Chapter 33 Further Reading: Strangler Fig Pattern for Mainframes

Tier 1: Verified IBM Documentation

Strangler Fig and API Mediation

IBM z/OS Connect EE The API mediation layer that enables CICS and IMS transactions to be exposed as RESTful APIs with OpenAPI 3.0 specifications. z/OS Connect is the z/OS-native component of the strangler fig's facade layer. Documentation covers enterprise deployment, security configuration (RACF integration, SSL/TLS), performance tuning, and the API requester function (for outbound calls from z/OS to external services). Available at: IBM Documentation (https://www.ibm.com/docs/en/zos-connect)

IBM CICS TS Web Services Guide Comprehensive documentation for CICS web services — the CICS-side component of the strangler fig facade. Covers the web service pipeline, JSON transformation (DFHJS2LS/DFHLS2JS), WSDL/OpenAPI generation, and the PIPELINE/WEBSERVICE resource definitions. Directly relevant to the BALWSSRV wrapper pattern described in Section 33.4.1. Available at: IBM Documentation (https://www.ibm.com/docs/en/cics-ts)

IBM IMS Connect Guide and Reference Documentation for IMS Connect — the TCP/IP gateway that enables client applications to send and receive IMS transactions over the network. Essential reading for the IMS strangler fig pattern described in Case Study 2. Covers IMS Connect configuration, message format, timeout management, and integration with z/OS Connect EE. Available at: IBM Documentation (https://www.ibm.com/docs/en/ims)

Change Data Capture

IBM InfoSphere Data Replication (IIDR) Documentation for IBM's CDC tool for DB2 on z/OS. IIDR reads the DB2 recovery log (BSDS) and streams row-level changes to target databases (PostgreSQL, Kafka, MongoDB, etc.). Covers source and target configuration, latency tuning, monitoring, and schema evolution handling. This is the CDC tool SecureFirst used in the chapter's running example. Available at: IBM Documentation (https://www.ibm.com/docs/en/idr)

IBM Data Gate for z/OS IBM's newer CDC offering for synchronizing DB2 on z/OS with cloud databases. Data Gate provides continuous replication with lower latency than traditional CDC tools and integrates with IBM Cloud Pak for Data. Relevant for organizations using IBM's hybrid cloud strategy. Available at: IBM Documentation (https://www.ibm.com/docs/en/data-gate-zos)

IBM IMS Solution Packs — IMS Library Integrity Utilities Documentation for IMS database change tracking and integrity utilities. While not a traditional CDC tool, the IMS Log Analysis utility can extract change records from the IMS log, which can serve as the foundation for an IMS-to-relational CDC pipeline. Relevant to Case Study 2's IMS extraction challenge. Available at: IBM Documentation (https://www.ibm.com/docs/en/ims-solution-packs)

DevOps and CI/CD for Mainframe

IBM Wazi Deploy Documentation for IBM's deployment automation tool for z/OS. Wazi Deploy automates the deployment of COBOL programs, CICS resources, and DB2 objects as part of a CI/CD pipeline. Relevant to the strangler fig because automated deployment is essential for rapid iteration during the shadow/parallel/canary phases. Available at: IBM Documentation (https://www.ibm.com/docs/en/wazi-deploy)

Tier 2: Foundational References

The Strangler Fig Pattern

Martin Fowler, "StranglerFigApplication" (2004) The original blog post that named the strangler fig pattern. Fowler describes the pattern in the context of general legacy system replacement, without specific mainframe focus. Short, readable, and essential for understanding the pattern's origin. Compare Fowler's general description with the mainframe-specific adaptation in this chapter. Available at: https://martinfowler.com/bliki/StranglerFigApplication.html

Sam Newman, "Building Microservices" (O'Reilly, 2nd Edition, 2021) Chapter 3 covers the strangler fig pattern in the context of decomposing monoliths into microservices. Newman's treatment is platform-agnostic but provides excellent coverage of the pattern's organizational and process dimensions — team structure, incremental delivery, and managing the transition period. Pair with this chapter for the mainframe-specific technical details. Publisher: O'Reilly Media. ISBN: 978-1492034025.

Michael Feathers, "Working Effectively with Legacy Code" (Prentice Hall, 2004) The definitive book on working with legacy codebases. Feathers introduced the concept of "seams" — places in code where behavior can be altered without editing the code itself — which is directly applied in Section 33.3.3 of this chapter. Chapters 4 (The Seam Model) and 9 (Breaking Dependencies) are particularly relevant. While the code examples are in C++ and Java, the concepts apply directly to COBOL. Publisher: Prentice Hall. ISBN: 978-0131177055.

Data Synchronization and CDC

Martin Kleppmann, "Designing Data-Intensive Applications" (O'Reilly, 2017) The authoritative reference on data replication, consistency, and distributed systems. Chapter 5 (Replication), Chapter 7 (Transactions), and Chapter 11 (Stream Processing) provide the theoretical foundation for the data synchronization patterns described in Section 33.5. Kleppmann's coverage of change data capture, dual writes, and event sourcing is essential reading for anyone designing the data layer of a strangler fig migration. Publisher: O'Reilly Media. ISBN: 978-1449373320.

Debezium Documentation Documentation for the open-source CDC platform. Debezium connectors are available for DB2 (distributed), PostgreSQL, MySQL, MongoDB, and others. While the z/OS-specific Db2 connector has limitations (DB2 on z/OS typically requires IIDR or Data Gate), Debezium is relevant for CDC on the target side and for understanding CDC concepts. The Debezium blog includes excellent articles on CDC architecture, schema evolution, and operational best practices. Available at: https://debezium.io/documentation/

API Gateway and Traffic Management

Kong Gateway Documentation Documentation for the Kong API gateway used in SecureFirst's strangler fig implementation. Covers route configuration, traffic splitting (canary plugin), rate limiting, request transformation, and health checking. The Kong YAML configuration format is used in the routing examples in Section 33.4.2. Available at: https://docs.konghq.com/

NGINX Documentation — Traffic Splitting and Canary Deployments NGINX's documentation on using upstream weighting for traffic splitting — an alternative to Kong for organizations that use NGINX as their API gateway. The split_clients module provides percentage-based routing similar to Kong's canary plugin. Available at: https://docs.nginx.com/

Tier 3: Industry Case Studies and Analysis

Mainframe Modernization Case Studies

Gartner: "How to Use the Strangler Pattern to Modernize Legacy Mainframe Applications" Gartner's research note on applying the strangler fig pattern specifically to mainframe environments. Includes data on typical timelines, cost ranges, and success rates for strangler fig migrations in banking, insurance, and government. Their finding that organizations achieve 80% of the business value from extracting 40% of the services aligns with this chapter's guidance on when to stop strangling. Access: Requires Gartner subscription. Check your organization's analyst access.

Forrester: "The Total Economic Impact of Incremental Mainframe Modernization" Forrester's TCO analysis of incremental (strangler fig) modernization versus big-bang replacement. Key finding: incremental modernization reaches breakeven 2-3 years faster than big-bang because it delivers business value with each extracted service rather than requiring the entire migration to complete before any value is realized. Access: Requires Forrester subscription.

Commonwealth Bank of Australia — Core Banking Modernization One of the largest mainframe modernization projects ever completed. CBA replaced its core banking platform over five years using a strangler fig approach, extracting services from the mainframe to a SAP-based platform one product at a time. The project's success (rare for projects of this scale) is attributed to the incremental approach and the decision to run old and new systems in parallel for extended periods. Note: Published case studies available through SAP and various banking industry publications.

Distributed Systems and Migration Patterns

Chris Richardson, "Microservices Patterns" (Manning, 2018) Chapter 13 covers the strangler fig pattern, and Chapter 4 covers the saga pattern (relevant to the dual-write data synchronization pattern in Section 33.5.1). Richardson's treatment of compensating transactions is directly applicable to the fund-transfer extraction challenge described in SecureFirst's Phase 3. Publisher: Manning Publications. ISBN: 978-1617294549.

Neal Ford, Rebecca Parsons, Patrick Kua, "Building Evolutionary Architectures" (O'Reilly, 2nd Edition, 2023) Covers the concept of fitness functions — automated tests that validate architectural characteristics over time. Relevant to the strangler fig because the comparison engine (Section 33.4.3) is essentially an architectural fitness function that validates equivalence between legacy and modern services. Chapter 5 on evolutionary data is particularly relevant to the data synchronization challenges. Publisher: O'Reilly Media. ISBN: 978-1492097549.

Tier 4: Community and Practitioner Resources

Open Mainframe Project A Linux Foundation project dedicated to mainframe technology community building and education. Includes resources on COBOL, z/OS, and modernization patterns. The Zowe project (an open-source z/OS interface framework) is particularly relevant to the strangler fig pattern because it provides modern CLI and API access to z/OS resources. Available at: https://www.openmainframeproject.org/

IBM Redbooks: "Modernizing Applications with IBM CICS" IBM Redbook covering CICS modernization patterns including API enablement, event processing, and integration with cloud platforms. Provides practical, step-by-step guidance for the CICS-side implementation of the strangler fig facade. Available at: IBM Redbooks (https://www.redbooks.ibm.com/)

IBM Z and Cloud Modernization Center IBM's online hub for mainframe modernization resources, including assessment tools, reference architectures, customer stories, and the "Application Modernization Field Guide." The reference architectures section includes strangler fig patterns for CICS, IMS, and batch workloads. Available at: https://www.ibm.com/z/modernization