Backing up Sap Maxdb Using Networker

Total Page:16

File Type:pdf, Size:1020Kb

Backing up Sap Maxdb Using Networker BACKING UP SAP MAXDB USING NETWORKER Michael Dick Principal Solutions Architect Backup and Recovery Systems Dell EMC [email protected] Updated October 2016 Table of Contents Introduction ..................................................................................................................... 4 History of SAP MaxDB .................................................................................................... 5 Uses Of SAP MaxDB ...................................................................................................... 5 Ways to back up SAP MaxDB ......................................................................................... 6 Using NetWorker to back up SAP MaxDB ....................................................................... 7 Creating the Backup Templates .................................................................................... 11 Configuring SAP MaxDB backups on Linux using NetWorker ....................................... 15 Configuring SAP MaxDB backups on Windows using NetWorker.................................. 17 Configuring multiple backup streams ............................................................................. 18 Backing up SAP MaxDB using NetWorker 8.x and 9.x .................................................. 21 Scheduled backups of SAP MaxDB using NetWorker 8.0 ......................................... 24 Scheduled backups of SAP MaxDB using NetWorker 9.0 ......................................... 27 Restoring SAP MaxDB using NetWorker ....................................................................... 29 Troubleshooting MaxDB backups .................................................................................. 38 Appendix A – Parameter Reference .............................................................................. 39 NSR_HOME .............................................................................................................. 39 NSR_HOST ............................................................................................................... 39 NSR_POOL ............................................................................................................... 39 NSR_EXPIRE ........................................................................................................... 39 2013 EMC Proven Professional Knowledge Sharing 2 NSR_NOTVERBOSE ................................................................................................ 40 NSR_USEOUTPUT ................................................................................................... 40 NSR_IGNOREERROR .............................................................................................. 41 NSR_EBIDTYPE ....................................................................................................... 41 NSR_SAVEINTERVAL .............................................................................................. 41 NSR_BACKUPNAME ................................................................................................ 41 NSR_AVOIDPSSIDBUG ........................................................................................... 42 NSR_AVOIDPSSIDBUG ........................................................................................... 42 NSR_SAVETIMEFORMAT ........................................................................................ 42 NSR_SIZEROUNDUP ............................................................................................... 44 NSR_AVOIDTIMEBUG ............................................................................................. 44 NSR_CLIENT ............................................................................................................ 44 NSR_USECLIENTFOR ............................................................................................. 45 References .................................................................................................................... 46 Biography ...................................................................................................................... 46 Disclaimer: The views, processes or methodologies published in this article are those of the authors. They do not necessarily reflect Dell EMC’s views, processes or methodologies. 2013 EMC Proven Professional Knowledge Sharing 3 Introduction This paper is intended as a guide to backing up SAP MaxDB using Networker 8 and 9. It is not intended to be an introduction or administrative guide to MaxDB or SQL programming. For a detailed discussion of MaxDB administration and tuning please go to maxdb.sap.com 2013 EMC Proven Professional Knowledge Sharing 4 History of SAP MaxDB SAP MaxDB started in 1977 as a research project at the Technical University (TU) in Berlin and was initially named RDS. Between 1977 and 1997, what is now known as SAP MaxDB, underwent many name changes. It was known as Reflex DDB/4 and ADABAS D during the time it was owned by Nixdorf Computer AG (Siemens Nixdorf Information Systems AG and Software AG). In 1993, this research database, now named ADABAS D started shipping with SAP R/3. In 1997, SAP AG took over ADABAS D and renamed it ADABAS D for SAP R/3. In 2003, SAP AG and MySQL joined in a partnership and rebranded the database to MaxDB. In 2007, this reselling agreement was terminated. SAP AG is now managing the development, sales, and support of the SAP MaxDB database system. Uses Of SAP MaxDB What makes SAP MaxDB so interesting is that MaxDB runs fully in memory; only security-related changes require access to the disk drives. This, of course, makes MaxDB very fast. While MaxDB can be used to run complete SAP instances, it is mainly used for LifeCache. LifeCache combines the advantages of main-memory based data retention with a complete operating concept, which includes backup and recovery. 2013 EMC Proven Professional Knowledge Sharing 5 Ways to back up SAP MaxDB There are two primary ways to back up MaxDB; with the internal backup tool and with a third party tool such as NetWorker®. Using the internal tool, we can create a backup on either a file type device (mostly local to the DB server) or a tape device. Both approaches have obvious disadvantages. The disadvantages with the file type device are that it is stored on expensive disk and, in order to have offsite copies, must be backed up again with a backup application. The disadvantage of tape is, besides the known disadvantages of tape, that it creates a backup server out of a database server. Using a third party application will back up MaxDB directly to a backup device, eliminating these disadvantages. The backup server can then clone copies for offsite storage without impacting the database system. The third party tool used in this article is NetWorker (version 8 and version 9) while the MaxDB version referred to is 7.9. The procedures outlined here are only valid for MaxDB versions 7.5 and higher. Figure 1 shows the command and data flow for a MaxDB backup using NetWorker as third party backup tool. dbmcli is calling the database manager MaxDB Database Server with start_backup <template_name> Start backup by calling savepnpc savepnpc is calling dbmcli Database Manager CLI Backup Server MaxDB Kernet DBM Server Backup History Backup Tool Server client sends backup data to Component server Data is send via named Backup Tool Client (NSR pipes to the client site of save) the backuptool Data Store Backup Device Figure 1 2013 EMC Proven Professional Knowledge Sharing 6 Using NetWorker to back up SAP MaxDB While the internal MaxDB backup tool is quite nice, it lacks the ability to schedule full and incremental backups. This is where NetWorker comes into the picture. Log file backups can be automated using the Automatic Log Backup function of SAP MaxDB. Using this function, we can choose to backup log files when the segment is full (default behavior), or backup log files at certain time intervals. These log file backups can then be written to NetWorker through a backup template. Using the automated log backup feature simplifies the taking of log backups. The following section will explain how to set up MaxDB backups to write to EMC NetWorker. It is only a small step to automate the backups, once we are able to write to NetWorker using SAP MaxDB Database Studio or command line. The backup configuration using NetWorker requires that backup environment parameters be set. The default locations for the configuration files differs by operating system and is shown in the configuration section specific to these operating systems. A non-default location for the configuration file can specified by setting the variable NSR_ENV to this location using dbmcli. The command syntax for setting the setting NSR_ENV is dbmcli –d <db_name> -n <server_name> -u <user>,<password> dbm_configset –raw NSR_ENV <absolute_path> The configuration file informs the database manager where NetWorker is located and how to address it. Table 1 shows the variables recognized in the configuration file and a short description. An explanation of each of the variables with their complete syntax can be found in Appendix A. 2013 EMC Proven Professional Knowledge Sharing 7 Variable Description NSR_HOME Absolute path of the directory where the NetWorker binaries are installed. This parameter is mandatory. NSR_HOST NetWorker server host name. This parameter is mandatory. NSR_POOL Pool to save the MaxDB backups. This parameter is mandatory. NSR_EXPIRE This parameter overwrites the expiration on the client with the expiration
Recommended publications
  • SAP on Google Cloud: High Availability
    SAP on Google Cloud: High availability Overview © 2020 Google LLC. All rights reserved. Contents About this document 2 Introduction 2 Levels of high availability 3 Level 1: Infrastructure 3 Zones and regions 3 Live migration 4 Host auto restart 4 Level 2: Database setup 5 SAP HANA databases 5 Synchronous SAP HANA System Replication 5 SAP HANA host auto-failover on Google Cloud 7 SAP ASE databases 8 MaxDB databases 8 IBM Db2 databases 9 Microsoft SQL Server databases 9 Level 3: Application servers 10 Summary 12 Further reading 13 ​1 ​© 2020 Google LLC. All rights reserved. About this document This document is part of a series about working with SAP on Google Cloud. The series includes the following documents: ● High availability (this document) ● Migration strategies ● Backup strategies and solutions ● Disaster-recovery strategies Introduction The term high availability (HA) is used to describe an architecture that improves a system’s ​ ​ availability. The availability of a system refers to a user’s ability to connect to the system and conduct the required operations. If a user can’t connect, the system is perceived as unavailable, regardless of the underlying issue. For example, a networking issue can prevent users from accessing the service, even though the system is running. A high-availability setup interacts with multiple components of the architecture to minimize the points of failure, typically by using redundancy. To measure a service’s performance throughout the year, the metric of percentage of uptime is ​ ​ used to calculate the ratio of uptime to the aggregate of uptime and downtime. A system that is available for ~8750 hours during the 8760 hours of a year has an uptime of 99.89% (8750/8760) and a downtime of 10 hours.
    [Show full text]
  • Maxdb Security Guide
    MaxDB Security Guide NetWeaver 2004s, SP 08 SAP Online Help June 2006 Copyright © Copyright 2006 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390, OS/400, iSeries, pSeries, xSeries, zSeries, z/OS, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli, Informix, i5/OS, POWER, POWER5, OpenPower and PowerPC are trademarks or registered trademarks of IBM Corporation. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. MaxDB is a trademark of MySQL AB, Sweden. SAP, R/3, mySAP, mySAP.com, xApps, xApp, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world.
    [Show full text]
  • CAMS Operations Guide, Which You Can Find on the SAP Service Marketplace At
    Application Operations Guide Complex Assembly Manufacturing Solution (CAMS) Operations Guide Release 7.2 Document Version 1.00 June 2012 SAP AG 2121 Palomar Airport Rd. Suite 350 Carlsbad, CA 92011 USA T 00/1/760-929-2300 F 00/1/760-929-2301 www.sap.com © Copyright 2012 SAP AG. All rights reserved. licensing terms described here, provided that the new terms are clearly indicated on the first page of each file where they apply. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may IN NO EVENT SHALL THE AUTHORS OR DISTRIBUTORS BE LIABLE TO ANY be changed without prior notice. PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OF THIS SOFTWARE, ITS Some software products marketed by SAP AG and its distributors contain proprietary DOCUMENTATION, OR ANY DERIVATIVES THEREOF, EVEN IF THE AUTHORS software components of other software vendors. HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Microsoft, Windows, Outlook, and PowerPoint are registered trademarks of Microsoft THE AUTHORS AND DISTRIBUTORS SPECIFICALLY DISCLAIM ANY Corporation. WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, PURPOSE, AND NON-INFRINGEMENT. THIS SOFTWARE IS PROVIDED ON AN AS/400, OS/390, OS/400, iSeries, pSeries, xSeries, zSeries, z/OS, AFP, Intelligent Miner, "AS IS" BASIS, AND THE AUTHORS AND DISTRIBUTORS HAVE NO WebSphere, Netfinity, Tivoli, and Informix are trademarks or registered trademarks of OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, IBM Corporation in the United States and/or other countries.
    [Show full text]
  • SAP Scripting Tool: an Introduction How to Use It
    SAP Scripting Tool: an Introduction how to use it SAP Scripting Tool: an Introduction how to use it Applies to: SAP Scripting Tool for Eclipse, version 0.8.8. Summary This article gives a short introduction to the SAP Scripting Tool, its motivation, installation and description of the different parts. Author: Frederic Ahring Company: SAP AG Created on: 12 October 2006 Author Bio Frederic Ahring ([email protected]) Frederic started to write programs at the age of 11, first for fun, later freelancing during his studies. He has several years of experience with Java, Perl and PHP after dropping Pascal and Delphi as his favorite languages. After graduating at the University of Applied Sciences, Karlsruhe, he joined SAP in July, 2006. His current work on the SAP Scripting Tool combines his experiences in Java and scripting languages. SAP DEVELOPER NETWORK | sdn.sap.com BUSINESS PROCESS EXPERT COMMUNITY | bpx.sap.com © 2006 SAP AG 1 _____________________________________________________________________SAP Scripting Tool: an Introduction how to use it Table of Contents SAP Scripting Tool: an introduction how to use it ........................................................................... 1 Applies to: ........................................................................................................................................ 1 Summary.......................................................................................................................................... 1 Author Bio .......................................................................................................................................
    [Show full text]
  • Veritas™ High Availability Agent for SAP Maxdb Installation and Configuration Guide
    Veritas™ High Availability Agent for SAP MaxDB Installation and Configuration Guide AIX, HP-UX, Linux, Solaris 5.0 March 2009 Veritas High Availability Agent for SAP MaxDB Installation and Configuration Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Agent version: 5.0.2.0 Document version: 5.0.2 Legal Notice Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Veritas and Veritas Storage Foundation are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations.
    [Show full text]
  • LCM263 Managing Maxdb with Database Studio
    LCM263 Managing MaxDB with Database Studio Version 7.7 Suitable for SAP and non-SAP environments 1 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP’s strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non- infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. © SAP 2007 /MaxDB Administration with Database Studio/ Page 2 2 Chapter Introduction © SAP 2007 /MaxDB Administration with Database Studio/ Page 3 3 SAP and MaxDB MaxDB is SAP’s database offering Part of the SAP Technology Portfolio Supports all SAP applications Part of the SAP NetWeaver Platform and Development Workbench Application, platform and DBMS from one vendor MaxDB Competitive feature set and performance level Easy administration and minimal cost of ownership Focused on the requirements of SAP customers and SAP applications Ongoing SAP
    [Show full text]
  • BLAISE PASCAL MAGAZINE ALL ABOUT DELPHI and DELPHI PRISM(.Net) , LAZARUS & PASCAL and RELATED LANGUAGES Pascal8
    BLAISE PASCAL MAGAZINE ALL ABOUT DELPHI AND DELPHI PRISM(.Net) , LAZARUS & PASCAL AND RELATED LANGUAGES Pascal8 Delphi 2010 – what a feeling! - Bob Swart page 7 Gestures could be the new ’must’ in our computers future Counters - David Dirkse page 11 Learning counting again, - could wel be a hobby... Virus in Delphi? - Nick Hodges page 14 Nick explains how to get rid of the virus and block it. Dezign for databases - Marco Roessen page 16 A fantastic alternative for its expensive competitors, and it’s even cheaper. Customizing the T-Field data display - Henk Schreij page 18 Diving deeper into the possibility’s Using Free Pascal and Lazarus to create applications for OSX - Jeremy North page 20 Working on the Mac is hot Writing Delphi Components II: Custom Properties and Windows Controls - Marco Cantù page 22 In the new Delphi versions it looks all different. My Top Five Delphi 2010 New Features - Pawel Glowacki page 24 Except for guestures ther is a lot of news... Fast Graphic deformation by using Scanlines - Peter Bijlsma page 28 Control your own image or blow it up! Berlusconi on the edge Wide Information Bus (Introduction) - Fikret Hasovic page 33 What is it and what the use for it? Freehand Drawing (Introduction) - David Dirkse page 36 shows how to create your own paint program October 2009 Publisher: Foundation for Supporting the Pascal Programming Language in collaboration with the Dutch Pascal User Group (Pascal Gebruikers Groep) © Stichting Ondersteuning Programeertaal Pascal Cover price Europe: € 10.00 / UK £ 10.00 / US $ 10.00 BLAISE PASCAL MAGAZINE 8 ALL ABOUT DELPHI AND DELPHI PRISM(.Net) ,LAZARUS & PASCAL AND RELATED LANGUAGES CONTENTS Volume 8, ISSN 1876-0589 Editor in chief Articles Detlef D.
    [Show full text]
  • Strong Dependencies Between Software Components
    Specific Targeted Research Project Contract no.214898 Seventh Framework Programme: FP7-ICT-2007-1 Technical Report 0002 MANCOOSI Managing the Complexity of the Open Source Infrastructure Strong Dependencies between Software Components Pietro Abate ([email protected]) Jaap Boender ([email protected]) Roberto Di Cosmo ([email protected]) Stefano Zacchiroli ([email protected]) Universit`eParis Diderot, PPS UMR 7126, Paris, France May 24, 2009 Web site: www.mancoosi.org Contents 1 Introduction . .2 2 Strong dependencies . .3 3 Strong dependencies in Debian . .7 3.1 Strong vs direct sensitivity: exceptions . .9 3.2 Using strong dominance to cluster data . 11 3.3 Debian is a small world . 11 4 Efficient computation . 12 5 Applications . 13 6 Related works . 16 7 Conclusion and future work . 17 8 Acknowledgements . 18 A Case Study: Evaluation of debian structure . 21 Abstract Component-based systems often describe context requirements in terms of explicit inter-component dependencies. Studying large instances of such systems|such as free and open source software (FOSS) distributions|in terms of declared dependencies between packages is appealing. It is however also misleading when the language to express dependencies is as expressive as boolean formulae, which is often the case. In such settings, a more appropriate notion of component dependency exists: strong dependency. This paper introduces such notion as a first step towards modeling semantic, rather then syntactic, inter-component relationships. Furthermore, a notion of component sensitivity is derived from strong dependencies, with ap- plications to quality assurance and to the evaluation of upgrade risks. An empirical study of strong dependencies and sensitivity is presented, in the context of one of the largest, freely available, component-based system.
    [Show full text]
  • ABAP Core Data Services SAP Business Suite – Best Practice Guide
    ABAP Core Data Services SAP Business Suite – Best Practice Guide PUBLIC Document Version: February 7, 2020 www.sap.com/contactsap © 2020 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality.
    [Show full text]
  • Snap Creator Framework 4.3.1 Administration Guide
    Snap Creator® Framework 4.3.1 Administration Guide October 2018 | 215-11922_C0 [email protected] Table of Contents | 3 Contents What Snap Creator Framework does ......................................................... 7 Benefits of using Snap Creator .................................................................................... 7 Snap Creator architecture ........................................................................... 9 Snap Creator Server overview ..................................................................................... 9 Snap Creator Agent overview ................................................................................... 11 Plug-ins for application integration ........................................................................... 12 Managing Snap Creator Server ................................................................ 14 Starting, verifying, and stopping Snap Creator Server on Windows ......................... 14 Starting, verifying, and stopping Snap Creator Server on UNIX .............................. 15 Changing the Snap Creator Server port after installation ......................................... 15 Setting Snap Creator Server credentials .................................................................... 16 Managing Snap Creator Agent ................................................................. 17 Starting, verifying, and stopping Snap Creator Agent on Windows ......................... 17 Starting, verifying, and stopping Snap Creator Agent on UNIX .............................
    [Show full text]
  • Penetration Testing Techniques
    POLITECNICO DI TORINO Corso di Laurea in Ingegneria Informatica Tesi di Laurea Magistrale Penetration Testing Techniques Relatori prof. Antonio Lioy ing. Andrea Atzeni Candidato Antonio Morrone Anno accademico 2016-2017 Sommario The subject of the thesis concerns one of the hottest aspect of IT today: Information Security. The goal of the work is the analysis of the methodologies used to verify the security of a system, also known as Penetration Testing techniques. It will give an overview of the techniques used by an attacker to penetrate into an information system in order to reach his objectives, which can include information gathering only, or leading a company to a denial of service. In order to correctly adopt the necessary countermeasures to be able to defend against pene- trations, companies need to develop the right mindset, to be suspicious and to be prepared to such events. Nowadays each company needs to protect themselves from cyber attacks, so it is impor- tant to become conscious about the risk involved in these days, since that no one is excluded, both people and companies. Today we heard about security attacks very often and they demonstrate that people and company have to be aware about the actions to be taken to reduce its risk and to be able to react if it occurs. The first part of the thesis will describe the different kinds of attack that can besufferedby a company, with the objective to permit a development of the knowledge necessary to implement the security procedures act to protect their assets. This document will give a categorization of the different scenarios which can take place during a penetration, since that many conditions can tamper with the status of an information system.
    [Show full text]
  • System Rename for SAP Systems Based on Application Server ABAP of SAP Netweaver 7.3 EHP1 to 7.52 on Windows Company
    Operations Guide | PUBLIC Software Provisioning Manager 1.0 SP32 Document Version: 3.3 – 2021-06-21 System Rename for SAP Systems Based on Application Server ABAP of SAP NetWeaver 7.3 EHP1 to 7.52 on Windows company. All rights reserved. All rights company. affiliate THE BEST RUN 2021 SAP SE or an SAP SE or an SAP SAP 2021 © Content 1 About this Document.........................................................7 1.1 Use Cases of System Rename....................................................8 1.2 How to Use this Guide..........................................................9 1.3 About Software Provisioning Manager 1.0............................................9 1.4 SAP Products Based on SAP NetWeaver 7.3 EHP1 to 7.52 Supported for System Rename Using Software Provisioning Manager 1.0 ................................................10 1.5 Naming Conventions..........................................................11 1.6 New Features...............................................................12 1.7 Constraints.................................................................14 1.8 SAP Notes for the System Rename................................................16 1.9 Accessing the Installation Guides and System Copy Guides...............................17 1.10 Accessing the SAP Library......................................................17 2 Planning..................................................................18 3 Preparation............................................................... 20 3.1 Preparation Checklist.........................................................20
    [Show full text]