SAP ASE Cockpit en
SAP ASE Cockpit en
5 Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
5.1 Managing Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Enabling Granular Permissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.2 SAP ASE Cockpit User Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Disabling and Enabling a User in SAP ASE Cockpit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Deleting a User in SAP ASE Cockpit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Defining an Email Address in SAP ASE Cockpit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Updating User Information in SAP ASE Cockpit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
5.3 Changing the uafadmin or sccadmin Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Encrypting a Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.4 Role Assignment in SAP ASE Cockpit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
5.5 Encrypted Authentication for SAP ASE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.6 Manage Encryption Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Dual Control and Split Knowledge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Creating a System Encryption Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Modifying a System Encryption Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Creating a Master Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Master Key Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Modifying a Master Key Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Creating a Column Encryption Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Column Encryption Keys Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Creating a Key Copy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Modifying a Column Encryption Key Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Creating a Database Encryption Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Database Encryption Keys Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Granting Encryption Permissions to a Role, User, or Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
This guide describes the SAP Adaptive Server Enterprise cockpit, a Web-based tool which provides availability
monitoring, historical performance monitoring, and administration capabilities for SAP ASE servers.
SAP Adaptive Server Enterprise cockpit (SAP ASE cockpit) is a Web-based tool for monitoring the status and
availability of SAP ASE servers. SAP ASE cockpit supports SAP ASE version 16.0 SP02.
SAP ASE cockpit provides availability monitoring, historical performance monitoring, and administration
capabilities in a scalable Web application. It offers management of alerts that provide state- and threshold-
based notifications about availability and performance in real time, and intelligent tools for spotting
performance and usage trends, all via a thin-client, rich Internet application delivered through your Web
browser.
Use the SAP ASE cockpit to track various performance metrics and gather statistics that over time will give you
powerful insight into patterns of use and the behavior of databases, devices, caches, and processes on your
servers. You can display collected data as tables or graphs. By plotting results over any period of time you
choose, from a minute to a year, you can both see the big picture and focus on the particulars. Detailed
knowledge of how your servers have performed in the past helps you ensure that SAP ASE meets your needs in
the future.
The SAP ASE Cockpit 16.0 SP02 release offers new and enhanced features.
Feature Topics
SAP ASE Cockpit is a new graphical administration tool for on- User Interface Overview [page 17]
board management and monitoring of SAP ASE. SAP ASE Cockpit
provides availability monitoring, historical monitoring, and real-
time monitoring in a scalable Web application. It offers real-time
alerts for availability, performance, and capacity issues, and intelli
gent tools for spotting performance and usage trends. Availability,
performance, and capacity alerts are configured and enabled by
default.
SAP ASE workload analyzer option – enables the capture and re Monitor Captured Workloads [page 438]
play of a production workload nondisruptively and uses it to diag
nose problems and understand and manage configuration
changes proactively. Analytics-based recommendations allow da
tabase administrators to improve performance, tune their sys
tems, and improve productivity.
Disaster Recovery – a system that consists of two servers: a pri Disaster Recovery [page 295]
mary on which all transaction processing takes place, and a com
panion that act as warm or hot standbys for the primary server
and contain copies of designated databases from the primary
server. Replication Server synchronizes the databases between
the primary and standby servers. Unplanned failover is managed
by the fault manager, which monitors the health of the HADR com
ponents.
The HADR dashboard displays the state and the health of the
HADR system, including charting the HADR-related alerts.
Data Store Access Management – provides a mean for customers Data Partitions with Data Store Access Management
to display and manage the physical storage of their data, offering a [page 417]
comprehensive means of managing the data’s physical character
istics. We offer tools and automation that permit database admin
istrators to move data between various classes of physical storage,
and to change the compression level of the stored data, in order to
achieve an optimal balance between storage cost and access
speed. DSAM provides below benefits to user:
Alerts – are configured by default, and are not required to be set Alerts in SAP ASE [page 145]
manually as in previous releases. Alerts are categorized into three
key performance areas (KPAs): availability, performance, and ca
pacity. Each KPA is composed of several key performance indica
tors (KPIs) whose data is collected at defined intervals. A KPI trig
gers an alert when it enters a predefined state or exceeds a thresh
old.
Important elements of the SAP ASE Cockpit user interfaced referenced in other help topics.
Note
Sorting is case-sensitive. A descending sort lists numbers, then uppercase, then lowercase.
Column Options
On the MONITOR and EXPLORE tabs, for data displayed in grid format, you can rearrange and sort columns.
Simple sorts Click a column name to sort based on that column in ascending or descending
order. The arrow in the sort tab (right of column name) indicates the sort order.
Reversing sort order Click a column sort tab to reverse the sort order.
Nesting sorts Click a column name to perform the primary sort. For subsidiary sorts, click the
column sort tab (not the column name). Choose subsidiary sort columns in the
order you want to apply them. After you click a sort tab, it displays its sorting
level (1 for the primary sort, 2 for the secondary sort, and so on). Click any col
umn name to clear the nested sort.
Columns retain their sort order until you exit SAP ASE Cockpit.
The figure below shows a list of tables that are sorted first by the database. Within the database sort, the tables
are sorted by owner; and within owner, sorted by name. All three columns sort in descending order.
Filter by Column
There is a filtering field at the top of each column to narrow the range of objects displayed. Delete the filtering
terms to return to the original display. Filtering terms are not case-sensitive. For example:
● Enter the name of a database at the top of the Database column to display only the tables included in that
database. The display reacts as you enter each character, so you might not need to enter the entire name.
● Enter text at the top of the Name column to filter tables names that start with the specified text and that
reside in the specified database.
Some areas on a page include a minimize or maximize icon in the upper-right corner ( ). Click the icon to
expand that area to its maximum size. Click the icon again to restore the area to its former size.
Once you maximize an area, the maximized state is retained, even when changing tabs, until you exit SAP ASE
Cockpit.
The font change applies to the SAP ASE Cockpit interface, and persists even after your exit SAP ASE Cockpit.
Shortcut key sequences available for the SAP ASE Cockpit Web interface.
Space bar ● Opens and closes the list after you press the Tab to navigate to a menu item or
a button with a drop down list.
● Expands and collapses a node in the left pane.
● In a wizard or property window, selects or deselects the item after you navigate
to a check box.
● In a wizard or dialog box, applies the highlighted button (for example, Yes, No,
Back, Next, Apply, Finish, or Cancel).
Arrow keys ● Highlight the next item in a list or menu in the indicated direction.
● Highlight the next radio button in a list in the indicated direction.
● In the left pane, left and right arrows expand and collapse a node.
● In a table with column searching, with the cursor positioned in the first row:
○ Press up arrow twice to access the column search row.
○ Press left or right arrow to move between columns.
○ Press down arrow twice to exit the column search row and return to the
list.
Tab ● Highlights the next item in the tab order. (Tab order progresses through the ac
cessible fields in a left-to-right, top-to-bottom fashion, starting at the upper
left.)
● In a two-pane window, moves to the next pane.
● In a window that includes a table or grid display, Tab twice highlights the table.
Press down arrow to enter it.
Shift-Tab ● Highlights the previous item in the tab order. (Tab order progresses through the
accessible fields in a bottom-to-top, right-to-left, fashion, starting at the bottom
right.)
● In a two-pane window, moves to the previous pane.
Home ● Highlights the first item in the active window (or the active section of a window).
For example, the first row in a list.
● In the left pane, highlights the first node.
End ● Highlights the last item in the active window (or the active section of a window).
For example, the last row in a list.
● In the left pane, highlights the last node.
Ctrl-Alt + Increases the size of displayed text. Change persists to future sessions.
Ctrl-Alt - Decreases the size of displayed text. Change persists to future sessions.
F11 (Internet Explorer only) Enables or disables the browser’s full-screen mode.
View a list of components installed in SAP ASE Cockpit and their versions.
Context
Check the versions of the components in your SAP ASE Cockpit installation to determine whether your
installation is up to date. Refer to online release information for the specific supported product component
versions.
Procedure
For the most current information about Adobe Flex keyboard shortcuts, see http://livedocs.adobe.com/flex/3/
html/help.html?content=accessible_5.html .
Start and configure the SAP ASE Cockpit server and launch the SAP ASE Cockpit console.
SAP ASE cockpit is licensed free of charge to customers who have a paid license for SAP ASE.
For detailed installation information, see theInstallation Guide for SAP Adaptive Server Enterprise
documentation.
You can start SAP ASE Cockpit server manually, or set the service to start automatically and to restart in case
of failure.
If you elect to run the SAP ASE Cockpit server manually, you must issue a command every time you want to
start or shut down the server. If you elect to run as a service (recommended), you can configure the service to
start and restart automatically.
Installation of SAP ASE Cockpit prompts you for your preferred method.
Regardless of the start method used, wait at least five minutes after startup to log in to the SAP ASE Cockpit
console. Startup triggers automatic discovery, technical user verification, and collection jobs. Competing with
these processes may cause unexpected behavior.
When you run SAP ASE Cockpit server manually, issue a command every time you start or shut down.
Prerequisites
Ensure that your home directory—that is, the home directory of the user who starts SAP ASE Cockpit—is
writable from the SAP ASE Cockpit host. If the starting user cannot write to the home directory, SAP ASE
Context
Note
If you are starting SAP ASE Cockpit server for the first time in Windows 2008, Windows 7, or Windows 8,
use the Run as Administrator option so that SAP ASE Cockpit can register its ODBC driver. (This is
necessary even if you are logged in as an administrator.)
Procedure
%SYBASE%\COCKPIT-4\bin\cockpit.bat
shutdown
Caution
Do not enter shutdown at a Windows prompt; it shuts down the operating system.
Related Information
When you run SAP ASE Cockpit server manually, issue a command every time you start or shut down.
Prerequisites
Ensure that your home directory—that is, the home directory of the user who starts SAP ASE Cockpit—is
writable from the SAP ASE Cockpit host. If the starting user cannot write to the home directory, SAP ASE
Cockpit logs an error and fails to launch. Resetting the user’s HOME environment variable to a writable
directory does not solve the problem.
Context
You can start the SAP ASE Cockpit server in the foreground or background. When you run SAP ASE Cockpit
server in the background, you can use nohup, &, and > to redirect output and system error to a file, and
suppress the SAP ASE Cockpit server console.
Procedure
Bourne shell:
. SYBASE.sh
C shell:
source SYBASE.csh
Option Description
In the back Execute a command similar to the sample below that matches your shell. The sample command di
ground rects output to the file cockpit-console.out. If the output file already exists, you might need
to use additional shell operators to append to or truncate the file.Check the which shell is used:
echo $SHELL
C shell
Option Description
Caution
Do not enter shutdown at a UNIX prompt; it shuts down the operating system.
Related Information
You can set the service to start automatically and to restart in case of failure. SAP recommends running SAP
ASE Cockpit as a service.
Prerequisites
Ensure that your home directory—that is, the home directory of the user who starts SAP ASE Cockpit—is
writable from the SAP ASE Cockpit host. If the starting user cannot write to the home directory, SAP ASE
Context
If you run SAP ASE Cockpit server as a service, you can still manually start and stop the service, as needed. By
default, if you install SAP ASE Cockpit to run as a service, the service is configured to automatically start, but
not automatically restart. You must configure this manually.
Procedure
Option Description
At a Execute:
com
mand net start "Cockpit 4.0"
line
The Cockpit 4.0 service is starting...... The Cockpit 4.0 service was
started successfully.
Option Description
You can set the service to start automatically and to restart in case of failure. SAP recommends running SAP
ASE Cockpit as a service.
Prerequisites
Ensure that your home directory—that is, the home directory of the user who starts SAP ASE Cockpit—is
writable from the SAP ASE Cockpit host. If the starting user cannot write to the home directory, SAP ASE
Cockpit logs an error and fails to launch. Resetting the user’s HOME environment variable to a writable
directory does not solve the problem.
Context
A UNIX service is a daemon process that starts automatically after the machine is started and runs in the
background. UNIX installations of SAP ASE Cockpit server include a shell script, cockpitd, which you can use
to configure the SAP ASE Cockpit service. (Some UNIX platforms supply tools that make service configuration
easier; Linux chkconfig is an example.)
Note
SAP recommends that if you are not familiar with setting up services in UNIX, you delegate this task to a
system administrator or consult the system administration documentation for your UNIX platform.
Procedure
SCRIPT_NAME=cockpit.sh
to:
You can test the cockpitd script with /usr/sbin/service cockpitd status. (The service
command accepts these options: start | stop | status | restart.)
3. Use the S90cockpitd and K10cockpitd links to test starting and stopping the service. The links are
called automatically when the machine is started or shut down.
Use cockpit.bat (Windows) or cockpit.sh (UNIX) to manually start and stop SAP ASE Cockpit servers and
to perform administrative tasks like configuring ports and enabling and disabling services.
A single cockpit server can manage other SAP database products if they reside on the same host. The cockpit
server shares ports and other resources, and the cockpit command enables all installed plugins.
Use the instance command to manage multiple server instances from the same Cockpit installation
directory. See Shared Disk Mode.
Syntax
Parameters
-a | --address <RMI-service-address>
the address for the RMI service to use; must be an IP address on this machine or the
name of this machine (which is the default).
-b | --bitwidth
returns an informational only string identifying the bit width (32 or 64) of the
underlying platform. If you use this option, the cockpit command does not start the
SAP ASE Cockpit.
-I | --info [<information-category>]
display the specified categories of information about SAP ASE Cockpit. Separate each
category from the next with a comma. The information categories are:
all returns all the information provided by the sys, ports, and services
categories. Default option.
sys returns general information about this instance of SAP ASE Cockpit,
including the version, the home (installation) directory, the host machine’s
name and IP address, the RMI port number, the messaging level, and details
about the platform and Java installation.
ports lists all the ports on which the SAP ASE Cockpit and its services listen,
indicates whether each port is in use, and shows the service running on each
port.
services lists all the services known to the SAP ASE Cockpit, indicates whether each
service is enabled, and lists other services on which each service depends.
sysprop lists all the Java system properties known to the Java VM and their values.
-instance [<instance-name>]
use with other options (-start and -stop, for example) to specify an instance in a
shared disk deployment. If you do not enter a name for the instance, it defaults to the
host name.
-m | --message <message-level>
set the amount of detail recorded in system logs; also known as the logging level. Valid
values are OFF, FATAL, ERROR, WARN, INFO, DEBUG, and ALL. WARN is the default.
-password | --password
Port Default
Name Description Service Names Property Names Port
Messaging messaging.db.port
Alert alert.database.port
You can also execute cockpit --info ports to display service names and
associated property names; they appear in the first two columns of the output.
-start | --start
start the SAP ASE Cockpit. This is the default option—if you execute cockpit with no
options, it starts the SAP ASE Cockpit. This option cannot be combined in the same
command with options that set ports or enable or disable services; use a separate
cockpit command to start the SAP ASE Cockpit.
-status | --status
display a status message indicating whether the SAP ASE Cockpit is running.
-stop | --stop
shut down the SAP ASE Cockpit if it is running.
-user | --user [<login-name>]
Examples
each of these commands sets the RMI port to 5992. The first command demonstrates the port name
syntax; the second demonstrates the service name:property name syntax:
these commands set the RMI port to 9996, then start the SAP ASE Cockpit. Two commands (separated by
a semicolon here) are needed because cockpit does not start the SAP ASE Cockpit when the command
includes any of the port-setting options:
this command sets all three of the repository database ports (data server, messaging, and database alert)
to 3638:
the first cockpit command enables the TDS service; the second starts the SAP ASE Cockpit. (The two
commands are separated by a semicolon.) The second command is needed because cockpit does not
start SAP ASE Cockpit when the command includes the -enable option:
this command starts the SAP ASE Cockpit instance called kalamazoo. -start is optional because it is the
default:
None required.
Related Information
Starting and Stopping the SAP ASE Cockpit Server in Windows [page 22]
Starting and Stopping the SAP ASE Cockpit Server in UNIX [page 24]
Prerequisites
● Adobe Flash Player is installed in the browser you are using for SAP ASE Cockpit.
● The SAP ASE Cockpit server is running. See cockpit Command [page 28]
Procedure
https://<hostname>:4283/cockpit
Note
Port 4283 is the default port. If you specified a different port during installation, substitute the custom
port number. To verify the defined port, type info -p in the console window on the SAP ASE Cockpit
server.
2. At the login prompt, select the system to manage and enter a valid SAP ASE user name (such as sa) and
password, as SAP ASE authentication is used for SAP ASE Cockpit login.
Click Log Out in the upper-right corner of the window to end the session.
Context
If an administrator has configured the automatic logout feature, SAP ASE Cockpit logs you out if your session is
idle (no typing or mouse movement) for longer than the timeout period.
● A login session left open on a screen that refreshes (a monitor screen or a data collection job screen, for
example) remains open indefinitely.
● A login session left open on a screen that does not change expires after 30 minutes. The next time you
make a request of the server, SAP ASE Cockpit logs you out.
Register and authenticate the SAP ASE Cockpit agent for a managed server.
Context
The SAP ASE Cockpit agent runs on a managed server and is installed automatically as part of the SAP ASE
server.
To perform certain administrative tasks, including starting and stopping an SAP ASE server, and adding
secondary nodes, you must register and authenticate the server’s SAP ASE Cockpit agent.
Procedure
Next Steps
For instructions on changing the password for the agent’s default uafadmin account, see Changing the
uafadmin Password
Related Information
Display read-only connection information for the SAP ASE Cockpit agent.
Procedure
Port number Port number on the host machine the agent is running. Default is 4992.
User name User name for authentication of the agent. Default is <uafadmin>.
Property Description
Server name The name of the SAP ASE server with which the agent is associated.
Status Status of the SAP ASE Cockpit Agent: Running, Stopped, Unknown.
The Cockpit Technical User account is a dedicated login used for creating and scheduling collection jobs,
monitoring, and triggering alerts.
Note
You can create a technical user from SAP ASE Cockpit under the following scenarios:
● The creation of the technical user failed during the installation process.
● You are provided a private SAP ASE Cockpit build. In this case, you will need to override the original
ASEMAP directory which will remove the technical user account that was created during the installation of
SAP ASE.
You can update the Cockpit Technical User account from SAP ASE Cockpit which will re-create the schedule
jobs for the managed resource.
Note
Do not use the technical user account to log in to SAP ASE Cockpit. The technical user account should only
be used for creating and scheduling collections, monitoring, and triggering alerts.
Prerequisites
The technical user is created during installation of each SAP ASE system. You can create a technical user from
SAP ASE Cockpit if the creation of the technical user failed during the installation process, or you have installed
a private SAP ASE Cockpit build.
Procedure
SAP ASE Cockpit uses SAP ASE authentication, but also includes predefined login accounts and roles.
A login account identifies a user who can connect to SAP ASE Cockpit. Because SAP ASE Cockpit uses SAP
ASE authentication, any user can log in.
SAP ASE Cockpit comes with predefined login accounts which can only be used to authenticate against the
SAP ASE Cockpit Agent. Do not use these user accounts to log in to the SAP ASE Cockpit.
A role is a predefined profile that can be assigned to a login account or a group. Roles control the access rights
for login accounts. Because the SAP ASE authentication mechanism is used for SAP ASE Cockpit login, SAP
ASE roles are used for restricting access to various administration and monitoring capabilities in SAP ASE
Note
These additional options are over and above the minimum configuration described in Get Started with SAP
ASE Cockpit.
Specify the e-mail server for SAP ASE Cockpit to send alert notifications.
Prerequisites
Procedure
If you have multiple SAP ASE Cockpit servers, configure their sender names so you can identify
which SAP ASE Cockpit an alert is coming from. For example, Cockpit_Boston or
Cockpit_test11.
c. If you entered anything in the E-mail Domain name or E-mail sender name fields, click Apply to make
the test e-mail option reappear.
d. To dispatch a test message, enter an e-mail address in the Test e-mail address field and click Send.
If the test e-mail is received, you have properly configured the server for e-mail alert notifications.
8. Click OK to update any changes and close the Cockpit Settings page.
The ASE agent plug-in is configured by the SAP ASE installer by default. However, you can manually configure
the ASE agent plug-in properties values for SAP ASE and HADR components by editing the agent-
plugin.xml file.
Procedure
Option Description
3. Navigate to:
Option Description
Windows %SYBASE%\COCKPIT-4\plugins\<server_name>
UNIX $SYBASE/COCKPIT-4/plugins/<server_name>
4. Configure the ASE agent plug-in by editing the properties section of the agent-plugin.xml
configuration file to specify the SAP ASE server specific environment values.
Option Description
5. Encrypt the passwords for the server components. See Encrypting a Password.
6. Start the SAP ASE cockpit.
Related Information
Manually edit the agent-plugin.xml file properties values for SAP ASE and HADR components.
Property Description
Properties Description
<properties>
<set-property property="ase.heartbeat.timer" value="60" />
<set-property property="ase.heartbeat.update.time" value="2015-06-15 23:37:37
+0000" />
<set-property property="ase.home" value="/rel/SAP_16/ASE-16_0" />
<set-property property="ase.interfaces.pathspec" value="/rel/SAP_16/
interfaces" />
<set-property property="ase.maintain.connection" value="true" />
<set-property property="ase.password" value="1-
iW99uLnZPem46WW1pmaeQQLWNpOQI2yhwIK+aMkQR3UZdGPf/VYoUZIHr/Jt5CLWCWWpw=" />
<set-property property="ase.port" value="5000" />
<set-property property="ase.server.log" value="/rel/SAP_16/ASE-16_0/install/
SAPserver.log" />
<set-property property="ase.server.name" value="SAP" />
<set-property property="ase.start.command" value="/rel/SAP_16/ASE-16_0/install/
RUN_SAP" />
<set-property property="com.sybase.home" value="/rel/SAP_16" />
<set-property property="rma.start.command" value="/rel/SAP_16/DM/RMA-15_5/bin/
RunContainer.sh" />
<set-property property="rma.user" value="DR_admin" />
<set-property property="rs.home" value="/rel/SAP_16/DM/REP-15_5" />
Related Information
Set limits on the time SAP ASE Cockpit waits for data to load or on the number of rows it loads.
Prerequisites
Context
Performing some tasks may cause the SAP ASE Cockpit to load a large amount of data, which can be time-
consuming and can place a heavy load on your network. SAP ASE Cockpit mitigates this problem by displaying
partial results and by displaying placeholders called message rows when data takes longer than a specified
number of seconds to retrieve, or exceeds a specified number of rows. The data retrieval options let you specify
those numbers.
This data retrieval scheme reduces network traffic, since result sets that exceed the specified row count are not
transmitted unless you ask for them by expanding a message row. By displaying partial results and message
rows for data from slow-responding systems, the scheme also minimizes the time you spend waiting.
Set SAP ASE Cockpit to end login sessions when users are inactive for too long.
Prerequisites
Procedure
The SAP ASE Cockpit embedded repository stores information related to managed systems, as well as user
preference data, operational data, statistics, and alert configuration.
You can back up the repository database on demand, schedule automatic backups, restore the repository from
backups, and configure repository purging options. Full and incremental backups are available. A full backup
copies the entire repository. An incremental backup copies the transaction log, capturing any changes since
the last full or incremental backup.
SAP recommends that you periodically move backup files to a secondary storage location to prevent the
installation directory from becoming too large.
Prerequisites
● Determine your backup strategy, including when to perform full backups and incremental backups. For
example, you might schedule incremental backups every day and a full backup every Saturday.
● Membership in the sa_role and mon_role.
A full backup copies the entire repository. An incremental backup copies the transaction log, capturing any
changes since the last full or incremental backup.
Procedure
○ Incremental Backup
○ Full Backup
4. To change the directory in which the backup is stored, click Browse, and navigate to the desired directory.
5. Select Schedule a Regular Backup.
6. Specify a Start date or click the calendar and select a date.
7. Use the Time and AM/PM controls to specify the time to start the backup.
8. Use the Repeat interval control to specify how often the backup occurs.
9. (Optional) To purge the repository after each backup, select Run a repository purge after the backup
completes.
a. If you include purging in the backup schedule, select the Size Management tab and unselect
Automatically purge the repository periodically to disable automatic purging.
10. Click Apply to save the schedule.
Next Steps
Related Information
Prerequisites
Context
● Purging keeps the repository from absorbing too much disk space.
● By default, purging is enabled. It occurs once a day and purges data older than one day.
● Statistics and alert history can help you detect trends in server performance and user behavior. The SAP
ASE Cockpit statistics chart can graph performance data over a period of a year or more if the data is
available. If you have enough disk space, consider saving data for a longer period of time or disabling the
purging of statistics or alert history.
● Changing the purge frequency and other options might affect SAP ASE Cockpit performance.
Note
If you configure purging as part of a scheduled backup of the repository, disable automatic purging on the
Size Management tab.
Procedure
Prerequisites
Procedure
Related Information
Prerequisites
Procedure
Related Information
Prerequisites
Procedure
Related Information
Load backup files into the repository database to revert undesirable changes or to recover from a catastrophic
failure.
Context
If you configured SAP ASE Cockpit to store backups somewhere other than the default location, change the
source directory in the copy commands in this procedure.
Option Description
UNIX $SYBASE/COCKPIT-4/backup
to $SYBASE/COCKPIT-4/services/Repository/db
For example:
UNIX:
cp /opt/sap/COCKPIT-4/backup/repository.270110161105/repository.db
/opt/sap/COCKPIT-4/services/Repository/db
Windows %SYBASE%\COCKPIT-4\backup\incremental
\<generated_directory_name>
to %SYBASE%\COCKPIT-4\services\Repository
UNIX $SYBASE/COCKPIT-4/backup/incremental/
<generated_directory_name>
to $SYBASE/COCKPIT-4/services/Repository
For example:
UNIX:
cp /opt/sap/COCKPIT-4/backup/repository.270110161105/repository.log
/opt/sap/COCKPIT-4/services/Repository
5. (Optional) To load incremental backups, start the repository database using the -ad option, which directs
it to load transaction logs (incremental backups) from the incremental directory. (The database loads
full backups automatically.) For example:
UNIX:
cd /opt/sap/COCKPIT-4/services/Repository
../../bin/sa/bin_<platform>/dbsrv11 repository -ad
/opt/sap/COCKPIT-4/backup/incremental
The repository database loads the full backup and any subsequent incremental backups present in the
incremental directory. Incremental backups are loaded in date order. After loading and saving, the
database shuts down.
6. Start the SAP ASE Cockpit server.
Related Information
4.6 Logging
Logging helps SAP ASE Cockpit administrators identify and track errors and other system events by recording
messages about the events in log files.
Client log captures messages about activities in the browser-based client components. These
messages are generated by the component product modules to display information that is
pertinent to the user but not critical enough to warrant a pop-up. SAP ASE Cockpit also uses
the client log to trace client browser operations.
Server logs capture messages about activities during the initialization sequence, such as starting
services; auditing messages recording logins and logouts; errors such as missed scheduled
events; and other events on the server. Server logs include:
● Component logs, which record only events concerning individual product modules.
Repository log captures information about inserts and updates that have occurred in the SAP ASE Cockpit
repository, a SQL Anywhere database. This log is in COCKPIT-4\log\repository.log.
Alert services captures information about alert service status and events, including execution of alert-
log triggered scripts (start time, end time, and status and exit codes). This log is in
COCKPIT-4\log\alert-server.log.
Procedure
1. Navigate to:
Option Description
Windows %SYBASE%\COCKPIT-4\plugins\ASEMAP\log
UNIX $SYBASE/COCKPIT-4/plugins/ASEMAP/log
2. Display the ASEMAP.log file using a log viewer or another method of your choice.
3. Look for entries of interest such as login attempts or the failure of a service to start.
Related Information
Display the event log for the current session of your SAP ASE Cockpit browser client.
Context
In the SAP ASE Cockpit, do either of the following to display the client log:
Note
If there have been no new warnings or errors since the last time the log was viewed, the icon does not
appear.
Related Information
Adjust the logging level that determines which events SAP ASE Cockpit records in the server logs. This task
requires you to restart SAP ASE Cockpit.
Context
If you are having a problem with SAP ASE Cockpit, you might be able to discover the cause of the problem by
changing the server logging level so that more events are recorded.
These are several logging levels, from highest to lowest. The higher the level, the more serious an event must be
to be logged. Each level includes all the levels above it—for example, if you set the logging level to WARN, you
log events for the WARN, ERROR, and FATAL levels.
Procedure
cockpit -m <logging-level>
FATAL Logs only very severe error events that lead the server to abort. This is the highest level at
which events are logged.
ERROR Logs error events that might allow the server to continue running.
WARN Logs potentially harmful situations. WARN is the default logging level during normal oper
ation (that is, after system initialization).
INFO Logs informational messages that track the progress of the server in a coarse-grained
fashion. INFO is the default logging level during the system initialization process.
DEBUG Logs a larger set of events that provides a finer-grained picture of how the server is oper
ating. This level is recommended for troubleshooting.
3. Examine the server log for clues about what might be causing the problem.
4. When you have resolved the problem, set the logging level back to WARN, the default. Your log may
become unmanageably large if you leave it at the DEBUG or ALL level.
Note
These commands, which must be executed in the installation directory, start SAP ASE Cockpit with the
logging level set to DEBUG:
UNIX Execute:
bin/cockpit -m DEBUG
Related Information
View, filter, copy, and paste from SAP ASE server and agent log snapshots in the SAP ASE Cockpit.
Prerequisites
Register and authenticate the agent to enable error log viewing. Registering and Authenticating an SAP ASE
Cockpit Agent [page 33]
Context
The SAP ASE agent log records agent activities and may help diagnose issues.
Procedure
Filter the entries To filter the entries for specific text, click in the Filter messages field and enter a
word or phrase to isolate server messages containing the entry. For example, enter
"memory" to find all log output pertaining to memory usage. Any text that matches
what you entered is highlighted. Click the X to clear the Filter messages field.
Navigate through messages Click the next or previous flag arrows to navigate to the messages that are flagged.
To navigate to a specific flag type, click the Flag type arrow before clicking the next
or previous arrows.
Flag definitions provide additional searching capabilities for error log entries.
Prerequisites
Register and authenticate the agent to enable error log viewing. Registering and Authenticating an SAP ASE
Cockpit Agent [page 33]
Procedure
Related Information
You can add flag definitions to a server by importing a list of definitions from a target server.
Prerequisites
Register and authenticate the agent to enable error log viewing. Registering and Authenticating an SAP ASE
Cockpit Agent [page 33]
Procedure
To apply the same rules across multiple servers, export a list of flag definitions.
Prerequisites
Register and authenticate the agent to enable error log viewing. Registering and Authenticating an SAP ASE
Cockpit Agent [page 33]
Procedure
You see a list of qualified target servers (those that are agent-authenticated, and listed in the perspective
resource view), in the Export Flag Definitions dialog.
8. Select the target servers.
By default, the flag definitions on the target servers are replaced by the definition list on the source server,
including each definition's state of enabled or disabled.
9. (Optional) To merge the definition list on the source server with the definition lists on the target servers,
unselect Overwrite existing flag definitions. The merge is based on the following:
○ If the regular expression of the source definition does not exist in the list of the target definitions, the
source definition is appended to the target list.
○ If the regular expression of the source definition does exist in the list of the target definitions, the
source definition is not appended to the list, regardless of the state.
10. Click OK to save your changes.
Use the cockpit --port command to assign SAP ASE Cockpit services to new ports.
Prerequisites
Check for port conflicts between SAP ASE Cockpit and other software running on the same host.
Context
SAP ASE Cockpit cannot function properly if other services use its ports. If you discover a conflict with any port
listed in the right column below, you can either reconfigure the other service’s port or reconfigure SAP ASE
Cockpit as described here.
Messaging messaging.db.port
Alert alert.database.port
HTTP) port
Procedure
Use the first, simpler format unless you want to configure the database services to use different ports. (By
default, they all use the same port.)
4. Start SAP ASE Cockpit.
5. Execute cockpit --info ports again to confirm that the port has been reassigned.
Note
Set all three database services (data server, messaging, and database alert) to the same port, 4639. (The
database services belong to the internal repository.)
Set the main SAP ASE Cockpit messaging service to port 4994.
Note
cockpit commands that include a port-setting option (-p or --port) do not start SAP ASE Cockpit.
To start SAP ASE Cockpit, execute a separate cockpit command.
Determine whether you need to configure how much memory SAP ASE Cockpit uses, and if so which
configuration method to use.
Context
It is not usually necessary to configure memory usage for SAP ASE Cockpit. This table lists memory options
you can set and circumstances under which you should consider changing them.
Set maximum memory availa ● You need to prevent SAP ASE Cockpit On machines with less than 4GB of mem
ble for Cockpit. from using more than a given amount ory, set maximum memory to 256MB or
of memory.
COCKPIT_MEM_MAX – if you more.
● SAP ASE Cockpit fails to start and may
are running SAP ASE Cockpit as
display an error: Could not Default value: none. (On machines with
a UNIX service or starting SAP
create the Java Virtual 4GB or more of memory, maximum mem
ASE Cockpit from the com machine. ory is set dynamically and is effectively lim
mand line.
● An OutOfMemory error says SAP ASE ited only by the amount of system memory
Cockpit is out of heap space. available.)
● A warning message about system
memory appears during the start proc
ess.
● The machine where SAP ASE Cockpit
is installed has less than 4GB of mem
ory. (Starting SAP ASE Cockpit on a
machine with less than 4GB of mem
ory triggers the startup warning mes
sage about system memory.)
Set initial memory available for Increase the initial memory used by Cockpit When set, the value for
Cockpit.
when the default value is insufficient. COCKPIT_MEM_INIT overrides the de
COCKPIT_MEM_INIT – if you fault value.
are running SAP ASE Cockpit as
When not set, the default value for initial
a UNIX service or starting SAP
memory is 128MB.
ASE Cockpit from the com
mand line.
● For SAP ASE Cockpit started from the command line – execute commands to set one or more environment
variables before executing the cockpit command to start SAP ASE Cockpit. When you use this method,
your changes to the memory options last only as long as the current login session. This method is useful
for testing new option values.
● For the SAP ASE Cockpit service – modify a file used by the SAP ASE Cockpit service. When you use this
method, your changes to the memory options persist—SAP ASE Cockpit uses them every time it starts as
a service.
Before you start SAP ASE Cockpit server from the command line, you can issue a command to change the
value of a memory option temporarily.
Context
Changes made using this method last only as long as the current login session. This method is useful for
testing new option values.
Procedure
UNIX example:
Add a jvmopt command to the cockpit.properties file to change a memory option (-Xmx or -
XX:MaxPermSize) for an SAP ASE Cockpit Windows service.
Context
When you use this method to set memory options, your changes are permanent—SAP ASE Cockpit uses them
every time it starts as a service.
jvmopt=-Xmx512m
4. Save the file and start the SAP ASE Cockpit Windows service.
To change a memory setting for an SAP ASE Cockpit UNIX service, add the appropriate environment variable
(<COCKPIT_MEM_MAX> or <COCKPIT_MEM_PERM>) to the cockpit.sh script.
Context
When you use this method to set memory options, your changes are permanent—SAP ASE Cockpit uses them
every time it starts as a service.
Procedure
COCKPIT_MEM_MAX=512
export COCKPIT_MEM_MAX
4. Save the file and start the SAP ASE Cockpit UNIX service.
The console is a command-line interface for displaying details about the status of the SAP ASE Cockpit server,
its ports, plug-ins, and services.
When you use the cockpit command to start SAP ASE Cockpit, it displays start-up messages and then
displays the console prompt.
Note
The console prompt does not appear if you start SAP ASE Cockpit as a service, if you direct the output of
cockpit to a file, or if you start SAP ASE Cockpit in the background.
Use the SAP ASE Cockpit console to get status information on SAP ASE Cockpit and its ports, plug-ins, and
services.
Display syntax information for one or more SAP ASE Cockpit console commands.
Syntax
help [<command_name>]
Parameters
command_name
Examples
Example 1
help status
Related Information
Display information about specified parts of the SAP ASE Cockpit server.
If you enter info with no parameters, it returns information for every parameter.
Syntax
Parameters
-a | --sys
-m | --mem
(optional) display information about the server’s memory resources.
-p | --ports
(optional) list all the ports on which the SAP ASE Cockpit services listen, indicate
whether each port is in use, and show the service running on each port.
-s | --services
(optional) list all SAP ASE Cockpit services, indicate whether each service is enabled,
and list other services on which each service depends.
Examples
Example 1
info -p
Related Information
Syntax
shutdown
Examples
Example 1
shutdown
Related Information
Display the status of the SAP ASE Cockpit plug-in, or service components of SAP ASE Cockpit.
Syntax
status
[-h | --help]
[-p | --plugin [<plugin-name>]]
[-s | --service [<service-name>]]
-h | --help
display information about the info command.
-p | --plugin [<plugin-name>]
display the status of the specified SAP ASE Cockpit plug-in. Omit the plugin-name
argument to return a list of plug-ins.
-s | --service [<service-name>]
display the status of the specified SAP ASE Cockpit service (for example, the Alert
service or the Messaging service). Omit the service-name argument to return a list of
services.
Examples
Example 1
Related Information
Prerequisites
Manage permissions and security features such as encryption, users, logins, login profiles, roles, and groups.
Grant command permissions or object permissions to or revoke them from users, groups, or roles.
Create Command Permissions You can grant permission to use these Setting Command Permissions for a
commands to or revoke it from users,
Group [page 121]
groups, or roles:
Object Permissions – Owners You can grant object permissions to or re Granting Object Permissions to a
voke them from a user, group, or role.
Role [page 139]
Object Permissions – Objects For tables, you can set these permissions: Setting Table or Column Permissions
For views, you can set these permissions: Granting Permissions on Views [page
360]
● select
● insert Revoking Permissions on Views
● delete [page 361]
● update
For precomputed results, you can grant or Granting Permissions [page 387]
revoke execute permission.
Revoking Permissions [page 388]
Granular permissions enable you to grant system privileges; allowing you to construct site-specific roles with
privileges to match your requirements, and let you restrict system administrators and database owners from
accessing user data.
Prerequisites
By default, the sa_role is granted the system privilege own any database. This privilege allows a system
administrator to become the database owner of any user database. However, database owners can revoke
the own any database privilege from the sa_role.
select any system catalog is not an automatically granted privilege, even if you can access system
catalogs. If you have sso_role, you are automatically given the manage security permissions privilege
when granular permission is enabled. Once you have the manage security permissions permission,
you can grant the select any system catalog privilege to yourself or other users to allow access to
generate DDL.
For complete information about how to manage granular permissions in SAP ASE, see the Security
Administration Guide.
Related Information
User Management allows the storage of some additional user information for SAP ASE Cockpit specific tasks.
Any valid user in the managed system can log in to SAP ASE Cockpit. You cannot prevent a valid user from
initially logging in to a managed system, but you can disable subsequent access. You can also maintain email
addresses for alert notification.
Prevent a valid user in a managed system from logging in to SAP ASE Cockpit.
Prerequisites
Context
You cannot prevent a valid managed system user from initially logging into SAP ASE Cockpit, but you can
prevent subsequent access.
Tip
The technical user account should never be used to log in. To enforce this, SAP recommends that you
disable this account in SAP ASE Cockpit. Disabling the technical user account has no impact on the
account's ability to collect data.
Procedure
Remove a user from the list of registered SAP ASE Cockpit users.
Prerequisites
Context
Note
Use extreme care when deleting a user from SAP ASE Cockpit. Do not delete the technical user account.
There should be little need to delete users under User Management as doing so does not prevent access to
SAP ASE Cockpit. To prevent a user from accessing SAP ASE Cockpit, disable the users.
Procedure
Prerequisites
If an email address is entered under ALERT NOTIFY , the user record under User Management is
automatically updated, and vice versa.
Procedure
Add details such as name, phone, and email address for a user who has successfully logged in to a managed
system.
Prerequisites
Context
Note
User information is stored in the SAP ASE Cockpit repository. It is not updated to the user account in the
managed system.
Procedure
You can change the passwords of the administrative login accounts for the cockpit (sccadmin) and the cockpit
agent (uafadmin).
Prerequisites
You have already encrypted the new password. See Encrypting a Password [page 78].
Procedure
Option Description
UNIX $SYBASE/COCKPIT-4/conf/csi_config.xml
2. Search for the account name: Default SCC agent admin account: uafadmin or sccadmin.
3. Paste the new encrypted password into the value field of the password line. It looks similar to this—be sure
to paste inside the double quotes:
Related Information
Use the passencrypt utility to encrypt passwords and other values that must be kept secure while stored in
text files.
Context
passencrypt uses the SHA-256 hash algorithm for passwords used in the PreConfiguredLoginModule in
csi_config.xml.
Procedure
Option Description
Windows passencrypt.bat
UNIX passencrypt -csi
SAP ASE Cockpit automatically grants administrative or monitoring privileges for SAP ASE.
Monitoring privileges are automatically assigned to users who have mon_role privileges on SAP ASE, which lets
them perform monitoring tasks for that server.
Administration privileges are automatically assigned to users who have sa_role privileges on an SAP ASE
server, which lets them perform certain administrative tasks for that server.
Checks for role validation are performed every 30 minutes. The resource must be authenticated. If you
authenticate a resource without having mon_role privileges, are warning appears indicating that you cannot
perform monitoring tasks or configure alerts on the server.
Note
If a role is revoked from outside of SAP ASE Cockpit, the change is not registered until the next role-check
occurs. If a role is revoked from within SAP ASE Cockpit, the change is registered immediately.
SAP ASE Cockpit uses encrypted passwords to connect to SAP ASE servers that are configured for network
password encryption.
If you have configured an SAP ASE server to use network password encryption by setting net password
encryption reqd, SAP ASE Cockpit establishes a connection to the server using a password that is
encrypted during network transmission.
You can encrypt database columns using keys that are created with user-defined or login passwords.
Encryption Keys
In each database, you can create a key that encrypts columns. Creating a key on each database minimizes
cross-database key integrity problems. Such key problems can happen in distributed systems, particularly
when you are dumping and loading, or mounting and unmounting databases.
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the following privilege or privileges based on the
encryption key type:
○ column encryption key – create encryption key or manage column encryption key
○ master key – manage master key
○ database encryption key – manage database encryption key
You must have the manage any encryption key privilege to create an encryption key for another
user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to create an encryption key for another user.
If you are a key owner, allow other users to access encryption keys by either:
● Creating an encryption key with a user-defined password and sharing it with each user who accesses key-
encrypted data, or
● Giving each user a copy of the base encryption key, and allowing him or her to change the key-copy
password.
Using encryption keys with user-defined passwords creates a highly secure system in which even database
owners and system administrators cannot access encrypted data. You can also require that the key encryption
method itself use a user-defined password.
When data is encrypted, system security officers, key-custodians, and users with permission to create
encryption keys can also create base keys. System security officers can also grant base key creation
permission to users who have no other permissions.
The creator of the base key is the "key owner." To control access to encrypted data, only key owners and
system security officers can change the base-key password.
To prevent users from having to keep multiple passwords, you can authorize users to access encrypted data
using their login password. Using login passwords to access key-encrypted data:
● Gives users access to encrypted data without requiring them to explicitly supply passwords.
● Involves fewer passwords for users to track.
● Reduces the need for the key custodian to replace lost passwords.
Key Copies
Key owners can allow data access to other users by making copies of the base key—called key copies. A key
copy is an additional password for the base key that can be changed as soon as it is assigned to a user, or key-
copy owner. Only the key-copy owner can change the key-copy password.
You can make key copies for designated users if you are the base-key owner or a system security officer. Key
copies of the base key are not new keys themselves; they are additional passwords for the base key. Key-copy
assignees should change their user-defined password for as soon as the key copy is assigned to them.
The key copy is encrypted with the login password as soon as the assignee logs in and accesses the key copy.
Note
The base key can be encrypted by the system encryption password or a user-defined password. Key copies
can be encrypted by a login password or by a user-defined password. The recovery key copy can be
encrypted only by a user-defined password. Keys that are encrypted with the system encryption password
cannot have key copies.
Key recovery requires you to create a special key copy, called the recovery key, that is designated for the
recovery of the base key. If you lose your password, use the recovery key to access the base key.
You can use a combination of system keys at the database level, called the master key and the dual-master key.
You must have sso_role or keycustodian_role to create the master key and dual master key. The master key and
the dual master key must have different owners.
You can provide passwords for the master keys using the Supply Password option for encryption keys. You can
also use the Execute SQL option to provide the password using SQL. The passwords to both these keys are not
stored in the database.
Master and dual-master keys act as key encryption keys (KEKs), and protect other keys, such as column
encryption keys and service keys. Once created, master and dual-master keys become the default protection
method for column encryption keys. There can only be one master and one dual-master key for a database.
The dual-master key is needed only for dual control of column encryption keys. Once the master key is created,
it replaces the system encryption password as the default key encryption key for user-created keys.
A composite key, comprising the master key and dual-master key, provides dual control and split-knowledge
security for all user-created keys. Alternately, you can create a composite key using the master key and the
column encryption key’s password. When master and dual-master keys are configured in a database, the
combination is used to encrypt passwords when you issue create table, alter table or select into
commands specifying dual control.
Related Information
SAP ASE encrypts keys using the Advanced Encryption Standard (AES) algorithm. The system encryption
password is encrypted and stored in the database.
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage database encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Context
The security of encryption keys might be compromised if the system encryption password is too short or easy
to guess.
Note
Keys that are encrypted using the system encryption password cannot have key copies.
Procedure
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage database encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Procedure
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage master key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Context
Note
SAP recommends that you do not create system encryption passwords after you have created master
keys.
● Can be used with the dual master key as a composite key to provide dual control and split knowledge for all
user-created keys. Alternatively, the master key can be used as a composite key with a column encryption
key’s explicit password.
● Can be altered to add key copies. Master key copies provide access to the dual-master key for unattended
start-up, to support recovery of the master key, and to allow users other than the base-key owner to set the
encryption password.
Procedure
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage master key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Procedure
Pages Properties
Key Copies Assignees and other information about keys – lists the
types of passwords and assignees for the key, and
information about whether the key is recoverable.
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage master key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
Context
Procedure
○ Change Password.
Enter the old and new passwords, and confirm the new password. Optionally, you can choose to
control encryption with a user-defined password.
Note
If a key has key copies, you cannot modify the key to encrypt it with the system encryption
password.
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the create encryption key or manage column
encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Procedure
Option Description
Select a database Select the database for which the encryption key is being
defined.
7. On the Encryption Key Name page, enter a unique name for encryption key.
8. On the Algorithm page, select parameters for the Advanced Encryption Standard (AES) encryption
algorithm:
Option Description
Key length Choose 128, 192, or 256, depending on the level of secur
ity you need.
Set this key as the database default key Setting the key as the default key allows user to create en
crypted columns without specifying the key.
Encrypt with user defined password Encryption is controlled with a user-defined password.
With dual control Encryption is controlled with both the master key and a
user-defined password.
Note
If you select dual control, the master key must already
exist in the database, and you must supply the master
key password.
Encrypt with master key Enable encryption using the master key.
Encrypt with system encryption password Enable encryption using the system encryption password.
Option Description
Initialization vector padding Select either null or random. Use initialization vector pad
ding to increase the security of encrypted data by increas
ing the cryptographic variance of the cipher text.
Pad value Select the pad value to be either random or null. If pad is
set to random, the datatype padding is used when the
length is smaller than one block.
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
Procedure
Pages Properties
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the create encryption key or manage column
encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Procedure
Option Description
Password for base key Enter the password for the base key.
Assign to Enter the assignee for the key copy. The assignee cannot
be the key owner.
Option Description
Change the encryption key, with the option of adding dual control.
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the create encryption key or manage column
encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Procedure
○ Change Password.
Enter the old and new passwords, and confirm the new password
Note
If a key has key copies, you cannot modify the key to encrypt it with the system encryption
password.
Option Description
Encrypt with user defined password Encryption is controlled with a user-defined password.
With dual control Encryption is controlled with both the master key and a
user-defined password.
Note
If you select dual control, the master key must al
ready exist in the database, and you must supply
the master key password.
Encrypt with master key Enable encryption using the master key.
Encrypt with system encryption password Enable encryption using the system encryption pass
word.
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage database encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Note
Before you create a database encryption key (DEK), create a key encryption key (KEK). The KEK can be a
master key or dual master key; these both protect the database encryption key (DEK). See Using Database-
Level Master and Dual Master Keys in the Encrypted Columns Users Guide.
Procedure
Related Information
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the manage database encryption key privilege.
You must have the manage any encryption key privilege to modify or create an encryption key for
another user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to modify or create an encryption key for another user.
Procedure
Pages Properties
Prerequisites
You must have the manage any encryption key privilege to create an encryption key for another user.
Procedure
Prerequisites
● Verify that you have a valid SAP ASE encryption feature license (ASE_ENCRYPTION)
● Set the enable encrypted columns parameter to 1.
● Ensure that you have the appropriate privileges. With:
○ Granular permissions enabled – you must have the following privilege or privileges based on the
encryption key type:
○ column encryption key – create encryption key or manage column encryption key
○ master key – manage master key
○ database encryption key – manage database encryption key
You must have the manage any encryption key privilege to create an encryption key for another
user.
○ Granular permissions disabled – you must have sso_role, keycustodian_role, or execute permission on
the create encryption key command.
You must have sso_role to create an encryption key for another user.
Procedure
Prerequisites
When granular permissions is enabled, you must have select any system catalog privilege on the
database where the encryption key resides.
Procedure
You can manage login accounts with login profiles that define attributes for individual logins, a subset of logins,
or all logins.
A login profile is a collection of attributes that are specific to login accounts. You can manage login accounts
attributes by creating login profiles and associating the profile with a login account. You can manage attributes
Login profiles attributes are associated with login accounts using this precedence:
Prerequisites
● Granular permissions enabled – you must be a user with the manage any login profile privilege.
● Granular permissions disabled – you must be a user with sso_role.
Procedure
With attributes derived from an existing login account Transfers existing login account values to a new login pro
file.
As default for all login accounts Use the login profile as the default for all login accounts on
the selected servers.
Option Description
Specify default database Choose a database to be used as the default for the login
profile.
(Optional) Use common default database for the login Select a default database.
profile on all servers
The list of available of databases depends on the data
bases that are common on all servers that have been se
lected. If there are no servers on this list, there are no
common databases available.
(Optional) Use default database for the login profile on in Select a default database.
dividual server
Option Description
Specify default language Choose a language to be used as the default for the login
profile.
(Optional) Use common default language for the login pro Select the default language.
file on all servers
us_english is the default language, but you can install lo
cale character sets. The additional installed languages and
the default language constitute the list of available lan
guages.
(Optional) Use default language for the login profile on in Select the default language.
dividual server
Description
Specify an authentication method Choose an authentication mechanism for the login profile.
(Optional) Use common authentication for the login pro Select the authentication method.
file on all servers
If you select ANY (the default) as the authentication
mechanism, a check is performed for a defined external
authentication mechanism. If one exists, it is used. Other
wise, the ASE mechanism is used.
(Optional) Use default authentication for the login profile Select the authentication method.
on individual server
Option Description
Track last login Specify whether to enable last login updates. The default is to track the last login.
Stale login inactivity pe Specify the length of time a login account can remain inactive before it is locked due to inac
riod tivity.
Prerequisites
● Granular permissions enabled – you must be a user with the manage any login profile privilege.
● Granular permissions disabled – you must be a user with sso_role.
Procedure
Pages Properties
Roles You can add or remove roles that have been granted to
the selected login profile.
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Display login profiles and the bindings of login accounts to login profiles.
Procedure
Procedure
○ Use common login on all servers, then select the login account.
The list of available of login accounts is based on login accounts that are common on all of the servers
that have been selected. An empty list indicates that there are no common login accounts.
A login profile is created on each server, based on the attributes of the common login account. The
name of the login profile is the same on each server.
○ Use login account on individual server, then select the login accounts.
A login profile is created on each server, based on the attributes from different login accounts. The
name of the login profile is the same on each server.
Procedure
Prerequisites
You must have the select any system catalog privilege on the master database.
Procedure
Each SAP ASE user must have a login account that is identified by a unique login name and a password.
To access a server, users must have a login account with a unique name and password. When a login account is
added to one or more servers, the account is given a unique system user ID, which identifies the users
regardless of the server being used. Once a login account is created, a user account is created for users to
access individual database. Login profiles can be associated with a login account to manage attributes such as
the default database, default language, authentication mechanism, tracking the login, setting inactivity periods,
and invoking login scripts.
Prerequisites
● Granular permissions enabled – you must have the manage any login privilege to alter login
accounts in general. To modify a login account’s password, you must have the change password
privilege or be the account owner.
● Granular permissions disabled – you must be a user with sso_role. The account owner is allowed to modify
the account’s password and full name.
Procedure
Option Description
Ignore login profile in creating login A login profile is not designated for the login.
Use common login profile for the login on the server This option is available only when an existing login profile
is available.
Use different login profile for the login on individual server This option is available only when an existing login profile
is available.
Option Description
Use common default database for the login on all servers Choose a default database.
Use default database for the login on individual server Select a server from the list of available servers.
9. (Optional) On the Optional Parameters page, select the default language for the new login account.
10. On the Database Access window, select the databases that the login account can access.
This step adds a user account of the same name as the login to the selected database.
11. (Optional) Click Summary to verify your selected options.
Display or modify login properties, such as set password parameters, add users to a login, and grant logins to a
role.
Prerequisites
● Granular permissions enabled – you must have the manage any login privilege to alter login
accounts in general. To modify a login account’s password, you must have the change password
privilege or be the account owner.
● Granular permissions disabled – you must be a user with sso_role. The account owner is allowed to modify
the account’s password and full name.
Pages Properties
Client Mapping Displays a list of client users mapped to the account. You
can add or remove client users to or from the account.
Procedure
○ Click Add, then select one or more users to map to the login.
○ Select one or more users, then click Remove to remove users from a login account.
○ Click Properties to see the attributes and properties assigned to a user.
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Related Information
Prerequisites
● Granular permissions enabled – you must have the manage any login privilege to alter login
accounts in general. To modify a login account’s password, you must have the change password
privilege or be the account owner.
● Granular permissions disabled – you must be a user with sso_role. The account owner is allowed to modify
the account’s password and full name.
Procedure
Option Description
Expire login account passwords When selected, the owners of the login accounts must
change the login password.
Select the login whose password is to be expired Expire passwords for specific login accounts.
Specify pattern matching characters for logins Expire passwords for login accounts matching specified
characters.
Expire stale passwords Expire passwords that have not been changed by a speci
fied date.
7. On the Lock Inactive Accounts page, check Lock inactive login accounts to locked accounts due to
inactivity, and specify the number of days the account can remain inactive before the account is locked.
Note
To lock inactive accounts, enable last login updates on the Configuration screen must be checked.
Related Information
Prerequisites
● Granular permissions enabled – you must have the manage any login privilege to alter login
accounts in general. To modify a login account’s password, you must have the change password
privilege or be the account owner.
Procedure
Option Description
Change password Enter the current password for the login and the new pass
word.
Lock Account
Max failed logins Number of login attempts allowed, after which the login
account is locked.
Related Information
Manage attributes of login accounts by assigning a login profile to an individual login, a subset of logins, or all
logins.
Procedure
Related Information
Procedure
Prerequisites
You must have the select any system catalog privilege on the master database.
Procedure
When SAP ASE is configured to restrict decrypt permission, only the system security officer can grant decrypt
permission on tables, columns, and views. When restricted decrypt permission is turned off, the system
security officer or the database owner can grant decrypt permission.
Command permissions allow the group to execute create commands. Database owners can assign command
permissions to groups in the databases they own.
Note
SAP ASE Cockpit reports only explicitly granted and revoked permissions as well as those that users obtain
by belonging to a group. For example, permissions associated with a login role are not reported.
A group can have members with specific permissions. You grant and revoke permissions and authorities for a
group in the same manner as you do for users.
Procedure
Related Information
Display or modify group properties, such as which users belong to a group, or permissions for the group.
Procedure
Add users to a group, view users who belong to a group, or remove users from a group.
Procedure
3. In the left pane of the Administration Console, expand ASE Servers Security Groups .
4. In the right pane, select a group, and do one of:
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
○ Click Revoke all permission to revoke all permissions shown in the Revoke Permissions window.
○ Click individual cells to revoke the currently granted permissions. The cell changes to show an "x,"
indicating that the permission type is no longer granted.
○ Click Revoke all permission with predicate to revoke all permissions with a predicate shown in the
Revoke Permissions window.
Prerequisites
● To grant or revoke privileges, set the configuration parameter enable granular permissions to 1.
● To grant or revoke predicated privileges, set the configuration parameter enable predicate
privileges to 1.
Procedure
Related Information
Prerequisites
● To grant or revoke privileges, set the configuration parameter enable granular permissions to 1.
● To grant or revoke predicated privileges, set the configuration parameter enable predicate
privileges to 1.
Procedure
Related Information
Procedure
○ To grant command permissions for the selected roles, click Grant and select one or more commands.
○ To revoke command permissions for the selected roles, select a command and click Revoke.
Procedure
Procedure
Add a new user to a SAP ASE database and manage database object access and ownership of database
objects.
Procedure
Related Information
Prerequisites
Ownership of dbo-owned objects can be transferred only by users with an sso_role. Users cannot also have
sa_role and users cannot be a database owner (dbo)
Context
You can also search for referencing objects in the current, or other databases, that will be affected if the
selected object is transferred to a different owner. If referencing objects exist, you can generate the SQL scripts
to create these objects with the new owner. You can also compare the scripts to create the object with the old
and new owners.
To transfer object ownership with referencing objects, first save the script that creates referencing objects with
the new owner, then click through the wizard to transfer the database object ownership. When the transfer is
complete, run the script to modify ownership of the referencing objects.
Procedure
Run the script only after you have changed the owner, that is, after the Transfer Database
Object wizard has completed.
○ Compare the two scripts (one that creates the object with the old owner and the other with the
new owner) – click the Name field of the row containing the object, then click the icon that
appears. Upon comparing the two scripts, select Accept to retain the object in the list of
referencing objects included in the script, or Reject to remove the corresponding object
entries from the script.
○ Select the new login name – change the loginame value (in system catalog sysobjects) of the
selected objects only.
To be available for selection, a login must meet these conditions:
○ If the current owner is guest, the login name must be valid, cannot have sa_role, and the login suid
cannot be in the sysusers or sysaliases tables.
○ If the current owner is dbo, the login name must be valid, the login suid must be either in the
sysaliases table that is aliased to the dbo, or have sa_role.
○ If the current owner is anyone else other than guest or dbo, the login name must be valid and the
login suid must be in the sysaliases table that is aliased to the current owner.
8. (Optional) Click Summary to verify your selected options.
Related Information
Display or modify user properties, such as permissions to access database objects and commands, and login
aliases.
Procedure
General Select from the list of groups to change the group for the user.
Objects Owned Select the database objects that your user owns in this database.
Object Permissions Permissions to access database objects – use the Grant Permission and Revoke Permission
wizards to grant or revoke permissions and predicated privileges for specific database opera
tions such as insert, delete, update, reference, and decrypt for specific data
base objects such as tables, procedures, and so on.
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
○ Click Revoke all permission to revoke all permissions shown in the Revoke Permissions window.
○ Click individual cells to revoke the currently granted permissions. The cell changes to show an "x,"
indicating that the permission type is no longer granted.
○ Click Revoke all permission with predicate to revoke all permissions with a predicate shown in the
Revoke Permissions window.
Procedure
○ To grant command permissions for the selected roles, click Grant and select one or more commands.
○ To revoke command permissions for the selected roles, select a command and click Revoke.
Prerequisites
Procedure
Related Information
Prerequisites
Procedure
Related Information
Procedure
Procedure
Manage permissions to multiple login accounts by creating roles and granting roles to logins.
● Granular permissions enabled – you must have the manage roles privilege.
● Granular permissions disabled – you must be a user with sso_role.
Create roles as a convenient way to grant and revoke permissions to several logins. A role can be granted to a
login account or another role.
Permissions
Permissions granted to roles override permissions granted to users or groups. For example, if John is granted
the role of system security officer and individual permissions of sales accounts, he can still access the sales
accounts if his individual permissions are revoked because his role permissions override his user permissions.
Hierarchical Roles
A system security officer can define role hierarchies such that a role can be assigned to another role. For
example, the chief financial officer role might contain both the financial analyst and the salary administrator
roles.
Roles can be defined to be mutually exclusive. The supported exclusive types are:
● Membership – one user cannot be granted two different roles. For example, the system administrator and
system security officer roles can be defined as mutually exclusive for membership; that is, one user cannot
be granted both roles.
● Activation – one user cannot activate, or enable, two different roles. For example, a user might be granted
both the senior auditor and the equipment buyer roles, but is not permitted to have both roles enabled
simultaneously.
Prerequisites
● Granular permissions enabled – you must have the manage roles privilege.
● Granular permissions disabled – you must be a user with sso_role.
Context
Procedure
Display or modify role properties, such as passwords, logins assigned to roles, permissions, hierarchically
mapped roles, and mutually exclusive roles.
Procedure
Pages Properties
The system security officer or user assigned the role can determine whether to activate roles granted by
default at login.
Context
Roles may or may not be active at login, depending on the default set for a role.
Procedure
Activate roles only when you need them, and turn them off when you no longer need them. For example,
when the sa_role is active, you assume the identity of database owner within any database that you use.
5. Supply a password if the role requires a password to be activated.
Procedure
Option Description
Expire role passwords When selected, the owner of the role must change the
password.
Select the role whose password is to be expired Expire passwords for specific roles.
Specify pattern matching characters for roles Expire passwords for roles matching specified characters.
Expire stale passwords Expire passwords that have not been changed by a speci
fied date.
Prerequisites
With granular permissions enabled, you must have manage security permissions system privilege to
restore system roles and manage server permissions to restore sa_role privileges.
Context
These system roles can be restored: sa_role, sso_role, oper_role, replication_role, keycustodian_role.
Procedure
Related Information
To manage permissions or privileges for one or more logins, you can grant roles hierarchically.
Procedure
Procedure
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Procedure
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
Procedure
Use object access permissions to regulate the use of specific commands that access specific database
objects.
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
To grant or revoke privileges, set the configuration parameter enable granular permissions to 1.
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
○ Click Revoke all permission to revoke all permissions shown in the Revoke Permissions window.
○ Click individual cells to revoke the currently granted permissions. The cell changes to show an "x,"
indicating that the permission type is no longer granted.
○ Click Revoke all permission with predicate to revoke all permissions with a predicate shown in the
Revoke Permissions window.
Related Information
Prerequisites
● To grant or revoke privileges, set the configuration parameter enable granular permissions to 1.
Procedure
Related Information
Prerequisites
● To grant or revoke privileges, set the configuration parameter enable granular permissions to 1.
● To grant or revoke predicated privileges, set the configuration parameter enable predicate
privileges to 1.
Procedure
Related Information
Procedure
○ To grant command permissions for the selected roles, click Grant and select one or more commands.
○ To revoke command permissions for the selected roles, select a command and click Revoke.
Related Information
Procedure
Procedure
Alerts are categorized into three key performance areas (KPA): Availability, Performance, and Capacity. Each
KPA is composed of several key performance indicators (KPI). Data is collected at defined intervals and alerts
triggered when the KPI exceeds the predefined thresholds or state. By default, all alerts are enabled. You can
customize the threshold of each alert and disable alerts not required. You cannot add additional alerts to a KPA.
The Alert Monitor page displays a dynamically updated list of active alerts, which can be resolved by entering a
resolution description.
Active alerts for all priorities display by default, sorted by priority (high to low).
Each alert remains on the Alert Monitor page until it has been resolved. The alert record indicates its original
timestamp and the age field is updated to reflect the amount of time elapsed since the alert was initially
triggered.
Active alerts appear in color, with a status of Active. When the condition that triggered the alert is resolved, and
the KPI returns to the expected range, the system automatically changes the status of the alert to Resolved
and creates a resolution record. Resolved alerts appear in grey. SAP ASE Cockpit stores details on the last 10
resolved alerts for each KPI. You can also manually change the status of an alert, but if the KPI has not returned
to the expected range, the alert reappears.
To manually change an alert status, click Resolve, enter a mandatory description, and click Finish.
Note
Once set to resolved, an alert status cannot be changed. The resolved alert disappears if Active Alerts Only is
selected; otherwise, the alert turns grey, but remains visible.
A nonadministrative SAP ASE Cockpit user can set an email address for notification.
Prerequisites
● The email server and port must be configured to enable email notification. See Configuring the E-mail
Server.
● At least one notification email address must be defined by an administrative user before a
nonadministrative user can enter an email address.
● A technical user account exists.
Context
Once set, notification is sent when any enabled alert is triggered. You cannot select specific alerts for
notification (for example, notification sent for a Resource State alert, but not a Total CPU Usage alert). You can
also elect to be notified if an alert is not resolved before its escalation period has expired.
If a nonadministrative user modifies the email address, the modified address is appended to the notification
list, but the original email address is not removed. It must be manually removed by an administrative user. If
only a notification check mark is changed, administrative user action is not required; the email address is
automatically added to or removed from the notification list. It is the responsibility of the nonadministrative
user to notify the administrative user of the change.
If an administrative user modifies a nonadministrative user email address, the notification check marks
become deselected on the Notify page of the nonadministrative user, and the email address does not reflect
the address change. However, the nonadministrative user does receive email notification using the modified
address.
SAP ASE Cockpit validates the format of the email address but not the address itself. The Apply button is
unavailable when the format of an address is invalid.
Each managed system must have its own notification email addresses defined; notification addresses are
specific to the managed system, not SAP ASE Cockpit.
Note
An administrative SAP ASE Cockpit user can set additional notification parameters. See Managing Alert
Notification Settings.
Note
When you click the ALERT workset for the first time in the current session, there may be a delay before
the NOTIFY option appears.
Option Description
An administrative SAP ASE Cockpit user can set his or her email address for notification and define additional
notification attributes for alerts.
Prerequisites
● The email server and port must be configured to enable email notification. See Configuring the E-mail
Server.
● A technical user account exists.
Context
At least one notification email address must be defined by an administrative user before a nonadministrative
user can enter an email address.
If a nonadministrative user modifies the email address, the modified address is appended to the notification
list, but the original email address is not removed. It must be manually removed by an administrative user. If
only a notification check mark is changed, administrative user action is not required; the email address is
automatically added to or removed from the notification list.
If an administrative user modifies a nonadministrative user email address, the notification check marks
become deselected on the Notify page of the nonadministrative user, and the email address does not reflect
SAP ASE Cockpit validates the format of the email address but not the address itself. The Apply button is
unavailable when the format of an address is invalid.
Procedure
Note
When you click the ALERT workset for the first time in the current session, there may be a delay before
the NOTIFY option appears.
Setting Description
Escalation period The elapsed time period, in minutes, in which an alert must be resolved before
an escalation email notification is sent.
Escalation email Email address to receive notification in the event an alert remains unresolved
once the escalation period has elapsed. Separate multiple addresses by semi
colons.
Script path The path to a script to execute in the event an alert is raised, but controlled by
suppression. For example, if suppression is 10 minutes and the alert is on a 1
minute interval, the script runs once every 10 minutes.
Storm Suppression Suppress email notifications and script execution for a period of time speci
fied, in minutes, if an alert continues to fire.
You can enable and disable alerts as well as configure the trigger thresholds for each alert.
Prerequisites
Context
Modifications to alert thresholds take effect the next time the monitoring interval is reached.
Note
If a message appears indicating the technical user account does not exist, and it was created in the current
session, log out and back in to the SAP ASE Cockpit console using the current user (not the technical user
account).
Procedure
Note
When you click the ALERT workset for the first time in the current session, there may be a delay before
the CONFIGURE option appears.
3. To enable or disable an alert, select or unselect the box in the Enabled column.
4. To modify the thresholds of an alert, click Edit and adjust the levels. Click Finish to save the changes.
Lists and describes alerts you can configure for SAP ASE data collection.
Alerts are based on the same key performance indicators (KPIs) that are collected for APCA monitor displays
and the Statistics Chart.
Number of Blocked Processes Count Number of currently blocked processes that have Yes
been blocked for more than 5 seconds. The heat
chart uses this metric to display server status.
Number of Database Dump Fail Count Number of failed database dumps. Yes
ures
Number of Suspended Processes Count Number of processes that are currently sus Yes
pended. The heat chart uses this metric to display
server status.
Server Availability Status Status Status of the SAP ASE server. Values of most inter Yes
est are stopped and running.
Server Device IO Rate I/O per second Total number of I/O operations performed by all Yes
devices on the server during the current collection
cycle.
Server Percent CPU Utilization Percentage Average CPU utilization percentage across all ac Yes
tive engines on the server.
Table 5: HADR Availability (KPI: HADR Availability Statistics - applies only to HADR enabled servers )
Name Unit Description Alert
State of primary Replication Status Status of the primary Replication server. Yes
Server
State of Fault Manager Status Status of the fault manager: running or stopped. Yes
State of RMA Status Status of the replication management agent (for pri Yes
mary and remote site respectively): running or stop
ped.
State of remote Replication Server Status Status of the remote Replication server. Yes
Synchronous to Asynchronus Rep Status Status of the change from synchronous to asynchro Yes
lication nous replication
Fault Manager Hibernate Status Status of the hibernating Fault Manager Yes
No Contact for Primary Host Status Primary SAP Host Agent cannot be contacted Yes
Agent
No Contact for Standby Host Status Standby SAP Host Agent cannot be contacted Yes
Agent
Average Blocked Process Wait MS Average time, in milliseconds, that the current Yes
Time blocked processes have waited.
Cache Hit Ratio Percentage Hit ratio in the data cache during the current Yes
collection cycle.
Device APF Reads Per second Rate of asynchronous prefetch read opera No
tions per second on the selected device.
Device IO Rate I/O per second Rate of I/O operations per second on this de Yes
vice.
Device IO Response Time MS Response time, in milliseconds, for I/O opera Yes
tions performed on this device.
Engine CPU Utilization Percentage CPU utilization for this engine as a percent Yes
age.
Long Running Transaction Execu Seconds Execution time of longest running transaction Yes
tion Time
Number of Cache Misses Count Number of times that a needed page was not No
found in a cache and had to be read from disk.
Number of Cache Searches Count Number of cache searches, including hits and No
misses for all caches combined.
Number of Critical Flags Last Count Number of critical flags received during the Yes
Collection collection cycle.
Number of Deadlocks Count Number of deadlocks on the server since the Yes
most recent execution of the collection.
Number of Error Flags Last Col Count Number of error flags received during the col Yes
lection lection cycle.
Number of Information Flags Count Number of information flags received during Yes
Last Collection the collection cycle.
Number of Locks Count Total number of active locks of all types on the Yes
server.
Number of Packets Received in Count Number of packets received during the cur Yes
Network IO rent collection cycle.
Number of Packets Sent in Net Count Number of packets sent during the current Yes
work IO collection cycle.
Number of Server Transactions Count Total number of transactions during the cur Yes
rent collection cycle.
Number of Warning Flags Last Count Number of warning flags received during the Yes
Collection collection cycle.
Procedure Cache Hit Ratio Percentage Hit ratio in the procedure cache. Yes
Statement Cache Hit Ratio Percentage Hit ratio in the statement cache during the Yes
current collection cycle.
Thread System CPU Utilization Percentage CPU utilization percentage in handling system Yes
level operations for each thread.
Thread Total CPU Utilization Percentage Total CPU utilization obtained by adding Yes
Thread User CPU Utilization and Thread Sys
tem CPU Utilization.
Thread User CPU Utilization Percentage CPU utilization percentage in handling user Yes
committed queries for each thread.
Table 7: HADR Performance (KPI: HADR Statistics - applies only to HADR enabled servers)
Name Unit Description Alert
Bytes written by RSI thread KB per minute Number of bytes written by RSI thread per mi No
nute.
Bytes Received by EXEC thread KB per minute Number of bytes received by EXEC thread per No
minute.
DIST to DSI Latency MS Latency time from DIST thread to DSI thread. No
DSI to RDB Latency MS Latency time from DSI thread to RDB thread. No
EXEC to DIST Latency MS Latency time from EXEC thread to DIST thread. No
Free Transaction Log Space Percentage Percentage of free transaction log space. No
Log Records processed by Rep Minute Number of log records processed by Rep Agent No
per minute.
Agent
Log Records scanned by Rep Minute Number of log records scanned by Rep Agent per No
minute.
Agent
PDB to EXEC Latency MS Latency time from PDB thread to EXEC thread. No
Primary ASE Transaction Log MB Primary backlog of the transaction log. Yes
Backlog
Percentage of Free Transaction Percentage Percentage of free transaction log space. Yes
Log Space
Overall Ticket Latency MS The latency times at various points in the path Yes
between the primary database and the replicate
database.
Percentage of Device Usage in Percentage Percentage of device usage in the remote Repli Yes
Remote RS cation server.
Percentage of Device Usage in Percentage Percentage of device usage in the primary Repli Yes
Primary RS cation server.
State of a replication path Status The state of the replication path between a pri Yes
mary and a replicate database.
Primary Replication Queue Back MB Primary Replication Server queue backlog statis Yes
log tics.
Remote Replication Queue Back MB Remote Replication Server queue backlog statis Yes
log tics.
Configured Resource Percentage Maximum size of additional memory that can Yes
Additional Network be used for network packets that are larger
Memory than the default packet size.
Configured Resource Percentage The audit queue holds audit records gener Yes
Audit Queue Size
ated by user processes until the records can
be processed and written to the audit trail.
Configured Resource Percentage Size of the memory pool used for compres Yes
Compression Info Pool
sion.
Size
Configured Resource Percentage Initial number of disk I/O control blocks SAP Yes
Disk IO Structures
ASE allocates at start-up.
Configured Resource Percentage Total number of available locks for all users on Yes
Number of Locks
SAP ASE.
Configured Resource Percentage Maximum number of indexes that can be used Yes
Number of Open In
simultaneously on SAP ASE.
dexes
Configured Resource Percentage Maximum number of objects that can be open Yes
Number of Open Ob
simultaneously on SAP ASE
jects
Configured Resource Percentage Number of partitions that SAP ASE can ac Yes
Number of Open Parti
cess at one time.
tions
Configured Resource Percentage Amount of memory allocated for buffers used Yes
Number of Sort Buffers
to hold pages read from input tables and per
form index merges during sorts.
Configured Resource Percentage Size of the procedure cache. The procedure Yes
Procedure Cache Size
cache is used while running stored proce
dures.
Device Space Free Percentage Total amount of free space, in megabytes, on Yes
this device.
Segment Space Free Percentage Amount, in megabytes, of free space in the Yes
segment; collected separately for each seg
ment.
Server tempdb Free Percentage Amount, in megabytes, of free space in the Yes
Space tempdb database.
Note
The configured resource alerts are based on the percentage of the configured resource that is in use rather
than a fixed quantity of the resource. These alerts can be configured to fire when the percent utilization of
any of the configurable resources exceeds a configured threshold that may affect server capacity or
performance. For example, you can configure an alert whenever the number of locks in use is 80% or more
of the configured number of locks. This alert definition does not need to be changed if you increase or
decrease the number of locks configured on the server.
Statistics collection jobs provide the data that appears on the Statistics Chart on the MONITOR workset. Some
collection jobs are also used to manage and monitor alerts on the ALERTS workset.
Data gathered by collection jobs appears on the Statistics Chart page on the MONITOR workset. If you attempt
to view data for a collection job that has not been created, No data was found for statistic appears.
The Availability Statistics, Performance Statistics, and Capacity Statistics collection jobs are scheduled by
default. Additional collection jobs can be created and scheduled as needed.
You can define job schedules as one-time or repeating, and modify the schedule for a job based on a number of
attributes such as repeat interval, date and time. Statistics gathering consumes system resources intensively;
the more collection jobs you run, the greater the burden on your server. The data is stored in the repository.
The job history displays the status of jobs executed each day.
Besides the default collection job, you can create and schedule additional data collection jobs.
Prerequisites
Procedure
Field Description
6. Choose to start the job Now or Later. If you choose Later, specify the start date and time.
7. Specify the duration of this schedule. The job can run:
○ Once
○ Repetitively at an interval you specify
Field Description
Repeat interval Time period (in seconds, minutes, hours, or days) between job executions
Field Description
Repeat interval Time period (in seconds, minutes, hours, or days) between job executions
Stop date Date and time the job should stop running
Note
Enter dates and times using your local time. SAP ASE converts your times for remote time zones if
necessary.
You cannot change the duration of a schedule (the once/repetitively/until setting) after you create it. To
change the schedule duration, delete and recreate the schedule.
Procedure
If the General tab is grayed out, you have selected a schedule (child) rather than a job (parent) in the
Collection Jobs table. Select the parent job to enable the General tab.
Prerequisites
Context
Caution
Data gathered by the Availability Statistics, Performance Statistics, and Capacity Statistics collections is
used to trigger alerts. If you suspend one of these collection jobs, no new collection data is gathered on
which to trigger new alerts until you resume the collection job.
Procedure
Tip
If the General tab is grayed out, you have selected a schedule (child) rather than a job (parent) in the
Collection Jobs table. Select the parent job to enable the General tab.
Context
You can only view schedule details; you cannot modify them.
Procedure
You can modify the repeat interval for which a data collection is scheduled.
Prerequisites
Procedure
If there is no arrow to the left of the job name, the job is not scheduled.
Procedure
Once an application is running, the system administrator should monitor performance and may choose to
customize and fine-tune the system by changing server configuration parameters.
Prerequisites
Procedure
Set monitoring controls for screen refresh, chart and historical SQL trend periods, and list size for alerts and
historical SQL.
Procedure
Screen Refresh Interval (seconds) The period between refreshes of screens in the monitor. 30 seconds
Refreshing a screen redraws it using the most recent
available data.
Chart Trend Period (minutes) The period of time over which data is used in historical 30 minutes
charts on the Overview, Devices, Engines, and Segments
screens, and on the Statistics Chart.
Alert List Size The maximum number of alert notifications that can ap 100 alerts
pear in the Alerts table on the Overview screen. When the
Alerts table is full, adding a new alert notification causes
the oldest notification to be removed.
Historical SQLs Size The maximum number of active SQL statements that can 500 statements
appear in the Active SQLS table of the SQL Activity win
dow. When the Active SQLS table is full, adding new SQL
statements causes the oldest statement to be deleted.
Historical SQLs Trend Period The period of time during which SQL statements appear 5 minutes
in the Active SQLS table of the SQL Activity window.
View the server status, details about memory usage, CPU utilization, recent alerts, and performance status.
Procedure
Option Description
Status Server status displays the server’s name, software product and version, its
hardware platform, and an indication of whether the server is running.
Engine CPU Utilization Displays aggregate CPU utilization for all engines on this server. For infor
mation about individual server engines, see the Engines screen. Because all
I/O for a process goes through one engine, CPU usage is not always evenly
distributed across engines.
Device IO/Sec Displays device I/O per second, aggregated across all devices on this
server. For information about individual devices, see the Devices screen.
Details tab Displays information about this server, including number of days it has
been running, number of deadlocks, data cache hit rate, procedure cache
stalls, page and device sizes, maximum number of online engines, number
of open databases, and the dates and times of the server’s most recent re
start and of the clearing of these counters.
Configured Resources tab Displays usage statistics for many of the configured resources for this
server:
○ Current – amount of this resource the server is currently using.
○ Run value – configured maximum for this resource.
○ Percentage – percentage of the configured maximum represented by
the current use of this resource.
○ High Water Mark – maximum amount of this resource that has been
used since this server started.
Use the Percentage and High Water Mark columns to identify resources
that might be over- or under-configured.
Wait Events Displays a list of server-wide wait events, which can be very useful in per
formance tuning. Information about the wait events includes the number of
waits, wait time, average wait time, and wait description.
Licenses tab Displays information about software licenses on this server or cluster in
stance.
Alerts tab Displays, for this server, all alert notifications that have occurred since the
monitor view was opened. If any alerts have occurred since you last looked
at the Alerts tab, a yellow warning icon appears on the tab.
You can use the Alert List Size property on the Settings screen to control
the number of alerts that appears.
3. (Optional) If data collections are running, move the mouse over the Engine CPU Utilization graph to display
precise figures (values, times, and dates) for points on the curve.
4. (Optional) Move your mouse over the Device IO/Sec graph to display precise figures (values, times, and
dates) for points on the curve.
5. In the right pane, select page tabs to display:
○ Details
○ Configured Resources
○ Wait Events
○ Licenses
○ Alerts
a. Click Auto Refresh to allow additional log messages and performance details to be added to the viewer
as they occur.
b. Click Options to manage the table view, and copy and select data.
To show performance trends, generate a graph for any set of performance counters over a specified period of
time.
Prerequisites
Verify that statistical data to be graphed has been collected. To verify data collection, go to the Collection Jobs
page and check the History tab for a collection job.
Context
Tip
Data collections start running when a server is authenticated. A recently authenticated server might not
have accumulated enough data to make a useful graph.
Tip
The statistics chart displays data covering a fixed period of time, and that period does not change
automatically. If you are viewing the most recent statistics and want to keep the graph current, adjust
the displayed time period as new statistics are collected.
8. (Optional) You can click the date/time labels that appear above the slider. Use these to change the start
and end time and the chart time span.
9. (Optional) Click Clear Graph to remove all the graphed statistics and start anew.
Results
Note
You can graph a maximum of five statistics with no more than two distinct units of measure. By default,
only 24 hours of statistics are available; change the repository purge options to save statistics for a longer
period.
The Data Caches table shows the size and level of activity in each data cache, including hit rate (the percentage
of database requests that can be answered from the cache), volatility, number of partitions in this cache,
relaxed replacement, and physical reads and writes.
Procedure
Option Description
Pool Information Shows information about the pools of different sizes that
optimize I/O in the selected cache. Details include size,
usage, reread ratio, physical and dirty reads, pages
touched, buffers to MRU (most recently used), and
buffers to LRU (least recently used). The Buffers to MRU
and Buffers to LRU columns show buffers added to the
ends of the buffer list. The oldest buffers (the least
recently used) are flushed first.
Cached Objects Lists the tables in the selected data cache and their size,
in kilobytes. Click the Cached Size column heading to sort
the table by size.
The Procedure Cache tab displays information about the contents of the procedure cache, which is a memory
pool used for stored procedures and a variety of other objects.
Context
The functions that use the procedure cache are called modules—there are over 20 modules in the system.
Procedure
Option Description
Top 10 Procedure Cache Module Users Shows the modules that use the cache most heavily. The
Procedural Objects module contains stored procedures;
there is also a module for the statement cache. Use the
bar chart to see which parts of the system are using the
procedure cache.
Cached Procedures Lists the stored procedures in the cache (in the Proce
dural Objects Module). For each stored procedure, it gives
the name, database name, cached size, owner’s name,
compile date, and plan ID.
The Statement Cache tab displays information about SQL queries and query plans stored in the statement
cache.
Prerequisites
Statement cache monitoring is controlled by the two configuration options enable stmt cache
monitoring and statement cache size. For the Statement Cache tab to appear, the statement cache
must be configured in SAP ASE and the enable stmt cache monitoring option must be turned on in SAP
ASE.
Option Description
Statement Cache Summary Shows details about the size, hit count, and traffic in the
cache.
Cached Statement Text Shows the query selected in the Cached Statements ta
ble.
The in-memory storage tab displays information about server in-memory caches, the devices that are created
from this cache, and the databases on these devices.
Procedure
Option Description
In-memory Devices Shows information about the devices that are created
from in-memory storage. Details include name, size, space
used, start page and number of pages of memory usage.
Cached Objects Lists the tables and table indexes in the selected data
cache, and their cached size, in kilobytes. Click the Cached
Size column heading to sort the table by size.
Find out when a database's most recent backup started, whether it failed, whether a backup is currently in
progress, and more.
Procedure
The Databases table lists the type, durability, and DML logging status for each database. Also included for
each database is the ID, backup status, whether the transaction log is full, and whether there are
suspended processes. Processes may be suspended when the transaction log fills up. If a database is
unavailable, for example, because it is quiesced or is offline, the Name column includes the reason.
The type of database is indicated for temporary, in-memory, proxy and archive databases, and left blank
for all other databases. The Durability column indicates if a database is recoverable.
The tabs at the bottom of the screen are populated with information on the database you selected. When
you select a database, space usage is calculated before any data is shown; for a large database, this
calculation may take 30 seconds or more.
4. View the details of the database by clicking on the tabs:
Option Description
Details Displays information about space usage, including pie charts for data segments and log
segments. If this database does not have a log segment, the pie chart on the right
shows combined data and log segment usage.
Running Processes Displays information about processes that are currently using this database, including
the process ID, login, host, command, and transaction name.
Click a process ID in the SPID column to switch to the Processes view’s information
about that process.
Devices Used Displays information about devices on which this database stores its data, including the
device name, the amount of space used on that device, and the usage allocation (data
or log).
Click a device in the Name column to switch to the Devices view’s information about
that device.
Segments Used Displays information about segments used by this database, including the segment
name, the size of the segment in megabytes, and the amount of free space in the seg
ment.
Click a segment in the Name column to switch to the Segments view's information
about that segment.
Unused Indexes Lists indexes in this database that have not been used since the server was last re
started.
Frequently Used Tables Displays information about tables in this database that have been used since the server
was last restarted, including the table name, index ID, logical and physical reads, lock
requests and waits, and contention statistics.
View details about devices that make up each segment, the tables and indexes used, and space usage.
Procedure
View database statistic details such as data and empty page counts, space utilization, and other statistics for a
selected database.
Context
Note
To execute this command, you must have an agent configured for your SAP ASE server.
Procedure
Related Information
Display information about all devices that store databases server. A device can be an entire disk drive, or any
part of a disk or file system.
Monitor device statics and determine how long it takes a device to respond to I/O requests and what its I/O
rate is.
Context
High response time can indicate problems in the functioning of the physical device or the storage layer,
problems with the configuration of the storage layer, or that the device is busy.
Procedure
Option Description
Details ○ A pie chart showing space usage on the selected device. Includes used and unused space,
in megabytes, and as percentages of all the available space on the device. The title above
the chart indicates the total available space.
○ Device IO/Sec – a line graph showing the rate of I/O per second on the selected device
over the current trend period. The graph shows the sum of reads, writes, and asynchro
nous prefetch (APF) reads. Because the graph shows a rate, and the read, write, and APF
read figures in the table are changes since the last refresh, the values do not correspond.
Note
Device IO/Sec graph for in-memory devices is not displayed.
Advanced ○ Device IO Response Time – a line graph showing the response time, in milliseconds, for I/O
operations performed on the selected device.
○ Device APF Reads/Sec – a line graph showing the rate of asynchronous prefetch read op
erations, per second, on the selected device. APF reads indicate that table scans are taking
place.
Note
The Advanced tab is not displayed for in-memory devices.
The Devices table includes device semaphore statistics. The device semaphore controls access to device
I/O; a high ratio of Device Semaphore Waits to Device Semaphore Requests indicates contention. If IO Wait
Time is high enough to cause concern, you can redistribute the data on the physical devices.
View the current condition of the database and track performance as conditions change.
View CPU utilization percentages, I/O processing, number of connections, garbage collector's maximum queue
size and counts, and the operating system process identifier (OS PID) for each engine.
Procedure
Option Description
IO Processing table Provides counts of disk I/O checks, checks without waits, polls, and completed
operations over the current trend period.
Garbage Collection table For the current trend period, provides the garbage collector's maximum queue
size and counts of pending items, high water mark items, and overflows.
Engine CPU Utilization graph A line graph showing CPU utilization for this engine as a percentage. If the server
is performing poorly, use the information from this graph to determine how busy
the engines are.
SAP ASE assigns tasks to thread pools, and all thread pools have threads. Each thread pool includes a
scheduler that assigns tasks to threads.
SAP ASE contains both system-created and user-created thread pools. All system-defined thread pools start
with the syb_ prefix (for example syb_default_pool). Names for user-defined thread pools cannot start
with the syb_ prefix and must follow the naming conventions for objects
Display thread pool details, CPU utilization, associated kernel task, and the threads associated with specific
thread pools.
Prerequisites
Procedure
Details Displays information about affinity and number of ticks in the selected thread, includ
ing:
○ Total number of ticks
○ Number of idle ticks
○ Number of sleeping ticks
○ Number of busy ticks
Also displays page faults and operating system context switches with the current
thread, including:
○ Number of minor and major page faults
○ Operating system thread ID and alternative thread ID
○ Number of voluntary and forced context switches
Thread CPU Utilization Displays graphs depicting user and system CPU utilization.
Note
For graphs to appear, one or more data collection jobs must be scheduled.
Tasks Displays a list of all the kernel task names and IDs associated with thread pools.
Identify resource-intensive process, blocking process, the lead blocker in a chain, and wait events and SQL
queries associated with a process.
Lock icons in the SPID column of the Processes table identify processes that are blocked (a dimmed lock) or
blocking (a gold lock) other processes. Other columns of the Processes table include the family ID (which is the
parent SPID value), processes blocked by an SPID, CPU activity, CPU cumulative activity, disk I/O activity, and
disk I/O cumulative activity.
On the Blocked Processes tab, SAP ASE Cockpit shows the lock request process that is blocking another
process, not the blocking lock itself. A yellow warning icon appears on the Blocked Processes tab label when
there are any blocked processes.
Blue Selected
Find the user processes that are consuming the most system resources on the selected SAP ASE server.
Context
You can choose a system resource (CPU, disk I/O, incoming network traffic, or outgoing network traffic) and
display information about the user processes that are using the chosen resource most intensively. For each
system resource, you can rank the processes by cumulative or most recent activity values. Each bar in the
graph represents the value of the selected metric for a process.
Procedure
○ CPU Cumulative – cumulative CPU activity since the server started or the counter wrapped.
○ CPU Activity – CPU activity, per second, since the last screen refresh.
○ Disk I/O Cumulative – cumulative disk I/O since the server started or the counter wrapped.
○ Disk I/O Activity – I/O activity per second since the last screen refresh.
○ Incoming Network Traffic Cumulative – cumulative incoming network traffic since the server started or
the counter wrapped.
○ Incoming Network Traffic Activity – incoming network traffic per second since the last screen refresh.
○ Outgoing Network Traffic Cumulative – cumulative outgoing network traffic since the server started or
the counter wrapped.
○ Outgoing Network Traffic Activity – outgoing network traffic per second since the last screen refresh.
4. (Optional) Move your mouse over a bar in the graph to display the server process ID (SPID) and the value of
the selected system resource metric for the process.
5. (Optional) Select Only display user processes below to filter out system processes, and display only user
process information.
6. (Optional) Click a bar in the graph to highlight information about that process in the table below.
7. Select a process to display its information in the tabs.
Option Description
SQL The SQL statement and query plan for the selected proc
ess
Wait Events Information about wait events for the selected process, in
cluding number of waits, wait times, and wait descriptions
Find user processes that are blocked and the processes that are blocking them.
Procedure
Option Description
SQL The SQL statement and query plan for the selected proc
ess
Wait Events Information about wait events for the selected process, in
cluding number of waits, wait times, and wait descriptions
Note
Identifying the lock held by a blocking process is not always straightforward. For example, the blocking
process does not necessarily hold a page lock; it might hold a table lock. For this reason, the lock
request process that is blocking another process is shown, not the blocking lock.
8. Click the Blocked Processes tab to display additional information about blocked processes, including
details about the lock, the row number, the page number, and the lock configuration options.
For information on handling blocked processes, see the locking reports chapter of the Performance and Tuning
Series: Locking and Concurrency Control.
Context
When Process A blocks Process B, which blocks Process C—and so on—the blocking processes form a chain.
Procedure
Note
Identifying the lock held by a blocking process is not always straightforward. For example, the blocking
process does not necessarily hold a page lock; it might hold a table lock. For this reason, the lock
request process that is blocking another process is shown, not the blocking lock.
Option Description
SQL The SQL statement and query plan for the selected proc
ess
Wait Events Information about wait events for the selected process, in
cluding number of waits, wait times, and wait descriptions
6. (Optional) Click the All Processes tab at the top of the window.
In the table below the bar graph, rows that are highlighted in yellow indicate blocking processes. Rows that
are highlighted in red indicate blocked processes.
For information on handling blocked processes, see the Performance and Tuning Series: Locking and
Concurrency Control.
See the SQL statement and query plan for a user process.
Procedure
If the selected process is active, displays the SQL statement and query plan for the query that the process
is executing.
Display a list of all events a for which a process is waiting. Wait events are internal states that represent
conditions that cause a process to stop.
Procedure
Monitor the segments used by the server. View the name of the database that uses the segment, the
database’s size and unused space on the segment, and the number of thresholds.
Find reserved space figures for tables on a segment, show current space usage, and find devices mapped to a
segment.
Context
You can sort tables by reserved size, which simplifies planning for a reorganization or rebuild.
Procedure
Option Description
Devices Used Displays devices included in the selected segment and the size of each device, in megabytes.
Click a name in the Device column to switch to the Devices monitoring view’s information for
that device.
Used Tables Displays tables allocated on the selected segment and the reserved size of each table, in kilo
bytes.
Used Indexes Displays indexes allocated on the selected segment and the table associated with each index.
If a transaction affects more than one database, only the transaction’s current database and the process that
started the transaction are displayed.
Display information about a currently running transaction, including the process that initiated the transaction.
Procedure
Procedure
Note
The SQL Activity screen displays SQL text for only the most recent collection interval.
See Capacity (KPI: ASE Capacity Statistics) for a lists of configured resources that show performance trends.
Related Information
To show performance trends, generate a graph for any set of performance counters over a specified period of
time
Context
Tip
Data collections start running when the SAP ASE Cockpit server starts and systems running on the host are
auto discovered. However, recently discovered systems might not have accumulated enough data to make
a useful graph.
If you attempt to view data for a collection job that has not been created, No data was found for
statistic appears.
Tip
The statistics chart displays data covering a fixed period of time, and that period does not change
automatically. If you are viewing the most recent statistics and want to keep the graph current, adjust
the displayed time period as new statistics are collected.
8. (Optional) You can click the date/time labels that appear above the slider. Use these to change the start
and end time and the chart time span.
9. (Optional) Click Clear Graph to remove all the graphed statistics and start a new.
Results
Note
You can graph a maximum of five statistics with no more than two distinct units of measure. By default,
only 24 hours of statistics are available; change the repository purge options to save statistics for a longer
period.
Lists and describes the key performance indicators (KPIs) that show performance trends.
For information about the always-on licensed option performance indicators, see HADR KPIs [page 304]
SAP ASE
Statistics KPI Name Description Data Collection Name
Number of Blocked Proc Number of currently blocked processes that ASE Availability Statistics
esses have been blocked for more than 5 seconds.
The heat chart uses this metric to display
server status.
Number of Database Dump Number of failed database dumps. ASE Availability Statistics
Failures
Number of Suspended Number of processes that are currently sus ASE Availability Statistics
Processes pended. The heat chart uses this metric to
display server status.
Server Availability Status Status of the SAP ASE server. Values of most ASE Availability Statistics
interest are stopped and running.
Server Device IO Rate Total number of I/O operations performed by ASE Availability Statistics
all devices on the server during the current
collection cycle.
Server Percent CPU Utiliza Average CPU utilization percentage across all ASE Availability Statistics
tion active engines on the server.
ASE Ca Configured Resource Addi Maximum size of additional memory that can ASE Capacity Statistics
tional Network Memory be used for network packets that are larger
pacity Statis
than the default packet size.
tics
Configured Resource Audit The audit queue holds audit records gener ASE Capacity Statistics
Queue Size
ated by user processes until the records can
be processed and written to the audit trail.
Configured Resource Com Size of the memory pool used for compres ASE Capacity Statistics
pression Info Pool Size
sion.
Configured Resource Disk Initial number of disk I/O control blocks SAP ASE Capacity Statistics
IO Structures
ASE allocates at start-up.
Configured Resource Mem Amount of memory used by worker proc ASE Capacity Statistics
ory Per Worker Process
esses.
Configured Resource Num Number of auxiliary scan descriptors availa ASE Capacity Statistics
ber of Aux Scan Descrip
ble in a pool shared by all users on a server.
tors
Configured Resource Num Total number of available locks for all users ASE Capacity Statistics
ber of Locks
on SAP ASE.
Configured Resource Num Number of mailbox structures allocated by ASE Capacity Statistics
ber of Mailboxes
SAP ASE.
Configured Resource Num Number of message structures allocated by ASE Capacity Statistics
ber of Messages
SAP ASE
Configured Resource Num Maximum number of indexes that can be ASE Capacity Statistics
ber of Open Indexes
used simultaneously on SAP ASE.
Configured Resource Num Maximum number of objects that can be ASE Capacity Statistics
ber of Open Objects
open simultaneously on SAP ASE
Configured Resource Num Number of partitions that SAP ASE can ac ASE Capacity Statistics
ber of Open Partitions
cess at one time.
Configured Resource Num Amount of memory allocated for buffers ASE Capacity Statistics
ber of Sort Buffers
used to hold pages read from input tables
and perform index merges during sorts.
Configured Resource Num Maximum number of user connections that ASE Capacity Statistics
ber of User Connections
can simultaneously be connected to SAP
ASE.
Configured Resource Num Maximum number of worker processes that ASE Capacity Statistics
ber of Worker Processes
SAP ASE can use at any one time for all si
multaneously running parallel queries.
Configured Resource Per Number of cache protectors per task. ASE Capacity Statistics
mission Cache Entries
Configured Resource Pro Size of the procedure cache. The procedure ASE Capacity Statistics
cedure Cache Size
cache is used while running stored proce
dures.
Device Space Free Total amount of free space, in megabytes, on ASE Capacity Statistics
this device.
Segment Space Free Amount, in megabytes, of free space in the ASE Capacity Statistics
segment; collected separately for each seg
ment.
Server tempdb Free Space Amount, in megabytes, of free space in the ASE Capacity Statistics
tempdb database.
ASE Per Average Blocked Process Average time, in milliseconds, that the cur ASE Performance Statistics
Wait Time rent blocked processes have waited.
formance
Statistics Cache Hit Ratio Hit ratio in the data cache during the current ASE Performance Statistics
collection cycle.
Device APF Reads Rate of asynchronous prefetch read opera ASE Performance Statistics
tions per second on the selected device.
Device IO Rate Rate of I/O operations per second on this de ASE Performance Statistics
vice.
Device IO Response Time Response time, in milliseconds, for I/O oper ASE Performance Statistics
ations performed on this device.
Engine CPU Utilization CPU utilization for this engine as a percent ASE Performance Statistics
age.
Long Running Transaction Execution time of longest running transaction ASE Performance Statistics
Execution Time
Number of Address Locks Number of address-level locks server-wide. ASE Performance Statistics
Number of Cache Misses Number of times that a needed page was not ASE Performance Statistics
found in a cache and had to be read from
disk.
Number of Cache Searches Number of cache searches, including hits and ASE Performance Statistics
misses for all caches combined.
Number of Critical Flags Number of critical flags received during the ASE Performance Statistics
Last Collection collection cycle.
Number of Deadlocks Number of deadlocks on the server since the ASE Performance Statistics
most recent execution of the collection.
Number of Error Flags Last Number of error flags received during the ASE Performance Statistics
Collection collection cycle.
Number of Information Number of information flags received during ASE Performance Statistics
Flags Last Collection the collection cycle.
Number of Locks Total number of active locks of all types on ASE Performance Statistics
the server.
Number of Packets Re Number of packets received during the cur ASE Performance Statistics
ceived in Network IO rent collection cycle.
Number of Packets Sent in Number of packets sent during the current ASE Performance Statistics
Network IO collection cycle.
Number of Page Locks Number of page-level locks server-wide. ASE Performance Statistics
Number of Row Locks Number of row-level locks server-wide. ASE Performance Statistics
Number of Server Transac Total number of transactions during the cur ASE Performance Statistics
tions rent collection cycle.
Number of Table Locks Number of table-level locks server-wide. ASE Performance Statistics
Number of Warning Flags Number of warning flags received during the ASE Performance Statistics
Last Collection collection cycle.
Procedure Cache Hit Ratio Hit ratio in the procedure cache. ASE Performance Statistics
Statement Cache Hit Ratio Hit ratio in the statement cache during the ASE Performance Statistics
current collection cycle.
Segment Space Usage Change in megabytes in the amount of space ASE Performance Statistics
used by this segment since the last refresh.
sp_who Response Time Time, in milliseconds, the sp_who stored ASE Performance Statistics
procedure takes to return a response.
sp_who is called each time collection_
ase_histmon is executed to collect perform
ance statistics.
Thread System CPU Uti CPU utilization percentage in handling sys ASE Performance Statistics
lization tem level operations for each thread.
Thread Total CPU Utiliza Total CPU utilization obtained by adding ASE Performance Statistics
tion Thread User CPU Utilization and Thread Sys
tem CPU Utilization.
Thread User CPU Utiliza Thread User CPU Utilization ASE Performance Statistics
tion
Data Caches Cache Hit Ratio Hit ratio in the data cache during the current ASE Performance Statistics
collection cycle.
Number of Cache Searches Number of cache searches, including hits and ASE Performance Statistics
misses for all caches combined.
Number of Cache Misses Number of times that a needed page was not ASE Performance Statistics
found in a cache and had to be read from
disk.
Devices Device APF Reads Rate per second of asynchronous pre-fetch ASE Performance Statistics
read operations on this device.
Device IO Rate Rate of I/O operations per second on this de ASE Performance Statistics
vice.
Device IO Response Time Response time, in milliseconds, for I/O oper ASE Performance Statistics
ations performed on this device.
Device Space Free Total amount of free space, in megabytes, on ASE Capacity Statistics
this device.
Engines Engine CPU Utilization Percentage of CPU cycles used by this SAP ASE Performance Statistics
ASE engine.
Segments Segment Space Usage Change, in megabytes, in the amount of ASE Performance Statistics
space used by this segment since the last re
fresh.
Threads Thread User CPU Utiliza CPU utilization percentage in handling user ASE Performance Statistics
tion committed queries for each thread.
Thread System CPU Uti CPU utilization percentage in handling sys ASE Performance Statistics
lization tem level operations for each thread.
Thread Total CPU Utiliza Total CPU utilization obtained by adding ASE Performance Statistics
tion Thread User CPU Utilization and Thread Sys
tem CPU Utilization.
Use the HADR dashboard to display primary and standby servers, HADR system status, synchronization mode,
and synchronization state.
The dashboard is the primary site for administering and monitoring the HADR system.
Note
Be aware that plotting area charts can require a significant amount of time after the collection job is first
scheduled. It requires at least two data points in order to plot area charts which can take approximately 10
minutes when the HADR collection interval is set to the default value of 5 minutes. For example, displaying
the latency chart in the HADR Dashboard can take approximately 15 minutes after the HADR collection job
is first scheduled.
The SAP ASE Cockpit dashboard displays two boxes representing two replication systems, each surrounding a
smaller box representing the primary or standby server. Primary servers are displayed in a light yellow color,
standby servers are in a light grey.
The server on the left is the server (primary or standby) on which you are currently focused. The replication
system boxes display the site name, HADR system status, synchronization mode, and synchronization state.
The server boxes display the logical host name, host-name, and the port number on which the server is run.
A green line between the boxes indicates the systems are successfully replicated. A red line indicates that
replication is stopped. A grey line indicates that replication is suspended.
The Service Component Status and the Replication Paths Status summarize the status of all components in
the Service Component panel and in the Replication Paths table, respectively. The Service Component Status
and the Replication Paths Status are shown as blue labels, and their text and icon are clickable. Clicking the
Service Component Status label opens the Service Components panel on the bottom of the dashboard.
Clicking the Replication Paths Status label opens the Replication Paths table.
● A green arrow with an Active label indicates there are no warnings or errors in any service component.
● A yellow icon with an exclamation mark indicates that warnings exists in at least one of the service
components, replication paths, or alerts.
● A red icon with an exclamation mark indicates that at lease one error exists in any of the service
components.
RMA is considered active if any local RMA or remote RMA is up. Otherwise it is considered inactive.
● Unknown – After its initial start up, the Cockpit Server has not yet received any communication from the
Fault Manager, so it is not known whether the Fault Manager is configured.
● Up – After receiving any message from the Fault Manager
● Down – After timing out the communication with the Fault Manager for not receiving any message from the
Fault Manager
● Hibernate – After receiving a FM_HIBERNATE message from the Fault Manager
To the right of the Service Components page is the Fault Manager Messages table. It shows up to 100
messages, with the most recent message on top. There are two types of Fault Manager Messages: fault and
recovered. All high severity messages are shown in red. recovered messages are shown in green. Lower
severity messages are shown in black. Whenever a new Fault Manager is received, it automatically switches the
screen to the Service Components screen to display the new Fault Manager message.
On top of the Fault Manager Message table is a Clear button that clears all messages in the table when
selected.
● ○ A green arrow with an Active label indicates there are no warnings or errors in any State, Log Records,
Backlog, Rep Agent, or Latency columns.
For the State column, an Inactive and Suspended message indicates a warning; Down, Incomplete and
Unknown indicates an error; an Active message indicates the status is healthy.
○ A yellow icon with an exclamation mark indicates that warnings exists in State, Log Records, Backlog,
or Latency columns.
○ A red icon with an exclamation mark indicates that at lease one error exists one of the columns.
Option Description
Rep Agent Indicates whether the Rep Agent Thread is running or not.
Select tabs on the on the bottom of the HADR dashboard to view the status of RMA, the Fault Manager, and
Replication Server. You can also display log messages, view latency, and configure Rep Agent parameters.
Option Description
Service Components Provides status information about the RMA, the Fault Man
ager, and Replication Server. Select Clear to clear all Fault
Manager messages.
Log Records Displays graphs for the % of Free Transaction Log, Log Re
cords Scanned, and Log Records Processed KPIs for the re
plicated database.
Latency Shows the Overall Latency and Latency associated with the
Total Latency, PDA_EXEC Latency, EXEC_DIST Latency,
DIST_DSI Latency, and the DSI_RDB Latency KPIs for the re
plicated system, in milliseconds, over time
Rep Agent Start and stop Rep Agent, or change Rep Agent configura-
tion parameters. Clicking Current Context shows the current
context of the Rep Agent. Only stream replication is shown
for HADR. See Modify Replication Agent Configuration Pa
rameters [page 304].
SAP ASE Cockpit allows you to manage an SAP ASE server and helps you perform complex administration
tasks without the need to remember the syntax of Transact-SQL commands or system stored procedures.
Search for a list of objects based on the resource, resource type, object type, and name.
Procedure
2. (Optional) In the left pane, click the Browse tab, expand ASE Servers , click the category for the object
type for which you want to search, then select an object type.
3. Click the Search tab.
If you selected the resource and object type from the Browse tab, your selection in listed in the Object type
pull-down menu. The resource type is ASE Servers.
4. Enter the full or partial name of the object in the Search string text box.
The text search is case insensitive.
5. (Optional) Click Exact Match to display only objects with names matching the exact search string.
6. Click Search.
7. (Optional) If the request cannot be displayed within the given threshold limits, a message row is displayed;
providing status of the retrieval request. Depending on the type of processing issue involved, you can
choose to cancel, expand, or retry the retrieval request. Hovering your mouse over the message row
provides information specific to the type of processing issue.
Processing of data retrieval from a search request can result in a message row being displayed.
Context
Processing of data retrieval may be slow due to various problems such as: a slow network connection or a
heavy server load, the result set may be larger than the threshold display or time limit, or an error can occur
and the request cannot be displayed.
Procedure
Use the Search tab to search for objects and display results in the right pane.
○ Processing request - (Optional) Click the drop-down arrow on the message row and select Cancel.
When the processing of data retrieval is slower than the set display time, a message row is displayed. By
default, the time period after which a message row is displayed is seven seconds. Once the requested data
is available, the actual result set is displayed, replacing the message row. Once Cancel is chosen the
processing request is stopped and you see a new message row with an option to retry the request.
○ Number of Rows - (Optional) Click the drop-down arrow on the message row and select Expand.
When the requested result set size exceeds the threshold display limit, a message row is displayed. The
default threshold display limit for rows is 500. Hovering your mouse over the message row provides the
number of rows. Selecting Expand allows you to see the entire result set.
When you select Expand an expanded message row is displayed below any remaining message rows once
the processing is complete. If the processing takes a large amount of time, then you have the option of
canceling the processing by selecting Cancel from the context menu of the expanded message row.
Note
If the number of rows are large (in the thousands), SAP recommends that you use the Search tab to
narrow your results.
○ Error - (Optional) Click the drop-down arrow on the message row and select Retry.
If a result set cannot be returned, a message row is displayed indicating an error has occurred. Hovering
your mouse over the message row provides the reason for the exception.
Replace existing compiled objects with a new definition while preserving the original name, object ID, auditing
options, and permissions.
A compiled object is any object that requires entries in the sysprocedures table.
When granular permissions is enabled or disabled, you must be the object owner to replace a compiled object.
You cannot impersonate a user through an alias or by using setuser. However, if you are the owner through
set proxy, you can replace a compiled object.
Replacing compiled objects is achieved by either using the Replace option from an object's context menu, or
adding an object and specifying a new definition for an existing object.
When adding an object to replace a complied object definition, you must specify the same compiled object
name, owner, and database location in the Add wizard.
● Stored procedures
● SQLJ procedures
● Extended stored procedures
● Views
● Triggers
● Scalar user-defined functions
● SQLJ functions
● Rules
● Defaults
Context
You can use the Execute SQL view to run any valid SQL statement, including queries and stored procedures.
Anyone can launch a query; no permissions are required. However, if you do not have authority to perform the
actions in the query, SAP ASE Cockpit displays an error.
SQL history is saved when the history has been changed from previously saved history. You can clear the
history by clicking Clear SQL.
6. Click Execute.
The query runs on all the servers you selected, and results appear in the bottom portion of the view. The
view includes a results tab for each server. On the tabs:
○ A green check indicates a successful query.
○ A red X indicates an error. A tab with a red X also displays an error message.
Related Information
Tables consist of columns and rows that contain data on a database. SAP ASE uses the following types of
tables:
● A system table stores information that allows the database to perform its services.
● A user table stores and provides access to user data.
● A proxy table accesses data on remote servers.
Note
● Decide what columns you need in the table, and the datatype, length, precision, and scale, for each.
● Create any new user-defined datatypes before you define the table where they are to be used.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
Using a segment to put a table on a specific database device can improve performance and give increased
control over placement, size, and space usage of database objects.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
Context
Conversions between allpages locking and data-only locking schemes can be expensive in time and I/O and
require sufficient free space. Convert the locking scheme by creating copies of the tables and re-creating
indexes. You must also dump the affected databases, and update statistics before changing between allpages
locking and data-only locking schemes.
Conversions between data page and data row locking are quick and inexpensive, and implemented by updates
to system tables. The data page and data row schemes are collectively called data-only locking.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Reorganize tables, table partitions, indexes, and index partitions to improve performance by reclaiming unused
page space, removing row forwarding, or rewriting all table rows to new pages, depending on the option used.
For additional information about reorganization, see Using the reorg Command in the System Administration
Guide: Volume 2.
Prerequisites
You must be a system administrator, or have reorg any table permissions when granular permissions is
enabled.
Context
Procedure
2. In the left pane, expand ASE Servers Schema Objects Database , then choose one of the following:
○ User Databases
Compact Reclaim space and remove row Not supported with all-pages-locked
forwarding. tables.
Rebuild ○ Remove row forwarding and Requires that the select into database
reclaim unused page space.
option to be true.
○ Rewrite all rows to accord with a
clustered index for a table, if it Not supported with system tables.
has one.
○ Write rows to data pages to
accord with any changes made in
space management settings
through sp_chgattribute.
○ Drop and re-create all indexes
belonging to the table.
Reclaim space Reclaim unused page space resulting Not supported with all-pages-locked
from deletions and row-shortening tables.
updates.
Compress Compress the rows affected by the reorganization. Available only when one of these
reorganization types is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
Resume Start reorganization at the point in a table where Available only when one of these
the previous reorganization left off. reorganization types is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
○ Defragmentation, and resuming
reorganization on a single table is
feasible.
Time Specify the length of time allowed for running Available only when one of these
reorganization. reorganization types is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
○ Defragmentation
Skip compact Specify the occupancy threshold of the extent. SAP Available only when Defragmentation is
extents ASE reorganizes only the extents for which selected.
compactness falls below the occupancy threshold;
extents with a compactness higher than the
threshold are not reorganized.
Related Information
Reorganize one or more tables to improve performance. By default, reorganization reorganizes all indexes
within the selected table.
Prerequisites
You must be a system administrator, or have reorg any table permissions when granular permissions is
enabled.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
○ Temporary Databases
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Space utilization uses the average row size and number of rows to compute the expected minimum
number of data pages, and compares the expected minimum to the current number of pages. If space
utilization is low, run reorganization.
See Performance and Tuning Series: Improving Performance with Statistical Analysis.
Space utilization is 0 when row count is equal to 0. For derived statistics on space utilization, the row count
is based on the information from systabstats.
If statistics have not been updated recently and the average row size has changed, or if the number of rows
and pages are inaccurate, space utilization may report values greater than 1.0.
6. On the Commands page, select the type and level of reorganization.
Compact Reclaim space and remove row Not supported with all-pages-locked
forwarding. tables.
Rebuild ○ Remove row forwarding and Requires that the select into database
reclaim unused page space.
option to be true.
○ Rewrite all rows to accord with a
clustered index for a table, if it Not supported with system tables.
has one.
○ Write rows to data pages to
accord with any changes made in
space management settings
through sp_chgattribute.
○ Drop and re-create all indexes
belonging to the table.
Reclaim space Reclaim unused page space resulting Not supported with all-pages-locked
from deletions and row-shortening tables.
updates.
Compress Compress the rows affected by the reorganization. Available only when one of these
reorganization types is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
Resume Start reorganization at the point in a table where Available only when one of these
the previous reorganization left off. reorganization types is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
○ Defragmentation, and resuming
reorganization on a single table is
feasible.
Time Specify the length of time allowed for running Available only when one of these
reorganization. reorganization types is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
○ Defragmentation
Skip compact Specify the occupancy threshold of the extent. SAP Available only when Defragmentation is
extents ASE reorganizes only the extents for which selected.
compactness falls below the occupancy threshold;
Related Information
Prerequisites
You must be a system administrator, or have reorg any table permissions when granular permissions is
enabled.
Context
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
Compact Reclaim space and remove row Not supported with all-pages-locked
forwarding. tables.
Reclaim space Reclaim unused page space resulting Not supported with all-pages-locked
from deletions and row-shortening tables.
updates.
Compress Compress the rows affected by the Available only when one of the
reorganization. following is selected:
○ Compact
○ Forwarded rows
○ Reclaim space
Resume Start reorganization at the point in a Available only when one of the
table where the previous following is selected:
reorganization left off. ○ Compact
○ Forwarded rows
○ Reclaim space
○ Defragmentation, and resuming
reorganization on a single table
partition is feasible.
Skip compact extents Specify the occupancy threshold of Available only when Defragmentation
the extent. SAP ASE reorganizes only is selected.
the extents for which compactness
Related Information
Prerequisites
You must be a system administrator, or have reorg any table permissions when granular permissions is
enabled.
Context
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
See Performance and Tuning Series: Improving Performance with Statistical Analysis.
Space utilization is 0 when row count is equal to 0. For derived statistics on space utilization, the row count
is based on the information from systabstats.
8. On the Commands page, select the type and level of reorganization.
Rebuild ○ Remove row forwarding and Requires that the select into database
reclaim unused page space.
option is set to true.
○ Rewrite all rows to accord with a
clustered index for a table, if it Not supported with system tables.
has one.
Rebuilding an index on an all-pages-
○ Write rows to data pages to
accord with any changes made in locked table is not supported.
space management settings
through sp_chgattribute.
○ Drop and re-create all indexes
belonging to the table.
9. If you selected Reclaim space in the previous screen, select your reorganization options:
Prerequisites
You must be a system administrator, or have reorg any table permissions when granular permissions is
enabled.
Context
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ System Tables
○ Temporary Databases
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Space utilization is 0 when row count is equal to 0. For derived statistics on space utilization, the row count
is based on the information from systabstats.
10. On the Commands page, select the type and level of reorganization.
Rebuild ○ Remove row forwarding and Requires that the select into database
reclaim unused page space.
option is set to true.
○ Rewrite all rows to accord with a
clustered index for a table, if it Not supported with system tables.
has one.
Rebuilding an index partition on an
○ Write rows to data pages to
accord with any changes made in all-pages-locked table is not
space management settings supported.
through sp_chgattribute.
○ Drop and re-create all indexes
belonging to the table.
Related Information
Reorganizing large amounts of data may take a long time. During reorganization, you can view the status and
possible errors.
Reorganization commands run asynchronously. The process bar displays the percentage of reorganization
completed. You can also view the total commands, executed commands, and errors reported during your
reorganization.
Close – closes the Reorganization Result window and continues to run the reorganization commands in the
background.
Grant or revoke permissions on tables or columns for users, groups, and roles.
You can grant and revoke permissions on a table based on the grantee type; users, groups, or roles, then select
a specific grantee. You can grant or revoke permission for specific columns belonging to a table.
You can also grant permission with predicated privileges, which are privileges subject to conditions that are
evaluated when data is accessed. Row-level access control can be granted on a given object based on
conditions expressed through a general SQL where clause.
As an example of the where clause in a SQL statement, the following describes how to grant access to a group
of engineers, allowing each member to see only his or her own salary and the salary of any direct reports.
Note
To grant or revoke predicated privileges, set the configuration parameter enable predicate
privileges to 1.
Context
Table owners and database owners can grant database object permissions on a table.
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
○ Users
○ Groups
○ Roles
8. On the Grantee page, select one or more grantees.
9. On the Columns and Options page, select the columns on which to set permissions.
10. On the Permission screen:
a. Select the types of permissions allowed for the selected grantees.
b. (Optional) Click With grant option to allow the specified users to grant object access permissions to
other users.
c. (Optional) Click With predicated privileges.
d. Enter the where search conditions.
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Context
Table owners and database owners can revoke database object permissions from a table.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
○ Click Revoke all permission to revoke all permissions shown in the Revoke Permissions window.
○ Click individual cells to revoke the currently granted permissions. The cell changes to show an "x,"
indicating that the permission type is no longer granted.
○ Click Revoke all permission with predicate to revoke all permissions with a predicate shown in the
Revoke Permissions window.
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ Users
○ Groups
○ Roles
10. On the Grantee page, select one or more grantees.
11. On the Permission page:
a. Select the types of permissions allowed for the selected grantees.
Option Description
b. (Optional) Click With grant option to allow the specified users to grant object access permissions to
other users.
c. (Optional) Click With predicated privileges.
d. Enter the where search conditions.
The search conditions act as a row filter, with the where clause specified on select, update, or
delete. Search conditions can use all syntax allowed in a generic where clause.
e. (Optional) Enter a correlation name.
The correlation name is an alias for referencing columns in the selected table within the where clause.
f. (Optional) Enter a name for the predicate.
12. (Optional) Click Preview to see the SQL statements for your command.
Related Information
Prerequisites
To grant or revoke predicated privileges, set the configuration parameter enable predicate privileges
to 1.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
○ Click Revoke all permission to revoke all permissions shown in the Revoke Permissions window.
○ Click individual cells to revoke the currently granted permissions. The cell changes to show an "x,"
indicating that the permission type is no longer granted.
○ Click Revoke all permission with predicate to revoke all permissions with a predicate shown in the
Revoke Permissions window.
Related Information
Create a user or proxy table to store and provide access to user data.
Context
A proxy table is a user table that allows you to access data in a remote table, view, remote procedure call,
directory, or file. A proxy table has all the attributes of a user table, such as columns, indexes, and triggers, but
it does not contain any data locally.
Note
Only a database owner or a user with create table permission can create a table.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the left pane, do one of:
For example, this SQL statement creates a table called titles in the pubs2 database:
create table titles
(title_id tid,
title varchar(80) not null,
type char(12),
pub_id char(4) null,
price money null,
advance money null,
royalty int null,
total_sales int null,
notes varchar(200) null,
pubdate datetime,
contract bit not null)
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the left pane, do one of:
An index provides quick access to data in a table, based on the values in specified columns.
Context
An index is created on one or more table columns and points to the place where the column data is stored on
disk. Indexes speed data retrieval and are useful for enforcing referential integrity. A table can have more than
one index.
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the left pane, do one of:
○ Make this index unique – If the index is unique, you can ignore duplicate keys in the Duplicate
Keys/Row window.
○ Make this index clustered – If the index is clustered, specify how you want the server to handle requests
to insert duplicate rows in a table in the Duplicate Keys/Row window.
13. (Optional) On the Duplicate Key page:
○ Click Ignore duplicate keys to ignore duplicate keys rather than abort the transaction.
○ Most recently used replacement – reads new pages into the LRU end of the chain of buffers in cache.
The pages are used and immediately flushed when a new page enters the MRU end. This strategy is
advantageous when a page is needed only once for a query. It tends to keep such pages from flushing
out other pages that can potentially be reused while still in cache.
○ Large buffer prefetch – if memory pools for large I/O are configured for the cache used by a table or an
index, the optimizer can prefetch data or index pages by performing large I/Os of up to eight data
pages at a time. This prefetch strategy can be used on the data pages of a table or on the leaf-level
pages of a nonclustered index. By default, prefetching is enabled for all tables, indexes, and text or
image objects. Setting the prefetch option to off disables prefetch for the specified object.
Delete tables.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables and select the table type.
3. In the right pane, select a table, and do one of:
To zero out residual data, which may be visible to a user using the dbcc utility after you delete the table,
select Erase Residual Data. You cannot use Erase Residual Data on tables that were created on a user
database earlier than SAP ASE version 16.0.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
To zero out residual data, which may be visible to a user using the dbcc utility after you delete the index,
select Erase Residual Data. You cannot use Erase Residual Data on indexes for tables that were created on a
user database earlier than SAP ASE version 16.0.
8. Click Finish.
Display or modify device usage, compression, permissions, cache, and the locking scheme.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Pages Properties
Note
The value displayed for Spaced Reserved on the
Usage screen includes unused space and the spaced
used by Object Allocation Map (OAM), data, and
index. The value displayed for Unused on the Usage
screen accounts for space used by Object Allocation
Map (OAM). The value of the unused space can differ
from a query for unused space that is preformed
directly on the SAP ASE server through the
administration console, which does not include OAM.
Lock Scheme specify the locking scheme to set how much data is
locked at one time.
Referenced By Displays the name, object type, and owner of objects that
reference the specified table.
Foreign Keys Displays each foreign key belonging to the table. Clicking
the foreign key name opens the foreign key window for
the selected index.
Partitions Displays each partition for the table. Clicking the partition
name opens the properties window for the selected
partition.
Related Information
Use the Columns Properties window to change permissions, create check constraints, specify encryption keys,
and bind rules and defaults to columns.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Pages Properties
Rules and Defaults ○ Default – specify a default value that appears in the
column if no value is entered for an insertion or
update.
○ Rule binding – bind rules to columns to provided
criteria against which is SAP ASE checks data
entered for an insertion or update.
Check Constraints Creates filters that data must pass through before the
data can be inserted into a table.
Related Information
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Related Information
Create, delete, and generate data definition language for database, device, and dump devices.
Procedure
Procedure
○ Data sync – ensures that writes to the database device occur on the physical storage medium. This
allows the server to recover data from the device when a system failure occurs.
○ Direct IO – transfers the data directly to disk, bypassing the operating system's buffer cache.
○ Cached IO – turns off the data sync option, and any writes to the database device are buffered into the
file system. During system failures, the server does not recover any data that has not been updated to
the physical medium.
9. (Optional) On the Mirroring page, you can click Mirror the database device and specify the path for the
duplicate device.
Note
If the server is not configured to enable disk mirroring, the options for the Mirroring page are
unavailable.
Procedure
Create an in-memory device, or a cache device, in a cache created for an in-memory database. This device
resides on an in-memory storage cache, and allows you to create in-memory databases.
Procedure
○ Add – displays the Specify Cache Device and Size wizard page, and lets you choose a cache to create
the device in. The default size of an in-memory device is 6MB. If the in-memory storage is smaller than
6MB, the device size automatically matches the in-memory storage size.
○ Edit – allows the in-memory device to require more space from the in-memory storage. You cannot,
however, increase the size of the storage itself.
○ Remove – removes the selected cache.
Create a dump device on a server. A dump device is a tape, partition, or file used for database or transaction
dumps.
Procedure
Display or modify device's, as well as analyze its mirror status, databases that occupy the space on the device,
and segments contained in the device.
Procedure
Display or modify in-memory devices, or analyze the list of databases and segments contained in the in-
memory device.
Procedure
Procedure
Procedure
Procedure
9.6 Databases
Create databases, modify their properties, and perform other administrative tasks.
Prerequisites
● Size:
○ sp_estspace helps you estimate table and index space requirements based on the definition of a
specific table.
○ Space for planned views, stored procedures, defaults, rules, and triggers.
○ Size of the transaction log.
○ Space for anticipated expansion.
● Database device location, and whether there is enough space on that device.
● Transaction log location – SAP recommends that you store the transaction log on a different device than
the data.
Procedure
○ (Not recommended) With override to store the log and data on the same logical device.
○ For load to use the database for loading a database dump.
If you created a database encryption key, you can select Encrypt this database, then specify the name of
the database encryption key.
10. (Optional) On the Durability Level page, choose one of these levels to improve server performance by
reducing the recoverability in case of a system failure:
○ NO_RECOVERY – there is no guarantee that, at runtime, committed transactions are written to the
disk.
○ AT_SHUTDOWN – all committed transactions are written to disk during a normal server shutdown.
○ FULL – a complete recovery of committed transactions is possible after a system failure.
11. (Optional) On the Data Compression page, choose:
○ Data compression for the entire database – either page-level or row-level compression. If you choose
neither option, then data is not compressed.
○ LOB compression – from levels 0 – 9, 100, or 101.
○ In-row LOB length – the length of the LOB column to be saved in-row. To disallow in-row LOB storage in
the database, set the length to 0.
12. (Optional) Use the Guest User page, to create a guest user who can access the database with limited
privileges.
13. (Optional) Click Summary to view your selected options.
Related Information
Prerequisites
● Size:
○ sp_estspace helps you estimate table and index space requirements based on the definition of a
specific table.
○ Space for planned views, stored procedures, defaults, rules, and triggers.
○ Size of the transaction log.
○ Space for anticipated expansion.
● Database device location, and whether there is enough space on that device.
● Transaction log location – SAP recommends that you store the transaction log on a different device than
the data.
Procedure
Related Information
Prerequisites
● Size:
○ sp_estspace helps you estimate table and index space requirements based on the definition of a
specific table.
○ Space for planned views, stored procedures, defaults, rules, and triggers.
○ Size of the transaction log
○ Space for anticipated expansion.
● Database device location, and whether there is enough space on that device.
● Transaction log location – SAP recommends that you store the transaction log on a different device than
the data.
Procedure
○ (Not recommended) With override to store the log and data on the same logical device.
○ For load to use the database for loading a database dump.
○ Specify a template database that is copied over to create the in-memory database.
10. (Optional) On the Data Compression page, choose:
○ Data compression for the entire database – either page-level or row-level compression. If you choose
neither option, then data is not compressed.
○ LOB compression – from levels 0 – 9, 100, or 101.
○ In-row LOB length – the length of the LOB column to be saved in-row. To disallow in-row LOB storage in
the database, set the length to 0.
If you created a database encryption key, you can select Encrypt this database, then specify the name of
the database encryption key.
11. (Optional) On the Temporary Database Group page, select the database group that the temporary
database belongs to.
12. (Optional) Click Summary to view your selected options.
Related Information
Prerequisites
● Size:
○ sp_estspace helps you estimate table and index space requirements based on the definition of a
specific table.
Procedure
Related Information
Prerequisites
● Size:
○ sp_estspace helps you estimate table and index space requirements based on the definition of a
specific table.
○ Space for planned views, stored procedures, defaults, rules, and triggers.
○ Size of the transaction log.
○ Space for anticipated expansion.
● Database device location, and whether there is enough space on that device.
● Transaction log location – SAP recommends that you store the transaction log on a different device than
the data.
Procedure
○ (Not recommended) With override to store the log and data on the same logical device.
○ For load to use the database for loading a database dump.
○ Specify a template database that is copied over to create the in-memory database.
10. (Optional) Use the Guest User page, to create a guest user who can access the database with limited
privileges.
11. (Optional) Click Summary to view your selected options.
Prerequisites
● Size:
○ sp_estspace helps you estimate table and index space requirements based on the definition of a
specific table.
○ Space for planned views, stored procedures, defaults, rules, and triggers.
○ Size of the transaction log.
○ Space for anticipated expansion.
● Database device location, and whether there is enough space on that device.
● Transaction log location – SAP recommends that you store the transaction log on a different device than
the data.
Procedure
○ (Not recommended) With override to store the log and data on the same logical device.
○ For load to use the database for loading a database dump.
○ Specify a template database that is copied over to create the in-memory database.
10. (Optional) On the Temporary Database Group page, select the database group that the temporary
database belongs to.
11. (Optional) Click Summary to view your selected options.
Related Information
Prerequisites
Full database encryption protects an entire database without affecting existing applications. Once you encrypt
a database, all of its data, indexes, and transaction logs become encrypted. This encryption is transparent; so
that you can perform operations on tables, indexes, and so on, as usual, without noticing any differences.
Data is encrypted at the page level. Once your database is set up as encrypted, the encryption and decryption
process is automatic. Data becomes encrypted just before the page is written into disk, and decrypted as soon
as the data page is loaded into memory.
Related Information
Procedure
Related Information
Use the Encrypt Database wizard to stop the encryption process of a database.
Procedure
Related Information
Procedure
Related Information
Procedure
Related Information
Procedure
Related Information
Procedure
Related Information
Procedure
Note
If you change the binding of a login to a different group, the old binding is no longer valid.
Related Information
Display or modify database options, cache options and storage allocation, extend log buffers, and change the
owner.
Procedure
Devices ○ Database devices – you can add or remove devices associated with a selected database.
See Modifying Database Storage Allocations [page 257].
○ Transaction log – you can move the transaction log to a different location. See Modifying
Database Storage Allocations [page 257].
Transaction Log ○ Transaction log buffer size – you can modify the I/O buffer size of the transaction log. See
Modifying Transaction Log Buffer Size [page 258].
Options ○ Server configuration options – see Changing Database Options [page 259].
Usage ○ Details – displays a graph of the space used by the tables and indexes of your database.
Use these values to determine if you have enough unreserved space to accommodate new
database objects.
○ Largest user tables – shows the largest user tables based on space reserved, used space,
and row count.
Related Information
Perform database administrative task such as mount or unmount a database, modify the size of a database,
shrink a database, check database consistency, or place a database in quiesce hold.
Procedure
○ User Databases
○ System Databases
○ Temporary Databases
4. In the right pane, select a database, and do one of:
Use the database consistency check to check the logical and physical consistency of a database.
Context
Regular database consistency checks detect, and often correct, index and page allocation errors resulting in
corrupted tables.
Procedure
Option Description
Check overall consistency Run dbcc checkdb, which checks each table and index in the selected database.
The generated report for each undamaged table shows the number of data pages and
data rows.
To fix allocation errors, select Fix allocation errors. The database is automatically placed
in single-user mode while executing dbcc checkalloc, then returned to multiuser
mode when processing is complete.
The generated report shows the amount of space allocated and used by each database
table, including the system tables. For each table or index, the report shows the number
of pages and extents (8-page blocks of allocated space) used.
Check system catalogs Execute dbcc checkcatalog and check for consistency within and between the
system tables found in a database. The generated report lists the segments used by the
database.
Related Information
Context
Quiesce hold allows you to block updates to one or more databases while you perform a disk unmirroring or
external copy of each database device. Because no writes are performed during this time, the external,
secondary copy of the database is identical to the primary image. While the database is in the quiescent state,
read-only queries to operations on the database are allowed. You can load the external copy of the database
onto a secondary server, ensuring that you have a transactionally consistent copy of your primary image.
Note
If there are distributed or multidatabase transactions in the database in prepared state, SAP ASE Cockpit
waits for 5 seconds for those transactions to complete. If they do not complete in 5 seconds, the quiesce
database hold operation fails.
Option Description
External Dump Option Copy the database while updates to specified databases are suspended with the
Quiesce Hold command. You must also specify:
○ Manifest File – specify the path for the manifest file.
○ Evaluate Dependencies – if you have not selected all the databases to be quiesced,
allow the wizard to generate a list of databases that must be quiesced, along with
your selected database, to ensure that the quiesce hold succeeds.
The list of unselected databases that must be quiesced are indicated in the depend
ency matrix.
Related Information
Use quiesce release to resume database updates that were suspended by a quiesce hold command.
Context
Issue quiesce release only when the external copy operation has completed.
Procedure
Note
If you have mon_role permissions, you can select a tag from the list. Otherwise, enter the tag name in
the text input box.
Related Information
Context
The mount command attaches the database to the destination or secondary server. mount also decodes the
information in the manifest file and makes a set of databases available online. The server also adds database
devices, if necessary, and activates them, creates the catalog entries for the new databases, recovers them,
and puts them online.
Procedure
Related Information
Context
When you unmount a database, you remove the database and its devices from an server. The unmount
command shuts down the database. All tasks using the database are terminated. The database and its pages
are not altered and remain on the operating system devices.
Procedure
Note
The unmount command fails unless you select all the databases on a device.
8. Select the databases listed in the Dependency Matrix screen for unmount to succeed. If no databases are
listed in the Unselected Databases column, there are no dependencies.
9. Override referential integrity checks by selecting With override.
Note
When the referencing database is dropped by the unmount command with an override, you cannot
drop the referential constraints.
10. Enter a delay for distributed or multidatabase transactions in prepared state to complete before the
unmount command is activated. If the transactions do not complete during the specified time period, the
unmount command is not executed.
11. (Optional) Click Summary to view your selected options.
Issuing a checkpoint forces SAP ASE to write modified data pages from memory to disk.
Context
When you issue a checkpoint, SAP ASE freezes all current data-modifying transactions while writing to the
disk. See the Reference Manual: Commands.
Procedure
Related Information
Procedure
Context
System administrators can change the ownership of a database to a user who is not a current user of the
database and who does not have a current alias in the database.
Procedure
Related Information
Procedure
○ Click Add to add space from a different device for your database. Specify whether the space is to be
allocated for data or for the transaction log.
○ Click Remove to remove the space allocated to your database from a device. You can only remove
devices that are added using the Add option.
○ Click Move log to move the transaction log of a database, with log and data on the same device, to a
separate device. See sp_logdevice in the Reference Manual.
8. (Optional) Click Create log or data fragment with override to force SAP ASE to allocate the data and log
devices as specified, even if data and log are specified on the same device.
9. (Optional) Click Preview to see the SQL statements for your command.
10. Click Apply.
Related Information
Modify the transaction log cache and the log I/O buffer size.
Context
Change the size of the transaction log cache and log I/O buffer by binding the log to a cache of different size.
The log buffer size determines the number of I/O transactions that can be stored in the transaction log I/O
cache.
Related Information
Procedure
Note
You cannot update any database options for the master database, or for archive databases.
Option Description
abort tran on full log Determines how active transactions are treated when the
database’s log becomes critically low on space:
○ To cancel all user queries that need to write to the
transaction log until space in the log has been freed,
select this option.
○ To suspend transactions and awaken them when
space has been freed, unset this option.
allow nulls by default Affects the ability of columns in newly created database
tables to accept NULL values:
○ If you select this option, columns in newly created ta
bles allow null values unless the column definitions
explicitly state “not null.”
○ If you do not select this option, nulls are not allowed
unless the column definitions explicitly permit them.
allow wide dol row Allows wide, variable-length data-only-locked (DOL) rows
in user databases.
async log service Provides greater scalability and higher throughput in log
ging subsystems for high-end symmetric multiprocessor
systems.
delayed commit When enabled, all local transactions use delayed commits
so that control returns to the client without waiting for the
I/O on log pages to complete, and I/O is not issued on the
last log buffer for delayed commit transactions. delayed
commit is supported by SAP ASE version 15.5 and later.
Note
Delayed commit is not used if you enable both
delayed commit and async log service
for a database.
enforce dump tran sequence When set to true, prevents operations that disallow a sub
sequent dump transaction.
erase residual data Allows you to enable or disable the removal of residual
data based on your needs.
When you enable the option at a session level, all the page
deallocations during that session have their residual data
removed. This includes page deallocations of tables that
have the erase residual data explicitly turned off.
no free space acctg Determines whether the database enables free-space ac
counting and execution of threshold actions for non log
segments.
Note
Only system security officers can change the no
free space acctg option.
scratch database The database that stores the sysaltusages table. See
the System Administration Guide: Volume 2.
single user Allows only one user at a time to use the database.
trunc log on chkpt Truncates the transaction log (removes committed trans
actions) every time the database is check pointed.
Note
If you select trunc log on chkpt for develop
ment purposes, clear it periodically and dump the
transaction log. If you never dump the transaction log,
it continues to grow, and eventually you run out of
space in the database.
Related Information
Context
Note
To zero out residual data, which may be visible to a user using the dbcc utility after you delete the
database, select Erase Residual Data.
7. Click Finish.
Procedure
2. In the left pane, expand ASE Servers, then select Databases Schema Objects .
3. Select the type of database.
4. In the right pane, select a database, and do one of:
Understand the scope and freshness of server data in SAP ASE Cockpit.
● Delta – the number of occurrences since the last screen refresh. For example, the user log cache statistics
on the Transactions screen are delta values.
● Rate – the number of occurrences over the given period of time. Device I/O is given as a rate.
● Percentage or ratio – an amount, number, or rate stated as a proportion to a whole. Percentage statistics
include CPU utilization, space usage on devices and segments, and cache hit rates. Ratios include cache
volatility.
● Count – a simple value; for example, the size of a database or cache in megabytes, or the number of
partitions in a cache.
● Cumulative – the number of occurrences since the server started, or since the counter wrapped. On the
Processes screen, you can set the Top 5 User Processes chart to display the five processes that use the
most CPU, disk I/O, or network resources as rates or as cumulative values.
Note
When a server has been running for a long time, its statistical counters might wrap, which means they
restart from zero. This most often affects cumulative statistics. Information about when or how many times
a counter has wrapped is not available.
Most server statistics not otherwise labeled are presented as deltas since the last screen refresh; rates,
percentages, and cumulative numbers are labeled as such.
Statistics are displayed promptly. However, there are several factors that affect the freshness of the data on the
screens:
● The screen refresh interval, which you can set on the Settings screen.
● The collection repeat interval, which you can set in the scheduler for each server collection
● Network latency.
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Option Description
Choose the type of hashing ○ Partial hashing – for columns that have 65536 or
fewer unique values.
○ With hashing – for columns that have greater than
65536 unique values.
○ No hashing.
A value for max resource granularity max resource granularity indicates the maximum percent
age of the system’s resources a query can use.
11. On the Histogram Tuning page, set the histogram tuning factor. The size of the histogram is
established by multiplying the number of steps with the value for histogram tuning factor.
12. On the Sampling page, specify whether to set sampling, and to what percentage.
13. On the Step Number page, indicate whether to set the number of histogram steps, and if so, how many.
14. On the Consumers page, set the number of consumer processes to be used in parallel processing. The
controls are enabled if the value for max parallel degree is 3 or greater.
Related Information
Creating statistics on unindexed columns can improve the performance of many queries. Adding statistics for
the minor columns of indexes and for unindexed columns that are frequently used in search arguments can
greatly improve the optimizer’s estimates.
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Option Description
Choose the type of hashing ○ Partial hashing – for columns that have 65536 or
fewer unique values.
○ With hashing – for columns that have greater than
65536 unique values.
○ No hashing.
A value for max resource granularity max resource granularity indicates the maximum percent
age of the system’s resources a query can use.
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Maintaining data partition statistics can improve the performance of many queries.
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Option Description
Choose the type of hashing ○ Partial hashing – for columns that have 65536 or
fewer unique values.
○ With hashing – for columns that have greater than
65536 unique values.
○ No hashing.
A value for max resource granularity max resource granularity indicates the maximum percent
age of the system’s resources a query can use.
9. On the Histogram Tuning page, set the histogram tuning factor. The size of the histogram is
established by multiplying the number of steps with the value for histogram tuning factor.
10. On the Sampling page, specify whether to set sampling, and to what percentage.
11. On the Step Number page, indicate whether to set the number of histogram steps, and how many.
12. On the Summary page, verify your selections.
13. Click Finish.
Maintaining index partition statistics can improve the performance of many queries.
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Option Description
Choose the type of hashing ○ Partial hashing – for columns that have 65536 or
fewer unique values.
○ With hashing – for columns that have greater than
65536 unique values.
○ No hashing.
A value for max resource granularity max resource granularity indicates the maximum percent
age of the system’s resources a query can use.
11. On the Histogram Tuning page, set the histogram tuning factor. The size of the histogram is
established by multiplying the number of steps with the value for histogram tuning factor.
12. On the Sampling page, specify whether to set sampling, and to what percentage.
13. On the Step Number page, indicate whether to set the number of histogram steps, and how many.
14. On the Summary page, verify your selections.
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Procedure
2. In the left pane, select ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
9.8 Compression
The compression advisor provides an estimate of the percentage of space you can save by compressing a user
table or index.
Compression reduces database storage space and improves system performance, especially in I/O-bound
systems. Queries against compressed data can be performed with fewer I/O operations, because each read
from the disk retrieves more data.
Use the database usage properties to identify tables that might benefit from compression. The compression
advisor then provides recommendations for which compression attributes to apply, and a compression
estimation that is based on an analysis of sampled data. The estimate is then compared to the selected table in
an uncompressed state and the table in its current state, which may or may not be compressed.
Compression advisor requires an ASE_COMPRESSION license and the system-wide configuration parameter
enable compression to be set to 1.
Identify the largest user tables based on space reserved, used space, or row count.
Context
Before compressing a user table, identify the largest tables then generate a compression estimate to
determine if the table will benefit from compression.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Databases User Databases .
3. In the right pane, select a database, and do one of:
○ Rowcount
○ Space reserved
○ Used space
9. (Optional) Click Compression Advisor to invoke the Compression Advisor wizard.
Apply compression attributes to a selected tables to reduce the size and improve performance for a database.
Prerequisites
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
For large tables, a sample size of 10% may provide good results. However, for smaller tables, a larger
sample size may provide better results.
b. Select a database to use for the sampling process.
The temporary table is created once you click Estimate. It is deleted when you close the Compression
Advisor Results dialog.
6. On the Table Attributes screen:
a. Choose the level of data compression.
○ Row-level compression compresses individual rows in a table.
○ Page compression performs row-level compression first, then page-level compression.
For uncompressed tables, data compression is, by default, set to page-level compression.
a. If the table has one or more indexes, and the version is 16.0 or later, select the type of index
compression.
To compress large object (LOB) data, choose the compression level for FastLZ (100 –101) or ZLib (1–9).
The LOB compression option is available for tables that use text, image, Unitext, or Java LOB datatypes.
7. (Optional) On the Columns Attributes screen, for LOB columns, click Calculate to calculate the best LOB
length for each LOB column based on the sampling size.
a. Click Cancel to cancel the calculation and restore the original values.
b. Once the calculation is complete, click Restore to restore the original values.
8. (Optional) On the Columns Attributes screen, select individual column attributes to override the inherited
table-level attributes. You can also choose to not compress individual columns.
○ You cannot change an in-row column to an off-row column.
○ You cannot reduce the in-row length.
○ You must set at least one column to be compressed.
9. (Optional; only available for tables with indexes) In the Indexes Attributes window, select either page
compression or no compression for individual indexes. Selected compression values override the inherited
index-level compression attributes.
The compression advisor provides compression estimates and recommendations. Based on the results of
these estimates, you can apply the attributes and compress the selected table.
Prerequisites
If granular permissions is enabled, you must have reorg any table privilege or be the table owner. If
granular permissions is not enabled, you must be the table owner or have sa_role.
Apply compression attributes to the selected tables and apply changes to its existing data.
Context
See Initiating a Compression Estimate [page 273]. Once the compression estimate is initiated, you see the
Compression Advisor Results window. The Results tab shows the compression ratio for the sample table,
compared to the selected table in an uncompressed state.
Procedure
Use the Create Table and Create Index wizards to set index compression. You can subsequently turn index
compression on or off on the table, index, or local index property screens.
● Tables
● Indexes
● Local index partitions
Any table, index, or local index partition can be designated for index compression, except system catalogs and
work tables.
The value of compression is page-level compression, which compresses redundant information on a page by
storing repeated values in a single place and uses a symbol on the data page to refer to them.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables and select the table type.
3. In the right pane, select a table, and do one of:
Use the Create Index wizard to specify index compression on a local index partition.
Procedure
2. In the left pane , expand ASE Servers Schema Objects Tables and select the table type.
3. In the right pane, select a table, and do one of:
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables and select the table type.
9.9 Partitions
Use partitioning to divide large tables and indexes into smaller, more manageable pieces.
Partitions
Partitions are database objects that have unique IDs and can be managed independently. Each partition can
reside on a separate segment.
Horizontal partitioning is supported, which means you can distribute a selection of table rows among storage
devices. Assign individual table or index rows to a partition according to a partitioning strategy. By default,
every table and index is created on a single, round-robin partition. You can also choose a semantics-based
strategy that assigns rows to partitions.
Hash Partitioning
With hash partitioning, a hash function is used to specify the partition assignment for each row. You select the
partitioning key columns, but SAP ASE chooses the hash function that controls the partition assignment. Hash
partitioning is a good choice for:
If you choose an appropriate partition key, hash partitioning distributes data evenly across all partitions.
However, if you choose an inappropriate key, for example, a key that has the same value for many rows—the
result may be skewed data, with an unbalanced distribution of rows among the partitions.
Rows in a range-partitioned table or index are distributed among partitions according to values in the
partitioning key columns. The partitioning column values of each row are compared with a set of upper and
lower bounds that determine the partition to which the row belongs.
Every partition has an inclusive upper bound and every partition except the first has a noninclusive lower
bound.
Range partitioning is particularly useful for high-performance applications in both OLTP and decision-support
environments. Select ranges carefully so that rows are assigned equally to all partitions—knowledge of the data
distribution of the partition key columns is crucial to balancing the load evenly among the partitions. Range
partitions are ordered; that is, each succeeding partition must have a higher bound than the previous partition.
List Partitioning
As with range partitioning, list partitioning distributes rows semantically; that is, according to the actual value
in the partitioning key column. A list partition has only one key column. The value in the partitioning key column
is compared with sets of user-supplied values to determine the partition to which each row belongs. The
partition key must match exactly one of the values specified for a partition.
The value list for each partition must contain at least one value, and value lists must be unique across all
partitions. You can specify as many as 250 values in each list partition. List partitions are not ordered.
Round-Robin Partitioning
In round-robin partitioning, partitioning criteria is not used. Round-robin-partitioned tables have no partition
key. Rows are assigned in a round-robin manner to each partition so that each partition contains a more or less
equal number of rows and load balancing is achieved. Because there is no partition key, rows are distributed
randomly across all partitions.
Prerequisites
Enable or disable partition locking for user tables. By default, partition locking is disabled.
By enabling partition locking, you are locking a partition of interest and therefore allowing access to other
partitions for concurrent DDL and DML access options. Concurrent access is allowed for tables during the
merge, move, split, and drop partition operations.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables User Tables .
3. In the right pane, select a table, and do one of:
Procedure
Create a new partition or change an existing partition using a strategy of a system-generated hashing function.
Context
Note
To create hash, list, or range partitions, turn on the server configuration parameter enable semantic
partitioning.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Create a new partition or change an existing partition according to whether one or more values in a row fall
within a range of predefined values for the partition.
Context
Note
To create hash, list, or range partitions, turn on the server configuration parameter enable semantic
partitioning.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Create a new partition or change an existing partition according to whether one value in the row matches one of
a set of predefined values unique for each partition.
Context
Note
To create hash, list, or range partitions, turn on the server configuration parameter enable semantic
partitioning.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Create a new partition or change an existing partition using the round-robin strategy so that each partition
contains an approximately equal number of rows.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Splitting partitions can improve performance on partitions that include frequent queries and updates.
Context
● You must set the select into/bulkcopy/pllsort database option to true before you split a partition.
● You may split only list and range partitions.
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Option Description
(Optional) Column name. The partition key is displayed, which is based on the table
that has been partitioned. Enter a new value (or partition
condition) for the split operation.
Value Specify the inclusive upper bound of values for the parti
tion.
Merging partitions consolidates data from partitions that are accessed infrequently into a single partition. You
can merge only list and range partitions.
Context
You can merge any two list partitions, but only adjacent range partitions. The partitions selected to be merged
must be on same segment.
You must set the select into/bulkcopy/pllsort database option to true before you merge partitions.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Table owners, database owners, or system administrators can move partitions to another segment.
Context
Note
You must set the select into/bulkcopy/pllsort database option to true before you split a partition.
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Context
● You must set the select into/bulkcopy/pllsort database option to true before you can delete a
partition.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
Display or modify partition properties, such as the partition name, strategy, and type.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a partition, and do one of:
Page Properties
Related Information
Configure server installations to allow request for execution of stored procedures on a remote server from a
local server. The result of this request is called a remote procedure call (RPC).
Your choice of RPC handling method affects SAP ASE configuration and login mapping for remote servers. To
handle RPCs, you can use either a site handler, or Component Integration Services (CIS).
The default method for handling interaction between local and remote servers is through a site handler, which
creates a physical connection between the local server and the remote server. It then creates a logical
connection for each RPC to the remote server. SAP ASE creates a site handler for each remote server it
connects to. A site handler is used only for connections between two server installations.
You can enable CIS for a server to request execution of stored procedures and access data on a remote server
as if it were on the local server. CIS RPC handling is always used for connections involving proxy tables.
The principal difference between the two methods of handling RPCs is how the remote server views the RPC:
● If you use site handler, the remote server detects that the logical connection is made by another remote
server and performs remote server verification through sysremotelogins.
● If you use CIS RPC handling, the remote server sees the RPC as an ordinary client connection. There is no
verification using sysremotelogins. Therefore, connections must have a valid server login account
established prior to the connection request. You cannot use trusted mode. Use of CIS RPC handling allows
you to include RPCs in a transaction. Work done by an RPC can be committed or rolled back along with the
other work performed in the transaction.
Related Information
Prerequisites
To add a remote server you must register and authenticate the agent for SAP ASE.
Procedure
Related Information
Verify that a connection can be established between the local server and the remote server.
Procedure
Related Information
Procedure
Option Description
Server cost (Component Integration Services only) Specifies the cost of a single exchange
under the user’s control, on a per-server basis.
CIS hafailover (Component Integration Services only) When enabled, instructs Open Client to
use automatic fail over when connections fail. In this case, CIS connection fail
ures automatically failover to the server specified in directory services (such as
the interface file and LDAP server) as the failover server.
Mutual authentication Verifies the identity of the client and the server. The local server initiating the
remote connection can request mutual authentication for all remote connec
tion requests to target a server. This allows the client to verify the identity of the
remote server.
Negotiated logins (Component Integration Services only) This option is necessary if CIS connec
tions to XP Server or Backup Server are required. When enabled, Omni con
nects to the specified server and establishes a callback handler that can re
spond appropriately to login challenges from XP Server and Backup Server.
Net password encryption Specifies whether to initiate connections with a remote server with the client-
side password encryption handshake or with the normal (unencrypted pass
word) handshake sequence. The default is false, which means that no network
encryption takes place.
Readonly (Component Integration Services only) Specifies that access to the server
named is read-only.
Relocated joins Permits joins between local and remote tables to be on the remote server.
Security mechanism External software that provides security services for a connection.
Server logins (Component Integration Services only) To fully support remote logins, Client-
Library provides connection properties that enable CIS to request a server con
nection. This connection is recognized at the receiving server as a server con
nection (as opposed to an ordinary client connection), allowing the remote
server to validate the connection as if the connection were made by a site han
dler.
Timeouts When unset (false), disables the normal timeout code used by the local server,
so the site connection handler does not automatically drop the physical con
nection after one minute with no logical connection.
Use message confidentiality Data is encrypted over the network to protect against unauthorized disclosure.
Use message integrity Verifies that communications have not been modified during transport.
Procedure
Map to local logins with the same names All logins from one remote server can use their remote
names.
Map all to a single local login All logins from one remote server can be mapped to one
local name. For example, all users sending remote proce
dure calls from the MAIN server are be mapped to remus
ers.
Note
Mapping more than one remote login to a single local login reduces individual accountability on the
server. Audited actions can be traced only to the local server login, not to the individual logins on the
remote server.
7. (Optional) To map a particular remote login to a specific local login name, click Add.
a. Specify the remote login name, then select the local login name.
b. (Optional) Click Trusted Password to indicate that the remote logins are trusted.
Using the Trusted Password option reduces the security of your server, as the passwords are not
verified.
8. (Optional) To remove a mapping of particular remote login from a specific local login name, select the login,
then click Remove.
Related Information
Add, remove, and configure remote server CIS roles and logins mappings.
Context
Logins and roles for CIS RPC handling are mapped on the local server level. By default, your local login is used
as the remote login.
Related Information
Procedure
Display or modify remote server properties, such change the server class, map local and remote logins, and
change configuration options.
Procedure
Pages Properties
The always-on option includes the high availability disaster recovery (HADR) feature. Administering HADR
includes a number of tasks.
Prerequisites
You must enable the HADR mode and cis RPC handling configuration parameters
Procedure
Procedure
The SAP ASE Cockpit displays properties such as the server name, the HADR mode, and host name, and the
name of the replication user.
Prerequisites
Procedure
Procedure
The SAP ASE Cockpit displays the primary and standby machines graphically as boxes, with a red or green
line connecting the boxes. A green line indicates the systems are successfully connected. A red line
indicates a connection issue.
Procedure
After a failover, the original primary server becomes the standby, and the original standby server becomes the
new primary server.
Context
Note
Procedure
○ Terminate failover – Stops the failover action if the task does not complete.
○ Force deactivation – Forces the current primary into a deactivated state by removing transactions that
do not complete within the specified timeout period.
○ Force primary – Forces the current standby to the primary role.
10. If the ASE Agent is registered, you can display the most recent progress messages for SAP ASE,
Replication Server, and the Replication Management Agent. If the remote site’s ASE Agent runs on the
If the Replication Agent is registered, you can display the latest 500 log messages for SAP ASE, Replication
Server, and the Replication Management Agent.
Context
If the remote site’s Replication Agent runs on the same port and uses the same user name and password,
messages from the remote site’s log are also displayed.
Procedure
Procedure
○ Suspend replication to a specific database – select Suspend replication to database, and select the
database name from the list.
○ Suspend replication to all databases – select Suspend all database replication.
9. Click Suspend Replication.
Procedure
○ Resume replication to a specific database – select Resume replication to database, and select the
database name from the list.
○ Resume replication to all databases – select Resume all database replication.
9. Click Resume Replication.
Procedure
Procedure
You can start and stop the SAP ASE, Replication Server, and RMA service components when ASEAP is available
Procedure
Procedure
You must restart the Rep Agent thread after modifying a configuration parameter.
M:11-20
H:0-10
M:20001-30000
H:30001-217484648
M:101-200
H:201-217484648
M:101-200
H:201-217484648
M:101-200
H:201-217484648
M:81-90
H:91-100
M:81-90
H:91-100
● UNKNOWN(0)
● STOPPED(1)
● PENDING(2)
● RUNNING(3)
● WARNING(4)
● ERROR(5)
Regular and frequent backups are your only protection against database damage that results from database-
device failure.
Prerequisites
● Ensure that you can connect to the Backup Server from each server you administer.
● Decide on the backup media you will use, and create dump devices that identify the physical backup media
to the server.
● Ensure that the login of the person starting the Backup Server has write permissions for the physical
backup dump device, and that the dump device is available.
Context
Although SAP ASE has automatic recovery procedures to protect you during power outages and computer
failures, your best protection against media failure is creating regular and frequent backups of system and user
databases. See the System Administration Guide for details on backup and recovery.
Procedure
Option Description
Block size The block size for the dump operation, which overrides
the default block size for the device. For optimal perform
ance, specify the block size as a power of 2.
Retention time The number of days for which the dump is preserved and
cannot be overwritten. The default value is 0. Specify re
tention time to override the default value for all dump de
vices. The backup server does not automatically overwrite
data unless it is older than the retention time.
9. (Optional) On the Dump Performance page, choose a setting to optimize the performance of the backup
(see sp_dumpoptimize in Reference Manual: Procedures for more information about reserved threshold
and allocation threshold settings):
Option Description
Prerequisites
Agent authentication is required when the wizard must validate user input in the archive directory; otherwise,
you can run this wizard without first authenticating the agent.
Procedure
Option Description
Archive directory The name of the stripe directory that holds the dump files.
By default, the stripe directory is the directory from which
Backup Server is started.
External API The name of the byte stream device to be used for the
dump operation.
Number of stripe devices The number of stripe devices to be used for the dump op
eration.
Retry times The number of times the server tries to execute the dump
operation for nonfatal errors. The range of values is 0 to 5.
Block size The block size for the dump operation, which overrides
the default block size for the device. For optimal perform
ance, specify the block size as a power of 2.
Retain days The number of days for which the dump is preserved and
cannot be overwritten.
Message destination Specify whether the Backup Server must route messages
to the client terminal that initiated the dump, or to the op
erator-console terminal where the Backup Server is run
ning.
Backup Server name Specify the remote Backup Server used for the dump op
eration.
Prerequisites
● Ensure that you can connect to the Backup Server from each server you administer.
● Decide on the backup media you will use, and create dump devices that identify the physical backup media
to the server.
● Ensure that the login of the person starting the Backup Server has write permissions for the physical
backup dump device, and that the dump device is available.
Procedure
Option Description
Block size The block size for the dump operation, which overrides
the default block size for the device. For optimal perform
ance, specify the block size as a power of 2. .
Retain days The number of days that the dump is preserved and can
not be overwritten.
Message destination Specify whether the Backup Server must route messages
to the client terminal that initiated the dump, or to the op
erator-console terminal where the Backup Server is run
ning.
Related Information
View available dump configurations, which define the options used to create a database dump, and dump
records.
Prerequisites
Backup Server must be running and you must be the system administrator or database owner.
Procedure
○ Dump Configurations
○ Dump Records
Procedure
(Optional) Click Preview to view the SQL syntax generated by the settings from your options,
then click Save to save the SQL, or Close to close the preview.
Related Information
Prerequisites
Procedure
Prerequisites
● Ensure that you can connect to the Backup Server from each server you administer.
● Decide on the backup media you will use, and create dump devices that identify the physical backup media
to the server.
● Ensure that the login of the person starting the Backup Server has write permissions for the physical
backup dump device, and that the dump device is available.
Option Description
Block size The block size for the dump stripes, which overrides the
default block size for all dump stripes. The block size
must be at least one database page, and be an exact
multiple of the database page size.
Retain days The number of days for which the dump is preserved
and cannot be overwritten. The default value is 0.
Some of these options are part of the dump configuration, but if you change them at dump time, the
new values take precedence over the dump configuration.
○ If you are not using a dump configuration, the parameters you can specify are:
Options Description
Block size The block size for the dump stripes, which overrides the
default block size for all dump stripes. The block size
must be least one database page, and be an exact mul
tiple of the database page size.
Retain days The number of days that the dump is preserved and
cannot be overwritten. The default value is 0.
9. On the Dump performance page, specify the amount of data to be dumped. The performance depends on
the amount of data and relative speed of the database and dump devices. See sp_dumpoptimize in
Reference Manual: Procedures for details on these options:
○ Default – the default values.
○ Maximum – dumps the entire database without determining which pages are allocated.
○ Minimum – dumps only the allocated pages, which results in the smallest possible archive image.
○ Advanced – allows you to specify the value of the reserved threshold and the archive space.
10. (Optional) Click Summary to view your selected options.
11. (Optional) Click Preview to view the SQL statement you generated with your settings. To save a copy of the
SQL statement, click Save.
12. Click Finish to start the backup. SAP ASE Cockpit displays backup messages from the server.
Related Information
Perform a cumulative dump, which is a type of incremental dump (backup) in which only the changes since the
last full database dump are backed up.
Prerequisites
● Ensure that you can connect to the Backup Server from each server you administer.
● Enable incremental dumps for the database you are dumping:
Procedure
To verify that you have enough space, click Estimate Dump Size.
Note
Cumulative backup is unavailable if you have not performed a full backup since enabling incremental
dumps, and you see a message similar to:
7. On the Dump Devices page, specify the dump stripes from the list. To add dump devices for the dump
operation, click No full database dump is available for cumulative dump.Add:
○ Named dump device – select the device.
○ No fullExplicit dump device – specify a local dump device as either an absolute path name or a relative
path name. When dumping across the network, specify an absolute path name.
When dumping across the network, you can specify the backup server as your remote dump device.
8. (Optional) The selections in the Options page are not part of the dump configuration, but are for the dump
database and dump transaction commands. This means that some of the options take precedence
Option Description
Block size The block size for the dump stripes, which overrides the
default block size for all dump stripes. The block size must
be least one database page and be an exact multiple of the
database page size.
Compression level The level of compression for all dump stripes. By default,
this option is disabled.
Retain days The number of days for which the dump is preserved and
cannot be overwritten. The default value is 0.
9. On the Dump performance page, specify the amount of data to be dumped. The performance depends on
the amount of data and relative speed of the database and dump devices. See sp_dumpoptimize in
Reference Manual: Procedures for details on these options:
○ Default – use the default values.
○ Maximum – dumps the entire database without determining which pages are allocated.
○ Minimum – dumps only the allocated pages, which results in the smallest possible archive image.
○ Advanced – allows you to specify the value of the reserved threshold and the archive space.
10. (Optional) Click Summary to view your selected options.
11. (Optional) Click Preview to view the SQL statement you generated with your settings. To save a copy of the
SQL statement, click Save.
12. Click Finish to start the backup.
Related Information
Using a dump configuration file, perform a cumulative dump, which is a type of incremental dump (backup) in
which only changes since the last full database dump are backed up.
Prerequisites
● Ensure that you can connect to the Backup Server from each server you administer.
● Enable incremental dumps for the database you are dumping:
If you do not do this before performing the task, you cannot select the cumulative backup option.
Procedure
To verify that you have enough space, click Estimate Dump Size.
7. (Optional) The selections in the Options page are disabled unless you click Use modified options. These
options are not part of the dump configuration, but are for the dump database and dump transaction
commands. This means that some of the options take precedence over the configured parameter value
stored in the dump configuration file for a particular dump operation. See dump database and dump
transaction in Reference Manual: Commands for more information on these options:
Block size The block size for the dump stripes, which overrides the
default block size for all dump stripes. The block size must
be at least one database page, and be an exact multiple of
the database page size.
Retain days The number of days for which the dump is preserved and
cannot be overwritten. The default value is 0.
Message destination Specify whether the Backup Server must route messages
to the client terminal that initiated the dump, or to the op
erator-console terminal where the Backup Server is run
ning. By default, this is unselected. When selected, the de
fault option is client.
Related Information
Prerequisites
Backup Server must be running and you must have dump history enabled. To enable dump history, use:
Procedure
Generate SQL and load sequences to create target databases that differ from the source databases you back
up, into which you can load database dumps.
Prerequisites
Backup Server must be running and you must have dump history enabled. To enable dump history, use:
Context
The Target Database DDL Generation wizard generates database-creation SQL using information from the
dump history file. It extracts device and segment mapping information from dump images, then generates a
sequence of create database and alter database commands. Use this wizard to generate a target
database into which you can restore (load) a database you backed up
The wizard performs the load database command using the listonly=create_sql option.
Procedure
Prerequisites
Backup Server must be running and you must have dump history enabled. To enable dump history, use:
Context
The Generate DDL from Dump Image wizard generates database-creation SQL using information from the
dump image. It extracts device and segment mapping information from dump images, then generates a
sequence of create database and alter database commands, ensuring that you can create an exact
copy of the same data and log segment layout for your target database.
.
Procedure
Procedure
Related Information
Database backups are an important part of system management and disaster recovery, and are typically
performed by the database administrator or database owner.
Context
By using the features of Job Scheduler, a database administrator or owner can schedule predefined database
backup jobs into a prearranged sequence that includes database backups, transaction backups, and
cumulative backups, which can then be automatically executed at planned times.
Before you schedule backups, install the Job Scheduler database, templates, and XML files.
Make sure:
Create a new schedule into which you can add a backup job.
Procedure
Display or modify schedule properties, such permissions, the schedule date and time, and recurrence.
Procedure
Pages Properties
Delete a schedule.
Procedure
Procedure
2. In the left pane, expand ASE Servers Task Management Scheduled Jobs .
3. In the left pane, do one of:
Option Description
Create new schedule A field in which to enter a new name for the schedule field.
Note
From this point in the wizard, click Preview at any point to view the SQL syntax for your selected
options.
9. If you are using a backup template, you see the Backup Template Options screen:
Dump location (Optional) Specify the location to which to dump the database. Job Scheduler uses the default
location if you leave this field blank.
Number of stripe files Specify how many dump stripe file will be generated.
Option Description
Allow multiple concurrent Allows you to run your job concurrently, except for jobs that may interfere with another in
executions stance of itself, such as dbcc reorg.
Allow others to use this Gives permission to others to use the schedule and execute your job.
job
Always execute as the job Specify this if you want all executions of this job to occur under your login.
owner
Timeout Specify a numeric value, in minutes. If the job does not complete in the amount specified,
the job is terminated.
Note
You can override this value for individual scheduled jobs.
11. On the Job Execution Option page, select all that apply:
Option Description
Do not log output from By default, any output generated by a job is saved and can be viewed in the Job
job Histories folder. Select this option to suppress output from the job you are scheduling.
By default, it is unselected.
Allow others to execute Allow others to be able to execute this job. By default, this is unselected.
this scheduled job
Disable on failure Disable the job if its previous execution failed, and suspend all scheduled executions of the
job until you manually re-enable it.
Delete on completion Delete the scheduled job when it finishes executing. This is useful for jobs that do not recur.
Note
Choosing this option does not delete the underlying job or schedule.
Procedure
2. In the left pane, expand ASE Servers Task Management Scheduled Jobs .
3. In the right pane, select a scheduled job, and do one of:
Pages Properties
Manually run an idle scheduled job from the job's context menu, or terminate, disable, or enable a running
scheduled job.
Context
When you install Job Scheduler, the JS Agent creates its own log file in the same directory as the SAP ASE log
file. If you encounter connection issues or failures, check the log file to view JS activity such as connection
issues and task request.
Procedure
2. In the left pane, expand ASE Servers Task Management Scheduled Jobs .
3. In the right pane, select a schedule, and do one of:
Option Description
Run Runs the scheduled job immediately. You can select more
than one job.
View the execution history log and properties for all scheduled backup jobs, or delete the record of a backup
job's execution history
Procedure
2. In the left pane, expand ASE Servers Task Management Job History .
The Job History page appears, and displays the execution history of all scheduled backup jobs.
3. In the right pane, select a job, then do one of:
Option Description
Perform various backup schedule activities with the Job Scheduler Administration dialog.
Prerequisites
The Job Scheduler Administration dialog is available only if Job Scheduler is installed on the server and the
user has js_admin_role permission.
Procedure
Option Description
Start or Stop Start or stop the Job Scheduler agent. The Stop button is
unavailable if Job Scheduler is not performing a task (and
the Start button is unavailable if the Job Scheduler is per
forming a task).
Terminate jobs Terminates all running Job Scheduler jobs. Enter a nu
meric value to specify a number of seconds after which to
perform the termination.
Enable Job Scheduler at boot Specify whether to enable Job Scheduler when the server
restarts.
Job Scheduler Interval Enter a numeric value, in minutes, of how much time
should elapse before the next Job Scheduler task begins.
Maximum number of concurrent jobs Enter the maximum number of concurrent jobs.
Maximum size of job output Enter a numeric value, in bytes, to set the maximum size
of the job output.
Prerequisites
Decide to load the backup into a new database with the for load option, or into a preexisting database.
Context
You cannot load a database backup that was created on a different operating system, or with an earlier version
of SAP ASE.
Note
When loading an archive database, the block size and compression level are set to the system default value
for each stripe.
You may restore the database directly from the saved SQL script, either using Execute SQL or script
functionality in ASEMAP or by using ISQL.
6. On the Type of Restore page, choose to restore the entire database or only the transaction log. This option
is available only when you select the Default restore option.
7. By default, the Dump Device page is initially empty. Click Add to identify the dump devices or dump stripes
you want to load back into the database:
○ Named dump device – select the device from the menu.
○ Explicit dump device – specify a local dump device as either an absolute path name or relative path
name. When dumping across the network, specify an absolute path name.
You can specify the backup server as your remote dump device when using a default server. This
option is not available when loading an archive database; use Named dump device instead.
If you select a remote backup server, select its server name from the drop-down list.
8. (Optional) On the Options page, if you specified a password for backup, you must use the same password
while restoring the database.
Select Bring the database online to bring the database online after the restoration is complete. By default,
this option is not selected.
9. (Optional) Click Summary to view your selected options.
10. (Optional) Click Preview to view the SQL statement you generated with your settings. To save a copy of the
SQL statement, click Save.
11. Click Finish to start the restore process. Restore messages from the server are displayed.
Generate a load sequence from the dump history file. You can choose to generating a load sequence for a
target database that is different from the database you backed up.
Procedure
6. On the Point in Time page, select a dump time from the list of points in time in which the database was
backed up. By default, the point in time is set to the last database dump time.
7. On the Options page:
○ If you used a password during the backup process, you must enter the same password to restore the
database.
○ (Optional) Select Restore to target database to generate database creation SQL for a target database
that is different from the database you backed up. This target database can reside on a different server.
If you choose this option, enter the name of the target database.
8. (Optional) Click Summary to view your selected options.
9. (Optional) Click Preview to view the SQL statement you generated with your settings. To save a copy of the
SQL statement, click Save.
10. (Optional) Click Save in the SQL Preview window to save the script to your local machine.
Restore a database backup and its transaction log from a cumulative backup, in which only the changes since
the last full database dump are backed up.
Prerequisites
Decide whether to load the backup into a new database with the for load option, or into a preexisting
database.
Context
You cannot load a database backup that was created on a different operating system, or with an earlier version
of SAP ASE.
Procedure
Click Bring the database online to bring the database online after the restoration is complete. By default,
this option is not selected.
Context
You cannot load a database backup that was created on a different operating system, or with an earlier version
of SAP ASE.
Procedure
○ Enter the syntax for your restore command in the text field.
○ Click Select script file to import an existing SQL file from a local machine that includes the restore
command. The command from your SQL file then populates the text field.
7. (Optional) Choose Summary from the left pane to see the summary of your restore command, including:
○ Database name
○ Type of restoration
○ Script name
8. Click Finish to begin restoring the database.
Context
You cannot load a database backup that was created on a different operating system, or with an earlier version
of SAP ASE.
Procedure
Select On-line database to bring the database online after the restoration is complete. By default, this
option is not selected.
8. (Optional) Click Summary to verify your selected options.
9. (Optional) Click Preview to view the SQL statement you generated with your settings. To save a copy of the
SQL statement, click Save.
10. Click Finish to start the restore process. SAP ASE Cockpit displays restore messages from the server.
Prerequisites
Procedure
Procedure
Pages Properties
Procedure
4. Select Properties .
5. In the left pane, click Bindings.
6. In the right pane, click Bind to bind objects to an execution class.
a. Select the scope of the execution class.
b. Select the login to bind to the execution class.
9.14 Engine
Context
Procedure
Use the Engine Groups Properties window to view engine information and to add or remove an engine from an
engine group.
Procedure
Pages Properties
Note
You cannot remove the last engine from the
group.
Procedure
Procedure
9.15 Segments
Use segments to improve performance and provide the System Administrator or Database Owner increased
control over the placement, size, and space usage of database objects.
Display a summary of available segments, which are labels that point to one or more database devices in your
databases.
Procedure
Property Description
Server The name of the server in which the database device re
sides.
Procedure
The device list is empty if the selected segment is using all the devices configured on the server. In this
case, add a new device to the server to extend the segment.
6. Click OK.
Create a new segment, which is a label that points to one or more database devices in a database.
Procedure
Procedure
Options Properties
Contains Displays:
○ Tables that use the segment – the list includes both
the table name and its owner.
○ Indexes that use the segment – the list includes both
the index name and the table the index uses.
Related Information
Procedure
Related Information
Procedure
Related Information
Procedure
Related Information
Use the Segment Properties wizard to add an existing database device to a segment.
Procedure
Related Information
Delete segments.
Context
Note
You can delete only the segments you created; the Delete option is not available for segments created by
other users.
Procedure
Use thread pools to group CPU resources and execute SAP ASE tasks associated with that thread pool.
Prerequisites
Set the kernel mode to threaded. You can change the kernel mode on the Server Configuration screen, or by
executing this command at the server level from the Administration Console.
You must restart SAP ASE for the change to take effect.
Context
Thread pools are groups of resources, such as engines, that execute user tasks, run specific jobs such as signal
handling, and process requests from a work queue. Both system-defined and user-defined thread pools are
supported.
Procedure
2. In the left pane, expand ASE Servers Performance , then select Thread Pools.
3. In the left pane, do one of:
Note
You cannot name thread pools starting with a syb_ prefix since that is reserved for system thread
pools.
6. On the Thread count page, specify the number of threads. The maximum number of threads you can
configure cannot exceed the value of max online engines.
7. Specify the thread pool idle time out in microseconds.
8. (Optional) Provide a description for the thread pool.
9. (Optional) Click Preview to see the SQL statements for your command.
10. (Optional) Click Summary to verify your selected options.
Procedure
2. In the left pane, expand ASE Servers Performance , then select Thread Pools.
3. In the right pane, select a thread pool, and do one of:
Option Properties
General ○ Name and type – two types of threads are supported: Engine (or multiplexed) or Run to
completion (RTC) threads. User created thread pools are always multiplexed.
○ Thread count – you can increase the thread count up to a maximum value of max
online engines configuration parameter.
○ Idle Time Out – set to:
○ 0 – threads change to sleep mode if no work is available.
○ -1 – threads never change to sleep mode even if no work is available.
○ Description – add a description for the thread pool.
Execution Classes The execution classes that are associated with each user or system thread pool are dis
played.
Procedure
2. In the left pane, expand Server Schema Objects User Defined Datatypes .
3. In the left pane, do one of:
Procedure
2. In the left pane, expand Server Schema Objects User Defined Datatypes .
3. In the right pane, select a user-defined datatype, and do one of:
General View the name, type, database, and owner of the user-
defined datatype.
Procedure
2. In the left pane, expand Server Schema Objects User Defined Datatypes .
3. In the right pane, select a user-defined datatype, and do one of:
Incremental data transfer lets you transfer data to SAP ASE or other products.
You can designate incremental transfer eligibility on an existing table, or when you create a table.
Context
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Prerequisites
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Transfer table data that has changed since a prior transmission from tables that are marked for incremental
transfer.
Prerequisites
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
You can use bulk copy to copy data into or out of a table.
Bulk copying data in or out of a table provides a convenient, high-speed method for transferring data between a
database table or view and an operating system file. When copying in from a file, bulk copy inserts data into an
existing database table; when copying out to a file, bulk copy overwrites any previous contents of the file.
Use bulk copy to insert data into an existing database table or to copy table data to an external file.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of:
○ User Tables
○ Proxy Tables
3. In the right pane, select a table, and do one of:
Views are an alternative way of looking at the data in one or more tables.
A view is the results of a predefined SQL query. Use views to structure table data, restrict access to data, or
combine data from various tables, which can be used to generate reports.
Procedure
Related Information
Procedure
○ Click the drop-down arrow on the view for which you want to replace the definition and select Replace.
○ From Views in the left pane, click the drop-down arrow and select New. Enter the name of the existing
view for which you want to replace the definition.
When selecting an existing view, the Confirm Replace dialog appears with an option to replace the
object definition or cancel the replacement.
4. (Optional) On the SQL Editor page, enter the new view value.
5. (Optional) On the Summary page, verify the view name, database, owner, and the new expression.
Display or modify column datatype and permissions, and on database objects that reference, and are
referenced by, the view.
Procedure
Option Properties
References The name, type, owner and properties of objects that this
view references.
Related Information
Procedure
○ Users
○ Groups
○ Roles
8. On the Grantee page, select one or more grantees.
9. Select the columns for the selected view.
10. Select the permission to be granted.
If restricted decrypt permission is set, only a system security officer can grant decrypt permission.
11. Choose with grant to allow the grantee to further grant permissions to other users.
12. (Optional) Click Summary to verify your selected options.
13. Click Finish.
Procedure
○ Individual cells to revoke the currently granted permissions. The cell changes to show an "x", indicating
that the permission type is no longer granted.
8. Click OK.
Delete views.
Procedure
9.21 Triggers
A trigger is a special type of procedure attached to a table column that goes into effect when a user changes
the table. Triggers execute immediately after data modification statements are completed.
Create a trigger on a table to enable checks whenever data is inserted, updated, or deleted.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Pages Properties
Referenced by Displays the name, type, and owner of the objects that
are referenced by the specified trigger.
Related Information
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
○ Click the drop-down arrow on the trigger for which you want to replace the definition and select
Replace.
○ From Triggers in the left pane, click the drop-down arrow and select New. Enter the name of the
existing trigger for which you want to replace the definition.
When selecting an existing trigger, the Confirm Replace dialog appears with an option to replace the
object definition or cancel the replacement.
7. (Optional) On the SQL Editor page, enter the new trigger value.
8. (Optional) On the Summary page, verify the trigger name, and type.
Procedure
(Optional) To determine if the server can manage the cache size, enter the size and click Calculate
overhead. The wizard calculates the overhead necessary for the specified cache size.
7. On the Type of Cache page, choose one of the following:
Related Information
Display or modify default data cache sizes, buffer pool values, and cache bindings. Also view in-memory
database and in-memory device information.
Procedure
Option Properties
Buffer Pool Current buffer pool values for regular caches – you can
add, change, or remove buffer pools.
Cache Bindings Shows object bindings for databases, tables, and indexes
for regular caches – you can add, change, or remove
cache bindings.
In-Memory Database (Available only for in-memory databases) Displays the in-
memory database that is created on this cache.
In Memory Device (Available only for in-memory databases) Displays the in-
memory device list that occupies this cache.
Related Information
You can add and change object bindings for your data cache.
Procedure
○ Add a binding – select the database, table, or index and click Bind to bind a new object to the cache
within your selected scope. If you do not select a scope, the default is database.
○ Delete a cache binding – select the bound database, table, or index object and click Unbind.
(Optional) Click Properties to see the detailed properties of the object you select.
Related Information
Procedure
Option Description
Wash size The point in the cache at which the server writes dirty pa
ges to disk for a memory pool and size format. The default
is KB.
Local async prefetch limit The percent of buffers in the pool that you can use to hold
buffers that have been read into cache by asynchronous
prefetch, but have yet to be used.
Affected pool The amount of memory, in kilobytes, the new pool should
take from the existing pool. The menu lists the existing
buffer pool you added to the cache. Since there is only a
2KB page-sized pool in the cache, you can add a new buf
fer pool only by taking part of the size from the 2KB page-
sized pool.
5. Click Save.
You can add and change buffer pools for your data cache.
Procedure
○ Click Add to add an additional memory pool to the existing data cache, and specify:
Option Description
Wash size The point in the cache at which the server writes dirty
pages to disk for a memory pool and size format. The
default is KB.
Local async prefetch limit The percent of buffers in the pool that you can use to
hold buffers that have been read into cache by asyn
chronous prefetch, but have yet to be used.
○ Select a buffer pool and click Change to change the memory pool settings. You see the same Add/
Change Memory Pool dialog, with fewer options to modify:
○ Wash size
○ Local async prefetch limit
○ Affected limit – since you do not affect other pools when you change an existing pool, set this to
null.
○ Select the buffer pool to delete, and click Remove to remove any additional buffer pools you created.
You cannot remove the default buffer pool.
Related Information
Modify the size of the data cache and specify the number of partitions in the data cache.
Procedure
Procedure
Note
Current size indicates how much unused space remains in your specified data cache, while Available
space shows the amount of additional memory available for all caches.
Calculate Overhead allows you to see how much overhead you need to manage your data cache.
Related Information
Procedure
Related Information
Context
Procedure
Related Information
Procedure
9.23 Constraints
Use constraints to specify rules for table data. Constraint prevent violations between the specified rule and the
data action.
Context
A foreign key:
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Related Information
The Foreign Key Properties window shows current foreign key options and the matching primary keys.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Options Description
Columns Shows the defined foreign keys and the primary keys to
which the foreign keys applies.
Related Information
Creating a check constraint specifies a condition that any value must pass before it is inserted into the table.
Context
A check constraint specifies a condition that any value must pass before it is inserted into the table. You can
create a check constraint at the table or column level. Column-level check constraints reference a single
column. Table-level check constraints apply to the entire table.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Related Information
The Check Constraint Properties window shows the check constraint definitions.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Page Properties
Related Information
Creating a unique constraint or primary key constraint to ensure that no two rows in a table have the same
values in the specified columns.
Context
A primary key is a column or combination of columns that uniquely identifies a row. It cannot be NULL and it
must have a unique index. A table with a primary key is eligible for joins with foreign keys in other tables. Think
of the primary key table as the master table in a master-detail relationship. There can be many such master-
detail groups in a database.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
Context
Make sure that any default value bound to a column or user-defined datatype is compatible with the rule. A
default that conflicts with the rule is not inserted.
Rules bound to columns take precedence over rules bound to user-defined datatypes.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables , then choose one of the following:
○ User Tables
○ Proxy Tables
○ System Tables
3. In the right pane, select a table, and do one of:
○ Default – None.
○ Default – Binding to bind an existing default to the column.
○ Default – Value to bind a default user, defined value to the column.
○ Rule Binding to bind an existing rule to a column.
Related Information
9.24 Rules
Create a rule that specifies the domain of acceptable values for a particular column.
Context
Only a database owner, or a user or group with create rule permission can create a rule.
Procedure
Related Information
Procedure
○ Click the drop-down arrow on the rule for which you want to replace the definition and select Replace.
○ From Rules in the left pane, click the drop-down arrow and select New. Enter the name of the existing
rule for which you want to replace the definition.
When selecting an existing rule, the Confirm Replace dialog appears with an option to replace the
object definition or cancel the replacement.
4. (Optional) On the Rule Expression page, enter the new rule value.
5. (Optional) On the Summary page, verify the rule name, database, owner, and the new expression.
Procedure
Pages Properties
General The name, type, database, owner, creation date, and rule
expression.
Related Information
Delete rules.
Procedure
Procedure
Precomputed result sets (PRS) are views for which the result is computed, stored, and available for future use.
SAP ASE precomputes queries and attempts to use the precomputed result during subsequent iterations.
Procedure
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the left pane, do one of:
9. On the Summary page, view your choices. Select Finish to create the precomputed result set. Select Back
to change a selection.
Deleting a precomputed result set deletes its data, removes any system table entries, and deletes the
precomputed result set.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
Related Information
Refresh precomputed result sets to prevent their data from getting stale.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
Related Information
Truncating a precomputed result set removes the data but retains the definition of the precomputed result set
in the system table.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
Grant permission on precomputed result sets for users, groups, and roles.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
Related Information
Revoke permissions on precomputed result sets for users, groups, and roles.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
Related Information
Procedure
Related Information
Revoking Precomputed Result Set Permissions from a Specific User [page 389]
Granting Permissions on Precomputed Result Sets [page 387]
Revoking Permissions on Precomputed Result Sets [page 388]
Procedure
Display information (such as column IDs, user names, partition names, and so on) associated with
precomputed result sets.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
Option Description
References The name, object type, and owner of all objects the pre
computed result set references.
Partitions The name of the partitions, the segment on which they re
side, and the date they were created.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Precomputed Result Sets .
3. In the right pane, select a precomputed result set, and do one of:
9.26 Defaults
Specify a default value that can be referenced by an object if no value is explicitly supplied.
Procedure
Procedure
Pages Properties
General ○ Name
○ Type
○ Database
○ Owner
○ Creation date
○ Expression
Referenced By ○ Name
○ Type
○ Owner
○ Properties of objects referenced by this default
Procedure
○ Click the drop-down arrow on the default for which you want to replace the definition and select
Replace.
○ From Defaults in the left pane, click the drop-down arrow and select New. Enter the name of the
existing default for which you want to replace the definition.
When selecting an existing default, the Confirm Replace dialog appears with an option to replace the
object definition or cancel the replacement.
Delete a default.
Procedure
Stored procedures are named collections of SQL statements and flow control statements. A stored procedure
that performs a select, execute, or data modification command must have the same owner as the object
acted upon.
A system administrator, a database owner, or a user or group with create procedure permission can create
a stored procedure.
Related Information
A stored procedure is a collection of SQL statements and optional control-of-flow statements stored under a
name.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
3. In the left pane, do one of:
Related Information
You can replace the SQL definition of a stored procedure and change whether the procedure is recompiled each
time it is executed.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
3. Choose one of the following:
○ Click the drop-down arrow on the stored procedure for which you want to replace the definition and
select Replace.
○ From Stored Procedures in the left pane, click the drop-down arrow and select New. Enter the name of
the existing stored procedure for which you want to replace the definition.
When selecting an existing stored procedure, the Confirm Replace dialog appears with an option to
replace the object definition or cancel the replacement.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
3. In the right pane, select a stored procedure, and do one of:
General ○ View the name, type, database, owner, creation date, and group number of the procedure.
Parameters ○ View the name, type, mode, and order of all the procedure parameters. The mode value in
dicates whether it is an input or an output parameter. The order is a numeric value that in
dicates the place of the parameter in the list of parameters.
○ To change the parameters, change the definition of the stored procedure by dropping and
re-creating the procedure.
Permissions ○ Grant and revoke permissions on a procedure to users, groups, or roles. Choose the Grant
option to allow the grantee to further grant permissions to other users.
Referenced By ○ View the name, type, owner, and properties of objects that this procedure references.
References ○ View the name, type, owner, and properties of objects that this procedure references.
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
3. In the right pane, select a stored procedure, and do one of:
○ Users
○ Groups
○ Roles
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
3. In the right pane, select a stored procedure, and do one of:
○ Individual cells to revoke the currently granted permissions. The cell changes to show an "x", indicating
that the permission type is no longer granted.
8. Click OK.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , Stored Procedures.
3. In the right pane, select a stored procedure, and do one of:
SQLJ procedures are named collections of SQLJ statements and flow control statements. A stored procedure
that performs a select, execute, or data modification command must have the same owner as the object
acted upon.
A system administrator, a database owner, or a user or group with create procedure permission can create
a stored procedure.
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , SQLJ Procedures.
3. In the left pane, do one of:
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , SQLJ Procedures.
3. Choose one of the following:
○ Click the drop-down arrow on the SQLJ procedure for which you want to replace the definition and
select Replace.
○ From SQLJ Procedures in the left pane, click the drop-down arrow and select New. Enter the name of
the existing SQLJ procedure for which you want to replace the definition.
When selecting an existing SQLJ procedure, the Confirm Replace dialog appears with an option to
replace the object definition or cancel the replacement.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , SQLJ Procedures.
3. In the right pane, select an SQLJ procedure, and do one of:
General ○ Name
○ Type
○ Database
○ Owner
○ Creation date
○ Group number
Parameters ○ Name
○ Type
○ Mode – indicates whether it is an input or an output
parameter
○ Order of all the procedure parameters – a numeric
value that indicates the place of the parameter in the
list of parameters
Referenced By ○ Name
○ Type
○ Owner
○ Properties of objects
References ○ Name
○ Type
○ Owner
○ Properties of objects that the procedure references
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , SQLJ Procedures.
3. In the right pane, select an SQLJ procedure, and do one of:
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Procedures , SQLJ Procedures.
3. In the right pane, select an SQLJ procedure, and do one of:
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
3. In the left pane, do one of:
Related Information
You can replace the SQL definition of a extended procedure or change whether the procedure is recompiled
each time it is executed.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
3. Choose one of the following:
○ Click the drop-down arrow on the extended stored procedure for which you want to replace the
definition and select Replace.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
3. In the right pane, select an extended stored procedure, and do one of:
Pages Properties
General View the name, type, database, owner, creation date, and
dynamic link library (DLL) path of the stored procedure.
The DLL need not exist when you create the extended
stored procedure, but it must exist when you execute the
extended stored procedure.
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
3. In the right pane, select an extended stored procedure, and do one of:
○ Users
○ Groups
○ Roles
8. On the Grantee page, select one or more grantees.
9. Select Execute.
10. Choose With grant option to allow the grantee to further grant permissions to other users.
11. (Optional) Click Summary to verify your selected options.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
○ Individual cells to revoke the currently granted permissions. The cell changes to show an "x", indicating
that the permission type is no longer granted.
8. Click OK.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
3. In the right pane, select an extended stored procedure, and do one of:
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Extended Stored Procedures .
3. In the right pane, select an extended stored procedure, and do one of:
9.29 Functions
A scalar function takes a list of scalar arguments and return a single scalar value.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
3. In the left pane, do one of:
Related Information
You can replace the SQL definition, the return type, and change whether the function is recompiled each time it
is executed.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
3. Choose one of the following:
○ Click the drop-down arrow on the scalar function for which you want to replace the definition and
select Replace.
○ From Scalar Functions in the left pane, click the drop-down arrow and select New. Enter the name of
the existing scalar function for which you want to replace the definition.
When selecting an existing scalar function, the Confirm Replace dialog appears with an option to
replace the object definition or cancel the replacement.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
3. In the right pane, select a scalar function, and do one of:
Pages Properties
General ○ Name
○ Type
○ Database
○ Owner
○ Creation date
○ Group number
Parameters ○ Name
○ Type
○ Mode – indicates whether it is an input or an output
parameter
○ Order – a numeric value that indicates the place of
the parameter in the list of parameters
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
3. In the right pane, select a scalar function, and do one of:
○ Users
○ Groups
○ Roles
8. On the Grantee page, select one or more grantees.
9. Select Execute.
10. Choose With grant option to allow the grantee to further grant permissions to other users.
11. (Optional) Click Summary to verify your selected options.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
3. In the right pane, select a scalar function, and do one of:
○ Individual cells to revoke the currently granted permissions. The cell changes to show an "x", indicating
that the permission type is no longer granted.
8. Click OK.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
3. In the right pane, select a scalar function, and do one of:
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , Scalar Functions.
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , SQLJ Functions.
3. In the left pane, do one of:
Related Information
You can replace the SQL definition, the return type, and change whether the function is recompiled each time it
is executed.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , SQLJ Functions.
3. Choose one of the following:
○ Click the drop-down arrow on the SQLJ function for which you want to replace the definition and select
Replace.
○ From SQLJ Functions in the left pane, click the drop-down arrow and select New. Enter the name of the
existing SQLJ function for which you want to replace the definition.
When selecting an existing SQLJ function, the Confirm Replace dialog appears with an option to
replace the object definition or cancel the replacement.
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , SQLJ Functions.
3. In the right pane, select an SQLJ function, and do one of:
Pages Properties
General ○ Name
○ Type
○ Database
○ Owner
○ Creation date
○ Group number
Parameters ○ Name
○ Type
○ Mode – indicates whether it is an input or an output
parameter
○ Order – numeric value that indicates the place of the
parameter in the list of parameters
Related Information
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , SQLJ Functions.
3. In the right pane, select an SQLJ function, and do one of:
Procedure
2. In the left pane, expand ASE Servers Compiled Objects Functions , SQLJ Functions.
3. In the right pane, select an SQLJ function, and do one of:
Data store access management (DSAM) tracks access patterns for devices, segments, and data partitions,
providing detailed insights on how data is accessed in an SAP ASE database. DSAM allows you to define data
storage policies that compress and move data to appropriate storage based on the activity level of data.
A graphical workflow illustrating DSAM elements and how they interact with each other.
● Object (Tables or Databases) – are associated with access groups for the purpose of display and control.
● Access Group – is composed of a collection of access tiers, any of which may have a policy associated with
it.
● Access Tier – access frequency descriptions that describe the data’s access patterns for reporting
purposes.
● Policy – may describe a compression level and a device class to be applied to data whose access pattern
matches the associated access tier.
● Device Class – A customer-supplied code describing a storage device, which may be applied to storage
devices as a means of characterizing those devices. For example, HI - Hi Performance device.
● Segment – partition assigned to a region of storage, which controls the data’s physical placement on its
storage devices. Device - each device may permit storage for several segments, or for only one.
● Compression Level – row or page level compression.
To use DSAM, you need sybdsamdb, a database in which DSAM stores its information. Although you may run
the installsybdsamdb script to install the default sybdsamdb database, this database may be too small for
your needs, in which case you should plan for and create one instead. By default, the sybdsamdb database is
built on the sybdsamdbdev device, which needs at least 10,240 pages. If the sybdsamdbdev device is
unavailable, the script uses the default device.
Activity Requirement
Compressing partitions Enable configuration parameter enable compression. Using this feature
requires the license ASE_COMPRESSION.
Scheduling ● SAP ASE Job Scheduler must be running to schedule the background access
collection job, policy evaluation job, and partitions’ movement job.
● To schedule background access collection for the monitored databases users
need these roles, in the following order:
1. sa_role
2. mon_role
3. js_admin_role or js_user_role
● When granular permissions are enabled, users must have sa_role or
manage server permissions, and Job Scheduler must be installed,
enabled, and running.
Context
The sybdsamdb space requirement is principally defined by the DSAMAccessData table, which holds historical
data access information. New rows are added to table DSAMAccessData on a user-defined schedule (the
default is every six hours) for every user partition in every tracked database. Those records are thinned out
after a user-defined period (the default is after six months) and eventually discarded (the default is after one
year). This uses the most space in the database, so this is the basis used to determine the database size.
Knowing the maximum size of this table lets you determine the maximum required size of sybdsamdb.
1. Determine which database or databases to track through DSAM. You cannot use master, model,
temporary, or in-memory databases.
2. Count the number of user partitions in those databases. A user partition has a partition ID greater than
255.
3. Determine how many rows each partition should store in DSAMAccessData. Each partition stores one row
per aggregation interval up to the "compression period", and one row per compression interval through the
"purge period". Using the system-supplied defaults:
○ Aggregation frequency is six hours (that is, four collections per day).
○ Compression period is six months, or 183 days.
○ Compression interval is seven days.
○ Purge period is one year, or 365 days.
Using these defaults, each partition stores 4 rows/day * 183 days = 732 rows, plus 1 row/week * 182 days =
26 rows, for a total of 758 rows per partition.
4. Multiply rows per partition times the number of partitions to get total rows. For example, if you have 10,000
partitions, you will store 758 * 10,000 = 7,580,000 rows.
5. Determine how many pages that data occupies. The number of rows per page depends on your
installation’s logical page size:
Option Description
In the example below, if you use a 16 KB page, you need 7,580,000 / 281 = 26,975.09 pages. SAP ASE
cannot allocate a fraction of a page, so you round up to 26,976 pages.
6. Determine how many megabytes that data will occupies: Divide the total pages by the number of
pages/MB given above. In our example, this is 26,976 / 64 = 421.5 MB.
7. Add approximately 25 percent for the table’s index and 25 percent for estimated log space. So: 421.5 * 1.25
= 526.875 MB for data, and 421.5 * 0.25 = 105.375 MB for log, for a total of 632.25 MB.
8. Minor additional data space may be required for smaller tables. This will not be larger than the size of the
model database:
Using a default installation with a 16 KB logical page, that size is 24 MB. 526.875 + 24 = 550.875 MB for
data.
9. SAP ASE can only create databases in even numbers of megabytes, and its “block” size varies by logical
page size. For 2 KB and 4 KB pages, the block is 1 MB; for 8 KB pages, 2 MB; and for 16 KB pages, 4 MB.
Round the sizes up to a multiple of your block size. In the example below, with a 16 KB page, 550.875
rounds to 552 MB and 105.375 MB rounds to 108 MB; or, if creating a mixed-use database, (550.875
+ 105.375) = 656.25 rounds to 660 Mb.
Note
or
The input parameter is the number of partitions you expect to collect data for. It represents the total number of
user data partitions in all databases for which DSAM is enabled. You may count this or estimate it. To count it,
see the example for counting user partitions in all trackable databases.
Discover how many rows fit on one page at the current page size:
Divide rows by rows/page to get pages. Divide pages by pages/MB to get MB. From that number, estimate
index space and log space:
print 'Number of rows by default for %1! partitions: %2!, @ %3! rows/page',
@ptn_total, @rows, @rows_page
print 'Estimated size:'
select @data_mb as 'Data size in Mb'
, @index_mb as 'Index size in Mb'
, @data_mb + @index_mb as 'Total non-log Mb'
, @log_mb as 'Log Mb'
Additionally, estimate the system table size plus additional spare space. The following estimate includes the
total size of the model database:
Round the suggested sizes to sizes that can succeed create database with this page size:
This example demonstrates how to obtain the total partition count of user tables in all databases that are
eligible to have DSAM statistics collected.
Any database is permitted except for master, model, temporary, and in-memory databases.
This example includes databases you typically need not monitor, such as sybsystemprocs and
sybsystemdb, which contain very few user tables.
set nocount on
declare @ptn_ct int
, @ptn_now int
, @db_name varchar(30)
, @cmd varchar(300)
select @ptn_ct = 0
select @db_name = min(name) from master.dbo.sysdatabases
where dbid > 3
and status3 & -536870656 = 0
and status4 & 4096 = 0
while @db_name is not null
begin
select @cmd = 'select @ptn_now = count(1) from '
+ @db_name + '.dbo.syspartitions where id > 255'
exec (@cmd)
select @ptn_ct = @ptn_ct + @ptn_now
if @ptn_now != 0
print '%1! partitions in database %2!', @ptn_now, @db_name
select @db_name = min(name) from master.dbo.sysdatabases
where dbid > 3
and status3 & -536870656 = 0
and status4 & 4096 = 0
and name > @db_name
end
print ''
select @ptn_ct as 'Partition count'
Prerequisites
To run installsybdsamdb:
Procedure
Option Description
UNIX $SYBASE/$SYBASE_ASE/scripts
Windows %SYBASE%\%SYBASE_ASE%\scripts
3. Use isql to log in to the SAP ASE server and run the following script, where <server_name> is the
destination server for the database:
Option Description
Use the DSAM Guidance Wizard the first time you configure DSAM. Changes can be made after this initial
setup using DSAM Configure.
Use the DSAM Guidance Wizard to configure DSAM for the first time.
Procedure
Option Description
You can associate devices (except log only devices) with the device classes according to the device’s
speed, cost and usage. The two-character designator (‘HI’, ‘GP’, ‘OA’) shown with each class is the “class
tag”, which is stored as part of the device description and used to associate a device with a class.
8. Click Next.
9. The Access Tiers and Policy page displays the default access group and the associated policies. The
Default access group has three access tiers:
Option Description
Active Data accessed 1000000 times per hour or more over the past 7 days
Less Active Data accessed less than 999999 times per hour over the past 7 days
10. Click Edit to change the access tier information, including access counts, time period, policy association or
if you want to change the default color.
11. Click Next.
12. In the Customization page, specify:
After you perform initial DSAM setup using the DSAM Guidance Wizard, you can use DSAM Configure to
change your collection frequency settings.
Procedure
When you enable database monitoring, all of its active partition activities (physical I/O) are recorded.
Procedure
Procedure
Procedure
Option Description
Remove To delete the device class. A warning displays all devices associate with the deleted device class. The associ
ated device classes is set to NULL.
9.30.3.5 Policies
A policy controls what to do with data that fits that access pattern.
Procedure
Procedure
Option Description
Edit To edit the policy. Click Preview to view the policy syntax.
7. Click OK to confirm.
An access group manages a partition by reporting and managing the storage for that partition.
The Access Group Wizard walks you through the creation of an access group.
Procedure
Procedure
Option Description
Procedure
○ The name of the new access tier and the color code to associate with it.
○ The access count and the time evaluation period.
○ (Optional) assign a policy to the new tier.
7. Click OK.
You can either remove an access tier from an access group, or modify existing access tiers, such assigning a
different policy to an access group.
Procedure
Option Description
Procedure
Note
7. To edit the object's properties, select the object and click Properties.
Procedure
2. In the left pane, expand ASE Servers Schema Objects Databases User Databases .
3. In the right pane, do one of:
Procedure
2. In the left pane, expand ASE Servers Schema Objects Tables User Tables .
3. In the right pane, do one of:
Procedure
For a table From the Table Information tab type any portion of the name, the number of views to display by
Row count, Space reserved or Used space, and click Search.
By access groups From the Search by Access Group tab, select the access groups that are used in the database, and
click Search.
A chart displays. The X axis is the access tier based on the access group which the table is assigned. Y axis
is the total size of partitions which falls in the same access tier.
8. Click a column to view its partitions.
View a list of partitions based on access tiers, and manage their storage and compression.
Procedure
Option Description
A table From the Table Information tab, type any portion of the name, the number of views to display by
row count, space reserved, or used space,
By Access Groups From the Search by Access Group tab, select the access groups that are used in the database.
7. Click Search.
8. Select a table and click Access Map.
A chart displays. The X axis is the access tier based on the access group which the table is assigned. Y axis
is the total size of partitions which falls in the same access tier.
9. Click a column to view its partitions.
10. To move a partition to a specified segment and compress it, select the partition and click Manage.
Note
To alter the table, enable the select into database option from Database Properties.
Procedure
View partitions that do not comply with the policy of their qualified access tier.
Procedure
Note
10. Select Enable online mode to allow access to the table during the move.
You can immediately execute a policy for a partition or schedule a time to do so with Job Scheduler.
Procedure
You can use Job Scheduler to set a date and time to evaluate partitions.
Prerequisites
Procedure
Procedure
Note
The SAP ASE workload analyzer option allows you to capture, analyze, and replay a production workload
nondisruptively. You can then utilize the captured workload to diagnose problems, and understand and manage
configuration changes proactively.
SAP ASE workload analyzer also allows you to run replays of captured workloads to measure and analyze
application performance under different conditions.
● Identify problematic queries, such as queries with a long response time due to missing indexes.
● Identify client activity patterns, such as the number of requests per IP address.
● Measure the performance of captured workloads in different server configurations.
● Compare query and overall workload performance between different server configurations.
● Evaluate database upgrades and understand benefits from new options.
● Diagnose product problems by replaying functionality in a controlled environment.
Note
Whenever you use this option, make sure to start both SAP ASE and SAP ASE Cockpit using the same
operating system login. SAP ASE Cockpit must be able to read the PCAP files that SAP ASE generates. SAP
ASE Cockpit creates the output directories for the PCAP files and SAP ASE must be able to write to those
directories. Because permission to access to the directories and files are controlled by the operating
system login that creates them, SAP ASE Cockpit cannot perform a workload analysis unless it is running
under the same operating system login as the SAP ASE server.
An overview of the SAP ASE workload analyzer option components describing the general workflow.
1. After you have finished a workload capture, and the workload file is available from the repository server,
start a replay workload request from the SAP ASE Cockpit.
2. Workload analyzer generates a replay of a captured workload.
The SAP ASE workload analyzer option uses a database to store the captured workload and the analysis of the
workload.
This data is stored in the sybcatdb database in an SAP ASE server. The resource requirements of this
database may be significant and it is recommended that a separate SAP ASE server from the production server
should be used to host the repository database.
The SAP ASE Cockpit connects to the repository database server in order to store the captured workload, to
perform and display analysis of the workload and to replay the workload on a target SAP ASE server.
Information about the connection to the repository server is stored and reused by SAP ASE Cockpit once it has
been entered.
To set up the repository database, run the installsybcatdb installation script. See SAP ASE Workload
Analyzer Users Guide > Running the installsybcatdb Script.
You must connect to a repository database before you can load and analyze a captured workload. All captured
workloads and their analytical data are stored in the repository database.
Prerequisites
● To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
● Configure the repository database using the UTF-8 character set.
Procedure
2. In the left pane, expand ASE Servers Workload Analyzer Settings Repository .
3. In the left pane, do one of:
○ Repository Name
○ Server Type (SAP ASE)
○ Hostname
○ Port
○ Username
○ Password
6. Click Finish.
Prerequisites
● To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
● Users must be disconnected from the repository.
Procedure
2. In the left pane, expand ASE Servers Workload Analyzer Settings Repository .
3. In the left pane, do one of:
○ Repository Name
○ Server Type (SAP ASE)
○ Hostname
○ Port
○ Username
○ Password
6. You have the option to immediately connect to a repository after saving the connection information.
7. Click OK.
Decide which repository database server to connect to. Connecting to a repository database is required to use
the SAP ASE workload analyzer option. Without a repository database connection, you can only perform a
database capture. You can both start and stop a capture without a repository.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
2. In the left pane, expand ASE Servers Workload Analyzer Settings Repository .
3. In the right pane, select a repository name, and then select Connect or Disconnect.
The status of the repository database is updated in the Workload Analyzer's Repository page tab.
Removing a repository database server from the repository list does not remove the database from the
repository database server.
Prerequisites
● To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
● SAP ASE Cockpit must be disconnected from the repository database server.
Procedure
Results
When the deletion is complete, the repository database server is removed from the repository list.
SAP ASE workload analyzer captures the complete production workload without disrupting currently running
SAP ASE transactions.
Prerequisites
● To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
● Back up your database using dump database before starting the capture from your production server.
If the states of the tables in the application database are not identical to the states at the beginning of the
capture on the production server, you may see Duplicate key errors if there are unique indexes on tables
and there are already rows in those tables with the same values that the application attempts to create
during replay. By performing a database dump, when you restore the database to the test server to prepare
for a replay, the tables will not contain any data that was added during the capture.
● The SAP ASE server must have operating system permission to open any capture files. The permission
checks for dbcc workload_capture differ based on your granular permissions settings.
Setting Description
Enabled Only users with set tracing any process permission can active capturing.
The captured workloads contain every SQL transaction taking place inside SAP ASE during the capture period,
so that you get detailed analytical information about the server’s behavior. The captured workload is also used
to replay the workload.
Procedure
You can specify a capture name or accept the default the wizard assigns. The wizard uses a format of
<servername_date_time>, such as server1_20150428_1029200.
Option Description
Use the Add and Remove buttons to control the application filter.
The application list displays the applications that are logged in to the SAP ASE server at the time you use
this wizard.
○ The Add button to add applications that are not currently active. Type a name in the add field and click
Add
○ The Remove button to remove select an application from the list and click Remove
You see the changes you make when you open the capture wizard.
File size (Optional) Whether to stop the capture when the file reaches a specific size. The default file size
is 4096 MB. The wizard calculates and displays the amount of free space you have.
TDS response Whether to capture all response TDS data (rather than last response packet for each request).
data Selecting this option may require additional storage space.
Cockpit TDS data Whether to ignore TDS data from SAP ASE Cockpit. The default for this option is set to On to
filter out the SAP ASE Cockpit commands from the workload capture.
In the Capture Status screen, information is displayed to indicate that workload capture is in progress or
scheduled.
During the capture period, you can close the status dialog – or even log out of cockpit – without stopping
the capture. To reopen the status dialog, select the Status context menu of the capture.
9. (Optional) Click Stop Capture to stop the current workload capture.
When the capture process is complete, the captured workload displays in the Captures window. The status
of the capture changes from "Capturing" to "Stopped" in the list of captures in the Captures window.
Note
When a capture is stopped on a server with a large number of engines, the finalization of the capture
may take a minute or more.
Results
After you create a capture, you can analyze the workload. See Analyzing Captured Workloads [page 446].
Remove captured workloads that are no longer needed from the repository database.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Context
Analytical information from captured workloads include requests from IP addresses, a histogram displaying the
timing and number of requests, and a summary of additional basic capture information.
● A basic capture summary, such as capture duration, number of sessions, number of requests, and number
of errors.
● A histogram of longest running requests and the most frequent running requests.
● Requests from IP, login, or application that sent the most number of requests.
Note
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
View the number of connections for the workload and basic information about each session.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, click Sessions to see individual workload connection information:
Option Description
Application Name The name of the application from which the requests were sent.
Login Time The date and time the user logged into a session.
Note
The default sort of the list is on this column.
Logout Time The date and time the user logged out of session.
Average Execution Duration The average time used to process requests in a session.
6. Double-click the row to display the details of individual execution requests made during the session.
7. Click:
Option Description
All Requests View all requests for the given session and double-click a row to display detailed information about the
request such as the request text.
Dynamic SQLs View Dynamic SQL for a given session and double-click a row to partially display the prepared state
ment and parameters associated with the request. Double-click an item from the Execution List to fully
display the prepared statements, parameters, and requested text associated with the request.
The Repeated Request Info page also displays the execution list, which shows the individual execution
requests made during the session.
10. If the query contains dynamic SQL, click Dynamic SQL to view more information.
To view full details of the statement, double-click an item in the Execution List.
11. To learn more about the errors in your query, select Error Details.
12. (Optional) Click the arrows at the bottom of the page to scroll through multiple pages.
13. Click OK when you are done.
The Request Explorer displays a list of all requested actions on the captured workload.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, click Requests to view:
Option Description
Note
The default sort of the list is on this column.
Application Name The name of the application from which the requests were sent.
Request text The query text. If the query text is truncated because it is long,double-click the request row to
view the complete text in the Request Info screen..
6. Select a query from the list to view a quick preview of the requested text associated with a long query. Click
the same query again to hide the quick preview.
7. (Optional) Double-click a row to display detailed information.
8. If the query has been repeated multiple times, click Repeated Request to view the query text, and a
summary that displays the following information:
The Repeated Request Info page also displays the execution list, which shows the individual execution
requests made during the session.
9. If the query contains dynamic SQL, click Dynamic SQL to view more information.
To view full details of the statement, double-click an item in the Execution List.
10. To learn more about the errors in your query, select Error Details.
11. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, click Errors to display the following, grouped by error numbers:
Option Description
Ratio Out of the total number of errors, the percentage of times that this error occurred.
Severity The severity level of a message indicates the type and severity of the problem that SAP ASE has en
countered.
Note
The default sort of the list is on this column.
Message Sample The error message. Text for multiple occurrences of the same error may be different due to variable
values contained within the messages.
6. Double-click a row to view the details of the query, or an error number to view:
Option Description
Application Name The name of the application from which the requests were sent.
7. If the query has been repeated multiple times, click Repeated Request to view the query text, and a
summary that displays the following information:
The Repeated Request Info page also displays the execution list, which shows the individual execution
requests made during the session.
To view full details of the statement, double-click an item in the Execution List.
9. To learn more about the errors in your query, select Error Details.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, the Top Long Running Requests chart displays up to 10 of longest running queries, along
with:
Option Description
You can also click the chart to view the complete list of queries.
6. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
7. (Optional) Double-click a row to display detailed information.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, the Top Frequent Running Requests chart displays up to 10 of the most frequently
executed queries in the capture, along with:
Option Description
You can also click the chart to view the complete list of queries.
The dashboard displays the top three IP addresses that send the most requests. Or you can view the complete
report of all IP addresses.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, click IP Address Report for a list of IP addresses used in the captured workload to display:
Option Description
Number of Requests The number of query requests sent from the IP address.
Note
The default sort of the list is on this column.
Number of Sessions The number of sessions associated with the IP address for the captured workload.
Total Session Duration The total time used to process requests for the IP address.
Total Execution Duration The total time used to execute requests for the IP address.
The dashboard displays the top three logins that send the most requests. Or you can view the complete report
of all logins.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, click Login Report to display:
Option Description
Number of Requests The number of query requests sent from the login.
Note
The default sort of the list is on this column.
Number of Sessions The number of sessions associated with the login for the captured workload.
Total Session Duration The total time used to process requests for the login.
Total Execution Duration The total time used to execute requests for the login.
The dashboard displays the top three applications that send the most requests. Or you can view the complete
report of all applications.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Capture Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
capture dashboard option displays after the replay is analyzed.
5. In the dashboard, click Application Report to display:
Option Description
Number of Requests The number of query requests sent from the application.
Note
The default sort of the list is on this column.
Number of Sessions The number of sessions associated with the application for the captured workload.
Total Session Duration The total time used to process requests for the application.
Total Execution Duration The total time used to execute requests for the application.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
● Pinpoint potential issues such as why certain queries are running slowly.
● Determine the longest running query.
● Test new features and run them against a captured workload to verify performance.
● Capture the workload on the target server that is running the replay and compare performance against the
original replay.
● Compare the differences between a source workload and a replay workload.
Use the Replay Wizard to specify workload replay. You can then later view the replay from an SAP ASE Cockpit
that is managing the SAP ASE server, which is usually a different cockpit from the one that is managing the
SAP ASE server that generated the workload.
Prerequisites
● To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
● The SAP ASE server must have operating system permission to open any capture files. The permission
checks for dbcc workload_capture differ based on your granular permissions settings.
Setting Description
Enabled Only users with set tracing any process permission can active capturing.
Option Description
Click Replay sessions which login failed in the source workload if you wish to replay failed login sessions.
8. In the Speed page, change the default value of 1.0 to change the speed at which to run the replay. The
values range from 0.1 for the slowest, and 2.0 for the fastest speed.
9. In the Password page, specify passwords to use in the replay.
10. On the Options page, select:
Option Description
Capture the workload If you keep this default, you can also specify the location in which to save the PCAP file.
during the replay
Use SSL connections If you did not capture a workload using SSL, do not use SSL during replay. Since the average
in the replay execution time for queries is longer when using SSL, and this could impact the performance of
a replay.
Reset server time to When date and time adjustment is not used during replay (default setting), the date and time
original workload on the replay SAP ASE server will be the actual time at which the replay occurs. If you check
capture start time
this box, when the replay begins, the date and time of the replay SAP ASE server are set to the
time at which the capture originally started.
On the Replay Status page, information displays to indicate that replay workload is in progress or
scheduled.
12. (Optional) Click Stop Replay to stop the replay you specified.
You can close the status dialog without stopping the replay. To reopen the status dialog, select the Status
context menu of the replay.
Compare the workload you captured with a replay workload to identify differences.
Prerequisites
For a full comparison, analyze both source and workload replays using SAP ASE version 16.0 SP03 or later. If
you have a captured replay from versions of SAP ASE 16.0 SP02, perform the capture and replay processes
again using SAP ASE from 16.0 SP03 before you generate a comparison. Versions of SAP ASE earlier than 16.0
SP03 are affected.
Context
Comparing your captured (source) workload with a workload replay allows you to check for differences in the
number of requests, average and individual request execution times, number of errors, and so on. Identifying
differences in execution time or error rate can be helpful in understanding differences in performance or
application behavior.
Procedure
SAP ASE cockpit compares the source workload with the workload replay you selected, and displays a
comparison of the average request execution duration of the two workloads. The dialog also provides the
following information about both workloads:
○ Workload names
○ Workload comments
○ Server names
○ Start times
View the number of connections for the comparison between the captured workload with a workload replay
and basic information about each session.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Compare Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
compare dashboard option displays after the replay is analyzed.
5. In the dashboard, click Sessions to see the following individual replay connection information:
Option Description
Session Duration Diff The difference in time spent in a single session when comparing the source to the replay.
Error Number Diff The difference in number of errors experienced for each session when comparing the
source to the replay.
Average Execution The average time difference used to process requests in a session when comparing the
Duration Diff source to the replay.
6. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
7. (Optional) Click the arrows at the bottom of the page to scroll through multiple pages.
8. Double-click the row to display the following details of individual execution requests made during the
session:
Option Description
Execution Time Diff The difference in time to execute a request when comparing the source to the replay.
Start Time (Default sort order for the list) The date and time a query was sent.
Request text The query text. If the query text is truncated because it is long, double-click the request row to
view the complete text in the Request Info screen..
The Request Explorer displays a list of all requested actions on the replay comparison.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
Option Description
Start Time (Default sort order for the list) The date and time a query was sent.
Request text The query text. If the query text is truncated because it is long, double-click the request row
to view the complete text in the Request Info screen.
6. Select a query from the list to view a quick preview of the requested text associated with a long query. To
hide it, click Hide on the text panel.
7. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
8. (Optional) Double-click a row to display detailed information.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Compare Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
compare dashboard option displays after the replay is analyzed.
Option Description
Count Diff The difference in number of errors that occurred between the source and the replay.
Ratio Diff Out of the total number of errors, the difference in the percentage of times that this error occurred.
Ratio Out of the total number of errors, the percentage of times this error occurred.
Severity (Default sort order for the list) The severity level of a message indicates the type and severity of the
problem that SAP ASE has encountered. See Diagnosing System Problems in the System Adminis
tration Guide Volume 1 for more information about error severity levels.
Message Sample A sample of the error message showing the number of errors and the error severity. Text for multiple
occurrences of the same error may be different due to variable values contained within the mes
sages.
Option Description
Start Time (Default sort order for the list) The date and time a query was sent.
Request Text The query text. If the query text is truncated because it is long, double-click the request row to
view the complete text in the Request Info screen.
7. (Optional) Double-click a row to display detailed information about the Request Text, Source Error
Message, and Replay Error Message.
The Top Performance Improved Requests chart displays queries with the most improved performance, and
compares them to the source capture.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
If Open Compare Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
compare dashboard option displays after the replay is analyzed.
5. In the dashboard, the Most Improved Requests chart displays up to 10 of the requests with the most
improved performance. Click the chart to view the following information about the comparison, source and
replay:
Option Description
Performance Improved Percentage The percentage by which the request's performance was improved.
Performance Improved Time The time to run the request with improved performance.
6. Double-click the row to display the details of individual execution requests made during the session.
Option Description
Start Time (Default sort order for the list) The date and time a query was sent.
Request text The query text. If the query text is truncated because it is long, double-click the request row
to view the complete text in the Request Info screen.
7. (Optional) Click 10, 50, 100, or 500 to change the number of results listed per page view.
8. (Optional) Double-click a row to display detailed information.
The Top Performance Decreased Requests chart displays those queries with the largest decrease in
performance, and compares them to the source capture.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Context
This chart displays queries with performances that have experienced the biggest performance decreases,
which may not necessarily be the same as queries with the worst performance.
Procedure
If Open Compare Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The
compare dashboard option displays after the replay is analyzed.
5. In the dashboard, the Most Decreased Performance chart displays up to 10 of the requests with the most
decreased performance. Click the chart to view the following information about the comparison, source
and replay:
Option Description
Performance Decreased Percentage The percentage by which the request's performance was decreased.
Performance Decreased Time The time to run the request with decreased performance.
Option Description
Start Time (Default sort order for the list) The date and time a query was sent.
Request text The query text. If the query text is truncated because it is long, double-click the request row
to view the complete text in the Request Info screen.
7. (Optional) Click 10, 50, 100, or 500 to change the number of results listed per page view.
8. (Optional) Double-click a row to display detailed information.
You can delete both a replay from the repository database, as well as its associated PCAP file. Deleting the
replay does not remove its associated PCAP file.
Since you only need to retain a PCAP file if you plan to run a replay from it, you can safely remove all PCAP files
when you delete their associated replays.
If you are removing both a replay as well as its associated PCAP file from the repository, remove the PCAP file
before removing the replay.
Deleting the replay does not remove the PCAP files. If you want to remove both the replay and the PCAP files
from the repository, you should remove the PCAP files first.
Remove PCAP files that you no longer need. If you want to remove a PCAP file's associated replay, remove the
PCAP file first.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Generally, you can delete the PCAP file after you load and analyze it. Do not delete PCAP files if you want to
load them again in the future.
Procedure
Remove replays that are no longer needed from the repository database.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
Note
Analytical information from workload replays include requests from IP addresses, a histogram displaying the
timing and number of requests, and a summary of additional basic replay information.
● A basic replay summary, such as replay duration, number of sessions, number of requests, and number of
errors.
● A histogram of longest running requests and the most frequent running requests.
● Requests from IP, login, or application that sent the most number of requests.
View the number of connections for the workload replay, as well as basic information about each session.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, click Sessions to see the following individual replay connection information:
Option Description
Application Name The name of the application from which the requests were sent.
Login Time (Default sort order for the list) The date and time the user logged into the session.
Logout Time The date and time the user logged out of the session.
Average Execution Duration The average time used to process requests in a session.
Option Description
All Requests View all requests for the session. Double-click any row to view detailed information about the selected
request.
Dynamic SQLs View Dynamic SQL for the session. Double-click any row to view a partial display of the SQL statement
and parameters for the request. Double-click an item from the Execution List to view the complete
SQL statement, parameters, and requested text for the request.
7. If the query has been repeated multiple times, click Repeated Request to view the query text, and a
summary that displays the following information:
The Repeated Request Info page also displays the execution list, which shows the individual execution
requests made during the session.
8. To learn more about the errors in your query, select Error Details.
9. (Optional) Click the arrows at the bottom of the page to scroll through multiple pages.
10. Click OK when you are done.
The Request Explorer displays a list of all requested actions on the captured workload replay.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, click Requests to view:
Option Description
Start Time (Default sort order for the list) The date and time a query was sent.
Application Name The name of the application from which the request was sent.
Request text The query text. If the query text is truncated because it is long, double-click the request row to
view the complete text in the Request Info screen.
The Repeated Request Info page also displays the execution list, which shows the individual execution
requests made during the session.
8. If the query contains dynamic SQL, click Dynamic SQL to view more information.
To view full details of the statement, double-click an item in the Execution List.
9. To learn more about the errors in your query, select Error Details.
10. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, click Errors to display the following, grouped by error numbers:
Option Description
Ratio Out of the total number of errors, the percentage of times that this error occurred.
Severity (Default sort order for the list) The severity level of a message indicates the type and severity of the
problem that SAP ASE has encountered.
Message Sample The error message. Text for multiple occurrences of the same error may be different due to variable
values contained within the messages.
6. Double-click a row to view the details of the query, or an error number to view:
Option Description
Application Name The name of the application from which the requests were sent.
7. If the query has been repeated multiple times, click Repeated Request to view the query text, and a
summary that displays the following information:
The Repeated Request Info page also displays the execution list, which shows the individual execution
requests made during the session.
8. If the query contains dynamic SQL, click Dynamic SQL to view more information.
To view full details of the statement, double-click an item in the Execution List.
9. To learn more about the errors in your query, select Error Details.
You can display the queries that were executed for the longest period of time in the replayed workload sorted
by the amount of time they were executed. The Top Longest Running Requests graph on the Replay Dashboard
lists up to 10 queries.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, the Top Long Running Requests chart displays up to 10 of longest running queries, along
with:
Option Description
6. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
7. (Optional) Double-click a row to display detailed information.
You can display the queries that were executed most frequently in the replayed workload.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, the Top Frequent Running Requests chart displays up to 10 of the most frequently
executed queries in the capture, sorted by the number of times they were executed, along with:
Option Description
The dashboard displays the top three IP addresses that send the most requests by default. You can view a list
of all the IP addresses and the workload that they generated by clicking on the IP Address chart.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, click IP Address Report for a list of all IP addresses used in the replay to display:
Option Description
Number of Requests (Default sort order for the list) The number of query requests sent from the IP address.
Number of Sessions The number of sessions associated with the IP address for the captured workload.
Total Session Duration The total time used to process requests for the IP address.
Total Execution Duration The total time used to execute requests for the IP address.
6. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
7. (Optional) Double-click a row to display detailed information.
The dashboard displays the top three logins that send the most requests by default. You can view a list of all of
the logins and the workload that they generated by clicking on the login chart.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, click Login Report to display:
Option Description
Number of Requests (Default sort order for the list) The number of query requests sent from the login.
Number of Sessions The number of sessions associated with the login for the captured workload.
Total Session Duration The total time used to process requests for the login.
Total Execution Duration The total time used to execute requests for the login.
6. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
7. (Optional) Double-click a row to display detailed information.
The dashboard displays the top three applications that send the most requests by default. You can view a list of
all the applications and the workload that they generated by clicking on the applications chart.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
If Open Replay Dashboard is not available, the replay has not yet been analyzed. Select Analyze. The replay
dashboard option displays after the replay is analyzed.
5. In the dashboard, click Application Report to display:
Option Description
Number of Requests (Default sort order for the list) The number of query requests sent from the application.
Number of Sessions The number of sessions associated with the application for the captured workload.
Total Session Duration The total time used to process requests for the application.
Total Execution Duration The total time used to execute requests for the application.
6. (Optional) Click 20, 50, or 100 to change the number of results listed per page view.
7. (Optional) Double-click a row to display detailed information.
You can display a dialog showing the status of completed or running replays.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Procedure
The Log Level setting determines how much diagnostic information is included in the SAP ASE log file for the
Workload Analyzer feature.
Prerequisites
To use the dashboard, you require a workload user login or sa_role permissions on the SAP ASE workload
analyzer repository server. See Add a Workload User Login for more information.
Context
Warning: Do not change this setting unless advised to do so by SAP Customer Service. Increasing the setting of
Log Level from the default value of Info may degrade the performance of the SAP ASE server due to an increase
in data written to its log file and additional disk space that data requires.
2. In the left pane, expand ASE Servers Workload Analyzer Settings Preferences .
3. In the left pane, do one of:
○ Click the arrow to the right of the name and select Modify, or
○ Click the Actions button and select Modify.
4. Specify the log level for the workload analyzer.
5. Click OK.
10.9 Restrictions
There are some restrictions on capturing, analyzing and replaying workloads at the same time.
When multiple SAP ASE Cockpit instances share the same workload repository database, it is not possible for
more than one of those cockpit instances to either analyze a captured workload or perform a replay.
This table shows what client #2 is permitted to do when client #1 is already performing a specific action, in a
set-up where the two clients are using the same cockpit server:
Table 10: Restrictions for Two Clients are Using the Same Cockpit Server
Can client #2 start a cap Can client #2 start an anal Can client #2 start a re
ture? ysis? play?
The following table shows what client #2 is permitted to do when client #1 is already performing a specific
action, in a setup where each client is using its own cockpit server:
Table 11: Restrictions When Two Clients are Using Their Own Cockpit Servers
Can client #2 start a cap Can client #2 start an anal Can client #2 start a re
ture? ysis? play?
Collect comprehensive SAP ASE configuration and environment data for diagnostic analysis. SAP Technical
Support uses this information to diagnose server issues, thus expediting customer cases.
● Field diagnostic data – includes configuration and environment information about SAP ASE at the time it is
run. The sybdiag utility command is invoked to collect this information.
● Optimizer diagnostic data – provides a way to analyze SQL queries to optimize their performance. The
sp_opt_querystats system procedure is invoked to collect this information.
Context
Perform the following to use all the functionality of the diagnostic data wizard:
Procedure
● Users must be granted the sa_role and mon_role to send diagnostic data through the diagnostic wizard to
SAP Technical Support via e-mail message.
● The administrator must configure the e-mail server for any user to send the diagnostic data as an e-mail
attachment using the diagnostic wizard.
Collect comprehensive diagnostic data about the configuration and environment of SAP ASE at the time it is
run. This data can be used by SAP Customer Support to diagnose server issues.
Prerequisites
Register and authenticate the agent to enable the collection of diagnostic data.
Context
Diagnostic data is obtained by executing the sybdiag utility. See sybdiag in the Utility Guide.
Procedure
Related Information
Collect diagnostic data to send to SAP Technical Support to perform detailed analyses in optimizing SQL
queries and improving performance.
Prerequisites
Register and authenticate the agent to enable the collection of diagnostic data.
Make sure Job Scheduler is installed, enabled, and running. You must also be logged in to Job Scheduler with a
login that has sa_role permissions and either js_user_role or js_admin_role before you collect optimizer
diagnostic data; otherwise, you see an error message on the Introduction page, and the Next button becomes
disabled.
Context
Diagnostic data is used to optimize complex SQL queries by executing the sp_opt_querystats system
procedure. See sp_opt_querystats in Reference Manual: Procedures.
Option Description
Enable statistics I/O Collects information about physical and logical I/O and the number of times
a table has been accessed. The output follows the query results and pro
vides actual I/O performed by the query.
Enable statistics time Is the query execution time generated by set statistics time.
Use option show_missing_stats Collects information about missing statistics found for any of the tables in
long volved in the query.
Enable statistics resource Displays the compilation and execution resources used, such as procedure
cache, sorting, and temporary databases.
Enable statistics plancost Displays the estimated values for logical I/O, physical I/O, and row counts
compared to the actual ones evaluated at each operator, and reports on
CPU and sort buffer cost.
Use option show long Is the logical operator tree for the query generated by the set option
show long command. If you unselect this option, the shorter set
option show is used. The default is set option show long.
Execute the query After you execute the query, the query execution time generated by set
statistics time.
Show data When selected, suppresses the set nodata on option.
10. If you selected Customize diagnostic options, clickingNext displays the Optimization Goals window. Choose
the strategy that best fits your query environment:
Option Description
allrows_mix (Default) Instructs the query processor to allow both nested-loop joins and merge joins. The query
processor measures the relative costs of each join type to determine which to use.
allrows_oltp Instructs the query processor to use the nested-loop join operator.
allrows_dss Instructs the query processor to use nested-loop, merge-, or hash-joins. The query processor
measures their relative costs to determine which join it uses.
11. On the Upload Options page, specify whether to upload the diagnostic data to SAP Technical Support
immediately after the data is collected. You can perform an upload as a separate step later.
If you select Upload the package to SAP Customer Support, you can upload diagnostic data package via e-
mail notification. By default, the Upload Options page lets you delete the diagnostic data package after a
successful upload. This operation is skipped if the upload task fails.
12. Click Next to start the collection process on the Summary page.
Related Information
● During data collection – select the upload option in the Diagnostic Data wizard as the last step during data
collection.
● After data collection – manually select to upload data packages that are created by the Diagnostic Data
wizard.
Submit field and optimizer diagnostic data to SAP Technical Support as an e-mail attachment.
Prerequisites
Use this process only if you are using the Diagnostic Data wizard to specify e-mail notification information, or if
you have already created a diagnostic data package and saved it to the cockpit repository.
If you do not set up your e-mail server information before you configure the diagnostic data wizard, an error
message will be shown on the Upload Options page when you select Send e-mail notification with the
diagnostic data package, and you are not able to proceed to E-mail Notification page.
Context
● While you are creating a diagnostic data package – select Send e-mail notification with the diagnostic data
package in the Upload Options page in the Diagnostic Data wizard.
● After you created a diagnostic data package and saved it to the repository – right-click the package record
in the Diagnostic Data summary window, select Upload Packages, then select Send e-mail notification with
the diagnostic data package.
Procedure
Option Description
Case Number (Optional) Your case number, if your diagnostic data is related to a ticket you have already opened with
SAP Technical Support.
Context
You can configure the Diagnostic Data wizard to automatically delete a package after it creates and uploads the
package to SAP Technical Support. You can also delete diagnostic data packages from the repository from the
Diagnostic Data summary page after they have been created.
Procedure
Problem: Pressing the F5 key to refresh your browser logs you out of SAP ASE Cockpit.
Browser refresh updates the loaded application or pages in the browser—in this case, the Adobe Flash on which
SAP ASE Cockpit is built.
Consequently, pressing F5 logs you out of servers, including SAP ASE Cockpit.
The Monitor and Statistics Chart context menu items for a monitored SAP ASE server are grayed out.
Solution: Make sure your user account is authenticated on the SAP ASE server. To monitor the SAP ASE server,
you must also make sure that your account has been granted mon_role.
Related Information
Problem: Changes made to database objects are sometimes not visible in SAP ASE Cockpit dialogs or screens.
Solution: Select Refresh from the Actions pull-down to see the updated values for the database objects.
● Click Finish on a wizard, and do not see the updates (that should be generated by the wizard action) on
your current screens.
● Create or update database objects outside of SAP ASE Cockpit.
Problem: A collection job for SAP ASE may fail when the number of open databases is too low.
Solution: Modify the value of number of open databases by using either the Server Configuration page on
the MONITOR tab, or these steps:
Related Information
The errors appear in the log and on the collection history screen.
Solution: Try to determine why the collection is taking so long. For example, are network delays slowing down
traffic between SAP ASE Cockpit and the monitored server?
In the case of network delays and other resource-related problems, the interval between collections might be
shorter than the time needed to finish the collection. To fix this problem, increase the time between collections.
Solution: Schedule a job to run the data collection that supports your alerts. See the data collections topic for
your SAP ASE Cockpit product module for information on which collections must be scheduled.
Troubleshoot problems that involve log in, starting, stopping, and authentication.
Problem: When trying to connect to SAP ASE Cockpit in Firefox, fatal error #2035 appears before the login
screen appears.
Solution:
Solution: Make sure that SAP ASE Cockpit has been configured:
Problem: Some features are not enabled even though you are using a login account that has sa_role on the
managed server.
Solution: If your login account was granted sa_role after you opened the Monitor view, exit from the monitor
view and reauthenticate. This causes SAP ASE Cockpit to reconnect to the server and the new connection
acquires the updated login privileges.
Solution: SAP ASE Cockpit might use a port that is used by another server or application. To check for port
conflicts:
The command lists all the ports on which SAP ASE Cockpit and its services listen, indicates whether each
port is in use, and shows the service running on each port. If the SAP ASE Cockpit is not running, any port
shown to be in use represents a conflict.
2. If you discover a conflict, use cockpit --port to change the port used by the SAP ASE Cockpit service.
Increase the maximum memory setting if you see this error when you try to start: Could not create the
Java Virtual machine.
(Linux platform only) If the environment variable LANG is set to POSIX, the start up script for both SAP
Adaptive Server and the Replication Server, which is invoke by the cockpit, will fail to run.
To resolve this issue, set the LANG environment explicitly in the start up script file to en_US.UTF-8.
For example, add the following lines to the RUN_<myServer>.sh start up script:
LANG=en_US.UTF-8
export LANG
Changing the SAP ASE host name in the interfaces file to a different name removes the authentication and
connection information for the SAP ASE cockpit.
When the SAP ASE cockpit is started, the first query entry of the interfaces is used to establish the host name
and port number. If you change the host name in the interfaces file, the SAP ASE server is treated as a new
server when the SAP ASE cockpit is restarted.
For example, the following information in the interfaces file is used to establish the host name and port number:
● master=NLWNSCK,host1,5000
● query=NLWNSCK,host1,5000
● master=NLWNSCK,localhost,5000
● query=NLWNSCK,localhost,5000
● master=NLWNSCK,host1,5000
● query=NLWNSCK,host1,5000
Once the host name is changed, both the ASE Agent and Replication Management Agent (RMA), must be
manually registered. SAP also recommends that you change the host name in ASE Agent Plug-in configuration
file (agent-plugin.xml).
Problem: SAP ASE Cockpit generates OutOfMemory errors and might fail to start.
Solution:
● If the OutOfMemory error says that SAP ASE Cockpit is out of heap space, increase the maximum memory
setting (<COCKPIT_MEM_MAX> or jvmopt=-Xmx).
● If the OutOfMemory error says that SAP ASE Cockpit is out of permanent generation space, increase the
permanent memory setting (<COCKPIT_MEM_PERM> or jvmopt=-XX:MaxPermSize).
● Repeated OutOfMemory errors may indicate a memory leak. OutOfMemory errors generate heap dumps.
Heap dump files have a file extension of .hprof, in the COCKPIT-4\log directory.
Problem: Instead of graphing performance counters over a long time period, the statistics chart shows only
very recent data.
Solution: Ask your SAP ASE Cockpit administrator to change the repository purging options to keep statistical
data available for as long as you need it. By default, statistics are purged frequently to conserve disk space.
Problem: A monitored SAP ASE server is responding slowly. How do you tell whether the problem lies in the
network or the server?
Solution: On the Monitor tab for the server in question, select Engines. On the Engines screen, select an engine
from the Engines table and check the Engine CPU Utilization graph. If the graph shows high activity for the
period of slow response, the engine might be overloaded. If the graphs for all engines on this server show low
activity, a network problem is more likely.
Related Information
Problem: When SAP ASE Cockpit starts, you see warnings about system memory or heap memory allocation.
Required repository database version Required Repository Database Version is Incompatible with
<repo_verion_required> is incompatible the Current Version [page 493]
with current version
<repo_version_current>.
You don't have permission to capture Capture Workload Permission Problems [page 494]
workload from this server,
You don't have permission to replay Replay Workload Permission Problems [page 494]
workload on this server.
Capture analysis failed, or Replay analysis Capture Analysis Fails, or Replay Analysis Fails [page 495]
failed.
Note
This is not a complete list of workload analyzer error messages. If you encounter an error message that is
not listed in this section, you can search the SAP knowledge base for a solution, or report the incident to
SAP Support. For more information, see https://support.sap.com/kb-incidents.html .
This message may be displayed from the SAP ASE cockpit when you are connecting to the repository
database. The repository and the cockpit server work together to complete the workload analyzer tasks
(capture, replay, analyze, compare, and so on). The version information in cockpit server and repository
database need to be consistent. To ensure the consistency, we have the same version information defined for
both the cockpit server and repository. It is represented as “x.y”. The x stands for the major version number,
and the y for the minor version number. For example, the latest version is 7.0. Each time there is a table or view
change in the repository database, the major version number is increase. When there are only stored procedure
changes in the repository database, the minor version number is increased.
● The <repo_version_current> in the error message is “0.0”. This means that cockpit server cannot read the
version information from the specified repository. This indicates the version table (t_repodbversion) or the
related stored procedure (p_getsybcatdbver) does not exist in the repository database or are corrupted.
This issue can be resolved by executing the repository installation script against the repository server. The
installation script is located at $COCKPIT\plugins\ASEMAP\scripts\installsybcatdb.
● The <repo_version_current> in the error message is not “0.0”, but less than the <repo_verion_required>.
This means the repository database is obsolete to the running cockpit server. You are running a newer
cockpit server but trying to connect to a repository with an older version. This issue can be resolved by
executing the repository installation script against the repository server. The installation script is located at
$COCKPIT\plugins\ASEMAP\scripts\installsybcatdb. The installation script will perform an
upgrade process on the existing data in the repository database. Ths means the data in the repository
database will not be lost after executing the installation script, but will be updated to a newer version.
● The <repo_version_current> in the error message is not “0.0”, but greater than the
<repo_verion_required>. This means the repository database is newer than the running cockpit server. You
are trying to connect to a repository with a version that is newer than the running cockpit server. This issue
can be resolved by either connecting to another repository that is consistent with the running cockpit
server, or drop and recreate the repository database and execute the repository installation script on the
new repository database. The installation script is located at $COCKPIT\plugins\ASEMAP\scripts
\installsybcatdb. This process will remove all the existing data in the repository database.
Error Message: You don't have permission to capture workload from this server.
This message may be displayed at the bottom of the first page (introduction page) in the Capture Wizard.
Appropriate privileges need to be checked before capturing or replaying workload on the SAP ASE server.
When granular permissions is enabled, the set tracing any process privilege is required. When granular
permissions is disabled, the SA or SSO role is required.
Error Message: You don't have permission to replay workload from this server.
This message may be displayed at the bottom of the first page (introduction page) in the Capture Wizard.
Appropriate privileges need to be checked before capturing or replaying workload on the SAP ASE server.
When granular permissions is enabled, the set tracing any process privilege is required. When granular
permissions is disabled, the SA or SSO role is required.
This message may be displayed after you click Finish the Capture Wizard. The most common cause of this
message is that the SAP ASE server has already started a workload capture. You might see a description such
as Capture <capture_name>(<capture_id>) has been running in the error message box. For this
situation:
● Check if there are any other users running a workload capture from a different cockpit window,
● Execute dbcc workload_capture(status) on the server to check the current capture status.
● Check the server errorlog file to see whether there are any errors when starting the capture.
This message may be displayed after you click Finish the Replay Wizard. The most common cause of this
message is that the SAP ASE server has already started a workload capture. By default, the “capture workload
during replay” option is enabled for replay analysis and comparison. You might also see a description like
Failed to start capturing for replay <replay_name>(<replay_id>) from the SAP ASE
server <ASE_name> in the error message box. For this situation:
● Check if there are any other users running a workload capture from different cockpit window,
● Execute dbcc workload_capture(status) on the server to check the current capture status.
● Check the server errorlog file to see whether there are any errors when starting the capture.
This message may be displayed after you start a capture analysis or replay analysis. Workload analysis is a
complex and time consuming process. There are many possible causes that could lead to the analysis failed.
● When the error message descriptions includes: Can't allocate space for object ‘xxx’ in
database 'sybcatdb' because 'default' segment is full/has no free extents, the
repository database sybcatdb has no free space on the data segment. The analysis process will be
aborted. To resolve this issue, extend the data segment of sybcatdb.
● When the error message descriptions includes: Can't allocate space for object ‘xxx’ in
database 'sybcatdb' because 'logsegment' segment is full/has no free extents, the
repository database sybcatdb has no free space on the log segment. The analysis process will be aborted.
To resolve this issue, user should extend the log segment of sybcatdb.
● When the error message descriptions includes: Can't allocate space for object 'xxx’ in
database 'tempdb' because 'default' segment is full/has no free extents, the
Note
A related scenario is when there is low free space on the log segment of temporary database. No message
is shown in the cockpit UI, but the analysis progress does not update and it appears that the analysis
process hangs. In this situation, the analysis progress might be quite slow and you will see a repository
server errorlog message such as, Space available in the log segment has fallen
critically low in database 'tempdb'. All future modifications to this database
will be suspended until the log is successfully dumped and space becomes
available. You can wait for the current analysis, or stop the analysis and extend the log segment of the
temorary database, and then restart the analysis. To save time, it is recommended to stop analysis, extend
the log segment and restart analysis.
This message may be displayed on the cockpit UI after you start a replay comparison. The replay and its parent
capture are both required to be analyzed before starting the workload comparison. When the error message
includes the following text, the selected replay has not been analyzed.
To resolve this issue, analyze the replay and then restart the workload comparison.
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
● Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
● The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
● SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
● Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering a SAP-hosted Web site. By using such
links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Gender-Related Language
We try not to use gender-specific word forms and formulations. As appropriate for context and readability, SAP may use masculine word forms to refer to all genders.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.