User's Guide and Reference
This book describes the CICS Interdependency Analyzer for z/OS. The analyzer is a tool that checks and reports on the dependencies of CICS programs on CICS, DB2, MQ, and IMS resources, and on the transaction affinities that might have been created by CICS programs. The book explains how to install the analyzer and run its various components.
- Preface
This information describes the IBM® CICS® Interdependency Analyzer. It explains what the program does and how to set up and run its various components. - What's new in CICS IA Version 5.3
CICS IA Version 5.3 delivers a wide range of important new capabilities. - Summary of changes for earlier versions
The changes made in earlier versions are listed in this section. - Overview of the CICS Interdependency Analyzer
This section gives an overview of the CICS Interdependency Analyzer (CICS IA), and describes its components. - Getting Started with the CICS IA plug-in for CICS Explorer
The CICS Interdependency Analyzer plug-in for CICS Explorer® provides an Eclipse-based interface to analyze your CICS IA data. It also provides cheat sheets that guide you through the steps required to configure and install CICS IA. It is recommended that you download the CICS IA plug-in and follow the steps in the cheat sheets. - Configuring CICS IA
This section describes what you need to do before you can use CICS IA. - Running the Collector
You run the CICS IA Collector to look for instances of program commands that might cause resource dependencies or transaction affinities. - Updating the Dependency and Affinity database objects
The Dependency database objects contain accumulated data about your applications and the resources that they use. Update the database objects regularly to add new information recorded by the Collector in the VSAM dependency files. - Managing your CICS IA data
With each new release CICS IA captures more data. In volatile development environments this data can soon become out of date. If you have out of date data, the CICS IA plug-in might retrieve more data than you need. The presence of unwanted data might impede your analysis and provide confusing results. - The CICS IA UDB database
CICS IA provides jobs to unload CICS IA data into CSV files. These files can be used to populate the IBM supported UDB databases. - Running the Reporter
- Running the Program Threadsafe report
The threadsafe report can be run from the CICS IA Explorer plug-in or as a batch job using the sample CIUJTSQ2 that can be found in SCIUSAMP.CICS. The report runs the DB2® stored procedure CIUSPTSR. - Running the Load Module Scanner
The Load Module Scanner scans load modules for instances of program commands that could cause resource dependencies or transaction affinities. - Running the CSECT Scanner
The CICS IA CSECT Scanner scans load modules for information that can be used to identify the version of each CSECT. - Running the Builder
The CICS IA Builder runs as a batch job to build affinity-transaction-group definitions suitable for input to the CICS system management product, CICSPlex® SM. - Running the sample DB2 query
This section describes how to run the sample CICS IA batch query job CIUJSAMP. - Solving problems
This section helps you to isolate and determine the cause of CICS IA problems. - Details of dependencies and affinities collected
- Correlating Load Module Scanner and Dependency Reporter output to source
- The structure of the CICS IA database
- Messages and codes
This section describes the messages that the Collector, Query interface, Dependency Reporter, Affinities Reporter, Load Module Scanner, CSECT Scanner, and Builder can issue, and the transaction abend codes that the Collector can produce. - CICS IA space considerations
- CICS IA security
- CICS IA External Interfaces
The Appendix describes available Stored Procedures and Command Flow user exit. - Collecting dynamic COBOL calls
CICS IA detects dynamic COBOL calls, which are collected by the Dependency and Command Flow Data collectors. - Accessibility
Accessibility features help a user who has a physical disability, such as restricted mobility or limited vision, to use software products successfully