SAP Basis ST06 Operating System Monitor - SAP Basis

Direkt zum Seiteninhalt
ST06 Operating System Monitor
What happens if an SAP job terminates unexpectedly?
In order to explain the relationship between TREX and SAP Solution Manager, I would like to ask you a question first. Can you remember when you last used the search help (F4) in SAP, what you were looking for and above all what the search string looked like? Now, the entitlement admin might have looked like this. Any role for a new key-user in the HCM area, but how exactly was that called? Would you Google the same way? - Not much. The Enterprise Search in Solution Manager 7.2 In the SAP Solution Manager, the SAP Enterprise Search provides a comprehensive full-text search. With only one keyword, you can search centrally for all types of documents in the ITSM and ChaRM, such as incidents or changes, via the Fiori Launchpad. If you have added attachments, they will also be searched for the keyword. At a technical level, a special BOL query object is passed to the Enterprise Search, which passes the HANA database and performs a search. What if you don't use the Solution Manager on SAP HANA? Enterprise Search with TREX 7.1 SAP offers the possibility to use Solution Manager 7.2 on another database (AnyDB), for example DB2 or Oracle. In order to use Enterprise Search (also embedded search) in this case, you need the TREX admin tool. This stands for Text Receival and Information Extraction, which basically describes the functionality of the software. The TREXEngine takes the search text in the form of the Query object and provides an intelligent search of keywords and long texts in previously classified documents. Installation and Usage Tips Run the TREX configuration after the basic configuration of the Solution Manager. In SOLMAN_SETUP you will find the Embedded Search scenario, which is the guide for the configuration. In the Process Management scenario, configure the embedded search using the description. Here the object connectors are created and the indexing jobs are started. Both are required to use the solution documentation in conjunction with other components. If you are installing UNIX, make sure that the shared libraries are up-to-date or that they are initially available.

In the beginning, in our company, the installation and management of the systems were dealt with by the functional consultants/consultants of the respective systems. The CRM consultant was responsible for the SAP CRM system, the SRM consultant for the SAP SRM, etc.
OData Services
In the context of the SAP basis, the deployment of an SAP application server for any SAP system can be used as an example. Parameters include processor count, memory, disk space, operating system, and run-time environment.

At best, for the time in which an emergency user is in service, a separate log of the activities undertaken is written, which can then be evaluated. In the following chapter I would like to explain our best practice approach to implementing an emergency user concept. Our approach to using an emergency user concept We have had good experience with the use of the Xiting Authorizations Management Suite (XAMS) in this area. This suite consists of various modules for creating role concepts, managing permissions including a permission concept, and also enables the implementation of an emergency user concept. XAMS works here with a limited time assignment of reference users with extended privileges to enable the emergency user concept. A self-service application may be made with a justification and a period for allocating special rights. The application window is illustrated in an example in the following screenshot: Evaluation of the use of the Emergency User Concept Once this request has been initiated, a new mode will be opened for the user, in which he can work with the extended rights. In addition, depending on the configuration, a stored workflow can be initiated as an approval process, or pre-defined controllers will be notified by email to verify activities. Once the session has ended with the emergency user, the responsible persons will receive another email with the logged activity of the user with the extended permissions. One of these logs is shown in the next screenshot: These logs can also be viewed in the system. Here you will get an overview of all the sessions that have been run. In addition, it is possible to approve activities with special rights after an evaluation. This allows the controller to get an overview of the activities undertaken with the emergency user. If you are using this Emergency User Concept and following these steps, you can ensure: Each user on the production system retains his or her original necessary rights.

Tools such as "Shortcut for SAP Systems" complement missing functions in the SAP basis area.

We would be happy to develop your solution.

On the other hand, a self-created e-learning offer offers the possibility to design it completely by itself and tailor it to the company's own needs.
SAP BASIS
Zurück zum Seiteninhalt