Where allowed to run:
|
Parameters Examples Error messages |
Use the Change CICS System Initialization Table (CHGCICSSIT) command to change the entry in the SIT.
The System Initialization Table (SIT) is used to specify the initial startup conditions and control parameters for your system. Because only one set of conditions can apply to the system at any one time, only one SIT entry is allowed per group and per Group List Table (GLT).
Note: It should be understood that changes to the SIT can affect the performance and run-time characteristics of your CICS system. Changes made to a SIT entry should be well tested and understood before being put into a production environment.
Top |
Keyword | Description | Choices | Notes |
---|---|---|---|
LIB | Library | Communications name, *LIBL, *CURLIB | Required, Positional 1 |
GROUP | Group | Communications name | Required, Positional 2 |
GLTGRP | GLT group | Communications name, *SAME, *NONE | Optional, Positional 3 |
WRKARASIZE | Common work area size | 0-3584, *SAME | Optional, Positional 4 |
APPLID | Application | Communications name, *SAME, DBDCCICS | Optional, Positional 5 |
DATFORM | Date format | *SAME, *MMDDYY, *DDMMYY, *YYMMDD | Optional, Positional 6 |
DUMP | CICS system dumps allowed | *SAME, *YES, *NO | Optional, Positional 7 |
DEVCTL | CICS device processing | Element list | Optional, Positional 8 |
Element 1: CICS device masking | Character value, *SAME, *DFT | ||
Element 2: Autoinstall inactivity limit | 0-180000, *SAME | ||
Element 3: Device dependent suffixing | *SAME, *DDS, *NODDS | ||
FILECTL | File processing | Element list | Optional, Positional 9 |
Element 1: Maximum files left open | 0-32767, *SAME | ||
Element 2: Open file inactivity limit | 0-1440, *SAME | ||
INTTRCCTL | Internal trace processing | Element list | Optional, Positional 10 |
Element 1: Maximum trace buffer entries | 125-10000, *SAME | ||
Element 2: Active at startup | *SAME, *NO, *YES | ||
Element 3: Wrapped when full | *SAME, *YES, *NO | ||
AUXTRCCTL | Auxiliary trace processing | Element list | Optional, Positional 11 |
Element 1: Active at startup | *SAME, *NO, *YES | ||
Element 2: Automatic switching | *SAME, *YES, *NO | ||
Element 3: Auxiliary trace A object | Qualified object name | ||
Qualifier 1: Auxiliary trace A object | Communications name, *SAME, *NONE | ||
Qualifier 2: Library | Communications name, *SAME, *CURLIB | ||
Element 4: Auxiliary trace B object | Qualified object name | ||
Qualifier 1: Auxiliary trace B object | Communications name, *SAME, *NONE | ||
Qualifier 2: Library | Communications name, *SAME, *CURLIB | ||
USRTRC | User trace active at startup | *SAME, *NO, *YES | Optional, Positional 12 |
TSCTL | Temporary storage processing | Element list | Optional, Positional 13 |
Element 1: Age limit | 0-512, *SAME | ||
Element 2: Recover data | *SAME, *YES, *NO | ||
SHRSTG | Shared storage information | Element list | Optional, Positional 14 |
Element 1: LSO storage requirements | Element list | ||
Element 1: Size | 10-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 2: System storage requirements | Element list | ||
Element 1: Size | 46-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 3: User storage requirements | Element list | ||
Element 1: Size | 3-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
NONSHRSTG | Nonshared storage processing | Element list | Optional, Positional 15 |
Element 1: LSO storage requirements | Element list | ||
Element 1: Size | 7-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 2: System storage requirements | Element list | ||
Element 1: Size | 7-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
Element 3: User storage requirements | Element list | ||
Element 1: Size | 5-16000, *SAME | ||
Element 2: Extent size | 0-16000, *SAME | ||
Element 3: Maximum extents | 0-32767, *SAME | ||
ITVCTL | Interval control processing | Element list | Optional, Positional 16 |
Element 1: Maximum active CICS shells | 1-32767, *SAME | ||
Element 2: Minimum active CICS shells | 1-32767, *SAME | ||
TDCTL | Transient data information | Element list | Optional, Positional 17 |
Element 1: ATI user profile | Simple name, *SAME, *INVOKER | ||
Element 2: Recover data | *SAME, *YES, *NO | ||
DSCOMP | Datastream compression | *SAME, *ALL, *NONE, 3270, 5250 | Optional, Positional 18 |
TCPPORT | TCP port number | 1-65535, *SAME, *NONE, *CICS | Optional, Positional 19 |
Top |
Enter the name of the OS/400 library that contains the group. Possible values are:
Top |
Enter the name of the group containing the SIT entry to be changed.
group-name: The group name may have a maximum length of 10 characters. The first character must be alphabetic, or one of the special characters, $, @, or #. The remaining characters can be alphanumeric or one of the special characters, $, @, or #.
Top |
Enter the name of the group that contains the group list table. All the groups specified in the group list table will be used when starting the CICS control region.
Possible values are:
Top |
Enter the size of the Common Work Area (CWA) portion of the Common System Area (CSA)
Possible values are:
Top |
Enter the VTAM application identifier for the CICS control region.
Possible values are:
Top |
Indicates how the CICS control region system date is formatted when the EXEC CICS FORMATTIME command is issued.
Possible values are:
Top |
Indicates whether or not a CICS control region dump can be taken.
Possible values are:
Top |
Enter the parameters used by the terminal control facility.
Possible values are:
Element 1: CICS device masking
Identifies which digits of the iSeries device name are used to generate the CICS terminal when the user signs on to the CICS control region. The digits are identified by using an offset relative to zero, that is 1 is the second digit of the iSeries device name.
Note: When one of the characters is not a number, then the character will be used in that position of the terminal identifier. For example, terminal mask = 0A5B, iSeries device name = XYZ1234567, CICS terminal identifier = XA3B.
Element 2: Autoinstall inactivity limit
The amount of idle time after a CICS shell has ended, that the CICS autoinstall terminal is deleted. The format is hhmmss.
Element 3: Device dependent suffixing.
Whether or not device dependent suffixing is enabled.
Top |
Enter the parameters used by the file control facility.
Possible values are:
Element 1: Maximum files left open
The maximum number of files that are left open to a CICS shell when a task ends.
Element 2: Open file inactivity limit
The amount of time in minutes that a file can be left open with no activity.
Top |
Enter the control parameters used by the internal tracing facility.
Possible values are:
Element 1: Maximum trace buffer entries
Maximum number of entries allowed in the internal trace buffer. The number entered here also controls the maximum number of entries in each auxiliary trace space object specified in the AUXTRCCTL optional parameter - elements 3 and 4.
Element 2: Active at startup
Indicates whether or not the internal trace is active, when the CICS control region is started.
Element 3: Wrapped when full
Indicates whether or not the internal trace should be wrapped when the internal trace buffer is full.
Top |
Enter the control parameters used by the auxiliary tracing facility in the CICS control region.
Possible values are:
Element 1: Active at startup
Indicates whether or not the auxiliary trace is active, when the CICS control region is started.
Element 2: Automatic switching
Indicates what to do when the auxiliary trace user space is full.
Element 3: Auxiliary trace file 1
The name of the first iSeries user space object that will be used by the auxiliary trace facility.
Possible library values are:
Possible file name values are:
Element 4: Auxiliary trace file 2
The name of the second iSeries user space that will be used by the auxiliary trace facility.
Note: This can not be the same as the iSeries user space object specified in Element 3 (Auxiliary trace file 1).
Possible library values are:
Possible file name values are:
Top |
Indicates whether or not user trace entries can be created when the CICS control region is started.
Possible values are:
Top |
Enter the control parameters used by the temporary storage facility.
Possible values are:
Element 1: TS Age Limit
The age limit of temporary storage data used by the temporary storage recovery program during emergency restart of control region. Data that is older than the specified limit will not be recovered. The value is specified in days.
Element 2: Recover Temporary Storage Queues
Indicates if the temporary storage queues are recovered during emergency restart of the CICS control region.
Top |
Enter the shared storage requirements.
Note: The maximum size that each of the three types of shared storage can be is 16,775,216. To calculate the maximum size add the following; the size * 1024, and the extent size * maximum extents * 1024.
Possible LSO storage requirement values are:
Element 1: LSO Size
Size of the CICS local space object (LSO) stated in K bytes.
Element 2: LSO Extent Size
Size of the CICS LSO extents stated in K bytes.
Element 3: LSO Maximum Extents
Maximum number of attempts allowed to extend the CICS LSO.
Element 4: System Size
Size of the CICS system space object stated in K bytes.
Possible system storage requirement values are:
Element 5: System Extent Size
Size of the CICS system space object extents stated in K bytes.
Element 6: Maximum System Extents
Maximum number of attempts allowed to extend the CICS system space object.
Element 7: User Size
Size of the CICS user space object stated in K bytes.
Possible user storage requirement values are:
Element 8: User Extent Size
Size of the CICS user space object extents stated in K bytes.
Element 9: Maximum User Extents
Maximum number of attempts allowed to extend the CICS user space object.
Top |
Enter the non-shared storage requirements.
Note: The maximum size that each of the three types of non-shared storage can be is 16,775,216. To calculate the maximum size add the following; the size * 1024, and the extent size * maximum extents * 1024.
Possible LSO requirement values are:
Element 1: LSO Size
Size of the CICS local space object (LSO) stated in K bytes.
Element 2: LSO Extent Size
Size of the CICS LSO extents stated in K bytes.
Element 3: Maximum LSO Extents
Maximum number of attempts allowed to extend the CICS LSO.
Possible system requirement values are:
Element 4: System Size
Size of the CICS system space object stated in K bytes.
Element 5: System Extent Size
Size of the CICS system space object extents stated in K bytes.
Element 6: Maximum System Extents
Maximum number of attempts allowed to extend the CICS system space object.
Possible user requirement values are:
Element 7: User Size
Size of the CICS user space object stated in K bytes.
Element 8: User Extent Size
Size of the CICS user space object extents stated in K bytes.
Element 9: Maximum User Extents
Maximum number of attempts allowed to extend the CICS user space object.
Top |
Enter the parameters used by the interval control facility.
Possible values are:
Element 1: Maximum active CICS shells
The maximum number of batch user shells to be used by interval control, that can be active at the same time.
Element 2: Minimum active CICS shells
The number of batch user shells to be used by interval control, that will remain active.
Top |
Enter the control parameters used by transient data facility
Possible values are:
Element 1: ATI user profile
The iSeries user profile to be associated with the transaction that is automatically initiated when the transient data trigger level is reached.
Element 2: Recover data
Indicates whether or not transient data queues are recovered during emergency restart of the CICS control region.
Top |
Indicates the device types for which datastream compression is to be enabled.
Possible values are:
Top |
Specifies if the CICS TCP/IP Listener should be started at control region startup, and if so, the TCP port that CICS Clients will use to connect to the listener.
The possible values are:
Top |
Top |
Top |