Building the REPORTS control statement


To build keywords and values on the REPORTS control statement, you use the REPORTS Control Statement panel.

The REPORTS control statement controls production of the batch reports that Log Analyzer writes to SYSOUT-type data sets. For more information, see Specifying-REPORTS-control-statements.

To access and work with the REPORTS Control Statement panel

  1. Access the Build JCL panel.For instructions, see Accessing-JCL-functions.
  2. In the Control Statements field to the left of the REPORTS label, enter S.The REPORTS Control Statement panel is displayed:

    REPORTS Control Statement panel

    Log Analyzer               REPORTS Control Statement                          
    Command ===> _________________________________________________________________
                                                                                 
    Reports. Select the reports to produce. (*=more options below for that report)
     / Analysis Summary         Limit SYSOUT to ________ lines                     
     / LUOW Summary             Limit SYSOUT to ________ lines                     
     / LUOW Detail            * Limit SYSOUT to ________ lines                     
     / LUOW Time Sequence       Limit SYSOUT to ________ lines                     
     / Log Record Dump        * Limit SYSOUT to ________ lines                     
     / Orphans                  Limit SYSOUT to ________ lines                     
    _ Audit                  * Limit SYSOUT to ________ lines                     
     / Application Checkpoint *                                                    
      The following reports are mutually exclusive with the above and each other.
    _ Abends                   Limit SYSOUT to ________ lines                     
    _ Deadlock                                                                    
    _ RBA Buffer Statistics  *                                                    
                                                                                 
    LUOW Detail report options. Select if desired.                                
      _ Display 01 and 03 record data.  Offset ______  Length __                  
      Limit to LUOW ID(s) ________________________________________________________
                                                                                 
    Log Record Dump report options.                                               
      Format.                                                                     
      1 1.Standard    2.Over/under  _ Character    _ Hexadecimal                  
                                                                                 
    Audit report options.                                                         
      Event type to include or exclude.                                           
      _ 1.Include     2.Exclude                                                   
        Event type.                                                               
         _ 1.Trans  2.Commands  3.Security violations  4.Signons  5.Signoffs      
      DBDs to include or exclude (If report includes transaction events).         
      _ 1.Include     2.Exclude                                                   
        DBD names _____________________________________________________           
                                                                                 
    Application Checkpoint report options.                                        
      Jobs to include or exclude.                                                 
      _ 1.Include     2.Exclude                                                   
        Jobnames  _____________________________________________________           
      PSBs to include or exclude.                                                 
      _ 1.Include     2.Exclude                                                   
        PSB names _____________________________________________________           
      Checkpoint frequency.                                                       
        Comparison operator   __   (<,<=,>,>=)                                    
        Number of checkpoints ____ (0-9999)                                       
        Per threshold         ___  (SEC or MIN)                                   
                                                                                 
    RBA Buffer Statistics report options.                                         
      _ 1.Show totals only   2.Show all RBAs
  3. In the Reports selection field to the left of each type of batch report that you want Log Analyzer to produce, enter a slash (/).These fields are used to produce the following keywords on the REPORTS control statement, as explained on the indicated page:

    In the Limit SYSOUT to n lines field for many of the reports, you can also enter the maximum number of lines to write to the output data set for that report. If you omit this number, all lines that Log Analyzer produces for this report are written to the output data set.

    Note

    If you select the Deadlock report or the Application Checkpoint report, you cannot select the FILTER control statement on the Build JCL panel. The ISPF interface issues a warning message if the FILTER control statement is selected and you select one of these reports. To correct this condition, remove any slashes from the Deadlock field and Application Checkpoint field, or remove the slash from the FILTER control statement field.

    If you select the Abends report, you cannot specify SELECT fields for the FILTER control statement field.

  4. (optional) Enter a slash (/) in the Display 01 and 03 record data field to generate the LUOWDETAILDATA keyword on the REPORTS control statement.This keyword controls whether Log Analyzer includes a portion of data from 01 records and 03 records in the LUOW Detail report. If you select this field, you can also specify an offset and length. For more information, see LUOWDETAILDATA-keyword.
  5. (optional) Enter a list of specific LUOW IDs in the Limit to LUOW ID(s) field to limit the LUOW Detail report to the specified list.This keyword modifies the generation of the LUOWDETAIL keyword on the REPORTS control statement. For more information, see LUOWDETAIL-keyword.
  6. (optional) In the Log Record Dump report options field, enter one of the following values to control the format of dumped log records:

     

    Value

    Result

    1

    The DUMPREC keyword is generated so that dumped records are formatted in standard format. For more information, see DUMPREC-keyword.

    2

    The DUMPVERT keyword is generated so that dumped records are formatted in vertical format. For more information, see DUMPVERT-keyword.

    You can also enter a slash (/) in the Character field, in the Hexadecimal field, or in both fields to include character representations, hexadecimal representations, or both representations of the dumped records. The DUMPFORM keyword is generated. For more information, see DUMPFORM-keyword.

  7. (optional) In the AUDIT report options fields, enter values to control the contents of the AUDIT report:

    Note

    If you omit all of these values and you select the report, the ISPF interface generates the AUDIT=ALL keyword.

    1. (optional) In the Event type to include or exclude field, enter one of the following values to control generation of the TYPE subkeyword of the AUDIT keyword:

       

      Value

      Result

      1

      In the AUDIT report, display information only for type that you specify in the Event type field. Omit information about all other types that Log Analyzer finds in the input logs.

      2

      In the AUDIT report, omit information about the type that you specify in the Event type field. Display information about all other types that Log Analyzer finds in the input logs.

    2. (optional) In the DBDs to include or exclude field, enter one of the following values to control generation of the DBD subkeyword of the AUDIT keyword:

       

      Value

      Result

      1

      In the AUDIT report, display information only for DBDs that you specify in the DBD names field. Omit information about all other DBDs that Log Analyzer finds in the input logs.

      2

      In the AUDIT report, omit information about the DBDs that you specify in the DBD names field. Display information about all other DBDs that Log Analyzer finds in the input logs.

       

      If you specify a value in the DBDs to include or exclude field, enter one or more DBD names in the DBD names field.

      You can enter a masked value by using the following wildcard characters:

      • Specify an asterisk (*) to match any number of characters, starting from that position.
      • Specify a percent sign (%) to match a single character at that position.

      Separate multiple names with a space, a comma, or both. The ISPF interface separates the names with a comma, as required by the keyword syntax.

  8. (optional) In the Application Checkpoint report options fields, enter values to control the contents of the Application Checkpoint report:

    Note

    If you omit all of these values and you select the report, the ISPF interface generates the APPCHECK=ALL keyword. This keyword causes Log Analyzer to include all BMPs in the analysis and bypass filtering by checkpoint frequency:

    1. (optional) In the Jobs to include or exclude field, enter one of the following values to control generation of the JOB subkeyword of the APPCHECK keyword:

       

      Value

      Result

      1

      In the Application Checkpoint report, display information only for jobs that you specify in the Jobnames field. Omit information about all other jobs that Log Analyzer finds in the input logs.

      2

      In the Application Checkpoint report, omit information about the jobs that you specify in the Jobnames field. Display information about all other jobs that Log Analyzer finds in the input logs.

       

      If you specify a value in the Jobs to include or exclude field, enter one or more job names in the Jobnames field.

      You can enter a masked value by using wildcard characters:

      • Specify an asterisk (*) to match any number of characters, starting from that position.
      • Specify a percent sign (%) to match a single character at that position.

      Separate multiple names with a space, a comma, or both. The ISPF interface separates the names with a comma, as required by the keyword syntax.

    2. (optional) In the PSBs to include or exclude field, enter one of the following values to control generation of the PSB subkeyword of the APPCHECK keyword:

       

      Value

      Result

      1

      In the Application Checkpoint report, display information only for BMPs with PSBs that you specify in the PSB names field. Omit information about all other BMPs that Log Analyzer finds in the input logs.

      2

      In the Application Checkpoint report, omit information about the BMPs with PSBs that you specify in the PSB names field. Display information about all other BMPs that Log Analyzer finds in the input logs.

       

      If you specify a value in the PSBs to include or exclude field, enter one or more PSB names in the PSB names field.

      You can enter a masked value by using wildcard characters:

      • Specify an asterisk (*) to match any number of characters, starting from that position.
      • Specify a percent sign (%) to match a single character at that position.

      Separate multiple names with a space, a comma, or both. The ISPF interface separates the names with a comma, as required by the keyword syntax.

    3. (optional) Use the Checkpoint frequency fields to establish a filter for the Application Checkpoint report, based on the calculated frequency of checkpoints.These fields control generation of the CHKFREQ subkeyword and the THRESH subkeyword of the APPCHECK keyword.

      • In the Comparison operator field, enter one of the following values to define how to compare the calculated frequency of checkpoints with the threshold value that you specify in the Number of checkpoints field.

       

      Value

      Result

      <

      Display data for this job and PSB if the calculated checkpoint frequency is less than the specified threshold value.

      <=

      Display data for this job and PSB if the calculated checkpoint frequency is less than or equal to the specified threshold value.

      >

      Display data for this job and PSB if the calculated checkpoint frequency is greater than the specified threshold value.

      >=

      Display data for this job and PSB if the calculated checkpoint frequency is greater than or equal to the specified threshold value.

       

      • In the Number of checkpoints field, specify the threshold number of checkpoints to compare with the calculated frequency of checkpoints. Valid values are 0 through 9999.
      • In the Per threshold field, specify the time unit for the threshold value. Valid values are SEC (seconds) and MIN (minutes).

      For the filter, you specify a comparison operator, the threshold number of checkpoints per time unit, and the time unit. Log Analyzer calculates the checkpoint frequency for an included job and PSB by dividing the number of checkpoint records by the elapsed time of the job (as reflected in the input log records). Then, Log Analyzer compares this calculated checkpoint frequency with the threshold number of checkpoints per time unit. If the comparison results in a true statement, the report displays information about the job and PSB.

  9. (optional) In the RBA Buffer Statistics report options field, enter a value to indicate the depth of information to report in the RBA Buffer Statistics report:

     

    Value

    Result

    1

    Report summarized (total) values.

    2

    Report information about all RBAs.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*