High Availability For SAP Solutions White Paper
High Availability For SAP Solutions White Paper
High Availability For SAP Solutions White Paper
2007
SAP AG Neurottstrae 16 69190 Walldorf Germany T +49/18 05/34 34 24 F +49/18 05/34 34 20 www.sap.com
Copyright 2007 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390, OS/400, iSeries, pSeries, xSeries, zSeries, System i, System i5, System p, System p5, System x, System z, System z9, z/OS, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli, Informix, i5/OS, POWER, POWER5, POWER5+, OpenPower and PowerPC are trademarks or registered trademarks of IBM Corporation. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. MaxDB is a trademark of MySQL AB, Sweden.
SAP, R/3, mySAP, mySAP.com, xApps, xApp, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. SAP assumes no responsibility for errors or omissions in this document. SAP does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or noninfringement. SAP shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence. The statutory liability for personal injury and defective products is not affected. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages. Documentation in the SAP Service Marketplace You can find this documentation at the following address:
http://service.sap.com/ha -> Media Library -> Literature & Brochures
Typographic Conventions
Type Style Example Text Represents Words or characters that appear on the screen. These include field names, screen titles, pushbuttons as well as menu names, paths and options. Cross-references to other documentation Example text Emphasized words or phrases in body text, titles of graphics and tables
Icons
Icon Meaning Caution Example Note Recommendation Syntax
Contents
Introduction ...............................................................................................................6 Avoiding Unplanned Downtimes .............................................................................7 Avoiding Single Points of Failure with the SAP NetWeaver AS ...........................8
Network ........................................................................................................................................ 9
Provider Connection ................................................................................................................................ 9 Router and Firewall .................................................................................................................................. 9 Network Load Balancing .......................................................................................................................... 9 Redundant Server Networks .................................................................................................................... 9 Other Network Services ........................................................................................................................... 9
Corrections by SAP................................................................................................................... 21
Support Packages ...................................................................................................................................21
Changes to Middleware Components ..................................................................................... 28 Maintenance of Hardware and System Software ................................................................... 28 Database Reorganizations ....................................................................................................... 28
Summary and Outlook ............................................................................................29 Checklist for HA Solutions.....................................................................................30 Glossary ...................................................................................................................32 SAP Library..............................................................................................................43
Introduction
To gain additional competitive advantage, enterprises must now work more closely together and integrate their current IT solutions with those of other organizations, such as partners, customers, or suppliers. The availability of these solutions is therefore essential. The number of areas that are critical to enterprises is increasing. SAP provides open, scalable, and available solutions to meet these requirements effectively. There are the following main availability classes, depending on the degree of availability required: Standard availability achievable availability without additional measures High availability increased availability after elimination of single points of failure Error tolerance highest availability, which even overcomes the failure of an entire production site With SAP solutions, SAP and its partners support all availability classes.
SAP offers a number of solutions to: Avoid unplanned downtime and optimize the support of system administration Reduce the effect of planned maintenance work on availability Restore production operation quickly Additional hardware and software solutions are used to increase availability. This requires close collaboration between SAP and its partners.
Application failures
40 %
Operation errors
- 80% of unplanned downtime (caused by "human errors") to be adressed with improved system, change and problem management processes - Hardware, OS, environment failures, disaster impact to be avoided by eliminating Single Points of Failure (SPOF)
A further 40% of unplanned downtime is due to operator errors. You can avoid this by using tools and services to support system operation. SAP provides coordinated system management solutions and a service portfolio to ensure stable operation and identify possible weak spots in advance. SAP also provides change management tools for this purpose.
HTTP Client
ABAP Dispatcher WP WP WP
Database Interface
RDBMS
The layers below the business applications are generally transparent to these applications. However, in the event of errors, they can affect the availability of the business applications and you must therefore protect them. Partners offer a number of proven solutions for this purpose. The most important mechanisms are described briefly below.
Network
To operate SAP applications in networks, additional components (for example, routers, switches, firewalls, load balancers) are required, which can also be single points of failure. These components are provided by partners. Note especially the following basic measures:
Provider Connection
When you are offering services that extend beyond an intranet, you normally have to use the network connections of internet providers. These connections must be executed redundantly. When choosing Internet service providers, make sure that as many potential customers as possible are also connected with these providers (which increases the likelihood of high throughput) and that peering between the chosen providers is possible, which avoids sudden performance problems due to the failure of one provider.
You can find more information on network high availability for SAP applications in the documentation SAP High Availability, which you can find in the SAP Library
Storage
Disk storage is particularly important for high availability. It stores important data that needs to be called quickly and reliably. Also, as a component with mechanical parts, it is exposed to wear and tear. Using technology based on a Redundant Array of Inexpensive/Independent Disks (RAID), you can distribute data redundantly to different disks to achieve both high availability and high performance. This is mostly implemented using special controller hardware. Besides hardware-based solutions, there are also software-based solutions for increasing the availability of disk systems. You can implement strategies using hardware-based RAID solutions (that is, mirroring and striping) together with the software-based solutions. In the last few years, there has been a trend away from storage units that are connected directly to local computers towards storage systems at network level. A Storage Area Network (SAN) is a highspeed network of shared storage systems. SANs are intended for block-oriented input and output. They are normally accessed using fiber channels and are suitable for large environments with high performance and scalability requirements. A Network Attached Storage (NAS) device is a server that has the sole task of providing disk space. NAS enables storage systems to be provided and extended flexibly, without affecting the servers using them. NAS devices are intended for file-oriented input and output and are normally accessed from IP networks. Features depend on the attributes of the respective devices and implementations. You can obtain more information from the relevant partners. Note that none of the critical components of storage devices are single points of failure.
You can find more information on how to make use of split-mirror features of storage devices for SAP Systems at: service.sap.com/split-mirror
Server
You can increase the availability of a server by using multiple components on different servers. This is particularly worthwhile if the applications running on the server are single points of failure. The following features can increase the availability of servers: Redundant resources, such as boards, space, power supply, bus Uninterrupted power supply Error-correcting memory (ECC memory) Mirrored disks Hot-plug compatible components Partitioning of server resources The solutions provided by SAP hardware partners include all these features.
Operating System
You should make sure that resources managed by the operating system (for example, host name, IP address, disk storage, processes) are set up so that applications can continue using them
10
transparently if the underlying hardware fails. To achieve this, multiple layers of hardware can be used with controlling cluster software, which appears externally as one unit. A switchover mechanism ensures that the resources assigned to a node in the cluster are automatically reassigned to another node in the cluster in the event of the first node failing. The affected resources remain available, except at switchover time. There are the following cluster types: A Shared Nothing Cluster is a cluster in which each node has its own tasks but also, in the event of another node failing, takes on the tasks of the failed node. Also, in the event of server resources failing, nodes are assigned other server resources. A Shared Everything Cluster is a clustering model in which each server can have simultaneous read and write access to all common data. You can obtain information about the exact attributes of a cluster solution from the relevant partner. Switchover in a Cluster
IP Address Transfer
10.1.1.2
Common Disks
You can find more information on SAP Systems in cluster environments in the Technical Infrastructure Guide, available from service.sap.com or in the relevant installation guide.
Database
The database is a central building block in the SAP component. Since the data is crucial, not only do you have to make sure that the database is safeguarded against failure, but you also have to regularly save the data itself and check that it can be recovered. SAP supports nearly all important database systems. However, the database technology is not usually developed by SAP itself, with the partly exception of Max DB. As with SAP's own technology, the SAP partners also provide high-availability solutions for the databases supported by SAP. The additional software and hardware required for this can often also be used to ensure the availability of critical SAP components. There are different methods of protecting databases against failures.
11
Cluster Parallel databases Standby database with replication at database level Standby database with replication at storage-system level
Public Network
Cluster Interconnect
DB Logs
DB Data
Common Disks
12
Node 1
IP
Client
Node 2
Standby DB Host
DB
Failover DB
13
Standby DB Host
DB
Database Reconnect
Failover DB
SAP provides the database reconnect solution to enable work to be continued without failures after database work has been resumed or the standby database activated. The SAP work processes restore the connection to the database so that the user can continue working without loss of data.
14
The hardware partners provide the cluster technology for Enqueue Replication Server, which is required for the Enqueue Server to operate without interruption.
Message Server
To avoid the single point of failure with the message server, this server must simply be restarted quickly. It can be restarted automatically in a few milliseconds using cluster technology.
Web Dispatcher
With SAP NetWeaver AS, SAP continues to provide its own technology for web load balancing, the Web dispatcher. Similarly to web switches, it enables load distribution of requests to multiple Web Application Servers. Configuration and load distribution are based on information that the Web dispatcher regularly receives from the message server. Web Dispatcher and SAP Web Application Server
Internet DMZ Intranet
Central Instance
RDBMS
DB Server
SSL / https
In contrast to message-server based load balancing (redirect), this setup has the advantage that only one address and one host name have to be known externally, for which bookmarks can be used. Also, separate, official IP addresses and server certificates do not have to be provided for each server. In the event of SAP NetWeaver AS failure, rerouting to an available web server occurs automatically. In contrast to traditional web switches, configuration is simpler because the information from the message server is used automatically.
15
SAP CRM
SAP CRM is a comprehensive solution for maintaining the relationships that an enterprise has with its business partners and customers using many different communication channels telephone, e-mail, fax, field service, or Internet. The complete customer life cycle (engage, transact, fulfill, service) from customer acquisition through order processing and delivery to customer service is mapped by SAP CRM. High availability is a central criterion, particularly in the area of eSelling. A web shop has to be open for its customers 7x24 hours a week, without exception. Therefore, we use this example to illustrate the high-availability solutions that SAP offers. SAP CRM is based on the SAP NetWeaver AS. Therefore, you can use the options for ensuring availability described in the preceding sections for SAP CRM. The same applies to SAP APO, SAP BW, and the SAP OLTP system, which are started from an SAP NetWeaver system. Internet Sales, the web shop in the SAP CRM solution, is a J2EE application that is based on the Java Functionality. The web shop is separate from the CRM server so that you can use firewalls to increase security. A firewall is recommended not only between the web server and the Java Engine, but also between the web shop and the CRM server. The SAP Internet Pricing and Configuration (SAP IPC) solution is available for complex price determination and the configuration of products in the Web shop. The TREX search engine enables products to be found quickly in the web shop catalog. All these components are designed so that they meet the high-availability requirements of a web shop.
16
APO TREX
Search IMS Engine
RDBMS
Web Server
BW
Customer
RDBMS
IPC
Internet Pricing and Configurator
RDBMS
R/3 OLTP
Plug-In
RDBMS
You can find more information on the technical implementation of CRM scenarios at the appropriate Masterguide http://service.sap.com/support Release & Upgrade Info Installation & Upgrade Guides SAP Business Suite Applications SAP CRM Your Release
SAP SCM
SAP Supply Chain Management (SAP SCM) provides a user-friendly, efficient, competitive solution, which enables modeling and optimization of the entire logical chain. An independent SAP component with the SAP Advanced Planner and Optimizer (SAP APO) forms the basis of this solution. SAP SCM Scenario
17
R/3 OLTP
Optimizer
RDBMS
APO DB Server
liveCache
RDBMS
RDBMS
SAP APO is started from an SAP Basis system, which means that the measures for increasing availability described above can also be applied here. Besides the APO database, the liveCache and one or more optimization servers can be used as additional components for SAP APO.
APO Optimizer
The APO modules SNP, CTM, PP/DS (DPS and SEQ optimizer), ND, and VSR use independent programs, called optimizers. Optimizers use simulations to solve optimization problems and are usually installed on separate servers. If an optimizer fails, the only effect is that the simulation has to be restarted. With regard to availability, optimizers are not classified as particularly critical, since they do not contain local databases and are not single points of failure. To achieve high availability, you can use and configure multiple optimizer servers in the APO.
You can find more information on SCM backup and recovery, SCM high availability, and the technical implementation of SAP SCM scenarios at: service.sap.com/scm SAP SCM Technology
18
19
DEV
QA
PROD
Transport
Transport
RDBMS
RDBMS
RDBMS
All objects (both repository and customizing objects) to be changed are kept in the database of the SAP system. The changes to be performed are included in change requests. These are files that are created by the source SAP system and will later be imported into the database of other SAP systems. CTS helps to implement changes within a system landscape and helps you avoid operation errors, which are in fact one of the main causes of unplanned downtime. Change management with CTS enables you to ensure quality and consistency for your SAP systems. For large developments, SAP offers a service that lets you create add-on components instead of transport requests. Add-on components are more stable with controlled version management and also allow shadow import and inclusion into the upgrade. You can maintain add-on components using Support Packages and Note corrections.
20
Using add-on assembly to package your software developments, you can reduce import times even more by exploiting shadow repository import.
Corrections by SAP
SAP provides corrections and changes to the SAP system by delivering Support Packages and kernel patches. To apply these corrections might cause some planned downtime. Corrections and changes of repository objects of the SAP system are delivered as Support Packages. Corrections of the SAP kernel are delivered as kernel patches.
Support Packages
You can decrease the planned downtime for the import of Support Packages by using downtime minimized option of the Support Package Manager (SPAM) to inactively import for report sources, report texts, classes, and function modules of one or more change requests. Inactive import means that these new objects are not detected by the runtime environment of the target system and exist in parallel to the old object versions that might already be in the database. The remaining objects are imported during the following import, which consists of DDIC import and main import. You can switch the previously inactive imported objects to an active state after the DDIC import, so that they become visible for the runtime environment. The main benefit of this downtime minimized option is that you can import the majority of a Support Package during uptime without negatively affecting performance. This greatly decreases the time required for the remaining import steps. You can use this method to significantly reduce downtime, especially for large or multiple Support Packages.
Uptime
inactive import
Downtime
switch of the report sources
Uptime
initial state
final state
Sources to be imported 1
active sources
active sources
Kernel Patches
Kernel patches contain corrections and enhancements of the SAP kernel. To change the kernel you have to stop the SAP-relevant services on an application server and replace the files of the old kernel with the files of the new kernel (for example, using a soft link to a new directory). You can then restart the application server, which now uses the new kernel files. A kernel switch takes only a short time, but requires you to stop all instances of the SAP system, which in turn stops all active transactions. This is very inconvenient, especially for long-running jobs. SAP plans to support rolling kernel patch upgrades. A rolling kernel upgrade enables you to change the kernel of all application servers sequentially. It has the following requirements: The application server must not be a single point of failure. That means that the message server and the enqueue server have to be run separately, using a standalone enqueue server, and protected by a failover cluster.
21
Rolling kernel upgrade is only possible for compatible kernels (compatibility is important for the message exchange between SAP instances and shared data structures in the database). SAP guarantees compatibility for kernels of the same patch level. You can only perform a rolling kernel upgrade for kernels of the same patch level with a higher patch number. Different kernel patch numbers are only allowed during the rolling kernel upgrade. We recommend you to test the rolling kernel patch before applying it in your production system.
Central Instance 1. Initial 2. Update 1 3. Update 2 4. Update 3 time Level 1 Level 1 Level 1 Level 2
RDBMS
Furthermore, there are tools to shut down an application server seamlessly. These tools are required to perform a rolling kernel patch transparently to the user (that is, no sessions have to be aborted). Such a soft shutdown is available from SAP NetWeaver AS 6.10. A soft shutdown terminates the work on an application server so that new requests are no longer accepted.
Release Upgrades
SAP releases are part of the product development process of an SAP system. They provide new and enhanced functionality developed by SAP on the basis of customer experience and requirements. As Support Packages contain a number of new repository objects, an SAP release upgrade provides a completely new and consistent SAP software component repository. During migration to a new repository and during the required customizing steps, the SAP system is temporarily unavailable. Therefore, performing a release upgrade has more impact than importing a Support Package. An SAP release upgrade can also require other upgrade tasks, such as an operating system or database upgrade. One of the major advantages of the SAP upgrade technology is that you can modify the SAP software for your own needs. During a release upgrade you can adjust these changes or continually modify them, but this requires extra effort.
22
Table TAB
DB-View on QCM1TAB
Table QCM1TAB
3.) rename old table
Table QCMTAB
Trigger
For upgrade of SAP components, the affected table is converted before the upgrade. The PREPARE tool detects which tables need to be converted and where ICNV should be applied. The best improvements are for large tables that would increase the upgrade runtime considerably during conversion. For the table that has to be converted, a new shadow table containing the new structure is created. The old structure is renamed. Access to the data is handled via a database view. Update and delete operations are done by triggers. The fields of the old table are then copied in the background to the corresponding fields of the new structure. The conversion is complete when all records in the old table are tagged as converted. Finally, the old table can be deleted. This ensures that the table can be transparently handled by applications although a table conversion is running. The system remains up and running.Customer-Based Upgrade A Customer-Based Upgrade (CBU) is a special upgrade procedure to significantly reduce downtime when you upgrade a production system. This is achieved by creating an individual export at the customer site, which replaces the SAP-delivered standard substitution set. This export already contains all customer-specific adjustments to the repository, which are normally made during or after the upgrade: Importing Support Packages for the target release Importing add-on updates and Conflict Resolution Transports (CRTs)
23
Modification adjustment (transactions SPDD and SPAU) Adjustments to customer development objects Creating the corresponding ABAP loads for the customer applications This customer-specific export removes the need for the following actions when you use a CBU for the production system: Dictionary activation Modification adjustment with transactions SPDD and SPAU Import of repository objects during downtime Import of customer transports after the upgrade, with the exception of Customizing ABAP load generation after the upgrade A CBU also offers the following advantages: Uses language exports and parallel language imports to reduce the runtime of the language import Critical or long-running database modifications (such as DROP FIELD actions or creating indexes) can be analyzed and avoided, if necessary In general, the process flow of a CBU lets you plan the upgrade of the production system more precisely. CBU has the following steps: 1. A copy of the production system is created. From here, no further development and transport to the production system are allowed until the upgrade is finished. 2. The copy is upgraded using a standard upgrade procedure. The modification adjustment is done here (or a transport from the development or QA system is used). Furthermore, development and delta customizing are transported. Support Packages and add-ons are imported. 3. From the new system, export CDs are created containing the customer-specific repository. 4. This CD set has to be validated. Therefore, you must perform a customer-based upgrade for testing on a new copy of the production system. 5. The production system is upgraded using the customer-based upgrade strategy.
P31
copy
production
P31
copy Customer Upgrade
P31
P46
upgrade
export
C31
upgrade
C46
C31
upgrade
C46
test
SAP Upgrade
24
Have a method to create fast copies of the production system, such as split-mirror copies Make sure that the transports from the development system are ready for modification adjustment, adjustment of your own development objects, and release customizing Have Support Packages and add-ons available Have additional hardware for the test upgrade
You get maximum benefit from CBU when you: Have to import a large number of Support Packages Have a SAP system with IS solutions or add-ons Have to adjust a lot of modifications Have to import a lot of transports after the upgrade Expect long adjustment and activation phases
Description of Improvements
Modification Adjustment of DDIC Objects During Uptime All version management functions are available in the shadow system, which enables you to perform the modification adjustment of the DDIC objects. You can create your own version of the objects or return to the SAP standard version.
25
Activation and Distribution During Uptime You need to activate all DDIC objects (as well as all their dependent objects) changed by Support Packages in the delivered release, as well as objects that you have modified or created. When there are a large number of integrated packages or add-ons, or where systems have been greatly modified, this procedure can take several hours. The distribution program then calculates how to achieve the transition from the source release structure of a database object to the target release structure. Since both procedures can be executed during uptime, downtime during the upgrade is largely independent of the number of Support Packages and add-ons included in the upgrade.
SAP Web AS
1h
DDIC ACT PCON TABIM XPRA Misc.
System Operation During the Upgrade With a Consistent System The system uses the version of programs that matches the ABAP Dictionary and the state of the database. This avoids the problems of the previous procedure, namely that integrated packages tend to destabilize the upgrade. Use of Target Release Tools for the Upgrade Programs belonging to the target release calculate the actions that are required to go from source release structure to target release structure (activation and distribution), and then perform these actions. This removes restrictions that are caused by using source release tools. Extension of the Shadow Import Using the shadow system to calculate the target release status of a table before the beginning of downtime lets you import data into more tables in advance. This is because you can already create the shadow tables in the final structure during uptime. Until now, you were only able to do this for new tables and substituted tables. Specific Use of the ICNV You can also increase the number of candidates for ICNV, since the amount and target structure can be calculated at the customer site. Therefore, ICNV can also be used for modified tables, that is, modified by customers, add-ons, or Support Packages. The number of tables, together with their structure, is currently limited to a fixed, delivered release.
26
This improvement is particularly noticeable in the shorter downtime in upgrades that include one or more add-ons.
EU_Import
Uptime
PREPARE
Upgrade
ICNV
Shadow Instance
Activation Distribution
Backup
End of Production
(MODPROF_TRANS)
post Upgrade
During the upgrade, various actions are performed by and in the shadow system. Creation of the shadow repository EU_IMPORT phases Import of additional software packages such as languages, Support Packages, and add-ons phase SHD_IMP Adjustment of modifications to the ABAP Dictionary objects use transaction SPDD Mass activation and distribution Incremental conversion of tables transaction ICNV The runtime of these actions depends on various factors, including your chosen upgrade strategy, and is specific to each SAP system. If you use the resource-minimized upgrade strategy, these phases take place during downtime. You can influence, among other things, how long these phases take by the number of import processes. If you have chosen the downtime-minimized strategy, you can continue to use your SAP system productively during these activities. You can reduce downtime if you make sure that all the activities that the shadow instance performs to deal with objects are finished before the scheduled start of downtime (phase MODPROF_TRANS). Therefore, start the upgrade in good time. If you finish the activities before the scheduled start of downtime, you can stop the upgrade before the MODPROF_TRANS phase.
Backup
Downtime
SGEN
27
You can find more information on SAP release upgrades at: service.sap.com/upgrade
Database Reorganizations
Database reorganizations optimize performance and recover disk space by cleaning up database tables and files, so eliminating fragmentation. The main causes for database reorganizations are: Tablespace overflow The free space within a tablespace can overflow due to unexpected data growth. Be sure to increase the tablespaces in time to avoid this problem (most databases can do this automatically). When the tablespaces can be extended automatically, disk size becomes the limiting factor. Database file fragmentation When data is inserted and deleted very frequently (for example, after archiving), this can lead to fragmentation of the data files, which increases disk space requirements. However, this does not normally impact performance and can often be tolerated when availability is the priority. Index fragmentation A fragmented index can decrease performance significantly, so that a reorganization is required. The main causes are incorrect parameter settings or frequent insert, update, and delete operations. When you reorganize a database, you create new database objects and convert the data from the old objects to the new objects. The new objects are not fragmented because they are newly created. You always have to decide whether to reorganize, which might impact the availability of your system, or to live with the performance or space constraints. SAP and some database suppliers provide tools for online reorganization without downtime. Check whether such tools exist for your database.
28
29
30
The SAP partners can provide you with more information on partner products. For more information on: SAP partners, see service.sap.com/partner SAP partner products chosen for high availability, see service.sap.com/ha or the SAP Library [page 43]
31
Glossary
ABAP See Advanced Business Application Programming.
ABAP Dictionary
A central redundancy-free information repository for all application and system data in the SAP System. The ABAP Dictionary (also known as DDIC) describes the logical structure of application development objects such as tables, views and data types, as well as their representation in the structures of the underlying relational database. Data redundancy is eliminated because all runtime environment components such as application programs or the database interface get information about these objects directly from the ABAP Dictionary. The ABAP Dictionary is an active data dictionary and is fully integrated in the ABAP Workbench.
ABAP load
ABAP code is not executed directly. An intermediate code is generated from the ABAP sources and loaded into the program buffers of the SAP instances that can be executed by the SAP Kernel.
A programming language developed by SAP for application development. All R/3 applications are written in ABAP.
A service is regarded as available when it can fulfill the tasks it has been designed for. A service is either available or unavailable (there is nothing in between). Since a business scenario consists of a lot of single processes that each consist of chains of single services, the availability of a scenario can only be considered for a particular process. When one service fails, only one process might be affected, although all other processes remain available. Availability can be calculated as follows: Availability = (uptime) / (expected uptime) * 100%
Backup and A backup and recovery concept, which is essential for high availability. Recovery Concept It describes what data has to be backed up as well as the procedures for backup and recovery. It should also contain procedures for restore tests on a regular basis.
CBU
CCMS
Checkpoint
A point in time where typically the buffers of a database are synchronized with the data files on disk.
32
Cluster
A cluster is a set of computers that work together to provide a joint service. Clusters are used to scale up the performance or to achieve a transparent failover between computers in the cluster (that is, cluster nodes).
Co-Location Services
Co-location services mainly use an alternative data center location to build up a disaster recovery site. Specialized vendors offer such services, so that a company does not need to build its own disaster recovery site.
Computing Center An integrated suite of tools for monitoring and managing SAP R/3 systems and Management independent SAP business components, with which operations such as resource System distribution and managing SAP databases can be automated. (CCMS) Conflict Resolution Transport (CRT) Adjusts a Support Package to a certain Add-On. Conflict Resolution Transports (CRTs) are used only in Add-Ons (IS-IS or IS-OIL, for example).
Customer- Based A special upgrade procedure that aims to reduce downtime significantly when a Upgrade customer upgrades a production system. (CBU) This is achieved by creating an export at the customer site, which replaces the substitution set that is imported in the EU_IMPORT phases.
Database Log File Databases can be operated to write modifications to log files. Database log files contain the database log. Using the database files and the log files, a database can be recovered to a given point in time.
Database Reorganization
During the work of a database, fragmentation within database files and indexes can occur. This fragmentation can lead to space and performance losses. Database reorganization aims to move the affected parts into new areas of the database in order to overcome the fragmentation. Generally, such reorganizations require database downtime.
Demilitarized Zone An area that exists between two networks that allows connections between the (DMZ) networks without sacrificing unauthorized access to the systems located within the networks. Example A company typically sets up a DMZ between the company's local intranet and the Internet. The DMZ contains the company's firewalls and routers, which allow Internet protocol connections such as HTTP or FTP into the DMZ. Within the DMZ, these connections are controlled and routed so that the company's intranet is not directly accessible to the Internet.
Disaster Recovery A method by which an installation recovers its computing services after a severe
33
disabling event, such as fire. In a disaster, critical components in the SAP environment become unavailable and service cannot be resumed quickly.
See Demilitarized Zone. A hierarchical name service in the Internet and TCP/IP based networks, that maps hostnames to IP addresses.
ECC = Error Correcting Circuits, Error Correcting Code, Error Correction Code Detects multi-bit errors and corrects single-bit errors transparently. To achieve this, a special algorithm is used to create redundant information that helps to detect and correct errors (using the Hamming code principle). It takes 7 additional bits to protect 32 bits and 8 bits to protect 64 bits. Modern servers are mostly equipped with ECC RAM. This ensures that all memory errors can be detected and even the most errors can be corrected.
Emergency Power Device to generate power independently of the normal electricity grid in the case Backup of a power failure.
Enqueue Service
A transaction that administers the lock table in a distributed R/3 System. The enqueue service (also known as the lock service) runs on the central instance. When an application running on an instance other than the central instance requests a lock, the lock request is sent through the local dispatcher to the message service and then to the dispatcher on the central instance. This dispatcher passes the request to the enqueue work process, which then looks in the lock table to determine whether this request conflicts with a lock that has already been set. If so, the request is denied. Otherwise the lock is set and an entry is added to the lock table.
Enqueue A high-availability solution for the Enqueue Server by SAP. Replication Server The Enqueue Server replicates changes to its lock table to a remote replication service. When the Enqueue Server fails, the replica table is used to rebuild the lock table when the Enqueue Server is restarted on another node in a cluster. This means that transactions do not have to be rolled back in the event of an Enqueue Server failure.
Java architecture for component-based programming of enterprise applications. Enterprise Beans are components of distributed transaction- oriented enterprise applications written in Java. They typically contain business logic that operates on the enterprise's data.
eXtensible Markup A subset of the Standard Generalized Markup Language (SGML) developed for Language use in the World Wide Web. (XML) XML documents consist of entities that contain either analyzed (parsed) or unanalyzed (unparsed) data. The XML 1.0 specification was created by the XML working group of the World Wide Web Consortium (W3C) and adopted as a
34
recommendation by W3C in 1998. You can find this specification at www.w3.org. A large number of standards for specific tasks have been (and are being) developed on the basis of XML (such as XLink, XPointer; XSL, XSLT; DOM).
Failsafe AirConditioning
Provides defined working temperatures. Powerful computers have to be operated in a specific temperature range, which is regulated by air-conditioning. If the maximum temperature is exceeded the computer might crash. Therefore, air-conditioning should be failsafe.
Firewall
A special server in computer networks that prevents unauthorized penetration (dialling in) of external people and/or unauthorized data transfer. A firewall is a type of digital protection wall that, for example, shields an internal network (that is, an intranet) from the Internet.
High Availability
A property of a service or a system to remain in production operation for a large proportion of the time. High availability for an SAP System means that unplanned and planned downtime is kept to a minimum. Well-managed system administration plays a key role in this.
Hot-Pluggable
Feature of modern computer components. A hot-pluggable component can be replaced during the normal operation of the computer. This does not require a planned downtime.
Hot-Standby
Feature of redundant components. Hot-standby components can take over the tasks of a failed component immediately because they have basically the same state as the failed component before the failure (e.g. the application is already running and has the same state as the failed application).
An application protocol of the World Wide Web (WWW). HyperText Transfer Protocol HTTP controls the communication between the Web browser (HTTP client) and (HTTP) the Web server (HTTP server).
HyperText A connection that provides for encrypted communications between the client and Transfer Protocol the server. with SSL In addition, server-side, client-side, or mutual authentication are also supported. (HTTPS) When accessing Internet sites that are protected with SSL, you use the prefix HTTPS: in the URL instead of HTTP.
IACOR Service
A tool for publishing Internet Transaction Server (ITS) files such as service files, HTML templates, flow files, language resources and MIME files directly from the SAP System to the ITS (AGate) and the Web server. The IAC Object Receiver (IACOR) enables automatic update of the ITS and the Web server whenever the SAP System is updated by a transport. In the case of a dual-host installation, you have to install the IACOR on the ITS server and the Web server. The IACOR is implemented as a Windows NT service.
35
Incremental A process that changes the structure of a table (conversion) during production Conversion (ICNV) operation.
J2EE defines the standard for developing multitier enterprise applications. Java 2 Platform, Enterprise Edition J2EE simplifies enterprise applications by basing them on standardized, modular (J2EE) components, by providing a complete set of services to those components, and by handling many details of application behavior automatically, without complex programming. The Java 2 Platform, Enterprise Edition, also takes advantage of many features of the Java 2 Platform, Standard Edition, such as "Write Once, Run Anywhere" portability, JDBCTM API for database access, CORBA technology for interaction with existing enterprise resources, and a security model that protects data even in internet applications. Java 2 Enterprise Edition adds full support for Enterprise JavaBeans components, Java Servlets API, JavaServer Pages and XML technology. The J2EE standard includes complete specifications and compliance tests to ensure portability of applications across the wide range of existing enterprise systems capable of supporting J2EE.
JDBC technology is an API that lets you access virtually any tabular data source from the Java programming language. It provides cross-DBMS connectivity to a wide range of SQL databases.
Java Server Pages JavaServer Pages technology is an extension of the Java Servlet technology. Servlets are platform-independent, 100% pure Java server-side modules that fit seamlessly into a Web server framework and can be used to extend the capabilities of a Web server with minimal overhead, maintenance, and support. Unlike other scripting languages, servlets involve no platform-specific consideration or modifications. They are Java application components that are downloaded, on demand, to the part of the system that needs them.
Jco
A middleware component that facilitates the development of SAP-enabled components and applications in Java. The SAP Java Connector (JCo) supports communication with the SAP server in two directions: Inbound (Java calls ABAP) Outbound calls (ABAP calls Java) SAP JCo can be deployed with desktop and (Web) server applications.
JDBC
Kernel
Central module of an operating system. The kernel is the part of the operating system that loads first. Since it remains in main memory, it should be as small as possible, yet still be able to provide all the essential services required by other parts of the operating system and applications. The kernel is typically responsible for memory management,
36
Load Balancing
Mechanism that distributes server requests across any number of application servers. Load balancing ensures that an Internet page remains available, even with a large number of users and a high load. It recognizes when a server is down within seconds and ensures that that server is not reused until the system becomes available again. In the SAP system, load balancing is performed by the message server when users log on. In the case of HTTP requests made to the SAP Web Application Server, the SAP Web Dispatcher performs load balancing.
Lock Table
A table stored in the main memory of the enqueue server containing entries for the current locks in the system. Each lock includes the owner of the lock, the lock mode, and the name and the fields of the locked table.
Message Service
An independent program that lists all the servers in the SAP System. The message service: Decides which server a user logs on to Handles communication between the application servers (not RFC/CPI-C) such as transport a lock request to the Enqueue service or transport update requests An SAP System always has one message service.
Modification Adjustment
Follow-up actions on Repository objects during a SAP release upgrade. This function compares Repository objects before the upgrade (old version) with their state after the upgrade (new version).
SAP CRM
A SAP solution that focuses primarily on the value relationship between an enterprise and its end customers. SAP CRM is closely related to and connected with the other SAP solutions.
SAP SCM
The solution that enables companies to network their supply chains and create business value. SAP SCM integrates extended supply chains, allowing companies to participate in collaborative, self-organizing, and value-added trading communities. The solution transforms supply chain management from a linear, sequential process into a collaborative community that enables businesses to network, plan, execute, and coordinate with customers, suppliers, and partners throughout the entire life span of the product or service.
Network Attached A NAS device is a server dedicated for file sharing that can be accessed using a Storage (NAS) LAN.
37
Online Transaction The APO system generally works in connection with an OLTP system. Processing This system supplies the APO system with the necessary data relevant for System planning. The APO system transfers the planning results back to the OLTP (OLTP System) system. In the OLTP system, if necessary, planning is completed and the production and planning is started, confirmed, and so on. The OLTP system can be an R/3 system or another system.
Parallel Database Database system where all nodes in a cluster have access to one database.
Platform
Profile Parameter A parameter to control the behavior of a SAP Basis or SAP NetWeaver AS system.
A hardware-based technology that supports disk redundancy by using disk mirroring. RAID systems contain an array of disk spindles sharing a common controller that distributes data on the disks in a way transparent to the user. Most RAID systems include internal error checking to keep data available even if single disks fail. There are different RAID levels, characterized by the methods of distributing data (and check bits) on the disks in the system. Another technique to achieve disk mirroring is the software-based LVM technology (Logical Volume Manager).
Remote Copy
A function of storage devices or storage management software that apply changes of a local disk or volume simultaneously to a remote device. This feature can be used for disaster recovery.
A SAP interface protocol based on CPI-C used to simplify the programming of communication processes between systems. RFCs enable you to call and execute predefined functions in a remote system, or in the same system. They manage the communication process, parameter transfer, and error handling.
RFC
Round Robin
A method of managing requests by distributing these requests across multiple equivalent servers (that is, containing identical content). Round robin works on a rotating basis. It passes a request to one server and moves the server to the end of the list. It then passes the next request to the next server on the list, moves the server to the end of the list, and so on through the list of servers. This continues in an endless loop. Round robin is different than load balancing. Load balancing distributes connection loads across multiple servers, giving preference to those servers with the lowest load. For round robin, server distribution rotates rigidly, with one server strictly being assigned to one user.
38
Router
A device to connect networks. The coupling is done on the network layer of the OSI reference model. Routers have implemented features to lead network traffic through meshed networks.
SAN
SAP Advanced Planner and Optimizer (SAP APO) SAP Business Information Warehouse (SAP BW) SAP Kernel
A part of the SAP Basis System. The SAP kernel is responsible for: Executing applications Managing user processes Distributing tasks to work processes Memory management Database accesses Communicating with other applications Managing the SAP System The SAP kernel is the interface between the underlying operating system and SAP applications and is an independent process (disp+work) underlying every SAP instance.
The SAP Solution Manager is a platform that provides the integrated content, tools, and methodologies that you need to implement, support, operate and monitor your enterprise's SAP solutions.
Scalability
Scalability is the feature of a solution to be made suitable to changing (growing) requirements. Satisfying performance is impossible without availability. On the other hand it might happen that the performance is so low that a service is regarded as unavailable. Many measures to improve performance also help to increase availability. Non-scalable components often impose a single point of failure. Horizontal scalability means to use several components that are configured identically. The workload can be distributed among these components. When the workload grows, new components can be added. In a failover situation the remaining components can take over the tasks of the failed components. Vertical scalability means that the component itself has to be scaled for higher workload and to be protected against failures. We strongly recommend protecting even the hardware of such components that have to be scaled vertically (for example, database servers).
Secure Storage for Backup media should be stored remotely from the production site, protected by Backup Media special safes that are protected against fire, and so-on.
39
When the production site is damaged, the backup media need to be accessible on the disaster recovery site.
Server Certificate
An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. The most widely used standard for digital certificates is X.509. Companies use X.509 certificates to implement SSL in their Web servers and browsers.
Servlet
An applet that runs on a server. This usually refers to a Java applet that runs within a Web server environment. Java servlets become more popular as an alternative for CGI programs.
Session Persistence
A feature of load balancing devices. It means that all requests of a session have to be handled by the same server because they need a session state that is stored only on this particular server. Session persistence has to be ensured by the load balancing technology.
Shadow Import
An import of upgrade transport requests, including any Support Packages and add-ons, into the shadow repository tables, and into the new tables in the target release. You can perform the import during production operation of the system, since the imported tables are not used by the source release.
Shared Everything A cluster where all nodes have concurrent access to the same resources. Cluster The cluster has to resolve access conflicts using a distributed lock management. Parallel databases are often called shared everything clusters.
A cluster where a single cluster node has exclusive access to a defined set of resources. In the case of a node failure, these resources are re-assigned to a surviving node that can restart the failed applications. A shared nothing cluster is often called fail-over cluster.
A method for a program running in one kind of operating system (such as Windows NT) to communicate with a program in the same or another kind of an operating system (such as Linux) by using the World Wide Web's Hypertext Transfer Protocol and its Extensible Markup Language as the mechanisms for information exchange. Simple Object Access Protocol specifies exactly how to encode an HTTP header and an XML file so that a program in one computer can call a program in another computer and pass it information. It also specifies how the called program can return a response.
Simple Mail
40
Transfer Protocol Most e-mail systems sending mail via the Internet use SMTP to send messages. (SMTP) Single Point of Failure (SPOF) A hardware or software service that, if it fails, causes the entire system to fail, leading to unplanned downtime. It is often advisable to use additional hardware and fault-tolerant software so that the service can continue operating. This enables uninterrupted system operation if a single component fails. Example Disk drives might be a hardware single point of failure (SPOF). Disk mirroring reduces the likelihood of failure and can effectively eliminate the SPOF.
SMTP
SOAP
Split-Mirror technology
Feature of storage management solutions. Split mirror means that a mirror of disks or volumes is created within very short time. This mirror can be used independently from the original (for example, for system copies, non-impact backup, and so on).
SPOF
Standby Database An identical copy of the production database on a standby database host. The secondary (that is, standby) database service can be used if the primary database fails, so providing a continued service with minimal data loss. Typically, the secondary database is located at a remote site (connected by a network) and is kept up to date with the primary by the shipping of the transaction log records generated on the primary database.
A high-speed subnetwork of shared storage devices. A storage device is a machine that contains nothing but a disk or disks for storing data. A SAN makes the storage available to all connected computers.
Switch
A network device that couples networks on the OSI data link layer. Most switches operate similarly to bridges in that they forward frames according to the destination MAC (media access control) address. However, frame and cell switches are much faster and use temporary virtual connections that link source to destination port. These dedicated connections provide more available bandwidth to network users than do shared network devices.
Switchover
Table conversion
41
Example: when the length of a field changes, the table has to be converted.
TCP/IP
Text Retrieval and Knowledge Management functions and services for information retrieval and information document classification. Extraction (TREX) Transaction A logical R/3 process. From the user's point of view, a transaction is a self-contained unit such as an address change for a customer or executing a program. From a dialog programming point of view, a transaction is a complex object that consists of a module pool and screens, and is called by specifying a transaction code. After logon, there are the following distinct levels in the SAP System: R/3 level, work area level, application level. A transaction is an application at application level. To go to the initial screen of an application, you can either navigate through the menus by choosing the appropriate menu options or enter the appropriate four-character transaction code in the command field. Using the transaction code saves time and takes the user directly to the initial screen.
Transport Control Combination of communication protocols used by host computers to exchange Protocol / Internet information between applications (and their processes) on a local (LAN) or wide Protocol area network (WAN). (TCP/IP) TCP/IP has become the accepted world-wide standard and is used for the Internet. TCP is a connection-oriented transport protocol that enables a full duplex pointto-point connection. It recognizes transmission errors and corrects them to a certain extent. For this reason TCP is considered relatively slow and is only used if large amounts of data need to be transmitted reliably. IP is a connection-independent network protocol. Information is transmitted between two separate components without establishing a path or a connection.
TREX
Means of ensuring the continuity and raising the quality of electricity supplied to a computer system. UPS comes in many different varieties but the aim is always to protect the system against complete failure or undesirable power fluctuations in the mains electricity supply. UPS is an important element in safeguarding the R/3 System against unplanned downtime. If UPS cannot continue to supply electricity (for example, because the battery backup is exhausted), it should ensure a graceful shutdown of the system as it nears the end of its power. This greatly reduces recovery time when the power supply is finally restored.
Upgrade
The switch from an older software version to a new version. Typically, both the server component of a system landscape and other
42
components are upgraded. Several different technical upgrade procedures are used to upgrade the server component, such as the Repository Switch upgrade or the System Switch upgrade.
See Uninterruptible Power Supply. Host that serves as the entry point for requests from the Web and forwards the requests to a Web server for processing. A Web server can process only a limited number of requests at any one time. To ensure that even busy websites can process all requests without any major delays, the Web content can be spread over a number of servers, and load balancing functions can forward the data traffic in the most efficient way possible to the various servers. Load balancing is one of the essential tasks of a Web switch. Web switches examine TCP/IP data within the HTTP header, and use layer 7 information, such as URL or cookie information, to distribute the load as efficiently as possible. Web switches also ensure the necessary level of persistence on connections being used for shopping basket transactions.
Work Process
A process that processes a particular SAP request. To process SAP requests from several front ends, an SAP application server has a dispatcher, which collects the requests and forwards them to work processes for execution. There are the following types of work process: Dialog for executing dialog programs Update for asynchronous database updates Background (batch) for executing background jobs Enqueue for executing lock operations Spool for print formatting Work processes can be assigned to dedicated application servers. In the service overview (SM51), you can see which work process types are provided by the individual servers.
SAP Library
For more information on the SAP Web Application Server, access the SAP Library from any of the following: An SAP system if you have installed the documentation: i. ii.
... he br owse r sta rts. ...
Choose Help
The SAP Help Portal at help.sap.com: i. ii. Choose SAP NetWeaver Your Release .
43
If you want to view the help files in HTML-Help format from the online documentation CDs, you need a PC running Microsoft Windows to install the HTMLHelp Viewer.
To find the high availability documentation, add the following to the above path: Computing Center Management System SAP High Availability (BC-CCM-HAV)
44