Sap Implementation and Administration Guide
Sap Implementation and Administration Guide
It is used to provide the support to End Users. There are various types of
Supports provided by the partners to the customers. Partner (Partner) is a
company which provides support services. Ex: IBM, HP, HCL, TCS, WIPRO,
SATYAM
Note: Very less privileges are assigned to the users there will be no
input on the system by this users there will be no input on the system
by this users i.e. they can’t Delete, Drop, Change objects in the
system. It is also referred as monitoring Job.
2. Level-2 Support: The reports from the Level-1 consultants along with
recommendations are evaluated and ensure that they are resolved.
Level-2 consultant handle assignments of roles, Background Jobs
rescheduling, data transfers, notes etc…..
Based on the nature of the company the following activities are also
segregated.
Security
Performance
1
Data Base
O/S
Transports
Working on Tickets/Requests/Cases
Configuring Buffers
2
Configuring operation modes
3
Support Architecture:
CVONNECT
VIDEOC
Connectivity Landscape
ON
RELIANC
OFFSHOR RIGHT CUSTOME
E
E SHORE R
TVS
4
Connectivity from OFFSHORE to CUSTOMER/CLIENT:
FAX REMEDY
CLARIFY
EMAIL HP
USER Overview
Request Seibel
Ticketing Tool
SAP CRM
SYNERGY
Phone
CUSTOMID
EXCEL
5
Status Description
New Raised Problem
Assigned When the Consultant Accept the Ticket
Work In progress Processing
Temp Fix Temporary Fixed, Job Aborted, Run
Temporary
Pending For Approval
Closed/Completed/ Finished Problem is Fixed
Severity of the Problem:
Very High: Printers Down, Instance Down, Services are partially inturepted
6
Parameters for defining the Number of W.P’s:
Dispatche QUEU
Central r E
USER W0,W1…………………………
Instance Wn
U SCREEN
C ABAP
SQL
DATA
BASE
R/3
Buffers
DBCL
7
Every Dialog W>P an handle 5 to 10 users 9Depending upon the type
of users (Lo, Medium, High))
Each Dialog W.P will be timed out for every 600 eseconds or the time
specified by parameter “rdisp/max_wprun_time”
Dialog Steps:
It is a part of a transaction. It can be also called as a sub transaction.
2. Type: It shows the type of work process. It can be any one of DVEBMGS
3. Process ID: (PID) It represents a process Id at O/S level. This is used to identify
the critical process running at O/S level and to take a decision whether to continue
or Kill the W.P.
a. Running: The W.P is executing the user task until it complete the task or
timed out. It written in the status of running
8
b. Waiting: It is waiting for the user request they are free t handle the task
assigned by the dispatcher
c. Holding: The process is on hold. (It is also running) and waiting for the
communication from an RFC system.
e. Ended: The W.P is ended i.e. it could not be started and it can’t handle any
user request
Sleep Mode: It’s waiting for the resources on the target system
Private Mode: It is dedicated to a user. Time out will not work for this
process
8. Semaphore: It indicates the number of the semaphore which blocked the W.P i.e.
each W.P needs to work at O/S level and gets blocked for the various resources.
There are 55 semaphores which are displayed by pressing F1
9. CPU: Click on CPU to display the time utilized by the W.P while accessing CPU. It
is also reffered as CPU time.
10. Time: The time spent by the dialog W.P to execute the current dialog step of a
transaction. If it goes beyond 600 seconds it will be terminated automatically.
9
14. Action: Specify the action performed by the W.P. Ex: Logical Read, Sequential
Read, Physical read, Roll In, Roll Out etc…
Monitoring:
1. SM50: It is used to monitor the status of various W.P’s on an instance.
2. SM66: It is used to display the W.P of all instances. It is used to monitor the time
consuming W.P’s with respect to users, report, reason for the long running and the
type of action on the database along with the time consuming for that dialog step.
3. As part of the checklist you need to identify the total number of work processes
with various statistics and mark them with red which are consuming lot of time.
The reason for this is also very important. (Sleep Mode, PROID, CPIC….) to identify
the expensive W.P.
4. If all the W.P’s are in the status of running we can assume that the system is
over loaded due to lack of memory or the users are overloading the system i.e.
more than the expected. (The system designed for 200 users but it is being utilized
by 300 users)
5. We can also kill the expensive W.P from SM50 (Inform the user before killing the
W.P). Select the user W.P Go to Menu Process Cancel with core or Without
Core
Note: Sometimes it may be recommended to end the user session instead of killing
user W.P.
Dpmon:
It is used to monitor the status of W.P at O/S level. If the system is congested and
user can not log on to GUI then use dpmon at o/s level. It displays the list similar to
SM50.
We can select the process which is time consuming and use the option kill with core
or without core. If we can’t kill identify the Project ID and kill at O/S level
10
Note: Dialog Process is used to handle the user request to schedule the job in the
background to update the database to print the requests and to get the logs before
updating a record.
Disadvantages: Dialog process can’t be used to run the long running, time
consuming expensive programs or Reports.
11
Background Process:
The time consuming, expensive, long running programs can be scheduled
in the background to run during Off Peak hours without user intervention.
The max work process runtime is not applicable to background W.P i.e.
they can run for any number of hours.
Go to SM36 Specify Job Name Specify the Job Class Specify the
job triggering mechanism (Immediate/Date & Time/Event/After Job/ At
Operation Mode…etc) Save the job definition
Job Class:
Class-A: It is used to define high priority jobs. We need a dedicated process of Type
A which is defined in operation mode. Class A job will be executed by only Class A
work processes.
Don’t schedule more Class-A jobs unless it has a dedicated work process at that
point of time.
Class-B: It is used to handle medium priority jobs i.e. system defined jobs like SAP
standard housekeeping jobs which runs periodically at regular intervals.
Class-C: It is the default class for all the Jobs. It is used to schedule low priority jobs.
2. Released: When you specify the date and time to a scheduled job it’s status is
released
3. Ready: Ready for the execution and waiting for the resources
12
4. Active: The job is currently running
When the dialog user defines the run a job in the background it is entered into the
tables “TBTCT” and “TBTCS”
It checks for the jobs in the ready state and brings them into background job queue.
It runs in the dialog process.
3. A background job scheduler runs for every 60 seconds in the dialog mode to pick
the background jobs
4. If the job is picked and ready to execute the status is set to ready
Background Job can be defined by using an ABAP program, External Program and
External Commands
13
Ex: Delete the background jobs for every two days 9The jobs which are
terminated or completed successfully)
Delete the old log files for every 3 days or delete the log files which are older
than 2 days.
Note: Variants are stored in the table TVARV (Table of variable in selection criteria)
2. External Program: It is used to define the program to trigger on the host wwith
the specified parameter
This type of job step allows you to run programs outside the SAP System. External programs are
unrestricted, directly entered commands reserved for system administrators.
3. External Command: These are the commands which are not specific to O/S
These commands are defined I transaction SM69 and executed through SM49.
This type of job step allows you to run programs outside the SAP System. External commands are
predefined, authorization-protected commands for end users.
The type of external command and external program is unrestricted, meaning that you can use either
compiled programs or scripts. Such programs can be run on any computer that can be reached from the
SAP System. Parameter passing to non-SAP programs is completely unrestricted except by the
predefinition mechanism for external commands.
Output of non-SAP programs, particularly error messages, is included in the job's log file.
Definition
• The background processing system makes a distinction between external commands for normal
users and external programs for system administrators. You can see this distinction when
scheduling a job from Transaction SM36, with separate fields for external commands and
external programs.
14
External commands
• External commands are predefined commands for end users. They are operating-system
independent and are protected by authorizations, so that normal end users can schedule only
those commands that the system administrator permits them to.
• With an external command, an ordinary end user—any user without background processing
administrator authorization—may run a host system command or program that has been pre-
defined by the administrator in the SAP System. The user who schedules the external command
must have the authorization required for the external command.
• External commands let you control what your users do outside the SAP System. End users can
run only the commands and arguments that you specify in external command definitions. And you
can control access to external commands with SAP authorizations.
• For additional security, external command definitions are operating-system specific. For example,
you can define variants of a command for UNIX and Windows NT hosts. A user who schedules
an external command must specify the type of operating system in which the command is to run.
The system then automatically selects the correct operating system variant or issues an error if
the required variant has not been defined.
External programs
• External programs are unrestricted commands that are neither pre-defined or restricted by
authorizations. A user with administrator authorization can enter any of these in a job step.
• With an external program, a system administrator can enter any desired host operating system
command or program in a job step. No SAP authorizations test is carried out before executing the
command.
• External programs give an administrator—a user with the background processing administration
authorization (authorization object S_BTCH_ADM Batch processing: Batch Administrator)—the
flexibility to run any required host system command without any administrative preparation in the
SAP System.
15
• The purpose of this distinction is to let system administrators execute any required external
program while restricting normal users to authorizations-tested external commands.
Go to SA38 Specify the program Name as RSPO1041 Execute or F8 Specify the inputs Go to
Variants and save as variant Specify the Variant name Specify the Description
Now Go to SM36 Specify the Job Name Specify the Job Class Status as ScheduledSpecify the
server where the Job needs to be executed Click on Job Steps Click on ABAP program Specify
the Program Name Specify the Variant Save the Job Steps Click on Start Time (Condition)
Specify the time or the start condition for the job execution and save the job definition.
Date and Time: To specify at later date and time i.e. date and time for the job execution
After Job: The success of one job starts the other job. Failure may terminate further steps
After Event: Event triggers the job using SAPEVT (SAPEVT is an executable in run directory)
At operation Mode: Once the operation mode switch takes place the jobs will get executed
We also can define the output using spool list recipient i.e. output can be to a printer, Email, Fax…etc
when defining the background job.
Housekeeping Jobs: Click on the standard jobs to define the standard housekeeping jobs.
Select all the required jobs to schedule or click on Default Scheduling to schedule as per SAP norms.
16
Background Job Monitoring:
1. Go to SM37 Specify the job name or user name with job status and start data and time.
2. The jobs are displayed with various statuses. Select the job. Click on the job log to display the
execution of the background job.
3. Select the job click on spool to check the spool generated by the background job
4. The background job can be deleted ( Including Active jobs) we can also reschedule and repeat the
scheduling or move to other dialog instances.
5. We can also apply the job change to the inputs of the job before it becomes active.
1. Schedule backup
2. Customize the in house reports such as daily sales, purchases to display the report to the usewr in the
PDF form.
4. Data Transfer from R/3 system to file system and vice versa. Ex: Manual Time in and Time out entries
or schedule to move in to SAP periodically
d. File is corrupted
2. Authorization issues:
3. Database Issues
a. The database space is not enough and results in errors (ora- 1653, 1654, 1631, 1632, 255,
272 ….)
17
4. ABAP dumps due to programmatically errors (S-Note, Support Packages, patches, Kernel upgrade)
a. Maestro Toll
b. Tidal Tool
Note: In order to work with above tools customer provides adequate training to the consultants
SM62: It is used to display SAP events which will be triggered in the background by using SAPEVT
Schedule report RSBTCDEL to delete the old background jobs based on outdated variants
18
19
Authorizations for Background Processing:
Authorizations for accessing background processing jobs can be set up for two types
of users: administrators and end users.
A user’s jobs are defined and run in the user’s current logon client, regardless of whether the user’s
background processing authorizations are set for user or for administrator.
Setting Up Authorizations
Administrator authorization setup requires the following authorization objects:
User authorization setup beyond job scheduling and status checking requires the following authorization
objects:
20
Operating System Commands)
Allows a user to run external commands.
S_ADMI_FCD (System Authorizations)
For special functions, such as debugging active jobs.
For complete information, see authorization object documentation from Transaction SU21.
21
SAP Transaction:
A transaction is defined as a sequence of dynpros (sap term for screens) having input and output fields
and corresponding processing logic behind them to perform a particular task.
Every transaction has a 4 or more character code assigned to it. To invoke the transaction the user needs
to enter this transaction code in the command window. This takes the control to the first screen of the
transaction.
E
L.U.W
M
L.U.W
P
T
L.U.W DB
A
L.U.W B Committed
A logical unit consisting of dialog steps, whose changes are written to the database in a single database
LUW is called an SAP LUW. Unlike a database LUW, an SAP LUW can span several dialog steps, and
be executed using a series of different work processes. If an SAP LUW contains database changes, you
should either write all of them or none at all to the database. To ensure that this happens, you must
include a database commit when your transaction has ended successfully, and a database rollback in
case the program detects an error. However, since database changes from a database LUW cannot be
reversed in a subsequent database LUW, you must make all of the database changes for the SAP LUW
in a single database LUW. To maintain data integrity, you must bundle all of you database changes in the
final database LUW of the SAP LUW.
22
The bundling technique for database changes within an SAP LUW ensures that you can still reverse
them. It also means that you can distribute a transaction across more than one work process, and even
across more than one R/3 System.
23
Update Mechanism:
Whenever a user wants to update or create a transaction logs into the
system using dialog process
Dialog process updates each dialog step task in temporary tables. These tables
are called as VB* tables.
24
Upon the successful update (Temp Table) a transaction Id is generated
Update process gets initiated, reads the temporary tables and updates the
database synchronously based on Transaction Id.
Types of Updates:
1. Local Update
2. Synchronous Update
3. Asynchronous Update
1. Local Update: Dialog process updates the database directly (System tables,
direct update tables, users etc…)
1. V1 Update
2. V2 update
3. V3 update
There should be at least one V1 update process defined for every 5 Dialog
processes.
25
SE12: Display the database tables
Note: The update process inherit the locks from dialog process
Update Monitoring:
Go to SM13 to display the records based on client, user, from date and To
date and status.
Auto: If the update is cancelled due to any reasons it will be set to automatic
update once the problem is solved
Update Errors:
1. There is no space on the database (errors are prompted with message Err-
1653, 1654, 1631, 1632, 255, 272 and so on)
3. Number range problem: Cannot insert duplicate records. During the above
problems we can set the system to deactivate the complete update mechanism
to keep the system consistent
4. After resolving the above issues we need to manually activate the update
mechanism to update the records. The records with errors state will turn into
Auto Status
5. There are some records where the error message says that error (Couldn’t
repeat the update) that means these records can’t be updated again
6. If there is no such error we can select the record and repeat the update
Use the following transaction to get the granular formation about the update
failure
26
SM14: It is used to deactivate and activate the update manually and we can fix
problems manually
Update Parameters:
1- Delete, 0- No
We can also schedule a background job RSM13002. But it will delete the
update request which are in completed. Alternatively use rdisp/vbreorg
set to 1 so that it will be deleted after restarting.
Update Advantages:
1. Database consistency
4. Update process reads the data from temp tables and update the database
synchronously.
27
Update Problems:
2. The number queue increases and more updates are init state
Resolution: Try to find out the status of other back ground job which are
updating the data base.
The update is consuming more time to update the database, the update queue
increases. If it is a generic problem try to resolve it.
5. Table Space Overflow: When the table gets overflowed we could not update
the database. Increase the table space and rerun the update.
Note: Update work with enqueue process to obtain and inherit the locks.
28
Enqueue Process:
Database locks are only at DB level, where as enqueue locks hold the
transaction in large.
DISPATCHER
DI
TSKTT
U
ENQUE
USER
C UE MESSAGE
SERVER
Enqueue Mechanism:
3. The enqueue locks are issued from the shared memory of the central instance
which are displayed in transaction SM12
4. The use update the record in temp tables and locks will be inherited to the
update process till the final update into permanent tables in the database.
29
6. There will be only one enqueue process in most of the environments. It is also
possible to configure more than one enqueue process but ensure that all the
processes shares the same lock table.
8. Enqueue displayed based on table name, client and user name. It displays
lock arguments, time and the table.
9. No lock should be older than 24 hrs. If long pending locks are displayed we
nedd to evaluate clearly.
Enqueue Problems:
When the lock table overflow the error message recorded in SM21,
ST22
Releasing Locks: Rlease the locks only with the permission of the user. Te
permission should be in black and white (Email or signed document).
30
The following is the procedure for the lock release:
Get the detail of the user from SM12 and communicate with the user to
release the lock
If the user is not in the office communicate over mobile (Verbal) and
send a mail (As per the conversation in releasing the lock….).
Get the approval to log off the user session in SM04 and release the
lock.
31
Spool Management:
It’s only the process which is used to output the documents to the printers, fax….
Dialog process or background process creates a spool request i.e. to print the
documents.
Ex: Dialog process use to print an individual pay slip, sales order, purchase order
invoice etc…
Background processes use to run the pay roll to generate pay slips for all the
employees. To print delivery orders in batch (bunch) invoices etc…
When the print order is specified by the user or background work process the spool
request is stored in database or at O/S level in the global directory. The storage
location is specified by the parameter rspo/store_location. This parameter has
two values Global-G and database- DB
These spool requests are also referred as TEMSE. (Temporary sequential objects).
These are stored in the location rspo/store_location parameter.
TEMSE is nothing but spool requests. Spool process reads Temse and generates
output requests.
TST01: It stores the objects and details of the spool requests such as name of the
Author, Number of copies, name of the printer etc..
USER
DIALO
G
DIALOG
BTC
Jobs
TEMSE
Parameter G: The Temse resides at O/S level. It will be faster to access than
database (DB). When the spool size is small (around 300 MB) and If the spool
size increases it will be difficult to locate them to print . O/S memory is used.
Parameter DB: Time consuming to wrote into DB. But with the help of indexes
it can be printed out fast. No special care for backup is required because it’s
backed up along with normal database. O/S memory is not required.
SA38: RSOSR002 is the report used for deleting the old requests.
Advantages of Temse:
Output requests are depends upon the access method. Access Method
specifies the type of access to the printer.
Access Methods:
Local Access Method: The spool process and the host spool (Printer
Spool) reside in the same system. Access method type L is used for
unix operating systems. C is used for windows which makes a direct
call to the host spooler.
Remote Access Method: The spool process host spooler resies on two
different machines. Access method U based on unix barkle protocol.
User for unix os access method. S sup protocol used for windows.
Sap R/3
33
USER
F Printer
It’s also not used for scheduling background jobs because the interactive inputs.
Defining a Printer:
Output device name should be meaningful to identify the location and type
of printer.
Spool Servers: The server with at least one spool process is called
spool server. Spool server can be logical or real server. Spool servers
are created in SPAD
Note: Specify the group so that only the group assigned can access
the printer
34
USER
Real Real
Spool Spool
Server Server
Click on the Access Method:
C for Windows NT
L for UNIX
U for UNIX
S for Windows NT
Note: Don’t configure too many front end printers. If configured spool congestion
occurs.
This parameter allows using the work process for the front end printing, let us say if
we have 10 processes only 2 can be used for front end.
Destination Host: Name of the host where the printers are configured.
Check Box: Don’t query host spooler for output status. Each work process goes to
the printer and gets the status of the printing. If this box is not checked the spool
process are busy getting the status.
Output Attributes:
35
Author Name
Number of copies
Note: If the device types are not available select SWIN a default device type
which will run a suplpd (Line print daemon). Suplpd is a protocol to print by
default, if the device types are not available.
Spool Monitoring:
Go to SP01 Specify the User Name, Date and Time to display the list of
spool requests. The following statistics of the spool requests are
displayed.
“-“: The request has not been sent to the host system or the output
request doesn’t exist.
Completed: The job might be completed but assume that handling over
the print job to the printer is completed. The printer might not be
printed.
Problem: The output request printed but contains mirror errors such as
page format, character set etc….
36
Go to SP01 and select the spool requests which are thrown into errors.
However we may need to act based on user requests such as the status
shown completed but the documents could not be completed.
Waiting Status: These requests are waiting in the waiting status for more
than one hour
This above reports deletes the old spool requests based on status.
Spool Problems:
Printer problem
Go to SP02. This will provide to all the users to display their own spool
requests.
If the spool request is thrown in to error to a particular printer then select the
printer and print select the printer with change parameter
SPIC: Spool installation check. This is used to check the spool device and
pending requests along with consolidated problems and warnings.
37
SP12: Temse administration. It is used to check the memory allocation
objects and perform the Temse consistency check
Reque
st
Dialog Dialog
Back
Groun
d
Spool Request
LGS
38
Data Transfer:
Old Legacy
system
Interface
BW
SAP SYSTEM
Parallel Run: It is an activity where both SAP and Non-SAP systems run
parallel. The data entered in NON SAP system will be transferred to SAP
system periodically during Off Peak hours without any user intervention.
39
Remote Function Call: There are various types of RFC’s which are used to
transfer the data.
ARFC: Does not check for the acknowledgment from the target system.
These are not reliable because there is no confirmation from the target
system.
Give description
Go to Technical Settings
40
Specify the system number
Gateway host
Save
If the specified user is a dialog you can click on remote login to check the
connectivity.
Logical System: Logical systems are used to identify the client uniquely in
the landscape.
Method C Simulator
41
Add message type and specify the message type.
Ex: Central user administration uses ALE mechanism to transfer the data
between clients
It is used to exchange the data between SAP and NON SAP systems.
SAP system sends invoice in the native format which is converted to IDOC
and sends to customer VB system.
The sending system documents are out bound documents in the sending
system. The receiving system documents are inbound documents from the
sending system.
Go to WE05 select the date and time to display the IDOC’s with various
statuses
42
Some of the states is 51 document not posted.
QRFC Monitor:
SM58: Is used for monitor the transactional RFC’s based on transaction Id’s
Ex: Char (50) is source but an receiver char (40) so we may need to
truncate the source by 10 characters. If receivers is char(60) se ma
need to padd the data.
RFC erros lik t ID. RFC: Error like USERID, Password, USER ID not active
43
Instance:
Instance provides a set of services, work processes, Buffer-Areas to an
application instance is controlled by various parameters i.e. start up
parameters, instance parameters and default parameters. These parameters
describe the characteristics of an instance.
login/* : All the login parameters to control password, user id etc. This
can be modified based on requirement by administrators. But it
requires a restart of the instance to take effect. It’s naming convention
is “default.pfl”.
44
<SID>_D<nr>_<Host Name> (Dialog instance)
rdisp/wp_no_dia
rdisp/wp_no_btc
rdisp/wp_no_vb1
rdisp/wp_no_vb2
rdisp/wp_no_spo
rdisp/wp_no_enq
rdisp/max_wprun_time=600-1800
Profile management:
Ex: Work process should not be configured more than 100 where as
this is allowed at O/S level but Database level it gives warnings.
Administrative Data: Which will gives you the path of each profile.
Do not change this until there is change in path of the profiles
45
BASIS Maintenance: This is used by technical team where
maintenance is performed without knowing the parameter names. You
can toggle between the values by increasing and decreasing the
values. It is used to maintain work process buffers, memory
management.
46
Operation Modes:
Operation modes are used to define system optimally by utilizing the resources
during the peak hours and off peak hours. Operation modes toggles between the
day mode and Night Mode (Peak and Off peak) by utilizing the work process
optimally.
Purpose of Operation Modes: Operation modes are used to utilize the dialog process
during day time and background process during the off peak hours i.e. we may not
require dialog during off peak hours. We may require more BTC during off peak. We
can dynamically switch between the processes without restarting the server. When
opmode switch occurs it is resulted in SM21.
47
Logon Load Balancing
L D.I
G
D.I
1
End
User C.I
DB
L
D.I
G
2
D.I
Message Server
These are used for logon load balancing\fail over between the instances.
These are used for optimal utilization of buffers.
Message server keeps the list of all logon instances and displays the favorite
computer server by calculating answer time and think time.
Mechanism:
48
User logon to the system using logon group
Message server keeps the info of favorite server and route the request
to that instances
Advantages:
Load balancing
Fail over
These are used by RFC users to identify the least loaded server and route the
request.
These are mainly used for background job processing. These are used for
optimally utilization of resources so that background processes are utilized
effectively
49
System Monitoring
It is used to monitor system health on a periodic schedule to avoid the last
minute surprises and accidental growth or utilization of resources
abnormally.
SM51: To identify the types of process configured and the status of the
instances. As per our checklist we need to count the servers and ensure that
all the active servers are running
Click on the release notes to identify the R/3 Kernel, DB Kernel, O/S kernel
and support package information
Select the systems and use option “Goto” to display various properties of the
instance
It is used to display the logs based on instance. Go to SM21 display the logs
based on Date, Time, User and Transaction Code.
2. Oracle errors (ORA 1631, 1632, 1653, 1654, 255, 273, 1555)
3. Update deactivation
6. User distribution
7. O/S errors
8. ABAP Dumps
50
9. Background job errors
Mostly it records all the important activities. We need to look in to the errors
that are displayed in RED color and light Red color
Analysis: Click on the error message. Get the error message. Identify the
uses and check with the user. If any abnormalities are found get the error
message and check out in market place.
1. Time out Error: Schedule in the background or fine tune the program
by restarting selection criteria
2. Data Base Errors: ORA 1631, 1632, 1653, 1654, 255, 272, 1555
8. Too many conditions and indefinite loops throws the custom program
in to dump
Go to ST22 Double click on the dump and read the dump thoroughly and
understand the problem. Thoroughly understand stand the problem. Go to how to
correct error and try to resolve get the error message and resolve by searching in
the market place.
51
SM04: To display the list of users logged on to the instance. RSUSR006 is the report
we can find all users.
SSAA: Transaction help you to know the user has navigated to the transaction or
not. It own all the reports (Monthly, Weekly, Daily)
SJAD: Statistics collection for all systems. Report used to generate STAD is: RSSTAT26
52
Front End Time (or) GUI Time: The time taken by the user request to reach the
dispatcher is refereed as GUI Time or Front End time.
Normally this time should not take more than 200 m/s. If it goes beyond 200
m/sec it is considered as expensive. However it is not going to be the part of
Response Time.
4. Logon through VPN or Firewall and proxy and filters may also be a
problem
Wait Time: The amount of time the users request waits in the dispatcher queue.
2. Work processes are not sufficiently configured at the rate of ratio 1:5
(5 user, 1 work process)
3. Work process configuration is fine but the processes are held up with
expensive user requests
4. The work process might gone into private mode, sleep mode, RFC,
CPIC modes
Solution: Identify the expensive process and logoff the user session based on
approval. We can also consider increasing of work process or deploying the
additional instance based on the load. Alternatively configure logon load balancing.
Roll-In-Time: The time taken by the work process to roll the user information into
task handler
Roll Out Time: The time taken by the work process to roll out the user information
into roll area.
53
Both Roll in and Roll out time considered as Roll Time.
54
Gateway Process:
There will be only one gateway process for each instance. Gateway is
monitored in SMGW. The RFC connections, The ICM connections are
displayed in SMGW
rdisp/max_gateway=100
Message Server:
There will be only one message server in R/3 system (Irrespective of
instances).
55
SAP Archiving:
It is the process of moving the old data (which cannot be updated any more
but required for data analysis and for statutory auditing requirements). The
data cane be moved into global directory. If the archiving is not performed
time to time the following issues are cropped up in the data center.
3. The existing tapes becomes un utilized when the size groups beyond
the size of the type
Database reorganizations should follow the SAP Data Archiving. There are third
party tools available for performing archiving.
1. IXOS
Process: Identify the data based on objects and tables i.e. users complain that
response modifying certain objects
Go to transaction DB15: It displays objects and tables along with the size of the
tables.
Go to transaction File: TO define the logical path for archiving and assign logical
path to physical path.
56
5. Click on logical file name to move the data
7. Specify name
2. Click on Write: To write the data click on delete specify date and
parameters Execute
57
CCMS Monitoring
CCMS: Computer center monitoring system
It is used to raise the alerts based on the threshold values which are defined in the
system.
RZ20:
It is used to raise the alerts based on the threshold values which are defined in the
system
1. RED: Problem
2. YELLOW: Warning
3. GREEN: ok
58
Go to RZ21: TO change methods properties and MTE classes if required
59
WORK LOAD OVERVIEW:
20 KB
GUI TIME r
TSKTT
Queue)/Wait Time50 m/sec
SCREEN
EN U
D ABAP
US C
ER SQL DB
R3
Buffers
DBSC
RFC
CI/DI
Processing Time
2. Wait Time
3. Roll In time
5. Processing time
6. CPU time
60
11. Dialog Response Time
Generally each time should not exceed more than 50 m/sec. If it exceeds consider
the following:
2. Advice the user to use the reports by search criteria (Specify user name,
date, time, status etc)
Processing Time: The amount of time taken by the work process to process the
user request. (ABAP interpretation, screen interpretation, SQL interpretation) and
reinterpretation, processing time should not more than 2*CPU time
While processing user request CPU resources are utilized expensive programs,
expensive SQL statements, expensive screens are responsible. For expensive/ high
processing time
CPU Time: The amount of time consumed by work process in utilizing CPU
resources while processing request.
SCREEN 1 4
ABAP
2
SQL0 5
3
6
1+2+3= CPU Time
The time taken by the work process to load and generate the screens and
programs is referred as lad and generation time.
Generally it should not be more than 200 m/sec. If it exceeds it’s not utilizing
buffers properly increase the size of the buffers.
61
Enqueue Time or Lock Time:
The time taken by the dialog process to communicate with Enqueue process
to communicate with Enqueue process and obtain the lock while updating a
record is referred as Enqueue time.
Generally it should be around 1 m/sec to 5 m/sec for the request that are
coming from central instance and up to 100 m/sec that are coming from
dialog instance through message server.
2. Dead Lock
RFC + CPIC Time: The time required to communicate with external system or
calling programs using RFC or CPIC is referred as CPIC time.
There is no threshold value but ensure that it should not be a bottleneck o the
response time. Ensure that resources are available on the target system. If required
configure RFC server groups.
DATABASE Time: The time required to process the user request in the database
is referred a Database time.
Generally it should not be more than 40% of (response time- Wait time)
62
Dialog Response Time: The sum of all the above time except (GUI Time + CPU
Time). Generally it should not be more than 1000 m/sec but on an average it should
be between 600 m/sec to 1200 m/sec.
63
Work Load Analysis
Go to Transaction ST03 and identify the Transaction, User and Process which are
consuming more than the threshold values.
The reports are displayed differently for Expert Mode, Administrative Mode and
Service Engineer
64
R/3 Buffers
Buffering: The frequently accessed content and rarely changed content is stored
as buffer in the application server which is also referred as R/3 buffers.
R/3 Buffers: These are stored in the instance and cannot be shared between
the Instances. These buffers are different from database buffers. There are
various types of buffers.
Buffer Mechanism: User logs into the system to access certain data. The
request is processed and goes to database to fetch the content. If the
content is eligible for buffering it is stored in the instance.
The content should be rolled out into user context before the response is
sent to the user. As the user context is small in size the context I not stored
in user context. But in terms store in R/3 buffers and the pointer to R/3
buffers are stored in user buffers.
Note: User context cannot be shared between users but R/3 buffers are
shared between users.
2. Buffer hit ration: The ration should be always greater than 94%
3. SWAPS
We need to look for swaps. Swaps occurs when the allowed space is completely
used or of all the directories used or both utilized.
Basically the ABAP buffer size will be 150 MB by default. We can increase up to 600
MB (Up to 4 times) based on the available memory.
65
1. Frequent transaction of objects
Note: In each company the swaps occurs frequently but look into the number of
swaps. Based on the size of the database we can allow 5000 to 25000 swaps.
They are not effecting the performance of the system i.e. response time.
Click on parameters to identify the parameter name and value and to change in
RZ10 before changing any parameter read type. Complete documentation in RZ11.
Miss configuration or improper configuration may not start the SAP engine.
TABLE Buffering: Apart from the repository objects SAP also buffers the table
content based on the table data (content).
Note: For most of the tables SAP define the buffering settings, which can be
modified in SE13.
2. Buffering Allowed but Switched off: This is used for development and
quality systems
66
Exercise: List out at least 5 tables in each of 7 cases. SE13 and SE14
Buffer Synchronization: DI
End R/3
User Buffers
CI DB
End R/3
USer Buffers
DI
End R/3
User Buffers
2. When data is fetched by one instance it will keep a log in the table
DDLOG
3. Even the content is accessed from buffers it will check the dialog
always
If there is a difference in time stamp it will fetch the data from database.
Mean while we can synchronize the data between instances using the
following two parameters:
67
68
Memory
It’s a temporary work area to perform calculations, Reads the data from the
disk. No operations are allowed on the hard disk without memory.
Memory Assignment:
When a user is assigned with work process the work process requires
memory to roll the user information.
In order to roll the user information from ROLL AREA (U.C) into Task Handler
work process requires memory.
Each work process assigned with a memory called Roll Memory which is
defined by parameter ztta/roll_area= 2 MB.
By default it is 2 MB, and this is the maximum memory a user can use.
But initially when the user request we will assign around 1 MB that is
specified by parameter ztta/roll_fiorst= 1 MB
Heap Memory
Extende
d
Ztta/roll_area=2 MB Local Memory
Memory
Once the initial memory is utilized i.e. ztta/roll_first we will assign memory
ztta/roll_extension=512 KB to 2 MB
If the specified value is used completely then the remaining part of the roll
memory is used i.e. (ztta/roll_area) – (ztta/roll_first)
If this value is also not enough it uses private memory i.e. the work process
goes on to private mode. The value ranges from 80 MB to 2 GB. This value
should be lower than abap/heap_area_total (Memory for Dialog and Non
Dialog WP)
rdisp/wppriv_max_no=1 0r 2
If too many programs or W.P goes into provate mode the WP congestion
occurs (Hour Glass) and no user can login to system.
Use” dpmon” to kill the expensive work process based on the approval.
70
Reconcile ST03 and ST06 and identify the expensive ABAP program and
recommend to fine time it.
However we can identify the top 10 CPU users, using Detail Analysis menu
Top CPU users.
ST06: It is used for displaying CPU idle time number of CPU’s, CPU
utilization, Physical memory available and utilized and available memory,
swap memory and used.
It is also used to start and stop SAPOSCOL service. Click on detailed analysis
menu to display the TOP CPU users compare the data based on memory
CPU.
ST07: It gives the complete picture of the instances users work process and
the load on the applications. It is used to say weather system is optimally
configured or not. It is a measuring device to configure load balancing based
on usage of application components.
It also gives the details of Response Time (Which Instance). It also displays
the amount of buffers configured on each instance along with the buffered
content.
1. SQL trace
2. Enqueue Trace
3. RFC Trace
4. Buffer Trace
1. SQL Trace: When a user complains with show response times while
accessing a report or when the DB time is more contributed in
response time i.e. more than 40% of the response time we need to run
71
the SQL Trace. Select SQL trace and activate the trace. Check that
trace with filter and specify the selection criteria. We can also enter
SQL statements and explain the statement about the cost and
estimated rows.
2. Enqueue Trace: When the enqueue time goes behind the threshold
value i.e. more thatn one m/s in Central Instnace and 100 m/s for
dialog instance then
Select Enqueue time and activate the trace and display the trace
similarly.
Kernel functions also i.e. kernel executable. When they are calling
certain functions we can also trace their activities
72
Motivation to Implement SAP
Industries
Marketing (Java & Oracle)
Sales (Wings)
3. Different Applications
4. Different Databases
7. Some of the software’s are out dated then there is no support from the
vendor
73
1. The companies unable to identify the requirements to implement and
replace the existing S/W by a single solution
3. Based on the auditors document the S/W vendors submit the feasibility
of the requirements.
4. External Auditors identify the right vendor with the help of customers.
At this point customer decides the S/W vendor based on the
advantages
Let us say customer decided to implement SAP ERP solution because it provides
functionality of more than 30 modules along with extension to various Add On’s. it
has a good track record of 46,100 customer providing 24*7 support and continuous
improvements by realizing patches, upgrades etc. It has a compatible GUI both web
based and GUI based and it’s portable across various OS’s and DB’s.
Steps:
SOW (Scope of work): It defines the scope of work at macro level and
includes the following:
3. O/S and DB
4. Number of Users
6. Assumptions etc…..
74
Based on the above document we can submit RFI (Request for Information) to
get additional details or clarity on the document. As a BASIS consultant we
need to submit the following documents:
2. Client Strategy
3. Transport Strategy
4. Approval Strategy
6. G0-Live strategy
8. Apart from the above the following documents are also included in the
proposal:
c. Planned man hours based on modules at the rate of 168 to 176 hours
per month or weekly 40 hours
e. List of assumptions
Finalizing S/W vendor by external auditors after considering SOW, RFP, RFQ
75
BASIC PREREQUISITES
2) Solution Manger
3. Perform H/W sizing based on users. to determine the CPU, Memory and
storage required for the system in the landscape (Development,
Quality, Production)
4. Include solution manager system in the sizing along with the SAND BOX
system. (Training or Testing or Standalone)
Note: IDES comes along with Demo Data Company is setup with all
options for Demo Data in IDES.
76
Implementation Methodology
Implementation partner uses the traditional process ASAP methodology to
implement SAP.
1. Preparation Phase
77
(Major Scope) is followed by final configuration (remaining
Scope) which can consist of up to four cycles.
We also need to resolve all open issues in this phase. At this stage we
need to ensure that all the prerequisites for our system to go live
have been fulfilled.
78
SOLUTION MANAGER
Uses of Solution manager:
8. Solution Monitoring
Interview Questions:
Roadmap:
79
connection, e-mail services. Apart from the above the major task is to plan
the hardware to implement SAP.
He needs to track the project status and update the management from time
to time. Based on the status of the project he will release the funds to
implementing partner.
Each division has one owner who owns the responsibility for the business.
It is accessed by www.service.sap.com/quicksizing.
2. It will prompt for USER ID and password. It is also referred as SAP USER ID
or SUSER ID
80
4. Click on the link Quicksizing. It will prompt you to key in your customer
number. It will be a 6 digit number.
5. Provide the customer number; specify the name of the project and click on
create.
1) Customer Information:
2) Working Time:
81
0-480 dialog steps/ 40 hours= 12 hrs (Dialog steps
per day)
I.e. low users will input his data for every 300
seconds.
7. Save the project with all the inputs and calculate the result. The result is
displayed as follows.
Ex:
82
1. SAP Notes: SAP provides a rich set of knowledge base to resolve
runtime issues information etc..
My SAPERP 2005
Netweaver 2004
Solution Manager
License Key: It is required for all the instances that are running on
production landscape.
Object Key: By default all the SAP objects are locked. In order to
modify the SAP standard object we need to obtain key for developers
and the object.
83
Click on SCCR key (SAP Software Change registration). Each developer
has to be registered in the website. There is a separate license fee for
developers. SAP designed 15 lakh programs or objects on SAP system.
System Data
User Data
User data is used to create new market place users and assign
passwords.
9. Quick Links: Quick Links are used to identify the options of market
place. It is also used to provide the URL’s
84
Solution Manager
1. Generation License keys/ Upgrade Keys
3. Monitoring Alerts
5. Maintenance Optimizer
6. Change management
Activity-2:
Satelite systems are SAP systems which can be monitored through sllution
manager.
85
Number, Host Name Generate RFC connectivity System
Landscape-RFC connectivity(required for each system to be
connected) Start select use scenarios Customizing
distribution Change request management SAP solmon RFC
connection with logon screens Transfer RFC connection
outgoing RFC connections Now specify Option, user Id, Pwd
Incoming RFC connection Additional RFC connection data RFC
connection attributes L:oad balancing Server Group Routing
Info Assign RFC connections for system monitoring complete
Activity-3:
Activity-4:
Activity-5:
86
SOLAR01: It is used to create various configuration scenarios that
needs to be configured in the project. This is also referred as
business blue print. This is used to select the scenarios from the
various modules, consultants can upload the docs.
The sizing output will provide the memory and storage required directly in
megabytes (MB’s) considering the growth in transactions values(Business)
No.of users and enhancement in modules.We may need to add 30% to 50%
to the output results.
1. Operating System
2. Database
Note: We may need to provide the sizing table with various options
Note: The sizing will be initially for development system. We need to plan
the hardware for production 3 months before going live (To save the
maintenenace cost, increase the warranty, Reduce the cost)
CPU requirement:
87
SAP does not give you the CPU output directly because the CPU varies based
on different manufacturers.
SAPS: SAP provides CPU requirement in SAPS (SAP Application Bench Mark
for performance standards). SAP defined benchmarks based on sales and
distribution module i.e. for every 2000 sales documents 100 SAPs are
required. Depending upon the vendor of CPU it can generate 800 to 2000
SAPs.
Let us say output requires around 5000 SAPs then Hardware vendor may
recommend 4 CPUs.
Ordering the HARDWARE: Once the sizing results are finalized we can call
for the quotations from the H/W vendors. Customer Manger and
Implementation manager work in this task.
3. SAP Software: We need to buy the SAP S/W through channel partners.
There are various types of SAP S/W. Based on customer requirements
SAP has its own release for different components.
88
From 6th year 17+2%=19% of total software cost
1997-1998 up to 3.1 i
2000 4.6c
Solution Manger:
3.2 2006-2007
4.0 2008
http://help.sap.com/releasenotes
SAP license is based on Number of Users. Each user cost is different from
country to country, state to state. It is estimated that each user cost varies
from 40,000 to 1,00,000 depending upon the number of users.
89
Note: After the H/W and S/W order it will take 1 Month to 45 Days to release
the Order.
Download the installation guide from service market place for specific O/S,
DB and Sap R/3 Version.
Ex:
3. If you have the software in DVD’s copy the software into TEMP directory
5. Find the required Virtual Memory and assign the memory to the
system.
Note: It is not possible to install the RAM which is required by the system.
90
On 32-Bit machines we can define up to 4 GB. On 64-Bit machine the
minimum SWAP memory will be 20 GB.
Install the JRE and set the path as defined in the document.
Environment Variables: This provides the run time environment of the S/W
i.e. installed on the system.
WINDOWS: On windows we need to set JAVA_HOME and Java Bin Path in local
variables and Global Variables.
IF the O/S is not WINDOWS then based on the O/S we may need to set profile
parameters in “.bash” profile or “.profile”. We can also use command
“setenv” and “setpath”.
Ex: WillERPDEV/WillBIWDEV
Get the Static IP address from the system administrator which should start
from either 172 or 10, where as 192 is used for Testing and 127 is used for
loop back etc as per the INA (International Network) standards.
Define the System ID (SID). SID is a three character alphanumeric string and
the first characters must be a character and the remaining two can be either
a number or a character.
91
There should not be any duplicate SID in the landscape
The SID name should be meaningful to identify the system in the landscape
based on the PRODUCT, LOCATION, Roll in the landscape.
Note: Don’t use reserved key words like SAP, BIW, SCM,SRM< ERP, All etc…
R/3 4.6 C
6.40 / 7.10
Installation Types:
92
SAPINST Requires JRE because the installation executables are
programmed using JAVA (SAPINST.CMD). Different passwords for
different users are created during installations. There is no provision
to change keyed Inputs. This is valid only for WEBAS 620 (4.7 EE,
4.7 EE SR1, 4.7 EE SR2). It is also not interactive.
4.7 620
5.0 640
XI 3.0 640
XI 7.0 700
BI 7.0 700
EP 6.0 640
EP 7.0 700
Installation:
93
Distributed Installation: In this installation the Central Instance and
Database Instance are installed separately
Select the SAPINST for the specified OS i.e. navigate to the folder i.e.
related to your OS
Note: While installing database use SAP customized Batch Files or Script files
defined by SAP. Don’t use the native setups of database. The advantage of
using SAP script is to set the environment variables that are required for SAP.
94
Specify the Instance Number
Specify the password for SAP system Administrator (USER ID) i.e.
SAPADM (SRMADM, DEVADM). He is the owner for entire R/3
system.
Ex: SAPServiceSRM
95
4. Dispatcher Security Port: 4700+<Instance Number>
DB Instance Installation:
Select DB instance
1. SAPBACKUP
2. SAP ARCH
3. ORAARCH
4. SAPREORG
5. SAPCHECK
96
6. SAPTRACE
1. SAPDATA1
2. SAPDATA2
3. SAPDATA3
4. SAPDATA4
5. SAPDATA5
6. SAPDATA6
2. Select the usage type (ABAP, JAVA, BI, PI, MI, EP etc..) ABAP is
mandatory to select
4. Specify the password i.e. master password for all the users that are
going to be created during installation
1. Click on additional life cycle task. Select Application Server and select the
dialog instance
97
4. Specify the password
Current version of GUI is 7.10 (700, 640, 620, 4.6 D, 4.6 C etc…)
Pre Implementation:
1. Feasibility Report
2. RFQ
3. RFI
4. RFP
6. Solution Manger
7. ASAP Methodology
Installation Logs:
Central Instance:
Keydb.xml: It will give you where the installation steps need to be start
(Continue with old installation)
Check for privileges of the user who is going to install the SAP S/W.
Contol.xml gets the details from DVD or DUMP and write the
installation steps in keydb.xml. When the installation is restarted it
98
reads from keydb.xml to continue the installation where it is
aborted.
Groups:
Creating usr directory where the SAP profile parameters are installed
99
Database Instance:
As we can’t load the data sequentially (It is time consuming) we will load the
data based on table type.
SAP Defined: It provides command files that are split based on the version.
These command files control the loads.
Each task file get’s the size from “.tpl” file and get’s the structure from,
“.str” file and table of contents from TOC file.
Process of Loading: Each task file consists of the Tables, Index View, Pkey etc
to be created.
Each task file when it is going to run state it is copied to a “.tsk.bak” file.
The load happens from .bak file. When the table is created or loaded an
entry is made into .tsk file with status (OK). If it could not be loaded then the
status will be (err) and we can see if it is failed in SAPint GUI (Failed)
Lock all the known users and passwords in all the clients
100
For Sap* login/no_automaticuser_sapstar=1
Create two super users. One should be sealed and kept by the
project manger and other one is used by BASIS consultant
101
Go to STMS
102
STMS Overview systems SAP systems create virtual system.
Quality System: It is used to test the objects for load and stress
that are developed in development system. The system settings are
set to "Not Modifiable”. If the object fails to test it needs to be
modified again in the development system is tested again in the
development system. Don’t move the objects to production system
until they are successfully tested.
Apart from the above we can have the following systems in the
landscape
1. SAND BOX
2. PRE PRODUCTION
3. TRAINING
4. PAY ROLL……..
Types of Landscapes:
103
3. Three System landscape
1. TRANS directory
3. Profile Directory
DVEBMGS <Instance_Number>.
(DATABASE LEVEL)
Repository Objects (A-X): The objects with name preceded by any letter of
this range are called as standard objects and repository objects and are
developed by SAP.
All the Repository objects are stored in the table TADIR. SAP recommends
not to modify any of the Repository objects. SAP in turn recommends to
develop your own objects in customer name space Y-Z alternatively with in
defined our own objects using Company Name.
104
Y-Z: Developer can create their own objects with the name starting with Y-Z
and this will not disturb the standard or repository objects.
Support Backup
EWA
066 Template
001 000
Strategy 066
Default
001 000
Template
Programs, Transactions,
DD02L: It is a table which contains all SAP tables.
It is recommended for Demo purpose and never used for production because
the Development, Quality and Production activities takes place in the same
system.
In Single System landscape the Inconsistency and Conflicts will arise in the
objects.
066
001 000
106
Two System Landscape:
066 066
001 000 001 000
Z<SID>
107
Consolidation Root Delivery
Root
DEV QAS
DEV QAS PRD
US
EUROPE
108
onto different landscapes. Geographically the objects are customized locally
according to local customize settings (Measurements, Time Tax etc…)
Other Systems in Landscape: Apart from the three system landscape SAP
also allows to include the following systems in the landscape.
1. Testing
2. Sand Box
3. Training
Go to Transaction slicense
The license key depends upon Hardware key o f the machine and installation
number.
Note: Hardware varies depending upon the O/S. Ex: 32-Bit, 6t4-Bit O/S and
SAP component
1. System ID
2. Host Name
4. OS
5. H/W key
109
6. Data Base
Normally license generation will take around 1 hour. The license key can be
downloaded from the same screen. Alternatively SAP also sends over the E-
mail.
The license key is a number of 24 digits but now SAP is sending the license
by encrypting in the text format.
Click on New License and specify the path of the text file.
When the system is installed it can be accessed with 000, 001 and 066
clients.
The tables with fields MANDT are called as Client specific tables.
110
Client field MNADT is a data separator i.e. the user’s needs to specify the
client number to logon to the client specific data.
001 Client: It is a backup client for 000 client as per initial plans of SAP. But
000 is continuously updated where as 001 is not. So the purpose is deviated
in the current versions like SOLMON, NETWEAVER systems. 001 is considered
as production client.
066 Client: Early watch client. It is used by SAP to logon remotely and
generate Early Watch Alerts. As per “SLA” (Service Level Agreement) SAP
sends two early watch reports per annum.
Client Creation: As the standard clients provided by SAP are not used for
production use we need to create our own clients and define client roles
Client Number: it is a3 digit ID which varies from 000 to 999 which means all
together we can create 1000 client s in SAP.
Note: The clients are available in the table “T000”. This is the only Cross
Client Table with the MANDT field.
Click on New Entries and specify the name of the clients, specify the client
numbers specify the name of the city.
Logical System:
111
This is used to differentiate between clients in the landscape. Logical
systems are created in transaction SALE.
SALE is used to define the logical systems that are used for communicating
or transferring data.
Note: Do not try to change the logical system name. Once it is assigned to a
client. In order to change logical system i.e. assigned to a client use
transaction BDLS.
112
It will prompt you to create a change request Specify the logical system
name Select the logical system name Select the currency Specify the
client Role
Client Role: It specifies the role of the client in the landscape. There are
various client roles defining the implementation.
This is only the client in the landscape where changes are made. The
changes in the landscape will be carry forwarded to other clients in the
landscape. No changes are allowed in other clients.
3. No changes allowed
113
eCATT and CATT allowed
eCATT allowed but FUN/ABAP and CATT only for trusted RFC.
Restrictions:
DEV:
TEST CWR NO 1
SAND CWRT NO 1
QAS:
CUST NO NO 2
TEST NO NO 2
SAND NO NO 2
PRD:
PRD NO NO 2
114
CS Client Specific
Protection Level:
Level-0: No restriction i.e. no restriction. This client is allowed for over writing
and available for client copy
Level-2: This option is provided to not to allow client copy and client
comparison
Ensure that necessary approvals are obtained from the customer to change
the client settings.
eCATT and CATT not allowed: It is used to upload the data into the system.
We need to specify whether they are allowed or not. Depending upon the
requirement we may allow or disallow all the clients. But in production client
it should be set to not allowed.
Test Client: It is used to test the scenarios that are configures in CUST
client. Changes are moved from CUST to TEST using transaction SCC1.
115
QTST Client: This client issued for integration testing and consolidation
testing. Changes that re made in CUST client are transported to QTST client.
(Tools like mercury, ecatt are used to test the integration between modules
along with stress and load testing).
TRNG Client: It is used to training end users before they work on the
production system.
MIGE and Prep (pay roll): These are optional clients that are created
based on requirement. Migration client is used to migrate the data from
legacy system. Preproduction client is used to check the behavior of changes
before they work.
Payroll Client: As we can’t run the pay roll on the production system (Test
Payroll n-number of times) payroll client is created and it is run at various
frequencies.
Prod Client: It is used by the end user to perform the business. It is more
critical client and no other system in the landscape is allowed to carry the
business.
116
Pre Requisites of Client Copy:
3. Choose 000 client for initial client copies. However business clients are
also allowed for client copy based on protection level.
4. To perform client copy always login into Target Client and copy the data
from Source Client.
11. It is not recommended to login to source client and modify the objects
during the client copy.
12. During client copy the number of tables does not increase. Only the
entries in the table increases under the entry “MANDT”.
13. Remote client copy has to be performed between same systems (Same
Version, Same Patch Levels) not possible for different R/3 system.
If there is no MANDT field in the tables these are shared tables for all clients.
117
Select MANDT , Count (*) from SAPDEV.usr02 group by mandt;
1. Create a client (SCC4 for create client) and logon to the target client
2. Go to Transaction SCCL
5. Select Profile
7. Go to SCC3 to check the logs (To monitor the client copy process)
1. Create a client
118
It is used to perform the client copy between the systems which are not in
the landscape
It is performed in 3 steps.
1. Client Export: Use Transaction SCC8 to export the client to O/S level. This
process generates transport requests in the \usr\sap\trans directory.
2. Copy the files to target system and import them using FTP and transaction
STMS
Standard Clients
Clients
119
CUST TEST SAND BOX QTST TRNG PREPROD
PROD
Client Deletion:
Go to SE37
Reports: The following reports can be used to lock and unlick the clients.
Note: Profile SAP_CUST is used initially to setup Golden Client but later this
golden client can be used as a source client to copy to another client with
other peofiles.
Client Deletion: Clients are deleted using SCC5. But they cannot leave any
space in the Database i.e. by deleting a client we cannot get any free space
in the database. We need to reorganize the database.
Locking and Unlocking Clients: Use these two reports to lock and unlock the
clients.
Setting up Library:
I order to get the screen context help we need to install the library and setup
in SR13.
Install the library from library DVD. In the shared folder Sap help.
120
Go to SR13 to set up the library
1. HTML Helo
2. Dynamic Help
F1-Field Help
Plain HTML: It is installed on the file serve and help is displayed in the HTML
format.
HTML HTTP: It is installed on the web server and requires web browser to
execute.
2. Variant
3. Training
121
Importing Profiles:
RZ10 It is used to set the parameters for Work processes, Memory, Buffers
etc…
Select check and verify database optimizer statistics, Adopt extents etc…
Go to DB13 Select the Date It displays all the above tasks. Select each of
them and schedule with different times.
Operation Modes: These are used to adjust the Work Process between Dialog
and Background work processes.
Go to Transaction SPAM
Creating Users: Create users and assign SAP_ALL, SAP_NEW (Take out the
critical Transactions like SU01, RZ10, RZ03, PFCG etc…)
122
DEVELOPMENT
Customizing: This is a process of modifying the system according to the
requirements of the customer.
1. Crating Company
2. Crating Country
For example below are some of the customizations that we will do indifferent
modules:
1. Field Exit
2. Screen Exit
3. Menu Exit
123
Support Packages, patches and Notes:
Support Packages are provided by SAP to provide the bug fixes, functional
enhancements and resolve run time issues.
Development:
If the customer requirements are not satisfied then we may need to develop
the Programs, Reports, Transactions, Menus, Screens, Scripts and Functional
Modules.
Create user in SU01 and register this user in the market place.
Function Modules: These are used in the programs for modularization i.e.
frequently and logis is turned in to functional Modules.
Domain: It is the least granular field in database which has its types and
property like Data Type and Size. It is created in transaction SE11.
124
It is used to keep the fields uniquely in the database i.e. all the location
follow the same format.
Transaction: SE93
Program: SE38
Domain: SE11
Table: SE11
SAP mostly never recommends modifying the standard objects in the name
space A-X. However based on the requirements customer may change the
objects by obtaining Access Key from SAP.
These Keys are also referred as SCCR key. 9SAP software change registration
key)
When you modify a standard program in SE38 it will prompt for Developer
Key and Access Key.
Get the above details to generate an access key from the market place
• As we are changing the standard programs the changes will be lost after
an upgrade.
125
• Customizing Requests or Modified Data can be copied from one client to
another client, where as workbench requests.
Customizing Request
126
DEV QAS
Workbench Request
CUSTOMIZING
Create super user. Don’t use DDIC to perform any of the following activities
1. Check SCC4 settings client and check whether it is set to ARC (IF it is ARC
we can perform client specific customizing and record the changes)
Click on Definition
Create a Company
• Once the task is assigned to a user only that user can work on that
task
127
• Change Requests are in the form of <SID>K900000 and start with 1
and subsequently it
Will change.
• Right Click on change request and click on Add User (Super User,
Admin etc..)
• Change Request can only be released when all the subsequent tasks
are released
• Please perform client coy using SAP_CUST profile before you start
customizing.
128
CHANGE MANAGEMENT
129
SAP BASIS Administration Tutorial . This will help in understanding and
answering different questions and asked in different interviews.
During the requirements analysis phase the BASIS consultants along with team
members (Functional Consultants, Project mangers) visits the customer and gathers
the requirements and analyzes the requirements to define the scope of thee work.
Analyze the servers and submit the feasibility report (This consists of
server details like CPU, RAM, Storage, and Warranty)
1. Online backup
2. Offline backup
3. Incremental backup
4. Partial backup
1. Online backup: The system continuously work and won’t be shut down. Users
cannot get any interruption while performing backup
What are the production hours & define peak times and off peak hours
130
1) System Availability: The system is available and the server is available
but users may not connect to the system or experience very low
performance.
2. Offline Backup: Offline backup is a way to store files from a network so that they will be
accessible even when the user is not connected to the network they are stored on. It is a
beneficial feature to users who often rely on telecommuting with portable computers or mobile
devices and who therefore are not always in direct contact with the network they typically access
files from. Offline backup is used as a safety precaution because it is not available for updating,
so it remains as an untouched copy of a file at the time it is saved or copied offline. Saving a file
or folder into offline backup will ensure that there is a copy of the file that is available for being
referenced, should an error occur with the network or if the system were to crash.
Because of this, many users depend on offline backup for peace of mind in the home or in the
workplace. Many businesses uses offline backup to store files so that they are unchanged and
easily referenced.
backups. During an incremental backup only the files changed since the most recent backup
are included. That is where it gets its name: each backup is an increment since the most recent
backup.
The time it takes to execute the backup may be a fraction of the time it takes to perform a full
backup . Backup4all uses the information it has recorded in its catalog file (.bkc ) to determine
whether each file has changed since the most recent backup.
The advantage of lower backup times comes with a price: increased restore time. When restoring
from incremental backup, you need the most recent full backup as well as EVERY
incremental backup you've made since the last full backup.
For example, if you did a full backup on Friday and incrementals on Monday, Tuesday and
Wednesday, and the PC crashes Thursday morning, you would need all four backup container
files: Friday's full backup plus the incremental backup for Monday, Tuesday and Wednesday.
As a comparison, if you had done differential backup on Monday, Tuesday and Wednesday,
then to restore on Thursday morning you'd only need Friday's full backup plus Wednesday's
differential.
131
Advantages:
Disadvantages:
4. Partial backup: A partial backup resembles a full database backup, but a partial backup
does not contain all the filegroups. Instead, a partial backup contains all the data in the primary
filegroup, every read/write filegroup, and any optionally-specified read-only files. Partial backups
are useful whenever you want to exclude read-only filegroups. A partial backup of a read-only
database contains only the primary filegroup.
We need to define the amount of time the business can sustain without the system.
This is called as percentage f high availability.
1. Clustering
2. Standby servers
High availability options needs to be discussed with the hardware vendor and the
customer.
The scope of work document will be sent as a draft to the customer manager and
project manager.
The document will be finalized and signed out by the customer and we can call it as
statement of work.
132
Implementation Methodology:
1. Preparation
3. Realization
4. Pre Go-Live
Preparation: once the project is awarded the following preparatory steps are
performed.
Note: Prior to this H/W sizing has to be performed to define the H/W required.
In order to perform H/W sizing SAP recommends to use “Quick Sizer Tool”.
4.6 – 40GB/256MB/512MB
4.7EE – 80GB/512MB
ECC5.0 – 120GB/1GB
133
ECC6.0 – 200GB/2GB
Legacy systems: These are nothing but the existing system which are to be
replaced with new configured system to introduce SAP.
In order to perform H/W sizing we need to use the sizing which is available on SAP
market place
The Quick Sizer is a tool that is developed by SAP and its H/W partners to help
customers get an idea about the sizing . It is free of cost
In order to log on to the market place we require USER Id and for performing the
H/W sizing we need customer number.
SUSER ID: It is a 10 digit number with S provided by SAP to log n to market place.
This user id a super administrator and have all the privileges on the market place.
We need a SAP user Id called as SUSER ID which start with S followed by 10 digit
number
Ex: S0001234567
134
The Customer No field value will be automatically shown.
Project name
6. This sizing depends upon the no of users, type of users and modules
used.
3 Types of users:
1. Normal User: The user who communicates with the system and the
requests will be in between (0 to 480 dialog steps/40 hours)2 dialog
steps/ Min
2. Power user: These are the one who will create dialog steps in between
480- 4800. For every 30 Sec one dialog step
135
3. Transactional users: These will create around 4800 to 14400 dialog
steps per week. These users will create more load on the system. By
activating the transactions at least once per every 10 seconds. These
users are also called as concurrent users.
Dialog Step: user request goes to server and comes back to the user. Average
response time of a dialog step is 800 m sec to 1200 m sec i.e. 1.2 seconds
It is based on objects and the dialog steps. In order to use this method prior
expertise or previous experience is required (Mostly used for upgrade)
Apart from the above we need to consider O/S, Db, JDK and other 3rd party
tools.
136
Output of H/W sizing:
H/W Sizing:
Fir every 2000 sales orders which are created in an hour generated 100 SAPS.
SAPS is a unit which will be used to calculate the amount of CPU resources
required. The H/W vendor also provides details of SAPS generated by various CPU’s.
In the same level I-Series generates around 900 SAPS. It always depends upon the
speed of the CPU. Depending upon the no of SAPS we need to recommend the CPU.
Ex: If the SAPS required are 3600 we may need to suggest going for multiple CPU.
Whereas for 1000 to 2000 steps we can recommend DUAL CPU’s.
Note: H/W sizing will not give you the exact figure required. It is recommended that
40 to 60 % of the sizing needs to be added to the sizing results.
Sizing report can be changed from time to time by modifying the details in the quick
sizer tool.
Note: The sizing which is planned should cater at least for minimum 3 years.
137
Communication with SAP: Customer communication with SAP to purchase SAP
software depends on No Of Users. Currently for 5 users it is charging 14 lakhs. On
top of it every year we need to pay 17% as service fees.
Once the agreement is signed SAP shifts software to the customer sight.
2. SAP NETWEAVER
2. SAP NETWEAVER:
3. SAPB1:
138
It is a combination of various functionalities. BIW, R3 come together as one
product.
Let the users log in to the system for demos. During this phase S/W and H/W
arise. The installation is valid only for 30 days.
2. Check and verify the S/W from the market place which is shifted to
you.
6. Install Java runtime environment because they are designed using JAVA
8. Set the virtual memory, currently we can set 3X RAM size from
Windows 2003 onwards
139
11. Install the O/S with relevant patches
14. Dump the S/W into the server, ensure that the directories should
not have spaces and special characters
Note: From ECC 5.0 onwards the Installation Key is necessary. This is can be
generated in Solution Manager. While doing the installation of R/3 at step 3 or 4 it
will ask for installation key.
XI
BW CR
M
Solution
Manager
R/3 AP
XI/EP
Solution Manager is used to configure satellite systems R/3, BW, CRM, XI,EP,APO
and other WEBAS ABAP and WEBAS JAVA components.
Satellite Systems: All the systems which are configured as satellite systems can be
monitored through solution manager.
140
Go to SMSY menu -> Go to other object and specify the HOST NAME, SYSTEM ID,
INSTANCE NUMBER –> click on Generate Installation/Up gradation Key
SAP Based Menu: Easy access menu. It is a standard menu, which is used to
navigate to the programs with “n” no of dialog steps.
We can create our own transactions. Transactions are created in T-Code SE93.
While defining transactions SAP has followed certain conventions.
Transactions that start with SM are used for System monitoring / Sap monitoring
Project Management:
Go to T-Code ” SOLAR_PROJECT_ADMIN”
4. Project status
5. Modules to be implemented
6. Mile stone
141
2. Business Blue Print Phase: It is configured in “solaro1”. It is used
to configure business scenarios which need to be implemented in the
project. Go to SOLAR01 select business scenarios -> go to structure ->
Go to Configure elements -> press F4
When we press F4 it will display the list of the components. Select the
component for configuration.
Note: To define and Configure Satellite system logical system component should
exist
In order to implement the above steps or phase we can use the road map which is
predefined in solution manger.
Go to Road Map (RM Main)-> Select the Project and choose the road map which is
predefined in solution manger -> Go to Road Map and you can down load the road
map. We also have the flexibility to define the consultants for each phase.
4. Pre Go-Live (or) Final preparation Phase: During this phase all the
configured components are related and moved on to other systems in
the landscape. Some of the key activities are
5. Go Live and Support: The system goes live on the cutoff date, end user
start working, run time problems are identified, patch up work will continue,
support the project till SLA ends
142
Advantages of Solution Manager:
1. Key Generation
2. Centralization
3. Alerts
4. Service Desk
6. Solution Monitoring
7. Documentation
8. Project Management
9. Reports
Make sure that Pre requisites are met. (H/W,O/S, Virtual Memory, Environment
variables, me JDK,RDBMS)
Make sure the availability of Installation master DVD, KERNEL,Export DVD and
Instguide.
In earlier versions up to 4.6c R/3 setup is used for installation. But from 4.7 onwards
SAPINST is used for R/3 installation up to WEBAS version 640 SAPinst tool has
independent DVD’s for R/3, BIW, CRM, APO. But from 640 onwards master DVD will
be used to install ERP, CRM, SRM and other NETWEAVER products.
Export DVD (If it is component Specific then it is separate for every module)
JAVA
SAPinst Tool: It is used for installing R/3 components based on ABAP and JAVA.
SAPinst tool has its own version. If the tool dosen’t support the installation we may
need to upgrade SAPinst to higher versions.
Download the current version of SAPinst executable from the market place
www.service.sap.com/swdc
143
1. Installation maser DVD
4. JAVA DVD’s which are required for providing graphic solutions (IGS-
Internet Graphic Service)
5. GUI installation DVD: It is used to install SAP GUI front ends for all the
users.
7. Language inputs (or) language DVD’s. By default German & English are
installed. Additional languages are installed using this DVD’s.
3) SAPinst.exe
5) SAPinst listener on port 21212. We need to ensure that the port is not
blocked.
Single Code: The database has its code to support the language.
Ex: If we have English, German the default code page is 1100. This code page
supports only few languages. If we want to access the system with other language
which are not supported by current code page we need to install that code page.
144
It is used to support in installing to a language. MDMP has a disadvantage because
e have to handle different code pages when upgrading the system.
UNICODE: The database reserves 2 bytes to cater to almost all the languages in the
world. It supports all the data code pages and no special attention is required during
up gradation.
Note: We can install non Unicode system but it can be upgraded to Unicode by
using SAP export and import tools.
10) Specify the< SID>: SID is used to identify the system. It should be of
3 characters and can also be alphanumeric. It should start with a
character only followed by alphanumeric values.
Note: Do not choose SID from the reserved words SAP, ALL, BIW, ERP. We can
use like PR1,P01, D01, D40, P20…..
Try to define the naming convention for all the systems in the landscape.
Instance Number: This is the port number which will be used to reserve the ports
or the instance services and processes. It should be in between 00 t 97.
11) Specify the host name. The name of the system where the installation
is performed. This should not be more than 13 characters. Ensure that
host name and IP address are entered in etc\host.
From Oracle 9i onwards multiple components like ERP, BIW, CRM, and SRM can
be installed on one database. The databases are differentiated by SCHEMA ID’s
(Ex: SAP<SID>SAP01).
Specify the host id of database. It will be same as the central instance host.
12) Specify the host ID of database. It will be same as the central instance
host.
145
Central System Installation: If the central instance and the database instance
installed on the same physical machine then it is treated as central system
installation.
Central System
DB
Central
INSTAB
Instanc
CE
e
Physical Machine
Instance has its own instance number it requires own memory configuration.
Multiple instances can be installed on a single system.
13) Specify the amount of memory reserved for the instance for
installation. By default 60% of the physical memory.
Local Installation: It is performed locally using the local user rights. Unless and
until it is recommended don’t go for any installation except local installation.
Duet Enterprise is a business tool that blends SAP and SharePoint data to increase
staff and department productivity, according to the pair.
146
management platform. SharePoint can be used to host web sites that access shared
workspaces, information stores and documents, as well as host defined applications
such as wikis and blogs. All users can manipulate proprietary controls called "web
parts" or interact with pieces of content such as lists and document libraries.
Installation Number: If the installation is carried out in a domain ensure that all
privileges are held by the user to install the components. Most of the domains have
restrictions for passwords, user creations password expiry.
Domain Server: All the systems in landscape are configured with domain server. It is
a centralized server. It can give IP address of DHCP.
Specify the database instance parameters, database id, dbhost, db home (Home
Directory of Oracle, db SCHEMA’s owner of the database, db character set.
SAP system administrator has the privileges to start and stop the system. He is the
administrator for R/3 system.
147
Database Instance Installation:
7) Specify db kernel file location. It will be the central instance kernel file
location. Because kernel for both R/3 and DB should put together on
one location
8) Specify the server directories and redo log files, archive log files
location.
11) Specify the location of mirror log files A,B and specify thee location of
Origlog A,B and data files (SAP DATA1, SAP DATA2………SAP DATAn)
12) Specify the load strategy (load strategy should be loaded by the data
file). Specify the DB code page. By default it is 1100. No of parallel jobs
can be increased based on the availability of memory by default it is
“3”
148
Solution Manager is used to create new solutions. “DSWP” is also used to
configure solution landscape.
Process of CI installation.
Process of DB installation.
149
Client/Server Architecture:
Reuest
Client Server
Response
Client
software
Client applicatio server
n server
Database
Accessing is easier.
150
Applicatio
n Server
Client Server
Applicatio
n server
In a typical client server architecture client request and server responds. The
contents of t client are GUI which is programmed using traditional language like C,
C++ etc…
In view of the above the concept of application server came into picture.
The application server handles the load of the client by taking client software from
the clients. The interpretation will be done at application server. Frequently
accessed content are stored in application server which reduces load on the
database. There by increases the performance of the client request.
2) Buffer Areas
151
R/3 Architecture:
1. Presentation Layer
2. Application Layer
3. Database Layer
All the above 3 layers are also termed as servers, because they do some work to
serve the clients.
Presentation Server:
It is an SAP GUI where user interacts with SAP system. There are 3 types of SAP GUI.
One GUI for all the applications (R/3, CRM, BIW, APO…..)
With the help of message server it defines the least loaded server and routes the
request to that particular server.
152
Use SAP GUI DVD to install SAP GUI. Use SAPinst to install SAP GUI. Installation on
few clients can be performed personally, but the number of users increases we
need to automate the tasks.
2. More than 100 users use login script so that GUI can be installed or
updated during the user logon to the system.
153
The above screen shot represents the SAP GUI after installation and configuration.
GUI Operation:
When user clicks on anyone of the options in SAP GUI logon screen one of the
following files will be evaluated.
1. SAPlogon.ini
2. SAPmsg.ini
3. SAProute.ini
4. SAPdoccd.ini
5. SAPrfc.ini
SAPlogon.ini: It consists of SAP logon credentials like description of the server, name
of the application server, SID and instance number. When user clicks this file is
evaluated.
SAPmsg.ini: It consists of the message server details like message server name and
port number. This file is used when logon groups are configured
SAProute.ini: This file is used when users are communicating with servers using
routers (The servers in the network)
SAPrfc.ini: While communicating with various systems using RFC this file will be
evaluated.
Uninstalling SAP GUI: For uninstalling SAP GUI use” SAP sweep”. Presentation server
is the only GUI.
Application Layer:
Application Server is used to handle the user request, whenever a request comes
from presentation server it is handled by dispatcher of that instance.
DIALOG PROCESS
USER
USER DISPATCHER Q
XXXX
154
The application server will contain the following components:
2. Buffer Area: The frequently accessed contents from the database need
to be stored in the temporary work area.
1. Calendar buffer
2. Table buffer
Dialog Step: User logs onto the system by keying USERID and password. “diag” is
the protocol which connects to the application servers.
Dispatcher receives the user request and checks for free work process. If free work
processes are not available it will be queued in the dispatcher “WAIT QUEUE”.
Dispatcher Wait Queue: When free work processes are available user requests are
served by dispatcher on “FIFO”
155
Work processes handle the task of user while handling the task. It sets the memory
allocated and completion of the task.
ABAP interpreter: It interprets the ABAP code which is containing in the task
handler.
The work process reaches database but it could not perform any task from the
database, because it it specific to application server.
The work process hands over the task to the “DB SHADOW PROCESS”. “SHADOW
PROCESS” processes the request and hands over the response to work process.
WORK PROCESSES analyzes the response which is in the native format and screens
are designed to respond to the user.
Before sending the response to the user the work process rolls out the user related
information into user context.
ROLL OUT: The process of rolling out of the user related information into USER
CONTEXT.
ROLL IN: The process of rolling the user context information into Work processes
buffers.
First Dialog Steps: The average dialog response time should be between 800-1200
milli seconds.
Dispatcher assigns the free work processes to the work process. Work process rolls
in thee user context information and checks whether the user is authorized to
create the Purchase order.
IF authorized the process continues else response back to the user saying that user
doesn’t have authorization.
156
All the Steps are:
1. UR
2. DIAG
3. Dispatcher
4. Queue
5. WP allocation
6. T.H
7. Interpretation
8. Reaches DB
9. Shadows process
10. Response to WP
Database Layer: It is used to store the data of the customer. Database has its own
memory, process (Work Process), buffer area……etc.
R/3 work process hands over the request to the shadow process. The SQL
statements are interpreted in the R/3 application servers and converted to native
SQL statements. All the ABAP programs consists of open SQL statements. When the
request sends to the DB they are interpreted into native SQL statements (T-SQL, PL
SQL)
Shadow Process: When the user request is added over to the shadow process
shadow process try to find out the request in the user buffer. If it is not available
then it will search in the database.
157
Application Layer:
1. It has its own memory, own buffer, own work process. One or more
instances can be installed on an application server. Application server
is a physical device. It consists of CPU, memory storage.
D: dialog WP
V: Update WP
E: Enqueue WP
B: Background WP
S: Spool WP
G: Gateway Service
158
159
The above 2 screen shots are typical windows MMC. (This sacreen shot is taken
from Netweaver 2004s flavor of SAP)
The number of dialog processes and the number of background processes can be
increased after the installation is completed by using the transaction code RZ10
(Profile Maintenance).
It is the only process where users communicate indirectly. There should be at least
2 dialog work processes for each instance. Dialog process is used to create, update
requests, transactions, print requests and background tasks.
Update Process: It updates the records to the database. There should be at least
one update work process for each R/3 system.
160
Transaction: A transaction consists of one or more dialog steps which will be
committed together or rollback. It is also referred as logical unit of work.
SAP Transaction: SAP transaction is a bundle of one or more transactions which can
be executed together or rolled back. Dialog process updates in temporary tables,
update process reads the temporary tables and updates the database
synchronously. The dialog WP time is restricted to 600 seconds. These all dialog WP
need to complete their task within the maximum runtime. If the task could not be
completed within the specified time timeout error occurs and program will be
terminated.
ENQUEUE Process: Enqueue process is used to provide tasks to the records which
are going to be updated. Technically enqueue process is used to lock and unlock
records which are being updated.
There will be only one enqueue process in any R/3 system and mostly it will reside
on the central instance, where message server is installed.
Note: More than one enqueue process can be configured based on the frequency of
updates.
Background process: The tasks which consumes more time are scheduled in the
Background mode. The jobs which are long running, expensive, time consuming and
non interactive will be scheduled to run in the off peak hours using background
process. Expensive means the ABAP code is expensive or the DB records have more
records. This should be at least one process for each instance.
Message Server: It is used to manage all the instances. That is it controls all the
dispatcher when logon load balance is configured. It also helps to procure logs from
enqueue process if the requests are coming from dialog instance.
There will be only one message server in an R/3 system. Message server always
resides on central instance.
Enqueue process & message server resides on the same instance and it is not
advised to host them in two different instances as it will increase the enqueue time.
Spool Process: it is used to output the documents to printers, fax, email…etc. Spool
process or print request are created by dialog process and background process. The
print requests are stored in the temporary area which are read by spool process to
format and print the request.
161
Dialog Instance: we can configure as many work processes as possible but it limits
to 89 per instance. If the load on the instance increases in terms of users we
consider displaying additional dialog instances.
Central Instance: It is a dialog instance where message server and enqueue process
resides.
There is a shared mount (or) shared directory which will be created during
installation.
\\usr\sap
\\usr\sap\trans
\\usr\sap\<SID>\sys\exe\run
Note: the sum of non dialog process should not exceed the sum of dialog process in
the dialog instance.
Central System: This is the installation where the central instance and the database
instance are installed together.
Application Layer
A1
Presentatio CI+DB
n layer A2 Central System
DVEBMGS
Central A3
System A4
Central System
Installation Check:
162
The status is Grey – Instance is stopped
WINDOWS:
Msg
dev_disp Server Default
Profile
Dispatche
dev_rd Instance
r
Profile
dev_icm Gateway
ICM
dev_w0… WP’S
wn
Connect DB
DATA
BASE
163
During startup of the operating system Windows NT, the NT Service Control
Manager starts all the services in the service list that are configured for automatic
startup.
The information relevant to these services is stored in the registry and is read by
the Service Control Manager during startup.
Several services of type “SAP_” (the SAP service) and “Oracle Service”,but only
one SAPOsCOL service, can be run on one computer.
The SAP service, SAPOsCOL, and OracleService should be configured for
automatic startup.
To start the Oracle database and the R/3 System, the administrator
performs the following steps:
Log on to the operating system Windows NT as user adm.
To start the R/3 System, open the Microsoft Management Console (MMC) using the
SAP R/3 Systems Snap-in. Right-click on the system icon and select Start. The
sapstartsrv.exe executable sends a message using a named pipe to the SAP
Service, SAP_.
The SAP service starts the database by executing an NT script that calls the Oracle
Server Manager.
The Oracle Server Manager executes an SQL script that starts the database if it is
currently not running. Once the database is up and running, the SAP service starts
the Message Server (msg_server.exe) and the Central Instance dispatcher
(disp+work.exe).
The R/3 System has been started successfully when the icon for the central
instance changes color to green. The colors displayed in the MMC have the following
meanings: red - the process terminated abnormally; yellow - the process is being
started; green - the R/3 System has been successfully started; gray - the process is
not running, status unknown.
You can also start the R/3 System with the NT scheduler called “at”. For this kind of
start, SAP provides the executables startsap and stopsap which are executed
164
locally. Use
- startsap name= nr= SAPDIAHOST= to start an R/3 instance and
- stopsap name= nr= SAPDIAHOST= to stop an R/3 instance (the executables
sapstart.exe, sapsrvkill.exe and sapntwaitforhalt.exe must be in the same directory)
165
R/3 work directories contain trace files and error files for messages relating to the
startup of work processes. Each R/3 instance has a separate work directory
containing information that may not be found in the R/3 System log.
The work directory files are initialized in chronological order. During startup, the
SAP service executable SAPSTARTSRV.EXE writes:
Database logs to the file STDERR1
Message server logs to the file STDERR2
Dispatcher logs to the file STDERR3
To define the level of information written to the developer trace files, set the profile
parameter “rdisp/TRACE” in the instance profile. The possible values for this
parameter are:
0: Write only errors (no traces)
1: Write error messages and warnings (default)
2: Write error messages and a short trace
3: Write error messages and the complete trace
166
UNIX:
start
Kill.sap
dev_ms
Msg
dev_disp Server Default
Profile
read
Dispatche
dev_rd Instance
r
Profile
Gateway start
dev_icm
ICM
dev_w0… WP’S
wn
Connect DB
DATA
BASE
167
In UNIX operating system the command startsap command id used for starting the
SAP instances. This command will in turn call the SAPOSCOL (If not started). This will
in turn calls the startdb script which will start the database.
Now the sapstart command is executed which reads the startup profile. Then the
message server will be started. Dispatcher (disp+work.exe) will be started which
reads the default profile and the Instance profile. Then the dispatcher will start the
GATEWAY, ICM, and the Work Processes.
There will be different trace files that will be generated while starting the sap
system.
In UNIX the commands are used for the starting and stopping of SAP:
$ startsap db
$ startsap r3
$ stopsap r3
168
To stop the database:
$ Stopsap db
Send a message through: SM02 or any other third party tool for the
execution.
On UNIX use scripts STARTSAP and STOPSAP to start and stop the system.
CI is started
Ensure that
CI is stopped
DB server is stopped
169
Users created during the installation:
These are the two operating system users during operating system installation.
DB users are:
When the ORACLE system is installed SYS & SYSTEM are installed
SA-System administrator.
OPS$<hostname> SIDADM
OPS$ Mechanism: This is the mechanism which allows the operating system users
to connect to database without prompting password
Services: These are various services which are created during installation.
1. SAPOSCOL: It is the O/S collector which will collect the H/W information
from the system before starting the instance. If the required resources
are not found this service will not be started. Execute SAPOSCOL at
command level and clear catche. There will be only one SAPOSCOL
service in a machine (SERVER)
3. ORACLE TNS LISTNER: This service is required to start DB. There will be
one listener for each DB
170
services options else go to My Computer-> Right Click-> Manage ->
Computer Management -> Services and Applications.
7. On UNIX use the command “ps-ef” to display the services. The service
user SAP<SID> runs the services.
Communication means to share the folders across the systems. This is for Windows
NT.
171
\\usr\sap\<SID>\sys\exe\run
This is the directory where kernel executables are located. Some of the kernel
executables are
Startsap
Stopsap
SAPOSCOL
MSG_server.exe
\\usr\sap\<SID>\DVEBMGS<instance number>
For a dialog instance it will be “DO7” like that. Under this which consists fo “logs”
and “traces” of the instance.
\\usr\sap\trans:
\\usr\sap\<SID>\sys\profile:
Startup Mechanism:
User clicks on strartsap -> saposcol which is already running provides the
information of the system.
Start up profile is used for starting the sap system. This resides in the directory
\\usr\sap\<SID>\sys\profiles
Start_DVEBMGS<Instance no>_<hostname>.pfl
Ex: Start_DVEBMGS00_indiainternat.pfl
172
2. Message Server msgserver.exe
3. Disp+work.exe
4. Igsgwrd.exe
5. Icmon.exe
Default Profile: This profile provides default values for all the instances. It provides
details like
Logon client
Login language
1. Disp+work.exe
2. Igsgwrd.exe
3. Icmon.exe
5. External Areas
Note: The above profiles are maintained in transaction code RZ10, RZ11
The profiles which are changed using RZ10 requires the instance restart.
The profiles which are changed using RZ11 (Dynamic Change to parameters) don’t
require any instance restart.
173
Don’t change start up profile unless there are changes in the directory structure.
• Change parameters
• Offline backup
Process of shutdown:
Ex: Sunday 1st Jan 2010 6:00 Am to 2nd Jan 2010 5:00 PM
Effective Users: All the R/3 users domain users BIW users…..
Purpose of Downtime: -
_________________________________________________________________
Inform all the users well in advance through notification, email, or through TCODE
SM02.
Scenario: We have scheduled downtime for our R/# system to update the O/S
patches and DB patches. If the system could not be started after applying patches
the system has no history of startup problems.
1. Check whether the server is pinging to the right host. Use” ipconfig” to
check the IP address and ping to that server
174
3. Check the DB is stated or not.
8. Check for the ports which are blocked or running. Use command
NETSTAT-P
Path: Class path is used to define the location of executables to execute from the
command window, irrespective of drive and directory.
1. User variables which are specific only to the users and it will not affect
the system variables
175
In UNIX:
$ SET JAVA_HOME
$ export JAVA_HOME
SET command sets the environmental variables only for that user services.
176
When the O/S and DB are patched they look for current versions of R/3 executables.
If there is a mismatch with the versions R/3 will not start. In this case we need to
perform kernel upgrade.
Kernel Upgrade: It is a process of replacing the current run directory i.e. R/3
executables are replaced with the new versions of R/3 executables.
Reason for up gradation: While applying the support packages and patches for R/3
system and applying the patches to O/S and DB sap recommends to upade the
kernel to resolve the runtime problems either in the future or during the post
installation.
Patches: it is the missing functionalities or bugs that arise while running the system.
Command disp+work
Go to my application components.
Select
Go to exe new run copy all the uncar files to new run stop the system and
services copy existing run directory to old run directory copy executables from
new run to run directory [replace]start the services and the system
Note: instead of downloading and upgrading entire kernel we can also upgrade each
lernel executables independently. But we need to check the dependencies.
Use this parameter to trace the start u activities into work directory. The following
files are trace files which provide more granular information.
Stderror 0
177
Stderror 1
Stderror 2
Dev_disp
Dev_W0….Wn
Startsap.log
startdb
Stderror0
Stderror1
Stderror2
4. Environment variables
5. Network connectivity
6. Check services
7. Check DB logs
9. Check ports
178
1. Find the patch level: to find this go to left top corner Click on sap
logon select the file version click in options to activate the GUI
trace level
3. “.ini” files are missing: take backup of the ini files and store on a file
server and restore them
4. GUI could not logon: check the other desktops to check the login
problem. Check the network connectivity on desktop. Check the client
number which is accessing. Ask the user to send the status bar. Check
whether the user exists, check caps lock, check password locks.
7. Check whether the GUI is compatible else upgrade GUI (ex: 4.6c, 4.7d,
6.20, 6.40, 7.10)
9. Check authorizations
Note: Screen Painter is used to design GUI screens. This is done by ABAP team.
SUMMARY:
So far we have seen the following topics for installing SAP system:
1. H/W sizing
2. Solution Manager
3. Pre requisites
4. Installation
179
5. Start up and shut down
Now we are supposed to do the post installation activities to check the installation
consistency and defining the other system settings to make the system readily
available for utilization.
The above activities are major tasks and require more analysis and pre planning
before the system (SERVER) starts working for the designated work (Development,
Testing, Production).
2. SE06: It is used for performing the post installaion activities. SE06 has 2
options:
180
2. DB configuration ( this is used to set the change the trapsport sustem
or correctin transport sustem)
3. SE03: click on the system change option in SE06. This option is used for
setting the system change option i.e either to modifiable or
notmodifiable. If the system is set to modifiable then the software
component s can be modifiable. This option is se set only to
Development and Sand Box systems.
If the system is set to not modifiable all the software component are
not allowed to change. This options is only set for Quality and
Production systems
Single System landscape: In this only one system will be there for
the entire landscape which is used for all the
purposes(Development, Qualtity and Production)
Single System
Landscape
Production
Quality
Development
181
Disadvantages: The objects which are used by developers will not
be allowed to eited by the tester and production users. The system
is not consistent either for development quality pr production. No
production for single system.
Developme Productio
nt and n
Quality
Development System: This system is used to develop the objects and customizing
activities are carried out. This system is usedd by functional consuoltants, ABAP
development team and BASIS team. No end user and production user can logon to
the system.
Quality system: The objects whch are modified (or) customized in DEV system will
be tested in this system. This system is utilized by the qulaity team, training team
and BASIS consultants.
Note: For each system we can configre upto 8 systems in the landscape.
1. Pre production
2. Pay roll
3. Migration
4. Sand box
5. Development
6. Quality
7. Production
8. Training
183
Configuring TDC:
Defining the virtual system:The systems which are going to be deployed in future
can be configured as virtual systems. Virtual systes name should be exactly the
same as of the real time systems.
2. Logon to the real system which is replacing real virtual sstems. (Logon
as client 000)
Note: A communication user TMSADM will be created and RFC destinaltion between
the TDC and member system is established.
Domain.cfg is updated
184
It consists of domain settings lie details of TDC and members. It is updated
whenever there is achange in the landscape.
Transport Group: The group of systems which share the same transort directory are
said to be in one group.
Transport Layer: It is a path defined to transport the objects. SAP transport layer is
by default . The name of it is trapsport layer.
Transport Routes: Transport routes define the flow of objects between systems.
There are two types of routes. They are
1. Graphical Editor
2. Text Editor
Specify the systems in the landscape sav and activate and distribute the
configuration.
5. RZ10:Import profiles of all active servers onto the database. Goto RZ10
select the profile import in to DB
1. Customer Number
185
2. Installatio Number
3. Host Name
4. SID
5. Instnace number
6. H/W Key
In order to get the H/W key goto transaction SLICENSE (or) at command level
saplicense –get
Get the key from market place and install using slicense transaction. Initial license
is valid for 30 days and when license is installed the expiry date DD:MM:YYYY
8. Install Library: Goto SR13 specify the tyoe of HELP (HTML help file,
HTML, HTTP< Dynamic Help). The library can be installed on a file
server or on a web server. Go to SR13 define language define
variant (IWB.Help, Documentation)
Repository Objects: The objects which are shifted by SAP are called as Repository
Objects. These are also called as “SAP standard objects”.
Client 000: It is a template client which consists of all the configurations like
company code, cost center, project center, sales, purchase etc. It is continuously
updated by applying the support packages, patches etc… It is the most updated
client. But it is not allowed for any customizing and it is eligible for client copy to
set up our company.
Client 001: It is a backup of 000 client. But it is not updated continuously. There is a
variation between 000 and 0001 i.e. 0001 is not updated continuously. No 001 for
7.0 version.
Client 066: It is an early watch alert client used by SAP to generate early watch alert
report to the customer.
In client 066 the report serve as recommendation to fine tune the system interms of
expensive reports, transactions, SQL statements and users.
186
Need for client copy: In order to adapt SAP systme to the requirements of the
customer we need to perform customizing. But customizing is not performed in 000
client as it is a template client and client 001 is a back up client. In order to perform
customizing we need to define our own client. When the client is defined it doesn’t
consists any data, so we need to copy data from the existing clients. Client 000 is
eligible for client copy because it is continuously updated.
Client dependant data/ client soecific data: The data which is visible only in that
client is called as client specific data. Ex: User master Data, Application data,
Customizing Data
2. The users which are created in one client cannot login to another client.
3. The application like invoices, delivery notesa are client specific i.e. if
you perform customizing in one client it is not visiblw in another client.
Note: The customizing which is performed in one clietn won’t effect the other
clietns.
Client independent data/ cros client data: The data which is visible across all the
cliet is called as cross client data (or) client independent data.
CCC: (Cross Client Customizing): The above one is known as cross client
customizing.
Repository Data:All the SAP standard objects are referred as repository objects
(reports, Functional Modules, Programs, Transactions) etc…
The changes t repository data will effect the entire R/3 system. Some times it
may mall function and the system will be crashed. Because of applying chages,
patches etc.
Note: While changing the repository objects follow SAP recommendations and
most of “Repository Objects” are locked for editing. If there is a need to modify
the repository objects we need to obtain key from SAP.
Ex: Company name and address entries, sales organizations, employee datga
applications such as material master data, vendor master data, customer master
data.
187
Customizing is performed in “SPRO”.
1. Field Objets
2. Menu Exits
3. Screen Exits
Exits are identified in transaction” SMOD” and exits are created in “CMOD”
Applying the Support Packages and Patches: I order to fix the bugs (or) to have
the enhance functionality support packages, patches are applied from time to
time. SPAM is the tcode for applying the support packages.
Changing the SAP Standard objects: In order to modify SAP standard objects we
need to obtain object access keys from market place. These are also referred as
SSCR.
188
In order to modify the repository objects we need to get the following
1. Developer Key
2. SSCR key
Client Creation: Clients are created based on the following requirements as a post
installation activity to set up demo, testing, tracing, production, quality clients.
(SE06, SE16, SM30, SE03)
9. Protection level 0, 1, 2
Go to SALE Tcode (SALE: SAP Application linking and Enabling) Click on sending &
Receiving system for further information click on logical system click on
define logical system logical system click on define the logical system click on
new entry.
189
Specify the name of the logical system. The naming conventions for logical system
are <SID>CLNT<CLINTNO>
Client Role: SAP defines client role to be specify the functionality of the client.
Note: Other than this client no clients are allowed to modify objects.
3. Testing Client: It is represented by TEST. This client is used for testing the
customization which is performed in cust client. Transactions SCC1 is used
to copy the change request from CUST client.
Note: SCC1 is used to copy transport requests between the clients within
the system. This client is used to test the modules which are customized
and if the consultants approves it will be released.
Note: Changes to ATST and TRNG are made by using transport request
190
Recording: It means saving the changes to a change request.
Protection Level: 0: No Restrictions. Client is allowed for client copy and client
comparison is allowed. Client can be overwritten.
Protection Level 2: It is neither allowed for a client copy not for comparison between
two clients.
Note: When the client is created an entry in table T000 is created without any data.
We can logon to the client using USERID: SAP* and Password: pass in that particular
client for client copy.
191
3. There should be enough space in the DB (Table Space and enough disk
space)
7. Select the profile determine the type of the data to be copied from source
client to target client.
8. Ensure that source and target clients are of in same versions in terms of O/S,
DB, R/3.
Note: Size of the table can be determined using the reports RSTABLESIZE and
RSSPACECHECK. These reports can be executed in SA38 T-Code
Before client copy we have to create the client. This can be done using the table
SCC4.
Go to SCC4 from which we can create an entry in the table “T000” (List if clients
present in the system). Make entry for the client number, description, logical
system name, application server… and click on save. This will create the client entry
i.e. client without any data in it.
Profile: It defined the type of data to be copied from the source client. We should
use SAP defined profiles that starts with “SAP”. (Ex: SAP_APPL)
Note: repository objects will not be copied during the client copy (Local or remote)
Select the source client from which the copy has to be performed.
By selecting the “Test Run” we can perform a resource check. Simulation reads the
extra data andif there are any problems with DB like space, and then simulation
terminated the copy.
192
Remote Client Copy:
When there is a necessity to copy a client from one landscape to another landscape
client then we will use the export and import of the client.
1. Client Export
2. Client Import
It is performed in SCC8. Client won’t be copied into DB in turn it will be copied into
transport directory in terms of “Control Files and Data Files”.
Specify the name of the target system and run it in the background mode.
Note: Ensure that transport directory have enough space to host the data files and
command files.
Copy of the co files and data files to the target system and execute the following
commands to import the data into the client or we can use STMS to import the
client data.
193
Copy the command files and data files into the target system.
tpimport<TR><SID><CLNT> pf=\usr\sap\trans\bin\tp_domain_<SID>.pfl
tpactive buffer: It is used to add the contents to the target system in order to import
any change request. It should be added to the buffer of the target system. During
the normal transportation the object follow the transport routes and automatically
added to the buffer of the target system. It is also one of the reasons for creating
virtual system.
Go to Scc7 select the transport request select the profile name specify the
export system <SID> schedule as a background process.
While performing post installation activities the clients are created and populated
with 000 template. Create users and assign them complete authorization to
configure the system according to the requirements document.
Ex: Setting of sales organizations, company code, sales areas, plant storage
locations, cost centers, profit centers etc.
Note: Client copy always rewrites the target system. There is no method for client
merging. If there are 1000 users in client 300 and there are 500 users in client 200.
If the users in client 200 are to be copied to client 300 then all the 1000 users n
client 300 are overwritten by client 200 users. So now there will be only 500 users
in client 300.
Authentication Authorization
Each change request created consists of one or more tasks which are in turn
assigned to developers, functional consultants.
Change requests are created in SE01. Change request can be copied from one client
to another client using SCC1.
195
Change Request Mechanism:
<SID>K900001
<SID>KA00001
Tasks follow the same naming convention. All the tasks are located by
developers (or) consultants I.e. the objects which are being assigned activity
is completed the developers/consultants will release the task. If the task is
released the objects can be used by other people (or) other team members.
Tasks follow the same naming convention. All the tasks are located by
developers (or) consultants i.e. the objects which are being created /
modified are locked to that user. Once the assigned activity is completed, the
developers / consultants will release the task. If the task is released the
objects can be used by other people (or) other team members.
If one of the tasks is locked y the user and left then change the owner of the
tasks based on the approval (or) instruction. Release the task as
administrator.
A change request has many tasks and each task is assigned to one developer
and the developer locks the table.
Once all the tasks are released the change request can be released by the
project leader.
Ex: User master data, Sales Area, Company Code, Sales organization,
Application Data and Customizing Data.
196
2. Development: When the customizing does not fulfill the user requirements
we need to perform development. Development involves creation of tables,
files, reports, programs etc.
Field: It is nothing but a column in the table. In SAP table fields are created as
domains and data elements.
Domain helps us to keep the relative fields consistent throughout the system.
Table: Table consists of columns and rows. Columns contain the name of the
data elements and rows contains the data.
1. Transparent Tables
2. Pool table
3. Cluster Table
197
In order to define the programs to take the runtime values and
calculate the values functional modules are defined. Functional
modules provide reusability of functions. These are defined in SE37.
Cross Client Customizing: The customizing related to the entire system such as
currency settings, time zones, calendars etc. These are specific to the entire
system. All the above changes need to be imported only once on the target system
irrespective of number of clients.
Work bench Change Request: The changes related to work bench [development,
cross client customizing] are saved to change request of type work bench.
Ex: When we want to retain client settings such as user master data during a client
refresh. User master record is saved as transport of copies and imported after a
client refresh. Identify the table to be included as transport of copies save it, release
the change request. It is exported to TRANS directories. It can be imported into the
client again to get the table entries back.
Relocation of objects: The objects can be moved from one system to another
system with development class (or) without development class.
Change Request Mechanism: The objects can’t be copied from one system to
another system using traditional means because it is difficult to identify what
objects are changed and where they are located. That is the reason whenever there
is any change it is recorded to change request. Change request consists of the
change made to the object.
Change Request Release: When the tasks are released in as change request the
change request is eligible for release. The change request can be released to
another change request.
When a change request is released the changes from the objects are bundled into
data files.
198
transport directory. The data files also have control files and these files are copied
to co files.
Data Files: It consists of the changes to the objects. It starts with naming convention
as follows.
Ex: DEVR00009
Command Files: Co files It stores the commands to be created while importing the
change request. Its naming conventions is derived from change request no
DEVK900009.
There will be exactly one command file for one data file.
SAP Names: When the change request is released the name of the developers and
the change request number is populated into this directory.
Buffer Directory: When a change request is released based on the routes definition
it will be added to the import buffers of the target system. If the routes are not
defined we need to explicitly add change requests to the buffer using command
“tpaddtobuffer”. That is the reason we will configure the landscape.
Change Transport
199
Importing a Change request:
The change requests which are released are stored in trans directory in the form of
data files and co files. These are available for import into systems in the landscape
based on buffer entries. If there are no buffer entries we need to add manually
using command tpaddtobuffer.
Change request once released are called as transport request. Transport requests
are imported using STMS.
Go to STMS Select import Queue of the selected system select the transport
request request can be imported as a single, mass or a group of change requests.
Co Files
C.C.C E070
Released Buffer
Table Content
200
Manual tp:
tp can be called from command line by using executable tp.IN order to execute tp
path to kernel directory has t be set in the environment variables.
Tp version is displayed using command tp. Type tp help to find out the various
options of tp
C:\> tp help
C:\>tpaddtobuffer
Import Errors:
The objects which are imported into target system could not over write
because the ojects are locked.
201
tp import mechanism:
tp is initiated and reads the contents from trans directory and connects to the
database
RDD * Jobs
RDDIMPDP
RDDNEWPDP, RDDMSQL
TRBAT, TRJOB
Documentation tables
tp
R3trans
RDD* Jobs reads all the steps from tables and executes them.
202
5. Perform transportation of objects
C.C.C C.C.C
Repository
Repository Repository
2. Development
QAS: In QAS objects are imported tested for quality integration testing. Imports are
also performed subsequently in training client and other optional clients. Testing
tools are deployed to test the load on the objects. Simulation of users to check the
performance of the objects is performed. If the objects are approved in terms of
quality [integration, stress and performance] the approving officers will document a
list of transport request along with scheduled date of release and time, into the
production system. Training for the users is common in the training client.
Preliminary Imports: These are emergency transport request which are moved
independently without following MTP. Preliminary imports will remain in the queue
even after the transport. This transport is again transported during MTP. Approval is
required to perform a preliminary import.
Current Settings (customizing): Even though system is set to not modifiable and
client customizing doesn’t allow any changes. In a production system we can
change some of the entries like tax, currency information transactions. These
203
changes are carried out on the production system by authorized consultants without
any change request.
Support Packages and Patches: During the implementation (or) post production
support whenever there is a gap in functionality (or) functional consultants request
for enhanced functionality support packages are applied. There are various types of
support packages and each support package has it’s own released life cycle.
Support packages should be applied in the sequence.
a. Always apply the support packages in client 000 using user like DDIC.
d. Always apply the support packages in the sequence such as 1,2 3, 4….
SAPKB64002 SAPKB64005
f. SPAM and SAINT versions should be updated. SPAM and SAINT have
their own versions. SAINT SAP add on installation tool. SPAM
Support package manager. These tools are used to apply support
packages and add on installable’s.
204
i. Developers and functional consultants should be around to handle the
change with support packages.
j. SPDD and SPAU are the places where data dictionary (DDIC) and
repository chages are made.
o. Users should be locked and this should be performed in off peak hours
6. Download the SPAM latest version and SAINT latest version into your desktop.
7. Go to Support Packages Load package from front end specify the path of
the download file .car and .sar (Sap Archive)
205
Download the support packages from market place.
If the support package is less than 10 MB size apply through front end.
Note: If the network connectivity is slow (or) if the support package is more than 10
MB of size then always use application server.
Load the support packages. It reduces the time from presentation server to
application server.
Download the .car/.sar files from the market place into trans directory.
Trans\eps\in.
Use command
Select the new support package and display. New support packages which are
loaded are displayed.
For defining the queue click on display queue and click on define
Select the support component for which the support packages have to be applied.
206
Click on import queue to import the support packages.
Note: The support packages once applied cannot be reverted back. Before applying
the support packages check all the requirements are fulfilled.
5. DB table space out of space (or) table space over flow with errors ORA_1653,
ORA_1654
9. tp and R3trans are out dated (We come to know about this when the screen
cannot move)
Note: Tables used are PAT01, PAT02. Do not delete entries from these tables unless
there is a SAP recommendation.
14.Check the status of the support packages imports in SPAM. Click on import
logs. Logs can also be displayed in trans\log
While applying the support packages it will prompt you to run SPDD. It is decided by
functional consultants to keep the existing changes to adapt the new changes which
come with new support packages. Do not run SPDD without the concern of
development team.
207
SPAU Phase: It is similar to SPDD, but it is related to repository objects.
CRI: Conflicts resolution transports. These are released by SAP to resolve the
conflicts between SAP support packages and add-on’s.
The following are the phases that include the support package implementation.
The Support Package Manager informs you of the status of the phase currently being
executed in the status bar. If you want to know which phases are executed for which
scenario (test or standard scenario), run the program RSSPAM10.
The following list provides an overview of all the modules and phases and lists them in the
order in which they are executed by the Support Package Manager:
Preparation Module
...
1. PROLOGUE
This phase checks whether you are authorized to import Support Packages.
2. CHECK_REQUIREMENTS
This phase checks various requirements for importing a Support Package, for example,
whether the transport control program tp can log on to your system.
3. DISASSEMBLE
This phase unpacks files from the appropriate EPS parcels and saves them to the
transport directory.
4. ADD_TO_BUFFER
This phase places the queue in the transport buffer of your system.
5. MODIFY_BUFFER
This phase prepares the transport buffer for correct processing of the following import
phases.
6. TEST_IMPORT
This phase performs a test import for the queue with the transport control program tp.
The system checks whether there are objects that are in open repairs and that are
overwritten during the import, or whether other conditions prevent the import of an
object.
7. IMPORT_OBJECT_LIST
This phase imports the object lists for the Support Packages in the queue into the
system.
8. OBJECTS_LOCKED_?
This phase checks whether there are objects that are overwritten by the import, and
that are still in unreleased requests.
9. ADDON_CONFLICTS_?
This phase checks whether there are conflicts between objects in the queue and any
installed add-ons.
10. SCHEDULE_RDDIMPDP
This phase schedules the transport daemon (program RDDIMPDP).
Import 1 Module
11. CREATE_VERS_BEFORE
This phase generates versions of the objects that are contained in the Support
Packages in the queue (if this option is set).
208
12. SPDD_SPAU_CHECK
In this phase, the system checks if a modification adjustment is necessary
(transactions SPDD/SPAU).
13. DDIC_IMPORT
This phase imports all ABAP Dictionary objects in the queue.
14. AUTO_MOD_SPDD
This phase checks whether all modifications to ABAP Dictionary objects can be
adjusted automatically.
15. RUN_SPDD_?
In this phase, you are asked to adjust your modifications to the ABAP Dictionary
objects by calling transaction SPDD.
16. LOCK_EU (only for import mode downtime-minimized)
This phase locks the development environment.
17. INACTIVE_IMPORT (only for import mode downtime-minimized)
This phase imports program code and program texts in an inactive state.
18. DDIC_ACTIVATION
This phase activates the imported ABAP Dictionary objects.
Import 2 Module
19. IMPORT_PROPER
This phase imports all the Repository objects and table entries if they were not already
imported in the INACTIVE_IMPORT phase. This is preceded by actions such as table
conversion and activation of the name tabs.
20. PREPARE_XPRA
This phase prepares the execution of the XPRAs and after-import methods.
21. UNLOCK_EU (only for import mode downtime-minimized)
This phase unlocks the development environment.
22. AUTO_MOD_SPAU
This phase checks whether modifications can be adjusted automatically.
23. XPRA_EXECUTION
This phase executes the XPRAs and after-import methods.
24. ABAP_GENERATION
This phase generates the runtime objects for the imported Repository objects (ABAP
source texts and screens).
Clean Up Module
25. RUN_SPAU_?
This phase prompts you to adjust your modifications to Repository objects by calling
transaction SPAU.
26. CLEAR_OLD_REPORTS (only for import mode downtime-minimized)
This phase deletes the obsolete versions of program code and program texts in the
database.
27. EPILOGUE
This phase completes the import. Among other things, it checks whether the queue
has been processed completely.
209
Applying the Plug-In:
Fabrication
Pharmacy
PI_BASIS
Textiles
/willsys
Standard Modules Additional
/VIRSA
SD,MM, PP…
/SATYAM
SAP shifts (or) SAP comes with standard functionality such as MM, SD etc.. In order
to provide additional modules such as banking insurance business content (BIW),
textile, mining, pharmacy etc. In Order to apply these plug-in’s (Solution tools plug
in). It is used to provide solution based on CCMS or EWA (early watch alerts).
SAP_BASIS should be 16
SAP_ABAP should be 14
STPI and PI_BASIS should be 2003 and 2005 (STPI-Solution tool plug in)
6. Read the note thoroughly and get the password, key word, key from the note
to install the add on
7. Pre requisites and problems are same as support packages and patches
210
9. Uncar the content using SAPCAR-xvf *****.car
12.Click on continue
13.A pop up box is displayed to go through the note and key in the password to
continue the add on installation.
15.There are chances for conflicts between the existing support packages then it
will ask you to configure CRT.
Note: SAP NOTES provides valuable information for resolving eh run time problems.
SAP maintain abundant knowledge base of notes. Notes are related to customer
problems and solution, break fixes to the standard functionality and minor
enhancements.
1. Informative Note
1. Production information
211
4. Recommend to resolve the issues (Table space overflow, Max extents list,
Archive struck, Work process congestion)
Corrective Note (Automatic): (Patches) Up to version 4.6c all the changes to SAP
system are performed manually. From 4.6c onwards SNOTE is used to apply the
changes automatically without any developer’s intervention and SSCR key. Most of
the changes are related to Sap standard objects.
Applying Note:
3. Go to SNOTE. Upload the note. (When it is uploaded the status will be new)
6. Some of the notes can’t be applied and some of the notes status will be
obsolete(Outdated).
Note: Notes consists of corrective coed, which will append to the standard
programs containing the necessary code, where as support packages overwrite
the code.
Until SEP 2005 there was not that much significance for market place. Before SEP
2005 we use OSS1 TCODE for downloads.
OSS1 is a transaction which is used to perform the following until SEP 2005:
1. Creating customizing
From SEP 2005 onwards SAP decommissioned using the TCODE OSS1 and
recommended to use “SAP MARKET PLACE”. SAP Market place is built on EP
212
(Enterprise Portal) which is used to connect between employees, customers,
partners and users.
1. Notes: This can be searched based on error description. Only SNOTES steps are
documented. Notes are always named with numbers.
2. Customer Messages: The runtime problems which could not be resolved can be
escalated to SAP
Enter the error message. SAP advices to search and look for the resolution among
the display notes.
Enter the error message. SAP advices to search and look for the resolution among
the display notes.
Note: We can define the priority of the issue such as normal, medium, high, very
high.
High and Very High are considered first as the production system is in danger which
causes business loss.
KEYS:
There are 4 types of keys which can be generated from the market place.
1. SAP LICENSE
213
2. DEVELOPER
3. SSCR
4. MIGRATION
SAP LICENSE Key: In order to apply license to the SAP system we need to generate
license key from market place. Before generating a license key the system needs to
be registered with SAP.
[The following information needs to be given for registering with SAP: Customer
Number, SID, Installation Number, Instance Number, Host name, Hardware Key]
The system which needs license needs to be registered. System data has various
information such as IP address, system name and router port. Select connection
and open it to SAP for specific number of days for remote connections.
Developer Key:
SSCR Key:
SCREEN SHOT
214
Migration Key: Whenever we are moving from one operating system to another
operating system (or) from one DB to another DB we need the migration key.
SCREEN SHOT
Client Comparison: When you install add on packages like country India version(CIV)
the changes effect only in that client through which its applied. CIN is an add-on
which is used to bring the changes related to taxes, wages etc. It was earlier
version. Now it is coming along with standard SAP software.
Select the entries and merge system prompt to record the changes to a change
request.
SAP Router: SAP router is a software program which runs on the application server.
It runs as a service and maintains access control list in a table SAPROUTETAB. It is a
text file which maintains the IP address, permit, deny and port numbers(Not a DB
table).
215
GO to www.service.sap.com/saprouter and download SAP Router executables into
c:\> (drive)and saprouter (folder). SAP ROUTER is an executable present in the run
directory and ensures that the version of the SAP router is always updated.
Download the files into SAP router directory send the details to SAP to establish
the remote connection.
Run the encryption and key in the SAP key and get the key to sap. Once the
connection is opened we can TELNET to SAP server. In order to start the SAAP the
command is
Start: saprouter –R
Stop: saprouter –S
SCREEN SHOT
The screen shot is an initial screen page for SAP ROUTER of the market place.
216
PRE GO LIVE:
Before the system goes live SAP logs into customer system and evaluate
customizing and development.
Pre Requisites:
4. No of modules configured
Go Live Analysis: This is the first check conducted by SAP to determine the
following:
1. Critical Transactions
2. Expensive Programs
3. CPU utilization
4. Memory Consumption
5. Back Up Configuration
7. Critical interfaces
8. Utilization of buffers
217
SAP studies all the above and recommends the measures for tuning such as
5. Run the check optimizer statistic schedule it in the standard background jobs
(House Keeping Jobs).
Note: Large installations should inform 2 months before Go Live (or) at least 1
month.
Small installations should inform 1 month or at least 15 days before the Go-Live.
Go Live Verification:
This session has to be scheduled after the Go Live analysis session. This will be
conducted by SAP technical consultants to verify the changes that are
recommended in GLA system. If the changes are related to Hardware it will
highlight during this phase.
Note: SAP verifies the parameters and recommends further changes on the system
configuration on the day off session.
Go Live Optimization:
This session will be conducted after Go Live (After 1 month of Go live). This is used
to analyze the load on the system. (How many users logged on, Critical transactions
and critical programs) and recommend further changes to optimize system
performance.
Parallel Run:
Data Migration: Most of the Customers define a migration client to perform data
transport from legacy systems. The data is migrated and tested for its quality
before moving to production. The data migration, parsing truncating is performed in
the migration client.
218
End User Training: Before Go-Live the production users are trained on all the
processes such as creating P.O’s, Invoices, Billing, Pay Roll Run and training client of
QA system.
Note: As the users are not habituated to SAP systems, we will uses to work on both
the systems (Legacy and R/3 systems). As a company policy it may be allowed to
use only fewer modules on the production system and remaining on legacy
systems.
In the above scenario parallel run of both SAP system and legacy systems are
advised.
During parallel run legacy system and R/3 system run together, the data from
legacy system is transported periodically, hourly, and daily to synchronize the data
between two systems.
SD MM PP HR FI CO
1st May09SD,MM
Daily/Hourly Transfer
1st June 09
PP,HR
in both systems
FI/CO (running on
SAP)
Now the other modules (SD, MM, PP, HR) are also cancelled in the legacy
219
Systems. Now the modules run only in SAP system.
1st Jan 2010
HR Clerk
HR
Manager
Project
Manager
Director
Employe
e
Employee can see his own details. But he cannot change any other entry. He can
see details of other employees.
Director can change create (or) display all the entries in the table. He can see/
change details of all the employees.
Project Manger can’t create the first four entries (Name, Empcode, Department, and
Address). He can only see them. He can create/change the other 3 entries.
220
Authentication: It is the means of providing access to the system i.e. User ID and
Password.
Roll Matrix (or) Authorization Matrix: It is a table which defines the critical
transactions, access levels and the rolls.
Authorization Field: The data element (or) a field in the table which needs to be
protected is called as authorization field. Authorization fields are created in
transaction SU20.
Ex: Employee Salary, Bonus, Discount, Sales Order Amount, Purchase Order Amount
etc….
Create,
Display
Modify/Change
Delete
Reverse etc…
Activities which are available in the system are shown in the table TACT. By default
there are aroune 170 activities defined in this table.
Authorization Fields and Activities: The list os possible activities for each
authorization objet is defined in the table TACT2
221
Authorization: Authorization field and its activities are referred as authorizations. It
is also referred as field and its value.
Note: Up to SAP 4.6 B version profiles are created manually, but from 4.6C onwards
profiles are generated while creating roles.
Composite Role: Group of one or more roles for administrative ease is called as a
composite role. It doesn’t provide any additional functionality.
Derived Role: The roles derived from a parent role, but differ by organizational
levels. These restrict the functionality based on organizational levels.
Defining a Role:
Go to PFCG
222
Include authorizations objects manually
Click on the traffic light. Then you will get the complete/full authorization.
(Pop up box will be displayed).
Perform user comparison, so that role will be effective in the user master
records.
Note: In earlier versions the user has to log off and log in to get the effectiveness of
the new role assigned to him. But in the current versions after user comparison the
role is effective automatically.
Note: Performing user comparison during role creation consumes more time. So
perform the user comparison in the background mode during off peak hours.
PFUD: This is used to perform user comparison in the background mode (or)
schedule a report “PFCG_TIME_DEPENDENCY” to perform user comparison in the
background mode.
When a client is created we cannot perform role creation without filling the
customer tables.
The relation between the transaction and the authorization object s can be
displayed in SU24.
SU24 is used to define the relation between transaction and authorization objects.
223
Authorization check indicators such as unchecked, not maintained, check check and
maintain.
SM30 table maintenance if the table maintenance is allowed we can create entries
manually.
Table TACTZ
Activity
Up to 10 authorization objects
[SU21/SU22]
Assigned Transactio
n
in SU24 Assigned
Users
Role
PFUD/PFCG
Profile/Composite PFCG-Time
Profile PFCG SU01
Activities are: Create, Modify, Delete, Reverse, Approve, Release (These activities
are listed in table TACT)
When the user is logged into the system request goes to the DB and gets the
necessary authorizations from the user master record (USR02) and keeps a copy on
the user context. This user context is displayed in transactions SU56.
When a user executes a transaction it points to the program. Program in turn points
to authorization objects inside it. Authorizations are programs busing statements
“authorization_check_” followed by the authorization object, field value and activity.
These are all checked against user buffer (SU56). If they are available user is
allowed to perform transactions else user is not authorized to run the transaction.
224
Missing Authorization: Very frequently help desk receives calls related to missing
authorization when a user could not access a program over a transaction. It is
referred by the user as Missing Authorization.
Analyzing Authorizations:
If the role assignment is expired then send a mail to the business process owner.
User raises a ticket of missing authorization ask the user to execute the transaction
again and send the screen shot of SU53 screen.
If the role is assigned recently and user comparison is not performed then perform
user comparison.
Note: Use SUIM (SAP User information management. This information transaction
gives you all the reports related to SAP security. Some of the reports are user to
roles, roles to transactions, user to profiles. Standard password reports, user change
documents (last logon date, last password change, list of users locked).
SA38 is executed.
225
Purchasing officer Sales Officer Plant In charge Warehouse In
charge
Note: Always assign only requested authorization to the users. Do not assign excess
authorizations.
All of the above can be combined in the role and assign it to the user.
Role Mitigation:
1. What worse will happen by assigning the existing role to the user? After
mitigation it will giva report of excessive authorization. Send the list to the
Business Process Owner and get approval.
Create Material, Create P.O etc.. are the authorizations of the role.
2. Identify the least effected role by mitigating fewer times and assign that
object to that role (Save the role, generate the profile, assign it to user,
perform user comparison).
If both of them are not allowed then write to the manager approval to create
a role.
226
Create Role, assign the authorization object, save and generate profile,
assign it to the user and perform user comparison.
SOX 404 act. It is implemented in most of the public limited companies in the U.S to
safeguard the applications. SAP uses the above tools (VIRSA, BIZRights) to mitigate
when modifying a role (or) assigning a role to the user. VIRSA has become internal
part of SAP and comes as an add-on.
These 3rd party tools are also used for the following:
1. Auditing Purpose:
Who has released P.O, Who has created P.O, When is it created, All the
details are given in auditing.
Ex: We can get across control to that P.O creations, TIN, bank account
number, address, telephone number, fax number, match with P.O
receivers.
4. User Management:
Types of users:
1. Dialog User
227
2. System User
3. Communication User
4. Service User
5. Reference User
Dialog User: Is the on e where interactive logon is possible. These are calculated for
license.
System User: Is used to communicate within the system in the background mode.
No interaction logon is possible.
Communication User: It is a non dialog user where interactive login is not possible
and used to communicate between 2 systems using RFC connection.
Service User: This is anonymous user, which is used by group f people where dialog
logon is possible. No password, USER ID
Ex: Users connecting to the system over the browser will have limited
authorizations (EP). Once authenticated the rights will be assigned to the reference
user.
228
Name of MM01 MM02 MM03 ME21 ME22 ME23
the Role
Purchase
Officer
SALES
OFFICER
SALES
MANAGER
AREA
MANAGER
MANAGER
DIRECTOR
Questions:
1. What are the standard roles available in the system. Name some of them
along with description (at least 10)
User Creation:
Address Tab:
It provides the details of the users like first name, last name (It is mandatory to
provide email and telephone number)
229
User Group: These are defined in SUGR. These are used to group the users based on
department or division or roles for easy maintenance. By default super group is
available in the system.
User Group for authentication Check: If we specify a group the user is allowed to be
administered by the user of this group only.
Super user group admin is allowed to administer the user belonging to all the
groups.
Default Tab:
Specify the printer settings like O/P device, O/P immediately or release after O/P.
Parameters: These are frequently used fields which will be popular during the run
time of the user
Roles Tab:
These are used to assign authorization to the users. We can delegate additional
rights by using reference users.
Profiles Tab:
These are going to be combined in the roles. There is a specific profile which can be
used like SAP_ALL, SAP_NEW needs to be documented. Use only either roles or
profiles.
Groups Tab: These are created in SUGR used to group the users for administrative
purpose.
Presentation: It is used to restrict the user access such as time in and time out of
the current day. Sales of the day and sales of the week, pay slip of the month.
230
Personalization Tab:
1. User Administration
When there are more systems in the landscape (or) various components SAP
(BW,CRM,SRM) are implemented in such a case SAP recommends to use control
administration CUA
User Admin Profile& Authorization
Admin
1. User Admin
3. Authorization Admin
Role Admin
Create Role
Display Roles
Change Roles
Profile Admin
User Admin Authorization Admin
231
Create User Assign roles to users and perform user
comparison
Prerequisites of CUA:
3. Go to SALE define the logical system name and assign them to clients
Go to SCUA of the master client or parent client from which we want to monitor
users centrally.
Specify the name of the CUA, SAVE and include all the logical systems.
Users can be created only in the master client and maintained in the child client
Users can be maintained either globally or logically which will be defined in SCUM
Note: RSDELCUA is used to delete the CUA. (Execute this report in SE38)
CUA mechanism: CUA uses ALE mechanism to transfer the data between different
clients. Transaction RFC is used to transfer the data between the systems.
SCUM: If you are using Central User Administration, you can use the distribution
parameters in transaction SCUM to determine where individual parts of a user
master record are maintained.
232
· In the child system with automatic redistribution to the central system and
the other CUA child systems
Every input field of the user maintenance transaction SU01 has a field attribute that
you set once in the central system with transaction SCUM during Customizing. As
far as possible, you should then not change the field maintenance indicator at all.
If you later change the distribution from Local or Proposal to Global or
Redistribution, data inconsistencies can occur
SCUM
The system displays the User Distribution Field Selection screen, with tab
pages of the fields whose distribution parameters you can set. To display
additional fields, choose page down.
You can select the following options on the tab pages:
Global You can only maintain the data in the central system.
The data is then automatically distributed to the child
systems. These fields do not accept input in the child
systems, but can only be displayed.
All other fields that are not set to “global” accept input
both in the central and in the child systems and are
differentiated only by a different distribution after you
have saved.
Proposal You maintain a default value in the central system that
is automatically distributed to the child systems when a
user is created. After the distribution, the data is only
maintained locally, and is not distributed again, if you
change it in the central or child system.
RetVal You can maintain data both centrally and locally. After
every local change to the data, the change is
redistributed to the central system and distributed from
there to the other child systems.
Local You can only maintain the data in the child system.
Changes are not distributed to other systems.
Everywh You can maintain data both centrally and locally.
ere However, only changes made in the central system are
distributed to other systems, local changes in the child
systems are not distributed.
SAP R/3 Security Tables are Tables in SAP R/3 that have relations or direct
impact to Logical Access Control, Program Changes Control and Operational
Control. Today, the convergence of the Internet within distributed ERP
systems is ever-increasing the demands on data and business process
security almost exponentially.
233
Organizations which employ distributed business processes and data
systems require surety of both data and its accompanied processes;
promising continued support of essential business needs - whilst mitigating
unauthorized access to critical information. This is especially true with the
introduction of Sarbanes-Oxley and other federally mandated policies and
procedures – many having direct (read potential fines and/or jail time)
responsibility tied to the efficacious employment of recognized security
measures.
Below the list of SAP R/3 Security Table that could be used for your
references
234
AGR_AGRS Roles in Composite Roles
AGR_DEFIN
Role definition
E
Menu structure information - Customer
AGR_HIER2
vers
AGR_HIERT Role menu texts
AGR_OBJ Assignment of Menu Nodes to Role
AGR_PROF Profile name for role
AGR_TCDT
Assignment of roles to Tcodes
XT
AGR_TEXT
File Structure for Hierarchical Menu - Cus
S
AGR_TIME Time Stamp for Role: Including profile
AGR_USER
Assignment of roles to users
S
Relation transaction to authorization
USOBT
object (SAP)
Relation Transaction to Auth. Object
USOBT_C
(Customer)
USOBX Check table for table USOBT
USOBXFLA Temporary table for storing USOBX/T*
GS chang
USOBX_C Check Table for Table USOBT_C
235
4. S_USER_GRP, S_USER_AUTH, S_USER_AGR, S_USER_TCD, S_USER_USR,
S_USER_PRO
These are user management authorizations for dual control and triplet control
SU01:
SU10:
SUGR:
PFCG:
EWZ5:
SCUM:
SCUL:
SUPC:
SU03:
SU24:
SU25:
SU99:
SM18:
SM19:
SM20:
SM58:
SM59:
SALE:
BD54:
236
SCC4:
SAP R/3 segregation of duties (SOD) is a basic key internal control that is
used to ensure that errors or irregularities are prevented or detected on a
timely basis by employees in the normal course of business.
SAP divides the possibilities and the scope of the CPIC interface into two
function groups: the CPIC starter set and the advanced function calls. This
division is simply meant to guide the user and not to restrict the available
functions. For instance, the CPIC starter set would just be used for the basic
and minimum set of functions shared by two partner programs, such as
establishing the connection and exchanging data. The advance calls cover
more communication functionality, such as converting data, checking the
communication, and applying security functions. For more information on
237
these CPIC function groups, refer to the SAP documentation BC SAP
Communication: CPI-C Programmer’s Guide.
• You can use the system profile parameters to assign a minimum length for
the passwords and define how often the user has to set new passwords.
• Invalid passwords can be entered in the table of reserved passwords,
USR40. This table is maintained with transaction SM30. The entries can also
be made generically:
The SAP System also has pre-defined password rules. You can control passwords
with profile parameters login*
238
Controls the deactivation of password-based logon
Starting with installations of SAP Web Application Server release 6.10 and
higher, the passwords of SAP* and DDIC are selected during the installation
process.
If you create a new client the default password for SAP* is pass. If you
delete SAP* userid, logon is possible with SAP* /pass.
The DDIC user maintains the ABAP dictionary and software logistics. The
system automatically creates a user master record for user SAP* and DDIC
in client 000 when
the SAP System is installed. This is the only user who can log on to the SAP
System
during a release upgrade.
Do not delete or lock user DDIC because it is required for certain installation
and set-up tasks. User DDIC needs extensive authorization. As a result, the
profile SAP_ALL is allocated to it. The users, SAP* and DDIC, should be
assigned to user group SUPER to prevent unauthorized users from changing
or deleting their user master record.
239
• Client 000 is used for customizing default settings. SAP imports the
customized
settings into this client in future SAP System releases during the upgrade
process
or even with support packages. Client 000 should not be used to customize
data
input or development.
• Client 066 is used by the SAP EarlyWatch service and should not be used
or
deleted by the customers.
SAP uses a technique called as Hashing to store the passwords in the database.
With this technique the system tries to guarantee that if an attacker gets access to
the database where passwords are stored, he won’t be able to recover the original
password string.
SAP has implemented different password hashing mechanisms along its history
each identified by a Code Version (CODVN From A,B,C,D,E,F,G,H,I).
USR02: This is the user master table. Contains information such as the User name,
user type, lock status, last logon date etc..
This table stores the current password hashes in two fields, depending on the code
version being in use. If the code version F is used a 40-character long PASSCODE
field is used to store the password hash.
USH02: This table is known as the change documents table and is updated every
time a user is locked, un-locked, its password reset etc… When these events take
240
place a partial copy of user master information including BCODE, PASSCODE and
PWDSALTEDHASH fields is inserted as a new record in this table.
Therefore, each time a user’s password is change a new rec0ord is inserted in this
table containing the old hash value.
The tables USR02, USH02 and USRPWDHISTORY should be protected against direct
access through table maintenance tools (TCODES SE16, SE17, SE11…). This can be
enforced through the proper use of the authorization object S_TABU_DIS which
restricts access to critical table authorization groups.
Use different passwords for critical users like Sap*, DDIC, Administrator….
If legacy components needs to to connect with a new SAP system then a possible
solution needs to be configured having 8-characters long upper case passwords,
including special characters. This would keep the hashing procedures strong, while
providing a decent level of security for legacy compatibility.
Role and profile go hand in hand. Profile is bought in by a role. Role is used
as a template, where you can add T-codes, reports..... Profile is one which
241
gives the user authorization. When you create a role, a profile is
automatically created.
Profile versions are nothing but when you modify a profile parameter through
a RZ10 and generate a new profile is created with a different version and it is
stored in the database.
Yes, we can change a user role template. There are exactly three ways in
which we can work with user role templates
- we can use it as they are delivered in sap
- we can modify them as per our needs through pfcg
- we can create them from scratch.
For all the above specified we have to use pfcg transaction to maintain them.
su53 is the best transaction with which we can find the missing
authorizations and we can insert those missing authorization through pfcg.
242
Table of authorization field settings
Is there a table for authorizations where I can quickly see the values entered
in a group of fields?
In particular I am looking to find the field values for P_ORGIN across a
number of authorization profiles, without having to drill down on each profile
and authorization.
Someone has deleted users in our system, and I am eager to find out who. Is
there a table where this is logged?
I have a requirement to make SPRO read only. As you know it has a tree like
structure and to make it read only seems like impossible.
You cannot make SPRO 100% display only by ANY setting. The SCC4 option
only turns configuration tables to not-modifiable but still allows the non-
config delivery class tables (or those configured to be changeable) to be
modified. It does nothing for the tcodes that are NOT table maintenance and
not controlled by S_TABU_DIS. These will still allow configuration. All the
tcodes in the SPRO are in several tables CUST_ACTOBJ (spelling?) is one.
You only real option is to create a role with all the tcodes in them that are in
the SPRO , remove the create and change to display ( generally by changing
the last number on the 4 digit tcodes to 3) and removing all the Create and
change access in all the activities and allow only the display.
PFCG allows you to create a role from a SPRO project so the usermenu will
come close to the SPRO menu, which your changes it will be display.
How can i do a mass delete of the roles without deleing the new roles.
There is a SAP delivered report that you can copy, remove the system type
check and run. To do a landscape with delete, enter the roles to be deleted
243
in a transport, run the delete program or manually delete and then release
the transport and import them into all clients and systems.
It is called: AGR_DELETE_ALL_ACTIVITY_GROUPS.
To used it, you need to tweak/debug & replace the code as it has a check
that ensure it is deleting SAP delivered roles only. Once you get past that
little bit, it works well.
244
Dialog Work Process in Multiplexing:
Dispatcher
User
Communica
tion W0,W1-------Wn-1 Queue
U
C Task
Handler
R/3 Buffers
DB
rdisp\wp_no_dia
The maximum run time of a dialog work process is restricted to 600 sec,
which can be increased dynamically in RZ11 by using the parameter
rdisp\max_wprun_time
245
We can also monitor dialog work process using command prompt using the
command “dpmon”
Ps –ef|grep de *
Disp+work
That is the reason they will update temporary tables, so that rollback is
possible. If the entire transaction is committed then the update is written to
the database.
Temporary Tables:
These are the tables which are used by the dialog process to update the data
temporarily. Update process reads the committed data from the tables and
updates the tables in DB.
Once all the steps (dialog steps) update temporary tables a COMMIT occurs.
Once the transaction is committed update gets initiated. Update process
reads the temporary tables and update the DB. Before updating temporary
tables dialog process gets a logical lock from enqueue process, if it is on CI
(Central Instance). If it is on DI (Dialog Instance) it communicates with
message server. Message server in turn communicates with enqueue
process to get the lock, so that other users will not modify during
transaction.
246
While updating records from the temporary tables to the DB update inherits
the locks
Types of Update Work Processes: There are two types of update work
processes V1 and V2
Update Process (v1): V1 handles the most critical updates. (User Transactions)
rdisp/wp_no_vb1
rdisp/wp_no_vb2
Each instance/ SAP system requires at least one V1 process. If v2 updates are
not defined they will be handled by v1 update process.
Init: Update is initialized and waiting for the updation work process.
(SAP recommends at least one update work process for 5 dialog work
processes)
Auto: If the update mechanism is deactivated the work processes will
be terminate the update process, upon activation of the update. The
update status will go into AUTO. That is no initialization is required
Run: Update is running. Update is updating into the DB
247
Error: Update is terminated
Go through SM21 logs and ST22 ABAP dumps thoroughly and fix the issue.
The update can be activated in SM14.
Note: IF the update could not be initialized automatically, select the record
and run the update (if the update is terminated).
1. Local
2. Asynchronous
3. Synchronous
Ex: User creates a P.O but could not see the P.O in the DB due to
deactivation of Update Mechanism. No acknowledgment.
248
RSM130002: It is used to delete the update requests based on number of
days.
Enqueue process is only confined to application server level. These are not
equal to DB locks (Tables updation locks) but similar to DB locks.
ENqueue_Table_Size
Apart from the above user call regularly raising a message saying that
transactions are locked and could not be updated.
Note: In order to resolve the above issue release the locks in SM12.
Note: Do not ever try to delete the locks without user approval.
Case-2: If the user is logged in get the telephone number and E-mail id from
SU01 and send a mail to the user about the lock release. Call the user and
249
explain the significance of lock release. Probably we can also involve the
consultant who is waiting for lock. Based on verbal approval send a mail to
the user saying that “ As discussed today morning 5 A.M about release of
locks we are going ahead to unlock the transaction”
Finally release the lock in SM12. Release the one which is approved.
After 600 seconds the transactions will get terminated and logged into ABAP
dump with an error “Time out occur” or a program running more than the
specified time.
SAP recommends to run this sort of long running programs and time
consuming programs or expensive programs in the background mode using
“Batch Process” (background Work Process).
Note: Companies uses 3rd party tools like “Maestro”, “Tidal” to trigger the
background processes.
1. Time-Controlled:
Every Month
Run immediately
250
2. Event Controlled: These are used to trigger based on events on
success of dependant programs
Users can trigger some of the events using standard ABAP programs or
customizing using functional modules
SM36 Specify the name of the job Description of the Job Specify the
type or class Spool recipient
Spool Recipient: Printer, E-mails, fax, intranet, internet [pdf] specify the
name of the program along with the variant.
251
Scheduled: When it is defined status is scheduled
Released: When we specify the time to run the status is released
Ready: Waiting for the background work process
Active: Actively running the job or program
Cancelled: Cancelled
Completed: Job is successfully completed.
Scheduler sap message server system (SM61) runs in the dialog mode for
every 60 seconds (default) which is specified by parameter
rdisp\btc_time=60
Dialog Instance
User
Communit
y CI
DB
rdisp\btc_time=60
Scheduler reads from the table and keeps the job in queue based on their
time of priority
Background job gets free work process and runs in the background mode
active
The job is completed the status is finished (or) completed else it is canclled
Text File
Excel File
Legacy
System Text and DB
Purchase Excel File
Order
252
Based on the time IDOC
253
Deletes old dumps produced by ABAP abnormal create a
terminations. variant.
Alternative: To keep from needing to schedule this job, run
the ABAP report RSNAPJOB from the ABAP editor
instead. This schedules RSSNAPDL as follows:
Job name: RSSNAPDL
Variant name: DEFAULT (you must create this variant)
Start time: 0100 AM
Repeat interval: Daily
SAP_REORG_JOBSTATISTIC RSBPSTDE You must Monthly
Deletes job statistics for jobs not run since the specified create a
date (statistics no longer needed since job was a one-time variant.
occurrence or is no longer run)
254
Note: Apart from the above we will run the statistics to update tracing
transactions (ST03, ST04)
External Commands: These commands are used to trigger the jobs in the
system. Using commands SAPEVT and SAPXPG (External Programs)
1. Startsap
2. Stopsap
3. BRBACKUP
4. BRARCHIVE
5. Tp
6. R3trans
7. BRRESTORE
Spool Re organization: The tables TST01, TST03 can held upto a limited
number of entries 32,000. This can be increased up to 99,000. If this number
exceeds the spool mechanism does not work i.e. why spool tables re
organized using the standars background jobs. Schedule background jobs
RSP0041 to delete this spool requests which are older than 14 days by
default
SMGW is used o monitor the connections which are coming to RFC, CPIC.
Ex: A service in JAVA system is set to run using a program ID. IN order to
check whether the connection is made to R/3 we need to check the program
ID in SMGW. Gateway process listens on 3300 (Instance number 00)
255
Spool process is used to generate output request as a device specific
request.
These are the spool requests which are generated by dialog (or)
background stored in the location defined by the parameter as follows:
rdisp\store_location=G (or) db
DB: Database
1. For fewer records access time is good, but if the record size grows it
takes longer time to fetch the record from the global directory
2. O/S is not part of the regular back up (printer). If there is any damage
to O/S global directory will be lost all our spool request will be lost
256
Advantages of Storing at DB:
These are stored in DB. It consumes more time than files stored in O/S
level
Type of
Storage Advantages Disadvantages
File system Relatively fast: improved performance. TemSe data must be backed up and
restored using operating system tools,
separately from the database.
Definition of Printers:
1. O/P devices
Spool Servers:
Go to SPAD
257
Specify the server class
Real Spool Server: This is an instance whether at least one spool work
process is configured
Logical Spool Server: This server doesn’t exist but logically defined for load
balancing and handle fail over.
Each logical spool server should be mapped to at least one real spool server
R/3 U TA
LP1 R/3 C
W.P of type Spool R/3
258
Access Method: Access method specifies the type of printing mechanism
(Local or Remote Front End)
DISP
U W0,W1………………
…Wn-1 T.H
C
D.B
R/3
Global Spool
User
Request
Reques TEMSE
data
t TST01/TST03
Output Request
O/S Spooler
Local
O/S Printer
Print Server
Print Server: This is a server in the network where the printers are configured
Local Access Method: If the output request generated by the spool process is
formatted according to the output device and hands over the request to O/S
259
spoolers. The commands Lp or LPR at O/S will analyze the O/P request and
print it local.
Remote Access Method: If the O/S spooler and the O/P request resides from
different hosts, then remote access method is used.
Go to SPAD
Authorization Group:
Front End Printing (P): The printer is connected to the user desktop to print
sensitive document
Disadvantages:
Print congestion Occur: IF more number of front end printers are configured
try to restrict the no of front end using the parameter rdisp\wp_no_spo_max
260
Go to SP01
Specify * in create
3. Device problem
261
8. While configuring barcode printers ensure that right drives are
installed
Define the name of the mail server host on which mail server resides
SOST: SOST is used to display and manage all messages sent using
SAPconnect.
Depending on the selection criteria chosen, the program displays send requests that are sent or have
already been sent using SAPconnect. A variety of selection and display options are available to you.
For more detailed information about using the send requests overview, see the program documentation in
transaction SOST. To do this, call transaction SOST and choose the info button or choose Help →
Application Help.
262
Go to SOST Select the status waiting, errors, sent and execute to display
the list of transmission requests we can trace error transmission requests
upon resolving the error, the transaction request can be resent, spool
process is configured using parameter
If a user is only allowed to select send requests of certain users or groups, you can
use transaction SOSG for this. This transaction is the same as transaction SOST,
however it also performs additional authorization checks. To be able to use this
transaction, a user must not have ADMINISTRATOR authorization in authorization
object S_OC_ROLE. Authorization to select users or groups in transaction SOSG is
controlled through authorization object S_OC_SOSG. For more information, see the
documentation for this authorization object. In transaction SOSG, using input help
for the Sender field displays only those users or groups for which the current user
has display authorization.
263
Printer Types:
• Local Printing: The spool server (which contains spool work process) and the host spool system
will reside in the same server.
Host Spool System: The area which contains the spool data
• Remote Printing: The spool server & host spool system are on different servers.
• Front-end Printing: The host spool is in the front-end system itself, the spool data will be stored
in the spool directory of the front-end system.
For front-end printing users must indicate SWIN device name as output devices, indicating the
access method F and the __default as host printer name.
SPAD
264
Specify the name of device according to naming convention of the device
Specify the device type
Specify the location & describe the printer
Choose the access method [local, remote, Front-end]
Specify the sequential printing, if we require a sequence in printing.
When it is remote printing specify the name of remote host where the printer is hosted.
Save and activate
The IP address of the printer and the short name described while configuring the printer in SAP
must be included in the hosts file.
SAP supports only limited number of printers. LP01 is the default printer.
Access Methods:
Access method specifies the communication path between SAP spool system and the host
spool system i.e., how the SAP spool transfers the data to be printed to the host spool system.
Local L C
Remote U U,S
Front-end F
Spool Architecture:
265
Spool Work Process converts the spool request into device specific output stream and sends it to
the host spool or SAPLPD.
SAP profile parameter that controls the no. of spool work processes per instance is
rdisp/wp_no_spo.
Having several spool work processes per instance avoids communication problems between
spool work process and the printing devices which implements spool load balancing by using server
groups called as dynamic spool assignment. Before 4.0 release, the spool server assignment &
spool server work process were static that is only one spool work process was allowed.
Spool Request It is for the print job or output job, made up of spool request record (administrative
information to manage the print jobs) that is it contains the reference to the spool data, output
device and the printing format.
266
SP01 Print directly toolbar button ( ) creates the output request.
Output Requests are the components of the spool request which actually formats the output data
and sends it to the host spool system to be printed. You can submit multiple output requests for a
single spool request.
SP01 select the spool request and click on output request button ( ). Shows the list of
output request for the spool request.
SAP spool system handles spool request and the output request, manages the output device
type, device drivers, device formats & the character sets. It converts all types of output data into
the required output format.
TemSe DB:
Temporarily Sequential Object Database which stores the spool request data, the
background processing job logs and other texts that are temporary.
1. TemSe Administration(SP12)
2. TemSe Contents(SP11 or SP12 Go to menu TemSe contents)
TemSe DB contains lot of job logs and print data files it is convenient to schedule
the report RSPO0041/RSPO1041 (house keeping jobs) periodically as a
267
To reorganize the TemSe database RSTS0022
Problem : The request was printed despite a minor problem, but the output
Administration Tasks:
1. Checking and monitoring the spool system, both at SAP and at OS level
2. Deleting old spool requests or scheduling the background job which automatically deletes
them (RSPO0041/RSPO1041).
3. Defining new printers, device types and other device elements.
268
4. Fine-tuning
5. Trouble shooting
Trouble Shooting:
1. Check and monitor the spool work process (SM50), message server working properly and
the OS spool.
2. Find which printer is causing the problems
(SP01 SystemservicesOutput Controller).
Summary
SPAD
SP01
SP02
SP11
SP12
TSP01
TSP02
TST01
TST03
TemSe
269
RSPO0041/RSPO1041
RSPO1043
RSTS0022
Rspo/store_location
Rdisp/wp_no_spo
Rdisp/wp_no_spo_fro_max
Access Methods C L U S F
SAPLPD, SWIN
270
System Monitoring
System health checks are used to achieve the high availability by forecasting
problems and resolving them within the time. The following activities are carried out
as part of system monitoring.
Common Transport
End
Directory D1
User
Comm
CI CI
unicat D2
ion DB1 DB2
DB1
D3
D4
D5
D6
Go to SM51 to display the list of active servers. This is to ensure that all the
dialog instances are up and running.
It is also used to identify describe the type of instance use go to go into the
respective transaction of the instance. There is no need to log in to the path
instance. There is no need to log on to each instance. Double click on the instance it
will navigate to SM50 of the respective transaction.
271
1. Number of work processes
Sleep Mode: If the target system is not available the work processes waits until the
target system is available till that time it will be in the sleep mode.
Private Mode: Each work processes required for certain amount of memory for
execute user transactions. Work process consumes the memory from roll area
initially, if it is not enough it consumes memory from the extended memory. If this
is also not enough it will go into HEAP memory. If all these are not available then it
goes into private mode.
If the work processes goes into private mode it will be released only when the entire
memory is exhausted or transaction is completed.
If mote number of work processes go into private mode work process congestion
occurs, users experience hour glass mode.
Identify the process which is logged in earlier. Inform the project manager about
the termination of work processes. Upon approval terminate the work process.
272
CPU: The amount of time work processes spend utilizing C.P.U resources
Insert sequentially read, physically read, generate, loaded on which table the
work process accesses.
SM04: It is used to display the list of active users of an instance Select the
user go to menu to display the terminal and amount of memory utilized by the
users such as roll memory, page memory and private memory
Select the work process double click on it it displays amount of external
memory and heap memory utilized.
3. ABAP dumps
4. Private mode
SAP is programmed in ABAP language. If ABAP program could not be executed it will
be thrown into DUMP. ST22 is used to identify the dumps based on date, time, user,
client.
1. DB errors
273
2. Table space over flow
4. Archive strucks
7. R/3 Error
8. Programmatical Errors
10.The ABAP program is expensive which consumes more time and Time Out
error occurs
12.GUI compatibility
274
Data Transfer:
Data Migration: During the Implementation the data from legacy systems has to
migrate into R/3 systems to continue the business transactions. In order to transfer
the data, data migration client is created in Quality System. Perform a migration.
Master Data:
It is basic information which is used to carry out transactions in system.
Ex: while creating sales order the customer name is required along with items
and descriptions and quantity
2. Data needs to be parsed (or) truncated and mapped to the target system
fields
1. LSMW
2. Direct Input
3. BDC
4. Batch Input
1. LSMW: It stands for legacy system migration work bench. It is ued to transfer
the legacy system data into R/3 system. It is a transaction
2. Direct input method: These are standard reports which are used to transfer
the data into R/3 system as and when we required.
3. Batch Input Session: It is a part of LSMW which can be executed as and when
they are required. A session can be created to upload the data using
standard transactions. This standard transaction is recorded with inputs and
it is executed in the background mode. It is used for transactional data.
275
4. BDC: Batch Data Communication: It is used to define the customer transfer
programs based on the requirements. It also used the mechanism similar to
Batch input session, but it is customized using the standard function
modules. Workstation upload and Work station download
It is used to transfer the data between two loosely coupled systems i.e. from SAP to
SAP systems. In order to work with ALE we need to define the following:
BAPI: These are standard interfaces defined in the system to transfer the
data from one system to another
It is used to transfer the data between SAP and Non SAP systems.
It is used to define the remote connectivity to the target system. RFC’s are used
widely in the following scenarios:
2. CUA admin
3. Data Migration
276
4. Transport
Go to SM59 Specify the name of the connection specify the description specify
the RFC destination (mostly logical system name) specify the type of connection
specify the description go to technical settings specify the target host (name of
the host or IP address) specify the instance number gateway host and services
can be specified optionally click on logon security specify whether it is a
clustered system or not specify the authorization and logon details, logon
language, USER ID and password go to special options to trace the RFC 9it’s not
required) save the connections click on the test connections (It displays the
connectivity and connection time) click on remote logon to check whether the
system can login remotely.
If the logon details specified in the RFC connections are correct it will connect the
remote system and opens the logon screen.
Note: Do not give dialog user while defining RFC connections always use either
system or communication user
Go to SA38 and use report RSRFCTRC to trace the activities of the RFC connections.
277
target system is not available the work process gets in to sleep mode and
waits till the target server is available.
This program identifies all the transaction ID’s which are not sent to target
systems and tries to update for every 60 seconds . TRFC’s are monitored in
SM58
4. Queud RFC: It ensures that the requests are updated in the target system by
following a defined sequence. It is an extension of TRFC. QRFC’s are
monitored in SMQ1, SMQ2, SMQR
Instance: It provides executable services and has its own memory, buffers, own
processes.
When more than one instance is configured the following issues may raise:
2. Users logon to different instances, buffers are not effectively utilized. In order
to address the above logon load balancing is defined.
Go to SMLG define the group and assign instance to it specify the response
time go to SAP GUI click on logo groups specify SID specify the message
server host and click on the groups lost of logon groups are displayed select
278
the logon group save specify the message server entry in etc\services file
create an entry in “sapmsg.ini” files.
Message server identifies the least loaded server in the logon load balancing and
directs the connection to that particular server
RFC Server Groups: These are similar to logon groups but used for RFC
communications.
The server groups are used while defining RFC connections when a request is
sent to the target system which will be sent to the server group. Server group is
mapped with all the available instances. This is used by the RFC request to
identify the least loaded available server.
279
Operation Modes: These are used to define switching of W.P during the
specified intervals.
Ex: During off peak hours there is no need of more dialog work processes which
can be converted into background processes.
Prerequisites:
Go to RZ10 import profiles of all the active instance go to RZ04 define the
instance along with profiles (check location) go to RZ04 define operation
mode (Day, Night, Peak, Off Peak) Assign the instance and configure the no of
W.P for each mode save the operation modesdefine the time schedules of
the operation mode in SM63.
Note: During the operation mode switch all the active work processes work till
they complete the job. As part of regular monitoring we need to check whether
operation modes are switched or not.
Maintaining Profiles:
By default when the system is installed minimum parameters run the instance
are configured. But in order to handle the load configure more memory,
configure more processes, increase the size of the buffers, security settings,
logon client logon language etc. We need to modify profiles from time to time
based on requirements.
Profiles:
280
Startup Profile: This will not be modified unless there is a change in the instance
and instance file system.
Default Profile: This is modified to set the default value for the users like logon
language etc. The parameters which set are applicable to all the instances. This
parameters are over written by the instance profile.
Instance Profile: These are instance specific parameters like W.P configuration
memory configuration
Profile Maintenance: These are maintained in RZ10 transaction code. These profiles
needs to be imported into DB after the installation. This will be done in the following
way:
Create your monitor set copy from the standard template and adapt the SAP
standard values save the monitor set
Dialog Instance 3
Dialog Instance 1
RFC RFC
B/W
RFC
Config Alerts
281
Archiving
It is a process of moving the old data (based on the age of the data) to a data
warehouse solution, to a tape, external device, HSM machines (Hierarchical Storage
Machines).
1. Aged Data
4. Based on the country specific requirements, the data in the system should be
available for a specific period of time for auditing purpose.
The old data cannot be deleted because it will be used to correlate the data,
analyze the data. It finally helps to forecast the expected business, man power,
material, machines, money and management.
3. Functional consultants identify the objects based on the modules and inform
us to archive
282
6. Go to file (FILE_Tcode)
The third party tools like IXOS, DWB2000, BIW are used for the archiving purpose.
283
GUI (or) Front End time:
It is the time taken by the user request to reach the dispatcher. GUI time is not part
of response time. GUI time should generally be around 200 m/second
Wait Time:
The time taken by the user request waiting for Work Process it should be around
500 m/sec i.e. 10% of dialog response time.
The time taken for roll-in of the user context information by the W.P.
Response Time:
The time taken for processing a user request and returning the data to the
presentation server. Response time will be continued from the movement when a
presentation server request is reached to the dispatcher.
Note: GUI time and CPU time are not part of the response time.
Process Time:
It is the amount of time required to process the user request by interpreting (ABAP,
Screens, SQL Statements).
Processing time in not measured directly. It should not be more than twice the
amount of CPU time
CPU Time:
It is the amount of time taken by the work process utilizing CPU resources while
processing the user request.
Generally CPU time should not be greater 40% of (Response Time – Wait Time)
284
If CPU time is expensive then ABAP programs are expensive. Tune ABAP programs.
Perform the run time analysis of the ABAP programs. It is done by the developers.
It is the amoun ot time taken to load and generate the programs. Normally it should
be 100 or 200 nano seconds. If LG Time is more we can consider the following
1. Buffer areas are configured with small size (Increase the buffer size)
RFC+CPIC time:
It is the amount of the time taken by the work process to communicate with
external systems like BW, CRM, SRM etc….
Generally the time is not defined because it varies from system to system
Enqueue Time:
The amount of time taken by the dialog process to communicate with enqueue
process to obtain the lock while updating records. Normally it should be 1 m/second
in the central instance.
It should not be more than 100 m/sec if the request is coming out from dialog
instance. "enqu_ tablesize” is the parameter which is used to define the size of the
enqueue table.
Database Time:
It is the amount of time taken by the database to process user request. It should not
be more than 40% of (Response Time – Wait Time).
285
2. Database Statistics are outdated: Run the statistics using DB13
3. DB buffers are not sufficient: Increase the buffer size (ST04) or using he
parameter
4. Missing Indexes: Indexes are missed out which can be traced out in DB02
(Recreate indexes, Create appropriate indexes). One primary index and upto
5 secondary indexes
5. Exclusive Lock waits on the DB: Go to DB01 and find out exclusive lock waits
Response Time:
It is the sum of all the above mentioned times i.e. Wait Time+ Roll Time+ Roll Out
Time + Processing Time + Load and generation Time + Enqueue Time+ (RFC +CPIC
) Time+ DB time
Time profile gives you the time consumption based on each component.
In order to populate information into the screen ST03 we need to run standard
background jobs.
1. RFC trace
2. Buffer Trace
3. Authorization Trace
4. SQL Trace
5. Enqueue Trace
6. Kernel Trace
286
These need to be explicitly switched based on the requirement.
Switch off the trace as soon as the tracing is finished else it will populate the log
files.
1. No of application servers
ST14:
287
DATABASE
Normalization:
1. Oracle
2. SQL Server-Microsoft
3. DB2 – IBM
5. Informix- IBM
KDB, a Kernel debugger, a type of tool used for debugging the kernel for Linux and
Unix
A kernel debugger is a debugger present in some kernels to ease debugging and kernel
development by the kernel developers.
No kernel debugger was included in the mainline Linux kernel tree prior to version 2.6.26-rc1
because Linus Torvalds didn't want a kernel debugger in the kernel
KGDB and KDB are two kernel debuggers for the Linux kernel. KGDB requires an additional
machine for debugging, whereas KDB allows the kernel to be debugged on the same machine
while the kernel is running. The debugger included in Linux is KGDB.
288
Windows 30-40% KDB
Linux- No KDB
When the ORACLE DB is installed it is installed by default with the following Users:
When R/3 system is installed the following users will be created in the DB.
2. Ops$<host name>\SAPSERVICE<SID>
Query:
Roles:
1. SYSDBA:
2. SYSOPER: He is an operator to start the DB and stop the DB Back up, Restore
except creating DB
289
Connect sys/my_secret_password as sysoper
Who am I?
Who am I?
USER is “SYS”
Now, I, being Rene, want to connect as sysdba and then as sysoper. In order to do so, I need to have
the sysdba and sysoper privileges:
Who am I?
Altough I have connected myself as Rene, giving my (not sys') password, I am sys:
USER is “SYS”
As sysoper:
Who am I?
USER is “PUBLIC”
The SYSDBA and SYSOPER system privileges allow access to a database instance even when
the database is not open. Control of these privileges is therefore completely outside of the
database itself. This enables an administrator who is granted one of these privileges to connect to
the database instance to start the database.
290
You can also think of the SYSDBA and SYSOPER privileges as types of connections that enable
you to perform certain database operations for which privileges cannot be granted in any other
way. For example, if you have the SYSDBA privilege, then you can connect to the database
using AS SYSDBA.
The SYS user is automatically granted the SYSDBA privilege upon installation. When you log
in as user SYS, you must connect to the database as SYSDBA. Connecting as a SYSDBA user
invokes the SYSDBA privilege. Oracle Enterprise Manager Database Control does not permit
you to log in as user SYS without connecting as SYSDBA.
When you connect with SYSDBA or SYSOPER privileges, you connect with a default schema,
not with the schema that is generally associated with your user name. For SYSDBA this schema
is SYS; for SYSOPER the schema is PUBLIC.
Two very special and important system privileges are SYSDBA and SYSOPER. Following table describes the
SYSDBA
Alter database with the OPEN, MOUNT, BACKUP, CHANGE CHARACTER SET, ARCHIVELOG and
RECOVER options
Create SP file
SYSOPER
Alter database with the OPEN, MOUNT, BACKUP, ARCHIVELOG and RECOVER options
Create SP file
Example:
ON emp_test
TO hr_emps;
GRANT hr_emps
291
In this example we have first created the role hr_emps and next we assign certain privileges to it and finally
we have assigned it to all the employees of hr (Human Resources department). After a month, new business
rule comes up which says that all the hr employees should only be having SELECT privilege on emp_test
table. To implement this rule all you have to do is to revoke the privilege from the role e.g.
REVOKE UPDATE
ON emp_test
FROM hr_emps;
Database Startup:
1. Startdb
2. Stopdb
Listner.ora: This file is used to configure the database and the port number. This
can be configured by using the SQL net configuration. It reads from file
“TNSnames.ora” to resolve the database.
Listner Status:
Listener> status
292
This gives the information about listener port blocked and why it is not
starting.
1. No mount phase: During this phase initialization files are evaluated. SGA is
created. The database is not appended and it is not operational. It is used to
build the control files and restore the control files. DB is not mounted.
2. Mount: The DB is mounted. SGA is created but the data files are not opened.
It is used to restore the data files. DB is operational only for few users like
SYSDBA
3. OPEN MODE: The DB is open. The users can logon to the system.
3. Shut down abort: The system will shut down without any notification to the
users. All the open transactions could not be completed or rolled back.
Therefore the system inconsistent. A small process SMON will perform instant
recovery during the restart.
293
It is a mechanism which allows the O/S users to connect to the DB without any
password provided that the following parameters are set in init<sid>.ora
1. remote_os_authen= true
2. os_authent_prefix= OPS$
Init<SID>.sap:
The initialization profile init<DBSID>.sap contains parameters that influence how the SAP tools
perform various functions. It is usually stored in directory <ORACLE_HOME>/dbs (UNIX) or
<ORACLE_HOME>\database (Windows).
This specifies the things like back up type, back up device tape size, tape copy
command and mostly related to BRTOOLS for backup and recovery.
Before you use one of the SAP tools, find out exactly which parameters you have to
configure. Pay particular attention to parameters without default values and
parameters that have device-specific information or require special platform-
specific commands.
Init<SID>.dba: This is used to look up when users withy DBA privileges is logged
on to utilize
1. brtools
2. SAPDBA
Modifications to this file are performed by the system, whenever the privileges are
modified.
Both the Oracle and SAP parameter files are usually found in $ORACLE_HOME/dbs.
294
3. Service user connects to the DB without password and gets the password for
Schema Owner which is residing in the table SAPUSER
5. OPS$ user gets the password from the SAP table and disconnects from the DB
6. Work process reconnects with SCHEMA ID and password. The work processes
is connected to the DB.
Note: To check the connectivity between work processes and DB use the command
R3trans-d. Trans.log is created current directory. Go to AL11 go to Work directory
then check dev_w0, dev_w1……
8. Changing the password at DB level will not work for SAP<SID> because it is
stored in two tables. Use SAPDBA tool or brconnect to change the password
of SCHEMA ID (AL11, ST11)
User requests a report from the database. R/3 work process cannot work on the
database. Instead it will assign the task to shadow process of DB.
4. It will check the DB and defines the shared pool size, nearest plan to SQL
execution to fetch the data.
5. Based on the execution plan shadow process requests the content form the
DB
6. The content is fetched into DB buffers from storage and responded back to
the R/3 buffers.
7. If the same request comes again it will fetch from the DB buffers.
Update Request:
1. When a user requests to update a transaction work process hands over the
request to shadow process
295
2. Shadow process checks or table definitions and goes to the DB to update the
DB buffers and DB records
4. While getting the content it will try to get the lock so that the records will not
be modified by others
5. In order to roll back during instance crash, the content is written to undo
segments
7. User shadow process updated the records in log buffers. Once it is committed
it will move to DB buffers and the content is marked as Dirty Buffers.
8. In order to save the transaction it will be updated to log files log writer
process (LGWR).
9. After check point interval DB writer reads the contents from th DB buffers
and updated the DB and sends a request to process monitor (PMON) to
release the locks and undo segments. Data will be released after
undo_retention_time (parameter in init<SID>.ora)
10.If the instance is crashed abnormally system monitor (SMON) will read the
content from the log files (DISK) and updates the DB. This is called as roll
forward mechanism.
11.If the content is not updated in the log files (transaction not committed)
PMON performs roll back mechanism and releases the locks.
SAP Directories:
SAP Trace: It is used to write the traces by the system “alert<SID).log is the file
which is populated continuously logged or documenting important activities like log
files which changes in the parameters etc…
SAP Check: This will be populated when the following commands are issued
1. Sapdba-check
2. Brconnect fcheck
296
2. Critical files and their size
SAPARCH:
ORAARCH:
It is used to store the archive files written by ARCH process. The archive logs are
coming from origlogA and origlogB to ORAARCH. It should be large enough to avoid
archive struck problem
Origlog A & B:
These are the log directories which are populated by log writer from log buffer. This
files are read by t perform “role forward mechanism” by SMON in case of an
instance crash
These are the physical storage locations of the DB. Data files are located in the
directories.
Control Files:
These files are required to restore the DB. These fies are written and updated by the
system continuously.
Information like database changes made to data file, storage locations, log
sequence number, system change number.
losing the control files will not allow to restore the system file. So it is recommended
to store the control files in six different physical locations
To find the six physical location go to init<SID>.ora and add the control file
location.
DB buffers are used to store the content accessed by the server process (Shadow
process) or background server process.
297
DB buffers help to reduce the fetches from the database.
Log Buffers:
It is used to log the changes made to the database content. It only documents the
log block which needs to be modified along with the content. Log buffers help to
write the changes using fast track mechanism and transactions commit will be
configured only after writing to “online redo log files “.( Original logs)
It is the process used to write from log buffers to “Online redo log files” (origlog
files). Log worter triggers under the following circumstances
It writes the contents (dirty buffers) from DB buffers to DB. It is triggered during the
following circumstances.
2. Process scans for space I the DB buffers. If it could not find them it triggers to
write the dirty buffers to database
Log Switch:
There are two online log files (origlog A and origlog B). These log files are
continuously updatd by log writer process from log buffers. If orig logA is full it will
be closed for writing and logB will be opened for writing. This mechanism is called
log switch. During the log switch log file number is incremented (LSM- Log sequence
number).
298
ARCH process:
The process of writing online redo log files into “ORAARCH” directory is called as
“ARCH process”. This is done by ARCH process.
The database administration will set this parameter to YES in all the productive
systems. This mode can be set to NO or FALSE in quality and development systems.
SMON:
In case of instance crash it is used to restore the DB from log files(role forward
mechanism) and rolls back is committed.
It is used to rollback the user transactions and the locks held by the users.
Data1….datan files:
ORACLE database is stored in the hard disk in terms of blocks. Each block can
consists of either 4KB or 8KB. SAP uses 8KB.
Extents:
The continuous blocks are allotted in terms of extents. Extends a group of blocks.
Extends are assigned in terms of init extents, minimum extents, nest extents and
max extents.
The extents allocation is stored in tables based on their category of tables TGORA
(Tables)& IGORA (Indexes)
Segments:
Group of tables or indexes (It can be a single table or index or a group of tables)
Table Space:
It is logically defined to store the tables and indexes. Each table space is pointed to
N number of physical data files. But data files can be pointed to only one table
space.
299
When table space is created using the statement create tale space we need to
specify the size of the data file. If the table space is full the data files are full and
the data cannot be inserted or updated.
Note: If the table space is full we get an error ora_1653 and or_1654 table space
overflow. In this situation we need to alter the table space by using commands
Note: SAP never recommends to use the above commands in turn it recommends to
use SAPDBA/BRTOOLS where knowledge on SQL commands is not required.
Extents Allocation:
For each of the tables extents are allocated based on their category referring to
tables TGORA & IGORA.
When a table is defined it is assigned wit initial extents. When the assigned extents
are reached it will throw an error. “max extends reached” with an error ora1631
(Related to the tables) & ora 1632 (Related to Indexes).
Note: All the above errors will be resulted in ABAP dump and logged in SM21 and
ST22.
Table Spaces:
DMTS: The space cannot be utilized because it cannot be reorganized. But in LMTS
unused space can be automatically reorganized. There is no need to adopt next
extents (SAPdba_next).
In 4.6c we have around 27 table spaces which start by default with PSAP and ends
with either data or index LDP
300
1. PSAPUNDO
2. PSAPTEMP
3. SYSTEM
4. PSAP<SID>
6. PSAPUSR
PSAPUNDO TABLESPACE:
PSAPTEMP TABLESPACE:
It is used to sort the data. It should be large enough to sort the data.
BACK UP:
In order to restore the database in case of failures (Media Disasters) media failure
means logical errors, disk crash, power crash etc…..
In order to restore the DB we require a valid back up. The areas which need to be
backed up are
2. Data Files
3. Log Files
4. Control Files
2. Online Back Up
3. Incremental Backup
4. Partial Back Up
301
1. Offline Back Up: The backup will be taken off line, users are disconnected and
the R/3 system is shut down. The backup is consistent to restore the
database.
Note: We do not take regular off line backup (Take during off peak hours).
Mostly the companies which are not supporting on line back up.
Off line backup can be performed using SAPDBA tool or O/S backup,
BRTOOLS, Native database backup and 3rd party tools like VERITAS,
BRIGHTSTORE, ARCSERVE, IBMTEVOLI>
2. Online Backup:
3. Partial Backup:
If the database sizes are very huge we can perform backup individually based
on tables, table spaces etc…
General back up life cycle is 30 days. But SAP recommends 7*4=28 backup.
Tapes Management:
2. Check the consistency of the tapes at least once in the backup life cycle.
302
3. Allow the tapes to fill only up to 90%
4. Check the tape compression ratio at least once in the backup life cycle.
6. Monitor the DB growth from time to time and plan the capacity of tapes.
Optimizer:
It defines the execution plan to fetch the data from the DB.
SAP uses cost based optimizer which is set by parameter cost based optimizer to
true. It is set in init<SID>.ora.
These are character based interface tools where users can work on DB without
being a DBA.
Functions of SAPDBA:
4. Reorganization
5. Users ad Security
8. Switching logs
303
When you click on SAPDBA or execute from command prompt a black window is
displayed. Before displaying it checks init<SID>.dba whether the user has
necessary privileges to run SAPDBA tool. If the user doesn’t have privileges it will
not be displayed.
Select the option c for going to table space administration. It displays all the table
spaces along with their allocated space and percentage of space utilized.
When the errors ORA1651 & ORA16534 occurs we do this based on the companies
threshold values. If its exceeds use DB13 to give SAPDBA –check
Now select the critical table space and add data file to check the disk space before
adding the data files. You are supporting versions earlier than 4.7EE you need to
decide the drive and directory where data files belonging data/indexes are added.
Select the option D reorganization select the table pace and data file and resize
the data
Select option M “Users & Security” and navigate to change the password of
schema owner.
Note: Do not try to change the password of schema owner using command alter
user id identified by password
BRTOOLS:
304
1. BRCONNECT
2. BRBACKUP
3. BRRESTORE
4. BRRECOVER
5. BRARCHIVE
BRBACKUP:
Go to DB13 (DBA calendar) select the data right click openselect the option
to backup the database
We can also schedule at command line using SM69 & SM49 or a batch script can be
used to schedule the back up.
BRARCHIVE:
It is used to backup archive log files from ORAARCH directory. BRARCHIVE uses to
tape or disk, BRARCHIVE uses various technologies to safeguard the archive log
files.
1. CDS: (Copy Delete Save) BRARCHIVE process copies to the tapes twice and
deletes the log files from the ORAARCH directory. If the BRARCHIVE is not
When the archive struck occurs archive process cannot archive on line redo log
files. Log switch fails and log buffers also gets filled because log writer could not
write to redo log files then the user encounters hour glass problem.
Note: Do not delete or move the ORAARCH contents manually to any other physical
location.
305
Note: Backup type (off line, on line) back up type2, type 2 copy command. Tape
size… are configured in init<SID>.sap
BRRESTORE:
BRRECOVERY:
Daily: I have a valid back up of last night which was taken at 3:30 PM
2. BRRECOVERY: restore the system up to 8:30 PM and recover the system until
time 2:30 PM (or) specify log file (1:30) to restore from log files.
3. BRCONNECT options:
The following are the options available with the BRCONNECT tool.
1. BRCONNECT –f next
3. BRCONNECT –f state
Also close the same function schedule this activity using DB13 at least
once in a day.
306
i. SAPDBA –psap%
This job identifies the tables whose statistics are outdated and in the
next stop it will update all the tables.
SAP Reorganization:
The data is populated into the DB. As the data grows the query times also degrade.
Moreover there are some extents (Which is unused). There will be around 20 to 30%
of space which is unused on database to effectively use the unused space. Perform
reorganization from time to time.
Note: SAP reorg directory should have enough space to hold the data.
DB01: It is used to find out logs. As the regular monitoring activity we need
to monitor DB locks.
1. Statistics
2. Display the current sizes of the table spaces along with used space.
3. It also displays the free space statistics like (Used, Unused space…..)
307
4. It will display space critical objects
Go to DB02 find the missing indexes select the missing indexes click
on creating DB(or) go to SE14
DB12: It is used to find the backup logs. It displays over view of the back up
and backup os successful or not. It also displays archive directory space.
DB17: The check conditions can be customized. The same can be done using
BRCONNECT –f check
DB20: It is used to edit the statistics. The statistics will be updated only for
transparent table.
It is the program (portal) which is used to send the change request into multiple
systems and multiple clients. ETC is used to point to target groups rather than
systems.
Buffer Management:
Buffers are stored in terms of directories in the memory. When the system is started
the buffer areas are allocated based on the profile (Instance Profile).
Buffers are built up in respective areas when the users access the content from the
DB.
Buffers are managed in to space and the directories and space. If any one of them
is full swaps occurs.
308
The performance of the system could not be gauzed initially because the buffers are
not built.
Do not measure the performance soon after starting the system. Wait for at least 20
to 25000 transactions take place.
Buffers Hit Ratio: It should be always greater than 94%. That is out of hundred
requests 94 are fetched from buffers.
SWAPS: Whenever the objects are changed or buffers space is fully utilized or if
directories are not enough swaps occurs. Swaps don’t mean a performance issue
but try to avoid more no of swaps by configuring enough space and directories.
2. Space is full
Table Buffering:
Some of the tables are allowed for buffering but buffering is switched off.
The tables which are frequently accessed but rarely changed are allowed for
buffering.
Full buffering: The tables which are frequently used but rarely changed
309
The buffering is based on primary key
The elements eligible for buffering are programs, menus, screens, common user
attributes, calendars, measurements tables, time settings.
Memory Management:
Virtual Memory: It is the sum of the physical memory and space allocated on the
disc
Roll Memory: The amount of memory required by the work process to roll in and roll
out the user context.
Local Memory: The memory assigned to work process to handle the user request. It
is defined by parameter ztta\rool_area
Memory allocation to Work Processes: When the user request is assigned to W.P it
will utilize an amount of memory which is specified in the parameter
zttz\roll_first=20 KB (It is a part of roll area).
If the memory is not sufficient it will use external memory up to an extent which is
defined in ztta\roll_extension=
If this memory is also not enough it will use the remaining part of the roll memory. If
this os also not sufficient it will use heap memory (Private memory). If the W.P
reaches heap memory it is restricted and time out paremeter will not be applicable
to it.
310
The work process will be released only after completions of the task or heap limit is
exhausted. Specified by parameter abap\heap_limit, abap\heap_area_dia,
abap\heap_area_nondia
If more no of W.P goes into private mode W.P congestion occurs. In order to resolve
this use “dpmon” to identify the expensive process and then kill the process.
ST02: It s used to find the amount of roll memory extended memory, roll memory,
heap memory
WP0
WP1
WP2
WP3
WP4
WP5
RFI (Request for Information) can be prepared by 3rd party agencies like KPMG/IBM
Customer Partner/SAP/Oracle
1. RFI Response
2. Chases S/W
311
312
NETWEAVER
Up to version 4.6 D R/3 ITS was used to provide web functions to the end users. It
consists of two components.
2. The request is received by web gate which is on the web server and redirect the
request to application gate way.
3. Agate in turn sends the request to application server which will be handled by
DIAG protocol
5. Agate interprets the request into .CSS (cascading style sheet) and hands over the
response to user
Agate and Wgate can be installed together on single host. It is called as singe host
installation
Agate and Wgate can be installed on to different hosts which is also referred as
Dual Host Installation.
313
Note: In order to overcome the above and to provide internet functionality to SA R/3
system ICM was introduced from SAP R/3 version 4.7
ICM become an internal part of SAP and it is monitored using transactions SMICM.
While installing SAP WEB AS J2EE engine is required
But as planned it could not provide the internet functionality up to version 6.30 (ITS
is required)
From 6.40 onwards integrated ITS has become an internal part of R/3. Where R/3
systems can be accessed without ITS. It is used to handle Dynpro based
applications
The SAP WEB AS version is used to provide Web functionality and formed as a BASIS
platform for Sap NETWEAVER
SAP WEB AS 6.40 supports both ABAP stack and JAVA Stack.
JAVA Stack:
In order to provide user friendly environment SAP has adapted JAVA as the internet
language.
314
Open DB Support O/S Independent
Application Platform
BIW
SMS
PS
WORK P
315
Parameters:
1. ITSP/enable=1 (RZ10)
2. Ms/http_port=8080 (or)8081
JAVA:
1. Unicode language
4. Integrations
5. Multi lingual
When java is programmed it ends with .java extension. This program will be
compiled to a .class extension. The compiled program is platform
independent. In order to interpret the compiled program we require JVM (Java
Virtual Machine).
316
Note: Java is used to develop and deploy internet based applications while
connecting to SAP and Non SAP systems.
Installation Options:
WEB Dispatcher
ICM
JAVA ABAP
Dispatcher Dispatcher
Work Processes Work Processes
MSG MSG
DB DB
ENQ ENQ
ICO
WEB Dispatcher:
4. ICM receives the user request and segregates whether it need to be send to
ABAP dispatchr or JAVA dispatcher
317
6. The request is received by JAVA dispatcher
7. JAVA dispatcher assigns the request to server processes. Server process has
threads to handle the user requests
8. This is the only process where user request will be connected to complete
transactions
10.The cookie information will be deleted when the user session is terminated
11.While updating a record it talks to enqueue process and obtains the locks
2. When it is plugged with ABAP engine ABAP start up frame work initiates JAVA
startup provided that start\J2EE=1 (Located in ABAP engine)
Note: Java is always is add-on to ABAP but ABAP can’t be add-on for JAVA
engine
2. Jcontrol process is also started and connects to the DB to get the instance
properties, updated to O/S leve;
3. Jcontrol: Boot strap process will read the O/S profiles and starts all the
services. JControl also starts Jlaunch process and assigns memory to them
Startup Problems:
1. Could not find the JVM. We need to set the path (Enviromental variable)
318
2. Memory is not enough t start the instance (Increase the memory based on
the availability)
Cluster:
It is the combination of dispatcher and server. It is nothing but instance and always
reports to the instance
J2E admin directory: it is used to provide admin tools where services are configured
This is used to configure the initial settings of JVM> Restart is required. Add server
process,memory settings of JVM. Restart is required.
Add Server process, Memory Settings and LDAP settings. LDAP (Light weight
Directory access Protocol).
TELNET Tool:
Ports 2: Visual Administrator listens on p4 (Port 4). That is the port number ends
with 4
319
JAVA instance port: By default 50,000 is used as port to access JAVA instance over
the internet provided instance number is 00.
2. Install SAP License. Go to Visual Admin Tool It will display the H/W key get
the H/W key go to market place and get the license key license will be in
the form of text file go the conflicttool.bat go to file add server process
select the dispatcher increase the heap size go to umel.data to configure
directory server so that domain users can connect to the system without any
password select the server process and go to services to configure the
services we can increase http cache size in http servers t o 3000-4000
When working on config tool JAVA Web AS is not required of there is any cahgne
mode to config tool it will defect the DB.
User admin is used to configure run time parameters most of the parameters are
effective immediately
1. JRE
2. JAVA Engine
4. Visual Composer
320
5. EP…
Patching Tools:
In order to initiate SDM we require user ID, Password and port number. USER
ID is SDM, password is SDM by default, but will be changed during the
installation.
Only one user can be connected to SDM. While applying patches to SDM, we need
to specify the path either DB file system or J2EE
SDM can also be initialized t apply the patches either online of offline dsployment
Trans\eps\in
The following extensions will be used to apply support packages and patches.
Note: We can revert back the packages. We cannot revert back the SPAM.
321
Go to config Toll directory and click on configtool.bat
Note: If SDM is blocked system hangs or while initializing SDM it says that user 8is
already connected to SDM.
Hoe to Resolve This: GO to MMC ( IN UNIX use $ps –ef|grep SDm to find the process
ID) find the process id and stop it and retart it again go to J2EE process list
SDM Right Click Restart
3. LDAP services
4. Security Services
Define http\cache
Note: Refer the note thoroughly before making any changes the config tool, ensure
that config tool parameter are backed up.
Memory Allocation:
322
-XX: Newsize=171M
The objects which are reusable like JAVA Classes, packages, methods will be
moved into permanent memory so that requests can access them directly.
The data which is not eligible to store or cache will be moved to this area.
Garbage is cleared from time to time. This memory is defined by using the
formula:
If more than one JAVA instance is configured the parameters and their values can
be populated globally using this option.
Global Server Configuration: It is used to set the values for the server process.
3. Security provider service to configure the user data store to create users and
assign roles
323
Log Configuration Service: it is used to configure the logs which determines with
what granularity the logs can be filled only errors, only warnings, only information.
Log Services: This is used to configure the log files, no of active users who is used
for.
JARM: Java Application Response Management: It collects the data for performance.
324
325