Show TOC

Procedure documentationCreating Cross-System Object Lock Entries

 

You can manage cross-system object lock entries in the administration cockpit on the Cross-System Object Locks tab page.

Procedure

  1. Choose Register and select one of the following options:

    • You can restrict the range of transport requests by system and request number. You can also specify all systems and all transport requests.

      For external requests, the transport request number prefix (containing the external system name) can be different from the real (internal) source system name.

    • You can send an e-mail notification if conflicts are detected. The system sends e-mails to the following recipients:

      • Change managers and IT operators of the change documents or QGM changes that contain the transport requests with conflicts

      • E-mail address specified in the popup

      If the system does not find an e-mail address, a warning message is entered in the application log.

      Note Note

      If the system is to send a notification to the change manager and IT operator, you have maintained the e-mail addresses for their business partners.

      For Quality Gate Management changes, only the change manager can be assigned to a change. It is not possible to send a notification to the IT operator.

      The system does not send any e-mail notifications to the transport request owners.

      End of the note.
    • You can specify the execution time (immediate or scheduled).

  2. After you have registered the lock entries, go to the Define Background Job transaction (SM36) and click Own jobs.

  3. Find job CM_CROSS_SYS_OBJ_LOCK_REGISTER, which is scheduled to run at the time you specified.

  4. You can monitor the job log to see the progress. When the job is finished, the job log refers to the application log. The application log contains detailed messages, whereas the job log shows only the job progress. The application log (transaction SLG1) with object /TMWFLOW/CMSCV and subobject CROSS_SYS_OBJ_LOCK is used by the system. You can call up the log using these parameters.

    For each system, the application log displays the final processing result.

    For requests that cannot be processed, a warning message is displayed.

More Information

Cross-System Object Lock