TECHNICAL FIELDThe present invention relates to reviewing ETL code, and more particularly to validating ETL code to accelerate review of ETL projects.
BACKGROUNDETL projects involve complex logic and a large number of jobs and other objects. For example, each project may include100 to1000 jobs and other objects. Effective and quality delivery demands disciplined coding. Software developers drawing from different experiences may generate undisciplined coding of low quality. Low quality code has defects and experiences malfunctions, which leads to increased cost and time requirements to rework the code to fix the defects. In the long run, low quality code leads to a lower client confidence in the developers' ability to deliver quality code, which impacts the reputation of the developers. For any project, code quality standards are set before development activities start. The standards specify how to name objects, the best coding practices to be followed, etc. Low quality code still results when developers do not comply with the standards. Not complying with the standards may result from various reasons, including the lack of experience of a developer, the developer being unaware of the relevance of a particular standard and its impact, and/or overlooking a standard by mistake. Overlooking a standard is the most common source of non-compliance with the standards because it is easy for a developer to miss one of the hundreds of standards that may be set for a particular project. Known techniques for addressing non-compliance with the standards are reviews (e.g., peer reviews, group reviews, etc.). Reviews in ETL projects are mostly manual processes. Manual reviews of hundreds of standards are time consuming processes and can be difficult to execute in ETL projects with aggressive timelines. Even if manual reviews are done, reviewers can make mistakes similar to the developers by overlooking some of the standards. With only manual reviews in place, it is difficult to assure a 100% adherence to standards and the quality of deliverables is always at risk.
BRIEF SUMMARYIn a first embodiment, the present invention provides a method of validating code for an extract, transform and load (ETL) tool. The method includes responsive to a receipt of naming, coding, and performance standards for the code of the ETL tool and an export of the code to a job definition file, a computer parsing the code of the ETL tool in the job definition file. The method further includes the computer determining violations of the naming, coding, and performance standards in part by determining the parsed code does not match the naming, coding, and performance standards. The method further includes the computer generating a report which identifies the violations. The method further includes, based at least in part on a review of the report and a rework of the code to comply with the naming, coding and performance standards and responsive to an export of the reworked code to another job definition file, the computer parsing the reworked code in the other job definition file, determining that the parsed reworked code does not include the violations of the naming, coding and performance standards, and generating a second report that indicates that the reworked code does not include the violations.
In a second embodiment, the present invention provides a computer system including a central processing unit (CPU); a memory coupled to the CPU; and a computer-readable storage device coupled to the CPU. The storage device includes instructions that are executed by the CPU via the memory to implement a method of validating code for an extract, transform and load (ETL) tool. The method includes responsive to a receipt of naming, coding, and performance standards for the code of the ETL tool and an export of the code to a job definition file, the computer system parsing the code of the ETL tool in the job definition file. The method further includes the computer system determining violations of the naming, coding, and performance standards in part by determining the parsed code does not match the naming, coding, and performance standards. The method further includes the computer system generating a report which identifies the violations. The method further includes, based at least in part on a review of the report and a rework of the code to comply with the naming, coding and performance standards and responsive to an export of the reworked code to another job definition file, the computer system parsing the reworked code in the other job definition file, determining that the parsed reworked code does not include the violations of the naming, coding and performance standards, and generating a second report that indicates that the reworked code does not include the violations.
In a third embodiment, the present invention provides a computer program product including a computer-readable storage device and a computer-readable program code stored in the computer-readable storage device. The computer-readable program code includes instructions that are executed by a central processing unit (CPU) of a computer system to implement a method of validating code for an extract, transform and load (ETL) tool. The method includes responsive to a receipt of naming, coding, and performance standards for the code of the ETL tool and an export of the code to a job definition file, the computer system parsing the code of the ETL tool in the job definition file. The method includes the computer system determining violations of the naming, coding, and performance standards in part by determining the parsed code does not match the naming, coding, and performance standards. The method further includes the computer system generating a report which identifies the violations. The method further includes, based at least in part on a review of the report and a rework of the code to comply with the naming, coding and performance standards and responsive to an export of the reworked code to another job definition file, the computer system parsing the reworked code in the other job definition file, determining that the parsed reworked code does not include the violations of the naming, coding and performance standards, and generating a second report that indicates that the reworked code does not include the violations.
Embodiments of the present invention provide a tool named “Validation Script” that automatically validates ETL code based on naming, coding, and performance standards and reports violations of the standards, which facilitates effective review of the code in less time. The Validation Script tool described herein facilitates the generation of high quality, disciplined coding for an ETL tool, and traps most code issues before code is delivered from the development environment, thereby decreasing costs involved in reworking code to fix code defects. The reporting of violations includes indicators (e.g., red highlights of standards violations) that allow even non-technical managers to easily monitor the quality of code of an ETL tool. The report also lists configuration details of different objects in a categorized and formatted manner, making the reports detailed and exhaustive. The reports generated will even allow technical experts (who do not have access to the code) to complete a detailed review of the code. Embodiments of the present invention provide processes for an automatic review and a partially manual review of ETL code. The automatic review can provide a 100% savings on review efforts and the partially manual review can provide at least a 50-60% savings on review efforts.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a block diagram of a system for validating code of an ETL tool, in accordance with embodiments of the present invention.
FIG. 2 is a flowchart of a process of validating code of an ETL tool, where the process is implemented in the system ofFIG. 1, in accordance with embodiments of the present invention.
FIG. 3 depicts an exemplary portion of a report summarizing violations of standards determined by the process ofFIG. 2, where the report is generated by the system ofFIG. 1, in accordance with embodiments of the present invention.
FIG. 4 is an exemplary portion of a report indicating hardcoding violations determined by the process ofFIG. 2, where the report is generated by the system ofFIG. 1, in accordance with embodiments of the present invention.
FIG. 5 is an exemplary portion of a report indicating standards violations determined by the process ofFIG. 2, where the report is generated by the system ofFIG. 1, in accordance with embodiments of the present invention.
FIG. 6 is a block diagram of a computer that is included in the system ofFIG. 1 and that implements the process ofFIG. 2, in accordance with embodiments of the present invention.
DETAILED DESCRIPTIONOverviewEmbodiments of the present invention provide automated validation of code in an ETL tool, where the validation is based on determinations of whether the code adheres to predetermined naming, coding and performance standards. The tool “Validation Script” is employed by ETL projects as a review accelerator to determine whether objects developed for the ETL projects adhere to standards and to generate a well-formatted report that indicates which objects adhere to the standards and which objects violate the standards. In one embodiment, the ETL tool that works with Validation Script is IBM® DataStage® , which is an ETL tool offered by International Business Machines Corporation located in Armonk, N.Y. IBM and DataStage are United States registered trademarks of International Business Machines Corporation. Embodiments of the present invention also include a unique “Release Process” with the method described herein, giving a highly robust quality checkpoint for any ETL project.
System for Validating Code of an ETL ToolFIG. 1 is a block diagram of asystem100 for validating code of an ETL tool, in accordance with embodiments of the present invention.System100 includes acomputer102, which executes a software-based validation tool104 (i.e., Validation Script), which is employed by projects using a software-based ETL tool (not shown) that is executed bycomputer102. In one embodiment,validation tool104 is employed by ETL projects using the DataStage ETL tool.
Validation tool104 receivesETL code106 in a job definition file which specifies code and attributes of code that includes jobs and other objects of an ETL project. In one embodiment, the job definition file is a flat file in DataStage® Export (DSX) format.Validation tool104 retrieves naming, coding, and performance standards which are stored in adata store108 and determines whetherETL code106 complies with the standards.
The naming standards stored indata store108 identify valid names in an ETL project, including valid names for jobs, sequences and other objects, parameters and parameter sets, stage variables, and links in jobs and sequences. The performance standards stored indata store108 enforce (1) limits on usage of expensive stages, including aggregators, sort stages, and transformers; (2) limits on expensive operations, including inline sorting, repartitioning, database read/write operations, and file read/write operations; (3) effectiveness of the performance of queries, including prohibiting select * or select count(*) and enforcing efficient array size and commit count. Annotations standards stored indata store108 require jobs and sequences to be well annotated. Partitioning-related standards stored indata store108 prohibit usage of auto partitioning. Parameter constraints configured invalidation tool104 enforce certain parameters to be present or not present on jobs, and enforce standards on the default values specified for parameters. Job activity parameter constraints configured invalidation tool104 enforce standards on values passed to jobs from a sequence job. Other standards stored indata store108 require: (1) file paths begin with a root path defined at the project level, and (2) surrogate keys are generated in Surrogate Key Generator (SKG) stages and not in Transformer stages.
Validation tool104 generates avalidation report110, which includes at least: (1) a summary of a validation of each the jobs and other objects specified byETL code106, (2) hardcoding present in the jobs and other objects specified byETL code106, and (3) standards violations present in the jobs and other objects specified byETL code106. Examples of portions ofvalidation report110 that include the summary of the validation, the hardcoding, and the standards violations are depicted inFIG. 3,FIG. 4 andFIG. 5, respectively.
The aforementioned summary of the validation includes a list of jobs and other objects specified byETL code106. The list of jobs and other objects may be grouped into categories, such as parallel jobs, shared containers, sequence jobs, routines, custom stages, parameter sets, table definitions, etc. The summary includes object-specific information for each job or other object. The object-specific information includes counts of violations for each object, including a count of the number of instances of hardcoding in an object and a count of the number of standards violations included in the object. In one embodiment, the object-specific information includes one or more of: a count of stages, a count of parameters, a count of aggregators, a count of transformers, a count of re-partitioning methods, a count of sorts, a count of annotations, a count of database read/write operations, and a count of file read/write operations.
For example, for each parallel job, the object-specific information includes: (1) date the object was modified, (2) time the object was modified, (3) whether multiple invocations of the same job can be run simultaneously, (4) whether runtime column propagation (RCP) is enabled, (5) whether an after job subroutine is present, (6) whether a before job subroutine is present, (7) stage count, (8) parameter count, (9) aggregator count, (10) transformer count, (11) re-partitioning count, (12) sort count, (13) annotation count, (14) database read/write count, (15) file read/write count, (16) hardcoding count, (17) standards violation count, and (18) job folder of the job.
Validation tool104 determines whether the count of an item specified by the object-specific information exceeds a predetermined threshold value stored indata store108. If the count exceeds the threshold value,validation report110 includes a red colored background or other indicator for the count to indicate a violation of standards stored indata store108. Furthermore, ifvalidation tool104 determines that any count of an item of an object exceeds the corresponding threshold value, thenvalidation report110 includes a red colored background or other indicator for the name of the object. Ifvalidation tool104 determines that the counts of all items for an object do not exceed the corresponding threshold values, thenvalidation report110 depicts the object without red colored background and any other indicator of a violation to indicate that the object adheres to all naming, coding, and performance standards stored indata store108. A reviewer studiesvalidation report110 to find which objects have and which objects do not have a red colored background or other indication of a standard violation. In this way, the report gives a complete picture on the quality of the code being delivered
For example, ifvalidation tool104 receives a threshold value of zero for standards violations and determines that the number of standards violations for object XYZ is four, thenvalidation report110 includes the standards violation count of four with a red background to indicate that four exceeds the threshold value of zero, and includes the name “XYZ” with a red background to indicate that there is at least one violation associated with object XYZ. As another example, ifvalidation tool104 receives a threshold value of one for the transformer count and subsequently determines that object XYZ includes two transformers, thenvalidation tool104 generatesvalidation report110 to include the count of two transformers with a red background to indicate that transformer count of two exceeds the threshold value of one.
The aforementioned hardcoding portion ofvalidation report110 includes a list of all hardcoding present in theETL code106, which includes a line number in the job definition file (e.g., DSX line number), object type, object name, stage name, error description, thestring validation tool104 searched for inETL code106 to determine hardcoding is present, and the line in the job definition file (e.g., DSX line).
The aforementioned standards violation portion ofvalidation report110 includes a list of all violations of the standards stored indata store108, which includes object name, object type, stage name, stage type, and type and description of the violation. For a violation of a naming standard, the list of violations includes the current, non-compliant name of the object along with the expected name of the object which complies with the naming standard.
Validation report110 may also include one or more of: (1) a list of parameters, defined on jobs and routines specified byETL code106, (2) files used in parallel jobs specified byETL code106, (3) queries in all the parallel jobs specified byETL code106, (4) job activities in every sequence specified byETL code106, (5) a list of after and before subroutines of every parallel job specified byETL code106, (6) a list of details of email activities for every sequence specified byETL code106, (7) a list of expressions from transformers where direct mapping is not present, and (8) job change history. The list of these sheets will grow in next versions of the tool making review easier and complete.
In one embodiment, validation tool104 (seeFIG. 1) is implemented as a multi-worksheet workbook of a spreadsheet application program, such as Microsoft® Excel® offered by Microsoft Corporation located in Redmond, Wash. Microsoft and Excel are registered trademarks of Microsoft Corporation in the United States and other countries.
The functionality of the components ofFIG. 1 is described in more detail in the discussions presented below relative toFIG. 2 andFIG. 6.
Process for Validating Code of an ETL Tool
FIG. 2 is a flowchart of a process of validating code106 (seeFIG. 1) of an ETL tool, where the process is implemented in the system ofFIG. 1, in accordance with embodiments of the present invention. The process ofFIG. 2 starts atstep200. Prior to step202, computer102 (seeFIG. 1) receives naming, coding, and performance standards for ETL code106 (seeFIG. 1) and stores the received standards in data store108 (seeFIG. 1). The receivedETL code106 specifies job(s) and/or other object(s) of ETL project(s). Hereinafter, in the discussion ofFIG. 2, the received naming, coding, and performance standards are collectively referred to as “the standards.”
Instep202, computer102 (seeFIG. 1) or another computer (not shown) exports ETL code106 (seeFIG. 1) to job definition file(s) (e.g., DSX file(s)). Validation tool104 (seeFIG. 1) receives the exported ETL code106 (seeFIG. 1) prior to step204.
Instep204, validation tool104 (seeFIG. 1) parses the ETL code106 (seeFIG. 1) and compares the parsed code106 (seeFIG. 1) to the standards to determine whether portion(s) of the ETL code106 (seeFIG. 1) (1) match character strings or regular expressions specified by the standards, (2) indicate the usage of expensive stages and operations in ETL code106 (seeFIG. 1) does not exceed predetermined threshold values specified by the standards, (3) indicate effective performance of queries in ETL code106 (seeFIGS. 1), and (4) indicate usage of auto partitioning in ETL code106 (seeFIG. 1). In one embodiment, instep204, validation tool104 (seeFIG. 1) parses a DSX file into which objects of an ETL project specified by the ETL code106 (seeFIG. 1) was exported.
The aforementioned match of character strings includes (1) beginning characters of a name of an object matching a predetermined string of characters or a regular expression to indicate a violation of a naming standard, and (2) any portion of ETL code106 (seeFIG. 1) matching a predetermined string of characters (e.g., matching the string “DWH_D”) or a regular expression to indicate an instance of hardcoding. For example, determining that a dataset name does not start with “DS_” indicates a naming standard violation and determining that a portion of ETL code106 (seeFIG. 1) matches “DWH_D” indicates an instance of hardcoding.
The aforementioned predetermined threshold values indicate limits on attributes ofETL code106, where the attributes are associated with the expensive stages and operations. For example, a predetermined threshold value of1 for an aggregator count means that determining that a job has more than one aggregator indicates a performance standard violation for the job.
The comparison to the standards to determine whether portion(s) of ETL code106 (seeFIG. 1) indicate usage of auto partitioning determines a standards violation if validation tool104 (seeFIG. 1) determines that ETL code106 (seeFIG. 1) specifies an automatic selection of a partitioning method for a link in ETL code106 (seeFIG. 1).
The comparison of the parsed code106 (seeFIG. 1) to the standards also determine whether (1) file paths in ETL code106 (seeFIG. 1) begin with a root path defined at the project level, (2) surrogate keys in ETL code106 (seeFIG. 1) are generated only in SKG stages, (3) parameter(s) in a first predetermined set of parameter(s) are present in a job specified by ETL code106 (seeFIG. 1), (4) parameter(s) in a second predetermined set of parameter(s) are not present in a job specified by ETL code106 (seeFIGS. 1), and (6) a job specified by ETL code106 (seeFIG. 1) is annotated in a field that describes the job.
Instep206, validation tool104 (seeFIG. 1) determines violation(s) in which job(s) and/or other object(s) of the parsed ETL code106 (seeFIG. 1) do not comply with the standards based in part on the comparison instep204 determining that portion(s) of ETL code106 (seeFIG. 1) (1) do not match character strings or regular expressions specified by the standards, (2) indicate the usage of expensive stages and operations in ETL code106 (seeFIG. 1) exceeds the predetermined threshold values specified by the standards, (3) indicate ineffective performance of the queries in ETL code106 (seeFIG. 1), and/or (4) indicate ineffective usage of partitioning in ETL code106 (seeFIG. 1).
In one embodiment, the violation(s) determined in step206 are also based in part on validation tool104 (seeFIG. 1) determining (1) a file path in ETL code106 (seeFIG. 1) does not begin with a root path defined at the project level, (2) a surrogate key in ETL code106 (seeFIG. 1) is generated in a transformer stage or another stage other than an SKG stage, (3) parameter(s) in the first predetermined set of parameter(s) are present in a job specified by ETL code106 (seeFIG. 1), (4) parameter(s) in the second predetermined set of parameter(s) are not present in the job, (5) the job is not annotated in a field that describes the job, (6) the field that describes the job does not include a value specified by a job annotation standard, (7) the field that describes the job does not include a name of the job, (8) a job activity in a sequence specified by ETL code106 (seeFIG. 1) does not pass a value specified by a job activity parameter standard, (9) an add checkpoints feature is not enabled for the sequence, where the add checkpoints feature allows jobs in the sequence to be restartable after a failure of the jobs, (10) a handle activities that fail feature is not enabled for the sequence, where the handle activities that fail feature allows an activity of a failing job in the sequence to be handled by triggering automatically inserted code that branches to an error handling point, (11) a log job errors feature is not enabled for the sequence, where the log job errors feature allows a message to be logged about a job whose run ends with a warning or fatal error, (12) a log job reports feature is not enabled for the sequence, where the log job reports feature allows a status report to be logged after a run of the job, and/or (13) a reset if required then run feature is not enabled for the sequence, where the reset if required then run feature allows the job to be run each time the sequence is run, even after a run of the sequence is aborted.
In one embodiment, the violation(s) determined in step206 are also based in part on validation tool104 (seeFIG. 1) determining that (1) a count of the number of aggregator stages of a job specified by ETL code106 (seeFIG. 1) exceeds a predetermined maximum number of aggregator stages, (2) a count of the number of transformer stages of the job exceeds a predetermined maximum number of transformer stages, (3) a count of the number of occurrences of re-partitioning of data sets in the job exceeds a predetermined maximum number of occurrences of re-partitioning of data sets, (4) a count of the number of sort stages in the job exceeds a predetermined maximum number of sort stages, (5) a count of the number of database read/write operations in the job exceeds a predetermined maximum number of database read/write operations, (6) a count of a number of sequential file read/write operations in the job exceeds a predetermined maximum number of sequential file read/write operations, (7) a ratio of a number of stages of the job to a number of stages of the job that are annotated is less than a predetermined minimum ratio of the number of stages to the number of stages that are annotated, (8) a size of a transaction for an insert, update, or delete operation of the job is less than a predetermined minimum size of the transaction, and/or (9) a size of an array employed for the insert, update, or delete operation of the job is less than a predetermined minimum size of the array. Validation tool104 (seeFIG. 1) receives the predetermined maximums and minimums described in this paragraph in items (1)-(9) prior to step206.
Instep208, for each violation determined instep206, validation tool104 (seeFIG. 1) determines attributes of the violation, including a corresponding job or object name, stage name, stage type, violation type and description of the violation.
Instep210, validation tool104 (seeFIG. 1) generates validation report110 (seeFIG. 1), which identifies one or both of the following items: (1) object(s) of ETL code106 (seeFIG. 1) that violate the standards and (2) other object(s) of ETL code106 (seeFIG. 1) that comply with the standards. The violation(s) of the standards included in validation report110 (seeFIG. 1) are determined instep206. Subsequent to generating validation report110 (seeFIG. 1), validation tool104 (seeFIG. 1) sends validation report110 (seeFIG. 1) to designer(s) for their review. In one embodiment, validation report110 (seeFIG. 1) is in a spreadsheet format.
Instep212, designer(s) determine whether their review of the validation report110 (seeFIG. 1) identifies issue(s) in the ETL code106 (seeFIG. 1) that need to be corrected or otherwise addressed. Identifying issue(s) in the ETL code106 (seeFIG. 1) in the review includes determining whether validation report110 (seeFIG. 1) includes a red colored background (or another predetermined visual indicator of a violation of a standard) for the name(s) of object(s) listed in validation report110 (seeFIG. 1) and/or for attribute(s) of each of the object(s) which are listed in validation report110 (seeFIG. 1). An attribute of an object that has the red colored background or other predetermined visual indicator indicates that the attribute causes the comparison instep204 to determine a violation of the standards. In one embodiment, the review also includes the partially manual and partially automated review described in the section presented below entitled “Partially Manual Review.” For example, reviewers go through a “Queries” sheet in validation report110 (seeFIG. 1) to find all the queries used in the ETL code and to check to see if all the queries have the right clauses.
If none of the objects in validation report110 (seeFIG. 1) includes the red colored background or other predetermined visual indicator of a standards violation, then ETL code106 (seeFIG. 1) does not have any issue(s) that require correction. If the designer(s)' review identifies no issue(s) with the ETL code106 (seeFIG. 1) by determining that no objects listed in validation report110 (seeFIG. 1) have any attribute with the red colored background or other visual indicator of a standards violation, then the No branch ofstep212 is taken and step214 is performed.
In an alternate embodiment, if none of the objects in validation report110 (seeFIG. 1) includes the visual indicator of a standards violation and if the partially manual review does not find any issues with the additional information in validation report110 (seeFIG. 1), as described below in the Partially Manual Review section, then ETL code106 (seeFIG. 1) does not have any issues that require correction, the No branch ofstep212 is taken and step214 is performed.
Instep214, based on validation report110 (seeFIG. 1) not having any indicator of standard violations as determined by the designer(s)' review, the designer(s) formally approve the ETL code106 (seeFIG. 1). Subsequent to step214 and prior to step216, validation tool104 (seeFIG. 1) receives an indication of the approval of the ETL code106 (seeFIG. 1).
In an alternative embodiment, instep214, based on validation report110 (seeFIG. 1) not having any indicator of standard violations as determined by the designer(s)' review and the partially manual review not finding any issues with the additional information in validation report110 (seeFIG. 1), as described below in the Partially Manual Review section, the designer(s) formally approve the ETL code106 (seeFIG. 1).
Instep216, job definition file(s) (e.g., file in DSX format) specifying the ETL code106 (seeFIG. 1) is imported to computer102 (seeFIG. 1) or another computer (not shown) in a Quality Assurance (QA) environment.
Prior to step218, computer102 (seeFIG. 1) or another computer (not shown) attempts to run the ETL code106 (seeFIG. 1) end-to-end and the results are reviewed by experts in the QA environment. Instep218, if the review in the QA environment identifies no issue(s) with the ETL code106 (seeFIG. 1) by a review of the results of the end-to-end run, then the No branch ofstep218 is taken and step220 is performed.
Instep220, computer102 (seeFIG. 1) generates release notes associated with the ETL code106 (seeFIG. 1) and releases the ETL code106 (seeFIG. 1) and the release notes. Followingstep220, the process ofFIG. 2 ends atstep222.
Returning to step218, if the review in the QA environment identifies issue(s) with the ETL code106 (seeFIG. 1) that need to be corrected or otherwise addressed, then the Yes branch ofstep218 is taken and step224 is performed. Instep224, the designer(s) rework the ETL code106 (seeFIG. 1) in the development environment to correct the issue(s) and the process loops back to step202 to export the reworked ETL code106 (seeFIG. 1) to job definition file(s). In the subsequent iteration ofsteps202,204,206,208,210,212, and214, the ETL code106 (seeFIG. 1) is replaced with the reworked ETL code106 (seeFIG. 1) resulting from the most recent performance ofstep224.
Returning to step212, if the designer(s)' review identifies issue(s) with the ETL code106 (seeFIG. 1) that need to be corrected or otherwise addressed, then the Yes branch ofstep212 is taken and step224 is performed. Instep224 following the Yes branch ofstep212, the designer(s) rework the ETL code106 (seeFIG. 1) in the development environment to correct the identified issue(s) and the process loops back to step202 to export the reworked ETL code106 (seeFIG. 1) to job definition file(s). In the subsequent iteration ofsteps202,204,206,208,210, and212 (and step214 if the No branch ofstep212 is taken in the subsequent iteration), the ETL code106 (seeFIG. 1) is replaced with the reworked ETL code106 (seeFIG. 1) resulting from the most recent performance ofstep224.
In an alternate embodiment, returning to step212, if (1) the designer(s)' review identifies issue(s) with the ETL code106 (seeFIG. 1) based on standard violation indicators in validation report110 (seeFIG. 1), or if the partially manual review finds issue(s) with the additional information in validation report110 (seeFIG. 1), as described below in the Partially Manual Review section, then the Yes branch ofstep212 is taken and step224 is performed. Instep224 following the Yes branch ofstep212, the designer(s) rework the ETL code106 (seeFIG. 1) in the development environment to correct the identified issue(s) and the process loops back to step202 to export the reworked ETL code106 (seeFIG. 1) to job definition file(s). In the subsequent iteration ofsteps202,204,206,208,210, and212 (and step214 if the No branch ofstep212 is taken in the subsequent iteration), the ETL code106 (seeFIG. 1) is replaced with the reworked ETL code106 (seeFIG. 1) resulting from the most recent performance ofstep224.
Partially Manual ReviewIn one embodiment, the review in step212 (seeFIG. 2) includes a partially manual review that uses additional information included in validation report110 (seeFIG. 1). The partially manual review checks (1) parameters from all objects (i.e., all jobs, sequences and routines) specified by ETL code106 (seeFIG. 1), (2) file names referred to in different jobs from all kinds of file stages, (3) queries from all database stages, (4) parameters passed to job activities in different sequences, (5) job subroutines, (6) format of emails from all mail activities, including the body of the email and attachment(s) to the email, (7) all expressions from transformers including stage variables, output links, and loop variables, and (8) job full description along with the last modified timestamp of the job, which helps to verify job history. The aforementioned checks (1)-(8) are described below.
In the check of the parameters from all objects specified byETL code106, a reviewer views a list of parameters defined on jobs, sequences and routines, along with the type of parameter and the default value set, to (1) verify consistency in naming of similar parameters across ETL projects, (2) identify redundant parameters, (3) verify type of parameters and default values, and (4) verify parameters defined on routines.
In the check of the file names referred to in different jobs from all kinds of file stages, a reviewer views a list of all the different files used in parallel jobs specified by ETL code106 (seeFIG. 1), along with a type of the file (i.e., sequential, dataset, file set, lookup file set, or surrogate key state file), whether each instance is a read or write operation, and whether each instance is a SKG state file, to (1) check if all the files read are written somewhere in the system, (2) identify typographical errors in file names, and (3) during debugging, identify where a file is written or read instead of traversing through sequences.
In the check of queries from all database stages, a reviewer views a list of queries from all the parallel jobs specified by ETL code106 (seeFIG. 1), along with query types (e.g., before query or after query), write mode (e.g., insert, update, or read), and table action (e.g., append or truncate), to (1) verify that each query has proper clauses and structure, (2) check if queries are performance effective, (3) check if the write mode is “append,” “truncate,” etc. at appropriate places, and (4) check if update queries have only primary keys in the “where” clause.
In the check of parameters passed to job activities in different sequences, a reviewer views a list of all job activities in every sequence specified by ETL code106 (seeFIG. 1), along with corresponding job names, all parameters of every job activity listed separately together with the values passed, and flags indicating whether the values are directly passed from the sequence parameters to (1) check if appropriate values are passed for parameters in each job activity, (2) validate the values passed when the flag is “false” (i.e., value is not directly passed from the parameter) to facilitate detection of any hardcoded values that are passed to the job, and (3) determine which sequence(s) are invoking a particular job.
In the check of job subroutines, a reviewer views a list of after subroutines and before subroutines for every parallel job specified by ETL code106 (seeFIG. 1) to check if the correct subroutines are invoked in each job and to facilitate a review of routines of a significant number (e.g., hundreds) of jobs.
In the check of the format of emails from all mail activities, a reviewer views the subject, sender address, recipient list, attachments, and body of each mail activity to (1) check for proper structure of the message in the email body, (2) check for accuracy of the subject, (3) check whether attachments are present in cases where attachments are expected and whether the attachments refer to the appropriate files, (4) check whether the sender and recipient list are as expected, and (5) check that only mails that indicate an aborted job have a job report indicated.
In the check of all expressions from transformers including stage variables, output links, and loop variables, a reviewer views expressions from transformers whenever a direct mapping is not present, along with expressions of links, stage variables and loop variables to (1) check the accuracy of the expressions, (2) check for performance effectiveness of the expressions, and (3) verifying that the correct parameters are passed when parallel routines are being invoked.
In the check of job full description, a reviewer views a list of the job full descriptions of every job along with the timestamp of the last modification of the job to (1) verify that job change history is present, (2) use the date modified to verify that a history log is present for the latest change, and (3) check whether the change description is accurate, meaningful, and properly structured.
EXAMPLESFIG. 3 depicts anexemplary portion300 of validation report110 (seeFIG. 1) summarizing violations of standards determined by the process ofFIG. 2, where the report is generated by the system ofFIG. 1, in accordance with embodiments of the present invention.Portion300 includes asection302 including a list of parallel jobs and asection304 including a list of sequence jobs, which are determined by validation tool104 (seeFIG. 1).
Section302 includes object-specific information for each job, including a job name, aggregator count, transformer count, re-partitioning count, sort count, annotation count, database read/write count, file read/write count, hardcoding count (i.e., count of the number of instances of hardcoding for each job), and standards violation count.
For example, for the second row of data insection302, the job name is AIE001WriteSAPFile, the aggregator count is 8, the transformer count is 6, the re-partitioning count is 6, the sort count is 7, the annotation count ratio is 22, the database read/write count is 3, the file read/write count is 5, the hardcoding count is 0, and the standards violation count is 59.
Although not shown inFIG. 3, an indicator of a red colored background is present for the items that exceed corresponding threshold values. For example, in the second row of data insection302, the aggregator count, transformer count, re-partitioning count, sort count, annotation count ratio, and standards violation count exceed predetermined thresholds of 1, 1, 1, 1, 2, and 0, respectively. Therefore, each of the aggregator count, transformer count, re-partitioning count, sort count, annotation count ratio, and standards violation count has a red colored background to indicate a standards violation. Furthermore, the job name of AIE001WriteSAPFile has a red colored background to indicate the job has at least one standards violation and/or at least one hardcoding violation.
FIG. 4 is anexemplary portion400 of validation report110 (seeFIG. 1) indicating hardcoding violations determined by the process ofFIG. 2, where the report is generated by the system ofFIG. 1, in accordance with embodiments of the present invention.Portion400 includes a list of hardcoding violations determined by validation tool104 (seeFIG. 1), where each hardcoding violation is identified by DSX line number, object type, object name, stage name, error description, string looked for, and DSX line.
For example, the first row of data inportion400 indicates that for a parallel job having the name ATL201FileReceipt, validation tool104 (seeFIG. 1) detects a database hardcoding violation because validation tool104 (seeFIG. 1) finds the string SOL2DEV (see the string in the String Looked For column in portion400) in a DSX line of the parallel job ATL201FIleReceipt. A portion of the DSX line that includes “sol2dev” is shown in the DSX Line column inFIG. 4. Regarding the second row of data inportion400, although the DWH_D string in the String Looked For column is not shown in the portion of the DSX line included in the DSX Line column, validation tool104 (seeFIG. 1) finds the string DWH_D in a search of the entire DSX line, thereby detecting a hardcoding violation.
FIG. 5 is anexemplary portion500 of validation report110 (seeFIG. 1) indicating standards violations determined by the process ofFIG. 2, where the report is generated by the system ofFIG. 1, in accordance with embodiments of the present invention.Portion500 includes a list of standards violations determined by validation tool104 (seeFIG. 1). Each violation in the list of standards violations includes a DSX line number, object type, object name, stage name, stage type, violation type and violation description.
For example, the first row of data inportion500 indicates that for the parallel job AIE001WriteSAPFile, validation tool104 (seeFIG. 1) determines an annotation violation because there is no job annotation for AIE001WriteSAPFile.
Computer SystemFIG. 6 is a block diagram of a computer that is included in the system ofFIG. 1 and that implements the process ofFIG. 2, in accordance with embodiments of the present invention.Computer102 is a computer system or mobile computing device that generally includes a central processing unit (CPU)602, amemory604, an input/output (I/O)interface606, and abus608. Further,computer102 is coupled to I/O devices610 and a computerdata storage unit612.CPU602 performs computation and control functions ofcomputer102, including carrying out instructions included inprogram code614 to perform a method of validating code of an ETL tool, where the instructions are carried out byCPU602 viamemory604.CPU602 may include a single processing unit, or be distributed across one or more processing units in one or more locations (e.g., on a client and server).Program code614 includes program code for validation tool104 (seeFIG. 1).
Memory604 includes a known computer readable storage medium, which is described below. In one embodiment, cache memory elements ofmemory604 provide temporary storage of at least some program code (e.g., program code614) in order to reduce the number of times code must be retrieved from bulk storage while instructions of the program code are carried out. Moreover, similar toCPU602,memory604 may reside at a single physical location, including one or more types of data storage, or be distributed across a plurality of physical systems in various forms. Further,memory604 can include data distributed across, for example, a local area network (LAN) or a wide area network (WAN).
I/O interface606 includes any system for exchanging information to or from an external source. I/O devices610 include any known type of external device, including a display device, keyboard, etc.Bus608 provides a communication link between each of the components incomputer102, and may include any type of transmission link, including electrical, optical, wireless, etc.
I/O interface606 also allowscomputer102 to store information (e.g., data or program instructions such as program code614) on and retrieve the information from computerdata storage unit612 or another computer data storage unit (not shown). Computerdata storage unit612 includes a known computer-readable storage medium, which is described below. In one embodiment, computerdata storage unit612 is a non-volatile data storage device, such as a magnetic disk drive (i.e., hard disk drive) or an optical disc drive (e.g., a CD-ROM drive which receives a CD-ROM disk).
Memory604 and/orstorage unit612 may storecomputer program code614 that includes instructions that are carried out byCPU602 viamemory604 to validate code of an ETL tool. AlthoughFIG. 6 depictsmemory604 as includingprogram code614, the present invention contemplates embodiments in whichmemory604 does not include all ofcode614 simultaneously, but instead at one time includes only a portion ofcode614.
Further,memory604 includes an operating system (not shown) and may include other systems not shown inFIG. 6.
Storage unit612 and/or one or more other computer data storage units (not shown) that are coupled tocomputer102 may include data store108 (seeFIG. 1).
As will be appreciated by one skilled in the art, in a first embodiment, the present invention may be a system; in a second embodiment, the present invention may be a method; and in a third embodiment, the present invention may be a computer program product.
Any of the components of an embodiment of the present invention can be deployed, managed, serviced, etc. by a service provider that offers to deploy or integrate computing infrastructure with respect to validating code of an ETL tool. Thus, an embodiment of the present invention discloses a process for supporting computer infrastructure, where the process includes providing at least one support service for at least one of integrating, hosting, maintaining and deploying computer-readable code (e.g., program code614) in a computer system (e.g., computer102) including one or more processors (e.g., CPU602), wherein the processor(s) carry out instructions contained in the code causing the computer system to validate code of an ETL tool. Another embodiment discloses a process for supporting computer infrastructure, where the process includes integrating computer-readable program code into a computer system including a processor. The step of integrating includes storing the program code in a computer-readable storage device of the computer system through use of the processor. The program code, upon being executed by the processor, implements a method of validating code of an ETL tool.
While it is understood thatprogram code614 for validating code of an ETL tool may be deployed by manually loading directly in client, server and proxy computers (not shown) via loading a computer-readable storage medium (e.g., computer data storage unit612),program code614 may also be automatically or semi-automatically deployed intocomputer102 by sendingprogram code614 to a central server or a group of central servers.Program code614 is then downloaded into client computers (e.g., computer102) that will executeprogram code614. Alternatively,program code614 is sent directly to the client computer via e-mail.Program code614 is then either detached to a directory on the client computer or loaded into a directory on the client computer by a button on the e-mail that executes a program that detachesprogram code614 into a directory. Another alternative is to sendprogram code614 directly to a directory on the client computer hard drive. In a case in which there are proxy servers, the process selects the proxy server code, determines on which computers to place the proxy servers' code, transmits the proxy server code, and then installs the proxy server code on the proxy computer.Program code614 is transmitted to the proxy server and then it is stored on the proxy server.
Another embodiment of the invention provides a method that performs the process steps on a subscription, advertising and/or fee basis. That is, a service provider, such as a Solution Integrator, can offer to create, maintain, support, etc. a process of validating code of an ETL tool. In this case, the service provider can create, maintain, support, etc. a computer infrastructure that performs the process steps for one or more customers. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement, and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) (memory604 and computer data storage unit612) having computerreadable program instructions614 thereon for causing a processor (e.g., CPU602) to carry out aspects of the present invention.
The computer readable storage medium (i.e., computer readable storage device) can be a tangible device that can retain and store instructions (e.g., program code614) for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium and a computer readable storage device, as used herein, are not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions (e.g., program code614) described herein can be downloaded to respective computing/processing devices (e.g., computer102) from a computer readable storage medium or to an external computer or external storage device (e.g., computer data storage unit612) via a network (not shown), for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card (not shown) or network interface (not shown) in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions (e.g., program code614) for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations (e.g.,FIG. 2) and/or block diagrams (e.g.,FIG. 1 andFIG. 6) of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions (e.g., program code614).
These computer readable program instructions may be provided to a processor (e.g., CPU602) of a general purpose computer, special purpose computer, or other programmable data processing apparatus (e.g., computer102) to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium (e.g., computer data storage unit612) that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions (e.g., program code614) may also be loaded onto a computer (e.g. computer102), other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
While embodiments of the present invention have been described herein for purposes of illustration, many modifications and changes will become apparent to those skilled in the art. Accordingly, the appended claims are intended to encompass all such modifications and changes as fall within the true spirit and scope of this invention.