Izsam8.2 221012
Izsam8.2 221012
Version 8 Release 2
IBM
SC22-5474-02
Contents
Chapter 1. Product overview....................................... 1 Collecting scanned libraries with the Inquisitor for
z/OS.......................................................................... 54
Implementing IBM Z Software Asset Management
with SQLite database.................................................4 Running the Inquisitor program.......................54
Accessibility................................................................4 PLX parameter of the Inquisitor program....... 55
How to read the syntax diagrams.............................5 Inquisitor program parameters and files.........56
What’s New in IBM Z Software Asset Management Inquisitor program command syntax..............58
Version 8.2................................................................. 8 Inquisitor examples..........................................65
Chapter 2. Planning for deployment.......................... 12 Designing Inquisitor requests..........................68
Predeployment considerations............................... 12 Controlling the data extraction level............... 69
Deployment data processes................................... 12 Extracting LE compile unit information...........69
Deployment for a single Repository....................... 13 Scanning migrated libraries.............................70
Deployment for multiple Repositories.................... 14 Scanning generation data sets........................71
Chapter 3. Installing and customizing IBM Z Software Logical Volume Mapping................................. 71
Asset Management................................................... 16
Collecting information about the I/O
Installation prerequisites......................................... 16 configuration.....................................................76
System configuration requirements....................... 16 Collecting UNIX files with the Inquisitor for z/OS
Security and authorization requirements............... 17 UNIX.......................................................................... 76
Checklist of installation and customization Inquisitor for z/OS® UNIX® overview.............76
tasks..........................................................................19 Running the Inquisitor for z/OS® UNIX®
Installing target libraries.................................. 21 program.............................................................77
Preparing Db2® database prerequisites.........22 PLX parameter of the z/OS® UNIX® Inquisitor
program.............................................................77
Preparing local environment settings............. 23
Inquisitor for z/OS® UNIX® program
Configuring a test Repository database..........28 parameters and files........................................ 78
Configuring a production Repository z/OS® UNIX® Inquisitor example................... 79
database........................................................... 31
Security considerations................................... 80
Chapter 4. Implementing deployment scenarios........ 34
Collecting usage data with the Usage Monitor...... 80
Scenario 1: Implementing a single Repository
database with a single GKB database....................34 Setting up the Usage Monitor..........................81
Scenario 2: Implementing multiple Repositories Starting and stopping the Usage Monitor....... 85
with a shared GKB database...................................35 Refresh processing for the Usage
Scenario 3: Implementing multiple Repositories Monitor.............................................................. 86
with multiple GKB databases..................................36 Usage Monitor commands.............................. 87
Scenario 4: Collecting and transferring Inquisitor Monitoring usage in CICS® regions..............109
and usage data from remote sites......................... 38
Customizing a CICS region to provide usage
Scenario 5: Implementing in a sysplex data................................................................. 111
environment..............................................................39
Importing Inquisitor data.......................................112
Chapter 5. Migrating to IBM Z Software Asset
Management Version 8.2.......................................... 41 Running the Inquisitor Import........................112
Migrating to IBM Z Software Asset Management Import filters and matching...........................112
from an earlier version............................................ 41 TPARAM parameters..................................... 113
Migrating from version 8.1 to Version 8.2 Importing usage data............................................ 114
(Db2® database)..............................................41
TPARAM parameters..................................... 115
Migrating from version 8.1 to Version 8.2
(SQLite database).............................................48 Aggregating usage and discovery data................115
Post migration errors....................................... 51 TPARAM parameters..................................... 116
Migrating repositories between different Activating the Automation Server.........................117
databases (optional)........................................ 53 Automation Server overview......................... 117
Chapter 6. Collecting and importing data with IBM Z Running the Automation Server.................... 118
Software Asset Management.................................... 54
Automation Server control data set
Updating the Global Knowledge Base.................... 54 maintenance................................................... 126
ii
Contents | iii
iii
Chapter 1. Overview of IBM Z Software Asset
Management
IBM Z Software Asset Management is built on the concept of remote and central mainframe components which work
together to produce reports on z/OS® mainframe products and their usage. This section provides you with a high-
level overview of the IBM Z Software Asset Management core architecture.
IBM Z Software Asset Management runs on z/Architecture® mainframes that use the z/OS® operating system. Its
purpose is to:
In a z/OS® environment, software is contained in load libraries or as z/OS® UNIX™ executable files. IBM Z Software
Asset Management scans contents of these libraries and executable files to determine which software products are
installed. IBM Z Software Asset Management also monitors the loaded programs and executable files to measure
software usage.
The discovered load libraries and executable files are then checked against a global database of product information.
IBM Z Software Asset Management uses this information to determine which products are installed and used on
each system.
The IBM Z Software Asset Management Usage Monitor gathers information about events for modules and
executable files which are then attributed to each product.
The workflow is illustrated in Figure 1: Product workflow on page 2, followed by a brief description of the
components.
1
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Inquisitor
The Inquisitor is a batch job that discovers loadable programs in z/OS® data sets and z/OS® UNIX™
Inquisitoroverview
System Services file systems. A program locates load libraries on z/OS® DASD devices and captures
information about the load modules. The process can be targeted to specific devices, libraries, or
groups of libraries. The program creates a compressed data set, which is then used as input to the
Inquisitor Import procedure.
An additional process locates and scans z/OS® UNIX™ directories for program objects and captures
this information. The process creates a compressed data set that is then used as input to the Inquisitor
Import for z/OS® UNIX™ procedure.
2
Chapter 1. Overview of IBM Z Software Asset Management
Usage Monitor
The Usage Monitor is a started task or batch job that monitors and records loaded modules of batch
Monitoroverview
Usage
jobs, started tasks, TSO users, and z/OS® UNIX™ executable files.
Knowledge Base
The Global Knowledge Base (GKB) is a database that is provided with IBM Z Software Asset
Management . The GKB has a list of all z/OS® globally-identified products that are used by the product
in the process of matching.
The Inquisitor Import is a batch job that loads Inquisitor data into database tables on z/OS® for z/OS®
Importoverview
Inquisitor
load modules and z/OS® UNIX™ program objects. The imported Inquisitor data is then matched against
the Global Knowledge Base.
Usage Import
The Usage Import is a batch job that imports Usage Monitor data into the Repository. The data is
Importoverview
Usage
matched against load modules and z/OS® UNIX™ executable files and the data is then aggregated with
installed software products. After this process has been completed, you can view the usage data with
the IBM Z Software Asset Management Analyzer reports.
Repository
The Repository is a set of database tables for z/OS® data that stores information about the software
Repositoryoverview
products discovered and their usage data.
Analyzer
The Analyzer queries the IBM Z Software Asset Management database and displays Analyzer online
Analyzeroverview
reports. The Analyzer runs as a started task or batch job on the same z/OS® system where the Db2®
subsystem or SQLite database runs. The output formats can be XML, HTML, Excel, text, or comma
separated value (CSV). You can logon to the Analyzer from a web browser to display interactive reports.
You can also run the Analyzer in batch mode and save the results to an output data set on z/OS®.
Process flow
Data collected on the target systems by the Inquisitor and the Usage Monitor batch programs, are then imported into
flow
process
the Repository database tables. The database is located on a z/OS® system within a Db2® subsystem or a SQLite
database.
3
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
SQLite is an in-process library that implements a self-contained, serverless, transactional SQL database engine. It is
an embedded SQL database engine that is unlike many other SQL databases, because it does not have a separate
server process. SQLite reads and writes data directly to ordinary disk files. When you implement SQLite with IBM Z
Software Asset Management , the complete SQL database is contained within a single z/OS® UNIX® zFS file.
Limitations
IBM Z Software Asset Management with SQLite database is implemented with the following configuration:
This configuration represents the limitation for SQLite support with IBM Z Software Asset Management . Only one
repository within a zFS file is supported. If you require a database with a larger configuration supporting multiple
repositories, consider implementing IBM Z Software Asset Management with Db2® for z/OS®.
SQLite has limited concurrency because it uses read/write locks on the entire database file. Therefore, if any process
is reading from any part of the database, all other processes are prevented from writing to any other part of the
database. Similarly, if any one process is writing to the database, all other processes are prevented from reading any
other part of the database.
Accessibility
Accessibility features help a user who has a physical disability, such as restricted mobility or limited vision, to use
software products successfully.
System console
You can set up, run, and maintain IBM Z Software Asset Management using a 3270 emulator as the system console.
IBM Personal Communications provides 3270 emulation with accessibility features for people with disabilities.
Reporting
The online version of the Analyzer reporting utility provided by IBM Z Software Asset Management supports the
standard keyboard commands that are used by screen reader applications. You can generate reports in a variety of
accessible formats, including HTML and Excel file formats.
Images
All images in the information center that convey additional information have alternate text.
4
Chapter 1. Overview of IBM Z Software Asset Management
Tables
You can navigate the content of all tables in the information center with a screen reader application.
Syntax diagrams
Syntax diagrams in the information center are displayed as railroad track images. Each syntax diagram has a link to a
dotted decimal version of the diagram that can be read by a screen reader application.
Figure 2: Sample syntax diagram on page 6 shows a sample syntax diagram that includes the various notations
that are used to indicate such things as whether:
5
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
choice3
repeatable_item1 required_choice1
fragment_name optional_choice1 required_choice2
optional_choice2 required_choice3
,
DEFAULT_KEYWORD
repeatable_item2
KEYword
KEYWORD2 ,
( variable4 -variable5 )
OPTIONAL_KEYWORD1
OPTIONAL_KEYWORD2
OPTIONAL_KEYWORD3
Here are some tips for reading and understanding syntax diagrams:
Order of reading
Read the syntax diagrams from left to right, from top to bottom, following the path of the line.
The ───► symbol indicates that a statement is continued on the next line.
The ►─── symbol indicates that a statement is continued from the previous line.
Keywords
COMMAND_NAME
Sometimes you only need to type part of a keyword. The required part of the keyword appears in
uppercase letters.
6
Chapter 1. Overview of IBM Z Software Asset Management
DEFAULT_KEYWORD
KeyWord
The abbreviated or whole keyword you enter must be spelled exactly as shown.
Variables
required_variable
Required items
COMMAND_NAME required_variable
Optional items
OPTIONAL_KEYWORD= variable
Choice of items
If you can choose from two or more items, they appear vertically, in a stack.
If you must choose one of the items, one item of the stack appears on the main path.
required_choice1
required_choice2
required_choice3
If choosing one of the items is optional, the entire stack appears below the main path.
optional_choice1
optional_choice2
If a default value applies when you do not choose any of the items, the default value appears above the
main path.
DEFAULT_KEYWORD
KEYWORD1
KEYWORD2
7
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Repeatable items
An arrow returning to the left above the main line indicates an item that can be repeated.
repeatable_item1
If you need to specify a separator character (such as a comma) between repeatable items, the line with
the arrow returning to the left shows the separator character you must specify.
repeatable_item2
Fragments
Where it makes the syntax diagram easier to read, a section or fragment of the syntax is sometimes
shown separately.
fragment_name
fragment_name
DEFAULT_KEYWORD
…
KEYWORD1
KEYWORD2
The following items/sections have been changed or added to the IBM Z Software Asset Management Version 8.2
Administration Guide and Reference manual:
• Added new section Configuring the Turkish Db2 subsystem for use with IBM Z Software Asset Management
on page 171.
• New error code added for SCRT Import - 8280 on page 265.
• Aggregator usage reports now contain usage for products that are disabled in IFAPRDxx
• Change to HSISCUST - BP range check
• Resolved IQ Import -803 abend
• Fixes applied to the following reporting issues in the Analyzer:
◦ When processing LPAR names with # symbol
◦ Discovered use by month extra column on right side
8
Chapter 1. Overview of IBM Z Software Asset Management
Product Suite support has been added to IBM Z Software Asset Manager. This release removes the previous support
for Product Suites where users have to manually create their own Product Suites via the Admin report ‘Define Product
Suites’. Support for IBM and ISV products has been added.
SCRT Tailored Fit Pricing has been added to IBM Z Software Asset Manager. The current SCRT Import program now
supports SCRT Tailored Fit Pricing. A new report has also been added for users to view their Tailored Fit Pricing data.
IBM Z Software Asset Manager provides new reports and adds additional information to existing reports:
• New Asset report ‘SCRT Tailored Fit Pricing’ (TFP) has been added. Users can view their SCRT data as TFP if
they are now using this facility.
• New Asset report ‘Product Suites’ shows which suites have been identified and the products that belong to the
suites.
• Admin report ‘Define Product Suites’ is removed.
• New Admin report ‘Exclude Product Suites’ enables users to decide whether to exclude Products Suites from
the report if suites have been identified incorrectly, when only some of the products have been installed. If
suites are not defined in the GKB, users need to open a Case with IBM to have the suites added.
• New Admin report ‘Define VUE Products’ enables users to create a list of MLC products that are now VUE.
This list will then be used to update the repository Asset reports with the VUE information. The list needs to be
created once only or when a previous product that was MLC is now VUE.
• New Admin reports – ‘Define Library Classifications’ and ‘Assign Library Classifications’ have been added to
support Product Lifecycle data. This enables users to create Library Classifications for products that move
between different libraries, as the life of a product changes.
• Discovery report ‘Product Libraries’ has been enhanced for users to select and view these library
classifications.
• New Charting tool has been added to the Trend Report. This improves chart creation performance
considerably.
• Analyzer batch reports can now have user defined headings.
9
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
The default zip file compression algorithm has been changed from shrink to fast deflate which produces greater
compression with minimal additional CPU consumption.
Data collectors which write zip files will recover from S213-C8 abends by writing unzipped data, thereby reducing
operational disruption.
During Inquisitor import, support to identify Product Suites has been added. This allows users to view Suite
information in the Asset report ‘Product Inventory’, without seeing all products associated with the Product Suite. A
new Asset report ‘Product Suites’, has been created for viewing suites and their associated products.
Product Use information that are collected allows users to see actual product use data.
The following new commands have been added to the Usage Monitor:
10
Chapter 1. Overview of IBM Z Software Asset Management
Usage Import now imports usage data to create new Metric Product Use. This new Metric displays actual product
Usage as well as the current Module Event data, so as to give a better view of product usage. This provides
information to users who are interested in the number of times products are used.
Installed GLUE modules from older releases of the Usage Monitor will not collect any data for this release of the
Usage Monitor. The GLUE modules in this release of the Usage Monitor cannot collect any data for older releases of
the Usage Monitor.
The following table lists the required GLUE programs for different versions of the CICS Transaction Server currently
supported by IZSAM.
The GKB now supports Product suites. This new enhancement groups individual products together into a single
product name, and this can then be reported in the Asset report ‘Product Inventory’.
Support for VUE products has also been added to the GKB. Users will now be able to assign VUE product information
to supported IBM products.
A version 8.1 repository can use only a version 8.1 GKB database. A version 8.2 repository can use only a version 8.2
GKB database.
All Repository and GKB tablespaces are now defined as partion-by-growth universal tablespaces (UTS). The
tablespaces and indexes are also defined with ‘COMPRESS Y’. With UTS, Db2 space limitation is no longer an issue
and with ‘COMPRESS Y’, there are significant savings in space utilization, especially for the largest tables - TUSEMTD
and TMODULE.
This release adds support for the latest level of SQLite database as an alternative to the Db2 database. This new
database support provides improved performance.
Deprecated items
HSISUSUM - Usage Summary utility is no longer required. Repository tables TUIMPORTCTRL and TUSELIB have been
removed.
11
Chapter 2. Planning for deployment
Before you deploy IBM Z Software Asset Management, consider which deployment option is best suited to your
environment.
Related information
Implementing deployment scenarios on page 34
Predeployment considerations
You can deploy IBM Z Software Asset Management to use a single Repository or multiple Repositories.
Implementing a deployment in a single Repository is relatively straightforward because the data from all systems
is imported into a single Repository. Before you deploy with a single Repository, plan the following aspects of the
deployment:
To deploy with multiple Repositories, plan the following aspects of the deployment:
Inquisitor data
The Inquisitor scans DASD volumes for libraries containing load modules and HFS/zFS files for z/OS®
data
datadescriptiondeploymentInquisitor
Inquisitor
UNIX™ program objects and produces Inquisitor data. These load modules and program objects are
matched and associated to a particular vendor and product and the matched information is then loaded
into the Repository tables. These processes are performed by running the Inquisitor Import job.
12
Chapter 2. Planning for deployment
Usage event
A usage event describes a unique load of a load module or program object for an address space that
event
eventdescriptiondeploymentUsage
usage
can contain an account code. The Usage Monitor records these usage events as they occur on a
particular operating system. After the usage data is imported into the Repository, each usage event is
identified by the load module name, library name, and volume. It can then be associated to a particular
product discovered on that system.
Repository
The Repository is a collection of database tables that contain processed Inquisitor and Usage Monitor
RepositorydescriptiondeploymentRepository
data. To ensure that accurate data is stored in the Repository tables, the following criteria must be met:
• The DASD VOLSERs of the data being imported must be unique unless the DASD VOLSERs are
shared or are clones of each other with identical contents.
• The data imported must be from systems with unique SMF IDs.
When you are designing the scope of a Repository, there are a few common scenarios that most installations fit into.
It is common to define the scope of a Repository based upon a data center. In this scenario, each data center in the
organization has a separate Repository.
CAUTION: Import only DASD volumes with a unique VOLSER into your Repository.
The only way to prevent this sharing from taking place is to divide the z/OS® systems with conflicting DASD/SMF IDs
into separate Repositories. This can entail running one Repository for each sysplex or stand-alone z/OS® system.
With IBM Z Software Asset Management, it is common for IT service providers to define separate Repositories for
each customer. This definition also satisfies the need for separation of data and ease of reporting.
It is recommended to have a central Db2® subsystem or SQLite databases that contain all the Repositories in your
entire enterprise. The usage and Inquisitor data that require processing should be transmitted to this central Db2®
subsystem or SQLite database by using the IBM Z Software Asset Management Automation Server or equivalent
automation product.
After you deploy both components to each system in your organization, perform data collection in the following
sequence:
1. Use the Inquisitor Job to scan all available DASD on each z/OS System.
2. Import Inquisitor data by running the Inquisitor Import job.
3. Ensure that the Usage Monitor is active on all z/OS® systems, directly after IPL.
4. Import Usage data by running the Usage Import job. Run this job after Inquisitor data has been imported.
13
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
IBM Z Software Asset Management displays products that have been discovered. Usage data collected from every
system by the Usage Monitor is imported and usage events are assigned to the discovered products, enabling
analysis of product use by system.
The first step in deploying IBM Z Software Asset Management is to run the SMP/E (System Modification Program/
Extended) installation of the product, followed by the customization and creation of the database resources.
The next step is to create a test Repository. This deployment exercise is useful as it helps you to:
As part of this test implementation, you can then deploy the Inquisitor and Usage Monitor to all systems in your
organization. It is advisable to first start the Usage Monitor on every system, in order to gather a significant amount of
usage data. Place the test repository on a test or development Db2 subsystem.
At this point you can start the IBM Z Software Asset Management Analyzer and connect to the Repository. To verify
the data collected by the Inquisitor and Usage Monitor, log on to the Analyzer and navigate to the Discovery menu tab.
From this menu you can proceed to various reports on discovered products and module usage.
After you move your Repositories to their final location, you should consider setting up automation of the product.
Db2 only: It is recommended that not more than 50 repositories be defined in a Db2 subsystem that is referenced by
each Analyzer. This is to prevent overload to the Analyzer and also for easier management of repositories.
You can locate multiple Repositories in one central location, or you can locate them in geographically dispersed
locations. Multiple Repositories may be organized as follows:
Central location
Each Repository contains data that is divided up into logical units, for example:
• Data center
• Outsourced customer
• Sysplex
Each Repository has its own database. For Db2®, all repositories must reside in the same Db2® subsystem. For
SQLite, each repository must reside in its own SQLite database. For Db2® only, the advantage of this configuration is
14
Chapter 2. Planning for deployment
that reporting can be performed on data across all repositories. With this configuration, all repositories can share the
same Global Knowledge Base (GKB) and you only have to maintain a single copy of the GKB.
15
Chapter 3. Installing and customizing IBM Z Software
Asset Management
The product installation involves downloading the product and available updates, preparing the database, and
configuring and populating a test database. After verifying that all components are correctly installed, you duplicate
the test database to create a production database where you automate data collection and import tasks.
Installation prerequisites
Before you install IBM Z Software Asset Management, verify that the required hardware and software are available in
the installation environment.
Hardware requirements
IBM Z Software Asset Management requires a z/Architecture® machine capable of running z/OS® Version 2 Release
3 or later.
Software requirements
The software required for IBM Z Software Asset Management is:
• z/OS® Version 2 Release 3 or later with z/OS® UNIX® System Services configured.
• Database software: Either Db2® or SQLite. It is not necessary to install the database on all of your z/OS®
systems, but it must be installed on at least one z/OS® system.
If you choose Db2® for your IBM Z Software Asset Management database, either of the following:
◦ Db2® for z/OS® Version 11, Release 1 and Db2® Utilities for z/OS®
◦ Db2® for z/OS® Version 12, Release 1 and Db2® Utilities for z/OS®
If you do not have a Db2® license:
◦ SQLite, Version 3.27.2, that is embedded in IBM Z Software Asset Management
Contact IBM support in order to install IBM Z Software Asset Management with SQLite only.
• Language Environment® for z/OS®
• Any of the following browsers:
◦ Firefox Standard Release 79.0 with JavaScript™ and cookies enabled
◦ Firefox Extended Support Release 68.1.0 with JavaScript™ and cookies enabled
◦ Microsoft™ Edge Version 80.0.361 with JavaScript™ and cookies enabled
◦ Internet Explorer, Version 11 with JavaScript™ and cookies enabled
◦ Chrome Version 83.0.41
• Microsoft™ Excel 2003
16
Chapter 3. Installing and customizing IBM Z Software Asset Management
However, this exit will only be given control if IEFU84 is an active SMF exit.
Accordingly, in the system’s SMF parameters, ensure that NOEXITS is not specified, and that IEFU84 is specified in
any list of SMF exits named in any EXITS parameter which may apply to the started task (STC) or batch job (JES2 or
JES3) subsystems.
Also ensure that type 30 and type 89 SMF records are being written by the system, and that SMF interval recording is
active for the started task (STC) and batch job (JES2 or JES3) subsystems.
RACF® authorizations
The following table lists the RACF® authority required to run IBM Z Software Asset Management Started Tasks,
Usage Monitor, Analyzer, and Automation Server. Consult with your RACF® administrator to define the required
RACF® authority.
Started task name SHSIMOD1 PARMLIB SHSIANL1 SHSIANL2 ACDS and SDSNEXIT data set output data sets
Usage Monitor READ READ n/a n/a n/a n/a READ ALTER
Automation Server READ READ n/a n/a CONTROL n/a n/a n/a
The started task should be defined in the resource class STARTED, with additional detail in the STDATA segment of
the resource. It can also be defined in the started task table ICHRIN03, but this requires an IPL to add or update a task
definition. For example:
Replace uuuuuuu with the name of the started task user for IBM Z Software Asset Management .
17
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
When SECURITY=SYSTEM is set for the Analyzer, the application name of HSICANLZ is supplied to SAF during
authentication. Security administrators can use permissions to the HSICANLZ resource in the APPL RACF class to
control which users are allowed to logon to the Analyzer.
The HSIPHOST module is called by the Usage Monitor writer task and by both Inquisitor programs to collect the
system TCP/IP host name and IP address. This action requires a security user profile which has an associated UNIX
uid value. The call of HSIPHOST can be disabled by relevant Usage Monitor and Inquisitor settings, if necessary.
APF
The Inquisitor and Usage Monitor use z/OS® authorized system services. These programs are contained in the PDSE
Load Library SHSIMOD1, which must be authorized using APF in order to run the Usage Monitor and/or the Inquisitor
when the latter is not being run with PARM=NOAPF.
The Analyzer also requires an APF authorized environment when the SECURITY=SYSTEM option is selected so that it
can issue the relevant SAF calls required for user authentication.
MEMLIMIT
The Usage Monitor creates memory objects, which are areas of virtual storage that have addresses greater than 2GB
and can only be addressed in 64-bit addressing mode.
The MEMLIMIT setting, which applies to the Usage Monitor address space, must be set at a value high enough
to allow the Usage Monitor to create all memory objects necessary for operations. It is recommended that
MEMLIMIT=NOLIMIT is used for the Usage Monitor address space.
The actual size of the memory objects that the Usage Monitor creates depends on the SIZ and QSZ settings.
Db2® authorization
You need Db2® privileges to perform the following tasks:
• DBADM authority to access the product database. You may need to drop and create Db2® resources.
• BIND plans and packages
• EXECUTE authority to execute plans and packages
• SELECT authority to access the Db2® Catalog tables
• LOAD, REPAIR, and STATS privileges to run Db2® utilities LOAD, REPAIR, and RUNSTATS
• GRANT USE OF BUFFERPOOL privilege to use specific buffer pools
• GRANT USE of STOGROUP privilege to use a specific storage group
18
Chapter 3. Installing and customizing IBM Z Software Asset Management
• ALTER BUFFERPOOL privilege to activate Bufferpool BP8K0. Compressed indexes require Bufferpools of size
8K, 16K, or 32K. Define and activate other Bufferpool names according to site requirements. For sites using
Db2 data sharing, group Bufferpools must be defined with the same names.
• Access to work file database or TEMP database for Declared Global Temporary table.
SQLite authorization
Creating a SQLite database requires authority to perform the following tasks:
19
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Tasks include editing the HSISCUST member in the SHSISAMP target hsi.SHSISAMP data set member:
library, changing the SYSIN DD entry for local settings, and running HSISCUST generates
the HSISCUST job. This job generates JCL jobs that you run in subse hsiinst.&DB.JCLLIB
quent tasks. hsiinst.&DB.PARMLIB
5 Collect data and import it into the test Repository database. JCLLIB data set members:
6 Create the production Repository database and arrange for regular JCLLIB data set members:
maintenance.
• HSISCUST
• Creating a production Repository database on page 31 • HSISDB01
• Maintaining the production Repository database on • HSISDB02
page 33 • HSISDB03
• HSISGKBL
• HSISGRNT
• HSISGRTB
• HSIJMON
• HSIASALC
• HSIJAUTO
• HSIJANLO
20
Chapter 3. Installing and customizing IBM Z Software Asset Management
• HSISANS1
• HSISANS2
• HSISANS3
• HSISINQZ
• HSISINQU
• HSISUMON
• HSISIQIM
• HSISUIMP
• HSISUDEL
• HSISLDEL
• HSISPDEL
• HSISTPRM
• HSISUN82
• HSISLO82
• HSISUT01
• HSISUT02
• HSISUT03
• HSISUT04
• HSISIVPD
• HSISMNPM
• HSIAPARM
• HSISANP1
Procedure
1. Download IBM Z Software Asset Management , version 8.2 , and all available maintenance components.
2. Follow the Receive and Apply instructions in the IBM Z Software Asset Management Program Directory to
install the target libraries.
The following libraries are installed:
21
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
SETPROG APF,ADD,DSN=hsi.SHSIMOD1,SMS
or
SETPROG APF,ADD,DSN=hsi.SHSIMOD1,VOL=xxxxxx
6. Schedule a change request to roll out target libraries to all z/OS® LPARs where IBM Z Software Asset
Management is used and include APF authorization for SHSIMOD1.
For example, update the appropriate PROGxx member.
Db2® for z/OS® must be installed. See Installation prerequisites on page 16. Db2® must have access to a
minimum of 1600 cylinders of 3390 DASD space.
All Db2® table spaces defined in IBM Z Software Asset Management are partition-by-growth universal table spaces
(UTS). UTS is a combination of partitioned and segmented table space schemes. Non-UTS table space types are
deprecated.
22
Chapter 3. Installing and customizing IBM Z Software Asset Management
Procedure
1. Run the DSNTIJCL job from Db2® SDSNSAMP to bind the DSNACLI plan and enable the Call Library Interface
(CLI/ODBC) Db2® plan.
If you encounter a SQL error, code -805, rebind this plan with the latest Db2® maintenance package and
include the following package in the job:
2. Run the DSNTIJTM job from Db2® SDSNSAMP to bind the DSNREXX plan and enable the REXX Db2® plan.
Depending on your environment, you can define parameters for the following environments:
• Db2®
• SQLite
• Remote configuration
The DBTYPE parameter determines the environment and creates the jobs to customize and run the product in that
environment.
Review the HSISCUST job parameters before you begin. A database administrator and a system programmer are
required to perform the customization. After you make the required changes, submit the job. The JCL creates or
reuses two output PDSE libraries and two sequential data sets.
• The JCLLIB library contains Job Control Language (JCL) scripts that implement and operate the product.
• The PARMLIB library contains predefined parameters that the JCL scripts reference.
• The UM.HLQIDS sequential data set is referenced by the Usage Monitor on creation, and contains a single
record.
• The ZSAMLOCK sequential data set is a dummy file used for serialization.
General parameters
The following table lists the general parameters that you must consider for all environments.
Parameter Description
SET HSI You must set this JCL parameter to the high-level qualifiers of the target libraries cre
ated by the SMP/E installation process. The default parameter is HSI.V820.
23
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Parameter Description
SET ISP The customization tool uses ISPF services to customize the parameters and JCL for
the user. This parameter specifies the high-level qualifiers for the ISPF target libraries.
The default parameter begins with ISP.
DBTYPE This parameter determines the environment and creates the JCL and parameters for
that environment:
• DB2®
• SQLITE
• REMOTE: The product collects Inquisitor and Usage Monitor data at remote
sites and no database is required.
Parameter Description
CLASS CLASS
CEERUN This parameter specifies the fully qualified Language Environment® CEERUN data set.
CBCDLL This parameter specifies the fully qualified Language Environment® CBCDLL C++ run
time data set.
HSIINST This parameter specifies the high-level qualifier of the JCLLIB, PARMLIB, and sequen
tial data sets that are created by running the HSISCUST job. If the JCLLIB and PARM
LIB data sets exist, they are reused and members are replaced. The sequential data
sets are either created or reused. The name specified for this parameter must be less
than, or equal to, 19 characters in length.
24
Chapter 3. Installing and customizing IBM Z Software Asset Management
Parameter Description
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back
the same value specified for this parameter. If you use a different value, a new
zFS file is created and the migration will fail.
Parameter Description
REPZSCHM This parameter is used as a full qualifier for the tables and index definitions in the
repository, and as a part qualifier for the tables and index definitions in the local knowl
edge base, and local knowledge base for z/OS® UNIX®. The REPZSCHM name must
be less than, or equal to, 8 characters in length.
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back the
same value specified for this parameter. If you use a different value, the migration will
fail.
GKBZSCHM This parameter is part of the table qualifier and the index definitions qualifier for the
GKB, GKB for z/OS® UNIX®, and Inquisitor filters. The GKBZSCHM name must be less
than, or equal to, 8 characters in length.
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back the
same value specified for this parameter. If you use a different value, the migration will
fail.
DBADMIN DBADMIN is an optional parameter. For a Db2® database, this parameter specifies the
list of user IDs that are granted administrator access to the database and its contents.
Specify an empty string if you do not want to grant adminstrator access to user IDs for
the database specified in DB and DBGKB. For SQLite, this parameter specifies the list
of user IDs that can connect to the z/OS® RACF® group.
SIZE This parameter specifies the initial space allocation for Db2® and SQLite table spaces
of the three largest tables. The default value of SIZE is 1.
25
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Parameter Description
DB This parameter specifies the name of the repository database that the product uses to
store all of the information that it gathers other than from the GKB. The DB name must
be less than, or equal to, 8 characters in length.
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back the
same value specified for this parameter. If you use a different value, the migration will
fail.
DBGKB This parameter defines a single GKB database that is accessed by multiple reposito
ries under the same Db2® subsystem. The DBGKB name must be less than, or equal
to, 8 characters in length, and must not have the same name as the name defined for
DB.
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back the
same value specified for this parameter. If you use a different value, the migration will
fail.
DB2LOAD This parameter specifies the fully qualified SDSNLOAD data set name.
DB2EXIT This parameter specifies the fully qualified SDSNEXIT data set name. If the DB2EXIT li
brary does not exist, use the same value as the DB2LOAD parameter.
DBSSID This parameter specifies the Db2® subsystem ID on the z/OS® system.
LOC This parameter specifies the CLI/ODBC location for the Db2® subsystem ID on the z/
OS® system. You can use the DB2® DISPLAY DDF command to determine the loca
tion.
SETSQLID This parameter is used in SET CURRENT SQLID to allow a different user to define
Db2® objects. This parameter is optional. The SETSQLID value must be less than, or
equal to, 8 characters in length.
SGHSITAB This parameter specifies the storage group name for small tables in the database. The
default value is SGHSITAB (same as the parameter name). Consult your Db2® data
base administrator for security implications and naming conventions. See the SQL
statement CREATE STOGROUP for more information.
SGHSIBIG This parameter specifies the storage group name for large tables in the database. The
default value is SGHSIBIG (same as the parameter name). Consult your Db2® data
base administrator for security implications and naming conventions. See the SQL
statement CREATE STOGROUP for more information.
SGHSIIDX This parameter specifies the storage group name for indexes in the database. The de
fault value is SGHSIIDX (same as the parameter name). Consult your Db2® database
26
Chapter 3. Installing and customizing IBM Z Software Asset Management
Parameter Description
administrator for security implications and naming conventions. See the SQL state
ment CREATE STOGROUP for more information.
SGTABCAT This parameter specifies the VCAT of the Db2® table space data set names for small
tables in the database. Consult your Db2® database administrator for security impli
cations and disk storage requirements. This parameter is referenced by storage group
name parameter SGHSITAB.
SGTABVOL This parameter specifies the names of the volumes that the table space data sets for
small tables are allocated on. This parameter is referenced by storage group name pa
rameter SGHSITAB.
SGBIGCAT This parameter specifies the VCAT of the Db2® table space data set names for large
tables in the database. Consult your Db2® database administrator for security impli
cations and disk storage requirements. This parameter is referenced by storage group
name parameter SGHSIBIG.
SGBIGVOL This parameter specifies the names of the volumes that the table space data sets for
large tables are allocated on. This parameter is referenced by storage group name pa
rameter SGHSIBIG.
SGIDXCAT This parameter specifies the VCAT of the Db2® data set names for indexes in the
database. Consult your Db2® database administrator for security implications and
disk storage requirements. This parameter is referenced by storage group name para
meter SGHSIIDX.
SGIDXVOL This parameter specifies the names of the volumes that the data sets, for indexes,
are allocated on. This parameter is referenced by storage group name parameter
SGHSIIDX.
• BPDB These parameters specify the buffer pool definitions for the database, table spaces,
• BPTS and indexes. For BPIX, the buffer pool size must be defined as 8K, 16K, or 32K.
• BPIX
Parameter Description
SQLTZFS The name of a zFS linear VSAM data set that is used for IBM Z Software Asset Man
agement SQLite databases.
27
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Parameter Description
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back the
same value specified for this parameter.
If you use a different value, the migration will fail.
SQLTPATH USS directory where the SQLTZFS data set is mounted. The HSISDB01 job in JCLLIB
creates this path at a later time.
If you are migrating from Tivoli Asset Discovery for z/OS, Version 8.1, use back the
same value specified for this parameter.
If you use a different value, the migration will fail.
Procedure
1. Run the HSISDB01 job to create the storage groups.
2. Run the HSISDB02 job to create the database objects for the Global Knowledge Base (GKB).
3. Run the HSISDB03 job to create the Repository database and database objects.
Note: Before running this job, review the comments in the job. In member HSISSQ18 of the PARMLIB
library, the COMPRESS keyword is set for all indexes. Bufferpool BP8K0 must first be activated in
Db2® before these compressed indexes can be created. Rename and activate different Bufferpool
names according to site requirements.
28
Chapter 3. Installing and customizing IBM Z Software Asset Management
Procedure
1. Run the HSISDB01 job to allocate, format, and mount a zFS file system.
2. Run the HSISDB02 job to create the database objects for the Global Knowledge Base (GKB).
3. Run the HSISDB03 job to create the Repository database and database objects.
4. Run the HSISGKBL job to load the GKB.
5. Run the HSISGRNT job to grant access to the z/OS® OMVS groups that the IBM Z Software Asset
Management administrator is a member of.
Procedure
1. Run the HSISINQZ job to scan the DASD for z/OS® product modules and generate output to the DD HSIPZIP
output file.
For large sites, this operation can take up to an hour. You can perform step 3 on page 29 while the job is
running.
2. Run the HSISINQU job to scan z/OS® UNIX files and generate output to the DD HSIXZIP output file.
For large sites, this operation can take up to an hour. You can perform step 3 on page 29 while the job is
running.
3. To run the Usage Monitor to gather initial usage data, perform the following tasks:
a. Run the HSISUMON job to start the Usage Monitor as a batch job.
The Usage Monitor is typically run as a started task, but you can run it as a batch job for this test. This
job runs continually until you stop it manually and most of the time this job is idle.
P HSIJMON
4. To import Inquisitor (IQ) data into the test Repository database, perform the following tasks:
a. Verify that the HSISINQZ and HSISINQU jobs that you started in steps 1 on page 29 and 2 on
page 29 have completed.
If the jobs are still running, wait until they are completed.
The output logs from these jobs provide information on the number of records collected.
29
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
b. Run the HSISIQIM job to import the data from the HSIPZIP and HSIUZIP output files that were created
by the HSISINQZ and HSISINQU jobs.
For large sites, this job can take more than two hours to run the first time. Performance is significantly
faster on subsequent runs.
5. Run the HSISUIMP job to import usage data from the hsiinst.UM&SMF.D*.T* file.
Procedure
1. Review the HSISANP1 PARMLIB library settings and modify if necessary.
These settings specify the IBM Z Software Asset Management administrator user ID and password.
2. Run the HSISANLO JCLLIB job on the test Repository database.
This job, typically, runs continually but you can enter the F HSISANLO, STOP command to stop it.
3. On your PC browser, logon to the Analyzer utility with the values specified in member HSISANP1 of PARMLIB
library.
4. Review the Analyzer reports to confirm that all expected products have been identified.
If a product is missing, perform the following tasks to identify the reason why a product is not included:
• Check that the product is in the GKB and report any missing product to IBM support so that they can
provide an updated GKB for the product.
• If the product exists in the GKB, check that the product is installed on the test z/OS®. If the product is
not installed on the test z/OS®, run the Inquisitor utility on a system where the product is installed and
then import that data into the test database.
Procedure
1. Run the following jobs to collect Inquisitor and Usage data from other systems:
a. Run the HSISINQZ job to scan all other LPARs and generate output to the hsiinst.HSIPZIP.Z&SMF
file.
b. Run the HSISINQU job and generate output to the hsiinst.HSIUZIP.U&SMF file.
c. Run the HSISUMON job to start the Usage Monitor as a batch job on the other LPARS.
2. Transfer collected data to the central site via file transfer protocol (FTP).
3. Run the following jobs to import Inquisitor and Usage data at the central site:
a. Run the HSISIQIM job to import Inquisitor data from the hsiinst.HSIPZIP.Z&SMF and
hsiinst.HSIUZIP.U&SMF files for each LPAR.
b. Run the HSISUIMP job to import Usage data from the hsiinst.UM&SMF.D*.T* file for each LPAR.
30
Chapter 3. Installing and customizing IBM Z Software Asset Management
Procedure
1. Run the HSISDB01 job.
• For Db2®, the job creates storage groups.
• For SQLite, the job allocates the zFS file system.
2. Run the HSISDB02 job to create the database objects for the Global Knowledge Base (GKB).
3. Run the HSISDB03 job to create the Repository database and database objects.
For Db2 databases: Before running the HSISDB03 job, review and change definitions in PARMLIB
members HSISSQ17 and HSISSQ18 as needed to meet site requirements:
• In member HSISSQ17 of PARMLIB library, use the MAXPARTITIONS parameter to increase the
number of partitions for the three largest table spaces (VMODULE, VUSEMTD, and VPRODDET)
according to site requirements.
• In member HSISSQ18 of the PARMLIB library, the COMPRESS keyword is set for all indexes.
Bufferpool BP8K0 must first be activated in Db2® before these compressed indexes can be
created. Rename and activate different Bufferpool names according to site requirements.
31
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
What to do next
Configure security for the production Repository database.
Procedure
1. Define a profile in the STARTED class to associate a user ID with the HSIJMON, HSIJAUTO, and HSIJANLO
started tasks.
2. Specify that user IDs have the following access permissions:
a. READ access to hsi** data sets
b. ALTER access to hsiinst.** data sets
What to do next
Configure the automation of data collection activities on the production Repository database.
Procedure
1. Configure the Usage Monitor utility to start automatically:
a. In the HSISMNPM member of the PARMLIB data set, modify settings if necessary so that the
DSN(hsiinst.UM&SMF) command generates hsiinst.UM&SMF.D*.T* data sets.
b. Schedule a change request to roll out the new HSIJMON started task on all z/OS® LPARs.
c. Copy the HSIJMON started task from the JCLLIB libray to the system PROCLIB data set.
d. Arrange for the HSIJMON started task to start early in the initial program load (IPL) cycle to ensure
that all usage activity is recorded.
2. Configure the Automation Server utility to start automatically and to automate data collection and import
tasks:
a. Schedule a change request to roll out a new HSIJAUTO started task on all z/OS® LPARs.
b. Run the HSIASALC job to define the automation control Virtual Storage Access Method (VSAM) data
set.
c. Configure the HSIAPARM settings to perform the following tasks every weekend:
• Remote hosts: Runs an Inquisitor scan job to collect data, runs the ZCAT to amalgamate usage
data, and transfers collected data via file transfer protocol (FTP).
• Database host: Runs an Inquisitor Import job, runs a usage import job, and aggregates the
data.
32
Chapter 3. Installing and customizing IBM Z Software Asset Management
d. If necessary, run the HSIASSCT job to mark existing data sets as being already processed in the
automation control data set.
e. Copy the HSIJAUTO started task from the JCLLIB library to the system PROCLIB data set.
f. Arrange for the HSIJAUTO to start automatically at any time in the IPL cycle.
3. Configure the Analyzer utility to start automatically:
a. Schedule a change request to roll out the new HSIJANLO started task to the production database host.
b. Copy the HSIJANLO started task from the JCLLIB data set to the system PROCLIB data sets.
4. Configure the Analyzer utility to work with a secure socket layer (SSL) for HTTPS transport and to logon with a
RACF® user ID and password:
a. In the HSISANP2 member of the PARMLIB data set, change the security parameter to
SECURITY=SYSTEM,
b. Review and edit the comments in the HSISANS1, HSISANS2, and HSISANS3 members of the JCLLIB
data set to create a digital certificate that is required for SSL.
c. Configure the HTTPPORT parameter, if you require a value other than the default value.
d. Review the Analyzer reports to confirm that all expected products are identified.
Procedure
1. Run the following jobs on a regular basis to delete old usage data, save space, and improve processing time:
a. Run the HSISUDEL job to delete usage data that are older than a specified period.
b. Run the HSISLDEL job to delete obsolete discovery and usage data for a specified system (LPAR).
c. Run the HSISPDEL job to physically delete data for all systems.
d. Run the HSISTPRM job to reset the status flag back to normal for tables in the production Repository
database, following a failure.
e. Run the HSISIVP job to verify database changes since the product was released.
2. Run the following jobs on a regular basis to maintain the integrity and performance of data in the production
Repository database:
a. Run the HSISUT01 job to backup the Repository database in Db2® or backup the zFS file system in
SQLite.
b. Run the HSISUT02 job to restore the Repository database in Db2® or restore the zFS file system in
SQLite.
c. Run the HSISUT03 job to reorganize the Repository database in Db2®.
d. Run the HSISUT04 job to update RUNSTATS statistics for the Repository database in Db2®.
33
Chapter 4. Implementing deployment scenarios
Most implementations of IBM Z Software Asset Management are based on one of the common deployment
scenarios. An example is provided for implementing each of these common deployment scenarios with a Db2®
Repository database. You can adapt an example for use with a SQLite Repository database.
Related information
Planning for deployment on page 12
Procedure
1. Customize an instance of the HSISCUST member in the hsi.SHSISAMP data set with the following
parameters:
• DBTYPE=DB2
• REPZSCHM=REPHLQ1
• GKBZSCHM=GKBHLQ1
• DB=REPDB1
• DBGKB=GKBDB1
2. Submit the HSISCUST job.
3. Create the Repository and GKB databases and grant access to them:
a. Run the HSISDB01 job to create storage groups.
b. Run the HSISDB02 job to create the GKB database and database objects.
c. Run the HSISDB03 job to create the Repository database and database objects.
d. Run the HSISGKBL job to load GKB data.
e. Run the HSISGRNT job to grant DBADMIN access to IBM Z Software Asset Management administrator.
f. Run the HSISGRTB job to grant SELECT access to database tables.
4. Collect Inquisitor and Usage Monitor data:
a. Run the HSISINQZ job on all z/OS® LPARs to collect Inquisitor data.
b. Run the HSISINQU job on all z/OS® LPARs to collect Inquisitor data for UNIX®.
c. Run the HSISUMON job on all z/OS® LPARs to collect usage data.
d. Run the HSISZCAT job to condense usage data, separately for each z/OS LPAR (if there are usage data
from 3 LPARs, then there should be 3 condensed output files).
34
Chapter 4. Implementing deployment scenarios
5. Transfer the collected Inquisitor and condensed ZCAT usage data to the central site via file transfer protocol
(FTP).
6. Import Inquisitor and Usage Monitor data at the central site:
a. Run the HSISIQIM job to import Inquisitor data into the Repository database for each LPAR.
b. Run the HSISUIMP job to import Usage data into the Repository database for each LPAR.
Procedure
1. Customize an instance of the HSISCUST member in the hsi.SHSISAMP data set with the following
parameters.
• DBTYPE=DB2
• REPZSCHM=REPHLQ1
• GKBZSCHM=GKBHLQ1
• DB=REPDB1
• DBGKB=GKBDB1
2. Submit the HSISCUST job.
3. Create the Repository and GKB database and grant access to them:
b. Run the HSISDB02 job to create the GKB database and database objects.
c. Run the HSISDB03 job to create the Repository database and database objects.
e. Run the HSISGRNT job to grant DBADMIN access to IBM Z Software Asset Management administrator.
35
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
5. Transfer the collected Inquisitor and condensed ZCAT usage data to the central site via file transfer protocol
(FTP).
6. Import Inquisitor and Usage Monitor data at the central site:
a. Run the HSISIQIM job to import Inquisitor data into the Repository database for each LPAR.
b. Run the HSISUIMP job to import Usage data into the Repository database for each LPAR.
7. Customize another instance of the HSISCUST member in the hsi.SHSISAMP data set with the following
parameters:
• DBTYPE=DB2
• REPZSCHM=REPHLQ2
• GKBZSCHM=GKBHLQ1
• DB=REPDB2
• DBGKB=GKBDB1
8. Submit the HSISCUST job.
9. Create the second Repository and grant access to it: It is not necessary to run jobs to create and populate the
GKB database in this step because the second Repository shares the GKB that was created in steps 3b and
3d.
a. Run the HSISDB01 job to create storage groups.
b. Run the HSISDB03 job to create the Repository database and database objects.
c. Run the HSISGRNT job to grant DBADMIN access to IBM Z Software Asset Management administrator.
d. Run the HSISGRTB job to grant SELECT access to database tables.
10. Collect Inquisitor and Usage Monitor data to add to the second Repository database:
a. Run the HSISINQZ job on all z/OS LPARs to collect Inquisitor data.
b. Run the HSISINQU job on all z/OS LPARs to collect Inquisitor data for UNIX.
c. Run the HSISUMON job on all z/OS LPARs to collect usage data.
d. Run the HSISZCAT job to condense usage data, separately for each z/OS LPAR (if there are usage data
from 3 LPARs, then there should be 3 condensed output files).
11. Transfer the collected Inquisitor and condensed ZCAT usage data to the central site via file transfer protocol
(FTP).
12. Import Inquisitor and Usage Monitor data at the central site:
a. Run the HSISIQIM job to import Inquisitor data into the second Repository database for each LPAR.
b. Run the HSISUIMP job to import Usage data into the second Repository database for each LPAR.
What to do next
Repeat steps 7-12 for each additional Repository that you want to create, changing the values for the REPZSCHM and
DB parameters for each new Repository.
36
Chapter 4. Implementing deployment scenarios
Procedure
1. Customize an instance of the HSISCUST member in the hsi.SHSISAMP data set with the following
parameters:
• DBTYPE=DB2
• REPZSCHM=REPHLQ1
• GKBZSCHM=GKBHLQ1
• DB=REPDB1
• DBGKB=GKBDB1
2. Submit the HSISCUST job.
3. Create the first Repository and GKB database, and grant access to them:
a. Run the HSISDB01 job to create storage groups.
b. Run the HSISDB02 job to create the GKB database and database objects.
c. Run the HSISDB03 job to create the Repository database and database objects.
d. Run the HSISGKBL job to load GKB data.
e. Run the HSISGRNT job to grant DBADMIN access to IBM Z Software Asset Management
administrator.
f. Run the HSISGRTB job to grant SELECT access to database tables.
4. Collect Inquisitor and Usage Monitor data:
a. Run the HSISINQZ job on all z/OS LPARs to collect Inquisitor data.
b. Run the HSISINQU job on all z/OS LPARs to collect Inquisitor data for UNIX.
c. Run the HSISUMON job on all z/OS LPARs to collect usage data.
d. Run the HSISZCAT job to condense usage data, separately for each z/OS LPAR (if there are usage data
from 3 LPARs, then there should be 3 condensed output files).
5. Transfer the collected Inquisitor and condensed ZCAT usage data to the central site via file transfer protocol
(FTP).
6. Import Inquisitor and Usage Monitor data at the central site:
a. Run the HSISIQIM job to import Inquisitor data into the second Repository database for each LPAR.
b. Run the HSISUIMP job to import Usage data into the second Repository database for each LPAR.
7. Customize another instance of the HSISCUST member in the hsi.SHSISAMP data set with the following
parameters:
• DBTYPE=DB2
• REPZSCHM=REPHLQ2
• GKBZSCHM=GKBHLQ2
• DB=REPDB2
• DBGKB=GKBDB2
8. Submit the HSISCUST job.
9. Create the second Repository and second GKB database, and grant access to them:
37
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
What to do next
Repeat steps 7-12 for each additional Repository and GKB database that you want to create, changing the values for
REPZSCHM, GKBZSCHM, DB, and DBGKB parameters for each new Repository and GKB database.
Procedure
1. At the remote site, install the target libraries.
2. Customize an instance of the HSISCUST member in the hsi.SHSISAMP data set with the following parameter:
DBTYPE=REMOTE
38
Chapter 4. Implementing deployment scenarios
Procedure
1. Customize an instance of the HSISCUST member in the hsi.SHSISAMP data set with the following
parameters:
• DBTYPE=DB2
• REPZSCHM=REPHLQ1
• GKBZSCHM=GKBHLQ1
• DB=REPDB1
• DBGKB=GKBDB1
2. Submit the HSISCUST job.
3. Create the Repository and GKB databases and grant access to them:
a. Run the HSISDB01 job to create storage groups.
b. Run the HSISDB02 job to create the GKB database and database objects.
c. Run the HSISDB03 job to create the Repository database and database objects.
d. Run the HSISGKBL job to load GKB data.
e. Run the HSISGRNT job to grant DBADMIN access to IBM Z Software Asset Management administrator.
f. Run the HSISGRTB job to grant SELECT access to database tables.
4. Collect and import Inquisitor data for all z/OS® LPARs the first time:
a. Run the HSISINQZ job on all four z/OS® LPARs to collect Inquisitor data: MVSA, MVSB, MVSC, and
MVSD.
b. Transfer the collected Inquisitor data to the central site via file transfer protocol (FTP).
c. Run the HSISIQIM job to import Inquisitor data into the Repository database for each z/OS® LPAR.
5. Collect and import Inquisitor data only for a single z/OS® LPAR in subsequent scans:
a. Set PLX=Y in the Inquisitor HSISINQZ job.
b. Run the HSISINQZ job on the first z/OS® LPAR, MVSA, to collect Inquisitor data.
c. Transfer the collected Inquisitor data to the central site via FTP.
d. Run the HSISIQIM job to import Inquisitor data into the Repository database for the z/OS® LPAR
MVSA only.
e. Repeat steps a on page 39 - d on page 39 for z/OS® LPAR MVSA every time a new scan is
required.
6. Collect and import Inquisitor data for UNIX for all z/OS® LPARs the first time:
39
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
a. Run the HSISINQU job on all four z/OS® LPARs to collect Inquisitor data for UNIX®.
b. Transfer the collected Inquisitor data for UNIX® to the central site via FTP.
c. Run the HSISIQIM job to import Inquisitor data for UNIX® into the Repository database for each z/OS®
LPAR.
7. Collect and import Inquisitor data for UNIX only for a single z/OS® LPAR in subsequent scans:
a. Set PLX=Y in the Inquisitor HSISINQU job.
b. Run the HSISINQU job on the first z/OS® LPAR, MVSA, to collect Inquisitor data for UNIX.
c. Transfer the collected Inquisitor data to the central site via FTP.
d. Run the HSISIQIM job to import Inquisitor data for UNIX into the Repository database for the z/OS®
LPAR MVSA only.
e. Repeat steps a on page 39 - d on page 39 for z/OS® LPAR MVSA every time a new scan is
required.
8. Collect and import Usage Monitor data:
a. Run the HSISUMON job on all z/OS® LPARs to collect usage data.
b. Transfer the collected Usage Monitor data to the central site via FTP.
c. Run the HSISUIMP job to import Usage data into the Repository database for each LPAR.
40
Chapter 5. Migrating to IBM Z Software Asset
Management Version 8.2
When you migrate to the latest version of IBM Z Software Asset Management from an earlier version, you must
convert existing data to be compatible with your new environment.
1. All table spaces from version 8.1 are migrated to version 8.2 partition-by-growth Universal Table Spaces
(UTS). These UTS are defined as ‘COMPRESS YES’. All indexes are also defined as ‘COMPRESS YES’ with the
BP8K0 as the default buffer-pool.
If you prefer to define some table spaces as partition-by-range UTS, you need to customize some PARMLIB
members, before the migration.
2. If your existing version 8.1 Repository database (including LKB/LKU) still use the original table space
definitions (segmented non-UTS), then you can use the migration jobs listed below for the migration.
3. If your existing version 8.1 Repository database (including LKB/LKU) already have some or all table spaces
reconfigured as UTS, then you need to review and decide which migration jobs are required for the migration.
After migration you need to customise version 8.2 JCLLIB/PARMLIB members to reflect your preferred table
space names.
4. If your existing version 8.1 Repository database (including LKB/LKU) and GKB use different schema names,
then you need to modify the migration jobs to suit your site requirements.
5. The version 8.2 Usage Monitor job/started task (HSISUMON/HSIJMON) requires a minimum level of z/OS
V2.3 or later. It will fail if run in z/OS V2.2 or earlier.
Note: If your repository is located on an LPAR running at z/OS V2.2 or earlier, the Usage Monitor job/
start task (HSISUMON/HSIJMON) must continue to run with version 8.1 load library hsi.SHSIMOD1.
41
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
You can still migrate the repository and GKB databases to version 8.2 (depending on types of
deployment scenarios described later in the list). Once you have upgraded to z/OS V2.3 or later, you
can then run the Usage Monitor with the version 8.2 load library hsi.SHSIMOD1.
6. If you have multiple version 8.1 repositories sharing the same version 8.1 GKB database, you need to phase
the migration process.
Note: Version 8.2 code fails when accessing a version 8.1 GKB database, due to newly defined
version 8.2 tables and columns. Conversely, version 8.1 code fails when accessing a version 8.2 GKB
database due to differences in version 8.2 table layouts.
For example, if you have version 8.1 repositories REP1, REP2, REP3, and REP4 sharing the same version 8.1
GKB, then migrate as follows:
• To migrate the first repository, REP1, in version 8.2 customization job, HSISCUST, create a new V8.2
GKB database. For example, GKB82.
Customize parameters DBGKB and GKBZSCHM with different names from those used in version 8.1
GKB database. Repository parameter settings and values remain the same.
• Migrate REP1 and GKB database (GKB82) to version 8.2 at the same time. Operational jobs for
repository REP1 must now reference the version 8.2 load library hsi.SHSIMOD1.
• The remaining REPs continue to run at version 8.1 with operational jobs still referencing the version
8.1 load library hsi.SHSIMOD1. These REPs continue to use the version 8.1 GKB database (GKB81).
• Gradually migrate the remaining three repositories without creating another version 8.2 GKB (GKB82).
• Once all REPs are migrated and are using the version 8.2 GKB database (GKB82), the version 8.1 GKB
(GKB81) database can be dropped.
7. If each repository has its own GKB, then migrate the Repository database, GKB database and hsi.SHSIMOD1
to version 8.2 all at the same time.
8. Housekeeping:
Perform housekeeping on the version 8.1 Repository database before you start your migration process. This
should reduce the time required to migrate all the data.
a. HSISLDEL - If you have any obsolete LPARs in the repository, you should delete the obsolete LPARs by
running job HSISLDEL.
b. HSISPDEL - TMODULE is one of the biggest tables and it contains modules of which a huge
percentage are in-house programs. To delete obsolete modules (especially in-house programs), refer
to job HSISPDEL. You need to define a date range for deletion and a sample SQL statement is provided
in the job to list date ranges. HSISPDEL deletes modules based on any load libraries that have been
marked deleted.
c. HSISUDEL - TUSEMTD is the largest table. Performing housekeeping on this table should be part of
best practices.
To determine the status of this table, run the following SQL statement:
42
Chapter 5. Migrating to IBM Z Software Asset Management Version 8.2
Next, in the Usage Deletion job HSISUDEL, select the date range for deletion. Follow the instructions in
the job – if you have never deleted before, you should delete Usage records in increments. Do it for all
LPARs. Run the SQL statement again to check the number of outstanding records in TUSEMTD.
A good guideline on the number of records to be retained is to run HSISUDEL monthly for all LPARs
with a fixed set of parameter settings:
KEEPDETAIL=3 (or 6)
KEEPAGGR=12
This will retain detailed Usage records for the current month and the previous 3 (or 6) months, and
summarized records for the current month and the previous 12 months.
9. Continue to run your version 8.1 Usage Monitor job/started task (HSISUMON/HSIJMON), but stop the
Analyzer and do not run any version 8.1 operational jobs during the migration.
Procedure
1. In IBM Z Software Asset Management version 8.2, make a copy of the HSISCUST member in the
hsi.SHSISAMP data set and modify the following parameters:
b. Set HSIINST to a different value to the one defined for the existing 8.1 system. This will ensure that
the JCLLIB/PARMLIB datasets are created with different names. As stated in the section, “Before you
begin”, backup or rename copies of version 8.1 JCLLIB/PARMLIB datasets.
c. Set the value of the SYS parameter to the same system that is defined for your existing version 8.1
Repository database.
d. Set the value of the DB parameter to the same value that is defined for your existing version 8.1
Repository database.
e. Set the value of the DBGKB parameter to the same value that is defined for your existing version 8.1
Global Knowledge Base (GKB) database.
Note: If you have multiple repositories sharing the same GKB database, you must use a
different DBGKB name to create a new version 8.2 GKB database. See Migration planning and
consideration on page 41, step 6 on page 42 .
f. Set the value of the REPZSCHM parameter to the same value that is defined for your version 8.1
Repository database.
43
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
g. Set the value of the GKBZSCHM parameter to the same value that is defined for your version 8.1 GKB
database.
Note: If you have multiple repositories sharing the same GKB database, you must use a
different GKBZSCHM name to create a new version 8.2 GKB database. See Migration planning
and consideration on page 41, step 6 on page 42 .
h. Set values of the remaining Db2 parameters (e.g. DBSSID, LOC) to the same values that are defined for
your version 8.1 Repository database.
i. The default value for the BPIX parameter is set to BP8K0 and must be activated before usage.
Compressed indexes require Bufferpools to be defined with BP8K0-BP8K9, BP16K0-BP16K9, or
BP32K-BP32K9. It cannot be BP0-BP49.
2. Submit the HSISCUST job. DO NOT share members of JCLLIB/PARMLIB between V8.1 and V8.2. Some
member names may be the same, but the contents differ.
3. Edit and update jobs in the JCLLIB library and parameters in the PARMLIB library if there are special site
requirements.
4. Run the following migration jobs:
a. HSISWS01 - Submit the job to verify whether all database changes have been applied. The comments
section in the job describes a list of version 8.1 PTFs where database changes for the Repository must
be applied. Also, this job verifies whether there are records in the TUSEMTD table with column FHWID
having values of 0 (zero).
DO NOT proceed to the next job, HSISWS02, until all database changes for version 8.1 have been
applied. OA56618/UJ00637 is the last PTF from version 8.1 where database changes need to be
applied. This PTF requires significant effort in implementation due to changes in the largest table -
TUSEMTD.
To fix records in the TUSEMTD table with column FHWID having values of 0 (zero), refer to 'Additional
instructions' in the technote at this web address: https://www.ibm.com/support/pages/hold-act-ptf-
uj00637
b. HSISWS02 - Submit the job to display the meta data of the version 8.1 Repository, LKB and LKU
objects. Verify that the number of version 8.1 Db2 objects match the expected result. If the expected
result does not match, DO NOT proceed to the next job, HSISWS03. Investigate why there are
differences. Possible reasons are described in the comments section of the job. Upon successful
completion of the job, proceed to the next job, HSISWS03.
A condition code of 0 is expected.
c. HSISWS03 – Submit the job to alter table spaces (table spaces defined with single tables) to UTS,
table spaces and indexes defined with ‘COMPRESS YES’. Upon successful completion of the job,
proceed to the next job, HSISWS04.
44
Chapter 5. Migrating to IBM Z Software Asset Management Version 8.2
d. HSISWS04 – Submit the job to reorg the 3 largest table spaces - TUSEMTD, TMODULE and
PRODUCT_USE_DETAIL, so as to instantiate these table spaces to UTS. Upon successful completion
of the job, proceed to the next job, HSISWS05.
A condition code of 4 is expected.
e. HSISWS05 – Submit the job to reorg the remaining 20 table spaces, so as to instantiate these table
spaces to UTS. Upon successful completion of the job, proceed to the next job, HSISWS06.
A condition code of 4 is expected.
f. HSISWS06 – Submit the job to drop primary keys and indexes of version 8.1 tables that were defined
under shared segmented table spaces. Upon successful completion of the job, proceed to the next job,
HSISWS07.
A condition code of 0 is expected.
g. HSISWS07 – Submit the job to create 15 new UTS, new tables with names suffixed with _V82, and
indexes. These 15 tables in version 8.1 share 3 segmented table spaces. Upon successful completion
of the job, proceed to the next job, HSISWS08.
A condition code of 0 is expected.
h. HSISWS08 – Submit the job to copy data from 15 tables of version 8.1 to the newly defined tables
suffixed with _V82 from step (g). Upon successful completion of the job, proceed to the next job,
HSISWS09.
A condition code of 0 is expected.
i. HSISWS09 – Submit the job to drop version 8.1 segmented table spaces (shared by 15 tables), a
deprecated table space, and rename tables suffixed with _V82 to their original names. Once this job is
run where the version 8.1 table spaces are dropped, there is no fall back to the 15 V8.1 tables. Upon
successful completion of the job, proceed to the next job, HSISWS10.
A condition code of 0 is expected.
j. HSISWS10 – Submit the job to drop LKB indexes, creates new LKB/LKU UTS, new tables with names
suffixed with _V82, and indexes. Upon successful completion of the job, proceed to the next job,
HSISWS11.
A condition code of 0 is expected.
k. HSISWS11 – Submit the job to copy LKB/LKU data of version 8.1 to the newly defined tables from step
(j). Upon successful completion of the job, proceed to the next job, HSISWS12.
A condition code of 0 is expected.
l. HSISWS12 – Submit the job to drop version 8.1 LKB/LKU segmented table spaces and rename tables
suffixed with _V82 to their original names. Once this job is run where the version 8.1 LKB/LKU table
spaces are dropped, there is no fall back to V8.1 LKB/LKU data. Upon successful completion of the
job, proceed to the next job, HSISWS15.
45
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
m. HSISWS15 – At this point, all Repository and LKB/LKU objects, and data have been migrated to V8.2.
Submit the job to update the Repository database, define new Db2 objects, add new columns and
modify existing columns. These are required for new functions in version 8.2. Upon successful
completion of the job, proceed to the next job, HSISWS16.
A condition code of 0 is expected.
n. HSISWS16 – Submit the job to populate data to the version 8.2 Repository database. Upon successful
completion of the job, proceed to the next job, HSISWS02.
A condition code of 0 is expected.
o. HSISWS02 - Submit the job to display the meta data of the newly migrated version 8.2 Repository, LKB
and LKU objects. Verify that the number of version 8.2 Db2 objects match the expected result.
A condition code of 0 is expected.
5. Backup version 8.2.
a. HSISUT01 – run the version 8.2 job to backup all 46 Repository UTS
b. HSISUT04 – Submit this job to run RUNSTATS for the version 8.2 repository
6. HSISDB02 – Submit the job to drop and create a new GKB database and its dependent objects.
• If you are creating a new version 8.2 GKB database with different GKBDB/GKBZSCHM names, just
submit the job. This creates a new version 8.2 GKB database and its dependent objects.
Use this approach if you have multiple version 8.1 repositories sharing the same version 8.1 GKB
database. See Migration planning and consideration on page 41, step 6 on page 42.
• If you are creating the version 8.2 GKB databse where the GKBDB/GKBZSCHM have identical names to
version 8.1, then uncomment step //*DROPGKB. This will drop the version 8.1 GKB database and create
a new version 8.2 GKB database with the same GKBDB/GKBZSCHM names as version 8.1.
Version 8.2 GKB has new tables, new columns, and columns with expanded column sizes.
• Upon successful completion of the job, proceed to the next job.
Note: Using a version 8.1 GKB level is not supported, as the table layouts are different.
46
Chapter 5. Migrating to IBM Z Software Asset Management Version 8.2
What to do next
After migration, use the following approach to manage the implementation to the new version:
1. You must apply the latest GKB update. This will ensure that all product identifications are up to date when
you run the Inquisitor Import job, HSISIQIM. For each repository, run HSISIQIM for all LPARs before you run
any Usage Import job, HSISUIMP. You can continue to use existing version 8.1 Inquisitor fully-scanned files as
inputs for the version 8.2 HSISIQIM Inquisitor Import job.
2. For each repository, run the HSISIQIM job for every LPAR with setting of FULLREMATCH=Y. For performance
reasons, exclude the Aggregator job step, except for the last HSISIQIM job. Please read the comments in the
"Performance consideration" section of job HSISIQIM job before you proceed.
3. For the last HSISIQIM job, update the Aggregator jobstep with COUNTUSAGEFULL=Y. For example:
Run the last HSISIQIM job with COUNTUSAGEFULL=Y for the Aggregator job step.
4. After running the last HSISIQIM job, in the Aggregator jobstep, set COUNTUSAGEFULL=N (the default setting).
5. Repeat steps 1 to 4 for the next repository.
6. Before you run any Usage Import job, HSISUIMP, you must run the Inquisitor Import job, HSISIQIM, for all
LPARS (as described in step 1). Failure to complete running the Inquisitor Import job ( HSISIQIM) for all LPARs
before you start running Usage Import (HSISUIMP) could result in errors during the Aggregator job step. This
is because product identifications may not be up to date.
For each repository, run the HSISUIMP job for every LPAR. For performance reasons, exclude the Aggregator
job step, except for the last HSISUIMP job. Please read the comments in the "Performance consideration"
section of job HSISUIMP job before you proceed.
a. For the last HSISUIMP job, update the Aggregator jobstep with COUNTUSAGEFULL=Y. For example:
Run the last HSISUIMP job with COUNTUSAGEFULL=Y for the Aggregator job step.
b. After running the last HSISUIMP job, in the Aggregator jobstep, set COUNTUSAGEFULL=N (the default
setting).
c. Repeat steps 6 to 6b for the next repository.
7. Configure APF authorization for the version 8.2 hsi.SHSIMOD1 load library.
8. When the version 8.2 Inquisitor scans and Usage Monitors are ready for use, you can run 8.2 operational jobs
and discontinue version 8.1 tasks.
a. Review the settings in the Inquisitor scan jobs, before submissions:
47
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Note: Usage Monitor job HSISUMON requires z/OS version 2.3, or later.
Make a backup or rename your JCLLIB and PARMLIB data sets. Version 8.2 will use the same dataset names for
JCLLIB and PARMLIB.
1. If your existing version 8.1 Repository database (including LKB/LKU) and GKB use different schema names,
then you need to modify the migration jobs to suit your site requirements.
2. The version 8.2 Usage Monitor job/started task (HSISUMON/HSIJMON) requires a minimum level of z/OS
V2.3 or later. It will fail if run in z/OS V2.2 or earlier.
3. Each SQLite repository with its own GKB and also its own hsi.SHSMOD1 load library should be migrated to
version 8.2 all at the same time. A version 8.2 hsi.SHSIMOD1 load library cannot be used by a version 8.1
repository.
4. Housekeeping:
Perform housekeeping on the version 8.1 Repository database before you start your migration process. This
should reduce the time required to migrate all the data.
a. HSISLDEL - If you have any obsolete LPARs in the repository, you should delete the obsolete LPARs by
running job HSISLDEL.
b. HSISPDEL - TMODULE is one of the biggest tables and it contains modules of which a huge
percentage are in-house programs. To delete obsolete modules (especially in-house programs), refer
to job HSISPDEL. You need to define a date range for deletion and a sample SQL statement is provided
in the job to list date ranges. HSISPDEL deletes modules based on any load libraries that have been
marked deleted.
c. HSISUDEL - TUSEMTD is the largest table. Performing housekeeping on this table should be part of
best practices.
To determine the status of this table, run the following SQL statement:
48
Chapter 5. Migrating to IBM Z Software Asset Management Version 8.2
Next, in the Usage Deletion job HSISUDEL, select the date range for deletion. Follow the instructions in
the job – if you have never deleted before, you should delete Usage records in increments. Do it for all
LPARs. Run the SQL statement again to check the number of outstanding records in TUSEMTD.
A good guideline on the number of records to be retained is to run HSISUDEL monthly for all LPARs
with a fixed set of parameter settings:
KEEPDETAIL=3 (or 6)
KEEPAGGR=12
This will retain detailed Usage records for the current month and the previous 3 (or 6) months, and
summarized records for the current month and the previous 12 months.
5. Continue to run your version 8.1 Usage Monitor job/started task (HSISUMON/HSIJMON), but stop the
Analyzer and do not run any version 8.1 operational jobs during the migration.
Procedure
1. In IBM Z Software Asset Management version 8.2, make a copy of the HSISCUST member in the
hsi.SHSISAMP data set and modify the following parameters:
a. Set the value of the new DBTYPE parameter to SQLITE.
b. Set HSIINST to the same value to the one defined for the existing 8.1 system. As stated in the section,
“Before you begin”, it is imperative that you either backup or rename copies of version 8.1 JCLLIB/
PARMLIB data sets.
c. Set the value of the SYS parameter to the same system that is defined for your existing version 8.1
Repository database.
d. Set the value of the REPZSCHM parameter to the same value that is defined for your version 8.1
Repository database.
e. Set the value of the new GKBZSCHM parameter to the same value that is defined for your version 8.1
GKB database.
f. Set the value of the SQLTZFS parameter to the same value that is defined for your version 8.1 zFS
linear VSAM data set.
g. Set the value of the SQLTPATH parameter to same value that is defined for your version 8.1 path of the
USS directory.
2. Submit the HSISCUST job. The JCLLIB/PARMLIB datasets created use the same names as created in version
8.1. The same dataset names for JCLLIB/PARMLIB must be used in version 8.2 because of the relationships
between the high level qualifier HSIINST parameter and the SQLTZFS/SQLTPATH parameters.
a. SQLTZFS = '&HSIINST..&SYS..ZFS'
b. SQLTPATH = '/u/tadz/&SQLTZFS'
3. Edit and update jobs in the JCLLIB library and parameters in the PARMLIB library if there are special site
requirements.
49
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
a. HSISWS01 - Submit the job to verify whether all database changes have been applied. The comments
section in the job describes a list of version 8.1 PTFs where database changes for the Repository must
be applied. Also this job verifies whether there are records in the TUSEMTD table with column FHWID
having values of 0 (zero).
DO NOT proceed to the next job, HSISWS02, until all database changes for version 8.1 have been
applied. OA56618/UJ00637 is the last PTF from version 8.1 where database changes need to be
applied. This PTF requires significant effort in implementation due to changes in the largest table,
TUSEMTD.
To fix records in the TUSEMTD table with column FHWID having values of 0 (zero), refer to 'Additional
instructions' in the technote at this web address: https://www.ibm.com/support/pages/hold-act-ptf-
uj00637
b. HSISWS02 - Submit the job to display the meta data of the version 8.1 Repository, LKB and LKU
objects. Verify that the number of version 8.1 SQLite objects match the expected result. If the
expected result does not match, DO NOT proceed to the next job, HSISWS13. Investigate why there
are differences. Possible reasons are described in the comments section of the job. Upon successful
completion of the job, proceed to the next job, HSISWS13.
c. HSISWS13 – Submit the job to rename version 8.1 tables to names suffixed with _OLD, create
new tables, and copy data from the renamed tables to the newly created tables. Upon successful
completion of the job, proceed to the next job, HSISWS14.
A condition code of 0 is expected.
d. HSISWS14 – Submit the job to drop obsolete version 8.1 tables. Upon successful completion of the
job, proceed to the next job, HSISWS15.
A condition code of 0 is expected.
e. HSISWS15 – At this point, all Repository and LKB/LKU objects, and data have been migrated to V8.2.
Submit the job to update the Repository database, define new Db2 objects, add new columns and
modify existing columns. These are required for new functions in version 8.2. Upon successful
completion of the job, proceed to the next job, HSISWS16.
f. HSISWS16 – Submit the job to populate data to the version 8.2 Repository database. Upon successful
completion of the job, proceed to the next job, HSISWS02.
A condition code of 0 is expected.
g. HSISWS02 - Submit the job to display the meta data of the newly migrated version 8.2 Repository, LKB
and LKU objects. Verify that the number of version 8.2 objects match the expected result.
A condition code of 0 is expected.
50
Chapter 5. Migrating to IBM Z Software Asset Management Version 8.2
5. HSISDB02 – Submit the job to drop and create a new GKB database and its dependent objects. Before
submitting this job, uncomment step //*DROPGKB. This will drop the version 8.1 GKB database and create a
new version 8.2 GKB database. Version 8.2 GKB has new tables, new columns and columns with expanded
column sizes. Upon successful completion of the job, proceed to the next job.
A condition code of 0 is expected.
6. HSISGKBL – Submit the job to populate the newly created version 8.2 GKB database. A GKB level is shipped
with this migration. To download the latest GKB level, refer to topic Updating the Global Knowledge Base on
page 54.
Note: Using a version 8.1 GKB level is not supported, as the table layouts are different.
HSISUT01 – run the version 8.2 job to backup the SQLite database.
8. Recovery – If failures occur during the migration, and a recovery is required, run the version 8.1 job, HSISUT02
to recover using the backup copy created just before the start of migration.
What to do next
See section "What to do next" on page 47 in topic Migrating from version 8.1 to Version 8.2 (Db2 database) on
page 41.
Reason:
New tables and columns have been defined in version 8.2 GKB.
Solution:
a. HSISDB02 - run this job to drop the version 8.1 GKB and create a new version 8.2 GKB.
b. HSISGKBL - run this job to populate the version 8.2 GKB database.
2. Running V8.1 HSISIQIM (IQ Import) with V8.2 GKB
=ERROR= SELECT
"FPRODUCTID","FPRODUCTNAME","FOPTIONNAME","FVENDORID",
"FCATEGORY","FDESCRIPTION","FPRODSTATUS" FROM
51
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
TFREPZ8.TPRODUCT
WHERE FPRODUCTNAME = ? AND FOPTIONNAME = ?
m_hstmt=17 IsOpen()=0 m_rc=-1 autocommit=0
ERROR -- RC = -1 Reported from //'HSI810S.FMPROM.C(CLIRS)', line 385
----------
SQLSTATE: 22001
Native Error Code: -302
{DB2 FOR OS/390}{ODBC DRIVER}{DSN12010}
DSNT408I SQLCODE = -302,
ERROR: THE VALUE OF INPUT VARIABLE OR PARAMETER
NUMBER 1 IS INVALID OR TOO LARGE FOR THE TARGET COLUMN
OR THE TARGET VALUE
Reason:
Version 8.2 GKB columns defined with expanded sizes contain data that are too large to be processed by the
version 8.1 code.
Solution
Reason:
Solution:
Reason:
Solution:
Version 8.1 Usage Import must use version 8.1 Usage files.
52
Chapter 5. Migrating to IBM Z Software Asset Management Version 8.2
Note: It is much easier to migrate SQLite from version 8.1 to version 8.2 (fewer migration steps) after
data has been ported.
Note: It is much easier to migrate SQLite from version 8.1 to version 8.2 (fewer migration steps) after
data has been ported.
2. Unload data from version 8.2 (SQLite database). Use member HSISUN82 in JCLLIB.
3. Define a new Db2 Repository database in version 8.2.
4. Load data into the newly created Db2 Repository database with input from step 2. Use member HSISLO82 in
JCLLIB.
5. After successful migration, refer to instructions in What to do next on page 47.
53
Chapter 6. Collecting and importing data with IBM Z
Software Asset Management
IBM Z Software Asset Management includes programs that collect system and usage data, import, filter, and match
this data, update the Repository tables, and make the data available for review and query.
Procedure
1. Go to the ShopzSeries site and order the latest GKB PTF.
2. Use SMP/E to install the PTF. Follow the instructions specified in HOLD ACTION, if any.
3. In the GKB load job, HSISGKBL, update the SET INDSN= value with the name of the library updated by SMP/E,
and then submit the job.
Related information
Importing Inquisitor data on page 112
54
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Procedure
1. In the HSISINQZ job, check the values for the following parameters and change if necessary:
• The ALLMSG parameter requests both DSNMSG and PGMMSG message logging.
• The PLX parameter is set to N (no). Run with this setting on all systems even if you later plan to use
PLX=Y for future scheduled scans.Review information about the PLX parameter before you use
PLX=Y.
• The PACK parameter is set to 1 to request that zipped output is written using the fastest level of the
deflate algorithm. Higher values up to 9 can be used for better compression, but they will use more
CPU time. Specify PACK=0 if use of the shrink zip algorithm is required.
• The LLQ parameter is set to Z&SMF. You can change this value if you want to generate data sets with
unique names without changing the JCL library.
These values are set when the HSISINQZ job is created.
2. In the program parameter string, you can specify a report message level and an override to the system
identifier. Use commas to separate the various settings specified within the program parameter string.
3. Run the HSISINQZ job.
Plan your Repository to receive scans of system identifiers (SIDs) containing libraries that are unique in library
name and volume, except when identically-named libraries are copies or are shared. If you have libraries that are
identical in library name and volume name but are intended to have different content, place these libraries in different
Repositories so that they can be processed separately.
If a library with the same library name and volume name is encountered in different SID scans, the Inquisitor Import
considers the first instance that it encounters on the first SID to be the base. The Inquisitor Import treats any
subsequent instances on different SIDs as mirrors.
The locations of all SIDs for a given library are recorded, but module discovery information is only calculated and
stored when the library is encountered on its base SID. This approach ensures consistency in matching if the copies
are not synchronized. The approach also saves processing time when SIDs are identical. If the Inquisitor Import
encounters mirror libraries, it displays their names, current SIDs, and base SIDs in the log file, and reports their
number at the end of the run.
If an SID is decommissioned and is no longer available for scanning, you can run the system deletion job to remove
the SID and any libraries, modules, and products that are exclusively attached to the deleted SID. For shared libraries,
only the record of the library that is attached to the specified SID is removed. The contents of the library are then
attached to the subsequent SID in the list which then functions as the base SID.
55
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
If the PLX=Y option is specified during the Inquisitor run, the Inquisitor Import applies the results of the scan from the
Inquisitor file to all SIDs that were previously processed and share the same sysplex ID with the SID in the Inquisitor
file. An existing library is processed on its base SID but is recorded as seen on all SIDs of the sysplex. A new library is
processed on the current SID which becomes its base SID and is recorded as seen on all SIDs of the sysplex.
The Inquisitor Import requires that the Inquisitor file is more recent than any Inquisitor file that it previously processed
for the same SID. If you specify the PLX=Y option during the Inquisitor scan, the Inquisitor file must be more recent
than previously processed files of all SIDs of the sysplex.
The default value for the PLX parameter is N (no). If you intend to use the PLX=Y option to save scanning time, you
must scan all SIDs at least once and present all the scans to the Inquisitor Import, so that it can determine how the
different SIDs are shared.
When you specify the PLX=Y option, the Inquisitor Import processes the file in the following manner:
• Treats the content of all SIDs that share the sysplex ID with the currently-scanned SID as being identical to
each other.
• Applies the scan results to all SIDs of the sysplex.
Because the Inquisitor Import process does not verify that all SIDs are identical, incorrect results can occur if the
SIDs of the sysplex have different content. Use the PLX=Y option only if you are sure that all SIDs of the sysplex are
identical in content at the time of the scan.
Parameter Description
DSNMSG Requests that messages relating to processed data sets, which might otherwise be suppressed, are
to be logged in the SYSPRINT report.
PGMMSG Requests that messages relating to processed programs, which might otherwise be suppressed, are
to be logged in the SYSPRINT report.
NOVSR Specifies that volume statistics reports normally generated from VTOC-scanning requests are not to
be written.
NOEAR Specifies that the execution activity report normally present at the end of the SYSPRINT output is not
to be written.
NOAPF Specifies that the Inquisitor is to run in an environment which is not APF authorized.
56
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Parameter Description
NOHOST Requests that the call to HSIPHOST to collect the TCPIP host name and IP address is bypassed.
OLDTAG Specifies that tag data members created by program HSITAGP will not be ignored, but should be
processed so that the tag data can be imported into the LKB.
SID= The value is up to 4 characters long, and specifies the system identifier to be contained in the data
output from the Inquisitor. If the SID identifier override is omitted, the system SMF identifier is used.
The SID parameter setting is used when the SMF system identifier of a system is not unique. For ex
ample: SID=SYS2
PLX= The parameter is used to identify if the Inquisitor data being collected is part of a SYSPLEX with fully
shared DASD. The value is either Y or N.
If the PLX parameter is not used, the default value of N is created in the Inquisitor header record.
PLEX The value is up to 8 characters long, and specifies the sysplex identifier to be contained in the data
NAME= output from the Inquisitor. If the PLEXNAME identifier override is omitted, the actual sysplex name
is used. The primary purpose of the PLEXNAME parameter is to provide a means for controlling the
scope of sysplex-wide inventory updates.
PACK= The value is a single decimal digit (0-9) and specifies the level of compaction that will be used to
write zipped output. The value of 0 specifies that shrink will be used. Values in the 1 to 9 range spec
ify the compaction level of deflate to be used. PACK=1 is the program default.
LLQ= This parameter is used to specify a suffix string made up of one or more data set name qualifiers to
be appended to the data set name of the HSIPZIP and HSIPOUT data set. Its maximum length is 44
characters. It may contain both static and dynamic system symbols, and the user symbols &SMF.
(SMF system identifier) and &SYSLPAR. (LPAR name) supplied by the Inquisitor. Use the LLQ setting
when you need to create uniquely named data sets without changing the JCL.
Filename Description
TAGREP An optional report file that summarizes tag data collected by the Inquisitor.
SYSIN A mandatory request input file. It processes fixed length, variable length, and undefined record
formats. Records shorter than 72 bytes will be logically extended by the Inquisitor with blanks.
HSIPZIP An optional output file that contains compressed Inquisitor data. It is written using a variable
length record format. You must provide DCB information to ensure optimal use of DASD space. In
the case where HSIPOUT is not allocated and HSIPZIP processing encounters an S213-C8 abend,
the Inquisitor will attempt to write uncompressed output to this file, overriding the LRECL as ap
propriate.
57
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Filename Description
HSIPOUT An optional output file that contains uncompressed Inquisitor data. It is not specified in the
packaged sample, as the use of HSIPZIP is preferred, due to its reduced space requirements.
HSIPOUT also contains variable length records. The program supplies the appropriate LRECL. By
default, system determined block size is used.
If you want to direct the Inquisitor output to a compressible extended-format data set, then you
should use the HSIPOUT file. The HSIPZIP file employs update-in-place processing, which pre
vents the use of DFSMS™ compression.
MCDS An optional file that allocates the DFHSM MCDS data set, and is required if any requests con
tain the REMIGRATE or NOML2 operands. Further, if supplied for other requests, you can use it
to avoid recalling data sets which are not load libraries. If the DFHSM MCDS is spread over more
than one data set, use the DD names MCDS2, MCDS3, and MCDS4 consecutively. This allocates
all the MCDS data sets in key range order.
ABRIN An optional SYSIN file belonging to the FDRABRP utility program that is required if any requests
contain the ABRMIG or ABRARC operands. It is primed by the Inquisitor during execution. For this
reason, a single track VIO file is an ideal allocation.
ABRPRINT An optional SYSPRINT file belonging to the FDRABRP utility program that is required if any re
quests contain the ABRMIG or ABRARC operands. It is an output-only file, and is not processed by
the Inquisitor.
SYSIN commands
The Inquisitor program uses the SCANCMD, SCANDIR, and SCANPGM SYSIN commands that are described in the
following table.
Command Description
SCANCMD Allows command syntax and operand consistency to be checked by the Inquisitor without initiating
an actual scan for program libraries. It performs a parse only operation, although output files are
opened.
Error messages relating to syntax and operand errors are produced as usual. This verb is useful if
you are formulating the best request combination when implementing on any given system.
58
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Command Description
SCANDIR Collects data from program library directory entries. Contents of program members are not ac
cessed.
Compared to SCANPGM, its reduced data collection allows it to run faster. Although all syntactical
ly correct operands are allowed, some operands relating to data from member contents are ignored
during processing. SCANDIR collects all of the information needed for automated software identifi
cation, and is the command of choice for a production environment.
SCANPGM Collects all data collected by SCANDIR, and information from member contents. Such information
relates to program structure and history.
Use SCANPGM without FULLIDR if you want to collect PDS load module link edit dates and can tol
erate the additional I/O and elapsed time of the scan.
Use SCANPGM with FULLIDR to collect LE compiler details. This is not recommended for ongoing
system-wide scans.
IBM support might request SCANPGM output data to assist with problem diagnosis and resolution.
SCANDEV Collects information about the input and output (I/O) configuration of the z/OS® system including
online I/O devices, control units, and related channel path connectivity. The SCANDEV command
has no operands.
The Inquisitor can process multiple requests in a single program run. The output of these requests is contained in the
same file.
This syntax diagram shows the SYSIN commands and their operands.
59
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
PGM
XPGM SG
XSG
This operand specifies one or more 1 to 44 byte data set name masks. Only data sets with names
matching any masks specified here are processed. Data sets with names not matching any masks
specified here are not processed. Multiple masks must be separated by one or more delimiters. This
operand can be specified more than once in a request, whereupon all masks specified in all occurrences
of this operand are checked for selection matching. The precise treatment of asterisks in these masks
is altered by the presence of the CATALOG keyword in the request. When CATALOG is specified, mask
matching becomes qualifier aware and a single asterisk represents one, or part of, one qualifier only.
When CATALOG is specified, use a double asterisk to specify any number of qualifiers. The data set
name selection mask is the only mask affected by the CATALOG keyword. When the CATALOG keyword
is present, exactly one DSNAME mask must be specified.
This operand specifies one or more 1 to 44 byte data set name masks. Data sets with names matching
any mask specified here are not processed. Multiple masks must be separated by one or more
delimiters. This operand can be specified more than once in a request, whereupon all masks specified in
60
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
all occurrences of this operand are checked for exclusion matching. If this operand is used, each mask
must specify a subset of a DATASET mask.
VOLUME
This operand specifies one or more 1 to 6 byte volume serial number masks. Only volumes with
serial numbers matching any mask specified here are processed. Volumes with serial numbers not
matching any mask specified here, are not processed. Multiple masks must be separated by one or
more delimiters. This operand can be specified more than once in a request, whereupon all masks
specified in all occurrences of this operand are checked for selection matching. A volume serial number
mask of six asterisks specifies the current IPL volume, which is ascertained during execution.
XVOLUME
This operand specifies one or more 1 to 6 byte volume serial number masks. Volumes with serial
XVOLUME
numbers matching any mask specified here are not processed. Multiple masks must be separated
by one or more delimiters. This operand can be specified more than once in a request, whereupon all
masks specified in all occurrences of this operand are checked for exclusion matching. If this operand
is used, each mask must specify a subset of a VOLUME mask. A volume serial number mask of six
asterisks specifies the current IPL volume, which is ascertained during execution.
DEVICE
This operand specifies one or more 1 to 4 byte device number masks. Only volumes with device
numbers matching any mask specified here are processed. Volumes with device numbers not matching
any mask specified here, are not processed. Multiple masks must be separated by one or more
delimiters. This operand can be specified more than once in a request, whereupon all masks specified
in all occurrences of this operand are checked for selection matching. Standard character string mask
matching is used. The use of characters which are not hexadecimal digits will not be detected by the
program.
XDEVICE
This operand specifies one or more 1 to 4 byte device number masks. Volumes with device numbers
matching any mask specified here are not processed. Multiple masks must be separated by one or
more delimiters. This operand can be specified more than once in a request, whereupon all masks
specified in all occurrences of this operand are checked for exclusion matching. If this operand is used,
each mask must specify a subset of a DEVICE mask. Standard character string mask matching is used.
The use of characters which are not hexadecimal digits will not be detected by the program.
This operand specifies one or more 1 to 8 byte program name masks. Only programs with names
matching any mask specified here are processed. Programs with names not matching any mask
specified here, are not processed. Multiple masks must be separated by one or more delimiters. This
operand can be specified more than once in a request, whereupon all masks specified in all occurrences
of this operand are checked for selection matching.
61
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
This operand specifies one or more 1 to 8 byte program name masks. Programs with names matching
any mask specified here are not processed. Multiple masks must be separated by one or more
delimiters. This operand can be specified more than once in a request, whereupon all masks specified in
all occurrences of this operand are checked for exclusion matching. If this operand is used, each mask
must specify a subset of a PROGRAM mask.
STOGROUP Alias: SG
This operand specifies one or more 1 to 8 byte storage group name masks. SMS-managed volumes in a
storage group with a name matching any mask specified here are processed. SMS-managed volumes in
a storage group with a name that does not match any mask specified here, are not processed. Multiple
masks must be separated by one or more delimiters. This operand can be specified more than once in
a request, whereupon all masks specified in all occurrences of this operand are checked for selection
matching. Volumes which are not SMS-managed are not processed unless the NONSMS keyword
operand is specified.
This operand specifies one or more 1 to 8 byte storage group name masks. SMS-managed volumes
in a storage group with a name matching any mask specified here are not processed. Multiple masks
must be separated by one or more delimiters. This operand can be specified more than once in a
request, whereupon all masks specified in all occurrences of this operand are checked for exclusion
matching. If both this mask and a STOGROUP mask are used, then each mask must specify a subset of
a STOGROUP mask.
NONSMS
This keyword operand specifies that volumes which are not SMS-managed are eligible for processing.
The presence of this operand means that SMS-managed volumes are not processed unless the
STOGROUP operand was used to supply a storage group name mask.
LINKLIST
This keyword operand specifies that all link list data sets are to be unconditionally included for
processing.
AUTHLIBS
This keyword operand specifies that all APF authorized data sets are to be unconditionally included for
processing.
NOALIAS
This keyword operand specifies that any program member marked as an alias is to be excluded from
processing.
CATALOG
This keyword operand specifies that data sets to be processed are located from a catalog search rather
than VTOC searches. Data set alias names are not processed. The Inquisitor triggers and waits for a
62
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
RECALL operation for each migrated data set which passes data set name mask processing, unless
NORECALL is also specified.
NORECALL
This keyword specifies that migrated data sets are not to be recalled and are excluded from processing.
This operand only has effect when the CATALOG operand is also specified. Data sets with a catalog
entry indicating a volume serial number of MIGRAT, or ARCIVE, are deemed to be migrated.
FULLIDR
This keyword operand specifies that a full scan of CESD and IDR records is to be performed, even when
a module would not have been selected for such processing. Depending upon the exact nature of the
request being run, this operand can significantly elongate the elapsed time of Inquisitor runtime.
REMIGRATE
This keyword operand specifies that when a data set which had to be recalled has been processed,
DFHSM is requested to migrate the data set again asynchronously. Migrated data sets can only be
processed when the CATALOG operand is also specified. Only data sets with a catalog entry indicating a
volume of MIGRAT are remigrated.
The presence of this operand requires that the MCDS file is allocated to the DFHSM MCDS. Access to
the MCDS allows the Inquisitor to avoid recalls for data sets which are not partitioned, do not have an
undefined record format, and do not have a block size of at least 1024.
NOML2
This keyword operand specifies that data sets migrated to level two are not to be recalled and are
excluded from processing. Migrated data sets can only be processed when the CATALOG operand is
also specified. Only data sets with a catalog entry indicating a volume of MIGRAT are checked for level
two status.
The presence of this operand requires that the MCDS file is allocated to the DFHSM MCDS. Access to
the MCDS allows the Inquisitor to avoid recalls for data sets which are not partitioned, do not have an
undefined record format, and do not have a block size of at least 1024.
ABRMIG
This keyword operand indicates that when a catalog entry with a volume of MIGRAT is encountered, the
FDRABR product is to be invoked to determine whether a recallable archived copy of the data sets is
available or not. If it is, then the data set is processed. If not, then the data set is not processed.
The presence of this operand requires that the ABRIN and ABRPRINT files are allocated.
63
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
ABRARC
This keyword indicates that, when a cataloged data set cannot be found on the volume, the FDRABR
product is to be invoked in order to determine whether a recallable archived copy of the data set is
available. If it is, then the data set is processed. If not, the data set is not processed.
The presence of this operand requires that the ABRIN and ABRPRINT files are allocated.
NOTAGDATA
This keyword indicates that data written to program libraries by the Product Tagger is not to be
collected and written to the Inquisitor output file. Use this operand only when you do not want to update
the Local Knowledge Base during the import process with the latest Tagger data that could be found by
the Inquisitor.
MAXTASKS
This operand specifies the maximum number of VTOC-scanning subtasks to be activated by the
Inquisitor. These subtasks reduce the elapsed time of an Inquisitor scan by enabling the concurrent
processing of multiple volumes. Reducing the number of subtasks reduces the demand on storage in
the region and does not impact performance unless the main task has to wait longer for VTOC scan
results. The operand value is a decimal number in the 1 to 200 range. The default value is 10. The actual
number of subtasks used does not exceed the number of volumes to be scanned. Too high a value may
impact critical applications due to I/O queuing. VTOC-scanning subtasks are not used for CATALOG
requests.
LIBMAINTASK
This keyword specifies that all library scan processing is to be carried out by the main task. Without this
operand being specified, VTOC-scanning subtasks may scan PDS (but not PDSE) libraries for SCANDIR
(but not SCANPGM) requests, which has the benefit of further reducing the elapsed time of the scan.
Data collected by subtasks is held in region storage until it is processed by the main task, and SCANDIR
collects a much smaller volume of data than SCANPGM. The main task uses DESERV FUNC=GET_ALL
to read directories, whereas subtasks use QSAM which allows for efficient processing of corrupt PDS
directories.
APISUBTASK
This keyword specifies that Program Binder API calls issued to process PDSE program objects during
a SCANPGM FULLIDR request are to be performed by a subtask. Various conditions can cause Binder
API calls to abend, and if such an abend occurs under the main task then Inquisitor processing is
abnormally terminated. The main task can be insulated from such abends by attaching subtasks to
perform the Binder API calls. Even if such subtasks abend, the main task can continue processing and
should be able to complete a successful scan, provided that abending subtasks have not corrupted
storage owned by the main task. Specifying this keyword will somewhat increase CPU overhead of a
64
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
SCANPGM FULLIDR request, so its use is only recommended when it is known that such abends will be
encountered and need to be tolerated.
INUSEWARN
This keyword specifies that failure to scan a data set because it was exclusively allocated to another job
is to raise a warning condition instead of an error condition. When a data set scan attempt receives a
DARC of hex 210, message HSIP092I is issued and the data set is queued for later retry. After the scan
request is complete, queued data sets are reprocessed, and one of the messages HSIP093I (successful
retry), HSIP094W (failed retry with INUSEWARN) or HSIP095E (failed retry without INUSEWARN) is
issued, as appropriate.
65
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Inquisitor examples
These examples show some possible scenarios where you can customize the scope and type of processing when
you run the Inquisitor program.
Example 1
These three statements are equivalent, and request data collection for all programs on all online DASD volumes.
SCANDIR
SCANDIR DA(*) PGM(*)
SCANDIR VOL(*) DS(*)
Example 2
To scan all SMS-managed volumes except volumes in storage group SGWORK use:
Example 3
To scan all volumes except volumes in storage groups with names beginning with SGW use:
Example 4
To scan all volumes with serial numbers beginning with TSO and WRK, these two requests are used in a single
program run:
SCANDIR VOLUME(TSO*)
SCANDIR VOLUME(WRK*)
Example 5
To scan all volumes except those with serial numbers beginning with TSO and WRK use:
Example 6
To scan all volumes with serial numbers beginning with USR which are also in SMS storage groups with names
beginning with SG for programs with names beginning with UTIL, use: .
Example 7
To scan all data sets with high level qualifiers of SYS1, SYS2, SYS3, except z/OS® distribution libraries, use:
Example 8
To restrict the data in the previous example to cataloged data sets, use:
66
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Note: Note the extra asterisk in the data set name selection mask. Without this, only data set names with two
qualifiers are selected. Data set name exclusion processing is not changed by the CATALOG operand.
Example 9
To scan the current IPL volume, and any other linklist and APF authorized libraries use:
Example 10
To scan the single cataloged data set SYS1.PPLIB without a lengthy DASD subsystem scan use:
Example 11
To scan all cataloged SYS1 and SYS2 data sets use (a) two requests in a single program run, or (b) a single request.
The two approaches exhibit similar resource consumption:
The XDSN values are coded as shown under the assumption that SYS1, SYS2, SYS3, SYS4 and SYSA are the only 4
character high-level qualifiers beginning with SYS on the system being scanned.
Example 12
These examples are all equivalent. They scan the entire DASD subsystem for all data sets with a first qualifier of SYS1
or SYS2, excluding those with a second qualifier beginning with A.
(a)
(b)
SCANDIR DA(SYS1.* +
SYS2.*) +
XDA(SYS1.A* +
SYS2.A*)
(c)
SCANDIR DA(SYS1.*) +
DA(SYS2.*) +
XDA(SYS1.A*) +
XDA(SYS2.A*)
(d)
67
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(e)
It can be difficult to formulate a system scan into a single CATALOG request, meaning that when the CATALOG
operand is used, multiple requests are coded. Ensure that no data set will be scanned by more than one SCANDIR
CATALOG request by excluding as many data set name patterns from each request as necessary. Data set name
exclusions may not be necessary if all CATALOG search selection masks represent disjoint parts of the name space.
The example shown here uses the XDA operand to prevent SYS1.LINKLIB from being scanned more than once:
As well as using the selection and exclusion facilities to ensure completeness, they can also be used to improve
performance and efficiency by excluding DASD volumes which do not contain program libraries. Although a volume
with no program libraries can be scanned quickly, processing duration might be reduced if such volumes can be
excluded from an Inquisitor scan.
For example, volumes that only contain databases, or temporary data sets, do not have any files suitable for Inquisitor
processing, but the VTOCs of those volumes are still read unless excluded by the appropriate selection criteria.
To illustrate this further, consider a system with these DASD subsystem usage elements:
System platform
Storage group TEMP containing temporary and short-lived (two days) permanent files.
requests
poolInquisitor
work
TSO
Non-SMS volumes DBA001 to DBA099 and SMS storage groups DB01, DB02, and DB03.
requests
databasesInquisitor
The scanning of this configuration is to be carried out with the following assumptions:
• No need for data from libraries that do not exist for more than two days.
• No program libraries on database volumes.
• Applications combine their program libraries and non-database files.
68
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
To acquire Inquisitor data from all useful sources without processing volumes more than once, and without
processing irrelevant volumes, you can specify multiple requests in a single Inquisitor run. For example:
SCANDIR SG(SYSTEM)
SCANDIR SG(TSO*)
SCANDIR SG(BATCH*)
SCANDIR NONSMS XVOL(DB*)
This can be consolidated into a single request giving the same result. For example:
If it is important to collect the bind dates of PDS load modules, then the SCANPGM verb can be used instead of
SCANDIR. However, because SCANPGM reads multiple blocks for every member, the elapsed time required to scan
each PDS library will increase by several hundred percent.
To perform maximum data extraction from every scanned program, use the SCANPGM verb with the FULLIDR
keyword. This combination will greatly increase the elapsed time it takes to scan PDSE libraries as well as PDS
libraries, so it is not normally expected to be used.
The data that can be tracked for each compile unit within a scanned program includes:
69
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Because of the additional resource consumption of a SCANPGM FULLIDR request over the usual SCANDIR request,
it is not anticipated that a full system scan would be performed to collect this data, but rather a scan targeted
to relevant application program libraries. The data from this limited scan would be used to form a purpose-built
repository where data base queries can be used to extract information of interest.
When the time comes to update the system’s LE compile application status, the repository would be deleted and
recreated from a new targeted scan. To ascertain usage history data for these application programs, relevant queries
would be directed to the main system repository where the usage data is imported.
When the keyword CATALOG is specified in a request statement, the Inquisitor passes the data set name selection
mask to the Catalog Search Interface (CSI) to search for the catalog entries. It is possible that one or more of the
catalog entries returned by the CSI are for a data set that has been migrated. In contrast, VTOC scans do not find
migrated data sets.
Inquisitor processing of migrated data sets found by the CSI involves dynamic allocation which then triggers the
recall of the data set. Recalls increase Inquisitor processing time. The processing leaves the data set in a recalled
status.
The Inquisitor looks at the volume serial number in the catalog entry to determine if a data set is migrated or not. A
data set is considered to have been migrated if its catalog entry indicates a volume serial number of either MIGRAT or
ARCIVE.
To suppress the processing of all migrated data sets, specify the NORECALL keyword on each Inquisitor request.
For systems with DFHSM space management functions, you can use the request keywords NOML2 and REMIG. The
MCDS file allocation is a prerequisite for using the following keywords:
NOML2
Specifies that data sets migrated to level 2 are excluded from the scan.
70
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
REMIG
Specifies that after a recalled data set is processed by the Inquisitor, the Inquisitor requests DFHSM to
remigrate the data set. The Inquisitor does not wait for the migration to complete, but begins to process
the next data set immediately after making the request to DFHSM. Migration level 2 is never specified
by the Inquisitor for the migration, even if the data set was recalled from ML2. (However, it might be
selected by DFHSM as a result of SMS management class settings.)
Note:
Any combination of REMIGRATE, NOML2, and NORECALL is valid. Specifying NORECALL means NOML2 and
REMIGRATE have no effect.
In the case where you want to scan all relevant migrated program libraries and do not want any such libraries
explicitly remigrated afterward, you would not code any of the NORECALL, NOML2 and REMIGRATE keywords. In this
instance, the MCDS file allocation, though optional, can still be used to great advantage.
To exclude generation data sets from a VTOC scan request, specify a suitable data set exclusion mask, for example:
XDA(*.G%%%%V00)
Program libraries are identified by their data set name and the volume serial number of the disk on which they reside.
Program usage is attributed to these libraries in the data base. Historical usage trends can be built up over time
for these software libraries. However, when a software maintenance cycle causes a program library to be replaced
by a newer version of the library on a different volume, or when DFHSM processing causes a program library to be
relocated to another volume, the historical connection with the usage of the library on the original volume is lost.
For example, upgrading the system platform with a new set of volumes would mean that reporting the long-term
usage trend for a particular program such as IDCAMS from the SYS1.LINKLIB library requires generating several
reports instead of one, even though the active SYS1.LINKLIB data set may have always resided on the IPL volume.
To counteract this, an optional facility is available where physical DASD volumes as seen by z/OS can be mapped
to logical volume sets which persist beyond the time individual physical volumes are part of that logical set. With
this approach, historical connections are maintained for functional program libraries which are relocated as DASD is
reorganized and renewed.
71
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
The mapping is achieved by supplying simple assignment statements in a sequential file allocated using the
HSIDAMAP file name. This file is processed by the HSIPVMAP program. HSIPVMAP is called by the Inquisitor and by
the Usage Monitor writer task to translate the selected real volume serial numbers to specified 6-character strings to
be considered as the volume serial numbers in data base and report processing.
The assignment statements consist of a left side, an equals sign, and a right side. Volume serial numbers
encountered in the collected data which match the left side are converted to the string on the right side. The
statements are processed in the order they exist in the HSIDAMAP file, and so the earliest matching statement will be
used.
It is important that both the Inquisitor and the Usage Monitor process that same volume logical mapping
assignments so that usage can be attributed to discovered inventory. The Usage Monitor writer task will process
the HSIDAMAP file at the end of each collection cycle, so there is no need to recycle or refresh the Usage Monitor to
activate updates to the file.
Real volume serial numbers are selected based on the left side of the assignment statement, and replaced in the
data with the value specified on the right side of the assignment statement. Generic masking characters and system
symbols may be used to generalize the mapping process so that the statements do not have to always be updated as
scheduled volume reconfigurations occur.
Historical note: Users of older releases may recall the SYMVOL operand of SCANDIR, and the SYM(Y) setting of
the Usage Monitor, both of which are now defunct. These allowed volume serial numbers to be represented by their
symbol names. This function can be replicated using volume mapping by specifying the symbol name with two
leading ampersands on the right side of an assignment statement. However, such usage of logical volume mapping
is not supported unless the symbol represents the same physical volume on all relevant systems. This last restriction
points to why SYMVOL and SYM(Y) were removed.
The Inquisitor program HSIPINQ allows PLX=Y to be specified in its program parameter. This setting instructs Usage
Import to match usage to inventory using the SYSPLEX name instead of the system identifier. This feature provides
for eliminating regular Inquisitor scans on multiple systems which share the same DASD configuration. That is, after
initial scans from all systems, PLX=Y allows future scans from a single system to keep the inventory up to date for all
systems in the same SYSPLEX with a DASD configuration exactly matching (or entirely contained within) the DASD
configuration of the primary system on which the DASD scans are to be performed on an ongoing basis.
The use of the logical volume mapping facility does not alter PLX setting requirements since PLX=Y is still
permissible if all volumes are mapped to the same logical volume set on all relevant systems.
However, in cases where volume mapping depends on specific volume uses (such as IPL volume) and those uses are
not the same across all relevant systems (such as the IPL volume is not shared by all relevant systems), the use of
PLX=Y is not supported.
If you add new volume mapping statements which apply only to volumes not yet processed, then this is equivalent
to setting up the statements before performing any DASD scan or usage data collection, and so there is no data
72
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
inconsistency. Similarly, it is safe to remove statements which apply only to volumes which have been permanently
removed from the DASD subsystem.
However, introducing logical volume mapping assignment statements which change the mapping for volumes which
have already been processed is equivalent to relocating the libraries on those volumes to new volumes. That is, the
historical connection with previous usage of those libraries will be broken.
In such a case, usage already assigned to previously unmapped volumes will be lost. There is currently no
mechanism to transfer previously accumulated usage across to the new mappings.
A data set name is unique within the scope of a single DASD volume. Logical volume mapping allows multiple data
sets with the same name to appear to reside on the same DASD volume. Many-to-one mappings result in a loss of
detail that cannot be exposed by subsequent reporting. This information loss may be acceptable if it improves the
reportability of other information such as trends over time which may be requested by local management. Make sure
you have thought out all the consequences of this before implementing such a mapping scheme.
For example, consider the scheme where all z/OS IPL volumes were labelled as RESvri where v is the version, r is the
release, and i is the iteration. So, the ninth iteration of the z/OS 2.3 IPL volume is labelled RES239, and RES1DG would
be the label of the sixteenth iteration of the z/OS 1.13 IPL volume.
The mapping RES*=<Z/OS> might be intended to preserve usage data for libraries such as SYS1.LINKLIB, but what
else flows from this? For a start, data sets from all IPL volumes will appear to contain software from the latest z/OS
release that is found on DASD, even though much of it will be from a different release, and possibly from a different
version. This is because the latest level is always assigned when there are multiple levels that fit the data.
Mappings of RES1*=Z/OSV1 and RES2*=Z/OSV2 will at least allow identifying the correct program product or
version, but accurate tracking of specific releases is still not possible.
RES1D%=Z/OS1D
RES21%=Z/OS21
RES22%=Z/OS22
RES23%=Z/OS23
RES24%=z/OS24
This mapping set would allow each release of z/OS to be separately identified with each release’s software usage
being tracked. Volumes at different maintenance levels of the same release would be treated as a single volume, but
this may be an acceptable loss of detail to make longer usage trends available for reporting.
Now consider grouping the usage by system rather than by OS release. The mapping &SYSR1.=<&SMF.> will preserve
usage history for the data sets on each system’s IPL volume no matter how frequently the IPL volume is cycled to a
new maintenance level. As IPL volumes are switched and a new DASD scan is imported, the software levels recorded
in the data base will be updated, but usage trend reports can still include data from older software levels. Such a
mapping scheme could be extended to platform volumes if local volume serial naming conventions are suitable.
Bear in mind that if a program is used via a STEPLIB to a data set on an IPL volume which is not the system’s current
IPL volume, then that usage will be recorded against the real volume serial (assuming no other active mappings
applied), but that will be correctly attributed to the software inventory from the DASD scan performed on the same
system with the same set of logical volume mappings. In this scenario, each system would require a DASD scan
73
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
on an ongoing basis (that is, PLX=Y would never be used) because the systems sharing the DASD would not have
identical mappings.
When called by the Inquisitor or the Usage Monitor, the HSIPVMAP program accesses the logical volume mapping
file via the HSIDAMAP data definition (DD). The logical volume mapping facility is only used if the HSIDAMAP file
allocation is present, and if the file contains valid volume symbol mapping assignment statements, and if any of these
statements apply to volumes being processed. There are no specific Inquisitor or Usage Monitor parameters, settings
or statement keywords which control this facility.
The assignment statements in the HSIDAMAP file consist of a left side character string specifying the volume
serial numbers which will be replaced by the statement's operation, an equals sign, and a right side character string
specifying the volume serial number to be imported into the data base.
• Data from a record located after a blank or after column 72 (whichever comes first) is discarded before
validation. The remaining data is referred to as active text in the points below.
• Because of the first point, all statements must start in column 1.
• No continuations across record boundaries are allowed.
• Active text without an equals sign is treated as a comment.
• All active text non-display characters are translated to periods. (EBCDIC code points in the x'40' to x'FE' range
deemed to be display characters.)
• DBCS is not supported. DBCS characters cannot be used in volume serial numbers.
• If an ampersand is present in the active text then the system symbol substitution routine is called to perform
symbol resolution.
• If the left side and/or the right side evaluate to a string longer than 6 characters then the first 6 characters will
be used.
• If the left side and/or the right side evaluate to a string shorter than 6 characters then the string will be
extended with blanks to a length of 6 characters.
• The first or only equals sign must be followed by a non-blank. (There is nothing to stop the use of an equals
sign in the right side character string.) That is, the right side cannot be a null string.
• Generic masking characters can only be used on the left side. These characters are treated as literals if used
on the right side.
• The generic masking characters are a percent sign for any single character and an asterisk for any group of
zero or more characters.
• If the left side evaluates to six asterisks, it will be replaced by the current IPL volume serial number.
• Symbols are allowed in the left side and the right side character strings.
• System symbols plus the symbols &SMF (SMF system identifier) and &SYSLPAR (LPAR name) can be used.
Note that &SYSLPAR may resolve to a null string if z/OS is running in a virtual machine.
74
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
• Do not use an ampersand character unless it is to denote the start of a symbol name.
• Do not use system dynamic symbols.
• Exploit system static symbols where appropriate so that the same set of statements can be used on multiple
systems.
• Do not attempt to convert a statement into a comment by simply inserting an asterisk in column 1. Inserting a
blank, or an asterisk and a blank at the start of the statement will convert it to a comment.
• Consider using a character in the right side string which is not a valid volume serial number character. This
will prevent name space clashes between logical volume set names and real volume serial numbers, and also
make it plain to report readers that the displayed volume is the result of a logical mapping.
• Only use EBCDIC characters in the right side string which reliably translate to invariant ASCII characters so
that the string can be reliably rendered by the Analyzer in reports without any dependence on web browser
language and code page settings.
The HSIDAMAP file may contain either fixed-length or variable-length records. Sequential concatenations of unlike
data sets are supported. If you decide to use this facility, you might find it convenient to store the volume symbol
mapping statements in a member of your customized PARMLIB library which was created by the HSISCUST process.
Because invalid statements are ignored, you may want to test the statements before using them in production. To
do this, run the HSIPINQ program with SYSPRINT allocated to SYSOUT, SYSIN allocated to DUMMY and HSIDAMAP
allocated to your volume mapping statement file. The absence of any output files will cause a condition code of 16,
but the active mapping status will still be reported.
The first statement would rename volume TSO to volume +TSO+ in the collected data. The second statement
would rename volume serial numbers ending in TSO (such as TSO, 9TSO, 99TSO and 999TSO) to +TSO+. The third
statement is a comment due to the blank in column 2 being situated before the assignment statement.
These four statements are functionally equivalent, and would cause the IPL volume serial number to be replaced by
the literal SYSRES.
The first statement would rename any volume serial starting with WORK to WORK* in the collected data. The second
statement would rename any 6-character volume serial starting with PUB to PUB%%% in the collected data.
&SYSCLONEDISK=<CLON>
&SYSCLONE.DISK=<CLON>
75
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
The first statement has no effect because the literal &SYSCL cannot match any real volume serial number. The
absence of a period to flag the end of the symbol name prevented any symbol substitution because the symbol
&SYSCLONEDISK does not exist. The second statement will cause volume S1DISK to be reported as volume <CLON>.
where all systems' IPL volumes have volume serial numbers with the fourth to sixth characters being equal to RES.
The first statement would cause the IPL volume to be reported as a volume serial number made up of two asterisks
concatenated with the system identifier. Programs found to be on the IPL volumes of other systems, or perhaps on
residence volumes not even in active use, would be reported as residing on volume *OTHRS (other residence volume).
These two statements would cause the volumes with serial numbers which match the values of the system symbols
&IMSVS and &DB2DA to be reported as &IMSVS and &DB2DA respectively.
When you run the SCANDEV command, two additional types of records are generated which describe device groups
and channel paths. Consideration of I/O devices is limited to those devices which are online at the time of the scan.
A device group is a contiguous block of device numbers, not including offline devices, where the device type, control
unit type and serial number, and online channel path connectivity is the same. The channel path type is collected for
each channel path used to connect to an online I/O device.
A channel that does not provide an online path to any online device is not reported even if the channel is configured
online to the z/OS® system.
The Inquisitor for z/OS® UNIX® processes the hierarchical file system (HFS) root directory, as well as all
subdirectories. For this reason, the program must run with a UID that allows access to all directories and programs to
be examined. If the Inquisitor for z/OS® UNIX® does not have permission to access a directory, then no information
is collected from that directory, or any of its subdirectories.
76
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
The HSIXROOT file is used to nominate one or more directories to be considered root directories. When specified, only
the nominated directories and their subdirectories are processed. This facility is useful when only a subset of the file
hierarchy needs to be scanned.
The HSIXOMIT file is used to nominate one or more directories which are to be omitted or excluded from the scan,
together with all of their subdirectories. This facility can be used to reduce resource consumption by preventing parts
of the UNIX® file hierarchy known not to have any executable software from being scanned.
Procedure
1. In the HSISINQU job, check the values for the following parameter and change if necessary:
• The PLX parameter is set to N (no). Review information about the PLX parameter before you use
PLX=Y – shared DASD is NOT sufficient to use this for a z/OS UNIX file system scan.
• The PACK parameter is set to 1 to request that zipped output is written using the fastest level of the
deflate algorithm. Higher values up to 9 can be used for better compression, but they will use more
CPU time. Specify PACK=0 if use of the shrink zip algorithm is required.
• The LLQ parameter is set to Z&SMF. You can change this value if you want to generate data sets with
unique names without changing the JCL library.This value is set when the HSISINQU job is submitted.
2. In the program parameter string, you can specify a report message level, an override to the system identifier,
and whether you want compressed or uncompressed output. Use commas to separate the various settings
specified within the program parameter string.
3. Run the HSISINQU job.
For the z/OS Inquisitor (which scans PDS and PDSE libraries), PLX=Y should only be specified when all the relevant
systems have access to all the same libraries, and for this it is usually sufficient to share the DASD and catalog
configurations.
For the z/OS UNIX Inquisitor, PLX=Y should only be specified when all the relevant systems have access to all the
same UNIX files. Sharing DASD and catalogs is not sufficient to achieve this. Systems in a sysplex must be explicitly
configured to share the same UNIX file system before it is suitable to use the PLX=Y setting of the UNIX Inquisitor
program.
77
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Parameter Description
PTHMSG Requests that a message is written to HSIXMSG each time a directory is opened or closed.
PGMMSG Requests that a message is written to HSIXMSG each time an executable file is processed.
NOHOST Requests that the call to HSIPHOST to collect the TCPIP host name and IP address is bypassed.
SID= The value is up to 4 characters long and specifies the system identifier to be contained in the data
output from the Inquisitor. If the SID identifier override is omitted, the system SMF identifier is used.
The SID parameter setting is used when the SMF system identifier of a system is not unique. For ex
ample: SID=SYS2
PLX= The parameter is used to identify if the Inquisitor data being collected is from a UNIX file system
shared by all systems scanned with the same sysplex name. The value is either Y or N. If the PLX pa
rameter is not used, the default value of N is created in the Inquisitor header record.
PLEX The value is up to 8 characters long, and specifies the sysplex name to be contained in the data out
NAME= put from the Inquisitor. If the PLEXNAME identifier override is omitted, the actual sysplex name is
used. The primary purpose of the PLEXNAME parameter is to provide a means for controlling the
scope of sysplex-wide inventory updates.
PACK= The value is a single decimal digit (0-9) and specifies the level of compaction that will be used to
write zipped output. The value of 0 specifies that shrink will be used. Values in the 1 to 9 range spec
ify the compaction level of deflate to be used. PACK=1 is the program default.
LLQ= This parameter is used to specify a suffix string made up of one or more data set name qualifiers to
be appended to the data set name of the HSIXZIP and HSIXOUT data set. Its maximum length is 44
characters. It may contain both static and dynamic system symbols, and the user symbols &SMF.
(SMF system identifier) and &SYSLPAR. (LPAR name) supplied by the Inquisitor. Use the LLQ setting
when you need to create uniquely named data sets without changing the JCL.
Filename Description
SYSPRINT Used by Language Environment® (LE), which is required to be in the standard module search path,
and by IDCAMS when LLQ= is specified.
SYSOUT Used by Language Environment® (LE), which is required to be in the standard module search path.
78
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Table 12. Files used by the Inquisitor for z/OS® UNIX® (continued)
Filename Description
HSIXZIP An optional output file that contains compressed Inquisitor for z/OS® data. It is written using a vari
able length record format. You need to provide DCB information to ensure optimal use of DASD
space.
In the case where HSIXOUT is not allocated and HSIXZIP processing encounters an S213-C8 abend,
the UNIX Inquisitor will attempt to write uncompressed output to this file, overriding the LRECL as ap
propriate.
HSIXOUT An optional output file that contains uncompressed Inquisitor for z/OS® UNIX® data. It is not spec
ified in the packaged sample, as the use of HSIPZIP is preferred, due to its reduced space require
ments. HSIXOUT also contains variable length records. The program supplies the appropriate LRECL.
By default, system determined block size is used.
If you want to direct the Inquisitor for z/OS® UNIX® output to a compressible extended-format da
ta set, then you should use the HSIXOUT file. The HSIXZIP file employs update-in-place processing,
which prevents the use of DFSMS™ compression.
HSIXROOT An optional file which can contain one or more records; each of which specifies a directory path to be
considered as a root directory to be processed. If HSIXROOT is not allocated or empty, then a forward
slash (/) is the only root directory processed.
HSIXOMIT An optional file which can contain one or more records; each of which specifies a directory path
which is to be omitted from the scan. Root directories cannot be omitted.
The HSIXROOT and HSIXOMIT files have the following characteristics and attributes in common:
To implement this exclusion filtering, the HSIXROOT file and the HSIXOMIT file contain the records as indicated below.
79
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIXROOT contents:
HSIXOMIT contents:
• The z/OS® UNIX® Inquisitor will begin scanning the entries in the system root directory.
• As each subdirectory is discovered, the subdirectory path name will be compared to path names supplied
from the HSIXOMIT file and discarded if a match is found. In this way, the /deploy1 directory and all its
subdirectories will be excluded from the scan.
• After the remainder of the file system has been scanned, the z/OS® UNIX® Inquisitor will scan the /deploy1/
bin directory and its subdirectories if it has any. Again, subdirectory path names will be compared with paths
named in the HSIXOMIT file, but no exact matches will be found since none of the names can equal /deploy1/.
Security considerations
If you want to collect all relevant z/OS® UNIX® data, you must have access to all UNIX® directories, including the
root directory. This access ensures that all z/OS® UNIX® data is collected.
To allow the Inquisitor unrestricted read access to all z/OS® UNIX® files, consider using the UNIXPRIV RACF®
Resource Class, which alleviates the need for UID(0).
The following sample definition can be used by your Security Administrator to define, permit, activate, and RACLIST
the RACF® UNIXPRIV Class:
Related information
Importing usage data on page 114
80
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Parameters for the Usage Monitor job are HSISMNPM member in the PARMLIB library.
HSIZIN
A sequential file consisting of fixed length 80 byte records. It contains initial commands which are run
before data collection becomes active. It must contain the data set prefix to be used for dynamically
created output files. The prefix can be changed later by an operator MODIFY command.
HSIZIN is opened, read, and closed during initialization processing. Do not specify FREE=CLOSE in the
JCL for HSIZIN, or refresh processing is not possible.
Data set &HSIINST..&DB..UM.HLQIDS contains the high-level qualifier listing for products and is
populated by the IQ Import job (HSISIQIM). To minimize the number of records to be created by the
Usage Monitor, only usage events that match the list of products in this data set are generated. To
activate this facility, in //HSIZIN, uncomment data set &HSIINST..&DB..UM.HLQIDS as described in
PROC HSIJMON.
HSIZMSG
A log file which contains the initial commands issued, and which indicates their degree of success.
It also contains regular status reports, writer reports, refresh reports (when appropriate), and a
termination report. It consists of fixed-length 121-byte records.
HSIDAMAP
Output files containing program usage data are dynamically allocated by the Usage Monitor. The data set name prefix,
the allocation unit, and the primary and secondary space allocation quantities (in tracks), need to be customized for
the target system. This is done in the PARMLIB member HSISMNPM.
81
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Each table entry contains a program name comparison string up to 8 bytes long. The string is either an 8-byte
program name, or a shorter program name prefix. When entering these strings with the EXC command, a prefix is
denoted by using an asterisk as the last character.
The program name exclusion table resides in key zero common storage, and its size is always a multiple of 4,096
bytes. The minimum table size can house up to 253 entries, and the table size increases dynamically, as required. The
default program name exclusion table contains entries to exclude data pertaining to the usage of many programs
which are part of the operating system.
In order to add, reset, remove, or display the entries to the table, use these commands:
EXC
To add entries to the program name exclusion table, or to reset the table to its default contents.
DEL
D-X
Unlike masks added by the EXC command, default program name exclusion masks do not exclude job step program
usage events. So, for example, the IEF* default exclusion mask excludes dynamic calls and loads of program
IEFBR14, but usages where IEFBR14 is invoked by JCL are not excluded by this mask.
To state it another way, this is an indirect filtering facility where usage of the named program is not excluded, but
programs fetched by the named program do have their usage excluded no matter what names those programs have.
There are no default entries for this filtering – all entries in this filter list are supplied via the LDX command. The
LDD command is available to deactivate previously added entries. Exact program names (with no masking) up to 8
characters long must be specified when using LDX and LDD commands.
In order to add, remove, or display the entries in the calling program exclusion list, use these commands:
LDX
To add one or several entries to the calling program name exclusion list.
82
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
LDD
D-X
To display active LDX exclusion entries after default and EXC exclusion entries.
The default data set name exclusion list is built during Usage Monitor initialization, and consists of the SCEERUN
library, the SCEERUN2 library, SYS1.CMDLIB (containing TSO commands), SYS1.CSSLIB (containing callable services
modules), and masks for data set names ending with DBDLIB and PSBLIB. The data set names of the SCEERUN
and SCEERUN2 Language Environment® libraries are determined by searching the link list for specific LE modules.
You can use the XDD command to deactivate any of these default exclusion entries. You can use the XDS(*DFLT*)
command to reactivate the default data set exclude list without affecting the status of masks in other lists.
The other two lists are constructed from commands you specify either in the HSIZIN file or dynamically via the
system MODIFY command.
To avoid excessive storage and processor resource consumption, keep the number of elements in each list to
a minimum. This is achieved by using generic masks to cover many data set names. The inclusion mask list is
provided so that specific exceptions to broad exclusion rules can be specified. If you do not supply any data set name
exclusion masks, the inclusion list does not affect data collection, but can still be used as a convenient way to collect
relative usage statistics from the regular Usage Monitor status reports.
1. Excludes usage if the data set name matches a default exclusion mask, otherwise proceeds to step 2.
2. Includes usage if the data set name matches a mask supplied by an IDS command, otherwise proceeds to
step 3.
3. Excludes usage if the data set name matches a mask supplied by an XDS command, otherwise proceeds to
step 4.
4. Includes usage if the data set name does not match any of the masks.
Data set mask elements reside in key zero common storage. Each element occupies 64 bytes, and contains a data
set name mask up to 44 bytes in length. You can use a percent sign as a wildcard to match any single character.
You can use an asterisk as a wildcard to match any group of zero or more characters. Before the mask is stored, all
occurrences of *% are changed to %*, and then all occurrences of multiple consecutive asterisks are changed to a
single asterisk.
In order to add, reset, remove, or display the entries to the tables, use these commands:
83
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
XDS
IDS
XDD
IDD
D-D
Both of the non-default lists have no elements until an XDS or IDS command is processed. Storage is dynamically
acquired for each element as required. To ensure system integrity, XDD and IDD commands do not cause the storage
of a deactivated element to be freed, but mark the element as inactive. When a deactivated mask is reactivated, the
existing entry is marked as active without the further acquisition of storage.
You can use the XDD(*ALL*) command to deactivate all data set exclusion masks, including those in the default list.
You can use the IDD(*ALL*) command to deactivate all data set inclusion masks.
When the Usage Monitor address space first initializes, all elements of lists that remain in storage from a previous run
are freed before the processing of initial commands and the commencement of data collection.
The default exclusion list is provided to reduce overhead by discarding data that does not assist with product use
identification, and while additional data set filtering is provided for local use, it is expected that for many systems no
customization of data set filtering would be necessary.
UNIX® path name masks entered via IDS and XDS commands are compared to the path names specified by
applications at run time and may not correspond to the path names against which usage is attributed. The main
cause for this difference in path names is the use of symbolic links. The Usage Monitor writer task converts path
names with symbolic links to real path names in order to match inventory discovered by the Inquisitor.
Do not use an IDD or XDD command that specifies a UNIX® path name mask because the only use for such a
command is to dynamically delete a UNIX® path name mask. Most UNIX® path name masks contain lowercase
alphabetic characters. The system MODIFY command interface usually changes lower case characters to upper case
which prevents the mask matching the relevant active mask. To delete a UNIX® path name mask you must either
recycle the Usage Monitor or use the REF command to refresh the settings from the HSIZIN file. In either case, all
UNIX® path name masks are deactivated and the necessary change is to remove the IDS or XDS command that you
want to deactivate from the HSIZIN file.
84
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Similarly, because of the prevalence of lower case alphabetics in UNIX® path names, you only specify IDS and XDS
commands with path name masks as HSIZIN file input rather than via the MODIFY system command interface.
The length limit of 44 characters also applies to UNIX® path name masks.
Accumulated CPU time is logged in the collection repository when a monitored program ends. This means that CPU
time for long-running jobs will either not be collected, or will be collected once when the component is shutdown,
perhaps even with the bulk of the CPU time being due to activity in prior collection cycles, which could compromise
the value of that data.
For this reason, the Usage Monitor can collect consumed CPU time differently for those address spaces which are
classed as being long-running. For these address spaces, all the consumed CPU time will be attributed to the job step
program, with the CPU time values being sourced from the SMF30CPT field of type 30, subtypes 2 and 3 SMF records.
The previously described CPU time tracking at the request block level will not be performed for these address spaces.
Long-running address spaces are recognized by their job step program name. The initial list of long-running program
names is formed from the system’s program properties table at the time that the Usage Monitor is started. Additional
names can be added by issuing the LRP command. Existing entries in the long-running program name list can be
deleted by the LRD command. The Usage Monitor will deem an address space to be long-running if its job step
program name matches any active entry in this name list. The Usage Monitor does not check whether any of the
properties described by the PPT entry are actually assigned. Only started task and batch job address spaces are
checked for being long-running.
This facility allows the Usage Monitor to report CPU time used by CICS, IMS control region, DB2 and MQ subsystem,
and various other address space types without having to wait until those address spaces terminate.
In order to add, remove, or display the entries in the long-running program name list, use these commands:
LRP
LRD
D-L
85
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Procedure
1. To start the Usage Monitor in normal mode, enter the following command:
S HSIJMON
2. To fully stop the Usage Monitor, enter one of the following commands:
P HSIJMON
F HSIJMON,STOP
F HSIJMON,END
These commands cause the Usage Monitor to stop data collection, attach a writer task to process the existing
data in the collection repository, wait for the writer task to output the data, and then terminate.
3. To perform an immediate termination, enter the following command:
F HSIJMON,CAN
This command causes the server address space to stop data collection, detaches any running writer task
which renders the output data in the data set unusable, deletes the current collection repository without
writing out its contents, and terminates. If you use the z/OS® system command CANCEL to stop the Usage
Monitor, its collection repository remains in storage. To clear the collection repository from storage, you must
restart the Usage Monitor.
Refresh processing involves the execution of the command stream placed in the HSIZIN file, without the requirement
of stopping and restarting the Usage Monitor. As a result, refresh processing can verify the validity of the initialization
command stream so that changes are made and tested dynamically. This ensures that future Usage Monitor
sessions do not encounter initialization command stream errors.
Some commands set a switch for logic control, or set a numeric value to be used during processing. These
commands specify the values to be used in the future. Other commands pertaining to inclusion and exclusion
masking add a mask to, or remove a mask from, the active mask list, so are part of an accumulation of commands
which specify future processing.
Consider the example where several exclusion masks are active, and a change to deactivate one of the masks
is required. A command to deactivate the mask might be issued dynamically, but if this change is to be made
permanent, then the HSIZIN file needs to be updated. The alternative is to remove the command setting the exclusion
from the HSIZIN file, and to then issue the Usage Monitor REF command to initiate a refresh.
Before the first HSIZIN command is run during refresh processing, the program mask exclusion list is set to the
default list. Further, all data set name exclusion masks are deactivated, and all data set name inclusion masks are
86
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
deactivated. This order of deactivation ensures that there is no loss of data that would otherwise be collected.
However, there is the possibility that data which would have been excluded is collected during the short window
between the reset of the mask lists and the processing of the HSIZIN commands.
The response to each command in the HSIZIN file is written to the HSIZMSG file. A summary WTO message,
indicating whether any errors are found or not, is issued after refresh processing has finished.
Stopping the Usage Monitor and restarting it, produces the same active exclusion masks as a refresh. It also
produces a data collection outage. For more information, see the REF command in the next topic for a list of the
processes performed during a refresh operation.
Settings are not preserved across successive runs of the Usage Monitor. Default values are set when the
Usage Monitor address space initiallizes prior to processing the HSIZIN file.
To record the settings the Usage Monitor is using, place the display commands at the end of the HSIZIN file.
APF( Y )
87
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
If no APF command is issued, then APF library information is collected. APF(Y) is the default setting.
The APF setting is only referenced by the writer task at the end of a collection cycle, and the APF library information
collected represents the status at that time.
This area of storage is normally never freed, but the area can be deleted and a new area created by recycling the
Usage Monitor with PARM='NEWASVT' specified on the job step EXEC JCL statement.
ASZ( segments )
segments
If no ASZ command is issued, a 16 MB area will be used. As new job steps start in any given ASID, storage is
reclaimed and reused so that number of pages that need to be physically backed is kept to a minimum.
A change to this setting does not take effect until the next collection repository switch.
CAP( N )
88
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
CIC( N )
Specifies that customized CICS® regions are able to present program usage data to the Usage Monitor
for collection.
Specifies CICS® program usage monitoring is disabled throughout the operating system image.
D-A
The following code example displays the current dynamic allocation values.
F HSIJMON,D-A
D-C
The following code example displays the current value of internal Usage Monitor counters.
F HSIJMON,D-C
89
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
D-D - Display the data set name inclusion and exclusion lists
D-D is used to display the data set name masks in the inclusion list, followed by the data set name masks in the
lists
exclusion
and
inclusion
name
set
data
the
Display
-
listsD-D
exclusion
and
inclusion
name
set
data
the
Display
-
commandD-D
Monitor
Usage
exclusion list.
The inclusion and exclusion lists do not need to be populated in order to collect data. The absence of any entries in
the exclusion list means that data collection is not filtered by program library data set names.
D-D
The following code example displays the current data set name inclusion and exclusion lists.
F HSIJMON,D-D
D-I
The following example code displays the current system identifier used by the Usage Monitor.
F HSIJMON,D-I
When the name of the job step program of a started task or batch job matches an active entry in this list, detailed
CPU time consumed by programs in this step is not tracked, but the step’s CPU time consumed each SMF interval is
attributed to the job step program, allowing some tracking of consumed CPU time for rarely-ending address spaces.
D-L
D-S
F HSIJMON,D-S
90
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
The UTC or GMT switch time is calculated using local time current at collection repository creation time. The time
when a collection repository is terminated is set when it is created. Changes to the system local time offset, such as
those caused by a change to daylight saving time, do not alter the UTC or GMT that the current collection repository is
closed. The time of the switch after the next switch is calculated using the new local time.
D-T
The following example code displays the current automatic switch-and-write time setting.
F HSIJMON,D-T
D-X
The following example code displays the current exclude list entries.
F HSIJMON,D-X
DCB( 3380 )
UNKN
DCB(3390)
RECFM=VB,LRECL=27994,BLKSIZE=27998
DCB(3380)
RECFM=VB,LRECL=23472,BLKSIZE=23476
DCB(UNKN)
91
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
RECFM=VBS,LRECL=32756,BLKSIZE=0
The system determines the optimal block size for the device used by dynamic allocation. Use when the
output device type is not known until allocation time.
Some FTP products do not process a file with RECFM=VBS correctly, even when no records are actually
spanned.
DCL( dataclas )
dataclas
DEL( mask )
, mask
, mask ...
*ALL*
mask
Specifies a 1 - 8 character program name mask. Any wildcard characters in the mask are treated as
literals for the purposes of finding the mask to delete.
*ALL*
Specifies every currently active mask. This mask cannot be specified with any other mask.
Except for short test periods, it is expected that default exclusion masks such as IGG* remain active.
monitored.
92
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
(continued)
modules.
called CEE.
You can use symbols in the construction of the data set name prefix. Available symbols include all z/OS® static
symbols, &SMF, the SMF identifier for the system, and &SYSLPAR, the logical partition name for the system.
DSN( dsnpref )
dsnpref
Specifies a 1 - 26 character data set name prefix. It can contain one or more data set qualifiers, and
must not end in a period after any symbol substitution.
Usage Monitor needs RACF® ALTER access to the data sets to be able to create them.
The following example code shows how to get output files with names of the form
SYS3.HSI.HSIJMON.Dyyyyddd.Thhmmsst:
F HSIJMON,DSN(SYS3.HSI.HSIJMON)
The DUR command is not normally used in standard operations where the Usage Monitor is to remain active until
system shutdown. When it is used, it is normally placed in the HSIZIN file to specify a predetermined length of
execution for sampling or testing purposes.
DUR( hhmm)
93
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
hhmm
Specifies a time duration in hour and minute notation. The value must be four decimal digits. The
minimum value is 0001 and the maximum value is 2400. The last two digits (mm) must be in the 00 - 59
range.
The following example code instructs the Usage Monitor to stop after 150 minutes.
F HSIJMON,DUR(0230)
EXC( mask )
, mask
, mask ...
*DFLT*
mask
Specifies a 1 - 8 character program name mask. If the mask ends in an asterisk only, characters before
the asterisk are compared. Otherwise, an exact program name is deemed to have been specified.
*DFLT*
Specifies every supplied default entry in the exclusion table is to be made active, and all user-added
entries are to be removed from the exclusion table. This mask cannot be specified with any other mask.
Except for short test periods, it is expected that default exclusion masks such as IGG* would remain active.
94
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
For Usage Monitor data, the HOF setting at the time that the writer task is attached after the closure (or switch) of a
collection repository is used.
For Inquisitor data, the HOF setting active at the time of the Inquisitor program initialization is used.
HOF(Y) will not cause any change to data timestamp values unless the Usage Monitor has processed a type 89 SMF
record. For this to occur, SMF parameter settings must specify the collection of type 89 records, and at least one SMF
interval must have ended while the Usage Monitor is active before the ouput file data generation commenced.
If the Usage Monitor has been stopped before an Inquisitor scan commences, the Inquisitor program uses the HOF
status current at the time of Usage Monitor termination.
HOF( Y )
Specifies the hypervisor STCK TOD clock offset will be used to adjust date and time values present in
collected data.
Specifies the date and time values present in collected data will be based wholly on the local time, as
maintained by z/OS®.
HOF(N) is the default setting that will be used if no HOF command has been issued.
IDD( mask )
All
mask
Specifies a 1 - 44 character data set name mask. Any wildcard characters in the mask are treated as
literals for the purposes of finding the mask to delete.
F HSIJMON,IDD(SYS3.LINKLIB)
Inclusion masks only affect data collection if there are active user-specified exclusion masks. An inclusion mask is
normally expected to match a subset of data set names that would match an exclusion mask.
95
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
IDS( mask )
mask
Specifies a 1 - 44 character data set name mask. Generic wildcard matching allows a percent sign to
match any single character, and an asterisk to match any group of zero or more characters. If the mask
contains a slash character (/), the value is processed as a UNIX® path name mask rather than a data
set name mask.
You can use the following example code if your intention is to not collect program usage data for data sets with a
high-level qualifier of SYS3, except for SYS3.LINKLIB. SYS3.LINKLIB is the only data set with a high-level qualifier of
SYS3 for which program usage data is to be collected.
XDS(SYS3.*)
IDS(SYS3.LINKLIB)
IMS( Y )
If no IMS command is issued, then IMS-managed program usage is collected. IMS(Y) is the default setting.
IPH( Y )
Specifies that the Usage Monitor will call HSIPHOST to procure TCPIP host details.
Specifies that the Usage Monitor will not report TCPIP host details in the program usage files.
96
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Do not instruct the Usage Monitor to collect and preserve all job account codes if they are not important to the
administration of your system. Collecting and preserving job accounts can significantly increase data volumes.
A change to this setting does not take effect until the next collection repository switch.
JAC( Y )
If no JAC command is issued, then job accounts are used. The default is JAC(N).
JID( Y )
Specifies that batch job identifiers should not be overlaid and that different batch job identifiers should
prevent data aggregation.
Specifies that normal aggregation by job name and user ID is to proceed without considering job
identifier differences.
The default setting of JID(N) applies each time the Usage Monitor is started.
97
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
usage is summed over broad address space categories, such as JOB, STC, TSO, and SYS. The total usage counts
collected by the Usage Monitor for each program are not affected by this setting.
A change to this setting takes effect at the next collection repository switch.
JNM( Y )
Specifies that only a broad address space category of each job running a program is to be collected,
instead of the individual job name.
If no JNM command has been issued, then job names are collected. JNM(Y) is the default.
LDD( pgm-name )
, pgm-name
, pgm-name
pgm-name
The LDX command is used to exclude these cases from collected usage data. The relevant program names are
supplied as values in LDX commands. The programs named in LDX commands are those programs which perform
the analysis or which issue the status request of numerous and perhaps varying subject programs.
Programs which are the subject of LINK or LOAD and DELETE requests issued by a program named in an active LDX
setting are excluded from usage data collection.
98
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
LDX( pgm-name )
, pgm-name
, pgm-name ...
pgm-name
LPA( Y )
If no LPA command is issued, then LPA program usage data is collected. LPA(Y) is the default setting.
A change to this setting does not take effect until the next collection repository switch.
LRD( pgm-name )
, pgm-name
, pgm-name ...
pgm-name
99
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
without having to wait until the job step terminates. You can use the LRP(*DFLT*) command to undo any LRD and LRP
commands that have been processed.
LRP( pgm-name )
, pgm-name
, pgm-name ...
pgm-name
The initial list of long-running program names is formed from the system’s program properties table active at the time
that the Usage Monitor is started.
MCL( mgmtclas )
mgmtclas
Larger PAK values will increase data compression but will also consume disproportionately more CPU time.
PAK(n)
If no PAK command is issued then PAK(1) will be used, resulting in a fast deflate zip file.
100
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
sysplex name. Available symbols include all z/OS® system symbols, &SMF, the SMF identifier for the system, and
&SYSLPAR, the logical partition name for the system.
PLN(plexname)
plexname
When the additional data collection is enabled, previously fetched programs resident in the regions of started task
and batch job address spaces where SMF interval recording is active have usage recorded in each collection cycle
which encompassed the end of at least one SMF interval.
This setting can affect usage figures. For example, the main program of a constantly running task can accrue a usage
count of around 30 over a month even though it was really only used once for an extended period.
PRE( Y )
The default setting of PRE (Y) applies each time the Usage Monitor is started.
trks
If no PRI command is issued, the primary space allocation is 750 tracks. The Usage Monitor uses the RLSE space
allocation attribute.
The following example code sets the primary space allocation to 900 tracks.
F HSIJMON,PRI(900)
101
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
A change to this setting does not take effect until the next collection repository switch.
PRS( Y )
If no PRS command is issued, then registered software data is collected. PRS(Y) is the default.
The QSZ value used is fixed for the life of the Usage Monitor address space. To change the QSZ value the Usage
Monitor started task must be recycled.
QSZ( segments )
segments
If no QSZ command is issued, a 10MB queue area will be used. The queue area is processed as a LIFO stack, which
means that only the necessary number of pages needed to hold the peak queue length will need to be backed by
physical storage, no matter how large the QSZ value is set.
102
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
REF
The following example code changes Usage Monitor settings to updated values from HSIZIN.
F HSIJMON,REF
SCL( storclas )
storclas
trks
If no SEC command is issued, the secondary space allocation is 300 tracks. The Usage Monitor uses the RLSE space
allocation attribute.
The following example code sets the secondary space allocation to 600 tracks.
F HSIJMON,SEC(600)
SID( sid)
sid
103
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
LPAR name. The LPAR name must not exceed four char
acters in length.
entries
If no SIZ command is issued, a data space capacity of 200,000 entries is used. Each entry occupies 232 bytes and
contains a pointer to a separate part of the repository dedicated to holding data set and UNIX® file names. Storage is
conserved by only storing a single copy of each collected data set and UNIX® file name. As each repository page has
data placed in it for the first time, that page must be backed physically by the system. When a collection repository
is full, a repository switch is triggered automatically. A repository switch also occurs when data stamped after the
switch time is detected, or when a manual switch is requested by the SWI command.
The following example code sets the size of future collection repositories to 1,000,000 entries.
F HSIJMON,SIZ(1000000)
The SJS setting can be used to remove the spawned sequence number suffix so that all usage events for programs
are logged under the original job name, resulting in fewer Usage Monitor records and reduced processing time. If the
spawning job name is eight characters long and ends in a digit in the 1 to 9 range, then activity in spawned address
spaces (but not the original address space) can be reported under a job name which is only the first seven characters
of the original job name. If this is likely to present a problem then use SJS(N).
104
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
SJS( Y )
SJS(Y) is the default if no SJS command has been issued since the Usage Monitor started.
The SWI command has no operands. It is invalid in the HSIZIN initial command file. As well as the switch caused by
an explicit SWI command, automatic switches occur when a repository becomes full, and when data stamped after
the switch time is detected. The SWI command might be rejected if the writer task is busy.
SWI
F HSIJMON,SWI
TMP( N )
If no TMP command is issued, then program usage events pertaining to temporary data sets are discarded. TMP(N)
is the default setting.
105
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
with the collection of this information. The advantage of not collecting user information is the reduction in processing
times and data volumes.
When user information is not collected, the user ID data item remains blank, and user names are not output,
regardless which UNM setting is current. The total usage counts collected by the Usage Monitor for each program are
not affected by this setting.
If you want program usage attributed to individual users but do not want the names of users to be retained, use
UID(Y) and UNM(N).
A change to this setting does not take effect until the next collection repository switch.
UID( Y )
Specifies that details of each user using a program are not to be collected.
If no UID command is issued, user details are collected. UID(Y) is the default.
UNK( N )
If no UNK command is issued, the unknown events are not collected. UNK(N) is the default setting.
A change to this setting does not take effect until the next collection repository switch.
106
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
UNM( Y )
Specifies that collected user names are written to the output file.
If no UNM command is issued, then user names are collected. UNM(Y) is the default.
A change to this setting does not take effect until the next collection repository switch.
Unitname
F HSIJMON,UNT(WORKDA)
If no USS command is issued, the programs retrieved from HFS files are not monitored. USS(N) is the default setting.
A change to this setting does not take effect until the next collection repository switch.
VOL( volume)
107
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
volume
If no VOL command is issued, a specific volume is not explicitly requested. You must then have PUBLIC or STORAGE
volumes in the public allocation pool, unless the data sets are managed by SMS.
F HSIJMON,VOL(SCR001)
The UTC or GMT switch time is calculated using the local time when the repository is created. The time that a data
space is terminated is set when it is created. Changes to the system local time offset, such as those caused by a
change to daylight saving time status, do not alter the UTC or GMT time that the current repository is closed. The time
of the switch, after the next switch, is calculated using the new local time.
WRT( hhmm)
hhmm
Specifies a 24-hour time-of-day in hour and minute notation. The value must be four decimal digits. The
first two digits (hh) must be in the 00 - 23 range. The last two digits (mm) must be in the 00 - 59 range.
If no WRT command is issued, the automatic switch time of midnight is used. That is, WRT(0000) is the default.
The following example code sets the automatic switch-and-write time to 10 minutes before midnight.
F HSIJMON,WRT(2350)
If a mask of *ALL* is specified then all (both default and user) data set exclusion masks are deactivated.
XDD( mask )
*ALL*
mask
Specifies a 1 - 44 character data set name mask. Any wildcard characters in the mask are treated as
literals for the purposes of finding the mask to delete.
F HSIJMON,XDD(SYS3.*)
108
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
XDS( mask )
*DFLT*
mask
Specifies a 1 - 44 character data set name mask. Generic wildcard matching allows a percent sign to
match any single character, and an asterisk to match any group of zero or more characters. If the mask
contains a slash character (/), the value is considered to be processed as a UNIX path name mask
rather than a data set name mask.
The following example code excludes program usage data from collection for programs fetched from data sets with a
high-level qualifier of SYS3.
F HSIJMON,XDS(SYS3.*)
ZIP( Y )
If no ZIP command is issued, then compressed data is output. ZIP(Y) is the default setting.
If abend S213-C8 occurs when the writer task opens the output data set, ZIP(N) will be issued internally and the data
will be written without being zipped. In this case, the following WTO message will be issued:
109
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
To prepare a CICS® region to enable detailed monitoring, you must install the following components:
The customized JCLLIB library contains the following sample jobs that you can copy and use in your customization:
• The HSISENAX member contains a sample job to translate, assemble and bind the enabling program.
• The HSISPLTX member contains a sample job to create a PLT with the required entry to trigger the enabling
program. If you use this sample job, verify the name of the enabling program and the PLT suffix before you
submit the job.
The CICS® program monitoring facility does not support releases earlier than CICS® Transaction Server version 5,
release 1. Different releases of the CICS® Transaction Server require different versions of the GLUE programs. You
must ensure that the correct version of these programs is used for each CICS® region. You must also take care when
upgrading regions to a later release of CICS® so that the correct version of this module will be used with the newer
software.
Installed GLUE modules from older releases of the Usage Monitor will not collect any data for this release of the
Usage Monitor. The GLUE modules in this release of the Usage Monitor cannot collect any data for older releases of
the Usage Monitor.
The following table lists the required GLUE programs for different versions of the CICS® Transaction Server:
Table 17.
When you implement this CICS® Transaction Server customization, the Usage Monitor can collect and record data
related to program name and data set name. The collected data is subject to the Usage Monitor program name and
data set name selection and exclusion filters. You can stop data collections from all HSIZFTCx and HSIZEIIx GLUE
programs with the CIC(N) Usage Monitor setting. CIC(Y) is the default setting if you do not issue a CIC Usage Monitor
command.
Depending upon the level of program usage detail you require, the HSIZFTCx exit might produce sufficient data
for your needs, without the HSIZEIIx exit. If you want to access more detailed CICS® data, such as particulars of
110
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
transactions and the end users involved, a specialized CICS® monitor such as IBM® OMEGAMON® for CICS® on z/
OS® is required.
Procedure
1. Copy the appropriate HSIZFTCx and HSIZEIIx global user exit (GLUE) programs from the SHSIMOD1 library to
a DFHRPL library of the CICS region.
2. Customize and submit the HSISENAX job to create a program that enables the HSIZFTCx and HSIZEIIx exit
programs:
a. Customize the sample job for translating, assembling, and binding the enabling program that is
provided in the HSISENAX member in the customized JCLLIB library.
For convenience, you can name this program HSIZENAx, where x is the same suffix character as the
suffix of the HSIZFTCx and HSIZEIIx programs that it enables.
b. Check that the name specified in the PROGRAM operand of EXEC CICS ENABLE statement is the name
of the enabling program.
c. Check that the name specified in EXEC CICS ENABLE PROGRAM statement is the name of the of the
GLUE programs.
d. Link the HSIZENAx enabling program into the same DFHRPL library where you copied the HSIZFTCx
and HSIZEIIx GLUE programs.
DFHPLT TYPE=ENTRY,PROGRAM=HSIZENA
Place the entry before the DFHPLT TYPE=ENTRY,PROGRAM=DFHDELIM entry to load it early during CICS initialization
and minimize the need for program resource definitions.
4. Ensure that the PLTPI setting for the CICS region specifies your newly updated PLT.
5. Optional: Use the HSITAGP tagger program to tag non-vendor application programs that you want to be
identified in usage reports.
Results
When you complete this task, the use of programs that are given control by various mechanisms in the CICS
Transaction Server are attributed to the CICS region address spaces that invoke them.
What to do next
You can stop data collection from all HSIZFTCx and HSIZEIIx glue programs with the CIC(N) Usage Monitor setting.
The CIC(Y) option is the default if you do not issue a CIC Usage Monitor command.
111
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Related information
PLX parameter of the Inquisitor program on page 55
If the HSISIQIM job processes the same data that is generated by the Inquisitor scan for a specified system, the job
terminates with an error to indicate that the input file is a duplicate input file.
Procedure
1. In the HSISIQIM job, update the following parameters, according to your requirements:
• FULLREMATCH: Set to N (no) to skip import from scanned libraries where no member directories have
changed since a previous Inquisitor Import to the same Repository. Set to Y (yes) to import and match
process all libraries.
When FULLREMATCH is set to Y, an extra check is performed on libraries in the repository. For a
given system ID (SID), existing libraries in the repository are marked as deleted unless the libraries
are found in the scanned Inquisitor file. For shared libraries (where PLX=Y), the scanned Inquisitor file
can be from any SID that belongs to the sysplex. For non-shared libraries (where PLX=N), the scanned
Inquisitor file must be from the same SID. The deletions include products, libraries and modules.
• PRODUCTONLY: Set to N (no) to import all modules, including unidentified modules. Set to Y (yes) to
import only matched modules.
The settings for both of these parameters influence the duration of the import process.
2. Review and modify other parameters, as required, in the PARMLIB member.
3. Submit the HSISIQIM job.
112
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
The Inquisitor Import loads data and performs the following tasks:
1. Reads Inquisitor data generated from Inquisitor scans. To exclude importing specific libraries, the Inquisitor
data is filtered against a set of supplied Inquisitor filter tables. These Inquisitor filter tables are updated
monthly, together with the knowledge databases. The filtering excludes, for example, the ISV distribution
libraries.
2. Matches load modules to best fitting products at the version, release, and modification (VRM) level. Best
matches for modules are found based on module names and sizes, and information in the Global Knowledge
Base (GKB) and Local Knowledge Base (LKB). Temporary scorecard tables are used to hold all the possible
scorecards for modules in a given library while they are matched.
3. Loads matched load modules, including matching information, into the Repository tables. Data from the
Repository tables are now ready for viewing or reporting using the Analyzer reporting facility.
4. Aggregates usage data for rediscovered modules in the Repository tables.
The Inquisitor Import uses memory intensively in order to efficiently match many Knowledge Base scorecards to
library modules. The maximum memory requirements depend on the number of modules in a library of an Inquisitor
Import file, and the number of scorecards in the GKB and LKB that affect the processed libraries. To estimate a
requirement, allow 5M +1.5k per module. For example, for an Inquisitor file containing a maximum library size of
30000 modules, the requirement is approximately 5M + (0.0015*30000) = 50M.
TPARAM parameters
The TPARAM parameters that you specify for Inquisitor Import define what data is included in the import.
COMMIT=
COUNTUSAGE=
The parameter controls when product usage totals are counted. Setting to Y indicates that records are
counted in the Inquisitor Import job for modules that have usage and are identified for the first time
when usage records were imported before discovery was performed. These recounts of product usage
because of modules that are identified can be time consuming.
The Inquisitor Import deletes count entries for products for which at least one module is identified for
the first time, and that have usage details as these counts are invalidated by the identification. This is
done regardless of the setting of the COUNTUSAGE parameter.
Default setting is COUNTUSAGE=N. For performance reasons, if you are running Inquisitor Imports for
many systems importing IQ data into the same Repository, run the Aggregator step only once in the
last IQ Import job. The Aggregator step performs the same function in summarizing the product usage
records.
DSN=
113
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
FILTERSCHEMA=
FULLREMATCH=
Default is N, which means all libraries are imported and processed. N means to skip import from
scanned libraries where no member directories have changed since a previous Inquisitor Import to the
same Repository.
GKBSCHEMA=
GKUSCHEMA=
Global Knowledge Base qualifier for z/OS® UNIX™. Name of qualifier is &GKBZSCHM_GKU7
LKBSCHEMA=
LKUSCHEMA=
Local Knowledge Base qualifier for z/OS® UNIX™. Name of qualifier is &REPZSCHM_LKU7
PRODUCTONLY=
Default is N, which means all modules, including unidentified modules, are loaded into the Repository.
Y means only modules that have been matched to known products are loaded into the Repository,
meaning, application modules are excluded.
REPSCHEMA=
The HSISUIMP job in the JCLLIB library performs the Usage import. This job is generated from the HSISCUST post-
installation customization job. Because run-time for this job depends on the volume of usage data to load, run this job
during off-peak periods.
Usage data files can be either outputs from the Usage Monitor or condensed outputs from the ZCAT utility. These
output files can be concatenated as a single input in the job. When you are priming a new repository, use a single
small file as input when loading usage data for the first time.
If the HSISUIMP job processes the same data that is generated by the Usage Monitor for a specified system, the job
terminates with an error to indicate that the input file is a duplicate input file.
Related information
Collecting usage data with the Usage Monitor on page 80
114
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
TPARAM parameters
The TPARAM parameters that you specify for Usage Import define what data is included in the import.
CHECKPERIOD=
Default is 12. The number of months prior to the current month for which records in TUSEMTD are still
retained.
COMMIT=
COUNTUSAGE=
The parameter controls when product usage totals are counted. Setting to Y indicates that records are
counted in the Usage Import job for systems and periods that are processed and receive new usage
details.
The Usage Import deletes count entries for systems and periods that receive new usage details and are
invalidated by the new details, regardless of the setting of the COUNTUSAGE parameter.
Default setting is COUNTUSAGE=N. For performance reasons, if you are running Usage Imports for
many systems importing usage data into the same Repository, run the Aggregator step only once in the
last Usage Import job. The Aggregator step performs the same function in summarizing the product
usage records.
DSN=
GKBSCHEMA=
REPSCHEMA=
These tables are accessed by Analyzer reports and batch jobs, and offer a higher level view of product discovery and
usage at a version rather than a release or module level. The Aggregator also calculates product discovery and usage
count totals that are used to speed up the Analyzer queries.
The Aggregator should be run as the final job in a batch run of Inquisitor Import and Usage Import jobs, and before
the repository is accessed by the Analyzer. This ensures that asset reports and counts are synchronized with the
latest collected discovery and usage details.
115
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
It is usual for asset level usage details to be kept longer than module usage details. This is controlled by the
KEEPAGGR parameter of the Usage Deletion program, which has a longer default period than the KEEPDETAIL
parameter. The aggregated entries are normally kept for the longer KEEPAGGR period and are usually only
recalculated for periods where module usage details are available.
The Aggregator run can be time consuming since it is run for the entire repository and periods rather than an
individual SID (as in the case of the Inquisitor Import), or system and period (as in the case of the Usage Import). It is
therefore more efficient to run the Aggregator only once following several imports of usage or discovery data. Ensure
also that you do not keep usage details for longer than is necessary for your site, and that Usage Deletion is run on a
regular basis.
An example of how to run the Aggregator can be seen in sample jobs that are generated by HSISCUST, such as
HSISIQIM (Inquisitor Import) and HSISUIMP (Usage Import).
TPARAM parameters
The TPARAM parameters that you specify for aggregating usage and discovery data is included in the import.
COMMIT=
COUNTUSAGEFULL=
Default value is N, and this means that only entries for systems and periods that are affected by recent
activities are calculated. This parameter performs the same function as the COUNTUSAGE parameter,
as described in sections - Importing Inquisitor data on page 113, and Importing usage data. on
page 115
A value of Y means that usage count totals for all systems and periods are deleted and recalculated.
It is more reliable, however, to recalculate all totals preferably with every run of the Aggregator, or at
least occasionally if the COUNTUSAGEFULL=Y process is too time consuming. The time taken to
refresh the usage counts can be seen in the Aggregator log.
DSN=
IXBUFFERPOOL=
The buffer pool for indexes created on declared global temporary tables that are used by the
Aggregator. If not supplied, the buffer pool defined for the database where the global temporary tables
belong is used. This value is normally only needed by sites which have a requirement to specify different
buffer pool values for different applications or invocations, and have used specific values during the
creation of the database repository.
116
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
IXSTOGROUP=
The storage group for indexes created on declared global temporary tables that are used the
Aggregator. Default is SGHSIIDX. This value need only be specified by sites that have a procedural
requirement of not using the default Db2® storage group value, and have used a different STOGROUP
value during the creation of the product database repository.
GKBSCHEMA=
REPSCHEMA=
The Automation Server runs as a started task in its own address space.
The user ID for the Automation Server must have an OMVS segment and a UID, or there must be a default UID
configured.
The Automation Server issues a system-wide ENQ to ensure that there is only one instance of it in a z/OS® image.
A single instance of the Automation Server continuously references all data sets, catalogs, and volumes that are
accessible from all systems in a sysplex so it is unnecessary for the Automation Server to run on more than one
system.
Usually a single instance of the Automation Server is sufficient to handle the work from multiple systems which share
the same DASD. JOB actions can have any necessary system affinities coded in their JCL.
Input control statements define the processing to be performed by the Automation Server. There are two types of
control statements, action statements and DSN statements:
action
Action statements name the template member which forms the basic input for the action to be
performed when a relevant data set is newly discovered by a catalog search. They have optional
operands to specify time-of-day, day-of-week, day-of-month, and month-of-year restrictions.
DSN
DSN statements provide a data set name mask to be associated with the preceding action statement.
There can be many DSN statements after each action statement.
117
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
FTP
For the FTP action, the template member is read and, after symbol substitution processing, is written
to the file defined by the INPUT DD statement. The INPUT file is allocated to a temporary data set. The
FTP program is attached as a subtask and scans the INPUT file to process the FTP requests. The report
messages it generates are written to the OUTPUT file.
Upon completion of the FTP subtask, the Automation Server examines the completion code. If the
program ends normally with a zero return code, the Automation Server deems the action to have been
successful and updates the action status in the HSIACDS file so the action is not repeated for this data
set.
If the FTP program abends, the Automation Server deems the action to have failed. A failed transfer is
tried again at a later time. A retry is subject to specified scheduling constraints. The OUTPUT FTP report
file contains information to track the exact cause of a transfer failure.
JOB
For the JOB action, the template member is read and, after symbol substitution processing, is written
to the file defined by the INTRDR DD statement. This file is directed to the internal reader used by the
system, and the jobs submitted by the Automation Server become available for JCL conversion as soon
as the INTRDR file is closed, or another JOB card image is found by the reader.
The Automation Server deems all JOB submissions successful, so there are no retries. Any failure
should be investigated using the appropriate procedures used by your installation.
Note: The job stream in a JOB action template member may define more than one job.
The Automation Server does not check template member records for either FTP or JCL validity.
Before initiating an action for a detected data set, the Automation Server attempts to exclusively allocate the data
set. If the data set is in use, the action is not performed and the awaiting retry status is stored in the control data
set. The action is performed when the data set is next found to be available for use within any specified scheduling
restrictions. Dynamic allocation failures due to other reasons do not inhibit the action.
118
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Procedure
1. Allocate sufficient space for the Automation Server to handle the workload required by the installation.
One 96 byte record (including the 52-byte key) is required for each data set processed by the Automation
Server.
2. Create the control data set by running the HSIASALC job that contains the IDCAMS JCL and control
statements.
3. In the HSIACDS ddname, allocate the VSAM KSDS control data set to the Automation Server.
Procedure
1. Set values for the following parameters in the HSIJAUTO task in the JCLLIB library:
• HSI : Set high-level qualifiers for the installation target libraries months
• HSIINST: Set high-level qualifiers for the &HSIINST..PARMLIB data set created by the HSISCUST job.
• ACDS: Set the data set name of the Automation Control Data Set (ACDS).
2. Copy the HSIJAUTO member from the JCLLIB library to an authorized PROCLIB library.
STEPLIB
Load library containing the product software. Not required if IBM Z Software Asset Management is
installed into the system link list.
HSIACNTL
Partitioned data set containing fixed-length 80-byte records. Member HSIAPARM of this partitioned data
set contains the Automation Server control statements that specify the actions to be performed. For
each action in the HSIAPARM member, there is a corresponding member of the same name containing
the template data for that action. The template data is made up of JCL or an FTP command stream
containing symbolic references, to be resolved by the Automation Server when the action is performed.
HSIACDS
119
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIAMSG
Specifies the message report file for the Automation Server. Initialization statements, error messages,
and activity logging messages, are written to this file.
SYSPRINT
SYSOUT
OUTPUT
Specifies the message report file for the FTP program. The contents are determined by the FTP program
installed in the system.
INPUT
Specifies a fixed length 120-byte record file containing FTP commands read by the FTP program. The
FTP commands are written to this file before the Automation Server FTP action is performed.
INTRDR
Specifies a fixed length 80-byte record file to be directed to the internal reader used by the system. The
Automation Server writes a job stream to this file whenever a JOB action is to be performed.
Syntax rules
Syntax rules are as follows:
Statement syntax
Action statement
Each statement requests that an action is performed for a data set when it matches an associated data
set name mask, and is detected for the first time. An action is performed once for each match, but the
presence of a data set triggers the action for each specified data set name mask it matches.
120
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Action statements have several optional operands to provide control over when Automation Server
processing is to occur.
• time-of-day window
• day-of-week control string
• day-of-month window
• month-of-year control string
When all these constraints have been satisfied, the Automation Server searches the catalog for data
sets with names that match the masks associated with an action.
Each data set name mask statement associates the specified data set name mask with the preceding
action statement. It is invalid for the HSIAPARM member to begin with a data set name mask
statement. When a data set with a name matching the specified mask is first located, the action
specified in the preceding action statement is triggered.
The data set name mask of NULLFILE is an exception. When a data set name mask with this exact value
is processed by the Automation Server, a catalog search is not performed, but the associated action
is triggered as if a new cataloged data set matching the mask has been located. Automation Server
symbols for the data set name, and for the first qualifier of the data set name have values of the 8-byte
string NULLFILE. Use the data set name mask of NULLFILE to trigger scheduled actions which do not
depend on the creation of a particular data set.
TIME( hhmm-hhmm ) WEEK( wkflags) NOTB( d1) NOTA( d2) MNTH( mthflags )
action
FTP or JOB
template
TIME
This operand is optional, and the default is TIME(0000-2400), which specifies no time-of-day constraint.
hhmm-hhmm
Specifies a time-of-day range. Each hhmm value is four contiguous decimal digits that specify a time-of-
day using the 24-hour clock. The minimum value is 0000 and the maximum value is 2400; the last two
digits must not exceed 59. The two values are separated by a hyphen. Zero or more additional blanks
are also permitted. The first hhmm specifies the time-of-day window start, while the second specifies
121
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
the time-of-day window end. The window includes times which are after the window start and before
the window end. However, if the second hhmm value is lower than the first, the window includes times
which are after the window start or before the window end.
WEEK
This operand is optional. The default is WEEK(YYYYYYY), which specifies that the action can be run on
every day of the week.
wkflags
Specifies a single contiguous 7-byte string, consisting of the uppercase characters Y or N. Each Y or
N corresponds to a day of the week depending on its position in the string; the first corresponding to
Sunday, the last to Saturday. If the character corresponding to a day of the week is N, the action is not
processed on that day.
NOTB
This operand is optional. The default NOTB(1) specifies that the monthly window starts on the first
possible day of the month. NOTB means "not before".
d1
Specifies a one or two digit decimal number in the 1-31 range. This number denotes the first possible
day of the month on which the action is permitted.
NOTA
This operand is optional. The default NOTA(31) specifies that the monthly window extends to the last
day of the month. NOTA means "not after".
d2
Specifies a one or two digit decimal number in the 1-31 range. This number denotes the last possible
day of the month on which the action is permitted.
MNTH
This operand is optional. The default value enables processing in every month of the year.
mthflags
Specifies a single contiguous 12-byte string, consisting of the uppercase characters Y or N. Each Y or
N corresponds to a month of the year depending on its position in the string; the first corresponding to
January, the last to December. If the character corresponding to a month of the year is N, the action is
not processed in that month.
DSN(data-set-name-mask )
DSN
122
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
data-set-name-mask
Specifies a data set name mask pattern which does not exceed 44 characters in length, and is used by
the Catalog Search Interface. The generic match mask for a single character is the percent sign. The
generic match mask variable number of characters is the asterisk. A double asterisk can be used to
match a variable number of data set name qualifiers. The catalog search is restricted to entry type A
non-VSAM data sets and entry type H generation data sets.
Files created by the Usage Monitor undergo two independent processes, both within the 8:00 p.m. to
11:30 p.m. window. They are processed by a job based on the JCL contained in member HSISJOB1,
and are separately transferred to a z/OS® system using the FTP commands in member HSISFTP1. All
members are pointed to by the HSIACNTL ddname.
Example 2:
Files created by the Usage Monitor are to be imported to the appropriate database.
In this example HSISUIMP contains the necessary JCL to run Usage Import on a z/OS® system.
Note: The JCL can route the job to any connected NJE node, or specify an affinity to any system
sharing the SPOOL. You do not need to run the job on the z/OS® system where the Automation
Server is running. The template name, HSISUIMP in this example, does not need to match the
job name submitted by the Automation Server action.
Example 3:
Example 4:
A job stream stored in member NEWSHIFT is to run every day at 6:00 a.m, 2:00 p.m., and 10:00 p.m.
123
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
DSN(NULLFILE)
JOB(NEWSHIFT) TIME(2200-2230)
DSN(NULLFILE)
System symbols supplied by the operating system, as well as the &SMF and &SYSLPAR symbols supplied by the
Automation Server, are available for use in the HSIAPARM member. The &SYSLPAR symbol might resolve to a null
string if the system is running in a virtual machine.
Symbol Description
124
Chapter 6. Collecting and importing data with IBM Z Software Asset Management
Example:
The data set triggering a JOB action is EXPUSER.IQ.ZIP. As a result, JCL DD statements referencing the
data set in a template member can be represented as shown in this example:
//*------------------------------------------------------------***
//* Sample JCL demonstrating the use of Automation Server local***
//* symbols derived from the data set name. ***
//*------------------------------------------------------------***
//BR14 EXEC PGM=IEFBR14
//DD1 DD DSN=&DATASETNAME.,DISP=SHR
//DD2 DD DSN=&QUAL1..&QUAL2..&QUAL3.,DISP=SHR
DSN=EXPUSER.IQ.ZIP,DISP=SHR
As symbol substitution is performed before the job is submitted, z/OS® system symbols that cannot
be used in batch job JCL, can be used in the Automation Server templates. The symbols are resolved
using the system executing the Automation Server, which may not be the system where the submitted
job executes.
Procedure
1. Assign RACF® CONTROL access to the VSAM data set that is configured for the user ID that is assigned to
the Automation Server.
2. Issue the system START command to start the Automation Server.
3. Issue the system STOP command to stop the Automation Server running as a started task or from running a
batch job.
In the HSIAPARM member you define actions to be performed, and supply data set name masks specifying the data
sets to be processed by the Automation Server. Data sets with these name patterns might already exist and have
been processed before the Automation Server was implemented.
To exclude a data set, the name of the data must satisfy a selection mask pattern. To implement the exclusion, you
can use the Automation Server data set name scouting program. The HSISCUST post-installation job creates the
HSIASSCT member in the JCLLIB data set. Run the HSIASSCT job to start the scouting program.
125
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
The program reads the HSIAPARM member, searches the catalog for every specified data set name mask, and writes
a record for each data set that it discovers. The job then sorts the records into key order and copies them into the
VSAM control data set. Every record loaded into the control data set in this way indicates a specific action with a
status of complete.
If you want to continue processing some of the data sets, you can manually delete them from the sequential data set
before the data is copied into the control data set.
If a processed data set is deleted, or a data set name mask is removed from the set of masks processed by the
Automation Server, then there is no reason to keep a record of that data set in the ACDS. The Automation Server
performs a cleanup cycle for the ACDS on a daily basis. This cleanup cycle consists of reading the ACDS sequentially,
and deleting records for data sets which have not been found by catalog search. This is based on the relevant data
set name mask in the current calendar month, or in the prior calendar month.
As with most VSAM data sets with ongoing record insertion and deletion activity, it is advisable to periodically
reorganize the ACDS.
126
Chapter 7. Reporting with the Analyzer
The primary reporting facility in IBM Z Software Asset Management is the Analyzer.
The Analyzer runs as a started task or batch job on the same z/OS® host as the Db2® Subsystem or SQLite database
that contains the IBM Z Software Asset Management database(s).
Online mode
A PC Browser, for example Firefox, is used to communicate with the Analyzer for interactive queries.
Batch mode
This mode uses the Analyzer to generate the report to an output file. The Batch mode is useful when
you want to automate reports or develop your own reports. Batch mode is also useful when you want
to select multiple criteria, such as multiple libraries or multiple users which you cannot do online from
some reports.
All Analyzer reports can be run in online and batch modes and can produce the following output formats:
• XML (xml)
• HTML (htm)
• Excel (Excel)
• Text line (txt)
• Comma Separated Value (csv)
Analyzer prerequisites
The Analyzer uses the Db2® Call Library Interface (ODBC/CLI), also used by the Inquisitor Import, Usage Import and
other batch components, and the z/OS® socket application programming interface. For the SQLite database, the
Analyzer uses an internal ODBC interface.
There is no dependency on any other middleware components. For example, no dependency exists on the HTTP
Server, WebSphere® Application Server, or Java™.
The Analyzer has been designed with minimal prerequisites. These are:
• The Analyzer must be run on the same z/OS® host as the Db2® subsystem or SQLite database that contains
the IBM Z Software Asset Management repositories.
• The user ID of the Analyzer address space must have previously been granted access to the databases. See
the HSISGRNT job in the JCLLIB for sample JCL to grant access.
• When running the Analyzer in the online mode, you need access to a TCP/IP port. The default is port 9000.
• When running the Analyzer in online mode with SECURITY=SYSTEM, the Analyzer SHSIMOD1 load library must
be defined to the z/OS® Authorized Program Facility (APF). In addition, all data sets in the Analyzer STEPLIB,
or JOBLIB DD concatenation, must be defined to APF.
• You can run the Analyzer in online mode while Inquisitor Import or Usage Import is also updating data into
the repositories. However, the Analyzer reports may not display the correct information on the latest updates
127
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
due to concurrency issues in Db2®. To ensure that the latest correct information is displayed, do not run
operational jobs that update data in the repositories while users are running reports with the Analyzer. This is
not an issue for the SQLite database, as only single thread is allowed.
The members in the JCLLIB contain sample JCL to run the Analyzer.
Member Description
HSIJANLO Analyzer PROC for online mode. Copy this PROC from the JCLLIB to a system PROCLIB data set
to run the Analyzer as a started task
HSISANS1 Define the Analyzer security profiles in RACF® (only applicable for Analyzer SECURITY=SYSTEM
setting)
HSISANS2 Generate the Analyzer SSL certificate in RACF® (only applicable for Analyzer SECURITY=SYSTEM
setting)
HSISANS3 Connect the Analyzer user ID to an existing SSL certificate in RACF® (only applicable for Analyzer
SECURITY=SYSTEM setting)
The following members in the PARMLIB contain sample configuration settings for the Analyzer in online mode. These
members are referenced with the TPARAM setting in the HSIJANLO PROC.
Member Description
HSISANP1 SECURITY=BASIC
HSISANP2 SECURITY=SYSTEM
Refer to the HSISANS1, HSISANS2, and HSISANS3 members in JCLLIB for sample JCL to define
RACF profiles/certificates.
128
Chapter 7. Reporting with the Analyzer
Note: The V8.2 Analyzer will support only V8.2 repositories. Repositories from V8.1 are NOT supported and
will not appear in the V8.2 Analyzer.
Note: Db2 only: It is recommended that not more than 50 repositories be defined in a Db2 subsystem that is
referenced by each Analyzer. This is to prevent overload to the Analyzer and also for easier management of
repositories.
Db2 only:
1. The Db2 subsystem must first be active before starting up the Analyzer. After the Analyzer starts, it needs
to access the Db2 Catalogs to obtain the list of repositories. If the Db2 subsystem is not active, the error
message below appears in the Analyzer joblog.
2. The Db2 subsystem can be stopped while the Analyzer is still active, but it will remain in a wait state. If a user
logs in and tries to access a repository, the error message below will appear on the Analyzer report. When the
Db2 subsystem is next started, users can login again and will automatically re-establish connection to Db2.
HSISANLO job in the JCLLIB is used to run Analyzer in online mode as a batch job.
To run the Analyzer in online mode as a Started Task, copy the HSIJANLO from the JCLLIB to a system PROCLIB data
set. Here is a sample for running the started task in a Db2 subsystem.
129
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
//HSICUST DD DISP=SHR,
// DSN=&HSIINST..&DB..PARMLIB(&&CUST)
//*HSINLS DD DISP=SHR,DSN=&HSI..SHSIANL1(HSINLSJP)
//TPARAM DD DISP=SHR,
// DSN=&HSIINST..&DB..PARMLIB(&&TPARAM)
//DSNAOINI DD DISP=SHR,
// DSN=&HSIINST..&DB..PARMLIB(&&CLI)
//WORK0 DD DISP=(NEW,DELETE),
// UNIT=SYSALLDA,SPACE=(CYL,(100,50),RLSE)
//APPSTATS DD SYSOUT=*,LRECL=1000
//APPTRACE DD SYSOUT=*
When the Analyzer is run with online mode, configuration options must be defined in the TPARAM DD, including the
communication port, security mode, and inactivity timeout.
Both sample PARMLIB members HSISANP1 (basic security) and HSISANP2 (system security), have the following:
***********************************************************************
* HTTPPORT defines the TCP/IP port used for communications. *
* *
* If HTTPPORT = 9000 is defined on a system with a TCP/IP host *
* called sys1.mycompany.com, to access the Analyzer the user *
* would specify the following URL in their PC Browser: *
* http://sys1.mycompany.com:9000 if SECURITY=BASIC *
* or https://sys1.mycompany.com:9000 if SECURITY=SYSTEM *
* *
* The port specified must be available on your system. *
* *
* TSO NETSTAT can be used to check if a port is available e.g.: *
* TSO NETSTAT (PORT 9000 --* is port 9000 in use? *
* TSO NETSTAT PORTL(PORT 9000 --* is port 9000 reserved? *
* *
* If no entries are returned from these NETSTAT commands, the port *
* is most probably available. At some sites, you may need your *
* Network Systems Programmer to reserve a port for IZSAM Analyzer. *
* *
***********************************************************************
HTTPPORT = 9000
If HTTPPORT is not specified, or is set to 0, the Analyzer fails with message “COULD NOT OPEN DD:SYSIN”.
Both sample PARMLIB members HSISANP1 (basic security) and HSISANP2 (system security), have the following:
***********************************************************************
* INACTIVITY_TIMEOUT defines the inactivity timeout in minutes. *
* *
* The minimum value is 5 and the maximum is 9999. *
* *
* If INACTIVITY_TIMEOUT = 0 is defined, no timeout will occur. *
130
Chapter 7. Reporting with the Analyzer
***********************************************************************
Analyzer security
You can view Analyzer reports in a web browser, such as Firefox, and you can communicate with the Analyzer utility to
perform interactive queries.
Some of the Analyzer reports contain a large amount of information and it is recommended that you use a screen
resolution of at least 1440 x 900 pixels to view them.
The following table describes the security modes that you can configure for accessing Analyzer online.
Communi
Security configuration cation mode Access ID and password Access permissions
SECURITY=BASIC HTTP Standard user ID and password. Default val User ID izsamusr has
ues are: limited access. User ID
izsamadm has full access.
• User: izsamusr and password IZSAM
• Admin: izsamadm and password IZSAM
SECURITY=SYSTEM HTTPS z/OS® system user ID and password Depends on the users'
access to the HSICANLZ
Default: User TSO ID and password
application and various
Z SW Asset Mgmt and
Db2® resources
User IDs IZSAMADM and IZSAMUSR can be used without any prior configuration. User ID AUID001 is a sample of how
to restrict a user ID to certain databases.
************************************************
* SECURITY=BASIC - HTTP communications *
* with basic security defined in TPARAM DD below. *
* *
***********************************************************************
SECURITY = BASIC
***********************************************************************
* The following settings are only applicable for *
* SECURITY=BASIC: *
* *
* AUTH_USER defines Userids and passwords for Analyzer logon *
* AUTH_DB defines the repositories access *
* AUTH_MENU defines the menus access *
* *
131
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
*----------------------------------------------------------------------
*AUTH_USER= USERID , PASSWORD *
*----------------------------------------------------------------------
AUTH_USER = IZSAMADM , IZSAM
AUTH_USER = IZSAMUSR , IZSAM
AUTH_USER = AUID001 , PW01
*---------------------------------------------------------------------*
*AUTH_DB = REPOSITORY, LIST OF USERIDS AUTHORIZED TO SEE THE *
* REPOSITORIES *
*---------------------------------------------------------------------*
AUTH_DB = * , IZSAMADM IZSAMUSR
AUTH_DB = AUDB01 , AUID001
AUTH_DB = AUDB02 , AUID001
*---------------------------------------------------------------------*
*AUTH_MENU= MENU_TAB , LIST OF USERIDS AUTHORIZED TO SEE THE MENU TAB *
*---------------------------------------------------------------------*
AUTH_MENU = ASSET , IZSAMADM IZSAMUSR AUID001
AUTH_MENU = DISC , IZSAMADM IZSAMUSR
AUTH_MENU = ADMINR , IZSAMADM,IZSAMUSR
AUTH_MENU = ADMIN , IZSAMADM
AUTH_MENU = CUSTOM , IZSAMADM IZSAMUSR
* Activation/deactivation of the new Lib Classification items.
* ADMIN displays Admin menu with lib classification items deactivated.
* (Must specify this to see the Admin menu at all)
* ADMIN(LIB_CLASSIFICATION) activates the lib classification items for the specified users.
***********************************************************************
* IZSAM Analyzer on-line mode settings for z/OS SYSTEM security *
* *
***********************************************************************
* SECURITY=SYSTEM - HTTPS (SSL encrypted) communications *
132
Chapter 7. Reporting with the Analyzer
***********************************************************************
* The following settings are only applicable for *
* SECURITY=SYSTEM: *
* *
* AUTH_HLQ defines SAF/RACF profile high level qualifier *
* *
* AUTH_UPPERCASE=Y Analyzer will uppercase passwords when *
* invoking SAF/RACF password authentication. *
* When password phrase support has been *
* enabled AUTH_UPPERCASE=Y has no effect, and *
* mixed case is used. *
* AUTH_UPPERCASE=N Analyzer will pass through mixed case passwords *
* when invoking SAF/RACF password authentication *
* *
* GSK_KEYRING_FILE defines SAF/RACF Keyring name of SSL Certificate *
* GSK_KEY_LABEL defines SAF/RACF Label name of SSL Certificate *
* GSK_.... defines optional z/OS SSL environment variables. *
* The z/OS Cryptographic Services Secure Sockets *
* Layer Programming manual explains the *
* environment variables. *
* For example, define GSK_HW_CRYPTO = 32 *
* for SHA-256 digest generation. *
* *
* JCLLIB(HSISANS1) contains sample JCL to define RACF profiles, using *
* a high level qualifier of 'IZSAM'. If you have changed HSISANS1, *
* you may also need to change the AUTH_HLQ TPARAM setting. *
* *
* JCLLIB(HSISANS2/3) contains sample JCL to define RACF SSL *
* Certificates. If you have changes HSISANS2/3, you may also need to *
* change the GSK_KEYRING_FILE and GSK_KEY_LABEL TPARAM settings. *
* *
***********************************************************************
AUTH_HLQ = IZSAM
AUTH_UPPERCASE = Y
GSK_KEYRING_FILE = ZSAM_KEYRING
GSK_KEY_LABEL = ZSAMCERT
HSISANS1 in the JCLLIB has sample JCL to define RACF® security profiles.
Note: The RACF® ID can be an existing RACF® group (which user IDs have been connected to) and/or
existing RACF® user IDs.
If your z/OS® system has been set up to use a third party alternative to RACF®, you must define comparable settings
in your third party security product.
/*--------------------------------------------------------------*/
/* IZSAM ANALYZER DATABASE PROFILES */
/*--------------------------------------------------------------*/
133
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
SSL Certificates
When the Analyzer is running with SYSTEM=SECURITY, you must have an SSL Certificate defined in your SAF/RACF®
security system. You can either generate your own certificate, or connect to an existing certificate.
//*********************************************************************
//* *
//* To enable IZSAM Analyzer to use HTTP secure (HTTPS) the following *
134
Chapter 7. Reporting with the Analyzer
SETROPTS CLASSACT(DIGTCERT,DIGTNMAP)
RACDCERT ID(Userid-running-HSISANLO) -
CONNECT(ID(Userid-running-HSISANLO) -
LABEL('IZSAMCERT') -
RING(IZSAM_KEYRING) -
DEFAULT -
USAGE(PERSONAL))
RACDCERT ID(Userid-running-HSISANLO) -
CONNECT(ID(Userid-running-HSISANLO) CERTAUTH -
LABEL('LOCALCA') -
135
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
RING(IZSAM_KEYRING) -
USAGE(CERTAUTH))
/*
HSISANS3 in JCLLIB has sample JCL to connect to existing SSL certificates in RACF®.
//*********************************************************************
//* *
//* To enable IZSAM Analyzer to use HTTP secure (HTTPS) using an *
//* existing CA certificate, 'Entrust Secure Server Root CA' in our *
//* example, the following steps should be implemented by your site's *
//* RACF Administrator: *
//* *
//* 1. Delete KEYRING(IZSAM_KEYRING) and certificate with the *
//* LABEL('IZSAMCERT'). *
//* 2. Activate RACF Classes required for digital certificates. *
//* 3. Define Keyring IZSAM_KEYRING. *
//* 4. Connect the existing CA certificate to the Keyring. *
//* 5. Refresh RACF Classes required for digital certificates. *
//* 6. Permit access to the Facility Class profiles. *
//* *
//* *
//* The following JCL demonstrates a sample implementation: *
//* 1. Update all occurrences of "Userid-running-HSISANLO" to reflect *
//* your IZSAM HTTPS environment. *
//* *
//* Do not change the RACF keyring 'IZSAM_KEYRING' or label 'IZSAMCERT'
//* unless you update the corresponding values in Analyzer PARMLIB *
//* member HSISANP2 and restart the Analyzer STC/Job. *
//*-------------------------------------------------------------------*
//RACFDEF EXEC PGM=IKJEFT01,DYNAMNBR=30
//SYSTSPRT DD SYSOUT=*
//SYSTSIN DD *
PROF NOPREF
136
Chapter 7. Reporting with the Analyzer
SETROPTS CLASSACT(DIGTCERT,DIGTNMAP)
RACDCERT ID(Userid-running-HSISANLO) -
CONNECT(ID(Userid-running-HSISANLO) -
LABEL('IZSAMCERT') -
RING(IZSAM_KEYRING) -
DEFAULT -
USAGE(PERSONAL))
RACDCERT ID(Userid-running-HSISANLO) -
CONNECT(ID(Userid-running-HSISANLO) CERTAUTH -
LABEL('Entrust Secure Server Root CA') -
RING(IZSAM_KEYRING) -
USAGE(CERTAUTH))
137
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
To access the Analyzer online, enter the URL including the host name and port number, in the address bar of a
browser, for example PTHOMU2.prod.hclpnp.com:9087. In the Log In screen, provide the user ID and password
associated with the BASIC security mode. See Analyzer security on page 131.
When you login to the Analyzer online, the Analyzer Menu window includes the following tabs:
• The Assets tab contains reports that query high level aggregated data, such as product versions. This level of
data is useful if you are reconciling product licenses.
• The Discovery tab contains reports that query low-level discovery data, such as product releases, libraries, and
modules. This level of data is useful if you support z/OS® systems.
138
Chapter 7. Reporting with the Analyzer
• The Administration Reports tab contains administration tasks where no updates are permitted.
• The Administration tab contains administration tasks and troubleshooting reports. These reports are
designed for IBM Z Software Asset Management administrators and users only see this menu if they are
granted specific access.
• The Custom tab contains your local custom reports. Two example custom reports are provided.
139
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
From any of the tabs, when you click the link to a report, the next window opens that contains parameter selection
lists based on the data in your database. Select items in the parameter lists to construct a query. Hold down the Ctrl
or Shift key to select multiple items from a list. When you have selected all required parameters, click Submit to run
the query.
At the end of every report, the report name and parameters are shown in the same syntax that you can copy and
paste into the HSISANLB batch job SYSIN DD deck to run the report in batch mode.
When you construct a query, if you choose the option Output format and select Browser as the output format, the
report includes hyperlinks that you can use to drill down for more information.
You can download the content of a report, including the embedded content, in the following file formats:
• XML (xml)
• HTML (htm)
• Excel (Excel)
• Text (txt)
• Comma separated value (csv)
Command Description
/F HSISANLO,STOP
/P HSISANLO
REFRESH Refreshes Analyzer report templates and NLS text. For example:
/F HSISANLO,REFRESH
140
Chapter 7. Reporting with the Analyzer
Command Description
/F HSISANLO,TRACE
141
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
//** DISP=(MOD,DELETE),UNIT=SYSALLDA,SPACE=(TRK,(0,0))
//*
//ALLOC EXEC PGM=IEFBR14
//OUTDSN DD DISP=(MOD,CATLG),DSN=&OUTDSN,
// UNIT=SYSALLDA,SPACE=(CYL,(200,100),RLSE)
/*
//**************************************************************
//ANALYZER EXEC PGM=HSICANLZ,REGION=0M,TIME=NOLIMIT
//STEPLIB DD DISP=SHR,DSN=DB2VC10.DEC2.SDSNEXIT
// DD DISP=SHR,DSN=DB2.VC10.SDSNLOAD
// DD DISP=SHR,DSN=hlq.SHSIMOD1
// DD DISP=SHR,DSN=CEE.SCEERUN
// DD DISP=SHR,DSN=CBC.SCLBDLL
//SYSPRINT DD SYSOUT=*,LRECL=500
//HSIANL1 DD DISP=SHR,DSN=hlq.SHSIANL1
//HSIANL2 DD DISP=SHR,DSN=hlq.SHSIANL2
//HSICUST DD DISP=SHR,
// DSN= USERID.hlq.DC2.TF12V8C2.PARMLIB(HSISANCQ)
//*HSINLS DD DISP=SHR,DSN=hlq.SHSIANL1(HSINLSJP)
//DSNAOINI DD DISP=SHR,
// DSN=USERID.hlq.DC2.TF12V8C2.PARMLIB(HSISCLI)
//WORK0 DD DSN=&WORK0,DISP=(NEW,DELETE),
// UNIT=SYSALLDA,SPACE=(CYL,(200,100),RLSE)
//TPARAM DD DUMMY
//OUTPUT1 DD DISP=OLD,DSN=&OUTDSN,LRECL=2000
//APPSTATS DD SYSOUT=*,LRECL=1000
//APPTRACE DD SYSOUT=*
//SYSIN DD *
/asset/audit_trail
vendor = IBM
showfeature = on
multirep = REPZ8
@headers = full
/*
The report name and parameters are specified in the SYSIN DD and the output goes to the OUTPUT1 DD.
The simplest way to know what report name and parameters to specify is to run the report first using Analyzer in
online mode. At the end of every report, the report name and parameters are listed in the syntax needed for batch
mode. You can copy and paste this syntax into the batch SYSIN DD.
Alternatively, you can directly type in the parameters. Wildcard filters have been enabled to assist in this case.
142
Chapter 8. Running the utilities provided with IBM Z
Software Asset Management
IBM Z Software Asset Management provides utilities that you run to perform routine functional tasks to maintain the
product lifecycle.
The Usage Monitor started task produces at least one usage data set per day. You can design a work flow that
runs the ZCAT utility on the data sets on a weekly, fortnightly, or monthly basis before the Usage Import program
processes them. Running the ZCAT utility on a weekly basis is useful, but depends on the amount of data that is
produced and processed at your site. The Usage Monitor program collects detail about which job, account ID, and
user ID are using each module of a particular library on a specified date. This information is output into multiple files
that are produced on a daily basis. The ZCAT utility condenses the files in the following manner:
• Usage data across multiple files is condensed to a monthly granularity, as are the records stored in the
Repository database.
• Redundant records in files and records that are not stored in the database, are omitted.
• Optionally, condensation can apply to user IDs, job names, or account ID details.
• The ZCAT output file is compressed and ready to be transmitted for Usage Import processing.
The following diagram shows the syntax of program parameters to run the ZCAT utility.
UMDSN( hlq)
,NORENAME
UMDSN(hlq)
hlq is the Usage Monitor data set high-level qualifier. When the UMDSN parameter is specified, ZCAT
concatenates all data sets having names of hlq.Dyyyyddd.Thhmmsst where yyyyddd and hhmmsst
are the timestamp patterns of data sets produced by the Usage Monitor. The hlq can contain wildcard
characters of percent or asterisk. The percent character denotes a single character mask, and the
143
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
asterisk character denotes all characters. For example UMDSN(hlq.**)would search for all data set
names of hlq.**.D%%%%%%%.T%%%%%%%.
UMMASK(dsnmask)
dsnmask is the full dsn mask search criteria. It can be used to search for a pattern of files that differ
from the files produced by the Usage Monitor. This parameter is useful if the files produced by the
Usage Monitor have been renamed, but still need processing. Specifying UMMASK(hlq.D%%%%%%%.T%
%%%%%%) is equivalent to specifying UMDSN(hlq)
Note: An easy way to remember the difference between UMDSN and UMMASK is to remember that UMDSN
can accept the data set name prefix value specified in the Usage Monitor DSN setting, whereas UMMASK
requires a mask which will match the entire data set name.
Input data sets found by searching the catalog may be zipped or unzipped. If zipped, then records before the
first Usage Monitor header record will be discarded. If unzipped, the data set will not be processed unless the
first record is a Usage Monitor header record.
DELETE
Delete the input data sets after the output data set is successfully generated. NODELETE is the default.
NORENAME
Do not rename input data sets from hlq.D*.T* to hlq.D*.S* after the output data set is successfully
generated. The default is to rename these input data sets to stop them being reprocessed by the ZCAT
utility. Use this option only to rename the data sets before further ZCAT processing. This option stops
double counting of usage data. This parameter is automatically set when UMMASK is used.
Data sets allocated to the ZCAT0001 DD are not included in RENAME and DELETE processing.
JNM
JNM=N - Condense different job names to generic names of -STC-, -JOB-, -TSO- or -SYS-
144
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
UID
JAC
Note: The ZCATDETL file can be used to collect all valid importable input records into a single data set for
archiving purposes, with the exception that duplicate user records are suppressed, and all user records are
discarded if UID=N is specified.
DSDTL
VFY
VFY is used to control whether the ZCATOUT file is to be verified after creation.
VFY=Y - After the ZCATOUT file is complete, it will be unzipped and read to verify that its contents are
readable and that the expected number of records are present. This is the default.
PACK
PACK is used to specify the zip compaction level used when writing zipped data.
PACK=0 - Specifies that the shrink zip algorithm is used while higher values specify the compaction
level of the deflate zip algorithm to be used. Higher compaction levels will achieve greater data
compression, but will also consume disproportionately more CPU time.
PACK=1 - Is the default setting which requests the fastest level of the deflate method.
145
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
DD statements
SYSPRINT
Specifies the report file required by ZCAT which is usually allocated to SYSOUT. By default, RECFM=VBA
and LRECL=137 will be used, though these can be overridden within some limits.
ZCATOUT
Specifies the name of the ZCAT output data set. This data set can then be used as the input to the
Usage Import program, where usage details are imported into the database. If the ZCATOUT DD card
is omitted, ZCAT by default writes to a data set having the name hlq.Dyyyyddd.Uhhmmsst (U instead
of T implied by the high level qualifier (hlq) option for input data sets), where yyyyddd and hhmmsst
refer to the date and time timestamp of the first processed input data set. If dynamically allocated,
SPACE=(TRK,(768,255),RLSE) is used.
ZCATDETL
If the ZCATDETL DD is allocated, the uncondensed data is written to this data set. This allows detailed
job name, user ID and job account information to be retained for subsequent analysis and/or reference.
Any diagnostic records and records that fail validity testing are not written. Duplicate user records are
suppressed. If UID=N is specified then all user records are discarded.
The ZCATDETL and ZCATOUT data sets are compressed data sets written by the ZCAT utility. SMS
compression is not supported for these data sets.
ZCAT0001
If the ZCAT0001 DD is allocated, it specifies one or more usage data zip archives to be processed
by ZCAT. ZCAT0001 is processed after any data sets located by searching the catalog, and allows
administrators to manually process specific data sets which may have fallen outside the usual
processing regime, or may not fit any convenient data set name mask. Like dynamically allocated
input data sets, data set(s) allocated to ZCAT0001 may be zip archives or may contain unzipped data.
However, ZCAT0001 is treated by ZCAT as a single file, and a concatenation containing both zipped and
unzipped data is not allowed.
In this example, all data sets having names of hlq.*.*.D%%%%%%%.T%%%%%%% are processed due to the UMDSN
parameter. The condensed output is written to sysuid.hlq.ZCATOUTwhere the SYSUID system symbol is the user ID of
the person submitting the job. This file is then transmitted for Usage Import processing. All valid records are written
to the ZCATDETL DD card, sysuid.hlq.CATDETL, which is then archived for reference purposes.
146
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
To minimize space utilization and improve SQL query performance, keep no more than three months of detailed
module usage data and 13 months of aggregated product usage data.
If you do not run the Usage Deletion utility for some time, select a period of a few months, in order to keep the run
times down to a reasonable time.
TPARAM parameters
COMMIT=
DSN=
KEEPDETAIL=
Default is 2. Number of months prior to the current month for which detailed and summarized module
usage data are kept. KEEPDETAIL=0 means all detailed and summarized module usage data excluding
those from the current month are deleted.
KEEPAGGR=
Default is 12. Number of months prior to the current month for which aggregated product usage data
are kept. KEEPAGGR=0 means all aggregated product usage data, excluding those from the current
month are deleted.
FIRSTDATE=
Start of the first date range. This is in the form YYYYMM. Only complete months are chosen.
LASTDATE=
Note: The date range of deletion is inclusive of the month specified in the FIRSTDATE and
LASTDATE parameters.
REPSCHEMA=
147
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
SID=
System Identifier of system for which usage should be deleted. Specify SID=ALLSIDS to delete usage
data for all SIDs.
Note: If KEEPDETAIL is set to a value, then FIRSTDATE / LASTDATE will be ignored. If detailed usage data are
to be deleted within a certain date range, then comment out KEEPDETAIL and define dates for FIRSTDATE /
LASTDATE. For further details, please see comments described in job HSISUDEL.
For example, you can also use the System Deletion utility to delete a system that was accidentally imported into the
repository, or to delete a system that is decommissioned.
TPARAM parameters
DSN=
REPSCHEMA=
SID=
Over time, data that have been collected are either superseded or no longer valid, thus taking up space in the
repository. Each time, you run this utility, obsolete data for the specified period are physically deleted for all systems
in the Repository.
To keep the run time down to a reasonable time, set the date range for a smaller period.
148
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
TPARAM parameters
COMMIT=
DSN=
FIRSTDATE=
Start of the first date range. This is in the form YYYYMM. Only complete months are chosen.
LASTDATE=
Note: The date range of deletion is inclusive of the month specified in the FIRSTDATE and
LASTDATE parameters.
REPSCHEMA=
During IQ Import, IQ audit records are collected. Over time, these obsolete records need to be deleted if they are no
longer referenced.
TPARAM parameters
DSN=
REPSCHEMA=
RETENTION=
Default is 24. Number of months prior to the current month for which IQ audit records are kept.
SID=
149
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Following are some examples that exclude all usage, but include some usage for the specified high-level qualifiers:
XDS(*)
IDS(DB2.*)
IDS(IMS.*)
IDS(CICS.*)
IDS(SYS1.*)
The high-level qualifier listing process is automated in the Inquisitor Import job. The high-level qualifier listing is
written to a data set, and this data set is concatenated to the HSIZIN control file for the Usage Monitor program.
Running the High-level Qualifier Listing for the Usage Monitor utility
To run the High Level Qualifier for the Usage Monitor utility, use the job HSISLLST in the JCLLIB. This job is generated
from the HSISCUST post-installation customization job.
TPARAM parameters
DSN=
REPSCHEMA=
To run the TPARAM table update, use the job HSISTPRM, in the JCLLIB. This job is generated from the HSISCUST
post-installation customization job.
SYSIN parameter
UPDATE &REPZSCHM.TPARAM SET FVALUE = ’0’ WHERE FKEY = ’PROCRUN’;
150
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
Note: Using options from the Administration tab of the Analyzer is the preferred method for updating and
managing the contents of the Local Knowledge Base (LKB). Use of the Analyzer will ensure that the LKB is
not updated in a logically inconsistent way. In order to continue creating program tag data with the Tagger in
batch, supply a program parameter of TAGNOW or OLDTAG. Also note that this tag data will not be collected
by the Inquisitor unless the OLDTAG keyword is present in the program parameter string passed to the
HSIPINQ program.
The SYSIN file contains the control statements that describe which licensed programs are to be tagged. This file
contains the program name, vendor name, product identifier, and product version. The program library which contains
the software to be tagged is allocated to the SYSLIB file.
You can have only one set of identifying attributes for each program name. If conflicting attributes are found for one
or more program names, the Product Tagging utility issues a message and stops.
Information about all discovered programs relating to the nominated product is compiled into a single object module.
This module is written to the scanned library allocated to SYSLIB file or to the program library allocated to the
optional HSIREDIR file. Using the HSIREDIR file, you can nominate to keep all tag data separate from licensed
program software. The HSIREDIR file data sets must be included in the standard Inquisitor scan processing, even if
these data sets contain no other program.
The tag data members created by the Product Tagging utility are recognized by the Inquisitor (by their SSI value)
during normal program library scanning. The Inquisitor program extracts the tag data from the member contents and
writes it to an output file. The Inquisitor import process uses these program tags to maintain entries for the programs
in the local knowledge base. The match engine can then accurately identify the tagged product level, regardless of
which library the product is deployed to and which system the data is collected from.
Each time you run the Product Tagging utility, it scans a single library and tags a single software product, or optional
feature of a product. For products with multiple program libraries, each library is processed in a separate job or
step. To ensure effective software identification by the match engine as it processes each library, use the OPTION
statement to differentiate the identification entities between the different libraries of a product. Do not tag distribution
libraries.
You can override the default output member name of @HSIPTAG by specifying a TAGMEM statement. All output
members from the Product Tagging utility are flagged with an SSI value of X'D7E3C1C7', which is 'PTAG' in EBCDIC.
If there is no preexisting member of the same name, the Product Tagging utility creates a new program member
to contain the tag data. If a member exists, the new tag data is added to the existing data that relates to other
products or optional features. Any data relating to the same software identified by {VENDOR + PRODUCT + OPTION +
VERSION} is replaced. The data relating to each software piece resides in its own control section. Tag data members
contain no executable code, and are bound with the only loadable attribute. These data members are bound as
151
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
reentrant, with a residence mode of ANY, to minimize the impact of being placed in a library which is loaded into the
Link Pack Area.
To erase the effects of processing with the Product Tagging utility, delete the tag data members which are identified
by their SSI value. If you are using ISPF, employ the SORT SSI member list command.
The software processed when you run the Product Tagging utility has a key of {VENDOR + PRODUCT + OPTION +
VERSION}. If non-key data items, such as the values specified in the PPNUM or LICENSED statements are incorrect,
you can correct them by fixing the input statement values and rerunning the utility. This action replaces all non-key
tag data. However, if a key data item is incorrect, it will not be erased by running the Product Tagging utility with the
correct data.
If you are processing libraries that are not dedicated to a single licensed program, use member name masking to
prevent tagging programs not related to that product. Some installations place multiple software products in a
combined common library. If the products are tagged before they are combined, you must use different tag data
member names.
• Fixed length, variable length, and undefined record formats are processed.
• Short records are extended to 72 bytes of data, with blanks if necessary.
• Only the first 72 bytes of data for each record are processed by the Tagger.
• Records beginning with an asterisk are treated as comments and do not alter continuation status.
• The first non-blanks of a statement must identify the statement type.
• One or more blanks must follow the statement type.
• A statement with no value or operand specified is invalid.
• For statement types other than SELECT, the specified value is deemed to start with the first non-blank after the
statement type name.
• Statements can be placed in any order. All statements are processed before any tagging activity commences.
• SELECT is the only statement type which can be supplied more than once in an input file.
• SELECT is the only statement type which can be continued over more than one record.
The following table lists all of the statement types that you can use with the Product Tagging utility:
152
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
SELECT is not a value-oriented statement type. It has operands which have values specified in parentheses. The
PROGRAM or PGM inclusion operand can be abbreviated to P. The XPROGRAM or XPGM exclusion operand can be
abbreviated to XP.
The Tagger stops parsing a SELECT record and the current statement continues on to the next record whenever a
continuation character is encountered. Valid continuation characters are plus and hyphen. A continuation cannot
occur within an operand name, or a value mask.
Figure 8. SELECT syntax
PROGRAM XPROGRAM
member-mask
A string up to 8 bytes in length, representing one or more possible member names of a PDS or PDSE.
Use a percent sign to indicate that any single character is to be considered a match in the exact location
of the compared character string. Use an asterisk to indicate that any zero or more characters are a
match.
Example 1
A company called ISV has created a build of several programs (build 97) it is developing under the Swisho4U brand.
The data sets created by this build have their own disk volume called BLD097. The tag data is to be redirected to a
data set dedicated for this purpose.
153
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
VENDOR ISV
PRODUCT Swisho4U
VERSION BUILD097
/*
Example 2
The BigBiz Inc. data center is about to deploy the contractor data processing component for Version 4 Release 2 of
its internally developed human resources application called HU-MAN. The software is tagged in its own library, but the
default tag member name is not used in case it is later loaded into a program library common to several applications.
All programs in HU-MAN have names beginning with HU, but the contractor component is the only component which
has program names beginning with HUC. The relevant program library can be accessed by using the catalog.
Example 3
Version 1.5 of the product MVSBLOAT from MiscWare has been deployed on a system which has a dedicated tag
data library called SYS2.TAGLIB. Link list programs for the product have been placed in SYS2.LINKLIB and ISPF
application modules have been placed in SYS2.ISPLLIB. The product does not have optional features, but only the
base component installed. All the installed programs have names beginning with MVSB. The OPTION statement is
used to ensure that the contents of each library can be identified by the Match Engine.
154
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
VERSION 01.05.00
TAGMEM $$OEMTAG
SELECT PGM(MVSB*)
/*
Data input
DDNAME CSVIN contains the CSV output from the IBM® SCRT tool which can be from a data set with DSORG of PS
or PO. Binary uploaded CSV files are supported. DDNAME SIDMAP maps duplicate SMFIDs to a unique SID. The SCRT
Import utility handles data where the same SMFID is used on multiple machines concurrently.
To support Multiplex reports, the IBM SCRT Tool needs to be 25.3.1 or higher.
//SIDMAP DD *
11111-IPO1=QIP1
11111-IPO2=QIP2
11111-IPO3=QIP3
/*
CPU serial
5 alphanumeric characters
SMFID
1 to 4 alphanumeric characters
Unique SID
1 to 4 alphanumeric characters. This must be the same as the SID value being used by the Usage
Monitor for that z/OS® system.
Data output
Several Db2® tables are populated from the data contained in CSVIN, including NODE, NODE_CAPACITY, and
PRODUCT_NODE_CAPACITY. Ensure that the CSVIN DD points to the .CSV output file created by the SCRT tool. This
may be a DSORG=PO or PS data set.
155
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
TPARAM parameters
COMMIT=
DSN=
GKBSCHEMA=
REPSCHEMA=
To start the process you need to run two jobs to capture scanned data (Inquisitor) and historical usage data (SMF
Scanner). The output from the SMF Scanner (usage data) can then be processed to produce historical trending. SMF
records must be from the same LPAR where the z/OS® Inquisitor scan was run. SMF records not from the same
LPAR are discarded.
A sample job HSISIBM can take a file from either the Inquisitor or the Usage Monitor and filter out non-IBM®
programs. You might use this function when sending data to IBM Support for diagnosis.
The output of the SMF Scanner may also be used as input to HSISIBM. The SMF Scanner only tracks usage of the Job
Step EXEC PGM modules and does not include modules that have been invoked from within the task.
Note: The historical usage data that are captured in this utility is only an abridged version of the usage
contents. Use this utility only if you need to quickly test processing of usage records; especially if you have
not yet set up the Usage Monitors to capture usage data.
156
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
The output XML file generated from this utility needs to be transferred by FTP to a distributed environment and then
loaded into IBM Control Desk (ICD). The XML file must be translated from EBCDIC to ASCII.
TPARAM parameters
SSID=
SCHEMA=
a) Using the Repository qualifier value means that a catalog of products installed on your site is
selected.
b) You can also use the Global Knowledge Base qualifier value. This would mean that a catalog of all
products defined in the Global Knowledge Base is selected.
Procedure
1. To connect to the host system, in a command line, enter the following command:
4. To transfer non-ASCII characters, enter an ENCODING command before you enter the GET command:
157
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
In this context, an archive is a sequential file that contains one or more logical files for the purpose of reducing
the space occupied by the data. The archive can serve as a backup and convenient transport format for the data it
contains. The Inquisitor and Usage Monitor components usually create zip archives to contain the data that they
collect.
The HSIZIP utility has two compress and decompress functions: one for text data, and one for binary data.
When compressing a text record, the HSIZIP utility performs the following processing:
Each compressed member is marked as an ASCII text file, and the internal attribute value of the central file header is
set to 1.
The following input data set attributes are also stored in the zip header extended field:
When decompressing text data, the HSIZIP utility performs the following processing:
During compression, records read from data sets with fixed-length records have their trailing blanks truncated before
being compressed. After being decompressed, short records to be written to data sets with fixed-length records are
extended with blanks to the required length.
The translation tables used for conversion between EBCDIC and ASCII that are originally sourced from the EZAESENU
member in the SEZATCPX library are reciprocal, so that applying one translate table and then the other yields the
original data. Consequently, all EBCDIC single byte character set (SBCS) and double byte character set (DBCS) text
can undergo a ZIP and UNZIP cycle without corruption.
158
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
When compressing a record of binary data, the HSIZIP utility performs the following processing:
• So that record boundaries can be preserved, the following is done depending on the input record format:
◦ For fixed-length records, no additional data preparation is done.
◦ For variable-length records, the record descriptor word (RDW) is retained as part of the data.
◦ When the record format is undefined, each block is prefixed by an RDW where the first two bytes
contain the length of the block including the RDW, and the third and fourth bytes contain zeros.
• Compresses the data and writes it to the archive.
Each compressed member is marked as a binary file and the internal attribute value of the central file header is set to
0.
The following input data set attributes are also stored in the zip header extended field:
When decompressing binary data, the HSIZIP utility performs the following processing:
• To establish the length of the record, the following is done depending on the record format of the original
input data set:
◦ For fixed-length records, the original record length is used.
◦ For other record formats, 4 bytes from the archive are decompressed and examined to determine if
they form a valid RDW. If so, the RDW length indication is used, and if not, then the data is treated as a
byte stream where record boundaries do not need to be preserved.
• Data is decompressed and written as a record of the determined length. Maximum-length records are written
when the data is assessed to be a byte stream.
During decompression of binary data, the embedded RDWs are checked for validity. If an RDW does not indicate
a positive length greater than 4 or does not end with two bytes of zeros, the HSIZIP utility switches to byte stream
mode. In byte stream mode, the utility considers data as a stream of bytes without an inherent record structure. If the
RDW that fails the validity test is the first four bytes of the file, the resultant decompression is broadly compatible with
the decompression that most other platforms perform and the utility issues an informational message. If the RDW
that fails the validity test is not at the start of the file, the utility issues a warning message, sets the final condition
code to be greater than zero, but continues processing so that the output data is available for any necessary data
recovery activity.
159
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
When you invoke the HSIZIP utility as a stand-alone batch program, the PARM value on the EXEC statement specifies
the functional request. DD statements define the details of the following files:
You can specify program parameters in the function request in mixed case. The following information describes valid
program parameters.
none
If you omit the program parameter, usage notes will be printed to SYSPRINT and LIST processing will be
initiated. If SYSUT1 is not allocated the program completion code will be set to 1.
LIST
If you specify this parameter, the utility produces a list of the entries in the central file directory.
TEST
This function will list the local file headers as well as the entries in the central file directory, check that
the stored and actual values of some properties match, then perform a trial unzip of each file in the zip
archive.
ZIP or ZIP=filename.ext
Use this parameter to compress a partitioned data set into an archive where each member is loaded as
a separate zipped file within the archive. A sequential input file is processed as a single member stored
in the archive under the name specified in the parameter. If no name is specified in the parameter, the
name seq.txt is used. The data is treated as text.
ADD or ADD=filename.ext
This parameter performs the same function as ZIP except that the output file must be an existing zip
archive. The utility writes the compressed data as additional member(s) and prints a report of the
original contents of the output archive before it starts to process any new data. The data is treated as
text. There is no dependency on the text or binary nature of the existing zipped files in the archive.
UNZIP or UNZIP=filenamemask
Use this parameter to decompress an archive into a partitioned data set and load each zipped file into
a separate member. The parameter restores data sets from archives made by the HSIZIP utility with
PARM=ZIP. If the output data set is sequential, only the first file in the archive is unzipped. You can use
the file name mask specification to filter the files to be unzipped.
ZIPBIN or ZIPBIN=filename.ext
Use this parameter to compress a partitioned data set into an archive and load each member as a
separate zipped file within the archive. A sequential input file is processed as a single member stored in
the archive under the name specified in the parameter. If no name is specified in the parameter then the
name seq.bin is used. The data is treated as binary data and no translation is performed.
160
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
ADDBIN or ADDBIN=filename.ext
This parameter performs the same function as the ZIPBIN parameter except that the output file must
be an existing zip archive. The utility writes the compressed data as additional member(s) and prints a
report of the original contents of the output archive before it starts to process any new data. The data is
treated as binary and no translation is performed. There is no dependency on the text or binary nature of
the existing zipped files in the archive.
UNZIPBIN or UNZIPBIN=filenamemask
Use this parameter to decompress an archive into a partitioned data set and load each zipped file into
a separate member. The parameter restores data sets from archives made by the HSIZIP utility with
PARM=ZIPBIN. If the output data set is sequential, only the first file in the archive is unzipped. Use the
file name mask specification to filter the files to be unzipped.
The filenames and filename masks that you specify in program parameters must not exceed 128 bytes in length.
File name mask matching is case insensitive. The following characters are generic masking characters for filename
masks:
If the function request is absent or invalid, the utility writes usage notes to the report file. If the request is absent, the
utility attempts to run the LIST function.
A value of 0 specifies that the shrink method is to be used, which is the method the HSIZIP program always used in
releases prior to Version 8 Release 2.
A value in the 1 to 9 range specifies the corresponding compaction level of the deflate method. As the compaction
level number increases, so does both the data compress and the CPU time consumed by the zip process.
The default is the fastest deflate compaction level. That is, PARM=ZIP is equivalent to PARM=ZP1 and PARM=ADD is
equivalent to PARM=AD1.
HSIZIP files
The HSIZIP utility uses the following files:
• SYSPRINT is a report file. RECFM=VBA and LRECL=137 are used in the DCB.
• SYSUT1 is an input file that describes the data set that contains data to be zipped or the zip archive that
contains data to be listed or unzipped.
• SYSUT2 is an output file that contains the results of a compression or a decompression operation. This file is
not required by the LIST and TEST functions.
161
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
The HSIZIP utility does not support spanned records for any file. The main compression and decompression input
and output to archive files uses the queued sequential access method (QSAM) locate mode. Apart from the lack of
support for spanned records, an input archive allocated to SYSUT1 can have any valid record format and reside on
any device that can be read by QSAM. An archive allocated to SYSUT2 must have variable-length records and support
update-in-place processing. In effect, a SYSUT2 file must be an MVS DASD data set that is not also a compressible
extended-format data set.
The first program parameter must begin with a halfword counter indicating the length of the function request text that
immediately follows. The format is the same format as the system uses to pass the parameter specified in the PARM
operand of the EXEC statement in JCL.
A second program parameter can be specified to override the default file names used by the HSIZIP utility. If the value
of the halfword length indicator at the start of the parameter is not a multiple of 8 or is not less than 256, the HSIZIP
utility ignores it. A series of 8-byte file name entries immediately follow the length indicator and each can specify the
DD name to use instead of the default name. Set a slot to 8 bytes of zeros to avoid overriding that particular default
file name. SYSPRINT, SYSUT1 and SYSUT2 correspond to the sixth, eighth and ninth file name slots respectively.
The following points are provided to help you to assess whether the HSIZIP utility can successfully process a data
set:
• When processing a whole partitioned data set, the file name specified after ZIP= or ADD= is ignored because
the member names are used to label the archived files.
• When ZIP processing detects that a PDS member is a zip archive, the member is stored as a byte stream as is
without attempting further compression or record boundary preservation.
• ZIPBIN processing of PDS members containing zip archives usually causes the compressed size to be larger
than the uncompressed size, due to the inability to further compact the data and the insertion of RDWs to
preserve record boundaries. So, if the only non-text data in a PDS is in members which are themselves zip
archives, specify ZIP rather than ZIPBIN to minimize the resultant file size.
• When using ADD or ADDBIN, avoid duplicate file names in the resultant archive.
• You can use the ADD and ADDBIN parameters to create an archive with a mixture of text and binary file
members.
• The binary or text nature of an unzip process is set by the program parameter and not from the attribute
values in the file header.
162
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
• When the HSIZIP utility creates a zip archive, the data set name of the input file is stored as the zip archive
comment.
• PDS member user data such as system status information (SSI), ISPF statistics, and load module attributes
are stored in the comment field of the central file header of the archive member and can be restored during
unzip operations.
• Alias members are stored as files with zero bytes. The alias member data is preserved only if the real member
associated with the alias member is also processed.
• Use ZIPBIN and UNZIPBIN when processing load module libraries.
• Segment overlay programs are not restored properly, unless the TTRs happen to match, because the TTRs in
the segment tables are not updated by the HSIZIP utility.
• The HSIZIP utility cannot restore program PDSE data sets because only the program binder can write to
program PDSEs. There is no restriction on data PDSEs.
1 Usage notes were printed and the SYSUT1 DD was not allocated.
2 Warning message issued. The warning is for a condition that does not affect the operation
of the current request, but will probably impact on the intended use of the file created by the
request.
One advantage of a file browser over an editor is that the browser can quickly present the data from the start of a file
for inspection without reading in the whole data set, whereas editors typically read the complete data contents before
proceeding. Similarly, a data set containing zipped data could be unzipped with the result being browsed in the usual
163
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
way, but this means that space for all the unzipped data is required which tends to defeat the purpose of compressing
the data.
The HSIBRZIP program can be used to browse the unzipped contents of a data set without requiring the unzipping
of the entire data set. A REXX EXEC called HSIIBRWZ is shipped in the SHSIEXEC library to provide a convenient
interface to invoke the HSIBRZIP program.
To make the facility available for use, customize the HSIIBRWZ EXEC and place it in a suitable library giving it a
suitable member name. (When installing it into your local library, you can call it HSIIBRWZ, or you can give it a simpler
name, such as BRZIP or whatever you find suitable.) The customization process consists of supplying the data set
name of the program library containing the HSIBRZIP program.
HSIBRZIP invokes the BRIF service of ISPF, and so it requires an ISPF environment for execution. The HSIIBRWZ EXEC
expects an operand of a data set name, and so is suitable for general use under ISPF including as a line command in
a data set list created by option 3.4.
HSIBRZIP only unzips enough data to be able to provide the records selected by the user for browsing. For example,
if there are ten million records but the user only scrolls down to view the first hundred records in the browse session,
then only 100 records need to be unzipped. Unzipped records are staged in a data space so that scroll up requests
can be satisfied by providing records from the data space without the need to interrupt the current progress of the
suspended unzip process. The unzip process is resumed when previously unread records need to be accessed.
• All zipped data is assumed to be ASCII text, and is translated to EBCDIC before display.
• The maximum record length without wrapping on to a new line is 1024 bytes.
• The name passed to BRIF to display as the file name is the name of the first or only file in the zip archive.
• If the end of a file is reached, before showing data from the next file, HSIBRZIP will insert a record containing
the following message:
where newname is the name of the next file being unzipped from the same archive.
• If HSIBRZIP recognizes records as having come from the Inquisitor or the Usage Monitor then it will insert
records into the browse data to provide column headings for data items within the recognized records. Such
inserted lines will be repeated whenever the record type is different from the previous record, and will have the
following form:
164
Chapter 8. Running the utilities provided with IBM Z Software Asset Management
The HSIZPEEK program provides a way of accessing data in the active collection repository. It writes a report to
the HSIZDATA DD which can be directed to SYSOUT or to a sequential data set. The HSIZDATA file has fixed-length
records with an LRECL set by the HSIZPEEK program. The record length depends on the items being reported and so
is subject to change, but is currently 289 bytes. HSIZPEEK can be run in a batch job step or in a TSO session.
The HSIIPEEK REXX EXEC is shipped in the SHSIEXEC library and when executed presents the data from HSIZPEEK
in an ISPF Browse session. Before using HSIIPEEK customize it by supplying the data set name of the program library
containing the HSIZPEEK program, and store the EXEC with a suitable member name in your local REXX EXEC library.
The contents of the HSIZDATA file are not a documented programming interface. However, the first section of the
report contains one line for each detail usage record that will be written by the writer task at the end of the collection
cycle, and so a simple FIND command in an HSIIPEEK ISPF Browse session can tell you whether usage for a specific
program has been detected in the current collection cycle so far or not. You can find program library data set name
and job name details on the same report line.
IBM Technical Support may ask for information from HSIZPEEK reports while investigating and diagnosing problems.
To run the verification, use job HSISIVPD in the JCLLIB. This job is generated from the HSISCUST post-installation job.
165
Chapter 9. Configuring language support
Z Software Asset Management includes Japanese language support for MVS™ Message Service (MMS) message
information. You can also configure the Analyzer utility to create and view reports in Japanese.
Procedure
1. Run the HSISMCMP job to compile the MMS files into a system runtime message file, for example the
hsi.MMSJPN99 file.
The HSISMCMP job is generated by the HSISCUST post-installation customization task.
2. Create an entry named MMSLSTJ9 in the z/OS® PARMLIB library, with the following values:
DEFAULTS LANGCODE(JPN)
LANGUAGE LANGCODE(JPN) DSN(SYS2.MMSJPN99) CONFIG(CNLJPN00)
3. Enter the following MVS™ system command to install the system runtime message file:
SET MMS=J9
4. Enable Japanese messages for the Inquisitor Import and the Usage Import, Summary, and Deletion
components.
To configure the language environment, refer to the following documents:
• For information about the Language Environment® MSGFILE and NATLANG options, refer to the
Language Environment® Programming Reference (SA227562).
• For information about specifying Language Environment® runtime options, refer to the Language
Environment® Programming Guide (SA227561).
• For information about setting NATLANG(JPN) as an installation default, refer to the Language
Environment® Customization (SA22-7564).
Procedure
1. In the Analyzer HSIJANLO started task, update the DD statements with the following commands:
//HSICUST hsi.SHSIPARM(HSISANCJ)
//HSINLS hsi.SHSIANL1(HSINLSJP)
166
Chapter 9. Configuring language support
c. Enter the following command to update the Analyzer HSIJANLO started task:
//HSICUST hsiinst.PARMLIB(HSISANCJ)
If your Db2® for z/OS® system is configured with MCCSID=930, MCCSID=1390, or MCCSID=5026 code page
(Japanese extended Katakana), additional customization is required to set up IBM Z Software Asset Management .
For Katakana codepage, data for lower case characters (a,b,c,d,...,z) are stored differently in the databases. For
example:
In Katakana, the hex definitions for lower case characters are different from Latin-based codepages.
In IBM Z Software Asset Management , some columns have data stored in lower case. As a result, there are extra
considerations in managing the conversion of data for lower case characters. In addition, module names in the GKB
Knowledge Base for z/OS (not GKB Knowledge Base for USS), are in encoded format – meaning some of the encoded
characters are in lower case characters.
For consistency in IBM Z Software Asset Management , if the Db2 subsystem is defined in the Katakana code page,
then all lower case characters must be stored in the Katakana format (value of ‘c’ must be stored as x’64’).
When setting up a Db2 subsystem to support EBCDIC double byte CCSID (coded character set identifiers), in the Db2
for z/OS installation job (DSNTIJUZ), parameter MIXED is set to ‘YES’ and parameter MCCSID defined with different
values (default value is a 65534). Here is an example from DSNTIJUZ:
DSNHDECM CHARSET=KATAKANA
• ASCCSID=1041
• AMCCSID=942
• SCCSID=290
• MCCSID=930 (1390 or 5026)
• GCCSID=300
• USCCSID=367
• UMCCSID=1208
• UGCCSID=1200
167
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
• ENSCHEME=EBCDIC
• APPENSCH=EBCDIC
• ENSCHEME=EBCDIC
• APPENSCH=EBCDIC
• DATE=ISO
• DATELEN=0
• DECARTH=DEC15
• DECIMAL=PERIOD
• DEF_DECFLOAT_ROUND_MODE=ROUND_HALF_EVEN
• DEFLANG=IBMCOB
• DELIM=DEFAULT
• IMPLICIT_TIMEZONE=CURRENT
• MIXED=YES
Procedure
1. Bind Call Level Interface ODBC/CLI.
Create a new CLI plan name for IBM Z Software Asset Management and bind it using ENCODING(939).
Note: By default, IBM Z Software Asset Management utilizes the Db2 supplied DSNACLI plan name
Create a copy of db2.SDSNSAMP(DSNTIJCL), and run the bind with the new definitions.
168
Chapter 9. Configuring language support
DSNAOCLT.DSNCLIF4 -
DSNAOCLT.DSNCLIMS -
DSNAOCLT.DSNCLIQR -
DSNAOCLT.DSNCLICR -
DSNAOCLT.DSNCLINF ) -
ENCODING(939)
END
b. Replace the value for PLANNAME from DSNACLI to DSNACLIT in the "SUBSYSTEM” section.
Here is an example on updating the two values:
; COMMON section
CURRENTAPPENSCH=939
;
; SUBSYSTEM section
DSN
MVSATTACHTYPE=CAF
PLANNAME=DSNACLIT
3. Update the following PARMLIB members to include the "CCSID (1027,939,300)" entry for all "LOAD DATA"
statements:
HSISSQ06
HSISSQ12
HSISSQ29
169
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
CCSID (1027,939,300)
INTO TABLE TFGKBZ9_IQF7.TXPCMODULES (
FOWNER POSITION( 2: 2) CHAR(1),
FMODNAME POSITION( 3:256) CHAR(254))
a. Create a copy of db2.SDSNSAMP(DSNTIJTM). This copy should just contain the DSNREXX job step.
b. Update the job by replacing parameter ENCODING (EBCDIC) with ENCODING (939). See example
below:
c. Run the modified DSNTIJTM job. DSNREXX plan should now have ENCODING (939).
Example:
DSN SYSTEM(DSN)
BIND PACKAGE(DSNREXX) MEMBER(DSNREXX) ACTION(REPLACE)
ISOLATION(CS)-
LIBRARY('DB2V12.SDSNDBRM')-
VALIDATE(BIND) CURRENTDATA(NO)-
ENCODING(939)
BIND PACKAGE(DSNREXUR) MEMBER(DSNREXX) ACTION(REPLACE)
ISOLATION(UR)-
LIBRARY('DB2V12.SDSNDBRM')-
VALIDATE(BIND)-
ENCODING(939)
BIND PACKAGE(DSNREXCS) MEMBER(DSNREXX) ACTION(REPLACE)
ISOLATION(CS)-
LIBRARY('DB2V12.SDSNDBRM')-
VALIDATE(BIND) CURRENTDATA(NO)-
ENCODING(939)
BIND PACKAGE(DSNREXRS) MEMBER(DSNREXX) ACTION(REPLACE)
ISOLATION(RS)-
LIBRARY('DB2V12.SDSNDBRM')-
VALIDATE(BIND)-
ENCODING(939)
BIND PACKAGE(DSNREXRR) MEMBER(DSNREXX) ACTION(REPLACE)
ISOLATION(RR)-
LIBRARY('DB2V12.SDSNDBRM')-
VALIDATE(BIND)-
ENCODING(939)
BIND PLAN(DSNREXX) -
PKLIST(*.DSNREXX.DSNREXX, -
*.DSNREXUR.DSNREXX, -
*.DSNREXCS.DSNREXX, -
*.DSNREXRS.DSNREXX, -
170
Chapter 9. Configuring language support
*.DSNREXRR.DSNREXX) -
ACT(REP) ISO(CS) CURRENTDATA(YES) SQLRULES(DB2) -
ENCODING(939)
RUN PROGRAM(DSNTIAD) PLAN(DSNTIA12) -
LIB('DB2V12.RUNLIB.LOAD')
Configuring the Turkish Db2 subsystem for use with IBM Z Software
Asset Management
If Db2 for z/OS is configured with SCCSID=1026, additional customization is required in setting up IBM Z Software
Asset Management.
Procedure
1. Update the ODBC initialization file.
In the COMMON section, add parameter CURRENTAPPENSCH=37 for both members - HSISCLI and HSISCLIT
; COMMON section
CURRENTAPPENSCH=37
;
2. Update the following PARMLIB members to include the "CCSID (37)" entry for ALL "LOAD DATA" statements:
(HSISSQ06)
(HSISSQ12)
(HSISSQ29)
3. Run HSISGKBL to load GKB data with these new LOAD definitions.
171
Chapter 10. Reference information for IBM Z Software
Asset Management
Reference information includes messages, repository table layouts, and performance and tuning.
172
Chapter 10. Reference information for IBM Z Software Asset Management
START_TIME Timestamp First date that this entry is applicable for this
Month
END_TIME Timestamp Last date that this entry is applicable for this
Month
SW_KEY Char 32 Global Unique ID (GUID) for this entry. For SW_
TYPE=VERSION this will be the same value as
VERSION_GUID For SW_TYPE=FEATURE this
will be the same value as FEATURE_GUID
173
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
FOBSERVEDELETED Timestamp Date and time that the library was deleted from
Inquisitor data.
174
Chapter 10. Reference information for IBM Z Software Asset Management
LAST_USED_DATE Date Date the product was last used on this System
START_TIME Timestamp First date that this entry is applicable for this
Month
END_TIME Timestamp Last date that this entry is applicable for this
Month
175
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HW_NODE_KEY Char 32 NODE GUID for Hardware NODE that this Sys
tem was last running on in this month
START_DATE Date Date within this Period that usage was for first
recorded
END_DATE Date Date within this Period that usage was for last
recorded
176
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
START_DATE Date Date within this Period that usage was for first
recorded
END_DATE Date Date within this Period that usage was for last
recorded
FOBSERVEDELETED Timestamp Date and time that system was deleted from In
quisitor data
177
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
END_TIME Timestamp Time it was last observed that this system is us
ing this Node in this month period
178
Chapter 10. Reference information for IBM Z Software Asset Management
• A – Asset
• D- Discovery
• B - Both
179
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
180
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
181
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
FOBSERVEFIRST Timestamp Date and time that library was first observed
FOBSERVELAST Timestamp Date and time that library was last observed
FOBSERVEDELETED Timestamp Date and time that library was deleted from In
quisitor data.
182
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
FOBSERVEFIRST Timestamp Date and time that library was first observed
FOBSERVELAST Timestamp Date and time that library was last observed
FOBSERVEDELETED Timestamp Date and time that library was deleted from In
quisitor data
183
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
184
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
FOBSERVEDELETED Timestamp Date and time that LPAR was deleted from In
quisitor data
HW_NODE_KEY Char 32 NODE GUID for Hardware NODE that this System
was last running on in this month
185
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
186
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
FOBSERVEFIRST Timestamp Date and time that module was first observed
FOBSERVELAST Timestamp Date and time that module was last observed
FOBSERVEDELETED Timestamp Date and time that module was deleted from In
quisitor data
187
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
FOBSERVEDELETED Timestamp First time observation was not found in this li
brary
188
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
FOBSERVEDELETED Timestamp First time observation was not found in this li
brary
FOBSERVEDELETED Timestamp Date and time that the library was deleted from
Inquisitor data.
189
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
190
Chapter 10. Reference information for IBM Z Software Asset Management
191
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
192
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
193
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
FOBSERVEDELETED Timestamp Date and time that the library was deleted from
Inquisitor data.
194
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
FOBSERVEDELETED Timestamp Date and time that the library was deleted from
Inquisitor data.
195
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
196
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
197
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
SW_KEY Char 32 Global Unique ID (GUID) for this entry. For SW_
TYPE=VERSION this will be the same value as
VERSION_GUID. For SW_TYPE=FEATURE this
will be the same value as FEATURE_GUID.
FOBSERVEDELETED Timestamp Date and time that suite was deleted from sys
tem
198
Chapter 10. Reference information for IBM Z Software Asset Management
(continued)
Post-installation jobs
After installation, you can create a custom version of any job in the JCLLIB library or any parameter in the PARMLIB
library, by copying and editing the relevant job in the HSISCUST member in the hsi.SHSISAMP data set.
Job Description
HSISGKBL Job to populate the GKB, GKB for z/OS® UNIX®, and Inquisitor filters
HSISGRNT Job to grant administrator access to the repository and GKB databases
HSISGRTB Job to grant SELECT access to the repository and GKB tables
Operations jobs
The following table lists the operations jobs generated in the JCLLIB library when the DBTYPE is set to DB2®.
199
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Job Description
HSISGKBL Job to populate the GKB, GKB for z/OS® UNIX®, and Inquisitor filters. To be run when
monthly updates are provided.
HSISIQIM Job to run the Inquisitor Import for z/OS® and z/OS® UNIX®
Reporting jobs
The following table lists the reporting jobs generated in the JCLLIB library when the DBTYPE is set to DB2®.
Job Description
Utility jobs
The following table lists the Utility jobs generated in the JCLLIB library when the DBTYPE is set to DB2®.
Job Description
200
Chapter 10. Reference information for IBM Z Software Asset Management
Job Description
HSISSCRT Job to read SCRT CSV files and populate the repository
HSISSMF Job to get the historical usage information from existing SMF data
HSISIBM Job to filter out non-IBM® programs from the Inquisitor utility and usage data
HSISUT04 Sample job to run the RUNSTATS utility on the repository database
HSISIPVD Diagnostic. Job to verify database changes since the product was released
Table 75. Jobs generated for porting data between repositories for a Db2® database
Job Description
Migration jobs
The following table lists the migration jobs generated in the JCLLIB library when the DBTYPE is set to Db2®.
Job Description
201
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Job Description
HSISWS03 Job to ALTER command to convert 23 existing V8.1 Rep tablespaces to PBG UTS
HSISWS04 Job to Reorg to instantiate 3 largest existing V8.1 Rep tablespaces to PBG UTS
HSISWS05 Job to Reorg to instantiate 20 existing V8.1 Rep tablespaces to PBG UTS
HSISWS08 Job to copy data from 15 old Rep tables to 15 new tables (PBG UTS)
HSISWS09 Job to drop obsolete Rep tablespaces, rename tables to original names
HSISWS11 Job to copy data from old LKB/LKU tables to new tables
HSISWS12 Job to drop obsolete LKB/LKU tablespaces, rename tables to original names
HSISWS15 Job to update Repository TPARAM table, create new V8.2 db objects
Globalization jobs
The following table lists the globalization jobs generated in the JCLLIB library when the DBTYPE is set to Db2®.
Job Description
Operations jobs
The following table lists the operations jobs generated in the JCLLIB library when the DBTYPE=REMOTE.
Job Description
202
Chapter 10. Reference information for IBM Z Software Asset Management
Job Description
Utility jobs
The following table lists the Utility jobs generated in the JCLLIB library when the DBTYPE=REMOTE.
Job Description
HSISSMF Optional. Job to get the historical usage information from existing SMF data
HSISIBM Optional. Job to filter out non-IBM programs from the Inquisitor and usage data
Job Description
HSISGKBL Job to populate the GKB, GKB for z/OS® UNIX®, and Inquisitor filters
203
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Job Description
Operations jobs
The following table lists the operations jobs generated in the JCLLIB library when the DBTYPE is set to SQLITE.
Job Description
Base for z/OS® UNIX®, and Inquisitor filters. To be run when monthly updates are provid
ed.
HSISIQIM Job to run the Inquisitor Import for z/OS® and z/OS® UNIX®
Reporting jobs
The following table lists the reporting jobs generated in the JCLLIB library when the DBTYPE is set to SQLITE.
Job Description
204
Chapter 10. Reference information for IBM Z Software Asset Management
Utility jobs
The following table lists the Utility jobs generated in the JCLLIB library when the DBTYPE is set to SQLITE.
Job Description
HSISSCRT Job to read SCRT CSV files and populate the Repository
HSISSMF Job to get the historical usage information from existing SMF data
HSISIBM Job to filter out non-IBM® programs from the Inquisitor and usage data
HSISIVPD Diagnostic. Job to verify database changes since the product was released
HSISMNT Diagnostic. Job to mount SQLite zFS file system and optionally delete the zFS file system
HSISMNTU Diagnostic. Job to unmount SQLite zFS file system after an IPL
Table 84. Jobs generated for porting data between repositories for a SQLite database
Job Description
205
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Migration jobs
The following table lists the migration jobs generated in the JCLLIB library when the DBTYPE is set to SQLITE.
Job Description
HSISWS15 Job to update Repository TPARAM table, create new V8.2 db objects
Globalization jobs
The following table lists the globalization jobs generated in the JCLLIB library when the DBTYPE is set to SQLITE.
Job Description
This section is useful for the database administrator who must determine space requirements for
tuning
and
allocationperformance
space
initial
IBM Z Software Asset Management . Listed in Table 87: Initial space allocation for the product on
page 206 are guidelines for the initial spaces allocation based on the number of LPARs. The value for
the SIZE parameter is specified in HSISCUST.
206
Chapter 10. Reference information for IBM Z Software Asset Management
In version 8.2, all table spaces and indexes are defined with ‘COMPRESS Y’. For estimated space
requirements of the 3 largest table spaces, refer to PARMLIB member HSISSQ17.
The Db2® resources required for this product do not need to be defined in a production Db2®
subsystem in order to minimize competition for mainframe resources in the Db2® production
environments. To avoid competing for mainframe resources, run the jobs for the Inquisitor Import and
Usage Import during off-peak periods. In addition, run the utility Usage Deletion during off-peak periods.
Buffer pools
By allocating the appropriate buffer pool to the respective table spaces and indexes, as defined in
HSISCUST, you can manage your system resources accordingly. For Db2® performance, first investigate
the buffer pools. Check with your site specialist on the types and size of buffer pools that are defined for
this product.
For sites using Db2 data sharing, group Bufferpools must be defined with the same names.
In terms of space utilization, -1 has been set for all SECQTY to enforce Sliding Secondary Extents.
This enables Db2® to manage secondary extents efficiently, and minimizes extension failures. You
need to extrapolate the PRIQTY for the table spaces and indexes for the large tables according to your
requirements. Definitions for these Db2® objects are listed in the respective jobs in JCLLIB.
Repository tables with the biggest impact on performance due to size are TMODULE, TUSEMTD, and
PRODUCT_USE_DETAIL. Data for the TMODULE table is populated during Inquisitor Import process.
TUSEMTD, and PRODUCT_USE_DETAIL tables are populated during Usage Import. For example, you
might have more than 300 million usage records in the TUSEMTD table, and more than 20 million
modules identified in the TMODULE table. To minimize space utilization and improve SQL query
performance, you must prune your usage and obsolete records by running the Usage Deletion job
HSISUDEL and Physical Deletion job HSISPDEL.
Declared Global Temporary tables are used during the Asset Aggregator process. The Work file table
spaces must be large enough to handle this process. When the Aggregator job step is run, indexes on
declared global temporary tables are created. By default, the bufferpool used by the index is dependent
on the bufferpool defined for the Work file database. Parameter IXBUFFERPOOL in PARMLIB member
HSISAGP1 can be used to substitute the default value.
207
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
When you run some of the SQL queries, they can produce a large amount of output. In order to avoid any
excessive output, increase the number and size of the table spaces in the work file database.
It is important to run reorganization of the Repository table spaces periodically, especially after
Inquisitor Imports, Usage Imports, and Usage Deletion After reorganization of the Repository table
spaces, it is also a good idea to run RUNSTATS for these table spaces.
• F ZFS,QUERY,SETTINGS
• F ZFS,QUERY,ALL
To query and reset performance counters, enter the following z/OS® UNIX® System Services command:
zfsadm
You can also optimize zFS performance by tailoring the size of its caches to reduce I/O rates and path length. It is
also important to monitor DASD performance to ensure that no disc volumes or channels are required to perform
beyond the intended capacity.
• The user file cache is used for all user files and performs I/O for all user files greater than 7 KB.
• The metadata cache performs I/O for all user files that are smaller than 7 KB.
• The log file cache stores file record transactions that describe changes to the file system.
208
Chapter 10. Reference information for IBM Z Software Asset Management
209
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
210
Chapter 10. Reference information for IBM Z Software Asset Management
211
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
212
Chapter 10. Reference information for IBM Z Software Asset Management
213
Chapter 11. Troubleshooting and support
To isolate and resolve problems with your IBM software, you can use the troubleshooting, messages, and support
information. This information contains instructions for using the problem determination resources that are provided
with your IBM products.
Troubleshooting a problem
Troubleshooting is a systematic approach to solving a problem. The goal of troubleshooting is to determine why
something does not work as expected and how to resolve the problem.
The first step in the troubleshooting process is to describe the problem completely. Problem descriptions help
you and the IBM technical-support representative know where to start to find the cause of the problem. This step
includes asking yourself basic questions:
The answers to these questions typically lead to a good description of the problem, which can then lead you a
problem resolution.
Two main ways to approach any problem you encounter are understanding messages and using log files.
Messages
Messages are issued when unexpected events occur. Messages can have any of these severities:
Informational
The message confirms an event that was requested or describes another normal occurrence.
Informational messages generally do not require any action. The identifier of an informational message
ends with the letter I.
214
Chapter 11. Troubleshooting and support
Warning
The message describes an event that might indicate a problem. Read the message text and determine
whether the event is normal or a problem. The identifier of a warning message ends with the letter W.
Error
The message describes an event that requires a response. Read the message description and the
suggested response. The identifier of an error message ends with the letter E.
Severe Error
The message describes an event that requires a response. Read the message description and the
suggested response. The identifier of an error message ends with the letter S.
Unrecoverable Error
The message indicates that an unrecoverable error was encountered and no requests were processed.
Read the message description. The identifier of an error message ends with the letter U.
You can find a message description easily by entering its identifier into the Search box in the information center.
Symptoms
IBM Z Software Asset Management operational jobs are failing.
Causes
The DSNACLI plan is not bound with the latest Db2® maintenance package, or the plan references a missing
package.
215
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Symptoms
IBM Z Software Asset Management operational jobs are failing.
Causes
When you run SQL queries that process large amounts of data, including sorts and joins, there is insufficient space in
the work file database that is used for temporary storage.
View and check the sizes and extents of the physical data sets allocated to the table spaces in the work file database.
216
Chapter 11. Troubleshooting and support
Symptoms
IBM Z Software Asset Management operational jobs for Inquisitor or Usage import are failing.
When running Inquisitor Import or Usage import batch jobs, multiple users using the Analyzer to access the
Repository database can lead to timeouts or deadlocks. These batch jobs require exclusive accesses to the data in
the tables. SQLCODE -904 error occurs with reason code 00C90083 or reason code 00C9008E.
Causes
When running Inquisitor Import or Usage import batch jobs, multiple users using the Analyzer to access the
Repository database can lead to timeouts or deadlocks. These batch jobs require exclusive accesses to the data in
the tables. SQLCODE -904 error occurs with reason code 00C90083 or reason code 00C9008E
217
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Symptom
• Operational jobs such as IQ Import and Usage Import seem to be taking longer to run.
• Reports retrieved via the Analyzer also seem to take longer to finish.
Causes
This issue can occur for the following reasons:
• Retaining too much usage data for long periods and not performing regular housekeeping tasks.
• Importing all usage data into a single repository instead of spreading the usage data across multiple
repositories.
• In the Db2 MSTR address space/system console, check for any DSNJ031I or DSNR035I messages, indicating
that jobs may not be committing at regular intervals as expected.
• In the Db2 MSTR address space/system console, check for problems related to the Db2 work file database
(this has been covered in a previous problem/solution).
• Run SQL command to determine size and periods of the largest table – TUSEMTD
• Run SQL command to list libraries that are marked deleted (obsolete).
• IBM Support may request you to run special diagnostics/traces.
• Run SQL command to determine size and periods of the largest table – TUSEMTD
Next review comments in job HSISLDEL and decide on range of periods to select for deletion of usage
records.
• Run SQL command to list libraries that are marked deleted (obsolete).
218
Chapter 11. Troubleshooting and support
The above SQL command is found in job, HSISPDEL. Review comments in the job and decide on range of
periods to select for deletion of obsolete records from the TLIBRARY, TLIBSYS, TMODULE, TUSEPOV, and
TCSECT tables.
• Run job HSISLDEL to delete obsolete LPARs (LPARs that have been decommissioned at your site).
• For sites that have an extremely large TUSEMTD table (50m to 100m rows per period), consider defining
the table space as a partition-by-range (PBR) UTS. Use column FPERIOD in TUSEMTD table as the key for
the range. As this is not a trivial task, the DBA needs to prepare an implementation plan for this exercise to
convert from a PBG to a PBR.
• On a regular basis, run REORG for all repositories. RUNSTATS is automatically run as part of IQ Import and
Usage Import jobs.
As part of improving the run times, you may be advised by IBM Support to change the value for the COMMIT
parameter required in the IQ Import and Usage Import jobs.
Symptoms
Products displayed in the Analyzer reports are not correct.
Causes
The GKB database does not contain the latest updates.
219
Chapter 12. IBM Z Software Asset Management
messages
You can identify the type of message by the message prefix.
12 Syntax error.
16 Unrecoverable error.
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
220
Chapter 12. IBM Z Software Asset Management messages
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSIA001E
EXPECTED CLOSE PARENTHESIS WAS NOT FOUND IN INPUT RECORD
HSIA002E
EXPECTED VALUE FOR parm NOT FOUND BEFORE THE CLOSE PARENTHESIS
Explanation: No subparameter value was specified within the parentheses. In the message text:
parm
HSIA003E
THE parm PARAMETER IS NOT RECOGNIZED
Explanation: A parameter was detected which is not valid for the type of statement being processed. In the message
text:
parm
221
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIAUTO
HSIA004E
THE VALUE SPECIFIED FOR parm IS INVALID
Explanation: The named parameter had a value which did not conform to syntax requirements. In the message text:
parm
Module: HSIAUTO
HSIA005E
NO "FTP" OR "JOB" STATEMENT BEFORE "DSN" STATEMENT
HSIA006E
parm IS AN UNRECOGNIZED STATEMENT TYPE
Explanation: A statement type other than FTP, JOB, or DSN was specified. In the message text:
parm
name of parameter.
222
Chapter 12. IBM Z Software Asset Management messages
HSIA007E
TERMINATING - AUTOMATION SERVER IS ALREADY ACTIVE
Explanation: The Automation Server is already running. Only one concurrent copy can run in an operating system
image.
System Action: Program terminates with condition code 16. The established Automation Server continues.
Module: HSIAUTO
HSIA008E
TERMINATING - COULD NOT INITIALISE WITH BAD PARAMETERS
Explanation: The HSIAPARM contents contained an error so the Automation Server could not initialize.
HSIA009E
REFRESH IGNORED - COULD NOT PROCESS BAD PARAMETERS
Explanation: The HSIAPARM contents contained an error so the Automation Server could not update its operational
parameters.
223
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIA010E
NO FUNCTIONS WERE REQUESTED
Explanation: No actions were specified. The Automation Server has no work to do.
HSIA011E
NO DATA SET NAME MASKS WERE SPECIFIED
Explanation: No work was requested. The Automation Server has no work to do.
HSIA012E
NUMBER OF ACTIONS EXCEEDS MAXIMUM OF 1000
HSIA013E
NUMBER OF DATA SET NAME MASKS EXCEEDS THE MAXIMUM OF 2000
224
Chapter 12. IBM Z Software Asset Management messages
HSIA014E
MEMBER mbr WAS NOT FOUND IN THE HSIACNTL FILE
Explanation: Member HSIAPARM was found to be missing from the HSIACNTL file. In the message text:
mbr
System Action: Terminates the processing of the member. If the member is HSIAPARM the Automation Server
terminates. For template members the Automation Server continues processing.
HSIA015E
INPUT LOGICAL RECORD LENGTH WAS NOT 80
Explanation: A record was read from the HSIACNTL library which was not 80 bytes long.
Operator response: Ensure the HSIACNTL library only contains fixed length 80 byte records.
HSIA016E
EXPECTED OPEN PARENTHESIS WAS NOT FOUND IN INPUT RECORD
225
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIAUTO
HSIA017E
VALUE SPECIFIED FOR parm IS TOO LONG
Explanation: A parameter value was specified which has a length greater than the maximum allowed for the named
parameter. In the message text:
parm
name of parameter.
HSIA018E
THE "NOTA" VALUE IS LESS THAN THE "NOTB" VALUE
Explanation: The action can never be performed because all days of the month have been excluded by the
combination of the NOTA (not after) and NOTB (not before) specifications.
Module: HSIAUTO
HSIA019I
AUTOMATION SERVER INITIALIZATION COMPLETE
226
Chapter 12. IBM Z Software Asset Management messages
Module: HSIAUTO
HSIA020I
AUTOMATION SERVER HAS NOW TERMINATED
Module: HSIAUTO
HSIA999U
HSIMSG/HSIAMSG FAILURE - MSGID=msgid RC=rc RS=rs
Explanation: HSIMSG was called to produce a message text, but the call failed. In the message text:
msgid
rc
227
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSIC002E
A message is missing from the internal repository
Explanation: A message is missing from the internal message repository. When the default language is not English,
the translation of the given message might not exist. If the default language is English, the message indicates an
error in the given application.
System Action: The application would normally continue ignoring the given message number, but the specific action
depends on the code attempting to issue the message, which could also terminate the application.
HSIC003U
The internal message repository is corrupted
Explanation: When attempting to issue a message, the internal message repository layout did not follow the expected
format.
228
Chapter 12. IBM Z Software Asset Management messages
HSIC020E
application-name encountered errors. Error code = errorcode
Explanation: The Application has encountered errors during processing. This is a general message on completion
indicating that an error has occurred.
User response: Refer to additional message, or to the section Error codes on page 244, and to the log for more
details on the specific error. Contact IBM support.
HSIC021S
application-name encountered fatal errors. Error code = error-code
User response: Refer to additional message, or to the section Error codes on page 244, and to the log for more
details on the specific error. Contact IBM support.
HSIC023E
Inquisitor Import error occurred in opening: filename
Explanation: The Inquisitor Import could not open the given file.
User response: Check that the file exists, and if it does, check for any additional log message identifying the error.
Contact IBM support.
HSIC024E
Inquisitor Import input file is in error. It looks like a usage data file
User response: Check that the input file is a valid file. Contact IBM support.
229
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIC025E
Inquisitor Import input file is in error. It looks like a hardware data file
User response: Check that the input file is a valid file. Contact IBM support.
HSIC026E
Inquisitor Import detected that table tablename is missing or invalid
Explanation: The expected table is missing from the database or has invalid format. This suggests a mismatch
between the database and this version of the product.
User response: Check for a version mismatch between the database and the version of the product. Contact IBM
support.
HSIC027S
Inquisitor Import table tablename is missing a column
Explanation: The given table is missing an expected column. This suggests a mismatch between the database and
this version of the product.
User response: Check for a version mismatch between the database and the version of the product. Contact IBM
support.
HSIC028S
Inquisitor Import table tablename appears to be an old version
Explanation: The given table in the database does not have the expected format.
User response: Check for a version mismatch between the database and the version of the product. Contact IBM
support.
230
Chapter 12. IBM Z Software Asset Management messages
HSIC029S
Inquisitor Import error when writing to table tablename
Explanation: An SQL error occurred when attempting to write to the given table.
User response: Check the log for additional details about the given error. Contact IBM support.
HSIC030S
The Inquisitor Import did not find a valid system header record in the input file
Explanation: The input file does not follow the expected format.
User response: Check that the correct input file is supplied and that there is no version mismatch. Contact IBM
support.
HSIC034S
Error reading Repository TPARAM table
User response: Check the log for any additional messages indicating the cause of the error. Contact IBM support.
HSIC035E
The Repository is in use by the application-name
Explanation: The application cannot run because the Repository is already in use by another application. Wait until
application-name completes before running the current application. If the Repository is not in use by application-
name, then the cause could be that it was previously run, but did not run to completion. To correct the problem, either
rerun the application-name identified in this message, or alternatively, run the supplied HSISTPRM job to reset FVALUE
to 0 where FKEY = PROCRUN in the TPARAM table.
User response: Check that the application is not already in use before running this application.
231
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIC036E
Syntax error scanning TPARAMS file on line linenumber
Explanation: The TPARAM file does not conform to the required syntax on the given line.
System Action: The specified option or value is ignored, and its default value is used where applicable.
User response: Check that valid options/values are supplied as specified in the documentation of the application that
you are running.
HSIC037E
Schema schemavalue is too long in param param
User response: Check that the schema ID does not exceed 8 characters in length.
HSIC038E
Unbalanced quote for value: value in param:param
Explanation: A starting quote that has no matching end quote was found for the given parameter.
User response: Check that the given parameter has matching quotes.
HSIC039E
Illegal character in value:value of param:param
User response: Check that the given parameter value is valid for its type.
HSIC040E
Reserved word: reservedword in param: param
Explanation: A reserved word or system value schema ID was chosen as a parameter value.
232
Chapter 12. IBM Z Software Asset Management messages
HSIC041W
value:value in param:param is not a recommended schema ID
Explanation: The value is not recommended because of possible conflicts with existing values.
HSIC042E
TPARAM file: param:param has an invalid proposed value: value
Explanation: The parameter cannot be set to the given value because the value is not valid.
User response: Choose a valid value as per the documentation of the given application.
HSIC043E
The application has failed to open the TPARAM file. Error: errordescription
Explanation: The application could not open the TPARAM file. The error description contains more details regarding
the reason for the error.
User response: Check that the TPARAM file exists and is valid.
HSIC045E
String string cannot exceed numberchars in length
User response: Ensure that the specified parameter length is not exceeded.
233
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIC050E
The program-name program has detected an invalid date parameter
User response: Ensure that the date format is valid, and start dates do not overlap end dates.
HSIC051S
Error adding record
User response: Check the log for additional information about the error. Contact IBM support.
HSIC052S
Error updating record
User response: Check the log for additional information about the error. Contact IBM support.
HSIC053S
Error deleting record
User response: Check the log for additional information about the error. Contact IBM support.
HSIC055S
Table initialization failure during Repository Merge
234
Chapter 12. IBM Z Software Asset Management messages
User response: Check the log for any additional details about this error. Contact IBM support.
HSIC056S
Some table destination fields are smaller than source
Explanation: Some fields in the target repository are not large enough to fit the contents of fields in the source
repository.
System Action: The application terminates, and the repositories are not merged.
User response: Check that the destination repository is not an older version than the source repository. You can
recreate the destination repository using the latest version of the product. If the problem persists, contact IBM
support.
HSIC057E
A value for parameter: parameter-name must be specified
Explanation: A mandatory parameter for this application has not been specified.
System Action: The application terminates during the syntax checking of input parameters.
User response: Ensure that a value for the given parameter is specified. Refer to the documentation of the failing
application for an explanation of the given parameter and/or valid parameter values.
HSIC058E
Could not open filename
User response: Check the log for additional information about the error. Contact IBM support.
HSIC059E
Could not read filename
User response: Check the log for additional information about the error. Contact IBM support.
235
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIC060E
IQDATA DD does not contain unzipped IQ data
Explanation: The input IQDATA dataset does not contain unzipped IQ data.
User response: Check the log for additional information about the error. Contact IBM support.
HSIC061E
Internal error hcreate(number) phase1a failed
User response: Check the log for additional information about the error. Contact IBM support.
HSIC062E
No SMF 30-2 or 30-4 data matched IQ data
Explanation: No match was found for the SMF data and IQ data.
User response: Check that the correct data sets have been used. Contact IBM support.
HSIC063E
Internal error hsearch(key) table add failed
User response: Check the log for additional information about the error. Contact IBM support.
HSIC064E
Could not write type to FMOUT
236
Chapter 12. IBM Z Software Asset Management messages
User response: Check the log for additional information about the error. Contact IBM support.
HSIC065E
SYSUT1 data Is not IQ text or UM text
Explanation: The SYSUT1 dataset does not contain the expected data.
User response: Check that the SYSUT1 dataset is correct. Contact IBM support.
HSIC066E
Internal error hsearch(key) table failed
User response: Check the log for additional information about the error. Contact IBM support.
HSIC067E
Unable to acquire storage
User response: Try increasing the region size specified in the region parameter on the JOB or EXEC statement in the
JCL for the job. Contact IBM support.
HSIC068E
IBMMOD Internal error
User response: Check the log for additional information about the error. Contact IBM support.
HSIC069E
IBMMOD_INIT internal error
237
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
User response: Check the log for additional information about the error. Contact IBM support.
HSIC070I
A full rematch will be performed
Explanation: A full import and rematch will be performed, which will not try to exclude modules of unchanged
libraries. The default behavior is to exclude such libraries from matching, which would normally lead to faster
processing.
The program performs a full rematch, if any of the following is true :
More specific details on why a full rematch is being performed, can be found in the log.
System Action: A full rematch of the data is performed. All libraries are processed.
User response: Ensure that a FULLREMATCH and the REPLACEFULL options are not in effect for better performance,
unless a full rematch is desired. If this is the first run of the Inquisitor Import, or there has been recent a change to
the GKB, then no action is necessary; the program will try on subsequent runs (subsequent to loading the current data
into the repository) to exclude unchanged libraries.
HSIC071I
&number_modules modules in &number_libraries unchanged libraries were ignored
Explanation: This is a report of the number of the modules and libraries that are ignored when the FULLREMATCH
option is not in effect. Details of these ignored libraries are in the log.
HSIC073E
Usage Import for system SID on time is a duplicate and will be ignored.
238
Chapter 12. IBM Z Software Asset Management messages
User response: Provide an input file that is the output of a more recent Usage Monitor output.
HSIC074E
IQ input file dated time1 is earlier than the latest os_type scan for SID sid dated time2.
Explanation: The input file is earlier than an an input file that was already processed for this system.
User response: Provide an input file that is the output of a more recent Inquisitor scan.
HSIC075I
num_libs libraries containing num_modules modules are mirrors.
Explanation: The program encountered mirror libraries, which are libraries that are identical in name and volume to
libraries that the program previously processed on different SIDs.
System Action: The program records the names and locations of such libraries but does not process their contents of
modules. The program displays the names of such libraries in the log, as well as their current and base SIDs.
User response: This operation is normal as long as the repository is set up correctly to receive SIDs containing
libraries that are unique in library and volume name except when they are copies or shared, and no other SIDs that do
not conform to these rules were mistakenly placed into the repository. Refer to the Inquisitor Import description for
more information. Refer to the log for a list of mirror libraries and their base SIDs. You can run the System Deletion
Job to remove any SIDs that have been placed recently but incorrectly into this repository.
HSIC076I
IQ input file dated time is a duplicate of the last OS_TYPE scan for SID SID_NAME.
HSIC077I
Analyzer initialization complete.
239
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIC078I
Analyzer has now terminated.
HSIC079I
Analyzer is unable to display URL because gethostname returned a null string for the host
name.
Explanation: The analyzer attempted to get the host name of the system it is running on using the z/OS C/C++
gethostname library function and a null string was returned. This may happen if the TCP/IP TCPIP.DATA configuration
file does not have a HOSTNAME statement.
System Action: The analyzer is unable to display the url that clients can use to access it in its log. The analyzer
continues processing and listening for connections from clients.
User response: Add a HOSTNAME statement to the TCP/IP TCPIP.DATA configuration file. In order for this change to
have an effect, the TCP/IP address space must be stopped and restarted. Refer to the z/OS Communications Server:
IP Configuration Reference for more information on the HOSTNAME statement, on the TCPIP.DATA configuration file,
and how to modify them.
HSIC080I
Analyzer is unable to display URL because getaddrinfo for host hostName failed with errno
errnoNumericValue, errnoDescriptionString.
Explanation: The analyzer attempted to get the fully qualified domain name and IP address for the host it is running
on, which is named hostName. The z/OS C/C++ getaddrinfo library function was used, and it returned the error
number shown.
System Action: The analyzer is unable to display the URL that clients can use to access it in its log. The analyzer
continues processing and listening for connections from clients.
User response: Refer to the z/OS Communications Manager: IP and SNA Codes manual for a description of Resolver
return codes. It is possible that the host name could not be resolved due to a Resolver configuration problem or a
Domain Name System (DNS) configuration problem. Refer to z/OS Communications Server: IP Configuration Guide
240
Chapter 12. IBM Z Software Asset Management messages
and the z/OS Communications Server: IP Configuration Reference for information about how to configure Resolver
and the BIND 9-based Domain Name System.
HSIC081E
Incompatible GKB level for gkb schema:schema. Expected level:expected_level_number,
received::received_level_number.
Explanation: A mismatch between the GKB level and the level expected by the program was found. This indicates
that the GKB and the code are at different maintenance levels. If the received_level_number is greater than the
expected_level_number, it indicates that a later level of the GKB is used than can be handled by the current
maintenance level of the code. If the received_level_number is less than the expected_level_number, it indicates that
an old level of the GKB, that can no longer be handled by the current maintenance level of the code, is used.
User response: Apply GKB and code maintenance to the indicated GKB schema as required to ensure code and GKB
are compatible. Contact IBM support for further assistance.
HSIC082E
Incompatible repository level for repository schema: schema. Expected
level:expected_level_number, received::received_level_number.
Explanation: A mismatch between the Database repository level and the level expected by the program was found.
This indicates that the repository and the code are at different maintenance levels. If the received_level_number is
greater than the expected_level_number, it indicates that a later level of the repository is used than can be handled
by the current maintenance level of the code. If the received_level_number is less than the expected_level_number,
it indicates that an old level of the repository, that can no longer be handled by the current maintenance level of the
code, is used.
User response: Apply Database repository and code maintenance to the indicated repository schema as required to
ensure code and repository are compatible. Contact IBM support for further assistance.
HSIC083I
GKB schema: schema of version date:gkb_date is out of date. It is more than number of
months old.
Explanation: The used GKB of the given schema name is likely to be superseded and can be replaced by a
more recent GKB containing more product updates. The GKB that is used is older than the default value of the
number_of_months from the current date which means the latest identification changes may be missed.
241
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIC084E
GKB schema: schema is missing configuration parameters.
Explanation: The used GKB of the given schema name is missing configuration parameters that the program needs.
This is most likely to occur if the GKB has not been loaded successfully.
User response: Ensure GKB is loaded successfully. Contact IBM support if the problem persists.
HSIC085E
GKB schema: schema does not have any scorecards.
Explanation: The used GKB of the given schema name does not have any scorecards that can be used to match
discovered modules. This is most likely to occur if the GKB has not been loaded successfully.
User response: Ensure GKB is loaded successfully. Contact IBM support if the problem persists.
HSIC086S
SCRT Import detected a configuration error.
User response: Check the log for any additional messages indicating the cause of the error. Contact IBM support.
HSIC087E
SCRT Import detected an input data error.
Explanation: The SCRT CSV file is invalid or does not follow the expected format.
User response: Check the log for additional information about the error. Contact IBM support.
242
Chapter 12. IBM Z Software Asset Management messages
HSIC088E
SCRT Import detected a database error.
User response: Check the log for additional information about the error. Contact IBM support.
HSIC089W
Hardware serial serial does not exist in the Z SW Asset Mgmt database.
Explanation: The hardware serial has not been discovered by Inquisitor Import or Usage Monitor.
System Action: The application continues; SCRT data will not be imported for this hardware serial.
User response: Ensure Inquisitor Import and Usage Monitor are run for the desired hardware serial prior to running
SCRT Import.
HSIC090W
The following Systems do not exist in the Z SW Asset Mgmt database: systems
Explanation: The systems have not been discovered by Inquisitor Import or Usage Monitor.
System Action: The application continues; SCRT data will not be imported for the systems.
User response: Ensure Inquisitor Import and Usage Monitor are run for the desired systems prior to running SCRT
Import.
HSIC091W
The following Products do not exist in the current GKB: products
System Action: The application continues; SCRT data will not be imported for the products.
User response: Contact IBM support, supply the missing products information from the log, and request a GKB
refresh.
243
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Error codes
6016
Input text file open error
6060
Input Parameter error
6061
Database open error
6062
Database commit error
6063
Error reading repository TPARAM table
6065
Repository is in use
6066
Unknown SID parameter value
6067
SQL error
6068
Expected parameter missing from the TPARAM table
6069
Specified SID is not found
6070
Invalid data was encountered
244
Chapter 12. IBM Z Software Asset Management messages
6071
Usage Import file is duplicate
6072
IQ Import file is duplicate or of earlier date
6073
File read error
6074
GKB level is unsupported
6075
Repository level is unsupported
6076
GKB is missing configuration parameters
6077
GKB is missing scorecards
6203
Inquisitor Import table open fail
6204
MVS™ system header record not found in input file
6205
Unix System Services header record not found in input file
6206
No system header record found in input file
6208
Error writing to TPARAM table
245
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
6209
Error opening input file
6211
Fatal error writing system record
6212
Fatal error writing library record
6213
Fatal error writing module record
6218
Input file looks like a usage data file
6219
Input file looks like a hardware data file
6220
Index missing error
6221
Vendor product version table processing error
6223
Error encountered when retrieving the inventory ID
6224
Error encountered when retrieving the current GKB version
6225
Error encountered when retrieving the inventory GKB version
6237
Inquisitor Import table does not exist or is a missing a column
246
Chapter 12. IBM Z Software Asset Management messages
6238
Inquisitor Import table does not exist
6239
Inquisitor Import table appears to be an old version
6240
Error updating fGPassLibID record
6241
Error deleting empty libraries
6244
Error assigning package information to TMODULE records
6260
Nothing to import, as no module records were found in IQ file
6400
Knowledge Base type is incorrect
6402
Failure in initializing IQ tables
6403
IQ TMODULE open error
6404
IQ TMODULE index error
6405
IQ database is empty
6409
TDECISION table open error
247
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
6413
Error creating scorecard tables for Match Engine
6417
GKB table is empty
6428
Local KB TRULES table open error
6434
Failure to open archive file
6435
Error creating index
6436
Error setting current index
6437
Search KB phase error
6438
Volume serial library phase error
6439
Inter Library phase error
6440
Rules processing phase error
6444
LPA phase error
6448
Error while clearing LMOD count
248
Chapter 12. IBM Z Software Asset Management messages
6449
TDECISION Table is missing FDECRPTION and/or FCATEGORY fields
6450
GKB TPRODUCT record seek error
6451
LKB TPRODUCT record seek error
6452
TDECISION record edit error
6453
KB TVERSION record access error
6454
KB TPRODUCT record access error
6455
KB TVENDOR record access error
6600
Match Engine tables TDECISION and/or TMIGREPORT are missing
6619
Error opening TPACKAGE table
6620
Repository table initialization failed
6621
Failure opening IQ table
6622
Unable to access GKB TVERSION table
249
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
6623
IQ TMODULE table is empty
6624
Predecessor inventory ID key does not exist
6625
Repository is not enabled for Unix System Services
6626
Repository must be enabled for Unix System Services, when the REPLACE option is in effect
6627
SYSPLEX ID mismatch in inventory record
6628
SMFID mismatch in inventory record
6629
Inventory ID key of zero is not valid
6630
Error in deleting library record
6632
Error transferring TLIBRARY information from IQ to Repository
6633
Error accessing TINVCTL table
6634
Mismatch found between the TINVCTL record flag and the REPLACE option
6635
Error updating FMODCNT field in TLIBRARY and TPOVLIB tables
250
Chapter 12. IBM Z Software Asset Management messages
6636
Product version key error
6637
Module key error
6640
Error updating FINVID field in TINVREG table
6641
Error updating FINVID field in TINVREG table
6642
Error updating summary tables
6643
Error querying table in FMODID order
6645
Error marking TLIBRARY, TMODULETPOVLIB and TPOVINV records as deleted
6647
Repository type does not match IQ type
6648
When using a Continuous Inventory, an Inventory Name must be specified
6666
Error when accessing the TLIBSYS table
6800
At least one repository failed during initialization
6802
No matching LPAR found in table
251
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
6803
Primary Inventory ID set to 0 for LPAR
6804
Error trying to find FMODID or FLIBID
6805
Inventory ID does not exist
6806
Unable to find or create TLPAR record for LPAR
6807
Error trying to find or create Job or User entry
6808
Error writing MTD record
6809
Error updating summary tables
6810
Error adding TUSELIBRARY record
6811
TLIBRARY update error
6812
Summary table error
6813
Error reading import control record
6814
User initiated stop
252
Chapter 12. IBM Z Software Asset Management messages
7000
At least one table failed initialization
7004
Date order error
7005
TMODULE record seek error
7011
Error inserting record into TMODULE table
7013
TJOBDATA record seek error
7014
TJOBDATA record add error
7015
TUSERDATA record seek error
7016
TUSERDATA record add error
7017
TUSEMTD record seek error
7018
TUSEMTD record add error
7019
TUSEMTD record edit error
7020
TUSEMTD record delete error
253
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
7021
TPOVINV record seek error
7022
TPERIODS record seek error
7023
TPERIODS record add error
7024
TPERIODS record edit error
7025
TUSEPOVLIB record seek error
7026
TUSEPOVLIB record add error
7027
TUSEPOVLIB record edit error
7028
TUSEPOV record seek error
7029
TUSEPOV record add error
7030
TUSEPOV record edit error
7034
TUSEMTD critical failure
7035
TUSEMTD error updating record with zero FMTDID
254
Chapter 12. IBM Z Software Asset Management messages
7036
TVERSION record seek error
7037
TUSEPO record seek error
7038
TUSEPO record seek error
7039
TUSEPO record edit error
7040
TUSEPO record delete error
7043
TMODULE record edit error
7044
TUSEPOVLIB record delete error
7045
TUSEPOV record delete error
7046
TPERIODS record delete error
7055
TLPAR record edit error
7058
TPOVLIB record seek error
7060
TLPAR record seek error
255
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
7061
Join record seek error
7062
TLIBRARY record edit error
7063
TLIBRARY record seek error
7065
Invalid SUMBY value
7066
Date formatting error
7068
PRODUCT_USE delete error
7069
PRODUCT_USE_DETAIL delete error
7201
Inventory to be deleted does not exist in repository
7203
TLIBRARY record delete failure
7204
TPOVINV record delete failure
7205
TPERIODS record delete failure
7206
TLPAR record delete failure
256
Chapter 12. IBM Z Software Asset Management messages
7208
Failure updating Delete Inventory ID record
7209
Failure deleting TINVCTL records of deleted inventory
7210
Error scanning product version
7211
Error reassigning predecessor links in successor InvCTL records
7600
Table initialization failure
7601
Destination repository column size failure
7602
TINVCTL record seek error
7603
TINVCTL record edit error
7604
TINVCTL record add error
7605
TINVCTL record delete error
7606
TLIBRARY record seek error
7607
TLIBRARY record edit error
257
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
7608
TLIBRARY record add error
7609
TLIBRARY record delete error
7610
Transfer product version join seek error
7611
TPOVLIB record seek error
7612
TPOVLIB record edit error
7613
TPOVLIB record add error
7614
TPOVLIB record delete error
7615
TPOVINV record seek error
7616
TPOVINV record edit error
7617
TPOVINV record add error
7618
TPOVINV record delete error
7619
Table TINVPOV failed in initialization
258
Chapter 12. IBM Z Software Asset Management messages
7620
TVERSION record seek error
7621
TVERSION record edit error
7622
TVERSION record add error
7623
TVERSION record delete error
7624
Table TVERSION open failed
7625
TPRODUCT record seek error
7626
TPRODUCT record edit error
7627
TPRODUCT record add error
7628
TPRODUCT record delete error
7629
TPRODUCT open error
7630
TVENDOR record seek error
7631
TVENDOR record edit error
259
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
7632
TVENDOR record add error
7633
TVENDOR record delete error
7634
TVENDOR open error
7635
TMODULE record seek error
7636
TMODULE record edit error
7637
TMODULE record add error
7638
TMODULE record delete error
7639
TREGCLASS record seek error
7640
TREGCLASS record edit error
7641
TREGCLASS record add error
7642
TREGCLASS record delete error
7643
TREGION record seek error
260
Chapter 12. IBM Z Software Asset Management messages
7644
TREGION record edit error
7645
TREGION record add error
7646
TREGION record delete error
7647
TREGLEAF record seek error
7648
TREGLEAF record edit error
7649
TREGLEAF record add error
7650
TREGLEAF record delete error
7651
TINVREG record seek error
7652
TINVREG record edit error
7653
TINVREG record add error
7654
TINVREG record delete error
7655
TJOBDATA record seek error
261
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
7656
TJOBDATA record edit error
7657
TJOBDATA record add error
7658
TJOBDATA record delete error
7659
TUSERDATA record seek error
7660
TUSERDATA record edit error
7661
TUSERDATA record add error
7662
TUSERDATA record delete error
7663
TLPAR record seek error
7664
TLPAR record edit error
7665
TLPAR record add error
7666
TLPAR record delete error
7667
TUSEMTD record seek error
262
Chapter 12. IBM Z Software Asset Management messages
7668
TUSEMTD record edit error
7669
TUSEMTD record add error
7670
TUSEMTD record delete error
7675
TPERIODS record seek error
7676
TPERIODS record edit error
7677
TPERIODS record add error
7678
TPERIODS record delete error
7679
TUSEPOVLIB record seek error
7680
TUSEPOVLIB record edit error
7681
TUSEPOVLIB record add error
7682
TUSEPOVLIB record delete error
7683
TUSEPOVLIB open error
263
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
7684
TUSEPOV record seek error
7685
TUSEPOV record edit error
7686
TUSEPOV record add error
7687
TUSEPOV record delete error
7688
TUSEPOV open error
7689
TUSEPO record seek error
7690
IDS_MRGE_TUSEPO_EDIT_ERROR
7691
TUSEPO record add error
7692
TUSEPO record delete error
7693
TUSEPO open error
7698
Source and destination repositories are not the same type
7699
Source and/or Destination Repositories are not the correct category database
264
Chapter 12. IBM Z Software Asset Management messages
7827
Memory error encountered
8100
SMF Scanner error
8200
SCRT unspecified fatal error
8280
Uneven Max Contributor record elements
12 Syntax error.
16 Unrecoverable error.
265
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSII001I
READ FAILED FOR SYSIN, RC=rc
Explanation: The HSIICUST program could not read commands from the SYSIN DDname. In the message text:
rc
Operator response: Correct the JCL and provide a SYSIN DD with valid control statements.
Module: HSIICUST
HSII002I
REQUIRED PARAMETER prm IS MISSING FROM SYSIN
Explanation: The HSIICUST program did not find the required parm in the SYSIN supplied by the user. In the message
text:
266
Chapter 12. IBM Z Software Asset Management messages
prm
Operator response: Correct the SYSIN and supply the required parm.
Module: HSIICUST
HSII003I
THE DEFAULT VALUE "prm=dft" IS BEING USED.
Explanation: The submitted HSISCUST Job SYSIN did not contain this parameter and the default value will now be
used. In the message text:
prm
dft
supplied default.
System Action: The program continues and uses the default as documented in the message.
Operator response: If the default value is to be overridden supply the parameter value in the HSISCUST Job SYSIN
stream then resubmit.
Module: HSIICUST
HSII004I
ALLOCATION OF DATASET dsn TO dd FAILED, RC=rc
Explanation: The HSIICUST program could not allocate the dataset to the ddname. In the message text:
dsn
dd
DD name to be allocated.
rc
267
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Check the return code from the allocate command in the TSO commands manual. Correct the
options and try running the program again. The probable option in error is HSIINST.
Module: HSIICUST
HSII005I
func FAILED FOR rsc, RC=rc
Explanation: The HSIICUST program could not perform a required ISPF function because an error occurred during the
function execution. In the message text:
func
rsc
rc
System Action: The program terminates and takes no actions. The program may have written out JCL and parameter
members. These members should be treated as suspect as they might contain errors in them due to the nature of this
error.
Operator response: Check that the options specified do not exceed the field length requirements of the various
options. If you cannot resolve this issue, gather appropriate diagnostic materials and contact IBM support.
Module: HSIICUST
HSII006I
MODEL DATASET SHSISAMP HAS NOT BEEN FOUND.
Explanation: The HSIICUST program could not find the SHSISAMP dataset created during installation.
Operator response: Check that the HSI option is correctly specified and that the installation target libraries are
available to the customization program.
268
Chapter 12. IBM Z Software Asset Management messages
Module: HSIICUST
HSII007I
CUSTOMIZATION TERMINATES ...
Operator response: Check the previous message which will identify the component causing the problem.
Module: HSIICUST
HSII008I
prm PARAMETER VALUE pval IS > plen CHARACTERS.
Explanation: The HSIICUST program found a parameter value with a length greater than the allowed value for that
parm. In the message text:
prm
pval
plen
Operator response: Check the parameter in question and re-submit the HSISCUST JCL after correcting the length
error.
Module: HSIICUST
HSII009I
prm DATASET dsn WAS NOT FOUND ON SYSTEM systm
Explanation: The HSIICUST program found a parameter value, which requires a Dataset name. This Dataset name
could not be found on the system. In the message text:
269
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
prm
dsn
systm
Operator response: Check the parameter in question and re-submit the HSISCUST JCL after correcting the DSN error.
Module: HSIICUST
HSII010I
verb STATEMENT VERB NOT ONE OF list
Explanation: During syntax parsing for a statement the verb found does not match any of the valid verbs for the
program. In the message text:
verb
list
Operator response: Update the statements to the program to correct the verb in error and supply a correct verb.
Module: HSIIKBT
HSII011I
word NOT VALID FOR VERB verb
Explanation: During syntax parsing for a statement, a word was found that does not match the syntax of the
statement for the verb that is being processed. In the message text:
word
word that is not valid for the statement syntax for a verb.
270
Chapter 12. IBM Z Software Asset Management messages
verb
Operator response: Update the statements to the program to correct the statement in error.
Module: HSIIKBT
HSII012I
PARAMETER prm IS NOT A VALID HSISCUST PARAMETER
Explanation: An invalid HSISCUST SYSIN parameter has been found. In the message text:
prm
Operator response: Remove the invalid parameter from the HSISCUST Job SYSIN then resubmit.
Module: HSIICUST
HSII013I
PARAMETER prm HAS A NULL VALUE
Explanation: The submitted HSISCUST Job SYSIN has encountered a parameter with a NULL value. In the message
text:
prm
Operator response: Ensure that the HSISCUST parameter has a valid parameter value in the HSISCUST Job SYSIN
then resubmit.
Module: HSIICUST
271
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSII014I
PARAMETER VALUE FOR prm HAS UNBALANCED QUOTES, PARAMETER VALUE IS pval
prm
pval
parameter value.
Operator response: Ensure that the Parameter value is enclosed within single quotation marks then resubmit the
HSISCUST Job.
Module: HSIICUST
HSII015I
DATASET dsn stat
Explanation: The HSIICUST program identifies the status of the output datasets that it is going to use. In the message
text:
dsn
stat
Module: HSIICUST
HSII016I
UNMATCHED COMMENT DELIMITER IN HSISCUST STATEMENT: stmnt
272
Chapter 12. IBM Z Software Asset Management messages
Explanation: The HSIICUST program found an error in the comment delimiters passed from the HSISCUST SYSIN
stream. In the message text:
stmnt
Operator response: Correct the HSISCUST SYSIN statements and provide valid comment delimiters, /* */.
Module: HSIICUST
HSII017I
PARAMETER prm MUST HAVE THE 1ST CHARACTER AS A VALUE BETWEEN A AND Z
Explanation: The HSISCUST Job has encountered a parameter in the SYSIN DD stream where the first character is not
alphabetic. This parameter value must start with a value between A and Z. In the message text:
prm
Operator response: Ensure that the HSISCUST parameter has a value between A and Z, then resubmit the Job.
Module: HSIICUST
HSII018I
prm VALUE pval MUST BE WITHIN THE VALID RANGE OF val1 TO val2
Explanation: The HSIICUST program encountered a parameter that was outside the valid range of values allowed. In
the message text:
prm
pval
val1
273
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
val2
Operator response: Correct the parameter in error and rerun the HSISCUST Job.
Module: HSIICUST
HSII019I
DBTYPE MUST BE THE FIRST PARM IN THE SYSIN STREAM. CURRENT VALUE IS prm
Explanation: The HSIICUST program found an error in the first parameter passed from the HSISCUST SYSIN stream.
In the message text:
prm
Operator response: Correct the HSISCUST SYSIN statements and ensure that DBTYPE= is the first entry. Comment
statements and blank lines may precede the DBTYPE= entry.
Module: HSIICUST
HSII020I
TAILORING PARAMETERS:
Operator response: This is an informational progress message and no further action is required.
Module: HSIICUST
HSII021I
CREATING POST-INSTALLATION DATASETS:
274
Chapter 12. IBM Z Software Asset Management messages
Operator response: This is an informational progress message and no further action is required.
Module: HSIICUST
HSII022I
APPLYING TAILORING INFORMATION TO POST-INSTALLATION MEMBERS:
Operator response: This is an informational progress message and no further action is required.
Module: HSIICUST
HSII023I
POST-INSTALLATION CUSTOMIZATION COMPLETE.
Operator response: This is an informational progress message and no further action is required.
Module: HSIICUST
HSII024I
PARAMETER prm CONTAINS AN EXTRANEOUS VALUE: xval
prm
xval
275
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Ensure that the Parameter value is correctly defined and that any comments are enclosed within
comment delimiters.
Module: HSIICUST
HSII025I
PARAMETER VALUE FOR prm MUST BE IN QUOTES, PARAMETER VALUE IS pval
prm
pval
parameter value.
Operator response: Ensure that the parameter value is enclosed within single quotation marks then resubmit the
HSISCUST Job.
Module: HSIICUST
HSII026I
PARAMETER prm MUST BE A VALUE BETWEEN A-Z OR 0-9
Explanation: The HSISCUST Job has encountered a parameter in the SYSIN DD stream where the 1st character is not
alphanumeric. This parameter value must be a value between A-Z or 0-9 In the message text:
prm
Operator response: Ensure that the HSISCUST parameter has a value between A-Z or 0-9, then resubmit the Job.
Module: HSIICUST
276
Chapter 12. IBM Z Software Asset Management messages
HSII027I
prm VALUE pval FAILED. VALUE MUST BE Db2, SQLITE OR REMOTE.
Explanation: The HSIICUST program encountered an invalid DBTYPE value. In the message text:
prm
pval
Operator response: Correct the DBTYPE value and rerun the HSISCUST Job.
Module: HSIICUST
HSII028I
PARAMETERS DB AND DBGKB CANNOT HAVE THE SAME DATABASE NAME: db
Explanation: The HSIICUST program found that the values of DB and DBGKB are the same. In the message text:
db
Operator response: Correct the HSISCUST SYSIN statements and provide unique values for both DB and DBGKB.
Module: HSIICUST
HSII100I
prm MISSING FROM CONFIGURATION.
Explanation: The utility requires the parameter in the TPARAM/SYSIN stream. In the message text:
prm
277
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Update the parameters in the TPARAM/SYSIN DD to add the missing parameter.
Module: HSIIKBT
HSII107I
svc FROM rsc FAILED, RC=rc
Explanation: An error has occurred executing the service for the resource specified. The service issued the return
code mentioned. In the message text:
svc
rsc
rc
System Action: The program stops processing statements. No changes have been made.
System Programmer response: For "EXECIO READ" service, this means that the resource specified (ddname) is
missing or empty. If you cannot resolve this issue, gather appropriate diagnostic materials and contact IBM support.
Module: HSIIKBT
HSII108I
SQL verb FAILED, SQLCODE=sqlcode
Explanation: An error has occurred executing the SQL verb for the table specified. In the message text:
verb
sqlcode
System Action: The program stops processing statements. The current statement changes to Db2 tables are backed
out.
278
Chapter 12. IBM Z Software Asset Management messages
System Programmer response: If you cannot resolve this issue, gather appropriate diagnostic materials and contact
IBM support.
Module: HSIIKBT
HSII300I
ERROR WRITING TO ddn.
Explanation: The XML Export utility has a problem writing the XML file. In the message text:
ddn
Operator response: Check the return code and any preceding messages.
Module: HSIIKBT
HSII301I
NUMBER OF LINES WRITTEN TO SWKBTXML DD IS ocnt.
Explanation: Number of lines written to SWKBTXML DD by the XML Export utility. In the message text:
ocnt
Module: HSIIKBT
HSII302I
SQL WARNING FOR warn.
Explanation: SQL warning was issued from a command. In the message text:
warn
SQL warning.
279
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIIKBT
HSII303I
SQL ERROR FOR err.
Explanation: The XML Export Utility has encountered an error. In the message text:
err
SQL Error.
Operator response: Examine the SQL return code to determine the cause of the error. Inform the system programmer.
System Programmer response: If you cannot resolve this issue, then gather appropriate diagnostic materials and
contact IBM support.
Module: HSIIKBT
HSII304I
err.
Explanation: The XML Export Utility has encountered a DSNREXX error. In the message text:
err
DSNREXX error.
Operator response: Examine the preceding error messages to determine the error. Inform the system programmer.
System Programmer response: If you cannot resolve this issue, gather appropriate diagnostic materials and contact
IBM support.
Module: HSIIKBT
HSII305I
INVALID SCHEMA sch.
280
Chapter 12. IBM Z Software Asset Management messages
Explanation: The XML Export Utility has encountered a problem with an invalid schema. In the message text:
sch
schema name
Module: HSIIKBT
HSII999U
MODULE HSIIMSG FAILED - MSGID=msgid RC=rc RS=rs
Explanation: HSIMSG was called to produce a message text, but the call failed. In the message text:
msgid
rc
rs
Module: HSIIINQ
281
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
12 Syntax error.
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSIP000U
NO USABLE SYSPRINT FILE
Explanation: The OPEN of the SYSPRINT file failed. Note: This message is issued by WTO with ROUTCDE=(2,11). All
other messages are written to the SYSPRINT file.
282
Chapter 12. IBM Z Software Asset Management messages
Operator response: Ensure a usable SYSPRINT file is allocated. The program overrides any unacceptable DCB values.
Module: HSIPINQ
HSIP001U
CANNOT OPEN SYSIN FILE
Module: HSIPINQ
HSIP004S
UNKNOWN VERB "verb"
Explanation: Parsing detected unrecognized data when looking for a verb. In the message text:
verb
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP005S
UNKNOWN OPERAND "op"
Explanation: Parsing detected unrecognized data when looking for an operand. In the message text:
op
Operator response: Correct the SYSIN file contents and rerun the program.
283
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIPINQ
HSIP006S
UNEXPECTED OPEN PARENTHESIS ENCOUNTERED
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP007S
UNEXPECTED CLOSE PARENTHESIS ENCOUNTERED
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP008S
EXPECTED OPEN PARENTHESIS MISSING
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
284
Chapter 12. IBM Z Software Asset Management messages
HSIP009S
EXPECTED CLOSE PARENTHESIS MISSING
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP010U
OPERATING SYSTEM NOT SUPPORTED - CODE "code"
Explanation: The value of the byte at CVTDCB was not X'9B'. In the message text:
code
Operator response: This version of the Inquisitor cannot be run on this Operating System. If necessary, gather
appropriate diagnostic materials and contact IBM support.
Module: HSIPINQ
HSIP011I
MISSING CLOSE PARENTHESIS ASSUMED
Explanation: End-of-file was detected for SYSIN before an expected close parenthesis was detected.
Operator response: Correct the SYSIN file contents to avoid this message.
Module: HSIPINQ
285
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP012S
MISSING OPERAND SUBPARAMETER FOR spm
Explanation: A required subparameter of an operand was not specified. In the message text:
spm
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP013S
E-O-F INSTEAD OF EXPECTED CONTINUATION
Explanation: End-of-file was detected for SYSIN instead of an expected record required to continue the current
statement being parsed.
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP014I
COMPLETED REQUEST NUMBER rno - PROCESSING STATISTICS ARE:
Explanation: Processing of a request has been completed. One or more messages follow containing the statistics for
the request. In the message text:
rno
286
Chapter 12. IBM Z Software Asset Management messages
Module: HSIPINQ
HSIP015I
VOLUMES=vol DATASETS=ds BAD-D/S=dsbad PROGRAMS=pgms
Explanation: Processing of a request has been completed. Statistics related to the request are shown. In the
message text:
vol
ds
dsbad
pgms
Module: HSIPINQ
HSIP016I
ACCEPTED REQUEST NUMBER rno
Explanation: Parsing of a request has been completed successfully. The request is stored for subsequent processing.
In the message text:
rno
Module: HSIPINQ
287
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP017E
DYNALLOC FAILURE: RC=rc ERROR=err INFO=inf VOLUME=vol
Explanation: A data set could not be dynamically allocated. See message HSIP080I on page 311 for the name of
the dataset that incurred the problem. In the message text:
rc
err
inf
vol
Operator response: If necessary, rerun when the file is available for use. Note: The meanings of many DARC values
are usually available in Appendix A of the ISPF Tutorial.
Module: HSIPINQ
HSIP018W
VTOC DYNALLOC FAILURE: RC=rc ERROR=err INFO=inf VOLUME=vol
rc
err
inf
vol
288
Chapter 12. IBM Z Software Asset Management messages
Operator response: If necessary, rerun when the VTOC is available for use to process this volume. Note: The
meanings of many DARC values are usually available in Appendix A of the ISPF Tutorial.
Module: HSIPINQ
HSIP020I
ocnt INQUISITOR OUTPUT RECORDS WRITTEN
Explanation: Processing has concluded and all data files have been closed. In the message text:
ocnt
Module: HSIPINQ
HSIP021S
INVALID OPERAND SUBPARAMETER FOR spm
Explanation: The specified subparameter of an operand was not valid. In the message text:
spm
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP022W
I/O ERR MEMBER mbr IN dsn
Explanation: An I/O error was encountered while reading the contents of a load module. In the message text:
289
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
mbr
dsn
Module: HSIPINQ
HSIP023W
ABEND abend IN OPEN FOR dsn
Explanation: An abnormal end occurred while opening a data set. In the message text:
abend
dsn
Operator response: None required, but you may wish to exclude the data set from processing, or correct the cause of
the abend.
Module: HSIPINQ
HSIP024S
BAD UCBSCAN RETURN CODE OF HEX rc
Explanation: An unexpected return code was received from UCBSCAN. In the message text:
rc
Operator response: Rerun the program when no dynamic reconfiguration changes are being implemented.
290
Chapter 12. IBM Z Software Asset Management messages
Module: HSIPINQ
HSIP025U
CANNOT OPEN HSIPOUT FILE
Operator response: Ensure that the allocated HSIPOUT file is usable, or omit the HSIPOUT file in favour of using the
HSIPZIP file.
Module: HSIPINQ
HSIP026E
I/O ERROR ENCOUNTERED READING VTOC OF VOLUME vol ON DEVICE dev
Explanation: An I/O error was encountered while reading a VTOC. In the message text:
vol
dev
Operator response: None required, but you may wish to exclude the volume from processing, or correct the cause of
the I/O error.
Module: HSIPINQ
HSIP028U
CANNOT OPEN HSIPDMP FILE
Explanation: The OPEN of the HSIPDMP file failed after DUMPTEXT was specified.
291
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Ensure a usable HSIPDMP file is allocated, or remove all DUMPTEXT operand's from the contents
of the SYSIN file. The DUMPTEXT operand should only be specified at the request of IBM support.
Module: HSIPINQ
HSIP029I
TEXT-DUMPS=cnt
Explanation: Processing of a request with DUMPTEXT specified has completed. This message follows HSIP015I on
page 287. In the message text:
cnt
Operator response: None required. The DUMPTEXT operand should only be specified at the request of IBM support.
Module: HSIPINQ
HSIP030I
"DUMPTEXT" OPERAND IGNORED FOR "SCANDIR" VERB
Explanation: A DUMPTEXT operand was encountered for a SCANDIR request. That is, the possible dumping of load
module text blocks was specified in a request which does not have access to text blocks.
Operator response: Remove the DUMPTEXT operand to avoid this message. The DUMPTEXT operand should only be
specified at the request of IBM support.
Module: HSIPINQ
HSIP031I
BAD SELECTION CRITERIA FOR dsn
Explanation: Processing of a data set was specified but attributes did not match other selection criteria also specified
in the request. This message is followed by HSIP015I on page 287 which details the cause. In the message text:
292
Chapter 12. IBM Z Software Asset Management messages
dsn
Operator response: If this data set is a program library which should be processed by the Inquisitor then modify or
remove the conflicting selection criteria.
Module: HSIPINQ
HSIP032I
OBTAIN FAILED RC=rc VOLUME vol
Explanation: The system could not read the VTOC entry for the data set named in the HSIP033I on page 293
message which follows this message. This message is only issued when DSNMSG or ALLMSG is specified in the
program parameter. In the message text:
rc
vol
Operator response: Ensure the relevant catalog entry is correct. Ensure the relevant volume is online and available
to the system. Ensure there is no I/O error in the relevant volume's VTOC. If necessary, gather appropriate diagnostic
materials and contact IBM support.
Module: HSIPINQ
HSIP033I
OBTAIN FAILED FOR DATA SET dsn
Explanation: The system could not read the VTOC entry for the data set on the volume named in the previous
HSIP032I on page 293 message. This message is only issued when DSNMSG or ALLMSG is specified in the
program parameter. In the message text:
dsn
293
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Ensure the relevant catalog entry is correct. Ensure the relevant volume is online and available
to the system. Ensure there is no I/O error in the relevant volumes VTOC. If necessary, gather appropriate diagnostic
materials and contact IBM support.
Module: HSIPINQ
HSIP034I
REFER DATE WAS date FOR dsn
Explanation: A load library was opened. The reference date of the data set before the OPEN is reported in this
message. This message is only issued when DSNMSG or ALLMSG is specified in the program parameter. In the
message text:
date
dsn
Module: HSIPINQ
HSIP036E
OPEN ERROR ENCOUNTERED READING VTOC OF VOLUME vol ON DEVICE dev
Explanation: The VTOC of the volume shown could not be opened. In the message text:
vol
dev
Operator response: None required, but you may wish to exclude the volume from processing, or correct the cause of
the I/O error.
294
Chapter 12. IBM Z Software Asset Management messages
Module: HSIPINQ
HSIP037E
SECURITY ACCESS DENIED FOR dsn
Explanation: A RACROUTE macro determined the program had insufficient security access to read the data set. In the
message text:
dsn
Operator response: Contact Security Administration to obtain sufficient security access to read the data set or
exclude the data set from processing.
Module: HSIPINQ
HSIP038I
BAD SELECTION CRITERIA WAS dsn
Explanation: Processing of a data set was specified but attributes did not match other selection criteria also specified
in the request. This message follows HSIP031I on page 292 which shows the data set name. In the message text:
dsn
Operator response: If this data set is a program library which should be processed by the Inquisitor then modify or
remove the conflicting selection criteria.
Module: HSIPINQ
HSIP039S
ALL POSSIBLE DATA SETS ARE EXCLUDED
295
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Explanation: An exclusion mask has been specified which excludes all possible data sets included by a selection
mask. Both masks are shown after this message.
Module: HSIPINQ
HSIP040S
ALL POSSIBLE DASD VOLUMES ARE EXCLUDED
Explanation: An exclusion mask has been specified which excludes all possible DASD volumes included by a
selection mask. Both masks are shown after this message.
Module: HSIPINQ
HSIP041S
ALL POSSIBLE PROGRAMS ARE EXCLUDED
Explanation: An exclusion mask has been specified which excludes all possible programs included by a selection
mask. Both masks are shown after this message.
Module: HSIPINQ
HSIP042S
ALL POSSIBLE MODULES ARE EXCLUDED
Explanation: An exclusion mask has been specified which excludes all possible modules included by a selection
mask.
296
Chapter 12. IBM Z Software Asset Management messages
Operator response: Modify or remove the conflicting selection criteria. If no CSECT-level records are required then
omit both MODULE and XMODULE operands.
Module: HSIPINQ
HSIP043I
"MODULE"/"CSECT" OPERAND IGNORED FOR "SCANDIR" VERB
Explanation: A MODULE operand was encountered for a SCANDIR request. That is, the output of program structure
data was requested in a request which does not have access to this data.
Module: HSIPINQ
HSIP044I
"XMODULE"/"XCSECT" OPERAND IGNORED FOR "SCANDIR" VERB
Explanation: An XMODULE operand was encountered for a SCANDIR request. That is, the output of program structure
data was implied in a request which does not have access to this data.
Module: HSIPINQ
HSIP045I
THE "XDSNAME" MASK IS NOT A SUBSET OF ANY "DSNAME" MASK
Explanation: The mask specified in the XDSNAME operand excludes possible values not included in the DSNAME
operand. This message is issued to highlight possible inconsistencies in a request.
297
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Specify the XDSNAME operand as a further qualification of the DSNAME operand to avoid this
message.
Module: HSIPINQ
HSIP046I
THE "XVOLUME" MASK IS NOT A SUBSET OF ANY "VOLUME" MASK
Explanation: The mask specified in the XVOLUME operand excludes possible values not included in the VOLUME
operand. This message is issued to highlight possible inconsistencies in a request.
Operator response: Specify the XVOLUME operand as a further qualification of the VOLUME operand to avoid this
message.
Module: HSIPINQ
HSIP047I
THE "XPROGRAM" MASK IS NOT A SUBSET OF ANY "PROGRAM" MASK
Explanation: The mask specified in the XPROGRAM operand excludes possible values not included in the PROGRAM
operand. This message is issued to highlight possible inconsistencies in a request.
Operator response: Specify the XPROGRAM operand as a further qualification of the PROGRAM operand to avoid this
message.
Module: HSIPINQ
HSIP048I
THE "XMODULE" MASK IS NOT A SUBSET OF ANY "MODULE" MASK
Explanation: The mask specified in the XMODULE operand excludes possible values not included in the MODULE
operand. This message is issued to highlight possible inconsistencies in a request.
298
Chapter 12. IBM Z Software Asset Management messages
Operator response: Specify the XMODULE operand as a further qualification of the MODULE operand to avoid this
message.
Module: HSIPINQ
HSIP049I
THE "XSTOGROUP" MASK IS NOT A SUBSET OF ANY "STOGROUP" MASK
Explanation: The mask specified in the XSTOGROUP operand excludes possible values not included in the
STOGROUP operand. This message is issued to highlight possible inconsistencies in a request.
Operator response: Specify the XSTOGROUP operand as a further qualification of the STOGROUP operand to avoid
this message.
Module: HSIPINQ
HSIP050I
MODULES=cnt
Explanation: Processing of a request with MODULE specified has completed. This message follows HSIP015I on
page 287. In the message text:
cnt
Module: HSIPINQ
HSIP051I
******** PARSE ONLY REQUEST PROCESSED - NO ACTION TAKEN ********
299
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIPINQ
HSIP052U
MISSING HSIPOUT AND HSIPZIP FILES
Explanation: Neither an HSIPOUT nor an HSIPZIP file is allocated. At least one output file is required.
Module: HSIPINQ
HSIP053U
COMPRESSION SUBROUTINE ERROR
Explanation: While processing the HSIPZIP file the compression subroutine encountered an error. The error message
from the compression subroutine immediately follows this message.
Operator response: Correct the error described in the message from the compression subroutine. If necessary, gather
appropriate diagnostic materials and contact IBM support.
Module: HSIPINQ
HSIP054I
"FULLIDR" OPERAND IGNORED FOR "SCANDIR" VERB
Explanation: A FULLIDR operand was encountered for a SCANDIR request. That is, the processing of load module
member contents was specified in a request which does not have access to this data.
300
Chapter 12. IBM Z Software Asset Management messages
Module: HSIPINQ
HSIP056I
date time COMMENCING SCAN OF VOLUME vol ON UNIT unit
Explanation: A request without the CATALOG keyword began processing a DASD volume. This message provides
feedback on the progress of long-running Inquisitor requests. In the message text:
date
date of message.
time
time of message.
vol
unit
Module: HSIPINQ
HSIP057E
ABEND abend PROCESSING VTOC OF VOLUME vol ON UNIT unit
Explanation: A request without the CATALOG keyword attempted to process a DASD volume VTOC and the OPEN or
CLOSE abended. The volume may not not usable. In the message text:
abend
vol
unit
301
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Operator response: Vary the volume offline, and/or reformat the volume. Institute any appropriate volume recovery
procedures.
Module: HSIPINQ
HSIP058S
DUPLICATE OPERAND ENCOUNTERED: op
Explanation: An input request was found to have the indicated operand specified more than once. In the message
text:
op
Operator response: Correct the SYSIN file contents and rerun the program.
Module: HSIPINQ
HSIP059W
BINDER FAILURE FOR MEMBER mbr RC=rc RS=rs
Explanation: The Binder could not successfully process a member of a PDSE. In the message text:
mbr
rc
rs
System Action: Terminates data collection for this member, writes out data already collected and continues
processing the next member.
System Programmer response: The Binder Fast Data Access API return and reason codes provide more detailed
indication of the cause.
302
Chapter 12. IBM Z Software Asset Management messages
Module: HSIPINQ
HSIP060S
SYMBOL SUBSTITUTION FAILURE - ASASYMBP RC=rc
Explanation: The system symbol substitution routine could not successfully perform symbol substitution. Data before
and after substitution is shown in the SYSPRINT file. In the message text:
rc
Module: HSIPINQ
HSIP061I
pgm NON-REEDITABLE IN dsn
Explanation: A program object in a PDSE was encountered which cannot be processed by the Program Binder.
The program was bound with the NE or OVLY attribute. This message is only issued when PGMMSG or ALLMSG is
specified in the program parameter. This message is not issues for DLL-enable program objects. In the message text:
pgm
dsn
Module: HSIPINQ
HSIP062S
THE CATALOG REQUEST NEEDS EXACTLY ONE DSNAME MASK
303
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Explanation: A request with the CATALOG operand either omitted the DSNAME operand or specified more than one
DSNAME mask.
Operator response: Correct the SYSIN file contents and rerun the program. To process multiple data set name masks
via the CATALOG specify a separate Inquisitor request for each mask. There is no programmed limit to the number of
requests which can be processed in a single Inquisitor run.
Module: HSIPINQ
HSIP063S
ALL POSSIBLE STORAGE GROUPS ARE EXCLUDED
Explanation: An exclusion mask has been specified which excludes all possible storage groups included by the
selection mask. Both masks are shown after this message.
Module: HSIPINQ
HSIP064W
ABEND abend FOR mbr IN dsn
Explanation: A subtask processing a program object from a PDSE has abended. The abend probably occurred in the
Program Binder API. In the message text:
abend
mbr
dsn
System Action: Data collected for this member so far is retained. Other Data Management abends may follow,
especially in CLOSE processing, which are unrecoverable and may abend the main Inquisitor task.
Operator response: Exclude the programs causing the failure and rerun the Job.
304
Chapter 12. IBM Z Software Asset Management messages
Module: HSIPINQ
HSIP065S
MCDS FILE FAILED VERIFICAION
Explanation: The MCDS data definition (DD) was found to be unusable by the Inquisitor. One or more of the following
is true: 1) The MCDS file could not be opened. Message HSIP066E on page 305 follows. 2) The MCDS file is not a
VSAM key-sequenced data set (KSDS). 3) The KSDS relative key position (RKP) is not zero (0). 4) The KSDS key length
is not forty-four (44).
Operator response: Either ensure that the Inquisitor has read access to DFHSM's MCDS, or change the Inquisitor
request(s) so that the MCDS is not required. MCDS access is required if either or both of the REMIGRATE and NOML2
keywords are specified.
Module: HSIPINQ
HSIP066E
MCDS OPEN ERROR - RC=rc RS=rs
Explanation: The OPEN of the MCDS data definition (DD) was not successful. In the message text:
rc
rs
System Action: Issues message HSIP065S on page 305 and terminates with a condition code of 12.
Operator response: Either ensure that the Inquisitor has read access to DFHSM's MCDS, or modify the Inquisitor
request(s) so that the MCDS is not required. MCDS access is required if either or both of the REMIGRATE and NOML2
keywords are specified.
Module: HSIPINQ
305
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP067E
MCDS READ RC=rc RS=rs FOR dsn
Explanation: The MCDS record of a data set cataloged on volume MIGRAT could not be read. Either the record is
missing or there was an I/O error. In the message text:
rc
rs
dsn
Operator response: If the data set is not really migrated then correct the catalog entry. If the MCDS is corrupt then
begin recovery procedures.
Module: HSIPINQ
HSIP068W
CATALOG RC=rc RS=rs,modid cat
Explanation: The Catalog Search Interface returned an entry which is flagged as being in error by Catalog
Management. In the message text:
rc
rs
modid
cat
306
Chapter 12. IBM Z Software Asset Management messages
Operator response: Correct the catalog entry. Refer to the System Messages manual for message IDC3009I to find
out the meaning of the Catalog Management error codes.
Module: HSIPINQ
HSIP069U
PROGRAM IS NOT APF AUTHORIZED
Explanation: The Inquisitor has determined that it is not running in an APF authorized environment, and
PARM=NOAPF was not specified.
Operator response: Ensure that the HSIPINQ program is run in an APF authorized environment, or specify
PARM=NOAPF in the JCL.
Module: HSIPINQ
HSIP070E
BAD BLKSIZE AFTER OPEN FOR dsn
Explanation: A BPAM DCB was opened for the named PDS, but despite the VTOC entry indicating a suitable blocksize,
the blocksize in the DCB after the OPEN was not positive. In the message text:
dsn
System Action: Processing of member contents for this data set is terminated to avoid an S002-30 abend.
Operator response: The PDS is probably corrupt and should be deleted. Recreate it from a backup if appropriate.
Module: HSIPINQ
HSIP071W
IGNORING INVALID DSNAME IN dsn
307
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Explanation: The Catalog Search Interface (CSI) returned a data set name with invalid characters. Although VTOC
entries can contain keys that are not valid data set names, such entries cannot be cataloged. Therefore the entry
returned from the CSI does not represent an actual data set. In the message text:
dsn
Operator response: Ensure that the named catalog is not corrupt and contains no invalid entries.
Module: HSIPINQ
HSIP072I
BYPASS PROCESSING DATA SET dsn DUE TO patn NAME PATTERN MATCH
Explanation: The name of the data set indicated that it does not contain programs which would normally be executed,
and therefore the Inquisitor skipped processing it. The matching name pattern will be one of DLIB (distribution
library), RELFILE (SMP/E relative file), SMPLTS (SMP/E Load Temporary Store library) or IMS LIBRARY. This message
is only issued when DSNMSG or ALLMSG is specified in the program parameter. In the message text:
dsn
patn
System Action: The data set is not opened, and no data from it is collected.
Operator response: None required, but if the data set must be processed then specify its name in an inclusion mask
without any generic masking characters, either by adding this mask to the existing request, or by adding an additional
request to the same Inquisitor run.
Module: HSIPINQ
HSIP073I
NO DATA WAS EXTRACTED FROM dsn
Explanation: The data set contained no members eligible for selection. This message is only issued when DSNMSG
or ALLMSG is specified in the program parameter. In the message text:
308
Chapter 12. IBM Z Software Asset Management messages
dsn
System Action: The data set was opened, but no data from it is collected.
Module: HSIPINQ
HSIP074S
ABRIN OR ABRPRINT FILES NOT ALLOCATED
Explanation: A request had ABRMIG and/or ABRARC specified but at least one of the required ABRIN and ABRPRINT
files was not defined in the JCL.
Operator response: Ensure the required files are pre-allocated for the Inquisitor.
Module: HSIPINQ
HSIP075W
FDRABR ABEND abend CHECKING dsn
Explanation: An abend occurred during ABR processing while checking a data set which may have been archived. In
the message text:
abend
dsn
Operator response: Ensure the catalog entry for the data set is correct.
Module: HSIPINQ
309
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP076E
BAD LOAD abend-rs: mbr dsn
Explanation: The Inquisitor attempted to load a product tag data module from the named data set, but LOAD issued
the displayed abend code. In the message text:
abend
rs
mbr
dsn
System Action: Processing continues with the next member in the data set.
Operator response: Verify that the named data set contains no unusable modules. If necessary, delete any modules
that are of no further use.
Module: HSIPINQ
HSIP077W
ISITMGD RC=rc RS=rs FOR dsn
Explanation: The Inquisitor executed an ISITMGD macro for the named data set, but ISITMGD issued a non-zero
return code. In the message text:
rc
rs
dsn
310
Chapter 12. IBM Z Software Asset Management messages
Operator response: Consult the applicable DFSMS Macro Instructions for Data Sets manual to determine the
meaning of the ISITMGD return and reason codes. Ensure that the named data set is a valid and accessible
partitioned data set. If necessary, gather appropriate diagnostic materials and contact IBM support.
Module: HSIPINQ
HSIP078W
DESERV RC=rc RS=rs FOR dsn
Explanation: The Inquisitor executed a DESERV FUNC=GET_ALL macro for the named data set, but DESERV issued a
non-zero return code. In the message text:
rc
rs
dsn
Operator response: Consult the applicable DFSMS Macro Instructions for Data Sets manual to determine the
meaning of the DESERV return and reason codes. Ensure that the named data set is a valid and accessible partitioned
data set. If necessary, gather appropriate diagnostic materials and contact IBM support.
Module: HSIPINQ
HSIP080I
DYNALLOC FAILURE: DSN=dsn
Explanation: A data set could not be dynamically allocated. In the message text:
dsn
System Action: Depends upon other messages associated with this message.
311
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIPINQ
HSIP081S
ALL POSSIBLE DEVICE NUMBERS ARE EXCLUDED
Explanation: An exclusion mask has been specified which excludes all possible device numbers included by a
selection mask. Both masks are shown after this message.
Module: HSIPINQ
HSIP082I
THE "XDEVICE" MASK IS NOT A SUBSET OF ANY "DEVICE" MASK
Explanation: The mask specified in the XDEVICE operand excludes possible values not included in the DEVICE
operand. This message is issued to highlight possible inconsistencies in a request.
Operator response: Specify the XDEVICE operand as a further qualification of the DEVICE operand to avoid this
message.
Module: HSIPINQ
HSIP083E
RENAME FAILED FOR DATA SET dsn
Explanation: The rename operation to add one or more extra low-level qualifiers to a data set name as specified
by the LLQ program parameter setting did not succeed. The named data set is allocated to either the HSIPZIP or
HSIPOUT file. This message is preceded by either an associated explanatory message, or by messages from IDCAMS
detailing the results of the rename attempt. In the message text:
dsn
System Action: The output data set retains its original name.
312
Chapter 12. IBM Z Software Asset Management messages
Operator response: Ensure that the specified LLQ string length does not exceed 44 bytes, that any symbols used are
valid for this system, and that resultant data set names are not longer than 44 bytes. Examine associated messages
to determine the reason for the rename failure.
Module: HSIPINQ
HSIP084I
ABEND abend OPENING DSN dsn
Explanation: An abnormal end occurred while opening a data set. In the message text:
abend
dsn
Operator response: None required, but you may wish to correct the cause of the abend.
Module: HSIPINQ
HSIP085I
ABEND abend CLOSING DSN dsn
Explanation: An abnormal end occurred while closing a data set. In the message text:
abend
dsn
Operator response: None required, but you may wish to correct the cause of the abend.
Module: HSIPINQ
313
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP086S
NO PROGRAMS OR TAG DATA FOUND - NO DATA FOR IMPORT WAS PRODUCED
Explanation: All scanning operations failed to find any executable programs or program tag data, so no data suitable
for subsequent processing was created.
Operator response: Correct any selection criteria errors and rerun the job.
Module: HSIPINQ
HSIP087I
SKIP INACCESSIBLE DATA SET dsn
Explanation: The named data set was encountered on an SMS-managed volume, but no matching catalog entry could
be located, which means that the data set cannot be successfully allocated by any job. In the message text:
dsn
Operator response: None required, but you may wish to either catalog the data set to make it accessible, or delete it
to reclaim the disk space.
Module: HSIPINQ
HSIP088I
DEVICES=vol CU-GROUPS=ds USED-CHPIDS=dsbad
Explanation: Processing of a SCANDEV request has been completed. Counts of online I/O devices, device groups and
used channel paths are shown. A group of devices with the same device type, control unit, and CHPID connectivity
generates one CU record. A CP record is generated for each online CHPID connected to at least one online I/O device.
In the message text:
vol
314
Chapter 12. IBM Z Software Asset Management messages
ds
dsbad
Module: HSIPINQ
HSIP089E
INSUFFICIENT AUTHORIZATION TO PROCESS "SCANDEV" REQUEST
Explanation: To process a SCANDEV request either the Inquisitor must be APF authorized or the user must have
UPDATE access to the IOSCDR entity in the FACILITY security class.
Operator response: Get the appropriate authorization, or omit the SCANDEV request.
Module: HSIPINQ
HSIP090I
EXCESSIVE DESERV DELAY FOR dsn
Explanation: This message is issued when a DESERV macro has not returned control to the Inquisitor after 15
minutes. This might indicate that the data set being processed is corrupt and unusable. In the message text:
dsn
System Action: Processing continues, possibly without making any further progress.
Operator response: If the scan does not progress, and the delay is not caused by contention with other work, cancel
the job. Either delete the data set, or add an exclusion to the Inquisitor control statement before rerunning the job.
Module: HSIPINQ
315
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP091I
IGNORING OLD TAG MEMBER mem IN DATA SET=dsn
Explanation: This message is issued when a tag member made by the defunct Tagger program HSITAGP is
encountered. The Inquisitor will not collect any information from or about this member. In the message text:
mem
dns
Operator response: The tag member can be safely deleted. Local tagging functions are now available in the Analyzer
which can directly update the data base.
HSIP092I
ANOTHER JOB HOLDS dsn =time / dsn
Explanation: This message is issued when a library to be scanned is found to be exclusively allocated to another job,
and therefore cannot be scanned. In the message text:
time
time of message.
dns
System Action: Processing continues. If the data set does not become available before the processing of the request
completes, an error or warning condition will be raised. The default error condition can be reduced to a warning
condition by specifying the INUSEWARN keyword in the request statement.
Operator response: If necessary, and if message HSIP093I on page 316 is not issued for this data set, rerun the
scan when the data set is available.
HSIP093I
RETRY SUCCESS FOR vol / dsn =vol / dsn
Explanation: This message is issued when a library to be scanned was previously found to be exclusively allocated to
another job, but has now become available and has been processed. In the message text:
316
Chapter 12. IBM Z Software Asset Management messages
vol
dns
HSIP094W
RETRY FAILURE FOR vol / dsn =vol / dsn
Explanation: This message is issued when a library to be scanned was previously found to be exclusively allocated to
another job, and the data set retried. INUSEWARN was specified on the request. In the message text:
vol
dns
Operator response: If necessary, rerun the scan when the data set is available.
HSIP095E
RETRY FAILURE FOR vol / dsn =vol / dsn
Explanation: This message is issued when a library to be scanned was previously found to be exclusively allocated to
another job, and the data set remains unavailable when the allocation was retried. INUSEWARN was not specified on
the request. In the message text:
vol
dns
Operator response: If necessary, rerun the scan when the data set is available.
317
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP097E
CATALOG SEARCH INTERFACE ERROR RC=csirc
Explanation: A request with the CATALOG keyword was specified, and the Catalog Search Interface encountered an
error. In the message text:
csirc
Module: HSIPINQ
HSIP098E
CATALOG SEARCH INTERFACE ERROR RC=csirc CATALOG RC=rc CATALOG RS=rs
Explanation: A request with the CATALOG keyword was specified, and the Catalog Search Interface encountered an
error. In the message text:
csirc
rc
rs
Module: HSIPINQ
HSIP099E
CATALOG SEARCH INTERFACE ERROR RC=csirc CATALOG RC=rc CATALOG RS=rs
MODULE=modid
318
Chapter 12. IBM Z Software Asset Management messages
Explanation: A request with the CATALOG keyword was specified, and the Catalog Search Interface encountered an
error. In the message text:
csirc
rc
rs
modid
module identifier.
Module: HSIPINQ
HSIP100I
PROGRAM HSIPVMAP COMPLETED WITH RC=rc
Explanation: The HSIPVMAP program was invoked to process the optional HSIDAMAP file, and HSIPVMAP issued
the return code shown. A return code of zero indicates success. A return code of 8 indicates that the HSIDAMAP DD
was allocated, but a problem was encountered trying to process it. In the message text:
rc
Operator response: If necessary, investigate any I/O errors associated with the data set allocated to HSIDAMAP.
Reconcile the intended mapping(s) with any HSIP101I messages that immediately follow. If necessary, correct the
assignments and rerun the job.
Module: HSIPINQ
HSIP101I
VOLUMES MATCHING "v-mask" WILL BE MAPPED TO "v-name"
319
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Explanation: The HSIPVMAP program has extracted the displayed logical volume mapping from the HSIDAMAP file.
In the message text:
v-mask
v-name
Operator response: Verify that the displayed logical volume mapping is as intended. Note that while the Usage
Monitor also calls program HSIPVMAP, it does not externalize the results, so trial executions of the HSIPINQ program
should be used to test new logical volume mapping assignments before the resulting data is imported into the data
base.
Module: HSIPINQ
HSIP102U
DSPSERV CREATE RC=rc RS=rs
Explanation: The Inquisitor executed a DSPSERV CREATE macro to acquire storage to hold collected data, but
DSPSERV issued a non-zero return code. In the message text:
rc
rs
System Action: Program HSIPINQ abends with user abend code 29 and with the reason code returned by DSPSERV.
Operator response: Consult the applicable MVS Programming: Assembler Services Reference manual to determine
the meaning of the DSPSERV return and reason codes. Ensure that the job is permitted to acquire numerous data
spaces and gigabytes of data space storage.
System Programmer response: Inspect and, if necessary, alter the DSLIMITNUM and DSLIMITSIZE settings in the
SMFLIMxx PARMLIB member that are applied to this job.
Module: HSIPINQ
HSIP103I
type QUEUE MAXIMUM=count
320
Chapter 12. IBM Z Software Asset Management messages
Explanation: This message is issued when volume-scanning subtasks queue collected data about items such as
data sets and programs for processing by the main task. The maximum queue length for each item type is reported.
In the message text:
type
count
Module: HSIPINQ
HSIP104I
type DATA SPACE FREE STORAGE ADDRESS IS addr
Explanation: This message is issued when volume-scanning subtasks use data space storage to queue collected
data for processing by the main task. The start address of unused virtual storage in the relevant data space is
reported. Pages above this address were not referenced. This message indicates how much data space storage
was used by the request. The used storage is also reported as a percentage of the total data space size to provide
capacity feedback. In the message text:
type
addr
Module: HSIPINQ
321
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIP105I
USED DATA SPACE PAGES:size
Explanation: This message is issued when volume-scanning subtasks use data space storage to queue collected
data for processing by the main task. It reports the maximum amount of virtual storage across all data spaces
created by the main task for this request that needed to be backed in central and/or auxiliary storage by the system.
This storage quantity is also expressed as a percentage to indicate how much of the data space storage that SMF
may report as being allocated was actually used. The small data space that may be created by each volume-scanning
subtask is not included in these numbers. In the message text:
size
Module: HSIPINQ
HSIP106I
bytes COMPRESSED DATA BYTES WRITTEN TO ddname
Explanation: This message is issued after closing the named output DD which contains compressed (zipped) data.
The reported compressed data byte count matches the count contained in the zip file headers, so the count does not
include the size of the zip headers. The reported DD name will be HSIPZIP unless HSIPINQ was invoked by another
program which supplied a DD override parameter. In the message text:
bytes
byte count.
ddname
output DD name.
Module: HSIPINQ
322
Chapter 12. IBM Z Software Asset Management messages
HSIP107I
NUMBER OF CONCURRENT DATA SPACES LIMIT IS limit
Explanation: This message is issued when a relatively low concurrent data space count limit is detected. Ensure that
active SMFLIMxx PARMLIB settings do not unduly limit storage access for the job. The Inquisitor uses data space
storage to reduce the dependency on large region size availability, and depending on the actual request, may allocate
up to MAXTASKS+4 data spaces. In the message text:
limit
Module: HSIPINQ
HSIP108I
DATA SPACE STORAGE LIMIT IS limit MB
Explanation: This message is issued when a relatively low data space storage limit is detected. Ensure that active
SMFLIMxx PARMLIB settings do not unduly limit storage access for the job. The Inquisitor uses data space storage to
reduce the dependency on large region size availability, and depending on the actual request, may allocate up to four
2 GB and MAXTASKS 16648 KB data spaces. In the message text:
limit
Module: HSIPINQ
HSIP999U
MODULE HSIPMSG FAILED - MSGID=msgid RC=rc RS=rs
Explanation: HSIMSG was called to produce a message text, but the call failed. In the message text:
323
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
msgid
rc
rs
Module: HSIPINQ
324
Chapter 12. IBM Z Software Asset Management messages
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSIT001U
HSITAGP COULD NOT OPEN THE INPUT FILE file
Explanation: A required file could not be opened successfully. In the message text:
file
name of file.
Operator response: Correct the file definition and rerun the job.
Module: HSITAGP
HSIT002S
UNRECOGNIZED STATEMENT TYPE: stattyp
Explanation: Input text was encountered which does not match any known statement type. In the message text:
stattyp
325
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSITAGP
HSIT003S
DUPLICATE VALUE SUPPLIED FOR stattyp
Explanation: More than one occurrence of the named statement type was encountered, but only one value can be
accepted. In the message text:
stattyp
Operator response: Remove the redundant statement and rerun the job.
Module: HSITAGP
HSIT004S
VALUE MISSING IN stattyp STATEMENT
Explanation: An input statement of the type indicated was encountered, but no non-blanks followed the statement
type name. In the message text:
stattyp
Operator response: Supply an appropriate value after the statement type name.
Module: HSITAGP
HSIT005S
VALUE SPECIFIED FOR LICENSED WAS NEITHER ''YES'' NOR ''NO''
326
Chapter 12. IBM Z Software Asset Management messages
Explanation: A LICENSED statement was processed which had a value specified other than one of the valid values.
Module: HSITAGP
HSIT006S
THE parm PARAMETER HAD NO SUBPARAMETER VALUE SPECIFIED
Explanation: A statement parameter or operand was specified, but the required subparameter, or value of the
parameter, was not specified. One cause for this condition is the omission of a parenthesis. In the message text:
parm
name of the parameter or operand being processed when the error is detected.
Module: HSITAGP
HSIT007I
A CLOSING PARENTHESIS ASSUMED FOR parm
Explanation: End-of-file was raised when processing input statements before an expected close parenthesis was
encountered. In the message text:
parm
name of the parameter or operand being processed when the error is detected.
System Action: Processing continues as if the expected close parenthesis had been specified.
Operator response: Check that the resulting processing is as expected. Correct the input file for future use, and rerun
the job if the desired processing was not performed.
Module: HSITAGP
327
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIT008S
UNEXPECTED OPEN PARENTHESIS ENCOUNTERED AFTER parm
Explanation: An open parenthesis was encountered when one was not expected. If this occurred while a parameter or
operand was being processed, then it is named in the message. In the message text:
parm
name of the parameter or operand being processed when the error is detected.
Operator response: Correct the input file and rerun the job.
Module: HSITAGP
HSIT009S
UNEXPECTED CLOSE PARENTHESIS ENCOUNTERED AFTER parm
Explanation: A close parenthesis was encountered when one was not expected. If this occurred while a parameter or
operand was being processed, then it is named in the message. In the message text:
parm
name of the parameter or operand being processed when the error is detected.
Operator response: Correct the input file and rerun the job.
Module: HSITAGP
HSIT010S
parm IS AN UNKNOWN SELECT PARAMETER
Explanation: Input data was encountered which is not a recognized parameter, or operand, of the SELECT statement.
In the message text:
parm
328
Chapter 12. IBM Z Software Asset Management messages
Operator response: Correct the input file and rerun the job.
Module: HSITAGP
HSIT011S
MEMBER NAME parm HAS EMBEDDED BLANK(S)
Explanation: The value specified on the TAGMEM statement was not a valid partitioned data set member name, a
blank was found within the eight character member name. In the message text:
parm
Operator response: Correct the input file and rerun the job.
Module: HSITAGP
HSIT012S
MISSING OPEN PARENTHESIS AFTER parm
Explanation: Whilst parsing the SELECT statement looking for a subparameter, or value, in parentheses specified for
the parameter or operand named in the message, text was encountered which was not enclosed in parentheses. In
the message text:
parm
name of the parameter or operand being processed when the error is detected.
Module: HSITAGP
HSIT013S
VALUE data TOO LONG FOR PARAMETER parm
329
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Explanation: The length of a subparameter or value was found to exceed the maximum length allowed. The maximum
length allowed depends on the specific parameter or operand being processed. For example, a data set name mask
exceeding 44 characters in length causes this condition, as will a volume mask exceeding six characters in length. In
the message text:
data
parm
name of the parameter or operand being processed when the error is detected.
Module: HSITAGP
HSIT014S
END OF INPUT REACHED, EXPECTED CONTINUATION IS MISSING
Explanation: End-of-file was raised on the input (SYSIN) file, but the SELECT statement currently being processed was
expected to continue on the next record.
Operator response: Either supply the missing input data, or remove the continuation character from the last input
record. Rerun the job.
Module: HSITAGP
HSIT017S
NO VALUE FOR stattyp WAS SPECIFIED
Explanation: A value for a statement of the type named in the message is required, but was not found in the input file.
In the message text:
stattyp
Operator response: Supply a statement of the named type which specifies a value.
330
Chapter 12. IBM Z Software Asset Management messages
Module: HSITAGP
HSIT019E
DESERV FAILED - RC=rc RS=rs FOR DATA SET dsn
Explanation: A DESERV FUNC=GET_ALL macro was issued to acquire the member list for a data set, but DESERV
issued a non-zero return code. In the message text:
rc
rs
dsn
System Action: The named data set is not processed, and processing continues with the next relevant data set.
Operator response: Consult the applicable DFSMS Macro Instructions for Data Sets manual to determine the
meaning of the DESERV return and reason codes. Ensure that the named data set is a valid and accessible program
library. If necessary, gather appropriate diagnostic materials and contact IBM support.
Module: HSITAGP
HSIT020S
DYNAMIC ALLOCATION FAILURE - BPXWDYN RC=rc
Explanation: BPXWDYN was called to dynamically allocate a required work file, but BPXWDYN issued a non-zero
return code. As a result, processing cannot proceed. In the message text:
rc
Operator response: Consult the applicable Using REXX and z/OS UNIX System Services manual to determine the
meaning of the return code. Examine the job log and messages to see any associated dynamic allocation error
message.
331
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSITAGP
HSIT022S
RC=rc WAS RETURNED BY PROGRAM pgm
Explanation: Either the High Level Assembler (program ASMA90) or the Program Binder (program IEWL) was
dynamically started to assist with creating the output data, but the named program issued a non-zero return code. In
the message text:
rc
pgm
Operator response: Examine all associated job output to determine if the problem is caused by a correctable
environmental error. If so, make the correction and rerun the job. If not, gather all relevant diagnostic materials and
contact IBM support.
Module: HSITAGP
HSIT023I
PROCESSING TERMINATED DUE TO ENCOUNTERED ERROR CONDITION
Explanation: Because of a previously reported error, the product tagging utility is terminating unilaterally, without
processing all of the specified program library data sets, and without generating all of the requested program product
tagging data.
Module: HSITAGP
HSIT024E
ISITMGD FAILED - RC=rc RS=rs FOR FILE file AND DATA SET dsn
332
Chapter 12. IBM Z Software Asset Management messages
Explanation: An ISITMGD macro was issued against a program library, but ISITMGD issued a non-zero return code. In
the message text:
rc
rs
file
dsn
System Action: The named data set is not processed, and processing continues with the next relevant data set.
Operator response: Consult the applicable DFSMS Macro Instructions for Data Sets manual to determine the
meaning of the ISITMGD return and reason codes. Ensure that the named data set is a valid and accessible
partitioned data set. If necessary, gather the appropriate diagnostic materials and contact IBM support.
Module: HSITAGP
HSIT025I
pgmcnt PROGRAMS FOUND TO TAG FROM DATA SET dsn
Explanation: Input processing of the named data set has completed, resulting in data from the reported number of
programs being accumulated for subsequent output. In the message text:
pgmcnt
dsn
Module: HSITAGP
333
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIT026I
PROCESSING COMPLETE - RC=rc AND pgmcnt PROGRAMS TAGGED IN TOTAL
Explanation: The product tagging utility program HSITAGP has completed processing. This message reports the
return code issued by HSITAGP, and the number of programs from which data has been collected during this run. In
the message text:
rc
pgmcnt
Module: HSITAGP
HSIT028W
UNABLE TO ACQUIRE ANY PRODUCT MAINTENANCE LEVEL DATE
Explanation: After having processed all of the relevant programs, HSITAGP was unable to acquire any date stamp for
use as a maintenance level indicator.
System Action: Blanks are placed in the maintenance level field and processing continues.
Module: HSITAGP
HSIT029S
stattyp STATEMENT VALUE LENGTH EXCEEDS THE ALLOWED MAXIMUM OF max BYTES
Explanation: The value specified for the named statement type was found to be longer than the maximum allowed.
The maximum byte count allowed for a value of this statement type is shown in the message. In the message text:
stattyp
334
Chapter 12. IBM Z Software Asset Management messages
max
number of bytes.
Module: HSITAGP
HSIT030S
INVALID TEXT CHARACTER X''char'' FOUND IN stattyp STATEMENT
Explanation: The displayed data byte was encountered when processing the value specified for the statement type
indicated. The value specified on the statement is expected to be a string. Valid byte values for text data are in the
range from X'40' to X'FE' inclusive. The control code encountered is either not valid input, or not valid input in this
location. The only control codes that can be used in the input value are SO (X'0E') and SI(X'0F'), when they are used to
encapsulate DBCS data. In the message text:
char
stattyp
Operator response: Remove the undisplayable characters from the input value. If using DBCS, ensure that SO
precedes DBCS text and SI terminates DBCS text, and that the DBCS text is an even number of valid text bytes.
Module: HSITAGP
HSIT032E
NO PROGRAMS ELIGIBLE FOR TAGGING COULD BE FOUND
Explanation: No programs met the selection criteria and so the request had no operation to perform. In the message
text:
Operator response: If appropriate, modify the request parameters and resubmit the job.
335
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSITAGP
HSIT033W
NOT ALL PROGRAM NAME INCLUSION MASKS WERE MATCHED
Explanation: One or more program name inclusion masks did not match any program names in the library. In the
message text:
Module: HSITAGP
HSIT034S
USE THE ANALYZER TO UPDATE THE LKB - OR PROVIDE 'TAGNOW' OVERRIDE PARAMETER
Explanation: The preferred method of maintaining the LKB is via the Administration tab of the Analyzer. To continue
using the batch Program Tagger an override program parameter of TAGNOW or OLDTAG must be provided. Note
that tag members created by HSITAGP will be ignored by the Inquisitor unless the OLDTAG keyword is present in the
program parameter string specified for the HSIPINQ program. In the message text:
Operator response: If appropriate, specify a program parameter override and resubmit the job. Otherwise, use the
Analyzer to maintain the LKB.
Module: HSITAGP
HSIT035I
DUPLICATE parm VALUE IGNORED: data.
Explanation: A subparameter value was encountered which matched a value previously specified for the same
parameter. The duplicate specification is discarded. In the message text:
parm
336
Chapter 12. IBM Z Software Asset Management messages
data
Operator response: If the value is incorrect then correct it. To prevent the message being issued remove duplicate
value specifications.
Module: HSITAGP
HSIT999U
HSIMSG/HSITMSG FAILURE - MSGID=msgid RC=rc RS=rs
Explanation: HSIMSG was called to produce a message text, but the call failed. In the message text:
msgid
rc
rs
System Programmer response: Ensure Joblib/Steplib contains the library where the HSITMSG message module
resides. If you cannot resolve this issue, contact IBM support.
Module: HSITAGP
337
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
(continued)
4 Warning issued.
12 Syntax error.
16 Unrecoverable error.
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSIX002I
THE SPECIFIED DIRECTORY NAME DOES NOT START WITH A SLASH
Explanation: A record from file HSIXROOT was read and was found to start with a non-blank that is not a slash. It is
reported in case processing errors result from the non-standard directory name.
338
Chapter 12. IBM Z Software Asset Management messages
Module: HSIXINQ
HSIX003I
PROGRAM PARAMETER "parm" DISCARDED
Explanation: The program parameter contained some unrecognized data. In the message text:
parm
parameter in error.
Module: HSIXINQ
HSIX004I
FUNCTION func COMPLETED WITH RC=rc AND REASON=rs
Explanation: The named z/OS® UNIX® System Service issued a negative return value. In the message text:
func
function name.
rc
rs
Operator response: Determine the meaning of the return and reason codes, and correct the problem if appropriate.
Information relating to the failing UNIX® function can be found in the UNIX® System Services Assembler Callable
Services manual. Information relating to the return code and reason code of the failing UNIX® function can be found
in the UNIX® System Services Messages and Codes manual.
Module: HSIXINQ
339
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIX006E
RENAME FAILED FOR DATA SET dsn
Explanation: The rename operation to add one or more extra low-level qualifiers to a data set name as specified
by the LLQ program parameter setting did not succeed. The named data set is allocated to either the HSIXZIP or
HSIXOUT file. If this message is not followed by an associated explanatory message then an IDCAMS report detailing
the results of the rename attempt will have been written to SYSPRINT. In the message text:
dsn
System Action: The output data set retains its original name.
Operator response: Ensure that the specified LLQ string length does not exceed 44 bytes, that any symbols used are
valid for this system, and that resultant data set names are not longer than 44 bytes. Examine associated messages
to determine the reason for the rename failure.
Module: HSIXINQ
HSIX007E
FUNCTION func FAILED, RC=rc, REASON=rs, FOR PATH pth
Explanation: The named z/OS® UNIX® system service issued a negative return value. In the message text:
func
function name.
rc
rs
pth
path in error.
Operator response: Determine the meaning of the return and reason codes, and correct the problem if appropriate.
Information relating to the failing UNIX® function can be found in the UNIX® System Services Assembler Callable
Services manual. Information relating to the return code and reason code of the failing UNIX® function can be found
in the UNIX® System Services Messages and Codes manual.
340
Chapter 12. IBM Z Software Asset Management messages
Module: HSIXINQ
HSIX008E
FUNCTION func WAS DENIED ACCESS TO PATH pth
Explanation: The named z/OS® UNIX® System Service issued a return code of hexadecimal 6F which indicates that
access was denied. In the message text:
func
function name.
pth
path in error.
Operator response: Grant the user access to the parts of the UNIX® file system to be scanned.
Module: HSIXINQ
HSIX009S
NO EXECUTABLE SOFTWARE FOUND - NO DATA FOR IMPORT WAS PRODUCED
Explanation: All scanning operations failed to find any programs or other executable software, so no data suitable for
subsequent processing was created.
Operator response: Correct any selection criteria errors and rerun the job.
Module: HSIXINQ
HSIX010U
MISSING HSIXOUT AND HSIXZIP FILES
Explanation: Neither an HSIXOUT nor an HSIXZIP file is allocated. At least one output file is required.
341
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIXINQ
HSIX999U
HSIMSG/HSIXMSG FAILURE - MSGID=msgid RC=rc RS=rs
Explanation: HSIMSG was called to produce a message text, but the call failed. In the message text:
msgid
rc
rs
System Programmer response: Ensure Joblib/Steplib contains the library where the HSIXMSG message module
resides. If you cannot resolve this issue, contact IBM support.
Module: HSIXINQ
0 Normal termination.
16 Initialization failed.
342
Chapter 12. IBM Z Software Asset Management messages
Raises minimum
Suffix Meaning condition code to:
I Information message 0
W Warning message 4
E Error message 8
All numeric completion codes of system services reported in these messages are in hexadecimal
unless otherwise stated.
HSIZ001I
USAGE MONITOR INITIALIZING
Module: HSIZMON
HSIZ002I
csid DETECTED UNSUPPORTED OPERATING SYSTEM
Explanation: The Usage Monitor may not run on an unsupported operating system. In the message text:
csid
343
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ003I
csid USAGE MONITOR NOT APF AUTHORIZED
Explanation: The Usage Monitor needs to be executed in an APF authorized environment. In the message text:
csid
System Programmer response: APF authorize the load libraries that the Usage monitor runs from.
Module: HSIZMON
HSIZ005I
csid USAGE MONITOR ALREADY ACTIVE
Explanation: The Usage Monitor is already running. Only one concurrent copy can run in an operating system image.
In the message text:
csid
System Action: Processing terminates. The established Usage Monitor task continues.
Module: HSIZMON
HSIZ006I
csid USAGE MONITOR QEDIT BUFFER SET FAILED
Explanation: A QEDIT issued to set up MODIFY command processing has failed. In the message text:
csid
344
Chapter 12. IBM Z Software Asset Management messages
System Programmer response: Gather appropriate diagnostic materials and contact IBM support.
Module: HSIZMON
HSIZ007I
csid USAGE MONITOR MODULE mod FAILED - RC=rc
csid
mod
rc
System Programmer response: Gather appropriate diagnostic materials and contact IBM support.
Module: HSIZMON
HSIZ008I
csid USAGE MONITOR INITIALIZED - ASID asid SET IN AVT avt
Explanation: An anchor vector table (AVT) has been acquired or reacquired, and has been updated for the current
server address space, which has completed initialization. In the message text:
csid
asid
ASID number.
avt
AVT Address.
345
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ009I
DATA WRITTEN TO DSN=dsn
Explanation: Usage Monitor data has been written to the named data set. In the message text:
dsn
Operator response: Transfer the named data set to the system where the database resides so it can be processed.
Module: HSIZMON
HSIZ010E
csid USAGE MONITOR - WRITER TASK ENDED - RC=rc
Explanation: A writer task has ended with a non-zero return code. In the message text:
csid
rc
System Programmer response: Gather appropriate diagnostic materials and contact IBM support.
Module: HSIZMON
HSIZ011E
csid USAGE MONITOR - WRITER TASK ABENDED - Sabend
346
Chapter 12. IBM Z Software Asset Management messages
csid
abend
System Programmer response: Local reasons for system abends should be investigated. If necessary, gather
appropriate diagnostic materials and contact IBM support.
Module: HSIZMON
HSIZ012I
**DATA LOSS** UNUSABLE DSN=dsn
Explanation: It is likely that Usage Monitor data has been lost because of unexpected behavior by a writer task. Any
compressed output data that has been written will probably be unusable. In the message text:
dsn
Operator response: Examine any preceding messages to determine the likely cause of the writer task error. If the
output data set is complete it can be used, otherwise if the data is compressed it is unusable. If the data set is empty,
this fact can be noted and the data set can be deleted. Unless retaining an unusable data set for diagnosis reasons, it
can be deleted.
Module: HSIZMON
HSIZ013I
csid USAGE MONITOR - UNRECOGNIZED PROGRAM PARAMETER IGNORED
csid
347
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ014I
csid USAGE MONITOR - COULD NOT OPEN FILE HSIZIN
Explanation: The HSIZIN file could not be opened by the Usage Monitor. In the message text:
csid
Module: HSIZMON
HSIZ015I
csid USAGE MONITOR - COULD NOT OPEN FILE HSIZMSG
Explanation: The HSIZMSG file could not be opened by the Usage Monitor. In the message text:
csid
Module: HSIZMON
HSIZ016I
csid USAGE MONITOR TERMINATING - INVALID OR MISSING HSIZIN DATA
Explanation: At least one HSIZIN input statement was invalid, or input required to be present in the HSIZIN file was
missing. In the message text:
348
Chapter 12. IBM Z Software Asset Management messages
csid
Operator response: Examine the HSIZMSG output report. Correct any invalid statements. Ensure a valid data set
name prefix was specified.
Module: HSIZMON
HSIZ017I
csid USAGE MONITOR TERMINATING - NOW WRITING CAPTURED DATA
Explanation: A STOP command has been encountered. The current repository contents are written before the Usage
Monitor terminates. In the message text:
csid
System Action: The Usage Monitor starts a writer task and waits for its completion before terminating.
Module: HSIZMON
HSIZ018I
csid USAGE MONITOR HAS NOW TERMINATED
Explanation: The Usage Monitor has now freed resources and is about to terminate. In the message text:
csid
Module: HSIZMON
349
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIZ019I
csid USAGE MONITOR REPOSITORY FULL - NOW SWITCHING
Explanation: The current Usage Monitor data collection repository is full. In the message text:
csid
System Action: A new repository is created and used for subsequent data collection. A writer task is initiated for the
full repository.
Module: HSIZMON
HSIZ020I
csid THE SPECIFIED NUMBER WAS TOO SMALL
Explanation: The numeric value of a command subparameter was too small to be valid in the command context. In
the message text:
csid
Operator response: Correct the numeric value and reissue the command.
Module: HSIZMON
HSIZ021I
csid THE SPECIFIED NUMBER WAS TOO LARGE
Explanation: The numeric value of a command subparameter was too large to be valid in the command context. In
the message text:
csid
350
Chapter 12. IBM Z Software Asset Management messages
Operator response: Correct the numeric value and reissue the command.
Module: HSIZMON
HSIZ022I
csid PASSIVE MODE SET FROM PROGRAM PARAMETER
Explanation: PASSIVE was specified in the program parameter. In the message text:
csid
System Action: The Usage Monitor starts in passive mode unless overridden by input from the HSIZIN file.
Operator response: Set the Usage Monitor into collection mode to start data collection.
Module: HSIZMON
HSIZ023I
csid PROGRAM NAME MASK mask NOT ADDED - ALREADY IN TABLE
Explanation: A command to add a program name mask to a program mask table was issued, but the mask was
already present in the table. In the message text:
csid
mask
Module: HSIZMON
HSIZ024I
csid PROGRAM NAME MASK mask ADDED TO TABLE
351
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Explanation: A command to add a program name mask to a program mask table was issued, and the mask was
added successfully. In the message text:
csid
mask
Module: HSIZMON
HSIZ025I
csid PROGRAM NAME MASK mask NOT DELETED - NOT FOUND IN TABLE
Explanation: A command to delete a program name mask from a program mask table was issued, but the mask was
not present in the table. In the message text:
csid
mask
Module: HSIZMON
HSIZ026I
csid PROGRAM NAME MASK mask DELETED FROM TABLE
Explanation: A command to delete a program name mask from a program mask table was issued, and the mask was
deleted successfully. In the message text:
csid
352
Chapter 12. IBM Z Software Asset Management messages
mask
Module: HSIZMON
HSIZ027I
ECSA APPEARS TO BE EXHAUSTED - INCREASE SIZE FOR NEXT IPL
Explanation: The Usage Monitor has attempted to acquire storage from ECSA, but was given CSA storage by the
system. This indicates that there is insufficient ECSA for the current workloads, and that it should be increased for the
next IPL.
System Programmer response: Add approximately 50 to 100 MB to the ECSA size in the system IPL parameters.
Check the capacity of the COMMON page data set.
Module: HSIZMON
HSIZ028I
ECSA AND CSA APPEAR TO BE EXHAUSTED - INCREASE ECSA NEXT IPL
Explanation: The Usage Monitor has attempted to acquire some common storage, but the requested amount was
unavailable. This indicates that there is insufficient ECSA for the current workloads, and that it should be increased
for the next IPL.
System Programmer response: Add approximately 50 to 100 MB to the ECSA size in the system IPL parameters.
Close some applications using CSA. If necessary, commence orderly shutdown and reIPL before the system crashes.
Check the capacity of the COMMON page data set.
Module: HSIZMON
353
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIZ029I
csid THERE IS CURRENTLY NO EXCLUDE TABLE
Explanation: A request was made to change or display the program name mask exclude table, but there is currently
no exclude table. In the message text:
csid
Operator response: None required. The EXC command may be used to create a table.
Module: HSIZMON
HSIZ030I
csid USAGE MONITOR - NO DATA COLLECTED SO SKIPPING WRITE
Explanation: Before a writer task was initiated to output the contents of a Usage Monitor repository, it was found that
the repository contained no data, and that therefore data output processing could be omitted. In the message text:
csid
Module: HSIZMON
HSIZ032I
csid cmd COMMAND UNKNOWN
Explanation: A command was issued but was not recognized. In the message text:
csid
cmd
354
Chapter 12. IBM Z Software Asset Management messages
Module: HSIZMON
HSIZ033I
csid cmd COMMAND PROCESSED
Explanation: A command was issued and has been processed successfully. In the message text:
csid
cmd
If the system identifier is shown as UMON-WTR then the command was issued internally by the writer task. Look
under the description of the command for more information.
System Action:
Module: HSIZMON
HSIZ034I
csid cmd COMMAND HAS INVALID OPERAND
Explanation: A command was issued but an invalid operand was encountered. In the message text:
csid
cmd
355
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ035I
csid cmd COMMAND FAILED
Explanation: A command was issued but insufficient resources were available to execute it successfully. In the
message text:
csid
cmd
Module: HSIZMON
HSIZ036I
csid cmd COMMAND CAUSED NO CHANGE
Explanation: A command was issued but the state to be set by the command was found to already exist. In the
message text:
csid
cmd
Module: HSIZMON
356
Chapter 12. IBM Z Software Asset Management messages
HSIZ037I
csid cmd COMMAND REJECTED
Explanation: A recognized command was issued at a time when the Usage Monitor is unable to process the
command. In the message text:
csid
cmd
Operator response: Try again after the Usage Monitor has freed the resources.
Module: HSIZMON
HSIZ038I
csid CURRENT USAGE MONITOR PROGRAM EXCLUDE LIST:
Explanation: A D-X command was issued to display the program name exclude table contents. The active entries are
shown after this message. In the message text:
csid
Module: HSIZMON
HSIZ039I
csid REPOSITORY SWITCH HAS BEEN QUEUED
Explanation: A repository switch was triggered by a SWI or STOP command, or by the current repository becoming
full, but a writer task is already active. This message is followed by message HSIZ040I on page 358, which shows
the creation timestamp of the active writer task. In the message text:
357
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
csid
System Action: Data collection is suspended. Wait for the current writer task to complete whereupon a new writer
task is created, and a new repository is created, and data collection is resumed.
Operator response: Check that there are sufficient resources to dispatch the Usage Monitor address space. Check
that there are no serialization problems with system components such as device allocation which could be inhibiting
writer task processing.
Module: HSIZMON
HSIZ040I
csid WAITING FOR WRITER TASK ATTACHED ts
Explanation: A repository switch was triggered by a SWI or STOP command, or by the current repository becoming
full, but a writer task is already active. This message follows message HSIZ039I on page 357 and shows the
creation timestamp of the active writer task. In the message text:
csid
ts
System Action: Data collection is suspended. Wait for the current writer task to complete whereupon a new writer
task is created, and a new repository is created, and data collection is resumed.
Operator response: Check that there are sufficient resources to dispatch the Usage Monitor address space. Check
that there are no serialization problems with system components such as device allocation which could be inhibiting
writer task processing.
Module: HSIZMON
HSIZ041I
csid CURRENT USAGE MONITOR OUTPUT DYNALLOC PARMS:
Explanation: A D-A command was issued to display the current output dynamic allocation parameters, which are
shown after this message. In the message text:
358
Chapter 12. IBM Z Software Asset Management messages
csid
Module: HSIZMON
HSIZ042I
CURRENT USAGE MONITOR OUTPUT SYSTEM ID IS "csysplex.csid"
Explanation: A D-I command was issued to display the current system identifier which is to be contained in output
header records. In the message text:
csysplex
csid
Module: HSIZMON
HSIZ043I
csid DATA DISCARDED DUE TO QUEUE AREA STORAGE LIMIT
Explanation: The Usage Monitor has detected for the first time in the life of the current collection repository that
program usage event data has been discarded due to the queue area storage usage limit being reached. This limit
was set with the QSZ command. In the message text:
csid
Operator response: Adjust the Usage Monitor QSZ setting as appropriate for the particular system. Recycle the Usage
Monitor address space to implement the new setting. Ensure that the Usage Monitor address space is running at a
359
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
higher priority than all CPU-bound workloads. Generally, monitors need to run at a higher priority than the workloads
being monitored.
Module: HSIZMON
HSIZ044I
csid SWITCH-AND-WRITE TIME-OF-DAY IS SET TO hh:mm
Explanation: A D-T command was issued to display the switch-and-write time-of-day setting for this system. In the
message text:
csid
hh
mm
Module: HSIZMON
HSIZ045I
csid CREATED area token-addr
Explanation: A memory object required to hold data was created. In the message text:
csid
area
token
addr
360
Chapter 12. IBM Z Software Asset Management messages
Module: HSIZMON
HSIZ046I
csid DELETED area token-addr
Explanation: A memory object which was no longer needed was deleted In the message text:
csid
area
token
addr
Module: HSIZMON
HSIZ047I
csid USAGE MONITOR - ATTACHING WRITER SEQ-NO-seqnbr
Explanation: A writer task is being attached to write out repository contents. The writer task sequence number is also
reported. The first writer task to run after the Usage Monitor starts has a sequence number of 1. In the message text:
csid
seqnbr
361
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ048I
csid USAGE MONITOR - IDENTIFY FAILED HEX RC=rc
Explanation: The Usage Monitor executed an IDENTIFY macro which failed. In the message text:
csid
rc
System Programmer response: Investigate why an IDENTIFY macro would fail with that return code.
Module: HSIZMON
HSIZ049I
csid DATA SET NAME MASK NOT DEACTIVATED, NOT FOUND IN LIST
Explanation: A command to delete a data set name mask from a data set name mask list was issued, but the mask
was not present in the list. In the message text:
csid
Module: HSIZMON
HSIZ050I
csid DATA SET NAME MASK mask LIST list
362
Chapter 12. IBM Z Software Asset Management messages
Explanation: A D-D command was issued to display the data set name mask include and exclude lists. These header
and trailer lines mark the start and end of the lists. In the message text:
csid
mask
INCLUDE or EXCLUDE.
list
START or END.
Module: HSIZMON
HSIZ053I
csid MONITORING UNIX® PROGRAMS? ans
Explanation: Either a USS command was issued to change the UNIX® program monitoring status or a D-S command
was issued. When the answer is YES, the usage of programs fetched from UNIX® files is monitored. When the answer
is NO, only the usage of programs from PDS and PDSE libraries is monitored. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ054I
csid MONITORING LINK PACK AREA PROGRAMS? ans
Explanation: Either an LPA command was issued to change the LPA program monitoring status or a D-S command
was issued. When the answer is YES, the usage of programs residing in the Link Pack Area is monitored. When
363
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
answer is NO, only the usage of programs loaded into address space regions (and sometimes into CSA) is monitored.
In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ056I
csid PREFER VOLUME SYMBOL OVER SERIAL? ans
Explanation: Either a SYM command was issued to change the volume symbol status or a D-S command was issued.
• When the answer is YES, a matching system static symbol that evaluates to the volume serial is collected
instead of the volume serial, if such a symbol exists; otherwise the actual volume serial is collected. A YES
setting might improve data matching when system software platform volume switches take place.
• When the answer is NO, the captured volume serial number is always output.
csid
ans
YES or NO.
Module: HSIZMON
HSIZ058I
csid FILE HSIZIN IS NOT ALLOCATED - CANNOT PERFORM REFRESH
364
Chapter 12. IBM Z Software Asset Management messages
Explanation: A REF command was issued to refresh settings from commands in the HSIZIN file, but the HSIZIN file
had been freed, and was no longer allocated to the Usage Monitor. In the message text:
csid
Operator response: Ensure FREE=CLOSE is not specified in the HSIZIN JCL DD statement. Recycle the Usage Monitor
to refresh the settings if necessary.
Module: HSIZMON
HSIZ059I
csid REFRESH PERFORMED WITH NO ERRORS
Explanation: A REF command was issued to refresh settings from commands in the HSIZIN file. All commands in the
HSIZIN file were completed successfully. In the message text:
csid
Module: HSIZMON
HSIZ060I
csid REFRESH PERFORMED BUT ERROR(S) FOUND
Explanation: A REF command was issued to refresh settings from commands in the HSIZIN file. At least one
command in the HSIZIN file resulted in an error. In the message text:
csid
Operator response: Examine the output in the HSIZMSG file to determine the problem(s).
365
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ063I
csid COLLECTING "UNKNOWN" EVENTS? ans
Explanation: Either a UNK command was issued or a D-S command was issued. When the answer is YES, this
message indicates that the Usage Monitor logs events with incomplete data which would not normally be collected.
Data base content is not affected. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ064I
csid WILL WRITER TASK COMPRESS THE DATA? ans
Explanation: Either a ZIP command was issued to change the output compression setting or a D-S command was
issued. When the answer is YES, the writer task writes compressed data to reduce I/O volumes. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
366
Chapter 12. IBM Z Software Asset Management messages
HSIZ065I
csid WILL WRITER TASK CORRECT LINKLIST DSN? ans
Explanation: Either an LLC command was issued or a D-S command was issued. When the answer is YES, the writer
task will perform a BLDL for programs known to have been fetched from the link list, and each output record for such
programs will be altered to reflect the link list data set name that the writer task found the program in. In the message
text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ066I
csid nbr IDLE ELEMENT(S) "LOST" DUE TO ZERO POINTER
Explanation: The Usage Monitor was terminating normally when a storage accounting discrepancy was discovered.
The storage for the idle element chain was being freed when it was found to be terminated by a zero pointer before
the expected number of elements had been processed. The most probable cause is a storage overlay. This may or
may not represent a Usage Monitor logic error. The size of common storage which may be unusable until the next IPL
can be calculated by multiplying the element count by the size of an element. In the message text:
csid
nbr
Operator response: Determine if the size of the potential loss of common storage is likely to impact upon system
stability, and take the appropriate action. Ensure that all appropriate maintenance has been applied.
Module: HSIZMON
367
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIZ068I
csid COLLECTING JOB ACCOUNTS NOW? ans
Explanation: A D-S command was issued. When the answer is YES, job account data is currently being collected as
program usage events are recorded. When the answer is NO, job account data is not being collected currently. In the
message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ069I
csid COLLECTING JOB ACCOUNTS LATER? ans
Explanation: Either a JAC command was issued or a D-S command was issued. When the answer is YES, job account
data will be collected after the next Usage Monitor collection repository switch. If the answer is NO, job account data
will not be collected from that time onwards. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ070I
csid COLLECTING REGISTERED PRODUCT DATA NOW? ans
368
Chapter 12. IBM Z Software Asset Management messages
Explanation: A D-S command was issued. When the answer is YES, registered software product data from SMF is
currently being collected by the Usage Monitor. When the answer is NO, then this SMF data is not being currently
collected. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ071I
csid COLLECTING REGISTERED PRODUCT DATA LATER? ans
Explanation: Either a PRS command was issued or a D-S command was issued. When the answer is YES, registered
software product data from SMF will be collected after the next Usage Monitor collection repository switch. When the
answer is NO, this SMF data will not be collected after the next switch. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ072I
csid COLLECTING DYNAMIC CAPACITY DATA NOW? ans
Explanation: A D-S command was issued. When the answer is YES, hardware capacity information is currently
being collected by the Usage Monitor. When the answer is NO, hardware capacity information is not being currently
collected. In the message text:
369
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
csid
ans
YES or NO.
Module: HSIZMON
HSIZ073I
csid COLLECTING DYNAMIC CAPACITY DATA LATER? ans
Explanation: Either a CAP command was issued or a D-S command was issued. When the answer is YES, the Usage
Monitor will collect hardware capacity information after the next Usage Monitor collection repository switch. When
the answer is NO, the hardware capacity information will not be collected after the next switch. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ074I
csid OUTPUT NAMES OF COLLECTED USERS? ans
Explanation: Either a UNM command was issued or a D-S command was issued. When the answer is YES, collected
user names will be included in the data output by the Usage Monitor writer task. When the answer is NO, user
names will not be written to the output data set. Even if the answer is YES, no user names will be output if no user
information was collected. In the message text:
csid
370
Chapter 12. IBM Z Software Asset Management messages
ans
YES or NO.
Module: HSIZMON
HSIZ075I
csid COLLECTING USER INFORMATION NOW? ans
Explanation: A D-S command was issued. When the answer is YES, the identifier and name of each program user
is currently being collected by the Usage Monitor. When the answer is NO, these user details are not being currently
collected. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ076I
csid COLLECTING USER INFORMATION LATER? ans
Explanation: Either a UID command was issued or a D-S command was issued. When the answer is YES, the identifier
and name of each program user will be collected after the next Usage Monitor collection repository switch. When the
answer is NO, these userid details will not be collected after the next switch. In the message text:
csid
ans
YES or NO.
371
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZMON
HSIZ077I
csid COLLECTING JOB NAMES NOW? ans
Explanation: A D-S command was issued. When the answer is YES, the names of jobs using programs are currently
being collected by the Usage Monitor. When the answer is NO, only generic address space type data such as JOB,
STC, and TSU is currently being collected instead of individual job names. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ078I
csid COLLECTING JOB NAMES LATER? ans
Explanation: Either a JNM command was issued or a D-S command was issued. When the answer is YES, the names
of jobs using programs will be collected after the next Usage Monitor collection repository switch. When the answer
is NO, only generic address space type data such as JOB, STC, and TSU will be collected after the next switch instead
of individual job names. In the message text:
csid
ans
YES or NO.
372
Chapter 12. IBM Z Software Asset Management messages
Module: HSIZMON
HSIZ079I
csid ALLOWING CICS® EVENT COLLECTION? ans
Explanation: A D-S command was issued. When the answer is YES, this message indicates that CICS® event
collection from suitably customized CICS® regions is enabled. When the answer is NO, CICS® generated program
usage information will not be collected. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ080I
csid dsn - mct MATCHES
Explanation: Displays the dataset name mask for a D-D command. In the message text:
csid
dsn
mct
match count.
Module: HSIZMON
373
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIZ081I
csid MONITORING PREVIOUSLY RUNNING PROGRAMS? ans
Explanation: A D-S command was issued. When the answer is YES, this message indicates usage data for programs
resident in the regions of jobs which are older than the current Usage Monitor repository and which have SMF interval
recording active will be collected. When the answer is NO, there will be no usage data collected for programs that
were running before the current repository was created and do not terminate before the repository collection period
ends. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ082I
csid RETAINING ALL BATCH JOB IDENTIFIERS? ans
Explanation: Either a JID or a D-S command was issued. When the answer is YES, the message indicates that data for
batch jobs with different JES job identifiers will not be aggregated together but will be reported as usage by separate
jobs. When the answer is NO, data for usage of programs will be aggregated only by userid and job name, and only
the most recent job identifier will be retained. Aggregation corresponding to the NO answer is always used for started
tasks and TSO sessions. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
374
Chapter 12. IBM Z Software Asset Management messages
HSIZ083I
csid ADJUSTING FOR HYPERVISOR TIME OFFSET? ans
Explanation: Either a HOF or a D-S command was issued. When the answer is YES, the message indicates that
timestamps in collected data will be adjusted by subtracting the hypervisor time offset from the z/OS® date and time.
When the answer is NO, the unaltered local z/OS® date and time will be used in the collected data. In the message
text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ084I
csid REPORTING TCPIP HOST DETAILS? ans
Explanation: Either an IPH or a D-S command was issued. When the answer is YES the message indicates that the
TCPIP host details (name and address) will be reported in the usage data file. When the answer is NO then the Usage
Monitor will not report any TCPIP host information. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
375
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
HSIZ085I
csid cmd NO LONGER SUPPORTED
Explanation: A command was issued that is no longer a functional Usage Monitor command. In the message text:
csid
cmd
Module: HSIZMON
HSIZ086I
csid COLLECTING APF LIBRARY DETAILS? ans
Explanation: Either an APF or a D-S command was issued. When the answer is YES the message indicates that
the volumes and data set names of APF authorized libraries will be collected and written in the output data. This
information is not collected when the answer is NO. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ087I
csid ACTIVE LONG-RUNNING PROGRAM NAME LIST
376
Chapter 12. IBM Z Software Asset Management messages
Explanation: A D-L command was issued to display the long-running program name list. The active entries are shown
after this message. In the message text:
csid
Module: HSIZMON
HSIZ088I
csid COLLECTING USAGE FROM TEMPORARY DATA SETS? ans
Explanation: Either a TMP or a D-S command was issued. When the answer is YES the message indicates that usage
from programs fetched from temporary data sets will be collected and written in the output data. Usage data about
these programs will be discarded when the answer is NO. In the message text:
csid
ans
YES or NO.
Module: HSIZMON
HSIZ089I
csid ALLOWING IMS USAGE COLLECTION? ans
Explanation: A D-S command was issued. When the answer is YES this message indicates that usage of IMS-
managed programs will be collected. Usage of IMS-managed programs will not be collected when the answer is
NO. In the message text:
csid
377
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
ans
YES or NO.
Module: HSIZMON
HSIZ090I
csid ALL type ENTRIES HAVE BEEN DEACTIVATED
Explanation: A DEL, IDD or XDD command was issued with *ALL* being the only specified mask. As a result, all of the
relevant type of filtering mask entries were deactivated. The filtering made inactive by the DEL, IDD or XDD command
is of the type set by EXC, IDS or XDS commands, respectively. In the message text:
csid
type
Module: HSIZMON
HSIZ091I
csid DEFAULT type EXCLUSION ENTRIES ARE NOW ACTIVE
Explanation: An EXC or XDS command was issued with *DFLT* being the only specified mask. As a result, all of the
relevant type of default exclusion mask entries are now active. When the reported type is PROGRAM, program name
filtering has been reset to the shipped default. When the reported type is DATA SET, all the default data set exclusion
entries have been made active without altering user specified data set name filtering. In the message text:
csid
type
378
Chapter 12. IBM Z Software Asset Management messages
Module: HSIZMON
HSIZ201I
DYNALLOC FAILURE RC=rc ERROR=s99error INFO=s99info DSN=dsn
Explanation: The writer task could not dynamically allocate a new output data set. In the message text:
rc
s99error
s99info
dsn
System Action: Processing of the repository is terminated, and the data lost.
Operator response: Correct the cause of the allocation failure. If necessary, use the DSN, PRI, SEC, and UNT
commands to customize the allocation request for your installation. Note: The meanings of most DARC values are
usually available in the appendix of the ISPF Tutorial.
Module: HSIZ0203
HSIZ202I
USAGE MONITOR - COMPRESSION SUBROUTINE ERROR
Explanation: While processing repository data the compression subroutine encountered an error. The error message
from the compression subroutine immediately follows this message.
System Action: Processing of the repository is terminated, and the data lost.
Operator response: Correct the error described in the message from the compression subroutine. If you cannot
resolve this issue, gather appropriate diagnostic materials and contact IBM support.
379
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZ0203
HSIZ206I
errmsg
Explanation: The HSISHRNK compression routine issued an error message which is displayed. In the message text:
errmsg
Module: HSIZ0203
HSIZ301I
DESERV FUNC=EXIT RC=rc REASON=rs
Explanation: DESERV FUNC=EXIT issued a non-zero return code. In the message text:
rc
rs
System Programmer response: Research the DESERV feedback to determine why the exit could not be installed.
Module: HSIZ0203
HSIZ302I
CSVDYNEX ADD (excd) RC=rc REASON=rs
Explanation: CSVDYNEX ADD issued a non-zero return code. An exit could not be dynamically defined for the named
exit point. In the message text:
380
Chapter 12. IBM Z Software Asset Management messages
excd
rc
rs
System Programmer response: Research the CSVDYNEX feedback to determine why the exit could not be installed.
Ensure that IEFU84 is an active SMF exit for the system or subsystem. If you cannot resolve this issue, gather
appropriate diagnostic materials and contact IBM support.
Module: HSIZ0203
HSIZ303I
ATTRIBUTE MISMATCH - mod NOT INSTALLED
Explanation: The examined SVC table entry did not have the expected attributes. In the message text:
mod
module name.
System Programmer response: Gather appropriate diagnostic materials and contact IBM support.
Module: HSIZ0203
HSIZ306I
BAD statnm ENTRY PGM=pgm JOB=jbn USER=user ID=id DATE=date REJECTED
Explanation: An invalid work element has been detected and some of its contents are displayed. In the message text:
statnm
status name.
381
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
pgm
program name.
jbn
job name.
user
user name.
id
id name.
date
date.
System Action: Attempted to dump some data to HSIZSNAP if the file is allocated, and will then try to free the work
element without processing its contents.
System Programmer response: The problem is indicative of a storage overlay. Gather appropriate diagnostic
materials and contact IBM support.
Module: HSIZ0203
HSIZ307I
csid SCAN OF volume VTOC ABENDED -S cde
Explanation: A scan of the named volume abended with the reported abend code. The scan was performed to find the
data set name of a program library that is in use. In the message text:
csid
volume
cde
System Programmer response: Check the named volume for error conditions. If necessary, gather appropriate
diagnostic materials and contact IBM support.
382
Chapter 12. IBM Z Software Asset Management messages
Module: HSIZMON
HSIZ310I
MODULE mod INSTALLED AT ADDRESS loadpt SIZE size
Explanation: The Usage Monitor has dynamically loaded a module into common storage and will now register it in
DLPA. In the message text:
mod
module name.
loadpt
size
module size.
Module: HSIZ0203
HSIZ311I
CSVDYLPA RC=rc RS=rs FOR mod
Explanation: The Usage Monitor attempted to register a newly installed module in DLPA, but CSVDYLPA issued a non-
zero return code. In the message text:
rc
rs
mod
System Programmer response: Investigate why the named module could not be registered in the current DLPA
configuration.
383
IBM Z Software Asset Management Version 8.2 Administration Guide and Reference
Module: HSIZ0203
HSIZ999U
HSIMSG/HSIZMSG FAILURE - MSGID=msgid RC=rc RS=rs
Explanation: HSIMSG was called to produce a message text, but the call failed. In the message text:
msgid
rc
rs
System Programmer response: Ensure Joblib/Steplib contains the library where the HSIMSG message module
resides. If you cannot resolve this issue, gather appropriate diagnostic materials and contact IBM support.
Module: HSIZMON
384
Appendix.Description of output message content
Messages generated during batch processing are explained in detail here.
Inquisitor
For each request based on scanning one or more VTOCs, the z/OS Inquisitor produces a VTOC Statistics Report
unless the NOVSR keyword appears in the program parameter string. The format of this report will change marginally
after the PTF for APAR OA61701 is applied.
Note: The ERROR-CD column may be relabeled as (MAP-TO) if logical volume mapping is used.
VOLUME MAP-TO DVNO STOGROUP TCBADR-ID START-&-STOP-TIME WT-DELAY ERROR-CD VOL-CYL VTOCTRK
IOERR DSCB VOL-DS SCAN-DS SCAN-PGMS
Item Description
WT-DELAY Main task idle time waiting for this volume scam to complete.
Item Description
ZCAT
When the VFY=Y setting is active, the ZCAT program reads the main output data set (which is allocated to the
ZCATOUT DD) to ensure that it can be processed. This output verification phase was added to assist with tracking file
corruptions as files are transferred from systems where the data is collected to systems where the data is processed.
The ZCATOUT Verification Report produces statistics about the contents of the ZCATOUT file and issues a message
regarding the success or failure of the verification process.
where count is the record count and type is the first two characters of the record. After the subtotal of each record
type is reported, the total number of records in the file is displayed.
If an error such as a record count mismatch is discovered, then other relevant messages may be issued, followed by
this message:
Table 109. Current types of Usage Monitor records (in sequence written by Usage Monitor)
UM Header record.
*C Capacity record.
IQIMPORT
When each library is matched, several statistical messages are generated that tell you what has transpired during the
matching process. See the following example:
modules(processed:8,ignored:0),matched(product:0,UNKNOWN:0,none:8),loaded(identified:
0,unidentified:8)
Item Description
UNKNOWN - If there are modules known in the GKB that are not matched to a product then
this is the number of modules. If 0, then none of the modules are defined in the GKB.
none - Number of modules in the library known in the GKB. If 0, then all modules are
known in the GKB.
Loaded Identified - This figure signifies how many modules are associated to a product.
unidentified – This indicates how many modules are not identified in the library.
As each library is matched the log indicates each scorecard for a given GKB or LKB entry and the values associated
with each match. See the following example:
Initial scores
==============
G , ProdVerID = 2123G, Num LMODs Matched = 286/292, Version Ident = 0%, Product Ident
= 97%, score = 79%
Item Description
ProdVerID Each entry in the GKB has a unique id for each version of a product. This data is used by
support to find out what happened during the matching process and why some entries
were not taken.
Num LMODs Matched Indicates how many load modules are matched to the data for the given PRODVER entry.
In the above example, 286 modules out of 292 in the GKB are deemed to have been identi
fied in the library out of 292 in total in the GKB.
Version Ident Indicates the percentage of a match to a specific version. The higher the percentage the
better the match.
Product Ident In the above example, the figure indicates the product is identified but the Version is not.
score Overall score for the scorecard entry. This score is used by the match engine after all
scorecards are matched to determine what product and version the modules in the library
belong to.
======================================================
IQ Import statistics for SID:OMU3
======================================================
New Libraries 42
Library records - imported 42
Library records - ignored 0
Module records - imported 5487
Module records - ignored 0
Modules matched (product) 5412
Modules matched (UNKNOWN) - insufficient score 8
Modules matched (none) - not found in KB 67
Modules migrated(identified) 5420
Modules migrated(unidentified) 67
CSECTs migrated 319
Channel Path records 10
Control Unit records
Item Description
Library records imported – The number of libraries imported into the Repository.
ignored – The number of libraries not imported into the Repository. These could be distrib
ution libraries that are filtered out by the import process.
Module records imported – The number of modules imported into the Repository.
ignored – The number of modules not imported into the Repository. This could be be
cause they are in a library that is filtered out.
UNKNOWN – insufficient score – The number of modules known, but not enough to regis
ter as a known version.
Modules migrated Identified – The number of modules identified to a product that are migrated to the Repos
itory.
unidentified – The number of module unidentified that are migrated to the Repository.
CSECTs migrated Number of CSECTs migrated to the Repository. For CSECTs to be migrated, the IQ data
must be scanned with parameter SCANPGM and keyword FULLIDR otherwise no CSECT
data is collected.
Control unit records Number of Control units found. These records are collected using the SCANDE command
in the Inquisitor.
USAGE IMPORT
When usage data is imported into a Repository, all the data imported is displayed. Multiple usage data can be
imported at the same time from the same system or multiple systems. As each data is imported, a key is generated
for each period.
The above example indicates that the data item is the 12th item being imported from the data file. This data is
probably coming from a file that has been processed by ZCAT. The elapsed time shows you how long it takes to
process the file.
At the end of Usage Import processing a summary report is created. See the below example.
Number of header Figure indicates number of LPARs processed during Usage Import.
records read
Number of user Figure indicates total number of individual user records collected. For example, TSO ID and
records read STC ID.
Number of detail Total number of usage records processed and imported into Repository.
records read
Number of hardware Figure indicates number of LPARS capacity records read. Usually one per LPAR.
capacity records read
Number of product reg Number of records read from Usage file containing registered products.
istration records read
Number of registered Number of records read from Usage file indicating which products have been used.
product usage records
read
Number of machine re Resource records read from the Usage Data showing what other resources are available
source records read on the machine.
Notices
October 2022
This information was developed for products and services offered in the U.S.A.
HCL® may not offer the products, services, or features discussed in this document in other countries. Consult your
local HCL® representative for information on the products and services currently available in your area. Any reference
to an HCL® product, program, or service is not intended to state or imply that only that HCL® product, program,
or service may be used. Any functionally equivalent product, program, or service that does not infringe any HCL®
intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-HCL product, program, or service.
HCL® may have patents or pending patent applications covering subject matter described in this documentation. The
furnishing of this documentation does not give you any license to these patents. You can send license inquiries, in
writing, to:
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM® Intellectual Property
Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other country where such provisions are
inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION
"AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore,
this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to
the information herein; these changes will be incorporated in new editions of the publication. HCL® may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-HCL Web sites are provided for convenience only and do not in any manner
serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this
IBM® product and use of those Web sites is at your own risk.
HCL® may use or distribute any of the information you supply in any way it believes appropriate without incurring any
obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of
information between independently created programs and other programs (including this one) and (ii) the mutual use
of the information which has been exchanged, should contact:
IBM® Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
U.S.A.
Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of
a fee.
The licensed program described in this document and all licensed material available for it are provided by HCL®
under terms of the HCL® Customer Agreement, HCL® International Program License Agreement or any equivalent
agreement between us.
Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained
in other operating environments may vary significantly. Some measurements may have been made on development-
level systems and there is no guarantee that these measurements will be the same on generally available systems.
Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of
this document should verify the applicable data for their specific environment.
Information concerning non-HCL products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. HCL® has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-HCL products. Questions on the
capabilities of non-HCL products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them as
completely as possible, the examples include the names of individuals, companies, brands, and products. All of these
names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely
coincidental.
Copyright License
This information contains sample application programs in source language, which illustrate programming techniques
on various operating platforms. You may copy, modify, and distribute these sample programs in any form without
payment to HCL, for the purposes of developing, using, marketing or distributing application programs conforming to
the application programming interface for the operating platform for which the sample programs are written. These
examples have not been thoroughly tested under all conditions. HCL, therefore, cannot guarantee or imply reliability,
serviceability, or function of these programs. The sample programs are provided "AS IS", without warranty of any kind.
HCL shall not be liable for any damages arising out of your use of the sample programs.
Index
A G N
aggregating usage and discovery data 115 generation data sets, scanning 71 navigation, Analyzer online mode 137
TPARAM parameters 116 Non-DB application
H
Aggregator Inquisitor requests 68
aggregating usage and discovery HSIC notices 391
data 115 , Operation messages
227 O
Analyzer
overview 3 HSII online mode navigation, Analyzer 137
Analyzer online mode navigation 137 utility messages Operation messages,
APF 17 265 HSIC
Automation Server HSISIVPD 227
job in the JCLLIB that verifies database
control data set 118 P
excluding data sets 125 changes since the product was
released 163, 164, 165 performance and tuning 206, 208
required files 119
HSIXOMIT PRI - Set the data set space primary
running 118
76 allocation 101
starting 125
HSIXROOT process flow 3
stopping 125
76 program names, filtering 81
C PRS - Set registered software activity data
I collection status 102
CAP - Set hardware capacity collection
IDD - Deleting data set name inclusion
status 88 R
CICS entries 95
IDS - Adding data set name inclusion RACF customization 17
monitoring usage 109
entries 95 REF - Refresh Usage Monitor settings 102
commands
Import Usage repeatable items, syntax diagrams 5
reading syntax diagrams 5
TPARAM parameters 115 Repository
commands, Usage Monitor 87
initial space allocation description 13
customizing a CICS region to provide usage
performance and tuning 206 overview 3
data 111
Inquisitor Repository table layouts 172
D overview 2 REXX utility messages 265
D-A - Display output allocation scanning generation data sets 71 S
parameters 89 Inquisitor data
SEC - Set the data set space secondary
D-C - Display the counters and statistics 89 description 12
allocation 103
D-D - Display the data set name inclusion Inquisitor for z/OS
security, z/OS UNIX 17
and exclusion lists 90 examples 65
SID - Set the Usage Monitor system
D-I - Display the system identifier 90 TPARAM parameters 113
identifier 103
D-S - Display the status settings 90 Inquisitor Import
syntax diagrams, how to read 5
D-T - Display the automatic switch-and- overview 3
system platform
write time setting 91 Inquisitor Import, running 54, 112
Inquisitor requests 68
D-X - Display the active exclude list 91 Inquisitor program
data sets, scanning generation 71 SYSIN commands 58 T
database changes since the product was Inquisitor requests, designing 68 table layouts, Repository 172
released integration with DFHSM 70 trademarks 391
verifying 163, 164, 165
J troubleshooting
databases identifying problems 214
Inquisitor requests 68 JAC - Set job account collection status 97
systematic problem solving 214
Db2 authorization 17 JNM - Control the collection of job
TSO
DCB - Set output DCB attributes 91 names 97
Inquisitor requests 68
DEL - Deleting program mask entries 92 K U
deployment
keywords, syntax diagrams 5
Inquisitor data 12 UNIX security, z/OS 17
Repository 13 L usage
Usage event 13 LE compile unit information 69 monitoring in CICS regions 109
DFHSM Integration 70 libraries, scanning migrated 69 usage and discovery data
DSN LPA - Set link pack area program aggregating 115
Usage Monitor command 93 monitoring status 99 usage data
DUR customizing a CICS region 111
Usage Monitor command 93
M usage event
messages description 13
E HSII Usage Import
examples, Inquisitor for z/OS 65 utility overview 3
EXC - Adding program mask exclusion 265 Usage Monitor
entries 94 messages, overview 3
exclusion masks 81 HSIC running 85
F Operation Usage Monitor command
227 CAP - Set hardware capacity collection
filtering program names 81
monitoring usage in CICS regions 109 status 88
fragments, syntax diagrams 5
393
CIC – Allow or disable program usage WRT- Set the automatic switch-and-write
data from CICS regions 89 time of day 108
D-A - Display output allocation XDD - Deleting data set name exclusion
parameters 89 entries 108
D-C - Display the counters and XDS - Adding data set name exclusion
statistics 89 entries 109
D-D - Display the data set name ZIP - Set the compressed output data
inclusion and exclusion lists 90 switch 109
D-I - Display the system identifier 90 Usage Monitor commands 87
D-S - Display the status settings 90
V
D-T - Display the automatic switch-and-
write time setting 91 variables, syntax diagrams 5
D-X - Display the active exclude list 91 verifying database changes since the
DCB - Set output DCB attributes 91 product was released 163, 164, 165
DEL - Deleting program mask entries 92 W
DSN - Setting the data set name
work pool
prefix 93
Inquisitor requests 68
DUR - Set execution duration 93
EXC - Adding program mask exclusion X
entries 94 XVOLUME 61
IDD - Deleting data set name inclusion
entries 95
Z
IDS - Adding data set name inclusion z/OS UNIX security 17
entries 95
JAC - Set job account collection
status 97
JID - Control the preservation of batch
job identifiers 97
JIPH – Control collection of TCPIP Host
details 96
JNM - Control the collection of job
names 97
LDI – Set LOAD exclusion inactive 98
LDX – Add or activate a LOAD
exclusion 98
LPA - Set link pack area program
monitoring status 99
LPLN - Set the sysplex name 100
PRE - Collect usage for long running
programs 101
PRI - Set the data set space primary
allocation 101
PRS - Set registered software activity
data collection status 102
QSZ – Specify collection element queue
area size 102
REF - Refresh Usage Monitor
settings 102
SEC - Set the data set space secondary
allocation 103
SID - Set the Usage Monitor system
identifier 103
SIZ - Set the data space repository
size 104
SJS - Controlling spawned job suffix
preservation 104
SWI - Switch to a new data space
repository 105
UID - Control the collection of user
details 105
UNK - Set the unknown event collection
switch 106
UNM - Set user name collection
status 106
UNT - Set the data set allocation
unit 107
USS - Set UNIX program monitoring
status 107
VOL - Set the data set allocation
volume 107
394