Professional Documents
Culture Documents
Microsoft®SQL Server TM
ST
SAP Labs, Inc.
Palo Alto, California
Copyright
Trademarks
SAP, the SAP logo, R/2, R/3, ABAP, and other SAP-related products mentioned herein are registered or
unregistered trademarks of SAP AG. All other products mentioned in this document are registered or unregistered
trademarks of their respective companies.
Simplification Group
SAP Labs, Inc. 3475
Deer Creek Road Palo
Alto, CA 94304
www.saplabs.com/simple
simplify-r3@sap.com
o This book uses EcoFLEX lay-flat binding. With this lay-flat feature—developed by and exclusively available
at Johnson Printing Service (JPS)—you can open this book and keep it open without it snapping shut on you.
You need not worry about breaking the spine. EcoFLEX makes books like this one easier to use.
Contents at a Glance
Introduction xxi
R/3 System Administration Basics 1-1
Chapter 1:
Disaster Recovery......................................................................................2-1
Chapter 2:
Backup and Recovery................................................................................3-1
Chapter 3:
Scheduled Daily Tasks...............................................................................4-1
Chapter 4:
Scheduled Weekly Tasks...........................................................................5-1
Chapter 5:
Scheduled Monthly Tasks..........................................................................6-1
Chapter 6:
Scheduled Quarterly Tasks........................................................................7-1
Chapter 7:
Scheduled Annual Tasks............................................................................8-1
Chapter 8:
Multi-Role Tasks.........................................................................................9-1
Chapter 9:
R/3 System Administration......................................................................10-1
Chapter 10:
Security Administration...........................................................................11-1
Chapter 11:
User Administration.................................................................................12-1
Chapter 12:
Database Administration - Microsoft SQL Server..................................13-1
Chapter 13:
Output Management.................................................................................14-1
Chapter 14:
Network/OS/Server Administration.........................................................15-1
Chapter 15:
Operations.................................................................................................16-1
Chapter 16:
Change Management................................................................................17-1
Chapter 17:
Troubleshooting.......................................................................................18-1
Chapter 18:
Performance..............................................................................................19-1
Chapter 19:
SAPNet—Web Frontend...........................................................................20-1
Chapter 20:
SAPNet-R/3 Frontend...............................................................................21-1
Chapter 21:
Remote Services.......................................................................................22-1
Chapter 22:
Special Maintenance.................................................................................23-1
Chapter 23:
Useful Transactions..................................................................................A-1
Appendix A:
Useful Resources and Products B-1
Appendix B:
Useful SAP Notes......................................................................................C-1
Appendix C:
Upgrade Discussion..................................................................................D-1
Appendix D:
..............................................................................................................................1-1
Index
4.6A/B iv Release
Detailed Table of Contents
Acknowledgements..............................................................................................................................xix
Introduction xxi
What Is This Guidebook About?............................................................................xxii
Who Should Read This Book?...............................................................................xxii
Prerequisites.............................................................................................................xxiii
System..................................................................................................................xxiv
Organization...........................................................................................................xxv
Content..................................................................................................................xxv
Conventions..............................................................................................................xxvi
Special Icons.........................................................................................................xxvii
Chapter 1: R/3 System Administration Basics ............................................................................1-1
Overview..................................................................................................................1-2
Roles of an R/3 System Administrator..................................................................1-2
Within R/3..................................................................................................................1-2
External to R/3..........................................................................................................1-3
Traits of an R/3 System Administrator..................................................................1-4
R/3 System Guidelines............................................................................................1-4
Protect the System....................................................................................................1-5
Do Not Be Afraid to Ask for Help...............................................................................1-5
Network with Other Customers and Consultants......................................................1-6
Keep It Short and Simple (KISS)...............................................................................1-7
Keep Proper Documentation.....................................................................................1-7
Use Checklists..........................................................................................................1-8
Use the Appropriate Tool for the Job.........................................................................1-9
Perform Preventive Maintenance..............................................................................1-9
Do Not Change What You Do Not Have To............................................................1-10
Do Not Make System Changes During Critical Periods..........................................1-11
Do Not Allow Direct Database Access....................................................................1-12
Keep all Non-SAP Activity Off the R/3 Servers.......................................................1-12
Minimize Single Points of Failure............................................................................1-13
Corollaries to Murphy’s Law................................................................................1-13
Special Definitions................................................................................................1-14
Application server...............................................................................................1-14
System................................................................................................................1-14
Transaction Logs..................................................................................................3-5
Operating System Level Files................................................................................3-6
Backup Types...........................................................................................................3-6
What Is Backed Up...............................................................................................3-7
How the Backup Is Taken......................................................................................3-8
vi Release 4.6A/B
Detailed Table of Contents
Design Recommendations......................................................................................3-12
Tracking..............................................................................................................3-15
Handling..............................................................................................................3-16
Retention Requirements.........................................................................................3-17
Recommendations..............................................................................................3-18
Storage....................................................................................................................3-18
Performance..........................................................................................................3-20
Backup....................................................................................................................3-20
Backup Options.......................................................................................................3-21
Back Up to Faster Devices.................................................................................3-21
Parallel Backup...................................................................................................3-22
Backing Up to Disks, Then to Tape....................................................................3-22
Restore Options......................................................................................................3-23
Useful SAP Notes..................................................................................................3-24
Chapter 4: Scheduled Daily Tasks................................................................................................4-1
Overview..................................................................................................................4-2
Critical Tasks...........................................................................................................4-3
The R/3 System........................................................................................................4-4
Database..................................................................................................................4-6
Operating System....................................................................................................4-6
Other.........................................................................................................................4-7
Notes........................................................................................................................4-7
The R/3 System........................................................................................................4-8
Critical Tasks...........................................................................................................4-9
Audit Considerations...............................................................................................11-5
Security Layers.....................................................................................................11-6
Access Security.......................................................................................................11-7
Application Security............................................................................................11-9
Operational Security................................................................................................11-9
Data Security........................................................................................................11-10
Application or R/3 Security....................................................................................11-11
NT.....................................................................................................................11-35
Databases.........................................................................................................11-36
DB2...................................................................................................................11-36
Informix.............................................................................................................11-36
Oracle/UNIX......................................................................................................11-36
Audit Tools..........................................................................................................11-37
Audit Information System (Transaction SECR).....................................................11-37
Complete Audit.................................................................................................11-38
Release 4.6A/B
Detailed Table of Contents
Overview.................................................................................................................13-4
Database Activity (ST04).........................................................................................13-4
Database Allocation (DB02)....................................................................................13-7
Scheduling Database Tasks (DB13).....................................................................13-9
Performance.......................................................................................................16-4
Housekeeping Jobs............................................................................................16-4
Others.................................................................................................................16-5
Performance Factors for Background Jobs.............................................................16-5
Creating and Scheduling a Batch Job (SM36)........................................................16-8
Background Jobs (SM37)...................................................................................16-15
Checking the Job Log.......................................................................................16-17
NT.....................................................................................................................16-40
Checking Consumable Supplies........................................................................16-42
General Procedure................................................................................................19-3
R/3...........................................................................................................................19-4
Workload Analysis of the System (Transaction ST03)............................................19-4
Buffers (ST02).........................................................................................................19-8
Memory Defragmentation......................................................................................19-10
Database..............................................................................................................19-11
Operating System................................................................................................19-11
Operating System Monitor (OS07)........................................................................19-11
Hardware..............................................................................................................19-15
CPU and Disk........................................................................................................19-15
Memory.................................................................................................................19-15
Chapter 20: SAP Net—Web Frontend..........................................................................................20-1
Overview................................................................................................................20-2
Logging on to SAPNet..........................................................................................20-3
Deleting a Developer.............................................................................................20-19
Registering an Object............................................................................................20-19
Developer Requests Object Key.......................................................................20-20
The System Administrator Gets the Access Key:..............................................20-20
Unpacking a File...............................................................................................22-13
Special SAPNet Notes..........................................................................................22-14
EarlyWatch Session............................................................................................22-14
Special Maintenance.............................................................................................23-1
Overview................................................................................................................23-2
Changing Parameters (Transaction RZ10)...........................................................................23-2
System Profile Support Packages...............................................................................................23-11
Strategy.................................................................................................................23-12
High-Level Process of Applying Support Packages..............................................23-12
Determining What Support Packages Have Been Applied...................................23-13
Getting Information on the Support Package from SAPNet-R/3............................23-15
Client Copy..........................................................................................................23-42
Special Notes....................................................................................................23-42
Useful SAP Notes.............................................................................................23-43
Creating a Client...................................................................................................23-44
Copying a Client....................................................................................................23-47
Copying on the Same System/SID...................................................................23-47
Copying to a Different System/SID....................................................................23-50
Post-Client Copy Tasks........................................................................................23-52
Deleting a Client....................................................................................................23-52
Other.....................................................................................................................B-5
White papers.........................................................................................................B-5
SAPNet, Selected Items of Interest......................................................................B-5
Third-Party Resources..............................................................................................B-7
Books:...................................................................................................................B-7
R/3........................................................................................................................B-7
UNIX.....................................................................................................................B-8
NT.........................................................................................................................B-8
OS/400..................................................................................................................B-9
Microsoft SQL Server...........................................................................................B-9
Informix.................................................................................................................B-9
DB2.....................................................................................................................B-10
Oracle.................................................................................................................B-10
Other Topics.......................................................................................................B-10
Magazines:..........................................................................................................B—11
Helpful Third-Party Information............................................................................B—11
Web Sites................................................................................................................B-11
SAP.....................................................................................................................B—11
SAP Affiliated......................................................................................................B-12
Third Party..........................................................................................................B-12
Internet News Groups.............................................................................................B-12
Other Resources.....................................................................................................B-13
Operating System...............................................................................................B-13
Database.............................................................................................................B-13
Other Helpful Products: Contributed by Users...................................................B-13
UNIX.......................................................................................................................B-14
Backup................................................................................................................B-14
Monitor................................................................................................................B-14
Scheduler............................................................................................................B-14
Spool Management.............................................................................................B-14
Other...................................................................................................................B-14
NT...........................................................................................................................B-14
Backup................................................................................................................B-14
Monitor................................................................................................................B-14
Remote Control...................................................................................................B-15
Scheduler............................................................................................................B-15
Spool Management.............................................................................................B-15
Other...................................................................................................................B-15
Common, Both UNIX and NT..................................................................................B-15
Network...................................................................................................................B-16
Appendix C: Useful SAP Notes.......................................................................................................C-1
Overview..................................................................................................................C-2
R/3 Notes..................................................................................................................C-2
Operating System Notes.........................................................................................C-6
Common to Multiple Operating Systems...................................................................C-6
NT.............................................................................................................................C-6
UNIX.........................................................................................................................C-8
AS-400......................................................................................................................C-8
Database Notes.......................................................................................................C-9
MS SQL server.........................................................................................................C-9
DB2 / UDB..............................................................................................................C-11
Informix...................................................................................................................C-12
Oracle.....................................................................................................................C-13
Index ..............................................................................................................................1-1
Contents
System x
Administr x
ation
Made
Easy
Introduction
What Is This Guidebook About?
Philosophy
Release 4.6 of the System Administration Made Easy Guidebook continues in the direction of the 4.0
version. The primary focus is the importance of the on-going nature of system administration. This
book is written for an installed system, where all installation tasks have been completed. Installation
and related tasks, which are usually performed once, have not been included in this guidebook.
Organization
We have tried to group items and tasks in job role categories, which allows this guidebook to be a
better reference book.
Content
Real world practical advice from consultants and customers has been integrated into this book.
Because of this perspective, some of the statements in this book are blunt and direct. Some of the
examples we have used may seem improbable, but “facts can be, and are, stranger than fiction.”
Because system administration is such a large area, it is difficult to reduce the volume to what can be
called “Made Easy.” Although material in this book has been carefully chosen, it is by no means
comprehensive. Certain chapters can be expanded into several books [two examples are the chapters
on disaster recovery (chapter 2) and security (chapter 11)].
Although there are chapters on problem solving and basic performance tuning, these chapters are only
introductions to the subjects. This guidebook is not meant to be a trouble shooting or performance
tuning manual. Installation tasks are not presented. We assume that your SAP consultant has
completed these tasks.
Senior consultants, experienced system administrators, and DBAs may find portions of this guidebook
very elementary, but hopefully useful.
Prerequisites
\<6tltf0# To help you use this guidebook, and to prevent this guidebook from becoming as thick as an unabridged
dictionary, we defined a baseline for user knowledge and system configuration. The two sections below
(User and System) define this baseline. Review these sections to determine how you and your system
match. This book is also written with certain assumptions about your knowledge level and the
expectation that particular system requirements have been met.
User
We assume that you have a baseline knowledge of R/3, the operating system, and the database. If you
lack knowledge in any of the following points, we recommend that you consult the many books and
training classes that specifically address your operating system and database.
You should know how to complete the following tasks at the:
► R/3 using menus and transaction codes
System There are screens that do not have menu paths and the only way to access them is by using the
transaction codes. In the “real world,” navigating by transaction codes is faster and more
level:
efficient than menus.
► Be
► Operating system level:
able
► Be familiar with the file and directory structure
to
► Be able to use the command line to navigate and execute programs
log
► Set up a printer
on
► Perform a backup using standard operating system tools or third-party tools
to ► Perform basic operating system security
R/3 ► Copy and move files
► Kn ► Properly start and stop the operating system and server
ow
► Database level
ho
w ► Properly start and stop the database
to ► Perform a backup of the database
nav
igat R/3 runs on more than five different versions of UNIX. In many cases, significant differences exist
e in between these versions. These differences contributed to our decision to not go into detail at the
R/3 operating system level.
System
For an ongoing productive environment, we assume that the:
► R/3 System is completely and properly installed
► Infrastructure is set up and functional
The following checklist will help you determine if your system is set up to the baseline assumptions
of this book. If you can log on to your R/3 System, most of these tasks have already been completed.
Hardware
Is the backup equipment installed and tested?
Infrastructure
► Is the Uninterruptible Power Supply (UPS) installed?
► Is a server or system monitor available?
Software
► Are the following utility software installed (as appropriate)?
► Backup program
► Hardware monitors
► System monitors
► UPS control
► R/3 System
■ Is R/3 installed according to SAP’s recommendation?
■ Is the TPPARAM file configured?
(In Release 4.6, TMS creates a file to be used as the TPPARAM file.)
► Is the TMS/CTS configured?
► Is the SAProuter configured?
► Is the OSS1 transaction configured?
► Is the ABAP workbench configured?
► Has initial security been configured (default passwords changed)?
► Are the NT sapmnt share or UNIX NFS sapmnt exports properly configured?
► Is the online documentation installed?
► Can users log on to R/3 from their desktops?
Desktop
For optimal results, we recommend that the minimum screen resolution be set as follows:
► For the users, 800 x 600
► For the system administrator, 1024 x 768 and a minimum color depth of 256 colors
The Release 4.6 GUI displays better with 64K colors.
What's New
This guidebook evolved from the previous versions of this guidebook and incorporates customer
and consultant comments. Send us your comments, so we can make future versions better meet
your needs.
Content
The new features of the Release 4.6 guidebook are:
► System Administration Assistant (transaction SSAA), chapter 10
► New chapters on:
► Security (chapter 11)
► Microsoft SQL Server / Windows NT (chapter 13)
► Basic problem solving (chapter 17 )
► Basic performance tuning (chapter 22)
The procedures to perform regularly-scheduled tasks have been moved to the Roles section. The
unscheduled tasks section from the 4.0B guidebook has become a role-oriented section. This change
accommodates customers who perform scheduled tasks at times other than the times presented in this
guidebook. Therefore, all the task procedures are classified in one section and by job roles, where
related tasks are placed together. Regardless of the job schedule, all jobs related to a job role are
grouped in one place.
Conventions
In the table below, you will find some of the text conventions used throughout this guide.
The screenshots shown in this guide are based on full user authorization (SAP_ALL). Depending on
your authorizations, some of the buttons on your application toolbar may not be available.
§ Workplace menu:
Depending on your authorizations, your workplace menu may look different from screenshots in
this guide which are based on SAP_ALL. The User menu and SAP standard menu buttons provide
different views of the workplace menu.
To learn how to build user menus, see Authorizations Made Easy guidebook Release 4.6A/B.
Note: In this guidebook, we show the technical names of each transaction. To match our settings,
choose Extras —> Settings and select Show technical names.
Special Icons
Throughout this guide special icons indicate important messages. Below are brief explanations of
each icon:
U W ''< to
Exercise caution when performing this task or step. An explanation of why you should be careful is
included.
\»<M o#
This information helps you understand the topic in greater detail. It is not necessary to know this information to
perform the task.
0 These messages provide helpful hints and shortcuts to make your work faster and easier.
Contents
Overview................................................................................................................1-2
Roles of an R/3 System Administrator................................................................1-2
Traits of an R/3 System Administrator................................................................1-4
R/3 System Guidelines.........................................................................................1-4
Corollaries to Murphy’s Law..............................................................................1-13
Special Definitions..............................................................................................1-14
System 1
Administra -
tion Made
Easy
Chapter 1: R/3 System Administration Basics
Overview
Overview
This chapter is about the roles that a system administrator plays. These roles cross all functional
areas, and the number and intensity of the tasks depends on the size of the company. In a small
company, one person can be the entire system administration department. In a larger company,
however, this person is probably part of a team. The purpose of this “definition” is to help clarify
the roles of a system administrator. This chapter is a list of commonly used system
administration terms and their definitions.
At the end of this chapter is a list of 14 R/3 System guidelines, which a system administrator must be
aware of while working with the system.
Sample guidelines include:
► Keep it short and simple (KISS)
► Use checklists
► Do not allow direct database access
Depending on the size of the company and available resources, R/3 administrator(s) may range from
one person to several specialized people in several departments.
Factors that affect an R/3 system administrator’s tasks, staffing, and roles:
► Company size
► Available resources (the size of the Basis group)
► Availability of infrastructure support for:
► Desktop support
► Database
► Network
► Facilities
The R/3 system administrator may wear many hats both in or directly related to, R/3 and indirectly or
external to R/3.
Within R/3
► User administrator
Set up and maintain user accounts Security administrator
► ► Create and maintain SAP security profiles
► Monitor and manage security access and violations
► System administrator
► Maintain the system’s health
► Monitor system performance and logs Transport
► administrator
► Transport changes between systems
► Manage change requests Batch scheduler
►
Create and manage the scheduling of batch jobs Backup operator
Schedule, run, and monitor backup jobs of the SAP database and any required operating system level files
►
Disaster recovery technical manager
Create, test, and execute the SAP disaster recovery plan Programmer
►
Apply SAPNet R/3 note fixes to programs Data Dictionary
(DDIC) manager
►
Change the Data Dictionary (when applicable) Data Base
Administrator (DBA)
External to R/3
► DBA for the specific database on which the system is running
► Manage database specific tasks
► Maintain the database’s health and integrity Operating system administrator
► ► Manage the operating system access and user IDs
► Manage operating system specific tasks Network administrator
► Manage network access and user IDs
► ► Manage network support and maintenance Server administrator
Manage the servers Desktop support
Supports the user’s desktop PC
►
Printers
Facilities
►
Manages facilities-related support issues, such as:
► Power/utilities
► Air conditioning (cooling)
What
Everything you do as a system administrator should be focused on protecting and
maintaining the system’s integrity.
Why
► If the system’s integrity is compromised, incorrect decisions could be made based on invalid data.
► If the system cannot be recovered after a disaster, your company could be out of business.
How
► The system administrator must have a positive, professional attitude.
If the system administrator has less than this attitude, critical tasks may not be properly
completed (for example, backups may not be taken as scheduled and backup logs may not be
checked, which reduces the chances for a successful recovery).
► System administrators should maintain a “my job is on the line” attitude.
This attitude helps to ensure that administrators focus on maintaining the integrity of the system.
The company may not survive if the system crashes and cannot be recovered.
► The system must be protected from internal and external sources.
One problem today is employees “poking around” in the network.
Why
► R/3 is so large and complex that one person cannot be expected to know everything.
If you are unsure which task to complete or how to complete it, you could make a mistake
and cause a larger problem.
► Mistakes within the system can be expensive.
Certain things cannot be “undone,” and once set, are set forever.
► The only way to learn is to ask.
There are no dumb questions—only dumb reasons for not asking them.
How
► SAPNet R/3 notes
► Various web sites and news groups
► Consultants
Also see the section in this chapter that covers networking with other customers and consultants.
What
Get to know the R/3 Basis and system administrators in other companies.
Why
► Other customers may be able to provide solutions to your problems.
► Customers who help each other reduce their consulting expenses.
► The more people you know, the better your chances of finding someone to help you solve a
problem.
Release
4.6A/B 1–6
Chapter 1: R/3 System Administration Basics
R/3 System Guidelines
Why
► Complex tasks are more likely to fail as situations change.
A process with 27 steps has 27 chances to fail, because complex tasks are difficult to create,
debug, and maintain.
► It is difficult to train people for complex tasks.
► Explaining a complex task on the telephone increases the chance that what is said will not be
properly understood and an error will be made. If the error is severe, you may have a disaster on
your hands.
How
► Keep tasks as simple as possible.
► Test
What
Document processes, procedures, hardware changes, configuration changes, checks performed,
problems, errors, etc. If in doubt about what to document, write it all down.
Why
► As time passes, you will forget the details of a process or problem.
At some point, you may not remember anything about the process or problem. In an extreme
situation, which happens with short-term memory, you can quickly forget the information in
minutes.
► If you violate the KISS principle, complete documentation becomes even more important.
► If the process is complex, complete documentation reduces the chance of errors.
► If you are sick or unavailable, complete documentation can help someone else do the job.
► If changes need to be undone, you will know exactly what needs to be done to complete this task.
► Documentation helps train new people.
Employee turnover must be planned for. Proper documentation makes the training and transition of
new employees easier and faster.
When
“Hot” projects or emergencies tend to take precedence over writing documentation. Do not postpone
writing documentation, or the task may never get done. Record everything that is done to the system
—as it is being done.
How
► Record everything done to the system, as it is being done, so details are not forgotten.
► Document items clearly and sufficiently so that, without assistance, a qualified person can read
what you have written and perform the task.
► Re-read older documentation to see where improvements can be made. Obvious items get
“fuzzy” over time and are no longer obvious.
► Use graphics, flowcharts, and screenshots to clarify documentation.
Where
► Keep a log (notebook) on each server and record everything that you do on the servers.
► Keep a log for everything done remotely to any of the servers.
► Keep a log for other related items.
Use Checklists
What
A checklist lists the steps required to complete a task. Each step requires an
acknowledgement of completion (a check) or an entry (date, time, size, etc.).
Why
► Checklists enforce a standardized process and reduce the chance that you will overlook
critical steps.
For example, if you were to use a checklist every time you drive a car, then you would
remember to turn off your headlights when you park your car, or you would not drive off with
your parking brake still set.
► Checklists force you to document events, such as run times, which may later become
important.
When
How
See examples in Scheduled Tasks.
What
Preventive maintenance is the proactive monitoring and maintenance of the system.
Why
► It is less disruptive and stressful if you can plan a convenient time to do a task, rather than have it
develop into an “emergency” situation.
► Fix a potential problem before it negatively impacts the system and company
operations.
An extreme situation is that the entire system is down until a particular task is completed (for
example, if the log file space goes down to zero (0), the database will stop, and then R/3 also
stops. Until sufficient file space is cleared, R/3 will not run and certain business operations, such
as shipping, may stop).
When
► Checking for problems should be a part of your regular routine.
► Scheduling tasks to fix a problem should be based on your situation, and when least disruptive to
your users.
How
► Monitor the various logs and event monitors
► Obtain additional disk storage before you run out of room
► Regularly clean the tape drive(s)
► Check the database for consistency and integrity
Why
► Risk
When something changes, there is a chance that something else may break.
► Cost
Upgrading is expensive in terms of time, resources, and consulting, etc.
When
► A business need exists.
► Legal requirements call for an update.
This really is not an option. If you do not keep up you will not be complying with legal
requirements. The associated penalties can be expensive.
► If the hardware or software release is no longer supported by the vendor.
► The new release offers a specific functionality that offers added business value to your company.
► Fixing a major problem requires an upgrade.
A fix is unavailable in a patch or an “advance release.”
How
► If the change fails or causes problems, make certain you can recover to a before-the-change
condition.
► All changes must be regression tested to make sure that nothing else has been affected by the
change. In other words, everything still works as it is supposed to.
Regression testing of R/3 involves the functional team and users.
► Stage the change and test it in the following order:
1. Test system (a “Sandbox” system)
2. Development system
3. Quality Assurance system
4. Production system
Even if your company does not have all the above-mentioned systems, the key is to maintain the
general order. For example, if your company does not have a test system, test the change in the
following order:
5. Development
6. Quality Assurance
7. Production
By the time you reach the production system, you should be comfortable that nothing will break.
What
A critical period is when system disruptions could cause severe operational problems.
Why
If a problem occurs during a critical period, the business maybe severely impacted. Note the
following sequence of events:
8. A system administrator changes a printer in Shipping at the end of the month.
9. R/3 cannot send output to the new printer.
10. The users cannot print shipping documents.
11. The company cannot ship their products.
12. Revenue for the month is reduced.
When
A critical period is any time where the users and the company may be “severely” impacted by a system
problem. These periods differ depending on the particular industry or company. What is a critical
period for one company may not be critical for another company.
The following are “real” examples of critical periods:
► At end of the month, when Sales and Shipping are booking and shipping as much as
they can, to maximize revenue for the month
► At the beginning of the month, when Finance is closing the prior month
► During the last month of the year, when Sales and Shipping are booking and shipping as much as
they can, to maximize the revenue for the year
► During the beginning of the year, when Finance is closing the books for the prior year and getting
ready for the financial audit
How
► Always coordinate potentially disruptive system events with the users. Different user groups
in the company, such as Finance and Order Entry, may have different quiet periods that need
to be coordinated.
► Plan all potentially disruptive systems-related activities during quiet periods when a problem will
have minimal user impact.
What
Direct database access means allowing a user to run a query or update directly to the database
without going through R/3.
Why
► By not going through R/3, there is the risk of corrupting the database.
► Directly updating the database could put the database out of sync with the R/3 buffers.
How
► When R/3 writes to the database, it could be writing to many different tables.
If a user writes directly to the tables, missing a single table may corrupt the database by putting
the tables out of sync with each other.
► With direct database access, a user could accidentally execute an update or delete, rather
than a read.
What
► Do not allow users to directly access (telnet, remote access, etc.) the R/3 server(s).
► Do not use the R/3 server as a general file server.
► Do not run programs that are not directly related to R/3 on an R/3 server.
Why
► Security
Not allowing users to have access to the R/3 server reduces the chance of files from being
accidentally deleted or changed.
No access also means that user cannot look at confidential or sensitive information.
► Performance
Using the production R/3 sever as a file server creates resource contention, where performance is
a primary concern. Programs running on the R/3 servers will contend for the same resources that
R/3 is using, which affects the performance of R/3.
How
Use other servers to perform functions unrelated to R/3.
What
A single-point failure is when the failure of a single component, task, or activity causes the system to
fail or creates a critical event.
Why
Each place where a single-point failure could occur increases the chances of a system failure or other
critical event.
For example, if:
► You only have one tape drive and it fails, you cannot back up your database.
► You rely on utility line power, and do not have a UPS, the server will crash during a power failure
and possibly corrupt the database.
► You are the only one who can complete a task, and you are on vacation, the task will not be
completed until you return (or you will be “on call” while on vacation).
To guard against a single-point failure, consider the following options:
► Systems configured with a built-in backup
► Redundant equipment, such as dual power supplies
► On-hand spares
► Sufficient personnel
► On-call consultants
► Cross-training
► Outsourcing
Special Definitions
There are terms used in this guidebook that have very specific meanings. To prevent confusion,
they are defined below:
Database server
This is where R/3 and the database resides.
The system clock of the database server is the master clock for the R/3 system.
Application server
This is where R/3 application runs.
On a two-tiered system, this would be combined on the database server. Application servers can
be dedicated to online users, batch processing or a mix.
Instance
An installation of R/3 on a server.
The two types of instances are central, and dialog. More than one instance could exist on a physical
server.
System
The complete R/3 installation for a System ID (SID), for example PRD.
A system logically consists of the R/3 central instance and dialog instances for the SID. This
physically consists of the database server and application servers for that SID.
A two-tiered configuration combines the application and database layers on a single server.
Release
4.6A/B 1–16
Chapter 2: Disaster Recovery
Contents
Overview................................................................................................................2-2
Why Plan for a Disaster?......................................................................................2-3
Planning for a Disaster..........................................................................................2-4
Test your Disaster Recovery Procedure...........................................................2-15
Other Considerations.........................................................................................2-16
Minimizing the Chances for a Disaster.............................................................2-17
System A
d
2-1
Chapter 2: Disaster Recovery
Overview
Overview
The purpose of this chapter is to help you understand what we feel is the most critical job of a system
administrator—disaster recovery.
We included this chapter at the beginning of our guidebook for two reasons:
► To emphasize the importance of the subject
Disaster recovery needs to be planned as soon as possible, because it takes time to
develop, test, and refine.
► To emphasize the importance of being prepared for a potential disaster
Murphy’s Law says:
“Disaster will strike when you are not prepared for it.” The faster you begin planning, the more
prepared you will be when a disaster does happen.
This chapter is not a disaster recovery “how to.” It is only designed to get you thinking and
working on disaster recovery.
What Is a Disaster?
The goal of disaster recovery is to restore the system so that the company can continue doing
business. A disaster is anything that results in the corruption or loss of the R/3 System.
Examples include:
► Database corruption. For example when test data is accidentally loaded into the
production system. This happens more often than people realize.
► A serious hardware failure.
► A complete loss of the R/3 System and infrastructure. For example, the
destruction of the building due to natural disaster.
The ultimate responsibility of a system administrator is to successfully restore R/3 after a disaster.
The ultimate consequence of not restoring the system is that your company goes out of business.
The administrator’s goal is to prevent the system from ever reaching the situation where the ultimate
responsibility is called upon.
Disaster recovery planning is a major project. Depending on your situation and the size and
complexity of your company, disaster recovery planning could take more than a year to
prepare, test, and refine. The plan could fill many volumes. This chapter helps you start thinking
about and planning for disaster recovery.
This chapter is not a disaster recovery “how to.” It is only designed to get you thinking and working on disaster
recovery.
Creating a Plan
Creating a disaster recovery plan is a major project because:
► It can take over a year and considerable time to develop, test, and document.
► The documentation may be extensive (literally thousands of pages long).
If you do not know how to plan for a disaster recovery, get the assistance of an expert. A bad plan
(that will fail) is worse than no plan, because it provides a false sense of security.
Example
► What: No more than one hour of transaction data may be lost.
► Why: The cost is 1,000 transactions per hour of lost transactions that are entered in R/3 and
cannot be recreated from memory.
This inability to recreate lost transactions may result in lost sales and upset customers.
If the lost orders are those that the customer quickly needs, this
situation can be critical.
Example 2
► What: The system cannot be offline for more than three hours.
► Why: The cost (an average of $25,000 per hour) is the inability to book sales.
Example 3
► What: In the event of disaster, such as the loss of the building containing the R/3 data
center, the company can only tolerate a two-day downtime.
► Why: At that point, permanent customer loss begins.
► Other: There must be an alternate method of continuing business.