Detecting risky SQL and enforcing SQL standards


Related topics

Use cases 

By enforcing SQL Assurance rules, you can identify problematic SQL statements early in the development lifecycle. This reduces the likelihood of performance issues in production and supports shift-left practices in mainframe DevOps.

The benefits include:

  • Performance issues are caught early, reducing production incidents
  • Application developers receive immediate feedback on SQL quality
  • CI/CD pipelines enforce SQL standards automatically
  • Compliance and audit readiness are improved

Workflow for detecting risky SQL and enforcing SQL standards

TaskProductRoleActionReference
1Time Sharing Option/Extension editor (TSO/E editor)Db2 DBACopy sample SQL rule set and define your custom SQL rule set to use in the SQL evaluationCustomizing expert rules
2Jenkins, Azure DevOps, GitHub Actions, or GitLab CI/CDCI/CD Pipeline EngineerConfigure project or pipeline to trigger SQL evaluationQuick start to SQL Risk Detection
3BMC AMI SQL Assurance for Db2Application DeveloperDefine SQL input details for evaluationUsing Jenkins UI or UC YAML configuration and pipeline files:
4BMC AMI SQL Assurance for Db2Application DeveloperReview project or pipeline console log resultsReviewing project/pipeline results:
5BMC AMI SQL Assurance for Db2 or BMC AMI Command Center for Db2Application Developer, Db2 DBAReview SQL rule violations in SQL Assurance report or Command Center Violations viewReviewing SQL violations:

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC AMI SQL Assurance for Db2 13.1