Change CICS SIT Entry (CHGCICSSIT)
Where allowed to run:
|
Parameters Examples Error messages |
Use the Change CICS System Initialization Table (CHGCICSSIT) command to change the entry in the SIT.
The System Initialization Table (SIT) is used to specify the initial startup conditions and control parameters for your system. Because only one set of conditions can apply to the system at any one time, only one SIT entry is allowed per group and per Group List Table (GLT).
Note: It should be understood that changes to the SIT can affect the performance and run-time characteristics of your CICS system. Changes made to a SIT entry should be well tested and understood before being put into a production environment.
Top |
Parameters
Keyword | Description | Choices | Notes |
---|---|---|---|
LIB | Library | Communications name, *LIBL, *CURLIB | Required, Positional 1 |
GROUP | Group | Communications name | Required, Positional 2 |
GLTGRP | GLT group | Communications name, *SAME, *NONE | Optional, Positional 3 |
WRKARASIZE | Common work area size | 0-3584, *SAME | Optional, Positional 4 |
APPLID | Application | Communications name, *SAME, DBDCCICS | Optional, Positional 5 |
DATFORM | Date format | *SAME, *MMDDYY, *DDMMYY, *YYMMDD | Optional, Positional 6 |
DUMP | CICS system dumps allowed | *SAME, *YES, *NO | Optional, Positional 7 |
DEVCTL | CICS device processing | Element list | Optional, Positional 8 |
Element 1: CICS device masking | Character value, *SAME, *DFT | ||
Element 2: Autoinstall inactivity limit | 0-180000, *SAME | ||
Element 3: Device dependent suffixing | *SAME, *DDS, *NODDS | ||
FILECTL | File processing | Element list | Optional, Positional 9 |
Element 1: Maximum files left open | 0-32767, *SAME | ||
Element 2: Open file inactivity limit | 0-1440, *SAME | ||
INTTRCCTL | Internal trace processing | Element list | Optional, Positional 10 |
Element 1: Maximum trace buffer entries | 125-10000, *SAME | ||
Element 2: Active at startup | *SAME, *NO, *YES | ||
Element 3: Wrapped when full | *SAME, *YES, *NO | ||
AUXTRCCTL | Auxiliary trace processing | Element list | Optional, Positional 11 |
Element 1: Active at startup | *SAME, *NO, *YES | ||
Element 2: Automatic switching | *SAME, *YES, *NO | ||
Element 3: Auxiliary trace A object | Qualified object name | ||
Qualifier 1: Auxiliary trace A object | Communications name, *SAME, *NONE | ||
Qualifier 2: Library | Communications name, *SAME, *CURLIB | ||
Element 4: Auxiliary trace B object | Qualified object name | ||
Qualifier 1: Auxiliary trace B object | Communications name, *SAME, *NONE | ||
Qualifier 2: Library | Communications name, *SAME, *CURLIB | ||
USRTRC | User trace active at startup | *SAME, *NO, *YES | Optional, Positional 12 |
TSCTL | Temporary storage processing | Element list | Optional, Positional 13 |
Element 1: Age limit | 0-512, *SAME | ||
Element 2: Recover data | *SAME, *YES, *NO | ||
SHRSTG | Shared storage information | Element list | Optional, Positional 14 |
Element 1: LSO storage requirements | Element list | ||
Element 1: Size | 10-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 2: System storage requirements | Element list | ||
Element 1: Size | 46-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 3: User storage requirements | Element list | ||
Element 1: Size | 3-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
NONSHRSTG | Nonshared storage processing | Element list | Optional, Positional 15 |
Element 1: LSO storage requirements | Element list | ||
Element 1: Size | 7-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 2: System storage requirements | Element list | ||
Element 1: Size | 7-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 3: User storage requirements | Element list | ||
Element 1: Size | 5-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
ITVCTL | Interval control processing | Element list | Optional, Positional 16 |
Element 1: Maximum active CICS shells | 1-32767, *SAME | ||
Element 2: Minimum active CICS shells | 1-32767, *SAME | ||
TDCTL | Transient data information | Element list | Optional, Positional 17 |
Element 1: ATI user profile | Simple name, *SAME, *INVOKER | ||
Element 2: Recover data | *SAME, *YES, *NO | ||
DSCOMP | Datastream compression | *SAME, *ALL, *NONE, 3270, 5250 | Optional, Positional 18 |
TCPPORT | TCP port number | 1-65535, *SAME, *NONE, *CICS | Optional, Positional 19 |
INLTRN | Initial Transaction | Communications name, *SAME, *NO, *EXT | Optional, Positional 20 |
Top |
Library (LIB)
Enter the name of the library that contains the group. Possible values are:
- *LIBL: The library list is used to locate the first library that contains the group.
- *CURLIB: The current library contains the group. If no current library is specified, the QGPL library is used.
- library-name: The name of the library that contains the group.
Top |
Group (GROUP)
Enter the name of the group containing the SIT entry to be changed.
group-name: The group name may have a maximum length of 10 characters. The first character must be alphabetic, or one of the special characters, $, @, or #. The remaining characters can be alphanumeric or one of the special characters, $, @, or #.
Top |
GLT group (GLTGRP)
Enter the name of the group that contains the group list table. All the groups specified in the group list table will be used when starting the CICS control region.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *NONE: No group list table will be used.
- group-name: The group name may have a maximum length of 10 characters. The first character must be alphabetic, or one of the special characters, $, @, or #. The remaining characters can be alphanumeric or one of the special characters, $, @, or #.
Top |
Common work area size (WRKARASIZE)
Enter the size of the Common Work Area (CWA) portion of the Common System Area (CSA)
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- 512: The common work area is 512 bytes.
- CWA-size: A number in the range 0 through 3584.
Top |
Application (APPLID)
Enter the VTAM application identifier for the CICS control region.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- DBDCCICS: This is the default VTAM application identifier to be used with the CICS control region.
- VTAM-application: The VTAM application identifier may have a maximum length of 8 characters. The first character must be alphabetic, or one of the special characters, $, @, or #. The remaining characters can be alphanumeric or one of the special characters, $, @, or #.
Top |
Date format (DATFORM)
Indicates how the CICS control region system date is formatted when the EXEC CICS FORMATTIME command is issued.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *MMDDYY: Month, day, year.
- *DDMMYY: Day, month, year.
- *YYMMDD: Year, month, day.
Top |
CICS system dumps allowed (DUMP)
Indicates whether or not a CICS control region dump can be taken.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *YES: CICS control region dumps can be taken.
- *NO: CICS control region dumps can not be taken.
Top |
CICS device processing (DEVCTL)
Enter the parameters used by the terminal control facility.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *DFT: The CICS terminal mask will consist of the last four non-blank characters of the IBM i device description.
- terminal-mask: The maximum length is four characters. The characters can be alphanumeric or one of the special characters, $, @, or #.
Element 2: Autoinstall inactivity limit
The amount of idle time after a CICS shell has ended, that the CICS autoinstall terminal is deleted. The format is hhmmss.
- *SAME: Keep the value currently specified in the SIT entry.
- hhmmss: A number in the range 0 through 180000. When the value specified is a 0, then delete the autoinstall terminal as soon as the session is ended.
Element 1: CICS device masking
Identifies which digits of the IBM i device name are used to generate the CICS terminal when the user signs on to the CICS control region. The digits are identified by using an offset relative to zero, that is 1 is the second digit of the IBM i device name.
Note: When one of the characters is not a number, then the character will be used in that position of the terminal identifier. For example, terminal mask = 0A5B, IBM i device name = XYZ1234567, CICS terminal identifier = XA3B.
- *SAME: Keep the value currently specified in the SIT entry.
- *DDS: Allow device dependent suffixing. BMS will always try to load a suffixed version of a map set. The suffix that is used will be determined in the following manner; If the transaction uses the alternate screen size, BMS will try to load a map version that has the alternate suffix. If the load fails (or the transaction does not use the alternate screen size) BMS tries to load a version that has a default map suffix. If this fails too, BMS tries to load the unsuffixed version.
- *NODDS: BMS is not to load suffixed versions of map sets. Specifying this option avoids the search for suffixed versions.
Element 3: Device dependent suffixing.
Whether or not device dependent suffixing is enabled.
Top |
File processing (FILECTL)
Enter the parameters used by the file control facility.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- max-open: A number in the range 0 through 32767. When the value specified is a 0, then an unlimited number of CICS files can be left open.
Element 2: Open file inactivity limit
The amount of time in minutes that a file can be left open with no activity.
- *SAME: Keep the value currently specified in the SIT entry.
- minutes: A number in the range 0 through 1440 (24 hours). When the value specified is a 0, then there is no limit to the amount of time that a file can remain open without activity.
Element 1: Maximum files left open
The maximum number of files that are left open to a CICS shell when a task ends.
Top |
Internal trace processing (INTTRCCTL)
Enter the control parameters used by the internal tracing facility.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- trace-buffer-entries: A number in the range 125 through 10000.
Element 2: Active at startup
Indicates whether or not the internal trace is active, when the CICS control region is started.
- *SAME: Keep the value currently specified in the SIT entry.
- *NO: Trace is not active.
- *YES: Trace is active.
Element 3: Wrapped when full
Indicates whether or not the internal trace should be wrapped when the internal trace buffer is full.
- *SAME: Keep the value currently specified in the SIT entry.
- *YES: The internal trace entries will be wrapped.
- *NO: The internal trace is to be stopped.
Element 1: Maximum trace buffer entries
Maximum number of entries allowed in the internal trace buffer. The number entered here also controls the maximum number of entries in each auxiliary trace space object specified in the AUXTRCCTL optional parameter - elements 3 and 4.
Top |
Auxiliary trace processing (AUXTRCCTL)
Enter the control parameters used by the auxiliary tracing facility in the CICS control region.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *NO: The trace is not active.
- *YES: The trace is active.
Element 2: Automatic switching
Indicates what to do when the auxiliary trace user space is full.
- *SAME: Keep the value currently specified in the SIT entry.
- *YES: The trace user space is to be switched.
- *NO: The auxiliary trace is to be stopped.
Element 3: Auxiliary trace file 1
The name of the first IBM i user space object that will be used by the auxiliary trace facility.
Possible library values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *CURLIB: The current library for the job that is associated to the CICS control region is used to locate the IBM i user space object. If no library is specified as the current library, the QGPL library is used.
- library-name: Specify the name of the library where the IBM i user space object is located.
Possible file name values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *NONE: There is no IBM i user space utilized by the auxiliary trace facility.
- Aux-1-file: Specify the name of the IBM i user space object.
Element 4: Auxiliary trace file 2
The name of the second IBM i user space that will be used by the auxiliary trace facility.
Note: This can not be the same as the IBM i user space object specified in Element 3 (Auxiliary trace file 1).
Possible library values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *CURLIB: The current library for the job that is associated to the CICS control region is used to locate the IBM i user space object. If no library is specified as the current library, the QGPL library is used.
- library-name: Specify the name of the library where the IBM i user space object is located.
Possible file name values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *NONE: There is no IBM i user space utilized by the auxiliary trace facility.
- Aux-2-file: Specify the name of the IBM i user space object.
Element 1: Active at startup
Indicates whether or not the auxiliary trace is active, when the CICS control region is started.
Top |
User trace active at startup (USRTRC)
Indicates whether or not user trace entries can be created when the CICS control region is started.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *NO: User trace entries will not be created.
- *YES: User trace entries will be created.
Top |
Temporary storage processing (TSCTL)
Enter the control parameters used by the temporary storage facility.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- temp-storage-age: A number in range 0 through 512. When the value specified is a 0, then all data is to be recovered.
Element 2: Recover Temporary Storage Queues
Indicates if the temporary storage queues are recovered during emergency restart of the CICS control region.
- *SAME: Keep the value currently specified in the SIT entry.
- *YES: Recover temporary storage queues.
- *NO: Do not recover temporary storage queues.
Element 1: TS Age Limit
The age limit of temporary storage data used by the temporary storage recovery program during emergency restart of control region. Data that is older than the specified limit will not be recovered. The value is specified in days.
Top |
Shared storage information (SHRSTG)
Enter the shared storage requirements.
Note: The maximum size that each of the three types of shared storage can be is 16,775,216. To calculate the maximum size add the following; the size * 1024, and the extent size * maximum extents * 1024.
Possible LSO storage requirement values are:
- *SAME: Keep the value currently specified in the SIT entry.
- LSO-sz: A number in the range 7 through 16000.
Element 2: LSO Extent Size
Size of the CICS LSO extents stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
- LSO-ext-sz: A number in the range 0 through 16000.
Element 3: LSO Maximum Extents
Maximum number of attempts allowed to extend the CICS LSO.
- *SAME: Keep the value currently specified in the SIT entry.
- LSO-exts: A number in the range 0 through 32767.
Element 4: System Size
Size of the CICS system space object stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
Element 1: LSO Size
Size of the CICS local space object (LSO) stated in K bytes.
Possible system storage requirement values are:
- Sys-sz: A number in the range 7 through 16000.
Element 5: System Extent Size
Size of the CICS system space object extents stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
- Sys-ext-sz: A number in the range 0 through 16000.
Element 6: Maximum System Extents
Maximum number of attempts allowed to extend the CICS system space object.
- *SAME: Keep the value currently specified in the SIT entry.
- Sys-exts: A number in the range 0 through 32767.
Element 7: User Size
Size of the CICS user space object stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
Possible user storage requirement values are:
- user-sz: A number in the range 5 through 16000.
Element 8: User Extent Size
Size of the CICS user space object extents stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
- user-ext-sz: A number in the range 0 through 16000. A number in the range 0 through 16000.
Element 9: Maximum User Extents
Maximum number of attempts allowed to extend the CICS user space object.
- *SAME: Keep the value currently specified in the SIT entry.
- user-exts: A number in the range 0 through 32767.
Top |
Nonshared storage processing (NONSHRSTG)
Enter the non-shared storage requirements.
Note: The maximum size that each of the three types of non-shared storage can be is 16,775,216. To calculate the maximum size add the following; the size * 1024, and the extent size * maximum extents * 1024.
Possible LSO requirement values are:
- *SAME: Keep the value currently specified in the SIT entry.
- LSO-sz: A number in the range 7 through 16000.
Element 2: LSO Extent Size
Size of the CICS LSO extents stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
- LSO-ext-sz: A number in the range 0 through 16000.
Element 3: Maximum LSO Extents
Maximum number of attempts allowed to extend the CICS LSO.
- *SAME: Keep the value currently specified in the SIT entry.
- LSO-exts: A number in the range 0 through 32767.
Element 1: LSO Size
Size of the CICS local space object (LSO) stated in K bytes.
Possible system requirement values are:
- *SAME: Keep the value currently specified in the SIT entry.
- Sys-sz: A number in the range 7 through 16000.
Element 5: System Extent Size
Size of the CICS system space object extents stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
- Sys-ext-sz: A number in the range 0 through 16000.
Element 6: Maximum System Extents
Maximum number of attempts allowed to extend the CICS system space object.
- *SAME: Keep the value currently specified in the SIT entry.
- Sys-exts: A number in the range 0 through 32767.
Element 4: System Size
Size of the CICS system space object stated in K bytes.
Possible user requirement values are:
- *SAME: Keep the value currently specified in the SIT entry.
- user-sz: A number in the range 5 through 16000.
Element 8: User Extent Size
Size of the CICS user space object extents stated in K bytes.
- *SAME: Keep the value currently specified in the SIT entry.
- user-ext-sz: A number in the range 0 through 16000.
Element 9: Maximum User Extents
Maximum number of attempts allowed to extend the CICS user space object.
- *SAME: Keep the value currently specified in the SIT entry.
- user-exts: A number in the range 0 through 32767.
Element 7: User Size
Size of the CICS user space object stated in K bytes.
Top |
Interval control processing (ITVCTL)
Enter the parameters used by the interval control facility.
Possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- btch-shell-max: A number in the range 1 through 32767.
Element 2: Minimum active CICS shells
The number of batch user shells to be used by interval control, that will remain active.
- *SAME: Keep the value currently specified in the SIT entry.
- btch-shell-min: A number in the range 1 through the value of Element 1 (Batch Shell Maximum).
Element 1: Maximum active CICS shells
The maximum number of batch user shells to be used by interval control, that can be active at the same time.
Top |
Transient data information (TDCTL)
Enter the control parameters used by transient data facility
Possible values are:
Element 1: ATI user profile
The IBM i user profile to be associated with the transaction that is automatically initiated when the transient data trigger level is reached.
- *SAME: Keep the value currently specified in the SIT entry.
- *INVOKER: Use the IBM i user profile that is associated with the CICS shell that caused the transient data trigger level to be reached.
- user-profile: The user profile name may have a maximum length of 10 characters. The first character must be alphabetic, or one of the special characters, $, @, or #. The remaining characters can be alphanumeric or one of the special characters, $, @, or #.
Element 2: Recover data
Indicates whether or not transient data queues are recovered during emergency restart of the CICS control region.
- *SAME: Keep the value currently specified in the SIT entry.
- *YES: Recover transient data queues.
- *NO: Do not recover transient data queue.
Top |
Datastream compression (DSCOMP)
Indicates the device types for which datastream compression is to be enabled.
Possible values are:
- *SAME: Keep the value currently specified in the System Initialization Table entry.
- *ALL: Specifies that datastream compression is to be enabled for all device types.
- *NONE: Specifies that datastream compression is not to be enabled for any device types.
- 3270: Specifies that datastream compression is to be enabled for 3270 device types.
- 5250: Specifies that datastream compression is to be enabled for 5250 device types.
Top |
TCP port number (TCPPORT)
Specifies if the CICS TCP/IP Listener should be started at control region startup, and if so, the TCP port that CICS Clients will use to connect to the listener.
The possible values are:
- *SAME: Keep the value currently specified in the SIT entry.
- *NONE: No CICS TCP/IP Listener is to be used.
- *CICS: The CICS TCP/IP Listener is started at control region startup to allow CICS Clients to connect using TCP/IP with the port number specified in the IBM-CICS entry of the Service Table.
- TCP port number: A number in the range of 1 through 65535. When a value is specified for this parameter, the CICS TCP/IP Listener is started at control region startup to allow CICS Clients to connect using TCP/IP with the specified port number.
Top |
Initial Transaction (INLTRN)
Enter the name of the transaction to be invoked immediately after the CICS control region completes the initialization process.
o The transaction is executed on a separated batch job. By default under the QBATCH subsystem. The job name is "AEGINLTRN" for transactions, while "AEGEXTPGM" is used for non-CICS programs.
o The transaction must have an entry defined in the Program Control Table (PCT), its program must have an entry defined in the Processing Program Table (PPT) and be stored in the local system.
o Non-CICS program objects must be named "EXTPGM" and its library be in the Library list of the job under which the CICS control region runs.
Single values
- *SAME: Keep the value currently specified in the SIT entry.
- *NO: No transaction is automatically called after the CICS control regions starts.
- *EXT: A non-CICS program "EXTPGM" is automatically invoked after the CICS control region starts. Non-CICS programs run in a normal batch job.
- transaction-name: Specify the name of the transaction. Transactions run in a shell under a batch job.
Top |
Examples
NoneTop |
Error messages
UnknownTop |