• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Monitoring for System Request Menu Option 2

    October 27, 2004 Hey, Ted

    As part of our Sarbanes-Oxley compliance requirements, I have to write a CL program that temporarily changes the user’s user profile. (Adopted authority is not appropriate in this case.) One concern I have is that the program may end without executing the code that undoes the temporary change. I can use a global Monitor Message (MONMSG) command to trap unexpected errors and prevent an abnormal termination, but I also need to prevent the user from canceling the program by taking option 2 of the System Request menu. Is there a way to disable that option?

    –Paul

    The options that are executed from the System Request menu are stored in message CPX2313 of message file QCPFMSG. There’s no reason why you can’t modify or override the message so that option 2 executes some command other than End Request (ENDRQS), but I don’t recommend it. Let me suggest another approach.

    If your program is a request-processing program, choosing option 2 from the System Request menu will cause your program to receive escape message CPF1907. By monitoring for this message, you will have complete control over the program and can handle the interruption as you please. Your request-processing program will also handle ENDRQS commands from called programs, unless they, too, are request-processing programs.

    To make a program process requests, include the following commands.

    sndpgmmsg msg('Request msg') topgmq(*ext) msgtype(*rqs)
    rcvmsg    pgmq(*ext) msgtype(*rqs) rmv(*no)
    

    There’s nothing magical about the contents of the MSG parameter in the SNDPGMMSG command. I use something that can’t be mistaken for a real command.

    Put the messages at the top of the program, after the global MONMSG. In this way, you will be setting the program to trap the ENDRQS command from the start.


    Here’s a short program by way of example. I hope it helps.

    pgm
    
    monmsg cpf0000 exec(goto CleanUp)
    
    sndpgmmsg msg('Rqs msg') topgmq(*ext) msgtype(*rqs) 
    rcvmsg pgmq(*ext) msgtype(*rqs) rmv(*no)
    
    call SecPgm1 
    call SecPgm2
    
    CleanUp: 
    /* clean up processing goes here */
    endpgm
    

    To learn more about request-processing procedures and programs, see the CL Programming manual at IBM’s iSeries Information Center.

    –Ted

    Click here to contact Ted Holt by e-mail.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Focal Point Solutions Group

    Comprehensive Data Protection from Focal Point SG

    Your organization needs to be thinking differently about your backup & disaster recovery strategy

    Concerns of the Industry

    • Inefficient manual backup processes
    • Effectively storing data offsite
    • Developing and testing a concrete disaster recovery plan
    • Efficient access to data in a disaster scenario for necessary users
    • Risk of cyber security attack
    • Declining IT staff and resources

    The true cause of the above concerns is an organization’s status quo – 80% of IBM i users currently backup to tape and 40% of companies have no DR plan at all. Don’t wait for a disaster to take action.

    The new way to ensure cost-effective safety

    • Automated cloud backup
    • Two (2) remote sites – redundant storage, power, internet pipe, firewalls, etc.
    • Data encryption at all times – in-flight and at-rest
    • Fully managed remote hardware DR, including remote VPN access for necessary users
    • Regularly simulated phishing tests and cyber security training

    Potential “landmines” in solutions to avoid

    • Single point of storage – no redundancy
    • Misleading data analysis, compression/de-dup ratios, sizing of necessary computer resources for backup and DR
    • Large-scale cloud storage with difficult recovery
    • Inability to meet RTO/RPO

    Don’t get caught like the many organizations we’ve seen with inefficient exposed backup data and no DR plan!

    What VAULT400 has to offer

    Backup

    • Native software agent schedules backups to the Focal Point SG cloud based on your retention scheme
    • Client data is backed up to two data centers in US or two data centers in Canada
    • 256-bit AES encryption in-flight and at rest – only the client has the encryption key
    • Detailed data analysis to ensure proper sizing

    Disaster Recovery as a Service (DRaaS)

    • Focal Point SG provides “hands-off” DR – fully managed recovery
    • 60 days of remote VPN access available to unlimited users in event of a disaster
    • Documented reports to ensure defined SLAs are met

    Managed Service Cyber Security Training

    • Fully managed phishing tests
    • Detailed reporting of results
    • Fully managed administration of custom online cyber security training

    VAULT400 Cloud Backup & DRaaS is an IBM Server Proven Solution.

    VAULT400.com/proposal for FREE analysis & proposal

    813.513.7402 | ContactUs@FocalPointSg.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    New BOSaNOVA Tool Integrates iSeries Data with Windows, Office iSeries High Availability Should Be Integrated and Invisible

    Leave a Reply Cancel reply

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM i Has a Future ‘If Kept Up To Date,’ IDC Says
  • When You Need Us, We Are Ready To Do Grunt Work
  • Generative AI: Coming to an ERP Near You
  • Four Hundred Monitor, March 22
  • IBM i PTF Guide, Volume 25, Number 12
  • Unattended IBM i Operations Continue Upward Climb
  • VS Code Is The Full Stack IDE For IBM i
  • Domino Runs on IBM i 7.5, But HCL Still Working on Power10
  • Four Hundred Monitor, March 6
  • IBM i PTF Guide, Volume 25, Number 11

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle