12
Change Request Management  ALM Solution Management May, 2012 Usage & Configuration of Downgrade Prote

Charm Down Grade Protection

Embed Size (px)

DESCRIPTION

chaRM

Citation preview

  • Change Request Management

    ALM Solution Management

    May, 2012

    Usage & Configuration of Downgrade Protection

  • 2012 SAP AG. All rights reserved. 2 RKT

    Downgrade Protection - Introduction

    Downgrade Protection functionalities help you to increase consistency throughout your

    system landscape by identifying parallel developments on same objects or customizing

    settings.

    It helps you to minimize the risk for downgrades by providing new checks on top of the existing

    Cross System Object Lock functionalities.

    Developers and Administrators will receive warning messages or errors, depending on the

    configuration of the downgrade protection settings.

    If conflicts are detected, the related transport management activity will be canceled by default to proceed it is required to specifically tell the system to ignore those conflicts.

  • 2012 SAP AG. All rights reserved. 3 RKT

    Downgrade Protection and Risk Mitigation

    Multiple Downgrade Checks

    At Change Recording

    Before Export

    When Reassigning Change

    Before Import

    Receive warnings before creating potential downgrade situations

    or creating a real downgrade

  • 2012 SAP AG. All rights reserved. 4 RKT

    How to use it?

    Conflicts that have been found will be reported in the Downgrade Protection Assignment Block.

    The Assignment Block is visible on all transport related Change Documents, and the Change

    Cycle document.

    Conflicts that have been detected need to be ignored, to proceed with the transport related

    action. By default the transport action will be canceled if there is at least one open conflict. It is

    possible to ignore conflicts for certain systems / system-roles / projects by default this is part of the configuration and customizing.

  • 2012 SAP AG. All rights reserved. 5 RKT

    Assignment Block Overview

    Check details of a conflict

    Ignore conflict

    Conflicting

    Object Number of Transport

    Object-Conflicts

    Conflict status

    (open or ignored)

    Confirmation

    Popup when

    ignoring

    conflicts

    Conflict status

    (open or ignored)

    Show all conflicts, including conflicts that have

    been ignored due to configuration

  • 2012 SAP AG. All rights reserved. 6 RKT

    Conflict Details

    Status and Type of

    Conflict

    Conflict Details:

    Transport, Object,

    Table

    Hint for risk of

    conflict

    Checked object Further

    Information

    about Conflict

    Responsible

    Persons

  • 2012 SAP AG. All rights reserved. 7 RKT

    Activation of Downgrade Protection

    Downgrade Protection (DGP) is connected to the Cross System Object Lock functionalities in

    SAP Solution Manager you need to activate both: CSOL and DGP.

    The customizing settings can be found in IMG (Transaction SPRO) of SAP Solution Manager.

    Follow this path:

    SAP Solution Manager Capabilities (Optional) Change Management Extended Configuration Cross System Object Lock and Downgrade Protection Configure and Activate Cross-System Object Lock

  • 2012 SAP AG. All rights reserved. 8 RKT

    Configuration of Downgrade Protection

    Once the general activation of CSOL and DGP has been made, the detailed customizing

    settings can be found in IMG (Transaction SPRO) of SAP Solution Manager. Follow this path:

    SAP Solution Manager Capabilities (Optional) Change Management Extended Configuration Cross System Object Lock and Downgrade Protection Configure Downgrade Protection

  • 2012 SAP AG. All rights reserved. 9 RKT

    Customizing 1) Conflict Types

    There are four different types of downgrade checks:

    Release check, Reassign check, Predecessor check,

    Imminent check

    Release check and reassign check are release

    checks, whereas predecessor check and imminent

    check are import checks. Imminent downgrade

    would mean to actively create a downgrade, by

    continuing with the import.

    The checks are either triggered automatically when releasing transport requests, importing a transport or decoupling a transport, and

    when reassigning a change document, or they can be triggered manually. For each check type, you can configure the conflict criticality

    and an icon, so you can classify the criticality of this check type as: Warning, Critical and Very Critical

    Example: If you set the conflict type for the release check to Warning and assign the warning icon, the system displays a conflict that is found when releasing a transport request as a warning and shows the yellow warning icon.

    Note: There can only be one configuration record for each check type. The default configuration contains recommended values.

  • 2012 SAP AG. All rights reserved. 10 RKT

    Customizing 2) System Types (Exception List)

    Caution: Incorrect settings in this table will result in malfunction of the downgrade protection mechanism, and endanger the

    consistency of your system landscape.

    Downgrade protection performs its checks in relation to the Change Request Management system landscape of the

    project. For example, in a development system you can create and release transport requests. When releasing a

    transport request, the release check is performed in the development system. The quality assurance system, pre-

    production system or production system also accepts imports, so the two downgrade protection checks (predecessor

    and imminent downgrade checks) are also performed in those target systems.

    All conflicts found in a check are shown in the Downgrade Protection assignment block in the WebClient UI. The user

    can then either ignore the conflicts, or try to resolve them manually (for example, by importing a dependent transport

    in advance).

    If the release check or the import check find new conflicts, or other conflicts in status Open that are not ignored, the release or the import will be canceled.

  • 2012 SAP AG. All rights reserved. 11 RKT

    Customizing 2) System Types (Exception List)

    In this activity, you can configure which system,

    system role, project or conflict type automatically

    bypasses the release check or import check, even

    when conflicts are found. The level of conflict types,

    from low to high, is:

    Warning,

    Critical,

    Very Critical

    Example:

    Record in Customizing table: AB1, 200, T, *, Import, Critical

    Behavior: Import to AB1:200 will always be allowed by downgrade protection, if the conflict type is lower than Critical and the system role in the project is T (by default the Quality Assurance system). This applies to all projects (*). If a record specifies a project ID, the record will be effective only for that project.

    Note: By default, the table is empty, for security reasons, so all conflicts will result in the cancelation of the corresponding

    action.

  • 2012 SAP AG. All rights reserved. 12 RKT

    No part of this publication may be reproduced or transmitted in any form or for any purpose without the express

    permission of SAP AG. The information contained herein may be changed without prior notice.

    Some software products marketed by SAP AG and its distributors contain proprietary software components of

    other software vendors.

    Microsoft, Windows, Excel, Outlook, PowerPoint, Silverlight, and Visual Studio are registered trademarks of

    Microsoft Corporation.

    IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System

    z10, z10, z/VM, z/OS, OS/390, zEnterprise, PowerVM, Power Architecture, Power Systems, POWER7,

    POWER6+, POWER6, POWER, PowerHA, pureScale, PowerPC, BladeCenter, System Storage, Storwize,

    XIV, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, AIX, Intelligent Miner, WebSphere,

    Tivoli, Informix, and Smarter Planet are trademarks or registered trademarks of IBM Corporation.

    Linux is the registered trademark of Linus Torvalds in the United States and other countries.

    Adobe, the Adobe logo, Acrobat, PostScript, and Reader are trademarks or registered trademarks of Adobe

    Systems Incorporated in the United States and other countries.

    Oracle and Java are registered trademarks of Oracle and its affiliates.

    UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.

    Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or

    registered trademarks of Citrix Systems Inc.

    HTML, XML, XHTML, and W3C are trademarks or registered trademarks of W3C, World Wide Web

    Consortium, Massachusetts Institute of Technology.

    Apple, App Store, iBooks, iPad, iPhone, iPhoto, iPod, iTunes, Multi-Touch, Objective-C, Retina, Safari, Siri,

    and Xcode are trademarks or registered trademarks of Apple Inc.

    IOS is a registered trademark of Cisco Systems Inc.

    RIM, BlackBerry, BBM, BlackBerry Curve, BlackBerry Bold, BlackBerry Pearl, BlackBerry Torch, BlackBerry

    Storm, BlackBerry Storm2, BlackBerry PlayBook, and BlackBerry App World are trademarks or registered

    trademarks of Research in Motion Limited.

    2012 SAP AG. All rights reserved.

    Google App Engine, Google Apps, Google Checkout, Google Data API, Google Maps, Google Mobile Ads,

    Google Mobile Updater, Google Mobile, Google Store, Google Sync, Google Updater, Google Voice,

    Google Mail, Gmail, YouTube, Dalvik and Android are trademarks or registered trademarks of Google Inc.

    INTERMEC is a registered trademark of Intermec Technologies Corporation.

    Wi-Fi is a registered trademark of Wi-Fi Alliance.

    Bluetooth is a registered trademark of Bluetooth SIG Inc.

    Motorola is a registered trademark of Motorola Trademark Holdings LLC.

    Computop is a registered trademark of Computop Wirtschaftsinformatik GmbH.

    SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork,

    SAP HANA, and other SAP products and services mentioned herein as well as their respective logos are

    trademarks or registered trademarks of SAP AG in Germany and other countries.

    Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web

    Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their

    respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects

    is an SAP company.

    Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services

    mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase Inc.

    Sybase is an SAP company.

    Crossgate, m@gic EDDY, B2B 360, and B2B 360 Services are registered trademarks of Crossgate AG in Germany and other countries. Crossgate is an SAP company.

    All other product and service names mentioned are the trademarks of their respective companies. Data

    contained in this document serves informational purposes only. National product specifications may vary.

    The information in this document is proprietary to SAP. No part of this document may be reproduced, copied,

    or transmitted in any form or for any purpose without the express prior written permission of SAP AG.