Solved

ODBC Connections

Posted on 2007-12-04
2
1,150 Views
Last Modified: 2012-08-14
Greetings,

When I have determined that when I do a WRKACTJOB I can see ODBC Connections because they look like the following.
         
 Opt  Subsystem/Job  User        Type  CPU %  Function        Status            
        QZDASOINIT   QUSER       PJ       .0                   TIMW            
        QZDASOINIT   QUSER       PJ       .0                   TIMW            

In order to find the "User" whos connection one of those jobs belongs to, I have to do a 5 (work with job) and then 10 "Display Job log"
Then I get the IP address and from that go to our network guys and ask them whos computer it is.

Our users sign in with their own Username and password..  
Is there ANY way to get that to show up under the "User" column? instead of QUser?
If I cant do that, does anyone know of a report I could run that would show me active ODBC connections and the username and IP address?  
We do also have a product called Standguard, but I am unsure on how to use it. I know that product can be used to block access but I have a feeling that after it was installed, everything was left wide open..  The person in "Charge" of it quit about a month ago.
0
Comment
Question by:ScottParker
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 4

Accepted Solution

by:
rward earned 500 total points
ID: 20404863
Brian Dietz has a freeware utility called WRKODBCJOB that will do what you want.  You can find it at http://home.columbus.rr.com/jbmmdietz/wrkodbcjob.html
0
 
LVL 3

Author Closing Comment

by:ScottParker
ID: 31412630
Just what I was looking for.. Thanks.
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
AS400 CPU allocation 3 123
iBM i DB2 Administration Training 6 117
iSeries email authority 6 110
Using the QLIRLIBD 2 38
A lot of things can happen during a presentation, worst of which is “death by PowerPoint.” Here are a few mistakes to avoid to make your slides clean.
When using a search centre, I'm going to show you how to configure Sharepoint's search to only return results from the current site collection. Very useful when using Office 365 with multiple site collections.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question