SAP BASIS
FAQ’s
99633 81588
99597 47328
SAI
VENKATESWARA DIGITAL XEROX
RoE eS EE
Plot No. 31, Ground Floor, Gayathii Nagar, Behind HUDA Malyrivanam,
3
‘Shiva Apartments, Ameerpet, Hyderabad - 500038,agg
aeSAP BASIS
1. What is SAP R/3? R/3 stands for?
‘Ans: System Application and Products. R stands for real-time environment version 3,
2. What is T_Code?
‘Ans: If we want to perform any operations that can be performed with T_Code.
T_Code stands for a collection of dialog steps.
3. What is the Instance?
Ans: It is group of R/3 services which are staited and stopped together.
4, What is the central Instance?
‘Ans: Where the message server and! dispatcher staying together that instance will be
called as central instance.
5. What is the Dialog instance?
Ans: If all work processes are dialog then It is called as a dialog instance.
6. Architecture of SAP Instance, What Message Server and Dispatcher
does?
An
7. What are the Message Server and Dispatcher?
Message Server can communicate all the dispatchers that are existing in a
An
system. Dispatcher is used for receives the information from the Presentation server
and dispatches to workprocesses.
8. What is the T_Code for checking the R/3 installation?
SICK or SM28.
the T_Code to activate the objects afte
\stallation?
‘Ans: SGEN,
10.Can I script the starting and stopping of R/3?
‘Ans: Definitely. You can use the SAPSTART, SAPSRVKILL and SAPNTWAITFORHALT
executables,
14.Where can I get a list of all transaction codes in SAP?
Ans: The following tables hold all SAP transactions:
Table TSTC stores all transaction codes and their respective ABAP program.
Table TSTCT stores the text (or description) for each transaction
Table THSTC has also documentation for all transaction. It is @ copy of TSTCT.
Table TSTCP stores the possible parameters for each transaction.
12.Where can I get a list of all tables in SAP?
Ans: Table DDO2L stores all tables in SAP.13.What happens if I start a dialog instance but the database and SAP
services are down on the central instance?
‘Ans: The SAP
_xx and SAPOSCOL services will start. However, the work
processes will end soon after being started
14.What happens if I start a dialog instance but only the database services
are up on the central instance?
Ans: The SAP services will start and so will the work processes. However, because
the message server is down on the central Instance users will get the message "No
logon possible (no hardware ID received by message server) when trying to log on.
‘No user logins will work. The "Process List” in the SAP MMC will stay in yellow.
15. If using Single Sign-On, do the passwords in SAP and Windows have to
match?
Ans: No. Only the user IDs must match for single-on to work.
16.Can SAP be installed on FAT or FAT32 partitions?
Ans: No. SAP needs to bé installed on NTFS pactitions only.
17. What Is SAP MMC good for?
‘Ans: The SAP MMC has multiple uses. Among them: starting/stopping instances and
viewing/analyzing the developer traces (dev_disp, dev_ms, dev_w*).
18.After a new installation of R/3 Enterprise, the system has a temporary
Ticense. How long does this license last?
‘Ans: This temporary license lasts up to four weeks. After that, nobody can log into
the system except SAP. Therefore, users must request 2 permanent license at the
early stages of an installation.
19.How does an SAP instance read logs?
‘Ans: For every lock entry the pointer to the lock is maintained in a separate table.
All the instances look into this table to detect lock entries.
20:How do you use DPMON?
An!
24.What is the transaction to access the language utility?
‘Ans: Transaction SMLT takes you to the Language Transport Utility.
22.How can I see all the available icons in SAP?
‘Ans: Execute transaction BIBS and select Elements -> Icon Overview.
You can use the code that appears on the last column in order to put icons in system
messages (SM02).USER ADMINISTRATION
1) How to create user account?
Ans: Using T_Code SUO1 we create the user accounts.
2) What are the various steps for crating the User?
Ans: Address Data, Logon Data, Defeults, Parameters, Profiles, Activity groups,
Users.
3) What are the Different types of users?
Ans:
External users: SAPSID, SAPServiceSID, SAPR3, and Administrator.
Internal Users:
log: This is the normal user to execute the interactive task,
+ BDC user: Access priviligers to execute the Batch input Jobs. (Service)
+ Background Job User: Access priviligers to execute the Background Jobs.
(Reference)
+ CPIC user: Access priviligers to communicate the Gateway services and execute
"the external programs and external commands. (System)
+ Special Users: SAP*, ODIC, Early Watch.
4) How to create the Mass Users?
‘Ans: Using T_Code SU10 we create the mass users.
5) How to create the User groups?
‘Ans: Using T_Code SUGR we create the User groups.
6) What you do using Su01?
Ans: Using SUO1 We will create the Users, Chang the user data, locking and un
locking user, Copying user from existing users and setting the password changes.
7) What are the reasons why users cannot login?
‘Ans. A Archival stuck 8. Page files is full. C. Heap Memory
8) What is CUA?
Ans: Central User Administration (CUA) was introduced in R/3 4.6 to provide a
‘mechanism that allows central user management. Once configured, all user accounts
are managed from a central client.
9) What is Logon Load Balancing and how to create the Logon Groups?
‘Ans: For distributing the load among the application servers and also for increasing
the performance of the system. Using T_Code SMLG we create the Logon GroupCLIENT ADMINISTRATION
1) What is the client?
Ans: Client is a logical unit of a system which is self contained technically,
commercially and organizationally. (Or) A client is an independent business unit in
with in an R/3.
2) What is Client Independent and Client Dependent?
Data Such as ABAP Programs, Repository objects and
Ans: Client Independent:
ete...
Client Dependent: Data includes customizing application and user data.
A client with out application data needs approximately 150 - 200 MB space in the
Database.
3) What r the default clients in R/3?
Ans: 000 ~SAP*, DDIC -- 06071992, 19920706. Used for administrative purpose. It
is used as reference client for creating new client.
001 -- SAP*, DDIC -- 06071992, 19924706. It is the replica of 000.
066 -- SAP*, EarlyWatch -- PASS, SUPPORT. R/3 support people will be used and it
is for SAP remote Sevices.
800 ~ For IDES System.
4) Tlost the password for SAP*. What can I do?
‘Ans: You can delete the record for SAP* in table USRO2 as follows:
‘SAP#* and MANDT="XXx"
delete USRO2 where BNAME=
Replace "XXX’ for a valid client number.
5) What are different client roles?
‘Ans: Role defines express the purpose of the Client.
Production, Testing, Customizing, Demonustration, Traning.
6) What are the Authorizations need to perform Client copies?
Ans: S_TABU_CLI ~ Table Maintain in all clients.
‘S_TABU_DIS -- Maintain of contents of Table.
‘S_USER_PRO ~ For the User Profiles.
‘S_USER_GRP ~ For the User master Records.
7) How to create the New Client? In which table all clients will be stored?
Ans: Using T_Code SCC4 we create a new client. The table enytries are made in
To00.
+ Enter T_Code SCC4 — Click on Change Icon ~ Click on New Entri-y, Logical system,
+ In the Screen Enter the Client Number, Name, City, Curre
Client Rote.
+ Changes and Transports For C.D Objects ~ Automatic Recording
+ Client Independent Object Changes ~ Changes to Repository and C.1 Customizing
allowed.
+ Protection client copies and comparison tool ~ Level0: No restriction.
+ Click on Save Button
8) What are different types of Client copies?
Ans: Local Client Copy: Copy the data into the new client from the client With in
the same system. Using T_Code SCCL we perform Local client copy
Remote Client Copy: Copy the data into the new client from the client for the
remote system. Using T_Code SCC9 we perform remote client copy
RFC connection must be established between the target system an
9) What is the T_code to test REC Connection?
Source System.
‘Ans: SM59. (Remote Function Call)
10) Where we fia the Client copy Logs?
Ans: Using T_Code SCC3 We find client copy Logs.
11) What is the Transaction code to delete the Client?
Ans: SCCS.
12) How to perform Local Client Copy?
‘Ans: Log on Newly created client with SAP* and PASS.
Enter The T_Code SCCL - Enter Target Client No, Name, Select the Profile,
Click on Execute in Background,
13) How to perform Remote Client Copy?
‘Ans: Log on Newly created client with SAP* and PASS.
Test the RFC connection using RFC system check button on the toll bar:
‘The R/3 System Release versions also checked.
Enter The T Code SCC9 ~ Enter Target Client No, Name, Select the Profile.
Click on Execute in Background,
14) Diff. bet. Client Transport and Remote Cli
Ans:
15) What is Client Transport (or) Export?
‘Ans: Data to be filled into new client from another system by the way of transport
Request. Using T_Code SCC8 we perform Client Transport.
16) What is the T_Code to perform client Import?‘Ans: SCC7
17) What are the different Profites available for client copies?
‘Ans: SAP_ALL, SAP_USER, Sap_Appl, SAP_Cust.
18) If we delete the one client from the system where we find details who delete
the client, when it will be deleted?
Ans: We find the needed information in client Copy logs. Using T_Code SCC3 we get
these details,
19) How we know how much space is reqs nt copy? How can I
red for
determine the size of a client?
Ans: After entering the needed information click the check box for test run and
execute it. It displays the no. of files to be copled and amount of space is required.
You can run a local client copy in “test” mode.
20) Can I copy ail users from client to ancther?
‘Ans: Yes. Use copy profile SAP_USER:
21) How can I hide a client from the users?
‘Ans: There is no way to actually hide a dlient but there is a workaround: detete the
entry in table T000 via SCC4. This way, nobody will able to fog on to it. To “unhide”
it, simply re-create the entry via SCC4.
22) How can I lock a client?
‘Ans: You can use one of these two: 1) delete the entry in table TO00 via SCC4; 2)
run tp locksys at the OS level.
23) Can I import transports between different R/3 releases?
‘Ans: Read the technical and logical problems SAP reports when doing transports
between different R/3 releases. SAP Notes 126776 and 330267.
24) Can I copy just data from client to another?
‘Ans: No. There is no copy profile that allows you to copy just data.
For this you need to configure and use ALE or buy a thifd-party program that has
this type of furictionality.
25) What is the use of SAP Router?
‘Ans: It is s/w program to connect the SAPNet Directly. SAPRouter.exe
SAPRoitter ~r to start the Router.
SAPRouter ~5 to stop the Router.
26) What is SAPRouttab?Ans: It is a file which we will give IP addresses. Default port is 3299. SAP reads the
parameter file from top to bottom. So SAProuttab Permit (p) always followed by
DENY (D).
PROFILES
1) What are defautt profiles in SAP R/3?
Ans: We have three profiles in R/3. They are Startup, Default, and instance.
Startup Profite: it Is a parameter file which is read by startsap program. The
services which the start profile can initiate the message server, the gateway, Dialog,
Depending on release
Engueue, system log collector and log sender programs
version the name is assigned, Start_instance name (or) Start_instanceName_Host.
Which contain parameter values used by all application servers
Default Prot
from same SAP System. The name is DEFAULT.PFL. Only one profile for the System.
Which contain parameter values which directly effect the
We have more than one
Instance Profile:
configuration and resources for the application server.
Instance profiles for the system. For each Application server we have one Instance
Profile.
SID_InstanceName (or) SID_InstanceName_Host. SID_DVEBMGSO0_DEV.
2) Where we find the all the parameters in the System?
‘Ans: Execute the report RSPARAM. (Or) Enter T_Code TUO2 ~ select the application
server ~ It displays list of available Paramaters.
3) How to Maintain the Profile Paramaters?
‘Ans: Using T_Code RZi1.
4) How to define Parameter and edit the Parameter values? How do you
display the profite parameters?
Ans: Using T_Code RZ10. We will define parameter or edit the parameters.
5) Why should we not change profile parameters from OS Level?
Ans: Because RZ10 supports versioning (Multiple instances of the profile), hence we
can recover to an earlier profile if something is wrong with the current. This Is not
possible through OS level.
6) How to delete the old ABAP Dumps?
‘Ans: RSSNAPDL using this abap program we delete the old Dumps,
7) What is the parameter used to change the dialog work process runtime?
Ans: rdisp/max_wprun_time (Default time is 600ms)
8) Where u find work processes list?‘Ans: SM50 ~ Work processes overview or SM66 ~ System wide work processes
9) If an SAP instance does not start after making changes to the instance
profile via RZ10, what is the best course of action?
Ans: In an emergency, the best thing to do is to manually edit and correct the
problem in the instance profile (located under usr/sap/sys/profile). After successfully
restarting the instance run RZ1O and correct the probiem there. Save and activate
the profile. IF possible restart the instance right away and make sure everything
works. Otherwise, plan on keeping a close eye on the instance the next time it
restarts.
Restoring the database from a full backup will erase all the work done since the
backup ended to the moment the problem occurred. Copying the instance profile
from another system Is a bad idea. The profiles are unique and contain hard coded
values. Logging a trouble ticket is not necessary unless you cannot absolutely bring
the system back up.
OPERATION MODES
1) Whats the use Operation Modes?
Ans: For distributing the work processes we use op.modes. To increase or decrease
the work processes for an instance. At the time of switching op.modes the running
WP may not be distributed till their job finishes.
2) How to create the Op.Mode?
‘Ans: Using the T_Code RZ04. Then using the T_Code SM63 we assign the Op.Mode
to time table.
3) How to delete the Op.Mode?
‘Ans: First deléte in the time table and save empty time table. Then delete the
Op.Mode using R204.
4) What is Exceptional Op.Modes?
Ans: We need to extend the maintains +day, -day, Date. We will dTRANSPORTATION
1) What is the tool you are using for performing the Transports?
Ans: STMS
2) What is the Domain Controller?
‘Ans: The system in which we logon TMS that system acts as Domain Controller.
3) What is the Domain?
Ans: Domain contains more than one transport groups and having only one Domain
controller.
4) What is the Transport group?
Ans: The system which have got the Trans directory from a transport group. In 2
Transport group we have 3 systems like Integration, Consolidation and Recipient
Systems,
5) What is the Transport Layer?
‘Ans: Transport Layer defines transport path from the
Consolidation system. Transport Layer is used for grouping all the Development
Integration system to
objects that will always use same Transport Route with in the same development
Project.
6) What is the Transport Route?
Ans: Transport Route is used for defining the different transport routes that exists
between two systems with in the same transport group.
7) What are different Types of Routes?
Ans: Consolidation Route: This is the route exists in between Integration System
and Consolidation System,
This is the route exists in between Consolidation System and
Delivery Rou
Recipient System.
8) What is the Development Class? How to create the Development Class?
Who create the Development Class?
‘Ans: Development Class is used for grouping the all the development objects in
module or project. Using T_Code SE80 we create the Development Class. The ABAP
team lead will create the Development Class.
9) In which table development classes are stored?
Ans: TDEVC.
10) What is the Change Request? Who creates the Change Request? How to
create the Change Request?In the system contains objects to be transported and
‘Ans: Change Request is 3 lis
information on the purpose of the Transport, Transport Type, Request Category, and
‘Target System. Team Lead will create the Change Request and assign to the team
members. Using the T_Code SE09/SE10 we create the Change Requests.
11) What are the Different types of Change Request?
Ans: Workbench Requests: Changes to SAP standard objects are ‘put in the
Workbench Requests. ABAPer’s do modifications at object level which are applicable
for all clients.
Customizing Requests: Changes to company specific objects are put into
Customizing Requests.
12) What is the prerequisite to change the SAP standard object?
‘Ans: We need to have the developer key to make changes to SAP standard objects.
13) What is the Naming convention for Change Request?
Ans: K9<00001>. SID Is System Name and K9 is Correction Request.
14) -What-are tools you are using to perform Transports at 0.S Level?
Ans: Tp—Transport Control Program: Is used for to control transport requests at
0.5 level.
R3trans: Is‘used for to-control the Transport Data at the o.s level.
15) What are Commands for Import, Adding the request to Queue, Import
All Requests at 0.s level using TP?» >
Ans: To Import Single Request --- Tp Import SIDK900012 PRD (SID Name).
To add request to Buffer --- Tp addtobuffer SIDK900012 PRD.
To Import all the Requests --- TP Import all PRD.
16) What is the standard way of moving the transport to production?
Ans:
17) Where the TPPARAM located?
‘Ans: Usr/SAP/Trans/Bin/TPPARAM
18) What is the TPPARAM ?
‘Ans: It is Transport Parameter File that contains all the important parameters that
directly affected the way TP program works for performing Exports/Imports. It
contains the Location of TP, R3TRANS, DB Host ,DB Name, SAPEvtpath, ALLLOG,
topSap, Start DB, StopDB.
SYSLOG, IMP_BY_EVENT=True, StartSap,
19) How to know the all the Parameters for TP?
‘Ans: TP Showparam .20) What are the sub directories in Trans?
‘Ans: BIN: Contains TPPARAM file.
Data: Contains the transport data files.
Log: All the individual and general transport logs and trace files located.
Buffer: Contains Buffer files, includes control information on the transports that will
be imported to other systems and order of them.
Cofiles: It is the control file directory, containing information about the steps of
transportable change request as well as return codes.
Sapnames: Information on SAP user performing Imports.
‘Tmp: Contains Control Flags and semsphores.
ActLog: Includes action log files for all task and Change Requests. Import, Export.
21) What is the Transport Log?
Ans: Transport Log keeps the record of jog files generated by the transport steps.
4 = Transport has at least one Warning
12 ~ Transport failed to due to fatal error
0 ~ Transport Succesfully
8 ~ Transport has Some Errors
22) What are the steps to configure the STMS?
‘Ans: Configure the “TRANS” directory and TPPARAM file.
+ Initialize CTO. Using SE06 we initialize the CTO(Change and Transport System).
+ Configure the Transport System and Routes.(STMS)
+ Create a Development Class. (SE80)
+ Create or Modify Object.
+ Release and Export the Object.(SE09/SE10)
+ Import Into the Target System.(STMS)
* Check the Log Files.
23) What are the tools available in R/3 for Transports?
‘Ans: S€01 ~ Transport Organizer. SE09 - Workbench Organizer.
SE10 — Customizing Organizer. STMS = Transport Management System.
TP, R3Trans ~ These Tools are used at 0.5 Level.
24) One hour back Transport done perfectly with out errors. Now when we
are trying to perform transports we getting error what happens?
‘Ans: At least one Background Job Should be free.
25) How to initialize the Workbench Organizer?
‘Ans: Enter T_Code SE06 ~ Configuration ~ Overview -~ Glick on system list ~ Enter
ID's involved in the Transports ~ Save (or) F3 ~ Back.
+ Click on Delivers ~ Make SID entries here ~ Save (or) F3 ~ Back.+ Click on consolidation Route ~ Enter the source system SID and Integration
‘System SID ~ Save ~ Back,
* Click on Transport Layer - New entries - Fill information for the Layer name,
Integration System, consolidation system and Description ~ Save ~ Back
* Click on Bevelopment Class ~ New entries ~ enter development class and assign
transport layer that we created ~ Save ~ Back.
TSYST ~ All the systems in the land scape.
TASYS ~ All the Deliveries systems in the LS.
TWSYS ~ All the Consolidation Systems in the LS.
DEVL ~ All the Transport layers.
BACKGROUND JOBS
1) What is the Background job?
‘Ans: A job Is group of steps. A step can be ABAP program, external cornmand or
external program. rdisp/btc time ~ 60seconds.
SAPMSSY6 - An ABAP program run continuous for every 1 min.(Scheduled report).
ferent types of Job classes?
2) What are the
Ans: Class A, Class B, Class C.
3) What are the different options in the startcondition of the Jobs?
‘Ans: Immediate, Date&Time; After Job, After Event, At the Op.Mode.
4) What r the different types of job status?
Ans: Scheduled, Released, Ready, Active, Finished, Cancelled.
5) How-to define the Background Job?
‘Ans: Using T_Code SM36.
6) Where you find. Job overview or where u find finishes jobs or cancelled
jobs? |
‘Ans: Using T_Code SM37. Enter the user name and client number then execute it. It
will display all the Jobs that can be finished and cancetled.
7) What is the ABAP report to delete the Background jobs?
Ans: RSBTCDEL.
8) All the background jobs are in released state and there is a delay time
and the background work processes are in wait status. What could be the
reason why the jobs are not in ready or active state and the solution?
Ans:
9) How to reserve a background work process for a particular job to run
without any delay?Ans:
SPOOL ADMINISTRATION
1) How to configure the printers and Output Devices?
‘Ans: Using the SPAD we configure the printers.
2) What are different types of Access Methods?
Ans:
+ C Direct 0.5 Cail
+L: Printing for using LP/LPR protocol.
+ F Front end printing,
‘+ S- Printing for using LPD host via sap protocol.
+ U- Printing for using LPD host via Berkely protocol.
+ & External printing.
+X SAPComm.
3) What are the different types of printing? What are the 3 types of Remote
Printing?
Ans: Local Printing: The Spool workprocess is running on the same server as a
host 0.s spool.
Remote Printing: The Servers are connected on different servers througtr network.
Front end Printing: The printers are configured with windows pc's through print
manager.
4) What is the Spool Request and how we access it?
‘Ans: Spool Request contains the actual data for printing. Using T_Code-SPO1 we
access it.
5) What is the Output Request and how we access it?
Ans: Output request contains Informatién about the Output device name, no.of
copies to be printed and using information. Using T..Code SP02 we access tt
6) How you delete the old spool requests?
‘Ans: RSPO0041 this report checks the old spool request and deletes it.
7) What is the Themse database how we access it?
Ans: It is the temporary sequentional database. Contains all the information related
to job logs, print job logs. Using SP12 we access the Themse Database.
8) How you find the inconsistencies the THEMSE database?
‘Ans: RSPO1043 this report finds the inconsistence in the theme database and
deletes it, It compares the TSTO1 and TSTO3 tables and displays the Inconsistencies.9) To prevent having to adjust output devices (e.g. print queue definitions)
in every system each time they are transported from one system to another,
an administrator can:
‘Ans: A logical spool server mapped to the real spool server can solve this problem
by adjusting output devices after importing them.
For example, logical spoo! server “logical épooler* can be set up in the customizing,
quality assurance and production systems; printers get assigned to this spool server
and they get transported. Because “logical spooler" exists on the target systems,
there is no need to change anything after the transport is imported.
410) When a log Is created for the Spool request where exactly it
placed?
An:
SUPPORT PACKAGES
**Vsith out Configuring the STMS we can’t apply the Support Packages.
1) What are the Support Packs?
Ans: From time to time SAP does modifications to the various objects of it’s R/3 S/w
and make the modification available to customers in form of the Support packs.
2) In Which-Form Support Packs Available? From where The Support packs are
downloaded?
Ans: Support packs are available in the form of .CAR, We need to Unpacked.
‘Support Packs are available in the form of .SAR from 4.7 onwards.
the required support packs from SAPServerVX (or)
We have downioad
www. service.sap.com/sp-stacks
3) What is the Command for Unpacking the CAR files?
‘Ans: Go to kernal Directory and type CAR -XVF kb46b007.
4) What is the Naming Convention For Support Packs?
Ans: KB46C005.
5) From Which Client do you apply Support Package? Why are packages
applied in 000 client?
Ans: With client 000 and DDIC user we apply the support packs.
6) What is the T_Code for applying the Support Packs? What does transaction SPAM
do?
‘Ans: SPAM (Support Packs Manager). Transaction SPAM not only lists the support
packages that have been imported into the system, but it also defines queues ofsupport packages that can be imported. It's also the transaction that carries out the
import.
7) What is the T_Code for to Access the SAPServerVX? How do I log on to
SAPNet?
‘Ans: Use transaction OSS1 to log on to SAPNet R/3 FrontEnd. To log on to SAPNet
8/3 Web visit: http://service.sap.com.
8) What is the latest SPAM Version? And what is the current Patch nembers for
Basis, ABA, HR, and BIN?
fans: The latest SPAM version for 4.7 is 6.20/0019 (May Be Basis ~ 55, ABA ~ 55)
9) What is the procedure for Applying Support Packs?
Ans: Download the Required .car files from SAPNet
+ Put them in a temporary directory in /usr/sap/trans/tmp.
+ Use the command CAR -XVF path the car file including .Car Extension
* The command CAR decompress the CAR files and put two files ( .ATT, .PTT in the
J‘usr/sap/trans/eps/in/ ).
+ Log on to the system client 000 as user DDIC.
+ Execute the T_Code SPAM.
Goto ~ Support Packages ~ Load Package ~ from Application Server.
We get the Pop-up menu with the list of Patches in the Queue. The applied
Patches and new ones will be listed.
* Press F3 (or) Back icon to get main screen.
+ Click on display/Define. 7
+ We will get the pop-up menu with unapplied patch.
+ Select the patch or group of patch that u want to apply and hit enter icon.
+ The patch Number will be defined in the Queue box.
+ Goto - Support Packages - Import Queue.
+ After the patch is successfully applied, we will have to confirm the: Patch
application.
+ Goto - Support package ~ Confirm.
+ The status box should turn to green.
+ After The Patches applied, Execute the T_Code SPAU.
10) When we are applying Support Packs from Front End and Application
Server?
‘Ans: If the Support Pack size is less than 10mb we applied from Front End.
Otherwise we can apply from application server. 200MB,11) What is the use of T_Codes SPAU and SPDD?
Ans: SPAU T_Code will check for changes made by the patches in the repository as
well as by the user via OSS Notes to the system.
SPDD will checks for changes made by the Patches in Data Dictionary Objects in the
System.
12) What are problem we get while applying the Support Packages?
Ans: Cannot_Create_Cofile: Delete the concerned file of path from
Usr/sap/trans/cofile and Usr/sap/trans/data directory. After deleting the files restart
the Process.
EPS in is old Format: Check the Spam Version and do a SPAM update. Delete the
concerned files (.ATT and .PTT)
Objects_Locked: An object that it is trying to modify is locked by a Change
Request.
13) How to Update the SPAM?
‘Ans: Download the files from the SAPNet. Enter T_Code SPAM. Support package —
Upload SPAM file.
14) What is the Add-ons and Plug-ins?
‘Ans: Add-ons is the additional functionality to the SAP R/3.
Plug-ins is the additional functionality to the Core/Basis Module. Plug-ins available
In the form of .CAR.
15) What is the T_Code for applying the Plug-ins?
‘Ans: SAINT.
16) How to apply the Plug-ins?
‘Ans: Log on the Client 000.
+ Execute the T_Code SAINT.
+ Upload the Plug-ins by going thru Menu options.
+ One the files are uploaded, we get two boxes on the screen. The top box contains
the list of plug-ins already applied in the system. The bottom box will contain the
list of plug-ins which is being available to be applied.
+ Select Plug-in from the second box and click on the continue button.
+ In the next screen Put the cursor on the Plug-in box and click the continue button,
« After plug-ins installed successfully you will be asked to do SPAU or Continué. Click
on Continue.
* Click Finish,17) Support packages and SAINT. What are they and how do you install
them?
Ans:
18) Where we find the Notes in a system?
Ans: Some of the errors will be rectified with notes. Enter T_Code SNOTE; we get all
the notes available in the system. Double click on the Note it will be executed.
SECURITY ADMINISTRATION
1) What is the Kernel Directory?
‘Ans: Ust/SAP/SID/Sys/Exe/Run/. RUN directory is the Kernel directory.
2) How to Upgrade the Kernel
‘Ans: Download the corresponding the files from SAP service marketplace. These files
are in the form of CAR
++ First of all stop services, then take the backup of existing kernel and uncar the
downloaded files and start the Services. SAPService_SID, SAPoscoll
+ Hf the SAProuter.exe, SAProuttab files exists in kernel, if we upgrade the kernel
then these files will be corrupt. So, router will not start. To avoid this problemi we
will keep the copy of SAProuter.exe, SAProuttab files in “Trans” directory.
+ SAPoscoll, SAP Router.exe,
3) How do you resolve /usr/sap file system issues?
Ans?
4) What is a Role (or) Activity group?
Ans: Role is collection R/3 transactions, Authorizations and other related objects.
5) What are different types of Activity groups?
‘Ans: Composite Activity Group: Composite activity group is made up of collection
of activity groups. Instead of assigning each role to user we made composite activity
group and assigned.to user.
Derived Activity Group: When creating Derived activity group we use an existing
activity group as a reference. In Derived Activity Group we are not assign
transaction, we inherit transaction from the Existing Activity groups. We will Chane
the Activities.
6) Tell me some authorization objects and its purpose?
‘Ans: S_DEVELOP, S_PROGRAM, S_TRANSPORT, S_TOCDE, BC_A, S_AAAB.
your organization? «
7) Write one role on the pair u r create:
‘Ans: Z_FI_APACCOUNTAG, Z_FI_AP_DATA_ENTER_CLERK.
£8) What the naming convention u follow for roles in our organization? How many characters u r using forreating roe, dow accept_and numeric vlues?
‘Ans: The first letter must be start with Z, we are accepting _ & Numeric value with minimum 11
characters.
9) What is the Authorization Object?
‘Ans: Authorization Object is collection of authorizations. Each Authorization object
has activities and fields and having max 10 Authorization fields.
10) What is Authorization?
‘Ans: Authorization gives the permission to access the transaction.
411) What is the Profile?
Ans: Profile 's a collection of Authorizations. If profile having more than 150
transaction its automatically generates the new profile.
12) ‘In role how many profiles we have?
Ans: 100 profiles for one Activity group (or) Role
13) How to create the Role?
Ans: Using T_Code PFCG we create the role.
14)’ What are the major steps while creating role?
‘Ans: Description, Menu, Authorizations, Users.
15) How to trouble shoot the missing authorizations?
‘Ans: Using the T_Code SUS3 we find the missing Authorizations.
16) What js the system trace what is the T_Code for trace?
Ans? If we are unable to find the missing authorizations using SUS3. Using STOL we
find the missing authorizations. We logon the particular Application server where
user exists and enter the STO1, Check the Authorization field and click on the
“traceon” button. It displays the missing authorizations and activity.
17) What is the User Information System?
Ans: Using SUIM we access the User information like users, authorizations,
transaction, profiles, foles, Change documents.
18) What is the Audit Information System?
‘Ans: Using SECR we access the Audit information system.
19) How can I fock a transaction? Why should I lock a transaction?
‘Ans: Use transaction SMO1. Look for the transaction you want and then check the
“Locked” box. Because some transactions are “dangerous” and a user without the
proper training may accidentally corrupt or destroy the system.
20) How can I see what users are currently fogged on an R/3 system?
Ans: Use either transaction SM04 or ALOB.21) Whats the fastest way to log off in SAPGUI?
Ans: Type /NEX at the command field. Notice that this transaction exists without
asking for confirmation. Save your work before using it.
22) How do J find information about transaction codes?
Ans: Run transaction SE93 to create, edit or display transactions.
23) How can I quickly check if the passwords for the accounts SAP*, DDIC,
at does report
SAPCPIC and EarlyWatch are not the default ones?
RSUSROO3 do?
‘Ans: Run SE38 and execute report RSUSROO3. Report RSUSROO3 fists all logon
system settings and It reports if passwords for accounts SAP*, DDIC, SAPCPIC and
EARLYWATCH are trivial. That is, the system will report the passwords for those
accounts that have not been changed from the delivered ones. This is a handy report
~ SAP auditors frequently ask for it immediately when doing an SAP audit.
24) To prevent the use of common password combinations, a system can be set up
to include:
Ans: To avoid this problem, populate Table USR40 with forbidden or illegal
passwords combinations. Also, as of Web AS 6.10, instance profile parameter
to force users enter at least
“login/min_password_digits* can be set to a value >
one digit in their password.
25) Which of the following are possible ways to display the R/3 Kernel
patch of a system? .
Ans: Within SAP run SMS1, dlick Release Notes, and then read the line that, cays
"Kernel Patch number." At the OS level, change it to the:
Ust/sap/sys/exe/run directory and run disp+work ~version or disp+work -V
‘Also, look for the "kernel patch number” line.
26) What is the purpose of T_Codes su24?
‘Ans: Tt displays what are the authorization objects we maintain for
particular T-Code.
27) How do you lock mass users?
Ans: EWZ5
28) Tell me some important parameters related to security?
Ans: rdisp/gui_auto_logout ~- Automatically logout.
Login/min_password_ten -~ Minimum Password Length:
Login/password_expiration_time ~ Password Expired Time.
Lock.
Login/fails_to_user_lock - User ALogin/fails_to_user_unlock ~ User Unlock.
Login/no_automatic_user_sapstar
29) Dangerous Combination of transaction codes?
Ans: RZ02, RZ03, SU01, SUO2
30) Important Audit Information Reports?
Ans:
+ RSUSROOS - Default passwords of SAP* and DDIC.
+ RSUSROOS - List users with critical Authorizations.
+ RSUSROOG - List the users who are locked due to Incorrect login.
+ RSUSROO7 - List the users with incorrect data.
+ RSUSROOB ~ List the users with critical combination of Authorizations and
T_Codes.
+ RSUSRICO ~ List the change documents for users and show changes made to
user security.
RSUSRIOI ~ List the change dacumants for profiles and shows changes made
to security profiles.
RSUSR102 ~ List the change document for authorizations and shows changes
made to security authorizations.
DATABASE
4) What Is the sequence of memory allocation when a user logs on to SAP
like Roll, Extended and Heap?
Ans: Roll memory is allotted to user (Which stores the user specific information,
such as parameters are stored), Once user finishes with a certain transaction, his
info’ is rolled -out to roli file & when he needs to use something else again, the data
is rolled back in, This Improves efficiency.
Once user starts using a transaction, all the processing date fetched from DB is
processed In Extended Memory (Which Is shared across riutiple users), but when
Ext. Mem gets full, heap memory starts to get used. But the problem with heap
memory is It can’t be shared & too much usage of Heap wil lead to Dialog process
stopping with error “PRIV mode”
2) What is SGA?
Anis: System Global Area. Database uses a memory region known as SGA. This
rogion is shared by all background processes.
3) What is a control file?‘Ans: Control file contains the schema of the Database. To initialize the Data files
and online redo Jog files.
4) What is check point?
‘Ans: Check point is the one of the oracle background processes, send the signal to
DBWR(Database writer) at check point. It updates the headers of control file and
data files.
5) What is a core file?
Ans:
6) Which background process writes data to Database?
Ans: DBWR (Database Writer) Process writing the data blocks from Data buffer to
the Data files.
7) Which Background process writes off line redologs?
‘Ans: LGWR (Log Writer) process writing redolog entries to the from redolog buffers
to the online redolog file on disk.
8) What is BRRESTORE?
‘Ans: BRRESTORE is the toll for restore the Database. Restore is the process of the
transferring all the data files needed for a recovery from backup media to the server
disks. Recovery is the process of setting the database to 2 consistent state using
files that were previously restored.
9) How do I backup a database?
‘Ans: You can create a maintenance plan or use the “backup database" SQL
statement in Query Analyzer or OSQL.
Within SAP, you can use DB13.
10) ABAP Query does not seem to work, what should I do?
‘Ans: It could be that you need to execute report RSAQUMAO to set the release flag.
See SAP note 92124 for more information,
11) Can Query Analyzer tell me if there is insufficient disk space to restore
a database?
‘Ans: Yes. It will display message (Msg) 3257 indicating that there is not enough disk
space to perform the restore.
12) True or False? In order to read developer traces you have to go the
in the
operating system because SAP does not have a way to do this wi
application.
Ans: False! SAP provides transaction STL for this purpose. ST11 can even sort the
trace files by date and time,13) True or False? MS-SQL Server can be installed using all the delivered
default settings. Everything is controlled within the application, so SAP
requires only a database engine to work.
‘Ans: False! MS-SQL Server needs to be configured with binary sort order and 850
multilingual character set, Therefore, using all defauits during a SQL Server
installation will not work. The SAP installation program will fa.
14) What is T_Code to access the Business Work Place?
Ans: SBWP.
45) How do I logon to a SAPServXx FTP server?
‘Ans: User = ftp; password = fp.
16) How can the logon screen be modified to include informational text,
such as the company name, address, the system role, etc.?
Ans: As of SAP version 4.6, transaction SE61 can be used to create object
ZLOGIN_SCREEN_INFO. Text and icons can be added to messages that can appear
at the logon screen.
R/3 MONITORING
41. What is the checklist for R/3 Monitoring?
B12 ~ Backup logs: Using this T_Code we check the any errors found in the last
successful backup. If we find any errors Intimate to the Database administrator.
‘5M51 ~ SAP Servers: Using SM51 we check all the application server are up or not.
SMS0 / SMG6 ~ WorkProcess Overview: Using SM50 we check the status of the
Work Processes. Whether itis running (or) Waiting (or) lecked by the user.
2, What is the T_Code for active servers and what is the T_Code for
displaying the all the servers in the landscape?
An:
SM21 ~ System Log: Using SM21 we check any error in the R/3. The system Log
will record the every thing in R/3 that is Errors, Warnings, and Successful messages.
3. Why u r looking system log?
Ans: The system tog is the R/3 system log of events, errors, problems and other
system messages. The log is important because unexpected errors or unknown
errors and warnings could initiate serious problems.4, How do I check for errors in R/3?
Ans: Rui transaction SM24 for read the System Log.
SM37 - Background Job Overview: Using SM37 we check the Background Job
Status. Whether it is finished (or) running (or) cancelled. If it is cancelled we analyze
the background job log and reschedule it. R/3 administrator need to know when we
are running some critical Jobs.
$M12 — Lock entries List: Using SM12 we find old lock entries. If we found any
Jock entries we contact the particular user and delete the locks.
5. Where u finds the lock entries and locked tables?
Ans: SM12 ~ We find the Lock entries.
6. Is the database lock same as SAP lock?
‘Ans: Oracle supports locking on a single database which Is not practical for SAP
which involves multiple databases; hence SAP has created its own locking concept
which can trigger lock on multiple tables.
7. What are the different types of locks?
‘Ans: Two types ~ Shared & Exclusive
Shared ~ One user can write & the other user can read the table.
Exclusive ~ Only a particular user can read it, nobody else can access it.
‘M13 ~ Failed Updates: Using SM13 we find the Failed Updates. When the user
trying entering the data In the database it Is not saved properly. If we found any
failed updates intimate to user where the Error occurred. (In which Module, Program
and Transaction).
M04 and ALO8: User Li
ALO8 we see application server wise logged’ users. With this we prevent the
Using SMO4 we see the all the logged users. Using
unauthorized users.
‘SP01 - Spool Problem: Using sp01 we check the Spool Problems.
SM35 ~ BatchInput Initial Screen: Using SM35 we check what jobs are ready for
executing and which jobs will be cancelled by errors. If we find errors Intimate to the
users.
‘$122 ~ ABAP Dump Analysis: Using ST22 we find the ABAP dumps what the
system generates. We are looking abap dumps of Raise Exceptional errors and Timed
out errors. Related to Raise exceptional Errors ABAPers will take care. We are looking
into he Timed out errors. If any job execute more than 600ms, the will be
terminated and records the Snapshot.
8. What is the ABAP dump directory?‘Ans: An ABAP dump is generated when a report or transaction terminate as a result
of error. The system records the error in the system log and writes snapshot of the
Program. We use an ABAP dump to analyze and determine why the error occurred
and take corrective action.
RZ20 - CCMS Alert Monitor
one application server and monitor the all application server that are availabie in the
land Scape. Using RZ20 we set threshold vaiues. If it meets criteria it generates the
Using RZ20 we find alerts. Using CCMS we fogon on
alert.
ST03 ~ Workload analysis: Using STO3 We find work load of the system.
STO2 ~ Buffer Statistics: Using ST02 We look into the buffer statistics.
B02 ~ Database Statistics: Using DBO2 we look the database statistics for table
and Indexes and Tablespace information.
STO4 — Database Performance analysis: Using STO4 we analyze the Database
Performance.
‘ST06 ~ Operating System Alerts: Using STO6 We find the Database alerts,
PERFORMANCE TUNING
1. How do you resolve performance issues?
Ans: Using ST03, St02, ST06, and.STO4 we find the performance related issues find
corrective solutions.
In STO3 ~ Workload Analysi
‘Avg.Roll In Time, Avg.Database request Time for particular Jobs.
In STO2 ~ Tune Summary of Buffers: we will look for Hitratio and Swaps. If the
Swaps and Hitratio's are very high we analyze the detailed analysis. Tt shows details
to the Roll Memory, Extended Memory, and Heap Memory.
In STO6 ~ 0.5 Alerts: we will look for CPU Utilization Time and Idle time, Load
average and Disk with high response. If the CPU time < 20% we are getting
look for Avg-Respone Time, Avg.Wait Time,
2 we
problems to resolve it.
In ST04 ~ DB Performance Analysis: We will look Memory Usage, Buffer Usage,
Disk Usage, 1/0 Statistics.
Response Time: Starts when the user request enters the dispatcher queue end
when the next screen is executed to user.‘Wait Time: This is the time a user request sit in the dispatcher queue. It starts went
the user request is entered in the queue and ends when the request starts being
processed.
Roll-In Time: The amount of time needed to roll user context information into
workprocess.
Load Time: The time needed to load from database and generate objects like ABAP
source code, CUA and Screen information.
Processing Time: Response time minus sur of wait time, DB request time, load
time, Enqueue time.
Database Request Time: Starts when a DB request is put through to the database
Interface ends when the database interface has delivered the result.
2. Where do you check response time in SAP?
‘Ans: Enter T_Code ST03. Here we will see the response time. If the Avg.Response
time is very high we will analyze the Transaction Profile, Task Profile and Time
Profile.
3. What is the Bottleneck?
‘Ans: Anything which can cause to decrease the performance of the system called
Bottleneck, This may be RAM/HDD/Processor/ABAP Program/SQL Statement.
4, What SAP transaction can assist in detecting 1/0 bottlenecks?
Ans: Either STO6 or OSO6 cari monitor disk 1/0. These: transactions are very
convenient, as you do not have to go to the OS level. On the other hand, tools at the
OS level may offer a more detailed analysis (e.g. Performance Monitor in Windows:
R/3 MEMORY MANAGEMENT
User needs two kinds of memory.
1. R/3 Buffers. (Memory accessible for all users) - Programs, Table and field
Definitions, Customizing Tables.
2. User Context. (Memory attached individual users) - Variables, Lists, Internal
tables, Administration Data (Authérizations).
Local Memory: Local memory is associated with individual workprocesses. Local
Memory is Executables, Data, Stack, and Buffer for data transfer, Local roll area,
Local Paging area.
Shared Memory: Share memory is associated with all the processes of one
instance. An R/3 buffer contains global objects for all users and workprocesses such
5 programs and customizing tables.Extended Memory: Contains user context i.e; objects associated with individ.
users such as variables, list and Internal tables.
Heap Memory: Contains User context, when extended memory is full. It is allo
and released on demand.
The Six R/3 Memory areas at
+ Buffers
+ Extended Memory
+ Heap Memory
= Roll Memory
* R/3 Paging Memory
+ Local workprocess Memory.
1) What is Roll area and Paging area?
User context data Is stored. :.e; Authorizations, set/get parameters,
Roll Area:
Internal Tables, Report lists.
which stores application program date that corresponding to specific
Paging Area:
ABAP Commands.
Defines first part of the roll area set to 1. 170kb for 4.6.
2tta/coll_first ~
Ztta/roll_extention ~ User quota for extended memory.
Ztta/roll_area~ Total roll area for workprocess.
Rdisp/roll_shm — The size of the roll buffers.
Rdisp/roll_maxfs — The size of roll buffer and roll file.
Em/initial_size_mb ~ the fixed size of extended memory.
Em/address_space_mb ~Amount of extended memory for workprocesses.
‘Abap/heap_area_total - Total amount of heap memory allocated to all WP.
‘Abap/heap_area_dia ~ Limit for thie amount of local memory allocated to Dialog WP.
‘Abap/heap_area_nondia - Amount of local memory allocated to non dialog WP.
Abap/heaplimits - Maximum heap limit ~ if it is reached the WP is flagged for restart.
Heap memory is released after use,
After ending the transaction the heap memory is automatically released and the
workprocess restarted to release the swap space.
2) In what tables can I find P.O. documents?
Purchase Orders are stored in table EKPO and field EBELN.
You can also find them in these two tables:
EKKO (Purchasing Document Header)
EKET (Scheduling Agreement Schedule Lines)UNIX
1, How do you check file systems in UNIX?
Ans:
2. How do you check process in UNIX?
Ans:
3. What is the command to list of files in UNIX?
Ans: 1S, LS -L
What is the command to view the Contents of File?
Ans: Cat. 5
4. What is the command to copy the file with what permission?
Aris: CP.
5. What is the command to find a string in a file?
Ans: Grep.
6. What is the command to compare the files in unix?
Ans: Diff.
7. What is the command to delete the file, and rename the file, delete
directory, creates the directory?
‘Ans: Rim, my, rmdir, mkdir.
8, What is the command to change the file protection?
Ans: Chmod.
9. What is the command to get help date and time?
‘Ans: Man, date.
10. What is the command to display the free disk spac
‘Ans: DF.
414, What is the command to print file and print queue?
‘Ans: Lor, Ipaq.
12. Ps ~ef|grep DW, what is DW?
Ans:
13. How do you edit file in UNIX?
‘Ans: Open the file in the VI (or) ED.mode and then edit the file.
14, What is NFS mount in UNIX?
‘Ans: Telnet, FTP (File transfer protocol).Interview Questions
1. what are the steps to install SAP?
Install OS and load t+2 VGA and LAN diivers after increase the SWAP Fiemiory
3 times of physical RAM and Assign IP addcess.
Install Kernet patches and java files
Install Dialog and Central Instance (start > programs SAP system setup of
C11 > install central and database instance,
PARAMETER!
Memory _
Number of parallel process
Instance number
SID. T93
Centrat Transport host Ze
Database Name
‘Sap Datat ... up to Data six locations.
w
a
2. What Is the folder it will ask to Install oracte?
Orahomesi path=\oracle
3. How do you allocate disks to different areas in SAP?
Diskt, Olsk2 (Raid 1 mia 4 GB) -> winat, Sapacch
Disk, Disk 4 (Stulpe Min 4 GB)->swap i
Disk $ (Hin 4 GB) Origlag A, Mirror log 8, TRANS bo:
Voreist/edtapsiea}Prigiog B, Mirror Log A, SAPREORG: :
Disk 7 to Disk 19 (Rald 5 min Total $4 GB each 18 GB) :
. Sapdatat, Sapdata2, Sapdata3, up to Sapdatas'
‘ 4. How much Swap memory should be ia the system?
‘Three times of Main Memory at feast 268
4 5. On which system you installed SAP?
QAS (Guality?
6. How many types of work process?
7 types (Dialog, Enque, Update, Background, Spool, Message se.
Gateway) * S ‘ ~ .
2. What is difference between CENTRAL INSTANCE 2nd OLALOG INSTANCE?
Centrat instance have message server installed on it where as
Dialog tastence da tor have message server.
8B. How co see the Work Process status?
smso
OP ‘tor roany types of wiecers you hove coatgured? How do you diferertoce
between them?
4 types of printers
Production Printing, ass printing, Test printing, Desktop Printir
10. Where printer part (LPT) is running of the systen?
Netwerk end Desktop printersFCG, then we generate te profil ater thet
Yes, SPAM
signi Soles to Users \
ile importing patches from OS level to SAP
3. What are the two files present
level?
PAT, ATT
4, De you see Sap Notes before applying patches if so what are the two steps in
‘SAP notes that we have to follow the befere the applying patches?
15.00 which system you have applied patches?
DEV and QA 2
Giave 00 appted 055 Notes?
17. How many types of client copies and which method do you prefer?
3 types of client copies (Local Client, Remote Client, Client Export)
We prefer mainly kemote Client Copy.
18. What is the difference between remote client copy and cltent export?
Remote Copy > using RFC connection we will perform remote copy.
Client Export > Using TMS configuration we will Perform ctlent export and
then we have to Import cllent to capy the cllent ~ STMS has to be created first
for doing Client Export.
‘Plow much time tt will take to copy a dient of size 650 6.8
More than 17 hours
20. Do you have faced any problems while connecting to OSS
Some time is not connected, some time it requires authentication
24. What is your landscape (how many no of applicatlon servers with production,
with specifications (Ram Database, server name) and number of users)
‘Three-system Landscape .
22.No of ws:¥ Braces
ZMOrk . 255 (Giots9, Enque, Background, $3001, Update, Message,
Gatews
23. What is the fob of Application Server
takes the request from the user and if the rege est requires data then i:
connects t0 database seever anc gives output
ws
ANSE is Gfcsonce « Central tasiance and Applicacion Server (Dialog Server)
Centeat instance has 2 enexsaye server and work processes
BERCei0% serve, ae nerver, having wort, processes.
WPS cae the Daily Activac28
29.
30.
u
32,
33.
34
35.
i x 36.
f 38.
39.
40.
4
4a.
Gackground lob Logs, Sp00! Logs, Work Pracesses Overview, Users Over
Ai application Secvers active or at,
what wil you observe in STOG
CPU, S\ZAP, Memory, Hard Disk Space
wnat és S103
workload Analysis
what is difference between ST06 and STO3
ST06 is OS Monitoring
5703 is used for - Honitor OS and Database and SAP System
What will observe in STO2
Hic Ratio and Buffer Fillers and Roll Memory anc Swap Memory
What is Table buffer and single record butter
What will you observe with respect to butlers
Have you configured Operation modes
Yes (R204, SM63, RZ03)
Where wil you change the paromnaters in tree Profiles?
Instance Profile, RZ10
Can yeu change the profile patameter inthe 05 level? Which one is acesabte
We'con change te pote parameter from OS level. ts not eecommersded
Ue you see the sanie parameter valve in all instance profiles what will you 0
What is Development Class? Wihy to create the Development Class?
Group of requests under one logical name is development class. When ever
we change in R3 repcsitory It chould be assigned to development class 20: it
Internally assigned tc transport layer.
I have a created one ABAP program I want te transport. How will you do that?
‘Assign that progzam 10 one transport request and release it.
What Is transport domain and what is Target Transport Group
T have three Servers and two Application Servers to QAS if T want to tansport
to one application server in QAS and.to production system how wilt Jo that
How to. create Transport Groups
Through STH
T have transported one object then how do u know that it has been applied.
And if it is nat transported: what vill you 40? How to check that object. is act
yet transferred?
If the cequest Is not la'the. queue of target system it means it has been.
applied. If it Is there the object is net yet applied
What is aifference between Transport Layer and Development Class?Yes, it is On-Line Sysiom Service
1198 at which situation will be created the Logan
43,Do you know Logon
Groups?
Yes, if we find lass or application server then we go for logon groups (if the
production depactmen: users ace more then we have to create logon group
for that deperdnent)
45. How many no of user nave been connected (> that particular logon group?
100 to 150 users
46. What is the purpose of Siique processor?
Enque work pracess mioxes sure that database in ccasistent state
AT. you have observes nave ouesfiew? What will you do?
Ro
48. What is vour lanascane?
3 System Landseage
49.1f 9 background jot is aborted then what will you do? How to rectify that?
80.What are the staxs ef wack ground job
5 States:
+ Scheduted
+ Ready
+ Released
+ Active 7
Finished (or)
+ Cancelled
51. How many background jobs are running in your production system?
52. What is the difference between spool request and print request?
53. Whot is the job of Spoot Werk Process?
54.1f 2 user complaints that he could aot execute some of the transaction codes
then what will you do? .
Use T-Code SUS3, This will show which authoFization is enssing in his profile
SS.Wi v4 -n4 Daity tearsactions?
“ALCE, aria, 1, SMI exc,
56.1 there bs performanus prablesn naw will you-snalyee Cie problem?
57. How itt yqu delete tne-locks?
58.
= YoU maintained Roles naming conventions?
59. iF gateway process 5 (aiid then can u connect to other R/3?% You can‘t connect to other R/3 System. You can connect to sare R/S.
% 60.1How to configure TS? = :
61.tow you transport the request?
62! what is your landscape?
63. What are patches you applied?
SAP GASES, SAP_ABAP, SAP-HR, SAP_SO
64. Kernel patches?
85. Proceduce for Appling patches?
66. Did you apply patches from OS level?
67. what are jobs you assigned jobs?
68. what are problems you faced In spool administration?
69. How many profiles
Total 3 Profiles
* Default
2 Str
2 Instance
70. 1 betvieen Start dnd tnstance Profile?
71.5103
iH 72. Read buffer - write butter
a 73.Temse 2
- Temporary €:queatit Object
aa 74.5814,
75.5122 {
76. What are the real-time problems you got?
77.Wthat are the transactions you used?
76. What is the Responsibility iw your Company?
79. Operation modes configurations on assigning time table
80: Maintai-jing User Profiles
81. Printer Configurations and Troubleshooting
7 82. Background Job Configuration
63. Applying Packages65, Documentation for variows task!
56. What is purpose ot Logan Load Ratance?
To distributed the workload between application servers
87. Which ¥CODE is using Logon Load Satance?
SMLG
88. | am having two application servers the Lagon Load Batance is there; If the
User wants to connect £0 apptication server which will connected first
Messages server is will assiga the Application server automatically.
89. How do you distribute the foad
Depend upon the load, according co module we have to configure Legon
groups,
90. How to analysis ABAP dumps?
+ BY Seeing ABAP dump error we come to know that whether the error
belongs to insufficient memory, table space error or ABAP program error
oF developer technique.
+ If belongs to insufficient memory dump error displays at which stage the
transaction terminate and how much memory requires. So that we have
to increase thé memory (through instance profile)
~ If Belongs to table space error it displays the table name so that we
increase the table space through the SAPOBA
+ If belongs to program error we have analysis the ABAP program through
SE30
+ ff Belongs to devetaper technique cancel the ABAP program.
91. €ach and every work processor is full even though the user wants to execute
the program. Then what's the solution? -
+ If u don't have setond appitcation server thén we have to cancel the
Particular work processor (through SM50)
+ Iuthave second application server then we have to configure the fogon
groups. :
92.At what stages we need to transport the requests
Whenever we need the change the objects and ated to transport we'have to
perform transports like user request, client transport ete.
93.Mow wo mths anspor?
Farough Sie 18 27 or through FTP
24.Wnenever I suppose to start the FINC, The message seiverts staiting, ut
the Dispatcher ang Wo-kprecess is unable to start? What could be the
problem?
atewey Service “ails3, cae you connect to other R/3 Syston?98.1 applied one Background jab. I want to see the output of the Gackgrou:
96.1 tried to cancel a job with ‘CANCEL ACTIVE jad,” but I got the message “Jot
is not active." 1 killed the process in Sf15U, Sut my SH37 is still showing
ACTIVE. that can T do to fk this?
In St337 > select Job name and us:
select job > check status.
+ Start STHS and double click on the -equest itself, you will see which tye
of request it is (Workbench > client independent or Customizing > clic.
dependent).
+ recommend you to import every request on each client without foai!=
inside the request.
» Bxécute Second screen on the wep
‘97. What are the Background jobs you applied?
Checkine the Spoot Lags, Background Job Logs, Client Copies, etc.,
(SORT OSB Aan
+ Ifyou double dick a Transfer requirement in SE1O or SEG9 and th
Press F4 In the fleld category, you will find some helpful information,
+ Client dependent or independent transfer requirements include client
‘Spedific or cross dient objects in the change requests. Workbench.
objects lke SAPscripts are cllent specific; some entries in customizing,
‘are citent Independent.
+ If you display the object list for one change request, and then for each
object the object attributes, you will find the flag client specific.
+ Tore object in the task list has this flag on, then that transport will be
cllent dependent.
‘+ You can also find a dist of the high-class objects ia SAP; here you will see
the flag on/off. Use T-Code SOB}.
+ Start STMS and double click on the request itself, you will see which
type of request It is (Workberich - client independent or Customizing >
cltent dependent).
100. Our database server service sap_ is not
Starting automatically. We tried to start it manually but itis giving the error
“ERRO 1069 the sefvice did not start due (6 logon failure” Is coming. SO we
are unable to start the service of dialog instance on our database server. 30
‘no application server Is running on database server. Whet should we co lor
this? -
101. __ Scenario: We are implementing SAP R/3 46C W2000/SQL2C00. 1
created a new client 200 from the system defautt client G6O-on the -—
evelopment system. Then logged into 200 with SAP*/Rass and chansed
password. Unfortunately I forgot to assign a profile (€.9. SAP_ALL) to SAP~
Thereatter whenever I log on as SAP*, I can't cun any task; with the sysusm
reporting that 1 don't have authority to carry‘ovk that task. J.can't.atso, delet
the client white logged on into it. Is there any other admin usec mas:
could go in with to assign a profile to maintain SAP* or to create anc:
master that has administrative rights? How caa I rectify this?
An authorization admin or usar adinin can help you to assign profi
user including sap system user (© 9. sapt). I don't think you need02. We recently installed Database Server (4.68,0raite 8.0.6.1.0, WINNT
4.0) with Diaiog Instance. after starting ‘he services on Centraf Instance
Bispatcher Is running for sometime and after that It is stoppiny automaticaliy
So what could be the problem and how to solve It?
103. We want to defoult the settings In SUO1. When we go to SUDI first
time the decimal and date formats are set to diff. formats than what we nec
We are maintaining Date as MM/DO/YYYY. But It Is default shows
“DD.MM.YYYY" and aso the decimal notation shows diff than what we need.
Is there any setting it will defauit to our cwn settings first time of execution
SU01 for new users?
104. In ST02 > Extended Memory shows as 99.68%. What could be the
Feason? Is there any memory bottleneck? Were should we look to see the
details and how to resolve? 7 :
105. Imported a Teansport Request from DEV to QA and QA to ‘production
Via STMS from our production system. While import into production was
running T got disconnected, The import to preductlon was successful. Now the
QA queue stilt shows the truck and when I tr: to Import-a transport from DEV
~ cto QAI receive the message that the Import Is already running. The Import
Monitor displays the tast Successful transport (where I got disconnected) with
MAIN IMPORT for x2000000% fintshed with Retum code 0. I cannot Import any
transports into QA anymore. Is there a way to set the st~tus of the transport
queue to “finish* the import? 7
106, neg? the diference between Kemél 4.60 32-bit and Kemel 4.60 ExT
-biee
107. ceci aichives exactly they rust download of SAP, to be able to update
he Kernel?
108. astatting SAP GATEWAY?
209. “Lem trying to install a QA instance of BW on the same machine as the .
Dev instance. I get the foltowirg error ‘Errors Guriog server check; reported :
ror "SYSADMIN Rights: Execution Faled™
110. We want to capy our Client in Production system to QA cifent in DEV
“nat are ali the steps involved fa this process? What pre-cautions ace
Ks fc:teng hut Remote Cent Copy.
First, we Nave to check the TableSpace,
Check the Network: €onnection.-
IML. 4s thereany-t-code tS Kine how many. times within a. year (or.a-morith
atleast) SAP has veen stGp/start: Unebd ie lor Feporting (eidence, beside
‘manual ceport} related to service level to customer.
#5 the procedure for applying Patches?First we will download the patches from the Service.sap.chm to Trans
Directory. In the Trans Directory exteact the patches using CAR command
after that using SPAS we have to import those patches into sap level and
apply.
413, Is there a way to trace people's activity back to when the server was
put into productiqn?
TC STAD and TC STAT
2/3 does not log the history of users activity. Given the size of 8Y3 you she
increase drastically the hardware resources for that to be a dala. Instead +9u
can simply trace them; to trace you have to put (activate) a trace on wha:
you want to trace (S101).
‘And/or you can et the audit profile accordingly to your needs (SI119 and
‘SM20). Be careful on the size of the loy! (S16)
On the other-hand thiere are some fags that can show you users specific
intervention on the system including thelr own status and change on chat, but
not as a “Alm.”
To give an example: The report RSUSR200 will show the list of users
according to thelr logon date and passviord change. But unless you put
trace on a user you will not find a log showing you exactly what it was doing
between; for exemple, Monday 10:00 a.m. and Friday 15:00 p.m.
114. How to.make a system copy: CLS=bou: coe )
1. Take offline backup of both the server (source and target servers}
2. Verify the backup Is successfully done.
3 Run the fellowing command on source system.
2. Lagin as adm
b. svemart
© Connect internat e
4. Alter database backup controlfile to trace;
fe: Ext;
© Above command will generate a tre file in
foracle/P01/saptrance/usertrace directory.
Capy the text from CREATE CONTROLFILE uatit the (;) and paste it in to
any new .sal or controtfile.sal file,
bh. Copy the controifite.sqt to target systern.
i Egle the file-ond replace the entice source SIO to target Si
j. Edit the ceuse database command with the set database c
= Copy the aft generated during the-backup tle fromthe source sy
Target system. (foracle/<510>/sepbacktin)
3. ‘Change the entire source to target .
By Only dont change the backup volume name it must be (2rget =yster
Copy the above aft file name line from the source back tn tO
target log file.
'S. Shutdown the target ¢erver instance. ‘
6. From this onwards all the command on the target system onty
2. Login a2 3dm
2 Rum the SAPDER
€. Select } (Resto-e/Recovery)
9
inand
en 50Select the offline backup, wirich you want +0 restore.
9. It will take some time'to restore.
1. Once the database is restored login as adm and run the
i. Svenget
J. Connect internat:
kK. Startup nomeunt (i! tke database is already mounted shutdown it using
the shutdown comvmanc)
1. Run the following command
im. @controifite.sal (filz name of the conteol file contains the CREATE
CONTROLFILE statement)
9. After the run the above command it should give the “Statement
Processed)
©. Alter database oven resetiogs
Bs Shutdown
Start the database and SAP services using startup.
2. aiter this you have to reconfigure the STM.
8. All the jobs also you hve to reconfigure and reschedule.
9. Reconfigure all the printers.
10. If you want to change the Client number then use the local copy tool and
remove the original client after successfully import to new client.
115. Upgrading the kernel on my system to “he latest pateh level?
Procedures for updating a kernel patch
1. Download files to focal directory from Sapnet (Sapserv4).
1. Review OSS note 19466 for basic information.
2. Go to www.saptabs.com and fog into "SAP Service Marketplace.” You
will need your OSS ID and password. Next, click on “System Admin,”
2nd go to “SAP ealine Corrections.” Finally, navigate to “Download
Kemel/Front-end Patches.”
. Enter the correct “Product data” * (SAP R/3, 4.58, Kemel Patches),
and click on “next page.
4. Enter the correct “Syste:n data” (i.e. SAP Kernel 4.58, Sélaris, Oracle),
and click on “next page".
5. Setect all files to download. At this point you can click on “Mark for
Downtoad.” Note: You must have SAP Download Manager installed on
your workstation. If vou do aot have this, you wil need to load it first.
5. If the status indicates the data Is “lagged for dawnload, click on
Oe
2 Glick en rain download basket.”
to your
i¢ downloaded files {0 the Unix server. Go to Start >
rams. reflection > FTP client and Connect to the server.
Navigate to /sapsource/donloads and create a new folder as Updates
FTP the entire kernel patches to this folder.
3. Telnet into ihe server as agm. Navigate to /sapsource/downloads and
remove ai update folders except the 2 most recent ones.416.
4. ‘Copy the CAR executable file to the new update folder. (i.e
Cprust/sap/iSyS/exe/un/CAR /sapsourceldownload/ulUpdates :005
5. Te SAPOSCOL file for-4.58 and 4.6C must be @ 64bit version since
ane SS tevel ts 64bI. (Get this fcom Gabit Splerls under 5.60) - see
OSS note 19227
6. Navigi ce to the update folder end dincar the files. (
BRARCHIVE.CAR}.
7. You con then delete all of the .car files (ie.: rm *.CAR and cm *.c9-)
Back up the exe/run directory by running
Jsapsource/scripts/bkup_fites.sh
8. Source: /sapsource/downloads/updates
Target: fust/sap//SvS/exe/ran
‘This backup script will copy the fies fom. exe/sua and put 2 ce
date extension on them -archive,07022001), Verify that alt (ie
files you downloaded were backed up in the exe/run dicectory.
9, Notify users that you will be bringing the system down for approx. »/2
hou
10. Stop R/3 and the database: /export/home/adm.
Stopzap__<00> ALL
LL.it the sapascol file(s belng replaces, stop the saposcol service
Run /sapsourcefscripts/cp_files.sh.
Source: /sapsource/downtoads/Updates
Target: /ust/sap//S¥S/exe/run
“This will copy the files from Updates and put thein in
pase/sap/iSYS/exe/cun.
412. Verify that-all the files were copied from the Updates directory xo
‘exe/tia, (Check the file sizes to make sure they match).
13. Check that the be files have ora as the owner except for BRRESTORE
44. check that the be+ files have the correct permissions (-rwsew-r-x)-
GRRESTORE should be (-renrw-r-x). Ifthe sticky BIC (5) is aot on, doo
“chmod 4755 br*” as user ora to change them.
15.1f SAPOSCOL is being replaced, it must be owned by “root
have the sticky bit on.
16. Remove al old backup. ites from the exe/run directory Keeping the
latest backup.
ing the system back u
rtsap_ ALL -
1B.1f the SAPOSCOL (ie Is being replaced, start the SAPOSCOL service.
‘tog into the systent you updsted and erty that it (= OK.
as: ne is now available. *
20. Once Sandbox is Completed and it ran for a few days you ©
updating the landscape, starting at step 11.7).
: CAR -xuf
and also
Jexport/home/adey
How to apply Hot Patches? .
yee ernload the support packs fram service:sap.com (provides yout ave:
2 login 10) to the usr\sap\trans directory
+ Open a command prompt and change the directory to usr\sen\cre:
Uhpack the support packs using the folowing command: car -xvt CAR
(this command unpacks the files that need {0 be imported into ye."
SAP instance into the usr\sap\trans'eos\in directory)
+ Log into client 000 as user OIC
+ Call transaction SPAM
1 th transaction SPAM, go to mens aption Support Package * Load
Packages .) From Application Server. Ix will ask you if Sou wantsiat you upiozwea
Another screen will appear listing the files that you up!
Successfully - Just click on the Back arrow to get back to the SPAM
screen,
si Ine button,
(On the SPAM screen, click on the Olsp-ay/Oefine b
A box will appezr with the Support Pac kage categories (Basis, ABA,
etc.)
Click on the category for the support packages that you uploaded ang
it will list them in order. ;
+ You can apply them individually or the whole list at one time.
+ To apply individually, select the first one In the list and thea hit the
‘green check mark at the bottom feft of the box. Then on the SPAM
screen, go to menu Support Package->Import Queue.
+ Confirm that you want te import the support package.
Once it is done importing, you have to confirm the queve by clicking
on the
+ Confirm Queve button - this will turd the yellow light in the Status
area (0 green.
Note: Always check your logs after applying support packages by clicking on
the Logs button in the SPAM screen.
“Step by step (HP)
1, Load the CL containing the patches.
2, Log on to the operating system a:
WT: adm
UNIX: adm
3. Change to the transport directory.
NNT: usr\sap\teans
UNIX: Jusr/sap/tcans
4. Unpack the patch archive.
NNT: CAR -xvf :\\.CAR
UNIX: CAR svt /7.CAR
The next step is to:uptead the patch {rom the operating system into 8/3
1. Log on to client 000, under any user that has SAP*-equivalent
authorizations. Z ?
2. In the Command field, enter transaction SPAM and choose Eater (or
adard menu, choose Tools ABP Workbench Utilities
from ths Sr?
Mainteny o>: A-Patches)
3. From the mesu bar, choose Patch Upload. :
3 Choose. S
2: Chack that the Support Packages have successfotty uploaded.
6. Chouse Back, vot
2. Select Air Patches
8: Choose Deploy.
9. The patch ts under New Patches.
117 ein oh, HOVE Granted avthorization to a user in order ta be able te access 2
Mle in the cerver. However, when he suns the program that uses the fils and
4needs.to access Iti he gets a8 ABAP Bump saying that he doesn't have
‘whiat con f do?
YF ~ authori ;
’ Tell the user to run transaction SUS3 after the dump. This will'sheve whch
authorization Is missing la his profile.
118. To find out all the transaction codes available to each user. How do f
do this?
Use T-Code S_BCE_68001426 to find out the T-Codes executable tor
particular user.
we
Go to SUIM >> transactions >> Transaction Lists According to Seieciuns
User, Profile or Object >> Executable for User >> >
ated/released fom &
119. How cai I view the transport requests cr
Client after a specific date? Also, can we get the list af transport reque.
imported to a specific client after a date as a report?
- + To check the transport requests released, you can go to SE.
table contents of Table £070. Display in last changed by field
fequired uséename and you will see the list of transport released.
Table contents can be displayed with transaction SE16 thus avow
whole menu structure of SEL1
+ Go to S03 > Requests/Tasks > Search for requests/tasks.
Go to STMS > Import Overview > Select the import queue and 20.
on Import history (CTRL#F7).
120. * How can -focate all locked SAP R/3 users? Is there any ceport that I
‘can cun?
+ Run Transaction Code SUI0 / EWZS / SUIM
+ Run Report RSUSRO06
121. ‘What is the message server?
122.” - What is the instance?
Spshers Beeset
123. what is the Dispatcher?
The data will distribute through the dispatcher to the work processes with
equal distetbuti
124. _ What is the difference between SU2# and SU22?
SU22 displays and updates the values in tables USOBT and USOBX, while
'SU2¢4 does the same in tables USOBT_C and USOBX_C. _
The,_C stands for Customer.
i + The'profite generator yets its data (roi the _C tables.
: ~ st the USOBY and USOBK tables the values are the SAP standard Values
fg as shown in SU24,
j + With SU2s one can (initially) transfer the USOBT values to the USOBT_C
4 table:
: a 125. "How SAP Router Works?
SAP Router examines any incoming data packets, chacks the route and
authorization and then sends them to their specified targets. The parta
that sets up the connection specifies the route (lrom SAP Router to SAP
Router and to the target). This procedure is known as source routing Lhy cs
235__ Where you use SPAM and SAINT
SPAM Is Support Package Administration Hanagement.
SAINT Is : :
236. How about auatt Gm ,Sm194j3m29)
237. rece on 0/5 of on Application level
338. If you have problem starting the SAP where will you look -
239. _ Where tc took at the Wela /S-_ Deen cuore
220. How about Memory mamt is there a prosram to be used.at
241. _1byowsee Regia! -t6-stialyze the REO? eck
3a5, Whol ave the alferent tyons of table tullering>ferens Key, nang tab,
322° Te Mier 0. T-Code whore you tan change the pies GE |e
343. How ave you familiar with setting up St¥Ss
249. How you supported Ovk. ji BIap
246. How abou system copies’
~ 247. How about performance tuning
345, Tow many SAP Instances aré there (Oev, Qa, PRO, Training, etc)?
339, What SAP versions are ir use for each instance? (6.9. 3.11 ate)
330. What release of SAP Kemel for each instance?
31. What's the SAP Hot Package level for each instance?
$22: What OS (type and version) is employed pes inet sce?
253. What RDBMS (type and version) 1s employed?ower 4
Aiffcrent systems.
255. Is any hardware available for the-upgrade? L.e. to copy the Dev and
Production systems or just 2 copy of Production
256. Which Add-ons are employed (faxing, print
scheduling, etc}?
287. Responsibility and tocls used for SAPGUT collout? How many users?
258. Who 's responsible for maintaining authorizations?
259. Was the Profile Generator used to create and develop the Profiles?
260. Is @ Change Management Procedure in place to manage and test transports?
261. Are any other tools other than SAP used to manage transports? If so, please
Provide details,
262. Is a tested backup and recovery process in place? :
263. What are the availability requirements per Instance?
264. What is the fongast period of time that the business can operate without the
SAP system? :
265. when is the peak processing times?
400. When is financial closing? fDCh 2 |
267. How many interfaces are in'use?
263. How many modifications were made and complexity?
269. How many user exits vere used and complerity?
278: Are any additional languages used? Ust if Yes.
274, “Which SAP modules are used (Induding Industry solutions)? Please also
Drovide verston Information.
BE few ony ket septs avaligbe? How curent are the test srs?
273. What Is the version of HP- UX-that you are using? - F
224. If the SAP system ts down, where you will stare the Investigaion?D & OX, PYSRaACL, oP
275. What are the different log files that Se do they contain?
What are their paths and exact file names? Ts tance damn) ; SUhse
276. | What fs suspending made In SQL server? How do You recover from suspend
mode? f
277. What is 16-bit OS and 32-bit OS? Is HP UNIX 16-bit or 32 bit?
278. What is RISC OS and CISC OS? Ts HP_UX Is RISC or CISC and how do you
sayz e
279. What Is RAID, logical volumes and volume sets? 7 .
280. | What is the locking snechanism that SQL2000 uses? And what is the one that
‘most recent ROBMS.s uses? -
281. What is the procedure for making system refrest?
282: What is a logical unit of work in the view of SAP »nd in the view of ROBMS?
283. . How do you check the version of the kemel Inf the OS? How do you check the
version of tp, 23T¢ans, RALoad what fs the exact cotamand? K@mak-~+ FLSP + oan
+> st ate applying Hot Packages, you havé defined a queue and-white
app | nave faced an error. How will you proceed thea?” - .
205. Is i occsible to defete the teanaaedleloge Ate tt the OS (SQt server)? amplive tan
52 ott 9 vou create cle to ‘ve onlyshe-deptoy access to tHGaape.© CIM% In PUES
721. What is the profile parameter that decides the location of the TemSe awse\
‘database? oe :
are the different services related to SAP that uns on the OS? Hors do
ayer Check in HP_UX if that services are running? SPOSCOY, SAREE D>
2E)- What is the use of making test run before client copy? DR, si Ah
329. How to ceaate printer? How many access methods? Device types?
q Oiffecess WP? What are Eaque WP and BG WP2,
fies ove there? 2 5
Fo fertend
cpp. geese 19 a's
* Baers in vaix
S > Ramole Sys 6A wt nde
AD wt 4 aa YAK
19, ATS, barcoding, taxation,
PEL Hess couny types of p:293. When a user complaint that the system is very slow how will you proceed! to
investigate? Anche? Joy SUCK, PteP Rosey
298. What is tne disadvantage of cunning the ent copy in dialogue mode? Yells P /y
295. Daily system monitoring checklists T-Code? hap _engy
296. How to add backup yomaln controle? u
297. How.do L-set up a crnnection to OSS?
Contact a local network service provider to establish a physical connection te the
SAP support network and obtain an official IP address. Then, contact SAP, by
phone of Ir writing, to Fequest an OSS connection. The appropriate form, Remote .
Connection ata Sheet, can be found in the OSS Windows help file. A detailed
answer to this question Is covered in the training unit establishing a Remote
Connection to SAP.
298. How do I get an OSS user 10?
Contact SAP to request an OSS user 10 is required. The appropriate form, OSS.
User Registration, can be found in the OSS Windows hieip vite.
299. How Secure is an OSS cofnection?
‘An OSS connection can be made completely secure with a combination of @
Correctly configured hardware router and the SAProuter program. This is an
application level gateway program, and ts configured so that only connections to
or from predefined IP addresses on predefined port aumbers will be accepted.
A fully.detalled answer to this question Is covered In the training unit
“Establishing a Remote Connection to SAP.” a
300. What happens if my problem gets no response ‘rom SAP?
First, make certain that you have actually sent the problem to’SAP! It is not
Uncommon for new OSS users to create a problem note, and then forget to click
on the Send to SAP button. Simply creating a note In’ OSS does not mean thet
‘SAP will process the problem. You have to explicitly send us the note.
SAP should only be contacted If, after having searching the notes database, you
have ‘not found an apprapriate solution. Remember that many problems can ¢ {ten
resolved by simply searching the OSS database. These types of probiems do
ot need to be Sent to SAP for resolution. Finally, if you have seat a problem. to.
‘SAP ead have not received a reply, perhaps you toaged it with too low a priority.
301. Can T reopen a problem note?
Yes. Over viewing Remote Services Online Service System (OSS)
302. What if I get too many notes proposed as solutions? a
Try to rustrict your searelcriteria. Always be 25-specific as possible to avoid this
-pcoblem...For Instance, searching under the-tecm “Business area” will recurn-over
1500 notes!
303. Oo I have to c-eate a note to. search for solutions?
No. You can.perfo-m a search of the notes database without creating 2 probler
note.
308. Do ail problem notes have to be sent to SAP?
No. If you can :'nd an applicable note in the database that resolves the prob! 2m
there is no need to send the problem to SAP. Even if you did send the note tu
SAP, the problem resolver wauld very likely attach the ncte already contained i
the dafabase as 2 solution to the problem,yur focal sugsiatary.
306. Do I have 24-hyur-a-dey access to OSS?
Yes. OSS is available (or users 24-hours a day, seven days a wee’, Only priority
1 problems will receive an after-hours response. all other problenis are handied
during normat office hours. Occasionally, OSS will have to be sivut down for
‘maintenance or ypgrades. This normally only happens during the weekends, and
You will always have price warning.
397. Can you run background processing with a loiwer priority than online activity?
There is no way to specify a tower priority for.background processing than for
online processing, aor would this have any effect In a-distributed ceat/server
environment. However, online processing és normally input-output (1/0) intensive
that is, the memory provided by the operating system is not utilized, due to
Waiting for the 1/0. These processes are assigned a higher priority by the
operating system than processes that fully utilize thele time slice, such as-jobs
where no rolling occurs. As a resuti, uniine processing will have a defacto higher
Priority. If you have a distributed system, one possible solution would be to rot!
all of the background processing to one server, while online activities run on
other servers. *
308. “Can Dreserve background work processes for Individual applications-or users?
No, Reservation ts only possible for fob Class A. >
309. Can 1 assign priorities (Job classes) tn the function modules “JOB_OPEN,”
“J0B_SUBMIT” and “}0B_CLOSE?”
No. If Class A or B Jobs must be autoitiatically scheduled, schedule a fob of the
required class and set It to start pertodically.
319. Can T influence the priority of the fobs; regardless of the Job class?
In distributed systems with 2 well-designed distribution on tl. servers see OSS.
‘note 24092. -
S11, Can t save fob logs in the database (analogously to the spool)? =
There is no such option in the standard.
312. What happens if the background work process needs to be suiltched Bnd a job
'S running in that work process? -
‘the instance kernel waits for the job to finish befe"e the background work
Process Is switched to an alternate type. Jobs are never terminated b.: the
System to make way for cn op-mode switch.
343 Ces job definitions be transported into wher clients ur systems
Ko. Job definitions contein zystem specific aaesmeters ((Or example, T3rGet host,
User, Program, eneration mpde, and SO on). Therefore, ft would not make sense
0 develope teanst0"t tos. fo: sentar feasons, copying a job across clients is,
Det a foreseen task.-the foliowing trick, However, IS posstble: A user, who has jot
faministrates authorizations, 1o9s cn to the target client, The user enters
£2nsaction SM37, so that eti jobs in all clients are displayed and with the Job
CoPY option copies a jad tram a source client (only steps, no start time).
Does the usc: receive 9 massage if the job is cancelled?
ra315. How can I set a periodic job to be deteted after a maximum walting time? For
example: A fob is to run every 15 minutes alter 08:00 hours. Autornatic dele! on
will be applicable for each of these jobs, ifthe jab has to walt more than 20
minutes for execution.
‘Schiedule the fob wit} the following pararieters
+ Start time 08:00 hours
+ No start after 08:20 hours
+ Period 15 minutes
For eactr fob, adjust che earliest and latest start time by 15 minutes.
316. How cam set a pertodic Job to no longer run as of a certpin date?
‘This optic Is not provided in the standard system. It can, however, be easily
implemented with the function modules *JO8_OPEN,““JOB_SUBMIT,” and
"30B_CLOSE" (see OSS note 4751). .
317; Where'are system parameters defined?
‘System parameters aie defiried and stored:
+ Inthe coding.
+ In the default profile, where the default profile overwrites the setting from
coding.
+ In the instance profile, where the Instance profile overwrites the settings in the
coding and the defautt profile.
+ As of release 3.0, some parameters can be changed dynamically, during syster:
operation. 3 j
318. _ Are all system patameters fisted in the profiles? ty
Many parameters do not nornially require changes and are therefore defind only
in the code. Thus parameters exist that are not iisted in the default profité or
instance jrofile. .
319. How can system parameters be displayed?
You can display the parameters as follows:
+ Call up the report RSPFPAR using transaction SE38 to display the paramieters for
the instance-on which you are currently logged on. When you double-clickon the
corresponding line, the origin of the current Value appears.
+ Use transaction 7402 to display the attive parameters.
+ _On the operating system level, you car-display.the parameters using ssapipar
320. Should the profites for each instance Be delindd individually, oF is it better to
“have a common profile of them?
‘The instance profiles ace managed centrally, stored ia the dicectory:
Windows NT: \\\sapmunt\\sys\profile
Unix: /ust/sap///SYS/pratile
‘Therefore, several lastances can access the same profile, Ia some cases, instance
profiles must be individually maintained, because each system needs individuct
settings of the system parameters. In particular it applies:
: If different hardware is used for the Instances
If the applications are different (For example, Flan ane instance and PP an
another)
U different code pages acevused (for example, West European, Cyrillic, ve
Japanese)
For te database server+ Simplified maintenance
Lower rate of ersaes .
321. What is TRANSPORT OOMATN?
A transport domain comprises all SA? Systems Jointly administrated through the
TMS (domain cantrolter)
322. What is TRANSPORT GROUP?
Group of SAP systems, which are having common transport directory.
323. How do you configure the THS?
You must define which R/3 Systems in the system landscape shouts be combined
in a transport domata and which R/3 System is to be the transport domain -
controtler
324. What are the TRANSPORT ROUTES?
A route between any 2 SAP systems In a land scape. Can be a consolidation or
delivery path.
CONSOLIDATION ~ between development and quality
DELIVERY ~ from quality to production
325. “How do you do the transports?
The transport routes are used to define in which target system you want to
consolidate and deliver change requests. :
Teénsport request will be released In the source system and are’ imported ta the.
destination system. ae
SEO9 and SE10 are used to release the Transport reouest
‘STMS ~ used to import the request.
18 OS level use program tp.
+ $78t@x ~ tp Import clientXXX ux a
326.- What will happen during the export process?
Files will be created in the OS level in the transport directory
Ru - data files
K."- control fites
Transport directory ~ ust/sap/trans/data
usr/sap/teans/cafiles if
St 201! Happen duriag the import process?
Gata wiii' + unported in to the database. Get in to uss/sap/trans/bin
Syotax ~ iy import “eSTD> clientXX ux
328. What types of files are-erazied dulag the export? :
Run data fites
Wo contrat ites
329. What era the problems usually occurs during the transport and what are the
return codes?
0 ~suce
4 waerings
S - cevor (- different tyes of ectortransport?
351. Diff between cemote client copy and cl
352. What are client settings?
353. What is client copy?
354. Off between local client copy and emote client copy?
355. I aiy errors coming ducing transport where it will be eecorded and t
you rectify? Transport fog and active tog
356. Buffer monitoring? 11 book 608 page
357. Table space creation - 783
358. What is the link between ‘oles profites and prejects?
359. What is 4coo?
360. Gack up and cestore procedure?
361. What is the purpose of archive and how do u da that?
362. What is client?
363. Define authorization ot roles and authorization of profiles?
364, What are STO1, 02, 0:, 04, and 05 how do you monitor?
365. What are the workben h organizer and customizing organizer in transport”
366. How will check the space directly? -
367. SM42 and SM13
368. How do you check the application server?
369. Installation steps?
370, What is the default fite for TMS?
371. What T-Codes are used to monitor the pectormance?
372. User says yesterday they could use some transaction where as today they are
‘not what will you do?
373. * How will you add the T-Code?
374. How CUA works?
375. What are the bast T-Codes you are using cegularty?, 5
376. What is the commin storage fie for oracle?
377. How do you lock a dient?
OS level tock and SAP level lack. Get in to SCC4 and delete the client, which has
to be locked. Basically what it does Is it will just delete the entry from TO00 table
' where as all the data’s and taformation’s will be majntained. Before deteting we
have to just remember the settings to get it back. Just create the same,in SCCL.
If you really want to delete the dient then use SCC7.
378. How do you estimate the cllent size?
Have a test run using SCL. This will run 2 background program RSCLXCOP. sec
the end of the spool. There u can see the “storage required” from that we can
have rough idea. e -
373, aint update?
380. ll the support package updates you have done?
Ser. ‘af abjects you have archived?
382. What Is the difference between a spool request and a print request?
A Spool Request containg which data Is to be printed and how this data should
be printed:
A Prieit Request is the translation of a spool request into a language chat che
printer understands.
382. Can I print a spool request more than once?
Yes, SAP stores {ne spool request. You Can create print requests fromm this 5900!
fequest as many tienes 95 you wish. To do this, use ransaction $962 ar cheese
System >> wa Spool Requests.
7spool work process processes the print data Into 9 g.-Intable vata stream. ine
cable data is transfered <0 31 ypeccting System spooler. This then forwards
tne data to the printer.
385. Can { configure more than one spool wark process for each Instance?
As of SAP Basis 4.0, you com configure more than one spool work process:for
‘ch instance.
386, Can I switch other work processes to spoot work processes without restarting
the instance?
No. The internal structure of spool work processes Is ciferent from, for example,
diatog work processes. Therefore, if you want to chanve the number of spoot
work processes, you must da this in the context of SAP profile maintenance
(transaction R210) and then restart the instance.
S37 Where can I create printers in the SAP system?
in the SAP system, printers are created in transaction SPAD. In the SAP Easy
hecess Menu, choose Tools >> CCMS >> Spool >> Spool Administration.
388. _ What is a device type?
sedeyice type is a printer driver. Using the device type, the spool work process
can Generate a data stream that the printer understands - Induding appropriate
‘ESCAPE sequences.
For an overview of the device types supported by SAP, see SAP Note 8928.
209." What is a spool server?
A spool server Is an SAP instance with spool! work processes. An Instance of this
type Can process spool deta into print data.
390. * What are logical spool servers used for?
Logical spool servers are afias names for either reat spol servets or for other
loglcat'spool servers.
Using fogical spool servers offers you three advantages:
Ala sp00l Server is down, another spool server can automatically take on its
0ck,
You can configure a distribution of the spool workicad over all available spoo!
You can create » complex: nrinivr landscape in the-test system and then transport
5:40 the productiga seers. crothe production system, only the logical spoot
servers are adjustec. 2° not nacessary to adjust the Individual printer
ens ons
What is 9 access mathod? 7
{te Dees» -od deakcisies the say in stich a-sp0BF Work process is connected
‘onerating system spooler Tinere are two different cases:
Lecat Access =
Wve SOE mrs srocess ad
Remiote sess 300
IE SPOR! wore process addressas an operating spooler that is aot on its focal
£05 the operating spooler on its “ocal hostFae gateway server (GW cr G) allows communication between K/2, R/2 anu
external application systems. .
339. What type of security problems you will get?
240. What are the profiles that are maintaned in the R3 system?
Instance profile, start profile and default profile.
341, Telt some profite paraineter that you have maintained?
Feisp/max_wprun_time
342. Do you know about éperation modes? how do you define operation modes?
5M63, RZ04
343. What is response time?
Time taken for single daloave step. . ,
344, What is roll in-and roll out?
The memory management system'differentiates between main memory aceas
that are avaliable exclusively to a work process, and memory areas that can be
used by all work processes. The memory space used exclusively by a work
~process stores session-spectic data that must be kept longer than the duration of
2 work step, This data Is automatically made available to the process at the start
of a dialog step (rotled-in) and saved at the end of the dizlog’step (rolled-out).
‘This data characterizes users (user context), such as thelr authorizations, .
jadministration information and additional data for the ABAP and diatog processor.
{Also'it contalns data collected by the system in the precediag dialog steps tn the
Jrunining transaction (see following slide). Additional memory areas used by ali
Jorocesses In shared memory include areas for the factory calendar, screen, table,
‘and program buffers.
345. What are vi and v2? ee :
‘URD: Update process for making V1 (time-critical) database changes
UP2: Update process for executing V2 (not time-critical) database changes
The update process can be performed in several steps. The time-critical part of
an update ls called 2 V1 update; the non-time-critical part a V2 update. An
example of 2.2 update Is the creation of statistical business’ data:
When using transaction SM13 for V1 updates, we do not recommend “posting” of
‘epeating the transaction. >
Hen update error occurs, first solve the croblém that caused the error. Then
fester the transaction.
Waviw successful but the V2 update aborts, we recommend that you
vse transe-ticn 513 to post the aborted V2 update. ci
Hf you use the System administration Assistant for. your daily system checks, it
Provides you wath direct accozs to tanaection SPT.
f you do-when spa6l process fails?
242. How 83 Systems are communicated?
at ‘What are central user ad: istration and its uses?
How do set the alert monitors?
R220. (CCHS Monitoring)
Oiff between SMSO and S66?330. How do you configure transport profile?
ing transport control program requires a transport profile that contains
«fyormatlon about establishing the database connection for ail U3 Srecemns in the
tr abort domain. THS generates ang manages this transport profile sea part of
the transport domain configuration. You do not have to adjuct ihe transport
Profile usirig operating system functions.
331, What is the R3 system startup and shutdown process? _
BIS" database will start and then messaging server at last dispatcher wit staee
and It will connect with the messaging server,
332. How do you do the Load Balancing? .
SY configuring the logon groups. Logon group is a group of application seevers
735, q\hat will you do when you cannot login to a dialog server?
Eft chack whether the services are eunning in the server
Check ditferent log files in'the OS and database fever
334. How do you extend the table space?
‘Through SAPOBA.
335, , What wall you do when there Is a performance issue?
Check wither any tong running jobs are there
Check for deaidiocks
SMI2 locks. -
Health of the database D802 and 0801, St04, Si150
336; How-do you. handle the lock entries?
Coton te ek entries over 24 hours old, they must be investigate (Please
follow the steps below for investigate the focis),
by double cick on the procéss, which is over 24 hes old (this is often
by the date). c
2 7 Lek for the HOST NAME; and WORK PROCESS.
4- Goto Susi .
questeget the Server, wich has the lock, and look forthe work process in
question.
$7 H the process fs still active 00 NOT REMOVE EROM.SM12,
7 - IF the. pracess ts.00-longer active, REMOVE FHE LOCK FROM SH412 ©
397... Hovi do-vou handle tie vadate foinanes>
oe
a
é
3
a
z
§
2
©
ic
a
© sen SerOF Occurs, the eck table entry is deleted, bull the entries ive
main 2eles 2Fe not deleted. The user is notified inumediately by ant eeave se
mail. Depending on the business dato abject, the entry may be cepeetes
9, You can update the database asyachronously using ABAP key ess (ra
serstion «fa update task. 19 special cases only, yO can nine noun
Gatabase synclironously inside a disieg service (tive is else
update)1a
0
392. 15 eheve a workload distaib:tion mechanism fr the creation of pink requests?
Tf you use logical spool servers, you can activate 9 workload distribution
mechanism. The mechanism takes into account the number of spool worl:
processes for each Instance and the curreit length of thé spoot wait queue, It
also estimates the size of the spool requests waiting for processing
393. Can I transport crinter settings?
‘Yes. Transaction SPAD provides 2 transport connection ir the overview of output
devices. Note that the printer definitions In the target system must be reworked,
if the definition contains real spool servers.
394. How can L use the default printer at my work center computer?
The administeator must set up a printer with the access method “Fin the
system. For more Information about this, see the relevant sections of the ‘34°
ontine documentation. If the user selects this printer, he or she can choost: any
printer that is-defined on his or her work center computer during the creation of 3
Spool request. In most cases, the default printer Is chosen.
395. How many default clients are there In development, testing and production
systems?
396." “Apart from R3 whet other components exposures do you nave?
397. How will you connect the tape drive and explain?
398. What are all the beckup types and what Is backup cycle? :
399. How will you add a file in the database level?
400. Database structure?
401. Have you used semgrt In databace side?
402. Installation types how you do It? .
403. TCODES related to security? :
404. Diff detween Roles and Profiles?
405. What authorization needs to be given for a guy who is in basis side?’
406. Explain WP types and ts functionality?
407. Performance tuning?
403. Will you create additional instatces of two diferent SAP servers on 2 Single
machine? (Windows N¥/Oracle)? *"” :
409." See from which network IP address anid host name a user has logged on?
Call trans ction 0504, click “Presentation Server™ button, “Change View"
button.
410. No System name and transaction code in SMOS
Ifyou have more than,one application server, uSe ALOB instead of SHO4. Or
because they are at the logon screen, which has-established 2 Caniection. You
will-notice that the transaction cade showin when (7 Js oo user came-ts
‘SESSION_MANAGER.
This shows-you which workstations out th
‘ot yet entered a user name and password.
‘The transaction column shows the Last executed transaction code.
Sometimes your users will have multiple sessions open. If they do, to the
system, itis the same as multiple logins as it relates to the resources us:
So the user narn? will show up more than ence in ALOB.
Under the application server they are logged into, each instance of thet user
fame on that application server represents a session open.
+ For instance if you un ALOB, you will have your name shov up 2t |
the application server you are fogaeé into
One will show ALOD and the other wil! not have a transaction nevi CS
2 have the fogin screen up but nave- Daily Routine Jobs -
B12 Check that daily backups executed without errors
SMS4 All sap application servers are up
51450 ‘Alt work processor or started or not
sai Check the system logs (Errors, Warnings, Security Messages,
Database Problems)
2.08 / SMO4 To check the active users on the system
sPO1 Check for the spoot problems: -
5435 Chack job logs (new Job, incorrect job)
sre ABAP dumps (Program Errors, Insufficient Memory, Table Space
Errors, Developer Technique)
Workload Analysis
Background Jobs (Check for all critical fobs)
- Database -
D324 Monitor, Logs
6313" Planning, Archive
~ Cost-based optimizer -
OB13 Statistics update
#
SAP.Adminiatration ~
S137. Active Jobs ;
S402 | System message to ait :
sim userlist
SSAA System Administration Agent
220” Computer Center Maniagement System (CMS)
RE04 Operations Mode esd Instances
Control Panel, Server statuses
User maintenance
+ Command Prompt Admi
SAPCHECK - Check of SaP-Systems
SRZEFPAR - Profite-Checi 2» commands te SAPPFPAR DEV_OVEBHGSOO check
(Sa? Level Parameter RSPEPAR)
SA2MIMC- Sap Mananement ronsole (Gisplay profiles, response times, ..)
Starting Procedure - Profiles: ~
Start_duchmss00 sig
.
wm we
€
@
e
SeHow to do client copy?
How to do transports'from OS level?
Where the transport data files will be placed?
> How to make security authorization reports?
{in which table failed user login altempts will be there?
How to see the t able entry values?
How you will give new authorizations?
Have you participated in Kernel upgrading and OCS Patches?
Have you done any up gradations?
How to configure TMS?
2 ‘What is transport domain?
What is Consolidation route and delivery routes? How you wil identify them?
‘Transport error codes and their description?
The transaction should not be cisplayed in User Easy access menu but he must
execute that transaction how to do that?
iteicome to the exciting world of SAP RU BASIS. The term BASIS (foundation).
E:nomisnomer. All application modules of an SAP RIS system are integrated
using the BASIS technology and comprise of four major areas,
Application administration: ABAP, Secu, Correction and Transport System,
Implementation guide, Workflow, SAPOitice, external interface configuration,
upgrades etc. are some of the major sub-areas,
a) » Database administration: database interface, space management,
Performance, capacity planning, upgrades.
Ra Operating System administration: OS and SAP kernel, cortnunication, disk,
memory. printers etc. *
¥ » hfrastructure administration such as hardvare, network planning, high
“Svailability, archiving, language support 2
+ 2Automatic CTS
Even though SAP does not recommend automatic imports, itis the most practic:
‘way of moving transports from a development system toa QA environment or to
special development system (although I wouldn't recommend auto imports to 2
production system for obvious reasons).
There are various methods for doing this. The most effective and simple method
is using an OS script (shell/perl etc.) scheculed using cron for user sidadm.
There are a couple of steps you need to take before setting up automatic imports.
1. Your entire project team should agree upon the overall strategy, frequency
of imports,
2. Resolve any issues with transport approvals (many shops don't care about
traffic between DEV and QA)
3. Who is responsible for watching for errors and corrective actions (an email to the
developer works in this ease)
Configuring outbound SAP to internet mait Gateway (R/3 4.0 and above)
Step 4 (UNIX SETUP) _
Logon to your as sidadm
Change directory to /sapmnU/SiD/global (or any directory globally available
across all application servers)
Greate the following entries in file SAP_EMAIL_GATEWAY.sh and save the file
‘Hibinishs
GWCONFIG=/sapmnY/SID/gioba/SAP_EMAIL_GATEWAY.cfg
‘export GWCONFIG.
ssapmnvSID/exelmlunxsnd S*
Execute ihe command: silosmadm SAP_EMAIL_ GATEWAY. cfg (onter.the:
following information) ss
‘System name : SID
Client: 200
Usemame : MAILADM
Password : inilpass
Language : E
Loadbalancing : ¥
Message Server : adm. :
Startsap starts the saposcol process, which is the statistics collector for
Operating system resource data, if-it is:not yet running,
~startsap Calls thé script startdb, which starts the database if it is
not already started.
+ Startsap then starts the central instance.
+ The R/3 System administrator can start additional.instances and.
application servers. To start the instances independently of the
database, use the script startsap.
+ startsap has the following options
+ startsap 3: Checks if the database is running; if it is,
only the instance is started
+ startsap db: Starts only the database
+ startsap all: Default entry; starts both the database and
the R/3 instance
@In what sequence are profile parameter read?
R/3 processes read the appropriate parameters from a C source in the
8/3 kernel
The default profile /usr/sap//SYS/profile/DEFAULT.PFL is
read; profile values already defined in the C source are replaced
with the values in the default profile
The instance profile
/ust/sap//SYS/profile/__ i
$ read; profile values already defined in the default profile or in
the C source are replaced with the values defined in the instance
profile
This procedure ensures that system parameter values reflect the
instance profile and the values in the default profile and the C
source.
What are the step involved before stopping R/3 system?
Before stopping any R/3 system following steps are basic steps to be
performed.
Before the R/3 System is stopped, the R/3 System administrator
should check the:
Check if any background jobs from any application server are
active or have been triggered externally. Use transaction, SM37
Check if the background work process BTC is running in any
application server.
Check if any update records are open when the system is
stopped, the records are rolled back and set to status init. At
startup, the records are processed agai
The administzstor must decide whether to interrupt the jobs or
wait until they are finished.
Give system users advance warning of the system shutdown. To
create a system message, you can. use transaction SMOZ.
Sei _re shutting down the system, use transaction SMO to check
whethor users are still logged on, and ask them to log off.
The R/3 System administrator and administrators of external
systems should also inform one another about data transfers
between their respective systems.How do you checkthe work process from UNIX?
Use the following commands. »
To check ali the work processes:
pS -ef | grep | grep dw
To check the message server:
ps -ef | grep | grep ms
To check the SAP OS collector:
Ps -ef | grep sapos
How do you display the server name?
To display the server name, use transaction SM51. Information about
the process types is also displayed. For further information, select one
of the instances and choose Processes. Alternatively, to display the
system processes, use transaction SM66.
How do you display all active users in your system?
To display the overview of all active users on the instance where you
are logged on, use transaction SMO4. For a user overview of the whole
system, call transaction ALO.
Performance Analysis
Q. What happens to locks when the enqueue server is
restarted?
A. If they have not been saved to disk in the backup file, they will be
lost. The locks that are inherited by the update task when COMMIT
WORK is executed after CALL FUNCTION .. IN UPDATE TASK are
saved to the disk. The jocks are.saved to.disk when.the update request
becomes valid, that is, with the COMMIT. WORK. Each time the
enqueue server is restarted, the tock entries saved on the disk are
reloaded to the lock table: A tock 1s saved to disk at the point at which
the backup flag is set.Q. The enqueue server is a single-point-of-failure in the SAP
System. Can I guarantee high availability for the Enqueue
Server?
A. To guarantee this you must use the standalone Enqueue Server
with the Replication Server. This is described in the documentation
Standalone Enqueue Server.
SAP note 524816 contains the prerequisites that must be fulfilled for
using the standalone Enqueue Servers with the Replication Server.
Q. Where is the lock table stored?
A. In the main memory (shared memory) of the enqueue server: Ail
work processes on the enqueue server has access to the table.
External application servers execute their lock operations in the
enqueue process on the enqueue server. Communication in this case
takes place via the relevant dispatchers and the message server.
Q. Can locks exist directly after startup?
A. Yes, the saved locks, which were inherited by the update task, are
reloaded to the lock table during startup (see first question).
Q. How fast are lock operations?
A. In work processes on the enqueue server, a few 100 microseconds.
In work processes of external application servers you have to include
network communications and process changes. Depending on CPU and
network load this amounts to a few milliseconds.
Q. What should X do first if @ problem arises?
A. Use the diagnosis functions: -
sm12_Ey:ras “3 Diagnosis and then
sm42 Extras. @.Diagnosis in‘ update
Tra problem is reported, back up the trace files dev; dev_di
dev .2q* and check the-Systog. eT awi
Q. The following message is displayed in the diagnosis details
in SM12:
Lock management operation mode
Internal lock management in same process
What does this message mean and what are the other
options?
. "Internal lock management in same work process” in the diagnosis
function means that you are logged onto the enqueue server and your
work process can access the lock table straight away. You do not have
to delegate enqueue requests to an enqueue process on a remote
enqueue server. If you are logged onto an application server that is
not an enqueue server, the diagnosis function will provide you with the
name of the enqueue server.
Each SAP System has exactly one application server that functions as
an enqueue server. This enqueue server maintains the lock table,
which is located in a shared memory segment. All of the work
processes on the enqueue server can access the lock table. AN! work
processes on other application servers delegate their enqueue requests
toa special enqueue work process on the enqueue server.
This procedure is configured automatically. The parameter line
“rdisp/enqname =" in the default profile
DEFAULT.PFL indicates which application server is currently acting as
the enqueue server. When an application server detects that its name
matches the name of the enqueue server, it creates the lock table and
all of its work processes process enqueue requests inline. If an
application server detects that its name does not match the name of
the enqueue server, it Sends all enqueue requests to the enqueue
server.
Work processes of the type “enqueue”. guarantee thet ineamings =o.
reqansts.are processed immedistély. One enqueue process-is- ustially-
sufficient. 11 very Jarge SAP Systems with many application servers, a
second process can be beneficial. However, it is not expedient to
define more than two enqueue processes. If the transaction SMSO ->
[CPU] shows that only the first enqueue process is being used, the
bottleneck is due to something else.Q.Why is an enqueue work process required in a central
system? Don't all work processes have the same access to the
shared memory and thus to the lock table?
A. Although the enqueue process is not used in a central system, it
does not do any harm. Since almost all customers install an application
server sooner or later, problems will inevitably arise if the enqueue
process is missing. For this reason, the enqueue diagnosis function will
output an error if an enqueue process has not been configured.
Q. Are the locks in the lock table also set at the database level?
If not, database functions could be used to process objects
locked in the SAP system.
A. Locks are not set on the database. The lock table is stored in the
main memory of the enqueue server.
Q. Is a lock table built if am enqueue work process is not
Started on the enqueue server in the instance profile?
A. Yes, because the work processes on the enqueue server use the
lock table directly, and not via the enqueue process. The latter is only
responsible for lock requests from external application servers.
Q.How can I find out who is currently holding the ungranted
lock? In other words, how can check the program after an
ENQUEUE to determine which use is currently holding the lock
so that I can fet him or her know?
A. When the ENQUEUE.
the lock owner is listed in SY-MSGV1.
Q. Can Tuse special characters in my lock argument (especially
the ‘at’ sign (@))?
A. Fox ‘at’ symbol is used as a wildcard in SAP locks (enqueues): Ia.
other words, it can stand for any.other chatactar darinig collision —
checks. For exa the parameter vi ‘Value-12345@ 10¢cks the ‘quantities
42345400" 123457, and 12345A to 123452, and all
other values with any special character in the 6th character
position
This is dzscribed in detail in the section Lock Collisions:
In order to prevent the wildcard mechanism from being activated in
SAP locks when it is not required, you need to ensure when enqueue
function modules are called that key value parameters do not contain
any wildcard characters.
Ifkey values that you want to use to lock individual entities do contain
wildcard characters, you have to replace the wildcards with different
characters before the enqueue is called.ina 2f@ common wsckground jobs tat wil can in your system?
fa background job runs ‘more than the time it should be completed normally then
what actions will u take?
{iow '0 Schedule background jobs at OS level?
pit 19 add authorizations, how you wil marin profiles?
TyLat are common transport exe and thew wenn
HiansPort request types and its syniae
“Where will u fing {transport error togs?
How to do transport at OS level?
{How fo transport objects from Production to Development?
Hout 10 define instances and operalion posees
What are Homogenous system copy ard Heterogeneous system copy and how
you will do that?
al is oracle Architecture?
40S level in which ccectory oracle alerts are stored?
K ent i
hat will You do itu got Update failure?
at ill you observe in System log (sm21)?
arlous tease tables space, resizing, backups and ‘when will you do?
Various client copy methods and how you will do them?
{How you wil get help from OSS netesy
{Howto login in to SAP trom command ect? .
24! sere Logon groups? And what e Logon load balancing?
"*ste your self in SAP, Oracte from a scale 1 — 10%
siient copy fast?
{ital ate various profiles avaitable fr client copy?
Natt '0 do tanspor's between Production nog Developme?
How to apply OCS Patches?
What are you roles and responsibilities in your company?2
O
What is ASAP?
[san old term for an implementation strategy, Blueprint -> prototype -> goLive (if you
Want to say it in one sentence).
ty for Printing say lke use, teamlead, project manager?
How should I set pri
There's nothing like "priority" settings for spool processes. Just define more (profile
Parameter rdisp/wp_no_spool) processes so people don't need to wait
Using Te SGEN I have generated 74% job and later I have terminated the job. T
wish to start generating from where it stopped I have refreshed but to no chance
nothing was done. How should I further proceed so as to complete the remaining
job..
Start SGEN again and select the same you have selected before. It will popup and ack if
You want to start from scratch or generate the just the remaining.
Whatis your system tandscape?
‘What are you roles and responsibilities in your company?
What are versions of SAP & R/3, Oracle you are using?
Patch numbers of SAP kemel & Oracle you are using
Ia user wants to execute a background job immediately but there is no
Background work process available. How u will do?
What is common House keeping background jobs that run in your system?
What are common transpoct errors u faced while transporting?
How you will do cilent copy? I SAP * user is not available at alin your system
then how u will do client, copy. mig aemte ere
How trwith mo
~~ What s the: database backup stfategy in your company?
‘What is upgrade process? And how u will do that?
How u will give new authorizations?
How to adjust user. master records? if user master record doesn’t adjust what will! <-
you do? ° z
How to check Kernel, tp versions? :
Briefly explain a recent problem you faced, which u felt proud by solving that?
‘And ho u solved?
How you will rate your self in SAP, Oracle from a scale 1-10?
What are your daily activities in your company?
What are you roles and responsibilities in your company?T would like (9 know the version or ‘aime of SAP that is implemented in reat time?
(his is @ very generic question and really ‘epends on what you are implementing
(modutes)
‘The history of the *R/3" is
3.0D Basis 300
3.08 Basis 300
3.0F Basis 300
3.1H Basis 310
3. Basis 310
4.0B Basis 400
ASB Basis 459
4.6C Basis 460
4.71 Basis 6.20
sewione S3sfems that ina contract, a MySAP ‘business suite consist of
-RM2605, SRM2005).
cd fo. implement SAP.. ie for
FeFVErs the harddisk space, RAN, Processor
Your are implementing how many uset vit wk ci
how many ecards in what are are created oon
2nd Fond BIG database systin and an even bigger ‘pplication server for ~ 900 users
and 12 languages.Spa)
4
After doing any Support Package update in SPAM, are there any further steps 10
© eff
carry out for this update to
No, they are active immediately. *-- Markus
What is the use of profile paramater 2tta/roll area?
The value specifies the size of the roll area in bytes. The roll area is one of several
memory areas, which satisfies the user requests of user programs. For technical reasons,
however, the first 250 KB or scraf'a user context are always stored in the roll area, further
data
up tothe roll area limit 2ta/oll_first,
~ in the extended memory, up tothe lirait2ta/oll_extension or ifextended memory is
exhausted, then
again in the roll area, until the roll area is “ull, then
~ inthe local process area, up to the limit abap/heap area_dia or abap/heap,_area_total or
until the address space or the
swap space is exhausted.
Followed by termination with errors like STORAGE_PARAMETERS_WRONG_SET an
error code, that points to memory bottleneck Minimum data transfer with context change:
however, the increase helps to avoid problems (address space, swap space, operating
system paging)... *.Anupam Sharma
basis version?
ions
jon in the system environment
~ Defines a stable architecture framework for system enhancements
~ Contains the tools for administering the entre system
= Allows the distri sources and system components.
~ Browides: lized system parts and external product
‘AMR/ instance isa group of R/ services that are started and stopped asa unit (by an
PV3 dispatcher) and have a common instance profile. The name of an R/3 instance fe
composed of letters standing for the relevant services, and an instance number which is
unique for each computer. The services may be D, V, E, B, M, G, or S, which
respectively stand for dialogue, update, enqueue, background, message, gateway, and
spool services.‘What is Transport domain and Domain controller?
TD: is the collection of transport controller, trans directory and all other systems in the:
group.
TC: A system which will have trans directory, and in which the total landscape is
designed and maintained. in stms you can see all these. *~- Suncel
What are SNOTES ? How to apply them in SAP ?
‘The name of the transaction is SNOTE. A “note" in general isa hint, documentation,
‘error/bug description and may contain code corrections, that are applied with the
‘tansaction SNOTE.
What is OSS 2
OSS is the old name of the nowadays "sapnet" which contains everything you need to run’
SAP 2 program, patches, installation/upgrade documentation etc.
What are different modules used like EP, XI, CRM BW, etc?
‘Those are not different modules but different products.
EP= Enterprise Portal
XI= Exchange Infrastructure
(CRM = Customer Relationship Management
BW = Business Warehouse (that is the old term), its now call BI (Business Intelligence)
What is the correct use of SPAM, SAINT, SPAD.and SPDD transactions. When
should we use each?
SPAS hr installing support packages, SAINT is used to install new addons. SPAD is
for cera peimets (Lassume you met SPAU) and SPDD is Tor adjusting modification
‘twdietionary objects...
bit;
10 update Support Release packages from OS level?
‘0 - you can import them but the full process will require additional steps the tools "tp"
and "R3trans" are not aware of. The way is to use SPAM - but SPAM has the possibilty
to schedule those imports in the background.
©~
a
a
' ‘What is th difference between Sap lock and database lock?
‘ A U*SAP lock” is named “enqueue lock", the enqueue is on a much higher level, e, ga
complete sales document is locked there whereas in the datbase usually only row locks
exist. Since SAP runs on more database than Oracle (thanx god) one necded to havea
mechanism, that is database independent and on a higher level
What is the diff between elients 000 and 001?
Client 000 isthe SAP source clint, client O01 exists only on cetin installations (e.g
solution Manages). *-- Markus
° 1 would like to know is there anyway to transport roles from Production to
a Development or Sandbox.»
Goto PECG and enter the role which you want to transfer to other system. goto utilities-
7 Mass download it will ack the path where to download/sav that role on local desktop,
give the location and save it. Next logon tothe system where you want that particulas
a role.
‘ PECG> Role > upload.
st Give the path where the rote is saved. it acepts and generates successfully. *-- Mahesh
What is the need of having Development system?
Jo develop and custamizé SAP to companies requirement. sy if you dont have DEV,
{ afer go live(started using SAP (PRD}) if you want to do some changes to application,
‘a You cannot do changes direcily io PRD server, which may cause problem the PRD server
i Ene date. s0 yout do the required changes on DEV first and test them on QAS, ifit wack,
anspor the same toPRD.
Difference between Application server and Central Instance?
4°.) ASsIsjust 9 didlog instance. :
Cir ts Dialog instance + Database Instance.TOP ae ead gy
DEMON.EXE,
SMS0.EXE
PS-EF.EXE
What is Hot site backup?
{dentical copy of the Production database on a stand-by database host.
Backing up the database completely in the production site,
A terminology used for regular backup,
Backing up an Informix databace.
9. SAPSWEEP/delregkeys command:
Will remove entire SAP Instances.
Will uninstall SAPGUI and moves the files to recycle bin.
Will uninstall SAP Instances and the corresponding cegistry keys.
Will remove SAPGUI files and their entries from the registry.
10. What is transport group?
A group of objects that is available readily for transportation
A Group of SAP systems which are having common transport directory, —~
A group of change request tasks and obj
A roup of systems on which transport management system is configured,
UL. What is an access method?
A method that is used to access the application servers.
A method that allows access to SAP sereens,
A method that restricts user access to SAP systems,
‘A method that specifies the role of the spool device,
12. Can wereserve a background work processes for individual applications or users:
“AL D0. Reservation is nly possible for jobs Cass A. ——
by ee. Work Processes can'be received for cetain applications
6) Reservation of work processes can be done only by SAP support personnel
d) Reservation can be done, if the dialog processes are more than 15,
13. Whats the use of matting test run before client copy?
To know the time that the process require.
To identify the list of files that the process is copying.
Fo Hind whether the volume has the required space to perform the elient copy.
To find the authorization data intonnation,
14. What is SPAM used for?To resitict the Spam mails in the SAP system.
12install Support packages
isan inbuilt Anti Virus sean engine,
SQe! (Security Project Adminisinaive Maintenanes) used by the administstors to Festrict changes to tine
1S. Whatis Logon group?
A Eroup of application servers,
Fue OUP that was assigned toa set of People for easy identification,
rite ative users group on an applicaine server,
None of the above,
doa USE calls and reports to you that bie jaykeround job is faking tong time, and which normally
{foes not take so much time. What wives
a) Ask the user
») Advice the u 1 background job, :
© Check the status of the hack, {he job log and provide him the status.” *
4) Advice him to add all the Auhonzaions required to execute the background re
17. Which transport route will be Created, ifthe architecture is a two system architecture:
Delivery route.
domain route
Consolidated route, _/
‘Two system Transport route,
18. What isthe rote ofS Teode?
po, The functional peopte in Mark Solutions will be performing tasks that Fequire more time to
Process. Now, the functional people are experiencing “timed out” error message and cannot pert
HY task. How you wit resoive the issue?
goaRezonnend the fanctiona users 0 schedule ita 2 huckyround job ad increase dhe sum of background
work processes
Recommend the project manager o perform the
Increase the rdisp/max_wprun_time parameter value
Disable the rdisp/time_out_mess parameter by settitg the value to 0.
ts that require more (ime in the night time,
21. How (0 restriet access to a transaction for all the users?
Remove access fiom their respective profiles using PFCG transaction,
Remove access using SMOI transaction
Mail them a list of transaction codes thaf they should access.
Not possible in SAP to restrict a single transaction,
Or F—”—r—“—O~™~™OC—CC—”—C—C~C the fast 3
Information) ets Who haven’t logged in.” Which ABAP report can be sed to ge da
information?
RSUSR200
RSUSR100
RSURSO03
RSUSROOS
23. Ifthe filed UFLAG in table USRO2 reflits value “64”, what does it mean?
User account is 64 days ofd
User password will expire in 64 days
User account has been locked.
Useris a Super user.
24. tp locksys DEV pf=
) Lock the transport domain controller.
£) Leck the Development system and will not allow any user to login
‘o Lock the Development activities on the DéVélopmicit server 7
Fock the transport profile on the DEV system. =
25. Potential destructive tesig willbe done on?
Development server
Testing servey
Sandbor
Quality system
26. The difference between ALOB, SMO4 transactions is?
@) ALOG is productive from 4.7EE and SMO4 is available from 3.0.
») Both are same9 splays aetiv,
lication server.
© ALOB splays REC & Dialog user
SMSEES OW all he app servers and Shing SNDIYS the tetive ser one the
and SMO4 disptays CPIC usoys only.
27. tp count dev win?
siting for import,
28. Toitsidsap fit is used to?
Configure the sap
Configure the bac
Configure the Sip,
His just a log file a
systems befor
kup device an
implementing SAP.
d the type."
of the SAP system,
‘allable in the Kernel directory,
29. R3trans—» option wins
Beeeute the control fle that war mentioned
Delete the control fite
30. SM36wiz transaction win?
are eteated automatically
‘round job wizard,
2) Display the Operatio
n mode wizard help,
ive'a etzor message,
31. What is the rote of COLLECTOR Fe
a) Fis th
t PERF
“MANCEMONITOR background Job?
SAPOSCOL.-~
ed by SAP Performance system,
ice of tie datahase stingiatianenscarees eae
ut the ore MCC OF he SAR yr 20 shutdowns the SAP sycicas hen,
Mie titeshota—
managed by?
iatubase activities.what is EAP?
ERP stands for Enterprise Resource Planning
Enterprise Resource Planning systems inlagrate al data and processes of an
‘organization into unified system,
The koy feature of an ERP syctom i it uses a single or unlied databace-ta store
dala lor the various eystam modula
Vatious Modules which comes under ERP ae listed below:
Manutacturing
‘Supply Chain
Financiats
crM
Human Resources
Warehouse management
What are the advantages and disadvaftages of ERP system?
Major Advantages of ERP.
Various modules are well integrated in ERP system.
If there is no ERP, we may need to develop many software applications that do not
talk each other and do nct effectively interface. But in ERP the problem is solved by ,
Ingograting al tho modules ofthe business.
ERP provides advanced secury features compared to other software
applications. These security features protects data both Irom insider crime and
Oulsider crime.
‘Major Disadvantages of ERP:
[Re enginadring of businoss process to tl the “industry standard” presciibedby
the ERP systom may lead ta a loss of competitive advantage.
ERP systems can be very expensive to install.
‘What is the difference between USOBX_C and USOBT_C?
What is the difference between USOBX_C and USOBT_c?
The table USOBX_C defines which authorization checks are to be performed within a transaction and
which not (despite suthorty-check command programmed ) This table also determines which
on ches ks. are maintained in the Profile Generator.
pyect which defount
Duthorization abject should Rave-in the Profte Generator
What is signiicant of Composite Role Why we should go with Composite Roe)?
What are the processes going on OS level while Transporting?
What all are the areas we need to check, i Transporting is not happening?
Now to scheduled a background [obin OS level”
VIIS300
SAP Security Interview Questions
@. SAP Security T-codes
A Frequently used secunty Fcedes
SUCH Cheater Choiige User
PCG taoaneaun Ro!
M1 Create/ Chane UserSUOLD Display User
SUIM Reports
5101 Trace
'5US3 Authorization analysis:
Click here for all Security T-codes
Q List few security Tables
Click here for security tables
Q How to create users?
Execute transaction SUO} and fill in all the field. When creating a new user, you must enter an
initial password for that user on the Logon data tab. All other data is optional. Click here for
Aurotial on creating sap userid
Q What is the difference betweén USOBX_C and USOBT_C?
‘The table USOBX_C defines which authorization checks are to be performed within a
transaction and which not (despite authority-check command programmed ). This table also
determines which authorization checks are maintained in the Prafile Generator,
‘The table USOBT_C defines for each transaction and for each authorization object which
default values an authorization created fram the authorization object should have in the Profile
Generator.
Q What authorization are required to create ahd inaintain user master
records?
‘The following authorization objects are required to create and maintain user master records:
‘+ S_USER_GRP: User Master Maintenance: Assign user groups
‘+ SLUSER_PRO: User Master Maintenance: Assign authorization profile
‘+ S_USER_AUT: User Master Maintenance: Create and maintain authorizations.
Q List R/3 User Types
3. Systemn users are not capable of interaction and are used to perform certain system
activities, such as background processing, ALE, Workflow, and s0 on.
4. AReference user is, ike 3 System user, 2 general, non-personally related, user.
‘Additional authorizations can be assigned within the system using a reference user. A
reference user for additional rights can be assigned for every user in the Roves tab.
QWhat is a derived rote?
Derived re'es reter to sotes that already exist. The derived roles inherit the menu
structure and the functions inciuded (transactions, ceports, Web links, and so on) fer
the ole referenced, A role can only inherit menus and functions if no transaction
codes have been assigned to it before.
+The higher-level role passes on its authorizations to the derived role as defaurt values
winich can be changed! afterwards. Organizational level definitions are not passed of
They must be created anew in the inhenting role, User assignments are nok passed cet
either.
+ Derived roles are an elegant way of maintaining roles that do not differ in their
functionatty (xienticot menus and identical wansactions) but have differentcharacteristics with regard to the organizational level, Follow this tink fer more info
Qwhatis a composite role?
& composite role is @ container which can collect severai different roles. For reasens of
clarity, it does not make sense and is therefore not allowed to add composite roles to
composite roles. Composite roles are also called roles,
Composite roles do not contain authorization data. f you want xo change the
authorizations (that are represented by a composite role), you must maintain the dota
for each role of the composite role
Creating composite roles makes sense if some of your employees need authorizations
from several roles. Instead of adding each user separately to each role required, you
{an set up a composite role and assign the users fo that group,
The users assigned to a composite role are automaticaly assigned to the
corresponding (elementary) roles during comparison. Follow the link to learn mors
@. What docs the different color light mean in profile generator?
a
Unmaintained Organitzizéonal Levet
FEI) some autnorizaton Fels Have Masing Values
WRG 9 ausrosication ride Have Values Assigned
. What are the different tabs in PECG?
a
Q What does user compare do?
f you are also using the role to generate authorization profiles, then you should note thot the
generated profile fs not entered in the user m
been compared. You can sutomate this b
daily
aster record until the user master records have
y scheduling report FCG TItie_DEPENDENCY on @
rization field to Org, field
A. Autherization felt con tve changed ty Organization fet using PFCG ORGFIELD CREATE ur
ZPECG, ORGFIELD. CREATE
Use SE38 oF SA3H to Hun the above report
+ Orgaaiationotfeve’ tields should anly be created vefore you start Setting up your system If
ou ereate orvjaris.tionat love Hse fates. vou might have t0 do on menace Th
ENLIrALION ra may have to be pastprocessed in roles
&s+ he fields “Activity”, "ACTYT" and “Transaction code", “TCD* cannot be converted into en
brganizational level eld,
In addition, all affected roles are enalyzed and the authorization data is adjusted. The values of ze
autnonazetion field which Is now to become the organizational level feld are removed and entered
into the ocganizational level data of the role.
Note: Table fer Org Element: USORG
Refer to Note 323817 for more detail
. How many profiles can be assigned to any user master record.
A. Maximum Profiles that can be assigned to any user is ~ 312. Table USROA (Profile assignments
for users). This table contains both information on the change status of a user and also the hat of
the profile names that were assigned to the user
The field PROFS is used for saving the change flag (C = user was created, M = user was changed),
and the name of the profiles assigned to the user. The feld is defined with a length st 3750
characters. Since the first two characters are intended for the change flag, 3748 charactors remain
for the list ofthe profile names per user. Because of the maximum length of 12 characters per
Profile name, this results in a maximum number of 312 profiles per user
Q. Can you add a composite role to another composite role?
A. No Q. How to reset SAP* password from oracie database.
‘A, Logon to_your database with orasid as user id and run this sql
delete from sapSID.usrO2 where bname="SAP™" and mandt= OX
commit:
Where mandt is the elient.
Now you can login to the client using sap* and password pass
. What is differance between role and profi
A-A role act as container that coiléct transaction and genérates the associated profile. The profile
‘generator (PFCG) in SAP System automatically generates the corresponding authorization profile,
Developer used to perform this step manually before PECG was introduced bySAD. Any mamtersnce
of the generated pi afte should be done using PFCG.
contaring aif aumnonzators For
“ser Smith togy-on tothe
‘2ystemn his user bubler contains at authorizations of rte USER. SMITH ROLE. The exer Bulle coe
be displayed in transaction SUS6.
A user would (ail an authorization check if:
+The authorization object des not exist in the user buffer
+ The values checked by the application are not assigned to the authorization abject in the
user buffer
+ The user butter contains toe man
user buffer can be controlied using the system profile parameter
auth/aumber_in_userbutter
y entries and has overflowed. The number of entries in ths
Q. How to find out all rotes with T-code Suo1?
8. You can use SUIM = eles by comptes triteria oF RSUSRO70 to find out this6 t0 the Selection by Authsrization Value,
“Object 1 put §_TCODE 273 hit enter.
27 put SUDY in Transactic~ code ond hit executs
Use authorization object, 25 you can use this to t
tock with cheek) button
any object.
levif you have access to SEL6 or SEIGN. Ex
You con 2150 get this information directly from tabl
SEI6N
Table AGR_2251
Object 5_TCODE
VALUE (low) SUOL
Q. How to find out all theusers whe got Suos >
A. You can use SUIM > User by complex criteria or (RSUSROD2) to find this out.
Go to the Selection by Authorization Value.
In Object 1 put $_TCODE ant hit ehter
‘And put SU01 in Transaction code and hit execute (clack with check) button
| use authorization abject, as you can use this to test any objact,
& How to find out all the roles for one composite rote or a selection of composite roles?
AL Execute SELGN
‘able ACR AGRS
Compete oles You can put multiple compost oles Using the more bustnka il
& How to find out all the derived roles for one or more Master (Parent) roles?
AL Execute SEIGN
Table AGR_DEFINE
0
Use either egr_name feld or Parent_agr field.
. How can I check all the Organization value For any role?
AL Exeute SEL6N.
Table ‘AGR_1252 .
Role... -. Fype'n-the sole here anct-hit execute.
XOU.can always download lithe ttorinatl to Srila aa Ging
. How do I restrict access to files through ALLA?
A Rist create an alias, Go to tcode ALLI > configure > create alias. Let say we are trying to
Skstrct alas DIR_TEMP which is /tmp. Open PFCG and assign t-code ALL, and change'the
authorization for 3_DATASET as mentioned below
Activity 33
Physica fle name —_/tmp/*
Program Name with Search Hel
Q. How ca Tadd one “ole to many users?
A. SURE, Iyou Mave tons than 16 User by complex criteria.
Put the userid of user who is having issue.
Execute
Double click on the user ld. and expand the tree. Select the profile in question and see if
the authorization is correct or not. If not do the role reorg in PFCG and see if that helps.
Q. How can f have a display all oles.
1: Copy sap_all and open the role and change the activity to 03 and 08
Q. How can F find out all actvt in sap?
A. All possible activities (ACTVT) are stored in table TACT (transaction SM30), and also the vatid
{activites for each authorization object can be found in table TACTZ (transaction SE16).
Profile Parameters for Logon
‘To make the parameters globally effective in an SAP System (system profile parameters),
set them la the default system profile DEFAULT.PFL: However, to make them instance
Specific, you must set them in the profiles of each application server in your SAP System:
To display the documentation for one of the parameters, choose Tools >> COMS>>
Configuration >> Profile Maintenance (transaction RZ10), speciy the parameter name
‘and choose Display.
“Password cheeks
Fines the minimum number of digits (O-
3) In passwords.
faut value:
[osin/min password letters
(A-2) in passwords
[befautt value: 0; permissible values: 0 ~ 8|
wallable as of SAP Web AS 6.10
|
jogin/inin password specials \Sefines the minimuin nwinber of Special
lcnaracters. in the password Permissible
Ispecial characters are ()!\"@
i IY V()= 7" 49K
: Detauit value: 0; permissible values: 0 ~ 8
i available as of SAP Web AS 6.10
i iDefines the minimum number of
aracters tnt must te iftevent i the
Fosinfenin passJogin/passwordexpiration time
jogin/password_change for SSO
jogin(aisable password loge:
Jogin/pascword_logon usergroup
Le
Multiple Logon
jogin/disable_maltl_gui login
jogin anai_login_vsers
Incorrect Logon
os tee fo season
L —_
{eain/iils_fo_user_fock
[gliaied use pa came
Initia! Password: Limited Validity
®
d compared to the
Pew passwor'
hasswora
PPefauitvatue: =: permissible val e321 ~
Javailable as of SAP Web AS 6.10
“Defines the velity period of pa
{eoys.
fault value: 2; permissible values: any |
wumerical vat
AP Basis 4.6 by Support Packag
‘onirals the ceactivation of passin
jaced logon for user groups
eae rece ||
/AP Basis 4.6 by Support Packaae.
planation
‘ontrols the deaclivation of muitipre dias ar
jogons,
Wwailable as of SAP Basis 4.6
ist of excepted users (multiple logon)
y default, the lock applies until midnight
fbetauie value= :2; permissipie values: 1
unsuccessful lezon attempts shout be |
ufomati."y remBved at micoigh= i
efault value: > Leck jales on on serve
planation — -
Detine Tilty ead OF jas oct___ BAP Basis 4.6 by Support Package
efines the validity period of reset
jasswords,
\vallable as of SAP Web AS 6.10, as of
JAP Basis 4.6 by Support Package
“Explanation
llows af 1ocks the logon using SSO ticket.
wailable a5 of SAP Bass 4.60, a8 of SAP
asi 4.0 by, Support Package _
lows the creation of SSO tickets.
Wwailable as of SAP Basis 4.60,
,efines the validity period of an SSO
ket.
wailable as of SAP Basis 4.60
foginfeket_nly_by_hitos re fogon Uicket is only transferred using
rTTP(S},
wallable a5 of SAP Basis 4.60.
ain cKet_only_fo host nen fogaing on over HTTP(S), Sends the
icket only to the server that created the
ick.
wailable as of SAP Basis 4.60
jogin/accept_ss02_ticket
Vereate_ss02_ticket
jogin/icket_expration tine
Other Login Parameters:
efines the maximum idle time fora user}
‘rdisp/aui_auto logout
In seconds (applies only for SAP GUI
Learn more about this effects different user tyoe
You can find ail users who have access to create or change users using SUIM
Execute Transaction SUIM
Go to - Users by Complex Selection Criteria >
eoport RSUSROD2 using SASH oF SEI
Users by Complen Selection Criteria or you could run'e query. There are couple of other authorization ©
Fill in the screen as shown below, and execute th
as welt
SLUSER_AGR, S_USER GRP and ‘5_USER-PRO} you might want to ch
Selelion iain 8 ne
7 Entry values:
in SAP Business Information Warehouse?
‘and task-relevant information models based on
fon they need to carry out their tasks, These
contain otes, workbooks, queries, tnfoSources, Infecubes, key
Fules and extractors for SAP R/3, mySAP.com business Appliestions
hqures, characteristics, update
ond other selected applications,
. What is IDEs?
2 International Demonstration an Education System. A sample application provided for faxter
learning and implementation
9. What is SAP R/32
* A tite dener2ton ct of hightyintenrated software modules that pevTorms conten busines
hunction based on uuthinational leading pact’. Takes vie of any enlerpioe hence
sievatinn wad eve the work, hv RFS syste the tee saves Ike Pacsentaie eeQ. What are presentation, application and database servers in SAP R/3?
{A The application layer of an R/3 System is made up of the application servers ang the message
server. Application programs in an R/3 System are run on application servers. The appiication
servers communicate with the presentation components, the database, and also with each other,
Using the message server. Allthe data are stared ina centralized server, This server is called
database server
Q. What shout be the approzch for writing a BDC program?
A. Convers the legacy system data to a flat file and convert flat fle into Internal table. Transfer the
flat Me into sap system called "sap data transfer". Call transaction(Wnite the program explicitly) or
create sessions (sessions are created and processed ,if success data will transfer).
Q. What are the major benefits of reporting with BW over R/3?
Q. Would it be sufficient just to Web-enable R/3 Reports?
A, Performance — Heavy reporting along with regular OLTP transactions can produce a tot cf foad
bboth on the R/3 and the database (cp, memory, disks, etc). Just take a look at the load put on.
your system during a month end, quafter end, oF year-end — now imagine that occurring even
more frequently. Data analysis ~ BWV uses 9 Data Warehouse and OLAP concepts for storing ard
‘nalyzing data, where R/3 was designed for transaction processing. With a lot of work you can get
the same analysis out of RY3 but mast likely would be easier from a BW.
(Q. What is the difference between OLAP and Data Mining?
‘A. OLAP - On line Analytical processing is a reporting tool configured to understand your database.
Schema, composition facts. and dimensions. By simple point-n-clicking, a user can run any number
of canned or user-designed reports without having to Know anything of SQL or the schema. Because.
Of tat prior configuration, the OLAP egine “builds” and executes the appropriate SQL. Mining is to
build the application to specialty look at detailed analyses, often algorithmic; even more often.
‘misappropriate called “reporting.
Q. what is “extended Star Schema” and how did itemerge?
‘A. The Star Schema consists of the Dimension Tables and the Fact Table. the :.sster Data related
tables are kept in separate tables, which has reference to the characteristics i the dimension
ables). These separate tables for master data Is termed as the Extended Star Schema.
Q. Define Meta data; Master data and Transaction data
‘A.Sata Data: Data that describes the structure of data or MetaObjects Is calleg Metadata, Jn other
words dae about dats i known as Weta Dat, Master Dat: Master datas dato tht remains
Q. What is Bex?
A. Bex stands for Business Explorer. Bex enables end user ta locate reports, view reports, analyze
information and can execute queries. The queries in workbook can be saved to there respective
roles in the Bex browser. Bex has the following components: Bex Browser, Bex analyzer, Bex Map,
Bex Web.
Q. What are variables? -
1A Variables are parameters of a query that are set in the parameter query definition and ace sot
filled with values until the queries are inserted into workbooks. There are dilferent types of vanabies
which are usect in efferent application: Characteristics variables, Hierarchies and hierarchy node,
Texts, Formulas, Processing types, User entry/Defauit type, Replacement Path,
@. what is AwB?. What is its purpose?
AA. AWB stands for Administratar WorkBanch. AVi8 is 2 tool for controlling, monitoring and
maintaining all the processes connected with data staging and processing in the business
Information warehousing,Q. What is the significance of 00S in BIW?
fan ODS Object serves ta store consolidated and &
tomic level). It describes » consolidated datasec fram ane or more InfoSourees. This dataset can
be analyzed with a BEx Query oF InfoSet Query. The data of an ODS Object can be undated with 2
Selta update into InfoCubes andor other ODS Objects in the same system or across systems. 1a
contrast to multidimensional data storage with infeCubes, the data in ODS Objects is stored in
Transparent, lat database tables.
ig9ed transaction data cn a document level
Q. What is Extractor?
A. Extractors 1s a data retrieval mechanisms in the SAP source system. Which can fil the extract
Structure of a data source with the data from the SAP source system datasets, The extractor may be
able to supply data to more fields than exlstin the extract structure.
2. How do I change the name of master / parent role keeping the name of derived/child
fole same? I would like to Keep the name of derived /child role same and also the profile
associated with the child roles.
2. First copy the master role using PFCG to a role with new name you wish to have. Then you have
{to generate the role. Now open each derived role and delete the menu. Once the menus are
removed it will let you put new inheritance. You can put the name of the new master role you
Created. This will help you Keep the same derived role name and alsa the same profle namie. Once
‘the new roles are done you can transport it. The transport automatically includes the Parent roles.
What is the difference between € (Check) and U (Unmaintained)?
A. Background:
Sinen defining authorizations using Profile Generator, the table USOBX_C defines which
authorization checks should occur within a transaction and which authorization checks should be
‘maintained in the PG. You determine the authorization checks that con be maintained in the PG
using Check Indicators. tis a Check Table for Table USOBT.C.
In USOBX.C there are 4 Check Indicators
=(CM (Check/maintain)
= An authority check Is carried out against this object.
= The PG creates an authorization for this object and field values are displayed for changing.
~ Default values for this authorization can be maintained.
© (eheck E
ani sere tT
i field values are not displayed.
~ Ne_lefault values Can be maintained tor this aumortzation.
1H (No check)
“The authority check against this object is disable.
= The PG does aot create an authorization for this object, so fleld values are nt displayed.
No default values can be maintained for this authorization.
1B (Unenaintained)
No check indicator is set.
[An authority check is always carved out against this object:
‘The PG does not ereate an authorization for this object, s0 Feld vahyes ave not displayed
No detauit values can be maintained for this authorization.
@. What does user compare do?
2. Comparing the user master” Thi is Basically updating profile wformation isto user master reLon
‘ansactions contained i the menu tree of their ries, Mere
So that users are allowed to execte th
1 ecord aust contain the pratie for the coveespanding rales,
Sow cin start the wscr Compare prow ss Hone within the Pratile Generator (User tab wind Us
Snare pasbbulten), Av resull of te cumace on, tne profile generated by the: Prlile Gere.
iene ants the oer weston second Mees cater seat ed pote: greet sty Ue nes ake
QSEiered manual in transaction ‘sett Whe sta
record (using transaction SUDA, for example)! During the automatic user compare process (wit
report pfcq_time. dependency, for example), generated profiles are removed from the user
iF they do not belong to the roles that are assigned to the user
TF you assign roles to users for a limited period of time only, you must perform a comparison a:
beginning and at the end of the validity period, You are recommended ta schedule the backgre 2
job pfeg._ time dependency in such cases
Q. Can wildcards be used in authorizations?
A. Authorization values may contain wildcards; however, the system ignores everything after t=2
wildcard. Therefore, A*B is the same as A*
Q. What does the PFCG_TIME_DEPENDENCY clean up?
[A The ‘PFCG_TIME_DEPENDENCY’ background report only cleans up the profiles (that is, i doe
Clean up the foles ih the system). Alternatively, you may use transaction ‘PFUD'
Q. What happens to change documents when they are transported to the production
system?
|A. Change documents cannot be displayed in transaction ‘SUIM’ alter they are transported to tn:
production system because we do not have the ‘befor input’ method for the transport. This means
that if charges are made, the ‘USRIO' table fs filed with the current values and writes the old
values to the 'USH1O' table beforehand. The difference between both tables is then calculated snc
the value for the change documents is determined as a result. However, this does not work when
change documents are transported to the produiction system. The ‘USR1O’ table Is automatically
filed with the current values for the transport and there is no option fer filling the "USHO" table in.
advance (for thé history) because we da not have a befor input’ method to fill the "USH0" table ix
‘advance for the transport.
Q. What is the difference between the table buffer and the user buffer?
A The table buffers are In the shared memory. Buffering the tables increases perforrnance when
‘accessing the data records conta- ed In the table. Table buffers and table entries are lgnored during
Startup. A user buffer is a buffer from which thé data of a user master record is loaded when the
user fogs on. The user buffer has different setting options with regard to the 'auth/new_buffering’
parameter.
Q-What does the Profile Generator do? +
“a ‘The Pole Generator creates fla. portant chat suable user oes, and pot press ore
The system Sheu enter Wie elles tor thie. user.
'Q. How many authorizations ft Into a profile?
AJ Amaximum of 150 authorization fi into a profile. If the number of authorizations exceed this
‘marker, the Profile Generator will automatically create more profiles for the role. A profile name
consists of twelve (12) characters and the first ten (10) may be changed when generated for &:
fest time,
Q. What authorization objects are needed for PFCG?
R/3 Security- Authorization object for Transport and PFCG B
SAP Transport Authorization
To release Task
‘S_TRANSPRT
ACIVT=#3, 03, 75
TIVPE=TASKOther type:CiCP client Transports
CUST Customizing Requests
DTRA Workbench Requests,
MOVE Relocation transports
PATC Preliminary Corrections and Deliveries
PIEC Piece ists
TASK Tasks
TRAN Transport of copies
S_DATASET
PROGRAM=SAPLSTRF, SAPLSLOG
ACTYT=34
FILENAME=*
To release Customizing Requests
S_TRANSPRT
ACTVT=43, 03, 75
‘S_DATASET
Authorization object needed for PFCG access
S_USER_AGR
ACT_GROUP=* (You can restrict by role, if proper naming convention Is used)
ACTVT=01, 02,.03, 64 other felts helaw
OF Create or Generate
BE Cate
5 DIARY crsng dciments
21 Transport
22. Enter, Include, Assign
36 Extended maintenance
59 Distribute
64 Generate
68 Mode!
78. Assign
79 Assign Role to Camposies Role
DL Downioad
"Upload
S_USER_GRP
class=
ACTVT=22; 03
Other acenvity
0s Dep
Os tee
_ @‘A. To guarantee this you must use the standalone Enqueve Server with the Replication Server.
is described in the documentation Standalone Enqueue Server,
SAP note 524816 contains the prerequisites that must be fulilled for using the standalone Enquess
Servers with the Replication Server. 5
@. Where is the lock table stored?
A. In the main " in the default profile DEFAULT.PFL indicates which application server is currently
acting as the enqueue server. When an application server detects that its name matches the name
ff the enqueue server, it creates the lock table and all ofits work processes process enqueue
requests inline. If an application server retects that its name does nok match the name of the
lenqueve server, it sends all enqueue requests to the er yueue server. :
Work processes of the tyne “enqueue” guarants2 that incoming requests are processes
immediately. One enqueue process is usually sutt.cient. ta very large SAP Systems veth many
application servers, a second process can be beneficial. However, i Is nat expedient ke define more
than two enqueue processes. Ifthe transaction SMSO -> [CPU] shows that only the frst enqueue
process is being used, the bottleneck is due to something else
Q.Why is an enqueue work process required in a central system? Don't all work processes
have the same access to the shared memory and thus to the Jock table?
AL Aathough the enqueue process «nol used Hn a central system, ¥€ does not da ay hasm. Since
lication suAver SogHEH OF Laer, HeaDKeNIs will evitaehy arse+ The detauit profile /usr/sap/ /S¥S/profile/DEFAULT.PFL. is read; profilz values alie-idy
efined in the C source are repiaced with the values in the default profile
+ The instance profile fusr/sap//SYS/profie/ -chos-name> is
‘ead profile values already defined in the default profile or in the C source are replaced
‘ith the values defined in the instance profile
* This procedure ensures that system parameter values reflect the instance grofte and the
values in the default profile and the € source
What are the step involved before stopping R/3 system?
Before stopping any AV3 system following steps are baste steps to be performed.
1 Before the R/3 System is stopped, the 8/3 System administrator should eheck the:
+ Check if any background fobs trarm any application server are active or have beur triggered
extemally. Use transaction SH3?
7 Check ifthe background work process BIC is running in any application server.
: + Check if any update records dre open when the system is stopped, the records are rolled
back and set to status init. At startup, the records are processed again,
7 The administrator must decide whether to Interrupt the jobs or wait until ‘hey are finished,
+ Give system users advance warning of the system shutdown. To create a system mesesee,
You can use transaction SM02.
7 Before shutting down the system, use transaction S104 to check whether users are stil
fogged on, and ask them to log off.
+ The R/3 System administrator and administrators of external systems shoud also inform
‘one another about data transfers between their respective systems,
How do you check the work process from UNIX?
Use the following commands,
To check all the work processes:
Sef grep | arep dw
4 To check the message server.
ps-ef | grep | grep ms
To check the SAP OS collector:
ps-et | grep sapes
2 2a5a tra0saion SHS. Information about the process types is olso
Select one of the instances and choose Processes. Alternatively
‘Use transaction SH66-
How do you display all active users in your system?
To disptay the overview ofall active users on the Instance where you are logged on. use transaction
SMO4. For a user overview of the whole system, call transaction ALOS
‘The following section contains some common questions and answers regarding the tock
. What happens to locks when the enguc-re server is restarted?
4: If they have not been saved to disk in the backup file. th wl be lost, The locks that are,
inherited by the update task shen COMMIT WORK ». executed ater CALL FUNCTION ¢ TA
UPDATE TASK are saved to the disk. The locks are saved lo disk when the Updete reaveat
Becomes valid. that 1s, with the COMMIT WORK. Gach tine the eaducue server ie centered, the
tock entries saved en the disk are reloaded to the lock table. foc Is saved {0 dish a the pelt ot
Q The enqueue server is 9 single-point-of-tailure in the SAP Systens. Can t guarantee
igh availability for the Enquewe Server?‘A. To guarantee this you must use the standalone Enqueue Server with the Replication Server. Tris
Is described in the documentation Standalone Enqueue Server.
‘SAP note 524816 contains the prerequisites that must be fulfiled for using the standalone Enquese
vers with the Replication Server
@. Where is the lock table stored?
In the main memory (shared memory) of she enqueve server, AM work processes on the enqueue
server has access to the table. External application servers execute their lock operations in the
enqueue process on the enqueue server. Communication in this case takes place Via the relevant
dispatchers and the message server.
Q. Can locks exist directly after startup?
AA. Yes, the saved locks, which were inherited by the update task, are reloaded to the fock table
‘toring startup (see first question).
9. How fast are fock operations?
A. In work processes on the enqueue server, a few 100 microseconds. In work processes of
‘external application servers you have to include network communications and process changes,
Depending on CPU and network load this amounts to a fev!
‘miliseconds,
Q. What should 1 do first it 2 problem arises?
A Use the diagnosis Functions:
smiz Extras @ Diagnosis and then
‘smi2 Extras @ Diagnosis In update
Ifa problem ts reported, hack up the trace files dev_w*, dev_disp, dev_eq* and check the
systog.
Q. The following message is displayed in the diagnosis details in SM12:
Lock management operation mode
Internal lock management in same process
What does this message mean and what are the other options?
‘A. “Internal lock management In same work process" in the dlagnosis function means that you are
logged onto the enqueue server and your work process can access the lock table straight away. You
"ar enquewe provess on 3 remote enqueue server. If
ou aie api ence comms ot ee seen
Saar Sogoene Aor the
‘wark peocesses on th renquete server con ‘access the tock table. Alt processes on other
Zpplication servers delegate their enqueue requests to 9 special enqueue work process on We
haueue server,
This procedure is configured automaticaly. The parameter fine “rdisp/enqname = " in the default profile DEFAULTPFL indicates which application server ie currently
‘acting as the enqueue server. When an application server detects that its name matches the name
fof the enqueue server, it creates the lock table and all ofits work processes process enqueue
requests inline. If an application server “etects that its name does nok match the name of the
enqueue server, it sends all enqueue requests to the or jueue server,
‘Work processes of the type “enquete” gharant== that incoming requests are processed
Immediately. One enqueue process is usually sufl.cient. In very large SAP Systems with many
application servers, a second process can be beneficial. However, i 1s not expedient te define more
than two enqueue processes. Ifthe transaction SMSO ~> [CPU] shows that only the frst enqueue
process is being used, the bottleneck js dus to something else.
Q.Why is an enqueue work process required in 2 central system? Don't all work processes
hove the same access to the shared memory and thus to the lock table?
A Although the enqueue process 1s not used in central system, st does not do any harm. Since
olimost alt custormers msi sn appheation stver sogdct or fitet, pablem will ineitaely aeseFor this reason, the enqueue diagnosis function wil output an error iF
been configured.
enqueue process is missin
fn enqueue process has ns
Q. Are the locks in the lack table also set at the database level? Ifnot, datzbaze functions
could be used to process objects locked in the SAP system.
A. Locks are not set an the database, The lock table s stored in the main memory of the enqueue
Q. 15. lock table built f an enqueve work process Is not started on the enqueue server in
the instance profile?
‘A. Yes, because the work processes on the enqueue server use the lock table directly, and not via
the enqueue process. The latter is only responsible for lack requests from external application
Q.How can I find out who is currently holding the ungranted lock? In other words, how
can check the program after an ENQUEUE to determine which use is currently holding the
Jock #o that I can let him or her know?
‘A. when the ENQUEUE_... function module Is returned, the name of the lock owner is listed ia SY.
SGV
Q. can Fuse special characters in my fock argument (especially the ‘at’ sign (@))?
A. The at’ symbol is used a5 a wildcard In SAP locks (enqueues). In other words, it can stand for
‘any other character during collision checks. For example, the parameter value 12345@ locks the
‘quantities 123450 to 123459, 12345a to 123452, and 12345A to 12345Z, and all other values with
‘ny special character in the éth character position.
‘Tris is described in detail in the section Lock Colsions.
Jn order to prevent the wildcard mechanism from being activated in SAP locks when itis not
required, you need to ensure when enqueue function modules are called that key value parameters
40 not contain any wildcard characters.
Ir key values that you want f0 use to lock Individuaf entities do contain wildcard characters, you
nave to replace the wildcards with different characters before the enqueue is called,
Q. With 9 single-process system as an enqueue server, we have reached X SD Benchmark
users. Can this number be Increased by using a multiprocessor system (message server
‘on the same machine as the enqueue server)? Can we assume that sealing Is linear
fgierber oct 2.4 $0-voare-eve meny-precessen ra amuimaic N secerens CUTE
=i message
Server; dapeneners, and Soh teen aor manta GI apts 3 proces ton be
‘ceupied simultaneously. Dispatchers and message server represent the bottleneck with the
fenqueve. Linear scaling can be expected for up to 3 processors, even if lock requests are 50
frequent that message server, dispatchers, and work processes are occupled simultaneously. Oue to
asynchronous system processes (for example, syncer), using more processors can further enhance
throughput.
Q. The Syslog often contains messages such as “Enqueue: total wait tine during locking:
2500 seconds". How should I analyze this problem? Or is the entry not critica? (There
dre no records of terminations or timeouts.)
AA. The message is output for information puroases only out may indicate parallel processing esrors
th ABAP programs. The specified wat tine Hs the ture that has elapsed since startup due tote
se of the WATT paramete” shen the enqueue furtion module as,
The WAIT parameter enables a 1otk attempt 19 be serented 2 number of times, for example, 9 hse
ce apdate task does not have to be cancelled wes 2 ack « Set tenMparatily by ether proge
hhe work process remains. busy Between the fock atone.
9. User cannot connect 0 SAP
. logon setting the ha. tick mes
by