SAP Basis SAP Business Warehouse: Reset source system with function blocks - SAP Basis

Direkt zum Seiteninhalt
SAP Business Warehouse: Reset source system with function blocks
Resource management such as memory, buffers, etc
Daily monitoring and maintenance of your systems. Together with you, we create a catalog of measures to ensure the optimal operation of your SAP landscape.

I believe that in ten years, enterprises will be able to choose from a variety of platforms for multi-cloud automation. As a result, installation costs will no longer run into the tens of thousands, and migrations and upgrades will no longer consume millions.
What has changed in the past ten years and what can we expect in the next ten? How will they affect the requirements profile of SAP Basis experts and how can they adapt to them?
There are the following reasons that may lead to the termination of this step: CANNOT_SKIP_ATTRIBUTE_RECORD: The attributes cannot be read in the OCS file. The file probably cannot be opened for reading because it has been deleted in the meantime, or the permissions at the operating system level are insufficient. CANNOT_DETERMINE_EPS_PARCEL: The OCS file does not exist in the EPS inbox; presumably it was deleted.

Many companies are struggling with the introduction and use of secinfo and reginfo files to secure SAP RFC gateways. We have developed a generator that supports the creation of the files. This blog post lists two SAP best practices for creating the secinfo and reginfo files to enhance the security of your SAP gateway and how the generator helps you do this. secinfo and reginfo Request generator Option 1: Restrictive procedure In the case of the restrictive solution approach, only in-system programmes are allowed. Therefore, external programmes cannot be used. However, since this is desired, the access control lists must be gradually expanded to include each programme required. Although this procedure is very restrictive, which speaks for safety, it has the very great disadvantage that, in the creation phase, links which are actually desired are always blocked. In addition, the permanent manual activation of individual connections represents a continuous effort. For large system landscapes, this procedure is very complex. Option 2: Logging-based approach An alternative to the restrictive procedure is the logging-based approach. To do this, all connections must be allowed first by the secinfo file containing the content USER=* HOST=* TP=* and the reginfo file contains the content TP=*. During the activation of all connections, a recording of all external programme calls and system registrations is made with the gateway logging. The generated log files can then be evaluated and the access control lists created. However, there is also a great deal of work involved here. Especially with large system landscapes, many external programmes are registered and executed, which can result in very large log files. Revising them and creating access control lists can be an unmanageable task. However, this process does not block any intentional connections during the compilation phase, which ensures the system will run non-disruptively.

"Shortcut for SAP Systems" is a PC application that simplifies or even facilitates many activities in the SAP base.

This consists of one or more application servers and a message server.

At our company, for example, Ansible is used for mass rollouts of agents in large environments.
SAP BASIS
Zurück zum Seiteninhalt