Where allowed to run:
|
Parameters Examples Error messages |
Use the Add CICS System Initialization Table (ADDCICSSIT) command to add an entry to the SIT.
The System Initialization Table (SIT) is used to specify the initial startup conditions and control parameters for your system. An Add is not valid if SIT entry already exists for this group.
Because only one set of conditions can apply to the system at any one time, only one SIT entry is allowed per group and per Group List Table (GLT). You can create as many SIT entries as you like, but each one must belong to a different group and a different GLT.
Top |
Keyword | Description | Choices | Notes |
---|---|---|---|
LIB | Library | Communications name, *LIBL, *CURLIB | Required, Positional 1 |
GROUP | Group | Communications name | Required, Positional 2 |
GLTLIB | GLT library | Communications name, *LIBL, *CURLIB | Optional, Positional 3 |
GLTGRP | GLT group | Communications name, *NONE | Optional, Positional 4 |
WRKARASIZE | Common work area size | 0-3584, 512 | Optional, Positional 5 |
APPLID | Application | Communications name, DBDCCICS | Optional, Positional 6 |
DATFORM | Date format | *MMDDYY, *DDMMYY, *YYMMDD | Optional, Positional 7 |
DUMP | CICS system dumps allowed | *YES, *NO | Optional, Positional 8 |
DEVCTL | CICS device processing | Element list | Optional, Positional 9 |
Element 1: CICS device masking | Character value, *DFT | ||
Element 2: Autoinstall inactivity limit | 0-180000, 0 | ||
Element 3: Device dependent suffixing | *DDS, *NODDS | ||
FILECTL | File processing | Element list | Optional, Positional 10 |
Element 1: Maximum files left open | 0-32767, 0 | ||
Element 2: Open file inactivity limit | 0-1440, 0 | ||
INTTRCCTL | Internal trace processing | Element list | Optional, Positional 11 |
Element 1: Maximum trace buffer entries | 125-10000, 125 | ||
Element 2: Active at startup | *NO, *YES | ||
Element 3: Wrapped when full | *YES, *NO | ||
AUXTRCCTL | Auxiliary trace processing | Element list | Optional, Positional 12 |
Element 1: Active at startup | *NO, *YES | ||
Element 2: Automatic switching | *YES, *NO | ||
Element 3: Auxiliary trace A object | Qualified object name | ||
Qualifier 1: Auxiliary trace A object | Communications name | ||
Qualifier 2: Library | Communications name, *CURLIB | ||
Element 4: Auxiliary trace B object | Qualified object name | ||
Qualifier 1: Auxiliary trace B object | Communications name | ||
Qualifier 2: Library | Communications name, *CURLIB | ||
USRTRC | User trace active at startup | *NO, *YES | Optional, Positional 13 |
TSCTL | Temporary storage processing | Element list | Optional, Positional 14 |
Element 1: Age limit | 0-512, 0 | ||
Element 2: Recover data | *YES, *NO | ||
SHRSTG | Shared storage information | Element list | Optional, Positional 15 |
Element 1: LSO storage requirements | Element list | ||
Element 1: Size | 10-16000, 10 | ||
Element 2: Extent size | 0-16000, 0 | ||
Element 3: Maximum extents | 0-32767, 0 | ||
Element 2: System storage requirements | Element list | ||
Element 1: Size | 46-16000, 46 | ||
Element 2: Extent size | 0-16000, 0 | ||
Element 3: Maximum extents | 0-32767, 0 | ||
Element 3: User storage requirements | Element list | ||
Element 1: Size | 3-16000, 3 | ||
Element 2: Extent size | 0-16000, 0 | ||
Element 3: Maximum extents | 0-32767, 0 | ||
NONSHRSTG | Nonshared storage processing | Element list | Optional, Positional 16 |
Element 1: LSO storage requirements | Element list | ||
Element 1: Size | 7-16000, 7 | ||
Element 2: Extent size | 0-16000, 0 | ||
Element 3: Maximum extents | 0-32767, 0 | ||
Element 2: System storage requirements | Element list | ||
Element 1: Size | 7-16000, 7 | ||
Element 2: Extent size | 0-16000, 0 | ||
Element 3: Maximum extents | 0-32767, 0 | ||
Element 3: User storage requirements | Element list | ||
Element 1: Size | 5-16000, 5 | ||
Element 2: Extent size | 0-16000, 0 | ||
Element 3: Maximum extents | 0-32767, 0 | ||
ITVCTL | Interval control processing | Element list | Optional, Positional 17 |
Element 1: Maximum active CICS shells | 1-32767, 5 | ||
Element 2: Minimum active CICS shells | 1-32767, 2 | ||
TDCTL | Transient data information | Element list | Optional, Positional 18 |
Element 1: ATI user profile | Simple name, *INVOKER | ||
Element 2: Recover data | *YES, *NO | ||
DSCOMP | Datastream compression | *ALL, *NONE, 3270, 5250 | Optional, Positional 19 |
TCPPORT | TCP port number | 1-65535, *NONE, *CICS | Optional, Positional 20 |
Top |
Enter the name of the OS/400 library that contains the group. Possible values are:
Top |
Enter the name of the group to which this SIT entry is to be added.
group-name: The group name may have a maximum length of 10 characters. The first character must be alphabetic, or one of the special characters, $, @, or #. The remaining characters can be alphanumeric or one of the special characters, $, @, or #.
Top |
Enter the name of the iSeries library that contains the group holding the group list table. This name is also used to identify this SIT entry.
Possible values are:
Top |
Enter the name of the group that contains the group list table. All the groups specified in the group list table will be used when the CICS control region is started.
Possible values are:
Top |
Enter the size of the Common Work Area (CWA) portion of the Common System Area (CSA).
Possible values are:
Top |
Enter the VTAM application identifier for the CICS control region.
Possible values are:
Top |
Indicates how the CICS control region system date is formatted when the EXEC CICS FORMATTIME command is issued.
Possible values are:
Top |
Indicates whether or not a CICS control region dump can be taken.
Possible values are:
Top |
Enter the terminal control parameters.
Possible values are:
Element 1: CICS device masking
Identifies which digits of the iSeries device name, as specified in the device identifier field of the TCT, are used to generate the terminal identifier when the user signs on to the CICS control region. The digits are identified by using an offset relative to zero, that is, 1 is the second digit of the iSeries device name.
Note: When one of the characters is not a number, then the character will be used in that position of the CICS terminal identifier. For example, terminal mask = 0A5B, iSeries device name = XYZ1234567, CICS terminal identifier = XA3B.
Element 2: Autoinstall inactivity limit
The amount of idle time after a shell has ended, that the autoinstall terminal is deleted. The format is hhmmss.
Element 3: Device dependent suffixing.
Whether or not device dependent suffixing is enabled.
Top |
Enter the parameters used by the file control facility.
Possible values are:
Element 1: Maximum files left open
The maximum number of files that will be left open to a CICS shell at task end.
Element 2: Open file inactivity limit
The amount of time in minutes that a file can be left open with no activity.
Top |
Enter the control parameters used by the internal tracing facility.
Possible values are:
Element 1: Maximum trace buffer entries
Maximum number of entries allowed in the internal trace buffer. The number entered here also controls the maximum number of entries in each auxiliary trace space object specified in the AUXTRCCTL optional parameter - elements 3 and 4.
Element 2: Active at startup
Indicates whether or not the internal trace is active, when the CICS control region is started.
Element 3: Wrapped when full
Indicates whether or not the internal trace should be wrapped when the internal trace buffer is full.
Top |
Specified the control parameters used by the auxiliary tracing facility.
Possible values are:
Element 1: Active at startup
Indicates whether or not the auxiliary trace is active when the CICS control region is started.
Element 2: Automatic switching
Indicates what to do when the auxiliary trace user space is full.
Element 3: Auxiliary trace file 1
The name of the first iSeries user space object that will be utilized by the auxiliary trace facility.
Possible library values are:
Element 4: Auxiliary file 2
The name of the second iSeries user space that will be utilized by the auxiliary trace facility.
Note: This cannot be the same as the iSeries user space object specified in Element 3 (Auxiliary Trace 1).
Possible library values are:
Top |
Indicates whether or not user trace entries can be created when the CICS control region is started.
Possible values are:
Top |
Enter the parameters to be used by the temporary storage facility. During a warm start, all recoverable temporary storage queues are recovered.
Possible values are:
Element 1: TS Age Limit
The age limit of temporary storage data used by the temporary storage recovery program during emergency restart of the CICS control region. Data that is older than the specified limit will not be recovered. The value is specified in days.
Element 2: Recover Temporary Storage Queues
Indicates whether or not the temporary storage queues are recovered during emergency restart of the CICS control region.
Top |
Enter the shared storage requirements.
Note: The maximum size that each of the three types of shared storage can be is 16,775,216. To calculate the maximum size add the following; the size * 1024, and the extent size * maximum extents * 1024.
Possible LSO storage requirement values are:
Element 1: LSO Size
Size of the CICS local space object (LSO) stated in K bytes.
Element 2: LSO Extent Size
Size of the CICS LSO extents stated in K bytes.
Element 3: Maximum LSO Extents
Maximum number of attempts allowed to extend the CICS LSO.
Possible system storage requirement values are:
Element 4: System Size
Size of the CICS system space object stated in K bytes.
Element 5: System Extent Size
Size of the CICS system space object extents stated in K bytes.
Element 6: Maximum System Extents
Maximum number of attempts allowed to extend the CICS system space object.
Possible user storage requirement values are:
Element 7: User Size
Size of the CICS user space object stated in K bytes.
Element 8: User Extent Size
Size of the CICS user space object extents stated in K bytes.
Element 9: Maximum User Extents
Maximum number of attempts allowed to extend the CICS user space object.
Top |
Enter the non-shared storage requirements.
Note: The maximum size that each of the three types of non-shared storage can be is 16,775,216. To calculate the maximum size add the following; the size * 1024, and the extent size * maximum extents * 1024.
Possible LSO storage requirement values are:
Element 1: LSO Size
Size of the CICS LSO stated in K bytes.
Element 2: LSO Extent Size
Size of the CICS LSO extents stated in K bytes.
Element 3: Maximum LSO Extents
Maximum number of attempts allowed to extend the CICS LSO.
Possible System storage requirement values are:
Element 4: System Size
Size of the CICS system space object stated in K bytes.
Element 5: System Extent Size
Size of the CICS system space object extents stated in K bytes.
Element 6: Maximum System Extents
Maximum number of attempts allowed to extend the CICS system space object.
Possible User storage requirement values are:
Element 7: User Size
Size of the CICS user space object stated in K bytes.
Element 8: User Extent Size
Size of the CICS user space object extents stated in K bytes.
Element 9: Maximum User Extents
Maximum number of attempts allowed to extend the CICS user space object.
Top |
Enter the parameters used by interval control facility.
Possible values are:
Element 1: Maximum active CICS shells
The maximum number of batch user shells to be used by interval control, that can be active at the same time.
Element 2: Minimum active CICS shells
The number of batch user shells to be used by interval control, that will remain active.
Top |
Enter the control parameters used by the transient data facility during an emergency restart. During a warm start, all recoverable transient data queues are recoverable.
Possible values are: Element 1: ATI User Profile
The iSeries user profile to be associated with the transaction that is automatically initiated when the transient data trigger level is reached.
Element 2: Recover data
Indicates whether or not the transient data queues are recovered during emergency restart of the CICS control region.
Top |
Indicates the device types for which datastream compression is to be enabled.
Possible values are:
Top |
Specifies if the CICS TCP/IP Listener should be started at control region startup, and if so, the TCP port that CICS Clients will use to connect to the listener.
The possible values are:
Top |
Top |
Top |