Transaction FILE : Configuration/Usage Best Practice

Looking for information regarding the best practice configuration for the transaction FILE. In particular, the activity is currently configured as a transportable object to where we have to define values in our DEV system and then promote through to PRD. This seems a bit off. I've looked all over to try and determine if this is a default setting and to see if other folks have turned this off as a best practice but I've yet to find any relevant info. Everywhere I read about using the functionality no one ever complains about the transport process... so this leads me to beleive that it really should not be setup that way.
So, can anyone point me to a SAP Note, or White Paper, or anything, with an official recommendation on how to configure as transportable or not.
I'm not necessarily looking for opinions... I'm really looking for some hardcopy recommendations.
Thanks in advance.
Bryan

FILE is basically useful for the Logical and Physical File mapping.
The end user is not aware of any physical path.
Its difficult to remember the physical path.
Eg:
BWSWEB\Interfaces\Out\File\Bank\RBS\ is mapped to simple and easy to remember logical path like Z_Bank_RBS
The configuration is very easy and transportable.
Developer can do it if have the authorization else BASIS will do it.
YOu need to enter the logical path, physical path and the file system to configure it.
YOu can also pass the run time parameters like System ID and Client.
Eg:
BWSWEB\DE1\300 will be development and the same will be dynamically changed to
BWSWEB\QE1\300 for Quality.
Hope this helps.

Similar Messages

  • Ask the Expert:Configuring, Troubleshooting & Best Practices on ASA & FWSM Failover

    With Prashanth Goutham R.
    Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about the Configuring, Troubleshooting & Best Practices on Adaptive Security Appliances (ASA) & Firewall Services Module (FWSM) Failover with Prashanth Goutham. 
    Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. Cisco ASA is a key component of the Cisco SecureX Framework, protects networks of all sizes with MultiScale performance and a comprehensive suite of highly integrated, market-leading security services.
    Prashanth Goutham is an experienced support engineer with the High Touch Technical Support (HTTS) Security team, covering all Cisco security technologies. During his four years with Cisco, he has worked with Cisco's major customers, troubleshooting routing, LAN switching, and security technologies. He is also qualified as a GIAC Certified Incident Handler (GCIH) by the SANS Institute.
    Remember to use the rating system to let Prashanth know if you have received an adequate response. 
    Prashanth might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Security sub-community forum shortly after the event. This event lasts through July 13, 2012. Visit this forum often to view responses to your questions and the questions of other community members.

    Hello John,
    This session is on Failover Functionality on all Cisco Firewalls, im not a geek on QOS however i have the answer for what you need. The way to limit traffic would be to enable QOS Policing on your Firewalls. The requirement that you have is about limiting 4 different tunnels to be utilizing the set limits and drop any further packets. This is called Traffic Policing. I tried out the following in my lab and it looks good.
    access-list tunnel_one extended permit ip 10.1.0.0 255.255.0.0 20.1.0.0 255.255.0.0access-list tunnel_two extended permit ip 10.2.0.0 255.255.0.0 20.2.0.0 255.255.0.0access-list tunnel_three extended permit ip 10.3.0.0 255.255.0.0 20.3.0.0 255.255.0.0access-list tunnel_four extended permit ip 10.4.0.0 255.255.0.0 20.4.0.0 255.255.0.0    class-map Tunnel_Policy1     match access-list tunnel_one   class-map Tunnel_Policy2     match access-list tunnel_two   class-map Tunnel_Policy3     match access-list tunnel_three   class-map Tunnel_Policy4     match access-list tunnel_four  policy-map tunnel_traffic_limit     class Tunnel_Policy1      police output 4096000   policy-map tunnel_traffic_limit     class Tunnel_Policy2      police output 5734400   policy-map tunnel_traffic_limit     class Tunnel_Policy3      police output 2457600    policy-map tunnel_traffic_limit     class Tunnel_Policy4      police output 4915200service-policy tunnel_traffic_limit interface outside
    You might want to watch out for the following changes in values:
    HTTS-SEC-R2-7-ASA5510-02(config-cmap)#     policy-map tunnel_traffic_limitHTTS-SEC-R2-7-ASA5510-02(config-pmap)#      class Tunnel_Policy1HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#       police output 4096000HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#     policy-map tunnel_traffic_limitHTTS-SEC-R2-7-ASA5510-02(config-pmap)#      class Tunnel_Policy2HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#       police output 5734400WARNING: police rate 5734400 not supported. Rate is changed to 5734000    
    HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#HTTS-SEC-R2-7-ASA5510-02(config)#     policy-map tunnel_traffic_limitHTTS-SEC-R2-7-ASA5510-02(config-pmap)#      class Tunnel_Policy3HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#       police output 2457600WARNING: police rate 2457600 not supported. Rate is changed to 2457500HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#     policy-map tunnel_traffic_limitHTTS-SEC-R2-7-ASA5510-02(config-pmap)#      class Tunnel_Policy4HTTS-SEC-R2-7-ASA5510-02(config-pmap-c)#       police output 4915200WARNING: police rate 4915200 not supported. Rate is changed to 4915000I believe this is because of the software granularity and the way IOS rounds it off in multiples of a certain value, so watch out for the exact values you might get finally. I used this website to calculate your Kilobyte values to Bits: http://www.matisse.net/bitcalc/
    The Final outputs of the configured values were :
        Class-map: Tunnel_Policy1      Output police Interface outside:        cir 4096000 bps, bc 128000 bytes        conformed 0 packets, 0 bytes; actions:  transmit        exceeded 0 packets, 0 bytes; actions:  drop        conformed 0 bps, exceed 0 bps     Class-map: Tunnel_Policy2      Output police Interface outside:        cir 5734000 bps, bc 179187 bytes        conformed 0 packets, 0 bytes; actions:  transmit        exceeded 0 packets, 0 bytes; actions:  drop        conformed 0 bps, exceed 0 bps    Class-map: Tunnel_Policy3      Output police Interface outside:        cir 2457500 bps, bc 76796 bytes        conformed 0 packets, 0 bytes; actions:  transmit        exceeded 0 packets, 0 bytes; actions:  drop        conformed 0 bps, exceed 0 bps    Class-map: Tunnel_Policy4      Output police Interface outside:        cir 4915000 bps, bc 153593 bytes        conformed 0 packets, 0 bytes; actions:  transmit        exceeded 0 packets, 0 bytes; actions:  drop        conformed 0 bps, exceed 0 bps
    Please refer to the QOS document on CCO here for further information: http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/conns_qos.html
    Hope that helps..

  • ECATT Configuration for Best Practices.

    Hi Gurus,
    i'm installing pharma best practices 1.6 on ecc60sr2, i have done all the configurations before importing the project, while activating the project i'm getting error. i.e
    Ecatt object/SMB10/OMCE_0001_P02 does not exist in the system.
    I have copied all the varient txt files in variants folder and pointed that folder in secatt transaction settings.
    can anybody please provide me the information,if any body faced same problem please give me the steps in detail.
    Thanks & Regards..Naveen

    Hi Naveen,
    Check the following links on SDN:
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/a0e0ebec-c9da-2910-689e-b1a22a621c7f
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/9093bf93-b1e3-2a10-04ba-f9e5c71558b1
    eCATT- An Introduction blog on SDN
    Check the following best link on help.sap.com
    http://help.sap.com/saphelp_nw04/helpdata/en/1b/e81c3b84e65e7be10000000a11402f/frameset.htm
    Search forums, library and blogs on SDN. I bet you will find loads of info on eCATT.
    Regards,
    Kiran Kandepalli.

  • Failover cluster File Server role best practices

    We recently implemented a Hyper-V Server Core 2012 R2 cluster with the sole purpose to run our server environment.  I started with our file servers and decided to create multiple file servers and put them in a cluster for high
    availability.  So now I have a cluster of VMs, which I have now learned is called a guest cluster, and I added the File Server role to this cluster.  It then struck me that I could have just as easily created the File Server role under my Hyper-V
    Server cluster and removed this extra virtual layer.  
    I'm reaching out to this community to see if there are any best practices on using the File Server role.  Are there any benefits to having a guest cluster provide file shares? Or am I making things overly complicated for no reason?
    Just to be clear, I'm just trying to make a simple Windows file server with folder shares that have security enabled on them for users to access internally. I'm using Hyper-V Core server 2012 R2 on my physical servers and right now I have Windows
    Server Standard 2012 R2 on the VMs in the guest cluster.
    Thanks for any information you can provide.

    Hi,
    Generally with Hyper-V VMs available, we will install all roles into virtual machines as that will be easy for management purpose.
    In your situation the host system is a server core, so it seems that manage file shares with a GUI is much better.
    I cannot find an article specifically regarding "best practices of setting up failover cluster". Here are 2 articles regarding build guest cluster (you have already done) and steps to create a file server cluster. 
    Hyper-V Guest Clustering Step-by-Step Guide
    http://blogs.technet.com/b/mghazai/archive/2009/12/12/hyper-v-guest-clustering-step-by-step-guide.aspx
    Failover Cluster Step-by-Step Guide: Configuring a Two-Node File Server Failover Cluster
    https://technet.microsoft.com/en-us/library/cc731844(v=ws.10).aspx
    Please remember to mark the replies as answers if they help and un-mark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Oracle Service Bus - Large Configuration Space Best Practices

    Does anyone have any best practices for handling large configurations in Oracle Service Bus (formerly ALSB)? We are going to have hundreds of HTTP services defined. Any best practices for handling proxy service granularity, cross cutting areas and componentization to help us create a high level of quality and consistency?
    Thanks

    We are going to face the similar situation soon. Any real world experience would be great.

  • Swtich with 2 wireless routers (configuration for best practice/advice?)

    HI folks,
    I have a gigabit switch, and 2 wireless G routers.  I'll leave the model numbers out as it's fairly irrelevant - all linksys.
    Router 1 is used as a router only (due to location in basement)
    Router 2 is used for wireless only
    My current network setup:
    DSL MODEM (accessed on 192.168.2.1 - can not be changed) > Router 1(192.168.1.1)
    Router 1 > Switch (i believe it can't be changed 192.168.2.12 - no webgui)
    Switch > everything else including Router 2
    Everything works except Router 2 - can't connect to it wired or wirelessly until connected directly to a pc.
    Is my setup wrong
    and/or is there a best practice?
    Many thanks!!!

    What is the model number of the switch?
    Normally a switch that cannot be changed does not have an IP address.  So if your switch has an address (you said it was 192.168.2.12)  I would assume that it can be changed and that it must support either a gui or have some way to set or reset the switch.
    Since Router1 is using the 192.168.1.x  subnet , then the switch would need to have a 192.168.1.x  address (assuming that it even has an IP address), otherwise Router1 will not be able to access the switch.
    I would suggest that initially, you setup your two routers without the switch, and make sure they are working properly, then add the switch.  Normally you should not need to change any settings in your routers when you add the switch.
    To setup your two routers, see my post at this URL:
    http://forums.linksys.com/linksys/board/message?board.id=Wireless_Routers&message.id=108928
    Message Edited by toomanydonuts on 04-07-2009 02:39 AM

  • CM (Configuration Managment) Best Practices for DBs?

    Hi:
    I've got a question on a topic I haven't seen discussed before. I have a project with application code and PL/SQL code and an Oracle 10g database that has triggers, constraints, etc. For a Java or C# project the concept of CM and a central code repository works, largely because the CM tool is able to enforce limits on who can do what to a given resource over time. Developers MUST check out the source files before modifying and adding back to the CM tree.
    Database objects are more on an honor system. Even if you put the code for the tables, triggers, constraints, packages etc. under CM, nothing prevents a developer or multiple developers from modifying those objects in the development database and never updating the create scripts that are in the CM tree. So given that there are thousands of systems out there with Java/C# or whatever front ends and PL/SQL back ends in databases that have all sorts of DB objects in them, what are the best CM practices? How does a developer know the package he's about to modify is the last one that got pushed to the production server?
    Constraints are problematic in several unique ways. They can be created in several places by different syntax (in the table create command; as a stand alone command after the table exist; named or system generated name if defined in the table definition). Things like SQL Developer and Toad can create code trees that contain all the scripts needed to build a database from scratch and a top level build script to run them all, but what's the best structure for that? Do table create scripts JUST define columns and separate scripts create all constraints?
    I like to think someone has crossed this particular bridge before and has some answers to my questions. Any takers?
    Thanks.

    Gaff wrote:
    No. With non-DB code, it isn't voluntary. The developer needs to check a file in or out before modifying it and the CM system enforces either that only one person at a time can edit the file or if multiple ones can, the merging of the results. Once the PL/SQL package is in a database, a developer can change it and NOT change the underlying file. I don't agree that there is a difference. All source control systems I have seen allow a copy to be taken or the source to be viewed without checking it out. I have a checked out source file on my PC. I copy it. I check in my changes, I make changes to the copy. I have made a change without changing the checked in source. Just like I could in the database. Should this change make it into the final build? No, and I can't complain when it doesn't, just like the unauthorized change directly in the database is overwritten and lost. I see no difference.
    Making changes to database objects directly in the database is a terrible practice, you can enforce the same lack of tolerance for it as you would for any other developer circumventing the source control and deployment process in any other language.
    - You tell them not to do it.
    - You overwrite their changes if they do do it.
    - You fire them if they continue to do it.
    >
    I think the solution is that by default DB developers have read-only access to the objects. When they identify the pieces that need to change to fix a given bug, some 3rd party (Software Lead? DBA?) grants them CRUD on the identified objects and verifies that their modified code makes it into the CM tree when the bug is fixed.The developer can make their own changes in the Dev database. Changes to the Test database prior to production deployment can only be made by the DBA using scripts from the source control system.
    This works flawlessly.

  • Data files available in Best Practice document for BPC

    Any idea how to retrieve data files avaialble under Miscellaneous folder on Best Preactice cd. These files are not available online and don't know how to retrieve the same.  Any help kindly appreciated.
    Sachin

    Download available through swdc.

  • Photoshop files in DVDSP-best practices...

    I am teaching a class and a discussion point cam about regarding Photoshop and layers. At issue is a menu design where the designer used multiple layers (10-13)for text, objects, etc. This is not a layered menu but there is one overlay file.
    Question:
    Apart from the overlay layer should one be merging or flattening (not sure I know which is preferred) the file before doing a build?
    Comment:
    In the build process we are converting still assets to JPEG's and video assets to MPEG2 so this very process does a "flattening." Therefore the extra time/work in Photoshop is not needed.

    You can certainly use a layered file to create a standard menu. It's a DVDSP feature, not something that all authoring apps let you do. Some may, but not all.
    You can import 10-13 layers in a single file, no need to flatten or merge. When you add this to a menu be sure to create the right kind of menu first! You are making a standard menu, not a layered menu. When you add the photoshop file the layers are preserved and you can then see how it looks. If you need to edit the file you can do so, and of course you get to specify which layer is the overlay. This last bit is in a different tab, but all in the property inspector for the menu. Also, if you sue coloured shapes for the overlay layer (and why not?) remember that your colour mapping will need to be set correctly in the 'Colors' tab for them to show as you expect. Generally speaking, using a color in the overlay file means you'll need to set the menu up with Chroma rather than grayscale settings.
    When complete, you build and format your disc, and DVDSP flattens all of the layers into a background image (apart from the specified overlay layer) before it converts them to MPEG2 format.
    This functionality is a feature that is intended to make authoring menus a little easier for people. Personally, I don't use it, preferring to manage the menu creation in photoshop entirely, but I do see how you could play around with various layer combinations from inside DVDSP to decide what the final look should be before committing it to the disc.

  • PC Convert - Configuring Mail & Best Practices for Multiple Users

    I finally came to the light side last night. I bought an iMac and now I'm trying to figure out how to best set it up for use by me and my wife. Our PC is set up with a single login account and I've created multiple Outlook (not Express) profiles, one for her and one for me.
    Can I do the same thing on the iMac? Am I better off creating multiple login accounts and just keeping everything separate? Being new, I would rather set things up the right way the first time and not have to undo things due to my lack of experience with iMac.
    Thanks!

    Hello,
    Welcome to the Discussions, and welcome to Macs!
    If you each wish not to see the email messages of the other, then your only real choice is to set up separate User Accounts (what you are calling login accounts). Of course using a single User Account, you can set both email accounts up in Mail, and if you keep the Inbox and Sent mailboxes expanded to show the separate Inbox (and Sent) for each account, then that works pretty well. It will not distinguish New Mail without looking in the the Inbox -- the red dot in the Dock will not separate for whom new mail has arrived. But the Address Book will be the same and shared.
    The advantage of multiple User Accounts is that the entire Dock can be customized for the applications each of you like to use, if they are different.
    The disadvantage will be in not sharing will include not sharing the Address Book, music and photo libraries, etc.
    Ernie

  • Oracle Best Practices / Guidelines regarding Cleaning TEMP files

    Hi folks,
    Can any one help me with a set of steps / guidelines or best practices to clean TEMP files from OBIEE servers (our PROD environment)?
    Does perhaps OBIEE take care of this for you automatically, how is that process happening?
    Thanks a lot for your time and attention and hope to hear from you soon.

    TEMPS files are deleted from the server once a user logs out. But there might be chance where the TEMP files does not get deleted automaticlly, when the user logs out of the system even before the TEMP file has been generated completely. In this case the temp files get stored in the server, and a bounce of services cleans up the files.
    The best practice would be to create a script to empty out the temp directory during the start up of the services.
    -Amith.

  • Best Practice EPA files...

    Hi,
    i found the the following  EPA files from SAP Best Practices for Portals- V1.70 :
    1)BP_ALL.EPA
    2)BP_EC_ALL.EPA
    3)BP_ECC_BL.EPA 
    ....The question is that whether i can use the "iviews" in these files to give to my users ...or whether this iviews are only for demo purpose(i could see that this are a prototype files)....if this files are a prototype ....can i find the original EPA files...any where else?
    Rgds,
    P.Navakanth

    Apple has already hidden about half of the folders on a typical OS X install. The ones that make up the Unix core of the OS. So unless you know how to find those, you'll never have to worry about them.
    Aside from that, you just want to keep away from the System folder and any of the Library folders. Nothing else should be too crucial to the OS running.
    Of course if you wanted to elaborate on "a little strange" we might be able to be a bit more helpful.

  • Best Practices for Configuration Manager

    What all links/ documents are available that summarize the best practices for Configuration Manager?
    Applications and Packages
    Software Updates
    Operating System Deployment
    Hardware/Software Inventory

    Hi,
    I think this may help you
    system center 2012 configuration manager best practices
    SCCM 2012 task-sequence best practices
    SCCM 2012 best practices for deploying application
    Configuration Manager 2012 Implementation and Administration
    Regards, Ibrahim Hamdy

  • Best Practice for Delivering Content

    Hi SDN Experts,
    We have a scenario where we need to read/write a EDI kind of file, separated file. But the solution should be a deployable one and we are planning to provide IR Content alone and use Integration Scenarios for ID.
    We have two options:
    1. Use file Content Conversion (EDI structure is very simple) and provide Communication Channel Templates with Content Conversion Parameters for Integration Scenario.
    2. Use java Map to read/write EDI (Communication Channels would be simple in this case ).
    What are the pros and cos of the two approaches?
    Regards,
    Sudharshan N A

    Hi Sudharsan,
    Pros and Cons:
    1. Use file Content Conversion (EDI structure is very simple) and provide Communication Channel Templates with Content Conversion Parameters for Integration Scenario.
    Ans: - Communication channel configuration is dificult as you have to introduce content conversion in it. If you miss any parameter in that part or provide wrong value. It will cause error.
    - Mapping will bw very easy may be one to one or upon requirement. can use graphical mapping.
    2. Use java Map to read/write EDI (Communication Channels would be simple in this case ).
    Ans: - You will resolve all conversion relation (like in which format data is expected at receiver) issues in java mapping by programing. so mapping is going to be atough task.
    - no content conversion required at CC level so its easy to configured.
    Best practice depends accordingly:
    if you are a java expert (in java mapping) go for 2nd one other wise its always default to use content conversion.
    Hope this will help.
    Best regards,
    Alok
    Edited by: Alok Sharma on Jan 31, 2008 8:42 AM

  • SAP Best Practice for Water Utilities on ERP2005

    Hi All,
    I want to load SAP Best Practice for Water Utilities on ERP2005. I have downloaded the package from Marketplace but there is NO transport file included on it. It only contains documentation. My questions are
    1. Does anyone know where I can download the transport file, if any?
    2. Should I use the transport file from Baseline Best Practice instead?
    Thank you,
    Bomo

    Hello!
    The file should contain eCATTs with data according to best practice preconfigured scenarios and transactions to install them.
    Some information about preconfigured scenario you could find here:
    http://help.sap.com/bp_waterutilv1600/index.htm -> Business Information -> Preconfigured Scenarios
    Under the "Installation" path you could find "Scenario Installation Guide" for Water Utilities.
    I hope it would be helpful.
    Vladimir

Maybe you are looking for