SAP Basis SPAM: Check Logs - SAP Corner

Direkt zum Seiteninhalt
SPAM: Check Logs
SAP HANA (SAP High-Performance Analytic Appliance) is an SAP platform based on in-memory technology. With SAP HANA, you can achieve enormous performance increases over conventional databases that were previously unthinkable. This enables you to analyze and evaluate mass data almost in real time without the need for data aggregation.

The database layer manages all data in the R/3 System. It contains the database management system (DBMS) and the actual data.
Preparation of full access to SAP systems and solutions in case of disasters (High Availability/Disaster Recovery)
Especially after security incidents it may be necessary to find out which (technical) users have logged in at which time. The USR02 table provides a first entry point. In the TRDAT column you can find the last login date for the user you want. However, a history of previous applications is not found in this table. In such cases, the Security Auditlog or SAL helps. Preparation In order to access the desired data, it must also have been saved previously. In the Security Auditlog, you can use various filters to determine which users are logged on which client and which information. The Security Auditlog stores, depending on configuration, logins, RFC calls, and other actions for specific users. You can make these settings in the SM19 transaction. Note: Logging user activity must be aware of the users concerned! Configure the SAL only for technical users or in consultation with users / works council / etc. It can be seen there among other things when the SAL was activated and last edited (1). You can also select the various filters (2), activate the filters individually (3), specify clients and users (4) and specify which activities are logged (5). Static configuration in the SM19 Under the Dynamic Configuration you can also see if SAL is currently active for the system. Determine the status of the SAL Evaluation of the SAL If the Security Audit Log is active, switch to the SM20 evaluation of the Security Audit Log. Select the desired user and client and the appropriate time window. The option Dialogues login is sufficient for the login. Then, restart the AuditLog analysis. Start evaluation You will get an overview of the user's login to the selected client of the system.

There is an RFC error. CANNOT_ADD_PATCH_TO_BUFFER: A support package could not be included in the transport buffer. For more information, see the log file in the /usr/sap/trans/log (UNIX) directory. CANNOT_MODIFY_BUFFER: An attempt was made to modify the transport buffer without success. TEST_IMPORT This step checks whether there are still objects in unshared tasks that are overwritten during the commit. The log of the test import shows the cause of the error. For more information, see Note 42379. IMPORT_OBJECT_LIST In this step, the object lists for the support packages in the queue are fed into the system.

Use "Shortcut for SAP Systems" to accomplish many tasks in the SAP basis more easily and quickly.

It is important that the associated approval processes can also be mapped and easily tracked.

On you will also find useful information about SAP basis.

SAP's client concept enables a SAP system to be split into several logical sub-systems - clients.
SAP Corner
Zurück zum Seiteninhalt