Viewing active security request recordings

A security request recording is started from the Regions view. The Security Request Recordings (SRR) view is used to identify currently running recordings.

Before you begin

You must have configured SRR in CICS. For more information, see Configuring security request recording (SRR).

Procedure

The Security Request Recordings view is used by the support person to identify when the recording that they started is ready for processing.

Active SRR entries are shown along with a sample of some key fields. In addition to these fields, the Maximum and Current® values are shown.

Maximum is the number that identifies ho many matches are needed before the SRR stops recording.

Count indicates how many times that a recording matched the selection criteria that were selected when the SRR was submitted.

If Count has a nonzero value, a system programmer can then start to review the recording for possible issues. You might run a recording again and use more specific criteria to capture the information you need.

Figure 1 shows three recordings that are submitted by using a single SRR submission. The region IYCWENW1 has data that matches the criteria for the recording.

Figure 1. Active SRR entries with one match
Active SRR entries with one match

You can remove a security request recording by selecting Remove from the menu.

You might want to modify a security request recording. For example, if a request is not captured when a user retries a problem you might want to change the origin point information . This amendment can be done by selecting Open on the menu and changing the attributes. Before you make a change, it is necessary to set Maximum to 0 and saving the request to deactivate the recording. You then change the origin data, set a new Maximum value, and save to reactivate the recording.

For more information about how to use Security Request Recording, see How security request recording can help diagnose security access issues.