Broadcom z/OS

RLX Suite Modernization Guide

REXXProgramming Language

RLX Suite is a rexx product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

RLX Suite is a comprehensive set of REXX-related tools designed for z/OS environments.

The suite leverages z/OS security mechanisms, including RACF, ACF2, and Top Secret, for authentication and supports ACLs and RBAC for access control.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is RLX Suite?

RLX Suite is a collection of REXX-related tools designed to enhance development and management tasks on z/OS. It includes tools for DB2, VSAM, SQL, ISPF, CLIST, and compilation, providing a comprehensive environment for REXX programming.

How does RLX Suite enhance REXX programming?

RLX Suite enhances REXX programming by providing specialized tools for database interaction, screen management, and compilation. It simplifies complex tasks and improves developer productivity.

What environments does RLX Suite support?

RLX Suite supports integration with DB2, VSAM, SQL, ISPF, and CLIST environments. This allows developers to leverage REXX in a variety of z/OS applications.

Who developed RLX Suite?

RLX Suite was initially developed by Relational Architects and later acquired by Broadcom in 2020. Broadcom bundled the individual tools into a comprehensive suite.

Technical

What are common operations in RLX Suite?

Common operations include executing REXX scripts, interacting with DB2 databases using RLX for DB2, managing VSAM datasets with RLX/VSAM, and creating ISPF panels using RLX/ISPF. The exact syntax depends on the specific RLX tool being used.

What types of APIs does RLX Suite expose?

RLX Suite exposes APIs for interacting with various z/OS subsystems. These APIs are typically native and may involve calls to specific system services. Integration is primarily supported through REXX and other z/OS programming languages.

What are the main system components of RLX Suite?

The main components include RLX for DB2, RLX/VSAM, RLX/SQL, RLX/ISPF, RLX/CLIST, RLX/Compile Host/Edit, and RLX/SDK. These components communicate through z/OS system services and inter-process communication mechanisms.

What security features does RLX Suite offer?

RLX Suite uses z/OS security mechanisms for authentication and authorization. Specific methods include leveraging RACF, ACF2, or Top Secret for user authentication. Access control is typically managed through ACLs and role-based access control (RBAC).

Business Value

How does RLX Suite provide business value?

RLX Suite enhances developer productivity by providing specialized tools for REXX programming. It simplifies database interactions, screen management, and compilation tasks, reducing development time and improving code quality.

How does RLX Suite improve efficiency?

By streamlining REXX development, RLX Suite helps organizations maintain and enhance their z/OS applications more efficiently. This leads to cost savings and improved responsiveness to business needs.

How does RLX Suite minimize costs?

RLX Suite allows organizations to leverage their existing REXX skills and infrastructure, minimizing the need for retraining and new investments. This makes it a cost-effective solution for z/OS application development.

Security

What authentication methods are supported?

RLX Suite leverages z/OS security mechanisms, including RACF, ACF2, and Top Secret, for authentication. It supports access control lists (ACLs) and role-based access control (RBAC) to manage user permissions.

What encryption is used and where?

RLX Suite uses the underlying z/OS encryption facilities for data protection. Specific encryption algorithms and methods depend on the z/OS configuration and the requirements of the applications using RLX Suite.

What audit/logging capabilities exist?

RLX Suite integrates with z/OS audit and logging facilities. It provides detailed logs of user activity and system events, enabling administrators to monitor and audit the use of RLX Suite and its components.

Operations

What administrative interfaces are available?

RLX Suite is administered through z/OS system commands and ISPF panels. User management is handled through RACF, ACF2, or Top Secret. Configuration parameters are typically stored in z/OS datasets.

What monitoring/logging capabilities exist?

RLX Suite provides monitoring and logging capabilities through z/OS system logs and SMF records. Administrators can use these logs to track system performance, identify issues, and ensure the availability of RLX Suite components.

What ports or network requirements exist?

RLX Suite requires standard z/OS ports for communication between components. Specific port requirements depend on the configuration of the z/OS environment and the applications using RLX Suite.

Ready to Start Your Migration?

Download our comprehensive migration guide for RLX Suite or calculate your ROI.

Calculate ROI