Previous Topic: Review the Monitor Exit Interface Programming SamplesNext Topic: Correlate Transaction Information


Monitor File Requests to Non CICS Resources

You can monitor file or database requests to non-CICS resources. Many applications use files or databases that are not under the control of CICS. The MEI can be used to monitor non-CICS file requests.

Follow these steps:

  1. Insert an MEI Start Clock request before the file request.
  2. Make the file request.
  3. Insert an MEI Stop Clock request after the file request.