If you have created a trace you can evaluate it to analyze the behavior of the system during the recorded steps.
On the initial screen choose System Trace Evaluation (Evaluation).
The following screen appears:
Options for Trace Analysis
You can set various options for the evaluation.
Besides determining the trace components, you can restrict the analysis to particular users, work processes, transactions, and times.
You can also use SAP Passport (BC-CST) as a filter. This will display all trace records for a request chain.
For performance analysis, you can use the field Duration to analyze only records for which the duration of a trace record exceeds a specific period of time. This applies only to trace components that have a duration. This setting should not be made for authorization traces.
You can also set a restriction that only specific tables are included in the trace analysis (this also applies to the SQL and the table buffer trace). You can enter two table names directly on the screen; you can add other tables by choosing Further Tables. The button changes color if there are more than two tables in the list.
In the group box File Selection, you can specify a separate filer to protect a trace from being automatically overwritten. If you specify a separate file here, the normal trace files are ignored and the specified file is used.
In the application toolbar next to the button (Start Evaluation) the following pushbuttons:
(Filter History)
This shows you that last 10 filter settings of the user in question.
(Set Default Values)
The filter is set with the following default values: own user, own client, from 10 minutes ago (rounded off) until now, all trace types, not tables D010* and D020*.
(Delete All Field Values)
This button deletes the values in all fields.
The menu Filter Settings also contains all these functions.
Once you have set the criteria for the evaluation, you can display the evaluation with (Start Evaluation).
Information in trace entries includes the following:
Time (to the millisecond). Double-click to see the time to the microsecond.
Type of Trace Entry that is, the component selected when the trace was activated or when the analysis settings were made.
Component |
Key |
Object |
---|---|---|
Authorization Check |
AUTH |
Authorization object used |
Kernel functions |
CMOD |
Corresponding C function in kernel |
General kernel |
USER |
C module in the kernel in which the trace is written |
Database accesses (SQL trace) |
SQL |
Database table being accessed |
Table buffer trace |
BUFF |
Database table being accessed |
RFC Calls |
RFC |
Called function module |
Lock operations |
ENQUE |
Lock object used |
Duration of the trace, provided this is useful information: In the case of an authorization trace, a user trace (free text that can be written by a kernel module), and the beginning of a C function in CMOD trace, a duration is not useful and therefore not required.
Object: The object is different, depending on the trace component, and can be obtained from the table above.
Trace message text.
Double-click on a line to get detailed information on this trace record.