The setup of SAP monitoring
SAP Solution Manager Training
Over time, the tasks associated with the base became more complex and time-consuming, so that only the consultants could handle them. A need arose to hire a person to deal only with Basis matters.
There are the following reasons that may lead to the termination of this step: CANNOT_GET_OBJECT_LIST: The Object List for a Support Package could not be found because the Support Package does not exist. CANNOT_CHECK_LOCKS: An error occurred while detecting the locks of an object in the queue. OBJECTS_LOCKED_IN_REQUESTS: Objects found in unreleased jobs. Release these jobs before you resume playing. SCHEDULE_RDDIMPDP In this step the transport daemon (programme RDDIMPDP) is planned. There are the following reasons that may lead to the termination of this step: CANNOT_SCHEDULE_RDDIMPDP: The RDDIMPDP job could not be scheduled. Enter the transaction SM37 (job selection), enter the following parameters, and select Next: Job Name RDDIMPDP Username
Start by Event SAP_TRIGGER_RDDIMPDP Select the job that was cancelled and view the job log.
Analysis and reflection of the existing system configuration
Application layer: The application layer is the central component of the SAP ERP system and is therefore also referred to as the base system. All applications and calculations are executed here. The application layer communicates with both the database layer and the presentation layer. On the one hand, it requests data from the database layer, processes it and then passes it on to the presentation layer. On the other hand, data that is newly entered in the presentation layer is passed on to the database layer and stored there.
Reachable at any time: Your competent contact person is available at all times. If you operate SAP Basis Support in-house, personnel bottlenecks may occur. If your SAP employees are absent due to illness or vacation, there may be no equivalent replacement available.
"Shortcut for SAP Systems" simplifies tasks in the area of the SAP basis and complements missing functions of the standard.
He develops and develops strategies and solutions in coordination with higher authorities, IT departments and also business units.
Remove weak password hashes from the system: Only updating the profile parameter does not provide you with the necessary security.