CA 7 Workload Automation Intelligence Modernization Guide
CA 7 Workload Automation Intelligence is a batch product by Broadcom. Explore technical details, modernization strategies, and migration paths below.
Product Overview
CA 7 Workload Automation Intelligence is a workload management solution for z/OS, automating batch job scheduling and managing dependencies.
Authentication methods include LDAP, RACF, and ACF2, with Role-Based Access Control (RBAC) for managing user permissions.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is CA 7 Workload Automation Intelligence?
CA 7 Workload Automation Intelligence is a job scheduling and workload management system for z/OS environments. It automates the execution of batch jobs, manages dependencies, and provides monitoring and reporting capabilities.
What databases or storage mechanisms are used?
CA 7 uses a database (typically DB2 or VSAM) to store job definitions, schedules, and historical data. It also uses VSAM datasets for checkpoint and restart information.
What are the main system components?
The main system components include the CA 7 scheduler, the database management system, and the interface components (such as the ISPF panels and web interface).
How do the components communicate?
CA 7 communicates between components using z/OS cross-memory services and inter-process communication mechanisms. TCP/IP is used for communication with external systems and the web interface.
Technical
What are some common commands?
Common commands include ADD (to add a job), LIST (to display job information), RUN (to execute a job), and DELETE (to remove a job).
What is the syntax for basic operations?
The ADD command syntax is: ADD,ID=jobid,DSN=datasetname. The LIST command syntax is: LIST,ID=jobid. The RUN command syntax is: RUN,ID=jobid.
What types of APIs does CA 7 expose?
CA 7 exposes a REST API for programmatic access to job scheduling and management functions. Specific endpoints include /jobs, /schedules, and /events.
What protocols does it use for communication?
Integration is supported through REST APIs, allowing interaction from various programming languages. The communication protocols used include TCP/IP and HTTP/HTTPS.
Business Value
How does CA 7 improve business value?
CA 7 automates batch job scheduling, reducing manual intervention and improving operational efficiency. This leads to faster processing times and reduced costs.
How does CA 7 ensure reliable execution of business processes?
By automating job scheduling and managing dependencies, CA 7 ensures that critical business processes are executed in a timely and reliable manner.
How does CA 7 help optimize workload performance?
CA 7 provides comprehensive reporting and monitoring capabilities, allowing businesses to track job execution, identify bottlenecks, and optimize workload performance.
Security
What authentication methods are supported?
CA 7 supports authentication methods such as LDAP, RACF, and ACF2. It uses Role-Based Access Control (RBAC) to manage user permissions.
What access control model is used?
CA 7 uses Role-Based Access Control (RBAC) to define and manage user permissions. Access to specific functions and data is controlled through role assignments.
What encryption is used and where?
CA 7 encrypts sensitive data both in transit and at rest. Encryption algorithms such as AES are used to protect data within the database and during communication.
What audit/logging capabilities exist?
CA 7 provides audit logging capabilities to track user activity and system events. These logs can be used for security monitoring and compliance purposes.
Operations
What administrative interfaces are available?
Administrative interfaces include a command-line interface (CLI), ISPF panels, and a web-based console. User management is handled through the ISPF panels or the CLI.
What are the main configuration parameters?
Key configuration parameters include job scheduling parameters, resource allocation settings, and security configurations. These parameters are typically set through the ISPF panels or the CLI.
What monitoring/logging capabilities exist?
CA 7 provides monitoring capabilities through ISPF panels, a web-based console, and SMF records. Logging is performed to system logs and SMF datasets.
What ports or network requirements exist?
The CA 7 scheduler component requires specific ports for communication, typically TCP ports for the web interface and internal communication between components.
Ready to Start Your Migration?
Download our comprehensive migration guide for CA 7 Workload Automation Intelligence or calculate your ROI.