Only transparent tables and
pooled tables can be buffered. Buffering is not possible for
cluster tables. There is no special restriction of the key length of the table when buffering, which means that keys in buffered tables can be up to
900 bytes long.
The following Open SQL statements bypass the SAP buffer implicitly and access the database tables directly, since the operation in question can only be executed on the database and not in the SAP buffer:
Access to a table or view with individual record buffering without specifying (in the WHERE condition) all the equality conditions joined by AND for all the key fields of the primary key.
Access to a generically buffered area without complete specification of equality conditions joined
by AND in a WHERE condition.
Open SQL statements with IS [NOT] NULL in the additions WHERE and HAVING.
SELECT with FOR
ALL ENTRIES in accesses to a table or view with generic buffering if the requirement to specify
the generic area exactly (as specified above) is violated. The condition after FOR ALL ENTRIES cannot produce an OR relationship between multiple generic areas.
SELECT with the addition ORDER BY, if specified as a sort key of individual columns
and these columns are not a left-aligned subset of the primary key in the correct order
or if the addition DESCENDING is specified in a column.
Reads on a database table or database view for which a replacement object is defined.
After the invalidation of an entry in the buffer using a write statement, the next five reads that
should have accessed the entry bypass the buffer of the current application server by default. The next
read performed on the changed entry reloads it into the buffer and removes the invalidation. The number of reads that bypass the buffer before the reload is specified in the
profile parameter zcsa/sync_reload_c.
Note
Bypassing the SAP buffer using the additions above should be noted for access to buffered database tables
or views for performance reasons. To bypass the SAP buffer in the statement SELECT
explicitly, the addition BYPASSING BUFFER should always be used. It is not enough to rely on the implicit behavior of the additions above.