The sample statistics program, DFH0STAT

The sample statistics program, DFH0STAT, produces a report showing system information about CICS® resources and an overview of the MVS™ storage in use.

The program demonstrates how you can use EXEC CICS INQUIRE, EXEC CICS COLLECT STATISTICS, and EXEC CICS EXTRACT STATISTICS commands to produce an analysis of your CICS regions. You can use the sample program as supplied, or modify it to suit your needs.

DFH0STAT does not report on terminals, DBCTL resources, FEPI resources, dumps, the table manager, and the user domain. DFH0STAT also does not report on private resources for applications that are deployed on platforms. If you require statistical information about any of these areas, you can obtain it using DFHSTUP, the statistics utility program.

DFH0STAT does not always report to the maximum capacity of certain large statistics fields. If your CICS system is unusually large or very busy, and you have a long statistics interval, check that the statistics values have not overflowed. To avoid this problem, reduce the length of your statistics interval, or use DFHSTUP.

Security definitions required

The STAT transaction might require command and resource security definitions for its use. If you need these definitions, it is recommended that you have a separate group for users with access to STAT in order to limit who has access.

Command security
If you have enabled command security for STAT, either by setting the system initialization parameter CMDSEC=ALWAYS, or by changing the transaction definition of STAT to CMDSEC(YES), you must give READ authority for all SPI commands to users of STAT. For details of how to use command security, see CICS command security.
Resource security
If you enable resource security for STAT, either by setting the system initialization parameter RESSEC=ALWAYS, or by changing the transaction definition of STAT to RESSEC(YES), you must give READ authority for all resources that are the subject of resource security.

In addition, UPDATE authority is required for the TDQ CSSL.

For details of how to use resource security, see Security of resource definitions and Resource and command check cross-reference.

Learn more