Monitoring Secrets for SAP
Transcription
Monitoring Secrets for SAP
Monitoring Secrets for SAP ENCYCLOPEDIA ENCYCLOPEDIA Monitoring Secrets for SAP © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... ...................................................................... © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 Monitoring Secrets for SAP ENCYCLOPEDIA Contents Argent Monitor For SAP Overview 3 Introduction 3 What to Monitor? 4 Availability Monitoring 5 SAP System TCP Port Listeners 7 Third-Party Applications 7 Server Hardware 7 Service and Process Monitoring 8 CCMS Monitoring 9 SAP CCMS Monitor Templates Monitor Set 14 Performance Overview Monitor 15 Operating System Monitor 17 Database Monitor 19 Security Monitor 20 Transactional RFC and Queued RFC 22 Appendix A – TCP/IP Ports Used by SAP Applications 24 Appendix B – Defining CCMS Communication Users 31 31 Procedure © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 Monitoring Secrets for SAP ENCYCLOPEDIA Argent Monitor For SAP Overview Internet Communication Manager (ICM) Introduction Handles communication between the SAP Application Server and the outside world via HTTP, HTTPS and SMTP protocols. Argent XT is a comprehensive monitoring and alerting solution that can SAP applications are based on the SAP NetWeaver application and integration platform. SAP enterprise applications can be deployed in a two or three-tier architecture. The three-tier client/server architecture generally consists of a presentation layer, an application layer, and a database layer. The SAP application layer contains the following components: Central services - which include messaging (manages client connections and communications) and enqueue (SAP lock management) services. Application services - that process online and batch workloads, which can be further categorized into the following types: • ABAP: processes workloads based on an SAP proprietary programming language. • Java: processes Java based workloads. • ABAP + Java: processes both ABAP and Java based workloads. The specific SAP product determines the type of application service required (ABAP, Java or both). Dispatcher Client (SAP GUI) Request for ABAP ABAP Work Processes Gateway Message Server DB ABAP JCo FastRFC J2EE Dispatcher Request for J2EE Task Handler ABAP Engine ICM Internet Client (Web Browser) Client (SAP GUI) SDM J2EE Server Processes J2EE Engine Message Server DB J2EE Enqueue Server Central Services The above image illustrates the architecture of the SAP NetWeaver application server which includes both the ABAP and Java stack. Note that the two stacks can be installed separately or together. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 Central Services Comprises message and enqueue services. There are separate central services for the ABAP and Java stack (image above shows two message servers, while the second enqueue server for the ABAP stack is not shown). Dispatcher Accepts requests from the ICM or external SAP clients and places them into a queue from which it distributes requests to other SAP processes to execute application logic. What are a System, an Instance and all that? A SAP Application Server system consists of one or more instances. An instance is a “server” in the sense that a user can connect to every instance individually. An instance typically consists of many running operating system processes that are connected by shared memory, TCP/IP connections on the local host and other means. All instances belonging to the same system are connected to the same RDBMS. A system has a three-letter name, the system identifier (SID). Instances of a system do not have to be configured identically; instead, different instances may offer different services. Some services are unique in a system, i.e. only one instance is configured to offer these services (e.g. Enqueue, Message Server). A system may have an instance called “central instance”, which offers many of these unique services. Every instance has a number between 00 and 99, the socalled instance number (abbreviated by InstNr or NN to indicate the numerical value). The installation default is 00. If more than one instance is installed on the same host, they MUST have different InstNr. InstNrs are usually part of the Port numbers to ensure that there is no conflict between instances. An instance uses a number of TCP and UDP ports for internal communication. These ports are usually not configurable and not relevant for the “outside world”. They are interesting only in the rare case when a conflict with other software on the same host occurs. The InstNr for an instance can be chosen freely. Different instances belonging to the same system can have different InstNrs. The InstNr is chosen during the installation. 3 Monitoring Secrets for SAP What to Monitor? SAP defines the following areas as Key Performance Indicators for SAP Monitoring: ENCYCLOPEDIA Network and System Monitoring • How is the network performance impacting the overall service performance? Availability • Are the servers properly sized in terms of CPU, memory, disk activity, etc.? Heartbeat of a Technical Component. • Are there any critical alerts in the system event logs? Performance Average General Response time. Response times of particularly important subcomponents or actions. Utilization Capacity Hardware – CPU, I/O, Memory and Operating System. Application – Memory and Processes. Processing Queues. Exceptions Short Dumps. Security Web Application Server Monitoring • How many sessions are currently being handled by the SAP web/application server, and are there sufficient processes configured to handle the load? • Is the workload properly balanced across SAP web application server instances? • What is the processing time of critical transactions on the server? • Were there any errors while connecting to the R/3 server? • Is the application server’s memory adequately sized? Is the free memory too low? SAP R/3 Server Monitoring Unauthorised Access. • Are the buffers of the SAP R/3 server sized appropriately? Configuring thresholds for these KPI’s strongly depends on the business needs and on the IT scenarios. CCMS monitoring counters are configured with a default threshold, which can act as a good starting point. For instance, CPU utilization turns red at 98% CPU rate. • Are there unusually high swap ins/outs? • How many requests are queued waiting for free worker processes or data locks? • Are there sufficient dialog processes configured to handle incoming user requests? To find an appropriate threshold, store a performance counter for • Are there any ABAP dumps happening, indicating errors in some weeks, and analyze the average afterwards. The average prothe R/3 system? vides an overview of the IT behavior. Finally, set the threshold 10-20% above or below the average, which indicates a clear deviation. SAP R/3 Database Monitoring The following statements provide insights into the key and critical monitoring and performance in an SAP system: SAP Service Monitoring • Is the SAP service working well? What are the response times? Is any step slowing down the entire service interaction? • Are the critical application processes running? What is their resource usage? © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 • Is the SAP R/3 database accessible? • How are the critical cache hit ratios of the database server? • Are any of the database table spaces reaching capacity? The remainder of this document will cover how to use some of these key performance indicators and ways of addressing the above questions. 4 Monitoring Secrets for SAP ENCYCLOPEDIA Availability Monitoring Let’s take a look at some of the things that might affect the availability of the R/3 system on UNIX and Windows Operating Systems. • UNIX OS Availability via SSH Logon Test • Windows OS Availability via NetRemoteTOD API These rules are provided via the Argent Guardian as shown below. SAP System R/3 System Logon Test The availability of the SAP R/3 system is a pre-requisite for using the SAP system for data processing. Suffice to say, that to establish connection to the SAP system, the system must be up and running. A simple way to ascertain this is to try and log on to the SAP system. This Rule is part of the Argent Monitor for SAP and provides a synthetic user logon test that can be performed from any Argent Remote Monitoring engine installed on a Windows server – e.g. from a remote location © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 5 Monitoring Secrets for SAP ENCYCLOPEDIA Each SAP server is defined in the Argent Master Catalog with the following instance detail as shown below. Application Server Enter the address/name of the SAP server to monitor. Router String (Optional) If the connection is being made through a router, enter a router address string; find the router address using the SAP Logon tool from the SAP Client software. Open the Logon console, select the server to monitor and then select Properties to view the router address; otherwise leave it blank. System Number Enter the System number for the SAP server. A default system number of 00 is typically used. Client Number Enter the Client to use for connecting to SAP. A default client of 800 is typically used. Logon Enter the Username required to connect to the SAP server. This user must have authorization to access CCMS metrics. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 6 Monitoring Secrets for SAP ENCYCLOPEDIA Password Enter the Password required to connect to the SAP server. System Name System Name functional reference. SAP System TCP Port Listeners Utilise a Scan Specific Port Test to check SAP Dispatcher or any other SAP Application Listeners. See Appendix A for other TCP Ports used by SAP Applications. Third-Party Applications Apart from potential problems within the R/3 environment there are numerous dependencies from multiple systems to ensure maximum performance of the network, hardware and operating system, database (s) and applications. Numerous other applications with interfaces to R/3, for example messaging systems such as Microsoft Exchange or Lotus Notes or Internet Server such as Microsoft IIS, can impair performance and availability of the systems. Even failure of automated backup solutions such as Legato’s NetWorker, Computer Associates’ ARCserve IT or Veritas’ Backup Exec may cause adverse effects on the SAP R/3 system. These systems should be monitored using standard best practice, which are the monitoring of Availability, services, processes and critical performance metrics within these applications. SAP Web Portals can be monitored by using the Argent Defender to simulate users’ transactions and to alert on any http based errors. Server Hardware The hardware components which run the SAP R/3 system must be monitored. Some events such a fan failure or physical disk errors often result in unplanned system failures. It is essential to monitor hardware health to ensure availability of the SAP R/3 system. Hardware can be achieved by using the vendor supplied hardware monitoring agents (such as HP SIM Agents, Dell OpenManage Agents or IBM Director Agents) to forward SNMP Traps to the Argent Console. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 7 Monitoring Secrets for SAP ENCYCLOPEDIA Service and Process Monitoring The services or processes of the SAP R/3 system are a pre-requisite for the SAP system for data processing. Suffice to say that to establish connection to the SAP system, the system must be up and running. Some of the processes that might affect the availability of the R/3 system on UNIX and Windows operating systems will now be examined. • Windows Services that run SAP systems Any windows service can be monitored and alerted if it has an issue. • UNIX Daemons / processes that run SAP Systems Any shell script can be used to monitor the underlying Operating System metrics such as Disk, CPU, Memory, Daemons and Processes. R/3’s critical processes There are quite a few areas that might impair availability and performance of the SAP R/3 system. The most critical components whose availability should be monitored are R/3 Message Service and R/3 Dispatcher Service. • A message service failure, the system cannot respond to enquiries. • A dispatcher service failure, at least one application server will no longer be available. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 8 Monitoring Secrets for SAP ENCYCLOPEDIA CCMS Monitoring Transaction RZ20 allows monitoring of all systems in the SAP system landscape. Using transaction RZ20, all defined alerts can be monitored. Furthermore, the CCMS monitor provides a current status view and open alert view which displays recent reporting data and history information respectively. Monitor - Collection of MTE (Monitor Tree Elements), assembled in a hierarchy MTE Monitor Tree Elements are knots in the monitor tree. There are three different kinds: monitor attributes, monitor objects and monitor collections. Monitor Objects Represent objects which can be monitored. They can be database table-spaces, hard disks or SAP System components. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 9 Monitoring Secrets for SAP ENCYCLOPEDIA Monitor Attributes These are the basic elements in the monitor tree. They describe the status of the monitor objects. Four different kinds exist: Performance, Status, Protocol and Text. Argent’s CCMS Rules use the SAP BAPI interface, opening up a wealth of SAP metrics. Using an installed SAP GUI on the Argent MAIN Engine or an Argent Remote Monitoring, the information necessary to build customized Argent monitoring Rules can be found. Example To monitor the CPU Usage of the SAP instance, use the SAP GUI to determine the System Name, Counter Name, Object Name, and MTE Name needed. In the SAP GUI, log onto the target system and expand the Tools folder under SAP Menu. Then expand CCMS, and Control/ Monitoring. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 10 Monitoring Secrets for SAP ENCYCLOPEDIA Next, double-click CCMS monitor sets. On the resulting screen expand the SAP CCMS Monitor Templates folder, and double-click the Operating System item. If not already expanded, expand the Server_Name_ERP_00 folder and locate the CPU item and CPU_Utilization beneath it. Right-click CPU_Utilization and choose Properties. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 11 Monitoring Secrets for SAP ENCYCLOPEDIA The Properties and Methods page contains the detail needed. In the Argent SAP Monitor, create a new CCMS Rule called CPU_ OVERLOAD. To the right of the CCMS Rule Is Broken If, click the New button (the first button on the left), to bring up the CCMS Rule Criteria dialog box. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 12 Monitoring Secrets for SAP ENCYCLOPEDIA Enter the corresponding information from the Monitoring: Properties and Methods screen, as shown below. NOTE: The information to be entered here is case-sensitive. Argent can create CCMS rules using either Numeric or Text criteria. However only Numeric data can be saved to the Argent Predictor database, this will provide reporting and trending of the numeric data. Both Numeric and Text can be used to generate Alerts to notify Systems Administrator. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 13 Monitoring Secrets for SAP ENCYCLOPEDIA SAP CCMS Monitor Templates Monitor Set Consult the SAP Basis Admin to obtain Monitor Set and Monitor names or follow the process shown above. The Monitors are configured in SAP using RZ20 transaction. Choose what metrics to monitor, what alerts to capture, what App servers to include in the SAP Monitor using RZ20. The following provides a list of categories that are available: • Availability and Performance Overview Monitor • Background Processing • Buffers - The various SAP buffers, their hit rates, and swap rates • Change and Transport System • Communications - Data transfers (SAPconnect, SAP Gateway, ALE, LDAP, RFC) • Data Archiving - Monitored data archiving sessions • Database - table status, performance, backups, data consistency • Dialog Overview - dialog system, broken down by performance attributes • Dialog per Application Server - dialog system, broken down by application servers • Entire System • Filesystems • Operating System - Operating system data for any application servers and host systems • Performance Overview - important values about performance and possible causes of problems • Security - Security Audit Log and security-relevant messages in the system log • Spool System • Syslog – provides system messages • System Configuration • System Errors - Information about the most important error messages of the system • Workload Collector Now the more important Monitor sets will be reviewed. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 14 Monitoring Secrets for SAP ENCYCLOPEDIA Performance Overview Monitor Use the Performance Overview monitor to obtain the most important values about the performance of the application servers of in the system and to identify possible causes for performance problems it is highly recommended that at least these metrics are added as Rules to the Argent Monitor for SAP. ResponseTime The dialog response time consists of the period of time from the request of the dialog to the dispatcher through the processing, to the ending of the dialog in the dispatcher and the transfer of the data to the presentation layer. It also includes the time used during the roundtrips for data transfer from the front end to the application server and back. An alert here indicates a performance problem. The problem can have many different causes, and it is therefore necessary to perform a thorough analysis. First ensure the application server is not overloaded. This is measured, for example, using the statistics for CPU performance, system paging, and dialog work processes. Another possible bottleneck is the database; ensure that the database performance is adequate. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 15 Monitoring Secrets for SAP Possible corrective measures are: • Distribute users onto another (additional) application server. • Encourage users to schedule long-running reports or other actions as jobs in times outside the peak workload times. • Add work processes (preferably through operation mode switching). • Move parallel background processing jobs to times outside the peak workload times. ENCYCLOPEDIA HeapAct Utilization of the private memory as a percentage. A work process is only assigned private memory if the roll area and extended memory are occupied; the work process is then reserved for the current user context until the end of the transaction (PRIV mode). Performance problems occur if too many dialog work processes are running in PRIV mode. Program\Swap Swap rate of the program buffer. An alert for FrontendResponseTime when there are normal values for the ResponseTime means that the problem must be at the front end or CPU_Utilization with at connection to the application server. Average utilization of the CPU on a host as a percentage. UsersLoggedIn Page_In Number of users logged on. The system will have an optimum number Average number of page-ins per second. of users that it can deal with without affecting the overall load of the Page_Out system. QueueTime Average number of page-outs per second. Average time in the dispatcher wait queue. Load+GenTime Average load and generation time of CUA objects. DBRequestTime Average time for processing logical database requests. R3RollUsed Usage of the roll area as a percentage. The roll area is a memory area of a fixed, configurable size that belongs to a work process; it contains user-specific data and is the first memory that a work process obtains. EsAct Utilization of the extended memory as a percentage. The extended memory contains the largest part of the user context. The page management of this memory is performed not by the operating system, but directly by the SAP system. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 16 Monitoring Secrets for SAP Operating System Monitor ENCYCLOPEDIA Commit_ChargeFree Available commit charge: difference between the maximum This monitor set will monitor operating system data for any application available and the currently used commit charge (only for servers and host systems. The values are collected by the operating Microsoft Windows): system collector SAPOSCOL; these metrics could be collected from the OS directly using the Argent Guardian. The monitor contains the • Commit_Percent following monitoring tree elements (MTEs): Proportion of the maximum available commit charge used (Windows). CPU_Utilization Average usage of the CPU in a host system; the value shows how intensively the CPU is used and how much processing capacity is still available. 5minLoadAverage Average number of processes in a host system that are ready for execution but must wait to be processed by the CPU. Idle Idle time for all CPUs in the system. Paging Exchange of data pages between the main memory of a host system and the overflow store in a paging file on the hard disk; paging occurs if the main memory is not large enough for the contexts of all running processes. Page_In Swap_Space Storage space on the hard disk on which data that is not currently required is stored out of the main memory, so that there is space in the main memory for the program currently being executed (only for UNIX platforms): • Freespace Free swap space (only for UNIX platforms). • Percentage_Used Percentage usage of the swap space (only for UNIX plaTforms). OS_Collector State Status of the operating system collector SAPOSCOL. Packets_In Incoming packets per second in a LAN at the interface of a host system. Average number of page-ins per second; a page-in occurs if a process Packets_Out must access a data page that is not available in the main memory. Before the process can be continued, the operating system must retrieve Outgoing packets per second in a LAN at the interface of a host system. the page from the paging file. Page_Out Average number of page-outs per second (page-out occurs if a page is stored out of the main memory to make room for the pages required by other processes). Commit_Charge Total physical and virtual memory used by the OS and programs (Windows). © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 17 Monitoring Secrets for SAP ENCYCLOPEDIA Collisions Collisions in the LAN, in which two stations transport a packet at the same time on the same channel; this leads to the destruction of both packets and means that they must be sent again. Monitored Processes Monitored processes on this host. The following shows a process monitoring example from a SAP Whitepaper and will allow the addition of processes on the SAP Host to be added to the RZ20 Monitoring Tree. This Monitored Process MTEs can be configured to be monitored within the Argent Monitor for SAP by defining a custom CCMS Rule. This process is an example only and may vary depending on the version or SAP and the CCMS agent installation. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 18 Monitoring Secrets for SAP ENCYCLOPEDIA Database Monitor Another component to be monitored and managed is the SAP R/3 data storage, in most cases Oracle or Microsoft SQL Server. The SAP Computer Center Management System™ (CCMS™) offers a good view of the health of the database, especially SAP R/3 utilization figures. However, various other metrics not being monitored by CCMS can also have a significant impact on availability and performance. Database (view in RZ20) DB02 10 8 6 4 2 0 <DB System> space management performance backup/restore R/3 consistency running jobs health 0 2 4 6 8 10 ST04 DB12 DB13 Backup logs The database has a significant effect on the performance of the entire system. Therefore, transaction RZ20 provides information concerning the database system. • Space management will monitor table spaces and segments • Performance to monitor optimizer statistics, buffers, logs, and checkpoints • Backup/restore to monitor database and redo log backup • Consistency to check the consistency between the indexes, database objects, and database tables • Health to monitor BRCONNECT database system checks Also from an Operating system perspective we should monitor any log file used by the database system via the Argent Data Consolidator, such as: • Oracle Alert Log • SQL Error Log © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 19 Monitoring Secrets for SAP ENCYCLOPEDIA Security Monitor The monitor contains the following monitoring tree elements (MTEs): Logon System logon events reported by the Security Audit Log: • Successful logons, unsuccessful logon attempts, and log offs by a user • Locking of a user due to unsuccessful logon attempts, and the removal of the lock RFCLogon RFC/CPIC logon events reported by the Security Audit Log: • Successful RFC/CPIC logon • Unsuccessful RFC/CPIC logon attempt TransactionStart Transaction events reported by the Security Audit Log: • Transaction started and failed transaction start • Transaction locked or unlocked © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 20 Monitoring Secrets for SAP ENCYCLOPEDIA ReportStart Events connected with starting reports reported by the Security Audit Log: • Successful start • Failed start RFCCall Events connected with calling Remote Function Calls (RFCs) reported by the Security Audit Log: • Successful call • Unsuccessful call UserMasterRecords Events connected with changes to user master records reported by the Security Audit Log: • User deleted, locked, or unlocked • User master or authorizations of a user changed • Authorization/authorization profile created, changed, or deleted System Events connected to system parameter changes reported by the Security Audit Log: • Configuration of the Security Audit Log changed • Application server started or stopped Miscellaneous Other events reported by the Security Audit Log: • Download of a file • Call of a digital signature • Test message System Log Messages Messages in the system log for the security category; the category in which a message is reported can be selected, the message text, and the severity and criticality of the alert using the message ID in transaction SE92 The system records security-relevant actions in the Security Audit Log. Decide which actions are recorded there and which should trigger an alert in the Alert Monitor on the Security Audit Log configuration screen (transaction SM19). © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 21 Monitoring Secrets for SAP ENCYCLOPEDIA Transactional RFC and Queued RFC Function calls between systems; the call is only executed once in the target system, and either all or no calls of a Logical Unit of Work (LUW) are performed; queued RFC also guarantees the chronological processing of RFCs. Transactional RFC and queued RFC are variants of the Remote Function Call that make the data transfer between different systems more reliable and more secure. Total Calls – Number of tRFC and qRFC calls that are waiting to be executed in this system. This should have a rule set that would represent a satisfactory number of calls that the system can handle. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 22 Monitoring Secrets for SAP The following MTEs have the following procedural processes that can be used for troubleshooting. ARFCSSTATE: Outbound tRFC Calls The transaction Transactional RFC (SM58) is assigned as analysis method to all MTEs of this monitoring object. This tool lists only those transactional RFCs that could not be carried out successfully or that had to be planned as batch jobs. ENCYCLOPEDIA Port Number / Service Name For each service, we list the port number associated with this service and if existent the rule used to compute port number and service name. Some ports have corresponding entries in / etc/services. If this is the case, we also list the service name. Some services use fixed port numbers, however most use a number that depends on some other value to allow multiple instances of the program running on the same host. Variable name convention (see below for explanation): Calls w/Communication Errors – CPICERR Errors often occur in this attribute when an instance is shut down for maintenance. Once the instance is available again, the calls are automatically processed. If this is not the case, check the RFC connection using the Display and Maintain RFC Destinations transaction (SM59). Calls w/ Execution Errors – SYSFAIL Errors in the execution of RFC calls are often caused by errors in the programs. These errors must therefore usually be individually processed. Calls w/o Server Resources – SYSLOAD RFC calls with the status SYSLOAD are automatically scheduled in a job. For more information about SYSLOAD status, see SAP Note 319860. ARFCSSTATE: Inbound tRFC/qRFC Calls For information about possible statuses and problems for table ARFCRSTATE, see SAP Notes 378903 and 366869. Outbound Queues, Inbound Queues Start the assigned analysis method. For the MTEs of this monitoring object, this is transaction SMQ1 orSMQ2 (qRFC Monitor). • NN is the instance number of the SAP Application Server instance (e.g. 32NN /sapdpNN means 3200 / sadp00 for instance no. 00) • SID is the three letter system ID (e.g. sapmsSID means sapmsC11 for SAP system C11) All ports are TCP ports except where UDP is indicated. UDP is used only for internal communication ON THE SAME HOST, never for communication across a network. Most port numbers are configured by the installation procedure. In this case, the port number listed in the table is the one used by the installation procedure. Sometimes the installation procedure allows changing the port number. In this case, the value is the one presented as a default by the installation procedure. Other ports are not configured by the installation procedure. This is because the corresponding service can be used only after other manual configuration steps that cannot be carried out by the installation procedure. If a port is not automatically configured, this is indicated in the comment. To use the corresponding service, set the port manually. External QIN Schedulers: Errors, QOUT Schedulers: Errors Start the assigned analysis method. For the MTEs of this monitoring object, this is transaction SMQR or SMQS (QIN/QOUT Scheduler). Service The name or identifier of the network services provided by SAP programs. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 The most relevant ports are the ones used by programs that connect to the system, for example, SAP GUI or Web browser or other programs that communicate with the system. Those ports are labeled “external” – there are relatively few of them. The other ports are used for internal communication between components of the system. 23 Monitoring Secrets for SAP ENCYCLOPEDIA Appendix A – TCP/IP Ports Used by SAP Applications Default The default port numbers are used all defaults presented by the installation procedure are accepted. Range The port range indicates the minimum and maximum port number for this service. Not all numbers in this range may be valid ports for this service. Fixed The column labeled “fix” indicates that SAP does not support changing this port number. If a conflict occurs, chose a different instance number to avoid occupied ports. Comments If appropriate, a brief explanation on the service, the port numbers used or the installation and configuration options. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 24 Monitoring Secrets for SAP ENCYCLOPEDIA SAP Application TCP Port Tables © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 25 Monitoring Secrets for SAP © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 ENCYCLOPEDIA 26 Monitoring Secrets for SAP © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 ENCYCLOPEDIA 27 Monitoring Secrets for SAP © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 ENCYCLOPEDIA 28 Monitoring Secrets for SAP © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 ENCYCLOPEDIA 29 Monitoring Secrets for SAP © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 ENCYCLOPEDIA 30 Monitoring Secrets for SAP Appendix B – Defining CCMS Communication Users Users with particular, restricted authorizations are required in all ABAP systems in the system landscape for communication between the central monitoring system (CEN), the monitored systems, and CCMS agents. RFC calls are triggered from CEN to monitored ABAP systems to pull monitoring data. If agents are used in monitored ABAP systems, data is pushed to the central system. Data from non-ABAP systems and non-SAP components is exclusively pushed to CEN by local agents. Agents require a communication user in CEN to be able to log on to it. ENCYCLOPEDIA Creating the CSMREG User A user with specific, greatly restricted authorizations is required to monitor remote systems for the monitoring architecture. The user should have the User Type Communications. Argent recommends the creation and use of the user CSMREG for this purpose -- this user is required for the following tasks, for example: • Performing the data collection in the monitored systems. • Pushing the monitoring data from monitored systems that are connected to the central monitoring system using CCMS agents. • Registering a System Component Repository (SCR) with a central repository. SAP recommends the creation and use of the user CSMREG for this purpose in all relevant components. This user must be assigned the The CSMREG user must be created in all monitored systems; it role SAP_BC_CSMREG. The user CSMREG is also used to register The is not created automatically. CCMS System Component (SCR) with a central repository. Procedure Roles Used in Central Monitoring The following predefined user roles are available for displaying, setting up and performing central monitoring functions and for communication: SAP_BC_BASIS_MONITORING This role contains authorizations for displaying data for the central monitoring of an SAP system landscape using the CCMS monitoring infrastructure. 1. Choose CCMS - Configuration - Alert Monitor, or call transaction RZ21. 2. Choose Technical Infrastructure - Configure Central System - Create CSMREG User. 3. Enter any password for this user. If errors that indicate to a missing profile occur when creating the user, generate the profile for the role SAP_BC_CSMREG in transaction PFCG. Various SAP tools are used to do this (SMxx, RZxx, and STxx transaction codes). SAP_BC_CSMREG This role must be assigned to a communication user required by agents reporting to the central monitoring system. It provides specific, greatly restricted logon authorizations for CCMS agents in the central monitoring system. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 31 Monitoring Secrets for SAP ENCYCLOPEDIA The role SAP_BC_CSMREG contains the following authorizations: Authorization Object Field Value S_CCM_RECV ACTVT P0-P2 TABLE * RFC_FUGR FUGR RFC_NAME SALC S_RFC SALF SALH SALP SALS SAL_CACHE_RECEIVE SYST SCSM* SCCMSBI_UTIL_FUNCTIONS RFC1 SAPWLN3_COLLECTOR SAPWLN3_UTILITIES SCCMSBI_UTIL_FUNCTIONS SWNC_GLOB_SYSTEM ACTVT 16 Note: ArgSoft Intellectual Property Holdings Limited has created this White Paper for informational purposes only. ArgSoft Intellectual Property Holdings Limited makes no warranties, express or implied, in this document. The information contained in this document is subject to change without notice. ArgSoft Intellectual Property Holdings Limited shall not be liable for any technical or editorial errors, or omissions contained in this document, nor for incidental, indirect or consequential damages resulting from the furnishing, performance, or use of the material contained in this document, or the document itself. All views expressed are opinions of ArgSoft Intellectual Property Holdings Limited. All trademarks are the property of their respective owners. © ArgSoft Intellectual Property Holdings, Limited. 1991 - 2010 32