1 DB1APPL APPL APPC=YES, ATNLOSS=ALL, AUTH=(ACQ), AUTOSES=1, DSESLIM=2 , DMINWNL=1 , DMINWNR=1 , PRTCT=DB1PWD, SECACPT=ALREADYV, EAS=5 9, MODETAB=DB2MODES, PARSESS=YES, SRBEXIT=YES, SYNCLVL=SYNCPT, VPACING=2 APPL STATEMENT FOR SYSTEM 2 DB2APPL APPL APPC=YES, ATNLOSS=ALL, AUTH=(ACQ), AUTOSES=1, DSESLIM=2 , DMINWNL=1 , DMINWNR=1 , PRTCT=DB2PWD, SECACPT=ALREADYV, EAS=5 9, MODETAB=DB2MODES, PARSESS=YES, SRBEXIT=YES, SYNCLVL=SYNCPT, VPACING=2 X X X X X X X X X X X X X X X X X X X X X X X X X X X X
LOGMODE TABLE FOR SYSTEM 1 TO SYSTEM 2 CONNECTIONS DB2MODES MODETAB LU6.2 SERVICES MANAGER BASE MODE FOR APPC/VTAM SNASVCMG MODEENT LOGMODE=SNASVCMG, FMPROF=X'13', TSPROF=X' 7', PRIPROT=X'B ', SECPROT=X'B ', PSERVIC=X' 6 2 COMPROT=X'D B1', RUSIZES=X'8585', ENCR=B' ' X X X X X X X X
',
479
DB2 DEFAULT MODE FOR SYSTEM 1 AND SYSTEM 2 PRIVATE PROTOCOL IBMDB2LM MODEENT LOGMODE=IBMDB2LM, TYPE= , PSNDPAC=X' ', SSNDPAC=X' 2', SRCVPAC=X' ', RUSIZES=X'8989', FMPROF=X'13', LU6.2 FM PROFILE TSPROF=X' 7', LU6.2 TS PROFILE PRIPROT=X'B ', LU6.2 PRIMARY PROTOCOLS SECPROT=X'B ', LU6.2 SECONDARY PROTOCOLS COMPROT=X'5 A5', LU6.2 COMMON PROTOCOLS PSERVIC=X' 6 2 122F ' LU6.2 LU TYPE DB2 DEFAULT FOR SYSTEM 1 AND SYSTEM 2 DRDA ACCESS IBMRDB MODEENT LOGMODE=IBMRDB, TYPE= , PSNDPAC=X' ', SSNDPAC=X' 2', SRCVPAC=X' ', RUSIZES=X'8989', FMPROF=X'13', LU6.2 FM PROFILE TSPROF=X' 7', LU6.2 TS PROFILE PRIPROT=X'B ', LU6.2 PRIMARY PROTOCOLS SECPROT=X'B ', LU6.2 SECONDARY PROTOCOLS COMPROT=X'5 A5', LU6.2 COMMON PROTOCOLS PSERVIC=X' 6 2 122F ' LU6.2 LU TYPE DB2 SYSTOSYS MODE FOR SYSTEM 1 AND SYSTEM 2 SYSTOSYS MODEENT LOGMODE=SYSTOSYS, TYPE= , PSNDPAC=X' ', SSNDPAC=X' 2', SRCVPAC=X' ', RUSIZES=X'8989', FMPROF=X'13', LU6.2 FM PROFILE TSPROF=X' 7', LU6.2 TS PROFILE PRIPROT=X'B ', LU6.2 PRIMARY PROTOCOLS SECPROT=X'B ', LU6.2 SECONDARY PROTOCOLS COMPROT=X'5 A5', LU6.2 COMMON PROTOCOLS PSERVIC=X' 6 2 122F ' LU6.2 LU TYPE MODEEND END ATCSTRTA VTAM START OPTIONS FOR SYSTEM 1, INCLUDES IOBUF CONFIG=TA, SSCPID=53,MAXSUBA=15 ,HOSTSA=53, SSCPNAME=SSCP 4,NETID=USIBMSY, IOBUF=(328,441,2 ,,64,48,768) ATCSTRTB VTAM START OPTIONS FOR SYSTEM 2, INCLUDES IOBUF CONFIG=TB, SSCPID=54,MAXSUBA=15 ,HOSTSA=54, SSCPNAME=SSCP E,NETID=USIBMSY, IOBUF=(328,441,2 ,,64,48,768) X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X
480
Installation Guide
Channel-connected DB2s
When determining your channel-to-channel definitions, remember that MAXBFRU must be large enough to handle the largest PIU. Since DB2 is sending 4096 bytes, you need enough 4KB buffers to accept 4096 + 29 bytes (the 29 bytes is for the network header). Thus MAXBFRU must be at least 2 in our example. In many cases, the DB2 RU size is larger than any other PIUs used on existing CTCs, which can mean you must examine your MAXBFRU values on existing CTC definitions. If the values are too small, you get an SNA X'800A' sense code, indicating that the PIU was truncated during transmission.
CTC DEFINITIONS FOR SYSTEM 1 DB1CTC DB1GRPB DB1CTCL VBUILD TYPE=CA CTC MAJOR NODE DEFINITION GROUP LNCTL=CTCA, CTCA LINE TYPE MIH=YES,REPLYTO=1 . LINE ADDRESS=(5 ), CTC ADDRESS FOR THIS LINE DELAY= , CTC DELAY MAXBFRU=8, MAX BUFFER USED ISTATUS=ACTIVE INITIAL STATUS IS ACTIVE PU ISTATUS=ACTIVE CTC DEFINITIONS FOR SYSTEM 2 DB2CTC DB2GRPB DB2CTCL VBUILD TYPE=CA CTC MAJOR NODE DEFINITION GROUP LNCTL=CTCA, CTCA LINE TYPE MIH=YES,REPLYTO=1 . LINE ADDRESS=(5 ), CTC ADDRESS FOR THIS LINE DELAY= , CTC DELAY MAXBFRU=8, MAX BUFFER USED ISTATUS=ACTIVE INITIAL STATUS IS ACTIVE PU ISTATUS=ACTIVE PATH - NETWORK ROUTES FOR SYSTEM 1 MVSDB2 PATH DESTSA=2,ER1=(2,1),VR1=1, VRPWS1 =(2,3 ),VRPWS11=(2,3 ),VRPWS12=(2,3 ) PATH - NETWORK ROUTES FOR SYSTEM 2 MVSDB1 PATH DESTSA=1,ER1=(1,1),VR1=1, VRPWS1 =(2,3 ),VRPWS11=(2,3 ),VRPWS12=(2,3 ) CDRSC DEFINITIONS FOR SYSTEM 1 VBUILD TYPE=CDRSC CDRSC CDRM=DB2CDRM,ISTATUS=ACTIVE CDRSC DEFINITIONS FOR SYSTEM 2 VBUILD TYPE=CDRSC DB1APPL CDRSC CDRM=DB1CDRM,ISTATUS=ACTIVE X X
X X X X
DB1CTCP
X X X X
DB2CTCP
DB2APPL
481
CDRM DEFINITIONS FOR SYSTEM 1 AND 2 (SAME DEFINITION USED) VBUILD TYPE=CDRM DB1CDRM CDRM SUBAREA=1,ISTATUS=ACTIVE,CDRSC=OPT DB2CDRM CDRM SUBAREA=2,ISTATUS=ACTIVE,CDRSC=OPT ATCCONTA - NETWORK CONFIGURATION LIST FOR SYSTEM 1 DB1PATH,DB1CTC,DB1RSC,DB1APPLS,DBCDRMS ATCCONTB - NETWORK CONFIGURATION LIST FOR SYSTEM 2 DB2PATH,DB2CTC,DB2RSC,DB2APPLS,DBCDRMS
NCP-connected DB2s
The Advanced Communications Facility/Network Control Program (ACF/NCP) is a product you use to generate a network control program load module, which is loaded from the host into a communications controller. The network control program controls the lines and devices attached to it. It transfers data to and from the devices and handles any errors that occur, including retries after line errors. A communications controller can be locally attached to a host via a channel, or it can be link-attached to another communications controller that is channel-attached. Our sample definitions are used for the following setup:
When you are defining your NCP connections, remember the following: MAXBFRU must be large enough to handle the biggest PIU that is sent to the NCP. In our example, DB2 is sending 4125 bytes per PIU (4096 + a 29-byte network header). Given an IOBUF buffer size of 441 bytes, MAXBFRU must therefore be at least 10 (10 441 = 4410, which is greater than 4125). The MAXDATA option must also be large enough to handle biggest PIU (RUSIZE + 29 bytes). If DB2 is using existing NCP definitions, you should make sure your MAXBFRU and MAXDATA options are large enough. If these values are too small, you get an SNA X'800A' sense code, indicating that the PIU was truncated during transmission.
482
Installation Guide
PCCU SPECIFICATION - FOR SYSTEM 1 PCCU1 PCCU CUADDR=C 2, AUTOSYN=YES, AUTODMP=NO, AUTOIPL=NO, BACKUP=YES, DELAY= , DUMPDS=DUMPDS, CDUMPDS=CDUMPDS, MDUMPDS=MDUMPDS, INITEST=NO, MAXDATA=43 2, OWNER=HOST1, SUBAREA=3, VFYLM=YES 3745 BLOCK CHANNEL X X X X X X DUMP DATA SET X CSP DUMP DATA SET X MOSS DUMP DATA SET X NO 3745 INITIAL TESTS AT LOAD TIME X = BFRS TRANSFR - 18 X X HOST SUBAREA X
PCCU SPECIFICATION - FOR SYSTEM 2 PCCU2 PCCU CUADDR=C 2, AUTOSYN=YES, AUTODMP=NO, AUTOIPL=NO, BACKUP=YES, DELAY= , DUMPDS=DUMPDS, CDUMPDS=CDUMPDS, MDUMPDS=MDUMPDS, INITEST=NO, MAXDATA=43 2, OWNER=HOST2, SUBAREA=4, VFYLM=YES 3745 BLOCK CHANNEL X X X X X X DUMP DATA SET X CSP DUMP DATA SET X MOSS DUMP DATA SET X NO 3745 INITIAL TESTS AT LOAD TIME X = BFRS TRANSFR - 18 X X HOST SUBAREA X
483
BUILD MACRO SPECIFICATIONS ACFNCPBD BUILD BFRS=(24 ), NCP BUFFER SIZE,# EP BUFFERS BRANCH=1 , CATRACE=(YES,1 ), CSMHDR=27F5C711C3F 4 5C4 C8C4D94 5C, CSMHDRC=4 E3C5E7E34 5C5C, CSMSG=5C5C4 E5E3C1D44 E2C8E4E3C4D6E6D54 , CSMSGC=6 4 C8C1E24 C2C5C7E4D54 5C5C, DIALTO=6 , WAIT 1 MIN FOR AUTOCALL ANSWER DR327 =NO, NO DYNAMIC RECONFIG DSABLTO=3. , TIME TO DETECT DSR DROP ENABLTO=2.2, TIME TO DETECT DSR AFTER ENABLE LOADLIB=NCPLOAD, LIBRARY FOR ACF/NCP LOAD MODULE LTRACE=8, UP TO 8 LINES CONCURRENTLY TRACED MAXSSCP=8, NUMBER OF SSCPS IN SESSION MAXSUBA=63, MUST BE SAME AS IN ATCSTRXX MEMSIZE=4M, AMOUNT OF MEMORY MODEL=3745, 3745 MODEL 41 NETID=BCR1, 3745 MODEL 41 NEWNAME=DDBLC , LOAD MODULE NAME PUNAME=DDB, NPA=YES, NPA WILL NOT COLLECT DATA OLT=NO, INCLUDE ONLINE TEST FACILITY-OLTEP PRTGEN=NOGEN, DON'T PRINT ASSEMBLED STATEMENTS PWROFF=NO, SLODOWN=15, SLOWDOWN AFTER 15% BUFFERS AVAIL SUBAREA=26, NCP SUBAREA TRACE=(YES,1 ), 1 -16 BYTE ADDRESS TRACE ENTRIES TRANSFR=18, =(4 96+51)/BFRS--ROUNDED UP TRCPIU=2 , SIZE OF LINE AND SIT TRACE TYPGEN=NCP, TYPSYS=MVS, MVS OPERATING SYSTEM USGTIER=5, NCP USAGE TIER - REQUIRED VERSION=V5R3, XBREAK=NONE X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X
SYSCNTRL OPTIONS=(ENDCALL,MODE,RCNTRL,RCOND,RECMD,RIMM, X SESSION,NAKLIM,LNSTAT,SSPAUSE,XMTLMT,BHSASSC,STORDSP) HOST2 HOST BFRPAD= , INBFRS=18, MAXBFRU=1 , SUBAREA=4, UNITSZ=441 BFRPAD= , INBFRS=18, MAXBFRU=1 , SUBAREA=3, UNITSZ=441 PATH STATEMENTS PATH DESTSA=3, ER4=(3,1), PATH DESTSA=4, ER4=(4,1), SYS1 SYS1 SYS2 SYS2 X VTAM REQUIREMENT FOR OS INITIAL BUFFERS FOR EACH RECEIVE < BASENO IN IOBUF FOR VTAM = BUFSIZE IN IOBUF FOR VTAM VTAM REQUIREMENT FOR OS INITIAL BUFFERS FOR EACH RECEIVE < BASENO IN IOBUF FOR VTAM = BUFSIZE IN IOBUF FOR VTAM X X X X X X X X
HOST1
HOST
484
Installation Guide
HOST 1 CHANNEL ADAPTER LINE ADDR = DDBCA5 ; PHYSICAL POSITION = 5. X STOP VTAM FROM ACT CHAN LINK 1ST CA PHYSICAL POSITION 1 3745 CHANNEL ADAPTER TYPE TIME ALLOWED TO BLOCK INBOUND DATA CHAN ATTN DELAY NO EP SUBCHANNELS TO DUMP # BUFS FOR EACH TRANSFER TO HOST NPA WILL COLLECT DATA ON CHANNEL INTERVAL BEFORE CHANNEL DISCONTACT INTERMEDIATE SUBAREA FUNCTION MUST BE 1 FOR PUTYPE5 X X X X X X X
GROUP LNCTL=CA, ISTATUS=INACTIVE LINE ADDRESS= , CA=TYPE6, CASDL=12 , DELAY= , DYNADMP=NONE, INBFRS=18, NPACOLL=YES, TIMEOUT=12 PUTYPE=5, TGN=1
DDBL 5
DDBP 5
PU
HOST 2 CHANNEL ADAPTER LINE ADDR = 2; PHYSICAL POSITION = 7. DDBCA7 GROUP LNCTL=CA, STATUS=INACTIVE LINE ADDRESS=2, CA=TYPE6, CASDL=12 , DELAY= , DYNADMP=NONE, INBFRS=18, NPACOLL=YES, TIMEOUT=12 PUTYPE=5, TGN=1 X ACT CHAN LINK 3RD CA PHYSICAL POSITION 3 3745 CHANNEL ADAPTER TYPE TIME ALLOWED TO BLOCK INBOUND DATA CHAN ATTN DELAY NO EP SUBCHANNELS TO DUMP #BUFS FOR EACH TRANSFER TO HOST NPA WILL COLLECT DATA ON CHANNEL INTERVAL BEFORE CHANNEL DISCONTACT INTERMEDIATE SUBAREA FUNCTION MUST BE 1 FOR PUTYPE5 X X X X X X X
DDBL 7
DDBP 7 PU
PASSWORD is optional, depending on whether you entered a password in the VTAM APPL statement. GENERIC is also optional.
485
To delete either a generic LU name or a password, use one of these statements: Value Generic LU name Password Statement for deleting DDF NGENERIC DDF NOPASSWD
For more information about the change log inventory utility, see Section 3 of DB2 Utility Guide and Reference.
486
Installation Guide
487
server location. We suggest that your DB2 subsystem be defined with the DRDA well-known port number of 446. However, the network administrator can assign a server port to the DB2 subsystem. If two different DB2 subsystems reside on the same host, acting as two different locations (a non-data-sharing group), each DB2 subsystem must have a unique port. In this case, only one DB2 subsystem can use the DRDA well-known port number. Service name Another way to refer to a port number. A network administrator can assign a service name for a remote location instead of using the port number. The domain name (IP address) and service name (port number) uniquely identify a DB2 subsystem in the TCP/IP network. The domain name and the service name of the database server must be defined in the communications database (CDB) so that a DB2 subsystem can connect to a remote location. The domain name and service name must be defined to the TCP/IP host so that a DB2 subsystem can accept connections from remote locations. When DDF is started, the DB2 subsystem binds itself to the port.
| |
488
Installation Guide
TCP/IP limitations
TCP/IP does not support DB2 private protocol connections, but you can use SNA for DB2 private protocol connections while using TCP/IP for DRDA connections. TCP/IP does not have built-in security features that SNA has, such as SNA partner LU verification. Because IP addresses are not as reliable as LU names, DDF support for TCP/IP differs from support for SNA in these ways: There is no support for inbound name translation. | | | | | A DB2 subsystem parameter defines the minimum security requirements for all TCP/IP clients because inbound security requirements cannot be established on individual clients. See the description of the TCP/IP ALREADY VERIFIED field on installation panel DSNTIP5 (Distributed data facility panel: DSNTIP5 on page 222). You cannot use the CDB for come from checking of TCP/IP clients.
| | | | | |
489
| | | |
The alternative method is to concatenate the LE/370 library in the MVS link list, which does not require the library to be APF authorized. If you choose this alternative method, remove the LE/370 library concatenation from the DDF JCL procedure.
490
Installation Guide
A server resynchronization port is used for processing 2-phase commit resynchronization requests. This requires some planning because the port number is used to pass the network requests to the right DB2 subsystem. Each location must have a unique port number. DB2 Data Sharing: Planning and Administration has information for assigning port numbers for systems that have enabled data sharing. Figure 96 shows some typical MVS system configurations that demonstrate some typical configurations. In SYSTEM1, there is only one DB2 subsystem, so the DRDA well-known port (446) can be assigned to DB2. In the example, port number 5020 is assigned for 2-phase commit resynchronization. In SYSTEM2, there are two DB2 subsystems, making it impossible to assign the port numbers 446 and 5020 to both DB2 subsystems, because TCP/IP can only support one server at each port number. The problem is resolved by assigning the 446 and 5020 port numbers to DB2C, and port numbers 5021 and 5022 to DB2D. Be sure to consider the impact of future system consolidations. If SYSTEM1 and SYSTEM2 are consolidated so that DB2A, DB2C, and DB2D run on a single MVS system, you must take special precautions because DB2A and DB2C have the same TCP/IP port numbers. You can resolve this by changing the port numbers of either DB2A or DB2C to eliminate the duplicate port numbers.
491
This example assumes that DB2CDIST and DB2DDIST are the DB2 started procedure names. 3. Define the TCP/IP host names that DB2 needs to know. The local host name must be defined before DDF is started. All domain names referenced in the table SYSIBM.IPNAMES must be defined. You define the host names by configuring the hlq.HOSTS.LOCAL data set, the /etc/hosts file in the hierarchical file system (HFS), or the domain name server (DNS). After the hlq.HOSTS.LOCAL data set is configured, you have to execute the utility MAKESITE. This utility generates the hlq.HOSTS ADDRINFO and the hlq.HOSTS.SITEINFO data sets that are used to translate between domain names and IP addresses. MAKESITE generates under the userid that issued the MAKESITE. Therefore, those files have to be moved to the high level qualifier that represents TCP/IP. The host name for the local DB2 subsystem must be defined in at least one of these places. If domain names are present in the CDB (in field IPADDR of table SYSIBM.IPNAMES), they must be defined in the MVS data sets, the HFS or the DNS. Recommendation: To support a Parallel Sysplex environment or multiple network interfaces on a single host, use the DNS or hlq.HOSTS.LOCAL data set to associate multiple IP addresses with a single host name. The following example from Figure 96 on page 491 shows a sample hlq.HOSTS.LOCAL entry for SYSTEM2: HOST : 121.65.183.98 : S2.VNET.IBM.COM
4. Define the TCP/IP service names that DB2 needs to know. Configure the hlq.ETC.SERVICES data set or the /etc/services file in the HFS. If service names are present in the CDB (in field PORT of table SYSIBM.LOCATIONS), they must be defined in the MVS data set or the HFS. The following example shows a sample hlq.ETC.SERVICES entry:
492
Installation Guide
DRDA
446/tcp
; DRDA databases
For more detailed information on these steps see IBM TCP/IP for MVS: Customization & Administration Guide.
493
SYSIBM.LOCATIONS table
The table LOCATIONS is used to determine the port number or service name used to connect to the remote location. The column LINKNAME maps to the corresponding row in table IPNAMES. LOCATIONS has the following columns relating to TCP/IP: LOCATION CHAR(16) The unique network location name, or DRDA RDBNAM, assigned to a system, remote or local. You must provide location names for any systems that you request data from. This column is the primary key for this table. LINKNAME CHAR(8) Identifies the TCP/IP attributes associated with this location. For each LINKNAME specified, you must have a row in SYSIBM.IPNAMES whose LINKNAME matches the value specified in this column. Because this table is used for outbound requests, you must provide a LINKNAME or your requests fail. Do not enter blanks in this column. PORT CHAR(32) If blank, the default port, 446, is used for TCP/IP communications. Otherwise, the value can be either: The port number of the remote database server. The number must be 1-5 characters and left justified. A TCP/IP service name. The service name is converted to a TCP/IP port number with the getservbyname socket call. Spiffy's USIBMSTODB21 location wants a LOCATIONS table that looks like Table 117. The location USIBMSTODB21 uses the default DRDA PORT, 446.
Table 117. Spiffy's LOCATIONS table LOCATION USIBMSTODB21 USIBMSTODB22 USIBMSTOSQL1 USIBMSTOSQL2 LINKNAME LUDB21 LUDB22 LUSQLDS LUSQLDS 1234 DRDA PORT
For example, add the second row with this statement: INSERT INTO SYSIBM.LOCATIONS (LOCATION, LINKNAME) VALUES ('USIBMSTODB22','LUDB22'); Since no port number is specified, location USIBMSTODB22 uses the default DRDA port number, 446. A row for the local location: You do not need a row for the local DB2 in the IPNAMES and LOCATIONS tables. For example, Spiffy's USIBMSTODB21 subsystem does not require a row that shows its own LINKNAME and location name.
494
Installation Guide
SYSIBM.IPNAMES table
IPNAMES defines the outbound security and host names used to connect to other systems using TCP/IP. IPNAMES has the following columns: LINKNAME CHAR(8) This value matches that specified in the LINKNAME column of the associated row in SYSIBM.LOCATIONS. SECURITY_OUT CHAR(1) Defines the security option that is used when local DB2 SQL applications connect to any remote server associated with this TCP/IP host. The default, A, means that outgoing connection requests contain an authorization ID without a password. USERNAMES CHAR(1) This column is used for outbound requests to control translations of authorization IDs. The values 'O' or 'B' are valid for TCP/IP connections. IPADDR VARCHAR(254) This column contains the IP address or domain name of a remote TCP/IP host. An IP address must be 1 to 15 characters and left justified. An example of an IP address is 9.112.46.111. A domain name is converted to an IP address by the domain name server. An example of a domain name is stlmvs1.stl.ibm.com. The gethostbyname socket call is used to resolve the domain name.
SYSIBM.USERNAMES table
USERNAMES contains information needed for outbound translation only. Reminder: Inbound ID translation and come from checking are not done for TCP/IP requesters. TYPE CHAR(1) Whether the row is for outbound translation. The value 'O' is valid for TCP/IP connections. AUTHID CHAR(8) Authorization ID to translate. If blank, it applies to all authorization IDs. LINKNAME CHAR(8) Identifies the TCP/IP network location associated with the row. A blank indicates it applies to all TCP/IP partners. For nonblank values, this value must match the LINKNAME value in SYSIBM.IPNAMES. NEWAUTHID CHAR(8) The translated value of AUTHID. PASSWORD CHAR(8) The password to accompany an outbound request. This column is ignored if RACF PassTickets, or already verified USERIDs are used.
495
496
Installation Guide
Appendixes
497
498
Installation Guide
499
500
Installation Guide
Table 118 (Page 2 of 3). Single-byte coded character set identifiers (CCSIDs) Country or National Language Bosnia and Herzegovina (Cyrillic) Bosnia and Herzegovina (Latin) Brazil (U.S. English) Bulgaria (Cyrillic Multilingual) Canada (U.S. English) Croatia Czech Republic Denmark Finland (Swedish) France Germany Greece Hungary Iceland International Latin-1 Israel Italy Latin America (Spanish) FYR Macedonia Netherlands (U.S. English) New Zealand (U.S. English) Norway Poland Portugal (U.S. English) Serbia/Montenegro Spain Sweden Switzerland Thailand EBCDIC 1025 ASCII PC ASCII AIX ASCII WINDOWS 1251/5347*
870
852
912
1250/5346*
37/1140* 1025 37/1140* 870 870 277/1142* 278/1143* 297/1147* 273/1141* 875 or 423 870 871/1149* 500/1148* 424 280/1144* 284/1145* 1025 37/1140* 37/1140* 277/1142* 870 37/1140* 1025 284/1145* 278/1143* 500 /1148* 838
850/858*
819
1252/5348* 1251/5347*
850/858* 852 852 850/858* 850/858* 850/858* 850/858* 869 852 850/858*
819 912 912 819 819 819 819 813 912 819
1252/5348* 1250/5346* 1250/5346* 1252/5348* 1252/5348* 1252/5348* 1252/5348* 1253/5349* 1250/5346* 1252/5348*
501
Table 118 (Page 3 of 3). Single-byte coded character set identifiers (CCSIDs) Country or National Language Turkey (Latin 5) United Kingdom U.S.A. (U.S. English) EBCDIC 1026 285/1146* 37/1140* ASCII PC 857 850/858* 437 ASCII AIX 920 819 819 ASCII WINDOWS 1254/5350* 1252/5348* 1252/5348*
Note: * This number represents the equivalent CCSIDs using the Euro symbol.
If you specified MIXED DATA=YES on field 7 of installation panel DSNTIPF, specify a double-byte CCSID from one of the CCSIDs listed in Table 119 for EBCDIC data. If you select an ASCII encoding scheme on field 10 of installation panel DSNTIPF, then specify a CCSID for mixed data from Table 120 on page 503. By specifying a CCSID for mixed data (an MCCSID), you also receive system CCSIDs for your SBCS and GRAPHIC data. Table 119 and Table 120 on page 503 show the associated identifiers your site is automatically assigned when you enter a specific MCCSID. In these tables, the terms used are as follows: SCCSID=single-byte coded character set identifier MCCSID=mixed coded character set identifier GCCSID=graphic coded character set identifier #
Table 119. EBCDIC double-byte coded character set identifiers (CCSIDs) National Language Japanese (Extended Katakana) MCCSID 930 1390 5026 939 1399 5035 933 1364 935 1388 937 SCCSID 290 8482 290 1027 5123 1027 833 13121 836 13124 28709 GCCSID 300 16684 4396 300 16684 4396 834 4390 837 4933 835 User-defined Characters 4370 4370 1880 4370 4370 1880 1880 1880 1880 1880 6204
# #
# #
# #
502
Installation Guide
Table 120. ASCII double-byte coded character set identifiers (CCSIDs) National Language Japanese Japanese (Extended ) Japanese (Open environment) Japanese (HP) Korean Korean (EUC) MCCSID 932 942 943 5039 949 970 1363 1381 1383 1386 938 948 950 SCCSID 897 1041 897 1041 1088 367 1126 1115 367 5210 904 1043 1114 GCCSID 301 301 941 1351 951 971 1362 1380 1382 1385 927 927 947 1880 6204 6204 User-defined Characters 1880 1880 1880 940 1880 1880 1880 1880
Simplified Chinese Traditional Chinese Traditional Chinese Traditional Chinese (IBM Big-5)
In Table 119 on page 502 and Table 120, four CCSIDs are listed for Japanese to allow for all possible combinations of two single-byte code pages and two double-byte character sets. The difference between the single-byte code pages is in the code points for lower-case Latin letters and Katakana characters. In the code page for Japanese (Extended English, SCCSID 1027), lower-case letters have the same code points as other EBCDIC code pages.
Special considerations
Character conversion can impact performance significantly, especially if you need to process many columns or host variables. Improving the performance of your applications: If you plan to have connections that require character conversion, you must identify character string columns with the subtype BIT DATA. Authorized users can do this by using the SQL UPDATE statement to change the FOREIGNKEY column of SYSIBM.SYSCOLUMNS to 'B' (for BIT data). Improving the performance of applications at DBCS sites: Many of the character strings at a DBCS site are actually SBCS data, though all character string columns originating from the site are classified as MIXED DATA. To improve performance, DBCS sites that do not plan to have a connection between DB2 and a system using ASCII MIXED data might want to identify columns that contain only SBCS data. Authorized users can do this by using the SQL UPDATE statement to change the FOREIGNKEY column of SYSIBM.SYSCOLUMNS to 'S' (for SBCS data). DBCS sites that do plan to have connections between DB2 and a system using ASCII MIXED data need to consider the lack of built-in conversions from ASCII MIXED to EBCDIC SBCS data before identifying SBCS columns. However, a site
503
can provide its own conversion procedures for those that are not builtin. See Customizing character conversion on page 506 for information on adding conversion procedures or rows. Expanding Conversions: The length of a character string can increase after it undergoes conversion from one coded character set identifier to another. Such a case is known as an expanding conversion. To accommodate expanding conversions, use varying length variables with a length attribute that is large enough to accommodate the expansion. | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
504
Installation Guide
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
4. Alter databases. This will only affect the default for new table spaces created in the altered database. 5. Drop any views on tables that exist in any table space that you want to alter. 6. Unload data from the tables that you want to alter. 7. Alter the CCSIDs on the table spaces. This will invalidate any plans or packages that reference these table spaces. 8. Reload data from tables. 9. Recreate views. 10. Recreate authorizations on the views. 11. Rebind the invalidated plans and packages either with autobind or manually. The list of CCSIDs that can be modified are listed according to the encoding scheme:
Table 121. EBCDIC CCSID values that convert to Euro CCSIDs CCSIDs without Euro symbol 37 273 277 278 280 284 285 297 500 871 Table 122. ASCII CCSID values that convert to Euro CCSIDs CCSIDs without Euro symbol 850 1250 1251 1252 1253 1254 1255 1256 1257 874 CCSIDs with Euro symbol 858 5346 5347 5348 5349 5350 5351 5352 5353 4970 CCSIDs with Euro symbol 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149
You can not convert other CCSIDs to the Euro supported CCSIDs. All databases and all table spaces within an encoding scheme should be altered at the same time.
505
| | | | | | | | | | | | | |
Specifying locales
Rules for uppercase and lowercase usage vary according to language and country. A locale defines the subset of a user's environment that depends on language and cultural conventions. DB2 uses the information associated with a locale to execute UPPER, LOWER, and TRANSLATE functions in a culturally correct manner. A locale consists of two components: the first component represents a specific language and country, and the second component is a CCSID. Example: In the locale, Fr_CA.IBM-1047, Fr_CA represents the language and country (French Canadian), and IBM-1047 is the associated CCSID. The symbol for Euro currency is supported through the modifier @EURO. Example: To display results in Euro dollars instead of French Francs, specify Fr_FR@EURO. Table 123 shows a partial list of locales supplied with OS/390 C/C++. For a more complete list of locales, see OS/390 C/C++ Programming Guide.
| Table 123. Examples of locales supplied with OS/390 C/C++. Excerpt of table from OS/390 C/C++ Programming | Guide | | | | | | | | | | | | |
Locale De_CH.IBM-500 De_CH.IBM-1047 De_DE.IBM-273 De_DE.IBM-1047 Fr_CA.IBM-037 Fr_CA.IBM-1047 It_IT.IBM-280 It_IT.IBM-1047 Ja_JP.IBM-290 Ja_JP.IBM-930 Ja_JP.IBM-939 Ja_JP.IBM-1027 Language German German German German French French Italian Italian Japanese Japanese Japanese Japanese Country Switzerland Switzerland Germany Germany Canada Canada Italy Italy Japan Japan Japan Japan Code set IBM-500 IBM-1047 IBM-273 IBM-1047 IBM-037 IBM-1047 IBM-280 IBM-1047 IBM-290 IBM-930 IBM-939 IBM-1027 Load module name EDC$DCEO EDC$DCEY EDC$DDEB EDC$DDEY EDC$FCEA EDC$FCEY EDC$ITEG EDC$ITEY EDC$JAEL EDC$JAEU EDC$JAEV EDC$JAEX
If OS/390 V2R9 is installed, refer to OS/390 C/C++ Programming Guide for additional conversions that are supported. If you need to add a conversion that is not provided by DB2 or override a built-in conversion, you must modify the catalog table SYSIBM.SYSSTRINGS. Any user with SYSADM, SYSCTRL, or DBADM authority for the catalog database has SELECT, INSERT, UPDATE, and DELETE privileges on SYSSTRINGS, subject to
506
Installation Guide
validation by an IBM-provided validation procedure. See Rules for SYSSTRINGS entries on page 509 for more information on this validation procedure.
TRANSTYPE The type of conversion: SS SM MS PS GG PM MM MP PP SP SBCS data to SBCS data SBCS data to EBCDIC MIXED data EBCDIC MIXED data to SBCS (EBCDIC and ASCII) data ASCII MIXED data to SBCS (EBCDIC and ASCII) data GRAPHIC data to GRAPHIC data ASCII MIXED data to EBCDIC MIXED data EBCDIC MIXED data to EBCDIC MIXED data. EBCDIC MIXED to ASCII MIXED data. ASCII MIXED to ASCII MIXED data. SBCS (ASCII and EBCDIC) to ASCII MIXED data.
ERRORBYTE Specifies the byte used in the conversion table (TRANSTAB) as an error indicator. For example, if ERRORBYTE is X'3E', that byte is used in the conversion table to indicate that no conversion is defined for code points that map to X'3E'. Null indicates the absence of an error indicator. SUBBYTE Specifies the byte used in the conversion table (TRANSTAB) as a substitution character. For example, if SUBBYTE is X'3F', that byte is used in the conversion table as a substitute for code points that map to X'3F'. A warning occurs when a code point maps to the value of SUBBYTE. Null indicates the absence of a substitution character.
TRANSPROC The name of a module or a blank string. If IBMREQD is N, a non-blank value of TRANSPROC is the name of a user-provided conversion procedure. If IBMREQD is Y, a non-blank value of TRANSPROC is the name of a DB2 module that contains DBCS conversion tables. IBMREQD TRANSTAB Y indicates that the row is provided by IBM. N indicates that the row has been inserted by the user. A 256-byte conversion table or an empty string.
Each row of SYSSTRINGS contains information about the conversion of character strings from the coded character set identified by INCCSID to the coded character set identified by OUTCCSID. The conversion function is automatically invoked when a conversion from the coded character set identified by the INCCSID column to the coded character set identified by the OUTCCSID column is required. For example, the row of SYSSTRINGS in which the value of INCCSID is 500 and the value of OUTCCSID is 37 describes the conversion from CCSID 500 to CCSID 37. The row in which the value of INCCSID is 37 and the value of OUTCCSID is 500 describes the conversion from CCSID 37 to CCSID 500.
507
DB2 enforces a distinction between IBM-supplied rows and user-provided rows with the following constraints: Rows with IBMREQD=Y cannot be updated or deleted. Rows with IBMREQD=N can be inserted, updated, and deleted. The same pair of CCSIDs can be in two rows, provided one is in an IBM-supplied row and the other is in a user-provided row. In this case, the user-provided row is used for the character conversion. The following types of rows are possible in SYSSTRINGS: TRANSPROC is blank and TRANSTAB is an empty string. This indicates that no conversion is performed. IBMREQD=N and TRANSPROC is not blank. This indicates that the conversion is performed by a conversion procedure that you provide; the conversion procedure module name is identified in the TRANSPROC column. Neither of the above. This indicates that the conversion is performed by a DB2 module. For example, if TRANSPROC is blank and TRANSTAB is not empty, the conversion function uses the conversion table identified in TRANSTAB. # # # If SYSTRINGS does not contain a row that describes the conversion from one CCSID to another and OS/390 V2R9 is installed, refer to OS/390 C/C++ Programming Guide for additional conversions that are supported.
508
Installation Guide
509
510
Installation Guide
Appendix B. Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this publication to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is as your own risk. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs
Copyright IBM Corp. 1982, 1999
511
and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation J74/G4 555 Bailey Avenue P.O. Box 49023 San Jose, CA 95161-9023 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
512
Installation Guide
General-use Programming Interface and Associated Guidance Information is identified where it occurs, by an introductory statement to a chapter or section or by the following markings: General-use Programming Interface General-use Programming Interface and Associated Guidance Information .... End of General-use Programming Interface Product-sensitive Programming Interfaces allow the customer installation to perform tasks such as diagnosing, modifying, monitoring, repairing, tailoring, or tuning of this IBM software product. Use of such interfaces creates dependencies on the detailed design or implementation of the IBM software product. Product-sensitive Programming Interfaces should be used only for these specialized purposes. Because of their dependencies on detailed design and implementation, it is to be expected that programs written to such interfaces may need to be changed in order to run with new product releases or versions, or as a result of service. Product-sensitive Programming Interface and Associated Guidance Information is identified where it occurs either by an introductory statement to a chapter or section or by the following marking: Product-sensitive Programming Interface Product-sensitive Programming Interface and Associated Guidance Information .... End of Product-sensitive Programming Interface
Appendix B. Notices
513
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States, or other countries or both: | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
AD/Cycle AIX APL2 AS/400 BookManager CICS CICS/ESA CICS/MVS COBOL/370 C/MVS C/370 DATABASE 2 DataHub DataPropagator DB2 DB2 Connect DB2 Universal Database DFSMS DFSMSdfp DFSMSdss DFSMShsm DFSMS/MVS DFSORT Distributed Relational Database Architecture DRDA DXT eNetwork Enterprise System/3090 Enterprise System/9000 ESA/390 ES/9000 GDDM Hiperspace IBM IBMLink IMS IMS/ESA Language Environment MVS/DFP MVS/ESA MVS/SP MVS/XA Net.Data OpenEdition OS/2 OS/390 OS/400 Parallel Sysplex PR/SM QMF RACF RAMAC RMF SOMobjects SQL/DS System/370 System/390 VTAM 3090
| |
Throughout the library, the DB2 licensed program and a particular DB2 subsystem are each referred to as DB2. In each case, the context makes the meaning clear. The term MVS is used to represent the MVS base element of the OS/390 system. CICS is used to represent CICS/ESA or the CICS Transaction Server; IMS is used to represent IMS/ESA; C and C language are used to represent the C/370 and C/C++ for MVS/ESA programming languages. COBOL is used to represent OS/VS COBOL, VS COBOL II, IBM COBOL, and COBOL/370 programming languages. Tivoli and NetView are trademarks of Tivoli Systems Inc. in the United States, or other countries, or both. The following terms are trademarks of other companies as follows: Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. UNIX is a registered trademark in the United States and/or other countries licensed exclusively through X/Open Company Limited.
| | | | | | | | | |
514
Installation Guide
Other company, product, and service names may be trademarks or service marks of others.
Appendix B. Notices
515
516
Installation Guide
abend
Glossary
The following terms and abbreviations are defined as they are used in the DB2 library. If you do not find the term you are looking for, refer to the index or to IBM Dictionary of Computing. allied address space. An area of storage that is external to DB2 and that is connected to DB2. An allied address space is capable of requesting DB2 services. allied thread. A thread that originates at the local DB2 subsystem and that can access data at a remote DB2 subsystem. already verified. An LU 6.2 security option that allows DB2 to provide the user's verified authorization ID when allocating a conversation. The user is not validated by the partner DB2 subsystem. ambiguous cursor. A database cursor that is not defined with the FOR FETCH ONLY clause or the FOR UPDATE OF clause, is not defined on a read-only result table, is not the target of a WHERE CURRENT clause on an SQL UPDATE or DELETE statement, and is in a plan or package that contains either PREPARE or EXECUTE IMMEDIATE SQL statements. APAR. Authorized program analysis report. APAR fix corrective service. A temporary correction of a DB2 defect. The correction is temporary, because it is usually replaced at a later date by a more permanent correction, such as a program temporary fix (PTF). APF. Authorized program facility. API. Application programming interface. APPL. A VTAM network definition statement that is used to define DB2 to VTAM as an application program that uses SNA LU 6.2 protocols. application. A program or set of programs that performs a task; for example, a payroll application. application plan. The control structure that is produced during the bind process. DB2 uses the application plan to process SQL statements that it encounters during statement execution. application process. The unit to which resources and locks are allocated. An application process involves the execution of one or more programs. application programming interface (API). A functional interface that is supplied by the operating system or by a separately orderable licensed program that allows an application program that is written in a high-level language to use specific data or functions of the operating system or licensed program. application requester (AR). See requester.
A
abend. Abnormal end of task. abend reason code. A 4-byte hexadecimal code that uniquely identifies a problem with DB2. A complete list of DB2 abend reason codes and their explanations is contained in DB2 Messages and Codes. abnormal end of task (abend). Termination of a task, job, or subsystem because of an error condition that recovery facilities cannot resolve during execution. access method services. The facility that is used to define and reproduce VSAM key-sequenced data sets. access path. The path that is used to locate data that is specified in SQL statements. An access path can be indexed or sequential. active log. The portion of the DB2 log to which log records are written as they are generated. The active log always contains the most recent log records, whereas the archive log holds those records that are older and no longer fit on the active log. address space. A range of virtual storage pages that is identified by a number (ASID) and a collection of segment and page tables that map the virtual pages to real pages of the computer's memory. address space connection. The result of connecting an allied address space to DB2. Each address space that contains a task that is connected to DB2 has exactly one address space connection, even though more than one task control block (TCB) can be present. See also allied address space and task control block. agent. As used in DB2, the structure that associates all processes that are involved in a DB2 unit of work. An allied agent is generally synonymous with an allied thread. System agents are units of work that process independently of the allied agent, such as prefetch processing, deferred writes, and service tasks. alias. An alternative name that can be used in SQL statements to refer to a table or view in the same or a remote DB2 subsystem.
517
built-in function
application server (AS). See server. AR. Application requester. See requester. archive log. The portion of the DB2 log that contains log records that have been copied from the active log. AS. Application server. See server. ASCII. An encoding scheme that is used to represent strings in many environments, typically on PCs and workstations. Contrast with EBCDIC. attachment facility. An interface between DB2 and TSO, IMS, CICS, or batch address spaces. An attachment facility allows application programs to access DB2. attribute. A characteristic of an entity. For example, in database design, the phone number of an employee is one of that employee's attributes. authorization ID. A string that can be verified for connection to DB2 and to which a set of privileges are allowed. It can represent an individual, an organizational group, or a function, but DB2 does not determine this representation. authorized program analysis report (APAR). A report of a problem that is caused by a suspected defect in a current release of an IBM licensed program. authorized program facility (APF). A facility that permits the identification of programs that are authorized to use restricted functions. auxiliary index. An index on an auxiliary table in which each index entry refers to a LOB. auxiliary table. A table that stores columns outside the table in which they are defined. Contrast with base table.
row and an indicator column for each of its LOB columns. Contrast with auxiliary table. basic sequential access method (BSAM). An access method for storing or retrieving data blocks in a continuous sequence, using either a sequential access or a direct access device. binary large object (BLOB). A sequence of bytes, where the size of the value ranges from 0 bytes to 2 GB - 1. Such a string does not have an associated CCSID. bind. The process by which the output from the DB2 precompiler is converted to a usable control structure (which is called a package or an application plan). During the process, access paths to the data are selected and some authorization checking is performed. automatic bind. (More correctly automatic rebind). A process by which SQL statements are bound automatically (without a user issuing a BIND command) when an application process begins execution and the bound application plan or package it requires is not valid. dynamic bind. A process by which SQL statements are bound as they are entered. incremental bind. A process by which SQL statements are bound during the execution of an application process, because they could not be bound during the bind process, and VALIDATE(RUN) was specified. static bind. A process by which SQL statements are bound after they have been precompiled. All static SQL statements are prepared for execution at the same time. BLOB. Binary large object. BMP. Batch Message Processing (IMS). bootstrap data set (BSDS). A VSAM data set that contains name and status information for DB2, as well as RBA range specifications, for all active and archive log data sets. It also contains passwords for the DB2 directory and catalog, and lists of conditional restart and checkpoint records. BSAM. Basic sequential access method. BSDS. Bootstrap data set.
B
backward log recovery. The fourth and final phase of restart processing during which DB2 scans the log in a backward direction to apply UNDO log records for all aborted changes. base table. (1) A table that is created by the SQL CREATE TABLE statement and that holds persistent data. Contrast with result table and temporary table. (2) A table containing a LOB column definition. The actual LOB column data is not stored with the base table. The base table contains a row identifier for each
buffer pool. Main storage that is reserved to satisfy the buffering requirements for one or more table spaces or indexes. built-in function. A function that DB2 supplies. Contrast with user-defined function.
518
Installation Guide
CAF
clustering index
C
CAF. Call attachment facility. call attachment facility (CAF). A DB2 attachment facility for application programs that run in TSO or MVS batch. The CAF is an alternative to the DSN command processor and provides greater control over the execution environment. cascade delete. The way in which DB2 enforces referential constraints when it deletes all descendent rows of a deleted parent row. cast function. A function that is used to convert instances of a (source) data type into instances of a different (target) data type. In general, a cast function has the name of the target data type. It has one single argument whose type is the source data type; its return type is the target data type. catalog. In DB2, a collection of tables that contains descriptions of objects such as tables, views, and indexes. catalog table. Any table in the DB2 catalog. CCSID. Coded character set identifier. CDB. Communications database. character large object (CLOB). A sequence of bytes representing single-byte characters or a mixture of single- and double-byte characters where the size of the value can be up to 2 GB - 1. In general, character large object values are used whenever a character string might exceed the limits of the VARCHAR type. character set. A defined set of characters. character string. A sequence of bytes that represent bit data, single-byte characters, or a mixture of singleand double-byte characters. CHECK clause. An extension to the SQL CREATE TABLE and SQL ALTER TABLE statements that specifies a table check constraint. See also table check constraint. check constraint. See table check constraint. check integrity. The condition that exists when each row in a table conforms to the table check constraints that are defined on that table. Maintaining check integrity requires DB2 to enforce table check constraints on operations that add or change data. check pending. A state of a table space or partition that prevents its use by some utilities and some SQL
statements because of rows that violate referential constraints, table check constraints, or both. checkpoint. A point at which DB2 records internal status information on the DB2 log; the recovery process uses this information if DB2 abnormally terminates. CI. Control interval. CICS. Represents (in this publication) one of the following products: CICS Transaction Server for OS/390: Customer Information Control Center Transaction Server for OS/390 CICS/ESA: Customer Information Control System/Enterprise Systems Architecture CICS/MVS: Customer Information Control System/Multiple Virtual Storage CICS attachment facility. A DB2 subcomponent that uses the MVS subsystem interface (SSI) and cross storage linkage to process requests from CICS to DB2 and to coordinate resource commitment. CIDF. Control interval definition field. claim. A notification to DB2 that an object is being accessed. Claims prevent drains from occurring until the claim is released, which usually occurs at a commit point. Contrast with drain. claim class. A specific type of object access that can be one of the following: Cursor stability (CS) Repeatable read (RR) Write claim count. A count of the number of agents that are accessing an object. class of service. A VTAM term for a list of routes through a network, arranged in an order of preference for their use. clause. In SQL, a distinct part of a statement, such as a SELECT clause or a WHERE clause. client. See requester. CLIST. Command list. A language for performing TSO tasks. CLOB. Character large object. CLPA. Create link pack area. clustering index. An index that determines how rows are physically ordered in a table space.
Glossary
519
correlation name
coded character set. A set of unambiguous rules that establish a character set and the one-to-one relationships between the characters of the set and their coded representations. coded character set identifier (CCSID). A 16-bit number that uniquely identifies a coded representation of graphic characters. It designates an encoding scheme identifier and one or more pairs consisting of a character set identifier and an associated code page identifier. coexistence. During migration, the period of time in which two releases exist in the same data sharing group. column. The vertical component of a table. A column has a name and a particular data type (for example, character, decimal, or integer). column function. An SQL operation that derives its result from a collection of values across one or more rows. Contrast with scalar function. "come from" checking. An LU 6.2 security option that defines a list of authorization IDs that are allowed to connect to DB2 from a partner LU. command. A DB2 operator command or a DSN subcommand. A command is distinct from an SQL statement. command recognition character (CRC). A character that permits an MVS console operator or an IMS subsystem user to route DB2 commands to specific DB2 subsystems. commit. The operation that ends a unit of work by releasing locks so that the database changes that are made by that unit of work can be perceived by other processes. commit point. A point in time when data is considered consistent. committed phase. The second phase of the multi-site update process that requests all participants to commit the effects of the logical unit of work. common service area (CSA). In MVS, a part of the common area that contains data areas that are addressable by all address spaces. communications database (CDB). A set of tables in the DB2 catalog that are used to establish conversations with remote database management systems. comparison operator. A token (such as =, >, <) that is used to specify a relationship between two values.
compression dictionary. The dictionary that controls the process of compression and decompression. This dictionary is created from the data in the table space or table space partition. concurrency. The shared use of resources by more than one application process at the same time. conditional restart. A DB2 restart that is directed by a user-defined conditional restart control record (CRCR). connection ID. An identifier that is supplied by the attachment facility and that is associated with a specific address space connection. consistency token. A timestamp that is used to generate the version identifier for an application. See also version. constraint. A rule that limits the values that can be inserted, deleted, or updated in a table. See referential constraint, table check constraint, and uniqueness constraint. control interval (CI). A fixed-length area or direct access storage in which VSAM stores records and creates distributed free space. Also, in a key-sequenced data set or file, the set of records pointed to by an entry in the sequence-set index record. The control interval is the unit of information that VSAM transmits to or from direct access storage. A control interval always includes an integral number of physical records. control interval definition field (CIDF). In VSAM, a field located in the 4 bytes at the end of each control interval; it describes the free space, if any, in the control interval. conversation. Communication, which is based on LU 6.2 or Advanced Program-to-Program Communication (APPC), between an application and a remote transaction program over an SNA logical unit-to-logical unit (LU-LU) session that allows communication while processing a transaction. coordinator. The system component that coordinates the commit or rollback of a unit of work that includes work that is done on one or more other systems. correlated subquery. A subquery (part of a WHERE or HAVING clause) that is applied to a row or group of rows of a table or view that is named in an outer subselect statement. correlation ID. An identifier that is associated with a specific thread. In TSO, it is either an authorization ID or the job name. correlation name. An identifier that designates a table, a view, or individual rows of a table or view within a single SQL statement. It can be defined in any FROM
520
Installation Guide
C++ member
data type
clause or in the first clause of an UPDATE or DELETE statement. C++ member. A data object or function in a structure, union, or class. C++ member function. An operator or function that is declared as a member of a class. A member function has access to the private and protected data members and to the member functions of objects in its class. Member functions are also called methods. C++ object. (1) A region of storage. An object is created when a variable is defined or a new function is invoked. (2) An instance of a class. CRC. Command recognition character. CRCR. Conditional restart control record. See also conditional restart. create link pack area (CLPA). An option used during IPL to initialize the link pack pageable area.
cycle. A set of tables that can be ordered so that each table is a descendent of the one before it, and the first table is a descendent of the last table. A self-referencing table is a cycle with a single member.
D
DASD. Direct access storage device. database. A collection of tables, or a collection of table spaces and index spaces. database access thread. A thread that accesses data at the local subsystem on behalf of a remote subsystem. database administrator (DBA). An individual who is responsible for designing, developing, operating, safeguarding, maintaining, and using a database. database descriptor (DBD). An internal representation of a DB2 database definition, which reflects the data definition that is in the DB2 catalog. The objects that are defined in a database descriptor are table spaces, tables, indexes, index spaces, and relationships. database management system (DBMS). A software system that controls the creation, organization, and modification of a database and the access to the data stored within it. database request module (DBRM). A data set member that is created by the DB2 precompiler and that contains information about SQL statements. DBRMs are used in the bind process. DATABASE 2 Interactive (DB2I). The DB2 facility that provides for the execution of SQL statements, DB2 (operator) commands, programmer commands, and utility invocation. data definition name (ddname). The name of a data definition (DD) statement that corresponds to a data control block containing the same name. Data Language/I (DL/I). The IMS data manipulation language; a common high-level interface between a user application and IMS. data space. A range of up to 2 GB of contiguous virtual storage addresses that a program can directly manipulate. Unlike an address space, a data space can hold only data; it does not contain common areas, system data, or programs. data type. An attribute of columns, literals, host variables, special registers, and the results of functions and expressions.
# # # # # # #
created temporary table. A table that holds temporary data and is defined with the SQL statement CREATE GLOBAL TEMPORARY TABLE. Information about created temporary tables is stored in the DB2 catalog, so this kind of table is persistent and can be shared across application processes. Contrast with declared temporary table. See also temporary table. cross-memory linkage. A method for invoking a program in a different address space. The invocation is synchronous with respect to the caller. CS. Cursor stability. CSA. Common service area. CT. Cursor table. current status rebuild. The second phase of restart processing during which the status of the subsystem is reconstructed from information on the log. cursor. A named control structure that an application program uses to point to a row of interest within some set of rows, and to retrieve rows from the set, possibly making updates or deletions. cursor stability (CS). The isolation level that provides maximum concurrency without the ability to read uncommitted data. With cursor stability, a unit of work holds locks only on its uncommitted changes and on the current row of each of its cursors. cursor table (CT). The copy of the skeleton cursor table that is used by an executing application process.
Glossary
521
date
dimension table
date. A three-part value that designates a day, month, and year. date duration. A decimal integer that represents a number of years, months, and days. datetime value. A value of the data type DATE, TIME, or TIMESTAMP. DBA. Database administrator. DBCLOB. Double-byte character large object. DBCS. Double-byte character set. DBD. Database descriptor. DBID. Database identifier. DBMS. Database management system. DBRM. Database request module. DB2 catalog. Tables that are maintained by DB2 and that contain descriptions of DB2 objects, such as tables, views, and indexes. DB2 command. An instruction to the DB2 subsystem allowing a user to start or stop DB2, to display information on current users, to start or stop databases, to display information on the status of databases, and so on. DB2 for VSE & VM. The IBM DB2 relational database management system for the VSE and VM operating systems. DB2I. DATABASE 2 Interactive. DB2I Kanji Feature. The tape that contains the panels and jobs that allow a site to display DB2I panels in Kanji. DB2 PM. DATABASE 2 Performance Monitor. DCE. OS/390 OpenEdition Distributed Computing Environment. DCE ticket. A transparent application mechanism that transmits the identity of an initiating principal to its target. A simple ticket contains the principal's identity, a session key, a timestamp, and other information, which is sealed using the target's secret key. DCLGEN. Declarations generator. DDF. Distributed data facility. ddname. Data definition name. deadlock. Unresolvable contention for the use of a resource such as a table or an index.
declarations generator (DCLGEN). A subcomponent of DB2 that generates SQL table declarations and COBOL, C, or PL/I data structure declarations that conform to the table. The declarations are generated from DB2 system catalog information. DCLGEN is also a DSN subcommand.
# # # # # # # #
declared temporary table. A table that holds temporary data and is defined with the SQL statement DECLARE GLOBAL TEMPORARY TABLE. Information about declared temporary tables is not stored in the DB2 catalog, so this kind of table is not persistent and can only be used by the application process that issued the DECLARE statement. Contrast with created temporary table. See also temporary table. default value. A predetermined value, attribute, or option that is assumed when no other is explicitly specified. delete rule. The rule that tells DB2 what to do to a dependent row when a parent row is deleted. For each relationship, the rule might be CASCADE, RESTRICT, SET NULL, or NO ACTION. dependent. An object (row, table, or table space) that has at least one parent. The object is also said to be a dependent (row, table, or table space) of its parent. See parent row, parent table, parent table space. dependent row. A row that contains a foreign key that matches the value of a primary key in the parent row. dependent table. A table that is a dependent in at least one referential constraint. descendent. An object that is a dependent of an object or is the dependent of a descendent of an object. descendent row. A row that is dependent on another row, or a row that is a descendent of a dependent row. descendent table. A table that is a dependent of another table, or a table that is a descendent of a dependent table. DFHSM. Data Facility Hierarchical Storage Manager. DFP. Data Facility Product (MVS).
# # # # #
dimension. A data category such as time, products, or markets. The elements of a dimension are referred to as members. Dimensions offer a very concise, intuitive way of organizing and selecting data for retrieval, exploration, and analysis. See also dimension table.
# dimension table. The representation of a dimension in # a star schema. Each row in a dimension table # represents all of the attributes for a particular member
522
Installation Guide
EUR
# of the dimension. See also dimension, star schema, and # star join.
direct access storage device (DASD). A device in which access time is independent of the location of the data. directory. The DB2 system database that contains internal objects such as database descriptors and skeleton cursor tables. Distributed Computing Environment MVS/ESA (DCE MVS/ESA). A set of technologies that are provided by the Open Software Foundation to implement distributed computing. distributed data facility (DDF). A set of DB2 components through which DB2 communicates with another RDBMS. Distributed Relational Database Architecture (DRDA). A connection protocol for distributed relational database processing that is used by IBM's relational database products. DRDA includes protocols for communication between an application and a remote relational database management system, and for communication between relational database management systems. DL/I. Data Language/I. double-byte character large object (DBCLOB). A sequence of bytes representing double-byte characters where the size of the values can be up to 2 GB. In general, double-byte character large object values are used whenever a double-byte character string might exceed the limits of the VARGRAPHIC type. double-byte character set (DBCS). A set of characters, which are used by national languages such as Japanese and Chinese, that have more symbols than can be represented by a single byte. Each character is 2 bytes in length and therefore requires special hardware to be displayed or printed. Contrast with single-byte character set. drain. The act of acquiring a locked resource by quiescing access to that object. drain lock. A lock on a claim class that prevents a claim from occurring. DRDA. Distributed Relational Database Architecture. DRDA access. A method of accessing distributed data by which you can connect to another location, using an SQL statement, to execute packages that have been previously bound at that location. The SQL CONNECT or three-part name statement is used to identify
application servers, and SQL statements are executed using packages that were previously bound at those servers. Contrast with private protocol access. DSN. (1) The default DB2 subsystem name. (2) The name of the TSO command processor of DB2. (3) The first three characters of DB2 module and macro names. duration. A number that represents an interval of time. See date duration, labeled duration, and time duration. dynamic SQL. SQL statements that are prepared and executed within an application program while the program is executing. In dynamic SQL, the SQL source is contained in host language variables rather than being coded into the application program. The SQL statement can change several times during the application program's execution.
E
| | | |
EA-enabled table space. A table space or index space that is enabled for extended addressability and that contains individual partitions (or pieces, for LOB table spaces) that are greater than 4 GB. EBCDIC. Extended binary coded decimal interchange code. An encoding scheme that is used to represent character data in the OS/390, MVS, VM, VSE, and OS/400 environments. Contrast with ASCII. EDM pool. A pool of main storage that is used for database descriptors, application plans, authorization cache, application packages, and dynamic statement caching. EID. Event identifier. embedded SQL. SQL statements that are coded within an application program. See static SQL. EOM. End of memory. EOT. End of task. error page range. A range of pages that are considered to be physically damaged. DB2 does not allow users to access any pages that fall within this range. equi-join. A join operation in which the join-condition has the form expression = expression. ESDS. Entry sequenced data set. ESMT. External subsystem module table (IMS). EUR. IBM European Standards.
Glossary
523
exception table
exception table. A table that holds rows that violate referential constraints or table check constraints that the CHECK DATA utility finds. exclusive lock. A lock that prevents concurrently executing application processes from reading or changing data. Contrast with shared lock. exit routine. A user-written (or IBM-provided default) program that receives control from DB2 to perform specific functions. Exit routines run as extensions of DB2. expression. An operand or a collection of operators and operands that yields a single value. extended recovery facility (XRF). A facility that minimizes the effect of failures in MVS, VTAM, the host processor, or high-availability applications during sessions between high-availability applications and designated terminals. This facility provides an alternative subsystem to take over sessions from the failing subsystem. external function. A function for which the body is written in a programming language that takes scalar argument values and produces a scalar result for each invocation. Contrast with sourced function and built-in function.
joined and preserves the unmatched rows of both tables. See also join. function. A specific purpose of an entity or its characteristic action such as a column function or scalar function. (See also column function and scalar function.) Functions can be user-defined, built-in, or generated by DB2. (See built-in function, cast function, external function, sourced function, and user-defined function.)
G
GB. Gigabyte (1 073 741 824 bytes). GBP. Group buffer pool. generalized trace facility (GTF). An MVS service program that records significant system events such as I/O interrupts, SVC interrupts, program interrupts, or external interrupts. getpage. An operation in which DB2 accesses a data page. GIMSMP. The load module name for the System Modification Program/Extended, a basic tool for installing, changing, and controlling changes to programming systems. graphic string. A sequence of DBCS characters. gross lock. The shared, update, or exclusive mode locks on a table, partition, or table space. group buffer pool (GBP). A coupling facility cache structure that is used by a data sharing group to cache data and to ensure that the data is consistent for all members. GTF. Generalized trace facility.
F
fallback. The process of returning to a previous release of DB2 after attempting or completing migration to a current release. field procedure. A user-written exit routine that is designed to receive a single value and transform (encode or decode) it in any way the user can specify. fixed-length string. A character or graphic string whose length is specified and cannot be changed. Contrast with varying-length string. foreign key. A key that is specified in the definition of a referential constraint. Because of the foreign key, the table is a dependent table. The key must have the same number of columns, with the same descriptions, as the primary key of the parent table. forward log recovery. The third phase of restart processing during which DB2 processes the log in a forward direction to apply all REDO log records. free space. The total amount of unused space in a page. That is, the space that is not used to store records or control information is free space. full outer join. The result of a join operation that includes the matched rows of both tables that are being
H
help panel. A screen of information presenting tutorial text to assist a user at the terminal. hiperspace. A range of up to 2 GB of contiguous virtual storage addresses that a program can use as a buffer. Like a data space, a hiperspace can hold user data; it does not contain common areas or system data. Unlike an address space or a data space, data in a hiperspace is not directly addressable. To manipulate data in a hiperspace, you bring the data into the address space in 4-KB blocks. home address space. The area of storage that MVS currently recognizes as dispatched.
524
Installation Guide
host language
host language. A programming language in which you can embed SQL statements. host program. An application program that is written in a host language and that contains embedded SQL statements. host structure. In an application program, a structure that is referenced by embedded SQL statements. host variable. In an application program, an application variable that is referenced by embedded SQL statements. HSM. Hierarchical storage manager.
before the process is completed, DB2 continues to back out the changes during restart. in-commit. A status of a unit of recovery. If DB2 fails after beginning its phase 2 commit processing, it knows, when restarted, that changes made to data are consistent. Such units of recovery are termed in-commit. independent. An object (row, table, or table space) that is neither a parent nor a dependent of another object. index. A set of pointers that are logically ordered by the values of a key. Indexes can provide faster access to data and can enforce uniqueness on the rows in a table. index key. The set of columns in a table that is used to determine the order of index entries. index space. A page set that is used to store the entries of one index. indicator variable. A variable that is used to represent the null value in an application program. If the value for the selected column is null, a negative value is placed in the indicator variable. indoubt. A status of a unit of recovery. If DB2 fails after it has finished its phase 1 commit processing and before it has started phase 2, only the commit coordinator knows if an individual unit of recovery is to be committed or rolled back. At emergency restart, if DB2 lacks the information it needs to make this decision, the status of the unit of recovery is indoubt until DB2 obtains this information from the coordinator. More than one unit of recovery can be indoubt at restart. indoubt resolution. The process of resolving the status of an indoubt logical unit of work to either the committed or the rollback state. inflight. A status of a unit of recovery. If DB2 fails before its unit of recovery completes phase 1 of the commit process, it merely backs out the updates of its unit of recovery at restart. These units of recovery are termed inflight. inner join. The result of a join operation that includes only the matched rows of both tables being joined. See also join. install. The process of preparing a DB2 subsystem to operate as an MVS subsystem. installation verification scenario. A sequence of operations that exercises the main DB2 functions and tests whether DB2 was correctly installed.
I
ICF. Integrated catalog facility. IDCAMS. An IBM program that is used to process access method services commands. It can be invoked as a job or jobstep, from a TSO terminal, or from within a user's application program. IDCAMS LISTCAT. A facility for obtaining information that is contained in the access method services catalog. identify. A request that an attachment service program in an address space that is separate from DB2 issues via the MVS subsystem interface to inform DB2 of its existence and to initiate the process of becoming connected to DB2. IFI. Instrumentation facility interface. IFI call. An invocation of the instrumentation facility interface (IFI) by means of one of its defined functions. IFP. IMS Fast Path. image copy. An exact reproduction of all or part of a table space. DB2 provides utility programs to make full image copies (to copy the entire table space) or incremental image copies (to copy only those pages that have been modified since the last image copy). IMS. Information Management System. IMS attachment facility. A DB2 subcomponent that uses MVS subsystem interface (SSI) protocols and cross-memory linkage to process requests from IMS to DB2 and to coordinate resource commitment. IMS DB. Information Management System Database. IMS TM. Information Management System Transaction Manager. in-abort. A status of a unit of recovery. If DB2 fails after a unit of recovery begins to be rolled back, but
Glossary
525
instrumentation facility interface (IFI). A programming interface that enables programs to obtain online trace data about DB2, to submit DB2 commands, and to pass data to DB2. Interactive System Productivity Facility (ISPF). An IBM licensed program that provides interactive dialog services. internal resource lock manager (IRLM). An MVS subsystem that DB2 uses to control communication and database locking. IRLM. Internal resource lock manager. ISO. International Standards Organization. isolation level. The degree to which a unit of work is isolated from the updating operations of other units of work. See also cursor stability, read stability, repeatable read, and uncommitted read. ISPF. Interactive System Productivity Facility. ISPF/PDF. Interactive System Productivity Facility/Program Development Facility.
key-sequenced data set (KSDS). A VSAM file or data set whose records are loaded in key sequence and controlled by an index. KSDS. Key-sequenced data set.
L
labeled duration. A number that represents a duration of years, months, days, hours, minutes, seconds, or microseconds. large object (LOB). A sequence of bytes representing bit data, single-byte characters, double-byte characters, or a mixture of single- and double-byte characters. A LOB can be up to 2 GB - 1 byte in length. See also BLOB, CLOB, and DBCLOB. latch. A DB2 internal mechanism for controlling concurrent events or the use of system resources. LCID. Log control interval definition. LDS. Linear data set. leaf page. A page that contains pairs of keys and RIDs and that points to actual data. Contrast with nonleaf page. left outer join. The result of a join operation that includes the matched rows of both tables that are being joined, and that preserves the unmatched rows of the first table. See also join. linear data set (LDS). A VSAM data set that contains data but no control information. A linear data set can be accessed as a byte-addressable string in virtual storage. linkage editor. A computer program for creating load modules from one or more object modules or load modules by resolving cross references among the modules and, if necessary, adjusting addresses. link-edit. The action of creating a loadable computer program using a linkage editor. L-lock. Logical lock. load module. A program unit that is suitable for loading into main storage for execution. The output of a linkage editor. LOB. Large object. LOB table space. A table space that contains all the data for a particular LOB column in the related base table.
J
Japanese Industrial Standards Committee (JISC). An organization that issues standards for coding character sets. JCL. Job control language. JES. MVS Job Entry Subsystem. JIS. Japanese Industrial Standard. job control language (JCL). A control language that is used to identify a job to an operating system and to describe the job's requirements. Job Entry Subsystem (JES). An IBM licensed program that receives jobs into the system and processes all output data that is produced by the jobs. join. A relational operation that allows retrieval of data from two or more tables based on matching column values. See also equi-join, full outer join, inner join, left outer join, outer join, and right outer join.
K
KB. Kilobyte (1024 bytes). key. A column or an ordered collection of columns identified in the description of a table, index, or referential constraint.
526
Installation Guide
local subsystem
MTO
local subsystem. The unique RDBMS to which the user or application program is directly connected (in the case of DB2, by one of the DB2 attachment facilities). lock. A means of controlling concurrent events or access to data. DB2 locking is performed by the IRLM. lock duration. The interval over which a DB2 lock is held. lock escalation. The promotion of a lock from a row, page, or LOB lock to a table space lock because the number of page locks that are concurrently held on a given resource exceeds a preset limit. locking. The process by which the integrity of data is ensured. Locking prevents concurrent users from accessing inconsistent data. lock mode. A representation for the type of access that concurrently running programs can have to a resource that a DB2 lock is holding. lock object. The resource that is controlled by a DB2 lock. lock promotion. The process of changing the size or mode of a DB2 lock to a higher level. lock size. The amount of data controlled by a DB2 lock on table data; the value can be a row, a page, a LOB, a partition, a table, or a table space. log. A collection of records that describe the events that occur during DB2 execution and that indicate their sequence. The information thus recorded is used for recovery in the event of a failure during DB2 execution. logical lock (L-lock). The lock type that transactions use to control intra- and inter-DB2 data concurrency between transactions. Contrast with P-lock. logical recovery pending (LRECP). The state in which the data and the index keys that reference the data are inconsistent. logical unit. An access point through which an application program accesses the SNA network in order to communicate with another application program. logical unit of work (LUW). The processing that a program performs between synchronization points. logical unit of work identifier (LUWID). A name that uniquely identifies a thread within a network. This name consists of a fully-qualified LU network name, an LUW instance number, and an LUW sequence number. log initialization. The first phase of restart processing during which DB2 attempts to locate the current end of the log.
log record sequence number (LRSN). A number that DB2 generates and associates with each log record. DB2 also uses the LRSN for page versioning. The LRSNs that a particular DB2 data sharing group generates form a strictly increasing sequence for each DB2 log and a strictly increasing sequence for each page across the DB2 group. log truncation. A process by which an explicit starting RBA is established. This RBA is the point at which the next byte of log data is to be written. long string. A string whose actual length, or a varying-length string whose maximum length, is greater than 255 bytes or 127 double-byte characters. Any LOB column, LOB host variable, or expression that evaluates to a LOB is considered a long string. LRECP. Logical recovery pending. LRH. Log record header. LRSN. Log record sequence number. LUW. Logical unit of work. LUWID. Logical unit of work identifier.
M
MB. Megabyte (1 048 576 bytes). migration. The process of converting a DB2 subsystem with a previous release of DB2 to an updated or current release. In this process, you can acquire the functions of the updated or current release without losing the data you created on the previous release. mixed data string. A character string that can contain both single-byte and double-byte characters. MLPA. Modified link pack area. MODEENT. A VTAM macro instruction that associates a logon mode name with a set of parameters representing session protocols. A set of MODEENT macro instructions defines a logon mode table. mode name. A VTAM name for the collection of physical and logical characteristics and attributes of a session. MPP. Message processing program (IMS). MSS. Mass Storage Subsystem. MTO. Master terminal operator.
Glossary
527
multi-site update
multi-site update. Distributed relational database processing in which data is updated in more than one location within a single unit of work. must-complete. A state during DB2 processing in which the entire operation must be completed to maintain data integrity. MVS. Multiple Virtual Storage. MVS/ESA. Multiple Virtual Storage/Enterprise Systems Architecture. MVS/XA. Multiple Virtual Storage/Extended Architecture.
OS/390. Operating System/390. OS/390 OpenEdition Distributed Computing Environment (OS/390 OE DCE). A set of technologies that are provided by the Open Software Foundation to implement distributed computing. outer join. The result of a join operation that includes the matched rows of both tables that are being joined and preserves some or all of the unmatched rows of the tables that are being joined. See also join.
P
package. An object containing a set of SQL statements that have been bound statically and that is available for processing. A package is sometimes also called an application package. package list. An ordered list of package names that may be used to extend an application plan. package name. The name of an object that is created by a BIND PACKAGE or REBIND PACKAGE command. The object is a bound version of a database request module (DBRM). The name consists of a location name, a collection ID, a package ID, and a version ID. page. A unit of storage within a table space (4 KB, 8 KB, 16 KB, or 32 KB) or index space (4 KB). In a table space, a page contains one or more rows of a table. In a LOB table space, a LOB value can span more than one page, but no more than one LOB value is stored on a page. page set. Another way to refer to a table space or index space. Each page set consists of a collection of VSAM data sets. page set recovery pending (PSRCP). A restrictive state of an index space. In this case, the entire page set must be recovered. Recovery of a logical part is prohibited. parallel I/O processing. A form of I/O processing in which DB2 initiates multiple concurrent requests for a single user query and performs I/O processing concurrently (in parallel), on multiple data partitions. parent row. A row whose primary key value is the foreign key value of a dependent row. parent table. A table whose primary key is referenced by the foreign key of a dependent table. parent table space. A table space that contains a parent table. A table space containing a dependent of that table is a dependent table space.
N
network identifier (NID). The network ID that is assigned by IMS or CICS, or if the connection type is RRSAF, the OS/390 RRS Unit of Recovery ID (URID). NID. Network ID. nonleaf page. A page that contains keys and page numbers of other pages in the index (either leaf or nonleaf pages). Nonleaf pages never point to actual data. NRE. Network recovery element. NUL. In C, a single character that denotes the end of the string. null. A special value that indicates the absence of information. NUL-terminated host variable. A varying-length host variable in which the end of the data is indicated by the presence of a NUL terminator. NUL terminator. In C, the value that indicates the end of a string. For character strings, the NUL terminator is X'00'.
O
OASN (origin application schedule number). In IMS, a 4-byte number that is assigned sequentially to each IMS schedule since the last cold start of IMS. The OASN is used as an identifier for a unit of work. In an 8-byte format, the first 4 bytes contain the schedule number and the last 4 bytes contain the number of IMS sync points (commit points) during the current schedule. The OASN is part of the NID for an IMS connection. OBID. Data object identifier.
528
Installation Guide
participant
program
participant. An entity other than the commit coordinator that takes part in the commit process. The term participant is synonymous with agent in SNA. partition. A portion of a page set. Each partition corresponds to a single, independently extendable data set. Partitions can be extended to a maximum size of 1, 2, or 4 GB, depending on the number of partitions in the partitioned page set. All partitions of a given page set have the same maximum size. partitioned data set (PDS). A data set in direct access storage that is divided into partitions, which are called members. Each partition can contain a program, part of a program, or data. The term partitioned data set is synonymous with program library. partitioned page set. A partitioned table space or an index space. Header pages, space map pages, data pages, and index pages reference data only within the scope of the partition. partitioned table space. A table space that is subdivided into parts (based on index key range), each of which can be processed independently by utilities. partner logical unit. An access point in the SNA network that is connected to the local DB2 subsystem by way of a VTAM conversation. PCT. Program control table (CICS). PDS. Partitioned data set. piece. A data set of a nonpartitioned page set. plan. See application plan. plan allocation. The process of allocating DB2 resources to a plan in preparation to execute it. plan name. The name of an application plan. plan segmentation. The dividing of each plan into sections. When a section is needed, it is independently brought into the EDM pool. PLT. Program list table (CICS). point of consistency. A time when all recoverable data that an application accesses is consistent with other data. The term point of consistency is synonymous with sync point or commit point. PPT. (1) Processing program table (CICS). (2) Program properties table (MVS). precompilation. A processing of application programs containing SQL statements that takes place before compilation. SQL statements are replaced with statements that are recognized by the host language
compiler. Output from this precompilation includes source code that can be submitted to the compiler and the database request module (DBRM) that is input to the bind process. predicate. An element of a search condition that expresses or implies a comparison operation. prefix. A code at the beginning of a message or record. primary authorization ID. The authorization ID used to identify the application process to DB2. primary index. An index that enforces the uniqueness of a primary key. primary key. In a relational database, a unique, nonnull key that is part of the definition of a table. A table cannot be defined as a parent unless it has a unique key or primary key. private connection. A communications connection that is specific to DB2. private protocol access. A method of accessing distributed data by which you can direct a query to another DB2 system. Contrast with DRDA access. private protocol connection. A DB2 private connection of the application process. See also private connection. privilege. The capability of performing a specific function, sometimes on a specific object. The term includes: explicit privileges, which have names and are held as the result of SQL GRANT and REVOKE statements. For example, the SELECT privilege. implicit privileges, which accompany the ownership of an object, such as the privilege to drop a synonym one owns, or the holding of an authority, such as the privilege of SYSADM authority to terminate any utility job. privilege set. For the installation SYSADM ID, the set of all possible privileges. For any other authorization ID, the set of all privileges that are recorded for that ID in the DB2 catalog. process. In DB2, the unit to which DB2 allocates resources and locks. Sometimes called an application process, a process involves the execution of one or more programs. The execution of an SQL statement is always associated with some process. The means of initiating and terminating a process are dependent on the environment. program. A single compilable collection of executable statements in a programming language.
Glossary
529
referential structure
program temporary fix (PTF). A solution or bypass of a problem that is diagnosed as a result of a defect in a current unaltered release of a licensed program. An authorized program analysis report (APAR) fix is corrective service for an existing problem. A PTF is preventive service for problems that might be encountered by other users of the product. A PTF is temporary, because a permanent fix is usually not incorporated into the product until its next release. protected conversation. A VTAM conversation that supports two-phase commit flows. PSRCP. Page set recovery pending. PTF. Program temporary fix.
rebind. The creation of a new application plan for an application program that has been bound previously. If, for example, you have added an index for a table that your application accesses, you must rebind the application in order to take advantage of that index. rebuild. The process of reallocating a coupling facility structure. For the shared communications area (SCA) and lock structure, the structure is repopulated; for the group buffer pool, changed pages are usually cast out to DASD, and the new structure is populated only with changed pages that were not successfully cast out. record. The storage representation of a row or other data. record identifier (RID) pool. An area of main storage above the 16-MB line that is reserved for sorting record identifiers during list prefetch processing. recovery. The process of rebuilding databases after a system failure. recovery log. A collection of records that describes the events that occur during DB2 execution and indicates their sequence. The recorded information is used for recovery in the event of a failure during DB2 execution. recovery pending (RECP). A condition that prevents SQL access to a table space that needs to be recovered. recovery token. An identifier for an element that is used in recovery (for example, NID or URID). RECP. Recovery pending. redo. A state of a unit of recovery that indicates that changes are to be reapplied to the DASD media to ensure data integrity. referential constraint. The requirement that nonnull values of a designated foreign key are valid only if they equal values of the primary key of a designated table. referential integrity. The condition that exists when all intended references from data in one column of a table to data in another column of the same or a different table are valid. Maintaining referential integrity requires that DB2 enforce referential constraints on all LOAD, RECOVER, INSERT, UPDATE, and DELETE operations. referential structure. A set of tables and relationships that includes at least one table and, for every table in the set, all the relationships in which that table participates and all the tables to which it is related.
Q
QMF. Query Management Facility. QSAM. Queued sequential access method. query block. The part of a query that is represented by one of the FROM clauses. Each FROM clause can have multiple query blocks, depending on DB2's internal processing of the query. queued sequential access method (QSAM). An extended version of the basic sequential access method (BSAM). When this method is used, a queue is formed of input data blocks that are awaiting processing or of output data blocks that are awaiting transfer to auxiliary storage or to an output device.
R
RACF. Resource Access Control Facility. RBA. Relative byte address. RCT. Resource control table (CICS attachment facility). RDB. Relational database. RDBMS. Relational database management system. RDBNAM. Relational database name. RDF. Record definition field. read stability (RS). An isolation level that is similar to repeatable read but does not completely isolate an application process from all other concurrently executing application processes. Under level RS, an application that issues the same query more than once might read additional rows that were inserted and committed by a concurrently executing application process.
530
Installation Guide
RRE
relational database (RDB). A database that can be perceived as a set of tables and manipulated in accordance with the relational model of data. relational database management system (RDBMS). A collection of hardware and software that organizes and provides access to a relational database. relational database name (RDBNAM). A unique identifier for an RDBMS within a network. In DB2, this must be the value in the LOCATION column of table SYSIBM.LOCATIONS in the CDB. DB2 publications refer to the name of another RDBMS as a LOCATION value or a location name. relationship. A defined connection between the rows of a table or the rows of two tables. A relationship is the internal representation of a referential constraint. relative byte address (RBA). The offset of a data record or control interval from the beginning of the storage space that is allocated to the data set or file to which it belongs. remigration. The process of returning to a current release of DB2 following a fallback to a previous release. This procedure constitutes another migration process. remote attach request. A request by a remote location to attach to the local DB2 subsystem. Specifically, the request that is sent is an SNA Function Management Header 5. remote subsystem. Any RDBMS, except the local subsystem, with which the user or application can communicate. The subsystem need not be remote in any physical sense, and might even operate on the same processor under the same MVS system. REORG pending (REORP). A condition that restricts SQL access and most utility access to an object that must be reorganized. REORP. REORG pending.
resource allocation. The part of plan allocation that deals specifically with the database resources. resource control table (RCT). A construct of the CICS attachment facility, created by site-provided macro parameters, that defines authorization and access attributes for transactions or transaction groups. resource definition online. A CICS feature that you use to define CICS resources online without assembling tables. resource limit facility (RLF). A portion of DB2 code that prevents dynamic manipulative SQL statements from exceeding specified time limits. The resource limit facility is sometimes called the governor. resource limit specification table. A site-defined table that specifies the limits to be enforced by the resource limit facility. restart pending (RESTP). A restrictive state of a page set or partition that indicates that restart (backout) work needs to be performed on the object. All access to the page set or partition is denied except for access by the: RECOVER POSTPONED command Automatic online backout (which DB2 invokes after restart if the system parameter LBACKOUT=AUTO) RESTP. Restart pending. result table. The set of rows that are specified by a SELECT statement. RID pool. Record identifier pool. right outer join. The result of a join operation that includes the matched rows of both tables that are being joined and preserves the unmatched rows of the second join operand. See also join. RLF. Resource limit facility. RMID. Resource manager identifier. RO. Read-only access.
repeatable read (RR). The isolation level that provides maximum protection from other executing application programs. When an application program executes with repeatable read protection, rows referenced by the program cannot be changed by other programs until the program reaches a commit point. request commit. The vote that is submitted to the prepare phase if the participant has modified data and is prepared to commit or roll back. requester. The source of a request to a remote RDBMS, the system that requests the data. A requester is sometimes called an application requester (AR).
rollback. The process of restoring data changed by SQL statements to the state at its last commit point. All locks are freed. Contrast with commit. root page. The page of an index page set that follows the first index space map page. A root page is the highest level (or the beginning point) of the index. row. The horizontal component of a table. A row consists of a sequence of values, one for each column of the table. RRE. Residual recovery entry (IMS).
Glossary
531
RS
special register
RS. Read stability. RTT. Resource translation table. RRSAF. Recoverable Resource Manager Services attachment facility. RRSAF is a DB2 subcomponent that uses OS/390 Transaction Management and Recoverable Resource Manager Services to coordinate resource commitment between DB2 and all other resource managers that also use OS/390 RRS in an OS/390 system.
session protocols. The available set of SNA communication requests and responses. shared lock. A lock that prevents concurrently executing application processes from changing data, but not from reading data. Contrast with exclusive lock. short string. A string whose actual length, or a varying-length string whose maximum length, is 255 bytes (or 127 double-byte characters) or less. Regardless of length, a LOB string is not a short string. sign-on. A request that is made on behalf of an individual CICS or IMS application process by an attachment facility to enable DB2 to verify that it is authorized to use DB2 resources. simple page set. A nonpartitioned page set. A simple page set initially consists of a single data set (page set piece). If and when that data set is extended to 2 GB, another data set is created, and so on up to a total of 32 data sets. DB2 considers the data sets to be a single contiguous linear address space containing a maximum of 64 GB. Data is stored in the next available location within this address space without regard to any partitioning scheme. simple table space. A table space that is neither partitioned nor segmented. single-byte character set (SBCS). A set of characters in which each character is represented by a single byte. Contrast with double-byte character set. SMF. System management facility. SMP/E. System Modification Program/Extended. SMS. Storage Management Subsystem. SNA. Systems Network Architecture.
S
SBCS. Single-byte character set. scalar function. An SQL operation that produces a single value from another value and is expressed as a function name, followed by a list of arguments that are enclosed in parentheses. Contrast with column function. SDWA. System diagnostic work area. search condition. A criterion for selecting rows from a table. A search condition consists of one or more predicates. secondary authorization ID. An authorization ID that has been associated with a primary authorization ID by an authorization exit routine. segmented table space. A table space that is divided into equal-sized groups of pages called segments. Segments are assigned to tables so that rows of different tables are never stored in the same segment. self-referencing constraint. A referential constraint that defines a relationship in which a table is a dependent of itself. self-referencing table. A table with a self-referencing constraint. sequential data set. A non-DB2 data set whose records are organized on the basis of their successive physical positions, such as on magnetic tape. Several of the DB2 database utilities require sequential data sets. server. A functional unit that provides services to one or more clients over a network. In the DB2 environment, a server is the target for a request from a remote RDBMS and is the RDBMS that provides the data. A server is sometimes also called an application server (AS). service request block. A unit of work that is scheduled to execute in another address space. session. A link between two nodes in a VTAM network.
SNA network. The part of a network that conforms to the formats and protocols of Systems Network Architecture (SNA). sourced function. A function that is implemented by another built-in or user-defined function that is already known to the database manager. This function can be a scalar function or a column (aggregating) function; it returns a single value from a set of values (for example, MAX or AVG). Contrast with external function and built-in function. source program. A set of host language statements and SQL statements that is processed by an SQL precompiler. special register. A storage area that DB2 defines for an application process to use for storing information that
532
Installation Guide
SPUFI
can be referenced in SQL statements. Examples of special registers are USER and CURRENT DATE. SPUFI. SQL Processor Using File Input. SQL. Structured Query Language. SQL authorization ID (SQL ID). The authorization ID that is used for checking dynamic SQL statements in some situations. SQL communication area (SQLCA). A structure that is used to provide an application program with information about the execution of its SQL statements. SQL descriptor area (SQLDA). A structure that describes input variables, output variables, or the columns of a result table. SQL processing conversation. Any conversation that requires access of DB2 data, either through an application or by dynamic query requests. SQL Processor Using File Input (SPUFI). SQL Processor Using File Input. A facility of the TSO attachment subcomponent that enables the DB2I user to execute SQL statements without embedding them in an application program. SQLCA. SQL communication area. SQLDA. SQL descriptor area. SQL/DS. Structured Query Language/Data System. This product is now obsolete and has been replaced by DB2 for VSE & VM. SRB. Service request block. SSI. Subsystem interface (MVS). SSM. Subsystem member. stand-alone. An attribute of a program that means it is capable of executing separately from DB2, without using DB2 services.
static SQL. SQL statements, embedded within a program, that are prepared during the program preparation process (before the program is executed). After being prepared, the SQL statement does not change (although values of host variables that are specified by the statement might change). storage group. A named set of DASD volumes on which DB2 data can be stored. string. See character string or graphic string. Structured Query Language (SQL). A standardized language for defining and manipulating data in a relational database. subcomponent. A group of closely related DB2 modules that work together to provide a general function. subpage. The unit into which a physical index page can be divided. subquery. A SELECT statement within the WHERE or HAVING clause of another SQL statement; a nested SQL statement. subselect. That form of a query that does not include ORDER BY clause, UPDATE clause, or UNION operators. subsystem. A distinct instance of a relational database management system (RDBMS). sync point. See commit point. synonym. In SQL, an alternative name for a table or view. Synonyms can only be used to refer to objects at the subsystem in which the synonym is defined. system administrator. The person at a computer installation who designs, controls, and manages the use of the computer system. system agent. A work request that DB2 creates internally such as prefetch processing, deferred writes, and service tasks. system conversation. The conversation that two DB2 subsystems must establish to process system messages before any distributed processing can begin. system diagnostic work area (SDWA). The data that is recorded in a SYS1.LOGREC entry that describes a program or hardware error. System Modification Program/Extended (SMP/E). A tool for making software changes in programming systems (such as DB2) and for controlling those changes.
# # # # # # # #
star join. A method of joining a dimension column of a fact table to the key column of the corresponding dimension table. See also join, dimension, and star schema. star schema. The combination of a fact table (which contains most of the data) and a number of dimension tables. See also star join, dimension, and dimension table. statement string. For a dynamic SQL statement, the character string form of the statement.
Glossary
533
unique index
Systems Network Architecture (SNA). The description of the logical structure, formats, protocols, and operational sequences for transmitting information through and controlling the configuration and operation of networks. SYS1.DUMPxx data set. A data set that contains a system dump. SYS1.LOGREC. A service aid that contains important information about program and hardware errors.
three-part name. The full name of a table, view, or alias. It consists of a location name, authorization ID, and an object name, separated by a period. time. A three-part value that designates a time of day in hours, minutes, and seconds. time duration. A decimal integer that represents a number of hours, minutes, and seconds. timeout. Abnormal termination of either the DB2 subsystem or of an application because of the unavailability of resources. Installation specifications are set to determine both the amount of time DB2 is to wait for IRLM services after starting, and the amount of time IRLM is to wait if a resource that an application requests is unavailable. If either of these time specifications is exceeded, a timeout is declared. Time-Sharing Option (TSO). An option in MVS that provides interactive time sharing from remote terminals. timestamp. A seven-part value that consists of a date and time. The timestamp is expressed in years, months, days, hours, minutes, seconds, and microseconds. TMP. Terminal Monitor Program. to-do. A state of a unit of recovery that indicates that the unit of recovery's changes to recoverable DB2 resources are indoubt and must either be applied to the DASD media or backed out, as determined by the commit coordinator. trace. A DB2 facility that provides the ability to monitor and collect DB2 monitoring, auditing, performance, accounting, statistics, and serviceability (global) data. TSO. Time-Sharing Option. TSO attachment facility. A DB2 facility consisting of the DSN command processor and DB2I. Applications that are not written for the CICS or IMS environments can run under the TSO attachment facility.
T
table. A named data object consisting of a specific number of columns and some number of unordered rows. See also base table or temporary table. table check constraint. A user-defined constraint that specifies the values that specific columns of a base table can contain. table space. A page set that is used to store the records in one or more tables. table space set. A set of table spaces and partitions that should be recovered together for one of these reasons: Each of them contains a table that is a parent or descendent of a table in one of the others. The set contains a base table and associated auxiliary tables. A table space set can contain both types of relationships. task control block (TCB). A control block that is used to communicate information about tasks within an address space that are connected to DB2. An address space can support many task connections (as many as one per task), but only one address space connection. See also address space connection. TCB. Task control block (MVS).
# # # # # # # #
temporary table. A table that holds temporary data; for example, temporary tables are useful for holding or sorting intermediate results from queries that contain a large number of rows. The two kinds of temporary table, which are created by different SQL statements, are the created temporary table and the declared temporary table. Contrast with result table. See also created temporary table and declared temporary table. thread. The DB2 structure that describes an application's connection, traces its progress, processes resource functions, and delimits its accessibility to DB2 resources and services. Most DB2 functions execute under a thread structure. See also allied thread and database access thread.
U
UDF. User-defined function. undo. A state of a unit of recovery that indicates that the changes that the unit of recovery made to recoverable DB2 resources must be backed out. UNION. An SQL operation that combines the results of two select statements. UNION is often used to merge lists of values that are obtained from several tables. unique index. An index which ensures that no identical key values are stored in a table.
534
Installation Guide
unique constraint
XRF
unique constraint. An SQL rule that no two values in a primary key, or in the key of a unique index, can be the same. unlock. The act of releasing an object or system resource that was previously locked and returning it to general availability within DB2. URE. Unit of recovery element. URID (unit of recovery ID). The LOGRBA of the first log record for a unit of recovery. The URID also appears in all subsequent log records for that unit of recovery. user-defined function (UDF). A function that is defined to DB2 using the CREATE FUNCTION statement and that can be referenced thereafter in SQL statements. A user-defined function can be either an external function or a sourced function. Contrast with built-in function. UT. Utility-only access.
A version of a LOB is a copy of a LOB value at a point in time. The version number for a LOB is stored in the auxiliary index entry for the LOB. view. An alternative representation of data from one or more tables. A view can include all or some of the columns that are contained in tables on which it is defined. Virtual Storage Access Method (VSAM). An access method for direct or sequential processing of fixed- and varying-length records on direct access devices. The records in a VSAM data set or file can be organized in logical sequence by a key field (key sequence), in the physical sequence in which they are written on the data set or file (entry-sequence), or by relative-record number. Virtual Telecommunications Access Method (VTAM). An IBM licensed program that controls communication and the flow of data in an SNA network. VSAM. Virtual storage access method. VTAM. Virtual Telecommunication Access Method (MVS).
V
value. The smallest unit of data that is manipulated in SQL. varying-length string. A character or graphic string whose length varies within set limits. Contrast with fixed-length string. version. A member of a set of similar programs, DBRMs, packages, or LOBs. A version of a program is the source code that is produced by precompiling the program. The program version is identified by the program name and a timestamp (consistency token). A version of a DBRM is the DBRM that is produced by precompiling a program. The DBRM version is identified by the same program name and timestamp as a corresponding program version. A version of a package is the result of binding a DBRM within a particular database system. The package version is identified by the same program name and consistency token as the DBRM.
W
WLM application environment. An MVS Workload Manager attribute that is associated with one or more stored procedures. The WLM application environment determines the address space in which a given DB2 stored procedure runs. write to operator (WTO). An optional user-coded service that allows a message to be written to the system console operator informing the operator of errors and unusual system conditions that may need to be corrected. WTO. Write to operator. WTOR. Write to operator (WTO) with reply.
X
XRF. Extended recovery facility.
Glossary
535
536
Installation Guide
Bibliography
DB2 Universal Database Server for OS/390 Version 6 Product Libraries: DB2 Universal Database for OS/390 DB2 Administration Guide, SC26-9003 DB2 Application Programming and SQL Guide, SC26-9004 DB2 Application Programming Guide and Reference for Java, SC26-9018 DB2 ODBC Guide and Reference, SC26-9005 DB2 Command Reference, SC26-9006 DB2 Data Sharing: Planning and Administration, SC26-9007 DB2 Data Sharing Quick Reference Card, SX26-3843 DB2 Diagnosis Guide and Reference, LY36-3736 DB2 Diagnostic Quick Reference Card, LY36-3737 DB2 Image, Audio, and Video Extenders Administration and Programming, SC26-9650 DB2 Installation Guide, GC26-9008 DB2 Licensed Program Specifications, GC26-9009 DB2 Messages and Codes, GC26-9011 DB2 Master Index, SC26-9010 DB2 Reference for Remote DRDA Requesters and Servers, SC26-9012 DB2 Reference Summary, SX26-3844 DB2 Release Planning Guide, SC26-9013 DB2 SQL Reference, SC26-9014 DB2 Text Extender Administration and Programming, SC26-9651 DB2 Utility Guide and Reference, SC26-9015 DB2 What's New? GC26-9017 DB2 Program Directory, GI10-8182 DB2 Administration Tool DB2 Administration Tool for OS/390 User's Guide, SC26-9847 DB2 Buffer Pool Tool DB2 Buffer Pool Tool for OS/390 User's Guide and Reference, SC26-9306 DB2 DataPropagator DB2 Replication Guide and Reference, SC26-9642 Net.Data for OS/390 The following books are available at
# http://www.ibm.com/software/net.data/library.html:
Net.Data Library: Administration and Programming Guide for OS/390 Net.Data Library: Language Environment Interface Reference Net.Data Library: Messages and Codes Net.Data Library: Reference DB2 PM for OS/390 DB2 PM for OS/390 Batch User's Guide, SC26-9167 DB2 PM for OS/390 Command Reference, SC26-9166 DB2 PM for OS/390 General Information, GC26-9172 DB2 PM for OS/390 Installation and Customization, SC26-9171 DB2 PM for OS/390 Messages, SC26-9169 DB2 PM for OS/390 Online Monitor User's Guide, SC26-9168 DB2 PM for OS/390 Report Reference Volume 1, SC26-9164 DB2 PM for OS/390 Report Reference Volume 2, SC26-9165 DB2 PM for OS/390 Using the Workstation Online Monitor, SC26-9170 DB2 PM for OS/390 Program Directory, GI10-8183 Query Management Facility Query Management Facility: Developing QMF Applications, SC26-9579 Query Management Facility: Getting Started with QMF on Windows, SC26-9582 Query Management Facility: High Peformance Option User's Guide for OS/390, SC26-9581 Query Management Facility: Installing and Managing QMF on OS/390, GC26-9575 Query Management Facility: Installing and Managing QMF on Windows, GC26-9583 Query Management Facility: Introducing QMF, GC26-9576 Query Management Facility: Messages and Codes, GC26-9580 Query Management Facility: Reference, SC26-9577 Query Management Facility: Using QMF, SC26-9578
537
Ada/370 IBM Ada/370 Language Reference, SC09-1297 IBM Ada/370 Programmer's Guide, SC09-1414 IBM Ada/370 SQL Module Processor for DB2 Database Manager User's Guide, SC09-1450 APL2 APL2 Programming Guide, SH21-1072 APL2 Programming: Language Reference, SH21-1061 APL2 Programming: Using Structured Query Language (SQL), SH21-1057 AS/400 DB2 for OS/400 SQL Programming, SC41-4611 DB2 for OS/400 SQL Reference, SC41-4612 BASIC IBM BASIC/MVS Language Reference, GC26-4026 IBM BASIC/MVS Programming Guide, SC26-4027 BookManager READ/MVS BookManager READ/MVS V1R3: Installation Planning & Customization, SC38-2035 C/370 IBM SAA AD/Cycle C/370 Programming Guide, SC09-1841 IBM SAA AD/Cycle C/370 Programming Guide for Language Environment/370, SC09-1840 IBM SAA AD/Cycle C/370 User's Guide, SC09-1763 SAA CPI C Reference, SC09-1308 Character Data Representation Architecture Character Data Representation Architecture Overview, GC09-2207 Character Data Representation Architecture Reference and Registry, SC09-2190 CICS/ESA CICS/ESA Application Programming Guide, SC33-1169 CICS for MVS/ESA Application Programming Reference, SC33-1170 CICS for MVS/ESA CICS-RACF Security Guide, SC33-1185 CICS for MVS/ESA CICS-Supplied Transactions, SC33-1168 CICS for MVS/ESA Customization Guide, SC33-1165 CICS for MVS/ESA Data Areas, LY33-6083 CICS for MVS/ESA Installation Guide, SC33-1163 CICS for MVS/ESA Intercommunication Guide, SC33-1181
CICS for MVS/ESA Messages and Codes, GC33-1177 CICS for MVS/ESA Operations and Utilities Guide, SC33-1167 CICS/ESA Performance Guide, SC33-1183 CICS/ESA Problem Determination Guide, SC33-1176 CICS for MVS/ESA Resource Definition Guide, SC33-1166 CICS for MVS/ESA System Definition Guide, SC33-1164 CICS for MVS/ESA System Programming Reference, GC33-1171 CICS/MVS CICS/MVS Application Programmer's Reference, SC33-0512 CICS/MVS Facilities and Planning Guide, SC33-0504 CICS/MVS Installation Guide, SC33-0506 CICS/MVS Operations Guide, SC33-0510 CICS/MVS Problem Determination Guide, SC33-0516 CICS/MVS Resource Definition (Macro), SC33-0509 CICS/MVS Resource Definition (Online), SC33-0508 IBM C/C++ for MVS/ESA IBM C/C++ for MVS/ESA Library Reference, SC09-1995 IBM C/C++ for MVS/ESA Programming Guide, SC09-1994 IBM COBOL IBM COBOL Language Reference, SC26-4769 IBM COBOL for MVS & VM Programming Guide, SC26-4767 Conversion Guide IMS-DB and DB2 Migration and Coexistence Guide, GH21-1083 Cooperative Development Environment CoOperative Development Environment/370: Debug Tool, SC09-1623 Data Extract (DXT) Data Extract Version 2: General Information, GC26-4666 Data Extract Version 2: Planning and Administration Guide, SC26-4631 DataPropagator NonRelational DataPropagator NonRelational MVS/ESA Administration Guide, SH19-5036 DataPropagator NonRelational MVS/ESA Reference, SH19-5039
538
Installation Guide
Data Facility Data Set Services Data Facility Data Set Services: User's Guide and Reference, SC26-4388 Database Design DB2 Design and Development Guide, Gabrielle Wiorkowski and David Kull, Addison Wesley, ISBN 0-20158-049-8 Handbook of Relational Database Design, C. Fleming and B. Von Halle, Addison Wesley, ISBN 0-20111-434-8 DataHub IBM DataHub General Information, GC26-4874 DB2 Connect DB2 Connect Windows NT: DB2 Connect GC09-2830 DB2 Connect Enterprise Edition for OS/2 and Quick Beginnings, GC09-2828 Personal Edition Quick Beginnings, User's Guide, SC09-2838
DFSMS/MVS Storage Management Library: Implementing System-Managed Storage, SC263123 DFSMS/MVS: Macro Instructions for Data Sets, SC26-4913 DFSMS/MVS: Managing Catalogs, SC26-4914 DFSMS/MVS: Program Management, SC26-4916 DFSMS/MVS: Storage Administration Reference for DFSMSdfp, SC26-4920 DFSMS/MVS: Using Advanced Services, SC26-4921 DFSMS/MVS: Utilities, SC26-4926 MVS/DFP: Using Data Sets, SC26-4749 DFSORT DFSORT Application Programming: Guide, SC33-4035 Distributed Relational Database Data Stream and OPA Reference, SC31-6806 IBM SQL Reference, SC26-8416 Open Group Technical Standard (the Open Group presently makes the following books available through its Web site at http://www.opengroup.org): DRDA Volume 1: Distributed Relational Database Architecture (DRDA), ISBN 1-85912-295-7
DB2 Server for VSE & VM DB2 Server for VM: DBS Utility, SC09-2394 DB2 Server for VSE: DBS Utility, SC09-2395 DB2 Universal Database (UDB) DB2 UDB Administration Guide Volume 1: Design and Implementation, SC09-2839 DB2 UDB Administration Guide Volume 2: Performance, SC09-2840 DB2 UDB Administrative API Reference, SC09-2841 DB2 UDB Application Building Guide, SC09-2842 DB2 UDB Application Development Guide, SC09-2845 DB2 UDB Call Level Interface Guide and Reference, SC09-2843 DB2 UDB SQL Getting Started, SC09-2856 DB2 UDB SQL Reference Volume 1, SC09-2847 DB2 UDB SQL Reference Volume 2, SC09-2848 Device Support Facilities Device Support Facilities User's Guide and Reference, GC35-0033 DFSMS/MVS DFSMS/MVS: Access Method Services for the Integrated Catalog, SC26-4906 DFSMS/MVS: Access Method Services for VSAM Catalogs, SC26-4905 DFSMS/MVS: Administration Reference for DFSMSdss, SC26-4929 DFSMS/MVS: DFSMShsm Managing Your Own Data, SH21-1077 DFSMS/MVS: Diagnosis Reference for DFSMSdfp, LY27-9606
# # #
DRDA Version 2 Volume 2: Formatted Data Object Content Architecture, available only on Web DRDA Volume 3: Distributed Database Management (DDM) Architecture, ISBN 1-85912-206-X Domain Name System DNS and BIND, Third Edition, Paul Albitz and Cricket Liu, O'Reilly, SR23-8771 Education IBM Dictionary of Computing, McGraw-Hill, ISBN 0-07031-489-6 1999 IBM All-in-One Education and Training Catalog, GR23-8105 Enterprise System/9000 and Enterprise System/3090 Enterprise System/9000 and Enterprise System/3090 Processor Resource/System Manager Planning Guide, GA22-7123 High Level Assembler High Level Assembler for MVS and VM and VSE Language Reference, SC26-4940 High Level Assembler for MVS and VM and VSE Programmer's Guide, SC26-4941
Bibliography
539
Parallel Sysplex Library OS/390 Parallel Sysplex Application Migration, GC28-1863 System/390 MVS Sysplex Hardware and Software Migration, GC28-1862 OS/390 Parallel Sysplex Overview: An Introduction to Data Sharing and Parallelism, GC28-1860 OS/390 Parallel Sysplex Systems Management, GC28-1861 OS/390 Parallel Sysplex Test Report, GC28-1963 System/390 9672/9674 System Overview, GA22-7148 ICSF/MVS ICSF/MVS General Information, GC23-0093 IMS/ESA IMS Batch Terminal Simulator General Information, GH20-5522 IMS/ESA Administration Guide: System, SC26-8013 IMS/ESA Administration Guide: Transaction Manager, SC26-8731 IMS/ESA Application Programming: Database Manager, SC26-8727 IMS/ESA Application Programming: Design Guide, SC26-8016 IMS/ESA Application Programming: Transaction Manager, SC26-8729 IMS/ESA Customization Guide, SC26-8020 IMS/ESA Installation Volume 1: Installation and Verification, SC26-8023 IMS/ESA Installation Volume 2: System Definition and Tailoring, SC26-8024 IMS/ESA Messages and Codes, SC26-8028 IMS/ESA Operator's Reference, SC26-8030 IMS/ESA Utilities Reference: System, SC26-8035 ISPF ISPF V4 Dialog Developer's Guide and Reference, SC34-4486 ISPF V4 Messages and Codes, SC34-4450 ISPF V4 Planning and Customizing, SC34-4443 ISPF V4 User's Guide, SC34-4484 Language Environment Debug Tool User's Guide and Reference, SC09-2137 National Language Support National Language Support Reference Volume 2, SE09-8002 NetView NetView Installation and Administration Guide, SC31-8043 NetView User's Guide, SC31-8056
ODBC Microsoft ODBC 3.0 Programmer's Reference and SDK Guide, Microsoft Press, ISBN 1-55615-658-8 OS/390 OS/390 C/C++ Programming Guide, SC09-2362 OS/390 C/C++ Run-Time Library Reference, SC28-1663 OS/390 C/C++ User's Guide, SC09-2361 OS/390 eNetwork Communications Server: IP Configuration, SC31-8513 OS/390 Hardware Configuration Definition Planning, GC28-1750 OS/390 Information Roadmap, GC28-1727 OS/390 Introduction and Release Guide, GC28-1725 OS/390 JES2 Initialization and Tuning Guide, SC28-1791 OS/390 JES3 Initialization and Tuning Guide, SC28-1802 OS/390 Language Environment for OS/390 & VM Concepts Guide, GC28-1945 OS/390 Language Environment for OS/390 & VM Customization, SC28-1941 OS/390 Language Environment for OS/390 & VM Debugging Guide, SC28-1942 OS/390 Language Environment for OS/390 & VM Programming Guide, SC28-1939 OS/390 Language Environment for OS/390 & VM Programming Reference, SC28-1940 OS/390 MVS Diagnosis: Procedures, LY28-1082 OS/390 MVS Diagnosis: Reference, SY28-1084 OS/390 MVS Diagnosis: Tools and Service Aids, LY28-1085 OS/390 MVS Initialization and Tuning Guide, SC28-1751 OS/390 MVS Initialization and Tuning Reference, SC28-1752 OS/390 MVS Installation Exits, SC28-1753 OS/390 MVS JCL Reference, GC28-1757 OS/390 MVS JCL User's Guide, GC28-1758 OS/390 MVS Planning: Global Resource Serialization, GC28-1759 OS/390 MVS Planning: Operations, GC28-1760 OS/390 MVS Planning: Workload Management, GC28-1761 OS/390 MVS Programming: Assembler Services Guide, GC28-1762 OS/390 MVS Programming: Assembler Services Reference, GC28-1910 OS/390 MVS Programming: Authorized Assembler Services Guide, GC28-1763 OS/390 MVS Programming: Authorized Assembler Services Reference, Volumes 1-4, GC28-1764, GC28-1765, GC28-1766, GC28-1767 OS/390 MVS Programming: Callable Services for High-Level Languages, GC28-1768 OS/390 MVS Programming: Extended Addressability Guide, GC28-1769
540
Installation Guide
OS/390 MVS Programming: Sysplex Services Guide, GC28-1771 OS/390 MVS Programming: Sysplex Services Reference, GC28-1772 OS/390 MVS Programming: Workload Management Services, GC28-1773 OS/390 MVS Routing and Descriptor Codes, GC28-1778 OS/390 MVS Setting Up a Sysplex, GC28-1779 OS/390 MVS System Codes, GC28-1780 OS/390 MVS System Commands, GC28-1781 OS/390 MVS System Messages Volume 1, GC28-1784 OS/390 MVS System Messages Volume 2, GC28-1785 OS/390 MVS System Messages Volume 3, GC28-1786 OS/390 MVS System Messages Volume 4, GC28-1787 OS/390 MVS System Messages Volume 5, GC28-1788 OS/390 MVS Using the Subsystem Interface, SC28-1789 OS/390 Security Server (RACF) Auditor's Guide, SC28-1916 OS/390 Security Server (RACF) Command Language Reference, SC28-1919 OS/390 Security Server (RACF) General User's Guide, SC28-1917 OS/390 Security Server (RACF) Introduction, GC28-1912 OS/390 Security Server (RACF) Macros and Interfaces, SK2T-6700 (OS/390 Collection Kit ), SK27-2180 (OS/390 Security Server Information Package ) OS/390 Security Server (RACF) Security Administrator's Guide, SC28-1915 OS/390 Security Server (RACF) System Programmer's Guide, SC28-1913 OS/390 SMP/E Reference, SC28-1806 OS/390 SMP/E User's Guide, SC28-1740 OS/390 RMF User's Guide, SC28-1949 OS/390 TSO/E CLISTS, SC28-1973 OS/390 TSO/E Command Reference, SC28-1969 OS/390 TSO/E Customization, SC28-1965 OS/390 TSO/E Messages, GC28-1978 OS/390 TSO/E Programming Guide, SC28-1970 OS/390 TSO/E Programming Services, SC28-1971 OS/390 TSO/E User's Guide, SC28-1968 OS/390 DCE Administration Guide, SC28-1584 OS/390 DCE Introduction, GC28-1581 OS/390 DCE Messages and Codes, SC28-1591 OS/390 UNIX System Services Command Reference, SC28-1892 OS/390 UNIX System Services Planning, SC28-1890 OS/390 UNIX System Services User's Guide, SC28-1891 OS/390 UNIX System Services Programming: Assembler Callable Services Reference, SC28-1899
j PL/I for MVS & VM IBM PL/I MVS & VM Language Reference, SC26-3114 IBM PL/I MVS & VM Programming Guide, SC26-3113 OS PL/I OS PL/I Programming Language Reference, SC26-4308 OS PL/I Programming Guide, SC26-4307 Prolog IBM SAA AD/Cycle Prolog/MVS & VM Programmer's Guide, SH19-6892 Remote Recovery Data Facility Remote Recovery Data Facility Program Description and Operations, LY37-3710 Storage Management DFSMS/MVS Storage Management Library: Implementing System-Managed Storage, SC26-3123 MVS/ESA Storage Management Library: Leading a Storage Administration Group, SC26-3126 MVS/ESA Storage Management Library: Managing Data, SC26-3124 MVS/ESA Storage Management Library: Managing Storage Groups, SC26-3125 MVS Storage Management Library: Storage Management Subsystem Migration Planning Guide, SC26-4659 System/370 and System/390 ESA/370 Principles of Operation, SA22-7200 ESA/390 Principles of Operation, SA22-7201 System/390 MVS Sysplex Hardware and Software Migration, GC28-1210 System Network Architecture (SNA) SNA Formats, GA27-3136 SNA LU 6.2 Peer Protocols Reference, SC31-6808 SNA Transaction Programmer's Reference Manual for LU Type 6.2, GC30-3084 SNA/Management Services Alert Implementation Guide, GC31-6809 TCP/IP IBM TCP/IP for MVS: Administration Guide, IBM TCP/IP for MVS: IBM TCP/IP for MVS: SC31-7132 Customization & SC31-7134 Diagnosis Guide, LY43-0105 Messages and Codes,
Bibliography
541
IBM TCP/IP for MVS: Planning and Migration Guide, SC31-7189 VS COBOL II VS COBOL II Application Programming Guide for MVS and CMS, SC26-4045 VS COBOL II Application Programming: Language Reference, GC26-4047 VS COBOL II Installation and Customization for MVS, SC26-4048 VS FORTRAN VS FORTRAN Version 2: Language and Library Reference, SC26-4221
VS FORTRAN Version 2: Programming Guide for CMS and MVS, SC26-4222 VTAM Planning for NetView, NCP, and VTAM, SC31-8063 VTAM for MVS/ESA Diagnosis, LY43-0069 VTAM for MVS/ESA Messages and Codes, SC31-6546 VTAM for MVS/ESA Network Implementation Guide, SC31-6548 VTAM for MVS/ESA Operation, SC31-6549 VTAM for MVS/ESA Programming, SC31-6550 VTAM for MVS/ESA Programming for LU 6.2, SC31-6551 VTAM for MVS/ESA Resource Definition Reference, SC31-6552
542
Installation Guide
Index Numerics
32 KB buffering 271 4 KB buffering 271 APPLICATION LOAD field of panel DSNTIPT 122 application program performance 503 APPLY job 78 archive log cataloging options 110 data set 282 DASD requirements 44 prefix 118 dual logging 116 ARCHIVE LOG FREQ field of panel DSNTIPL 208 ARCHIVE LOG RACF field of panel DSNTIPP 199 ART/ORT ESCAPE CHARACTER field of panel DSNTIPZ 230 ASCII conversion table 500 ASCII CODED CHARACTER SET field of panel DSNTIPF 179 ASSEMBLER field of panel DSNTIPG 136 ASSISTANT field of panel DSNTIPK 115 ATCSTRxx member of SYS1.VTAMLST library ATNLOSS option of APPL statement 454 attachment facility CICS 269, 306 See also CICS IMS 403 See also IMS installation 269, 403 migration 306 TSO 262, 303 See also TSO AUDIT TRACE field of panel DSNTIPN 161 AUTH AT HOP SITE field of panel DSNTIP5 224 AUTH MEMBER field of panel DSNTIPM 205 AUTH option APPL statement 454 DSNCRCT macro TYPE=ENTRY 433 AUTH SEQUENCE field of panel DSNTIPM 206 AUTHID column of MODESELECT table 470 AUTHID column USERNAMES catalog table 495
A
ACBNAME option of APPL statement 455 ACCEPT job 66, 79 active log data set 282 DASD requirements 39 prefix 118 dual logging 116 installation 256 size estimating 39, 142 address space allied agent 47 database services description 46 working storage calculation 58, 59 DDF 46 DSN1DIST 46 IRLM 46 system services 46 ADSNDKF library 64 ADSNENU library 64 ADSNIVPD library 64 ADSNLOAD library 64 ADSNMACS library 64 ADXRLOAD library 64 ADXRSAMP library 64 AIHSCLSB library 64 AIHSMODB library 64 AIHSSMPB library 64 alias migration considerations 295 allied agent address space 47 allocation job 75, 76 ALLOCATION UNITS field of panel DSNTIPA 209 AMDPRECT module 252 APN option of DSNMAPN macro 408, 410 APPC option of APPL statement 454 APPL REGISTRATION TABLE field of panel DSNTIPZ 231 APPL statement 452 example 452 option descriptions 452 options DSESLIM 476 LUNAME 485
464
543
authorization ID RACF 269 TSO 269 AUTO BIND field of panel DSNTIPO 170, 327 AUTO START field of panel DSNTIPI 189 automatic recall 168 AUTOSES option of APPL statement 452
B
BACKOUT DURATION field of panel DSNTIPN 165 BIND NEW PACKAGE field of panel DSNTIPP 201 binding installation 273 migration DCLGEN 316 SPUFI 316 remote package plan name for 470 relation to character conversion 509 bit data columns 503 BLOCK SIZE field of panel DSNTIPA 211 bootstrap data set (BSDS) 309 See also BSDS (bootstrap data set) BP0BP25 fields of panel DSNTIP1 156 BP16K0BP16K9 fields of panel DSNTIP6 159 BP26BP49 fields of panel DSNTIP2 157 BP32KBP32K9 fields of panel DSNTIP6 159 BP8K0BP8K9 fields of panel DSNTIP6 159 BSDS (bootstrap data set) adding a second 309 installation 256 space requirement 41 buffer pool storage requirement 50 VTAM IOBUF storage requirements 474
C
C fields of panel DSNTIPU 127, 129 C++ fields of panel DSNTIPU 131, 132 CACHE DYNAMIC SQL field of panel DSNTIP4 185 capturing changed data log data set size 41 CATALOG ALIAS field of panel DSNTIPA2 109 CATALOG DATA field of panel DSNTIPA 210
catalog tables SYSPROCEDURES migration considerations 298 SYSSTRINGS description 507 governing rules 508 catalog, DB2 DASD requirements 38 installing 256 catalog, integrated catalog facility 256 See also integrated catalog facility CATMAINT utility 314 CCSID (coded character set identifier) changing 499 code page 503 definition 500 installation option for 178 specifying 500 CD-ROM, books on 8 CDB (communications database) creating during installation 273, 274 description 458, 493 dropping while DDF is active 471 IPNAMES table 444, 495 See also SYSIBM LOCATIONS table 444, 459, 463, 494 See also SYSIBM LULIST table 458, 463 See also SYSIBM LUMODES table 463 See also SYSIBM LUNAMES table 444, 460, 463 See also SYSIBM MODESELECT table 463 See also SYSIBM populating while connecting DB2 subsystems 458, 493 installing 275 updating while DDF is active 471 USERNAMES table 444, 462, 463, 495 See also SYSIBM change log inventory utility changing generic LU name 485 location name 485 LU name 485 VTAM password 485 changed data capture 41 See also capturing changed data channel-to-channel (CTC) 481 See also CTC (channel-to-channel) character conversion adding a conversion procedure 508 code page 503 code points 503
544
Installation Guide
character conversion (continued) description 499 distributed data 499 expanding conversion 504 installation procedure 503 locale definition 506 specifying 506 support for Euro currency 506 performance 503 rebinding remote packages 509 SYSIBM.SYSSTRINGS catalog table 507 character string transmitting 499 checkpoint frequency 41 CHECKPOINT FREQ field of panel DSNTIPN 164 CICS attachment facility connecting 411 commands DSNCCOM1 transaction program 420 connecting to DB2 accessing resources 421 authorization 421 authorization IDs 426 CICS V4 and CICS TS Version 1.1 411 installation 269 security 421 facilities message destination 424 resource control table 414 subtask failure snap dump 426 initialization JCL 420 migration 306, 411 operating create thread error processing 424 starting 427 starting an application 359 testing 357 using 359 planning OSCOR storage area 415 storage requirements 412 system tables program entries 418 program list table 419 system initialization table 415 transaction entries 416 table generation procedures 422 thread maximum, specifying 428, 429 CICS attachment facility 411 See also CICS
CICS COBOL II LIBRARY field of panel DSNTIPW 141 CICS COBOL LIBRARY field of panel DSNTIPW 141 CICS LOAD LIBRARY field of panel DSNTIPW 141 CICS MACRO LIBRARY field of panel DSNTIPW 141 CICS PL/I LIBRARY field of panel DSNTIPW 141 class of service, modifying 467 CLIST LIBRARY field of panel DSNTIPT 122 CLIST messages fields of panel DSNTIPC1 239 CLUSTERRATIOF column SYSINDEXES catalog table 296 SYSINDEXSTATS catalog table 296 CNOS (change number of sessions) description 476 COBOL TYPE field of panel DSNTIPY 233 code page 503 coded character set 499 CODED CHARACTER SET fields of panel DSNTIPF 178 See also CCSID (coded character set identifier) COLUMNS field of panel DSNTIPD 143 command recognition character (CRC) 405 See also CRC (command recognition character) common service area (CSA) 44 See also CSA (common service area) communications database (CDB) 443, 460 See also CDB (communications database) COMPACT DATA field of panel DSNTIPA 213 compression archive log data set 213 COMPROT option of MODEENT macro 458 connection database management systems 443, 460, 494 DB2 460, 494 systems 443 DB2I panels to ISPF installation 265 migration 305 connection exit routine installation 260 migration 312 contention for conversation 452 CONTRACT THREAD STG field of panel DSNTIPE 154 CONTROL ALL APPLICATIONS field of panel DSNTIPZ 230
Index
545
conversation contention 452 definition 447 SQL 468 See also SQL processing conversation system 460 See also system conversation conversion procedure adding 508 conversion table 499 rules for 508 CONVLIMIT column of LUMODES table CNOS negotiation 476 description 469 COORDINATOR field of panel DSNTIPK 115 COPY 1 NAME field of panel DSNTIPH 117 COPY 1 PREFIX field of panel DSNTIPH active log 117 archive log 118 COPY 2 NAME field of panel DSNTIPH 117 COPY 2 PREFIX field of panel DSNTIPH active log 118 archive log 118 CRC (command recognition character) installation 405 CROSS MEMORY field of panel DSNTIPJ 194 IRLM 46 CSA (common service area) 44, 47 CTC (channel-to-channel) considerations for MAXBFRU size 481 sample definitions for VTAM 481 SNA X'800A' sense code 481
D
DASD requirements 36 data compression 399 distributed 443 See also distributed data data compression Huffman 399 Data Facility Sort (DFSORT) 254 See also DFSORT (Data Facility Sort) data set control block size calculation 57 storage requirements 36
DATA SET NAME(MEMBER) field of panel DSNTIPA1 105 DATA SHARING field of panel DSNTIPA1 104 database DSNDB06 (DB2 catalog database) 256 See also DSNDB06 database DSNDB07 (work file database) 271 See also work file database temporary storage estimation 41 DATABASE PROTOCOL field of panel DSNTIP5 223 database services address space 46 DATABASES field panel DSNTIPD 143 panel DSNTIPE 150 DATASET STATS TIME field of panel DSNTIPN 163 DATE option of DSNHDECP macro 183 DATE FORMAT field of panel DSNTIP4 183 DB2 books online 8 DB2 Connect creating database during installation 275 storage estimation 44 DB2 GENERIC LUNAME field of panel DSNTIPR 220, 450 DB2 LOCATION NAME field of panel DSNTIPR 218 DB2 NETWORK LUNAME field of panel DSNTIPR 218 DB2 NETWORK PASSWORD field of panel DSNTIPR 218 DB2 Online Help accessing 87 copying the bookshelf list 83 customizing BookManager READ/MVS 84 exiting 89 installation 83 reading 87 searching text 88 using 87 DB2 private protocol access definition 443 setting up 443 DB2 PROC NAME field of panel DSNTIPX 226 DB2I (DB2 Interactive) connecting to ISPF installation 265 migration 305 English panels, fall back 82 Kanji panels, fall back 82
546
Installation Guide
DBCS (double-byte character set) identifiers 502 DBD (database descriptor) size 56 DBPROTOCOL migration consideration 296 DBRM LIBRARY field of panel DSNTIPT 122 DBRMLIB.DATA library data set DASD volume 112 device type 113 DSNTIJIN job 256 installing a second DB2 280, 282 naming considerations 73 DCLGEN (declarations generator) installation 350 migration 316 DDCS (data definition control support) creating database during installation 275 storage estimation 44 DDF (distributed data facility) address space 46 overview 444 DDF STARTUP OPTION field of panel DSNTIPR 217 DDF THREADS field of panel DSNTIPR 219 DDRAINL option of APPL statement 455 deadlock cycles 196 sync point rollback 426 DEADLOCK CYCLE field of panel DSNTIPJ 196 DEADLOCK TIME field of panel DSNTIPJ 196 DEALLOC PERIOD field of panel DSNTIPA 211 DECIMAL ARITHMETIC field of panel DSNTIPF 180 DECIMAL POINT IS field of panel DSNTIPF 176 DECLARATION LIBRARY field of panel DSNTIPT 122 DEF ENCODING SCHEME field of panel DSNTIPF 180 DEFAULT BUFFER POOL FOR USER DATA field of panel DSNTIP1 155 DEFAULT BUFFER POOL FOR USER INDEXES field of panel DSNTIP1 156 default database (DSNDB04) storage estimation 44 DEFER field of panel DSNTIPS 215 DEFINE CATALOG field of panel DSNTIPA2 111
deleting data sets DSNTIJDE 257 DESCRIBE FOR STATIC field of panel DSNTIPF 181 DEVICE TYPE 1 field of panel DSNTIPA 210 DEVICE TYPE 2 field of panel DSNTIPA 210 DFSESL DD statement 71, 403 DFSMS (Data Facility Storage Management Subsystem) 199 DFSMShsm (Data Facility Hierarchical Storage Manager) RECALL command 168 DFSORT (Data Facility Sort) program library 254 directory DASD requirements 38 installing 256 panel field names 97 panels 96 DISCONNECT IRLM field of panel DSNTIPJ 197 DISPLAY NET,BFRUSE command of VTAM 463 DIST SQL STR DELIMTR field of panel DSNTIPF 178 distributed data planning DB2 private protocol access 443 DRDA access 443 number of systems that can be connected 443 programming character conversion 499 testing 363 Distributed Relational Database Architecture (DRDA) 443 See also DRDA (Distributed Relational Database Architecture) distributed unit of work 443 See also DB2 private protocol access distribution libraries 64 DASD requirements 36 manage using DFSMShsm 168 DL/I BATCH TIMEOUT field of panel DSNTIPI 188 DL/I TIMEOUT field of panel DSNTIPI 192 DMINWNL option of APPL statement 453 DMINWNR option of APPL statement 453 domain name definition 487 domain name server definition 487 DPMODE option of DSNCRCT macro 435 DPMODI option of DSNCRCT macro 424
Index
547
DPROP SUPPORT field of panel DSNTIPO 172 DRDA (Distributed Relational Database Architecture) 443 DRDA access definition 443 organization application 388 setting up 443 specifying modes 468 updating 390 DRDA PORT field of panel DSNTIP5 222 DRDA RDBNAM (relational database name) See also location name description 449 DRESPL option of APPL statement 455 DSESLIM option of APPL statement CNOS negotiation 476 description 453 DSMAX field of panel DSNTIPC 236 DSMAX limit on open data sets description 57 DSN1CHKR utility migration preparation 300 DSN1COPY utility migration preparation 300 DSN1DIST address space 46 DSN3@ATH connection exit routine 260 See also connection exit routine DSN3@SGN sign-on exit routine 260 See also sign-on exit routine DSN3EPX load module 252 DSN3INI load module 252 DSN6ARVP macro 258 DSN6ENV macro 258 DSN6FAC macro 258 DSN6GRP macro 258 DSN6LOGP macro 258 DSN6SPRM macro 258 DSN6SYSP macro 258 DSN8EAE1 exit routine 399 DSN8HUFF edit routine 399 DSNBIND plan name in SYSIBM.MODESELECT table 470 DSNCONNS ISPF table 264 DSNCRCT macro description 422 specification requirements 422 TYPE=COMD 429 TYPE=DSECT 440 TYPE=ENTRY description 432 null specification (*) 434 option descriptions 433, 438
DSNCRCT macro (continued) TYPE=FINAL 439 TYPE=INIT description 423 option descriptions 424, 429 SUFFIX option 420 TYPE=POOL description 430 option descriptions 430, 431 DSNDB06 database installation job DSNTIJIN 256 DSNDBRMS ISPF table 264 DSNDDF database 443 See also CDB (communications database) DSNEMCO1 CLIST 263 DSNEPRI panel of ISPF 268 DSNETBLS data set for ISPF tables 264 DSNH migration considerations 295 DSNHASM procedure 255 DSNHC procedure 255 DSNHCOB procedure 255 DSNHCOB2 procedure 255 DSNHCPP procedure 255 DSNHCPP2 procedure 255 DSNHDECP installation 258 list of parameters 243 migration 308 DSNHFOR procedure 255 DSNHICB2 procedure 255 DSNHICOB procedure 255 DSNHPLI procedure 255 DSNHSQL procedure 255 DSNMAPN macro 408, 410 DSNPLPKN ISPF table 264 DSNTEJ1T job 508 DSNTEJxx job installation 330 migration 30, 317 DSNTESA job 349 DSNTESC job 349 DSNTESE job 350 DSNTESQ queries 302, 402 DSNTIAC subroutine calling 422 DSNTIAD sample program executes SQL statements 402 invoked by DSNTEJ1 340 run by DSNTIJTM 271, 316 DSNTIDxx member 107 DSNTIJAA job 66, 75 DSNTIJAC job 66, 79 DSNTIJAE job 66, 76 DSNTIJAL job 75, 76
548
Installation Guide
DSNTIJAP job 66, 78 DSNTIJCA job 256 DSNTIJCC job 284 DSNTIJDE job 257 DSNTIJEX job installation 260 migration 312 DSNTIJFV job 324 DSNTIJIC job installation 275 migration 302, 317 DSNTIJID job 257 DSNTIJIN job 256, 312 DSNTIJMV job 251, 309 DSNTIJPM job 292 DSNTIJRC job 66, 77 DSNTIJSE job 66 DSNTIJSG job installation 273 migration 316 DSNTIJSQ job 285 DSNTIJTC job 314 DSNTIJTM job 271, 316 DSNTIJUD job 66, 77 DSNTIJUZ job 258, 308 DSNTIJVC job 263, 304 DSNTINS0 CLIST 91, 93 DSNTINST CLIST 26, 93 DSNTIP1 installation panel 155 DSNTIP2 installation panel 157 DSNTIP4 installation panel 183 DSNTIP5 installation panel 222 DSNTIP6 installation panel 159 DSNTIP7 installation panel 148 DSNTIPA installation panel 209 DSNTIPA0 installation panel 102 DSNTIPA1 installation panel 103 DSNTIPA2 installation panel 109 DSNTIPB installation panel 247 DSNTIPC installation panel 236 DSNTIPC1 installation panel 239 DSNTIPD installation panel 143 DSNTIPE installation panel 150 DSNTIPF installation panel 175 DSNTIPG installation panel 136 DSNTIPH installation panel 117 DSNTIPI installation panel 188 DSNTIPJ installation panel 194 DSNTIPK installation panel 114 DSNTIPL installation panel 207 DSNTIPM installation panel 203 DSNTIPN installation panel 161 DSNTIPO installation panel 168 DSNTIPP installation panel 199 DSNTIPQ installation panel 133
DSNTIPR installation panel 217 DSNTIPS installation panel 215 DSNTIPT installation panel 121 DSNTIPU installation panel 127 DSNTIPW installation panel 139 DSNTIPX installation panel 226 DSNTIPY installaton panel 233 DSNTIPZ installation panel 229 DSNTNJxx jobs 66, 67 DSNTPSMP stored procedure 273 DSNUTILB entry in PPT 251 DSNUTILS stored procedure 273, 367 DSNWZP stored procedure 273 DSNYASCP entry in PPT 251 DSNZPARM list of parameters 243 dual logging specifying 116 dump data set size 44 DXRRLM00 entry in PPT 251 dynamic plan selection in CICS 435 dynamic SQL DSNTESA 400 DSNTESQ 400 programs using 402 DYNAMICRULES migration considerations 296
E
early code 69 EAS option of APPL statement 455 ECSA (extended common storage area) edit routine DSN8HUFF 399 EDM pool package size 53 plan size 53 size 53 EDMPOOL DATA SPACE SIZE field of panel DSNTIPC 237 EDMPOOL STORAGE SIZE field of panel DSNTIPC 236 ENCR option of APPL statement 455 ENCRYPTPSWDS column LUNAMES catalog table 461 END option of DSNMAPN macro description 410 installation format 408 ERLY code 69 ERRDEST option DSNCRCT macro 424 Euro currency support 506 195
Index
549
EXECUTED STMTS field of panel DSNTIPD 145 EXIT LIBRARY field of panel DSNTIPT 123 exit routine description 399 EXPLAIN PROCESSING field of panel DSNTIPO 172 extended common storage area (ECSA) extended English code page 503 extended Katakana code page 503 EXTENDED SECURITY field of panel DSNTIPR 221 external storage 35 See also storage EXTRA BLOCKS REQ field of panel DSNTIP5 223 EXTRA BLOCKS SRV field of panel DSNTIP5 223
group name field of panel DSNTIPK 114 GROUP option DSNCRCT macro 433
H
195 HAVAIL option of APPL statement 455 help online 83 Hierarchical Storage Manager (DFSMShsm) 168 See also DFSMShsm (Hierarchical Storage Manager) hiperpool storage requirement 51 Huffman compression exit routine 399
I
IBM COBOL fields of DSNTIPQ 134, 135 IBMDB2LM mode 456 IBMRDB mode 456 IBMUSER authority, establishing authorization ID IDLE THREAD TIMEOUT field of panel DSNTIPR 221, 496 IDRC 213 IEAAPFxx member of SYS1.PARMLIB DSNTIJMV job installation 253 migration 310 DSNTIPM panel 203 IEBCOPY utility 68 IEBPTPCH utility 68 IEFSSNxx member of SYS1.PARMLIB DSNTIJMV job installation 252 migration 310 DSNTIPM panel 203 IMS attachment facility 403 connecting to DB2 installation 269, 403 language interface module (DFSLI000) generating 408 migration 306 operating starting 356 testing 353 IMS BMP TIMEOUT field of panel DSNTIPI 192 IMS RESLIB field of panel DSNTIPW 140 IMS.PROCLIB library description 404 269
F
fallback automatic rebind 321 description 319 frozen objects 319 jobs 324 release incompatibilities 321 remigration following 327 steps 32 FMIDs 63 FMPROF option of MODEENT macro 458 FORMAT command in sample application 356 FORTRAN COMPILER field of panel DSNTIPG 137 FORTRAN LINK EDIT field of panel DSNTIPG 137 frozen objects 319 function keys 377
G
GDDM LOAD MODULES field of panel DSNTIPW 140 GDDM MACLIB field of panel DSNTIPW 140 GENERIC column of LUNAMES catalog table description 461 global deadlock cycle 196 Global Trace 162 governor (resource limit facility) 169 See also resource limit facility (governor) graphic coded character set identifiers 503 GROUP ATTACH field of panel DSNTIPK 115
450
550
Installation Guide
IMSCTRL macro 404 incompatibilities of releases 294 initial program load (IPL) 270 See also IPL (initial program load) INPUT MEMBER NAME field of panel DSNTIPA1 106 INSTALL DD CONTROL SUPT. field of panel DSNTIPZ 229 INSTALL IRLM field of panel DSNTIPI 188 INSTALL TYPE field of panel DSNTIPA1 103 installation character conversion connections 503 CLIST 26, 91 defining DB2 to MVS 251 description 27 IRLM 188, 194 jobs description 25 DSNTIJCA 256 DSNTIJDE 257 DSNTIJEX 260 DSNTIJIC 275 DSNTIJID 257 DSNTIJIN 256 DSNTIJMV 251, 309 DSNTIJSG 273 DSNTIJTM 271, 316 DSNTIJUZ 258 DSNTIJVC 263 system affinity 232 macros DSN6ARVP 258 DSN6ENV 258 DSN6FAC 258 DSN6GRP 258 DSN6LOGP 258 DSN6SPRM 258 DSN6SYSP 258 output 92 overview 277 panels description 95 list of 96 planning 25 second subsystem 277 steps 29 tailoring session 27 tapes or cartridges 63 verification planning 334 testing batch environment 344 testing CICS environment 357 testing IMS environment 353 testing PL/I batch 349 testing SPUFI 349
installation (continued) verification (continued) testing the TSO attachment facility 340 installation CLIST calculating DASD requirements 45 installation SYSADM authority authorization IDs established 269 installation SYSOPR authority authorization IDs established 269 installation tapes or cartridges 63 installation verification procedure (IVP) 326 See also IVP (installation verification procedure) integrated catalog facility DSNTIJCA job 256 invoking CLIST 92 IOBUF buffer pool calculating storage requirements 474 description 463 IP address definition 487 IPADDR column IPNAMES catalog table 495 IPL (initial program load) installation 270 migration 313 IRLM address space 255 fallback, stopping IRLM during 323 FMID 63 group naming, naming convention 114 installation AUTO START parameter 188 CROSS MEMORY parameter 194 DEADLOCK CYCLE parameter 194 DEADLOCK TIME parameter 194 DISCONNECT IRLM parameter 194 DL/I BATCH TIMEOUT parameter 188 IMS BMP TIMEOUT paramter 188 INSTALL IRLM parameter 188 IRLM LOCK MAXIMUM SPACE parameter 235 IRLM XCF GROUP NAME parameter 194 LOCK ENTRY SIZE parameter 194 LOCKS PER TABLE(SPACE) parameter 194 LOCKS PER USER parameter 194 MAXIMUM ECSA parameter 194 MEMBER IDENTIFIER parameter 194 panel DSNTIPI 188 panel DSNTIPJ 194 PROC NAME parameter 188 RESOURCE TIMEOUT parameter 188 START IRLM CTRACE parameter 188 SUBSYSTEM NAME parameter 188 TIME TO AUTOSTART parameter 188 U LOCK FOR RR/RS parameter 188 UTILITY TIMEOUT parameter 188
Index
551
IRLM (continued) installing a second DB2 subsystem 277 libraries load 120 sample 64 target 65 loading DB2 libraries maintenance considerations 77 migration considerations 77 MVS system linkage index 251 naming convention for group names 114 space, estimating maximum 235 SYS1.PARMLIB updates 252 IRLM (internal resource lock manager) address space (IRLMPROC) 46 dump formatting module, AMDPRECT 252 entry in PPT 251 starting after fallback 325 installation 270 migration 313 IRLM LOCK MANIMUM SPACE field of panel DSNTIPC 235 IRLM XCF GROUP NAME field of panel DSNTIPJ 197 IRLMPROC 46, 255 ISPF (Interactive System Productivity Facility) primary option menu panel connection 265 ISPF ISPLINK MODULE field of panel DSNTIPW 140 ISPF Skeleton Library (ISPSLIB) 91 ISTINCLM mode table 453, 456 IVP (installation verification procedure) COBOL options 335 fallback 326 installation 329 migration 329 phase 361, 371 phases 339 PL/I options 339 programs-phases relationship 330
J
JOB statement description 69
L
LANGUAGE DEFAULT field of panel DSNTIPF 175 language interface token (LIT) 404 LE/370 LINK EDIT LIBRARY field of panel DSNTIPG 138
LE/370 RUN TIME 489 field of panel DSNTIPG 138 LEVEL ID UPDATE FREQ field of panel DSNTIPN 166 library description 63 distribution 64 online 8 prefix name 73 target 64 LIMIT BACKOUT field of panel DSNTIPN 165 link checker 300 See also DSN1CHKR utility LINK LIST ENTRY field of panel DSNTIPM 206 LINK LIST LIBRARY field of panel DSNTIPT 123 LINK LIST SEQUENCE field of panel DSNTIPM 206 LINKNAME column IPNAMES catalog table 495 LOCATIONS catalog table 444, 445, 459, 494 USERNAMES catalog table 495 LIT (language interface token) 404 LLA (LNKLST lookaside) description 69 installation 254 migration 310 LMDENT option of APPL statement 455 LNKLST lookaside (LLA) 69 See also LLA (LNKLST lookaside) LNKLSTxx member of SYS1.PARMLIB installation 203, 254 migration 310 LOAD DISTRIBUTION field of panel DSNTIPT 123 LOAD LIBRARY field of panel DSNTIPT 123 load module library DSNHDECP 258, 308 SDSNEXIT 70 SDSNLINK 69 SDSNLOAD 70 loading 63 See also LOAD utility distribution libraries 63 target libraries 63 LOCAL DATE LENGTH field of panel DSNTIP4 184 local deadlock cycles 196 LOCAL TIME LENGTH field of panel DSNTIP4 184 locale definition 506 specifying 506
552
Installation Guide
locale (continued) support for Euro currency 506 LOCALE LC_CTYPE field of panel DSNTIPF 181 LOCATION column of LOCATIONS table 494 LOCATION column LOCATIONS catalog table 459 location name description 449 updating the BSDS 485 lock object request 189 usage, IRLM 46 LOCK ENTRY SIZE field of panel DSNTIPJ 197 LOCKS PER TABLE(SPACE) field of panel DSNTIPJ 195 LOCKS PER USER field of panel DSNTIPJ 195 log data set 282 storage examples 39 LOG APPLY STORAGE field of panel DSNTIPL 208 log mode table 456 See also mode table logical unit (LU) 447 LOGMODE option of MODEENT macro 458 logon mode table entries 456 LU 6.2 communications protocols 444 LUNAME column of LUMODES table 469 column of LUNAMES table 460 column of MODESELECT table 470 field of panel DSNTIPR 444 option of APPL statement 450 coding values 452 updating the BSDS 485
M
MACRO LIBRARY field of panel DSNTIPT 123 main storage 49 See also storage maintenance level for selected enhancements MAX ABEND COUNT field of panel DSNTIPX 227 MAX BATCH CONNECT field of panel DSNTIPE 152 MAX DEGREE field of panel DSNTIP4 186 MAX KEPT DYN STMTS field of panel DSNTIPE 154
294
MAX REMOTE ACTIVE field of panel DSNTIPE 151 MAX REMOTE CONNECTED field of panel DSNTIPE 152 MAX TSO CONNECT field of panel DSNTIPE 152 MAX TYPE 1 INACTIVE field of panel DSNTIPR 220 MAX USERS field of panel DSNTIPE 151 MAXBFRU option of LINE statement 481 MAXCSA setting parameter 46 MAXDATA option of VTAM considerations for NCP connections the 482 MAXIMUM ECSA field of panel DSNTIPJ 195 MAXIMUM LE TOKENS field panel DSNTIP7 148 MAXPVT option of APPL statement 455 MEMBER IDENTIFIER field of panel DSNTIPJ 196 MEMBER NAME field of panel DSNTIPK specifying 114 migration CLIST 26, 91 considerations 287 jobs description 25 DSNTIJEX 312 DSNTIJIC 302 DSNTIJIN 312 DSNTIJMV 309 DSNTIJTC 314 DSNTIJUZ 308 DSNTIJVC 304 planning 25 release incompatibilities 294 steps 30 tailoring session 27 MINIMUM DIVIDE SCALE field of panel DSNTIPF 176 mixed applications, calculating session limits 473 mixed CCSIDs (coded character set identifiers) 503 MIXED DATA field of panel DSNTIPF 178 MNOTE macro error 410 mode of VTAM adding new modes 458 creating new modes 458 VTAM sessions associating with sessions 467 default 456 IBMDB2LM 456 IBMRDB 456 SNASVCMG 456
Index
553
mode table default 453, 456 entering modes 456 MODEENT macro 456, 458 MODENAME column LUMODES table 469 MODESELECT table 470 MODESELECT column LUNAMES catalog table 461 MODETAB option of APPL statement 453 modified jobs 93 MODIFY VTAM,DEFINE command of VTAM MONITOR SIZE field of panel DSNTIPN 164 MONITOR TRACE field of panel DSNTIPN 163 monitoring VTAM buffer pools DISPLAY NET, BFRUSE 463 MODIFY command of MVS 463 multi-site update APPL options 454, 455 MODEENT options 457 MVS defining DB2 to 251 IPL 270 MVS PARMLIB updates 203
466
OPERCNOS option of APPL statement OPTIMIZATION HINTS field of panel DSNTIP4 185 OPTION option of DSNMAPN macro 408 organization application DRDA access 388 format command 356 panels 373 with IMS 356 OUTPUT BUFFER field of panel DSNTIPL 207 OUTPUT MEMBER NAME field of panel DSNTIPA1 107 overriding built-in conversion 507
456
P
pacing controlling description 464 modifying session limits 466 SRCVPAC option of MODEENT macro 458, 466 VPACING option of VTAM APPL statement 454 PACKAGE AUTH CACHE field of panel DSNTIPP 202 PACKAGE LISTS field of panel DSNTIPD 144 PACKAGE STATEMENTS field of panel DSNTIPD 144 PACKAGES field of panel DSNTIPD 144 panel directory 96 ISPF 27, 91 organization 373 projects 373 panel field names directory 97 PARAMETER MODULE field of panel DSNTIPO 170 PARMLIB update options 203 PARSESS option of APPL statement 455 password VTAM 450 See also VTAM (Virtual Telecommunications Access Method) PASSWORD column USERNAMES catalog table 495 PCTEROP option of DSNCRCT macro 424 performance improving 503 PERMANENT UNIT NAME field of panel DSNTIPA2 113 phone application 384 data set format 386 format command 356
N
national language character set identifiers 500 double-byte character set identifiers 502 NCP-connected DB2s considerations for MAXDATA option 482 sample definitions 482 NETID 449 NetView installation 277 NEWAUTHID column USERNAMES catalog table 495 notices, legal 511 NUMBER OF COPIES field of panel DSNTIPH 117, 118 NUMBER OF LOGS field of panel DSNTIPL 207 NUMBER OF TCBS field of panel DSNTIPX 227
O
OBJT REGISTRATION TABLE field of panel DSNTIPZ 231 online books 8 OpenEdition 490, 492, 496
554
Installation Guide
phone application (continued) JCL 387 panels 385 program description 384 transaction code 360 using under batch 386 PIU (path information unit) description 474 relationship to MAXBFRU 481 PL/I fields of panel DSNTIPG 137, 138 PLAN option of DSNCRCT macro 435 option of DSNMAPN macro description 410 installation format 408 PLAN AUTH CACHE field of DSNTIPP 201 plan name for remote bind 470 plan size, calculating 53 PLAN STATEMENTS field of panel DSNTIPD 144 PLANI option of DSNCRCT macro 425 PLANNAME column SYSIBM.MODESELECT catalog table 470 PLANS field of panel DSNTIPD 144 PLNEXIT option of DSNCRCT macro 435 PLNPGME option of DSNCRCT macro 435 PLNPGMI option of DSNCRCT macro 425 PLNXTR1 option of DSNCRCT macro 425 PLNXTR2 option of DSNCRCT macro 425 PLT (program list table) processing 419 POOL THREAD TIMEOUT field of panel DSNTIP5 225 populating 458, 493 CDB connecting subsystems 458, 460, 493, 494 installation 275 port column of LOCATIONS table 494 definition 487 ephemeral 487 server 487 well-known 487 port numbers 490 PPT (MVS program properties table) 251 prefix active log 118 archive log 118, 210 library 73 log 118 PREFIX field of panel DSNTIPA1 106 PREPARE statement migration considerations 295
PRIMARY QUANTITY field of panel DSNTIPA 209 PRIPROT option of MODEENT macro 458 PROC NAME field of panel DSNTIPI 190 program libraries 69 program list table (PLT) 419 PROGxx member of SYS1.PARMLIB 253, 310 project application format command 356 panels 373 using 377 with IMS 356 PRTCT option of APPL statement 450, 453 PSERVIC option of MODEENT macro 458 PSTOP transaction type 410 PURGEC option of DSNCRCT macro description 425
Q
QUIESCE PERIOD field of panel DSNTIPA 213 QUIESCE utility migration considerations 295
R
RACF (Resource Access Control Facility) option to specify at installation or migration RCT (resource control table) defining DB2 to CICS 414 description 422 installation 269 RDO (resource definition online) 416 READ COPY2 ARCHIVE field of panel DSNTIPO 174 READ TAPE UNITS field of panel DSNTIPA 211 reading online book 87 real storage 60 See also storage rebinding remote package 509 RECALL DATABASE field of panel DSNTIPO 168 RECALL DELAY field of panel DSNTIPO 169 RECEIVE job 77 RECORDING MAX field of panel DSNTIPA description 212 recovery job DSNTIJDE 257 REGISTRATION DATABASE field of panel DSNTIPZ 231 200
Index
555
REGISTRATION OWNER field of panel DSNTIPZ 230 relational database name 449 RELCURHL subsystem parameter migration consideration 296 release incompatibilities 294 release level for selected enhancements 294 RELEASE LOCKS field of panel DSNTIP4 186 remigration 32, 327 REMOTE LOCATION field of panel DSNTIPY 233 remote unit of work 443 See also DRDA access REO (region error option) default OPTION of DSNMAPN macro 410 installation 405 REQUIRE FULL NAMES field of panel DSNTIPZ 230 Resource Access Control Facility (RACF) 200 See also RACF (Resource Access Control Facility) RESOURCE AUTHID field of panel DSNTIPP 201 resource control table (RCT) 269, 414 See also RCT (resource control table) resource definition online (RDO) 416 resource limit facility (governor) 169 authorization ID 201 creating database during installation 275 specifying 169 storage estimation 44 RESOURCE TIMEOUT field of panel DSNTIPI 189 resource translation table (RTT) 404 See also RTT (resource translation table) RESTART field of panel DSNTIPS 215 RESYNC INTERVAL field of panel DSNTIPR 219 RESYNC PORT field of panel DSNTIP5 222, 489 RETAINED LOCK TIMEOUT field of panel DSNTIPI 192 RETENTION PERIOD field of panel DSNTIPA 213 RID (record identifier) pool size 52 RID blocks 52 RID POOL SIZE field of panel DSNTIPC 238 RLF AUTO START field of panel DSNTIPO 169 RLST (resource limit specification table) migration considerations 298
RLST ACCESS ERROR field panel DSNTIPO 169 panel DSNTIPR 218 RLST NAME SUFFIX field of panel DSNTIPO 169 RO SWITCH CHKPTS field of panel DSNTIPN 166 RO SWITCH TIME field of panel DSNTIPN 166 ROLBE option of DSNCRCT macro 435 ROLBI option of DSNCRCT macro 426 rollback ROLBI option of DSNCRCT macro 426 sync point rollback 426 ROUTINE AUTH CACHE field of panel DSNTIPP 202 RTT (resource translation table) description 409 installation 404 RUNLIB.LOAD library DASD volume 112 device type 113 DSNTIJIN job 256 installing a second DB2 280, 282 naming considerations 73 RUSIZES option of MODEENT macro 458
S
sample application description 373 ODBA stored procedure 367 organization 379 output 124 phone 384 project 377 SQL procedure 368 SQL procedures processor 368 utilities stored procedure 367 verifying installation 329 SAMPLE LIBRARY field of panel DSNTIPT 122 sample VTAM definitions 482 description 478 NCP-connected DB2s 482 SDSNBKS library 65 SDSNCHDR library 65 SDSNCLST library 65 SDSNDBRM library 65 SDSNENU library 65 SDSNEXIT library 65, 258 SDSNINDX library 65 SDSNINST library 65 SDSNIVPD library 65 SDSNLINK library description 65, 69
556
Installation Guide
SDSNLINK library (continued) suffix 206 SDSNLOAD library description 65 link list options 69 SDSNMACS library 65 SDSNSAMP library description 65 output from panel session 92 SDSNSHLF library 65 SDSNSPFM library 65 SDSNSPFP library 65 SDSNSPFPE library 65 SDSNSPFPK library 65 SDSNSPFS library 65 SDSNSPFT library 65 SDXRRESL library 65 SDXRSAMP library 65 SECACPT option of APPL statement 454 SECONDARY QTY field of panel DSNTIPA 210 secondary server 473 SECPROT option of MODEENT macro 458 security installation 262 migration 309 SECURITY_IN column LUNAMES catalog table 460 SECURITY_OUT column IPNAMES catalog table 495 LUNAMES catalog table 460 selection of data values 375 SEQUENTIAL CACHE field of panel DSNTIPE 153 server DB2 as secondary server 473 service name 488 session 447 session limit for VTAM calculating 471 considerations for mixed applications 473 modifying default 466 modifying LUMODES 469 OPERCNOS option of APPL statement 456 specifying in APPL statement 453 SHDDEST option of DSNCRCT macro 426 sign-on exit routine installation 260 migration 312 SIGNID option of DSNCRCT macro 426, 434 SIHSCLSB library 65 SIHSMODB library 65 SIHSSMPB library 65 single-byte character set identifiers 500, 503 SIT (system initialization table) 415
SITE TYPE field of panel DSNTIPO 173 SMF (System Management Facility) buffers 261 installation 261 SMF ACCOUNTING field of panel DSNTIPN 162 SMF STATISTICS field of panel DSNTIPN 163 SMP/E (System Modification Program/Extended) ACCEPT job 66, 79 allocation job 75, 76 APPLY job 66, 78 cleanup job 66, 77 copying jobs to DASD 67 data set options 74 data sets for two releases 75 job listings 66 loading DB2 libraries 63 RECEIVE job 66, 77 RELFILE format 63 sharing data sets with IMS 74 steps 28 SNA sense code X'800A' 481, 482 snap dump 426 SNAP option of DSNCRCT macro 426 SNASVCMG mode 456 softcopy publications 8 SONSCIP option of APPL statement 455 sort program APF authorization of library 254 SORT LIBRARY field of panel DSNTIPW 140 SORT POOL SIZE field of panel DSNTIPC 237 SPUFI access to remote systems 350 binding migration 316 remotely 350 testing 349 SQL (Structured Query Language) processing conversations description 468 specifying mode 469 SQL STRING DELIMITER field of panel DSNTIPF 177 SQLCODE -101 295 -30081, migration consideration 296 -470, migration consideration 296 -751, migration consideration 296 +2000, migration consideration 296 +464, migration consideration 296 +466, migration consideration 296
74
Index
557
SQLCODE (continued) +655, migration consideration 296 SQLSTATE '38003' 296 SRBEXIT option of APPL statement 454 SRCLIB.DATA library DASD volume 112 device type 113 DSNTIJIN job 256 installing a second DB2 280, 282 naming considerations 73 SRCVPAC option of MODEENT macro 458 used to control pacing 466 SSM (subsystem member) entry in IMS.PROCLIB 404 execution parameter 406 SSNDPAC option of MODEENT macro 458 recommended value 466 STANDBY option of DSNCRCT macro 427 START IRLM CTRACE field of panel DSNTIPI 191 START NAMES field of panel DSNTIPS 215 start options for VTAM 462 starting DB2 installation 270 migration 313, 325 IRLM fallback, after 325 installation, during 270 migration, during 313 TSO after fallback 326 installation 271 migration 314 statistics report destination 426 STATISTICS TIME field of panel DSNTIPN 163 STD SQL LANGUAGE field of panel DSNTIP4 185 STEPLIB statement of DB2 program libraries 71 storage calculating external storage 35 main 49, 59 predefined models 35 real 60 virtual constraints 59 VTAM IOBUF 474 working 58 stored procedures DB2 SQL procedures processor 284, 316 DB2 UDB Control Center 284
stored procedures (continued) DB2 UDB Control Center catalog query 273, 284, 316 DB2 UDB Control Center partition information 273, 284, 316 DB2-supplied 273, 284, 285 enabling after installation 283 running concurrently 48 SQL procedures processor 273, 285 subsystem parameter 273, 284 utilities 316, 367 utility invocation 273, 284 Visual Explain 273, 284, 316 STRING DELIMITER field of panel DSNTIPF 176 STRTWT option of DSNCRCT macro 427 SUBID option of DSNCRCT macro 427 subsystem multiple 70, 277 name IEFSSNxx member of SYS1.PARMLIB 252 SUBSYSTEM MEMBER field of panel DSNTIPM 205 SUBSYSTEM NAME field panel DSNTIPI 189 panel DSNTIPM 203 subsystem parameter module installation 258 migration 308 option descriptions 117, 236, 237 subsystem parameters EDMBFIT 244 list 243 NPGTHRSH 245 PTASKROL 245 migration considerations 296 SPRMLTD 245 SUBSYSTEM SEQUENCE field of panel DSNTIPM 205 subtask priority 424, 435 SUFFIX field of panel DSNTIPA1 106 option of DSNCRCT macro 427 suffix identification character 427 sync point rollback 426 SYNCLVL option of APPL statement 454 syntax diagrams, how to read 4 SYS1.PARMLIB library updated by DSNTIJMV 251, 309 SYS1.PROCLIB library 251, 309 SYS1.VTAMLST library 462 SYSADM authority establish authorization IDs 269 use 276 SYSIBM.IPNAMES table of CDB description 495
558
Installation Guide
SYSIBM.LOCATIONS table of CDB description 459, 494 example 459, 494 SYSIBM.LUMODES table of CDB CONVLIMIT column 469 description 468 LUNAME column 469 MODENAME column 469 updating 469 SYSIBM.LUNAMES table of CDB description 460 example 461 specifying modes 468 updating 468 SYSIBM.MODESELECT table of CDB bind plan name 470 description 469 search order 470 SYSIBM.SYSPROCEDURES catalog table migration considerations 298 SYSIBM.USERNAMES table of CDB description 495 SYSOPR authority establish authorization IDs 269 system 38 conversation specifying modes 468 using default mode 460 SYSTEM ADMIN 1 field of panel DSNTIPP 200 SYSTEM ADMIN 2 field of panel DSNTIPP 200 system initialization table (SIT) 415 SYSTEM LOB VALUE STORAGE field panel DSNTIP7 148 SYSTEM MACLIB field of panel DSNTIPW 139 System Management Facility (SMF) 261 See also SMF (System Management Facility) System Modification Program/Extended (SMP/E) See also SMP/E (System Modification Program/Extended) SYSTEM OPERATOR 1 field of panel DSNTIPP 200 SYSTEM OPERATOR 2 field of panel DSNTIPP 201 SYSTEM PROCEDURES field of panel DSNTIPW 139 system services address space 46
63
T
table CICS table generation procedure TABLE SPACES field of panel DSNTIPD 144 422
TABLES field of panel DSNTIPD 143 TABLES IN STMT field of panel DSNTIPD 145 target library 64 TASKREQ option of DSNCRCT macro 436 TCP/IP ALREADY VERIFIED field of panel DSNTIP5 223, 489 TCP/IP KEEPALIVE field of panel DSNTIP5 225 TCPALVER field of panel DSNTIP5 223 TEMP 32K DATA SETS field of panel DSNTIPD 147 TEMP 32K SPACE field of panel DSNTIPD 146, 271 TEMP 4K DATA SETS field of panel DSNTIPD 146 TEMP 4K SPACE field of panel DSNTIPD 145, 271 TEMP CLIST LIBRARY field of panel DSNTIPT 121 TEMP data set 92 temporary database storage estimation 41, 145 TEMPORARY UNIT NAME field of panel DSNTIPA2 113 TERM option DSNCRCT macro 434 THRDA option DSNCRCT macro 436 THRDM option of DSNCRCT macro 437 THRDMAX option of DSNCRCT macro 428 THRDS option of DSNCRCT macro 437 thread CICS maximum, specifying 428, 429 maximum number 428 space 59 subtasks priority 424, 435 termination disconnecting 432 DSNCRCT macro 432 TIME FORMAT field of panel DSNTIP4 184 TIME TO AUTOSTART field of panel DSNTIPI 190 TIMEOUT VALUE field of panel DSNTIPX 227 TIMESTAMP ARCHIVES field of panel DSNTIPH 119 TOKENE option of DSNCRCT macro 437 TOKENI option of DSNCRCT macro 428 TPN (transaction program name) 451
Index
559
TPN column LOCATIONS catalog table 459 trace identification for CICS 428 TRACE AUTO START field of panel DSNTIPN 162 TRACE SIZE field of panel DSNTIPN 162 TRACEID option of DSNCRCT macro 428 TRACKER SITE field of panel DSNTIPO 174 transaction entries 416 transaction program name (TPN) description 451 transmitting character data 499 TSO establishing user IDs 269 installation procedures 262 migration procedures 303 starting 271 testing 340 TSPROF option of MODEENT macro 458 tuning VTAM buffer storage 463 creating new modes 458 description 462 MODEENT macro 466 pacing count 464 session limits 466 SRCVPAC option of MODEENT macro 466 TWAIT option of DSNCRCT macro TYPE=ENTRY macro 438 TWAITI option of DSNCRCT macro 429 two-phase commit 443, 454, 489 DRDA (Distributed Relational Database Architecture) 443 TXID option of DSNCRCT macro 434, 438 TXIDSO option of DSNCRCT macro description 428 TYPE column USERNAMES catalog table 495 TYPE option of MODEENT macro 458 TYPE=COMD option of DSNCRCT macro 429 TYPE=ENTRY option of DSNCRCT macro 432 TYPE=FINAL option of DSNCRCT macro 439 TYPE=INIT option of DSNCRCT macro 423 TYPE=POOL option of DSNCRCT macro 430
UNREGISTERED DDL DEFAULT field of panel DSNTIPZ 230 UPDATE PART KEY COLS field of panel DSNTIP4 187 UPDATE RATE field of panel DSNTIPL 208 updating activity 378 communications database while DDF is active LUMODES table of CDB 469 LUNAMES table of CDB 468 MODESELECT table of CDB 469 session limits 469 system parameters 247 UR CHECK FREQ field of panel DSNTIPN 164 USE FOR DYNAMICRULES field of panel DSNTIPF 180 USE PROTECTION field of panel DSNTIPP 200 USER option of DSNCRCT macro 434 USER LOB VALUE STORAGE field panel DSNTIP7 148 user-defined characters 503 USERID option of DSNCRCT macro 434 USERNAMES column IPNAMES catalog table 495 LUNAMES catalog table 461 utilities types CATMAINT 314 UTILITY CACHE OPTION field of panel DSNTIPE 153 UTILITY TIMEOUT field of panel DSNTIPI 190
471
V
validation routine DSNQSTR, governing rules for VARCHAR FROM INDEX field of panel DSNTIP4 186 VARY NET command of VTAM ACTIVE option 462 verification jobs DSNTEJ0 330, 339 DSNTEJ1 330, 340 DSNTEJ1L 330, 340 DSNTEJ1P 330, 340 DSNTEJ2A 330, 344 DSNTEJ2C 330, 344 DSNTEJ2D 330, 331, 345 DSNTEJ2E 330, 331 DSNTEJ2F 330, 331, 346 DSNTEJ2P 330, 346 508
U
U LOCK FOR RR/RS field of panel DSNTIPI 191 UNKNOWN AUTHID field of panel DSNTIPP 201
560
Installation Guide
verification jobs (continued) DSNTEJ2U 330, 331, 347 DSNTEJ3C 330, 331, 351 DSNTEJ3P 330, 331, 351 DSNTEJ4C 330, 353 DSNTEJ4P 330, 332, 353 DSNTEJ5A 330, 332, 357 DSNTEJ5C 330, 332, 357 DSNTEJ5P 330, 332, 357 DSNTEJ6 332, 362 DSNTEJ61 330, 332 DSNTEJ62 330, 332 DSNTEJ63 330, 332 DSNTEJ64 330, 332 DSNTEJ65 330, 332 DSNTEJ6D 332 DSNTEJ6P 330, 332 DSNTEJ6S 330, 332 DSNTEJ6T 332 DSNTEJ6U 330, 332 DSNTEJ7 330, 333, 371 DSNTEJ71 330, 333 DSNTEJ73 330, 333 DSNTEJ75 330, 333 DSNTESA 349 DSNTESC 349 DSNTESE 350 verification testing DDF 361 LOB 371 VERIFY option of APPL statement 454 VIEWS field of panel DSNTIPD 143 virtual sequential access method (VSAM) 256 See also VSAM (virtual storage access method) virtual storage calculating constraints 59 calculations 49 layout 45 Virtual Telecommunications Access Method (VTAM) 449 See also VTAM (Virtual Telecommunications Access Method) Visual Explain 273 VOLUME SERIAL 1-VOLUME SERIAL 7 fields of panel DSNTIPA2 111 VPACING option of APPL statement 454 VS COBOL fields of panel DSNTIPQ 133, 134 VSAM (virtual storage access method) clusters 256 VTAM (Virtual Telecommunications Access Method) APPL statement 452 buffer pools calculating storage 474 increasing 464 monitoring 463
VTAM (Virtual Telecommunications Access Method) (continued) buffer pools (continued) performance effect 463 commands DISPLAY BFRUSE 463 MODIFY VTAM,DEFINE 466 VARY NET 462 defining a DB2 subsystem 451, 458 See also sample VTAM definitions log mode table, default 456 MODEENT macro 456 modes, default for DB2 456 sample definitions 478 installing 276 libraries SYS1.SAMPLIB 456 SYS1.VTAMLST 462 parallel sessions 452 password 450 specifying in APPL statement 453 updating the BSDS 485 planning considerations 449 session limit 471 See also session limit for VTAM calculating 471 default maximum for a mode 453 start options 462 tracing 463 VTAMFRR option of APPL statement 455
W
WLM ENVIRONMENT field of panel DSNTIPX 227 WLM PROC NAME field of panel DSNTIPX 226 work file installation job DSNTIJTM 271 migration job DSNTIJTM 316 work file database installation job DSNTIJTM 271 migration job DSNTIJTM 316 storage estimation 41 WORK FILE DB field of panel DSNTIPK 115 working storage 58 See also storage WRITE THRESHOLD field of panel DSNTIPL 208 WRITE TO OPER field of panel DSNTIPA 212 WTO ROUTE CODES field of panel DSNTIPO 168 WTOR ROUTE CODE field of panel DSNTIPA 212
Index
561
X
X LOCK FOR SEAARCHED U/D field of panel DSNTIPI 191
Z
ZPARM 243 See also subsystem parameters
562
Installation Guide
Readers' Comments
DB2 Universal Database for OS/390 Installation Guide Version 6 Publication No. GC26-9008-01 How satisfied are you with the information in this book? Very Satisfied Technically accurate Complete Easy to find Easy to understand Well organized Applicable to your tasks Grammatically correct and consistent Graphically well designed Overall satisfaction Please tell us how we can improve this book: Satisfied Neutral Dissatisfied Very Dissatisfied
Yes
No
Name
Address
Company or Organization
Phone No.
IBM
International Business Machines Corporation Department BWE/H3 PO Box 49023 San Jose, CA 95161-9945
GC26-9008-01
IBM
GC26-9
8- 1