CA Scheduler Modernization Guide
CA Scheduler is a batch product by Broadcom. Explore technical details, modernization strategies, and migration paths below.
Product Overview
To get started with CA Scheduler, you define jobs using the ADDJOB command, specifying execution parameters and dependencies.
Configuration is managed through control cards and the CA Scheduler database.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is CA Scheduler and what does it do?
CA Scheduler automates and manages batch job scheduling across z/OS, z/VM, and zVSE/VSEn environments. It centralizes control, optimizes resource utilization, and ensures timely job completion.
How does CA Scheduler work?
CA Scheduler uses a central database to store job definitions, schedules, and execution history. It interacts with the operating system to submit and monitor jobs, and provides interfaces for users and administrators to manage the scheduling environment.
What are the key features of CA Scheduler?
Key features include event-driven scheduling, resource management, workload balancing, dependency management, and comprehensive reporting. It also offers integration with other mainframe systems and security features to protect sensitive data and processes.
Technical
What are some common commands and how is CA Scheduler configured?
Common commands include ADDJOB (to define a new job), DELETEJOB (to remove a job), RUNJOB (to immediately execute a job), and LISTJOB (to display job details). Configuration is primarily done through the CA Scheduler ISPF panels and control cards.
What APIs does CA Scheduler expose?
CA Scheduler exposes APIs for integration with other systems. These APIs often use protocols like TCP/IP for communication. Specific API endpoint patterns and method names depend on the version and configuration.
What are the main system components?
The main components include the Scheduler Engine, the Database Manager, and the User Interface (ISPF panels). These components communicate through internal interfaces and system calls. The database stores job definitions, schedules, and historical data.
What authentication methods are supported?
CA Scheduler supports authentication methods such as RACF, ACF2, and Top Secret. Access control is typically managed through role-based access control (RBAC), where users are assigned roles with specific permissions.
Business Value
How does CA Scheduler improve operational efficiency?
CA Scheduler improves operational efficiency by automating batch job scheduling, reducing manual intervention, and optimizing resource utilization. This leads to faster job completion times and reduced operational costs.
How does CA Scheduler improve service levels?
By centralizing control over batch job scheduling, CA Scheduler ensures consistent and reliable job execution. This reduces the risk of errors and delays, leading to improved service levels and customer satisfaction.
How does CA Scheduler improve decision-making?
CA Scheduler provides comprehensive reporting and monitoring capabilities, allowing organizations to track job execution, identify bottlenecks, and optimize workload distribution. This leads to better decision-making and improved resource allocation.
Security
What authentication and access control mechanisms are in place?
CA Scheduler supports authentication methods such as RACF, ACF2, and Top Secret. It uses role-based access control (RBAC) to manage user permissions and access to resources.
What encryption is used and where?
CA Scheduler encrypts sensitive data both in transit and at rest. The specific encryption algorithms used depend on the configuration and version.
What audit and logging capabilities exist?
CA Scheduler provides audit logging capabilities, allowing organizations to track user activity, job execution, and configuration changes. This helps ensure compliance with security policies and regulatory requirements.
Operations
What administrative interfaces are available?
CA Scheduler provides administrative interfaces through ISPF panels and a command-line interface (CLI). User management is handled through the security system (RACF, ACF2, Top Secret).
What monitoring and logging capabilities exist?
Monitoring is performed through ISPF panels and log files. CA Scheduler provides real-time status updates and historical data on job execution. Alerts and notifications can be configured to notify administrators of critical events.
What are the main configuration parameters?
Configuration parameters are stored in control cards and the CA Scheduler database. These parameters control job definitions, schedules, resource allocation, and security settings.
Ready to Start Your Migration?
Download our comprehensive migration guide for CA Scheduler or calculate your ROI.