Log Reporter And Statistical System

This set of programs will gather sumlog information and produce statistical reports. The first program will extract information from the sumlog and build a data base with this data. This data base may be updated with new sumlog data at regular intervals. The data base would contain selected information based upon report needs. The report program will print various reports based on input specifications.

LOG/EXTRACT is the program that reads the sumlog files and builds the data base with data based on the input specifications. LOG/REPORT is the reporting program that takes input specifications, reads the data base, and produces a report or reports.

Program Resource Statistics

EOJ and EOT information is used to report on all programs within the time limits of the sumlog information. Reports may contain number of occurrences of programs run as well as processor usage, I/O usage, ready queue usage, lines printed, and elapsed time. In addition, programs may be grouped by categories as you choose. Currently there are four category classifications. Programs may be related to any of the categories. The last category is used to group all programs not assigned to one of the other categories.

Example files containing the customized report headings, billing specifications, and file specifications for the category classifications are included. A sample WFL job is included. It contains examples of execution specifications.

Sorting of report information may be done by any report category, such as number of occurrences, CPU time, or I/O time.


1. The ability to gather resource statistics of every program execution on the computer system.

2. The ability to report the resource usage of each program and establish a data base of these statistics.

3. The ability to combine groups of programs by function and present totals of their usage. The current groups include:

1. System programs

2. External programs

3. Internal programs

4. Overhead programs
4. The ability to sort reports by any report category.

Billing Module

This is the portion where you assign a value in dollars and cents to one or more resources that programs use when they execute on your computer. This may be added to disk storage information to assign values to what computer resources individuals or groups of individuals are using. The information may be used internally for office use or budgeting or it may be used for billing the users of your computer. Users may be grouped by usercode or by other means that you choose.

Security Module

When security is selected all security information that is stored in the log will be reported. There are system options which determine which and how much information is written to the system sumlog. After you select your customized security options, then the log extract program will build the data base with this information in it. The log report program will then be able to produce security reports. These reports are helpful for security auditors.

Security information available includes the following:

1. Security log-on errors.

2. Userdata file modifications.

3. Files that are created, removed, and renamed.

4. Databases that are opened and closed.

5. Coms configuration file changes.

6. Security attribute changes.

7. Data Communications configuration changes.

8. Logging option changes.

Copyright 2003© Integrity Services, Inc. All rights reserved