External Events – Power Virtual User Group

Session 105: Everything You Need to Know About IBM i Administration Runtime Expert

  • 21 April 2021, 14:00-15:30 UK time (BST)
  • Speaker: Dawn May, IBM i Consultant, and Technical Expert
  • Business-critical applications must be up and running reliably without failure. When something unexpected occurs, you must identify the cause and correct it quickly. We all want to find ways to make our jobs easier, and unexpected surprises are not fun. The relentless push to do “more with less” is going to intensify while the tolerance for failure keeps dropping.  Yet identifying points of failure can be tricky as complexities scale.IBM i offers a free product that helps ascertain application and infrastructure health. The IBM Administration Runtime Expert for i (ARE) can be used to define attributes of a healthy environment and use those defined attributes to validate that the environment is as expected.  This session covers everything you need to know about ARE, including examples such as:
    • Ensure a test environment is the same as production for software installed and object levels
    • Identify what changed to cause an unexpected application failure
    • Validate multiple partitions are consistent in their configurations
    • Verify user profiles are consistent across all partitions
    • Check that PTF levels are the same across all partitions for a particular release
    • Create custom plug-ins to extend the base ARE functionality
  • Relevant for IBM i environments

Daily news about IBM AIX

  • AIX 7.2 on QEMU, virtio drivers
    by krackout21 on 2025-03-25 at 05:42

    I’m also trying to switch from spapr-vscsi & spapr-vlan devices to virtio. (There’s only one NIC on the vm, but have the same result with spapr-vlan enabled, in which case networking works fine)

  • perl binary on AIX shows relative paths in ldd output
    by tseeling on 2025-03-25 at 05:42

    If set to a static default like the offending (and imho insecure!) relative paths are no longer shown and works correctly. Update: I can block this behaviour by explicitly setting the variable which controls the order of searching and loading dynamic libraries (this is like on Linux).

  • IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution – GBHackers
    on 2025-03-20 at 18:55

    Free Webinar – Supply Chain Attack PreventionRecent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.Discussion points Meeting PCI DSS 4.0 mandates. Blocking malicious components and unauthorized JavaScript execution. PIdentifying attack surfaces from third-party dependencies. Preventing man-in-the-browser attacks with proactive monitoring.

  • Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems
    on 2025-03-20 at 18:55

    Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution. CVE-2024-56346 (CVSS score: 10.0) – An improper access control vulnerability that could permit a remote attacker to execute arbitrary commands via the AIX nimesis NIM master service

  • Serious security vulnerabilities threaten IBM AIX server operating system | heise online
    on 2025-03-20 at 18:55

    According to an article, IBM License Metric Tool v9 can be attacked via several security vulnerabilities. In a warning message, IBM’s developers state that they have closed two “critical” security gaps (CVE-202456346, CVE-2024-56347) in the AIX server operating system.

Displaying foreign key constraints using SQL

foreign key information using sql

I was asked:

What about referenced tables when you specify a foreign key when creating a table? I can check this when I run DSPFD, it is in Parent File Description but I still can’t find an SQL to elaborate all tables in our Application.

I have to admit this one took me some time to find the information I need to provide the example in this post.

A foreign key is one of the many constraints that can be used with Db2 for i tables and DDS files. Doing a quick search of the IBM KnowledgeCenter I found the following:

  • SYSCST:  Every constraint, can be considered the “header” file for constraints
  • SYSCSTCOL:  Columns upon which the constraints have been defined
  • SYSCSTDEP:  Tables upon which the constrains have been defined
  • SYSKEYCST:  Every unique, primary, and foreign key that has been defined
  • SYSREFCST:  Foreign keys that have been defined

Read more »

Verified by MonsterInsights