Documente Academic
Documente Profesional
Documente Cultură
SAP PI Tutorials
SAP PI Tutorials, SAP PI Jobs, SAP PI
Interview Questions
0
tweets
tweet
Background
PI Mapping Runtime can require external data for serveral reasons. Most common are different names for same
unities in different systems. For example material classes vary often as well as names for organizations. A
mapping program requires in such cases an access to a table where the values from different systems are
correlated. There are quite different strategies to implement such a scenario:
■ Put the data direct into the mapping program: Most serios disadvantage would be a bad maintenance; the
program has to be changed and retested in case of new or changed values .
■ Reading the data from an external file or a PI table: Unusual maintenance and no control of authorization
■ Access the data during runtime via lookup: Can lead to performance issues. Analyzing any errors could be
difficult as the monitoring isnt that smooze as for message traffic. A temporary connection problem to the
value mapping storage would be an additional risc.
■ Storing the data in a SAP ECC table for usual maintenance (SM30) and good control of authorization and
replicating them by any change to PI Java Runtime Cache for a good runtime performance
The external data (correlation of different values) are stored in SAP ECC z-table. By any change of the table
content an ABAP program calls a proxy, which replicates the whole table content. There wont be any
performance issues if the data are not changed too often and if this are not too much data. This preconditions
shouldnt be a problem in the most cases. The full table replication is much easier than a delta load and can be
implemented within a few hours.
The data are replicated to Java Runtime Mapping Cache, they can be controlled from Runtime Workbench. A
standard function from Message Mapping can make use of the correlated values, the Runtime performance for
this sceanrio is better than for any scenario with lookup.
http://www.sappi.sapag.co.in/uncategorized/value-mapping-replication-scenario/ 10/04/2011
Value Mapping Replication Scenario | SAP PI Tutorials Page 2 of 6
Example
Suppose we have different purchase organizations in a SAP system and a third party system. We are planning to
add later organizations and we might want to add another third party system in future. To exchange messages we
need to map that organizations by an external table.
The function Utilities / Table Maintenance Generator at SE11 allows to create a quick controlled table
maintenance from SM30). We can choose directly a Authorization Group for a control of access. The Function
Group, which later will be extended, must be in the customers namespace. From this dialog we can jump to the
http://www.sappi.sapag.co.in/uncategorized/value-mapping-replication-scenario/ 10/04/2011
Value Mapping Replication Scenario | SAP PI Tutorials Page 3 of 6
An event can be defined in that step, for example “02 – After saving in the database”, and a FORM routine what
should be called if that event was raised. A own FORM should be typed in here, which will be created in the next
step.
Function Group
A new include needs to created in the Function Group (SE80), what was typed in at the Table Maintenance
Dialog. It has to be in the customers namespace. During the activation there could popup some confusing
messages which can be ignored. The include just contains the FORM routine from the last step.
http://www.sappi.sapag.co.in/uncategorized/value-mapping-replication-scenario/ 10/04/2011
Value Mapping Replication Scenario | SAP PI Tutorials Page 4 of 6
With the SAP BASIS Software Component two ABAP outbound proxies were delivered (transaction SPROXY). In
our example the synchronous proxy is used.
It can be used to send messages directly (as XML) to the PI Integration Engine. The view tabs are very helpful
during implementation of the ABAP program (the FORM) routine. They provide an overview about the structure
and by clicking on an element the type can be copied from “ABAP Name Ref.”.
■ Operation: Fixed Value: Insert, Delete, DeleteGroup, DeleteContext or DeleteContextGenerice. This value
determines the action. In our example we use “Insert” and “DeleteContext”.
■ GroupID: 2 Values with the same GroupID belong together (correlation). To create that 32 character
hexadecimal number function module ICF_CREATE_GUID is used.
■ Context: Values of one context belong to one scenario. For values of one context can be searched at RTW
and one context can be deleted by only one message.
■ Identifier(VALUE): The value of the parameter in the different systems. In our case the value for the purchase
organization.
■ scheme: A scheme what the value is about. In our case the fix value “PurchaseOrg”. The scheme would allow
to extend the scenario for other mapping tasks to use only one ECC table for a lot PI scenarios. In our
example a constant is used, the more generic scenario would require a variable value there.
■ agency: The system (or the “agency”) what the value is belonging to. In our case SAP or the the third party
system.
http://www.sappi.sapag.co.in/uncategorized/value-mapping-replication-scenario/ 10/04/2011
Value Mapping Replication Scenario | SAP PI Tutorials Page 5 of 6
The Java inbound proxies on the Integration Server can easily be activated by calling a simple URL:
Asynchronous: http://: /ProxyServer/register?
ns=http://sap.com/xi/XI/System&interface=ValueMappingReplication
&bean=localejbs/sap.com/com.sap.xi.services/ValueMappingApplication &method=valueMappingReplication
Synchronous: http://: /ProxyServer/register?
ns=http://sap.com/xi/XI/System&interface=ValueMappingReplicationSynchronous
&bean=localejbs/sap.com/com.sap.xi.services/ValueMappingApplicationSynchronous
&method=valueMappingReplicationSynchronous
Replication Control
The proxy replication can be monitored at transaction SXMB_MONI either at SAP and at PI. The values are
available at Runtime Workbench / Cache Monitoring / Cache Instance: Mapping Runtime Cache, CAche Object:
Value Mapping Groups
http://www.sappi.sapag.co.in/uncategorized/value-mapping-replication-scenario/ 10/04/2011
Value Mapping Replication Scenario | SAP PI Tutorials Page 6 of 6
Value Mappings can maintained with standard function “Value Mapping”. The context must be typed in, as well
the Schema (“PurchaseOrg” for our example). The organizations are mapped by the typed in values for source
and target agency. The behaviour regarding exceptions of the function can be maintained: Source value, default
value or runtime exception
Value Mapping
Value Mapping Replication for Mass Data
Share this:
Related posts:
http://www.sappi.sapag.co.in/uncategorized/value-mapping-replication-scenario/ 10/04/2011