Best practices are not a secret incantation; they are the habits teams adopt after expensive incidents. VSAM rewards boring consistency: names you can grep, LISTCAT screenshots attached to tickets, SORT proofs kept beside REPRO listings, SHAREOPTIONS chosen with CICS and batch in the same meeting, and performance tuning informed by split statistics instead of folklore. This page collects those habits as a compact governance checklist you can hand to new hires and auditors alike. It complements deep dives on CI tuning or RACF by answering the question “what does a healthy shop actually do every week?”
| Area | Healthy habit | Anti-pattern |
|---|---|---|
| Naming and documentation | HLQ patterns aligned with RACF; runbooks list cluster, components, PATHs, owning systems. | Mystery acronyms, missing LISTCAT in tickets, production names reused in twelve sandboxes. |
| Define-time discipline | Peer review KEYS, RECORDSIZE, and SHAREOPTIONS; SMS triplet understood. | Copy-paste DEFINE from internet HLQ; KEYS offset guessed from green bar intuition. |
| Load pipelines | Sort proofs archived; REPRO SYSPRINT attached; counts reconciled. | Restart only REPRO after SORT failed; assume “RC=0 means correct business totals.” |
| Operational monitoring | Track CI/CA splits, extents, and response times; alert before user pain. | Measure only CPU; ignore DASD queues until nightly batch misses SLA. |
| Change windows | Structured back-out with DELETE/DEFINE or restore scripts tested quarterly. | Friday 16:55 experimental ALTER without rollback paragraph. |
Treat the catalog as part of your source code. When developers ask for a new cluster, capture the entire sphere name list up front, including future AIX and PATH suffixes if the roadmap mentions them. Alias strategies and user catalogs should be documented per business unit so “dataset not found” tickets stop being treasure hunts. Naming reviews out loud still catch single-character mistakes faster than diff tools when tired humans approve changes at midnight.
Pick initial sizes from standards, then measure with real workloads. CI splits suggest inserts or updates no longer fit the free space budget inside intervals; CA splits suggest control area pressure. Fixing those signals only with faster disks treats the symptom while logical hot spots remain.
BUFND and BUFNI adjustments belong in controlled experiments with SMF or RMF evidence, not casual edits during Sev1 unless directed by tuning owners. Document AMP changes with job names so operators can correlate behavior changes.
Model RACF at the granularity your auditors expect: sometimes cluster-level generics suffice; sometimes component-level profiles matter. Ensure batch service IDs and online regions receive symmetric authority to avoid “works in CICS, fails overnight” mysteries. Sensitive datasets need ownership tags in the configuration management database, not tribal memory.
Coordinate EXPORT/IMPORT, REPRO backup jobs, and storage replication with catalog dependencies. A backup tape nobody can restore because catalogs diverged is worthless. Quarterly restore drills into an isolated LPAR catch procedural rot early.
VSAM files rarely exist in isolation: COBOL copybooks describe record layouts, CICS FILE definitions map online names, scheduler tables reference batch procs, and data lineage tools may point to downstream warehouses. Best practice is to store those cross-references in the same configuration management system as your JCL. When a record layout version bumps, the ticket should list every VSAM consumer, not only the program that first failed compile. That habit prevents silent corruption where one program writes a longer field while another still reads the old picture.
Meaningful regression for VSAM includes at least three layers: structural checks (LISTCAT, IDCAMS VERIFY when appropriate), data sampling (controlled REPRO extracts or read utilities), and application-level tests (CICS transaction scripts or batch totals). Skipping the structural layer because “the program compiled” is how teams discover KEYS mismatches only after financial reconciliation fails.
Healthy shops connect VSAM performance questions to measurement: which address spaces hold the files open, which volumes see elevated disconnect times, whether buffer pool hit ratios moved after AMP changes. You do not need to become an SMF expert overnight, but you should know which colleague owns the reporting and which dashboard shows VSAM-related I/O rates for your critical files. Best practice is writing those dashboard names into the same runbook that documents LISTCAT commands.
Best practices are the chore chart on the fridge: take shoes off at the door, wash hands before snack, put blocks back in the blue bin. VSAM is the toy room. If everyone follows the chart, nobody steps on bricks at midnight. If one guest dumps every bucket on the floor “because it was faster,” the next morning is loud. The chart is not bossy; it is how the house stays walkable.
1. Why archive IDCAMS SYSPRINT for DEFINE and REPRO jobs?
2. Which pair best describes a balanced approach to FREESPACE?
3. SHAREOPTIONS should be chosen by whom?