• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Clamoring For Attention

    July 21, 2015 Ted Holt

    You know how to send a message to the system operator message queue. Here’s some code you can use when you need that message to stand out.

    Here’s the CL code.

    dcl  &Message   *char 434
    dcl  &Line1     *char  74  stg(*defined)  defvar(&Message   1)
    dcl  &Line2     *char  72  stg(*defined)  defvar(&Message  75)
    dcl  &Line3     *char  72  stg(*defined)  defvar(&Message 147)
    dcl  &Line4     *char  72  stg(*defined)  defvar(&Message 219)
    dcl  &Line5     *char  72  stg(*defined)  defvar(&Message 291)
    dcl  &Line6     *char  72  stg(*defined)  defvar(&Message 363)
    
    ChgVar &Line1 '  **************************************+
                     *********************************'
    ChgVar &Line2 '*'
    ChgVar &Line3 '*  Test message -- please ignore. '
    ChgVar &Line4 '*  More important information'
    ChgVar &Line5 '*'
    ChgVar &Line6 %sst(&Line1 3 72)
    ChgVar %sst(&Line2  71 1) '*'
    ChgVar %sst(&Line3  71 1) '*'
    ChgVar %sst(&Line4  71 1) '*'
    ChgVar %sst(&Line5  71 1) '*'
    
    SndPgmMsg  msg(&Message) tomsgq(qsysopr)
    

    Your message has six lines, cleverly named &LINE1 through &LINE6. Load whatever you like into them. Filling the last two lines, and the first and last characters of the other four lines, with asterisks really makes the message stand out.

    Message queue CHUCK not found.
    Journal receivers WXYZ00002 and *N detached.
    Service Agent is analyzing your system product activity log entries.
    From  . . . :   SOMEUSER          07/21/15   08:09:10
      ***********************************************************************
      *                                                                     *
      *  Test message -- please ignore.                                     *
      *  More important information                                         *
      *                                                                     *
      ***********************************************************************
    Log version QHST000011 in QSYS closed and should be saved.
    

    I recommend you use this technique sparingly. Remember the story of the boy who cried “Wolf!”

    I realize this technique doesn’t qualify as rocket science, but that’s OK. Rocket science doesn’t ship product.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Fresche Solutions

    ON-DEMAND SESSION

    Protecting Your IBM i Systems from Ransomware and Other Cyber Threats

    Zero-day attacks and ransomware threats are on the rise and data that resides on IBM i is not immune. Now is the time to learn how to defend it.

    Join Marcel Sarrasin, CPO, Fresche and Pauline Brazil Ayala, VP of Operations, Trinity Guard as they introduce you to TGSuite, the next generation of IBM i security tools and dive into IFS and network security to help you learn how to configure the defenses on your system and guard your valuable data.

    In the session, Pauline and Marcel will discuss:

    • What a secure system looks like in 2022
    • Cybersecurity and auditing, data-level reporting and job activity monitoring
    • Advanced exit point security – knowing and managing who has access to your IBM i
    • Setting up alerts on critical security events as they happen
    • Managing all your LPARs from one centralized web console

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    BCD:  IBM i Ebook: The Business Case for IBM i Green Screen Modernization
    SystemObjects:  Send SMS, email & push messages from your IBM i applications!
    LaserVault:  LIVE WEBINAR: Get Up to 75% Faster Backups & Restores. July 23

    Infor Delivers IBM i-Based Cloud ERP for Automakers, M3 Update IBM i Strategist Sets Priorities, Balances Resources

    Leave a Reply Cancel reply

Volume 15, Number 14 -- July 21, 2015
THIS ISSUE SPONSORED BY:

WorksRight Software
Robot
LaserVault

Table of Contents

  • Object Dependency Tracking In DB2 For i
  • Clamoring For Attention
  • How Much Temporary Storage Is In Use And Who Is Using It?

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Guild Mortgage Takes The 20-Year Option For Modernization
  • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
  • Guru: The Finer Points of Exit Points
  • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
  • We Still Want IBM i On The Impending Power E1050
  • DRV Brings More Automation to IBM i Message Monitoring
  • Managed Cloud Saves Money By Cutting System And People Overprovisioning
  • Multiple Security Vulnerabilities Patched on IBM i
  • Four Hundred Monitor, June 22
  • IBM i PTF Guide, Volume 24, Number 25

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2022 IT Jungle

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.