Solved

Using UNIX to submit a Mainframe Job

Posted on 2004-10-13
5
570 Views
Last Modified: 2013-12-26
I am looking for a way to submit jobs from my UNIX system and execute them on an OS/390 Mainframe.  Anyone have any ideas?
0
Comment
Question by:tobey1
  • 3
5 Comments
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 12299434
I've seen this done in many ways at different companies:
o Purchase a Unix/Mainframe gateway product that does this. I think Tivoli, for example, has a module that does this.
o Drop JCL to a specific directory on the mainframe and have a job on the mainframe that checks that directory every few minutes and runs anything it finds there
o Use IBM Message Queue (MQ) and write a queue-handler that does this
0
 
LVL 20

Accepted Solution

by:
dsacker earned 400 total points
ID: 12300790
ftp it to the mainframe, to the JES reader. It has been a long time since I've done that, but you can probably google those key words (JES reader, submitting, etc), and find examples.
0
 
LVL 20

Assisted Solution

by:dsacker
dsacker earned 400 total points
ID: 12300823
Somewhere in the back of my mind, you will want to ftp it to the equivalent of the JCL statement:

     //OUTPUT  DD SYSOUT=(,INTRDR)

And the mainframe has such an equivalent. I've done this many times, but it has been about 15 years ago or more.  And I've slept since then. :)
0
 
LVL 3

Assisted Solution

by:hweber
hweber earned 100 total points
ID: 12356331
If you have the JCL in a file on your UNIX system:

Connect with ftp.
Enter "SITE filetype=JES"
Enter "PUT <name_of_the_JCL_file>"

To watch the job queue you can use the ls command.
To retrieve the results of the job you can use the get command.

To get more help on what you can do enter "SITE help" or "SITE commands", if I remember correctly.
0
 
LVL 20

Expert Comment

by:dsacker
ID: 12357593
That's it, hweber; it had been awhile, but yes, that's how I used to do it.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
repeateFront java challenge 31 87
Strange date stored 22 100
post4 challenge 28 83
firstChar challenge 13 86
Here is how to use MFC's automatic Radio Button handling in your dialog boxes and forms.  Beginner programmers usually start with a OnClick handler for each radio button and that's just not the right way to go.  MFC has a very cool system for handli…
Introduction: Finishing the grid – keyboard support for arrow keys to manoeuvre, entering the numbers.  The PreTranslateMessage function is to be used to intercept and respond to keyboard events. Continuing from the fourth article about sudoku. …
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now