Legent z/OS

SCON Modernization Guide

Operating SystemTools and UtilitiesAdministration

SCON is a operating system product by Legent. Explore technical details, modernization strategies, and migration paths below.

Product Overview

SCON provided a centralized view of z/OS console messages by merging output from multiple MVS images into a single 3270 session.

Alternatives like IBM Z ChatOps offer enhanced features and modern interfaces.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What was the primary function of SCON?

SCON primarily focused on consolidating console messages from multiple MVS images into a single 3270 session. It facilitated centralized monitoring and management of z/OS systems.

How did SCON manage its configuration?

SCON used configuration files to define which MVS images to monitor and how to merge their console messages. These files specified parameters for connection, filtering, and display settings.

What were the main architectural components of SCON?

SCON's architecture involved components for message capture, consolidation, and presentation. It captured messages from different MVS images, merged them based on defined rules, and displayed the consolidated output in a 3270 session.

Technical

Did SCON expose any APIs for integration?

SCON did not expose standard APIs like REST or SOAP. Its integration capabilities were primarily through its configuration files and the 3270 interface it provided for consolidated console output.

How was SCON administered?

SCON's administrative interface was primarily through its configuration files, which defined the parameters for message consolidation and display. User management was handled at the z/OS level.

How did SCON handle security?

SCON likely used standard z/OS security mechanisms for authentication and access control. Specific details would depend on the z/OS environment in which it was deployed.

Business Value

What business value did SCON provide?

SCON provided business value by centralizing console monitoring, which improved operational efficiency and reduced the time needed to identify and respond to system issues.

How did SCON improve operational workflow?

By consolidating console messages, SCON helped reduce the need for operators to switch between multiple 3270 sessions, streamlining their workflow.

Security

What security measures did SCON employ?

SCON leveraged the security features of the underlying z/OS system. Authentication was handled through z/OS security mechanisms, and access to the consolidated console output was controlled through z/OS user profiles.

What audit and logging capabilities did SCON have?

SCON's audit and logging capabilities were tied to the z/OS system's logging facilities. It recorded events related to console message consolidation and user access.

Operations

What were the key operational considerations for SCON?

SCON required configuration to define the MVS images to monitor and the rules for consolidating their console messages. This configuration was typically done through configuration files.

How did SCON assist in system monitoring?

SCON's monitoring capabilities were focused on consolidating console messages. It provided a centralized view of system events, which aided in problem determination and resolution.

Ready to Start Your Migration?

Download our comprehensive migration guide for SCON or calculate your ROI.

Calculate ROI