436
MP Server / Re: Issue with CMOD 10.1 and Content Collector for SAP 4.0
« on: September 04, 2018, 07:20:01 AM »
Thanks for posting the resolution!
Ed
Ed
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
PROBLEM SUMMARY:
****************************************************************
* USERS AFFECTED: *
* Users of POSIX(ON) Language Environment *
* applications which expect to roll back the *
* in-progress update to the recoverable *
* resources when SIGXCPU is received and *
* there are no signal handlers registered for *
* SIGXCPU by the applications. *
****************************************************************
* PROBLEM DESCRIPTION: *
* When Language Environment applications *
* are terminated with return code 3000 *
* due to unhandled SIGXCPU under *
* POSIX(ON), the in-progress updates to *
* recoverable resources would be *
* committed instead of being rolled back. *
****************************************************************
* RECOMMENDATION: *
****************************************************************
See the problem description.
PROBLEM CONCLUSION:
The code has been changed to ensure that, when a Language
Environment application is terminated with return code 3000 due
to unhandled SIGXCPU under POSIX(ON), the ThliAbnormalTerm flag
for all the threads in the process which receives SIGXCPU are
set to ON to notify Unix System Service to propagate the flag
to TCB_PTHREADTERMABNORMAL. The TCB_PTHREADTERMABNORMAL flags
are set to ON to indicate that the TCBs are terminated
abnormally. Then DB2 or other resource managers can check the
TCB_PTHREADTERMABNORMAL flags to determine commit or roll back
the in-progress transactions.
TEMPORARY FIX:
*********
* HIPER *
*********
PROBLEM SUMMARY:
****************************************************************
* USERS AFFECTED: *
* Users of POSIX(ON) Language Environment *
* applications which expect to roll back the *
* in-progress update to the recoverable *
* resources when SIGXCPU is received and *
* there are no signal handlers registered for *
* SIGXCPU by the applications. *
****************************************************************
* PROBLEM DESCRIPTION: *
* When Language Environment applications *
* are terminated with return code 3000 *
* due to unhandled SIGXCPU under *
* POSIX(ON), the in-progress updates to *
* recoverable resources would be *
* committed instead of being rolled back. *
****************************************************************
* RECOMMENDATION: *
****************************************************************
See the problem description.
PROBLEM CONCLUSION:
The code has been changed to ensure that, when a Language
Environment application is terminated with return code 3000 due
to unhandled SIGXCPU under POSIX(ON), the ThliAbnormalTerm flag
for all the threads in the process which receives SIGXCPU are
set to ON to notify Unix System Service to propagate the flag
to TCB_PTHREADTERMABNORMAL. The TCB_PTHREADTERMABNORMAL flags
are set to ON to indicate that the TCBs are terminated
abnormally. Then DB2 or other resource managers can check the
TCB_PTHREADTERMABNORMAL flags to determine commit or roll back
the in-progress transactions.
TEMPORARY FIX:
*********
* HIPER *
*********
I think the product you're linking to is the Filenet System Monitor -- which, while an awesome product, also had a shock-and-awe pricetag.
Comp type Input Output Rows
OD77 104,964,644 98,569,326 250
OD77 19,441,637 18,070,032 100
None 602,067 602,675 10
Disable 602,067 602,676 10
Disable 19,441,645 19,445,485 100
LZW12 19,441,649 25,353,227 100
LZW16 19,441,634 24,814,181 100
Site certificate
A certificate that is associated with an off-platform server or other network
entity, such as a peer VPN server. This category of certificate can also be
used to share a single certificate and its private key among multiple RACF
user IDs. When used for sharing, a certificate might be referred to as a
placeholder certificate.
When using FTP under z/OS to connect to a remote system (whether it’s another z/OS system or not), and still using only server certificates, our client again needs to have knowledge of the remote servers’ certificate in order to validate it.
...you’ll have been given the CA certificate for the site to which you’re connecting.
To accept a self-signed certificate from a server, use the following RACF definitions:
Hi Ed (and all)
Do you know if this works with a SITE certificate? We'd like to share the cert for batch usage.
Thanks!
...the docid for security reasons they use the user ID for the user requesting the docid to "encrypt" the docid.
So if userA gets a docid, and gives it to userB, then userB cannot use the docid, since he is not userA