Log
Reporter And Statistical System
This
set of programs will gather sumlog information and produce statistical
reports. The first program will extract information from the sumlog
and build a data base with this data. This data base may be updated
with new sumlog data at regular intervals. The data base would contain
selected information based upon report needs. The report program
will print various reports based on input specifications.
LOG/EXTRACT
is the program that reads the sumlog files and builds the data base
with data based on the input specifications. LOG/REPORT is the reporting
program that takes input specifications, reads the data base, and
produces a report or reports.
Program
Resource Statistics
EOJ
and EOT information is used to report on all programs within the
time limits of the sumlog information. Reports may contain number
of occurrences of programs run as well as processor usage, I/O usage,
ready queue usage, lines printed, and elapsed time. In addition,
programs may be grouped by categories as you choose. Currently there
are four category classifications. Programs may be related to any
of the categories. The last category is used to group all programs
not assigned to one of the other categories.
Example
files containing the customized report headings, billing specifications,
and file specifications for the category classifications are included.
A sample WFL job is included. It contains examples of execution
specifications.
Sorting
of report information may be done by any report category, such as
number of occurrences, CPU time, or I/O time.
Features
1.
The ability to gather resource statistics of every program execution
on the computer system.
2.
The ability to report the resource usage of each program and establish
a data base of these statistics.
3.
The ability to combine groups of programs by function and present
totals of their usage. The current groups include:
1.
System programs
2.
External programs
3.
Internal programs
4.
Overhead programs
4. The ability to sort reports by any report category.
Billing
Module
This
is the portion where you assign a value in dollars and cents to
one or more resources that programs use when they execute on your
computer. This may be added to disk storage information to assign
values to what computer resources individuals or groups of individuals
are using. The information may be used internally for office use
or budgeting or it may be used for billing the users of your computer.
Users may be grouped by usercode or by other means that you choose.
Security
Module
When
security is selected all security information that is stored in
the log will be reported. There are system options which determine
which and how much information is written to the system sumlog.
After you select your customized security options, then the log
extract program will build the data base with this information in
it. The log report program will then be able to produce security
reports. These reports are helpful for security auditors.
Security
information available includes the following:
1.
Security log-on errors.
2.
Userdata file modifications.
3.
Files that are created, removed, and renamed.
4.
Databases that are opened and closed.
5.
Coms configuration file changes.
6.
Security attribute changes.
7.
Data Communications configuration changes.
8.
Logging option changes.