Use this sample procedure to perform a destructive update,
which will delete the log stream and any existing data.
- Cause the exploiter to disconnect from the original-log-stream log
stream.
- Confirm that no connections remain to the log stream in the sysplex.
For example, you can issue the following system command:
DISPLAY LOGGER,L,LSN=original-log-stream
The
status will be AVAILABLE when there are no more connections.
- Delete the original-log-stream log stream from
the LOGR policy.
- Delete the original-structure structure from
the LOGR policy.
- Redefine the structure in the LOGR policy with the original-structure name
and attributes MAXBUFSIZE, AVGBUFSIZE, and LOGSNUM, as needed.
- Redefine the log stream in the LOGR policy with the original-log-stream name
and map it to the redefined original-structure structure.
- Cause the exploiter to connect to the newly defined original-log-stream log
stream.
- Confirm that the exploiter is connected on the expected z/OS images.
For example:
DISPLAY LOGGER,L,LSN=original-log-stream