Table of Contents

Open all
Close all
Preface
17
1 Fundamentals of SAP System Administration
23
1.1 System Administrator Tasks
23
1.2 Guiding Principles for System Administrators
25
1.3 Definitions
31
1.4 Summary
33
2 SAP System Administration
35
2.1 Starting and Stopping the SAP System
35
2.1.1 Starting the SAP System
36
2.1.2 Stopping the SAP System
40
2.2 Instances and Operation Modes
46
2.3 Maintaining Profile Parameters
61
2.4 Specific Monitoring Transactions
68
2.4.1 System Log
69
2.4.2 ABAP Dump Analysis
71
2.4.3 Checking Application Servers and Work Processes
76
2.4.4 Lock Entries
78
2.4.5 Canceled Update Requests
81
2.5 System Messages
85
2.6 Connections
88
2.6.1 RFC Destinations
88
2.6.2 SAP Gateway Monitor
97
2.6.3 SAPconnect
98
2.6.4 Message Server Monitor
103
2.6.5 Internet Communication Framework
105
2.6.6 ICM Monitor
108
2.7 Client Administration
111
2.7.1 Creating Clients
111
2.7.2 Copying Clients
115
2.7.3 Deleting Clients
128
2.7.4 Checking the Client Copy Log
130
2.8 System Copy
132
2.8.1 A Database Copy of the Production System
133
2.8.2 Client Copy with Data
134
2.8.3 Client Copy without Data
134
2.9 Summary
135
3 System Monitoring
137
3.1 CCMS Alert Monitor
137
3.2 System Monitoring with the Standard CCMS Alert Monitor
139
3.3 Adapting the CCMS Monitor Sets
148
3.3.1 Hiding Monitor Sets
149
3.3.2 Defining a New Monitor Set
154
3.3.3 Adding a Monitor to a Monitor Set
156
3.3.4 Deleting a Monitor from a Monitor Set
159
3.3.5 Changing Alert Thresholds
162
3.4 Auto-Reaction Methods
165
3.4.1 Changing an Auto-Reaction Method
165
3.4.2 Assigning an Auto-Reaction Method to a Monitor Object
170
3.5 Summary
176
4 System Administration Using SAP Solution Manager
177
4.1 Functional Spectrum of SAP Solution Manager
178
4.2 Maintaining the System Landscape
180
4.2.1 Transferring System Data to SAP Solution Manager
180
4.2.2 Creating a Product System
185
4.2.3 Creating a Logical Component
189
4.2.4 Solutions
193
4.2.5 Configuring Managed Systems
197
4.3 System Administration
206
4.3.1 Technical Monitoring and Alerting
206
4.3.2 End-to-End Analysis
223
4.3.3 Configuration Validation
230
4.3.4 SAP EarlyWatch Alert
236
4.3.5 System Recommendations
243
4.3.6 Managing Service Connections
245
4.3.7 License Administration
249
4.4 Maintenance Optimizer
251
4.5 Summary
262
5 Scheduled Tasks
263
5.1 Critical Tasks
264
5.1.1 Check Whether the SAP System Is Running
264
5.1.2 Checks to Determine Whether Your Backups Have Been Successful
264
5.2 Daily Tasks
267
5.2.1 Critical Tasks
268
5.2.2 SAP System
268
5.2.3 Databases
271
5.2.4 Operating System
271
5.2.5 Other
271
5.3 Weekly Tasks
272
5.3.1 SAP System
272
5.3.2 Databases
272
5.3.3 Operating System
273
5.3.4 Other
273
5.3.5 Overview of Transactions
274
5.4 Monthly Tasks
274
5.4.1 SAP System, Database, Operating System, Other
274
5.4.2 Checking Consumable Items
276
5.5 Quarterly Tasks
277
5.5.1 SAP System
277
5.5.2 Databases
278
5.5.3 Operating System
278
5.5.4 Other
279
5.6 Yearly Tasks
279
5.6.1 SAP System
279
5.6.2 Databases
281
5.6.3 Operating System
281
5.6.4 Other
281
5.6.5 Overview of Transactions
282
5.7 Summary
283
6 Backup and Restore
285
6.1 Backup
285
6.1.1 What Has to Be Saved?
286
6.1.2 Backup Types
290
6.1.3 Backup Strategy
295
6.1.4 Strategy Recommendations
297
6.2 Restore
299
6.3 Performance
301
6.3.1 Performance Factors
301
6.3.2 Backup Performance
302
6.3.3 Restore Performance
304
6.4 Summary
305
7 Disaster Recovery
307
7.1 Preliminary Considerations
307
7.2 Planning for an Emergency
309
7.2.1 Which Measures Apply to Disaster Recovery?
309
7.2.2 When Should the Disaster Recovery Procedure Begin?
310
7.2.3 Expected Downtime
311
7.2.4 Restore Time
311
7.2.5 Communication in the Event of a Disaster
312
7.3 Recovery Team and Role Distribution
313
7.4 Types of Disaster Recovery
314
7.5 Emergency Scenarios
315
7.5.1 Damaged Database
316
7.5.2 Hardware Failure
316
7.5.3 Complete Loss or Destruction of the Server Facility
317
7.6 Recovery Script
318
7.7 Crash Kit
321
7.8 Testing the Disaster Recovery Procedure
324
7.9 Minimizing the Risk of Failure
326
7.9.1 Minimizing the Risk of Human Error
326
7.9.2 Minimizing Single Points of Failure
326
7.10 Continuing Business During a System Recovery
327
7.11 Summary
328
8 Database Administration
329
8.1 Planning Database Administration Tasks
330
8.1.1 Planning Database Tasks
330
8.1.2 Changing and Deleting Database Tasks
335
8.1.3 Checking the DBA Planning Calendar
338
8.2 Checking Database Actions
340
8.3 Performing a Database Analysis
346
8.4 Monitoring Database Performance
351
8.5 Database Administration—DB2
356
8.5.1 DB2 Command Line Processor
357
8.5.2 Establishing a Connection to the DB2 Database
358
8.5.3 Starting and Stopping the Database
360
8.5.4 Executing SQL Statements
362
8.5.5 Updating and Checking the Database Manager Configuration
362
8.5.6 Updating and Checking the Database Configuration
365
8.5.7 Automatic Storage Management
366
8.5.8 Backing Up the Database
367
8.5.9 Restoring the Database
370
8.5.10 DBA Cockpit for DB2 for LUW
373
8.6 Database Administration—Oracle
376
8.6.1 SQL*Plus
376
8.6.2 Starting and Stopping the Database
379
8.6.3 Executing SQL Statements and SQL Scripts
386
8.6.4 Managing the Database Using SQL*Plus
387
8.6.5 Managing the Database Using the BR*Tools
388
8.6.6 Backing Up the Database
402
8.6.7 Restoring the Database
406
8.6.8 Checking the Database
409
8.7 Database Administration—Microsoft SQL Server
413
8.7.1 SQL Server Management Studio
414
8.7.2 Starting and Stopping the Database
417
8.7.3 Files and Logs
419
8.7.4 Initiating a Backup Process
424
8.7.5 Setting Up Maintenance Plans for a Backup
428
8.7.6 Backing Up System Databases
433
8.7.7 SQL Server Logs
436
8.8 Database Administration—SAP MaxDB
437
8.8.1 Database Studio
437
8.8.2 Starting and Stopping the Database
438
8.8.3 Database Monitoring
440
8.8.4 Backing Up the Database
444
8.9 Database Administration—SAP HANA
448
8.9.1 Technical Background
449
8.9.2 SAP HANA Studio
450
8.9.3 Starting and Stopping the Database
459
8.9.4 Database Monitoring
463
8.9.5 Configuring the Database Backup
467
8.9.6 Backing Up the Database
469
8.9.7 Restoring the Database
471
8.10 Summary
475
9 Operating System Administration
477
9.1 Checking the Memory Usage of the File System
477
9.1.1 Monitoring the File System Using the CCMS Alert Monitor
478
9.1.2 Changing Alert Thresholds
481
9.1.3 Releasing Memory at the Operating System Level
482
9.2 Retrieving Operating System Information
486
9.3 Summary
491
10 Security Administration
493
10.1 What Is Security?
493
10.1.1 Protecting Data against Damage or Loss
494
10.1.2 Adhering to Legal or Quasi-Legal Provisions
494
10.2 Security Levels
495
10.2.1 Access Security
495
10.2.2 Operational Security
497
10.2.3 Data Security
498
10.3 Safeguarding the SAP System
499
10.3.1 Preventing Multiple User Logons
500
10.3.2 Passwords
501
10.3.3 Limiting Access for SAP* or DDIC Users
504
10.3.4 Locking Critical Transactions
505
10.3.5 Preventing Changes in the Production System
508
10.3.6 Operational Security
513
10.4 Audits
514
10.4.1 Auditing Aspects
515
10.4.2 Auditing Tasks for SAP Administrators
516
10.5 Auditing Tools
517
10.5.1 Audit Information System
517
10.5.2 Security Audit Log
519
10.6 Summary
535
11 Performance
537
11.1 Short-Term Remedy of Performance Problems
537
11.2 Detailed Analysis of Performance Problems
542
11.2.1 System Load Analysis
543
11.2.2 Buffer Analysis
548
11.2.3 Memory Defragmentation
550
11.3 Analysis at Other Levels
551
11.3.1 Analysis at the Database Level
551
11.3.2 Analysis at the Operating System Level
551
11.3.3 Analysis at the Hardware Level
552
11.4 Summary
552
12 SAP GUI
553
12.1 Installation Requirements
553
12.1.1 Minimum Requirements for the User’s PC
553
12.1.2 Network Functions
554
12.2 Installation Scenarios
554
12.2.1 Installing SAP GUI from an Installation Medium
555
12.2.2 Installing SAP GUI from an Installation Server
558
12.3 Adding Systems to SAP Logon
574
12.4 Summary
578
13 User Administration
579
13.1 General
579
13.2 Setting Up New Users
582
13.2.1 Copying Existing Users
582
13.2.2 Creating a New User
591
13.3 Maintaining Users
591
13.4 Mass Changes
592
13.5 Resetting the Password
594
13.6 Locking or Unlocking a User
596
13.7 Central User Administration
597
13.7.1 Setting Up a Central User Administration
598
13.7.2 Creating and Maintaining Users via a Central User Administration
616
13.7.3 Troubleshooting
620
13.7.4 Deactivating or Deleting a Central User Administration
623
13.8 User Groups
632
13.9 Deleting User Sessions
635
13.9.1 Displaying Active Users
635
13.9.2 Deleting User Sessions
637
13.10 System Administration
638
13.10.1 Special User IDs
638
13.10.2 Special Authorizations
639
13.10.3 User Passwords
640
13.11 Summary
641
14 Authorization Management
643
14.1 Authorization Check Process
643
14.2 Authorization Roles
644
14.2.1 Creating and Maintaining Single Roles
645
14.2.2 Creating and Maintaining Composite Roles
656
14.3 Authorization Profiles
662
14.4 Utilities for Authorization Management
667
14.4.1 Default Values and Check Indicators
667
14.4.2 Authorization Trace
672
14.4.3 Infosystem Authorizations
677
14.5 Summary
679
15 Background Processing
681
15.1 Creating Background Jobs
681
15.1.1 General
682
15.1.2 Creating and Scheduling Background Jobs
684
15.2 Monitoring Background Jobs
691
15.3 Graphical Job Scheduling Monitor
694
15.4 Performance Factors for Background Jobs
695
15.5 Summary
697
16 Output Management
699
16.1 Setting Up the Spool Servers
699
16.2 Setting Up Printers
703
16.2.1 Configuring Network Printers
703
16.2.2 Setting Up Frontend Printers
709
16.2.3 Transporting Output Devices
712
16.3 Outputting Data
714
16.4 Output Control
716
16.5 Deleting Old Spool Requests
724
16.6 Checking the Spool Consistency
724
16.7 Checking the TemSe Consistency
726
16.8 Summary
728
17 Change and Transport Management
729
17.1 General Notes on Change Management
730
17.2 Transporting Objects
732
17.2.1 Creating a Transport Request
733
17.2.2 Recording Changes in a Transport Request
736
17.2.3 Releasing a Transport Request
738
17.2.4 Importing Transport Requests
742
17.2.5 Checking the Transport Log
748
17.2.6 Checking the History
750
17.3 Direct Table Maintenance
752
17.4 Summary
758
18 System Maintenance
759
18.1 Downloading SAP Support Packages
760
18.1.1 Determining the System’s Current Support Package Level
761
18.1.2 Finding Support Packages
766
18.1.3 Downloading Support Packages
781
18.2 Important Notes on Preparing and Executing System Maintenance
783
18.3 Performing a Kernel Update
784
18.3.1 Kernel Backup
785
18.3.2 Unpacking a New Kernel
786
18.3.3 Stopping the SAP System
787
18.3.4 Replacing Kernel Files
788
18.3.5 Starting the SAP System and Checking the Logs
789
18.4 Applying the SPAM/SAINT Update
790
18.5 Importing ABAP Support Packages
794
18.5.1 Making the Support Packages Available
794
18.5.2 Importing the Support Packages
799
18.5.3 Performing a Modification Adjustment
810
18.5.4 Regenerating Objects
811
18.5.5 Performing Regression Tests
814
18.6 Installing Add-Ons
814
18.7 Summary
821
19 Diagnostics and Troubleshooting
823
19.1 Basic Procedure
823
19.2 Troubleshooting with the SAP Support Portal
826
19.2.1 Searching for SAP Notes with the SAP Support Portal
827
19.2.2 Customer Incident Messages
831
19.3 Creating a Remote Service Connection
850
19.4 Implementing SAP Notes
859
19.5 Summary
866
Appendices
867
A Useful Transactions
869
B Security-Relevant Transactions
875
C Useful Tables
881
D Forms
885
E Bibliography
891
F The Author
893
Index
895