STRATEGY & CREATIVITY

SAP HANA In Memory Database.

PORTFOLIO

We pride ourselves on bringing a good technology and effective knowledge to every perfect one.

  • SAP HANA - ETL Based Replication

    SAP HANA ETL based replication uses SAP Data Services to migrate data from SAP or non-SAP source system to target HANA database. BODS system is an ETL tool used to extract, transform and load data from source system to target system.
    It enables to read the business data at Application layer. You need to define data flows in Data Services, scheduling a replication job and defining source and target system in data store in Data Services designer.

    How to use SAP HANA Data Services ETL based Replication?

    Login to Data Services Designer (choose Repository) → Create Data store
    SAP HANA Data Services
    For SAP ECC system, choose database as SAP Applications, enter ECC server name, user name and password for ECC system, Advanced tab choose details as instance number, client number, etc. and apply.
    New Data Store
    This data store will come under local object library, if you expand this there is no table inside it.
    Local Object Library
    Right click on Table → Import by name → Enter ECC table to import from ECC system (MARA is default table in ECC system) → Import → Now expand Table → MARA → Right Click View Data. If data is displayed, Data store connection is fine.
    Now, to choose target system as HANA database, create a new data store. Create Data store → Name of data store SAP_HANA_TEST → Data store type (database) → Database type SAP HANA → Database version HANA 1.x.
    Enter HANA server name, user name and password for HANA system and OK.
    Create New Datastore
    This data store will be added to Local Object Library. You can add table if you want to move data from source table to some specific table in HANA database. Note that target table should be of similar datatype as source table.

    Creating a Replication Job

    Create a new Project → Enter Project Name → Right Click on Project name → New Batch Job → Enter job name.
    Creating a Replication Job
    From right side tab, choose work flow → Enter work flow name → Double click to add it under batch job → Enter data flow → Enter data flow name → Double click to add it under batch job in Project area Save all option at top.
    Object Area
    Drag table from First Data Store ECC (MARA) to work area. Select it and right click → Add new → Template table to create new table with similar data types in HANA DB → Enter table name, Data store ECC_HANA_TEST2 → Owner name (schema name) → OK
    Create Template
    Drag table to front and connect both the table → save all. Now go to batch job → Right Click → Execute → Yes → OK
    SAP ECC Test
    Once you execute the Replication job, you will get a confirmation that job has been completed successfully.
    Go to HANA studio → Expand Schema → Tables → Verify data. This is manual execution of a batch job.

    Scheduling of Batch Job

    You can also schedule a batch job by going to Data Services Management console. Login to Data Services Management Console.
    Choose the repository from left side → Navigate to 'Batch Job Configuration' tab, where you will see the list of jobs → Against the job you want to schedule → click on add schedule → Enter the 'schedule name' and set the parameters like (time, date, reoccurring etc.) as appropriate and click on 'Apply'.
    Scheduling of Batch Job

  • SAP HANA - Data Replication Overview

    SAP HANA Replication allows migration of data from source systems to SAP HANA database. Simple way to move data from existing SAP system to HANA is by using various data replication techniques.
    System replication can be set up on the console via command line or by using HANA studio. The primary ECC or transaction systems can stay online during this process. We have three types of data replication methods in HANA system −
    • SAP LT Replication method
    • ETL tool SAP Business Object Data Service (BODS) method
    • Direct Extractor connection method (DXC)

    SAP LT Replication Method

    SAP Landscape Transformation Replication is a trigger based data replication method in HANA system. It is a perfect solution for replicating real time data or schedule based replication from SAP and non-SAP sources. It has SAP LT Replication server, which takes care of all trigger requests. Replication server can be installed as standalone server or can run on any SAP system with SAP NW 7.02 or above.
    There is a Trusted RFC connection between HANA DB and ECC transaction system, which enables trigger based data replication in HANA system environment.
    SAP LT Replication Method

    Advantages of SLT Replication

    • SLT Replication method allows data replication from multiple source systems to one HANA system and also from one source system to multiple HANA systems.
    • SAP LT uses trigger based approach. It has no measureable performance impact in source system.
    • It also provides data transformation and filtering capability before loading to HANA database.
    • It allows real-time data replication, replicating only relevant data into HANA from SAP and non-SAP source systems.
    • It is fully integrated with HANA System and HANA studio.

    Creating a Trusted RFC Connection in ECC system

    On your source SAP system AA1 you want to setup a trusted RFC towards target system BB1. When it is done, it would mean that when you are logged onto AA1 and your user has enough authorization in BB1, you can use the RFC connection and logon to BB1 without having to re-enter user and password.
    Using RFC trusted/trusting relationship between two SAP systems, RFC from a trusted system to a trusting system, password is no required for logging on to the trusting system.
    Open SAP ECC system using SAP logon. Enter transaction number sm59 → this is transaction number to create a new Trusted RFC connection → Click on 3rdicon to open a new connection wizard → click on Create and new window will open.
    SAP ECC System
    RFC Destination ECCHANA (enter name of RFC destination) Connection Type − 3 (for ABAP system)

    Go to Technical Setting

    Enter Target host − ECC system name, IP and enter System number.
    Technical Setting1
    Go to Logon & Security tab, Enter Language, Client, ECC system user name and password.
    Technical Setting2
    Click on the Save option at the top.
    Destination
    Click on Test Connection and it will successfully test the connection.
    RFC Connection Test

    To Configure RFC connection

    Run transaction − ltr (to configure RFC connection) → New browser will open → enter ECC system user name and password and logon.
    Configure RFC Connection
    Click on New → New Window will open → Enter configuration name → Click Next → Enter RFC Destination (connection name created earlier), Use search option, choose name and click next.
    Create Configuration
    In Specify Target system, Enter HANA system admin user name & password, host name, Instance number and click next. Enter No of Data transfer jobs like 007(it cannot be 000) → Next → Create Configuration.
    Now go to HANA Studio to use this connection −
    Go to HANA Studio → Click on Data Provisioning → choose HANA system
    Hana System
    Select source system (name of trusted RFC connection) and target schema name where you want to load tables from ECC system. Select tables you want to move to HANA database → ADD → Finish.
    Source System
    Selected tables will move to chosen schema under HANA database.
  • SAP HANA - Auditing

    SAP HANA audit policy tells the actions to be audited and also the condition under which the action must be performed to be relevant for auditing. Audit Policy defines what activities have been performed in HANA system and who has performed those activities at what time.
    SAP HANA database auditing feature allows monitoring action performed in HANA system. SAP HANA audit policy must be activated on HANA system to use it. When an action is performed, the policy triggers an audit event to write to audit trail. You can also delete audit entries in Audit trail.
    In a distributed environment, where you have multiple database, Audit policy can be enabled on each individual system. For the system database, audit policy is defined in nameserver.ini file and for tenant database, it is defined in global.ini file.

    Activating an Audit Policy

    To define Audit policy in HANA system, you should have system privilege − Audit Admin.
    Go to Security option in HANA system → Auditing
    Auditing
    Under Global Settings → set Auditing status as enabled.
    You can also choose Audit trail targets. The following audit trail targets are possible −
    • Syslog (default) − Logging system of Linux Operating System.
    • Database Table − Internal database table, user who has Audit admin or Audit operator system privilege he can only run select operation on this table.
    • CSV text − This type of audit trail is only used for test purpose in a non-production environment.
    Audit Trail Target
    You can also create a new Audit policy in the Audit Policies area → choose Create New Policy. Enter Policy name and actions to be audited.
    Save the new policy using the Deploy button. A new policy is enabled automatically, when an action condition is met, an audit entry is created in Audit trail table. You can disable a policy by changing status to disable or you can also delete the policy.
  • SAP HANA - License Management

    SAP HANA License management and keys are required to use HANA database. You can install or delete HANA License keys using HANA studio.

    Types of License keys

    SAP HANA system supports two types of License keys −
    • Temporary License Key − Temporary License keys are automatically installed when you install the HANA database. These keys are valid only for 90 days and you should request permanent license keys from SAP market place before expiry of this 90 days period after installation.
    • Permanent License Key − Permanent License keys are valid only till the predefine expiration date. License keys specify amount of memory licensed to target HANA installation. They can installed from SAP Market place under Keys and Requests tab. When a permanent License key is expired, a temporary license key is issued, which is valid for only 28 days. During this period, you have to install a permanent License key again.
    There are two types of permanent License keys for HANA system −
    • Unenforced − If unenforced license key is installed and consumption of HANA system exceeds the license amount of memory, operation of SAP HANA is not affected in this case.
    • Enforced − If Enforced license key is installed and consumption of HANA system exceeds the license amount of memory, HANA system gets locked. If this situation occurs, HANA system has to be restarted or a new license key should be requested and installed.
    There is different License scenarios that can be used in HANA system depending on the landscape of the system (Standalone, HANA Cloud, BW on HANA, etc.) and not all of these models are based on memory of HANA system installation.

    How to Check License Properties of HANA

    Right Click on HANA system → Properties → License
    Check License Properties
    It tells about License type, Start Date and Expiration Date, Memory Allocation and the information (Hardware Key, System Id) that is required to request a new license through SAP Market Place.
    Install License key → Browse → Enter Path, is used to install a new License key and delete option is used to delete any old expiration key.
    All Licenses tab under License tells about Product name, description, Hardware key, First installation time, etc.
  • SAP HANA - Authorization Methods

    Authorization is checked when a user tries to connect to HANA database and perform some database operations. When a user connects to HANA database using client tools via JDBC/ODBC or Via HTTP to perform some operations on database objects, corresponding action is determined by the access that is granted to the user.
    Privileges granted to a user are determined by Object privileges assigned on user profile or role that has been granted to user. Authorization is a combination of both accesses. When a user tries to perform some operation on HANA database, system performs an authorization check. When all required privileges are found, system stops this check and grants the requested access.
    There are different types of privileges, which are used in SAP HANA as mentioned under User role and Management −

    System Privileges

    They are applicable to system and database authorization for users and control system activities. They are used for administrative tasks such as creating Schemas, data backups, creating users and roles and so on. System privileges are also used to perform Repository operations.

    Object Privileges

    They are applicable to database operations and apply to database objects like tables, Schemas, etc. They are used to manage database objects such as tables and views. Different actions like Select, Execute, Alter, Drop, Delete can be defined based on database objects.
    They are also used to control remote data objects, which are connected through SMART data access to SAP HANA.

    Analytic Privileges

    They are applicable to data inside all the packages that are created in HANA repository. They are used to control modeling views that are created inside packages like Attribute View, Analytic View, and Calculation View. They apply row and column level security to attributes that are defined in modeling views in HANA packages.

    Package Privileges

    They are applicable to allow access to and ability to use packages that are created in repository of HANA database. Package contains different Modeling views like Attribute, Analytic and Calculation views and also Analytic Privileges defined in HANA repository database.

    Application Privileges

    They are applicable to HANA XS application that access HANA database via HTTP request. They are used to control access on applications created with HANA XS engine.
    Application Privileges can be applied to users/roles directly using HANA studio but it is preferred that they should be applied to roles created in repository at design time.

    Repository Authorization in SAP HANA Database

    _SYS_REPO is the user owns all the objects in HANA repository. This user should be authorized externally for the objects on which repository objects are modeled in HANA system. _SYS_REPO is owner of all objects so it can only be used to grant access on these objects, no other user can login as _SYS_REPO user.
    GRANT SELECT ON SCHEMA "<SCHEMA_NAME>" TO _SYS_REPO WITH GRANT OPTION
  • SAP HANA - Authentications

    All SAP HANA users that have access on HANA database are verified with different Authentications method. SAP HANA system supports various types of authentication method and all these login methods are configured at time of profile creation.
    Below is the list of authentication methods supported by SAP HANA −
    • User name/Password
    • Kerberos
    • SAML 2.0
    • SAP Logon tickets
    • X.509
    Authentications

    User Name/Password

    This method requires a HANA user to enter user name and password to login to database. This user profile is created under User management in HANA Studio → Security Tab.
    Password should be as per password policy i.e. Password length, complexity, lower and upper case letters, etc.
    You can change the password policy as per your organization’s security standards. Please note that password policy cannot be deactivated.
    Username password

    Kerberos

    All users who connect to HANA database system using an external authentication method should also have a database user. It is required to map external login to internal database user.
    This method enables users to authenticate HANA system directly using JDBC/ODBC drivers through network or by using front end applications in SAP Business Objects.
    It also allows HTTP access in HANA Extended Service using HANA XS engine. It uses SPENGO mechanism for Kerberos authentication.
    Kerberos

    SAML

    SAML stands for Security Assertion Markup Language and can be used to authenticate users accessing HANA system directly from ODBC/JDBC clients. It can also be used to authenticate users in HANA system coming via HTTP through HANA XS engine.
    SAML is used only for authentication purpose and not for authorization.
    SAML

    SAP Logon and Assertion Tickets

    SAP Logon/assertion tickets can be used to authenticate users in HANA system. These tickets are issued to users when they login into SAP system, which is configured to issue such tickets like SAP Portal, etc. User specified in SAP logon tickets should be created in HANA system, as it does not provide support for mapping users.
    SAP Logon and Assertion Tickets

    X.509 Client Certificates

    X.509 certificates can also be used to login to HANA system via HTTP access request from HANA XS engine. Users are authenticated by certificated that are signed from trusted Certificate Authority, which is stored in HANA XS system.
    User in trusted certificate should exist in HANA system as there is no support for user mapping.
    Client Certificates

    Single Sign On in HANA system

    Single sign on can be configured in HANA system, which allows users to login to HANA system from an initial authentication on the client. User logins at client applications using different authentication methods and SSO allows user to access HANA system directly.
    SSO can be configured on below configuration methods −
    • SAML
    • Kerberos
    • X.509 client certificates for HTTP access from HANA XS engine
    • SAP Logon/Assertion tickets
  • CONTENT

    We are providing SAP HANA Administration Materials.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    VENKAT SAP HANA

    • Street :Hyderabad
    • Person :Venkat
    • Country :INDIA
    • Email :venkatsaptraining@gmail.com

    For any Query,Please leave message

    Learn SAP HANA Be with latest update.