Вы находитесь на странице: 1из 214
SAP BASIS FAQ’s 99633 81588 99597 47328 SAI VENKATESWARA DIGITAL XEROX RoE eS EE Plot No. 31, Ground Floor, Gayathii Nagar, Behind HUDA Malyrivanam, 3 ‘Shiva Apartments, Ameerpet, Hyderabad - 500038, agg ae SAP BASIS 1. What is SAP R/3? R/3 stands for? ‘Ans: System Application and Products. R stands for real-time environment version 3, 2. What is T_Code? ‘Ans: If we want to perform any operations that can be performed with T_Code. T_Code stands for a collection of dialog steps. 3. What is the Instance? Ans: It is group of R/3 services which are staited and stopped together. 4, What is the central Instance? ‘Ans: Where the message server and! dispatcher staying together that instance will be called as central instance. 5. What is the Dialog instance? Ans: If all work processes are dialog then It is called as a dialog instance. 6. Architecture of SAP Instance, What Message Server and Dispatcher does? An 7. What are the Message Server and Dispatcher? Message Server can communicate all the dispatchers that are existing in a An system. Dispatcher is used for receives the information from the Presentation server and dispatches to workprocesses. 8. What is the T_Code for checking the R/3 installation? SICK or SM28. the T_Code to activate the objects afte \stallation? ‘Ans: SGEN, 10.Can I script the starting and stopping of R/3? ‘Ans: Definitely. You can use the SAPSTART, SAPSRVKILL and SAPNTWAITFORHALT executables, 14.Where can I get a list of all transaction codes in SAP? Ans: The following tables hold all SAP transactions: Table TSTC stores all transaction codes and their respective ABAP program. Table TSTCT stores the text (or description) for each transaction Table THSTC has also documentation for all transaction. It is @ copy of TSTCT. Table TSTCP stores the possible parameters for each transaction. 12.Where can I get a list of all tables in SAP? Ans: Table DDO2L stores all tables in SAP. 13.What happens if I start a dialog instance but the database and SAP services are down on the central instance? ‘Ans: The SAP_xx and SAPOSCOL services will start. However, the work processes will end soon after being started 14.What happens if I start a dialog instance but only the database services are up on the central instance? Ans: The SAP services will start and so will the work processes. However, because the message server is down on the central Instance users will get the message "No logon possible (no hardware ID received by message server) when trying to log on. ‘No user logins will work. The "Process List” in the SAP MMC will stay in yellow. 15. If using Single Sign-On, do the passwords in SAP and Windows have to match? Ans: No. Only the user IDs must match for single-on to work. 16.Can SAP be installed on FAT or FAT32 partitions? Ans: No. SAP needs to bé installed on NTFS pactitions only. 17. What Is SAP MMC good for? ‘Ans: The SAP MMC has multiple uses. Among them: starting/stopping instances and viewing/analyzing the developer traces (dev_disp, dev_ms, dev_w*). 18.After a new installation of R/3 Enterprise, the system has a temporary Ticense. How long does this license last? ‘Ans: This temporary license lasts up to four weeks. After that, nobody can log into the system except SAP. Therefore, users must request 2 permanent license at the early stages of an installation. 19.How does an SAP instance read logs? ‘Ans: For every lock entry the pointer to the lock is maintained in a separate table. All the instances look into this table to detect lock entries. 20:How do you use DPMON? An! 24.What is the transaction to access the language utility? ‘Ans: Transaction SMLT takes you to the Language Transport Utility. 22.How can I see all the available icons in SAP? ‘Ans: Execute transaction BIBS and select Elements -> Icon Overview. You can use the code that appears on the last column in order to put icons in system messages (SM02). USER ADMINISTRATION 1) How to create user account? Ans: Using T_Code SUO1 we create the user accounts. 2) What are the various steps for crating the User? Ans: Address Data, Logon Data, Defeults, Parameters, Profiles, Activity groups, Users. 3) What are the Different types of users? Ans: External users: SAPSID, SAPServiceSID, SAPR3, and Administrator. Internal Users: log: This is the normal user to execute the interactive task, + BDC user: Access priviligers to execute the Batch input Jobs. (Service) + Background Job User: Access priviligers to execute the Background Jobs. (Reference) + CPIC user: Access priviligers to communicate the Gateway services and execute "the external programs and external commands. (System) + Special Users: SAP*, ODIC, Early Watch. 4) How to create the Mass Users? ‘Ans: Using T_Code SU10 we create the mass users. 5) How to create the User groups? ‘Ans: Using T_Code SUGR we create the User groups. 6) What you do using Su01? Ans: Using SUO1 We will create the Users, Chang the user data, locking and un locking user, Copying user from existing users and setting the password changes. 7) What are the reasons why users cannot login? ‘Ans. A Archival stuck 8. Page files is full. C. Heap Memory 8) What is CUA? Ans: Central User Administration (CUA) was introduced in R/3 4.6 to provide a ‘mechanism that allows central user management. Once configured, all user accounts are managed from a central client. 9) What is Logon Load Balancing and how to create the Logon Groups? ‘Ans: For distributing the load among the application servers and also for increasing the performance of the system. Using T_Code SMLG we create the Logon Group CLIENT ADMINISTRATION 1) What is the client? Ans: Client is a logical unit of a system which is self contained technically, commercially and organizationally. (Or) A client is an independent business unit in with in an R/3. 2) What is Client Independent and Client Dependent? Data Such as ABAP Programs, Repository objects and Ans: Client Independent: ete... Client Dependent: Data includes customizing application and user data. A client with out application data needs approximately 150 - 200 MB space in the Database. 3) What r the default clients in R/3? Ans: 000 ~SAP*, DDIC -- 06071992, 19920706. Used for administrative purpose. It is used as reference client for creating new client. 001 -- SAP*, DDIC -- 06071992, 19924706. It is the replica of 000. 066 -- SAP*, EarlyWatch -- PASS, SUPPORT. R/3 support people will be used and it is for SAP remote Sevices. 800 ~ For IDES System. 4) Tlost the password for SAP*. What can I do? ‘Ans: You can delete the record for SAP* in table USRO2 as follows: ‘SAP#* and MANDT="XXx" delete USRO2 where BNAME= Replace "XXX’ for a valid client number. 5) What are different client roles? ‘Ans: Role defines express the purpose of the Client. Production, Testing, Customizing, Demonustration, Traning. 6) What are the Authorizations need to perform Client copies? Ans: S_TABU_CLI ~ Table Maintain in all clients. ‘S_TABU_DIS -- Maintain of contents of Table. ‘S_USER_PRO ~ For the User Profiles. ‘S_USER_GRP ~ For the User master Records. 7) How to create the New Client? In which table all clients will be stored? Ans: Using T_Code SCC4 we create a new client. The table enytries are made in To00. + Enter T_Code SCC4 — Click on Change Icon ~ Click on New Entri -y, Logical system, + In the Screen Enter the Client Number, Name, City, Curre Client Rote. + Changes and Transports For C.D Objects ~ Automatic Recording + Client Independent Object Changes ~ Changes to Repository and C.1 Customizing allowed. + Protection client copies and comparison tool ~ Level0: No restriction. + Click on Save Button 8) What are different types of Client copies? Ans: Local Client Copy: Copy the data into the new client from the client With in the same system. Using T_Code SCCL we perform Local client copy Remote Client Copy: Copy the data into the new client from the client for the remote system. Using T_Code SCC9 we perform remote client copy RFC connection must be established between the target system an 9) What is the T_code to test REC Connection? Source System. ‘Ans: SM59. (Remote Function Call) 10) Where we fia the Client copy Logs? Ans: Using T_Code SCC3 We find client copy Logs. 11) What is the Transaction code to delete the Client? Ans: SCCS. 12) How to perform Local Client Copy? ‘Ans: Log on Newly created client with SAP* and PASS. Enter The T_Code SCCL - Enter Target Client No, Name, Select the Profile, Click on Execute in Background, 13) How to perform Remote Client Copy? ‘Ans: Log on Newly created client with SAP* and PASS. Test the RFC connection using RFC system check button on the toll bar: ‘The R/3 System Release versions also checked. Enter The T Code SCC9 ~ Enter Target Client No, Name, Select the Profile. Click on Execute in Background, 14) Diff. bet. Client Transport and Remote Cli Ans: 15) What is Client Transport (or) Export? ‘Ans: Data to be filled into new client from another system by the way of transport Request. Using T_Code SCC8 we perform Client Transport. 16) What is the T_Code to perform client Import? ‘Ans: SCC7 17) What are the different Profites available for client copies? ‘Ans: SAP_ALL, SAP_USER, Sap_Appl, SAP_Cust. 18) If we delete the one client from the system where we find details who delete the client, when it will be deleted? Ans: We find the needed information in client Copy logs. Using T_Code SCC3 we get these details, 19) How we know how much space is reqs nt copy? How can I red for determine the size of a client? Ans: After entering the needed information click the check box for test run and execute it. It displays the no. of files to be copled and amount of space is required. You can run a local client copy in “test” mode. 20) Can I copy ail users from client to ancther? ‘Ans: Yes. Use copy profile SAP_USER: 21) How can I hide a client from the users? ‘Ans: There is no way to actually hide a dlient but there is a workaround: detete the entry in table T000 via SCC4. This way, nobody will able to fog on to it. To “unhide” it, simply re-create the entry via SCC4. 22) How can I lock a client? ‘Ans: You can use one of these two: 1) delete the entry in table TO00 via SCC4; 2) run tp locksys at the OS level. 23) Can I import transports between different R/3 releases? ‘Ans: Read the technical and logical problems SAP reports when doing transports between different R/3 releases. SAP Notes 126776 and 330267. 24) Can I copy just data from client to another? ‘Ans: No. There is no copy profile that allows you to copy just data. For this you need to configure and use ALE or buy a thifd-party program that has this type of furictionality. 25) What is the use of SAP Router? ‘Ans: It is s/w program to connect the SAPNet Directly. SAPRouter.exe SAPRoitter ~r to start the Router. SAPRouter ~5 to stop the Router. 26) What is SAPRouttab? Ans: It is a file which we will give IP addresses. Default port is 3299. SAP reads the parameter file from top to bottom. So SAProuttab Permit (p) always followed by DENY (D). PROFILES 1) What are defautt profiles in SAP R/3? Ans: We have three profiles in R/3. They are Startup, Default, and instance. Startup Profite: it Is a parameter file which is read by startsap program. The services which the start profile can initiate the message server, the gateway, Dialog, Depending on release Engueue, system log collector and log sender programs version the name is assigned, Start_instance name (or) Start_instanceName_Host. Which contain parameter values used by all application servers Default Prot from same SAP System. The name is DEFAULT.PFL. Only one profile for the System. Which contain parameter values which directly effect the We have more than one Instance Profile: configuration and resources for the application server. Instance profiles for the system. For each Application server we have one Instance Profile. SID_InstanceName (or) SID_InstanceName_Host. SID_DVEBMGSO0_DEV. 2) Where we find the all the parameters in the System? ‘Ans: Execute the report RSPARAM. (Or) Enter T_Code TUO2 ~ select the application server ~ It displays list of available Paramaters. 3) How to Maintain the Profile Paramaters? ‘Ans: Using T_Code RZi1. 4) How to define Parameter and edit the Parameter values? How do you display the profite parameters? Ans: Using T_Code RZ10. We will define parameter or edit the parameters. 5) Why should we not change profile parameters from OS Level? Ans: Because RZ10 supports versioning (Multiple instances of the profile), hence we can recover to an earlier profile if something is wrong with the current. This Is not possible through OS level. 6) How to delete the old ABAP Dumps? ‘Ans: RSSNAPDL using this abap program we delete the old Dumps, 7) What is the parameter used to change the dialog work process runtime? Ans: rdisp/max_wprun_time (Default time is 600ms) 8) Where u find work processes list? ‘Ans: SM50 ~ Work processes overview or SM66 ~ System wide work processes 9) If an SAP instance does not start after making changes to the instance profile via RZ10, what is the best course of action? Ans: In an emergency, the best thing to do is to manually edit and correct the problem in the instance profile (located under usr/sap/sys/profile). After successfully restarting the instance run RZ1O and correct the probiem there. Save and activate the profile. IF possible restart the instance right away and make sure everything works. Otherwise, plan on keeping a close eye on the instance the next time it restarts. Restoring the database from a full backup will erase all the work done since the backup ended to the moment the problem occurred. Copying the instance profile from another system Is a bad idea. The profiles are unique and contain hard coded values. Logging a trouble ticket is not necessary unless you cannot absolutely bring the system back up. OPERATION MODES 1) Whats the use Operation Modes? Ans: For distributing the work processes we use op.modes. To increase or decrease the work processes for an instance. At the time of switching op.modes the running WP may not be distributed till their job finishes. 2) How to create the Op.Mode? ‘Ans: Using the T_Code RZ04. Then using the T_Code SM63 we assign the Op.Mode to time table. 3) How to delete the Op.Mode? ‘Ans: First deléte in the time table and save empty time table. Then delete the Op.Mode using R204. 4) What is Exceptional Op.Modes? Ans: We need to extend the maintains +day, -day, Date. We will d TRANSPORTATION 1) What is the tool you are using for performing the Transports? Ans: STMS 2) What is the Domain Controller? ‘Ans: The system in which we logon TMS that system acts as Domain Controller. 3) What is the Domain? Ans: Domain contains more than one transport groups and having only one Domain controller. 4) What is the Transport group? Ans: The system which have got the Trans directory from a transport group. In 2 Transport group we have 3 systems like Integration, Consolidation and Recipient Systems, 5) What is the Transport Layer? ‘Ans: Transport Layer defines transport path from the Consolidation system. Transport Layer is used for grouping all the Development Integration system to objects that will always use same Transport Route with in the same development Project. 6) What is the Transport Route? Ans: Transport Route is used for defining the different transport routes that exists between two systems with in the same transport group. 7) What are different Types of Routes? Ans: Consolidation Route: This is the route exists in between Integration System and Consolidation System, This is the route exists in between Consolidation System and Delivery Rou Recipient System. 8) What is the Development Class? How to create the Development Class? Who create the Development Class? ‘Ans: Development Class is used for grouping the all the development objects in module or project. Using T_Code SE80 we create the Development Class. The ABAP team lead will create the Development Class. 9) In which table development classes are stored? Ans: TDEVC. 10) What is the Change Request? Who creates the Change Request? How to create the Change Request? In the system contains objects to be transported and ‘Ans: Change Request is 3 lis information on the purpose of the Transport, Transport Type, Request Category, and ‘Target System. Team Lead will create the Change Request and assign to the team members. Using the T_Code SE09/SE10 we create the Change Requests. 11) What are the Different types of Change Request? Ans: Workbench Requests: Changes to SAP standard objects are ‘put in the Workbench Requests. ABAPer’s do modifications at object level which are applicable for all clients. Customizing Requests: Changes to company specific objects are put into Customizing Requests. 12) What is the prerequisite to change the SAP standard object? ‘Ans: We need to have the developer key to make changes to SAP standard objects. 13) What is the Naming convention for Change Request? Ans: K9<00001>. SID Is System Name and K9 is Correction Request. 14) -What-are tools you are using to perform Transports at 0.S Level? Ans: Tp—Transport Control Program: Is used for to control transport requests at 0.5 level. R3trans: Is‘used for to-control the Transport Data at the o.s level. 15) What are Commands for Import, Adding the request to Queue, Import All Requests at 0.s level using TP?» > Ans: To Import Single Request --- Tp Import SIDK900012 PRD (SID Name). To add request to Buffer --- Tp addtobuffer SIDK900012 PRD. To Import all the Requests --- TP Import all PRD. 16) What is the standard way of moving the transport to production? Ans: 17) Where the TPPARAM located? ‘Ans: Usr/SAP/Trans/Bin/TPPARAM 18) What is the TPPARAM ? ‘Ans: It is Transport Parameter File that contains all the important parameters that directly affected the way TP program works for performing Exports/Imports. It contains the Location of TP, R3TRANS, DB Host ,DB Name, SAPEvtpath, ALLLOG, topSap, Start DB, StopDB. SYSLOG, IMP_BY_EVENT=True, StartSap, 19) How to know the all the Parameters for TP? ‘Ans: TP Showparam . 20) What are the sub directories in Trans? ‘Ans: BIN: Contains TPPARAM file. Data: Contains the transport data files. Log: All the individual and general transport logs and trace files located. Buffer: Contains Buffer files, includes control information on the transports that will be imported to other systems and order of them. Cofiles: It is the control file directory, containing information about the steps of transportable change request as well as return codes. Sapnames: Information on SAP user performing Imports. ‘Tmp: Contains Control Flags and semsphores. ActLog: Includes action log files for all task and Change Requests. Import, Export. 21) What is the Transport Log? Ans: Transport Log keeps the record of jog files generated by the transport steps. 4 = Transport has at least one Warning 12 ~ Transport failed to due to fatal error 0 ~ Transport Succesfully 8 ~ Transport has Some Errors 22) What are the steps to configure the STMS? ‘Ans: Configure the “TRANS” directory and TPPARAM file. + Initialize CTO. Using SE06 we initialize the CTO(Change and Transport System). + Configure the Transport System and Routes.(STMS) + Create a Development Class. (SE80) + Create or Modify Object. + Release and Export the Object.(SE09/SE10) + Import Into the Target System.(STMS) * Check the Log Files. 23) What are the tools available in R/3 for Transports? ‘Ans: S€01 ~ Transport Organizer. SE09 - Workbench Organizer. SE10 — Customizing Organizer. STMS = Transport Management System. TP, R3Trans ~ These Tools are used at 0.5 Level. 24) One hour back Transport done perfectly with out errors. Now when we are trying to perform transports we getting error what happens? ‘Ans: At least one Background Job Should be free. 25) How to initialize the Workbench Organizer? ‘Ans: Enter T_Code SE06 ~ Configuration ~ Overview -~ Glick on system list ~ Enter ID's involved in the Transports ~ Save (or) F3 ~ Back. + Click on Delivers ~ Make SID entries here ~ Save (or) F3 ~ Back. + Click on consolidation Route ~ Enter the source system SID and Integration ‘System SID ~ Save ~ Back, * Click on Transport Layer - New entries - Fill information for the Layer name, Integration System, consolidation system and Description ~ Save ~ Back * Click on Bevelopment Class ~ New entries ~ enter development class and assign transport layer that we created ~ Save ~ Back. TSYST ~ All the systems in the land scape. TASYS ~ All the Deliveries systems in the LS. TWSYS ~ All the Consolidation Systems in the LS. DEVL ~ All the Transport layers. BACKGROUND JOBS 1) What is the Background job? ‘Ans: A job Is group of steps. A step can be ABAP program, external cornmand or external program. rdisp/btc time ~ 60seconds. SAPMSSY6 - An ABAP program run continuous for every 1 min.(Scheduled report). ferent types of Job classes? 2) What are the Ans: Class A, Class B, Class C. 3) What are the different options in the startcondition of the Jobs? ‘Ans: Immediate, Date&Time; After Job, After Event, At the Op.Mode. 4) What r the different types of job status? Ans: Scheduled, Released, Ready, Active, Finished, Cancelled. 5) How-to define the Background Job? ‘Ans: Using T_Code SM36. 6) Where you find. Job overview or where u find finishes jobs or cancelled jobs? | ‘Ans: Using T_Code SM37. Enter the user name and client number then execute it. It will display all the Jobs that can be finished and cancetled. 7) What is the ABAP report to delete the Background jobs? Ans: RSBTCDEL. 8) All the background jobs are in released state and there is a delay time and the background work processes are in wait status. What could be the reason why the jobs are not in ready or active state and the solution? Ans: 9) How to reserve a background work process for a particular job to run without any delay? Ans: SPOOL ADMINISTRATION 1) How to configure the printers and Output Devices? ‘Ans: Using the SPAD we configure the printers. 2) What are different types of Access Methods? Ans: + C Direct 0.5 Cail +L: Printing for using LP/LPR protocol. + F Front end printing, ‘+ S- Printing for using LPD host via sap protocol. + U- Printing for using LPD host via Berkely protocol. + & External printing. +X SAPComm. 3) What are the different types of printing? What are the 3 types of Remote Printing? Ans: Local Printing: The Spool workprocess is running on the same server as a host 0.s spool. Remote Printing: The Servers are connected on different servers througtr network. Front end Printing: The printers are configured with windows pc's through print manager. 4) What is the Spool Request and how we access it? ‘Ans: Spool Request contains the actual data for printing. Using T_Code-SPO1 we access it. 5) What is the Output Request and how we access it? Ans: Output request contains Informatién about the Output device name, no.of copies to be printed and using information. Using T..Code SP02 we access tt 6) How you delete the old spool requests? ‘Ans: RSPO0041 this report checks the old spool request and deletes it. 7) What is the Themse database how we access it? Ans: It is the temporary sequentional database. Contains all the information related to job logs, print job logs. Using SP12 we access the Themse Database. 8) How you find the inconsistencies the THEMSE database? ‘Ans: RSPO1043 this report finds the inconsistence in the theme database and deletes it, It compares the TSTO1 and TSTO3 tables and displays the Inconsistencies. 9) To prevent having to adjust output devices (e.g. print queue definitions) in every system each time they are transported from one system to another, an administrator can: ‘Ans: A logical spool server mapped to the real spool server can solve this problem by adjusting output devices after importing them. For example, logical spoo! server “logical épooler* can be set up in the customizing, quality assurance and production systems; printers get assigned to this spool server and they get transported. Because “logical spooler" exists on the target systems, there is no need to change anything after the transport is imported. 410) When a log Is created for the Spool request where exactly it placed? An: SUPPORT PACKAGES **Vsith out Configuring the STMS we can’t apply the Support Packages. 1) What are the Support Packs? Ans: From time to time SAP does modifications to the various objects of it’s R/3 S/w and make the modification available to customers in form of the Support packs. 2) In Which-Form Support Packs Available? From where The Support packs are downloaded? Ans: Support packs are available in the form of .CAR, We need to Unpacked. ‘Support Packs are available in the form of .SAR from 4.7 onwards. the required support packs from SAPServerVX (or) We have downioad www. service.sap.com/sp-stacks 3) What is the Command for Unpacking the CAR files? ‘Ans: Go to kernal Directory and type CAR -XVF kb46b007. 4) What is the Naming Convention For Support Packs? Ans: KB46C005. 5) From Which Client do you apply Support Package? Why are packages applied in 000 client? Ans: With client 000 and DDIC user we apply the support packs. 6) What is the T_Code for applying the Support Packs? What does transaction SPAM do? ‘Ans: SPAM (Support Packs Manager). Transaction SPAM not only lists the support packages that have been imported into the system, but it also defines queues of support packages that can be imported. It's also the transaction that carries out the import. 7) What is the T_Code for to Access the SAPServerVX? How do I log on to SAPNet? ‘Ans: Use transaction OSS1 to log on to SAPNet R/3 FrontEnd. To log on to SAPNet 8/3 Web visit: http://service.sap.com. 8) What is the latest SPAM Version? And what is the current Patch nembers for Basis, ABA, HR, and BIN? fans: The latest SPAM version for 4.7 is 6.20/0019 (May Be Basis ~ 55, ABA ~ 55) 9) What is the procedure for Applying Support Packs? Ans: Download the Required .car files from SAPNet + Put them in a temporary directory in /usr/sap/trans/tmp. + Use the command CAR -XVF path the car file including .Car Extension * The command CAR decompress the CAR files and put two files ( .ATT, .PTT in the J‘usr/sap/trans/eps/in/ ). + Log on to the system client 000 as user DDIC. + Execute the T_Code SPAM. Goto ~ Support Packages ~ Load Package ~ from Application Server. We get the Pop-up menu with the list of Patches in the Queue. The applied Patches and new ones will be listed. * Press F3 (or) Back icon to get main screen. + Click on display/Define. 7 + We will get the pop-up menu with unapplied patch. + Select the patch or group of patch that u want to apply and hit enter icon. + The patch Number will be defined in the Queue box. + Goto - Support Packages - Import Queue. + After the patch is successfully applied, we will have to confirm the: Patch application. + Goto - Support package ~ Confirm. + The status box should turn to green. + After The Patches applied, Execute the T_Code SPAU. 10) When we are applying Support Packs from Front End and Application Server? ‘Ans: If the Support Pack size is less than 10mb we applied from Front End. Otherwise we can apply from application server. 200MB, 11) What is the use of T_Codes SPAU and SPDD? Ans: SPAU T_Code will check for changes made by the patches in the repository as well as by the user via OSS Notes to the system. SPDD will checks for changes made by the Patches in Data Dictionary Objects in the System. 12) What are problem we get while applying the Support Packages? Ans: Cannot_Create_Cofile: Delete the concerned file of path from Usr/sap/trans/cofile and Usr/sap/trans/data directory. After deleting the files restart the Process. EPS in is old Format: Check the Spam Version and do a SPAM update. Delete the concerned files (.ATT and .PTT) Objects_Locked: An object that it is trying to modify is locked by a Change Request. 13) How to Update the SPAM? ‘Ans: Download the files from the SAPNet. Enter T_Code SPAM. Support package — Upload SPAM file. 14) What is the Add-ons and Plug-ins? ‘Ans: Add-ons is the additional functionality to the SAP R/3. Plug-ins is the additional functionality to the Core/Basis Module. Plug-ins available In the form of .CAR. 15) What is the T_Code for applying the Plug-ins? ‘Ans: SAINT. 16) How to apply the Plug-ins? ‘Ans: Log on the Client 000. + Execute the T_Code SAINT. + Upload the Plug-ins by going thru Menu options. + One the files are uploaded, we get two boxes on the screen. The top box contains the list of plug-ins already applied in the system. The bottom box will contain the list of plug-ins which is being available to be applied. + Select Plug-in from the second box and click on the continue button. + In the next screen Put the cursor on the Plug-in box and click the continue button, « After plug-ins installed successfully you will be asked to do SPAU or Continué. Click on Continue. * Click Finish, 17) Support packages and SAINT. What are they and how do you install them? Ans: 18) Where we find the Notes in a system? Ans: Some of the errors will be rectified with notes. Enter T_Code SNOTE; we get all the notes available in the system. Double click on the Note it will be executed. SECURITY ADMINISTRATION 1) What is the Kernel Directory? ‘Ans: Ust/SAP/SID/Sys/Exe/Run/. RUN directory is the Kernel directory. 2) How to Upgrade the Kernel ‘Ans: Download the corresponding the files from SAP service marketplace. These files are in the form of CAR ++ First of all stop services, then take the backup of existing kernel and uncar the downloaded files and start the Services. SAPService_SID, SAPoscoll + Hf the SAProuter.exe, SAProuttab files exists in kernel, if we upgrade the kernel then these files will be corrupt. So, router will not start. To avoid this problemi we will keep the copy of SAProuter.exe, SAProuttab files in “Trans” directory. + SAPoscoll, SAP Router.exe, 3) How do you resolve /usr/sap file system issues? Ans? 4) What is a Role (or) Activity group? Ans: Role is collection R/3 transactions, Authorizations and other related objects. 5) What are different types of Activity groups? ‘Ans: Composite Activity Group: Composite activity group is made up of collection of activity groups. Instead of assigning each role to user we made composite activity group and assigned.to user. Derived Activity Group: When creating Derived activity group we use an existing activity group as a reference. In Derived Activity Group we are not assign transaction, we inherit transaction from the Existing Activity groups. We will Chane the Activities. 6) Tell me some authorization objects and its purpose? ‘Ans: S_DEVELOP, S_PROGRAM, S_TRANSPORT, S_TOCDE, BC_A, S_AAAB. your organization? « 7) Write one role on the pair u r create: ‘Ans: Z_FI_APACCOUNTAG, Z_FI_AP_DATA_ENTER_CLERK. £8) What the naming convention u follow for roles in our organization? How many characters u r using for reating roe, dow accept_and numeric vlues? ‘Ans: The first letter must be start with Z, we are accepting _ & Numeric value with minimum 11 characters. 9) What is the Authorization Object? ‘Ans: Authorization Object is collection of authorizations. Each Authorization object has activities and fields and having max 10 Authorization fields. 10) What is Authorization? ‘Ans: Authorization gives the permission to access the transaction. 411) What is the Profile? Ans: Profile 's a collection of Authorizations. If profile having more than 150 transaction its automatically generates the new profile. 12) ‘In role how many profiles we have? Ans: 100 profiles for one Activity group (or) Role 13) How to create the Role? Ans: Using T_Code PFCG we create the role. 14)’ What are the major steps while creating role? ‘Ans: Description, Menu, Authorizations, Users. 15) How to trouble shoot the missing authorizations? ‘Ans: Using the T_Code SUS3 we find the missing Authorizations. 16) What js the system trace what is the T_Code for trace? Ans? If we are unable to find the missing authorizations using SUS3. Using STOL we find the missing authorizations. We logon the particular Application server where user exists and enter the STO1, Check the Authorization field and click on the “traceon” button. It displays the missing authorizations and activity. 17) What is the User Information System? Ans: Using SUIM we access the User information like users, authorizations, transaction, profiles, foles, Change documents. 18) What is the Audit Information System? ‘Ans: Using SECR we access the Audit information system. 19) How can I fock a transaction? Why should I lock a transaction? ‘Ans: Use transaction SMO1. Look for the transaction you want and then check the “Locked” box. Because some transactions are “dangerous” and a user without the proper training may accidentally corrupt or destroy the system. 20) How can I see what users are currently fogged on an R/3 system? Ans: Use either transaction SM04 or ALOB. 21) Whats the fastest way to log off in SAPGUI? Ans: Type /NEX at the command field. Notice that this transaction exists without asking for confirmation. Save your work before using it. 22) How do J find information about transaction codes? Ans: Run transaction SE93 to create, edit or display transactions. 23) How can I quickly check if the passwords for the accounts SAP*, DDIC, at does report SAPCPIC and EarlyWatch are not the default ones? RSUSROO3 do? ‘Ans: Run SE38 and execute report RSUSROO3. Report RSUSROO3 fists all logon system settings and It reports if passwords for accounts SAP*, DDIC, SAPCPIC and EARLYWATCH are trivial. That is, the system will report the passwords for those accounts that have not been changed from the delivered ones. This is a handy report ~ SAP auditors frequently ask for it immediately when doing an SAP audit. 24) To prevent the use of common password combinations, a system can be set up to include: Ans: To avoid this problem, populate Table USR40 with forbidden or illegal passwords combinations. Also, as of Web AS 6.10, instance profile parameter to force users enter at least “login/min_password_digits* can be set to a value > one digit in their password. 25) Which of the following are possible ways to display the R/3 Kernel patch of a system? . Ans: Within SAP run SMS1, dlick Release Notes, and then read the line that, cays "Kernel Patch number." At the OS level, change it to the: Ust/sap/sys/exe/run directory and run disp+work ~version or disp+work -V ‘Also, look for the "kernel patch number” line. 26) What is the purpose of T_Codes su24? ‘Ans: Tt displays what are the authorization objects we maintain for particular T-Code. 27) How do you lock mass users? Ans: EWZ5 28) Tell me some important parameters related to security? Ans: rdisp/gui_auto_logout ~- Automatically logout. Login/min_password_ten -~ Minimum Password Length: Login/password_expiration_time ~ Password Expired Time. Lock. Login/fails_to_user_lock - User A Login/fails_to_user_unlock ~ User Unlock. Login/no_automatic_user_sapstar 29) Dangerous Combination of transaction codes? Ans: RZ02, RZ03, SU01, SUO2 30) Important Audit Information Reports? Ans: + RSUSROOS - Default passwords of SAP* and DDIC. + RSUSROOS - List users with critical Authorizations. + RSUSROOG - List the users who are locked due to Incorrect login. + RSUSROO7 - List the users with incorrect data. + RSUSROOB ~ List the users with critical combination of Authorizations and T_Codes. + RSUSRICO ~ List the change documents for users and show changes made to user security. RSUSRIOI ~ List the change dacumants for profiles and shows changes made to security profiles. RSUSR102 ~ List the change document for authorizations and shows changes made to security authorizations. DATABASE 4) What Is the sequence of memory allocation when a user logs on to SAP like Roll, Extended and Heap? Ans: Roll memory is allotted to user (Which stores the user specific information, such as parameters are stored), Once user finishes with a certain transaction, his info’ is rolled -out to roli file & when he needs to use something else again, the data is rolled back in, This Improves efficiency. Once user starts using a transaction, all the processing date fetched from DB is processed In Extended Memory (Which Is shared across riutiple users), but when Ext. Mem gets full, heap memory starts to get used. But the problem with heap memory is It can’t be shared & too much usage of Heap wil lead to Dialog process stopping with error “PRIV mode” 2) What is SGA? Anis: System Global Area. Database uses a memory region known as SGA. This rogion is shared by all background processes. 3) What is a control file? ‘Ans: Control file contains the schema of the Database. To initialize the Data files and online redo Jog files. 4) What is check point? ‘Ans: Check point is the one of the oracle background processes, send the signal to DBWR(Database writer) at check point. It updates the headers of control file and data files. 5) What is a core file? Ans: 6) Which background process writes data to Database? Ans: DBWR (Database Writer) Process writing the data blocks from Data buffer to the Data files. 7) Which Background process writes off line redologs? ‘Ans: LGWR (Log Writer) process writing redolog entries to the from redolog buffers to the online redolog file on disk. 8) What is BRRESTORE? ‘Ans: BRRESTORE is the toll for restore the Database. Restore is the process of the transferring all the data files needed for a recovery from backup media to the server disks. Recovery is the process of setting the database to 2 consistent state using files that were previously restored. 9) How do I backup a database? ‘Ans: You can create a maintenance plan or use the “backup database" SQL statement in Query Analyzer or OSQL. Within SAP, you can use DB13. 10) ABAP Query does not seem to work, what should I do? ‘Ans: It could be that you need to execute report RSAQUMAO to set the release flag. See SAP note 92124 for more information, 11) Can Query Analyzer tell me if there is insufficient disk space to restore a database? ‘Ans: Yes. It will display message (Msg) 3257 indicating that there is not enough disk space to perform the restore. 12) True or False? In order to read developer traces you have to go the in the operating system because SAP does not have a way to do this wi application. Ans: False! SAP provides transaction STL for this purpose. ST11 can even sort the trace files by date and time, 13) True or False? MS-SQL Server can be installed using all the delivered default settings. Everything is controlled within the application, so SAP requires only a database engine to work. ‘Ans: False! MS-SQL Server needs to be configured with binary sort order and 850 multilingual character set, Therefore, using all defauits during a SQL Server installation will not work. The SAP installation program will fa. 14) What is T_Code to access the Business Work Place? Ans: SBWP. 45) How do I logon to a SAPServXx FTP server? ‘Ans: User = ftp; password = fp. 16) How can the logon screen be modified to include informational text, such as the company name, address, the system role, etc.? Ans: As of SAP version 4.6, transaction SE61 can be used to create object ZLOGIN_SCREEN_INFO. Text and icons can be added to messages that can appear at the logon screen. R/3 MONITORING 41. What is the checklist for R/3 Monitoring? B12 ~ Backup logs: Using this T_Code we check the any errors found in the last successful backup. If we find any errors Intimate to the Database administrator. ‘5M51 ~ SAP Servers: Using SM51 we check all the application server are up or not. SMS0 / SMG6 ~ WorkProcess Overview: Using SM50 we check the status of the Work Processes. Whether itis running (or) Waiting (or) lecked by the user. 2, What is the T_Code for active servers and what is the T_Code for displaying the all the servers in the landscape? An: SM21 ~ System Log: Using SM21 we check any error in the R/3. The system Log will record the every thing in R/3 that is Errors, Warnings, and Successful messages. 3. Why u r looking system log? Ans: The system tog is the R/3 system log of events, errors, problems and other system messages. The log is important because unexpected errors or unknown errors and warnings could initiate serious problems. 4, How do I check for errors in R/3? Ans: Rui transaction SM24 for read the System Log. SM37 - Background Job Overview: Using SM37 we check the Background Job Status. Whether it is finished (or) running (or) cancelled. If it is cancelled we analyze the background job log and reschedule it. R/3 administrator need to know when we are running some critical Jobs. $M12 — Lock entries List: Using SM12 we find old lock entries. If we found any Jock entries we contact the particular user and delete the locks. 5. Where u finds the lock entries and locked tables? Ans: SM12 ~ We find the Lock entries. 6. Is the database lock same as SAP lock? ‘Ans: Oracle supports locking on a single database which Is not practical for SAP which involves multiple databases; hence SAP has created its own locking concept which can trigger lock on multiple tables. 7. What are the different types of locks? ‘Ans: Two types ~ Shared & Exclusive Shared ~ One user can write & the other user can read the table. Exclusive ~ Only a particular user can read it, nobody else can access it. ‘M13 ~ Failed Updates: Using SM13 we find the Failed Updates. When the user trying entering the data In the database it Is not saved properly. If we found any failed updates intimate to user where the Error occurred. (In which Module, Program and Transaction). M04 and ALO8: User Li ALO8 we see application server wise logged’ users. With this we prevent the Using SMO4 we see the all the logged users. Using unauthorized users. ‘SP01 - Spool Problem: Using sp01 we check the Spool Problems. SM35 ~ BatchInput Initial Screen: Using SM35 we check what jobs are ready for executing and which jobs will be cancelled by errors. If we find errors Intimate to the users. ‘$122 ~ ABAP Dump Analysis: Using ST22 we find the ABAP dumps what the system generates. We are looking abap dumps of Raise Exceptional errors and Timed out errors. Related to Raise exceptional Errors ABAPers will take care. We are looking into he Timed out errors. If any job execute more than 600ms, the will be terminated and records the Snapshot. 8. What is the ABAP dump directory? ‘Ans: An ABAP dump is generated when a report or transaction terminate as a result of error. The system records the error in the system log and writes snapshot of the Program. We use an ABAP dump to analyze and determine why the error occurred and take corrective action. RZ20 - CCMS Alert Monitor one application server and monitor the all application server that are availabie in the land Scape. Using RZ20 we set threshold vaiues. If it meets criteria it generates the Using RZ20 we find alerts. Using CCMS we fogon on alert. ST03 ~ Workload analysis: Using STO3 We find work load of the system. STO2 ~ Buffer Statistics: Using ST02 We look into the buffer statistics. B02 ~ Database Statistics: Using DBO2 we look the database statistics for table and Indexes and Tablespace information. STO4 — Database Performance analysis: Using STO4 we analyze the Database Performance. ‘ST06 ~ Operating System Alerts: Using STO6 We find the Database alerts, PERFORMANCE TUNING 1. How do you resolve performance issues? Ans: Using ST03, St02, ST06, and.STO4 we find the performance related issues find corrective solutions. In STO3 ~ Workload Analysi ‘Avg.Roll In Time, Avg.Database request Time for particular Jobs. In STO2 ~ Tune Summary of Buffers: we will look for Hitratio and Swaps. If the Swaps and Hitratio's are very high we analyze the detailed analysis. Tt shows details to the Roll Memory, Extended Memory, and Heap Memory. In STO6 ~ 0.5 Alerts: we will look for CPU Utilization Time and Idle time, Load average and Disk with high response. If the CPU time < 20% we are getting look for Avg-Respone Time, Avg.Wait Time, 2 we problems to resolve it. In ST04 ~ DB Performance Analysis: We will look Memory Usage, Buffer Usage, Disk Usage, 1/0 Statistics. Response Time: Starts when the user request enters the dispatcher queue end when the next screen is executed to user. ‘Wait Time: This is the time a user request sit in the dispatcher queue. It starts went the user request is entered in the queue and ends when the request starts being processed. Roll-In Time: The amount of time needed to roll user context information into workprocess. Load Time: The time needed to load from database and generate objects like ABAP source code, CUA and Screen information. Processing Time: Response time minus sur of wait time, DB request time, load time, Enqueue time. Database Request Time: Starts when a DB request is put through to the database Interface ends when the database interface has delivered the result. 2. Where do you check response time in SAP? ‘Ans: Enter T_Code ST03. Here we will see the response time. If the Avg.Response time is very high we will analyze the Transaction Profile, Task Profile and Time Profile. 3. What is the Bottleneck? ‘Ans: Anything which can cause to decrease the performance of the system called Bottleneck, This may be RAM/HDD/Processor/ABAP Program/SQL Statement. 4, What SAP transaction can assist in detecting 1/0 bottlenecks? Ans: Either STO6 or OSO6 cari monitor disk 1/0. These: transactions are very convenient, as you do not have to go to the OS level. On the other hand, tools at the OS level may offer a more detailed analysis (e.g. Performance Monitor in Windows: R/3 MEMORY MANAGEMENT User needs two kinds of memory. 1. R/3 Buffers. (Memory accessible for all users) - Programs, Table and field Definitions, Customizing Tables. 2. User Context. (Memory attached individual users) - Variables, Lists, Internal tables, Administration Data (Authérizations). Local Memory: Local memory is associated with individual workprocesses. Local Memory is Executables, Data, Stack, and Buffer for data transfer, Local roll area, Local Paging area. Shared Memory: Share memory is associated with all the processes of one instance. An R/3 buffer contains global objects for all users and workprocesses such 5 programs and customizing tables. Extended Memory: Contains user context i.e; objects associated with individ. users such as variables, list and Internal tables. Heap Memory: Contains User context, when extended memory is full. It is allo and released on demand. The Six R/3 Memory areas at + Buffers + Extended Memory + Heap Memory = Roll Memory * R/3 Paging Memory + Local workprocess Memory. 1) What is Roll area and Paging area? User context data Is stored. :.e; Authorizations, set/get parameters, Roll Area: Internal Tables, Report lists. which stores application program date that corresponding to specific Paging Area: ABAP Commands. Defines first part of the roll area set to 1. 170kb for 4.6. 2tta/coll_first ~ Ztta/roll_extention ~ User quota for extended memory. Ztta/roll_area~ Total roll area for workprocess. Rdisp/roll_shm — The size of the roll buffers. Rdisp/roll_maxfs — The size of roll buffer and roll file. Em/initial_size_mb ~ the fixed size of extended memory. Em/address_space_mb ~Amount of extended memory for workprocesses. ‘Abap/heap_area_total - Total amount of heap memory allocated to all WP. ‘Abap/heap_area_dia ~ Limit for thie amount of local memory allocated to Dialog WP. ‘Abap/heap_area_nondia - Amount of local memory allocated to non dialog WP. Abap/heaplimits - Maximum heap limit ~ if it is reached the WP is flagged for restart. Heap memory is released after use, After ending the transaction the heap memory is automatically released and the workprocess restarted to release the swap space. 2) In what tables can I find P.O. documents? Purchase Orders are stored in table EKPO and field EBELN. You can also find them in these two tables: EKKO (Purchasing Document Header) EKET (Scheduling Agreement Schedule Lines) UNIX 1, How do you check file systems in UNIX? Ans: 2. How do you check process in UNIX? Ans: 3. What is the command to list of files in UNIX? Ans: 1S, LS -L What is the command to view the Contents of File? Ans: Cat. 5 4. What is the command to copy the file with what permission? Aris: CP. 5. What is the command to find a string in a file? Ans: Grep. 6. What is the command to compare the files in unix? Ans: Diff. 7. What is the command to delete the file, and rename the file, delete directory, creates the directory? ‘Ans: Rim, my, rmdir, mkdir. 8, What is the command to change the file protection? Ans: Chmod. 9. What is the command to get help date and time? ‘Ans: Man, date. 10. What is the command to display the free disk spac ‘Ans: DF. 414, What is the command to print file and print queue? ‘Ans: Lor, Ipaq. 12. Ps ~ef|grep DW, what is DW? Ans: 13. How do you edit file in UNIX? ‘Ans: Open the file in the VI (or) ED.mode and then edit the file. 14, What is NFS mount in UNIX? ‘Ans: Telnet, FTP (File transfer protocol). Interview Questions 1. what are the steps to install SAP? Install OS and load t+2 VGA and LAN diivers after increase the SWAP Fiemiory 3 times of physical RAM and Assign IP addcess. Install Kernet patches and java files Install Dialog and Central Instance (start > programs SAP system setup of C11 > install central and database instance, PARAMETER! Memory _ Number of parallel process Instance number SID. T93 Centrat Transport host Ze Database Name ‘Sap Datat ... up to Data six locations. w a 2. What Is the folder it will ask to Install oracte? Orahomesi path=\oracle 3. How do you allocate disks to different areas in SAP? Diskt, Olsk2 (Raid 1 mia 4 GB) -> winat, Sapacch Disk, Disk 4 (Stulpe Min 4 GB)->swap i Disk $ (Hin 4 GB) Origlag A, Mirror log 8, TRANS bo: Voreist/edtapsiea}Prigiog B, Mirror Log A, SAPREORG: : Disk 7 to Disk 19 (Rald 5 min Total $4 GB each 18 GB) : . Sapdatat, Sapdata2, Sapdata3, up to Sapdatas' ‘ 4. How much Swap memory should be ia the system? ‘Three times of Main Memory at feast 268 4 5. On which system you installed SAP? QAS (Guality? 6. How many types of work process? 7 types (Dialog, Enque, Update, Background, Spool, Message se. Gateway) * S ‘ ~ . 2. What is difference between CENTRAL INSTANCE 2nd OLALOG INSTANCE? Centrat instance have message server installed on it where as Dialog tastence da tor have message server. 8B. How co see the Work Process status? smso OP ‘tor roany types of wiecers you hove coatgured? How do you diferertoce between them? 4 types of printers Production Printing, ass printing, Test printing, Desktop Printir 10. Where printer part (LPT) is running of the systen? Netwerk end Desktop printers FCG, then we generate te profil ater thet Yes, SPAM signi Soles to Users \ ile importing patches from OS level to SAP 3. What are the two files present level? PAT, ATT 4, De you see Sap Notes before applying patches if so what are the two steps in ‘SAP notes that we have to follow the befere the applying patches? 15.00 which system you have applied patches? DEV and QA 2 Giave 00 appted 055 Notes? 17. How many types of client copies and which method do you prefer? 3 types of client copies (Local Client, Remote Client, Client Export) We prefer mainly kemote Client Copy. 18. What is the difference between remote client copy and cltent export? Remote Copy > using RFC connection we will perform remote copy. Client Export > Using TMS configuration we will Perform ctlent export and then we have to Import cllent to capy the cllent ~ STMS has to be created first for doing Client Export. ‘Plow much time tt will take to copy a dient of size 650 6.8 More than 17 hours 20. Do you have faced any problems while connecting to OSS Some time is not connected, some time it requires authentication 24. What is your landscape (how many no of applicatlon servers with production, with specifications (Ram Database, server name) and number of users) ‘Three-system Landscape . 22.No of ws:¥ Braces ZMOrk . 255 (Giots9, Enque, Background, $3001, Update, Message, Gatews 23. What is the fob of Application Server takes the request from the user and if the rege est requires data then i: connects t0 database seever anc gives output ws ANSE is Gfcsonce « Central tasiance and Applicacion Server (Dialog Server) Centeat instance has 2 enexsaye server and work processes BERCei0% serve, ae nerver, having wort, processes. WPS cae the Daily Activac 28 29. 30. u 32, 33. 34 35. i x 36. f 38. 39. 40. 4 4a. Gackground lob Logs, Sp00! Logs, Work Pracesses Overview, Users Over Ai application Secvers active or at, what wil you observe in STOG CPU, S\ZAP, Memory, Hard Disk Space wnat és S103 workload Analysis what is difference between ST06 and STO3 ST06 is OS Monitoring 5703 is used for - Honitor OS and Database and SAP System What will observe in STO2 Hic Ratio and Buffer Fillers and Roll Memory anc Swap Memory What is Table buffer and single record butter What will you observe with respect to butlers Have you configured Operation modes Yes (R204, SM63, RZ03) Where wil you change the paromnaters in tree Profiles? Instance Profile, RZ10 Can yeu change the profile patameter inthe 05 level? Which one is acesabte We'con change te pote parameter from OS level. ts not eecommersded Ue you see the sanie parameter valve in all instance profiles what will you 0 What is Development Class? Wihy to create the Development Class? Group of requests under one logical name is development class. When ever we change in R3 repcsitory It chould be assigned to development class 20: it Internally assigned tc transport layer. I have a created one ABAP program I want te transport. How will you do that? ‘Assign that progzam 10 one transport request and release it. What Is transport domain and what is Target Transport Group T have three Servers and two Application Servers to QAS if T want to tansport to one application server in QAS and.to production system how wilt Jo that How to. create Transport Groups Through STH T have transported one object then how do u know that it has been applied. And if it is nat transported: what vill you 40? How to check that object. is act yet transferred? If the cequest Is not la'the. queue of target system it means it has been. applied. If it Is there the object is net yet applied What is aifference between Transport Layer and Development Class? Yes, it is On-Line Sysiom Service 1198 at which situation will be created the Logan 43,Do you know Logon Groups? Yes, if we find lass or application server then we go for logon groups (if the production depactmen: users ace more then we have to create logon group for that deperdnent) 45. How many no of user nave been connected (> that particular logon group? 100 to 150 users 46. What is the purpose of Siique processor? Enque work pracess mioxes sure that database in ccasistent state AT. you have observes nave ouesfiew? What will you do? Ro 48. What is vour lanascane? 3 System Landseage 49.1f 9 background jot is aborted then what will you do? How to rectify that? 80.What are the staxs ef wack ground job 5 States: + Scheduted + Ready + Released + Active 7 Finished (or) + Cancelled 51. How many background jobs are running in your production system? 52. What is the difference between spool request and print request? 53. Whot is the job of Spoot Werk Process? 54.1f 2 user complaints that he could aot execute some of the transaction codes then what will you do? . Use T-Code SUS3, This will show which authoFization is enssing in his profile SS.Wi v4 -n4 Daity tearsactions? “ALCE, aria, 1, SMI exc, 56.1 there bs performanus prablesn naw will you-snalyee Cie problem? 57. How itt yqu delete tne-locks? 58. = YoU maintained Roles naming conventions? 59. iF gateway process 5 (aiid then can u connect to other R/3? % You can‘t connect to other R/3 System. You can connect to sare R/S. % 60.1How to configure TS? = : 61.tow you transport the request? 62! what is your landscape? 63. What are patches you applied? SAP GASES, SAP_ABAP, SAP-HR, SAP_SO 64. Kernel patches? 85. Proceduce for Appling patches? 66. Did you apply patches from OS level? 67. what are jobs you assigned jobs? 68. what are problems you faced In spool administration? 69. How many profiles Total 3 Profiles * Default 2 Str 2 Instance 70. 1 betvieen Start dnd tnstance Profile? 71.5103 iH 72. Read buffer - write butter a 73.Temse 2 - Temporary €:queatit Object aa 74.5814, 75.5122 { 76. What are the real-time problems you got? 77.Wthat are the transactions you used? 76. What is the Responsibility iw your Company? 79. Operation modes configurations on assigning time table 80: Maintai-jing User Profiles 81. Printer Configurations and Troubleshooting 7 82. Background Job Configuration 63. Applying Packages 65, Documentation for variows task! 56. What is purpose ot Logan Load Ratance? To distributed the workload between application servers 87. Which ¥CODE is using Logon Load Satance? SMLG 88. | am having two application servers the Lagon Load Batance is there; If the User wants to connect £0 apptication server which will connected first Messages server is will assiga the Application server automatically. 89. How do you distribute the foad Depend upon the load, according co module we have to configure Legon groups, 90. How to analysis ABAP dumps? + BY Seeing ABAP dump error we come to know that whether the error belongs to insufficient memory, table space error or ABAP program error oF developer technique. + If belongs to insufficient memory dump error displays at which stage the transaction terminate and how much memory requires. So that we have to increase thé memory (through instance profile) ~ If Belongs to table space error it displays the table name so that we increase the table space through the SAPOBA + If belongs to program error we have analysis the ABAP program through SE30 + ff Belongs to devetaper technique cancel the ABAP program. 91. €ach and every work processor is full even though the user wants to execute the program. Then what's the solution? - + If u don't have setond appitcation server thén we have to cancel the Particular work processor (through SM50) + Iuthave second application server then we have to configure the fogon groups. : 92.At what stages we need to transport the requests Whenever we need the change the objects and ated to transport we'have to perform transports like user request, client transport ete. 93.Mow wo mths anspor? Farough Sie 18 27 or through FTP 24.Wnenever I suppose to start the FINC, The message seiverts staiting, ut the Dispatcher ang Wo-kprecess is unable to start? What could be the problem? atewey Service “ails3, cae you connect to other R/3 Syston? 98.1 applied one Background jab. I want to see the output of the Gackgrou: 96.1 tried to cancel a job with ‘CANCEL ACTIVE jad,” but I got the message “Jot is not active." 1 killed the process in Sf15U, Sut my SH37 is still showing ACTIVE. that can T do to fk this? In St337 > select Job name and us: select job > check status. + Start STHS and double click on the -equest itself, you will see which tye of request it is (Workbench > client independent or Customizing > clic. dependent). + recommend you to import every request on each client without foai!= inside the request. » Bxécute Second screen on the wep ‘97. What are the Background jobs you applied? Checkine the Spoot Lags, Background Job Logs, Client Copies, etc., (SORT OSB Aan + Ifyou double dick a Transfer requirement in SE1O or SEG9 and th Press F4 In the fleld category, you will find some helpful information, + Client dependent or independent transfer requirements include client ‘Spedific or cross dient objects in the change requests. Workbench. objects lke SAPscripts are cllent specific; some entries in customizing, ‘are citent Independent. + If you display the object list for one change request, and then for each object the object attributes, you will find the flag client specific. + Tore object in the task list has this flag on, then that transport will be cllent dependent. ‘+ You can also find a dist of the high-class objects ia SAP; here you will see the flag on/off. Use T-Code SOB}. + Start STMS and double click on the request itself, you will see which type of request It is (Workberich - client independent or Customizing > cltent dependent). 100. Our database server service sap_ is not Starting automatically. We tried to start it manually but itis giving the error “ERRO 1069 the sefvice did not start due (6 logon failure” Is coming. SO we are unable to start the service of dialog instance on our database server. 30 ‘no application server Is running on database server. Whet should we co lor this? - 101. __ Scenario: We are implementing SAP R/3 46C W2000/SQL2C00. 1 created a new client 200 from the system defautt client G6O-on the -— evelopment system. Then logged into 200 with SAP*/Rass and chansed password. Unfortunately I forgot to assign a profile (€.9. SAP_ALL) to SAP~ Thereatter whenever I log on as SAP*, I can't cun any task; with the sysusm reporting that 1 don't have authority to carry‘ovk that task. J.can't.atso, delet the client white logged on into it. Is there any other admin usec mas: could go in with to assign a profile to maintain SAP* or to create anc: master that has administrative rights? How caa I rectify this? An authorization admin or usar adinin can help you to assign profi user including sap system user (© 9. sapt). I don't think you need 02. We recently installed Database Server (4.68,0raite 8.0.6.1.0, WINNT 4.0) with Diaiog Instance. after starting ‘he services on Centraf Instance Bispatcher Is running for sometime and after that It is stoppiny automaticaliy So what could be the problem and how to solve It? 103. We want to defoult the settings In SUO1. When we go to SUDI first time the decimal and date formats are set to diff. formats than what we nec We are maintaining Date as MM/DO/YYYY. But It Is default shows “DD.MM.YYYY" and aso the decimal notation shows diff than what we need. Is there any setting it will defauit to our cwn settings first time of execution SU01 for new users? 104. In ST02 > Extended Memory shows as 99.68%. What could be the Feason? Is there any memory bottleneck? Were should we look to see the details and how to resolve? 7 : 105. Imported a Teansport Request from DEV to QA and QA to ‘production Via STMS from our production system. While import into production was running T got disconnected, The import to preductlon was successful. Now the QA queue stilt shows the truck and when I tr: to Import-a transport from DEV ~ cto QAI receive the message that the Import Is already running. The Import Monitor displays the tast Successful transport (where I got disconnected) with MAIN IMPORT for x2000000% fintshed with Retum code 0. I cannot Import any transports into QA anymore. Is there a way to set the st~tus of the transport queue to “finish* the import? 7 106, neg? the diference between Kemél 4.60 32-bit and Kemel 4.60 ExT -biee 107. ceci aichives exactly they rust download of SAP, to be able to update he Kernel? 108. astatting SAP GATEWAY? 209. “Lem trying to install a QA instance of BW on the same machine as the . Dev instance. I get the foltowirg error ‘Errors Guriog server check; reported : ror "SYSADMIN Rights: Execution Faled™ 110. We want to capy our Client in Production system to QA cifent in DEV “nat are ali the steps involved fa this process? What pre-cautions ace Ks fc:teng hut Remote Cent Copy. First, we Nave to check the TableSpace, Check the Network: €onnection.- IML. 4s thereany-t-code tS Kine how many. times within a. year (or.a-morith atleast) SAP has veen stGp/start: Unebd ie lor Feporting (eidence, beside ‘manual ceport} related to service level to customer. #5 the procedure for applying Patches? First we will download the patches from the Service.sap.chm to Trans Directory. In the Trans Directory exteact the patches using CAR command after that using SPAS we have to import those patches into sap level and apply. 413, Is there a way to trace people's activity back to when the server was put into productiqn? TC STAD and TC STAT 2/3 does not log the history of users activity. Given the size of 8Y3 you she increase drastically the hardware resources for that to be a dala. Instead +9u can simply trace them; to trace you have to put (activate) a trace on wha: you want to trace (S101). ‘And/or you can et the audit profile accordingly to your needs (SI119 and ‘SM20). Be careful on the size of the loy! (S16) On the other-hand thiere are some fags that can show you users specific intervention on the system including thelr own status and change on chat, but not as a “Alm.” To give an example: The report RSUSR200 will show the list of users according to thelr logon date and passviord change. But unless you put trace on a user you will not find a log showing you exactly what it was doing between; for exemple, Monday 10:00 a.m. and Friday 15:00 p.m. 114. How to.make a system copy: CLS=bou: coe ) 1. Take offline backup of both the server (source and target servers} 2. Verify the backup Is successfully done. 3 Run the fellowing command on source system. 2. Lagin as adm b. svemart © Connect internat e 4. Alter database backup controlfile to trace; fe: Ext; © Above command will generate a tre file in foracle/P01/saptrance/usertrace directory. Capy the text from CREATE CONTROLFILE uatit the (;) and paste it in to any new .sal or controtfile.sal file, bh. Copy the controifite.sqt to target systern. i Egle the file-ond replace the entice source SIO to target Si j. Edit the ceuse database command with the set database c = Copy the aft generated during the-backup tle fromthe source sy Target system. (foracle/<510>/sepbacktin) 3. ‘Change the entire source to target . By Only dont change the backup volume name it must be (2rget =yster Copy the above aft file name line from the source back tn tO target log file. 'S. Shutdown the target ¢erver instance. ‘ 6. From this onwards all the command on the target system onty 2. Login a2 3dm 2 Rum the SAPDER €. Select } (Resto-e/Recovery) 9 inand en 50 Select the offline backup, wirich you want +0 restore. 9. It will take some time'to restore. 1. Once the database is restored login as adm and run the i. Svenget J. Connect internat: kK. Startup nomeunt (i! tke database is already mounted shutdown it using the shutdown comvmanc) 1. Run the following command im. @controifite.sal (filz name of the conteol file contains the CREATE CONTROLFILE statement) 9. After the run the above command it should give the “Statement Processed) ©. Alter database oven resetiogs Bs Shutdown Start the database and SAP services using startup. 2. aiter this you have to reconfigure the STM. 8. All the jobs also you hve to reconfigure and reschedule. 9. Reconfigure all the printers. 10. If you want to change the Client number then use the local copy tool and remove the original client after successfully import to new client. 115. Upgrading the kernel on my system to “he latest pateh level? Procedures for updating a kernel patch 1. Download files to focal directory from Sapnet (Sapserv4). 1. Review OSS note 19466 for basic information. 2. Go to www.saptabs.com and fog into "SAP Service Marketplace.” You will need your OSS ID and password. Next, click on “System Admin,” 2nd go to “SAP ealine Corrections.” Finally, navigate to “Download Kemel/Front-end Patches.” . Enter the correct “Product data” * (SAP R/3, 4.58, Kemel Patches), and click on “next page. 4. Enter the correct “Syste:n data” (i.e. SAP Kernel 4.58, Sélaris, Oracle), and click on “next page". 5. Setect all files to download. At this point you can click on “Mark for Downtoad.” Note: You must have SAP Download Manager installed on your workstation. If vou do aot have this, you wil need to load it first. 5. If the status indicates the data Is “lagged for dawnload, click on Oe 2 Glick en rain download basket.” to your i¢ downloaded files {0 the Unix server. Go to Start > rams. reflection > FTP client and Connect to the server. Navigate to /sapsource/donloads and create a new folder as Updates FTP the entire kernel patches to this folder. 3. Telnet into ihe server as agm. Navigate to /sapsource/downloads and remove ai update folders except the 2 most recent ones. 416. 4. ‘Copy the CAR executable file to the new update folder. (i.e Cprust/sap/iSyS/exe/un/CAR /sapsourceldownload/ulUpdates :005 5. Te SAPOSCOL file for-4.58 and 4.6C must be @ 64bit version since ane SS tevel ts 64bI. (Get this fcom Gabit Splerls under 5.60) - see OSS note 19227 6. Navigi ce to the update folder end dincar the files. ( BRARCHIVE.CAR}. 7. You con then delete all of the .car files (ie.: rm *.CAR and cm *.c9-) Back up the exe/run directory by running Jsapsource/scripts/bkup_fites.sh 8. Source: /sapsource/downloads/updates Target: fust/sap//SvS/exe/ran ‘This backup script will copy the fies fom. exe/sua and put 2 ce date extension on them -archive,07022001), Verify that alt (ie files you downloaded were backed up in the exe/run dicectory. 9, Notify users that you will be bringing the system down for approx. »/2 hou 10. Stop R/3 and the database: /export/home/adm. Stopzap__<00> ALL LL.it the sapascol file(s belng replaces, stop the saposcol service Run /sapsourcefscripts/cp_files.sh. Source: /sapsource/downtoads/Updates Target: /ust/sap//S¥S/exe/run “This will copy the files from Updates and put thein in pase/sap/iSYS/exe/cun. 412. Verify that-all the files were copied from the Updates directory xo ‘exe/tia, (Check the file sizes to make sure they match). 13. Check that the be files have ora as the owner except for BRRESTORE 44. check that the be+ files have the correct permissions (-rwsew-r-x)- GRRESTORE should be (-renrw-r-x). Ifthe sticky BIC (5) is aot on, doo “chmod 4755 br*” as user ora to change them. 15.1f SAPOSCOL is being replaced, it must be owned by “root have the sticky bit on. 16. Remove al old backup. ites from the exe/run directory Keeping the latest backup. ing the system back u rtsap_ ALL - 1B.1f the SAPOSCOL (ie Is being replaced, start the SAPOSCOL service. ‘tog into the systent you updsted and erty that it (= OK. as: ne is now available. * 20. Once Sandbox is Completed and it ran for a few days you © updating the landscape, starting at step 11.7). : CAR -xuf and also Jexport/home/adey How to apply Hot Patches? . yee ernload the support packs fram service:sap.com (provides yout ave: 2 login 10) to the usr\sap\trans directory + Open a command prompt and change the directory to usr\sen\cre: Uhpack the support packs using the folowing command: car -xvt CAR (this command unpacks the files that need {0 be imported into ye." SAP instance into the usr\sap\trans'eos\in directory) + Log into client 000 as user OIC + Call transaction SPAM 1 th transaction SPAM, go to mens aption Support Package * Load Packages .) From Application Server. Ix will ask you if Sou wants iat you upiozwea Another screen will appear listing the files that you up! Successfully - Just click on the Back arrow to get back to the SPAM screen, si Ine button, (On the SPAM screen, click on the Olsp-ay/Oefine b A box will appezr with the Support Pac kage categories (Basis, ABA, etc.) Click on the category for the support packages that you uploaded ang it will list them in order. ; + You can apply them individually or the whole list at one time. + To apply individually, select the first one In the list and thea hit the ‘green check mark at the bottom feft of the box. Then on the SPAM screen, go to menu Support Package->Import Queue. + Confirm that you want te import the support package. Once it is done importing, you have to confirm the queve by clicking on the + Confirm Queve button - this will turd the yellow light in the Status area (0 green. Note: Always check your logs after applying support packages by clicking on the Logs button in the SPAM screen. “Step by step (HP) 1, Load the CL containing the patches. 2, Log on to the operating system a: WT: adm UNIX: adm 3. Change to the transport directory. NNT: usr\sap\teans UNIX: Jusr/sap/tcans 4. Unpack the patch archive. NNT: CAR -xvf :\\.CAR UNIX: CAR svt /7.CAR The next step is to:uptead the patch {rom the operating system into 8/3 1. Log on to client 000, under any user that has SAP*-equivalent authorizations. Z ? 2. In the Command field, enter transaction SPAM and choose Eater (or adard menu, choose Tools ABP Workbench Utilities from ths Sr? Mainteny o>: A-Patches) 3. From the mesu bar, choose Patch Upload. : 3 Choose. S 2: Chack that the Support Packages have successfotty uploaded. 6. Chouse Back, vot 2. Select Air Patches 8: Choose Deploy. 9. The patch ts under New Patches. 117 ein oh, HOVE Granted avthorization to a user in order ta be able te access 2 Mle in the cerver. However, when he suns the program that uses the fils and 4 needs.to access Iti he gets a8 ABAP Bump saying that he doesn't have ‘whiat con f do? YF ~ authori ; ’ Tell the user to run transaction SUS3 after the dump. This will'sheve whch authorization Is missing la his profile. 118. To find out all the transaction codes available to each user. How do f do this? Use T-Code S_BCE_68001426 to find out the T-Codes executable tor particular user. we Go to SUIM >> transactions >> Transaction Lists According to Seieciuns User, Profile or Object >> Executable for User >> > ated/released fom & 119. How cai I view the transport requests cr Client after a specific date? Also, can we get the list af transport reque. imported to a specific client after a date as a report? - + To check the transport requests released, you can go to SE. table contents of Table £070. Display in last changed by field fequired uséename and you will see the list of transport released. Table contents can be displayed with transaction SE16 thus avow whole menu structure of SEL1 + Go to S03 > Requests/Tasks > Search for requests/tasks. Go to STMS > Import Overview > Select the import queue and 20. on Import history (CTRL#F7). 120. * How can -focate all locked SAP R/3 users? Is there any ceport that I ‘can cun? + Run Transaction Code SUI0 / EWZS / SUIM + Run Report RSUSRO06 121. ‘What is the message server? 122.” - What is the instance? Spshers Beeset 123. what is the Dispatcher? The data will distribute through the dispatcher to the work processes with equal distetbuti 124. _ What is the difference between SU2# and SU22? SU22 displays and updates the values in tables USOBT and USOBX, while 'SU2¢4 does the same in tables USOBT_C and USOBX_C. _ The,_C stands for Customer. i + The'profite generator yets its data (roi the _C tables. : ~ st the USOBY and USOBK tables the values are the SAP standard Values fg as shown in SU24, j + With SU2s one can (initially) transfer the USOBT values to the USOBT_C 4 table: : a 125. "How SAP Router Works? SAP Router examines any incoming data packets, chacks the route and authorization and then sends them to their specified targets. The parta that sets up the connection specifies the route (lrom SAP Router to SAP Router and to the target). This procedure is known as source routing Lhy cs 235__ Where you use SPAM and SAINT SPAM Is Support Package Administration Hanagement. SAINT Is : : 236. How about auatt Gm ,Sm194j3m29) 237. rece on 0/5 of on Application level 338. If you have problem starting the SAP where will you look - 239. _ Where tc took at the Wela /S-_ Deen cuore 220. How about Memory mamt is there a prosram to be used.at 241. _1byowsee Regia! -t6-stialyze the REO? eck 3a5, Whol ave the alferent tyons of table tullering>ferens Key, nang tab, 322° Te Mier 0. T-Code whore you tan change the pies GE |e 343. How ave you familiar with setting up St¥Ss 249. How you supported Ovk. ji BIap 246. How abou system copies’ ~ 247. How about performance tuning 345, Tow many SAP Instances aré there (Oev, Qa, PRO, Training, etc)? 339, What SAP versions are ir use for each instance? (6.9. 3.11 ate) 330. What release of SAP Kemel for each instance? 31. What's the SAP Hot Package level for each instance? $22: What OS (type and version) is employed pes inet sce? 253. What RDBMS (type and version) 1s employed? ower 4 Aiffcrent systems. 255. Is any hardware available for the-upgrade? L.e. to copy the Dev and Production systems or just 2 copy of Production 256. Which Add-ons are employed (faxing, print scheduling, etc}? 287. Responsibility and tocls used for SAPGUT collout? How many users? 258. Who 's responsible for maintaining authorizations? 259. Was the Profile Generator used to create and develop the Profiles? 260. Is @ Change Management Procedure in place to manage and test transports? 261. Are any other tools other than SAP used to manage transports? If so, please Provide details, 262. Is a tested backup and recovery process in place? : 263. What are the availability requirements per Instance? 264. What is the fongast period of time that the business can operate without the SAP system? : 265. when is the peak processing times? 400. When is financial closing? fDCh 2 | 267. How many interfaces are in'use? 263. How many modifications were made and complexity? 269. How many user exits vere used and complerity? 278: Are any additional languages used? Ust if Yes. 274, “Which SAP modules are used (Induding Industry solutions)? Please also Drovide verston Information. BE few ony ket septs avaligbe? How curent are the test srs? 273. What Is the version of HP- UX-that you are using? - F 224. If the SAP system ts down, where you will stare the Investigaion?D & OX, PYSRaACL, oP 275. What are the different log files that Se do they contain? What are their paths and exact file names? Ts tance damn) ; SUhse 276. | What fs suspending made In SQL server? How do You recover from suspend mode? f 277. What is 16-bit OS and 32-bit OS? Is HP UNIX 16-bit or 32 bit? 278. What is RISC OS and CISC OS? Ts HP_UX Is RISC or CISC and how do you sayz e 279. What Is RAID, logical volumes and volume sets? 7 . 280. | What is the locking snechanism that SQL2000 uses? And what is the one that ‘most recent ROBMS.s uses? - 281. What is the procedure for making system refrest? 282: What is a logical unit of work in the view of SAP »nd in the view of ROBMS? 283. . How do you check the version of the kemel Inf the OS? How do you check the version of tp, 23T¢ans, RALoad what fs the exact cotamand? K@mak-~+ FLSP + oan +> st ate applying Hot Packages, you havé defined a queue and-white app | nave faced an error. How will you proceed thea?” - . 205. Is i occsible to defete the teanaaedleloge Ate tt the OS (SQt server)? amplive tan 52 ott 9 vou create cle to ‘ve onlyshe-deptoy access to tHGaape.© CIM% In PUES 721. What is the profile parameter that decides the location of the TemSe awse\ ‘database? oe : are the different services related to SAP that uns on the OS? Hors do ayer Check in HP_UX if that services are running? SPOSCOY, SAREE D> 2E)- What is the use of making test run before client copy? DR, si Ah 329. How to ceaate printer? How many access methods? Device types? q Oiffecess WP? What are Eaque WP and BG WP2, fies ove there? 2 5 Fo fertend cpp. geese 19 a's * Baers in vaix S > Ramole Sys 6A wt nde AD wt 4 aa YAK 19, ATS, barcoding, taxation, PEL Hess couny types of p: 293. When a user complaint that the system is very slow how will you proceed! to investigate? Anche? Joy SUCK, PteP Rosey 298. What is tne disadvantage of cunning the ent copy in dialogue mode? Yells P /y 295. Daily system monitoring checklists T-Code? hap _engy 296. How to add backup yomaln controle? u 297. How.do L-set up a crnnection to OSS? Contact a local network service provider to establish a physical connection te the SAP support network and obtain an official IP address. Then, contact SAP, by phone of Ir writing, to Fequest an OSS connection. The appropriate form, Remote . Connection ata Sheet, can be found in the OSS Windows help file. A detailed answer to this question Is covered in the training unit establishing a Remote Connection to SAP. 298. How do I get an OSS user 10? Contact SAP to request an OSS user 10 is required. The appropriate form, OSS. User Registration, can be found in the OSS Windows hieip vite. 299. How Secure is an OSS cofnection? ‘An OSS connection can be made completely secure with a combination of @ Correctly configured hardware router and the SAProuter program. This is an application level gateway program, and ts configured so that only connections to or from predefined IP addresses on predefined port aumbers will be accepted. A fully.detalled answer to this question Is covered In the training unit “Establishing a Remote Connection to SAP.” a 300. What happens if my problem gets no response ‘rom SAP? First, make certain that you have actually sent the problem to’SAP! It is not Uncommon for new OSS users to create a problem note, and then forget to click on the Send to SAP button. Simply creating a note In’ OSS does not mean thet ‘SAP will process the problem. You have to explicitly send us the note. SAP should only be contacted If, after having searching the notes database, you have ‘not found an apprapriate solution. Remember that many problems can ¢ {ten resolved by simply searching the OSS database. These types of probiems do ot need to be Sent to SAP for resolution. Finally, if you have seat a problem. to. ‘SAP ead have not received a reply, perhaps you toaged it with too low a priority. 301. Can T reopen a problem note? Yes. Over viewing Remote Services Online Service System (OSS) 302. What if I get too many notes proposed as solutions? a Try to rustrict your searelcriteria. Always be 25-specific as possible to avoid this -pcoblem...For Instance, searching under the-tecm “Business area” will recurn-over 1500 notes! 303. Oo I have to c-eate a note to. search for solutions? No. You can.perfo-m a search of the notes database without creating 2 probler note. 308. Do ail problem notes have to be sent to SAP? No. If you can :'nd an applicable note in the database that resolves the prob! 2m there is no need to send the problem to SAP. Even if you did send the note tu SAP, the problem resolver wauld very likely attach the ncte already contained i the dafabase as 2 solution to the problem, yur focal sugsiatary. 306. Do I have 24-hyur-a-dey access to OSS? Yes. OSS is available (or users 24-hours a day, seven days a wee’, Only priority 1 problems will receive an after-hours response. all other problenis are handied during normat office hours. Occasionally, OSS will have to be sivut down for ‘maintenance or ypgrades. This normally only happens during the weekends, and You will always have price warning. 397. Can you run background processing with a loiwer priority than online activity? There is no way to specify a tower priority for.background processing than for online processing, aor would this have any effect In a-distributed ceat/server environment. However, online processing és normally input-output (1/0) intensive that is, the memory provided by the operating system is not utilized, due to Waiting for the 1/0. These processes are assigned a higher priority by the operating system than processes that fully utilize thele time slice, such as-jobs where no rolling occurs. As a resuti, uniine processing will have a defacto higher Priority. If you have a distributed system, one possible solution would be to rot! all of the background processing to one server, while online activities run on other servers. * 308. “Can Dreserve background work processes for Individual applications-or users? No, Reservation ts only possible for fob Class A. > 309. Can 1 assign priorities (Job classes) tn the function modules “JOB_OPEN,” “J0B_SUBMIT” and “}0B_CLOSE?” No. If Class A or B Jobs must be autoitiatically scheduled, schedule a fob of the required class and set It to start pertodically. 319. Can T influence the priority of the fobs; regardless of the Job class? In distributed systems with 2 well-designed distribution on tl. servers see OSS. ‘note 24092. - S11, Can t save fob logs in the database (analogously to the spool)? = There is no such option in the standard. 312. What happens if the background work process needs to be suiltched Bnd a job 'S running in that work process? - ‘the instance kernel waits for the job to finish befe"e the background work Process Is switched to an alternate type. Jobs are never terminated b.: the System to make way for cn op-mode switch. 343 Ces job definitions be transported into wher clients ur systems Ko. Job definitions contein zystem specific aaesmeters ((Or example, T3rGet host, User, Program, eneration mpde, and SO on). Therefore, ft would not make sense 0 develope teanst0"t tos. fo: sentar feasons, copying a job across clients is, Det a foreseen task.-the foliowing trick, However, IS posstble: A user, who has jot faministrates authorizations, 1o9s cn to the target client, The user enters £2nsaction SM37, so that eti jobs in all clients are displayed and with the Job CoPY option copies a jad tram a source client (only steps, no start time). Does the usc: receive 9 massage if the job is cancelled? ra 315. How can I set a periodic job to be deteted after a maximum walting time? For example: A fob is to run every 15 minutes alter 08:00 hours. Autornatic dele! on will be applicable for each of these jobs, ifthe jab has to walt more than 20 minutes for execution. ‘Schiedule the fob wit} the following pararieters + Start time 08:00 hours + No start after 08:20 hours + Period 15 minutes For eactr fob, adjust che earliest and latest start time by 15 minutes. 316. How cam set a pertodic Job to no longer run as of a certpin date? ‘This optic Is not provided in the standard system. It can, however, be easily implemented with the function modules *JO8_OPEN,““JOB_SUBMIT,” and "30B_CLOSE" (see OSS note 4751). . 317; Where'are system parameters defined? ‘System parameters aie defiried and stored: + Inthe coding. + In the default profile, where the default profile overwrites the setting from coding. + In the instance profile, where the Instance profile overwrites the settings in the coding and the defautt profile. + As of release 3.0, some parameters can be changed dynamically, during syster: operation. 3 j 318. _ Are all system patameters fisted in the profiles? ty Many parameters do not nornially require changes and are therefore defind only in the code. Thus parameters exist that are not iisted in the default profité or instance jrofile. . 319. How can system parameters be displayed? You can display the parameters as follows: + Call up the report RSPFPAR using transaction SE38 to display the paramieters for the instance-on which you are currently logged on. When you double-clickon the corresponding line, the origin of the current Value appears. + Use transaction 7402 to display the attive parameters. + _On the operating system level, you car-display.the parameters using ssapipar 320. Should the profites for each instance Be delindd individually, oF is it better to “have a common profile of them? ‘The instance profiles ace managed centrally, stored ia the dicectory: Windows NT: \\\sapmunt\\sys\profile Unix: /ust/sap///SYS/pratile ‘Therefore, several lastances can access the same profile, Ia some cases, instance profiles must be individually maintained, because each system needs individuct settings of the system parameters. In particular it applies: : If different hardware is used for the Instances If the applications are different (For example, Flan ane instance and PP an another) U different code pages acevused (for example, West European, Cyrillic, ve Japanese) For te database server + Simplified maintenance Lower rate of ersaes . 321. What is TRANSPORT OOMATN? A transport domain comprises all SA? Systems Jointly administrated through the TMS (domain cantrolter) 322. What is TRANSPORT GROUP? Group of SAP systems, which are having common transport directory. 323. How do you configure the THS? You must define which R/3 Systems in the system landscape shouts be combined in a transport domata and which R/3 System is to be the transport domain - controtler 324. What are the TRANSPORT ROUTES? A route between any 2 SAP systems In a land scape. Can be a consolidation or delivery path. CONSOLIDATION ~ between development and quality DELIVERY ~ from quality to production 325. “How do you do the transports? The transport routes are used to define in which target system you want to consolidate and deliver change requests. : Teénsport request will be released In the source system and are’ imported ta the. destination system. ae SEO9 and SE10 are used to release the Transport reouest ‘STMS ~ used to import the request. 18 OS level use program tp. + $78t@x ~ tp Import clientXXX ux a 326.- What will happen during the export process? Files will be created in the OS level in the transport directory Ru - data files K."- control fites Transport directory ~ ust/sap/trans/data usr/sap/teans/cafiles if St 201! Happen duriag the import process? Gata wiii' + unported in to the database. Get in to uss/sap/trans/bin Syotax ~ iy import “eSTD> clientXX ux 328. What types of files are-erazied dulag the export? : Run data fites Wo contrat ites 329. What era the problems usually occurs during the transport and what are the return codes? 0 ~suce 4 waerings S - cevor (- different tyes of ector transport? 351. Diff between cemote client copy and cl 352. What are client settings? 353. What is client copy? 354. Off between local client copy and emote client copy? 355. I aiy errors coming ducing transport where it will be eecorded and t you rectify? Transport fog and active tog 356. Buffer monitoring? 11 book 608 page 357. Table space creation - 783 358. What is the link between ‘oles profites and prejects? 359. What is 4coo? 360. Gack up and cestore procedure? 361. What is the purpose of archive and how do u da that? 362. What is client? 363. Define authorization ot roles and authorization of profiles? 364, What are STO1, 02, 0:, 04, and 05 how do you monitor? 365. What are the workben h organizer and customizing organizer in transport” 366. How will check the space directly? - 367. SM42 and SM13 368. How do you check the application server? 369. Installation steps? 370, What is the default fite for TMS? 371. What T-Codes are used to monitor the pectormance? 372. User says yesterday they could use some transaction where as today they are ‘not what will you do? 373. * How will you add the T-Code? 374. How CUA works? 375. What are the bast T-Codes you are using cegularty?, 5 376. What is the commin storage fie for oracle? 377. How do you lock a dient? OS level tock and SAP level lack. Get in to SCC4 and delete the client, which has to be locked. Basically what it does Is it will just delete the entry from TO00 table ' where as all the data’s and taformation’s will be majntained. Before deteting we have to just remember the settings to get it back. Just create the same,in SCCL. If you really want to delete the dient then use SCC7. 378. How do you estimate the cllent size? Have a test run using SCL. This will run 2 background program RSCLXCOP. sec the end of the spool. There u can see the “storage required” from that we can have rough idea. e - 373, aint update? 380. ll the support package updates you have done? Ser. ‘af abjects you have archived? 382. What Is the difference between a spool request and a print request? A Spool Request containg which data Is to be printed and how this data should be printed: A Prieit Request is the translation of a spool request into a language chat che printer understands. 382. Can I print a spool request more than once? Yes, SAP stores {ne spool request. You Can create print requests fromm this 5900! fequest as many tienes 95 you wish. To do this, use ransaction $962 ar cheese System >> wa Spool Requests. 7 spool work process processes the print data Into 9 g.-Intable vata stream. ine cable data is transfered <0 31 ypeccting System spooler. This then forwards tne data to the printer. 385. Can { configure more than one spool wark process for each Instance? As of SAP Basis 4.0, you com configure more than one spool work process:for ‘ch instance. 386, Can I switch other work processes to spoot work processes without restarting the instance? No. The internal structure of spool work processes Is ciferent from, for example, diatog work processes. Therefore, if you want to chanve the number of spoot work processes, you must da this in the context of SAP profile maintenance (transaction R210) and then restart the instance. S37 Where can I create printers in the SAP system? in the SAP system, printers are created in transaction SPAD. In the SAP Easy hecess Menu, choose Tools >> CCMS >> Spool >> Spool Administration. 388. _ What is a device type? sedeyice type is a printer driver. Using the device type, the spool work process can Generate a data stream that the printer understands - Induding appropriate ‘ESCAPE sequences. For an overview of the device types supported by SAP, see SAP Note 8928. 209." What is a spool server? A spool server Is an SAP instance with spool! work processes. An Instance of this type Can process spool deta into print data. 390. * What are logical spool servers used for? Logical spool servers are afias names for either reat spol servets or for other loglcat'spool servers. Using fogical spool servers offers you three advantages: Ala sp00l Server is down, another spool server can automatically take on its 0ck, You can configure a distribution of the spool workicad over all available spoo! You can create » complex: nrinivr landscape in the-test system and then transport 5:40 the productiga seers. crothe production system, only the logical spoot servers are adjustec. 2° not nacessary to adjust the Individual printer ens ons What is 9 access mathod? 7 {te Dees» -od deakcisies the say in stich a-sp0BF Work process is connected ‘onerating system spooler Tinere are two different cases: Lecat Access = Wve SOE mrs srocess ad Remiote sess 300 IE SPOR! wore process addressas an operating spooler that is aot on its focal £05 the operating spooler on its “ocal host Fae gateway server (GW cr G) allows communication between K/2, R/2 anu external application systems. . 339. What type of security problems you will get? 240. What are the profiles that are maintaned in the R3 system? Instance profile, start profile and default profile. 341, Telt some profite paraineter that you have maintained? Feisp/max_wprun_time 342. Do you know about éperation modes? how do you define operation modes? 5M63, RZ04 343. What is response time? Time taken for single daloave step. . , 344, What is roll in-and roll out? The memory management system'differentiates between main memory aceas that are avaliable exclusively to a work process, and memory areas that can be used by all work processes. The memory space used exclusively by a work ~process stores session-spectic data that must be kept longer than the duration of 2 work step, This data Is automatically made available to the process at the start of a dialog step (rotled-in) and saved at the end of the dizlog’step (rolled-out). ‘This data characterizes users (user context), such as thelr authorizations, . jadministration information and additional data for the ABAP and diatog processor. {Also'it contalns data collected by the system in the precediag dialog steps tn the Jrunining transaction (see following slide). Additional memory areas used by ali Jorocesses In shared memory include areas for the factory calendar, screen, table, ‘and program buffers. 345. What are vi and v2? ee : ‘URD: Update process for making V1 (time-critical) database changes UP2: Update process for executing V2 (not time-critical) database changes The update process can be performed in several steps. The time-critical part of an update ls called 2 V1 update; the non-time-critical part a V2 update. An example of 2.2 update Is the creation of statistical business’ data: When using transaction SM13 for V1 updates, we do not recommend “posting” of ‘epeating the transaction. > Hen update error occurs, first solve the croblém that caused the error. Then fester the transaction. Waviw successful but the V2 update aborts, we recommend that you vse transe-ticn 513 to post the aborted V2 update. ci Hf you use the System administration Assistant for. your daily system checks, it Provides you wath direct accozs to tanaection SPT. f you do-when spa6l process fails? 242. How 83 Systems are communicated? at ‘What are central user ad: istration and its uses? How do set the alert monitors? R220. (CCHS Monitoring) Oiff between SMSO and S66? 330. How do you configure transport profile? ing transport control program requires a transport profile that contains «fyormatlon about establishing the database connection for ail U3 Srecemns in the tr abort domain. THS generates ang manages this transport profile sea part of the transport domain configuration. You do not have to adjuct ihe transport Profile usirig operating system functions. 331, What is the R3 system startup and shutdown process? _ BIS" database will start and then messaging server at last dispatcher wit staee and It will connect with the messaging server, 332. How do you do the Load Balancing? . SY configuring the logon groups. Logon group is a group of application seevers 735, q\hat will you do when you cannot login to a dialog server? Eft chack whether the services are eunning in the server Check ditferent log files in'the OS and database fever 334. How do you extend the table space? ‘Through SAPOBA. 335, , What wall you do when there Is a performance issue? Check wither any tong running jobs are there Check for deaidiocks SMI2 locks. - Health of the database D802 and 0801, St04, Si150 336; How-do you. handle the lock entries? Coton te ek entries over 24 hours old, they must be investigate (Please follow the steps below for investigate the focis), by double cick on the procéss, which is over 24 hes old (this is often by the date). c 2 7 Lek for the HOST NAME; and WORK PROCESS. 4- Goto Susi . questeget the Server, wich has the lock, and look forthe work process in question. $7 H the process fs still active 00 NOT REMOVE EROM.SM12, 7 - IF the. pracess ts.00-longer active, REMOVE FHE LOCK FROM SH412 © 397... Hovi do-vou handle tie vadate foinanes> oe a é 3 a z § 2 © ic a © sen SerOF Occurs, the eck table entry is deleted, bull the entries ive main 2eles 2Fe not deleted. The user is notified inumediately by ant eeave se mail. Depending on the business dato abject, the entry may be cepeetes 9, You can update the database asyachronously using ABAP key ess (ra serstion «fa update task. 19 special cases only, yO can nine noun Gatabase synclironously inside a disieg service (tive is else update) 1a 0 392. 15 eheve a workload distaib:tion mechanism fr the creation of pink requests? Tf you use logical spool servers, you can activate 9 workload distribution mechanism. The mechanism takes into account the number of spool worl: processes for each Instance and the curreit length of thé spoot wait queue, It also estimates the size of the spool requests waiting for processing 393. Can I transport crinter settings? ‘Yes. Transaction SPAD provides 2 transport connection ir the overview of output devices. Note that the printer definitions In the target system must be reworked, if the definition contains real spool servers. 394. How can L use the default printer at my work center computer? The administeator must set up a printer with the access method “Fin the system. For more Information about this, see the relevant sections of the ‘34° ontine documentation. If the user selects this printer, he or she can choost: any printer that is-defined on his or her work center computer during the creation of 3 Spool request. In most cases, the default printer Is chosen. 395. How many default clients are there In development, testing and production systems? 396." “Apart from R3 whet other components exposures do you nave? 397. How will you connect the tape drive and explain? 398. What are all the beckup types and what Is backup cycle? : 399. How will you add a file in the database level? 400. Database structure? 401. Have you used semgrt In databace side? 402. Installation types how you do It? . 403. TCODES related to security? : 404. Diff detween Roles and Profiles? 405. What authorization needs to be given for a guy who is in basis side?’ 406. Explain WP types and ts functionality? 407. Performance tuning? 403. Will you create additional instatces of two diferent SAP servers on 2 Single machine? (Windows N¥/Oracle)? *"” : 409." See from which network IP address anid host name a user has logged on? Call trans ction 0504, click “Presentation Server™ button, “Change View" button. 410. No System name and transaction code in SMOS Ifyou have more than,one application server, uSe ALOB instead of SHO4. Or because they are at the logon screen, which has-established 2 Caniection. You will-notice that the transaction cade showin when (7 Js oo user came-ts ‘SESSION_MANAGER. This shows-you which workstations out th ‘ot yet entered a user name and password. ‘The transaction column shows the Last executed transaction code. Sometimes your users will have multiple sessions open. If they do, to the system, itis the same as multiple logins as it relates to the resources us: So the user narn? will show up more than ence in ALOB. Under the application server they are logged into, each instance of thet user fame on that application server represents a session open. + For instance if you un ALOB, you will have your name shov up 2t | the application server you are fogaeé into One will show ALOD and the other wil! not have a transaction nevi CS 2 have the fogin screen up but nave - Daily Routine Jobs - B12 Check that daily backups executed without errors SMS4 All sap application servers are up 51450 ‘Alt work processor or started or not sai Check the system logs (Errors, Warnings, Security Messages, Database Problems) 2.08 / SMO4 To check the active users on the system sPO1 Check for the spoot problems: - 5435 Chack job logs (new Job, incorrect job) sre ABAP dumps (Program Errors, Insufficient Memory, Table Space Errors, Developer Technique) Workload Analysis Background Jobs (Check for all critical fobs) - Database - D324 Monitor, Logs 6313" Planning, Archive ~ Cost-based optimizer - OB13 Statistics update # SAP.Adminiatration ~ S137. Active Jobs ; S402 | System message to ait : sim userlist SSAA System Administration Agent 220” Computer Center Maniagement System (CMS) RE04 Operations Mode esd Instances Control Panel, Server statuses User maintenance + Command Prompt Admi SAPCHECK - Check of SaP-Systems SRZEFPAR - Profite-Checi 2» commands te SAPPFPAR DEV_OVEBHGSOO check (Sa? Level Parameter RSPEPAR) SA2MIMC- Sap Mananement ronsole (Gisplay profiles, response times, ..) Starting Procedure - Profiles: ~ Start_duchmss00 sig . wm we € @ e Se How to do client copy? How to do transports'from OS level? Where the transport data files will be placed? > How to make security authorization reports? {in which table failed user login altempts will be there? How to see the t able entry values? How you will give new authorizations? Have you participated in Kernel upgrading and OCS Patches? Have you done any up gradations? How to configure TMS? 2 ‘What is transport domain? What is Consolidation route and delivery routes? How you wil identify them? ‘Transport error codes and their description? The transaction should not be cisplayed in User Easy access menu but he must execute that transaction how to do that? iteicome to the exciting world of SAP RU BASIS. The term BASIS (foundation). E:nomisnomer. All application modules of an SAP RIS system are integrated using the BASIS technology and comprise of four major areas, Application administration: ABAP, Secu, Correction and Transport System, Implementation guide, Workflow, SAPOitice, external interface configuration, upgrades etc. are some of the major sub-areas, a) » Database administration: database interface, space management, Performance, capacity planning, upgrades. Ra Operating System administration: OS and SAP kernel, cortnunication, disk, memory. printers etc. * ¥ » hfrastructure administration such as hardvare, network planning, high “Svailability, archiving, language support 2 + 2 Automatic CTS Even though SAP does not recommend automatic imports, itis the most practic: ‘way of moving transports from a development system toa QA environment or to special development system (although I wouldn't recommend auto imports to 2 production system for obvious reasons). There are various methods for doing this. The most effective and simple method is using an OS script (shell/perl etc.) scheculed using cron for user sidadm. There are a couple of steps you need to take before setting up automatic imports. 1. Your entire project team should agree upon the overall strategy, frequency of imports, 2. Resolve any issues with transport approvals (many shops don't care about traffic between DEV and QA) 3. Who is responsible for watching for errors and corrective actions (an email to the developer works in this ease) Configuring outbound SAP to internet mait Gateway (R/3 4.0 and above) Step 4 (UNIX SETUP) _ Logon to your as sidadm Change directory to /sapmnU/SiD/global (or any directory globally available across all application servers) Greate the following entries in file SAP_EMAIL_GATEWAY.sh and save the file ‘Hibinishs GWCONFIG=/sapmnY/SID/gioba/SAP_EMAIL_GATEWAY.cfg ‘export GWCONFIG. ssapmnvSID/exelmlunxsnd S* Execute ihe command: silosmadm SAP_EMAIL_ GATEWAY. cfg (onter.the: following information) ss ‘System name : SID Client: 200 Usemame : MAILADM Password : inilpass Language : E Loadbalancing : ¥ Message Server : adm. : Startsap starts the saposcol process, which is the statistics collector for Operating system resource data, if-it is:not yet running, ~startsap Calls thé script startdb, which starts the database if it is not already started. + Startsap then starts the central instance. + The R/3 System administrator can start additional.instances and. application servers. To start the instances independently of the database, use the script startsap. + startsap has the following options + startsap 3: Checks if the database is running; if it is, only the instance is started + startsap db: Starts only the database + startsap all: Default entry; starts both the database and the R/3 instance @ In what sequence are profile parameter read? R/3 processes read the appropriate parameters from a C source in the 8/3 kernel The default profile /usr/sap//SYS/profile/DEFAULT.PFL is read; profile values already defined in the C source are replaced with the values in the default profile The instance profile /ust/sap//SYS/profile/__ i $ read; profile values already defined in the default profile or in the C source are replaced with the values defined in the instance profile This procedure ensures that system parameter values reflect the instance profile and the values in the default profile and the C source. What are the step involved before stopping R/3 system? Before stopping any R/3 system following steps are basic steps to be performed. Before the R/3 System is stopped, the R/3 System administrator should check the: Check if any background jobs from any application server are active or have been triggered externally. Use transaction, SM37 Check if the background work process BTC is running in any application server. Check if any update records are open when the system is stopped, the records are rolled back and set to status init. At startup, the records are processed agai The administzstor must decide whether to interrupt the jobs or wait until they are finished. Give system users advance warning of the system shutdown. To create a system message, you can. use transaction SMOZ. Sei _re shutting down the system, use transaction SMO to check whethor users are still logged on, and ask them to log off. The R/3 System administrator and administrators of external systems should also inform one another about data transfers between their respective systems. How do you checkthe work process from UNIX? Use the following commands. » To check ali the work processes: pS -ef | grep | grep dw To check the message server: ps -ef | grep | grep ms To check the SAP OS collector: Ps -ef | grep sapos How do you display the server name? To display the server name, use transaction SM51. Information about the process types is also displayed. For further information, select one of the instances and choose Processes. Alternatively, to display the system processes, use transaction SM66. How do you display all active users in your system? To display the overview of all active users on the instance where you are logged on, use transaction SMO4. For a user overview of the whole system, call transaction ALO. Performance Analysis Q. What happens to locks when the enqueue server is restarted? A. If they have not been saved to disk in the backup file, they will be lost. The locks that are inherited by the update task when COMMIT WORK is executed after CALL FUNCTION .. IN UPDATE TASK are saved to the disk. The jocks are.saved to.disk when.the update request becomes valid, that is, with the COMMIT. WORK. Each time the enqueue server is restarted, the tock entries saved on the disk are reloaded to the lock table: A tock 1s saved to disk at the point at which the backup flag is set. Q. The enqueue server is a single-point-of-failure in the SAP System. Can I guarantee high availability for the Enqueue Server? A. To guarantee this you must use the standalone Enqueue Server with the Replication Server. This is described in the documentation Standalone Enqueue Server. SAP note 524816 contains the prerequisites that must be fulfilled for using the standalone Enqueue Servers with the Replication Server. Q. Where is the lock table stored? A. In the main memory (shared memory) of the enqueue server: Ail work processes on the enqueue server has access to the table. External application servers execute their lock operations in the enqueue process on the enqueue server. Communication in this case takes place via the relevant dispatchers and the message server. Q. Can locks exist directly after startup? A. Yes, the saved locks, which were inherited by the update task, are reloaded to the lock table during startup (see first question). Q. How fast are lock operations? A. In work processes on the enqueue server, a few 100 microseconds. In work processes of external application servers you have to include network communications and process changes. Depending on CPU and network load this amounts to a few milliseconds. Q. What should X do first if @ problem arises? A. Use the diagnosis functions: - sm12_Ey:ras “3 Diagnosis and then sm42 Extras. @.Diagnosis in‘ update Tra problem is reported, back up the trace files dev; dev_di dev .2q* and check the-Systog. eT a wi Q. The following message is displayed in the diagnosis details in SM12: Lock management operation mode Internal lock management in same process What does this message mean and what are the other options? . "Internal lock management in same work process” in the diagnosis function means that you are logged onto the enqueue server and your work process can access the lock table straight away. You do not have to delegate enqueue requests to an enqueue process on a remote enqueue server. If you are logged onto an application server that is not an enqueue server, the diagnosis function will provide you with the name of the enqueue server. Each SAP System has exactly one application server that functions as an enqueue server. This enqueue server maintains the lock table, which is located in a shared memory segment. All of the work processes on the enqueue server can access the lock table. AN! work processes on other application servers delegate their enqueue requests toa special enqueue work process on the enqueue server. This procedure is configured automatically. The parameter line “rdisp/enqname =" in the default profile DEFAULT.PFL indicates which application server is currently acting as the enqueue server. When an application server detects that its name matches the name of the enqueue server, it creates the lock table and all of its work processes process enqueue requests inline. If an application server detects that its name does not match the name of the enqueue server, it Sends all enqueue requests to the enqueue server. Work processes of the type “enqueue”. guarantee thet ineamings =o. reqansts.are processed immedistély. One enqueue process-is- ustially- sufficient. 11 very Jarge SAP Systems with many application servers, a second process can be beneficial. However, it is not expedient to define more than two enqueue processes. If the transaction SMSO -> [CPU] shows that only the first enqueue process is being used, the bottleneck is due to something else. Q.Why is an enqueue work process required in a central system? Don't all work processes have the same access to the shared memory and thus to the lock table? A. Although the enqueue process is not used in a central system, it does not do any harm. Since almost all customers install an application server sooner or later, problems will inevitably arise if the enqueue process is missing. For this reason, the enqueue diagnosis function will output an error if an enqueue process has not been configured. Q. Are the locks in the lock table also set at the database level? If not, database functions could be used to process objects locked in the SAP system. A. Locks are not set on the database. The lock table is stored in the main memory of the enqueue server. Q. Is a lock table built if am enqueue work process is not Started on the enqueue server in the instance profile? A. Yes, because the work processes on the enqueue server use the lock table directly, and not via the enqueue process. The latter is only responsible for lock requests from external application servers. Q.How can I find out who is currently holding the ungranted lock? In other words, how can check the program after an ENQUEUE to determine which use is currently holding the lock so that I can fet him or her know? A. When the ENQUEUE. the lock owner is listed in SY-MSGV1. Q. Can Tuse special characters in my lock argument (especially the ‘at’ sign (@))? A. Fox ‘at’ symbol is used as a wildcard in SAP locks (enqueues): Ia. other words, it can stand for any.other chatactar darinig collision — checks. For exa the parameter vi ‘Value-12345@ 10¢cks the ‘quantities 42345400" 123457, and 12345A to 123452, and all other values with any special character in the 6th character position This is dzscribed in detail in the section Lock Collisions: In order to prevent the wildcard mechanism from being activated in SAP locks when it is not required, you need to ensure when enqueue function modules are called that key value parameters do not contain any wildcard characters. Ifkey values that you want to use to lock individual entities do contain wildcard characters, you have to replace the wildcards with different characters before the enqueue is called. ina 2f@ common wsckground jobs tat wil can in your system? fa background job runs ‘more than the time it should be completed normally then what actions will u take? {iow '0 Schedule background jobs at OS level? pit 19 add authorizations, how you wil marin profiles? TyLat are common transport exe and thew wenn HiansPort request types and its syniae “Where will u fing {transport error togs? How to do transport at OS level? {How fo transport objects from Production to Development? Hout 10 define instances and operalion posees What are Homogenous system copy ard Heterogeneous system copy and how you will do that? al is oracle Architecture? 40S level in which ccectory oracle alerts are stored? K ent i hat will You do itu got Update failure? at ill you observe in System log (sm21)? arlous tease tables space, resizing, backups and ‘when will you do? Various client copy methods and how you will do them? {How you wil get help from OSS netesy {Howto login in to SAP trom command ect? . 24! sere Logon groups? And what e Logon load balancing? "*ste your self in SAP, Oracte from a scale 1 — 10% siient copy fast? {ital ate various profiles avaitable fr client copy? Natt '0 do tanspor's between Production nog Developme? How to apply OCS Patches? What are you roles and responsibilities in your company? 2 O What is ASAP? [san old term for an implementation strategy, Blueprint -> prototype -> goLive (if you Want to say it in one sentence). ty for Printing say lke use, teamlead, project manager? How should I set pri There's nothing like "priority" settings for spool processes. Just define more (profile Parameter rdisp/wp_no_spool) processes so people don't need to wait Using Te SGEN I have generated 74% job and later I have terminated the job. T wish to start generating from where it stopped I have refreshed but to no chance nothing was done. How should I further proceed so as to complete the remaining job.. Start SGEN again and select the same you have selected before. It will popup and ack if You want to start from scratch or generate the just the remaining. Whatis your system tandscape? ‘What are you roles and responsibilities in your company? What are versions of SAP & R/3, Oracle you are using? Patch numbers of SAP kemel & Oracle you are using Ia user wants to execute a background job immediately but there is no Background work process available. How u will do? What is common House keeping background jobs that run in your system? What are common transpoct errors u faced while transporting? How you will do cilent copy? I SAP * user is not available at alin your system then how u will do client, copy. mig aemte ere How trwith mo ~~ What s the: database backup stfategy in your company? ‘What is upgrade process? And how u will do that? How u will give new authorizations? How to adjust user. master records? if user master record doesn’t adjust what will! <- you do? ° z How to check Kernel, tp versions? : Briefly explain a recent problem you faced, which u felt proud by solving that? ‘And ho u solved? How you will rate your self in SAP, Oracle from a scale 1-10? What are your daily activities in your company? What are you roles and responsibilities in your company? T would like (9 know the version or ‘aime of SAP that is implemented in reat time? (his is @ very generic question and really ‘epends on what you are implementing (modutes) ‘The history of the *R/3" is 3.0D Basis 300 3.08 Basis 300 3.0F Basis 300 3.1H Basis 310 3. Basis 310 4.0B Basis 400 ASB Basis 459 4.6C Basis 460 4.71 Basis 6.20 sewione S3sfems that ina contract, a MySAP ‘business suite consist of -RM2605, SRM2005). cd fo. implement SAP.. ie for FeFVErs the harddisk space, RAN, Processor Your are implementing how many uset vit wk ci how many ecards in what are are created oon 2nd Fond BIG database systin and an even bigger ‘pplication server for ~ 900 users and 12 languages. Spa) 4 After doing any Support Package update in SPAM, are there any further steps 10 © eff carry out for this update to No, they are active immediately. *-- Markus What is the use of profile paramater 2tta/roll area? The value specifies the size of the roll area in bytes. The roll area is one of several memory areas, which satisfies the user requests of user programs. For technical reasons, however, the first 250 KB or scraf'a user context are always stored in the roll area, further data up tothe roll area limit 2ta/oll_first, ~ in the extended memory, up tothe lirait2ta/oll_extension or ifextended memory is exhausted, then again in the roll area, until the roll area is “ull, then ~ inthe local process area, up to the limit abap/heap area_dia or abap/heap,_area_total or until the address space or the swap space is exhausted. Followed by termination with errors like STORAGE_PARAMETERS_WRONG_SET an error code, that points to memory bottleneck Minimum data transfer with context change: however, the increase helps to avoid problems (address space, swap space, operating system paging)... *.Anupam Sharma basis version? ions jon in the system environment ~ Defines a stable architecture framework for system enhancements ~ Contains the tools for administering the entre system = Allows the distri sources and system components. ~ Browides: lized system parts and external product ‘AMR/ instance isa group of R/ services that are started and stopped asa unit (by an PV3 dispatcher) and have a common instance profile. The name of an R/3 instance fe composed of letters standing for the relevant services, and an instance number which is unique for each computer. The services may be D, V, E, B, M, G, or S, which respectively stand for dialogue, update, enqueue, background, message, gateway, and spool services. ‘What is Transport domain and Domain controller? TD: is the collection of transport controller, trans directory and all other systems in the: group. TC: A system which will have trans directory, and in which the total landscape is designed and maintained. in stms you can see all these. *~- Suncel What are SNOTES ? How to apply them in SAP ? ‘The name of the transaction is SNOTE. A “note" in general isa hint, documentation, ‘error/bug description and may contain code corrections, that are applied with the ‘tansaction SNOTE. What is OSS 2 OSS is the old name of the nowadays "sapnet" which contains everything you need to run’ SAP 2 program, patches, installation/upgrade documentation etc. What are different modules used like EP, XI, CRM BW, etc? ‘Those are not different modules but different products. EP= Enterprise Portal XI= Exchange Infrastructure (CRM = Customer Relationship Management BW = Business Warehouse (that is the old term), its now call BI (Business Intelligence) What is the correct use of SPAM, SAINT, SPAD.and SPDD transactions. When should we use each? SPAS hr installing support packages, SAINT is used to install new addons. SPAD is for cera peimets (Lassume you met SPAU) and SPDD is Tor adjusting modification ‘twdietionary objects... bit; 10 update Support Release packages from OS level? ‘0 - you can import them but the full process will require additional steps the tools "tp" and "R3trans" are not aware of. The way is to use SPAM - but SPAM has the possibilty to schedule those imports in the background. © ~ a a ' ‘What is th difference between Sap lock and database lock? ‘ A U*SAP lock” is named “enqueue lock", the enqueue is on a much higher level, e, ga complete sales document is locked there whereas in the datbase usually only row locks exist. Since SAP runs on more database than Oracle (thanx god) one necded to havea mechanism, that is database independent and on a higher level What is the diff between elients 000 and 001? Client 000 isthe SAP source clint, client O01 exists only on cetin installations (e.g solution Manages). *-- Markus ° 1 would like to know is there anyway to transport roles from Production to a Development or Sandbox.» Goto PECG and enter the role which you want to transfer to other system. goto utilities- 7 Mass download it will ack the path where to download/sav that role on local desktop, give the location and save it. Next logon tothe system where you want that particulas a role. ‘ PECG> Role > upload. st Give the path where the rote is saved. it acepts and generates successfully. *-- Mahesh What is the need of having Development system? Jo develop and custamizé SAP to companies requirement. sy if you dont have DEV, { afer go live(started using SAP (PRD}) if you want to do some changes to application, ‘a You cannot do changes direcily io PRD server, which may cause problem the PRD server i Ene date. s0 yout do the required changes on DEV first and test them on QAS, ifit wack, anspor the same toPRD. Difference between Application server and Central Instance? 4°.) ASsIsjust 9 didlog instance. : Cir ts Dialog instance + Database Instance. TOP ae ead gy DEMON.EXE, SMS0.EXE PS-EF.EXE What is Hot site backup? {dentical copy of the Production database on a stand-by database host. Backing up the database completely in the production site, A terminology used for regular backup, Backing up an Informix databace. 9. SAPSWEEP/delregkeys command: Will remove entire SAP Instances. Will uninstall SAPGUI and moves the files to recycle bin. Will uninstall SAP Instances and the corresponding cegistry keys. Will remove SAPGUI files and their entries from the registry. 10. What is transport group? A group of objects that is available readily for transportation A Group of SAP systems which are having common transport directory, —~ A group of change request tasks and obj A roup of systems on which transport management system is configured, UL. What is an access method? A method that is used to access the application servers. A method that allows access to SAP sereens, A method that restricts user access to SAP systems, ‘A method that specifies the role of the spool device, 12. Can wereserve a background work processes for individual applications or users: “AL D0. Reservation is nly possible for jobs Cass A. —— by ee. Work Processes can'be received for cetain applications 6) Reservation of work processes can be done only by SAP support personnel d) Reservation can be done, if the dialog processes are more than 15, 13. Whats the use of matting test run before client copy? To know the time that the process require. To identify the list of files that the process is copying. Fo Hind whether the volume has the required space to perform the elient copy. To find the authorization data intonnation, 14. What is SPAM used for? To resitict the Spam mails in the SAP system. 12install Support packages isan inbuilt Anti Virus sean engine, SQe! (Security Project Adminisinaive Maintenanes) used by the administstors to Festrict changes to tine 1S. Whatis Logon group? A Eroup of application servers, Fue OUP that was assigned toa set of People for easy identification, rite ative users group on an applicaine server, None of the above, doa USE calls and reports to you that bie jaykeround job is faking tong time, and which normally {foes not take so much time. What wives a) Ask the user ») Advice the u 1 background job, : © Check the status of the hack, {he job log and provide him the status.” * 4) Advice him to add all the Auhonzaions required to execute the background re 17. Which transport route will be Created, ifthe architecture is a two system architecture: Delivery route. domain route Consolidated route, _/ ‘Two system Transport route, 18. What isthe rote ofS Teode? po, The functional peopte in Mark Solutions will be performing tasks that Fequire more time to Process. Now, the functional people are experiencing “timed out” error message and cannot pert HY task. How you wit resoive the issue? goa Rezonnend the fanctiona users 0 schedule ita 2 huckyround job ad increase dhe sum of background work processes Recommend the project manager o perform the Increase the rdisp/max_wprun_time parameter value Disable the rdisp/time_out_mess parameter by settitg the value to 0. ts that require more (ime in the night time, 21. How (0 restriet access to a transaction for all the users? Remove access fiom their respective profiles using PFCG transaction, Remove access using SMOI transaction Mail them a list of transaction codes thaf they should access. Not possible in SAP to restrict a single transaction, Or F—”—r—“—O~™~™OC—CC—”—C—C~C the fast 3 Information) ets Who haven’t logged in.” Which ABAP report can be sed to ge da information? RSUSR200 RSUSR100 RSURSO03 RSUSROOS 23. Ifthe filed UFLAG in table USRO2 reflits value “64”, what does it mean? User account is 64 days ofd User password will expire in 64 days User account has been locked. Useris a Super user. 24. tp locksys DEV pf= ) Lock the transport domain controller. £) Leck the Development system and will not allow any user to login ‘o Lock the Development activities on the DéVélopmicit server 7 Fock the transport profile on the DEV system. = 25. Potential destructive tesig willbe done on? Development server Testing servey Sandbor Quality system 26. The difference between ALOB, SMO4 transactions is? @) ALOG is productive from 4.7EE and SMO4 is available from 3.0. ») Both are same 9 splays aetiv, lication server. © ALOB splays REC & Dialog user SMSEES OW all he app servers and Shing SNDIYS the tetive ser one the and SMO4 disptays CPIC usoys only. 27. tp count dev win? siting for import, 28. Toitsidsap fit is used to? Configure the sap Configure the bac Configure the Sip, His just a log file a systems befor kup device an implementing SAP. d the type." of the SAP system, ‘allable in the Kernel directory, 29. R3trans—» option wins Beeeute the control fle that war mentioned Delete the control fite 30. SM36wiz transaction win? are eteated automatically ‘round job wizard, 2) Display the Operatio n mode wizard help, ive'a etzor message, 31. What is the rote of COLLECTOR Fe a) Fis th t PERF “MANCEMONITOR background Job? SAPOSCOL.-~ ed by SAP Performance system, ice of tie datahase stingiatianenscarees eae ut the ore MCC OF he SAR yr 20 shutdowns the SAP sycicas hen, Mie titeshota— managed by? iatubase activities. what is EAP? ERP stands for Enterprise Resource Planning Enterprise Resource Planning systems inlagrate al data and processes of an ‘organization into unified system, The koy feature of an ERP syctom i it uses a single or unlied databace-ta store dala lor the various eystam modula Vatious Modules which comes under ERP ae listed below: Manutacturing ‘Supply Chain Financiats crM Human Resources Warehouse management What are the advantages and disadvaftages of ERP system? Major Advantages of ERP. Various modules are well integrated in ERP system. If there is no ERP, we may need to develop many software applications that do not talk each other and do nct effectively interface. But in ERP the problem is solved by , Ingograting al tho modules ofthe business. ERP provides advanced secury features compared to other software applications. These security features protects data both Irom insider crime and Oulsider crime. ‘Major Disadvantages of ERP: [Re enginadring of businoss process to tl the “industry standard” presciibedby the ERP systom may lead ta a loss of competitive advantage. ERP systems can be very expensive to install. ‘What is the difference between USOBX_C and USOBT_C? What is the difference between USOBX_C and USOBT_c? The table USOBX_C defines which authorization checks are to be performed within a transaction and which not (despite suthorty-check command programmed ) This table also determines which on ches ks. are maintained in the Profile Generator. pyect which defount Duthorization abject should Rave-in the Profte Generator What is signiicant of Composite Role Why we should go with Composite Roe)? What are the processes going on OS level while Transporting? What all are the areas we need to check, i Transporting is not happening? Now to scheduled a background [obin OS level” VIIS300 SAP Security Interview Questions @. SAP Security T-codes A Frequently used secunty Fcedes SUCH Cheater Choiige User PCG taoaneaun Ro! M1 Create/ Chane User SUOLD Display User SUIM Reports 5101 Trace '5US3 Authorization analysis: Click here for all Security T-codes Q List few security Tables Click here for security tables Q How to create users? Execute transaction SUO} and fill in all the field. When creating a new user, you must enter an initial password for that user on the Logon data tab. All other data is optional. Click here for Aurotial on creating sap userid Q What is the difference betweén USOBX_C and USOBT_C? ‘The table USOBX_C defines which authorization checks are to be performed within a transaction and which not (despite authority-check command programmed ). This table also determines which authorization checks are maintained in the Prafile Generator, ‘The table USOBT_C defines for each transaction and for each authorization object which default values an authorization created fram the authorization object should have in the Profile Generator. Q What authorization are required to create ahd inaintain user master records? ‘The following authorization objects are required to create and maintain user master records: ‘+ S_USER_GRP: User Master Maintenance: Assign user groups ‘+ SLUSER_PRO: User Master Maintenance: Assign authorization profile ‘+ S_USER_AUT: User Master Maintenance: Create and maintain authorizations. Q List R/3 User Types 3. Systemn users are not capable of interaction and are used to perform certain system activities, such as background processing, ALE, Workflow, and s0 on. 4. AReference user is, ike 3 System user, 2 general, non-personally related, user. ‘Additional authorizations can be assigned within the system using a reference user. A reference user for additional rights can be assigned for every user in the Roves tab. QWhat is a derived rote? Derived re'es reter to sotes that already exist. The derived roles inherit the menu structure and the functions inciuded (transactions, ceports, Web links, and so on) fer the ole referenced, A role can only inherit menus and functions if no transaction codes have been assigned to it before. +The higher-level role passes on its authorizations to the derived role as defaurt values winich can be changed! afterwards. Organizational level definitions are not passed of They must be created anew in the inhenting role, User assignments are nok passed cet either. + Derived roles are an elegant way of maintaining roles that do not differ in their functionatty (xienticot menus and identical wansactions) but have different characteristics with regard to the organizational level, Follow this tink fer more info Qwhatis a composite role? & composite role is @ container which can collect severai different roles. For reasens of clarity, it does not make sense and is therefore not allowed to add composite roles to composite roles. Composite roles are also called roles, Composite roles do not contain authorization data. f you want xo change the authorizations (that are represented by a composite role), you must maintain the dota for each role of the composite role Creating composite roles makes sense if some of your employees need authorizations from several roles. Instead of adding each user separately to each role required, you {an set up a composite role and assign the users fo that group, The users assigned to a composite role are automaticaly assigned to the corresponding (elementary) roles during comparison. Follow the link to learn mors @. What docs the different color light mean in profile generator? a Unmaintained Organitzizéonal Levet FEI) some autnorizaton Fels Have Masing Values WRG 9 ausrosication ride Have Values Assigned . What are the different tabs in PECG? a Q What does user compare do? f you are also using the role to generate authorization profiles, then you should note thot the generated profile fs not entered in the user m been compared. You can sutomate this b daily aster record until the user master records have y scheduling report FCG TItie_DEPENDENCY on @ rization field to Org, field A. Autherization felt con tve changed ty Organization fet using PFCG ORGFIELD CREATE ur ZPECG, ORGFIELD. CREATE Use SE38 oF SA3H to Hun the above report + Orgaaiationotfeve’ tields should anly be created vefore you start Setting up your system If ou ereate orvjaris.tionat love Hse fates. vou might have t0 do on menace Th ENLIrALION ra may have to be pastprocessed in roles &s + he fields “Activity”, "ACTYT" and “Transaction code", “TCD* cannot be converted into en brganizational level eld, In addition, all affected roles are enalyzed and the authorization data is adjusted. The values of ze autnonazetion field which Is now to become the organizational level feld are removed and entered into the ocganizational level data of the role. Note: Table fer Org Element: USORG Refer to Note 323817 for more detail . How many profiles can be assigned to any user master record. A. Maximum Profiles that can be assigned to any user is ~ 312. Table USROA (Profile assignments for users). This table contains both information on the change status of a user and also the hat of the profile names that were assigned to the user The field PROFS is used for saving the change flag (C = user was created, M = user was changed), and the name of the profiles assigned to the user. The feld is defined with a length st 3750 characters. Since the first two characters are intended for the change flag, 3748 charactors remain for the list ofthe profile names per user. Because of the maximum length of 12 characters per Profile name, this results in a maximum number of 312 profiles per user Q. Can you add a composite role to another composite role? A. No Q. How to reset SAP* password from oracie database. ‘A, Logon to_your database with orasid as user id and run this sql delete from sapSID.usrO2 where bname="SAP™" and mandt= OX commit: Where mandt is the elient. Now you can login to the client using sap* and password pass . What is differance between role and profi A-A role act as container that coiléct transaction and genérates the associated profile. The profile ‘generator (PFCG) in SAP System automatically generates the corresponding authorization profile, Developer used to perform this step manually before PECG was introduced bySAD. Any mamtersnce of the generated pi afte should be done using PFCG. contaring aif aumnonzators For “ser Smith togy-on tothe ‘2ystemn his user bubler contains at authorizations of rte USER. SMITH ROLE. The exer Bulle coe be displayed in transaction SUS6. A user would (ail an authorization check if: +The authorization object des not exist in the user buffer + The values checked by the application are not assigned to the authorization abject in the user buffer + The user butter contains toe man user buffer can be controlied using the system profile parameter auth/aumber_in_userbutter y entries and has overflowed. The number of entries in ths Q. How to find out all rotes with T-code Suo1? 8. You can use SUIM = eles by comptes triteria oF RSUSRO70 to find out this 6 t0 the Selection by Authsrization Value, “Object 1 put §_TCODE 273 hit enter. 27 put SUDY in Transactic~ code ond hit executs Use authorization object, 25 you can use this to t tock with cheek) button any object. levif you have access to SEL6 or SEIGN. Ex You con 2150 get this information directly from tabl SEI6N Table AGR_2251 Object 5_TCODE VALUE (low) SUOL Q. How to find out all theusers whe got Suos > A. You can use SUIM > User by complex criteria or (RSUSROD2) to find this out. Go to the Selection by Authorization Value. In Object 1 put $_TCODE ant hit ehter ‘And put SU01 in Transaction code and hit execute (clack with check) button | use authorization abject, as you can use this to test any objact, & How to find out all the roles for one composite rote or a selection of composite roles? AL Execute SELGN ‘able ACR AGRS Compete oles You can put multiple compost oles Using the more bustnka il & How to find out all the derived roles for one or more Master (Parent) roles? AL Execute SEIGN Table AGR_DEFINE 0 Use either egr_name feld or Parent_agr field. . How can I check all the Organization value For any role? AL Exeute SEL6N. Table ‘AGR_1252 . Role... -. Fype'n-the sole here anct-hit execute. XOU.can always download lithe ttorinatl to Srila aa Ging . How do I restrict access to files through ALLA? A Rist create an alias, Go to tcode ALLI > configure > create alias. Let say we are trying to Skstrct alas DIR_TEMP which is /tmp. Open PFCG and assign t-code ALL, and change'the authorization for 3_DATASET as mentioned below Activity 33 Physica fle name —_/tmp/* Program Name with Search Hel Q. How ca Tadd one “ole to many users? A. SURE, Iyou Mave tons than 16 User by complex criteria. Put the userid of user who is having issue. Execute Double click on the user ld. and expand the tree. Select the profile in question and see if the authorization is correct or not. If not do the role reorg in PFCG and see if that helps. Q. How can f have a display all oles. 1: Copy sap_all and open the role and change the activity to 03 and 08 Q. How can F find out all actvt in sap? A. All possible activities (ACTVT) are stored in table TACT (transaction SM30), and also the vatid {activites for each authorization object can be found in table TACTZ (transaction SE16). Profile Parameters for Logon ‘To make the parameters globally effective in an SAP System (system profile parameters), set them la the default system profile DEFAULT.PFL: However, to make them instance Specific, you must set them in the profiles of each application server in your SAP System: To display the documentation for one of the parameters, choose Tools >> COMS>> Configuration >> Profile Maintenance (transaction RZ10), speciy the parameter name ‘and choose Display. “Password cheeks Fines the minimum number of digits (O- 3) In passwords. faut value: [osin/min password letters (A-2) in passwords [befautt value: 0; permissible values: 0 ~ 8| wallable as of SAP Web AS 6.10 | jogin/inin password specials \Sefines the minimuin nwinber of Special lcnaracters. in the password Permissible Ispecial characters are ()!\"@ i IY V()= 7" 49K : Detauit value: 0; permissible values: 0 ~ 8 i available as of SAP Web AS 6.10 i iDefines the minimum number of aracters tnt must te iftevent i the Fosinfenin pass Jogin/passwordexpiration time jogin/password_change for SSO jogin(aisable password loge: Jogin/pascword_logon usergroup Le Multiple Logon jogin/disable_maltl_gui login jogin anai_login_vsers Incorrect Logon os tee fo season L —_ {eain/iils_fo_user_fock [gliaied use pa came Initia! Password: Limited Validity ® d compared to the Pew passwor' hasswora PPefauitvatue: =: permissible val e321 ~ Javailable as of SAP Web AS 6.10 “Defines the velity period of pa {eoys. fault value: 2; permissible values: any | wumerical vat AP Basis 4.6 by Support Packag ‘onirals the ceactivation of passin jaced logon for user groups eae rece || /AP Basis 4.6 by Support Packaae. planation ‘ontrols the deaclivation of muitipre dias ar jogons, Wwailable as of SAP Basis 4.6 ist of excepted users (multiple logon) y default, the lock applies until midnight fbetauie value= :2; permissipie values: 1 unsuccessful lezon attempts shout be | ufomati."y remBved at micoigh= i efault value: > Leck jales on on serve planation — - Detine Tilty ead OF jas oct ___ BAP Basis 4.6 by Support Package efines the validity period of reset jasswords, \vallable as of SAP Web AS 6.10, as of JAP Basis 4.6 by Support Package “Explanation llows af 1ocks the logon using SSO ticket. wailable a5 of SAP Bass 4.60, a8 of SAP asi 4.0 by, Support Package _ lows the creation of SSO tickets. Wwailable as of SAP Basis 4.60, ,efines the validity period of an SSO ket. wailable as of SAP Basis 4.60 foginfeket_nly_by_hitos re fogon Uicket is only transferred using rTTP(S}, wallable a5 of SAP Basis 4.60. ain cKet_only_fo host nen fogaing on over HTTP(S), Sends the icket only to the server that created the ick. wailable as of SAP Basis 4.60 jogin/accept_ss02_ticket Vereate_ss02_ticket jogin/icket_expration tine Other Login Parameters: efines the maximum idle time fora user} ‘rdisp/aui_auto logout In seconds (applies only for SAP GUI Learn more about this effects different user tyoe You can find ail users who have access to create or change users using SUIM Execute Transaction SUIM Go to - Users by Complex Selection Criteria > eoport RSUSROD2 using SASH oF SEI Users by Complen Selection Criteria or you could run 'e query. There are couple of other authorization © Fill in the screen as shown below, and execute th as welt SLUSER_AGR, S_USER GRP and ‘5_USER-PRO} you might want to ch Selelion iain 8 ne 7 Entry values: in SAP Business Information Warehouse? ‘and task-relevant information models based on fon they need to carry out their tasks, These contain otes, workbooks, queries, tnfoSources, Infecubes, key Fules and extractors for SAP R/3, mySAP.com business Appliestions hqures, characteristics, update ond other selected applications, . What is IDEs? 2 International Demonstration an Education System. A sample application provided for faxter learning and implementation 9. What is SAP R/32 * A tite dener2ton ct of hightyintenrated software modules that pevTorms conten busines hunction based on uuthinational leading pact’. Takes vie of any enlerpioe hence sievatinn wad eve the work, hv RFS syste the tee saves Ike Pacsentaie ee Q. What are presentation, application and database servers in SAP R/3? {A The application layer of an R/3 System is made up of the application servers ang the message server. Application programs in an R/3 System are run on application servers. The appiication servers communicate with the presentation components, the database, and also with each other, Using the message server. Allthe data are stared ina centralized server, This server is called database server Q. What shout be the approzch for writing a BDC program? A. Convers the legacy system data to a flat file and convert flat fle into Internal table. Transfer the flat Me into sap system called "sap data transfer". Call transaction(Wnite the program explicitly) or create sessions (sessions are created and processed ,if success data will transfer). Q. What are the major benefits of reporting with BW over R/3? Q. Would it be sufficient just to Web-enable R/3 Reports? A, Performance — Heavy reporting along with regular OLTP transactions can produce a tot cf foad bboth on the R/3 and the database (cp, memory, disks, etc). Just take a look at the load put on. your system during a month end, quafter end, oF year-end — now imagine that occurring even more frequently. Data analysis ~ BWV uses 9 Data Warehouse and OLAP concepts for storing ard ‘nalyzing data, where R/3 was designed for transaction processing. With a lot of work you can get the same analysis out of RY3 but mast likely would be easier from a BW. (Q. What is the difference between OLAP and Data Mining? ‘A. OLAP - On line Analytical processing is a reporting tool configured to understand your database. Schema, composition facts. and dimensions. By simple point-n-clicking, a user can run any number of canned or user-designed reports without having to Know anything of SQL or the schema. Because. Of tat prior configuration, the OLAP egine “builds” and executes the appropriate SQL. Mining is to build the application to specialty look at detailed analyses, often algorithmic; even more often. ‘misappropriate called “reporting. Q. what is “extended Star Schema” and how did itemerge? ‘A. The Star Schema consists of the Dimension Tables and the Fact Table. the :.sster Data related tables are kept in separate tables, which has reference to the characteristics i the dimension ables). These separate tables for master data Is termed as the Extended Star Schema. Q. Define Meta data; Master data and Transaction data ‘A.Sata Data: Data that describes the structure of data or MetaObjects Is calleg Metadata, Jn other words dae about dats i known as Weta Dat, Master Dat: Master datas dato tht remains Q. What is Bex? A. Bex stands for Business Explorer. Bex enables end user ta locate reports, view reports, analyze information and can execute queries. The queries in workbook can be saved to there respective roles in the Bex browser. Bex has the following components: Bex Browser, Bex analyzer, Bex Map, Bex Web. Q. What are variables? - 1A Variables are parameters of a query that are set in the parameter query definition and ace sot filled with values until the queries are inserted into workbooks. There are dilferent types of vanabies which are usect in efferent application: Characteristics variables, Hierarchies and hierarchy node, Texts, Formulas, Processing types, User entry/Defauit type, Replacement Path, @. what is AwB?. What is its purpose? AA. AWB stands for Administratar WorkBanch. AVi8 is 2 tool for controlling, monitoring and maintaining all the processes connected with data staging and processing in the business Information warehousing, Q. What is the significance of 00S in BIW? fan ODS Object serves ta store consolidated and & tomic level). It describes » consolidated datasec fram ane or more InfoSourees. This dataset can be analyzed with a BEx Query oF InfoSet Query. The data of an ODS Object can be undated with 2 Selta update into InfoCubes andor other ODS Objects in the same system or across systems. 1a contrast to multidimensional data storage with infeCubes, the data in ODS Objects is stored in Transparent, lat database tables. ig9ed transaction data cn a document level Q. What is Extractor? A. Extractors 1s a data retrieval mechanisms in the SAP source system. Which can fil the extract Structure of a data source with the data from the SAP source system datasets, The extractor may be able to supply data to more fields than exlstin the extract structure. 2. How do I change the name of master / parent role keeping the name of derived/child fole same? I would like to Keep the name of derived /child role same and also the profile associated with the child roles. 2. First copy the master role using PFCG to a role with new name you wish to have. Then you have {to generate the role. Now open each derived role and delete the menu. Once the menus are removed it will let you put new inheritance. You can put the name of the new master role you Created. This will help you Keep the same derived role name and alsa the same profle namie. Once ‘the new roles are done you can transport it. The transport automatically includes the Parent roles. What is the difference between € (Check) and U (Unmaintained)? A. Background: Sinen defining authorizations using Profile Generator, the table USOBX_C defines which authorization checks should occur within a transaction and which authorization checks should be ‘maintained in the PG. You determine the authorization checks that con be maintained in the PG using Check Indicators. tis a Check Table for Table USOBT.C. In USOBX.C there are 4 Check Indicators =(CM (Check/maintain) = An authority check Is carried out against this object. = The PG creates an authorization for this object and field values are displayed for changing. ~ Default values for this authorization can be maintained. © (eheck E ani sere tT i field values are not displayed. ~ Ne_lefault values Can be maintained tor this aumortzation. 1H (No check) “The authority check against this object is disable. = The PG does aot create an authorization for this object, so fleld values are nt displayed. No default values can be maintained for this authorization. 1B (Unenaintained) No check indicator is set. [An authority check is always carved out against this object: ‘The PG does not ereate an authorization for this object, s0 Feld vahyes ave not displayed No detauit values can be maintained for this authorization. @. What does user compare do? 2. Comparing the user master” Thi is Basically updating profile wformation isto user master reLon ‘ansactions contained i the menu tree of their ries, Mere So that users are allowed to execte th 1 ecord aust contain the pratie for the coveespanding rales, Sow cin start the wscr Compare prow ss Hone within the Pratile Generator (User tab wind Us Snare pasbbulten), Av resull of te cumace on, tne profile generated by the: Prlile Gere. iene ants the oer weston second Mees cater seat ed pote: greet sty Ue nes ake Q SEiered manual in transaction ‘sett Whe sta record (using transaction SUDA, for example)! During the automatic user compare process (wit report pfcq_time. dependency, for example), generated profiles are removed from the user iF they do not belong to the roles that are assigned to the user TF you assign roles to users for a limited period of time only, you must perform a comparison a: beginning and at the end of the validity period, You are recommended ta schedule the backgre 2 job pfeg._ time dependency in such cases Q. Can wildcards be used in authorizations? A. Authorization values may contain wildcards; however, the system ignores everything after t=2 wildcard. Therefore, A*B is the same as A* Q. What does the PFCG_TIME_DEPENDENCY clean up? [A The ‘PFCG_TIME_DEPENDENCY’ background report only cleans up the profiles (that is, i doe Clean up the foles ih the system). Alternatively, you may use transaction ‘PFUD' Q. What happens to change documents when they are transported to the production system? |A. Change documents cannot be displayed in transaction ‘SUIM’ alter they are transported to tn: production system because we do not have the ‘befor input’ method for the transport. This means that if charges are made, the ‘USRIO' table fs filed with the current values and writes the old values to the 'USH1O' table beforehand. The difference between both tables is then calculated snc the value for the change documents is determined as a result. However, this does not work when change documents are transported to the produiction system. The ‘USR1O’ table Is automatically filed with the current values for the transport and there is no option fer filling the "USHO" table in. advance (for thé history) because we da not have a befor input’ method to fill the "USH0" table ix ‘advance for the transport. Q. What is the difference between the table buffer and the user buffer? A The table buffers are In the shared memory. Buffering the tables increases perforrnance when ‘accessing the data records conta- ed In the table. Table buffers and table entries are lgnored during Startup. A user buffer is a buffer from which thé data of a user master record is loaded when the user fogs on. The user buffer has different setting options with regard to the 'auth/new_buffering’ parameter. Q-What does the Profile Generator do? + “a ‘The Pole Generator creates fla. portant chat suable user oes, and pot press ore The system Sheu enter Wie elles tor thie. user. 'Q. How many authorizations ft Into a profile? AJ Amaximum of 150 authorization fi into a profile. If the number of authorizations exceed this ‘marker, the Profile Generator will automatically create more profiles for the role. A profile name consists of twelve (12) characters and the first ten (10) may be changed when generated for &: fest time, Q. What authorization objects are needed for PFCG? R/3 Security- Authorization object for Transport and PFCG B SAP Transport Authorization To release Task ‘S_TRANSPRT ACIVT=#3, 03, 75 TIVPE=TASK Other type:CiCP client Transports CUST Customizing Requests DTRA Workbench Requests, MOVE Relocation transports PATC Preliminary Corrections and Deliveries PIEC Piece ists TASK Tasks TRAN Transport of copies S_DATASET PROGRAM=SAPLSTRF, SAPLSLOG ACTYT=34 FILENAME=* To release Customizing Requests S_TRANSPRT ACTVT=43, 03, 75 ‘S_DATASET Authorization object needed for PFCG access S_USER_AGR ACT_GROUP=* (You can restrict by role, if proper naming convention Is used) ACTVT=01, 02,.03, 64 other felts helaw OF Create or Generate BE Cate 5 DIARY crsng dciments 21 Transport 22. Enter, Include, Assign 36 Extended maintenance 59 Distribute 64 Generate 68 Mode! 78. Assign 79 Assign Role to Camposies Role DL Downioad "Upload S_USER_GRP class= ACTVT=22; 03 Other acenvity 0s Dep Os tee _ @ ‘A. To guarantee this you must use the standalone Enqueve Server with the Replication Server. is described in the documentation Standalone Enqueue Server, SAP note 524816 contains the prerequisites that must be fulilled for using the standalone Enquess Servers with the Replication Server. 5 @. Where is the lock table stored? A. In the main " in the default profile DEFAULT.PFL indicates which application server is currently acting as the enqueue server. When an application server detects that its name matches the name ff the enqueue server, it creates the lock table and all ofits work processes process enqueue requests inline. If an application server retects that its name does nok match the name of the lenqueve server, it sends all enqueue requests to the er yueue server. : Work processes of the tyne “enqueue” guarants2 that incoming requests are processes immediately. One enqueue process is usually sutt.cient. ta very large SAP Systems veth many application servers, a second process can be beneficial. However, i Is nat expedient ke define more than two enqueue processes. Ifthe transaction SMSO -> [CPU] shows that only the frst enqueue process is being used, the bottleneck is due to something else Q.Why is an enqueue work process required in a central system? Don't all work processes have the same access to the shared memory and thus to the Jock table? AL Aathough the enqueue process «nol used Hn a central system, ¥€ does not da ay hasm. Since lication suAver SogHEH OF Laer, HeaDKeNIs will evitaehy arse + The detauit profile /usr/sap/ /S¥S/profile/DEFAULT.PFL. is read; profilz values alie-idy efined in the C source are repiaced with the values in the default profile + The instance profile fusr/sap//SYS/profie/ -chos-name> is ‘ead profile values already defined in the default profile or in the C source are replaced ‘ith the values defined in the instance profile * This procedure ensures that system parameter values reflect the instance grofte and the values in the default profile and the € source What are the step involved before stopping R/3 system? Before stopping any AV3 system following steps are baste steps to be performed. 1 Before the R/3 System is stopped, the 8/3 System administrator should eheck the: + Check if any background fobs trarm any application server are active or have beur triggered extemally. Use transaction SH3? 7 Check ifthe background work process BIC is running in any application server. : + Check if any update records dre open when the system is stopped, the records are rolled back and set to status init. At startup, the records are processed again, 7 The administrator must decide whether to Interrupt the jobs or wait until ‘hey are finished, + Give system users advance warning of the system shutdown. To create a system mesesee, You can use transaction SM02. 7 Before shutting down the system, use transaction S104 to check whether users are stil fogged on, and ask them to log off. + The R/3 System administrator and administrators of external systems shoud also inform ‘one another about data transfers between their respective systems, How do you check the work process from UNIX? Use the following commands, To check all the work processes: Sef grep | arep dw 4 To check the message server. ps-ef | grep | grep ms To check the SAP OS collector: ps-et | grep sapes 2 2a5a tra0saion SHS. Information about the process types is olso Select one of the instances and choose Processes. Alternatively ‘Use transaction SH66- How do you display all active users in your system? To disptay the overview ofall active users on the Instance where you are logged on. use transaction SMO4. For a user overview of the whole system, call transaction ALOS ‘The following section contains some common questions and answers regarding the tock . What happens to locks when the enguc-re server is restarted? 4: If they have not been saved to disk in the backup file. th wl be lost, The locks that are, inherited by the update task shen COMMIT WORK ». executed ater CALL FUNCTION ¢ TA UPDATE TASK are saved to the disk. The locks are saved lo disk when the Updete reaveat Becomes valid. that 1s, with the COMMIT WORK. Gach tine the eaducue server ie centered, the tock entries saved en the disk are reloaded to the lock table. foc Is saved {0 dish a the pelt ot Q The enqueue server is 9 single-point-of-tailure in the SAP Systens. Can t guarantee igh availability for the Enquewe Server? ‘A. To guarantee this you must use the standalone Enqueue Server with the Replication Server. Tris Is described in the documentation Standalone Enqueue Server. ‘SAP note 524816 contains the prerequisites that must be fulfiled for using the standalone Enquese vers with the Replication Server @. Where is the lock table stored? In the main memory (shared memory) of she enqueve server, AM work processes on the enqueue server has access to the table. External application servers execute their lock operations in the enqueue process on the enqueue server. Communication in this case takes place Via the relevant dispatchers and the message server. Q. Can locks exist directly after startup? AA. Yes, the saved locks, which were inherited by the update task, are reloaded to the fock table ‘toring startup (see first question). 9. How fast are fock operations? A. In work processes on the enqueue server, a few 100 microseconds. In work processes of ‘external application servers you have to include network communications and process changes, Depending on CPU and network load this amounts to a fev! ‘miliseconds, Q. What should 1 do first it 2 problem arises? A Use the diagnosis Functions: smiz Extras @ Diagnosis and then ‘smi2 Extras @ Diagnosis In update Ifa problem ts reported, hack up the trace files dev_w*, dev_disp, dev_eq* and check the systog. Q. The following message is displayed in the diagnosis details in SM12: Lock management operation mode Internal lock management in same process What does this message mean and what are the other options? ‘A. “Internal lock management In same work process" in the dlagnosis function means that you are logged onto the enqueue server and your work process can access the lock table straight away. You "ar enquewe provess on 3 remote enqueue server. If ou aie api ence comms ot ee seen Saar Sogoene Aor the ‘wark peocesses on th renquete server con ‘access the tock table. Alt processes on other Zpplication servers delegate their enqueue requests to 9 special enqueue work process on We haueue server, This procedure is configured automaticaly. The parameter fine “rdisp/enqname = " in the default profile DEFAULTPFL indicates which application server ie currently ‘acting as the enqueue server. When an application server detects that its name matches the name fof the enqueue server, it creates the lock table and all ofits work processes process enqueue requests inline. If an application server “etects that its name does nok match the name of the enqueue server, it sends all enqueue requests to the or jueue server, ‘Work processes of the type “enquete” gharant== that incoming requests are processed Immediately. One enqueue process is usually sufl.cient. In very large SAP Systems with many application servers, a second process can be beneficial. However, i 1s not expedient te define more than two enqueue processes. Ifthe transaction SMSO ~> [CPU] shows that only the frst enqueue process is being used, the bottleneck js dus to something else. Q.Why is an enqueue work process required in 2 central system? Don't all work processes hove the same access to the shared memory and thus to the lock table? A Although the enqueue process 1s not used in central system, st does not do any harm. Since olimost alt custormers msi sn appheation stver sogdct or fitet, pablem will ineitaely aese For this reason, the enqueue diagnosis function wil output an error iF been configured. enqueue process is missin fn enqueue process has ns Q. Are the locks in the lack table also set at the database level? Ifnot, datzbaze functions could be used to process objects locked in the SAP system. A. Locks are not set an the database, The lock table s stored in the main memory of the enqueue Q. 15. lock table built f an enqueve work process Is not started on the enqueue server in the instance profile? ‘A. Yes, because the work processes on the enqueue server use the lock table directly, and not via the enqueue process. The latter is only responsible for lack requests from external application Q.How can I find out who is currently holding the ungranted lock? In other words, how can check the program after an ENQUEUE to determine which use is currently holding the Jock #o that I can let him or her know? ‘A. when the ENQUEUE_... function module Is returned, the name of the lock owner is listed ia SY. SGV Q. can Fuse special characters in my fock argument (especially the ‘at’ sign (@))? A. The at’ symbol is used a5 a wildcard In SAP locks (enqueues). In other words, it can stand for ‘any other character during collision checks. For example, the parameter value 12345@ locks the ‘quantities 123450 to 123459, 12345a to 123452, and 12345A to 12345Z, and all other values with ‘ny special character in the éth character position. ‘Tris is described in detail in the section Lock Colsions. Jn order to prevent the wildcard mechanism from being activated in SAP locks when itis not required, you need to ensure when enqueue function modules are called that key value parameters 40 not contain any wildcard characters. Ir key values that you want f0 use to lock Individuaf entities do contain wildcard characters, you nave to replace the wildcards with different characters before the enqueue is called, Q. With 9 single-process system as an enqueue server, we have reached X SD Benchmark users. Can this number be Increased by using a multiprocessor system (message server ‘on the same machine as the enqueue server)? Can we assume that sealing Is linear fgierber oct 2.4 $0-voare-eve meny-precessen ra amuimaic N secerens CUTE =i message Server; dapeneners, and Soh teen aor manta GI apts 3 proces ton be ‘ceupied simultaneously. Dispatchers and message server represent the bottleneck with the fenqueve. Linear scaling can be expected for up to 3 processors, even if lock requests are 50 frequent that message server, dispatchers, and work processes are occupled simultaneously. Oue to asynchronous system processes (for example, syncer), using more processors can further enhance throughput. Q. The Syslog often contains messages such as “Enqueue: total wait tine during locking: 2500 seconds". How should I analyze this problem? Or is the entry not critica? (There dre no records of terminations or timeouts.) AA. The message is output for information puroases only out may indicate parallel processing esrors th ABAP programs. The specified wat tine Hs the ture that has elapsed since startup due tote se of the WATT paramete” shen the enqueue furtion module as, The WAIT parameter enables a 1otk attempt 19 be serented 2 number of times, for example, 9 hse ce apdate task does not have to be cancelled wes 2 ack « Set tenMparatily by ether proge hhe work process remains. busy Between the fock atone. 9. User cannot connect 0 SAP . logon setting the ha. tick mes by

Вам также может понравиться