dqqmst
dqqmst
6.4
IBM
SC27-2867-09
Note
Before using this information and the product it supports, read the information in “Notices” on page
269.
This edition applies to version 6, release 4 of IBM Z NetView (product number 5697-NV6 ) and to all subsequent
versions, releases, and modifications until otherwise indicated in new editions.
This edition replaces SC27-2867-08.
© Copyright International Business Machines Corporation 1997, 2022.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
Figures................................................................................................................. xi
About this publication......................................................................................... xix
Intended audience.................................................................................................................................... xix
Publications............................................................................................................................................... xix
IBM Z NetView library.......................................................................................................................... xix
Related publications ............................................................................................................................ xx
Terminology in this Library....................................................................................................................xx
Using IBM Z NetView online help........................................................................................................ xxi
Accessing publications online............................................................................................................. xxi
Ordering publications ..........................................................................................................................xxi
Accessibility ............................................................................................................................................. xxii
Support information................................................................................................................................. xxii
Conventions used in this publication....................................................................................................... xxii
Typeface conventions .........................................................................................................................xxii
Operating system-dependent variables and paths........................................................................... xxiii
Syntax diagrams................................................................................................................................. xxiii
Chapter 1. Introduction............................................................................................................................... 3
IBM Z NetView Overview........................................................................................................................3
Automation........................................................................................................................................3
IP Management................................................................................................................................. 4
Sysplex and System Management....................................................................................................8
SNA Management..............................................................................................................................9
Security..............................................................................................................................................9
IBM Z NetView Components.................................................................................................................. 9
Core Components........................................................................................................................... 10
Resource Object Data Manager...................................................................................................... 12
Graphic Monitor Facility Host Subsystem...................................................................................... 12
NetView Enterprise Management Agent........................................................................................ 12
NetView REST Server......................................................................................................................12
Subsystem Interface.......................................................................................................................13
Message Revision Table..................................................................................................................13
Command Revision Table............................................................................................................... 13
Program-to-Program Interface...................................................................................................... 13
Event/Automation Service.............................................................................................................. 14
User Interfaces and Help................................................................................................................14
Programs That Interact with the IBM Z NetView Program................................................................. 15
z/OS Operating System...................................................................................................................17
IBM Z System Automation..............................................................................................................18
GDPS............................................................................................................................................... 18
Linux on Z........................................................................................................................................ 19
Tivoli Business Service Manager.................................................................................................... 19
IBM Z Decision Support.................................................................................................................. 19
IBM Z Workload Scheduler.............................................................................................................19
Tivoli Netcool/OMNIbus................................................................................................................. 19
Open Systems Interconnection Agents......................................................................................... 19
What Are Network Management Tasks?.............................................................................................. 19
iii
Chapter 2. Getting Started.........................................................................................................................23
Starting the NetView Program............................................................................................................. 23
Replying to a Message.................................................................................................................... 24
Stopping NetView........................................................................................................................... 24
Issuing a NetView Command from MVS........................................................................................ 25
Using NetView from a 3270 Session....................................................................................................26
Logging on to NetView from a 3270 Session................................................................................. 26
Understanding the Panel Layout.................................................................................................... 31
Moving between the Components..................................................................................................34
Issuing Commands......................................................................................................................... 34
Using Program Function and Program Access Keys...................................................................... 35
Controlling the NetView Screen..................................................................................................... 36
Accessing the NetView Program from the NetView Management Console........................................36
Accessing the NetView Program from the Tivoli Enterprise Portal.....................................................37
Accessing the NetView Program from Service Management Unite.................................................... 37
iv
Chapter 5. Managing Network and System Status................................................................................... 83
Using Tivoli Workload Scheduler for z/OS........................................................................................... 83
Using Z Decision Support..................................................................................................................... 83
v
Chapter 10. Maintaining the NetView Program...................................................................................... 123
Defining a NetView Command........................................................................................................... 123
Defining Resources in the Network................................................................................................... 123
Maintaining Objects and Relationships in RODM.............................................................................. 124
Using the NetView RODM Load Utility..........................................................................................124
Using the RODMVIEW Command................................................................................................. 124
Changing the Value of a RODM Object Attribute Using RODMView..................................................125
Displaying Data Sets Used by the NetView Program........................................................................ 126
vi
Switching the Network Log...........................................................................................................153
Creating and Displaying NetView Trace Data.................................................................................... 153
Creating and Displaying Command Facility Trace Data............................................................... 154
Creating and Displaying Session Monitor Trace Data.................................................................. 154
Creating and Displaying PPI Trace Data...................................................................................... 155
Maintaining the Hardware Monitor Database....................................................................................155
Switching Primary and Secondary Databases............................................................................. 155
Controlling the Amount of Data Retained in the Hardware Monitor Database........................... 156
Removing Unwanted Data from the Hardware Monitor Database.............................................. 156
Collecting Hardware Monitor Data in an SMF Data Set............................................................... 156
Using and Maintaining the Session Monitor Database......................................................................157
Switching Primary and Secondary Logs....................................................................................... 157
Removing Unwanted Data from the Session Monitor Log........................................................... 157
Collecting Session Monitor Data in an SMF Data Set...................................................................157
Maintaining the Save/Restore Database........................................................................................... 158
Switching Primary and Secondary Databases............................................................................. 158
Removing Unwanted Data from the Save/Restore Database......................................................158
Reorganizing the Save/Restore Database....................................................................................158
Using the MVS System Log (SYSLOG)................................................................................................ 159
Using and Maintaining the RODM Log................................................................................................159
Switching the Primary and Secondary RODM Logs......................................................................159
Formatting the RODM log............................................................................................................. 159
Copying the Contents of RODM to a Checkpoint Data Set................................................................ 160
Chapter 14. Controlling Message Routing Using the ASSIGN Command.............................................. 173
Assigning Operators to Groups.......................................................................................................... 173
Working with Unsolicited Messages.................................................................................................. 173
Working with Solicited Messages...................................................................................................... 173
vii
Using NetView Timer Management Panels....................................................................................... 180
Selecting Remote Targets.............................................................................................................181
Setting Timers for a Specific Date and Time................................................................................184
Adding a Timer..............................................................................................................................185
Purging (Deleting) Timers.............................................................................................................193
Reinstating Timers........................................................................................................................194
viii
Sessions-Data Availability Scenarios...................................................................................................... 249
SNA Session....................................................................................................................................... 249
SNA Advanced Peer-to-Peer Networking Session through a Composite Node............................... 250
SNA Advanced Peer-to-Peer Networking Session through Non-Adjacent Composite Nodes.........251
SNA Advanced Peer-to-Peer Networking Session through Adjacent Composite Nodes.................252
SNA Advanced Peer-to-Peer Networking Session through a SNI Gateway..................................... 254
Session between 2 SNA Advanced Peer-to-Peer Networking Subnetworks with a LEN
Connection.................................................................................................................................... 256
SNA Session through an Advanced Peer-to-Peer Networking Network...........................................257
SSCP Takeover⁄Giveback Scenarios........................................................................................................ 257
SSCP Takeover⁄Giveback of NCP BF Connection - Scenario 1.......................................................... 258
SSCP Takeover⁄Giveback of NCP BF Connection - Scenario 2.......................................................... 259
SSCP Takeover⁄Giveback of NCP BF Connection - Scenario 3.......................................................... 260
SSCP Takeover⁄Giveback of NCP BF Connection - Scenario 4.......................................................... 261
Notices..............................................................................................................269
Programming Interfaces..........................................................................................................................270
Trademarks.............................................................................................................................................. 270
Privacy policy considerations.................................................................................................................. 270
Index................................................................................................................ 273
ix
x
Figures
10. Default Command Facility PF Keys That Are Supplied by the NetView Product..................................... 36
xi
24. Virtual Route Status Panel........................................................................................................................ 61
36. Advanced Peer-to-Peer Networking Session Route Configuration Panel with Subarea Number
from Primary Side.......................................................................................................................................68
37. Advanced Peer-to-Peer Networking Session Route Configuration Panel with Subarea Number
from Secondary Side and OAR Prompt......................................................................................................69
40. Session List Panel for an SNA Advanced Peer-to-Peer Networking or Mixed Network.......................... 71
45. Domain Status Detail (Description) Panel Showing the VTAM Commands You Can Run against the
Resources................................................................................................................................................... 77
46. Domain Status Detail (Description) Panel Showing the Command Lists You Can Run against the
Resources................................................................................................................................................... 77
47. Domain Status Detail (Description) Panel Containing Activity and Analysis Information...................... 78
xii
48. Domain Status Detail (Description) Panel Showing only Active Applications......................................... 78
xiii
73. Target System Hardware Summary Status Panel.................................................................................. 110
xiv
98. Timer Set Panel for a Type of EVERY...................................................................................................... 184
108. Timer Options Panel to Create a New Timer or Copy a Timer............................................................. 193
xv
123. Session List Panel................................................................................................................................. 223
141. SNA Advanced Peer-to-Peer Networking Sessions through Composite Nodes................................. 250
142. SNA Advanced Peer-to-Peer Networking Session through Nonadjacent Composite Nodes............. 251
143. SNA Advanced Peer-to-Peer Networking Session through Adjacent Composite Nodes with FID2
Connection............................................................................................................................................... 252
144. SNA Advanced Peer-to-Peer Networking Session through Adjacent Composite Nodes with VR
Connection............................................................................................................................................... 253
146. Session between 2 SNA Advanced Peer-to-Peer Networking Subnetworks through a LEN
Connection............................................................................................................................................... 256
xvi
147. SNA Session through an Advanced Peer-to-Peer Networking Network............................................. 257
xvii
xviii
About this publication
The IBM Z® NetView® product provides advanced capabilities that you can use to maintain the highest
degree of availability of your complex, multi-platform, multi-vendor networks and systems from a single
point of control. This publication, the IBM Z NetView User's Guide: NetView provides information for the
operator and system programmer on using the NetView program as the central point to manage their
networks and systems.
Intended audience
This publication is for operators and system programmers who use the NetView program. Specific
operator procedures are defined by the individual installation to meet local requirements.
Publications
This section lists publications in the IBM Z NetView library and related documents. It also describes how
to access NetView publications online and how to order NetView publications.
Related publications
You can find additional product information on the IBM Z NetView web site at https://www.ibm.com/
products/z-netview.
For information about the NetView Bridge function, see Tivoli NetView for OS/390® Bridge Implementation,
SC31-8238-03 (available only in the V1R4 library).
Ordering publications
You can order many IBM publications online at http://www.ibm.com/e-business/linkweb/publications/
servlet/pbi.wss
You can also order by telephone by calling one of these numbers:
• In the United States: 800-426-4968
Accessibility
Accessibility features help users with a physical disability, such as restricted mobility or limited vision, to
use software products successfully. Standard shortcut and accelerator keys are used by the product and
are documented by the operating system. Refer to the documentation provided by your operating system
for more information.
For additional information, see Appendix E, “Accessibility,” on page 267.
Support information
If you have a problem with your IBM software, you want to resolve it quickly. IBM provides the following
ways for you to obtain the support you need:
Online
Please follow the instructions located in the support guide entry: https://www.ibm.com/support/
home/pages/support-guide/?product=4429363.
Troubleshooting information
For more information about resolving problems with the IBM Z NetView product, see the IBM Z
NetView Troubleshooting Guide. You can also discuss technical issues about the IBM Z NetView
product through the NetView user group located at https://groups.io/g/NetView. This user group is for
IBM Z NetView customers only, and registration is required. This forum is also monitored by interested
parties within IBM who answer questions and provide guidance about the NetView product. When a
problem with the code is found, you are asked to open an official case to obtain resolution.
Typeface conventions
This publication uses the following typeface conventions:
Bold
• Lowercase commands and mixed case commands that are otherwise difficult to distinguish from
surrounding text
• Interface controls (check boxes, push buttons, radio buttons, spin buttons, fields, folders, icons,
list boxes, items inside list boxes, multicolumn lists, containers, menu choices, menu names, tabs,
property sheets), labels (such as Tip:, and Operating system considerations:)
• Keywords and parameters in text
Italic
• Citations (examples: titles of publications, diskettes, and CDs
• Words defined in text (example: a nonswitched line is called a point-to-point line)
• Emphasis of words and letters (words as words example: "Use the word that to introduce a
restrictive clause."; letters as letters example: "The LUN address must start with the letter L.")
Syntax diagrams
The following syntax elements are shown in syntax diagrams. Read syntax diagrams from left-to-right,
top-to-bottom, following the horizontal line (the main path).
• “Symbols” on page xxiii
• “Parameters” on page xxiii
• “Punctuation and parentheses” on page xxiv
• “Abbreviations” on page xxiv
For examples of syntax, see “Syntax examples” on page xxiv.
Symbols
The following symbols are used in syntax diagrams:
Parameters
The following types of parameters are used in syntax diagrams:
Required
Required parameters are shown on the main path.
COMMAND_NAME opt_variable_1,,opt_variable_3
You do not need to specify the trailing positional commas. Trailing positional and non-positional commas
either are ignored or cause a command to be rejected. Restrictions for each command state whether
trailing commas cause the command to be rejected.
Abbreviations
Command and keyword abbreviations are listed in synonym tables after each command description.
Syntax examples
The following examples show the different uses of syntax elements:
• “Required syntax elements” on page xxv
• “Optional syntax elements” on page xxv
• “Default keywords and values” on page xxv
• “Multiple operands or values” on page xxv
• “Syntax that is longer than one line” on page xxvi
• “Syntax fragments” on page xxvi
A required choice (two or more items) is shown in a vertical stack on the main path. The items are shown
in alphanumeric order.
REQUIRED_OPERAND_OR_VALUE_1
REQUIRED_OPERAND_OR_VALUE_2
OPTIONAL_OPERAND
A required choice (two or more items) is shown in a vertical stack below the main path. The items are
shown in alphanumeric order.
OPTIONAL_OPERAND_OR_VALUE_1
OPTIONAL_OPERAND_OR_VALUE_2
KEYWORD1 OPTION=*
COMMAND_NAME
KEYWORD1 OPTION= *
KEYWORD2 VALUE1
KEYWORD3 VALUE2
REPEATABLE_OPERAND_OR_VALUE_1
REPEATABLE_OPERAND_OR_VALUE_2
REPEATABLE_OPERAND_OR_VALUE_3
value_n )
OPERAND7 OPERAND8
Syntax fragments
Some syntax diagrams contain syntax fragments, which are used for lengthy, complex, or repeated
sections of syntax. Syntax fragments follow the main diagram. Each syntax fragment name is mixed case
and is shown in the main diagram and in the heading of the fragment. The following syntax example
shows a syntax diagram with two fragments that are identified as Fragment1 and Fragment2.
COMMAND_NAME Fragment1
Fragment2
Fragment1
KEYWORD_A= valueA KEYWORD_B KEYWORD_C
Fragment2
KEYWORD_D KEYWORD_E= valueE KEYWORD_F
This chapter provides an overview of the IBM Z NetView program, including information about the
NetView components. It also describes key programs with which the NetView program interoperates
and provides an overview of networking concepts.
Automation
Automated operations enable corrections to occur without human intervention. The automation
capabilities of the NetView program facilitate and simplify operator interactions and include the following
functions. For information about the operator use of automated capabilities, see Part 4, “Automating the
Network or System,” on page 161. For detailed information about NetView automation capabilities, see
IBM Z NetView Automation Guide.
• Automation of responses to messages and events
This automation is enabled by the NetView automation table.
IP Management
TCP/IP management is an integral part of the IBM Z NetView program. A full array of management
functions is provided, including the following functions. For detailed information about these functions,
see IBM Z NetView IP Management.
• Management of SNA over IP
The Enterprise Extender technology enables the transport of SNA traffic over an IP network. This
technology routes SNA path information units (PIUs) over Advanced Peer-to-Peer Networking nodes
Chapter 1. Introduction 5
The NetView program manages both active and historical connections, including stack name, local
and remote addresses and ports, start time, end time and termination code (for connections that
have ended), traffic information such as sent and received byte and segment counts, retransmit
counts, and information about the connection state, the interface, the host, TN3270, and more. With
this information, for example, connections that end but should still be active or connections with
unexpectedly low activity can easily be identified. Data is available both in a form for you to read and in
binary form for programming use. Host name translation and IPv4 or IPv6 addresses are supported. In
addition, the cross-domain capabilities of the NetView program enable the viewing of connection data
at remote z/OS hosts, thus enabling centralized management. The NetView program can also provide
details about encryption protocols being used on active connections by exploiting Communication
Server's z/OS Encryption Readiness Technology (zERT).
• Packet trace collection and formatting at the stack and Open Systems Adapter (OSA) level
The examination of packet content is sometimes necessary to debug a problem. The NetView program
provides real-time capture and formatting of IP packet or OSA trace data, including both headers and
payloads. The formatting is the same as that under IPCS, so that you do not have to learn a new format.
Because the formatter is directly integrated with the TCP/IP stack, no translation mismatches can occur.
Highly flexible tracing and formatting options are available so that you can filter out unwanted data.
Both IPv4 and IPv6 packets are supported, and the data is also available in binary (unformatted) form
for use by automation routines. In addition to providing data, the NetView program provides analysis
to help locate problem areas. For example, the analysis can indicate how many of your IP connections
(TCP, UDP or ICMP) have errors and the kinds of errors (delayed ACKs, resets, retransmissions, and
zero window size). With the NetView program, this information is readily available. If necessary, you can
run multiple IP packet traces simultaneously. Packet traces can be saved in CTRACE and Sniffer trace
format for additional analysis.
• Command support
Monitoring a network or system can have limited value when you cannot take action on problems that
you find. The NetView program provides extensive support for IP-related commands, giving you the
control capabilities you need to manage IP resources. The following commands can be issued from the
NetView command line directly, in REXX procedures, and in other automation routines:
– The TN3270 command logs in to remote TCP/IP-connected systems, either from the NetView
command line or from the NetView management console.
– The SNMP command sends requests to SNMP agents to retrieve or set information in the
management information bases (MIBs) maintained by those agents. Besides supporting SNMPv1 and
SNMPv2c, this command also supports SNMPv3 authentication and encryption from the command
line, REXX, and command lists, with switches for the following settings:
- The authentication protocol (MD5 or SHA) used for authenticating SNMPv3 messages
- The authentication pass phrase used for authenticating SNMPv3 messages
- The privacy pass phrase used for encrypted SNMPv3 messages.
- The encryption (privacy) algorithm (DES or AES) used for encrypting and decrypting SNMPv3
messages.
– Any UNIX System Services command can be issued directly from the NetView command line or used
in REXX procedures and other automation routines.
– The SOCKET command retrieves information about TCP/IP stacks or can be used to run stack
services. It can be used in TCP/IP applications based on the NetView program.
– The TRACERTE command traces the routes of data packets to a specified IP host from the TCP/IP
stack on the host on which the NetView program is running. Use this command to determine
connectivity with or routing to a particular endpoint, roundtrip times between the NetView and target
hosts, and routers along the way.
– The PING command tests connectivity to an IP host.
– The RMTCMD command sends system, subsystem, and network commands to a remote NetView host
for processing.
Chapter 1. Introduction 7
is stored in RODM, including resources that are discovered by the discovery manager and by customer
or vendor applications that use the Graphic Monitor Facility host subsystem data model.
• IPv6 support
In support of the growing adoption of IPv6 addresses, the NetView program provides for IPv6
connectivity, allows IPv6 addresses in command input, and displays IPv6 addresses in messages,
views, and most other places where an IP address can be shown.
• Security
To prevent unauthorized connections to the NetView program from a TCP/IP host, you can restrict
access using the NetView command authorization table, the NETCMDS class of an SAF product, and
sample definition members that are part of the NetView program. You can also protect IP addresses
for command security and span of control. For more information about security, see the IBM Z NetView
Security Reference.
The NetView program can also collect security data for active TCP/IP connections. Data includes the
state of IP filtering on the connection, the types of encryption protocols being used on the connection
(if any), and information on any digital certificates being used on the connection. For each encryption
protocol (TLS/SSL, SSH or IPSec), protocol-related information such as encryption algorithms, cipher
suites, message authentication algorithms and FIPS140 support is collected. Data is displayed in the
Tivoli Enterprise Portal and is available in 3270 messages.
• AON IP functions
Most IP-related functions that were previously implemented as part of the NetView Automated
Operations Network (AON) component are now implemented as base NetView services and no longer
require AON enablement and configuration. The following functions are exceptions and still require
AON; for more information about these functions, see the IBM Z NetView User's Guide: Automated
Operations Network.
– IP server management (managing TSO server sessions)
– Issuing of line mode TSO and UNIX commands without logging on to TSO
– SNMPView
– CISCOWorks Blue Inter-network Status Monitor
For information about installing and enabling the various IP functions, including a "Getting Started" guide
for enabling basic IP management, see IBM Z NetView Installation: Configuring Additional Components.
Security
The IBM Z NetView program includes many provisions to ensure that only authorized personnel gain
access to the product and its capabilities, and thereby to the networks, systems, and data it controls.
These include user IDs and passwords; limitations on scope of authority; terminal access restrictions;
authorization through an SAF product for commands, views and data sets; and other mechanisms.
RACF® supports mixed-case passwords. To support that capability and to reduce the already remote
likelihood of a successful random logon attempt, the NetView program also accepts mixed-case
passwords. If the RACF mixed-case password function is active and passwords are defined in mixed
case, the NetView program leaves them unchanged. Otherwise, NetView passwords are converted to
uppercase. This processing applies to all password handling.
The NetView program provides support for password phrase authorization. A password phrase can be
used as a substitute for a password for all NetView functions that use a SAF product, such as RACF, for
security checking. The password phrase can include phrases that are 9 - 100 characters long, without
character restrictions.
The NetView program currently has the capability to perform Multi-factor Authentication (MFA)
authentication. This enhancement provides the capability to change MFA passwords and passphrases
from the NetView program.
For detailed information about NetView security capabilities, see IBM Z NetView Security Reference.
Chapter 1. Introduction 9
• “Command Revision Table” on page 13
• “Program-to-Program Interface” on page 13
• “Event/Automation Service” on page 14
• “User Interfaces and Help” on page 14
For the distributed components and the NetView operating environment, including other programs that
work with the NetView program, see Figure 2 on page 16 in “Programs That Interact with the IBM Z
NetView Program” on page 15.
Core Components
The core NetView components, which are shown in the following list, run under the MVS element in a z/OS
system.
• “Command Facility” on page 10
• “Hardware Monitor” on page 11
• “Session Monitor” on page 11
• “Terminal Access Facility” on page 11
• “Automated Operations Network” on page 11
• “Browse Facility” on page 11
• “Automation Table” on page 11
• “Status Monitor” on page 11
Command Facility
The command facility is used to send commands and receive messages. It also provides base functions
and services for other components, such as intercomponent communication, presentation services,
database services, and automation facilities.
Session Monitor
The session monitor component provides information about SNA sessions (subarea and Advanced
Peer-to-Peer Networking) including session partner identification, session status, connectivity of active
sessions, and response time data. The session monitor also provides session trace data, route data, and
Virtual Telecommunications Access Method (VTAM) sense code information for problem determination. It
can display all SNA sessions across an Enterprise Extender connection.
Browse Facility
The browse facility is used to view local or remote NetView data set members including the NetView log,
NetView parameter files, and NetView panels.
Automation Table
With the NetView automation table, you can specify processing options for incoming messages and
MSUs and issue automatic responses. The table contains a sequence of statements that define the
actions that the NetView program can take in various circumstances. The automation table is one of
several components that provide automation capabilities; for more information about automation, see
“Automation” on page 3.
Status Monitor
The status monitor component provides status information about SNA subarea network resources.
Chapter 1. Introduction 11
Resource Object Data Manager
Resource Object Data Manager (RODM) is an object-oriented data cache. Objects in RODM can represent
resources in your network. The data cache is located entirely in the memory of the host processor for fast
access to data and high transaction rates. RODM can contain approximately 2 million objects, providing
support for large and growing networks.
The NetView program populates RODM with management information such as topology and status that is
related to the resources that are being monitored, and maintains that information as changes occur. Using
data in RODM, the Graphic Monitor Facility host subsystem component dynamically builds graphical views
for display by the NetView management console. When the topology or status changes in RODM, methods
automatically update the views that include the affected resources.
Additionally, authorized operators can use the RODMView command to display, create, update, and delete
classes, objects, fields, and relationships in RODM.
RODM also provides application programming interfaces (APIs) that can be used by any application
running in the host processor. A user API allows a properly authorized address space to access the
data contained in the RODM address space and data spaces. Through this user API, objects can be
created, organized into hierarchies, or deleted. The user API can also query the value of a field associated
with an object or alter the value in that field. It can be called from NetView command processors and
from applications written in any programming language that meets the parameter passing conventions
of RODM. A method API enables methods that reside in the RODM address space to be called by user
applications, by changes to fields in RODM, by other methods, and at RODM initialization.
Subsystem Interface
The subsystem interface is used to receive system messages and enter system commands. With extended
multiple console support (EMCS) consoles, the subsystem interface is used to receive commands, but not
messages. In a single system, multiple NetView programs can use the subsystem interface. Each NetView
program that uses the subsystem interface requires a NetView subsystem address space in addition to
the NetView application address space.
Using the subsystem interface is optional. If you do not need to use the PPI, receive system messages, or
enter system commands from a NetView program, then that NetView program does not need to use the
subsystem interface.
Program-to-Program Interface
The program-to-program interface (PPI) enables application programs to communicate with the NetView
program and other applications running in the same host. When an application calls the PPI using its
application program interface (API), the request is synchronous.
Chapter 1. Introduction 13
For more information about the PPI , see the IBM Z NetView Application Programmer's Guide.
Event/Automation Service
The Event/Automation Service (E/AS) serves as a gateway for event data between the Z NetView
management environment, managers and agents that handle Event Integration Facility (EIF) events, and
SNMP managers and agents. With this gateway function, you can manage all network events from the
management platform of your choice.
If you manage network events using the Tivoli Netcool/OMNIbus program, the Tivoli Enterprise Console®
program, or a similar event manager on a distributed platform, E/AS can convert Z NetView alerts and
messages into EIF events before forwarding the event data to that event manager.
If you choose to manage events at the NetView program, E/AS can convert EIF events from an EIF agent
into alerts before forwarding the alerts to the Z NetView program through the Alert Receiver PPI mailbox.
The E/AS can convert SNMP traps from SNMP managers into alerts before forwarding the alerts to the Z
NetView program through the Alert Receiver PPI mailbox. The E/AS also converts Z NetView alerts into
SNMP traps before forwarding the trap data to an SNMP manager. The E/AS performs the function of an
SNMP subagent and sends the converted alert data to an SNMP agent for eventual forwarding to an SNMP
manager. Note that these functions are also available as base NetView services, independent of E/AS.
For information about the services of the E/AS, see “Services of the Event/Automation Service” on page
100.
The following Z NetView mainframe online help is available, depending on your installation and
configuration:
• General help and component information
• Command help
• Message help
• Sense code information
• Recommended actions
• Help desk
The following online help is available in workstations running Z NetView components, depending on your
installation and configuration:
• Tivoli Enterprise Portal help
• NetView management console help
• IBM Z NetView Documentation, which includes the Z NetView online library
Chapter 1. Introduction 15
Figure 2. NetView Operating Environment
MVS
MVS services and functions are provided by the Base Control Program (BCP), a base element and the
backbone of the z/OS system. These essential services enable reliable, secure workload processing with
complete data integrity and without interruption.
Chapter 1. Introduction 17
TSO
Operators, administrators, programmers, and others who access z/OS can use Time Sharing Option/
Extensions (TSO/E or simply TSO) to create an interactive session with the z/OS system. TSO provides a
single-user logon capability and a basic command prompt interface to the z/OS operating system.
Most users work with TSO through the menu-driven interface, Interactive System Productivity Facility
(ISPF). This collection of menus and panels offers a wide range of functions to assist users in working with
data files on the system.
NetView operators or programs can interact with TSO using the NetView TSO PIPE stage. For more
information, see the help for PIPE TSO.
System Operations
The system operations component monitors and controls system operations applications and subsystems
such as the Z NetView program, System Display and Search Facility (SDSF), job entry subsystem (JES),
Resource Measurement Facility (RMF), Time Sharing Option (TSO), RODM, VTAM, DB2, CICS, IMS,
OMEGAMON, Tivoli Business Service Manager , and Tivoli Workload Scheduler. With system operations,
you can automate Parallel Sysplex applications. System Automation can automate applications that are
distributed over a sysplex by virtually removing system boundaries for automation through its automation
manager/automation agent design. System Automation reduces the complexity of managing a Parallel
Sysplex cluster through goal-driven automation and concepts such as grouping and powerful dependency
support, which you can use to model your configuration. Single systems are also fully supported; the
automation scope is then just one system. System Automation uses enterprise monitoring to interoperate
with products such as IBM Tivoli Netcool/OMNIbus or the IBM Tivoli Service Request Manager® product in
case of an incident and to update the health status information that is displayed on the Tivoli Enterprise
Portal through the IBM Tivoli Monitoring infrastructure.
Processor Operations
The processor operations component monitors and controls processor hardware operations. It provides
a connection from a focal point processor to a target processor. With the NetView program on the
focal point system, processor operations automates operator and system consoles for monitoring and
recovering target processors. You can use processor operations to power on, power off, and reset multiple
target processors; to load the initial programs; to set the time-of-day clocks; to respond to messages; to
monitor status; and to detect and resolve wait states.
GDPS
The GDPS solutions are multi-site or single-site end-to-end application availability solutions that
provide the capability to manage remote copy configuration and storage subsystems, automate Parallel
Sysplex operation tasks, and perform failure recovery from a single point of control. You can use the
GDPS solutions to automate recovery procedures for planned and unplanned outages to provide near-
continuous availability and disaster recovery capability.
Tivoli Netcool/OMNIbus
IBM Tivoli Netcool/OMNIbus is a service level management system that collects enterprise-wide event
information from a wide variety of IT and network environments in real time and presents a consolidated
view of this information to operators and administrators. Tivoli Netcool/OMNIbus tracks alert information
in a high-performance, in-memory database, and presents information of interest to specific users
through filters and views that can be configured individually.
Chapter 1. Introduction 19
• Monitor and control the network and system
• Investigate and solve problems
• Control the NetView program
In a multiple-host environment, you can automate the NetView program so that many operation tasks
are automatically performed in distributed hosts. Significant events that require intervention can be
forwarded to a NetView operator at the focal point host. You can design systems so that little or no
intervention is required at the distributed hosts.
Table 1 on page 20 describes these categories of tasks, and the remaining chapters of this book further
divide these categories into subcategories and actual tasks that make up network management.
Note: For information about automating the NetView program, see the IBM Z NetView Automation Guide.
Controlling the NetView Environment Controlling the NetView program is the continual
adjustment of the NetView environment to achieve
This management task is described in the following
the goals of monitoring, investigating, analyzing, and
chapters:
controlling of network and system components.
• Chapter 10, “Maintaining the NetView Program,” on
page 123
• Chapter 11, “Controlling NetView Operation,” on
page 129
• Chapter 12, “Managing NetView Data,” on page 143
Chapter 1. Introduction 21
22 IBM Z NetView: User's Guide: NetView
Chapter 2. Getting Started
This chapter describes how to get started using the IBM Z NetView program and briefly describes the Z
NetView interfaces and functions. It also provides an introduction to the NetView REST Server.
s procname
When the NetView program starts, certain functions can be specified to start automatically. See Chapter
11, “Controlling NetView Operation,” on page 129 for more information.
• To start the NetView subsystem, enter the following command, where procname is the name that
your system programmer assigned to the cataloged procedure for the NetView subsystem, such as
CNMPSSI:
s procname
• To start the Event/Automation Service, enter the following command, where procname is the name your
system programmer assigned to the cataloged procedure for the Event/Automation Service, such as
IHSAEVNT:
s procname
s procname,type=c,name=rodmname
If you do not enter a value for rodmname, the NetView program defaults to procname.
You get the following message requesting confirmation not to use the checkpoint data sets:
s procname,type=w
This is the default for the RODM procedure that is supplied by the NetView product (if you do not
specify TYPE=C).
See “Copying the Contents of RODM to a Checkpoint Data Set” on page 160 for information about how
to copy the data from the RODM data cache to a checkpoint data set.
• To start the GMFHS program, enter the following command:
s procname.id
• To start the IBM Z NetView Enterprise Management Agent, enter the following command, where
procname is the name that your system programmer assigned in the Agent started task field on the
Specify Agent Address Space Parameters panel in the Configuration Tool during agent configuration:
s procname
Replying to a Message
If the DSIWTOMT task is started, the NetView program issues a write-to-operator with reply (WTOR)
message to the system console when initialization is complete. This WTOR message is outstanding while
the NetView program is active. The message ID is either DSI802A or DSI803A. You can use the REPLY
command to issue NetView commands from the system console. For example, if you see the following
WTOR message on your system console:
*07 DSI802A CNM01 REPLY WITH VALID NCCF SYSTEM OPERATOR COMMAND
r 07,command
Stopping NetView
To stop the NetView address spaces, enter the following commands from the system console:
p procname
You can also stop the NetView program by replying to the NetView outstanding WTOR in the following
way, where nn is the reply identifier for the WTOR message DSI802A or DSI803A:
r nn,close stop
Using one of these methods allows the NetView program to write recent messages from the Canzlog
data space to Canzlog archive files. To allow the NetView program to write recent messages to the
Canzlog archive files when it is stopped by another method, use the CANZLOG CUE command. See the
help for the CANZLOG command for more information.
• To stop the NetView subsystem, enter the following command, where procname is the name that
your system programmer assigned to the cataloged procedure for the NetView subsystem, such as
CNMPSSI:
p procname
• To stop the Event/Automation Service, enter one of the following commands, where procname is the
name your system programmer assigned to the cataloged procedure for Event/Automation Service such
as IHSAEVNT:
f procname,term
p procname
• To stop the RODM program, enter the following command, where procname is the name that your
system programmer assigned to the cataloged procedure for the RODM program, such as EKGXRODM:
f procname,term
• To stop the GMFHS program, enter one of the following commands, where procname is the name
that your system programmer assigned to the cataloged procedure for the GMFHS program, such
CNMGMFHS:
f procname,term
p procname
• To stop the Z NetView Enterprise Management Agent, enter the following command, where procname is
the name that your system programmer assigned in the Agent started task field on the Specify Agent
Address Space Parameters panel in the Configuration Tool during agent configuration:
p procname
f procname,command
For example, to display the MVS console names and IDs used by the NetView program, enter the following
command:
f procname,disconid
When the NetView subsystem is active, you can also enter NetView commands by prefixing the command
with a designator that identifies the command as belonging to the NetView program. The default
command designator is the 4-character subsystem name. For example, if job T130TEST is the NetView
subsystem address space job, the designator is T130. To display the MVS console names and IDs used by
the NetView program, enter the following command:
t130 disconid
You can register the command designator with the MVS system on which the subsystem address space
job runs or you can register the prefix for the entire sysplex. This is done when you start the NetView
subsystem address space.
Note: If you use the MVS MODIFY command, a designator character for the NetView program is not
required.
Topic: Reference:
CNMSJ009 and CNMSJ010 IBM Z NetView Installation: Getting Started
(NetView start procedure)
NetView commands NetView online help
Associating an autotask with an AUTOTASK command in the NetView online help
MVS console
NetView cataloged procedures IBM Z NetView Installation: Getting Started
Activating VTAM, NetView, SSI, IBM Z NetView Installation: Getting Started
RODM, and GMFHS
The password is accepted only on the VTAM LOGON command when the NetView program has
enabled the function through the LOGONPW command. In this case data is entered in the form
userid/password.
When you log on, the NetView program queries the device for screen size and color attributes if the
logmode specifies to issue the query. Otherwise, the NetView program uses the screen size specified
in the logmode. The command facility adapts to use the entire width and depth of the screen. The
hardware monitor and session monitor adapt to use the screen depth, but limit the display to 80
characters in width. "The hardware monitor supports a maximum of 107 rows. All components of the
NetView program support color where the display is capable of displaying color.
When a session is established, a NetView logon panel similar to the one shown in Figure 3 on page
27 is displayed.
NN NN VV VV
NNN NN EEEEEE TTTTTTTT VV VV II EEEEEE WW WW TM
NNNN NN EE TT VV VV II EE WW W WW
NN NN NN EEEE TT VV VV II EEEE WW WWW WW
NN NNNN EE TT VV VV II EE WWWW WWWW
NN NNN EEEEEE TT VVV II EEEEEE WW WW
NN NN V
Notes®:
• The NetView program provides the option of specifying whether password checking is performed
by the NetView program or by an SAF security product such as RACF. The method of checking is
specified by the SECOPTS.OPERSEC statement in the CNMSTYLE member, described in the IBM Z
NetView Administration Reference.
If you specify that the NetView program is to do password checking, be aware that any password
that is defined to the NetView program is automatically converted to uppercase and stored in
uppercase. If you specify that password checking is to be done by using an SAF security product,
you can use the mixed-case password function. Also, if you are using an SAF security product, you
can use a password phrase as a substitute for a password.
If the value of the SECOPTS.OPERSEC statement in the CNMSTYLE member is SAFDEF, or if the
OPERSEC operand was specified as SAFDEF on the REFRESH command, no PROFILE field is shown
on the Logon panel and the HARDCOPY LOG field does not have a default value.
• In the PROFILE ==> field, system symbolic substitution is performed on records that are read from
the DSIOPF member in the DSIPARM data set and the specified profile member in the DSIPRF data
set. The symbolic supplied by the NetView product is also included in the substitution process.
The substitution occurs after comment removal but prior to record processing. After substitution,
On the logon panel, type a valid operator identifier in the OPERATOR ID field; type the appropriate
credential (a token, PIN, passcode, password, password phrase, or some combination of credentials
as configured by a security administrator) in the PASSWORD field; type the desired options in the
HARDCOPY LOG, RUN INITIAL COMMAND, Takeover session fields; type a non-blank character in
the Change password field, and press enter. The New Password panel is presented.
On the New Password panel, type the password or password phrase for the user profile in the SAF
product, in the OLD PASSWORD field, and type the new password or password phrase for the user
profile in the SAF product in the NEW PASSWORD and VERIFY NEW PASSWORD fields and press
enter.
9. Fill in the fields as appropriate
10. Press Enter.
If you left the PASSWORD field blank and the NetView program is using an SAF product such as RACF
to check passwords or password phrases, the panel shown in Figure 5 on page 29 is displayed.
NN NN VV VV
NNN NN EEEEEE TTTTTTTT VV VV II EEEEEE WW WW TM
NNNN NN EE TT VV VV II EE WW W WW
NN NN NN EEEE TT VV VV II EEEE WW WWW WW
NN NNNN EE TT VV VV II EE WWWW WWWW
NN NNN EEEEEE TT VVV II EEEEEE WW WW
NN NN V
DOMAIN = CNM01
PASSWORD ==>
| CNM01
News for 29 Apr 2022
new messages
2
----------------------------------------------------------------------- 3
old messages
4
??? 5
command entry area 6
You can customize this panel for your needs.For additional information about changing the format of the
NetView panel, see sample CNMSCNFT and “Changing the NetView Screen Layout” on page 134.
Message Area
The message area displays commands, responses, and messages from the system. Figure 9 on page 32
shows a sample display screen.
The dashed line, indicated by 3 separates the latest messages from the older ones. The messages are
continually updated. You can use this line to locate the most recent messages. The most recent messages
are the ones directly above the line, in the area indicated by 2 . The oldest messages displayed on the
screen are at the bottom of the screen, below the line, in the area indicated by 4 .
You can use message suppression to limit the number of messages sent to the screen, as described in
the IBM Z NetView Automation Guide. See Appendix A, “Message Formats,” on page 233 for additional
information about message formats.
To rearrange the messages on the screen, press the Enter key. This redisplays the messages in sequential
order and removes the dashed line. If you type a command and press Enter before you rearrange the
messages on the screen, you might have to press Enter again to see the full response.
Generally, messages are no longer displayed as the screen scrolls. Examples of exceptions include reply
messages, held messages, and windowed responses.
Reply messages are messages to which you need to reply before you delete them from the display screen.
These messages are displayed in high intensity on your display screen with a Pnumber or Lnumber and
the message number, where number is a 2- or 4-digit number. Unsolicited reply messages received on the
system console remain outstanding even after a reply is given. Delete these messages manually using the
MVS control (K) command.
Response Area
Near the bottom of the screen is a line that begins with the ??? indicator. This line is the response area,
indicated by 5 in Figure 8 on page 31. Look here for error messages.
The =X= indicator is displayed in place of the ??? indicator when messages are arriving (prior to entering
or after leaving a panel). This indicator means that only a limited set of commands can be used. The
following commands are some of the commands you can use:
• AUTOWRAP
• CLOSE
• GO
• HOLD
• LOGOFF
• RESET
Hint: In general, commands that are specified as TYPE=I or TYPE=B in CNMCMD can be used when the
=X= indicator is displayed.
Most of these commands change how quickly new information is presented. If you enter any other
command, you get message DSI596I, which reads WAITING TO DISPLAY A PANEL, COMMAND NOT
PROCESSED. HIT ENTER.
For example, to move to the hardware monitor initial screen (or the last panel viewed if the hardware
monitor component is still active), enter npda.
In the NetView program, you can have multiple components active at the same time. Use the ROLL
function to move among active components in a continuous loop. The PF key that is supplied by the
NetView product for ROLL is PF6. If your PF key settings have PF6 set to ROLL, then pressing PF6 returns
you to the last panel you viewed in an active component.
To display a list of the active components, enter the following command:
LIST ROLL
RESUME component_name
For additional information about the hierarchy of panels within the session monitor, hardware monitor and
status monitor, see Appendix B, “NetView Component Hierarchies,” on page 235. This information also
includes the command that you can use to enter the hierarchy at a specific point.
If you are in a component other than command facility with a panel displayed, you can be interrupted by
a message from another component. This message is displayed on the command facility screen. After the
message is displayed, the NetView program displays *** at the bottom of the command facility screen.
You can press Enter to return to the panel you were using when the interrupt occurred.
Issuing Commands
You can direct commands to explicit destinations in the NetView environment. Table 3 on page 35 shows
the possible destinations and how to direct commands to those destinations.
Note: You do not have to use the NetView MVS command to run the DISPLAY (D) command, the MODIFY
(F) command, or the VARY (V) MVS command. For more information on the MVS command, see the IBM Z
NetView Command Reference Volume 1 (A-N).
To direct a command to the session monitor or hardware monitor from another component, type the
component name followed by the command. For example, to view the total statistics information in the
hardware monitor from the session monitor, enter the following command:
npda tot st
To direct a command to the status monitor, type the command without prefixing it with the component
name. For example, to start automatic node reactivation for all applicable nodes from the session monitor,
enter the following command:
dispfk nccf
A scrollable window similar to the following one is displayed, showing the default values that are supplied
by the NetView product. Your system might have different values, and each operator can change PF key
values, both in a profile and interactively.
Figure 10. Default Command Facility PF Keys That Are Supplied by the NetView Product
You can also display PF key settings for other components, such as status monitor, hardware monitor, and
log browse by specifying their component abbreviations on the DISPFK command or a PF key set to that
command. For example, the NetView defaults specify the DISPFK command with the APPEND keyword
as PF4; you can type a component name on the command line and press PF4 to see the PF keys for that
component. Browse the CNMKEYS member or enter dispfk all to display all PF key settings. As an
example of other default settings supplied by the NetView product, see Figure 44 on page 76.
If you need only a single PF key definition, enter the following command, where nn is the PF key number:
list key=pfnn
See “Defining Program Function Keys” on page 131 for information about changing the settings of PF
key defaults across components, or for individual components such as the command facility, hardware
monitor and session monitor.
Service Management Unite Automation V1.1.7 provides modern NetView dashboards that allow you to
display the following information:
• NetView overview dashboard that displays all NetView domains accessible to an Enterprise Master
NetView program
• Canzlog messages
• NetView health dashboard that displays key metrics about NetView domain and its tasks
• Automation dialogs that provide the capability to create, validate, and test automation table statements,
as well as manage automation table members
• Sysplex connection distribution dashboard that displays connection distribution metrics and graphical
views for DDVIPAs and ports
• Output from NetView commands
The NetView REST Server is a pre-requisite to view the NetView dashboards in Service Management Unite
Automation.
This chapter provides an overview of how to manage your network from a workstation using the following
components:
• NetView Enterprise Management Agent, described in “Using the NetView Enterprise Management
Agent” on page 41
• NetView management console, described in “Using the NetView Management Console” on page 41
Monitoring is the examination of the entire network and system for changes in the status of individual
components from satisfactory to a status requiring attention.
Controlling is the taking of specific actions against individual network and system components to change
their status, make them available for monitoring, or to manipulate the use of the resources.
function.autotask.NRM=AUTORNM
Use NetView Resource Manager to set thresholds for the following types of resources:
• Processor
• I/O
• MQS rates
• Storage
• Message queue count
When a resource reaches a threshold, a status change is sent to NetView management console. Reaching
a threshold does not cause any action to be taken on the task. The NetView Resource Manager NetView
uses the following functions:
• RODM
• RMTCMD
• Hardware Monitor
• TCP/IP Alert Receiver (if your communication method is TCP/IP)
The NetView Resource Manager agent NetView program uses the RMTCMD function. NetView Resource
Manager can also be used without the NetView management console. When a threshold for a resource is
reached or exceeded, the following message is issued:
Automation to take an appropriate action can be written for this message. When the limit for the resource
returns to a level that is below the threshold, the following message is issued:
For more information about setting up and using NetView Resource Manager, see the following
documents:
• IBM Z NetView Installation: Configuring Graphical Components
• IBM Z NetView Resource Object Data Manager and GMFHS Programmer's Guide
You can monitor your network and system for changes in the status of individual resources. The NetView
program lets you track these changes and display the information for any required analysis. You can
explicitly request status information or the NetView program can present it automatically. You can control
the amount of information collected, and you can request more information, such as network and system
definitions, for use in analyzing changes in status.
You can then take specific actions against individual resources to change their status, make them
available for monitoring, or to manipulate their usage. This can include controlling the configuration and
definition of the resources. The NetView program provides controls to limit the functions you can use and
the resources you can access.
d net,id=cnm01003,e
???
Notice that the application CNM01003 is active and currently has one session running. The NetView
program supplies command lists (DIS, ACT, INACT, DISG) that can be used instead of the VTAM
commands. For more information about these commands, see “Using NetView Commands (SNA Subarea,
SNA Advanced Peer-to-Peer Networking)” on page 48, and refer to the NetView online help.
v net,id=nru0505,inact
v net,id=nru0505,act
To activate, inactivate, or load an NCP, complete the following steps from the NetView command facility:
1. To inactivate an NCP named NCP45, enter:
v net,id=ncp45,inact
v net,id=ncp45,act,load=yes
applspen a01a701,act
disg a04p1092
Select:
1 NCP 2 Line 3 Link Station
Sending Commands
The following example uses the local NetView program and a remote NetView program named CNM02.
Complete the following steps to activate an NCP controlled by the VTAM program on CNM02:
1. From your local NetView console, enter the following command:
This command establishes an association with a RMTCMD autotask using the same name as your
operator ID running in the remote NetView program CNM02.
2. To ensure the NCP is now active, enter:
The command response indicates that you activated the NCP successfully.
The first time you issue the RMTCMD command, the NetView program establishes an association between
your operator ID and your RMTCMD autotask in the remote NetView program. Subsequent commands are
sent using this association. The association remains active until:
• You log off your local NetView program.
• You send a LOGOFF command to your RMTCMD autotask.
endtask lu=cnm02,stop
• An SNA sense code is received indicating a communication failure with the remote NetView.
rmtsess
A list of the RMTCMD autotasks which you have started is displayed. An example is shown on Figure 14 on
page 50:
???
RMTSESS
Notice in this example that the operator started two RMTCMD autotasks on NETA.CNM01: OPER1 and
OPER5. Also, the operator started a RMTCMD autotask on NETB.CNM20: OPER2.
Syntax
In the simplest case, entering /: command allows the label to default to your domain and your operator
ID. In this case, the label prefix bypasses RMTCMD or EXCMD processing, and simply correlates the
responses with the command.
command
Where:
netid
Specifies the VTAM network ID that should be used for routing the command. If specified, the netid
value, including an asterisk (*), must be followed by a period (.). If you do not specify a value or an
asterisk, the default value is to find the network ID dynamically. See the description of the RMTCMD
command in the IBM Z NetView Command Reference Volume 1 (A-N) for more information.
domain_name
Specifies the application name (such as CNM02) of the NetView program to which the command
should be routed. The presence of this value determines that the label is treated like a RMTCMD SEND
request.
If the domain name that you specify was defined for IP routing by your system programmer (using a
RMTSYN statement in the CNMSTYLE member), your command is routed over TCP/IP.
operator_id
Specifies the name of the operator task where the command should process. If you specify an opid
value, other than your operator ID, the label is treated like an EXCMD command. If you do not specify
a value or enter an asterisk (*), the default is to send the command to your operator ID.
wait_time
Specifies the maximum time in seconds that the command running on the target is to collect
correlated messages.
If you do not specify wait_time, the default_time is defined by the CCDEF command specifications,
such as the values supplied by the NetView product in the DSICCDEF profile. If the label specifies a
remote domain, the default_time of the CCDEF specifications at the remote domain determines the
default wait time.
command
Specifies the command, keyword, or values, which are routed and correlated by the label prefix.
Usage Notes
The following list includes usage considerations:
• A label can be used anywhere a regular NetView command can be entered, except on the assembler
interface described in IBM Z NetView Programming: Assembler.
• You must enter a blank before any command, immediately after the colon. No blanks can be used within
the label.
• Error conditions and messages, including authority checking, typically apply as if you had entered a
RMTCMD or EXCMD command. Unlike RMTCMD or EXCMD, the label syntax causes correlated responses
from the command to be returned to the originator. For more information, refer to the description of the
NetView RMTCMD and EXCMD commands in the NetView online help.
• If your label addresses a remote NetView program, the command is transmitted by either LU 6.2 or
TCP/IP as determined by the RMTSYN definitions in the CNMSTYLE member.
• When using labeled commands to send a VTAM command to a remote VTAM, ensure the automation
table entries for IST097I match in both the local and remote NetView systems.
• For commands with slower than expected response times (for example MVS ROUTE), you might need
to set longer time-out values. The slower response time causes the target task to remain in a wait
Topic: Reference:
ENDTASK, REFRESH, RMTCMD NetView online help
command
Defining RMTCMD and RMTCMD IBM Z NetView Installation: Configuring Additional Components
Security
Security Definitions (RMTSEC and IBM Z NetView Administration Reference
RMTSECUR parameters)
Example
The following example shows how to use the /AUTO1: QRYGLOBL TASK,VARS=* command to query
the values of a task global variable under another task:
sess *discard
Because the PIUs in this area are associated with many different sessions, no session parameters or
session configuration data are available. However, selection from the SESS panel displays the trace data.
The size of the *DISCARD area is specified by the session monitor KEEPDISC initialization statement. The
*DISCARD data is not saved in the VSAM database when the session monitor is brought down unless the
save is set up by a FORCE command. You can use this command with a timer-driven command list.
If associated with a specific session, PIUs discarded by the access method are inserted in the active
session's PIU wrap area. You can then examine the discarded PIU in the context of that session's PIU
flow. If the PIU is discarded from this area (because of session activity), a copy can still exist in the
*DISCARD file.
Route Data
Active route data is collected whenever a route is first used by a session. The route information includes a
list of PUs and transmission groups (TGs) that make up the explicit route. Use the session monitor to view
the route data and then proceed into the session hierarchy on a route-by-route basis.
Active route data is displayed in the following ways:
• Active explicit route list
• Active virtual route list
• Active virtual route status
• Explicit route configuration
• Transmission group information
• Advanced Peer-to-Peer Networking route data
Activation status includes BIND failure, UNBIND reason and sense codes, and INIT failure. Session
awareness data includes information about the activation status for certain non-SNA terminals not
supported by the Network Terminal Option.
Session awareness data is displayed in various forms. Some examples are resource lists, domain lists,
session histories for specific resources, and session configuration diagrams. Session awareness data is
required for all other types of data collection.
DOMAIN CNM09
SEL# DESCRIPTION
NLDM.LIST PAGE 1
RESOURCE NAME LIST
LIST TYPE: ACTIVE LU DOMAIN: CNM09
------------------------------------------------------------------------------
SEL# NAME STATUS SEL# NAME STATUS SEL# NAME STATUS
( 1) AAUTCNMI ACTIVE (16) BNJHWMON ACTIVE (31) CNM09003 ACTIVE
( 2) A09A701 ACTIVE (17) CNM01 ACTIVE (32) CNM09004 ACTIVE
( 3) A09A702 ACTIVE (18) CNM02 ACTIVE (33) CNM09005 ACTIVE
( 4) A09A703 ACTIVE (19) CNM02LUC ACTIVE (34) CNM09006 ACTIVE
( 5) A09A704 ACTIVE (20) CNM18 ACTIVE (35) CNM09007 ACTIVE
( 6) A09A705 ACTIVE (21) CNM18LUC ACTIVE (36) CNM09008 ACTIVE
( 7) A09A706 ACTIVE (22) CNM20 ACTIVE (37) CNM09010 ACTIVE
( 8) A09A740 ACTIVE (23) CNM69LUC ACTIVE (38) DSIAMLUT ACTIVE
( 9) A09A741 ACTIVE (24) CNM09 ACTIVE (39) DSICRTR ACTIVE
(10) A09A742 ACTIVE (25) CNM09LUC ACTIVE (40) DSIGDS ACTIVE
(11) A09A743 ACTIVE (26) CNM09PPT ACTIVE (41) ECHOA99 ACTIVE
(12) A09A744 ACTIVE (27) CNM09SPT ACTIVE (42) ECHOA09 ACTIVE
(13) A09A745 ACTIVE (28) CNM09000 ACTIVE (43) ISTNOP ACTIVE
(14) A09A746 ACTIVE (29) CNM09001 ACTIVE (44) ISTPDCLU ACTIVE
(15) A09M ACTIVE (30) CNM09002 ACTIVE (45) TSOA09 ACTIVE
ENTER TO VIEW MORE DATA OR TYPE FIND NAME TO LOCATE SPECIFIC NAME
ENTER SEL# (SESS LIST), SEL# RTS (RESP TIME SUM) OR SEL# RTT (RESP TIME TREND)
CMD==> 42
In a large network, listing all the LUs can be resource intensive and can result in several panels
of information. In such a case, you might consider using the SESS command, as explained in the
following step.
3. Locate the specific resource name and select the corresponding number to display a list of sessions
for that resource. For example, to list all the sessions for ECHOA09, enter 42 in the CMD==> field. You
can also enter sess echoa09 from the command line to get to the session list panel. A panel similar
to Figure 19 on page 58 is displayed.
END OF DATA
ENTER SEL# (CONFIG), SEL# AND CT (CONN. TEST), SEL# AND STR (TERM REASON)
CMD==> 1
This panel lists the active and stopped sessions that are still in the database for a resource. Each
entry in the list is one session. Each line shows the session date, start time, session partner, and
current status.
4. Select a session number to obtain configuration data for that session (in this case, session 1). A panel
similar to Figure 20 on page 58 is displayed.
LOGMODE INTERACT
This panel shows how each LU is physically connected to its own subarea. Note that even though
AR (Advanced Peer-to-Peer Networking Route) is listed as an option, LU-LU sessions across pure
SNA subarea networks do not have Advanced Peer-to-Peer Networking route data. If you choose this
option, you receive a message stating that Advanced Peer-to-Peer Networking session route data is
not available.
5. Enter the option to display trace data. You can enter pt to display primary session trace data or st
to display secondary session trace data. If you enter st, a panel similar to Figure 21 on page 59 is
displayed:
END OF DATA
ENTER SEL# OR COMMAND
CMD==>
This panel shows the flow of the most recent PIUs on a session. Also shown is the time, type, and
length of the data that was sent, and the direction in which it was sent. Complete PIUs are available
for LU-LU session debugging. If the data is truncated, a T marker is displayed in the right margin.
6. If you enter a selection number for a PIU, the PIU is displayed in hexadecimal and EBCDIC
representation on the NLDM.PIUD panel.
If SEL# AND F (FORMATTED RU) is an option, you can enter a selection number followed by a
space followed by F to display the formatted PIU, if formatted data is available, on the NLDM.PIUF
panel. Formatting is generally available for PIUs with the following characteristics:
• They contain an SNA request/response header (RH) and a format header (FMH) type 5.
• They are complete enough to format.
• They are not compressed.
The first formatted page shows the FMH. Subsequent pages show the different general data stream
(GDS) variable types that are included in the PIU.
Note: Formatting is limited to approximately the first 1000 bytes.
From any page in the formatted display, you can enter SET HEX ON to reference the hexadecimal
and EBCDIC PIU. The resulting NLDM.PIUF.HEX panel displays the hexadecimal and EBCDIC
representation associated with that particular page, as indicated by the matching hex offsets listed
on either panel. Enter SET HEX OFF to return to the formatted display.
7. If you use the default PF key values supplied by the NetView product, press PF3 to return to the
Session Configuration Data panel. If your PF keys have different values, select the PF key which is set
to RETURN.
To determine your current PF key settings, use the NetView DISPFK command to display the values in
effect for the current component.
For more information about how your PF keys are set, refer to the NetView PFKDEF command in the
NetView online help, and browse the CNMKEYS sample.
8. Enter p to display the Session Parameters panel. If the KEEPPIU count is zero, you have access to the
Session Parameters panel, but no other PIUs are kept. You cannot access primary or secondary trace
data, the PT and ST options, from the Session Configuration Data panel. The KEEPPIU count is found
in the AAUPRMLP member (used to initialize the session monitor). Depending on the session type, the
following information is displayed:
This panel interprets the BIND request unit for the session displayed. The selected session is
identified in the panel heading. The BIND response and the BIND are recorded in the session monitor
database.
Several panels of session parameter data are available. For additional information about the
information contained in each of the panels, type help nldm or help nldm 'term' to access the
online help for the session monitor.
9. Enter r or press the PF key with a value of RETURN (NetView default is PF3) to return to the Session
Configuration Data panel.
10. Enter er to display the explicit route for the session. A panel similar to Figure 23 on page 61 is
displayed.
END OF DATA
ENTER SEL# (FOR TG DETAIL)
CMD==>
You can use ER data to list the sessions using a specific explicit route, display the network
configuration for the explicit route, and display the lines which make up a transmission group. If
too many sessions are using the same explicit route, this can result in slow session response.
11. Press the PF key with a value of RETURN (NetView default is PF3) to return to the Session
Configuration Data panel.
12. Enter vr to display the virtual route for the session. A panel similar to Figure 24 on page 61 is
displayed.
A virtual route (VR) is a logical data path from one resource to another. Control information flows
along the VR to regulate the amount of data flowing at a particular time. The amount of data allowed
to flow expands and contracts dynamically based on the capability of intermediate nodes to store and
forward data. When you access this panel, the session monitor issues a ROUTE-TEST request. The
information in the RSP (ROUTE-TEST) is used to determine the status of the VR.
Based on the two most recent samples taken, status conclusions are displayed on the panel. In this
case, the conclusion for both samples is VR IS NOT BLOCKED.
DOMAIN CNM99
SEL# DESCRIPTION
NLDM.LIST PAGE 1
RESOURCE NAME LIST
LIST TYPE: ACTIVE CP/SSCP DOMAIN: CNM99
------------------------------------------------------------------------------
SEL# NAME STATUS SEL# NAME STATUS SEL# NAME STATUS
( 1) A69M ACTIVE
( 2) A99M ACTIVE
( 3) B18M ACTIVE
( 4) B20M ACTIVE
( 5) B52M ACTIVE
( 6) C01M ACTIVE
( 7) C02M ACTIVE
This panel lists the active and stopped sessions for a resource. Each entry in the list is one session.
Each line shows the session date, start time, session partner, and current status.
4. Select a session number to obtain configuration data for that session (in this case, session 1). A panel
similar to Figure 29 on page 64 is displayed.
APPNCOS CPSVCMG
LOGMODE CPSVCMG
SADJ CP A69M
This panel shows how each CP is physically connected. The PT (Primary Trace), ST (Secondary Trace),
P (Parameters), ER (Explicit Route), and VR (Virtual Route) options are described in “Typical LU-LU
Session for an SNA Subarea Network” on page 56.
5. Enter ar to display the Advanced Peer-to-Peer Networking route configuration panel. A panel similar
to Figure 30 on page 65 is displayed.
+---------+
| CP |
|A99M |
+----+----+
TG021 |
+----+----+
| CP |
|A69M |
+---------+
END OF DATA
SELECT PAR, SAR
CMD==>
This panel displays Advanced Peer-to-Peer Networking nodes and connecting groups in an Advanced
Peer-to-Peer Networking session path.
NLDM.SESS PAGE 1
SESSION LIST
NAME: ECHOA29 DOMAIN: CNM19
------------------------------------------------------------------------------
***** PRIMARY ***** **** SECONDARY ****
SEL# NAME TYPE DOM NAME TYPE DOM START TIME END TIME
( 1) ECHOA69 LU CNM99 ECHOA29 ILU C-C 08/12 17:54:55 *** ACTIVE ***
( 2) ECHOA29 ILU C-C ECHOA69 LU CNM99 08/12 17:54:53 *** ACTIVE ***
( 3) ECHOA29 ILU C-C ECHOA69 LU CNM99 08/12 16:05:14 08/12 16:18:20
REASON CODE 0F SENSE 80030004
( 4) ECHOA69 LU CNM99 ECHOA29 ILU C-C 08/12 16:05:12 08/12 16:18:20
REASON CODE 0F SENSE 80030004
END OF DATA
ENTER SEL# (CONFIG), SEL# AND CT (CONN. TEST), SEL# AND STR (TERM REASON)
CMD==> 1
This panel lists the active and stopped sessions for a resource. Each entry in the list is one session.
Each line shows the session date, start time, session partner, and current status.
2. Select a session number to obtain configuration data for that session. A panel similar to Figure 32 on
page 66 is displayed.
See “Typical LU-LU Session for an SNA Subarea Network” on page 56 for descriptions of the PT
(Primary Trace), ST (Secondary Trace), P (Parameters), and ER (Explicit Route) options.
3. Enter vr to display the virtual route for the session. A panel similar to Figure 33 on page 66 is
displayed.
A virtual route (VR) is a logical data path from one resource to another. For an SNA Advanced
Peer-to-Peer Networking network, this panel lets you access flow control data. You can issue flow
control requests from this screen: origin flow control (OFC) requests and destination flow control (DFC)
requests. DFC requests provide flow control data in the secondary direction at the point where the SNA
subarea and SNA Advanced Peer-to-Peer Networking network meet. OFC requests provide flow control
data in the primary direction at the point where the SNA subarea and SNA Advanced Peer-to-Peer
Networking network meet.
You can enter a at the command line to analyze the virtual route.
PACING DATA:
LAST IPM SENT 83010000002D
NEXT SEND WINDOW SIZE 15
NEXT REC WINDOW SIZE 45
MSGS IN PACING QUEUE 0
END OF DATA
CMD==>
If you enter dfc (to display destination flow control data), a panel similar to Figure 35 on page 67 is
displayed:
PACING DATA:
LAST IPM SENT 830100007FFF
NEXT SEND WINDOW SIZE 7
NEXT REC WINDOW SIZE 32767
MSGS IN PACING QUEUE 0
END OF DATA
CMD==>
Flow control data is maintained for low-entry networking (LEN) and Advanced Peer-to-Peer
Networking connections where the transmission group (TG) ends in an SNA subarea node. If the TG
intersects a virtual route, you can enter fc, ofc, or dfc from the Virtual Route Status panel to access
this panel. If the TG ends in VTAM and no connecting virtual route exists, you can enter fc from the
Session Configuration Data panel to display this panel.
From this panel, you can:
• Look for missing responses in the flow control which might lead to blocked virtual routes.
• Look for requests to close the VR window. A large number of those requests can indicate an
intermediate node running over capacity. The pacing data (specifically the size of the pacing
windows) controls the number of PIUs allowed to flow on a virtual route before the SNA subarea
+---------+
| SUBAREA |
| NODE(S) |
+----+----+
IN-TG |
+----+----+
| CP(ICN) | PRI-SA: 000E
|A19M |
+----+----+
TG021 | HPR-1234567890123456
+----+----+
| CP |
|A29M |
+---------+
END OF DATA
SELECT PAR, SAR
CMD==> PAR
Figure 36. Advanced Peer-to-Peer Networking Session Route Configuration Panel with Subarea Number
from Primary Side
In the SNA Advanced Peer-to-Peer Networking environment, the number of Advanced Peer-to-Peer
Networking subnetworks that a session can flow through has no limit. This means that a single
session could have more than one Route Selection Control Vector (RSCV). Because of the possibility
of multiple RSCVs, this panel only displays local RSCV data. When additional RSCVs are in the session
path, the user can scroll in the primary direction (using the PAR option) or in the secondary direction
(using the SAR option) to view these RSCVs. SNA subarea nodes existing between the SNA Advanced
Peer-to-Peer Networking nodes are shown with a generic subarea node box.
If VTAM is unable to provide part of the route data to the NetView program, a box containing ROUTE
DATA NA at either the beginning or end of the RSCV display identifies where data is not available for
display. If the primary endpoint node name of the RSCV being displayed is not known, UNKNOWN is
displayed. The corresponding PAR and SAR options are not displayed for these situations.
7. Enter par to scroll in the primary direction. A panel similar to Figure 37 on page 69 is displayed.
+---------+
| CP |
|A69M | SEC-SA: 000F
+----+----+
TG021 | HPR-ABCDEF1234567890
+----+----+
| CP(ICN) |
|A99M |
+----+----+
IN-TG |
+----+----+
| SUBAREA |
| NODE(S) |
+---------+
END OF DATA
SELECT PAR, SAR, OAR
CMD==>
Figure 37. Advanced Peer-to-Peer Networking Session Route Configuration Panel with Subarea Number
from Secondary Side and OAR Prompt
Note: The following paragraphs explain some of the abbreviations that are displayed on the screen:
The terms PRI-SA (see Figure 36 on page 68) and SEC-SA (Figure 37 on page 69) indicate the subarea
number that is associated with an Advanced Peer-to-Peer Networking node from its primary (above) or
secondary (below) side.
HPR indicates a TG that is part of an HPR pipe whose TCID number is shown. VTAM reports path switches
and NLDM reflects them in the route.
You might see HPRC, instead of HPR. HPRC indicates a hop that is believed to be part of an HPR pipe;
however this NLDM does not know about any path switches.
If you see an OAR prompt at the bottom of the NLDM.CON or the NLDM.AR panel, it means that outboard
Advanced Peer-to-Peer Networking route data is present (from a 2210 or 2216 router, for example). If
you select the OAR prompt, a panel displays that is similar to Figure 37 on page 69, but which shows the
RSCV that the outboard CP reports.
For details about these terms, see the online help.
END OF DATA
ENTER SEL# (CONFIG), SEL# AND CT (CONN. TEST), SEL# AND STR (TERM REASON)
CMD==>
This panel lists the active and stopped sessions for a resource. Each entry in the list is one session.
Each line shows the session date, start time, session partner, and current status. These sessions
also have DLUS-DLUR PIPE displayed below the current status. This designation indicates that the
sessions contain an Advanced Peer-to-Peer Networking network that is crossed using a LU 6.2 session
pipe. The pipe is established and controlled by the dependent LU server (DLUS) and dependent LU
requestor (DLUR) functions.
2. Session 1 is the only active session. Select session 1 to obtain configuration data for that session. A
panel similar to Figure 39 on page 70 is displayed.
This panel displays the resource (ps2dl2pa) and session path that connects it to the host (hosta09).
The DLUR and DLUS ends of the LU 6.2 pipe that travels through the Advanced Peer-to-Peer
Networking network are also shown. The DLUR function for this session is located in resource dlur2,
and the DLUS function is located in resource a09m. Note that the Advanced Peer-to-Peer Networking
network itself is not displayed. Similar data is also available for the SSCP-LU sessions. To display more
information about the resources that the pipe crosses, view the Advanced Peer-to-Peer Networking
Route Data displays (AR) for the DLUR-DLUS sessions.
NLDM.SESS PAGE 2
SESSION LIST
NAME: ECHOA69 DOMAIN: CNM09
------------------------------------------------------------------------------
***** PRIMARY ***** **** SECONDARY ****
SEL# NAME TYPE DOM NAME TYPE DOM START TIME END TIME
( 1) ECHOA29 LU C-C ECHOA69 LU CNM19 05/07 08:46:02 05/07 08:47:40
TOV ** TAKEOVER **
REASON CODE OF SENSE 087D000A
( 2) ECHOA69 LU CNM19 ECHOA29 LU C-C 05/07 08:46:02 05/07 08:47:40
TOV ** TAKEOVER **
REASON CODE OF SENSE 087D000A
( 3) ECHOA69 ILU C-C ECHOA19 LU CNM09 05/07 08:41:24 05/07 08:41:48
TGV ** GIVEBACK **
( 4) ECHOA19 LU CNM09 ECHOA69 ILU C-C 05/07 08:41:24 05/07 08:41:48
TGV ** GIVEBACK **
( 5) ECHOA69 LU C-C ECHOA09 LU CNM09 05/07 08:40:24 05/07 08:52:30
GTK ** TAKEOVER **
REASON CODE OF SENSE 80030004
Figure 40. Session List Panel for an SNA Advanced Peer-to-Peer Networking or Mixed Network
VTAM can take over or give back control of the NCP providing boundary function for some sessions.
When takeovers and givebacks exist, the Session List panel can display Takeover/Giveback statuses (as
shown here) and the active and stopped status (as shown in “Typical LU-LU Session for an SNA Subarea
Network” on page 56).The following takeover/giveback notifications are possible:
** TAKEOVER **
Indicates that the local VTAM has taken over the NCP boundary function connection to one of the
session endpoints. One of the following values is displayed under the name of the resource which has
been taken over:
TOV
To indicate that the resource has been taken over
GTK
To indicate that the resource was previously given back and has been taken over.
** GIVEBACK **
Indicates that the local VTAM has given up the NCP boundary function connection to one of the
session endpoints. One of the following values is displayed under the name of the resource which has
been given up:
GBK
To indicate that the resource has been given back
TGV
To indicate that the resource was previously taken over and has now been given back.
For additional information about this and other session monitor panels, see “Typical LU-LU Session
for an SNA Subarea Network” on page 56, “Typical CP-CP Session for an SNA Advanced Peer-to-Peer
Networking Network” on page 62, and “Typical LU-LU Session for an SNA Advanced Peer-to-Peer
Networking Network” on page 65.
Because of the limited data received in the takeover notification, some session PD route functions might
be limited.
Options in Effect SAW: YES LU Trace: YES CP/SSCP Trace: YES SESSTATS: YES
Topic: Reference:
Description of the output Additional information about the SESSMDIS command can be found
displayed from the SESSMDIS in the IBM Z NetView Tuning Guide
command
NLDM panel help NetView Online Help
NLDM panel Field Level Help NetView Online Field Level Help
The term higher node refers to the next node up in the hierarchy. For example, in Figure 42 on page 73,
the switched major nodes are the next higher node in relation to the switched PU minor nodes. The term
lower node refers to the next node down in the hierarchy. Domain represents the highest level in the
status monitor hierarchy. Resources of the same type are considered to be at the same level. For example,
all PUs are on the same level in the hierarchy.
• The preprocessor, CNMNDEF, which reads the VTAMLST members and creates a member DSINDEF in
DSIPARM, has run. DSINDEF is used by the status monitor initialization process.
• The status monitor is defined. This can be done in the status monitor initialization member sample
DSICNM. In this sample, you can specify the following items:
– Command lists available for processing through the status monitor
– The automatic reactivation function
– A secondary status monitor
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
This panel summarizes the status for all the resource types within the domain's hierarchy. The status
monitor uses two types of panels:
Summary
Provides information about the status for all resource types under any resource
Detail
Provides a list of resources (by name) one level immediately below the resource for which the
detail panel was selected
For more information about the hierarchy of the status monitor panels, see Appendix B, “NetView
Component Hierarchies,” on page 235.
You can then use the NetView SREFRESH command or press a PF key set to that command (NetView
default for status monitor is PF9) to switch the status monitor Domain Status Summary panel between
dynamic and static states.
In the current setting of the panel, the REFRESH=ON state, changes to the displayed resources are
reflected dynamically on the panel as they occur. If you are using the default PF key setting that
is supplied by the NetView product for the status monitor component, pressing PF9 or entering
SREFRESH switches the panel to the REFRESH=OFF state. In this state, the panel is static, and
resource status changes are not refreshed automatically on the panel.
2. To determine your current PF key settings, use the NetView DISPFK command to display the values
in effect for the current component. For example, if you enter DISPFK while in the status monitor
component, you see one or more screens similar to the one shown here:
Figure 44. Default Status Monitor PF Keys Supplied by the NetView Product
For more information about how your PF keys are set, refer to the NetView PFKDEF command in the
NetView online help, and browse the CNMKEYS sample. Press PF3 to return to the Domain Status
Summary screen.
3. To select detailed information about specific resources:
a. Press the Tab key to position the cursor in front of the resource type for which you want more
information. To display detailed information for applications, position the cursor in the following
way:
b. Type any character except a blank in the space immediately before the field you just located. For
example:
c. Press Enter.
A panel similar to Figure 45 on page 77 is displayed.
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
Figure 45. Domain Status Detail (Description) Panel Showing the VTAM Commands You Can Run
against the Resources
This panel displays the name and description for each resource in the resource group you selected
to access this panel. You can use any of the VTAM commands listed on this panel to display,
activate, or inactivate any of the resources shown in the panel. To make a selection on the VTAM
command menu, type any character except a blank or a question mark (?) over the ? field next
to the command you want to use and next to the resource for which you want the command
performed, then press Enter.
4. Enter the NetView SCLIST command to display the command lists that you can run from this panel, or
press a PF key set to that command, such as the NetView default STATMON setting of PF11. A panel
similar to Figure 46 on page 77 is displayed.
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
Figure 46. Domain Status Detail (Description) Panel Showing the Command Lists You Can Run against
the Resources
This panel displays the command lists that you can run against one or more of the resources listed. To
return to the original panel, enter the SVTAM command or press the NetView default STATMON PF10
key to display the VTAM commands that you can run from that panel.
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
Figure 47. Domain Status Detail (Description) Panel Containing Activity and Analysis Information
You can use the status indicators (ACTIVE, PENDING, and so on) displayed in the heading to view
information about a portion of the resources displayed on this panel. For example, to view information
about only the ACTIVE applications, type any character over the ? field below ACTIVE and press
Enter. The status monitor displays a new Description panel with information about only the active
applications, as shown in Figure 48 on page 78:
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
Figure 48. Domain Status Detail (Description) Panel Showing only Active Applications
Use the DISPLAY menu on the upper left side of the panel to ask for summary information or more
details about the resources displayed on this panel (THIS NODE) or about the next HIGHER NODE
above THIS NODE in the network configuration. To make your selection, type any character over the ?
field next to your choice on the DISPLAY menu and next to the resource for which to display the
information, then press Enter.
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
This panel displays information about the activity between applications and the terminals and LUs in
session with them. For the application you choose, the panel shows the number of messages sent to
and received from the session partners of each application. You can use this information to monitor
how frequently a particular application is accessed and how heavily it is used at any given time of day.
7. Replace the question mark in front of ANALYSIS with any character and press Enter to view analysis
information. A panel similar to Figure 50 on page 79 is displayed.
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
STATMON.BROWSE ACTP NETWORK LOG FOR 04/12/13 (93221) COLS 017 094 09:17
HOST: HOST009 *1* *2* *3* *4* SCROLL ==> CSR
---2----+----3----+----4----+----5----+----6----+----7----+----8----+----9----
CNM09 08:49:42 CNME1087 CNM35 DSILCRTR CNM09LUC * 00000050
CNM09 08:49:43 CNME1087 CNM43 DSILCRTR CNM09LUC * 00000051
CNM09 08:49:43 CNME1087 CNM54 DSILCRTR CNM09LUC * 00000052
CNM09 08:49:43 CNME1087 CNM72 DSILCRTR CNM09LUC * 00000053
CNM09 08:49:44 CNME1087 CNM83 DSILCRTR CNM09LUC * 00000054
CNM09 08:56:30 CNM154I HOURLY OPERATOR MESSAGE INDICATOR STATISTICS
CNM09 08:56:30 CNM155I MI #1 MI #2 MI #3 MI #4 LOGTOTAL
CNM09 08:56:30 CNM156I 00000 00000 00000 00000 000000
CNM09 08:59:41 CNME1087 CNM69 DSILCRTR CNM09LUC * 00000055
CNM09 % 08:59:41 DSI781I CNM09LUC : UNABLE TO ALLOCATE SESSION FOR 'CNMD9LU
CNM09 08:59:42 CNME1087 CNM52 DSILCRTR CNM09LUC * 00000056
CNM09 08:59:42 CNME1087 CNM24 DSILCRTR CNM09LUC * 00000057
CNM09 08:59:42 CNME1087 CNM11 DSILCRTR CNM09LUC * 00000058
CNM09 08:59:42 CNME1087 CNM35 DSILCRTR CNM09LUC * 00000059
CNM09 08:59:43 CNME1087 CNM43 DSILCRTR CNM09LUC * 0000005A
CNM09 08:59:43 CNME1087 CNM54 DSILCRTR CNM09LUC * 0000005B
CNM09 08:59:43 CNME1087 CNM72 DSILCRTR CNM09LUC * 0000005C
CNM09 08:59:44 CNME1087 CNM83 DSILCRTR CNM09LUC * 0000005D
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
Topic: Reference:
Network log message format Appendix A, “Message Formats,” on page 233
STATMON, CLRSTATS command NetView online help
STATOPT statement syntax IBM Z NetView Administration Reference
Defining the status monitor IBM Z NetView Installation: Configuring Additional Components
To manage the status of your network from a workstation, use the NetView management console or
the IBM Z System Automation graphical interface to collect status data and display it in real time.
From a 3270 terminal, use the following products to monitor the status of your network and to provide
performance measurements:
• Tivoli Workload Scheduler for z/OS
• Tivoli Decision Support for z/OS
• IBM Z System Automation
Note: These products are not shipped with the NetView product.
Topic: Reference:
Installation and customization Z Decision Support Administration Guide and Reference
Setting up the Session Monitor to IBM Z NetView Installation: Configuring Additional Components
log data to the external log (SMF)
Hardware problems are associated with the physical structure of a network. The physical network
consists of the hardware and software that connect network resources, allowing them to communicate
with each other. The physical network includes the following connections:
• Hosts
• Communication controllers
• Cluster controllers
• Cable, telephone lines, or satellites
• Various devices such as printers and terminals
Associated with each connection is the network problem determination application (NPDA) responsible
for performing link tests and diagnosing problems.
You can use the NetView management console or the hardware monitor to detect hardware problems.
The sections that follow describe how to use the hardware monitor; to obtain additional information about
using the NetView management console to monitor hardware problems, see Chapter 3, “Monitoring and
Controlling Your Network from a Workstation,” on page 41.
Data Collection
The hardware monitor collects data from many different sources in various formats and gives a common
structure to this information. This data can be classified as solicited or unsolicited data.
Figure 52 on page 86 provides an illustration of hardware monitor data collection.
Solicited Data
Solicited data is received as the result of a specific request for information or as the result of an action
that you have taken. Certain SNA control units keep counters of different types of communication errors
they detect and transmit the counters to the host only as solicited data.
Unsolicited Data
Unsolicited data can be recorded as a statistic, an event, or as a GMFALERT record. Unsolicited data is
received without any action on your part. You can receive unsolicited data when an error or performance
problem is detected in the network. Unsolicited data can also be received when a problem in the network
is resolved or a resource is deactivated.
Statistics are records of traffic volumes and temporary errors. Events can be records of permanent errors,
or of other unusual occurrences, and can come from statistics that qualify for event status because of
a high ratio of temporary errors to traffic. Hardware alerts are events that require attention. GMFALERT
records represent events that pertain to resources monitored by the NetView management console.
When the hardware monitor receives unsolicited data, it creates a record containing information about
the data and stores it as an event, statistical record, or GMFALERT in the database. If the data qualifies
as an alert, an alert record is also created. Unsolicited alerts can also be received when forwarded from
distributed NetView programs or entry point nodes.
Record Types
The hardware monitor creates a database made up of several record types: statistics, events,
GMFALERTs, and alerts.
Events
Events are unexpected occurrences in network operation. An event can be created when the attempted
activation of a resource fails. This failure can be because of a physical error in the network. Event data
detected and generated by resources is sent to the host system for the hardware monitor to store in
its database and to determine whether to issue and record an alert. Resolution major vectors (X'0002'),
which inform you that an alert was resolved, are also stored on the database as events.
GMFALERTs
GMFALERT records represent events that pertain to resources monitored by the NetView management
console. If the NetView management console is not installed, the GMFALERT records, which are a
subset of NetView management console event report records, are recorded in the hardware monitor
database. The alert history window of NetView management console is one place where GMFALERT
records are displayed. Prior to NetView V3R2, the GMFALERT records were recorded to the GMFHS VSAM
database along with the other event report records. See the IBM Z NetView Customization Guide for more
information.
Alerts
Alerts are events (including resolutions) that require attention. If the records pass the event filters, the
hardware monitor checks the current state of its recording filters to see if this event qualifies for alert
status. If it does, several things occur:
• An alert record about the event is written to the hardware monitor database.
• A line item is created for presentation to the hardware monitor users on the Alerts-Dynamic panel if
their viewing filters are set to pass an alert of this type from this resource. These users' panels are
automatically updated to reflect the occurrence of this special event. They can then take immediate
action as called for by the nature of the event and any pertinent local procedures.
• An alert can also be forwarded to the NetView alert focal point. The following methods are used to
forward alerts:
– The primary method uses the ROUTE filter. This filter controls the selection of alert records that are
routed.
– The secondary method uses the OPER filter and NetView automation. With this method, the alert is
converted to a message and sent to the focal point. The message is converted back to an alert at the
focal point.
Note: The message might not contain all the important data stored at the sending NetView program.
Use the ROUTE filter for forwarding alerts to the focal point. See “Network Management for Multiple
Domains” on page 97 for more information.
An alert is displayed on your Alerts-Dynamic panel as a one-line summary of the event that shows the
error description and probable cause. The alert summary also shows the NetView domain where the alert
Note: BYPS, IMPD, PAFF, PERF, PERM, REDL, and TEMP are supported as part of the generic alert
architecture.
In certain instances, the definitions of alert or event types used by non-generic alert records differ from
the current architected generic definitions.
You can use event types in filter-setting commands to control the types of data recorded in the hardware
monitor's database or viewed by a NetView operator.
help 'resname'
You can also enter help from any hardware monitor panel to access the main help menu.
This section describes typical scenarios using the major hardware monitor panels. For additional
information about how to use the hardware monitor panels to solve specific network problems, see Part
3, “Controlling the NetView Environment,” on page 121.
Investigating Alerts
The following scenario shows how to investigate the cause of an alert.
1. Enter npda from the main menu panel. A panel similar to Figure 53 on page 90 is displayed.
SEL# PRODUCES:
( 1) ALERTS-DYNAMIC DISPLAY
( 2) TOTAL EVENTS DISPLAY
( 3) TOTAL STATISTICAL DATA DISPLAY
( 4) HELP MENU DISPLAY
ENTER SEL#
???
CMD==>
???
CMD==>
This is the Alerts-Dynamic panel, a single-page display designed to continuously show local alerts and
alerts forwarded from entry points. As failures occur, each alert is displayed at the top of the display,
and the alert at the bottom of the display is removed.
For each alert the following information can be displayed:
DOMAIN
The name of the domain from which the alert originated
RESNAME
The name of the device or other resource which is the one most affected by the event that
originated the alert
TYPE
An abbreviation of the resource type
TIME
The time the alert was recorded on the database
ALERT DESCRIPTION:PROBABLE CAUSE
An abbreviated message describing the error that occurred and the probable cause
Note: Other formats are available for displaying alerts. You can code the ALT_ALERT statement in the
member specified by the MEM keyword of the BNJDSERV TASK statement to select a specific format
for the Alerts-Dynamic, Alerts-Static, and Alerts-History panels.
3. Press Enter to display the Alerts-Static panel. A panel that is similar to the one in Figure 55 on page
92 is displayed.
???
CMD==>
The Alerts-Static panel freezes the current contents of the Alerts-Dynamic panel. It does not allow
new alerts to be displayed on the panel, because a dynamic display can show alerts so quickly that it
might be difficult to view. The alerts are listed in reverse chronological order.
The following options are listed at the bottom of the panel:
A
Use this option to display all the alerts recorded in the database. You can then press the Enter key
to page forward through the alerts.
SEL#
This option is used to view the recommended actions for a specific alert.
SEL# M
Use this option to view the most recent events recorded for a specific resource (such as a
controller). You can enter the number of one of the alerts generated by that resource followed
by m. For example, to view the most recent events for CTRL D11CCL48, enter 1 m.
SEL# P
Use this option to create a problem report for a specific alert. For example, to create a problem
report for the first alert shown on the panel, enter 1 p.
SEL# DEL
Use this option to delete a specific alert from the hardware monitor database. For example, to
delete the first alert shown on the panel, enter 1 del.
Not all of the available options are shown at the bottom of the panel. For a list of all the available
options, enter help and then select PROMPTS from the help menu.
You can also scroll through panels using PF keys. The default hardware monitor PF key setting
supplied by the NetView product for FORWARD is PF8. To determine your current hardware monitor PF
key settings, use the NetView DISPFK command.
You can also display current PF key settings for other components, such as command facility or status
monitor. For a list of default settings for those components, see Figure 10 on page 36 and Figure 44 on
page 76.
4. Enter the alert number in the command area to obtain the recommended actions for the alert. For
example, if you enter 15, a panel that is similar to the one in Figure 56 on page 93 is displayed.
???
CMD==>
The Recommended Action panel lists the probable causes of a problem and shows the configuration
of the resources that are associated with the problem. The probable causes are listed from three
perspectives: user caused, install caused, and failure caused. This type of panel is available for any
error that the hardware monitor lists, whether the error is a permanent or temporary problem.
The action numbers (Dnnn, Ennn, Innn, or Rnnn) indicate actions that you can take to investigate the
error. If you want to display an explanation of these recommended actions first, you can enter action
followed by the action number. While Dnnn actions have associated panels that are supplied with the
NetView product, Ennn, Innn, and Rnnn actions do not have panels that are supplied with the NetView
product,. However, with the NetView program, you can overlay I-numbers and E-numbers with action
numbers to create panels that are specific to the sending product. For additional information about
creating your own action panels, see the IBM Z NetView Customization Guide.
5. Enter d to display event detail information for the alert. A panel that is similar to the one in Figure 57
on page 93 is displayed.
PROBABLE CAUSES:
COMMUNICATION ACCESS METHOD
ENTER A (ACTION)
???
CMD==>
The Event Detail panel displays additional information about the event that generated the alert. Event
detail data has several distinct formats. These formats are tailored to the type of resource for which
SEL# PRODUCES:
( 1) EVENT DETAIL DISPLAY
( 2) PRODUCT SET IDENTIFICATION DISPLAY
( 3) HEXADECIMAL DISPLAY OF DATA RECORD
???
CMD==>
This panel lists available detailed information about the problem. In this example, three options are
provided. The number of options provided depends on the problem.
Event Detail Display
This option provides detailed information about the problem associated with the alert. You can
also access this panel by using the D option from the Recommended Action panel (see step “5” on
page 93).
Product Set Identification Display
This option provides information about the origin of the alert. It identifies the software or hardware
components from which the alert was sent. This can help you isolate problems by directing you to
the appropriate documentation.
CNM01
+--------+
DOMAIN | |
+--------+
************** RESOURCE EVENTS ************** ATTACHED RESOURCES EV
SEL# TYPE RESNAME TOTAL FROM TO TOTAL TO
( 1) COMC NTFFC 25 04/01 13:59 04/12 13:59 949 04/12 12:01
( 2) CP NTADPU05 0 00/00 00:00 00/00 00:00 2 04/03 07:19
( 3) CP NTA0PU 0 00/00 00:00 00/00 00:00 2 04/12 08:57
( 4) CP NTA1I013 6 04/06 10:40 04/06 12:39 12 04/07 16:42
( 5) CP NTA1PU 0 00/00 00:00 00/00 00:00 1 03/12 13:37
( 6) CP NTA1PU02 0 00/00 00:00 00/00 00:00 1 03/12 13:37
( 7) CP NTA1PU03 0 00/00 00:00 00/00 00:00 4 04/12 08:40
( 8) CP NTA1PU06 0 00/00 00:00 00/00 00:00 3 04/06 01:30
( 9) CP NTA2I001 0 00/00 00:00 00/00 00:00 1 04/08 14:51
(10) CP NTA7I001 0 00/00 00:00 00/00 00:00 42 04/12 10:44
(11) CP NTB4I001 0 00/00 00:00 00/00 00:00 70 04/12 09:14
ENTER ST (STAT), OR SEL# (ATTACHED), OR SEL# PLUS M (MOST RECENT)
???
CMD==>
This panel shows the total counts for first-level resource types. It provides the highest-level view of all
attached events recorded for the domain. From this panel, you can select the total display for the next
lower resource level. For example, if you select event 1, a panel similar to Figure 60 on page 96 is
displayed.
CNM01 NTFFC
+--------+ +--------+
DOMAIN | COMC |-- | |
+--------+ +--------+
************** RESOURCE EVENTS ************** ATTACHED RESOURCES EV
SEL# TYPE RESNAME TOTAL FROM TO TOTAL TO
( 1) CHAN NTCH06 0 00/00 00:00 00/00 00:00 5 04/12 07:43
( 2) CHAN NTCH07 0 00/00 00:00 00/00 00:00 9 04/06 02:17
( 3) CHAN NTCH08 0 00/00 00:00 00/00 00:00 3 04/06 10:33
( 4) LAN NTFFTRLN 7 03/12 12:46 04/07 10:38 0 00/00 00:00
( 5) LINE J007V0D3 0 00/00 00:00 00/00 00:00 1 04/06 13:26
( 6) LINE J007V0ED 0 00/00 00:00 00/00 00:00 1 04/08 19:53
( 7) LINE J007V001 0 00/00 00:00 00/00 00:00 1 04/06 13:26
( 8) LINE J007V003 0 00/00 00:00 00/00 00:00 1 04/06 13:26
( 9) LINE J007V03F 0 00/00 00:00 00/00 00:00 1 04/06 13:26
(10) LINE J007V05B 0 00/00 00:00 00/00 00:00 1 04/06 13:26
(11) LINE J007V089 0 00/00 00:00 00/00 00:00 1 04/06 12:47
ENTER ST (STAT), OR SEL# (ATTACHED), OR SEL# PLUS M (MOST RECENT)
???
CMD==>
As you can see, this panel displays the event totals for the communication controller NTFFC. To continue
to display event totals for lower resource levels, select a resource from this panel. During event tracking
you can choose total event displays for the next lower resource until you reach the resource level
suspected of causing the problem.
CNM01
+--------+
DOMAIN | |
+--------+
********************* TOTALS ********************* DAILY
SEL# TYPE RESNAME TRAFFIC TEMPS E/T FROM TO E/T
( 1) COMC NTFFC N/A N/A N/A N/A N/A 04/12 13:52 N/A
( 2) CPU CPU72068 N/A N/A N/A N/A N/A N/A N/A N/A
???
CMD==>
CNM01 NTFFC
+--------+ +--------+
DOMAIN | COMC |-- | |
+--------+ +--------+
********************* TOTALS ********************* DAILY
SEL# TYPE RESNAME TRAFFIC TEMPS E/T FROM TO E/T MR
( 1) CHAN NTCH05 N/A 0 N/A 00/00 00:00 00/00 00:00 N/A
( 2) CHAN NTCH06 N/A 0 N/A 00/00 00:00 00/00 00:00 N/A
( 3) CHAN NTCH07 N/A 0 N/A 00/00 00:00 00/00 00:00 N/A
( 4) CHAN NTCH08 N/A 0 N/A 00/00 00:00 00/00 00:00 N/A
( 5) LAN NTFFTRLN 0 0 N/A 03/12 12:32 03/12 13:07 N/A Y
( 6) LINE J007V0D3 24 0 N/A N/A N/A 04/06 13:26 N/A
( 7) LINE J007V0ED 28816 0 N/A N/A N/A 04/08 19:53 N/A
( 8) LINE J007V001 20 0 N/A N/A N/A 04/06 13:26 N/A
( 9) LINE J007V003 37 0 N/A N/A N/A 04/06 13:26 N/A
(10) LINE J007V03F 24 0 N/A N/A N/A 04/06 13:26 N/A
(11) LINE J007V05B 20 0 N/A N/A N/A 04/06 13:26 N/A
ENTER EV (EVENT), OR SEL# (ATTACHED), OR SEL# PLUS M (MOST RECENT)
???
CMD==>
This panel displays statistical record counts for the resources attached to the communication controller
NTFFC.
To display statistical record counts for the resource attached to line J007V0ED, enter 7. A panel similar to
Figure 63 on page 97 is displayed.
???
CMD==>
Alert Forwarding
Any operators logged on to the focal point can view these forwarded and local alerts on the Alerts-
Dynamic, Alerts-Static panel, or Alerts-History panels. See Figure 65 on page 98 for an example of an
Alerts-Static panel.
The session domain of CNM01 is presented on the first line of the Alerts-Static panel. The session domain
is the domain with which the operator is currently in session. More specifically, it is the domain associated
with the hardware monitor database being accessed. The domain names shown under the DOMAIN
column heading are owning domains. The owning domain is the domain that originally received the alert.
For example, the alert corresponding to selection 2 originated in distributed host (and owning) domain
CNM04 and was forwarded to the focal point (and session) domain CNM01.
The session domain is always on the first line of all hardware monitor panels. The owning domain is
presented on all hardware monitor panels that have a pictorial hierarchy, and on the Alerts-Dynamic/
The selection 4 alert was forwarded over LUC. You can determine this because the owning domain and
session domain are different and no @ indicator exists.
The selection 1 alert is a local alert as indicated by the absence of an @ indicator and the fact that the
owning domain is the same as the session domain.
Topic: Reference:
Alert forwarding IBM Z NetView Automation Guide
Topic: Reference:
Using filters “Using Hardware Monitor Filters” on page 136
Implementing filtering decisions IBM Z NetView Automation Guide
using the XITCI exit
Topic: Reference:
IBM Z NetView adapters • IBM Z NetView Installation: Configuring Additional Components
• IBM Z NetView Customization Guide
• IBM Tivoli Netcool/OMNIbus Event Integration Facility Reference
Problem Management
Problem management is a function that lists, creates, displays, and updates problem reports. Problem
reports are records that identify known problems with individual resources and are stored in the
Information/Management database.
Note: The hardware monitor sends as many as five resource names to define the failing resource. You can
then enter additional data about a specific problem into Information/Management.
npda ald
A panel similar to Figure 66 on page 103 is displayed. This single-page panel continuously shows the
system being monitored. As failures occur, each alert is shown at the top of the panel, and the alert at
the bottom of the panel is removed.
???
CMD==>
The top of the Alerts-Dynamic panel shows the date and time the panel was last updated and the
domain name. Each alert is displayed on a separate line according to the following format:
RESNAME
The name of the resource associated with the alert
TYPE
The resource type
TIME
The time the alert was received from the system
ALERT DESCRIPTION:PROBABLE CAUSE
An abbreviated message describing the error that has occurred and the probable cause. The
probable cause is the component that is most likely to have caused the failure.
2. Press Enter to switch to the Alerts-Static panel. A panel similar to Figure 67 on page 103 is displayed.
???
CMD==>
Note: The Information/Management load library SBLMMOD1 must be one of the concatenated libraries
for this process to work. For more information on configuring Information/Management to work with the
NetView program, see the Information/Management library.
To effectively manage the various parts of your Information System, from your central computers
to your most remote terminal, stay informed of all its components. An effective configuration
management process with maintaining a centralized, up-to-date inventory of system components and
their relationships to one another, and with the ability to gather, organize, and locate information about
your Information System (IS) installation.
You can create records about your system and store them in a database. You can then extract facts
about your system, update the records as changes occur, create reports and diagrams, and search for
records with specific information. You can also maintain financial information specific to one component
or to a group of components, and you can establish relationships to these configuration components
with the problem and change management information. With this information at your fingertips, you can
react more quickly to a potential failure. You can help your network group more easily detect failing
components, swap or bypass components, and institute recovery procedures.
vpdall config(atccon01),create,clist(vpdact),add
Use the VPDCMD command to retrieve VPD data from the following devices:
• A specific LU
• A specific PU and its ports
• Data circuit-terminating equipment (DCE) between and NCP and a PU
The solicited VPD data is displayed on your terminal and is not saved in storage. However, you can use a
command list to automate the collection of VPD data, and to write it to an external log.
For example, to request VPD data from PU H040PU and all devices attached to the PU, enter the following
command:
2. Define the following statements in DSIVPARM. DSIVPARM contains the initialization parameter for the
VPD task:
VPDINIT ACBNAME=VPDACB,PASSWORD=CNM01,VPDREQ=001
VPDINIT VPDWAIT=030,SNAPRQ=OFF,VPDSTOR=02
Topic: Reference:
Defining VPD to the NetView Refer to IBM Z NetView Installation: Configuring Additional
program Components.
VPDALL and VPDCMD commands NetView online help
IBM Z NetView provides the ability to control remote processors. In typical operation, NetView
communicates with a peer NetView program on the remote z/OS processor to issue commands and
receive responses and unsolicited messages. When not available with distributed NetView programs, the
NetView program uses the facilities provided by Processor Operations to directly communicate with the
remote processor to perform tasks such as IPL and system or subsystem initialization. In this case, the
goal is to initialize the environment including the remote NetView so that typical NetView-to-NetView
communication can take over.
The NetView program can also control remote processors that are not z/OS processors and that support
the host command facility (HCF) interface. Additionally, you can use the IBM Tivoli Remote Control
product from a workstation to control a remote workstation.
For information about setting NetView timer commands for remote systems and processors, see Chapter
16, “Scheduling Commands,” on page 177.
Place cursor on desired system and press PF key for more details
Notice that in this example, the panel is being updated dynamically (the update status is displayed on
the upper right corner of the panel, in the Updates: field). To toggle between a dynamic and a static
display, press the Enter key. This applies to this panel and to any other TSCF status panels. If update
are very frequent, you might want to place the panel in a static condition.
2. Move the cursor to the name of the target system you want to monitor and press PF4. A panel similar
to Figure 70 on page 108 is displayed.
If the target system is running on hardware that is not in LPAR mode, a panel similar to Figure 72 on
page 109 is displayed.
Central Storage : 16
Expanded Storage : 128
Number of Central Processors : 2
Number of Vector Processors : 1
Depending on the type of hardware on which the target is running (for example, a 9021 can have up
to 256 CHPIDs), these panels might be split into two panels (with the CHPID map information on a
different panel and accessible by pressing the PF2 key).
When you review the information, press PF3 to return to the Target System Summary panel.
5. To view detailed status information about the target hardware on which the target system is defined,
press PF9. A panel similar to Figure 73 on page 110 is displayed.
When you have reviewed the information, press PF3 to return to the Target System Summary panel.
6. To view detailed status information about a specific workstation, move the cursor to the name of
the workstation you want to monitor and press PF11. A panel similar to Figure 74 on page 110 is
displayed.
M ACTIVE
N CLOSED
O LINK ERROR
T UNKNOWN
When you have reviewed the information, press PF3 to return to the Target System Summary panel.
7. To view detailed status information about a specific workstation port, move the cursor to the name of
the workstation and port letter you want to monitor and press PF10. A panel similar to Figure 75 on
page 111 is displayed.
Status : ACTIVE
Port Name : CUT1
Port Type : ACTIVE SYSTEM CONSOLE
Screen Handler : SYS3090
Protocol : 3270 (3270 or ASCII)
System Name : BANKER (system name)
Lock Holder : OPER1
When you have reviewed the information, press PF3 to return to the Target System Summary panel.
8. To view detailed status information about the operators that receive messages from the console
connected to a specified port and workstation, move the cursor to the name of the workstation and
port letter you wish to monitor and press PF7. A panel similar to Figure 76 on page 111 is displayed.
PS2NAM01 DEVLAB
S SC
FRANK ALICE
JOHNNIE RHONDA
WILEY
FRANK
If more data exists than can fit on this panel, press PF8 to scroll through the data.
When you have reviewed the information, press PF3 to return to the Target System Summary panel.
From this panel, press PF3 again to return to the TSCF Status Summary panel and to select a different
target system.
Use the Load common command to load and start a target system's operating system, without initializing
the system. This can happen if, for example, the target system is reinitialized after a disabled wait state.
For example, to load and start the target system SYS2, enter:
Use the ISQXIII command to initialize a target system (without starting and loading the operating system
software). Initializing a target system associates the target system with the target hardware and with the
PS⁄2 computers and PS⁄2 ports that provide the communication path between the focal point system and
the target system. For example, to initialize the active and backup operator and system console for SYS2,
enter:
isqxiii sys2
Topic: Reference:
Monitoring the status of the Target System Control Facility Operations and Commands
components in your TSCF
configuration.
Topic: Reference:
Using the Distributed Console IBM Distributed Console Access Facility User's Guide
Access Facility
You can manage operating system resources through the NetView program, IBM Z System Automation,
and Tivoli Workload Scheduler for z/OS. In addition, you can use the NetView program and the
Programmable Operator Facility of VM to control VM systems and the Operator Communication Control
Facility of VSE to control VSE systems.
mvs d a,l
start task=CNMCSSIR
s procname
From the MVS console, where procname is the name of the procedure defined by your system
programmer to start the NetView subsystem.
If the subsystem is already started, your system programmer can check the startup parameters for
the NetView subsystem interface. Refer to the IBM Z NetView Installation: Getting Started.
Hint: You do not need to start the subsystem to send MVS commands from the NetView operator if
you are using extended MCS consoles.
CNM567I
No MVS console is available. You can either ask your system programmer to define additional MVS
consoles or you can enter the following command:
disconid
To determine which other operators have consoles assigned to them and ask one of them to release
their console. An operator can release a console by entering the following command:
relconid
CNM568I
You do not have command authorization to issue the keyword. Contact your system programmer to
give your operator task access.
DWO338I
The console you requested is already in use. To request a different console, enter the following
command, where name is a different console than you first requested, and the default console name
is the same as your operator ID:
getconid console=name
Topic: Reference:
MVS, GETCONID, RELCONID, DISCONID, NetView online help
SETCONID commands
Consoles IBM Z NetView Automation Guide
MVS System Commands MVS/ESA System Commands Reference
Defining consoles MVS/ESA Initialization and Tuning Reference
mvs $du,prt15
mvs $pprt15
mvs $iprt15
???
Topic: Reference:
Issuing JES3 commands from the IBM Z NetView Automation Guide
NetView program
jes2 du,all
ACTION===>
PF1=Help PF2=End PF3=Return
PF6=Roll PF9=Refresh PF12=Retrieve
The ALL operand displays detailed information about all local JES2 controlled devices, active remote
devices, and internal readers.
Topic: Reference:
MVS command NetView online help
Setting up, displaying, and IBM Z System Automation Customization and Programming and IBM Z
changing the IBM Z System System Automation User's Guide
Automation automation control
file
Assigning automation operators IBM Z System Automation User's Guide
for IBM Z System Automation
messages
Managing the status of MVS IBM Z System Automation User's Guide
resources
Issuing MVS and JES2 IBM Z System Automation User's Guide
commands from IBM Z System
Automation
Controlling the NetView program is the continual adjustment of the NetView environment to achieve the
goals of monitoring, investigating, analyzing, and controlling network and system components.
For information about how to protect commands and resources, define operators to the NetView program,
and restrict access to data sets, refer to the IBM Z NetView Administration Reference.
CMDDEF.LIST.MOD=DSISHP
Where DSISHP is the name of the module that contains the code to run the command. If you are
defining your own command processor, be sure to specify a unique module name on the MOD operand.
Do not use a name that the system might recognize as a NetView program command, because the
NetView program attempts to process the NetView command instead of your command processor. Use
the following conventions when defining commands:
• Start the name with an alphabetical character.
• Do not use NetView prefixes.
• Avoid special characters such as commas and colons.
• Avoid NetView command names, both internal commands and those shipped in CNMCMD.
For more information about NetView prefixes and internal command names, refer to the IBM Z NetView
Customization Guide.
You can also include CMDDEF statements for a command list for which you want to provide a synonym.
For example, to define a command list named MYSTATUS and a synonym of MYSTAT, include the following
statements in DSIPARM member CNMCMDU:
CMDDEF.MYSTATUS.MOD=DSICCP
CMDDEF.MYSTATUS.CMDSYN=MYSTAT
You can define command security using the NetView command authorization table, or a system
authorization facility (SAF) security product such as Resource Access Control Facility (RACF). When you
make changes to command security using the NetView command authorization table or SAF product, you
do not need to recycle the NetView program for these changes to take effect.
For more information, refer to the IBM Z NetView Security Reference.
Topic: Reference:
NetView RODM load utility usage IBM Z NetView Resource Object Data Manager and GMFHS
Programmer's Guide
CMD==>
F1= Help F2= End F3= Return F6= Roll F12=PrevCmd
User password
CMD==>
F1= Help F2= End F3= Return F6= Roll F12=PrevCmd
Method name
Method type (Named, Object independent)
Object name
Object ID (Hexadecimal value)
Field name
Field ID
CMD==>
F1= Help F2= End F3= Return F6= Roll F12=PrevCmd
Object name
Object ID (Hexadecimal value)
CMD==>
F1= Help F2= End F3= Return F6= Roll F12=PrevCmd
Topic: Reference:
Introduction to RODMView “Changing the Value of a RODM Object Attribute Using RODMView”
on page 125
RODMView panel flow “Using the RODMView Panels” on page 247
RODMView panels and usage IBM Z NetView Resource Object Data Manager and GMFHS
Programmer's Guide .
browse dispfk
You can display members of data sets on a remote NetView system. For example, to view the CNMKEYS
settings for PF keys on the remote NetView system NETV2, enter:
Use the following BROWSE command to view the contents of an active network netv2 log:
browse netloga
If your command security is appropriately configured and allows remote system access, you can use the
BROWSE command to view the contents of a remote network log or remote member on netv2 as shown in
the following examples:
Topic: Reference:
BROWSE command NetView online help
Protecting data sets IBM Z NetView Administration Reference
Generally, NetView tasks are started automatically when the NetView program starts and remains active.
You can use the STARTCNM and STOPCNM command lists to start or stop groups of DST or OPT tasks
by function or all tasks. For example, to start all tasks for the NetView management console, enter the
following command:
startcnm graphics
There might also be tasks, which are not frequently used, that you might need to start or stop. Here are
the steps to follow:
1. To start a task named MYTASK that was predefined in the CNMSTYLE member, enter:
start task=mytask
If the task was not predefined in the CNMSTYLE member, you can still start the task and specify its
characteristics using additional parameters on the START command.
2. To stop a task named MYTASK that is active, enter:
stop task=mytask
Each NetView task is assigned a dispatching priority of 1 - 9, where 9 is the lowest and 1 is the highest.
The initial priority of a task can be defined by using the CNMSTUSR or CxxSTGEN member or when the
task is started. For information about changing CNMSTYLE statements, see IBM Z NetView Installation:
Getting Started. You can display the priority of all tasks with the LIST command. For example, to list the
priorities of all active tasks, enter the following command:
list priority
You can also specify the priority of a task on the START command. For example, to change the priority of
task MYTASK to 8, first stop and then restart the task:
stop task=mytask
start task=mytask,pri=8
Note: Changing the priority of a task can affect the performance of other tasks running on your system.
Topic: Reference:
Additional task definitions IBM Z NetView Administration Reference
AUTOTASK, START, STOP, NetView online help
STARTCNM, and STOPCNM
commands
For a list of tasks IBM Z NetView Installation: Getting Started
Topic: Reference:
TASKMON, LOGTSTAT, DEFAULTS, IBM Z NetView Command Reference Volume 1 (A-N)
and OVERRIDE commands
TASKURPT IBM Z NetView Troubleshooting Guide
Topic: Reference:
APPL statements IBM Z NetView Installation: Getting Started
Operator definitions in DSIPRF IBM Z NetView Administration Reference
and DSIOPF, or in an SAF product
REFRESH command NetView online help
Topic: Reference:
Operator definitions in DSIOPF or IBM Z NetView Administration Reference
in an SAF product
REFRESH and STOP commands NetView online help
Topic: Reference:
The DEFAULTS command IBM Z NetView Command Reference Volume 1 (A-N)
Help information The online help facility
set pf9,immed,lines
If instead, you want to define the PF key for just the command facility component, and add text to a
command before sending it to the system, enter:
When the command facility is active and you press PF9, anything typed from the input area is placed
directly following the DIS command before processing it. You can enter a resource name without having to
enter the DIS command and press the Enter key.
You can specify different PF keys for each component. For example, in addition to specifying nccf as the
component name, you can specify any of the following keywords:
Keyword
Component Name
NETVIEW
The default setting, unless otherwise specified
LBROWSE
Log browse
MAINMENU
The NetView main menu panel
MBROWSE
Member browse
NCCF
Command facility
NLDM
Session monitor
NPDA
Hardware monitor
STATMON
Status monitor
VIEW
View applications, such as the NetView WINDOW command
WINDOW
The NetView WINDOW command
PFKDEF
The PFKDEF display
If an operator data set is defined for you, an OVERRIDE DSIOPEN=datasetname command may have
already been issued in your logon profile. You can check this by issuing LIST OVERRIDE. If a data set
name is shown next to DSIOPEN: under OVERRIDES, you can use the SAVE function of DISPFK to save
your key settings across logons or NetView restarts. Settings are saved in that data set in member
CNMKEYSV, and picked up by the PFKDEF command.
Topic: Reference:
Setting PF keys PFKDEF and NCCF SET in the NetView online help
PF key definitions Browse member CNMKEYS or enter DISPFK ALL
Saving PF Keys DISPFK and PFKDEF in the NetView online help. For additional
information, refer to operator data set references in the online help
for OVERRIDE and in the IBM Z NetView Installation: Configuring
Additional Components.
Repeating Commands
The RETRIEVE command tells the system to place the last command you entered on the command line. If
necessary, you can alter the command on the command line, or leave it as it is, then press Enter to send
the command to the system.
OVERRIDE NETVASIS=YES
rodminst NMG_Class
Note that when OVERRIDE NETVASIS=YES is entered, the ??? at the bottom of the panel is replaced by
>>>. OVERRIDE NETVASIS=YES remains in effect until OVERRIDE NETVASIS=NO is entered.
Suppressing Commands
You might want to keep certain information, such as a password, from being echoed to your screen, being
recorded in the NetView log, or being retrieved. You can use a suppression character to do this. A question
mark (?) is the default suppression character.
?allocate dsn(user.init),shr,password(xyz)
If the text of one command is embedded in another command, for example with EXCMD, you must enter
the suppression character as the first character on the command line or the command buffer, as shown in
the following example:
Note: The suppression character must precede the EXCMD command; do not enter the suppression
character with the queued command.
The suppression character is defined by using the SUPPCHAR statement in the CNMSTUSR or CxxSTGEN
member. For information about changing CNMSTYLE statements, see IBM Z NetView Installation: Getting
Started. To automatically suppress the command echo for a command, you can include ECHO=N on
the CMDDEF statement for the command in DSIPARM member CNMCMDU. Command echo suppression
works only in the command facility and is not supported in full-screen data mode.
autowrap no
Your screen locks when the message area is full. When you see the asterisks (***) at the bottom of the
screen, press either the Clear or Enter key, or enter a command to receive more messages.
To have the system automatically update messages every 5 seconds, enter the following command:
autowrap 5
The A in the upper right corner of the screen indicates that AUTOWRAP is being used.
override scrnfmt=*
list override
You can also control message colors and attributes using the NetView automation table.
Topic: Reference:
Setting up your screen definitions IBM Z NetView Customization Guide
Syntax of screen definition statements IBM Z NetView Administration Reference
OVERRIDE and LIST commands NetView online help
CMDDEF.DSINVGRP.RES=Y
Deleting Alerts
After NetView alerts have been resolved or are no longer useful, you can use the hardware monitor to
remove the alerts from the hardware monitor database and therefore from hardware monitor screens. You
can do this from the command facility screen and from the hardware monitor alerts display screens.
To delete a specific alert from the hardware monitor database while viewing the Alerts Static panel, enter
the selection number from the hardware monitor screen followed by the DEL function.
To delete all alerts recorded in the hardware monitor database using the command facility screen, follow
these steps:
npda sw al 0
npda sw al 100
Topic: Reference:
SWRAP Command NetView online help
SEL# ACTION DATA ETYPE FTYPE -------- RESNAME, TYPE, OR ADAPTADR ---
( 1) BLOCK ..... HELD TREF CTRL
( 2) BLOCK ..... HELD TREF LCTL
( 3) PASS ..... PERM TREF CTRL
( 4) PASS ..... PERF TREF CTRL
( 5) PASS ..... PERM TREF LCTL
( 6) PASS ..... PERF TREF LCTL
( 7) BLOCK ..... .... TREF CPU
( 8) BLOCK ..... HELD
( 9) PASS ..... PERM
(10) PASS ..... USER
(11) PASS ..... NTFY
(12) PASS ..... INST
(13) PASS ..... SCUR
(14) PASS ..... UNKN
(15) PASS ..... PERF
ENTER SEL# FOLLOWED BY DEL (DELETE)
???
CMD==>
You can then use the sample REXX command list shown in Figure 84 on page 137 to delete the alert
filters listed:
Note: The last statement in the command list allows all alerts to flow as a default.
2. Determine which alerts are unnecessary. You have to run your system with the defaults disabled for
a period of time before you can gather the data necessary to make your filtering decisions. Ask the
following questions for each alert:
• Does the event need to be recorded or deleted?
• Does the event need to be made an alert: does it require operator intervention or attention?
• Can the response be automated?
Based on these answers, you can:
• Record the event and create an alert
• Not record the event
• Record the event and not make it an alert
• Add automation to handle the event
• Forward the event or alert to the hardware monitor focal point
Table 7 on page 138 shows examples of how to set specific viewing filters.
Resetting a Filter
Use the CLEAR option to remove filters you have set and return the filter settings to the default settings
that are supplied by the NetView product. To remove a filter that blocks a specific event (whose unique
character code is 04C10), use the following command:
VTAM examines the session partner names for session awareness data against each of the MAPSESS
statements. The first MAPSESS statement that matches determines the KCLASS and therefore the
action taken on the data. If no MAPSESS statement matches the session partner names, VTAM
defaults to SAW=YES for that data.
2. Assemble and link edit IGCMGC10 into SYS1.VTAMLIB.
3. You can dynamically load or reload session awareness filter table IGCMGC10 from the NetView
console by entering:
mvs f net,table,type=filter,option=load,newtab=istmgc10
Topic: Reference:
VTAM filter table ISTMGC10 See the z/OS Communications Server library.
Focal points are the designated receivers of management data. Entry points are the designated senders of
management data. The NetView program can act as a focal point or an entry point for the following items:
• Alerts
• Link services
• Operations management data
• Service point command services
• User-defined categories
The roles of focal point and entry point can be set from the NetView program. Generally the roles are
defined by the sphere of control manager (SOC-MGR) at the focal point through its use of a sphere of
control configuration file (DSIPARM member DSI6SCF). The focal point sphere-of-control is defined as the
set of entry points that have an established relationship with the focal point.
2. To set your system as the focal point to receive alerts from the entry point CNM02, enter the following
command:
Also use the FOCALPT CHANGE command to establish a backup focal point for problem management
data sent from an entry point. To do this, complete the following steps at the NetView console of the
primary focal point:
1. To retain your system as the focal point to receive operations management data from the entry point
CNM02 and to establish CNM88 as the backup focal point, enter the following command:
2. To retain your system as the focal point to receive alerts from the entry point CNM02, and to establish
CNM88 as the backup focal point, enter the following command:
All existing backup focal points are dropped and the existing primary focal point remains unchanged.
Existing backup focal points are dropped and the existing primary focal point remains unchanged.
2. To name CNM99 as the new backup focal point for alerts, enter the following command:
Existing backup focal points are dropped and the existing primary focal point remains unchanged.
This command displays the primary focal point and the list of backup focal points for this entry point.
This command displays active entry points that are to forward alerts to this focal point.
This command removes CNM03 from the sphere of control of the focal point.
Note: The entry point is not removed until either the session with the entry point ends or the entry point
issues a FOCALPT DROP command.
focalpt refresh
Topic: Reference:
FOCALPT commands NetView online help
Setting up focal points IBM Z NetView Installation: Configuring Additional Components
Canzlog MVS & local NetView messages FILTER=LOG 02/15/22 13:28:07 -- 13:40:34
13:28:07 IST621I RECOVERY SUCCESSFUL FOR NETWORK RESOURCE NMP181
13:40:32 S NV
13:40:32 IRR813I NO PROFILE WAS FOUND IN THE STARTED CLASS FOR
NV WITH JOBNAME NV. RACF WILL USE ICHRIN03.
13:40:33 $HASP100 NV ON STCINRDR
13:40:33 IEFC165I // S T630EENV.NV,NV2I=7E,TOOL=NMPTLS,REG=0,DEPT=USER2
13:40:33 S T630EENV.NV,NV2I=7E,TOOL=NMPTLS,REG=0,DEPT=USER2
13:40:33_IEF695I START NV WITH JOBNAME NV IS ASSIGNED TO USER IBMUS
13:40:33 $HASP373 NV STARTED
13:40:33 IEF403I NV - STARTED - TIME=13.40.33
13:40:33 - --TIMINGS (MINS.)--
13:40:33 -JOBNAME STEPNAME PROCSTEP RC EXCP CONN TCB SRB CLOCK
13:40:33 -NV NV621 00 0 0 .00 .00 .0
13:40:33 IEF404I NV - ENDED - TIME=13.40.33
13:40:33 -NV ENDED. NAME- TOTAL TCB CPU TIME= .00
13:40:33 IRR813I NO PROFILE WAS FOUND IN THE STARTED CLASS FOR
T630EENV WITH JOBNAME T630EENV. RACF WILL USE ICHRIN03.
13:40:33 $HASP395 NV ENDED
13:40:33 IEA989I SLIP TRAP ID=X33E MATCHED. JOBNAME=*UNAVAIL, ASID=0035.
13:40:33 $HASP100 T630EENV ON STCINRDR
13:40:33 IEF695I START T630EENV WITH JOBNAME T630EENV IS ASSIGNED TO USER IBMUS
13:40:33 $HASP373 T630EENV STARTED
13:40:33 IEF403I T630EENV - STARTED - TIME=13.40.33
13:40:33 IEF196I IEF237I 0573 ALLOCATED TO SYS00013
13:40:33 CNM910I 'BPX1SDD WITH PROCESSDEFER+JOBPERM+NOJSTUNDUB+UNIQUEACEE' REQU
13:40:33 BNJ080I BNJLINTB - BUFFER SIZE=24K,SLOT SIZE=200
13:40:34 DSI244I NETVIEW TRACE ACTIVE FOR TASK = ALL : MODE = INT, SIZE = 4000
13:40:34 DSI899I DSI244I , SAF TRACE = FAILURES FOR REQUEST TYPES = AUTH EXTRAC
13:40:34 DSI530I 'DSIDCBMT' : 'DSIDCBMT' IS READY AND WAITING FOR WORK
MVS & local NetView messages FILTER=LOG TAG=(NVMSG,MVSMSG)
CMD==>
After pressing ENTER on the previous display, detail information about the selected message is shown.
The time display here is for the message origin. This message required more than 13 seconds to automate
because the NetView program was not active when it was issued. The immediate message indicates that
the message was too wide (or had too many lines) for a complete display.
After pressing PF2 (SHOWTEXT) on either of the two previous panels, the full message text is displayed.
SHOWTEXT is also useful for viewing a long multi-line message as a separate unit. The CzID number in
the title is useful for troubleshooting; see description of pipe stage CZR in IBM Z NetView Programming:
Pipes.
Figure 87. Display of Full Message Text from the SHOWTEXT Command
Archive message and archive index data sets can be managed by the NetView program with the
introduction of the CANZLOG BUILDARC command. When this command is run, any archive message
data sets older than the value specified on the DEFAULTS CZDELAGE command will be deleted, and the
archive index data sets will be rebuilt. Occasionally it might be necessary to rebuild the archive index data
sets for performance reasons or in the scenario where the archive index data sets are deleted by accident.
The Canzlog function provides multiple methods to print Canzlog messages. You can issue the PRINT
command from the following ways:
• NetView operator's console with a filter specification
• Browse Canzlog window and specify the number of rows to print
• Canzlog filter panel
• NVINFO
If you want to print Canzlog messages by using the PRINT command from the NetView command line,
you must at least specify a named filter on the PRINT command. The named filter can be a common level
filter, a task level filter, or a filter defined in the CNMSTYLE configuration file. You can also define the filter
on the command itself.
If you want to print Canzlog in a browse window that displays Canzlog messages, you can issue only
the PRINT command without any parameters. It will print Canzlog messages that start from the first
message displayed in the current BROWSE window. For more information about the PRINT (BROWSE)
command, see the NetView online help or the IBM Z NetView Command Reference Volume 2 (O-Z). The
print destination is controlled by the CZ.PRINT.OUTPUT CNMSTYLE statement or an included member.
If you issue the PRINT command from the Canzlog panel, it will filter the Canzlog messages by using the
filter specifications defined in the panel, and print the messages to the output destination that is defined
by the CZ.PRINT.OUTPUT CNMSTYLE statement or an included member.
browse netloga
You can also specify a time and date range to limit the amount of network log information displayed. For
example, to display the primary network log from 1:00 p.m. on 4/07/13 to 8:30 a.m. on 4/08/13, enter
the following command:
Note: If you specify a time range for browsing the network log, the first and the last record of the specified
time range remains the first and the last record during the entire browse.
f 'invalid command'
Selection Criteria:
list dsilog
switch dsilog,s
Using Browse
If the BROWSE screen defaults are set to display a scroll field, as shown in the following example,
entering a number on the command line before pressing a PF key for BACK or FORWARD affects only the
next time a PF key is pressed.
NETVIEW.BRWS ------ BROWSE CNMKEYS (DSIOPEN ) --- LINE 00000 TO 00036 OF 00165
SCROLL ==> CSR
----+----1----+----2----+----3----+----4----+----5----+----6----+----7----+----
You can enter a new value for the SCROLL field to change the effect of the BACK and FORWARD PF keys.
If your SCROLL field is not displayed on the BROWSE screens, entering a value on the command line
changes the number of lines scrolled by the BACK and FORWARD PF keys. You can change whether the
BROWSE screens have a SCROLL field using OVERRIDE SCROLL=OFF. For more information about the
effects of the OVERRIDE command, see the NetView online help.
Topic: Reference:
Setting up the network log IBM Z NetView Installation: Configuring Additional
Components
Filtering the log display using the log IBM Z NetView Programming: Assembler
browse installation exit DSIEX18
Printing the network log (DSIPRT) IBM Z NetView Installation: Configuring Additional
Components
Message formats Appendix A, “Message Formats,” on page 233
BROWSE and FIND commands NetView online help
stop task=dsitrace
6. To print the trace data, use the DSIPRT command facility utility program. An example of the job to start
this utility is located in the CNMS6214 member of the CNMSAMP data set.
Topic: Reference:
Setting up the command facility trace IBM Z NetView Installation: Configuring Additional
log Components
Command facility LIST, START, STOP, NetView online help
and TRACE commands
Reading the command facility trace data Information about diagnostic tools for the NetView program
in IBM Z NetView Troubleshooting Guide
3. To display the trace, see “Typical LU-LU Session for an SNA Subarea Network” on page 56.
Topic: Reference:
Session monitor TRACE NetView online help
command
mvs s gtf.gtf
2. Start the PPI trace for SSI task NETVSSI from the command facility. Enter the following command:
mvs p gtf
5. To display the trace data, use IPCS and the NetView sample CNMS4501 to format the PPI trace
records.
Topic: Reference:
Using GTF to collect PPI trace data IBM Z NetView Application Programmer's Guide
MVS START and STOP commands MVS/ESA System Commands
TRACEPPI command NetView online help
Displaying the trace data MVS/ESA Diagnosis: Using Dumps and Traces
dbauto npda,switch
Also, to retain a maximum of 100 events for resource RES1, enter the following from the command
facility:
dbauto npda,purge,60
To reclaim the space used by the purged records, reorganize the database. To do this, enter the following
command:
dbauto npda,reorg
Note: If the default is not what you want, you can also specify primary and secondary space allocation.
To delete all data in the database, enter the following command:
dbauto npda,clear
If you use the CLEAR option, it is not necessary to reorganize the database.
You can automate the process of maintaining the database by using the automation table.
npda reports on
Topic: Reference:
Setting up the hardware monitor IBM Z NetView Installation: Configuring Additional Components
database
Maintaining the hardware Refer to IBM Z NetView Installation: Configuring Additional
monitor database through Components
automation
Using SMF logs Refer to IBM Z NetView Installation: Configuring Additional
Components.
REPORTS and SWRAP commands NetView online help
dbauto nldm,switch
dbauto nldm,purge,60
To reclaim the space used by the purged records, reorganize the log. To do this, enter the following
command:
dbauto nldm,reorg
dbauto nldm,clear
If you use the CLEAR option, it is not necessary to reorganize the log.
You can automate the process of maintaining the database by using the automation table.
To write storage and processor utilization data to the external log enter the following command:
Topic: Reference:
Setting up the session monitor IBM Z NetView Installation: Configuring Additional Components
log
Maintaining the session monitor IBM Z NetView Installation: Configuring Additional Components
log through automation
DBAUTO, LISTCAT, and RECORD NetView online help
commands
Using Session Monitor filters “Using Session Monitor Filters” on page 140
dbauto save,switch
dbauto save,clear
dbauto save,reorg
Note: You might also want to specify primary and secondary space allocation if the default is not what you
want.
Topic: Reference:
Setting up the save/restore data IBM Z NetView Installation: Configuring Additional Components
set
DBAUTO and LISTCAT commands NetView online help
f ekgxrodm,logf
f ekgxrodm,logq
f ekgxrodm,logs
Topic: Reference:
Setting up the RODM log IBM Z NetView Installation: Configuring Additional Components
Calling a MAPI call from a RODM IBM Z NetView Resource Object Data Manager and GMFHS
method to write records to the Programmer's Guide
RODM log
Customizing member EKGCUST IBM Z NetView Administration Reference
Using the RODM log formatter for IBM Z NetView Troubleshooting Guide
problem diagnosis
mvs f ekgxrodm,chkpt
This command causes RODM to checkpoint to the next available checkpoint data set. EKGXRODM is the
RODM startup procedure. Message EKG1303I is displayed when the checkpoint is complete.
Note: Before starting RODM, specify one or more checkpoint data sets in the RODM procedure.
Topic: Reference:
Setting up the RODM checkpoint IBM Z NetView Installation: Configuring Additional Components
data set
MVS command NetView online help
Automating the network and system consists of developing procedures which respond to specific events.
Development of an automated procedure requires you to understand how to detect the condition to
which you want to respond automatically, and what action the automatic response includes. You can then
use a combination of the NetView automation table and RODM to correlate events and their automated
responses. You have the flexibility of using the automation table and RODM together or each can be used
separately. These automated responses can include the calling of a command list or command processor
using an automation task.
You can also schedule commands at periodic intervals or specific times. This is helpful for maintaining
status information about your environment for automation. You can also perform routine operations
automatically.
The NetView automation table provides a way to examine and separate data, and then take actions in
response. It enables the following actions:
• Processing system, subsystem, application, and network messages
• Scanning for any errors or indicators of significant events in the network
• Collecting status information by analyzing messages
• Examining network management service units (MSUs) for errors or significant events in the network. An
MSU is a data structure, such as an alert major vector X'0000' contained within a Network management
vector transport (NMVT) that carries management services data that the NetView program uses to
manage the system or network. Many IBM and non-IBM products send data to the NetView program in
the form of MSUs. You can also create your own MSUs.
NetView automation processes the following MSU types:
– Network management vector transports (NMVT), including alerts, resolutions, link configuration data,
link events, and problem determination statistics
– Control point management services units (CP-MSU)
– Multiple domain support message units (MDS-MU), which usually contains a CP-MSU
– Record maintenance statistics (RECMS)
– Record formatted maintenance statistics (RECFMS)
Use the generic automation receiver function of the NetView program to send data from your application
to the NetView program without having to provide your own receiving application. The data must be in
the form of a multiple domain support message unit (MDS-MU). The generic automation receiver presents
the received data to the NetView automation table. For more information about the generic automation
receiver, refer to the IBM Z NetView Customization Guide.
Many of the records that the hardware monitor receives go to the automation table during the course of
typical processing. There, you can have the automation table change filtering and highlighting attributes
or issue automatic responses. The hardware monitor sends only the following major vectors:
• Alerts, key X'0000'
• Link events, key X'0001'
• Resolutions, key X'0002'
• Problem determination statistics, key X'0025'
• Record maintenance statistics (RECMS), key X'1044'
• Record formatter maintenance statistics (RECFMS), key X'1045'
• Link configuration data, key X'1332'
Automate most messages and MSUs so that only the few situations requiring operator action are
forwarded to an operator.
Topic: Reference:
Using the AUTOTBL and NetView online help
AUTOCNT commands
Protecting data sets IBM Z NetView Security Reference
Protecting commands and IBM Z NetView Security Reference
keywords
Planning security for automation IBM Z NetView Security Reference
If the message is issued for several purposes, If the MSU is issued for several purposes, specify
specify the purpose for which the message is the purpose for which the MSU is to be automated.
to be automated. Specify the particular message Each MSU can be identified using some part of the
text position or message token that contains the MSU, such as a particular subvector or subfield.
information, such as the message number or
message text.
Identify what actions need to be performed when Identify the actions to be performed when the MSU
the message is processed by NetView automation. is processed by NetView automation. You might
You might want to suppress the message from want to block the MSU from recording and being
display, change the coloring or other highlight displayed, change the coloring or other highlight
attributes, suppress it from logging, process a attributes, or process a command or command list.
command or command list, or route it to a
particular operator or group of operators.
browse autotab2
Notice that all the automation table statements are displayed, including those which are in embedded
members.
The automation tables are located in the DSIPARM library.
You can analyze the existing statements in the automation table with the NetView AUTOCNT command, as
described in“Analyzing Automation Table Usage” on page 167.
You can create a listing of an automation table using the NetView AUTOTBL command. This listing is
placed in a member of the first data set defined by the DSILIST DD statement. You might want to do this
before you design your changes to the automation table. For example, if your automation table is named
AUTOTAB2, enter:
autotbl autotab2,listing=autolist,test
This places a listing of this automation table including all embedded members in the AUTOLIST member
of the DSILIST data set. If the AUTOLIST member already exists, the existing list is not replaced unless
you use the REPLACE parameter on AUTOTBL.
2. Use the TRACE action on an IF-THEN statement to trace the processing of a message or MSU through
the automation table. Detailed trace information is displayed by message BNH370I for each part of
When a message whose text begins with the characters WAC is processed by the automation table
statement, message BNH370 is generated and includes the trace results.
3. Use the AUTOTEST command to test the automation table. Specify the LISTING keyword, to generate
an automation table listing, and the REPORT keyword, to generate a listing of the commands that have
been run. For example, to test the DSIPARM member DSITBL01, generating an automation table listing
to EXLIST and a report to TESTRPT, enter the following command:
This command tests the automation table DSITBL01 in parallel with the active automation table.
4. Use the following AUTOTEST command with the STATUS keyword to verify that testing is still active:
autotest status
autotest off
autotest source=off
browse testrpt
The following example shows how a syntax error is displayed in the listing:
2. Activate the automation table by using the AUTOTBL command without the TEST keyword. Specify
the LISTING keyword to generate an automation table listing. For example, to activate the DSIPARM
member DSITBL01 and to generate an automation table listing to EXLIST, enter:
When activated successfully, two messages are displayed: message DWO044 indicating that the listing
was successfully generated, and message DSI410 indicating that the table is active.
3. To add another DSIPARM member to the list of active automation tables, specify where in the list the
new member is to be inserted. For example, to insert member DSITBL99 as the second member in the
list of active automation table members, enter:
4. To ensure that a specific DSIPARM member is always the first or last table within the list of automation
tables, you can use the FIRST or LAST keyword on the AUTOTBL command. For example, to ensure
that DSITBL99 is always the last table, enter:
5. To verify the automation table is still active, use the AUTOTBL command with the STATUS keyword.
autotbl status
To disable this block of automation table statements, enter the following command:
If, instead, you want to enable the single automation table statement identified by LABEL=VTAM (and not
the entire block of statements), enter the following command:
You can also enable or disable automation table statements with the AUTOMAN command. See the IBM Z
NetView User's Guide: Automated Operations Network for more information.
Use the AUTOCNT command to generate usage reports, which can be summary, detailed, or both. Each
type of report can include message statements, MSU statements, or both. Because the output can be
lengthy, especially for detailed reports, you can use the FILE option to send the output to a file. You can
also generate the report from a command list and process the information automatically.
To analyze a detail report, associate specific automation statements with the actual statements in the
source member or the automation table listing; the actual text of the statement is not shown in the report.
For each statement, the detail report provides:
• The member name and sequence number of the source statement. Note that these values might not
be current if the source automation table member has been changed since the automation table was
activated.
• The sequential statement number as stored in an automation table list. Note that this is only current
if the list was generated when the automation table was loaded and not replaced after the table was
activated.
If an automation table list is generated when the automation table is activated, and no AUTOCNT RESET
command is issued between the automation table activation and the usage report generation, the date
and time in the listing match the STATISTICS STARTED date and time in the summary usage report.
Comparing the dates and times is one way you can verify that you have correlation between the detailed
usage report statements and the actual automation statements.
The next example indicates that automation processing is to stop for all problem determination
statistics major vectors (key X'0025'):
Note: When an ALWAYS statement is processed for a message or MSU, the message or MSU is then
counted as being matched. Therefore, the number of messages or MSU matches can be misleading if
you use ALWAYS statements.
Where possible (without changing the automation logic), order the automation table in the following way:
• Place BEGIN/END sections with the highest MATCH COUNT at the top of the table and those with the
lowest MATCH COUNT at the bottom.
• Within BEGIN/END sections, place statements with the highest MATCH COUNT at the top and those
with the lowest MATCH COUNT at the bottom.
Ordering your automation table in this way optimizes the performance of your automation processing so
that the automation table requires less time to process messages and MSUs.
You can use the NetView ASSIGN command to route solicited and unsolicited messages and to assign
operators to groups. The ASSIGN command is useful for preliminary routing of messages to autotasks to
get messages to the automation table faster, and for assigning operators to groups.
If operators in a group are not yet defined when the ASSIGN command is issued, the assignment takes
effect after the operator is defined and logs on to NetView.
If the ASSIGN command defines message routing to a single operator, and that operator is not yet
defined, the assignment fails.
To activate changes to operators defined by NetView profiles, modify the definition in DSIOPF, then issue
the NetView REFRESH OPERS command.
If the operators are defined in a system authorization facility (SAF) security product (SAF) product such as
RACF, changes to the NETVIEW segment definitions take effect immediately.
Topic: Reference:
ASSIGN and REFRESH NetView online help
commands
assign group=+group1,op=(oper1,oper2)
assign msg=*,pri=oper1,sec=oper2
assign msg=ist*,pri=(vtamoper,auto1)
assign msg=ist5*,pri=(vtamoper,auto2)
Messages beginning with IST5 are routed to VTAMOPER or AUTO2, and all other IST messages are routed
to VTAMOPER or AUTO1. All remaining messages are routed to OPER1 and if OPER1 is available, they are
also routed to OPER2.
assign msg=dsi660i,copy=(oper2,oper3,oper4)
Creating and using NetView automated operator station tasks (autotasks) enables work to be performed
automatically. Autotasks can do work usually performed by operators, thus providing more time for
operators to perform less repetitive tasks. Autotasks can perform the following tasks:
• Perform a wide range of tasks, such as running command lists in response to messages and
MSUs, sending messages to other operator tasks, scheduling commands to run using NetView timer
commands, and so on.
• Respond quickly to system or network failures.
• Facilitate cross domain communication, thus reducing the required number of NetView programs to
which an operator must be logged on.
• Ensure consistent responses to system and network problems.
For information about defining autotasks, see the IBM Z NetView Automation Guide.
You can start autotasks by using the NetView AUTOTASK or RMTCMD command. Table 13 on page 175
shows how each command implements an autotask:
• Perform tasks usually reserved for NetView • Are used to provide cross domain communication
operators. using LU 6.2.
• Can be started before the VTAM program is • Can be used to provide an operation path into
started so the NetView program can be used to another NetView program on the same host or on
monitor VTAM program failures and recover them a different host. Commands can be processed on
automatically. different NetView systems, and the results can
• Can be associated with MVS consoles when be viewed.
started, and NetView commands can be entered
at the MVS console which are then processed
under the NetView autotask associated with that
MVS console.
For example, to start an autotask AUTO3 using the AUTOTASK command, enter:
autotask opid=auto3
To start an autotask named OPER2 on the remote NetView CNM02 and display the name of the alert focal
point, enter:
Topic: Reference:
AUTOTASK and RMTCMD NetView online help
commands
Defining operators using a IBM Z NetView Administration Reference.
security application
A command issued by a timer command is a timed command. Any command that you can issue from the
NetView program can be a timed command. For example, command lists and NetView, VTAM, and MVS
commands can be timed commands.
Like other NetView commands, timed commands can be issued from the following places:
• An operator console
• An autotask
• A command list or command processor
• Any active task
NetView timer commands include AT, AFTER, CHRON, and EVERY. You can use timer commands to issue
commands whenever you choose and to conveniently issue commands repeatedly.
Note: A timed command is subject to any restrictions of the task under which it runs.
You can schedule a command to automatically perform tasks that operators traditionally perform, such as
the following tasks:
• Periodically reviewing the status of a critical resource
• Starting a process at a scheduled time
• Verifying, after a designated period of time, whether a process completed successfully
You can issue timed commands in either of the following two ways:
• Using NetView commands at the command line
• Using NetView Timer Management Panels
at 09/24 09:00:00,id=statrep,statrep
every 1:00:00,ppt,taskutil
after 1:00:00,id=statvtam,chkvtam
list timer=all,op=all
To display a specific timer command with an ID, specify an ID with the TIMER parameter. For example, to
display a timer command with an ID of SHOWLINK on the task of the calling operator, enter the following
command:
list timer=showlink
To display all timers for a specific operator, add OP= followed by the operator ID. For example, to display
all timers issued by operator OPER1, enter the following command:
list timer=all,op=oper1
Note: To facilitate viewing timer information, preface the LIST command with the WINDOW command.
This displays the list timer output in a scrollable window.
purge op=oper1,timer=status1
If the SAVE parameter was used on the timer command, purging the timer also deletes it from the Save/
Restore database.
Saving a Timer
To restore a TIMER command so that it can be processed when the NetView program is recycled, use the
SAVE parameter. This parameter saves the TIMER command in the Save/Restore VSAM database.
For example, to schedule the TASKUTIL timed command for 09/24 at 9 a.m. and to have the timed
command saved in case NetView is recycled, enter the following command:
at 09/24 09:00:00,id=taskstat,save,taskutil
Restoring Timers
The NetView RESTORE command can be used to restore timers that have been saved to the VSAM
database.
To restore all saved timers, enter the following command:
restore timer
To erase all saved timer records from the database, add the DELETE option:
Topic: Reference:
AT, AFTER, CHRON, EVERY, LIST, NetView online help
PURGE, and RESTORE commands
Timed commands IBM Z NetView Automation Guide
Using IBM Z System Automation IBM Z System Automation User's Guide
to set timers
Filter criteria:
Type one action code. Then press enter.
1|A=Add 2|C=Display/Change 3|P=Purge 4=Add CHRON timer
Timer ID Scheduled Type Interval Task Save Catchup
_ IDLEOFF 07/19/13 19:22:19 EVERY 00:10:00 AUTO1
IDLEOFF 10000
_ EZLRSET 07/20/13 00:01:00 AT PPT
EXCMD AUTO1 EZLEASTM
_ PSTS 07/23/13 02:00:00 EVERY MONDAY AONMSG1
DBMAINT EZLSTS 7
_ PNPDA 07/23/13 04:00:00 EVERY MONDAY AONMSG1
DBMAINT NPDA 7
_ PNLDM 07/23/13 06:00:00 EVERY MONDAY AONMSG1
DBMAINT NLDM 7
Command ===>
F1=Help F2=End F3=Return F5=Refresh F6=Roll
F7=Backward F8=Forward F11=Reset Target F12=Cancel
Filter criteria:
Type one action code. Then press enter.
1|A=Add 2|C=Display/Change 3|P=Purge 4=Add CHRON timer
Timer ID Scheduled Type Interval Task Save Catchup
_ IDLEOFF 07/19/13 19:42:19 EVERY 00:10:00 AUTO1
IDLEOFF 10000
_ EZLRSET 07/20/13 00:01:00 AT PPT
EXCMD AUTO1 EZLEASTM
_ PSTS 07/23/13 02:00:00 EVERY MONDAY AONMSG1
DBMAINT EZLSTS 7
_ PNPDA 07/23/13 04:00:00 EVERY MONDAY AONMSG1
DBMAINT NPDA 7
_ PNLDM 07/23/13 06:00:00 EVERY MONDAY AONMSG1
DBMAINT NLDM 7
Command ===>
F1=Help F2=End F3=Return F5=Refresh F6=Roll
F7=Backward F8=Forward F11=Reset Target F12=Cancel
If you are using the NetView RMTCMD interface (the COMMON.EZLRMTTIMER = NETV statement in the
CNMSTYLE member), the Remote Target Selection panel is displayed, as shown in Figure 95 on page 182.
Filter:
Type one action code and press enter.
Command ===>
F1=Help F3=Return F5=Refresh F6=Roll
F7=Backward F8=Forward F12=Cancel
The Remote Target Selection Panel displays the following columns of data:
Filter
Used for specifying a DOMAIN, SYSTEM, SYSPLEX, or COMM method to display.
DOMAIN
Specifies the IDs of the domains that you can select as a target.
SYSTEM
Specifies the IDs of systems that you can select as a target.
Filter:
Type one action code and press enter.
Command ===>
F1=Help F3=Return F5=Refresh F6=Roll
F7=Backward F8=Forward F12=Cancel
Type any character to select a target system, as shown in Figure 95 on page 182, and press Enter.
The NetView program displays the active timers for the Target that you selected.
Filter criteria:
Type one action code. Then press enter.
1|A=Add 2|C=Display/Change 3|P=Purge 4=Add CHRON timer
Timer ID Scheduled Type Interval Task Save Catchup
_ ADOIV 07/19/13 19:38:53 EVERY 00:03:00 AUTOIV1
EZLEOIVT
_ EZLRSET 07/20/13 00:01:00 AT PPT
EXCMD AONBASE EZLEASTM
_ PSTS 07/23/13 02:00:00 EVERY MONDAY AONMSG1
DBMAINT EZLSTS 7
_ PNPDA 07/23/13 04:00:00 EVERY MONDAY AONMSG1
DBMAINT NPDA 7
_ PNLDM 07/23/13 06:00:00 EVERY MONDAY AONMSG1
DBMAINT NLDM 7
Command ===>
F1=Help F2=End F3=Return F5=Refresh F6=Roll
F7=Backward F8=Forward F11=Reset Target F12=Cancel
Timer Command
Command ===>
F1=Help F2=End F3=Return F6=Roll
F12=Cancel
The pop-up window that displays on the panel depends on the type of the timer whose entry field you
used to make the add request on the Timer Management panel. The timers are one of the following
types:
Adding a Timer
You can add the following types of timers:
• “EVERY Timer” on page 185
• “AT Timer” on page 186
• “AFTER Timer” on page 187
• “CHRON Timer” on page 189
EVERY Timer
To add a timer that pops at recurring intervals and is not deleted:
1. Display the Timer Management panel.
To display the Timer Management panel, see “Using NetView Timer Management Panels” on page
180.
2. Display the Timer Set panel.
To display the Timer Set panel, see “Setting Timers for a Specific Date and Time” on page 184.
3. If the EVERY pop-up window is not already displayed on the Timer Set panel, type 1 in the Timer
Type field and press Enter.
The Timer Set panel, shown in Figure 99 on page 185, is displayed with the EVERY pop-up window.
Timer Command
Command ===>
F1=Help F2=End F3=Return F6=Roll
F12=Cancel
Interval 00 : 15 : 00
Select 9
9 000 DAYS
To specify a time of day and a day of the week, type the time in the Interval fields, and in the
Select field, type the number that corresponds to the day. The time is shown in military time or the
hh:mm:ss format.
For example, to set the timer for Sunday at 2 p.m., type:
Interval 14 : 00 : 00
Select 1
To specify a timer that goes off at a certain time of day every x number of days, type the time of day in
the Interval fields, and type 9 in the Select field. Then, specify a number of days in the DAYS field.
For example, to set the timer for noon every 5 days, type:
Interval 12 : 00 : 00
Select 9
9 005 DAYS
AT Timer
To add a timer that pops on a specific date and time:
1. Display the Timer Management panel.
To display the Timer Management panel, see “Using NetView Timer Management Panels” on page
180.
2. Display the Timer Set panel.
Timer Command
Command ===>
F1=Help F2=End F3=Return F6=Roll
F12=Cancel
Note: To set the timer for a different domain or system, see “Selecting Remote Targets” on page 181.
4. Define whether you want messages generated if the requested timer fails. Specify TIMEFMSG as
follows:
• Type 1 if you do not want messages generated.
• Type 2 if you want messages generated.
5. In the Time field of the pop-up window, type the time of day when you want the command to run.
The time is shown in the hh:mm:ss format; for example, specify 2:43:58 p.m. in the following format:
14 : 43 : 58
6. In the Date field of the pop-up window, type the date when you want the command to run. The date
follows the mm/dd/yy format; for example, specify August 3, 2013 in the following way:
08/03/13
AFTER Timer
To add a timer that goes off after a specified period of time:
1. Display the Timer Management panel.
Timer Command
Command ===>
F1=Help F2=End F3=Return F6=Roll
F12=Cancel
The AFTER timer type works differently from the EVERY and AT types.
When you use the AFTER type, do not specify a time of day or a date setting for the timer. Instead,
specify a number of days, hours, minutes, and seconds after which you want the timer to expire. An
interval is set that begins the moment you set the timer and ends after the specified number of days,
hours, minutes, and seconds have passed.
Note: To set the timer for a different domain or system, see “Selecting Remote Targets” on page 181.
4. Use the Intvl and Days fields together to specify the timer setting.
For example, to set the timer for 14 hours from now, type:
Intvl 14 : 00 : 00
Days 000
When you set the number of days to 000, the day the timer goes off is today. If you specify a number
other than 000, the timer goes off after the specified number of days from the current day.
For example, to set the timer for 5 days, 12 hours, 10 minutes, and 15 seconds from now, type:
Intvl 12 : 10 : 15
Days 005
To set the timer for the current time 5 days from now, type:
Intvl 00 : 00 : 00
Days 005
5. Define whether you want messages generated if the requested timer fails. Specify TIMEFMSG as
follows:
• Type 1 if you do not want messages generated.
• Type 2 if you want messages generated.
6. Specify a timer ID in the Timerid field (Optional).
CHRON Timer
To add a CHRON timer that pops on regular intervals, perform the following steps:
1. Display the Timer Management panel. To display the Timer Management panel, see “Using NetView
Timer Management Panels” on page 180.
2. Display the Timer Set panel. To display the Timer Set panel, see “Setting Timers for a Specific Date
and Time” on page 184.
3. If the Timer Set panel does not already display the CHRON pop-up window, type 4 in the Timer Type
field and press Enter. The pop-up window matching the CHRON timer type is displayed, as shown in
Figure 102 on page 189.
Command ===>
F1=Help F2=Display Results F3=Return F4=Options F5=Intervals F6=Roll
F9=Set Timer F10=Notify F11=Preview F12=Cancel
Note: To set the timer for a different domain or system, see “Selecting Remote Targets” on page 181.
• In the Interval pop-up window, specify how often you want your command to be issued in one of
the following ways:
– Type 1 to specify how often the command is to be issued in your local time format.
– Type 2 to specify how often the command is to be issued in programmer format, which specifies
intervals greater than 24 hours.
– Type 3 to specify that the command is to be issued every 24 hours.
Note: The pop-up windows for CHRON AT and CHRON AFTER timers contain slightly different
information.
• Type 1 in the Save field to save the timer or type 2 if you do not want to save the timer.
• Type 2 in the Clock field for Greenwich Mean Time, or type 1 if you want local time.
• Specify a timer ID in the Timerid field (optional).
• Type the operator ID that is to issue the command in the Route field (optional).
Command ===>
F1=Help F2=Display result F3=Return F6=Roll
F9=Set Timer F10=Notify F11=Preview F12=Cancel
• Type one or more operator IDs in the Ignore field to specify which operators to notify when the
command does not run because the specified task is not active.
• Type one or more operator IDs in the Purge field to specify which operators to notify when the
command does not run because it was purged.
• Type one or more operator IDs in the Remove field to specify which operators to notify when the
command does not run because it was removed.
• Type one or more operator IDs in the Run field to specify which operators to notify when the
command runs.
5. Press Enter to return to the EZLK6210 panel.
6. If you press F5 in the EZLK6210 panel, for more detailed interval options, the panel shown in Figure
104 on page 191 is displayed:
Command ===>
F1=Help F2=Display Results F3=Return F4=Options F5=Intervals F6=Roll
F9=Set Timer F10=Notify F11=Preview F12=Cancel
• Start timer AT displays a panel where you can specify the time when the EVERY is to start.
• Start timer AFTER displays a panel where you can specify a delay interval after which the EVERY is
to start.
Command ===>
F1=Help F2=Display Results F3=Return F4=Options F5=Intervals F6=Roll
F9=Set Timer F10=Notify F11=Preview F12=Cancel
Command ===>
F1=Help F2=Display Results F3=Return F4=Options F5=Intervals F6=Roll
F9=Set Timer F10=Notify F11=Preview F12=Cancel
Command ===>
F1=Help F2=Display results F3=Return F4=Options F6=Roll
F9=Set Timer F10=Notify F11=Preview F12=Cancel
Figure 108. Timer Options Panel to Create a New Timer or Copy a Timer
Type 1 to create a new timer of the same type or type 2 to copy a timer. You can copy a timer only if it
was set previously.
Filter criteria:
Type one action code. Then press enter.
1|A=Add 2|C=Display/Change 3|P=Purge 4=Add CHRON timer
Timer ID Scheduled Type Interval Task Save Catchup
_ IDLEOFF 07/19/13 20:12:19 EVERY 00:10:00 AUTO1
IDLEOFF 10000
d SYS00001 07/19/13 20:12:48 CHRON 00:01:00 OPER2
list status=ops
_ EZLRSET 07/20/13 00:01:00 AT PPT
EXCMD AUTO1 EZLEASTM
_ PSTS 07/23/13 02:00:00 EVERY MONDAY AONMSG1
DBMAINT EZLSTS 7
_ PNPDA 07/23/13 04:00:00 EVERY MONDAY AONMSG1
DBMAINT NPDA 7
_ PNLDM 07/23/13 06:00:00 EVERY MONDAY AONMSG1
DBMAINT NLDM 7
Command ===>
F1=Help F2=End F3=Return F5=Refresh F6=Roll
F7=Backward F8=Forward F11=Reset Target F12=Cancel
After you press Enter to purge a specific timer, the panel shown in Figure 110 on page 194 is displayed. In
the following example, the Total Purged Timers is now set to 1, and F9=Purged Timers is displayed.
Filter criteria:
Type one action code. Then press enter.
1|A=Add 2|C=Display/Change 3|P=Purge 4=Add CHRON timer
Timer ID Scheduled Type Interval Task Save Catchup
_ IDLEOFF 07/19/13 20:12:19 EVERY 00:10:00 AUTO1
IDLEOFF 10000
_ EZLRSET 07/20/13 00:01:00 AT PPT
EXCMD AUTO1 EZLEASTM
_ PSTS 07/23/13 02:00:00 EVERY MONDAY AONMSG1
DBMAINT EZLSTS 7
_ PNPDA 07/23/13 04:00:00 EVERY MONDAY AONMSG1
DBMAINT NPDA 7
_ PNLDM 07/23/13 06:00:00 EVERY MONDAY AONMSG1
DBMAINT NLDM 7
Reinstating Timers
To display purged (or deleted) timers, press F9 on the Active Timer panel. Figure 111 on page 195 shows
an example of a Purged Timer panel.
Command ===>
F1=Help F2=End F3=Return F6=Roll
F7=Backward F8=Forward F9=Active Timers F12=Cancel
To reinstate a purged timer, type 1 in the input field beside the timer that you want to reinstate and
press Enter. The Change Timer panel that is appropriate for the timer you requested to be reinstated is
displayed. Follow the steps listed previously for changing timers and make any necessary changes before
setting the timer.
Figure 112 on page 195 shows the panel that is displayed after the requested timer has been set. Note
the following changes on the panel:
• The timer is no longer displayed.
• The Selected field is increased by 1.
• The Purged field is decreased by 1.
Press F9 to display your active timers.
Command ===>
F1=Help F2=End F3=Return F6=Roll
F7=Backward F8=Forward F9=Active Timers F12=Cancel
In automating your enterprise using the NetView program, the unexpected occasionally happens: a
command list that was supposed to handle a problem does not handle it; a message that was supposed to
be automated was not; an alert that was supposed to be suppressed was not; a timed command does not
run when it was supposed to; and so on.
Even in the most comprehensive automated environment, human intervention is sometimes required to
solve a problem that automation was not designed to handle and to update automation when it fails
to detect or recover a problem. The remainder of this chapter contains problem scenarios followed by
problem determination steps and possible solutions.
This statement sends OPER1 a message (DSI039I) when the message that is to be automated
is received by the automation table. This statement does not affect any other processing of the
message by subsequent statements in the automation table because of the CONTINUE(Y) action,
which allows later automation table statements in the table to also process the message. Message
DSI039I identifies the task that processed the message.
5. Trace the processing of a message or MSU through the automation table using the TRACE action.
The TRACE action sets a trace tag in the AIFR and an indicator that the AIFR is to be traced as it is
processed by the automation table. Detailed trace information is displayed on the console by message
BNH370I for each part of each automation table statement that analyzes the AIFR.
An example automation table statement to trace a message whose text begins with the characters WAC
follows:
6. Use the AUTOCNT command to generate a detailed automation table usage report, then determine
whether multiple statements in the automation table match the message. A message detail usage
report shows how often an automation table statement was compared against messages and how
often it was matched with messages.
Table 14. Determining Why a Message Was Not Automated Using the Detail Report
Indicators Possible explanation
The automation table statement might be coded incorrectly, in which
COMPARE COUNT >
case the automation statement never matches the message
0
MATCH COUNT = 0
If a command was scheduled, determine which of the following situations prevented it from running:
• It was sent to a task that was not logged on.
You can use the LIST STATUS=OP command to determine whether the task that was supposed to
receive the command is logged on, although it does not tell you if the task was logged on at the time
the message was automated. You can also check the network log for DWO032E messages, which are
written when a command is sent to a task that is not logged on. A CNM493I message found near a
DWO032E message identifies the statement in the automation table that scheduled the command.
Topic: Reference:
The AUTOTBL, AUTOCNT, and NetView online help
TASKUTIL commands
Using the TASKUTIL command Additional information about the TASKUTIL command can be found
in the IBM Z NetView Tuning Guide
The DSIEX16 and DSIEX17 IBM Z NetView Programming: Assembler
installation exits
DSIEX02A and XITCI installation IBM Z NetView Programming: Assembler or IBM Z NetView
exits Programming: PL/I and C
Using MPF, PROP, and OCCF IBM Z NetView Automation Guide
MVS extended consoles for IBM Z NetView Automation Guide
automation
Command security IBM Z NetView Security Reference
This can assist you in determining how to correctly code automation table statements.
4. Determine whether the installation exit XITCI or DSIEX16B is changing or deleting the alert. If you
have an active XITCI or DSIEX16B exit routine, it can affect the alert. XITCI can change or delete the
alert prior to automation, and DSIEX16B can affect the alert or automation actions scheduled by the
automation table.
5. Issue the NetView AUTOTBL STATUS command to find out which automation table is currently active
and determine whether this is the correct automation table.
6. Determine whether the automation table is receiving the alert. You can accomplish this by adding a
statement like this to your automation table:
Note: The ROUTE statement is included because under certain conditions (for example, if BNJDSERV
is not started from an OST) certain actions fail because they cannot be processed under BNJDSERV
(DST). This statement sends OPER1 a message (DSI039I) when the alert is received by the
automation table.
This statement does not affect other processing of the alert by subsequent statements in the
automation table because of the CONTINUE(Y) action. The CONTINUE(Y) action allows other or
subsequent automation table statements in the table to also process the alert.
7. Use the AUTOCNT command to generate a detailed automation table usage report, then determine
whether multiple statements in the automation table match the alert. A detailed automation table
usage report shows how often an automation table statement was compared against an alert and
how often it was matched with an alert.
Table 15 on page 200 shows how to interpret some of the data from the detail report.
Table 15. Determining Why an Alert Was not Automated Using the Detail Report
Indicators Explanation
COMPARE COUNT > 0 The automation table statement might be coded incorrectly, in
MATCH COUNT = 0 which case the automation statement never matches the alert
Topic: Reference:
RATE, AUTORATE statements IBM Z NetView Administration Reference
SRFILTER, AUTOTBL, AUTOCNT, NetView online help
TASKUTIL commands
Using the TASKUTIL command Additional information about the TASKUTIL command can be found
in the IBM Z NetView Tuning Guide
MSUSEG condition item IBM Z NetView Automation Guide
XITCI installation exit IBM Z NetView Programming: Assembler or IBM Z NetView
Programming: PL/I and C
DSIEX16B installation exit IBM Z NetView Programming: Assembler
Topic: Reference:
TRACE, PULL instruction TSO/E REXX/MVS Reference
WAIT instruction IBM Z NetView Programming: REXX and the NetView Command List
Language
&CONTROL, &PAUSE statement IBM Z NetView Programming: REXX and the NetView Command List
Language
&WAIT statement IBM Z NetView Programming: REXX and the NetView Command List
Language
CMD, DEFAULTS, OVERRIDE, NetView online help
RESET, TASKUTIL commands
Using the TASKUTIL command Additional information about the TASKUTIL command can be found
in the IBM Z NetView Tuning Guide
Topic: Reference:
AFTER, AT, EVERY command NetView online help
&PAUSE statement IBM Z NetView Programming: REXX and the NetView Command List
Language
Topic: Reference:
LIST MSGQ command NetView Online Help
LOADCL command IBM Z NetView Programming: REXX and the NetView Command List
Language
TASKMON NetView Online Help
TASKUTIL, AUTOCNT commands NetView online help
Using MPF, PROP, OCCF IBM Z NetView Automation Guide
Using the AUTOCNT command Additional information about the AUTOCNT command can be found
in the IBM Z NetView Tuning Guide
Using the TASKUTIL command Additional information about the TASKUTIL command can be found
in the IBM Z NetView Tuning Guide
Using the XITCI exit IBM Z NetView Programming: Assembler
Problem diagnosis involves the requesting of additional information to let you further analyze the cause of
a status change from satisfactory to unsatisfactory. You can then resolve the problem situation and decide
on the proper action to bypass or resolve the unsatisfactory condition.
This topic provides problem scenarios that illustrate how to solve potential problems before they affect
the status of your network. The tools used to solve these problems are the NetView Graphic Monitor
Facility, command facility, status monitor, and hardware monitor.
Chapter 19, “Reactive Investigating,” on page 219 provides problem scenarios that illustrate how to
solve problems that have already occurred. The tools used to solve these problems are the NetView
management console, session monitor, hardware monitor, VTAM commands, NPM, AON, and command
facility.
Preventing Problems
Proactive investigating involves resolving potential problems before they affect the network. You can
accomplish this by monitoring the status of various network components (such as controllers, links, and
so on) and studying response time trends. Use the following scenarios to investigate potential network
problems. Table 16 on page 211 gives an overview of the problem scenarios that are described in
this chapter. For each scenario, the table lists the product used to solve the problem and the types of
resources involved.
A response similar to Figure 113 on page 212 is received (by default, command responses are also sent to
the network log).
DWO022I
TASKNAME TYPE DPR CPU-TIME N-CPU% S-CPU% MESSAGEQ STORAGE-K CMDLIST
-------- ---- --- ------------ ------ ------ -------- --------- --------
AAUTSKLP DST 249 22019.13 49.02 9.37 0 87521 N/A
BNJDSERV DST 250 4466.25 7.35 1.41 0 357 N/A
DSIELTSK DST 253 4731.99 7.24 1.38 0 31 N/A
DSICRTR DST 251 1362.16 1.97 0.38 0 32 N/A
DSILOG DST 254 624.64 1.40 0.27 0 23 N/A
DSIAMLUT DST 248 1145.74 1.34 0.26 0 26 N/A
AAUTCNMI DST 249 94.44 0.33 0.06 0 463 N/A
CNMTAMEL DST 249 0.36 0.00 0.00 0 49 N/A
CNM01LUC DST 251 306.54 0.00 0.00 0 43 N/A
DSIGDS DST 254 1.89 0.00 0.00 0 46 N/A
DSIHPDST DST 252 2.15 0.00 0.00 0 39 N/A
DSIKREM DST 250 2.15 0.00 0.00 0 549 N/A
DSIROVS DST 251 0.03 0.00 0.00 0 13 N/A
DSISVRT DST 253 0.93 0.00 0.00 0 105 N/A
DSIUDST DST 250 2.59 0.00 0.00 0 14 N/A
DSI6DST DST 251 28.98 0.00 0.00 0 41 N/A
NETVIEW OTHR N/A N/A 0.00 0.00 N/A N/A N/A
NETVIEW SRB N/A 4026.90 5.93 1.13 N/A N/A N/A
NETVIEW TOTL 157 54766.96 100.00 19.11 253 157477 N/A
SYSTEM TOTL N/A N/A N/A 63.70 N/A N/A N/A
For each task, the task name (TASKNAME), task type (TYPE), dispatching priority (DPR), and processor
usage (CPU-TIME) is displayed. In addition, you can use the following information (shown in Figure 113
on page 212) to diagnose performance or storage problems.
N-CPU% (NetView program CPU • If this value is continuously high for an operator task,
utilization) autotask, distributed task, or NNT, this can indicate an
Relative contribution of the task endless loop condition in a command list or argument. The
to the NetView program processor active command list is displayed in the CMDLIST field.
utilization, based on a maximum of • If this value is low, with the same command list active and
100%. message buildup for an operator task, autotask, distributed
task, or NNT, this can indicate that the command list is
stuck in a WAIT.
S-CPU% (system CPU utilization) • If this value is continuously high for an operator task,
Contribution of the task to the total autotask, distributed task, or NNT, this can indicate an
system processor utilization, based endless loop condition in a command list or argument. The
on a maximum of 100%. active command list is displayed in the CMDLIST field.
• If this value is low, with the same command list active and
message buildup for an operator task, autotask, distributed
task, or NNT, this can indicate that the command list is
stuck in a WAIT.
MESSAGEQ • If this value is high, with the same command list active
Number of messages currently and low processor usage for an operator task, autotask,
backed up on the 3 public message distributed autotask, or NNT, this can indicate that the
queues of the task (HIGH, NORMAL, command list is stuck in a WAIT.
and LOW). • If this value continues to grow for a task during a steady
state period when you are expecting the workload activity
of the NetView program to be fairly uniform, and if the
total system processor utilization is near 100%, this can
indicate that the NetView program is not getting dispatched
frequently enough to do its work. Continued growth results
in continued NetView storage growth, which can lead to
storage abends. If you detect such a condition, consider
ending low-priority processor-intensive applications to
relieve the system processor constraint. If the NetView
program regularly experiences message growth, consider
making the MVS dispatching priority for the NetView
address space more favorable.
STORAGE-K If this value continues to rise for a task, this can indicate that
Amount of pooled and non-pooled the task is getting queued storage but not freeing it properly.
queued storage, in kilobytes,
currently being used by the task.
Topic: Reference:
Tuning your system using IBM Z NetView Tuning Guide
TASKUTIL
TASKUTIL command NetView online help
monit stop,all
or
monoff all
monit start,all
or
monon all
monit start,line27
or
monon line27
You can also initiate error recovery using Automated Operations Networks (AON). AON recovers network
resources by monitoring critical VTAM messages and taking automated action based on preset tailored
criteria. AON reacts to adverse conditions of network resources and notifies operators of these conditions,
when appropriate. Recovery criteria can be set based on resource type, resource naming convention,
explicit resource name, or network-wide settings. A variety of parameters and options can be selected to
control when and how recovery takes place.
Topic: Reference:
MONIT, MONON, MONOFF NetView online help
commands
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
The panel displays information about resources. The resources listed are divided into major and
minor nodes. The major nodes are NCP/CA/LAN/PK, SWITCHED/XCA, LOCAL MAJ NDS, APPL MAJ
NDS, CDRM MAJ NDS, and CDRSC MAJ NDS. Under each major node are the minor nodes (individual
resources) that make up the major node. By using this panel, you can find and correct problems before
users report them, or before other resources are affected.
The status monitor displays status condition names, called states, near the top of the panel. A
resource can be in any of six states: ACTIVE, PENDING, INACT, MONIT, NEVACT, and OTHER. Each
state is associated with a color. For a description of these states, see “Understanding the Status
Monitor Panel Colors” on page 73.
Notice that two of the logical units or terminals have become inactive.
2. To display detailed information about the inactive units, insert any character except a blank before the
first period under the INACT column of LUS/TERMS and press Enter. A panel similar to Figure 115 on
page 215 is displayed.
CMD==>
TO SEE YOUR KEY SETTINGS, ENTER 'DISPFK'
The right side shows the inactive resources for one major node followed by a brief description. The
left side shows you a list of available VTAM commands. You can use these commands to display
* CNM01 V NET,ACT,ID=A01A445
* CNM01 V NET,ACT,ID=A01A446
CNM01 IST097I VARY ACCEPTED
CNM01 IST097I VARY ACCEPTED
CNM01 IST093I A01A445 ACTIVE
CNM01 IST093I A01A446 ACTIVE
The last two messages tell you that the resources are now active.
4. Press Enter to return to the status monitor.
Topic: Reference:
Monitoring and controlling “Using the Status Monitor (SNA Subarea)” on page 72
resources using the status
monitor
Topic: Reference:
Modifying the Code Point tables IBM Z NetView Customization Guide
List of code points provided by Information about codes and messages in IBM Z NetView
the NetView program Troubleshooting Guide
Alert types SNA Formats
listcat bnjdserv
Note: For the session monitor database, use AAUTSKLP instead of BNJDSERV.
2. Figure 116 on page 217 shows the response to the LISTCAT command.
LISTCAT Listcat of Active VSAM Data Base for BNJDSERV 09:07:03 Page 1 of 1
VSAM ACB Options: LSR, ADR, KEY, SEQ, DIR, OUT
Cluster Information:
DDNAME: BNJLGPR KEYLEN: ..........76 RKP: ...........0
BSTRNO: ...........0 STRNO: ..........11 STRMAX: ...........2
BUFSP: ...........0
DATA Component Information:
LRECL: ........4086 CINV: ........4096
BUFND: ..........12 BUFNO: ...........0
NEXT: ...........6 FS: ..........28
NCIS: ........1516 NSSS: ...........3
NEXCP: ......151037 NLOGR: ........5249 NRETR: ......455779
NINSR: .......11804 NUPDR: .......18641 NDELR: ........6565
AVSPAC: .....2945024 ENDRBA: .....4587520 HALCRBA: .....4587520
INDEX Component Information:
LRECL: ........4089 CINV: ........4096
BUFNI: ...........0 BUFNO: ...........0
NEXT: ...........7 NIXL: ...........2
NEXCP: ........7132 NLOGR: ...........5
AVSPAC: .......53248 ENDRBA: .......73728 HALCRBA: .......73728
Note that this NetView panel has the PF keys listed on the panel, and that you cannot use the NetView
DISPFK command from this panel.
In reactive investigating, you react to a problem that has already occurred. You learn about this problem
in monitoring the problem or through a phone call. In general, you have some idea about the location of
the problem and the kind of problem that has occurred.
Table 18 on page 219 contains an overview of the scenarios that are covered in this chapter. For each
scenario, the table lists the product used to solve the problem and the types of resources involved. Note
that all scenarios might not be applicable, depending on which option of NetView is installed.
END OF DATA
ENTER SEL# (CONFIG), SEL# AND CT (CONN. TEST), SEL# AND STR (TERM REASON)
CMD==>
The display shows that both the SSCP-LU and application LU sessions are active. According to the end
user, however, the keyboard is locked and data cannot be entered. Because a contradiction exists, you
need to look at the path information unit (PIU) trace data.
2. Select 1 to display the Session Configuration Data panel for the BADAPPL-T11 session. A panel similar
to Figure 118 on page 220 is displayed.
This panel shows how each LU (BADAPPL and T11) is connected to its own subarea. From this panel
you can now access trace data.
3. Enter pt on the command line to display the primary PIU trace for the session between terminal T11
and application BADAPPL. Note that the trace facility must be set either through the initial session
monitor definition (in AAUPRMLP) or through the TRACE command. A panel similar to Figure 119 on
page 221 is displayed.
END OF DATA
ENTER SEL# or COMMAND
CMD==>
Figure 119 on page 221 shows the primary trace data. Each trace entry has the time-of-day, sequence
number, flow direction (P-S/S-P), and PIU type. Important indicators in the Request/Response Header
(RH) are formatted. The trace response data is described in the following list:
OC
Only one in chain
DR
Definite response
ER
Exception response
The first four trace entries show the session getting established, and the next five trace entries show a
normal exchange of data. The BB/EB indicators show bracket protocol is in effect. Each flow direction
change is signaled by a change direction (CD) flag.
In this scenario, the error source is the host application program. The NAU named BADAPPL did not
insert a change direction (CD) flag in trace 10. Therefore, the terminal did not unlock the keyboard and
the operator cannot respond with more data.
Further resolution of this problem is up to the BADAPPL programmer.
Topic: Reference:
Using the session monitor panels “Session Monitor Scenarios” on page 56
END OF DATA
ENTER SEL# (CONFIG), SEL# AND CT (CONN. TEST), SEL# AND STR (TERM REASON)
CMD==>
The active SSCP-LU session (option 1) indicates that the user terminal is still active. The inactive LU-LU
session (option 2) between application TSO0101 and terminal A04T0011 is the one about which the
user called.
The panel also shows that application TSO0101 is in domain CNM01 and that terminal A04T0011 is in
domain CNM02. This is a cross-domain session.
2. Select option 2 to display the Session Configuration Data panel for the inactive session. A panel similar
to Figure 121 on page 222 is displayed:
Review the information on the panel. This panel shows the path between the session from the primary
LU (TSO0101) to its host PU (A01MPU) and from the secondary LU (A04T0011) to its NCP (A04NV4).
It also shows the explicit route between them for this session. The explicit route is identified by an
explicit route number (in this case, the explicit route number is 02).
Notice the term INOP that is displayed in the center of the panel. INOP indicates that the explicit route
the session was using became inoperative. This occurred because a node or transmission group (TG) in
the route became inoperative.
END OF DATA
ENTER SEL# (FOR TG DETAIL)
CMD==>
Notice the placement of the notation INOP: UNPLANNED next to item 1, TG01. This indicates that the
explicit route is inoperative, because either the host PU (A01MPU) or the transmission group between
A01MPU and A03NV4 (TG01) became inactive.
4. Enter the COPY command in the command line to store the Specific ER Configuration panel in the
network log. The system programmer can use the information when further investigating this problem.
5. Tell the user to log on to the TSO application again and perhaps establish another route.
6. Confirm that the session is active by entering sess a04t0011. The panel shown in Figure 123 on page
223 is displayed.
NLDM.SESS PAGE 1
SESSION LIST
NAME: A04T0011 DOMAIN: CNM02
------------------------------------------------------------------------------
***** PRIMARY ***** **** SECONDARY ****
SEL# NAME TYPE DOM NAME TYPE DOM START TIME END TIME
( 1) TSO0101 LU CNM01 A04T0011 LU CNM02 06/06 20:49:03 *** ACTIVE ***
( 2) A02M SSCP CNM02 A04T0011 LU CNM02 06/06 18:11:17 *** ACTIVE ***
( 1) TSO0101 LU CNM01 A04T0011 LU CNM02 06/06 20:34:58 06/06 20:54:48
END OF DATA
ENTER SEL# (CONFIG), SEL# AND CT (CONN. TEST), SEL# AND STR (TERM REASON)
CMD==>
END OF DATA
ENTER SEL# (FOR TG DETAIL)
CMD==>
Note that the new TSO session has been established. The route is now going directly from the host PU
(A01MPU) in subarea 1 (SA: 00000001) to the host PU (A02MPU) in subarea 2 (SA: 00000002). It no
longer passes through NCP A03NV4.
Because this panel shows the new session route, the information on the panel might help the system
programmer when further investigating this problem. Enter the COPY command from command line to
store the Specific ER Configuration panel to the network log.
The user can continue working while the inoperative route is being repaired.
Topic: Reference:
Using the session monitor panels “Session Monitor Scenarios” on page 56
???
CMD==>
Notice that CNM01 is the focal point for CNM99, the entry point.
2. Press Enter to view the Alerts-Static panel. A panel similar to Figure 127 on page 225 is displayed.
???
CMD==>
Notice that the first alert on the panel is a link error from the distributed node CNM99.
Note: To obtain a description of all the available options from this panel, see “Network Monitoring with
the Hardware Monitor Panels” on page 90 or enter help to access the help menu and select PROMPTS.
3. Select option 1 to obtain detailed information about the alert and recommended actions for the link
error. A panel similar to Figure 128 on page 226 is displayed.
???
CMD==>
This panel includes a diagram of the configuration of resources. The rightmost resource (described in
the RESNAME field of the Alerts-Static panel) is the one most affected by the event described in the
panel.
Note the resource names at each end of the line (A31L06). The resource names are A31N43H and
A31P061. You need these two names to run a line analysis test.
4. For this scenario, assume that action D209 (RUN TRANSMIT/RECEIVE TEST) has been tried and the
results are positive (for example, no failures were detected). The next recommended action is D219
(RUN LINE ANALYSIS TEST). Enter action d219 to get more information about how to run the line
analysis test. A panel similar to Figure 129 on page 226 is displayed.
4 Transmit/Receive Test
This is the help panel menu for running the data communication equipment (DCE) tests.
5. Select option 2 to get more information about the line analysis test. A panel similar to Figure 130 on
page 227 is displayed.
Use the LA (Line Analysis) option of the hardware monitor TEST command on
both the first and second link segments to provide the line characteristics and
to determine the failing segment. The results are presented on a single page
display (NPDA-24B), accompanied by normal or acceptable limit values. This
test can be run only on analog lines.
Report this trouble to the telephone company, indicating the values you have
recorded for all line parameters. Emphasize any values that are beyond the
acceptable limits.
Because this alert originated from the distributed node CNM99, change to that domain to run the line
analysis test for this alert.
6. Enter npda sdomain cnm99 to access the hardware monitor main menu panel in the CNM99 domain.
Topic: Reference:
Using the hardware monitor panels “Network Monitoring with the Hardware Monitor
Panels” on page 90
d net,route,destsub=01,netid=netc,origin=a0453le
To obtain a description for a specific status, type status followed by the status keyword. For example, to
obtain a description for the BLCKD status, enter:
status blckd
Also, the session monitor can be used to display and test virtual routes.
This command measures NetView task utilization for 5 seconds and displays the results on your
operator console. An example of the output follows:
High CPU utilization indicates the command procedure is in a loop. In this example, task OPER1 was
using 99.86% of the CPU used by the NetView program and this was 84.00% of the total system CPU
usage. The problem might be a loop in command list CLIST1 because CLIST1 is identified as being
active and work is queued to the task.
2. Cancel the looping command list by using the following STOP command:
STOP FORCE=OPER1
3. If Step “2” on page 228 does not clear the problem, issuing the STOP FORCE command again results
in more forceful action.
4. If the STOP FORCE command in Step “2” on page 228 was successful but the task is still having
problems, issue STOP TASK=opid or STOP TASK=luname to cause the task to log off.
Topic: Reference:
STOP and TASKUTIL commands NetView online help
You notice that the user response time is actually 75% under 5 seconds, and the objective is for 80 per
cent of the transactions to be completed in under 5 seconds. Because the user response times do not
meet the response time objective, the horizontal bar is highlighted (or shown in red, depending on the
terminal type).
At this point, inform the appropriate support personnel of the slow response time.
3. Because the user complained about a continually degrading response time, enter nldm rtrend lu3440
11:20 * to check the response times trend for LU3440. A panel similar to Figure 132 on page 230 is
displayed:
96%
100% | *** 93% 90% 85%
90% | *** *** *** 82% *** 80% 78%
80% | -- *** - *** - *** - *** - *** - *** - 70% ------------- *** ---------
70% | *** *** *** *** *** *** *** ***
60% | *** *** *** *** *** *** *** ***
50% | *** *** *** *** *** *** *** ***
40% | *** *** *** *** *** *** *** ***
30% | *** *** *** *** *** *** *** 22% ***
20% | *** *** *** *** *** *** *** *** ***
10% | *** *** *** *** *** *** *** 0% *** ***
0% ------------------------------------------------------------------
11:20 11:30 11:45 12:00 12:15 12:30 12:45 13:00 13:15 13:30 13:42
02/21
You notice that the user response time has become worse in the last hour. The last bar suggests that
the trend might have been reversed, but not enough time has elapsed since 13:30 to decide whether
the response time is now approaching its previous level.
4. Log a problem report. You can now display the configuration for this session using the Session
Configuration Data panel of the session monitor. See “Using the Session Monitor (SNA Subarea, SNA
Advanced Peer-to-Peer Networking)” on page 52 for additional information about using the session
monitor.
Use the information obtained, along with other problem determination tools (such as Hardware
monitor and Network performance monitor) to locate problems which were identified along this
session path.
Topic: Reference:
AUTOCOLL, COLLECT, RTREND, RTSUM, QUERY RANGE, SET RANGE NetView online help
command
helpdesk
Choose from the following topics that are listed in the help desk:
1 Introduction
0 Contents
This appendix describes the formats of NCCF and network log messages. It also describes the codes that
are used in these messages.
Where:
type
Message type. For more information about message type symbols, refer to HDRMTYPE in the DSITIB
macro.
domid
Domain or application of the message origin
code
Code (see “Message Codes” on page 234)
msgno
Message number you can use to look up more information using the online help.
msgtext
Text of the message
The NCCF message format can be customized; see the online help for information about the SCRNFMT
option for the DEFAULTS and OVERRIDE commands.
Where:
number
The sequential serial number of NETLOG.
taskid
Generally the ID of the logging operator or task, but, if applicable, can be another name such as an
SAF user ID.
domid
Generally the originating domain, but, if applicable, can be another name such as an SAF user ID,
a PPI name, a PDS member, or a TAF session ID. These names can be up to 8 characters and can
therefore overwrite the code field, which otherwise is the next field.
code
If the previous field is a domain ID, which is 5 or fewer characters, this field is the code (see “Message
Codes” on page 234). The domid field can cause this field to be overwritten or missing.
time
The time that the task logged the message.
Message Codes
The following message codes indicate the origin or destination of a message:
B
The command came from the NetView Web browser.
P
The message came from the PPT.
%
The message was sent only to the authorized receiver of the messages (assigned with PRI).
P%
The message was sent to the authorized receiver and came from the PPT.
*
The message was sent to a secondary receiver (assigned with SEC).
P*
The message was sent to a secondary receiver (assigned with SEC) from the PPT.
+
The message has been copied and sent to this receiver (assigned with COPY).
?
The message is an important message echoed to the system console by the status monitor. The
question mark prevents the echoed message from being logged as an important message by the
status monitor.
In some cases, the initial portion of the message (type domid code) is displayed on a line by itself as a
title, and the remainder of the message (msgno text) is on the following line.
The following list shows the commands that correspond to certain selections on the help facility main
menu:
2
HELPDESK
3
HELP msg_number
5
HELP VTAM
6
HELP RODM
7
HELP GMFHS
8
HELP PIPE NETVIEW
A
HELP COMMANDS
I
HELP INDEX
P
HELP PIPE
Type the number or move the cursor to a function and press Enter
Command ===>
F1=Help F3=Return F6=Roll
F12=Cancel
The functions are briefly described briefly. For detailed information about these functions, see IBM Z
NetView IP Management.
Ping a device (PING)
Test connectivity to an IP host, which can often be useful in determining if a resource can be reached.
Trace the route to a device (TRACERTE)
Trace the routes of data packets to a specified IP host from the IP stack on the host on which
the NetView program is running. Use this command to determine connectivity with or routing to a
particular endpoint, roundtrip times between the NetView and target hosts, and routers along the way.
Check TCP connection status (IPSTAT)
Display connections for a stack, display connection information such as connection endpoints and the
type of connection, and determine if a connection is stopped.
Work with IP traces (IPTRACE)
Start and view diagnostic traces to help resolve TCP/IP problems. IP packet trace is used for IP data
flow problems and for copying IP packets as they are received or sent. OSA packet trace is used for
Open Systems Adapter (OSA) data flow problems and for copying OSA packets as they are received or
sent. Component trace is used to trace data processing problems between the client and the server.
Manage IP Active Monitoring (IPMAN)
Control the monitoring of IP resources. You can start and stop monitoring; add, change, or delete an
instore control file policy of a given resource; and display resources.
Issue SNMP commands (NVSNMP)
Manage IP devices through SNMP. You can use the Get, Set, Walk, and Group commands. You can also
use extended SNMP groups.
Manage Sysplex
Manage sysplex resources by using the following information from the sysplex management functions
panel (CNM4NVSP):
• Stack configuration and status (CNMSSTAC)
The panels in Figure 135 on page 239 are described in the following list:
Menu Panel
Provides a selection of different hardware monitor functions and shows database initialization dates.
This panel also indicates with which domain you are in session and the domain to which you are
attached.
Alerts-Dynamic Panel
Provides a continuously updated single page of alerts retrieved from the database, presented in
reverse chronological order. A C in column 80 indicates that there might be correlated records for the
listed resource.
Alerts-Static Panel
Similar to the dynamic panel, but can hold alerts (take a “snapshot” of the Alerts-Dynamic panel)
so you can continue to work on problems. From this panel, you can also enter a problem in the
Information/Management (MVS only) system. See “Creating a Problem Report” on page 102 for
additional information. A C in column 80 indicates that correlated records are available for the listed
resource. You can enter CE to display the related records.
Where term specifies one or more words on a panel. If you do not specify a component, all component
fields are searched.
To leave the panel hierarchy and return to the component that you were using before you entered the
hardware monitor, enter the NetView END command or press a PF key with that setting. The PF key
setting that is supplied by the NetView product for END is PF2.
This table uses the characters XX, Y, and Z to describe the first, second, third, and fourth hexadecimal
characters, respectively, of the channel unit address.
XX
Represents either a channel number or a channel path ID.
XXY
Represents a controller on a channel.
XXYZ
Represents a device on a controller. These characters might also represent a controller when the
device cannot be addressed.
NNNN
Is the numerical IBM machine type designator expressed in decimal.
SSSSS
Is the resource serial number expressed in decimal.
Resource names and types, all leading or embedded blanks, all characters below X'40', and characters
with a value of X'FF' are converted to an underscore (_). Names and types consisting of all blanks are
converted to all underscores.
help nldm.panelname
Where panelname is the name of the panel, found in the upper left corner of each session monitor panel.
For example, to receive help for the main menu, enter:
help nldm.menu
Where term specifies one or more words on a panel. You can request help for any of the terms on the
panels.
To leave the panel hierarchy and return to the component that you were using before you entered the
session monitor, enter the NetView END command or press a PF key with that setting. The PF key setting
that is supplied by the NetView product for END is PF2.
The panels in Figure 138 on page 246 are described in the following list:
Status Summary Panel
When you access this panel by typing statmon, this panel displays every type of major and minor
resource (node) within your domain. For each resource type, this panel displays the total resource
count and the number of resources that fall into each of the status monitor's interpretation of VTAM
states.
When you access this panel from the Status Detail panel that contains the detail/format menu (by
selecting a resource and SUMMARY from the DISPLAY: HIGHER NODE option), this panel displays,
for the specified resource type, the total resource count and the number of resources that fall into the
status monitor's interpretation of VTAM states.
Status Detail Panels
By selecting any total in the Domain Status Summary, you can display the Domain Status Detail panel
for that resource type. For example, if you select LINES, the Domain Status Detail panel displays all of
the lines for the domain identified in the header section.
Initially, the Domain Status Detail panel is presented in description format with a list of available
VTAM commands that can be applied to the listed resources. In this format, each listed resource is
For a description of the panels in Figure 139 on page 248, refer to IBM Z NetView Resource Object Data
Manager and GMFHS Programmer's Guide.
You can get function equivalent to the RODMView panels through the NetView EKGV commands. The
EKGV commands do not display the RODMView panels. For a list and descriptions of the RODMView
commands, refer to the NetView online help.
You can use the session monitor to provide information about sessions and resources in pure SNA
subarea, pure SNA Advanced Peer-to-Peer Networking, or mixed networks. This section provides
scenarios that show:
• Typical SNA subarea and SNA Advanced Peer-to-Peer Networking configurations and the network
management data available at the session monitor in each of the network nodes
• The session monitor data resulting from taking over or giving back one or more endpoints in a session
For additional information about defining SNA Advanced Peer-to-Peer Networking session configurations,
refer to the IBM Z NetView Installation: Configuring Additional Components .
SNA Session
The configuration shown in Figure 140 on page 249 is composed of an LU-LU session in a pure SNA
subarea network. An SSCP-SSCP session exists between SSCP1 and SSCP2.
Figure 141. SNA Advanced Peer-to-Peer Networking Sessions through Composite Nodes
Figure 142. SNA Advanced Peer-to-Peer Networking Session through Nonadjacent Composite Nodes
CP2 • SAW data, including Virtual Route (VR) information for VR1
• Complete Advanced Peer-to-Peer Networking Session Route Configuration (built from
the RSCV) from the Session Configuration display
• Origin flow control data (data for TG1 in the primary direction) by soliciting NCP1
• Destination flow control data (data for TG2 in the secondary direction) by soliciting
NCP1
CP3 • Session awareness (SAW) data, including the Route Selection Control Vector (RSCV) for
the session
• Complete Advanced Peer-to-Peer Networking Session Route Configuration (built from
the RSCV) from the Session Configuration display
• Origin flow control data (data for TG2 in the primary direction) by soliciting NCP2
• Destination flow control data (data for TG3 in the secondary direction) by soliciting
NCP3
Figure 143. SNA Advanced Peer-to-Peer Networking Session through Adjacent Composite Nodes with FID2
Connection
Table 21 on page 253 displays the data available with a Casual connection.
CP2 • SAW data, including Virtual Route (VR) information for VR1
• Complete Advanced Peer-to-Peer Networking Session Route Configuration (built from
the RSCV) from the Session Configuration display
• Origin flow control data (data for TG1 in the primary direction) by soliciting NCP1
• Destination flow control data (data for TG2 in the secondary direction) by soliciting
NCP1
CP3 • SAW data, including Virtual Route (VR) information for VR2
• Complete Advanced Peer-to-Peer Networking Session Route Configuration (built from
the RSCV) from the Session Configuration display
• Origin flow control data (data for TG2 in the primary direction) by soliciting NCP2
• Destination flow control data (data for TG3 in the secondary direction) by soliciting
NCP3
Figure 144. SNA Advanced Peer-to-Peer Networking Session through Adjacent Composite Nodes with VR
Connection
CP2 • SAW data, including the local RSCV (RSCV1) and Virtual Route (VR) information for VR1
for the node
• Advanced Peer-to-Peer Networking Session Route Configuration (built from the RSCV1)
from the Session Configuration display RSCV2 data can be viewed by issuing a SAR
command from the session monitor Advanced Peer-to-Peer Networking Session Route
Configuration panel
• Origin flow control data (data for TG1 in the primary direction) by soliciting NCP1
CP3 • SAW data, including the local RSCV (RSCV2) and Virtual Route (VR) information for VR1
for the node
• Complete Advanced Peer-to-Peer Networking Session Route Configuration (built from
RSCV2) from the Session Configuration display RSCV1 data can be viewed by issuing
a PAR command from the session monitor Advanced Peer-to-Peer Networking Session
Route Configuration panel
• Destination flow control data (data for TG3 in the secondary direction) by soliciting
NCP3
CP4 • SAW data, including the local RSCV (RSCV2) for the node
• Complete Advanced Peer-to-Peer Networking Session Route Configuration (built from
the RSCV2) from the Session Configuration display RSCV1 data can be viewed by
issuing a PAR command from the session monitor Advanced Peer-to-Peer Networking
Session Route Configuration panel
• Flow control data for TG3 in the primary direction
• Subarea route data (by issuing a Set Domain to CP3 or CP2)
Figure 146. Session between 2 SNA Advanced Peer-to-Peer Networking Subnetworks through a LEN
Connection
Table 23 on page 258 shows the data available before and after CP3 takes over the connection to ALS2.
CP3 Session monitor is not The session monitor has no • The session is displayed on the
aware of the session. awareness of the session. It becomes session monitor session list as
aware of the session after the session ACTIVE and with a TAKEOVER
is taken over. indicator.
• The resource names are displayed
with a TOV (takeover) indicator.
• Because of the limited data
received in the takeover
notification, some Session PD route
functions can be limited.
Table 24 on page 260 shows the data available before and after CP2 takes over the connection to ALS1
and ALS2.
CP2 Session monitor is not Session monitor is not aware of the • The session is displayed on the
aware of the session. session. It becomes aware of the session monitor session list as
session after the session is taken ACTIVE and with a TAKEOVER
over. indicator.
• The resource names are displayed
with a TOV (takeover) indicator.
• Because of the limited data
received in the takeover
notification, some Session PD route
functions can be limited.
Table 25 on page 261 shows the data available before and after CP2 takes over the connection to ALS1.
CP2 Session monitor is not Session monitor is not aware of the • The session is displayed on the
aware of the session. session. It becomes aware of the session monitor session list as
session after the session is taken ACTIVE and with a TAKEOVER
over. indicator.
• The resource names are displayed
with a TOV (takeover) indicator.
• Because of the limited data
received in the takeover
notification, some Session PD route
functions can be limited.
Table 26 on page 262 shows the data available before and after CP2 takes over the connection to ALS1.
CP2 Session monitor No change. Session monitor has SAW • The session is displayed on the
receives SAW data for data for the session. session monitor session list as
the session. ACTIVE and with a TAKEOVER
indicator.
• The resource names are displayed
with a TOV (takeover) indicator.
• Because of the limited data
received in the takeover
notification, some Session PD route
functions can be limited.
In a focal point NetView program, data is received from distributed programs. Messages can be filtered
out at several levels by NetView or operating system filters, such as MPF on MVS.
Alerts can be filtered using the SVFILTER and SRFILTER commands. In addition, you can use the
SRFILTER command to forward alerts to the focal point. See “Alert Forwarding” on page 98 for additional
information about forwarding alerts. See the NetView online help for additional information about the
SVFILTER and SRFILTER commands.
To analyze problems, you need to know how data gets to the NetView program. Problems are often
identified by resources sending events, statistics, or alerts. See Figure 152 on page 263 for some of the
command destinations and for some of the sources of events, statistics, alerts, and messages.
Interface information
The interface offers the greatest range of functionality, but is not entirely accessible.
Keyboard-only operation
Standard shortcut and accelerator keys are used by the product and are documented by the operating
system. See the documentation provided by your operating system for more information.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore,
this statement might not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of
the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the
exchange of information between independently created programs and other programs (including this
one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Such information may be available, subject to appropriate terms and conditions, including in some cases
payment of a fee.
The licensed program described in this document and all licensed material available for it are provided by
IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement or any
equivalent agreement between us.
Information concerning non-IBM products was obtained from the suppliers of those products, their
published announcements or other publicly available sources. IBM has not tested those products and
cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM
products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of
those products.
Programming Interfaces
This publication documents information that is NOT intended to be used as Programming Interfaces of
IBM Z NetView.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at http://www.ibm.com/legal/copytrade.shtml .
Adobe is a trademark of Adobe Systems Incorporated in the United States, and/or other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or
both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other product and service names might be trademarks of IBM or other companies.
Notices 271
272 IBM Z NetView: User's Guide: NetView
Index
Index 273
B command facility (continued)
panels (continued)
BLOCK filter option 138 RMTSESS command response 50
BLOG command 151 TASKUTIL command response 228
BLOG, printing inactive network log 150 trace 154
books command flows 264
see publications xix command list
boundary function NCP data 54 browsing 126
browse command lists
automation tables 165 debugging 202
data set 126 command prefix labels
network log message format 233 RMTCMD-type 50
network log panel 80 usage 51
BROWSE command 126, 146, 150 command response display panel, JES2 commands 117
browse facility 11 command revision table 13
browse, NetView log 151 commands
*I S 117
AFTER 178
C APPLSPEN 48
Canzlog ASSIGN 173
archiving data 149 AT 178
displaying 146 AUTOCNT 167
filtering 147 AUTOTBL 165
maintaining 146 AUTOTEST 165
choosing, monitoring process 45 AUTOWRAP 134
CHRON EVERY panel BLOG 151
Timer Management panels 192 BROWSE 126, 146, 150
CHRON EVERY Timer Preview panel DBAUTO 155, 158
Timer Management panels 192 defining in NetView 123
CHRON Notify panel DISCONID 116
Timer Management panels 190 DISG 48
CHRON Options panel DISPLAY ID 46
Timer Management panels 193 DISPLAY ROUTE 227
CHRON timer entering mixed case 133
adding EVERY 178
from Timer Management panels 189 FIND 151
CLEAR filter option 139 FOCALPT ACQUIRE 143, 144
CMDDEF statement, adding 123 FOCALPT CHANGE 143
CNM560I message 115 FOCALPT DELETE 144
CNM564I message 115 FOCALPT DISPSOC 144
CNM566I message 116 FOCALPT QUERY 144
CNM567I message 116 FOCALPT REFRESH 144
CNM568I message 116 GENALERT 145
CNMPSSI subsystem 26 GETCONID 116
CNMS0003 sample 130 help 15
CNMS4501 sample exit 155 ISQCCMD 112
CNMSCNFT sample 31 ISQXDST 107
cold starting RODM 23 ISQXIII 112
command entry area JES2, issuing 116
length 34 JES3, issuing 117
NetView panel 33 LIST 153
command facility LIST LU 57
creating trace data 154 LIST TIMER
displaying trace data 154 displaying timers that are waiting to process 178
DSIPRT program 154 LISTCAT 155, 217
hung task, identifying 228 MONIT START 214
hung task, terminating 228 MONIT STOP 213
looping task, identifying 228 MONOFF 213
looping task, terminating 228 MONON 214
measuring response time using TASKUTIL 211 MSGROUTE 173
overview 10 MVS 116
panels MVS $DU,PRT15 116
JES3 command response 117 MVS $IPRT15 116
LISTCAT, active VSAM data base for BNJDSERV 217 MVS $PPRT15 116
Index 275
DELETE filter option 138 DSIPRF, browsing 127
deleting held messages 33 DSIPRT 153
deleting timers DSIPRT program 154
from Timer Management panels 193 DSISVRTP 158
destination flow control 66 DSISVRTS 158
detail panels, status monitor 75 DSITBL01 sample 163
DFILTER command 139 DSITRACE task 154
diagnosing problems DSIVTAM, browsing 127
broken session, repairing 221 DWO338I message 116
diagnosing performance problems using TASKUTIL 212
diagnosing storage problems using TASKUTIL 212
filter not working 139
E
hung session 219 E/AS 100
hung session, repairing 219 E/AS (Event/Automation Service) 14
hung task, identifying 228 EKGRLOG submit JCL 159
hung task, terminating 228 EKGXRODM startup procedure 159
initiating error recovery using status monitor 213 Enterprise Management Agent, Z NetView
intermittent problems, identifying 216 about 41
line failures 224 entry points
looping task, identifying 228 definition 143
looping task, terminating 228 description 263
measuring response time using TASKUTIL 211 relationship, focal point and service point 263
NetView trace data 153 environment variables, notation xxiii
resource status, displaying 214 environment, NetView
response time, measuring using RTM 228 changing
session monitor database, checking status 217 backup focal point from current focal point 143
virtual route blocked, determining 227 backup focal point from entry point 144
directing commands, NetView 34 primary focal point from entry point 143
directory names, notation xxiii primary focal point from new focal point 143
DISCONID command 116 screen layout 134
DISG command 48 checkpointing RODM 160
DISPLAY ID command 46 collecting
DISPLAY ID VTAM command response panel 46 hardware monitor data in SMF data set 156
DISPLAY ROUTE command 227 session monitor data in SMF data set 157
displaying controlling
automation timer set panel 184 amount of data in hardware monitor 156
Timer Management panel 180 creating
DISPMSG command 146 command facility trace data 154
distributed database retrieval 99 NetView trace data 153
distributed hosts 97 PPI trace data 155
domain status session monitor trace data 154
detail panel 79 defining
detail panel, activity/analysis option 78 alert receivers 135
detail panel, command lists 77 NetView command 123
detail panel, VTAM commands 76 network resources 123
moving through status monitor panels 76 new operators 130
summary panel 75 PF and PA keys 131
domain status detail panel, VTAM commands deleting
displaying resource status 215 alerts 135
domain status summary panel 214 new operators 130
domains, managing multiple 97 displaying
DSI596I message 33 Canzlog 146
DSI802A message 24 command facility trace data 154
DSI803A message 24 focal point sphere of control 144
DSIARPT, browsing 127 NetView data sets 126
DSIASRC, browsing 127 NetView trace data 153
DSICLD, browsing 127 network log 150
DSICNM sample 74 PPI trace data 155
DSILIST DD statement 165 primary backup focal point 144
DSILIST, browsing 127 session monitor trace data 154
DSIMSG, browsing 127 entering mixed case commands 133
DSINVFRP CMDDEF statement 135 formatting RODM log 159
DSIOPEN, browsing 127 maintaining
DSIPARM, browsing 126 Canzlog 146
Index 277
H hardware monitor (continued)
terminology in panels 241
hardware monitor using panels to monitor network 90
abbreviations 241 hardware monitor main menu
alert 135 line failures, handling 227
checking database status 217 hardware monitor main menu panel
collecting solicited data 86 investigating alerts 90
collecting unsolicited data 86 held messages 32
creating problem reports 102 held-screen indicator, NetView panel 31
database help
deleting alert 135 command 15
maintaining 155 help desk 15
removing data 156 message 15
displaying total events 95 recommended actions 15
displaying total statistical data 96 sense code 15
distributed database retrieval 99 workstation 15
distributed hosts 97 help desk 15
filter 136 help panels, browsing 127
focal point domain 97 higher node 73
forwarding alerts 98 HPR 69
Information/Management link 102 HPRC 69
intermittent problems, identifying 216
investigating alerts 90
line failures 224
I
logical databases 155 IBM Z Decision Support
managing multiple domains 97 displaying logical view of network 83
overview 11 setup 84
owning domains 98 IBM Z System Automation
panel system operations component 18
alerts-dynamic, creating a problem report 102 IBM Z Workload Scheduler
alerts-dynamic, handling line failures 225 overview 19
alerts-dynamic, investigating alerts 90 IGCMGC10 141
alerts-static, alert forwarding 98 IHSAACDS 101
alerts-static, creating a problem report 103 IHSABCDS 101
alerts-static, handling line failures 225 IHSAECDS 101
alerts-static, investigating alerts 90 IHSALCDS 102
current filter status 136 IHSAMFMT 101
D219 run DCE test 226 IHSANFMT 101
D219 run line analysis test 226 IHSATCDS 101
event detail 90 INACT status monitor state 73
event detail menu 90 Interactive System Productivity Facility (ISPF) 18
main menu, investigating alerts 90 interested operator list panel 111
recommended action for selected event, intermittent problems, failure-cause code points 216
investigating alerts 90 interpreting session data 249
recommended action, selected event, handling line intervals, regular
failures 225 setting CHRON timers
total events (first level) 95 from Timer Management panels 189
total events (second level) 95 investigating
total statistical data (first level) 96 proactive 211
total statistical data (second level) 97 reactive 219
total statistical data (third level) 97 investigating, definition 21
panel hierarchy 238 ISQCCMD command 112
record type ISQXDST command 107
alerts 87 ISQXIII command 112
events 87 issuing commands
GMFALERTs 87 determining problems 115
resolutions 87 JES2 commands 116
statistics 86 JES3 commands, NetView 117
scenarios MVS system 115
displaying total events 95 NetView commands, MVS 25
displaying total statistical data 96 setup 115
investigating alerts 90 specific destinations 34
secondary recording of event records 89
session domains 98
Index 279
MVS (Multiple Virtual Storage) (continued) NetView (continued)
issuing system console commands 115 environment (continued)
system log, using 159 prefixing commands with NETVASIS 133
MVS command automation 115 refreshing focal point sphere of control 144
MVS services 17 removing data from hardware monitor database
156
removing entry point, sphere of control 144
N removing save/restore database data 158
NCP removing session monitor log data 157
activating 47 reorganizing save/restore database 158
activating, remote NetView 49 repeating commands 132
boundary function trace data 54 setting alert error thresholds 145
gateway trace data 54 starting or stopping NetView task 129
inactivating 47 suppressing commands, NetView log 133
loading 47 switching hardware monitor databases 155
status, displaying 48 switching RODM log 159
NetSP/SLC product 28 switching save/restore database 158
NetView switching session monitor logs 157
breaking link between RMTCMD and autotask 49 using Canzlog 146
changing screen settings 36 using GENALERT to generate alerts 145
command prefix 26 using network log 150
commands, issuing from MVS 25 using PPI to generate alerts 145
default command designator 26 using the OVERRIDE command with NETVASIS 133
directing commands using function keys 35 generic automation receiver function 85
environment host and workstation components 9
changing backup focal point from current focal host environment MVS address spaces 23
point 143 how data arrives 263
changing backup focal point from entry point 144 issuing commands
changing primary focal point from entry point 143 MVS system 115
changing primary focal point from new focal point specific destinations 34
143 listing PF and PA key settings 35
changing screen layout 134 logging on 26
checkpointing RODM 160 logon panel 27
collecting hardware monitor data in SMF data set main menu panel 30
156 Main Menu panel 30
collection session monitor data in SMF data set 157 modifying resource ceilings 119
controlling amount of data in hardware monitor 156 operating system filters 263
creating command facility trace data 154 operating system resources, controlling 115
creating NetView trace data 153 operation tasks 19
creating PPI trace data 155 operation, controlling 129
creating session monitor trace data 154 panel indicators 31
defining alert receivers 135 panels
defining NetView command 123 Advanced Peer-to-Peer Networking session route
defining network resources 123 configuration, typical SNA Advanced Peer-to-Peer
defining new operators 130 Networking CP-CP session 64
defining PF and PA keys 131 Advanced Peer-to-Peer Networking session route
deleting alerts 135 configuration, typical SNA Advanced Peer-to-Peer
deleting new operators 130 Networking LU-LU session 68
displaying Canzlog data 146 alerts-dynamic, creating a problem report 102
displaying command facility trace data 154 alerts-dynamic, handling line failures 225
displaying focal point sphere of control 144 alerts-dynamic, investigating alerts 90
displaying NetView data sets 126 alerts-static, alert forwarding 98
displaying NetView trace data 153 alerts-static, creating a problem report 103
displaying network log 150 alerts-static, handling line failures 225
displaying PPI trace data 155 alerts-static, investigating alerts 90
displaying primary backup focal point 144 browse network log 80
displaying session monitor trace data 154 command response display for JES2 commands
entering mixed case commands 133 117
formatting RODM log 159 current filter status 136
maintaining Canzlog 146 D219 run DCE test 226
maintaining MVS system log (SYSLOG) 159 D219 run line analysis test 226
maintaining network log 150 domain status detail 79
maintaining RODM objects 124 domain status detail, activity/analysis option 78
maintaining RODM relationships 124 domain status detail, command lists 77
Index 281
OTHER status monitor state 73 problem reports, creating
overview using hardware monitor 102
IBM Z System Automation 18 Processor Operations
owning domains 98 controlling remote processors 107
initializing target system 112
ISQCCMD command 112
P ISQXDST command 107
PA and PF keys, listing settings 35 ISQXIII command 112
pacing data 68 loading target system 112
panel hierarchy panel
hardware monitor 238 interested operator list 111
RODMView 247 PS/2 detail 110
session monitor 243 PS/2 port detail 110
status monitor 246 target hardware summary 109
panel layout target resource 109
command entry area 33 target system LPAR resource 109
message area 32 target system summary 108
NetView command facility 31 TSCF status summary 107
response area 33 performing IPL, target system 112
session identification line 31 shutting target system 112
panels using status panels 107
automation timer set 184 processor operations component of System Automation for
timer management 180 z/OS 18
parallel servers, OPC/ESA 118 program-to-program interface (PPI) 13
PASS filter option 138 PS/2 detail panel 110
PassTickets 28 PS/2 port detail panel 110
path names, notation xxiii pseudosession trace buffer 54
pause status indicator, NetView panel 32 PU, displaying status 48
PENDING status monitor state 73 publications
PF and PA keys accessing online xxi
defining 131 IBM Z NetView xix
listing settings 35 ordering xxi
PIPE command PURGE command
debugging 207 issuing at the command line 179
PIU data 54, 154 purging timers
PPI from Timer Management panels 193
trace 155
using to generate alerts 145 R
PPI (program-to-program interface) 13
PPT timer commands reactive investigating 219
enabling command authorization for 177 rearranging messages, NetView screen 32
prefix, command labels 50 RECFMS automation 163
proactive investigating 211 RECMS automation 163
problem determination recommended action, selected event panel
broken session, repairing 221 investigating alerts 90
diagnosing performance problems using TASKUTIL 212 line failures, handling 225
diagnosing storage problems using TASKUTIL 212 recommended actions 15
filter not working 139 RECORD command 157
hung session 219 record types
hung session, repairing 219 alerts 87
hung task, identifying 228 events 87
hung task, terminating 228 GMFALERTs 87
initiating error recovery using status monitor 213 resolutions 87
intermittent problems, identifying 216 statistics 86
line failures 224 recording filter
looping task, identifying 228 definition 136
looping task, terminating 228 setting 163
measuring response time using TASKUTIL 211 REFRESH command 130
NetView trace data 153 reinstating timers
resource status, displaying 214 from Timer Management panels 194
response time, measuring using RTM 228 RELCONID command 116
session monitor database, checking status 217 releasing consoles 116
virtual route blocked, determining 227 remote processors, controlling 107
problem management data, controlling processing 145 REPLY command 24
Index 283
selecting a target system (continued) session monitor (continued)
from Timer Management panels 183 panel
selecting remote targets 181 Advanced Peer-to-Peer Networking session route
sense code configuration, typical SNA Advanced Peer-to-Peer
information 15 Networking CP-CP session 64
Service Management Unite 14 Advanced Peer-to-Peer Networking session route
service points configuration, typical SNA Advanced Peer-to-Peer
description 263 Networking LU-LU session 68
relationship, entry point and focal point 263 flow control data 67
SESS command 65 main menu 56
session activation parameters 54 resource name list 57, 63
session awareness data 55 response time summary 229
session configuration data panel response time trend panel 229
broken session, repairing 222, 223 session configuration data, repairing broken session
hung session, repairing 220 222, 223
typical SNA Advanced Peer-to-Peer Networking CP-CP session configuration data, repairing hung session
session 64 220
typical SNA Advanced Peer-to-Peer Networking LU-LU session configuration data, typical SNA Advanced
session 65 Peer-to-Peer Networking CP-CP session 64
typical SNA LU-LU session 58 session configuration data, typical SNA Advanced
session domains 98 Peer-to-Peer Networking LU-LU session 65
session identification line, NetView panel 31 session configuration data, typical SNA LU-LU
session list panel session 58
broken session, repairing 221, 223 session list, repairing broken session 221, 223
repairing hung session 219 session list, repairing hung session 219
typical SNA Advanced Peer-to-Peer Networking CP-CP session list, SNA Advanced Peer-to-Peer
session 63 Networking CP-CP session 63
typical SNA Advanced Peer-to-Peer Networking LU-LU session list, typical SNA Advanced Peer-to-Peer
session 65 Networking LU-LU session 65
typical SNA LU-LU session 57 session list, typical SNA LU-LU session 57
typical takeover/giveback session 71 session list, typical takeover/giveback session 71
session monitor session monitor main menu 62
broken session, repairing 221 session parameters 60
checking database status 217 session trace data 58
command SESSMDIS session monitor session and storage
LIST LU 57 information 72
SESS 65 specific ER configuration, repairing broken session
SESSMDIS 72 223, 224
TRACE 154 specific ER configuration, typical SNA LU-LU session
data availability scenarios 249 60
data collected 157 specific session trace data 220
database, using and maintaining 157 virtual route status 61, 62, 66
description 52 panel hierarchy 243
destination flow control 66 PIU data
directing commands 35 components 54
displayed active route data 55 recording 154
filter primary session trace data, displaying 58
overview 140 pseudosession trace buffer 54
strategy, implementing 140 response time, measuring using RTM 228
hung session 219 route data 55
hung session, repairing 219 SAW data, recording 154
information monitored 52 scenarios
interpreting session data 249 CP-CP session, SNA Advanced Peer-to-Peer
KEEPDISC initialization statement 54 Networking network 62
log, removing data 157 LU-LU session, SNA Advanced Peer-to-Peer
main menu panel 56 Networking network 65
NCP LU-LU session, subarea network 56
boundary function trace data 54 takeover/giveback session 71
gateway trace data 54 secondary session trace data, displaying 58
network accounting and availability measurement data session activation parameters 54
54 session awareness data 55
origin flow control 66 session awareness data, types 55
overview 11 session response time data 53
pacing data 68 session trace data 54
Index 285
tasks (continued) total statistical data (first level) panel 96
NetView program supplied 129 total statistical data (second level) panel 97
priority 129 total statistical data (third level) panel 97
starting and stopping 129 trace
TASKUTIL command 211, 228 command facility 154
TASKUTIL command response panel 228 PPI 155
terminal access facility (TAF) 11 session monitor 154
time, specifying intervals 186 TRACE command 154
timed commands 177 trace data, creating and displaying 153
timed events 158 transmission groups 55
TIMER 177 trap to alert service 102
TIMER command triggering 119
saving TSCF status summary panel 107
issuing at the command line 179 TSO
timer commands overview 18
debugging 204 typeface conventions xxii
deleting
issuing at the command line 179
displaying 178
U
restoring UNIX
issuing at the command line 179 overview 17
setup 177 unsolicited data 86
typing at the command line 180 unsolicited message 264
Timer Interval panel unsolicited message flows 264
Timer Management panels 191 usage report data set 127
Timer Management panels user group, NetView xxii
active timer panel after a purge 194 user groups
CHRON EVERY panel 192 NetView xxii
CHRON EVERY Timer Preview panel 192 user interfaces, Z NetView
CHRON Notify panel 190 3270 session 14
CHRON Options panel 193 NetView management console 14
deleting timers 193 Tivoli Enterprise Portal 14
example of a purged (or deleted) timer panel 194
example of a purged (or deleted) timer panel after
reinstating 195 V
example of purging a timer 193
variables, notation for xxiii
purging timers 193
viewing filter 136
reinstating 194
virtual route
selecting a target system 183
blocked, determining 227
selecting remote targets 181
definition 61
setting CHRON timers 189
virtual route status panel 61, 62, 66
setting timers for a specific date and time 184–186
vital product data
setting timers for after a specific date and time 187
collecting 105
Timer Interval panel 191
setting up 106
using to issue TIMER commands 180
VPDALL command 105
timers
VPDCMD command 105
AFTER 187
writing to external log 105
AT 186
Vital Product Data
CHRON 189
overview 105
management panel 180
VPDALL command 105
setting 180
VPDCMD command 105
Timers
VTAM (Virtual Telecommunications Access Method)
deleting 193
activating, loading NCP 47
purging 193
command
reinstating 194
DISPLAY ID 46
Tivoli Business Service Manager 19
DISPLAY ROUTE 227
Tivoli Enterprise Portal
filter table 140
accessing the NetView program 37
inactivating NCP 47
workspaces
inactivating resources 47
introduction 41
overview 17
Tivoli Netcool/OMNIbus program 19
panel
Tivoli Software Information Center xxi
DISPLAY ID command response 46
total events (first level) panel 95
VTAM display : NCP 49
total events (second level) panel 95
W
wait indicator, NetView panel 32
warm starting RODM 23
warning, autowrap 33
WHAT command 146
WHENCE command 146
WINDOW command 33
workspaces
using 41
workstation help 15
workstation resources, OPC/ESA 118
WTOR message
replying 24
valid command replies 24
Z
Z NetView Enterprise Management Agent
about 41
starting 23
stopping 25
Z System Automation
overview 18
Z, Linux on 19
z/OS Communications Server 17
z/OS operating system
MVS services 17
overview 17
TSO 18
UNIX System Services 17
z/OS Communications Server
17
Index 287
288 IBM Z NetView: User's Guide: NetView
IBM®
SC27-2867-09