SLA violations

Hello,
I am using osb in order to monitor my bpel process. I have define some sla alerts and the aggregation interval I use, is 1 minute. Every time a violation occurs
I see at the alert at the dashboard after one minute. I would like to know if it is possible to see the violation the time it occurs. it is very important not to wait for one minute in order to see if there is any violation.
Thanks in advance

If you don't want to use built-in monitoring functions because of unacceptable delay, then you can maybe implement your check in proxy. For example if you want to raise an alert when it takes too long for your business service to invoke, then you can compare time before service callout and after service callout and it difference is greater than x seconds, then you can raise alert. This way, there won't be any delay. The drawback is this approach is not usable in all cases and it's less flexible to make adjustments to than with SLAs.

Similar Messages

  • I can not make IP SLA to signal SNMP traps upon timeout

    Hello team.
    I want SNMP traps to be sent every time an IP SLA (ICMP) object times out. For that purpose, I carried out the following
    ip sla monitor logging traps
    ip sla monitor 1
    type echo protocol ipIcmpEcho 10.1.1.254
    timeout 1000
    frequency 15
    ip sla monitor schedule 1 life forever start-time now
    snmp-server enable traps rtr
    snmp-server host 10.1.1.10 mycommunity
    But no SNMP trap is sent when the IP SLA object times out. ¿ Am I missing something?
    Any help will be greatly appreciated.
    Rogelio Alvez
    Argentina

    SNMP traps for IP SLAs are handled through the system logging (syslog) process. This means that system logging messages for IP SLAs violations are generated when the specified conditions are met, then sent as SNMP traps using the CISCO-SYSLOG-MIB. The ip sla monitor logging traps command is used to enable the generation of these IP SLAs specific traps. The generation of IP SLAs specific logging messages is dependant on the configuration of the standard set of logging commands (for example, logging on). IP SLAs logging messages are generated at the "informational" system logging severity level.
    The command ip sla monitor logging traps is sometime hidden and may not show with ?, so just copy and paste in global config mode and have logging on and check if any traps are generated.
    -Thanks
    Vinod
    **Encourage Contributors. RATE them**

  • Monitoring traffic but not use IP SLA

    Dear everyone,
    I have a problem. I make a leased line between ISP (Service Provider) to Customer. And customer want to monitor traffic on this link. I can use IP SLA to do it. But now, customer don't agree to open ICMP on this link so IP SLA fall
    Can everyone help me to resolve it?

    SNMP traps for IP SLAs are handled through the system logging (syslog) process. This means that system logging messages for IP SLAs violations are generated when the specified conditions are met, then sent as SNMP traps using the CISCO-SYSLOG-MIB. The ip sla monitor logging traps command is used to enable the generation of these IP SLAs specific traps. The generation of IP SLAs specific logging messages is dependant on the configuration of the standard set of logging commands (for example, logging on). IP SLAs logging messages are generated at the "informational" system logging severity level.
    The command ip sla monitor logging traps is sometime hidden and may not show with ?, so just copy and paste in global config mode and have logging on and check if any traps are generated.
    -Thanks
    Vinod
    **Encourage Contributors. RATE them**

  • How to include  images in BAM reports

    Hi all,
    In Oracle 11g BAM , i can see some already existing Demo reports, i the Active Studio.
    in that demo reports i can see a report called SLA Violation.Here in this SLA Vioaltion report there is Updating Orderded list within the list they are showing some images .
    can some one help me how to add images like that..? or tell me the steps..
    i tried creating the similar updating ordered list in my sample report and gave the image links gived in that demo report
    " _switch({Process Due Soon SLA}) case(true):(<span style='width: 8px'><img src='../Images/TradeSubmitted.png'/></span><span style='padding-left: 4px;vertical-align:top;'>Submitted</span>) default( <span style='width: 8px'><img src='../Images/TradeFine.png'/></span><span style='padding-left: 4px;vertical-align:top;'>Fine</span>")_but in the updated ordering list instead of the image im getting entries like this " ):(<span style='width: 8px'><img src='../Images/TradeSubmitted.png'/></span><span style='padding"
    Any suggestions on this is Really appreciated..
    TIA,
    Karthik
    Edited by: karthik !! on 20 Jun, 2011 7:28 AM

    Hi,
    I have used four different ways to display images in my applications depending on which method is the fastest to refresh.
    1. Under Application Attributes > Edit Standard Attributes > Substitutions enter your substitution string (MY_IMAGE_URL) and substitution value(http://somewhere/img)
    and then in the region or template use the following syntax &MY_IMAGE_URL. in your html tags eg. img src="&MY_IMAGE_URL./banner.png" width="x" height="x">)
    I have found this the best for image refresh speed, especially if the image is already cached.
    2. Load your image up into Apex and don't associate it with any application and use the following tag img src="#WORKSPACE_IMAGES#banner.png" width="x" height="x" alt="">
    Good for development as all images not associated to an application are available.
    3. Load your image up into Apex and associate it with an application and use the following tag img src="#APP_IMAGES#banner.png" width="x" height="x" alt="">
    This can be a pain during development when your application numbers continually change.
    4. Use standard http address <img src="http://somewhere/banner.png" width="x" height="x">
    Ben
    Message was edited by:
    Benton

  • App Advisor-SCOM

     Could someone help me with the document which clearly explains the following reports of the app advisor in detail:
    Client Side Monitoring
    Application AJAX Calls Analysis
    Application Analysis
    Application Status
    Client Latency Distribution
    Load Time Analysis Based on Subnet
    Summary Performance Analysis
    Summary User Analysis
    Problem Analysis Reports
    Application Activity Breakdown
    Application Daily Activity
    Application Failure Breakdown by Functionality
    Application Failure Breakdown by Resources
    Application Heavy Resources Analysis
    Application Slow Request Analysis
    Day of Week Utilization
    Hour of Day Utilization
    Utilization Trend
    Resource Utilization Analysis
    Application CPU Utilization Analysis
    Application IO Utilization Analysis
    Application Memory Utilization Analysis
    Application Request Utilization Analysis
    Computer Application Load Analysis
    Computer CPU Utilization Analysis
    Computer IO Utilization Analysis
    Computer Memory Utilization Analysis

    Hello !
    Here is an extract of the descriptions of each Application Advisor report.
    Application Advisor Reports
    Application Performance Analysis
    This report provides detailed performance analysis for a selected application. It shows the distribution of performance events based on duration. It highlights the top 5 functionality areas that lead to response time SLA violations and provides
    further details about the root cause of  performance slowdowns for each area. This report also provides an analysis of the top performance problems and groups those problems into application functionality areas.
    Application Status
    This report provides daily, weekly and monthly application status summaries. It shows major application activity and resource utilization KPI for a selected period in comparison to a dynamic baseline of previous periods.  For applications
    that experience problems during a selected report period, it provides drilldown to a detailed timeline graph of problem events for the selected period. This report also highlights new problems for the period and the most critical problem for the period.
    Problems Distribution Analysis
    This report shows the distribution of performance, connectivity, security and code problems across all monitored applications, highlighting the applications that are most problematic. For the applications that contribute to the majority of problems,
    this report provides more details by showing application components and external dependencies that are the root cause of those problems.
    Summary Failure Analysis
    This report provides a breakdown of problems by application. For each application, it lists the top 5 problems and shows them as a percentage of the total problems. This report is a perfect example of the 80-20 rule, where 80% of all failures
    happen due to 20% of the problems. This report highlights the top problems and allows management to concentrate on resolving the problems that affect their applications the most.
    Summary Performance Analysis
    This report provides a breakdown of performance violations by application. For each application it lists the top 5 problems and shows them as a percentage of total performance violations. This report is a good example of the 80-20 rule, where
    80% of all failures happen due to 20% of the problems. This report highlights the top problems and allows management to concentrate on resolving problems that affect their applications the most.
    Summary User Analysis
    This report highlights the application users who experience most of the problems. For each user the report shows performance, connectivity, security and application failure problems. For performance problems the reports shows the top 5 problematic
    requests for the selected user and how the response time for that user compares to the average response time for the system.
    Client Side Monitoring
    Application AJAX Calls Analysis
    This report provides detailed failure analysis for a selected application. It highlights the 5 longest running AJAX calls with the average call processing time, average call size, and average latency.  The call processing time is broken
    down by network, server or client processing. This report also breaks down each of the calls by calling page, providing the average call processing time, average call size, and average latency on a per-page basis.
    Client Latency Distribution
    This report provides an analysis of client side performance in relation to network latency. Network Latency indicates the quality of a user connection by measuring the time for a packet of data to get from the server to the client browser. This
    report correlates the number of performance violations experienced by users with network latency, highlighting network subnets where users experience most of the problems and providing network latency information for those subnets.
    Load Time Analysis Based on Subnet
    This report provides an analysis of client side performance based on client subnets. The report identifies client subnets where users experience most of the problems and shows a response time breakdown for those subnets. The report analyzes
    the response time by breaking it down to Network, Server, DOM load, Peripheral Load and Java Script Processing times. The report provides further analysis by highlighting problematic pages and AJAX calls and shows a response time analysis for them.
    Summary Performance Analysis
    This report provides an analysis of performance violations by application. For each application it lists the top 5 problems for page requests, AJAX calls and Java Script actions and shows them as a percentage of total performance violations.
    This report further breaks down the load time by network, server processing, DOM load, peripheral loading and Java script processing times.
    Summary Size Analysis
    This report provides an analysis of content size across multiple applications and shows the correlation between content size and load time. The content size is broken down by HTML size, HTC size, Image size, CSS size, Java Script size, and AJAX
    size. The report provides further drilldown by showing information for the top 4 heaviest pages and the top 4 heaviest AJAX calls for each application.
    Summary User Analysis
    This report highlights the application users who experience most of the problems. For each user the report shows the exceptions and performance problems that were experienced by that user and how it compares to an average user experience. For
    performance problems the reports shows the top 5 problematic pages for the selected user and how the user response time compares to the average response time for the system.
    Problem Analysis Reports
    Application Daily Activity
    This report shows application activity trends for a selected day in relation to an application's activity during a previous period and average application activity. This reports allows detecting any unusual spikes in the number of requests,
    average response time and number of errors.
    Application Failure Breakdown by Functionality
    This report shows the list of application requests that experience most of the problems. For each request this report provides drilldown into problems happening within the request, and includes information about the frequency of each problem.
    Application Failure Breakdown by Resources
    This reports provides failure analysis for distributed applications based on the application components and external resource dependencies. This report shows the percentage of application failures attributed to each application component and
    external resource dependencies. It provides further drilldown into the problem list for each component and resource.
    Application Heavy Resources Analysis
    This report provides performance analysis for distributed applications based on the application components and external resource dependencies. For each application component and external resource dependency, this report shows the percentage
    of application performance violations that happen due to the slow performance of a corresponding application component or external resource.  It provides further drilldown into the performance violation list for each component and resource.
    Application Slow Request Analysis
    This report shows the breakdown of application performance violations based on application requests. For each application request, this report shows the number of violations along with average and maximum durations. It provides further drilldown
    into the performance violation root cause within each request.
    Day of Week Utilization
    This report shows application activity trends and application resource utilization trends for a selected period.
    Hour of Day Utilization
    This report shows application activity trends and application resource utilization trends for a selected period.
    Utilization Trend
    This report shows application activity trends and application resource utilization trends for a selected period.
    Resource Utilization Analysis
    Application IO Utilization Analysis
    This reports highlights applications that have the heaviest IO utilization and provides a breakdown of IO utilization based on the servers which host each application. It provides further drilldown to an analysis of the IO utilization timelines.
    Application Memory Utilization Analysis
    This reports highlights applications that have the heaviest memory utilization and provides a breakdown of memory utilization based on the servers which host each application. It provides further drilldown to an analysis of the memory utilization
    timelines.
    Application Request Utilization Analysis
    This report provides an analysis of application based on the volume of processed requests. It highlights applications that process the highest volume of requests and shows how request volume correlates with CPU, Memory and IO utilization. This
    report provides the utilization information for the selected application and for each server.
    Computer Application Load Analysis
    This report provides an analysis of servers based on the volume of processed requests. It highlights servers that process the highest volume of requests and shows how request volume correlates with CPU, Memory and IO utilization. This report
    provides the utilization information for the selected server and for each monitored application. It provides further drilldown to an analysis of application load and resource utilization  timelines.
    Computer CPU Utilization Analysis
    This reports highlights servers that have the heaviest CPU utilization and provides a breakdown of CPU utilization based on the monitored applications running on each server. This report provides further drilldown to an analysis of the CPU utilization
    timelines.
    Computer IO Utilization Analysis
    This reports highlights servers that have the heaviest IO utilization and provides a breakdown of IO utilization by monitored applications running on each server. It provides further drilldown to an analysis of the IO utilization timelines.
    Computer Memory Utilization Analysis
    This reports highlights servers that have the heaviest memory utilization and provides a breakdown of memory utilization based on the monitored applications running on each server. It provides further drilldown to an analysis of the memory utilization
    timelines.
    Hope this helps.
    Note: This posting is provided 'AS IS' with no warranties or guarantees, and confers no rights. Please take a moment to "Vote as Helpful" and/or "Mark as Answer", where applicable. This helps the community, keeps the forums tidy, and
    recognises useful contributions.

  • What is SAP ESB (Enterprise Service Bus)?

    Hi fellow sdners gurus…  I have been reading threads about SAP SOA and ESB. 
    I do not want to start a debate on wether XI is an ESB, but more of a statement to what is SAP ESB (if XI it is, then be it).
    1) What is SAP ESB (Enterprise Service Bus) today (I could not find a clear answer to is)? 
    2) Who uses this SAP ESB in production currently and what kind of environment (i.e. strictly SAP backend systems, or combination of various vendors’ backend systems)?
    Can someone share some light on this topic?
    As a reminder, an ESB is expected to exhibit the following characteristics (source Wikipedia):
    •     It is usually operating-system and programming-language agnostic; for example, it should enable interoperability between Java and .NET applications.
    •     It uses XML (eXtensible Markup Language) as the standard communication language.
    •     It supports web-services standards.
    •     It supports various MEPs (Message Exchange Patterns) (e.g., synchronous request/response, asynchronous request/response, send-and-forget, publish/subscribe).
    •     It includes adapters for supporting integration with legacy systems, possibly based on standards such as JCA
    •     It includes a standardized security model to authorize, authenticate and audit use of the ESB.
    •     To facilitate the transformation of data formats and values, it includes transformation services (often via XSLT or XQuery) between the format of the sending application and the receiving application.
    •     It includes validation against schemas for sending and receiving messages.
    •     It can uniformly apply business rules, enriching messages from other sources, the splitting and combining of multiple messages and the handling of exceptions.
    •     It can provide a unified abstraction across multiple layers
    •     It can route or transform messages conditionally, based on a non-centralized policy (i.e. no central rules-engine needs to be present).
    •     It is monitored for various SLA (Service Level Agreement) threshold message latencies and other SLA characteristics.
    •     It (often) facilitates "service classes," responding appropriately to higher and lower priority users.
    •     It supports queuing, holding messages if applications are temporarily unavailable.
    Your help is greatly appreciated.
    Kind Regards,
    Jean-Michel

    PI or XI is the ESB from SAP side. PI is not a full pledged ESB on a reference model of ESB idea but it is the the framework SAP provide as a ESB product.
    A Standard Based ESB Reference Model should fullfil the following features in a framework.
    ESB Features    Service Enablement Phase (1, 2, 3)
    1)     Message brokering between heterogeneous environments                     
    2)     Supports asynchronous, synchronous, publish and subscribe messaging                    
    3)     Supports synchronous and asynchronous bridging                    
    4)     Supports message formats of SOAP                    
    5)     Support for message format of SOAP with attachments                    
    6)     Support for xml message                     
    7)     Support for structured non-XML data                    
    8)     Support for raw data message                    
    9)     Support for text data message                    
    10)     Sport for e-mail with attachment message                    
    11)     Heterogeneous transports between service end points                    
    12)     Supports for FILE protocols                    
    13)     Supports for FTP protocols                     
    14)     Supports for HTTP protocols                    
    15)     Supports for HTTPS protocols                    
    16)     Supports for Multiple JMS providers                    
    17)     Supports for RMI protocols                    
    18)     Supports for web service protocols                    
    19)     Supports for CORBA protocols                    
    20)     Supports for DCOM protocols                    
    21)     Supports for E-mail (POP, SMTP, IMAP) protocols                    
    22)     Support for advanced transformation engine                    
    23)     Support for configuration-driven routing                    
    24)     Message routing based policies                    
    25)     Support for call-outs to external services to support complex routing                    
    26)     Support for point-to-point routing                    
    27)     Support for one-to-many routing scenarios                     
    28)     Support for request response model                    
    29)     Support for publish-subscribe models                    
    30)     Service monitoring                    
    31)     Service logging                    
    32)     Service auditing with search capabilities.                    
    33)     Support for capture of key statistics for message and transport attributes including message invocations, errors, and performance, volume, and SLA violations.                     
    34)     Supports clusters and gathers statistics across the cluster to review SLA violations                    
    35)     Support for service provisioning                     
    36)     Support deployment of new versions of services dynamically through configuration                    
    37)     Migrates configured services and resources between design, staging and production                    
    38)     Supports multiple versions of message resources that are incrementally deployed with selective service access through flexible routing                    
    39)     Configurable policy-driven security                    
    40)     Supports the latest security standards for authentication, encryption-decryption, and digital signatures                    
    41)     Supports SSL for HTTP and JMS transports                    
    42)     Supports multiple authentication models                    
    43)     Policy-driven SLA enforcement                    
    44)     Establishes SLAs on a variety of attributes including                     
    a.     Throughput times                    
    b.     Processing volumes                    
    c.     Success/failure ratios of message processes                    
    d.     Number of errors                    
    e.     Security violations                    
    f.     Schema validation issues                     
    45)     Initiates automated alerts or enables operator-initiated responses to rule violations using flexible mechanisms including                     
    a.     E-mail notifications                    
    b.     Triggered JMS messages                    
    c.     Triggered integration processes with a JMS message                    
    d.     Web services invocations with a JMS message                    
    e.     Administration console alerts.                     
    46)     Support for having multiple LOBs manage their own service bus based on their policies, and a service bus at an enterprise level that could act as a broker for sharing services across the various business units.                    
    47)     Support for agent plug-in to support following features                    
    48)     External provider’s service access for security                    
    49)     External provider’s service management                     
    50)     External provider’s transaction container                    
    a.     External provider’s business orchestration (BPEL Engine) and business work flow service container                    
    51)     Transaction support on message level                    
    52)     IDE Integration                    
    53)     Open standards

  • MDG SLA time for each workflow step

    Hi Experts,
    As I know MDG calculates and report the SLA times for an entire process, It will show as violated if the number of days/half day  is exceeded since the creation, but it does not show in which step took more time to process.
    My requirement is to have SLA control in each step of a workflow. Please check the following example:
    Material creation that has 2 approval steps since it submission.
    Example: Submission (Requestor) -> Approval 1 (Business Area) -> Approval 2 (Master Data Specialist) -> Activation / Replication
    I need to know through a report how much time the Approval 1 took to process the Change request, How much time Approval 2 took to process the Change Request based on the priority set by the requestor.
    With this report the responsible from the Master Data department can check the time spent by the processors for each step of the process.
    Does anyone had a similiar requirement?
    What is the best approach to achieve this? Through standard SLA queries it is possible to have more information? Or only having an enhancement?
    I appreciate any help.
    Kind Regards,
    Fabiano

    Hello Fabiano ,
    We have also same requirement like .
    Submission (Requestor) -> Approval 1  -> Approval 2 ----------   ->Approval- N (Master Data Specialist) -> Activation.
    Can you plz share how to achieve this with : Any document for that plz share.
    As you mention :
    It uses the object type for example BUS2250 and the object key that is a concatenation with the CR number + an index, after that it obtain the "parent" workitem with the  SAP_WAPI_WORKITEMS_TO_OBJECT function module. After that it uses the  SAP_WAPI_GET_DEPENDENT_WIS and   SAP_WAPI_GET_WORKITEM_DETAIL functions.
    Thanks
    Nikhilesh

  • SLA or Pipeline Alert Monitoring

    At Oracle Service Bus I have define sla alert rules and I can monitor at the administrator console if there is any violation.
    Can I monitor the details like timestamp , the alert name, alert severity, service etc.. and every time a violation occurs through JMX?
    If there are any API's available, could you please provide.
    Thanks in advance

    You can use JMS APIs for monitoring. Here is the reference:
    http://docs.oracle.com/cd/E28280_01/admin.1111/e15867/app_jmx_monitoring.htm#OSBAG748
    Oracle Fusion Middleware Java API Reference for Oracle Service Bus

  • SLA alerts

    Hello,
    I have installed SOA Suite 11.1.1.5.0. At Oracle Service Bus I have define sla alert rules and I can monitor at the administrator console if there is any violation. I would like
    to know if these violations are written at a file? I want to have a file with the timestamp , the alert name, alert severity, service etc.. and every time a violation occurs these information are written at it.
    Thanks in advamce

    Hi,
    I changed the Alert rule to Message Count=0 and the main setting that I had to change to raise the alert was in the Operational Settings tab of the Proxy service.
    Monitoring: Enabled Pipeline Monitoring for Service Level and above. By default this is set as Pipeline Level.
    Thanks & Regards
    Kshama

  • SLA Voilation Alert

    Hi all,
    I setup SLA and after creating activity I can see SLA & reminder timings, when it reached reminder time SLA icon turn in to yellow from green.
    But I canu2019t get the Violation Alert u2013 alert profile is activated and also ran the program RPEIC_SLA_ALERTS and it got message on screen saying that 5 entries have been moved into THREIC_SLA_ALRT but when I checked in the table  but no entries found
    Personal reminder - I created personal reminder when it due to alert I am getting error msg in broadcasting area saying 'unable to deliver the msg'?
    Did I miss something here? Any help?
    thanks,
    R

    Hi Jarret,
    As you requested here I am giving steps that I followed.
    I followed below steps
    1)     Defined alert profiles  Alert ID HREIC_VOLATION
    Class- CL_CRM_IC_ALERT_GENRIC
    Navigation link u2013 ToActivityDetailsFromAlert
    Description: violation
    Message: Activity [param1] passed the due date [param2]
    Tooltip: Go To Alert View
    2)     Defined alert profiles  Alert ID HREIC_REMINDER
    Class- CL_CRM_IC_ALERT_GENRIC
    Navigation link u2013 ToalertviewfromAlert
    Description: reminder
    Message: The due date [param1]for activity [parm2] approching
    Tooltip: Go To Alert View
    3)     Maintain constants(Table: v_hreic_constant) : ALRTREMIED  - HREIC_REMINDER
                                                                               ALRTVIOLAT - HREIC_VOILATION
    4)     The program RPEIC_SLA_ALERTS reads the activity table THREIC_ACTIVITY and records those activities that need to have alerts sent to them in the alert table THREIC_SLA_ALRTS (Activities Selected by SLA Alert Program). (for testing after creating activity (assume sla in place) then run the above program then only you can get alerts in production systems we will schedule it back ground on your requirement.
    Hope this helps.
    Ravi

  • Service desk SLA

    Hi all,
    I have implemented basic service desk.
    Now i want to implement SLA for the same.
    Currently i have config the mailing action depending upon Status change. But now the req is to to trigger the mails depending upon timeline.Which can be done via SLA.
    I have gone thru the Service desk additional guide which is available on service.sap but not that much helpful.
    Can anyone please explain me how to implement the same.
    Points will be rewarded for sure.

    Dear Prakhar,
    If you want to work with SLAs a service product and contracts have to be
    used. The relevant dates then are not on header level of a service desk
    message but on item level. The actions concerning the SLA have to be
    defined on item level.
    The processing of the service desk messages is done with the transaction
    CRM_DNO_MONITOR. In this transaction monitor fields to the header of a
    message as well as to the item of a message are available and can be
    displayed.
    CRM transaction type SLFN actually is NOT configured for the use with
    contracts, SLAs,... . If you want to use these functionalities CRM
    transaction type SLF1 or an own defined transaction type should be used.
    Availability and Response Times can be maintained with transaction
    CRMD_SERV_SLA.
    Detailed information about the use and the customizing of Service
    Contracts and Service Level Agreements can be found
    - in the online documentation to Service Level Agreements
    - in the CRM IMG documentation, e.g.:
      - Customer Relationship Management
        - Transactions
          - Settings for Service Processes
            - SLA Escalation Management      <-
            - in the additional informations to the service desk that are to
    find in the SAP Service Marketplace under the quicklink
    'Solutionmanager'
      - Media Library
        - Technical Papers
          -> Service Desk: Additional Information
    Hope this helps explain things.
    Regards
    Amit

  • Service Desk with SLA: item data not automatic

    Hello all.
    I'm trying to setup service desck with contract determination for monitoring SLA (SolMan 7.0 SP 15)
    Everything works well, except for item/product determination. I mean, when i check a  support message creatde in a satellite system, organizational data are ok, but item's data are blank. Well, i put manually my own product in Item, quantity, press Enter and... that's all: contract data are correctly fullfilled, SLA schema ok, no errors at all.
    I'm sure that i missed some basic configuration, but i don't know where... Maybe in the Action Profile of the ABA message? Or in the Item category determination?
    Help me!

    Hi Michele
    Go to SPPFCADM > Select Application DNO_NOTIF >> Define Action Profile and Actions >> Action Profile - SLFN0001_STANDARD_DNO >> Action  - SLFN0001_STANDARD_DNO_CRM >> Select the processing type Method Call and choose 'change'icon in Method call settings >>
    In the container editor , Choose create >>  Maintain Element, Name & Description - maintain as ITEM_PRODUCT_ID, Choose ABAP Dict. Reference , Maintain values - Structure CRMD_ORDERADM_I, Field ORDERED_PROD, choose tab - intial value, enter the product code (Ex.SUPPORT)
    enter and save.
    This setting will ensure you to determine the product id in the Support message automatically, during your message creation process.
    Thanks
    Ram

  • Oracle 9i installation problem with RedHat 7.2 (segmentation violation)

    I have try to installation 9i with RedHat 7.2 by x windows.
    when i use xwin to run the "./runInstaller, i got the error
    (segmentation) as below:
    i have already try to follow the installation procedure in
    http://staff.in2.hr/denis/oracle/901install_rh72_en.html#1 but
    still got this error.
    Can anyone help me??
    Regards
    Chris Sung
    =================================================================
    ===============
    oracle install
    Connecting 192.168.1.3 via TELNET
    Thursday, December 13, 2001 1:04:06
    Red Hat Linux release 7.2 (Enigma)
    Kernel 2.4.7-10 on an i686
    login: oracle
    Password:
    Last login: Thu Dec 13 00:46:39 from apple
    [oracle@orange oracle]$ (/home/oracle/Disk1/runInstaller -
    display 192.168.1.2:0
    -name "oracle install" &)
    [oracle@orange oracle]$ Initializing Java Virtual Machine
    from /tmp/OraInstall/jre/bin/jre. Please wait...
    SIGSEGV 11* segmentation violation
         stackbase=0xbffff298, stackpointer=0xbffff160
    Full thread dump:
    "Finalizer thread" (TID:0x4276d210, sys_thread_t:0x4d0bfe0c,
    state:R) prio=1
    "Async Garbage Collector" (TID:0x4276d258,
    sys_thread_t:0x4d09ee0c, state:R) prio=1
    "Idle thread" (TID:0x4276d2a0, sys_thread_t:0x4d07de0c,
    state:R) prio=0
    "Clock" (TID:0x4276d088, sys_thread_t:0x4d05ce0c, state:CW)
    prio=12
    "main" (TID:0x4276d0b0, sys_thread_t:0x80d6fe8, state:R)
    prio=5 *current thread*
         java.lang.System.initializeSystemClass(System.java)
    Monitor Cache Dump:
    Registered Monitor Dump:
    Thread queue lock: <unowned>
    Name and type hash table lock: <unowned>
    String intern lock: <unowned>
    JNI pinning lock: <unowned>
    JNI global reference lock: <unowned>
    BinClass lock: <unowned>
    Class loading lock: <unowned>
    Java stack lock: <unowned>
    Code rewrite lock: <unowned>
    Heap lock: <unowned>
    Has finalization queue lock: <unowned>
    Finalize me queue lock: <unowned>
    Dynamic loading lock: <unowned>
    Monitor IO lock: <unowned>
    Child death monitor: <unowned>
    Event monitor: <unowned>
    I/O monitor: <unowned>
    Alarm monitor: <unowned>
         Waiting to be notified:
         "Clock" (0x4d05ce0c)
    Monitor registry: owner "main" (0x80d6fe8, 1 entry)
    Thread Alarm Q:

    Strange, but yesterday I nter in Oracle9i install, open
    gnome-terminal window as oracle user and simply type
    /tmp/Disk1/runInstaler
    the DISPLAY enviroment variable was set,
    using RedHat 7.2 , kernel 2.4.16-0.9, glibc-2.2.4-19
    Segmentation violation 11 may mean RAM problem, sometimes
    incorrect program pointer.So I think it must work (runIstaler)

  • Google Play Nexus 6 on Verizon Network C-Block Rules Violation

    Verizon,
    I have tired for some time to figure out how to activate my Google Play bought Nexus 6 on your network in accordance to C-Block rules. As No rep is able to point me to clearly defined and published procedures and rights I can only assume your in violation of "47 CFR 27.16 - NETWORK ACCESS REQUIREMENTS FOR BLOCK C IN THE 746-757 AND 776-787 MHZ BANDS."
    I request that my Nexus 6 be properly activated on your Network, and that I be provided with a Link to the "clear and reasonable procedures" that the FCC requires of you to publish for how to activate a device on your network along with all of my rights to request attachment to your network.
    47 CFR States that if your operating in 746-757 and 776-787 MHz bands that
    1) Licensees offering service on spectrum subject to this section shall not deny, limit, or restrict the ability of their customers to use the devices and applications of their choice on the licensee's C Block network
    2)
    (1) Licensees shall establish and publish clear and reasonable procedures for parties to seek approval to use devices or applications on the licensees' networks. A licensee must also provide to potential customers notice of the customers' rights to request the attachment of a device or application to the licensee's network, and notice of the licensee's process for customers to make such requests, including the relevant network criteria.
    (2) If a licensee determines that a request for access would violate its technical standards or regulatory requirements, the licensee shall expeditiously provide a written response to the requester specifying the basis for denying access and providing an opportunity for the requester to modify its request to satisfy the licensee's concerns.

    I disagree... I am being discriminated against and charged and extra $25 a month by bringing my own device.
    So as they are also not able to activate my device without faking a sim card - IE I cannot make a new account with my GP N6, and they are charging me over. This is clearly a violation.
    Discrimination of this nature is prohibited by the 700 MHz Order open platforms provisions (22 FCC Rcd, Pages 15358–15374), specifically Paragraph 222:
    In that regard, we emphasize that C Block licensees may not impose any additional discriminatory charges (one-time or recurring) or conditions on customers who seek to use devices or applications outside of those provided by the licensee.

  • ASA 5505 8.4. How to configure the switch to the backup channel to the primary with a delay (ex., 5 min) using the SLA?

    I have ASA 5505 8.4.  How to configure the switch to the backup channel to the primary with a delay (for example 5 min.) using the SLA monitor?
    Or as something else to implement it?
    My configuration for SLA monitor:
    sla monitor 123
     type echo protocol ipIcmpEcho IP_GATEWAY_MAIN interface outside_cifra
     num-packets 3
     timeout 3000
     frequency 10
    sla monitor schedule 123 life forever start-time now
    track 1 rtr 123 reachability

    Hey cadet alain,
    thank you for your answer :-)
    I have deleted all such attempts not working, so a packet-trace will be not very useful conent...
    Here is the LogLine when i try to browse port 80 from outside (80.xxx.xxx.180:80) without VPN connection:
    3
    Nov 21 2011
    18:29:56
    77.xxx.xxx.99
    59068
    80.xxx.xxx.180
    80
    TCP access denied by ACL from 77.xxx.xxx.99/59068 to outside:80.xxx.xxx.180/80
    The attached file is only the show running-config
    Now i can with my AnyConnect Clients, too, but after connection is up, my vpnclients can't surf the web any longer because anyconnect serves as default route on 0.0.0.0 ... that's bad, too
    Actually the AnyConnect and Nat/ACL Problem are my last two open Problems until i setup the second ASA on the right ;-)
    Regards.
    Chris

Maybe you are looking for

  • KT3 Ultra Aru xp2400?

    Hi I have been building my new PC for the last few month now it need 1 part a cpu. will the new AMD xp2400 be compaterble with my MSI KT3 Ultra Aru v1.0? if not what is the highest cpu it will take Thanks in Advance Widowmaker   KT3 Ultra Aru Coolerm

  • Movement type to manually input GL account for charity

    Hi Expert, I have issue from user as below: There are certain transactions in their operations was not in the preset movement type as shown during MIGO. As the GL accounts was preset they were unable to choose another account to reflect the actual si

  • ICal 3.0.7 alarms?

    Help file says to add an alarm by double-clicking the event, and then clicking on "Edit" in the Event Editor. I do not have an edit button in the Event Editor. I can add attendees, attachments, notes, and a url, but nothing about adding an alarm.

  • Can't see Ipod in network

    I have an IPOD touch that I can connect wirelessly to the internet. I am using a WRT610n router using WPA-2 encryption.  The IPOD connects through the router without any problems.  When I open LELA3 I see every computer/laptop that is connected to th

  • 1200 Series - Tagged Management VLAN Traffic

    Hi, As per my understanding the 1200 Series Access points running IOS (12.2(15)XR) send the management traffic (RADIUS,Accouting NTP etc) un-tagged i.e. using VLAN 1. As per our current setup, we assign this un-tagged traffic to a different VLAN (by