• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Access the Database from Qshell

    November 15, 2002 Timothy Prickett Morgan

    Hey, Ted:

    Qshell does a good job when it comes to accessing data in source physical file members and IFS files, but I need to access a database file from a Qshell script. Is that possible?

    — Mike

    IBM provides an undocumented utility called db2 that can execute SQL commands against the database.

    It’s one of those “use it at your own risk” things.

    The following command displays all the records from the COMPANIES file in library mylib.





    db2 "select * from mylib.companies"
    

    Qshell responds with this output.

    COMPANY  COMPNAME
    -------- -------------------------
       1     Leroy's Livery Stable
       2     Pete's Pet Shoppe
    
      2 RECORD(S) SELECTED.
    

    Here’s another example. This time I retrieve the company name only, and just for the company whose number is stored in Qshell variable company.

    db2 "select compname from mylib.companies where company = $company"
    

    I enclosed the SQL command with double quotes (“) so that Qshell would interpret the company variable. If company has a value of 2, this is the output.

    COMPNAME
    -------------------------
    Pete's Pet Shoppe
    
      1 RECORD(S) SELECTED.
    

    Now I will pull out just the company name and load it into variable companyname.

    companyname=$(db2 "select compname from mylib.companies where company = 
         $company" | sed -n '/--/{n; p;}')  
    

    Even though that code wraps on your screen, it is all one line. The sed command looks for a line with two dashes (–). When it finds one, it reads and prints the following record. The $( ) characters surrounding the db2 and sed commands make Qshell redirect the output from the screen into the variable.

    You can run other SQL commands besides select. I have used the db2 utility to create tables and insert data into them. Here are a few more examples. They are all one-liners, but may wrap on your browser screen.

    db2 "update mylib.companies set compname='Lizzy''s Livery Stable' 
         where company = 1"
    
    db2 "delete from mylib.companies where company = 1"
    
    db2 "insert into mylib.companies values(3, 'Jack''s Java Palace')"
    

    I want to point out two important aspects.

    First, the table names must be qualified in *SQL format. IBM tells me that the *SYS format is not supported, and I have not been able to get the db2 utility to access the library list.

    Second, if an SQL command contains single quotes (‘), enclose the SQL command in double quotes and double the single quotes where they are to be included as part of a data value.

    For more information, see IBM’s “Qshell, Perl, and DB2 UDB for iSeries–DB2 Universal Database” Web page.

    — Ted

    Sponsored By
    ADVANCED SYSTEMS CONCEPTS

    Business Analytics
    – Practical –
    – Cost Effective –
    – Easy to Deploy –

    SEQUEL FYI

    User Quote:
    “I love SEQUEL FYI because it lets me look at the data any way I need to see it, instantly. This is the easiest tool to manage complex product relationships that I have ever seen.”

    SEQUEL FYI offers outstanding OLAP business intelligence functionality for a fraction of the cost of comparable solutions.

    Read More > View Streaming Video

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mgo_rc, Volume 2, Number 88 -- November 15, 2002

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Compiler Directives for RPG Programs and Modules Reader Feedback and Insights: Thanks for Qshell Tips

    Leave a Reply Cancel reply

MGO Volume: 2 Issue: 88

This Issue Sponsored By

    Table of Contents

    • Reader Feedback and Insights: Indicators in RPG II Programs
    • Access the Database from Qshell
    • Data Structure Parameters in RPG Prototypes

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
    • Three Things For IBM i Shops To Consider About DevSecOps
    • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
    • As I See It: Retirement Challenges
    • IBM i PTF Guide, Volume 27, Number 41
    • Stacking Up Power11 Entry Server Performance To Older Iron
    • Big Blue Boosts IBM i Support In Instana, Adds Tracing
    • It Is Time To Tell Us What You Are Thinking And Doing
    • IBM i PTF Guide, Volume 27, Number 40
    • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle