Types of SAP system copy
Challenges with SAP system copies
The process of creating system copies for updates can be broken down into different activities, as shown in Table 1. For each group, the software used for automation is shown, where "UC4" stands for UC4 Automated System Copy and "HP" stands for HP System Copy. All these activity groups are described individually below.
Table splitting requires 2 tools: R3ta, which determines the WHERE conditions used to access subsets of a table. TableSplitter, which splits the WHERE-conditions determined by R3ta into packages with one or more subsets.
SAP SYSTEM COPY - A BEFORE AND AFTER GUIDE
Homogeneous system copy: In this type of copy, the operating system and database on the target system are the same as on the source system. So Windows remains Windows and Linux remains Linux. And if the SAPHana database is running on the source system, it will also be used on the target system.
Without interrupting operations, we copy your systems using established methods and products. We guarantee consistent quality and reliable reproducibility through standardized processes and a high degree of automation. Due to the SAP system copy, the test and development systems are up to date and tests can be performed reliably and trustworthily on the non-production systems.
Of course, time savings also mean money savings. In addition, these processes for system copying can be planned, standardized and always run at a high level of process quality using automation tools of this kind. Especially the latter is of great importance in SAP Basis departments (and of course also for service providers). With "Shortcut for SAP Systems", a number of activities in the context of system copies can be carried out and automated. Your SAP Basis administration is thus significantly relieved. Automation also means that SAP Basis Administrators no longer have to work unreasonable hours. The product can be integrated into almost any automation software.
Innovative test data management can protect data from internal and external misuse through encryption, among other things.
In many places, this was supplemented by scripts created in-house, which, however, only automated partial tasks/processes of an SAP system copy.