• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Take Two: Where Did I Come From?

    May 4, 2005 Hey, Ted

    The “Where Did I Come From?” tip is a good article. To expand upon it, we sometimes have cases where a job was submitted to job queue A and then moved to job queue B. The QUSRJOBI API will then return job queue B. The joblog will just show CPC1129, “Job number/user/jobname changed by userprofile”. I don’t know of any way to retrieve the value of job queue A from within the active program, but there are a couple of ways of tracking its true origins.

    1. This is what we use. Turn on auditing for the *JOBQ object, like this:

    CHGOBJAUD OBJ(QUSRSYS/QBATCH) OBJTYPE(*JOBD) OBJAUD(*CHANGE)
    

    System value QAUDLVL must have the value *SECURITY, and QAUDCTL may need both *OBJAUD and *AUDLVL–I’m not sure if both are needed. This will cause entries to be put on the system audit journal, QAUDJRN, when a job is put into or removed from that job queue. The entry will be journal code T, entry type ZC. Access type 1 is adding a job to the queue, 17 is deleting or moving the job.

    Make a copy of file QSYS/QASYZCJ4 and dump the journal entries:

    DSPJRN QAUDJRN JRNCDE((T)) ENTTYP(ZC) OUTPUT(*OUTFILE)
                     OUTFILFMT(*TYPE4) OUTFILE(MyLib/CopyOfFile) 
    

    Then just query the file.

    2. Use the QIBM_QWT_JOBNOTIFY exit point, which writes to a data queue.

    Both methods must manually be set up whenever a new job queue is created (unless you attach a program to the CRTJOBQ command, I suppose). There may be other methods as well.

    Best wishes,

    –Ken

    There is another, more versatile way to determine which job queue an active job is running from.

    WRKUSRJOB USER(*ALL) JOBTYPE(*BATCH) ASTLVL(*BASIC)
    

    This command shows all active batch jobs grouped by job queue. It also shows all waiting jobs and what sequence they will run in.

    Keep up the good work!

    –Tim

    RELATED STORY

    Where Did I Come From?


    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Fresche Solutions

    ON-DEMAND SESSION

    Protecting Your IBM i Systems from Ransomware and Other Cyber Threats

    Zero-day attacks and ransomware threats are on the rise and data that resides on IBM i is not immune. Now is the time to learn how to defend it.

    Join Marcel Sarrasin, CPO, Fresche and Pauline Brazil Ayala, VP of Operations, Trinity Guard as they introduce you to TGSuite, the next generation of IBM i security tools and dive into IFS and network security to help you learn how to configure the defenses on your system and guard your valuable data.

    In the session, Pauline and Marcel will discuss:

    • What a secure system looks like in 2022
    • Cybersecurity and auditing, data-level reporting and job activity monitoring
    • Advanced exit point security – knowing and managing who has access to your IBM i
    • Setting up alerts on critical security events as they happen
    • Managing all your LPARs from one centralized web console

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Kisco Launches Spool File Distribution Software SSA Delivers New ERP LX Platform for iSeries

    Leave a Reply Cancel reply

Volume 5, Number 18 -- May 4, 2005
THIS ISSUE
SPONSORED BY:

iTera
WorksRight Software
Patrick Townsend & Associates

Table of Contents

  • Use Special Files to Access the IFS
  • Take Two: Where Did I Come From?
  • Admin Alert: Configuring i5/OS and a Windows Network Server for SSO

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power10 Entry Machines: The Power S1024 And Power L1024
  • Thoroughly Modern: Latest IT Trends – Bring Security, Speed, And Consistency To IT With Automation
  • Big Blue Unveils New Scalable VTL For IBM i
  • As I See It: Thank God It’s Thursday
  • IBM i PTF Guide, Volume 24, Number 32
  • JD Edwards Customers Face Support Decisions
  • Security, Automation, and Cloud Top Midrange IT Priorities, Study Says
  • Cleo and SrinSoft in Integration-Modernization Link Up
  • Four Hundred Monitor, August 3
  • IBM i PTF Guide, Volume 24, Number 31

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.