Professional Documents
Culture Documents
In st22 look for the core dumps if any and report to the respective consultants and
try to know why it happened.
In st02 look if any swaps are happening, swaps are not good for performance.
In sm59 look for connectivety tesing if there are other systems also connected to
your SAP R/3 system
In sm37 look for any cancelled scheduled job and take action appropriately.
In sm12 look for any pending locks from the previous days.
In sm13 look for any hanged updates, or updates pending for long or updates in
PRIV mode
6. how can u generate roles? explain?
The transport routes are used to define in which target system you want to
consolidate and deliver change requests
Transport requests are released in the source system and are imported into the
destination system se09 and se10 are used to release transport requests
Before applying any OSS note, you need to check whether that OSS note is
applicable to you system or not. Most of the changes mentioned in OSS note are
incorporated in Support packs. Depending on the support pack level of your system,
you will have to apply or ignore an OSS note.
IBM
Are designed to replace data of one client with data from other client
Local client copy between clients in the same R/3 System
Remote client copy between clients in different R/3 Systems
Client transport between clients of different R/3 System
It provides
Profile maintenance
Unattended 24-hour system management using operation
modes, instance definitions, and scheduling
Starting and stopping instances
Processing and controlling background jobs, scheduling
database backups
Automatic reporting of system alerts
Dynamic logon load balancing
System and network monitoring and analysis
The Computing Center Management System (CCMS) is an integral part of the R/3
Basis. CCMS
provides tools for managing:
R/3 System and performance
Database and archiving
Workload
Output
Security
4.What is an authorization?
5. What is a profile?
After you have configured logon groups, you must install and configure SAP Logon on
your frontend PCs (this program replaces the SAP GUI icon on the PC). SAP Logon
displays a list of all the configured logon groups.
You can also configure logon groups for different groups of users. If load balancing is
employed, only the programs and tables used by the group are buffered on the
application server. Therefore, the application server requires less memory. For
example, if users working with the SD module form a logon group, the server may
only need to buffer SD data and programs.
11. How can u recognise the application server?( if the R/3 contains
additional instances)
13. how many printers can we configure with one spool server?
clients.
18. With out org level values can we generate the roles or not?
19. how can u find ,whether the tables r client dependent or not?
Yes we can find whether table is client dependent or not by checking mandt field in
the table
St01
21. how can u get the authorization failures from the users?
To analyze an authorization failure, call transaction SU53 and determine which
authorizations are required for your task
23. what is the difference between se09 and se10? Explain their tasks?
The Customizing Organizer (CO) (Transaction code SE10) records Customizing
changes in change requests (of type CUST) which can be released to the transport
system for export to other systems in the R/3 System landscape.
24 how can u modify or add the authorizations (after getting the user
ans: by using su24( it can possible thru expert mode only) or manual
as"standard"
authorizations
role too.
25.what is an instance?
An instance is an administrative unit that combines R/3 System components
providing one or more services. The services provided by an instance are started or
stopped together. You use a common instance profile to set parameters for all the
components of an instance.
The authorization object is the template from which the authorization is created. It is
used in the ABAP code for authorization checks. Each object has up to 10 fields that
are checked using AND logic before access is granted to the desired transaction.
27. what is an authorization trace?
ST01
There are seven work processes (dialog, background, spool, update, enque,
gateway, message)
31. While extending the table space (addind a data file to the table
Tablespace name
32. while adding the data file , r u writing any sql query?
NO
• The developer can keep track of his or her work ("What have I changed?")
• The system administrator can monitor work ("Which objects were changed and how in a
specific time interval?")
• It provides a basis for any auditor who requires a complete history of changes.
• It enables customers to use the system to adjust data after they have upgraded to a new
release.
The Change and Transport System (CTS) is a tool that helps you to organize
development projects in the ABAP Workbench and in Customizing, and then
transport the changes between the SAP Systems in your system landscape.
The Change and Transport Organizer (CTO) provides functions for organizing
software development projects. It is designed to support projects of all sizes,
whether they are carried out centrally or in a distributed environment.
By seeing the ABAP dump error we come to whether the error belongs to insufficient
memory, table space error or ABAP program error or Developer error
If the error belongs to Table Space error it displays table name. So we need to
increase the Tablespace of that table.
If the error belongs to ABAP program error we have to analyze the program through
SE30.
If the error belongs to Developer, then we need to cancel the ABAP program
Yes
45. what is a background job? How can u define? how can u maintain the
jobs?
ST04
Database performance monitor displays overview of the load and configuration of
database
SM50
Work process overview
SM51
Name of instance
AL04
Display user overview
ST06
Important statistics displayed in the Operating System Monitor include:
CPU load average and % CPU utilization
Operating system swapping and % memory utilization
% disk utilization
Operating system configuration parameters
CPU bottlenecks are indicated during several snapshots by:
Idle CPU < 10 %
Load Average: N processes waiting in front of the CPU
Note: you must refresh your screen several times, as each display is a momentary
snapshot.
Memory bottlenecks are indicated during several snapshots by:
An increase in page outs for UNIX or page ins for NT.
This topic is covered in more depth in unit Hardware Capacity Verification.
SSAA: All periodic and occasional tasks of system administrator can be performed
It provides single point of control for entire system landscape
SM21: System log
The system log shows various messages, including error messages. Some of these provide
information about, for example, operation mode switches or system start up. Other log
messages how errors that occurred in the system (such as update errors, deletion of lock
entries, or aborted
programs).
SM12 Current database locks
SM13 Terminated updates
55. How many messege servers r there in Application Server? Where it lies?
There is only one message server in application server. We can find on which
Application server the message server resides using profile parameter rdisp/mshost
SAP ICG
** in sap icg , we need to explain with the files and where they lies
c)
CSC
To apply Support Packages, use the SAP Patch Manager (Transaction SPAM) in R/3 client
000,which is the interface between the customer's system and the OCS
A system landscape is usually synonymous with a transport domain. Having all R/3 Systems
of the same system landscape in the same transport domain ensures consistent configuration
and easy delivery of all change requests.
generating profiles?
9. while generating the roles, if the user tab having different type of
An activity group may contain one-to many (1-n) profiles depending upon the transactions
selected from the company menu. If more than 150 authorizations are required for the
transactions selected, multiple profiles are generated.
The MAXEXTENT for R/3 tables and indexes is usually set to 300. If the number of
extents for a database object approaches 300, you must increase this parameter. As
of Oracle release 7.3, you can set this parameter to UNLIMITED.
infosys and hp
copy?
A client transport differs from a remote client copy in that it does not use RFC. Like a remote
client copy, however, a client transport is used to copy data between different R/3 Systems.
A client transport consists of two steps. First, a client export extracts client data from the
source client to files at the operating system level. Second, the data is imported from the
operating system files into the target client.
To perform a client export, proceed as follows: Log on to the source client. From the R/3
initial
screen, choose Tools → Administration → Administration → Client Admin. → Client
Transport
→ Client Export. Select the data to be copied using a profile.
Indicate the target system to which the client will be copied. (The target system must be
defined in TMS as part of the transport domain.)
Begin the client export. As copying is a lengthy process, use scheduled background
processing.
why?
7. Transport requests r client independent or dependent?
Client independent
‘C’ type: With this transport type objects change system owner after they are
transported which means source system of the object looses its ownership after the
object is transported. So the target system in which objects are transported becomes
the original system. In other words objects are transported as original objects so
they can be corrected / modified in the target system too.
‘T’ type: this transport type is useful when you want copy objects between two
systems in a group i.e when the system other then the consolidation system receives
a copy of objects. Objects included in a transport of type T do not change their
system owner, so original system remains same.
yes
application server?
Means by which the integration and consolidation system for R/3 repository objects
are determined. A transport layer is assigned to each development class and thus to
all r/3 repository objects in that development class. It determines the R/3 system in
which development or changes to r/3 repository objects are performed, and whether
the objects will be transported to other systems when development work has been
completed.
Transport routes are used to indicate role of each system and flow of change
requests
A transport routes can be either a consolidation route or a delivery route. For a standard
three-system landscape, the transport routes are as follows:
A consolidation route connects the development system and the quality assurance
system. This transport layer is named Z<SID>, where <SID> is the system ID of the
development system.
A delivery route is created between the quality assurance system and the production
system.
In the development system, if changes are made to objects whose development class
refers to the (standard) transport layer corresponding to a consolidation route, these changes
are recorded in requests and transported to the quality assurance system and then to the
production system. If you change SAP objects, these changes are recorded in repairs, which
can be transported in the same way but using the consolidation route "SAP".
To create a consolidation route; enter a transport layer name in the field Transport layer.
A transport layer name must be within the customer's name range.
You can only create delivery routes for consolidation routes that already exist.
Transport Group is a collection of r/3 systems that share same transport directory
If u change an object in a system that is not the original system, you are changing
the a copy of the object and not the original itself is called repair
19. How can you restrict a user to access only a single table for
22. can we retransport the request , once it ahs already import by the
destination client?
No
23. how can you configure the printer? Explain the spool admin?
role?
25.what is min and max size of a data file, while adding to table
space?
Composite profiles are set of authorization profiles, both simple and composite. A
composite profiles can contain unlimited number of profiles. Composite profiles are
suitable for users who have different responsibilities or job tasks in the system.
These profiles are sometimes known as reference profiles for assigning larger group
of access privileges and having the possibility of better match users with several
responsibilities.
28. how can you find missing authorizations? how can you solve?
SU53
34. is there any other way to create roles not with PFCG?
35. Which system is the domain controller in a landscape?
Yours
(+91)9849259487
ST01 (trace) enables you to find out which authorization objects are checked when you
run a Particular transaction, report, or program.
SM12 Locks
DB02: Tables and Indexes Monitor displays overview of storage behavior of the
database and status of database objects
DB24: The DBA operations Monitor provides you with a central point from which you
can check the status and logs of all database operations including backup
monitoring, update of optimizer statistics, and dba checks
RZ20: database alert monitor is a tool to monitor all preset alerts for different areas
of database.
A database is divided into logical storage units called tablespaces. Tablespaces are
divided into logical units of storage called segments (tables/indexes). Segments are
further dividedinto extents, which consist of contiguous data blocks. A data block
(normally 8K) is the smallest unit of I/O used by a database.
A tablespace in an Oracle database consists of one or more physical data files. A
data file can be associated with only one tablespace. You can increase a tablespace
in two ways:
Add a data file to a tablespace. When you add another data file to an existing
tablespace, you increase the amount of disk space allocated for the corresponding
tablespace.
Increase the size of a data file.
Storage parameters such as INITIAL EXTENT, NEXT EXTENT and MAX EXTENT
allow you to manage space allocated to a table.
For performance reasons, operating system block size should be the same as
Oracle data
block size.
1
Incremental backup (also known as level 1 backup) is always based on the last level
0 backup (full backup). With SAP tools, only cumulative level 1 backup is supported
as incremental backup. RMAN retrieves information about the last level 0 backup
from the control files. An incremental backup is always a backup of the whole
database, not of individual data files.
In an incremental backup, all blocks of all data files are always read. However,
only those blocks that have changed since the last level 0 backup are backed up.
Therefore, if long backup runtime was caused by low throughput on the tape
stations, incremental backup can reduce the backup time.
ST04
A physical read must go to the disk to access the database data. When a physical
read occurs, a copy of the data block is written to the data buffer and then read and
analyzed by the shadow process.
A logical read does not need to go to the disk to access the database data,
instead, it reads the data block from the data buffer.
Accessing the data buffer is 1000 times faster than accessing the disk. To
minimize disk
access, the data buffer must be tuned.
When a database update occurs, the data blocks are updated in the data buffer
immediately, and written to disk at later time.
The hit ratio (Quality) of a database is defined as the percentage of data blocks
accessed
(Reads) compared with the total number of data blocks read from disk (Physical
reads). The
Reads are the sum of the logical and physical reads.
The hit ratio is displayed in the Database Performance Monitor (transaction
ST04), and
should be at least 94%.
Since the hit ratio is poor in the first few hours after startup, you should only
evaluate the hit
ratio after your system has been up for some time. As a general rule, wait until the
number of
Reads exceeds 20,000,000.
Before you increase the size of the database buffer, check for poorly qualified
SQL statements. Problems in the application can cause poor hit ratios in even the
largest of database buffers, for example, in the case of inefficient SQL coding, many
blocks may be read into memory unnecessarily.
Development class
A grouping of r/3 Repository objects belonging to common area. Unlike the objects in
change request, the grouping is logical rather then temporal. The development class
is assigned a transport layer to ensure that all objects have the same consolidation
route
The following things needed to be backed up
SAPDBA will backup all the business data, but your backup strategy must include backing
up all objects. Exactly which objects these are depends on the organizational structure of
your company. In the R/3 environment, the backup objects include the operating system and
the files associated with R/3.
The objects that need to be backed up include:
R/3 data, such as:
R/3 archiving objects
R/3 interfaces
SAP executables
Computing center data, such as:
The operating system
Third party programs connected to R/3
Database objects
A correctly implemented database backup strategy is the only effective protection against
data loss in the database.
Backup strategy
A pool of tapes for database and offline redo log file backups is required. Ensure that enough
tapes are provided in each tape pool to span the entire backup cycle. We recommend having
30% more tapes than required to cover database growth and additional backups, for example
after a database extension. Backup tapes can be reused at the end of a backup cycle (after 28
days).
Perform a full online backup each workday. Perform a full offline backup at least once in
the cycle.
You must back up the offline redo log files each workday, as well as after every online
and offline backup. Ensure that you back up the offline redo log files twice, on separate
tapes, before they are deleted.
To verify a backup, check the database for logical errors and the database backups for
physical errors. You must perform backup verification at least once in the backup cycle.
However, we recommend that you perform it once a week.
Remove the last verified full offline backup of each cycle from the tape pool, and keep
this backup in long-term storage. Replace the tapes, and initialize new ones.
Changes to the file structure of the database affect the subsequent database restore. These
changes occur when a data file is added, when a data file is moved to a different location, or
when a tablespace and its data files are reorganized. Perform additional backups after each
database structure modification or a system upgrade. Place these additional backups in
longterm storage.
In addition to the database administration tool SAPDBA, SAP provides you with the
following tools for performing data backups:
The program BRBACKUP backs up the data files, the control file, and the database
redo log files where necessary.
The program BRARCHIVE backs up the offline redo log files of the database.
Both BRBACKUP and BRARCHIVE record the actions performed in log files. These log
files can be used in the case of a database restore, and can be analyzed by the program
BRRESTORE. This program can restore all files belonging to the database system from the
backups.
The database backup tools support standard backups, both to disk and to tape.