Upload
rajans1976
View
4
Download
0
Tags:
Embed Size (px)
Citation preview
© 2011 SAP AG. All rights reserved. 2Confidential
Nature of Business is Changing
2000 2007 2011
Every customer has mission-
critical applications along with
integration needs
SAP landscapes become more
sophisticated the more
comprehensive & integrated
they are
Complexity of landscapes is
increasing
Higher business demands on
availability and flexibility
R/3R/3Legacy
System
Legacy
System
ManguisticsManguistics
» INCREASED SAP LANDSCAPE
INTEGRATION
Business Networks
No. of users
© 2011 SAP AG. All rights reserved. 3Confidential
Today's Challenges in Data Volume Management
Large and
Complex system
landscapes
Data retention
requirements from
governments and
legal entities
Data destruction
only in legally
compliant manner
Growing energy
costs and pressure
to become greener
Facing financial audits
and tax requirements
Data volume
growing
exponentially
© 2011 SAP AG. All rights reserved. 4Confidential
Finance
CEO
HR
Supply ChainSales
Through mergers and
acquisitions, a company will
typically need to integrate
and reconcile data from
different systems.
Individual departments often
run their own systems and with
their own separate data stores
and business processes.
System upgrades, multiple
systems, data owners,
and duplicate data results
in poor data quality
Data complexity grows as a business grows
Merger / Acquisition
Merger / Acquisition
Merger / Acquisition
Business Growth
The Data Challenge - complexity of doing business
© 2011 SAP AG. All rights reserved. 5Confidential
Data Volume Facts
Current Situation:
Database size is 9 TB (that is 9 000 000 000 000 Bytes)
At a monthly growth rate of 70 GB
The number of users are rapidly growing
The Storage System (external Content Repository grows
moderate)
Consequently the performance of the system is
decreasing:
• The average response time per transaction goes up from
500 ms /TA up to 2,5 seconds / TA
• users are complaining about a slow system
Software Package (SP) and Enhancement Package
(EhP) upgrades are very delicate tasks and it is
difficult to find an appropriate time slot to do such
things. Administrative Tasks are highly aggravated.
Your DB-Storage TCO is increasing and there is no
way out.
2000 2003 2007 2011
DB Size 0,5 0,8 4,5 9
02468
10
In T
err
aB
yte
DB Size *
2000 2003 2007 2011
Users 50 150 1500 3500
0
1000
2000
3000
4000
Nu
mb
er
of
use
rs
Number of Users
2000 2003 2007 2011
Average Response time
0,5 0,7 1,5 2,5
0123
seco
nd
sAverage Response time per Transaction
* Note: Database growth assumption of 70 GB
growth per month after Productive Going Live
© 2011 SAP AG. All rights reserved. 6Confidential
Reasons for Data Volume Management
2000 2003 2007 2011
DB Size 0,5 0,8 4,5 9
DB Size - DVM 0,5 0,8 5,5 2
0
5
10
15
In T
err
aB
yte
DB Size *
2000 2003 2007 2011
Users 50 150 1500 3500
0
1000
2000
3000
4000
Nu
mb
er
of
use
rs
Number of Users
2000 2003 2007 2011
Average Response time
0,5 0,7 1,5 1,5
0
1
2seco
nd
sAverage Response time per Transaction
* Note: Database growth assumption of 70 GB
growth per month after Productive Going Live
Organize (e.g. reduce) the DB-Size and/or external
Storage System Space:
Could impact in increasing the overall system
performance
The average response time per transaction
could decrease (even if the total number of
system users are increasing)
The overall maintenance of the system will be
manageable
The overall TCO of the system will decrease
1. It is usually not that easy to add more disk
space in the cabinet every time you need to
expand your DB size
2. You cannot just install faster CPU’s to speed
up your performance
3. You cannot only shutdown some
components of the system landscape to
lower your TCO
© 2011 SAP AG. All rights reserved. 7Confidential
Elements in the Scope of a Data Volume Management
Project
PastPresent
Mid-termLong-term
Not Covered
Covered
Why? How? What? Who?
© 2011 SAP AG. All rights reserved. 9Confidential
Technical Operations in SAP Solution Manager 7.1Part of Application Lifecycle Management
Template Management Comparison & Adjustment for Template
Roll-in changes from projects
Change Control Management Enhanced Quality Gate Management for various activities
Enhanced process flexibility for Change Request Management
Improved mechanism for the change and transport backend
Configuration Validation and Change Analysis
Application Incident Management IT Service Management Processes
Highly configurable web-client user interface
Additional Service document functions
Solution Implementation Enhanced Business Blueprint
Implementing Business Functions
Integration with the service messages Business Process Operations Enhanced BPO Dashboards with Alert Inbox
Cross Database Comparison
Job Control and Schedule Management
Solution Documentation Enhanced Solution Documentation Assistant
Reverse Business Process Documentation and IBIS Content
integration
Upload interface to build an initial Business Blueprint structure
Maintenance Management Enhanced Maintenance Optimizer
System Recommendations
Test Management Enhancement to manage test phases efficiently
Test Automation Framework with 3rd party tools
Test Scope Identification & Optimization with BPCA
Upgrade Management Integration of Upgrade Dependency Analyzer
Enhanced Custom Code Lifecycle Management
Technical Operations New Infrastructure for Technical Monitoring and Alerting
Technical Administration
Technical Analytics
Enhanced Root Cause Analysis
Data Volume Management
Configuration Validation
© 2011 SAP AG. All rights reserved. 10Confidential
What is in scope of technical operations?
Infrastructure
Applications
Business
Processes
ABAP J2EE
Solutions
Business Processes
Business Process Steps
End-Users & Scenarios
Products & Product Instances
Interfaces & Jobs
Application Servers
Databases
Operating System
Physical & Virtual Hosts
Printers
Disks & Storage
Network
Te
ch
nic
al O
pera
tio
ns
Busin
ess
Pro
cess
Opera
tions
© 2011 SAP AG. All rights reserved. 11Confidential
Capabilities of technical operations
Technical Monitoring and
Alerting
One infrastructure for all monitoring and
alerting covering SAP & non-SAP
Root-cause Analysis
Analyize issues in heterogeneous
landscapes with one look-and-feel
Technical Administration
Optimize operation of your IT and
application landscape
Technical Analytics
From technical reporting to management
reporting, out-of-the-box and extendable
Change Diagnostic
Ensure that your landscape is configured
compliant to your policy and references
Data Volume Management
Manage and control data growth and data
reduction measures in your landscape
© 2011 SAP AG. All rights reserved. 12Confidential
The process behind technical operations…
Monitor
Proactive monitoring of data
distribution, growth rates and
saving potential
Optimize
Optimize storage costs
and data lifecycle
Analyze
Evaluate origin of data,
data quality, data reduction
possibilities
Notify
Reactive handling of
deviations from DVM
compliance
Report
Prove value to business
© 2011 SAP AG. All rights reserved. 13Confidential
Questions on the way to a global strategy…
Where do I start my investigation?
Which business object consums most data?
Which country does not stick to the global DVM policy?
How old is my data in the entire landscape?
Which application area shows biggest growth rates?
Is there any data in the system I have never used?
Which reduction options apply to my system landscape?
Are there any quick wins and synergies?
Which archiving object should I tackle first?
Which data is of critical importance for my daily business?
I am running already archiving programs – is the reduction as expected?
© 2011 SAP AG. All rights reserved.
© 2011 SAP AG. All rights reserved. 15Confidential
Data Volume ManagementWhich applications are provided…
Data Allocation Statistics• Understanding the data consumption of SAP Landscapes rather than single systems
• Application related views on data distribution (application area, document types, archiving objects…)
• Historical view on data size and growth rates
Table Utilization Analysis• Identify unused data as potential for data reduction
• Tackle most heavily accessed objects with DVM measures on an early stage
Time Based Distribution of Records• Automated calculation of ‘Age Footprint’ of SAP Applications
• Identification of application areas and document types ‘mature’ enough for reduction measures
• Detection of data quality issues
Best Practice Document Generation• Guided creation of best practice documents for selected objects
• Understanding the business background and possible data reduction measures
• Provides standardized data content analysis for technical blueprint
Data Volume Management Efficiency Reporting• Visualization of business growth rate compared to technical landscape growth
• Basis for decision making and planning of follow up activities
• Display of landscape wide achievements of measures taken
Calculation of Potential Savings• Simulation of saving potential for data deletion or archiving using SAP best practice values
• Revealing potential data volume management strategy gaps
© 2011 SAP AG. All rights reserved. 17Confidential
Data Allocation Statistics - Overview
Focus: Decision Making
Supports process of setting priorities for
upcoming DVM projects correctly
Visualization of biggest consumer’s of data
across landscapes and products
Helps in identification of reduction
measures beneficial for multiple systems
Enables multi-level analysis based on best-
practice data model and respective
hierarchy
Easy analysis and identification of trends
and exceptional growth rates
Enables historical views on highly
aggregated and very detailed technical
views
© 2011 SAP AG. All rights reserved. 18Confidential
Data Allocation Statistics – Hierarchical Views
• Showing space consumption with
different views, such as
• Product
• System
• Application Area
• Document Type
• Archiving Object
• Table
• Index
© 2011 SAP AG. All rights reserved. 19Confidential
Data Allocation Statistics – Summary Dashboards
Navigation AreaTime range Selection
Chart / Graphic Area
Technical Details
Dashboard Area &
View Selection
System Grouping
options (e.g. via
technical scenarios /
technical systems)
© 2011 SAP AG. All rights reserved. 20Confidential
Data Allocation Statistics – History View
Granularity of Data (e.g.
month / week)
Customizable selection
of time frame
© 2011 SAP AG. All rights reserved. 21Confidential
Data Allocation Statistics – Top Consumer Analyses
Focus on different key
figures (absolute, relative
growth rates)
Different analysis
dashboards available per
default
Available in all views
across the hierarchy
(products, systems,…)
© 2011 SAP AG. All rights reserved. 22Confidential
Data Allocation Statistics – Archiving Object Views
• Analyses of complex archiving
objects across a landscape (*)
• Space consumption
calculation based on
archiving object
• Easy identification of
synergies
• Detection of missmatch
between systems (or gaps in
global concept)
(*) Analysis programs are to be configured and scheduled on each system
Portion of Archiving
Object on System Level
Distribution of
Landscape Size per
Archiving Object
© 2011 SAP AG. All rights reserved. 23Confidential
Data Allocation Statistics – Deviations Analysis
• Automated identification
of objects showing
exceptional size / growth
rates (e.g. compared to
last three months)
• Reveals potential issues
long before they become
critical (early warning
system)
• Gives enough time for
root cause analysis of
abnormal growth rates
© 2011 SAP AG. All rights reserved. 24Confidential
Data Allocation Statistics – Technical Classification
• Classification of data:
• Master data
• Transactional data
• System data
• Customizing data
• BW related data
© 2011 SAP AG. All rights reserved. 26Confidential
Table Utilization Statistics- Overview
Focus: Business Relevance
Extraction of all DB related activities for
tables (read, insert, update, delete)
Visualization of objects with highest
execution frequency
Easy identification of objects of most
important business contribution to be
covered in a global DVM Strategy
Focus: ‘Waste Detection’
Long term evaluation of objects which
show no indication of being used
Detection of old data which is not required
anymore (migrated data, obsolete business
functions)
© 2011 SAP AG. All rights reserved. 27Confidential
Table Utilization Statistics- Summary Dashboards
Granularity of Data (e.g.
month / week / day)
Direct access to different
preconfigured
dashboards
Toggle for display of
specific key figures only
Details about all DB
operations (read,
change, delete
operations etc.)
© 2011 SAP AG. All rights reserved. 28Confidential
Table Utilization Statistics- Top Used Dashboards
© 2011 SAP AG. All rights reserved. 29Confidential
Table Utilization Statistics- Not Accessed Data
Selected data object
level (e.g. document
type)
Timeframe for Analysis
Related Size of unused
data objects
(potentially to be deleted)
System specific
contribution
© 2011 SAP AG. All rights reserved. 31Confidential
Time Based Data Distribution - Overview
Focus: Decision Making
Understand the ‘Age Footprint’ of your
system landscape
Identify areas of ‘mature’ data as a
prerequisite for archiving or deletion
discussions
Reveal lacks in data quality (e.g. data old
enough for archiving, but still in the
system)
© 2011 SAP AG. All rights reserved. 32Confidential
Time Based Data Distribution - Dashboards
Granularity of Data (e.g.
month / week / day)
Level of Details
(Year -> Month)
Details about all DB
operations (read,
change, delete
operations etc.)
© 2011 SAP AG. All rights reserved. 33Confidential
Time Based Data Distribution - Dashboards
• System overview enables the
identification of systems relevant for
the scope of a planned DVM project
• High level indications for first
discussions on global residence
time definitions
Details on document type level
help to involve all related
stakeholders for follow up
planning
Valuable input for starting
deeper analysis on saving
potential
© 2011 SAP AG. All rights reserved. 35Confidential
Best Practice Document Generation - Overview
Focus: Technical Blueprint
Collects all necessary background
information for the selected objects
(such as application/process assignment,
business background, related tables)
Identify linkage between selected object
and related and dependent tables
Reveal all possible data reduction
possibilities (deletion / summarization /
avoidance / archiving)
Automatic analysis and detection of most
relevant archiving / deletion object
Calculates a saving potential for selected
objects (if applicable) based on given SAP
Best Practice residence times
© 2011 SAP AG. All rights reserved. 36Confidential
Best Practice Document Generation – Guided Preparation
In order to start a self
service nearly no
technical knowledge is
required
A step-by-step process
flow helps to run any
kind of analysis
Various options help to
focus on the objects
which require a deeper
analysis
© 2011 SAP AG. All rights reserved. 37Confidential
Best Practice Document Generation – Service Session
The left side of the session
contains the check tree
structure. Intention is to
perform each step in the
sequence they are
presented, start at the top.
This sections gives you
the purpose of the check
plus the instructions how
to perform it
Depending on the object
chosen the relevant DVM
methodologies are
presented dynamically.
This is the working area,
where you perform the
actions outlined in the
instruction pane above.
© 2011 SAP AG. All rights reserved. 38Confidential
Best Practice Document - Detailed Analysis of an Object
A standard analysis shows the time based distribution of data. More complex analyses can even
show the status of the data, avoidable, deletable, archivable or not. Different tabs present data
from individual tables or combinations of tables.
© 2011 SAP AG. All rights reserved. 39Confidential
Best Practice Document – Report (Contents)
Depending on the objects chosen in the
session, the resulting report reflects the
checks performed.
© 2011 SAP AG. All rights reserved. 40Confidential
Best Practice Document – Report(Business Background & Data Reduction Measures)
Based on the relevant DVM methodology, a
separate chapter is delivered through the
best practice report.
© 2011 SAP AG. All rights reserved. 41Confidential
Best Practice Document – Report(Archiving Information & Saving Potential)
The automated evaluation and
calculation of the reduction
potential based on best
practice.
© 2011 SAP AG. All rights reserved. 43Confidential
Calculation of Potential Savings - Overview
Focus: Input for Discussion with
Business Owners
Provides an environment to visualize the
effect of archiving (what-if prediction)
Simulation of different residence times
possible (aggressive – moderate -
customer specific)
Reveal all possible data reduction
possibilities (deletion / summarization /
avoidance / archiving)
Automatic analysis and detection of most
relevant archiving / deletion object
Calculates a saving potential for selected
objects (if applicable) based on given SAP
Best Practice residence times
© 2011 SAP AG. All rights reserved. 44Confidential
Calculation of Potential Savings - Dashboards
Easy Identification of
areas for improvement
Can be used for decision
making or quality
checking for archiving
© 2011 SAP AG. All rights reserved. 47Confidential
Archiving Information (Statistics) - Overview
Focus: Monitoring of Archiving Progress
Monitoring of archiving and related deletion
activities
Global landscape wide reporting about
technical achievements in terms of
archiving statistics
Identification of areas which are not
following global DVM standards and
guidelines
Input for cross checking if archiving
activities match with forecasted values
Easy prediction of ‘where would we end up
if no archiving would have taken place’
© 2011 SAP AG. All rights reserved. 48Confidential
Archiving Information (Statistics) - Dashboards
Easy Identification of
areas for improvement
Can be used for decision
making or quality
checking for archiving
© 2011 SAP AG. All rights reserved. 49Confidential
Archiving Information (Statistics) - Dashboards
• Flow charts show the progress of activities and
achievements (e.g. archived and deleted data)
• Trends and missmatches can easily been
identified to intensify DVM measures
© 2011 SAP AG. All rights reserved. 51Confidential
Efficiency & Benefit Reporting - Overview
Introduction of Management KPI
Focus: Decision Making
High level KPI for IT Management
Supports scope definition of a DVM project
Determination of business growth rate
Calculation landscape’s growth rate
Easy detection of mismatch
Focus: Improvement Measurement
Trend Analysis for IT Management and
Project Team
Monitoring of improvements achieved by
various DVM measures
Visualization of benefits and efficiency of
current strategy
© 2011 SAP AG. All rights reserved. 52Confidential
Efficiency & Benefit Reporting – Management Dashboards
DVM KPI Dashboard
(Is my DVM process running well?)
• High level management / project lead
dashboard
• Introducing DVM KPI (derived from SUGEN)
• Provides simple view on ‚Quality‘ of DVM
Business Volume <-> Technical Growth
(Is my technical growth in sync with
business growth?)
Provides insights into the business volume
and related landscape growth
Enables the identification of mis-matches
and planning of follow-up actions
© 2011 SAP AG. All rights reserved. 53Confidential
Time Based Data Distribution - Dashboards
Business Volume related
calculation can be enhanced
with customer defined tables to
be considered
Configured
Management
Dashboards
Automated KPI
measurement per month
Available measurement
time range
© 2011 SAP AG. All rights reserved. 54Confidential
Time Based Data Distribution - Dashboards
Detailed Statistics &
History for DVM KPI
Business growth rate
compared to technical
system growth
Business growth rate
compared to technical
system growth
© 2011 SAP AG. All rights reserved. 56Confidential
Configuration Procedure - Overview
Introduction of Guided Procedures
Focus: Reduced effort in Installation and
Configuration
New scenario established in SAP Solution
Manager Configuration -> Data Volume
Management
Enables mass configuration of systems
Most administration and configuration
tasks fully automated e.g.
– Activation of BI Content
– Prerequisite checking for all systems in scope
– Activation of extractors
– Downloading and applying of latest DVM
content
Execution of Self Services
© 2011 SAP AG. All rights reserved. 57Confidential
Configuration Procedure - Example
For the whole setup of the
technical infrastructure five
simple steps are to be
performed
Each step provides an
embedded documentation
about the purpose of each
steps and its related
activities
All well defined systems
known to SAP Solution
Manager are offered for a
mass setup of the DVM
environment