View previous topic :: View next topic |
Author |
Message |
arunmr4 Beginner
Joined: 19 Dec 2005 Posts: 23 Topics: 8
|
Posted: Tue Jan 30, 2007 8:03 am Post subject: Confirming if a list of program are unreferenced |
|
|
Hi,
During a conversion project we came with the list of unreferenced programs in the application. We used relativity workbench (a legacy application modernization tool) to come up with this list. We want to double check the correctness of this list before removing the programs from the application. Can anyone suggest a foolproof method to confirm that the programs are really unreferenced and it is safe to remove them?
Regards,
Arun |
|
Back to top |
|
 |
arunmr4 Beginner
Joined: 19 Dec 2005 Posts: 23 Topics: 8
|
Posted: Tue Jan 30, 2007 8:56 am Post subject: |
|
|
Hi,
Since these are unreferenced (not invoked anywhere)it is not possible to test them. I was asking for a easy way to confirm the list we have. Also, list comes to around 400 programs.
Thanks,
Arun |
|
Back to top |
|
 |
semigeezer Supermod
Joined: 03 Jan 2003 Posts: 1014 Topics: 13 Location: Atlantis
|
Posted: Tue Jan 30, 2007 9:06 am Post subject: |
|
|
Get a program that is designed to do this. SoftAudit, for example, monitors program load activity (load modules) and tells you what was actually used. Of course, even this will not catch the case where a program would only get invoked in unusual circumstances such as once a year at year-end, or during a particular type if crisis such as I/O errors, system intrusion, etc. |
|
Back to top |
|
 |
dbzTHEdinosauer Supermod
Joined: 20 Oct 2006 Posts: 1411 Topics: 26 Location: germany
|
Posted: Tue Jan 30, 2007 9:11 am Post subject: |
|
|
Not knowing what your modernization tool uses for input? - JCL/Proc libraries
- pgm source list analysis which will resolve any and all dynamic CALLs (e.g. pgm name read from a file, level 88 values,)
- JES archive
- program documentation???
- talking with customer support personnel
can't say. But if you have gone thru all the above, delete them. Suggest that you have a very well designed retrieval system when you do remove them and encounter suprises in the future. _________________ Dick Brenholtz
American living in Varel, Germany |
|
Back to top |
|
 |
Bill Dennis Advanced

Joined: 03 Dec 2002 Posts: 579 Topics: 1 Location: Iowa, USA
|
Posted: Tue Jan 30, 2007 9:20 am Post subject: |
|
|
SMF "step end" records can show programs that were directly invoked via jcl PGM=XXXXX, but not called subroutines or online programs (CICS, etc.).
I second Dick's suggestion to be ready to replace them quickly. _________________ Regards,
Bill Dennis
Disclaimer: My comments on this foorum are my own and do not represent the opinions or suggestions of any other person or business entity. |
|
Back to top |
|
 |
arunmr4 Beginner
Joined: 19 Dec 2005 Posts: 23 Topics: 8
|
Posted: Tue Jan 30, 2007 11:09 am Post subject: |
|
|
Hi,
As semigeezer said we will go with the soft audit report even though it might not be foolproof as there seems to be no other go.
Thanks a lot guys,
Regards,
Arun |
|
Back to top |
|
 |
|
|