Skip to main content

Systems Programmer's Guide to: z/OS System Logger

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 27 July 2007, updated 29 March 2012

  1. .PDF (2.2 MB)


Share this page:   

ISBN-10: 0738489433
ISBN-13: 9780738489438
IBM Form #: SG24-6898-01


Authors: Frank Kyne, Stephen Anania, Paola Bari, Gianmario Bescape, Jim Grauel, Hiram Neal, Andrew Sica, Bill Stillwell and David Viguers

    menu icon

    Abstract

    The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of this component is increasing, as is its importance in relation to system performance and availability. This IBM Redbooks document provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters.

    System Logger is an MVS component that provides a logging facility for applications running in a single-system or multi-system sysplex. The advantage of using System Logger is that the responsibility for tasks such as saving the log data (with the requested persistence), retrieving the data (potentially from any system in the sysplex), archiving the data, and expiring the data is removed from the creator of the log records. In addition, Logger provides the ability to have a single, merged, log, containing log data from multiple instances of an application within the sysplex.

    Table of Contents

    Chapter 1. Introduction to System Logger

    Chapter 2. System Logger fundamentals

    Chapter 3. DFSMStvs and Logger

    Chapter 4. IMS Common Queue Server and the System Logger

    Chapter 5. CICS and System Logger

    Chapter 6. Other Logger exploiters

    Chapter 7. Logger operations

    Chapter 8. System Logger performance and tuning

    Chapter 9. Disaster Recovery considerations

    Appendix A. Rebuilding the LOGR Policy

    Appendix B. Additional material

     

    Others who read this also read