Professional Documents
Culture Documents
01 R3 System Administration Basis
01 R3 System Administration Basis
%DVLFV
&RQWHQWV
Overview ..................................................................................................................12
Roles of an R/3 System Administrator .................................................................12
Traits of an R/3 System Administrator .................................................................14
R/3 System Guidelines ...........................................................................................14
Corollaries to Murphys Law................................................................................113
Special Definitions ................................................................................................114
11
2YHUYLHZ
This chapter is about the roles that a system administrator plays. These roles cross all
functional areas, and the number and intensity of the tasks depends on the size of the
company. In a small company, one person can be the entire system administration
department. In a larger company, however, this person is probably part of a team. The
purpose of this definition is to help clarify the roles of a system administrator. This
chapter is a list of commonly used system administration terms and their definitions.
At the end of this chapter is a list of 14 R/3 System guidelines, which a system administrator
must be aware of while working with the system.
Sample guidelines include:
<
<
Use checklists
<
5ROHVRIDQ56\VWHP$GPLQLVWUDWRU
Depending on the size of the company and available resources, R/3 administrator(s) may
range from one person to several specialized people in several departments.
Factors that affect an R/3 system administrators tasks, staffing, and roles:
<
Company size
<
<
The R/3 system administrator may wear many hats both in or directly related to, R/3 and
indirectly or external to R/3.
:LWKLQ5
<
User administrator
Set up and maintain user accounts
<
12
Security administrator
Create and maintain SAP security profiles
Monitor and manage security access and violations
Release 4.6A/B
<
System administrator
Maintain the systems health
Monitor system performance and logs
<
Transport administrator
Transport changes between systems
Manage change requests
<
Batch scheduler
Create and manage the scheduling of batch jobs
<
Backup operator
Schedule, run, and monitor backup jobs of the SAP database and any required operating
system level files
<
<
Programmer
Apply SAPNet R/3 note fixes to programs
<
<
([WHUQDOWR5
<
<
<
<
<
Desktop support
Supports the users desktop PC
<
Printers
<
Facilities
Manages facilities-related support issues, such as:
Power/utilities
Air conditioning (cooling)
13
7UDLWVRIDQ56\VWHP$GPLQLVWUDWRU
An R/3 system administrator should:
<
<
Be technically competent
When necessary, the company must invest in training for the Basis staff.
You must also take responsibility for your own training and education, whether
your company pays for it or not.
<
Be a team-player
The system administrator will have to work with various functional groups, users, the IS
staff, and others to successfully complete the necessary tasks.
56\VWHP*XLGHOLQHV
When working on an R/3 System:
14
<
<
<
<
<
<
<
<
<
<
<
<
<
Release 4.6A/B
3URWHFWWKH6\VWHP
:KDW
<
<
If the system cannot be recovered after a disaster, your company could be out of
business.
+RZ
<
<
<
'R1RW%H$IUDLGWR$VNIRU+HOS
:K\
<
R/3 is so large and complex that one person cannot be expected to know everything.
If you are unsure which task to complete or how to complete it, you could make a
mistake and cause a larger problem.
<
<
+RZ
<
<
<
Consultants
Also see the section in this chapter that covers networking with other customers and
consultants.
15
1HWZRUNZLWK2WKHU&XVWRPHUVDQG&RQVXOWDQWV
:KDW
Get to know the R/3 Basis and system administrators in other companies.
:K\
<
<
<
The more people you know, the better your chances of finding someone to help you
solve a problem.
:KHQ:KHUHDQG+RZ
Other SAP customers and consultants, especially those in your specialty area
Others using your operating system or database
Where to network:
<
Training classes
<
SAP events
Technical Education Conference (TechEd)
SAPPHIRE
Participate in user groups:
Americas SAP Users Group (ASUG)
Regional SAP users groups
Database user groups, such as those for Microsoft SQL Server, Informix, DB2, or
Oracle
Operating system user groups, such as those for UNIX (the various versions), NT, or
IBM (AIX, AS400, or OS390)
<
<
Participation means getting involved in the organization. The more you participate, the
more people you meet and get to know.
<
<
16
Release 4.6A/B
.HHS,W6KRUWDQG6LPSOH.,66
:K\
<
<
<
Explaining a complex task on the telephone increases the chance that what is said will
not be properly understood and an error will be made. If the error is severe, you may
have a disaster on your hands.
+RZ
<
<
.HHS3URSHU'RFXPHQWDWLRQ
:KDW
<
<
If you violate the KISS principle, complete documentation becomes even more
important.
<
<
If you are sick or unavailable, complete documentation can help someone else do the
job.
<
If changes need to be undone, you will know exactly what needs to be done to complete
this task.
<
17
:KHQ
<
<
Problems, such as hardware failures, error log entries, and security violations, occur.
<
Record everything done to the system, as it is being done, so details are not forgotten.
<
Document items clearly and sufficiently so that, without assistance, a qualified person
can read what you have written and perform the task.
<
Re-read older documentation to see where improvements can be made. Obvious items
get fuzzy over time and are no longer obvious.
<
:KHUH
<
Keep a log (notebook) on each server and record everything that you do on the servers.
<
<
8VH&KHFNOLVWV
:KDW
A checklist lists the steps required to complete a task. Each step requires an
acknowledgement of completion (a check) or an entry (date, time, size, etc.).
:K\
<
Checklists enforce a standardized process and reduce the chance that you will overlook
critical steps.
For example, if you were to use a checklist every time you drive a car, then you would
remember to turn off your headlights when you park your car, or you would not drive
off with your parking brake still set.
<
18
Checklists force you to document events, such as run times, which may later become
important.
Release 4.6A/B
:KHQ
Complex or critical
If a step is missed or done incorrectly, the result could be serious (for example, inability
to restore the database).
<
<
Done infrequently
It is difficult to remember how to do a complicated task that you do only once a year.
+RZ
8VHWKH$SSURSULDWH7RROIRUWKH-RE
Sometimes a low-tech solution is best. Depending on the situation, a paper-and-pencil
solution may work better and be more cost effective than a computerized solution. Paper
and pencil still works during a power failure.
3HUIRUP3UHYHQWLYH0DLQWHQDQFH
:KDW
<
<
It is less disruptive and stressful if you can plan a convenient time to do a task, rather
than have it develop into an emergency situation.
Fix a potential problem before it negatively impacts the system and company
operations.
An extreme situation is that the entire system is down until a particular task is
completed (for example, if the log file space goes down to zero (0), the database will
stop, and then R/3 also stops. Until sufficient file space is cleared, R/3 will not run and
certain business operations, such as shipping, may stop).
:KHQ
<
<
Scheduling tasks to fix a problem should be based on your situation, and when least
disruptive to your users.
+RZ
<
<
<
<
19
'R1RW&KDQJH:KDW<RX'R1RW+DYH7R
:KDW
<
<
:K\
<
Risk
When something changes, there is a chance that something else may break.
<
Cost
Upgrading is expensive in terms of time, resources, and consulting, etc.
:KHQ
<
<
<
<
The new release offers a specific functionality that offers added business value to your
company.
<
+RZ
<
If the change fails or causes problems, make certain you can recover to a before-thechange condition.
<
All changes must be regression tested to make sure that nothing else has been affected
by the change. In other words, everything still works as it is supposed to.
Regression testing of R/3 involves the functional team and users.
<
110
Release 4.6A/B
By the time you reach the production system, you should be comfortable that nothing
will break.
'R1RW0DNH6\VWHP&KDQJHV'XULQJ&ULWLFDO3HULRGV
:KDW
A critical period is when system disruptions could cause severe operational problems.
:K\
If a problem occurs during a critical period, the business maybe severely impacted.
Note the following sequence of events:
1. A system administrator changes a printer in Shipping at the end of the month.
2. R/3 cannot send output to the new printer.
3. The users cannot print shipping documents.
4. The company cannot ship their products.
5. Revenue for the month is reduced.
:KHQ
A critical period is any time where the users and the company may be severely impacted
by a system problem. These periods differ depending on the particular industry or
company. What is a critical period for one company may not be critical for another
company.
The following are real examples of critical periods:
<
At end of the month, when Sales and Shipping are booking and shipping as much as
they can, to maximize revenue for the month
<
At the beginning of the month, when Finance is closing the prior month
<
During the last month of the year, when Sales and Shipping are booking and shipping as
much as they can, to maximize the revenue for the year
<
During the beginning of the year, when Finance is closing the books for the prior year
and getting ready for the financial audit
+RZ
<
<
Plan all potentially disruptive systems-related activities during quiet periods when a
problem will have minimal user impact.
111
'R1RW$OORZ'LUHFW'DWDEDVH$FFHVV
:KDW
Direct database access means allowing a user to run a query or update directly to the
database without going through R/3.
:K\
<
By not going through R/3, there is the risk of corrupting the database.
<
Directly updating the database could put the database out of sync with the R/3 buffers.
+RZ
<
<
When R/3 writes to the database, it could be writing to many different tables.
If a user writes directly to the tables, missing a single table may corrupt the database by
putting the tables out of sync with each other.
With direct database access, a user could accidentally execute an update or delete, rather
than a read.
.HHSDOO1RQ6$3$FWLYLW\2IIWKH56HUYHUV
:KDW
< Do not allow users to directly access (telnet, remote access, etc.) the R/3 server(s).
< Do not use the R/3 server as a general file server.
< Do not run programs that are not directly related to R/3 on an R/3 server.
:K\
<
Security
Not allowing users to have access to the R/3 server reduces the chance of files from
being accidentally deleted or changed.
No access also means that user cannot look at confidential or sensitive information.
<
Performance
Using the production R/3 sever as a file server creates resource contention, where
performance is a primary concern. Programs running on the R/3 servers will contend
for the same resources that R/3 is using, which affects the performance of R/3.
+RZ
112
Release 4.6A/B
0LQLPL]H6LQJOH3RLQWVRI)DLOXUH
:KDW
A single-point failure is when the failure of a single component, task, or activity causes the
system to fail or creates a critical event.
:K\
Each place where a single-point failure could occur increases the chances of a system failure
or other critical event.
For example, if:
<
You only have one tape drive and it fails, you cannot back up your database.
<
You rely on utility line power, and do not have a UPS, the server will crash during a
power failure and possibly corrupt the database.
<
You are the only one who can complete a task, and you are on vacation, the task will not
be completed until you return (or you will be on call while on vacation).
<
On-hand spares
<
Sufficient personnel
<
On-call consultants
<
Cross-training
<
Outsourcing
&RUROODULHVWR0XUSK\V/DZ
Murphys Law states: Whatever can go wrong will go wrong.
The following are some corollaries to Murphys Law:
<
Without telling you, someone will change something in the infrastructure and crash the
system.
<
When the power fails, you find out that the battery in your UPS is dead.
<
<
The one thing that you did not test is where the problem is.
<
Someone will need a network jumper cable, and will remove it from your server.
<
<
<
<
113
<
<
The one time you did not check the backup log will be the time when the backup fails.
<
<
<
What you did not write down, and forgot, is what you need to know.
<
<
<
<
When you need to send an alpha page, a link in the e-mail system will fail.
<
When a disaster strikes, and you need to be found, you will be out of the pager or cell
phone coverage area.
<
When a disaster strikes, and you need to be contacted, the battery in your pager or cell
phone will be dead.
6SHFLDO'HILQLWLRQV
There are terms used in this guidebook that have very specific meanings. To prevent
confusion, they are defined below:
'DWDEDVHVHUYHU
This is where R/3 and the database resides.
The system clock of the database server is the master clock for the R/3 system.
$SSOLFDWLRQVHUYHU
This is where R/3 application runs.
On a two-tiered system, this would be combined on the database server. Application
servers can be dedicated to online users, batch processing or a mix.
,QVWDQFH
An installation of R/3 on a server.
The two types of instances are central, and dialog. More than one instance could exist on a
physical server.
6\VWHP
The complete R/3 installation for a System ID (SID), for example PRD.
A system logically consists of the R/3 central instance and dialog instances for the SID. This
physically consists of the database server and application servers for that SID.
114
Release 4.6A/B
Layers
Physical Devices
R/3 Instance
Presentation
Desktop PCmany
N/A
SAP GUI
Application
Application Server
Dialog
R/3
Central
Database: SQL
Server, DB2,
Informix, ADABAS,
Oracle
N/A many
Database
Database server
only one
A two-tiered configuration combines the application and database layers on a single server.
115
116
Release 4.6A/B