SP01 Output controller: spool requests
The typical tasks of system support and administration of an SAP landscape, regardless of whether it is 2-tier or multi-level, include the following
Many companies are struggling with the introduction and use of secinfo and reginfo files to secure SAP RFC gateways. We have developed a generator that supports the creation of the files. This blog post lists two SAP best practices for creating the secinfo and reginfo files to enhance the security of your SAP gateway and how the generator helps you do this. secinfo and reginfo Request generator Option 1: Restrictive procedure In the case of the restrictive solution approach, only in-system programmes are allowed. Therefore, external programmes cannot be used. However, since this is desired, the access control lists must be gradually expanded to include each programme required. Although this procedure is very restrictive, which speaks for safety, it has the very great disadvantage that, in the creation phase, links which are actually desired are always blocked. In addition, the permanent manual activation of individual connections represents a continuous effort. For large system landscapes, this procedure is very complex. Option 2: Logging-based approach An alternative to the restrictive procedure is the logging-based approach. To do this, all connections must be allowed first by the secinfo file containing the content USER=* HOST=* TP=* and the reginfo file contains the content TP=*. During the activation of all connections, a recording of all external programme calls and system registrations is made with the gateway logging. The generated log files can then be evaluated and the access control lists created. However, there is also a great deal of work involved here. Especially with large system landscapes, many external programmes are registered and executed, which can result in very large log files. Revising them and creating access control lists can be an unmanageable task. However, this process does not block any intentional connections during the compilation phase, which ensures the system will run non-disruptively.
Job scheduling: your system needs to run various automated background jobs that consume resources. Your administrator must carefully schedule these tasks when user demand is low so they don't impact performance.
SAP Installation & Configuration
ITIL stands for The IT Infrastructure Library. ITIL is a summary of "best practices" rules for professional implementation of IT service management. ITIL has established itself as an international standard in the area of IT business processes. The ITIL set of rules describes the processes, the organizational structure and the tools required for IT infrastructure. ITIL is based on the economic added value that IT operations provide for the company. itSMF Deutschland eV has further developed and improved these standards, and at the same time operates a portal for exchanging knowledge and experience.
If the additional memory in the Advanced Storage Area is still not sufficient for the user context, the optional second role area can be used. The size of the second roll range is determined by the difference between the parameters ztta/roll_first and ztta/roll_area. Rolling range has been eliminated in kernel release 7.4, so these parameters are obsolete from then on. Instead, the user context is now stored directly in the Advanced Memory.
For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.
In the event of an error, you will not be able to resume and complete the playback successfully unless the error(s) are resolved.
Resetting the status should only be used to troubleshoot the issue and you should repeat the playback as soon as possible.