SAP Basis Database Management - SAP Admin

Direkt zum Seiteninhalt
Database Management
Concept, planning and execution transports
The entry screen gives a brief overview of the status of the last queued. In case of incomplete support packages, the last (aborted) step of the SPAM will be displayed. System: Check the correct function of the transport tools using Tool Transport Tool. Make sure there is enough space (the size of the OCS files multiplied by 2) in the transport directory (see the R/3 profile parameter DIR_TRANS with the AL11 transaction or the SE38 transaction and the report RSPARAM). Make sure that there is enough space, especially in the subdirectories trans/EPS/in and trans/data. Use the latest SPAM update. Verify that the SPAM update offered in the SAPNet - R/3 frontend or the SAPNet - Web Frontend is newer than the one available in your system. You can see the version of the SPAM update available in your system in the title bar of the SPAM image. We recommend that you always run the latest SPAM update first [page 14] to avoid problems when playing. The insertion of a SPAM update is analogous to the insertion of support packages. There must be no incomplete support packages in your system. To do this, under Folder in the SPAM, select Aborted Support. Packages and select View. Support packages should not be displayed. The status light should be green. If not, view the detailed status and log information for all support packages in the system. Select Jump Status or Jump Log. Load Activities Support Package [page 15] Define Queue [page 17] Insert Queue [page 20] If necessary: Sync Modifications [Page 22] Verify Protocols [Page 23] Confirm Queue [Page 24].

The SAP basis is often perceived as a brake within projects or when introducing new technologies. This is partly due to the late consultation of the SAP basis on the issues of technical feasibility as well as the integration of new technologies and applications into the existing system landscape. By implementing the recommendations, the SAP basis is repositioning itself in parts within the IT organisation. The SAP basis has a clearly defined self-understanding (inward-looking perception) as well as a clear positioning and a defined task area within the IT organisation (outward-facing perception), as shown in Figure 5. By integrating the SAP basis into the development of the IT strategy, the digitisation strategy and a clear communication with the CIO, the SAP basis has the opportunity to deal with technologies and topics at an early stage. As a result, the SAP basis is prepared for requests from business units or other IT departments and has the opportunity to approach them proactively. The SAP basis is supported by an IT service and IT product catalogue, which describes the scope of the SAP basis. For internal communication and communication with external service providers, as well as other suppliers, outsourcing partners or outsourcing partners and cloud service providers, there are up-to-date and meaningful documentation and process descriptions. For the control, measurement and monitoring of external partners, Service Level Agreements and meaningful key figures are also available.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.
Copies Transport
The value for abap/heap_area_total can also be set dynamically in the lower pane. Once you click on the "Apply" button, the values are changed until the next reboot of your system. In addition, the report also provides ways to analyse the global extended global memory hidden behind the two buttons "EG Overview" and "EG Dump".

SAP HANA has been one of the major topics in the SAP environment for the last few years. Many customers are currently faced with the question of whether or not to migrate your SAP system. In addition to the actual changeover itself, there are many other topics on which you should have already informed yourself in advance, as these influence the success of SAP HANA in your company. What do you already know about SAP HANA? I would like to encourage you to think about security in the following article. If you would like to learn about the architecture of HANA, I recommend a contribution from our colleagues at erlebe Software. SAP HANA Scenario But why are we even talking about HANA Security? Why is it so important to consider new security strategies with the new technology? With HANA it is possible to analyse data quickly. BW scenarios primarily benefit from the in-memory database (IMDB) used, as speed advantages in data access are particularly positive. Compared to a classic ERP / R3 scenario, the normal DB is replaced by HANA. The desired speed advantages result. However, migration is expected to be required for the changeover. This is caused by customer-specific developments in the system. HANA is not a further development of SAP ERP, HANA is the next stage of an ERP system. It is well known that an ERP system contains the capital of the companies. Therefore a new HANA system like all other ERP systems is also interesting for attackers. On the one hand, such a system contains the critical business data that are available for espionage. In addition, most business processes are mapped in such a system and offer an attack surface for sabotage. In addition, users do not initially know the new technology well. This also applies to administrators in the area of a new technology. Attackers quickly gain a dangerous leap of knowledge over these user groups. SAP HANA has a lot of new features, although many existing ones are used by SAP ERP, so there is a risk here.

Some missing SAP basic functions in the standard are supplied by the PC application "Shortcut for SAP Systems".

With such a large and mostly living system landscape, it is normal that individual systems are dismantled from time to time.

So much information... how can you keep it so that you can find it again when you need it? Scribble Papers is a "note box" that makes this very easy.


The technical complexity of SAP systems and the ongoing adaptations of business processes often lead to unknown security vulnerabilities.
Zurück zum Seiteninhalt