This section contains the following topics:
The trace is used to diagnose access problems. It is activated via any one of several control options specified through the O/S MODIFY TSS command or the TSS MODIFY in combination with the TSS ADDTO commands:
|
Trace Level |
Activation |
|---|---|
|
SYSTEM‑WIDE |
SECTRACE(ON) |
|
FACILITY‑WIDE |
FACILITY(TSO=TRACE) |
|
GROUP OF USERS |
TSS ADDTO(profile) TRACE |
|
SPECIFIC USER |
TSS ADDTO(user) TRACE |
TSO traces go to both the user's screen and the system log. IMS, CICS, and other online traces go to SYSLOG.
Note: For CICS, you can also write diagnostic trace records into the CICS main trace table. For information, see the Implementation: CICS Guide.
For batch, traces go to SYSLOG if SECTRACE(ACT,WTL) is specified, or to the security console if SECTRACE(ACT,WTO) is specified.
The trace provides abundant information,keep tracing to a minimum and be specific about who or what is being traced.
Trace messages begin with:
TSS‑?
The ? indicates the type of trace record. A trace for a single event comprises four or five trace messages with the headers:
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|