• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Let’s See Those Command Parameters

    August 31, 2005 Hey, Ted

    I have a CL program that builds a command in a variable, which it passes to QCMDEXC for execution. If I run the program in a job that logs CL program messages, the job log contains a nearly useless message that tells me that the “CALL command contains parameters.” Is there a way for me to make the system show me the CL command that is being executed?

    –Mitch

    I share your frustration, Mitch. I know of nothing in the operating system that would make the job log show the command that is being executed. If you have access to the source code, you can add something to display the contents of the variable. Here’s an example.

    dcl &cmd     *char 80                          
    dcl &cmdlen  *dec (15 5) value(80)             
    
    sndpgmmsg msg('CMD:' *bcat &cmd) topgmq(*same) 
    call qcmdexc (&cmd &cmdlen)                    
    

    I’ve used the Send Program Message (SNDPGMMSG) command to send a message to the program’s message queue. The job log will contain a message that shows you the value of the &CMD variable just before QCMDEXC gets hold of it. The job log will probably show you the variable’s value twice–once in the MSG parameter of SNDPGMMSG and then again as the contents of the message, which is redundant, but better than nothing at all.

    –Ted


    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    DataMystic Provides iSeries Data Transformation Services Valid Tech Delivers Biometric Authentication Solution for OS/400

    Leave a Reply Cancel reply

Volume 5, Number 33 -- August 31, 2005
THIS ISSUE
SPONSORED BY:

T.L. Ashford
Advanced Systems Concepts
COMMON

Table of Contents

  • Let’s See Those Command Parameters
  • Submit a Prompted Command to Batch
  • Admin Alert: Changing Your Mind When Loading Group PTFs

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41
  • Stacking Up Power11 Entry Server Performance To Older Iron
  • Big Blue Boosts IBM i Support In Instana, Adds Tracing
  • It Is Time To Tell Us What You Are Thinking And Doing
  • IBM i PTF Guide, Volume 27, Number 40
  • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle