LogoLogo
  • Welcome
  • Overview
    • Architecture
      • API Server
      • Sizing
    • Dashboard Overview
    • Monitoring Concepts
      • Application Performance Management
        • Availability Monitoring
        • Performance Intelligence
        • Service Level Management
        • Synthetic Transaction Management
        • Alerts Management
        • Reporting & Analytics
      • Infrastructure Monitoring
      • Unified Monitoring
    • Automation Concepts
      • Definition of Terms
      • Infrastructure as Code
        • Project Structure and Organization
        • Setting Up IaC Environment
        • Infrastructure Provisioning
        • Configuration Management
      • SAP Basis Automation
      • Automated Migration
  • User Guide
    • Onboarding
    • Setup
      • Gateway Setup
        • Gateway Network Setup
        • IT-Conductor Gateway Setup on Windows
        • IT-Conductor Gateway Setup on Linux
        • IT-Conductor Gateway Setup on AWS
        • IT-Conductor Gateway Setup on Azure
        • IT-Conductor Gateway Setup for SAP Secure Network Communications (SNC)
      • API Server Setup
      • MSP Tenant Setup
      • SSO Setup
        • Azure ADFS Identity Provider
        • Azure Active Directory (AAD) App Gallery
    • Monitoring
      • General
        • Maintenance Mode
          • Manual Maintenance
          • Scheduled Maintenance
        • Central Syslog Server Monitoring
        • URL Monitoring Locations
      • Cloud Monitoring
        • AWS Monitoring
        • Microsoft Azure Monitoring
      • Database Monitoring
        • IBM DB2 Database Monitoring
        • Microsoft SQL Server Monitoring
        • Oracle Database Monitoring
        • SAP HANA System Monitoring
          • SAP HANA Scale-Out Monitoring
          • SAP HANA Overview Dashboard
          • SAP HANA Alert Management
        • SAP ASE Database Monitoring
        • SAP MaxDB Monitoring
        • HA/DR Monitoring
      • Infrastructure Monitoring
        • File Server Monitoring
          • File Watcher Monitoring
        • Git Server
        • OS Monitoring
          • Unix/Linux System Monitoring
            • Linux Network Interface Monitoring
            • OS Printer Monitoring
          • Windows System Monitoring
            • WinRM Adapter Configuration
              • WinRM Services Configuration
              • Domain User Access
              • WMI Namespace Access
              • Windows Service Configuration
        • VMWare vCenter Monitoring
      • SAP Monitoring
        • Business Process Monitoring
          • Business Process Composer
          • BDoc Monitoring
          • IDoc Monitoring
        • SAP BusinessObjects Monitoring
          • SAP BO Data Services Monitoring
        • SAP Cloud Connector Monitoring
        • SAP Host Agent Monitoring
        • SAP NetWeaver Monitoring
          • SAP ABAP System Monitoring
            • SAP Transports
            • Security Role Import
            • SAP ABAP Overview Dashboard
            • SAP CCMS Alert Monitoring
            • SAP Batch Jobs Monitoring
              • SAP Batch Job Monitoring for CCMS Alerts
              • Advanced SAP Batch Job Monitoring
            • SAP SLT & RFC Connection Monitoring
            • Print Spooler Monitoring
            • Workload Monitoring
              • Transaction Code Monitoring
              • SAP Workload Monitoring
          • SAP J2EE System Monitoring
            • SAP J2EE Monitoring Role
            • Keystore Views and Certificates Monitoring
            • SAP PO Application Monitoring
          • SAP Systems Administrator Panel
        • SAP Web Dispatcher Monitoring
        • LMDB Discovery
        • Team-Based Central SAP Download Manager
    • Automation
      • Migration
        • Oracle to AWS Migration
        • Oracle to ASE Migration
        • SAP on MSSQL to AWS Migration
        • S/4HANA to Cloud Migration
      • E2E System Refresh Automation
        • Frequently Asked Questions
      • Age-based HANA Backup Automation
      • Inbound/Outbound Queue Restart Automation
      • OS File System Cleanup Automation
      • OS Linux Pacemaker Cluster Error Management
      • OS Printer Queue Restart Automation
      • OS Linux Kernel Patching using ChAI
      • OS Linux System Reboot using ChAI
      • SAP Batch Job Restart on Error
      • SAP Kernel Update using ChAI
      • SAP HANA Account Activation using ChAI
      • SAP Transports using ChAI
        • Frequently Asked Questions
      • SAP User Unlock and Password Reset Automation
      • Start/Stop Automation
    • Reporting
      • Available Reports
      • Creating Reports
        • Service Health KPI Report
      • Scheduling Reports
        • Automated HANA Reports
      • Report Elements
      • Archived Alerts Reporting
    • Account Administration
      • Invite Users
      • Create Robot Users
      • Update Linux System Account Password After Expiration
    • Notifications
      • Alerts
      • Threshold Overrides
        • Threshold Overrides Variables
      • Notification Targets
      • Distribution Lists
      • Subscriptions
      • Custom SMTP Notification Providers
      • Integration Providers
        • Derdack EA Integration
        • ilert Integration
        • Jira Service Desk Integration
        • Microsoft Teams Integration
        • PagerDuty Integration
        • Slack Integration
      • On-Call Scheduling
      • Calendar Events
    • Diagnostics
      • Gateway Communication Dump Debug Mode
      • Running IT-Conductor Gateway from CLI
      • SAP CCMS Missing Data
    • IT-Conductor FLUX
    • SID-Refresh
      • Product Overview
      • Getting Started
      • Documentation
      • Release Notes
      • Frequently Asked Questions
      • Troubleshooting Guide
        • Component CRM_MIDDLEWA_CRM - CRM Middleware Configuration
        • Failure to Start the Java-based GUI
        • Inconsistencies found in the table TADIR
        • Java-based GUI Runs with Pixelated Fonts
        • No email message is created after sending an email in SO01
        • Program Run as root
        • SICF Wrong Credentials
        • SU01: Error in user management
        • External Resources
      • Pricing
  • Release Notes
    • Gateway
  • References
    • Open-Source Software
    • Support
Powered by GitBook
On this page
  • Prerequisites
  • Configure SAP BusinessObjects Monitoring in IT-Conductor
  • Monitor SAP BusinessObjects System in IT-Conductor
  • Video
  • Related Information
  1. User Guide
  2. Monitoring
  3. SAP Monitoring

SAP BusinessObjects Monitoring

PreviousIDoc MonitoringNextSAP BO Data Services Monitoring

Last updated 8 months ago

SAP BusinessObjects (BOBJ) is a suite of business intelligence (BI) tools and applications designed to help businesses analyze data and make well-informed decisions. These tools encompass a range of functionalities, including reporting, dashboards, data visualization, and data exploration, which collectively enable users to derive insights from their data assets.

Monitoring SAP BOBJ helps maintain the reliability, performance, and security of BI platforms. By continuously monitoring the SAP BOBJ environment, organizations can proactively identify and address potential issues that may impact system availability, responsiveness, or data integrity.

Prerequisites

Before configuring an SAP BOBJ system for monitoring in IT-Conductor, follow the instructions below.

Account Requirements

  1. Create a new SAP BOBJ monitoring account.

  2. Assign it to the standard "Monitoring Users" user group and "Everyone" group.

Note: Perform these steps on the SAP BOBJ system.

Configure SAP BusinessObjects Monitoring in IT-Conductor

To configure SAP BOBJ monitoring in IT-Conductor, follow the instructions below.

Add New SAP BOBJ System

  1. Visit and enter your login credentials.

  2. Navigate to Dashboards → Administrator to access the Administrator's Dashboard.

  3. Locate the BusinessObjects Systems actions panel and click the title to access the complete list.

  1. Click the New BusinessObjects System button to start adding a new system for monitoring.

  • Description - refers to any relevant information about the system being added.

  • Organization - refers to an administrative structure that defines objects with a common goal or purpose. If you previously created an organization, please select it.

  • Role - refers to the environment where the system will be used.

  • Site - refers to a logical object that describes a particular area or location, depending on the context in which it is used.

  • Auth Type - refers to the authentication type to be used to access the BOBJ system.

  • Availability Ping - refers to the mechanism used to check the availability of the BOBJ system.

  • Description - refers to any relevant information about the user account being added.

  • Application - refers to the name given to the system being added.

  • Person - refers to the name of the user who is adding the system.

  • Authentication Type - refers to the authentication type to be used to access the BOBJ system.

  • Domain - refers to a logical group that contains one or more BOBJ servers and services. Specify the System ID value in this field.

  • Password - refers to the password of the previously created user.

  • Retype Password - refers to the same password provided in the Password field.

7. Verify if the system was added to the BusinessObjects Systems actions panel and check its status.

8. Navigate to the service grid and verify if the system was added under the BusinessObjects Systems node.

Note: The system will appear in the service grid within 5-15 minutes.

Activate Job Executions Retriever

  1. Select the BOBJ system in the service grid, then click Retrievers. You will be redirected to a page listing all available BOBJ retrievers.

  1. Click Job Executions in the list of retrievers.

Create Threshold Overrides

In IT-Conductor, you can create threshold overrides with or without a template.

  • Name - refers to the identifier assigned to the override configuration.

  • Description - refers to any details about the purpose or functionality of the override.

  • Target Object Class - refers to the specific type or class of object to which the override settings will apply.

  • Application Role - refers to the application environment where the override will be used.

  • Organization - refers to an administrative structure that defines objects with a common goal or purpose. If you previously created an organization, please select it.

  • Site - refers to a logical object that describes a particular area or location, depending on the context in which it is used.

  • Object Criteria - refers to specific conditions or criteria used to target and apply the override.

  • Value Attribute - refers to a specific parameter or attribute associated with an object that can be modified or overridden.

  • Comments - refers to any additional notes, explanations, or contextual information related to the override.

  • Scheduling - refers to the specific time frame during which the threshold override is in effect. You can either select a pre-defined schedule under the Schedule dropdown menu or select specific days and define the Start and End times.

  • Aggregation Interval - refers to a specific period or interval used for consolidating data or events within the BOBJ system.

  • Consecutive Interval - refers to a specific period during which a series of events or conditions occur continuously without interruption or gaps.

  • Aggregation - refers to the aggregation method to calculate the key metrics or statistics from collected data.

  • Warning Value - refers to the Warning limit or threshold set for the override configuration. If selected in the Alert On field, this metric will be utilized.

  • Alarm Value - refers to the Alarm limit or threshold set for the override configuration. If selected in the Alert On field, this metric will be utilized.

  • Reset After - refers to the number of minutes after which an active alert will automatically reset or clear once the triggering condition is no longer present.

  • Alert On - refers to the setting that prompts the system to issue an alert when the Warning Value or the Alarm Value is met or exceeded.

  • Recovery On - refers to the setting that prompts the system to restore normal operation after the Warning Value or the Alarm Value falls below the specified thresholds.

  1. Select the override template you want to copy on the Failed Jobs Threshold Default Settings Templates page.

Monitor SAP BusinessObjects System in IT-Conductor

To view the availability and performance metrics of a SAP BOBJ system, locate the BusinessObjects Systems node in the service grid.

SAP BusinessObjects Systems Key Metrics

  • Availability - refers to the operational state and accessibility of the BOBJ system.

  • Connection Failures - refer to the events where attempts to establish a connection are unsuccessful.

  • Heartbeat - refers to the periodic signal sent to the system, enabling real-time detection of system downtime.

  • Missing Account - refers to the absence of a required user account or resource within the BOBJ system.

  • Retriever Failures - refer to the errors or issues encountered during the retrieval process of essential data or information within the BOBJ system.

Note: All metrics will not show data when a system is unavailable.

Authentication

Authentication in SAP BOBJ is critical for ensuring data security, regulatory compliance, and user access control. Organizations can protect sensitive information, prevent unauthorized access, and enforce security policies across their BI environment by effectively authenticating users.

Connections

BusinessObjects rely on connections to the backend or data universes. If you are connected to any SAP system, it will automatically associate with the application in the service grid. You can track performance metrics from the backend system since they provide data to the BOBJ environment and impact the service.

Crypto Keys

Crypto keys are essential components of security infrastructure within SAP BOBJ, playing a crucial role in protecting data, securing communications, and verifying the identity and integrity of users and resources within the BI environment.

Enterprise Nodes

You may have one or more enterprise nodes in a cluster. Each node contains server-processing services such as Adaptive Job Server, Adaptive Processing Server, and Web Intelligence.

Failed Jobs

Failed Jobs refers to the number of jobs that failed on the server. IT-Conductor monitors failed job executions in BOBJ by querying for scheduled jobs that couldn't be completed within a specific period.

License Keys

License keys monitor the expiration of the BOBJ SAP license and their quota of number/types of users.

Probes

Probes are where you can schedule probes to run at specified intervals. The probes often ping different services to ensure the service is up and responding.

Health Explorer

To view a more detailed analysis of metrics and time-synchronized data, click Health in the service grid, and you will be redirected to the Health Explorer page.

Video

Related Information

Fill out all the necessary information in the New BusinessObjects System wizard. Once completed, click to add the system.

Gateway - allows communication between the customer's site network and the IT-Conductor cloud platform. Select the previously configured gateway from the dropdown menu. See for more details.

Provide the account information in the New Account screen and click to complete the configuration.

User Name - refers to the user created aligned with the .

Note: The status will remain on Ready for a few minutes. Refresh the panel if needed. If there are configuration issues, such as incorrect connection parameters or an invalid account, the status will remain Ready. Click to display the logs and troubleshoot. If everything is configured correctly, the status will change to In Progress.

In IT-Conductor, you need to activate Job Executions first before creating threshold overrides. Once activated, follow the instructions in .

Click to activate the Job Executions retriever.

Note: Ensure Job Executions retriever is activated. See and follow the instructions if it has not been activated yet.

Navigate back to the BOBJ system in the service grid and select Failed Jobs. Then click on the Failed Jobs page. You will be redirected to the Failed Jobs Overrides page.

To create an override without a template, click on the Failed Jobs Overrides page.

Fill out all the necessary information on the Create New Override for Failed Jobs page. Once completed, click to create the new override.

To create an override using a template, click on the Failed Jobs Overrides page.

Modify the parameters to match your specific requirements, then click to save.

To access a historical view of each of these metrics, click and a pop-up chart will be displayed.

To view more information about the authentication mode, click .

Note: To enable this feature, activate the Jobs Executions retriever in IT-Conductor. See for more details.

Gateway Setup
SAP BO Data Services Monitoring
BusinessObjects Monitoring is Tricky but These Resources Should Help
Account Requirements
Create Threshold Overrides
Activate Jobs Executions Retriever
Activate Jobs Executions Retriever
service.itconductor.com
Figure 1: BusinessObjects Systems Actions Panel in Administrator's Dashboard
Figure 2: BusinessObjects Systems Actions Panel Page
Figure 3a: New BusinessObjects System Wizard (New BI System Screen)
Figure 3b: New BusinessObjects System Wizard (New Account Screen)
Figure 4: BOBJ Retrievers Option in Service Grid
Figure 5: BOBJ Retrievers List
Figure 6a: Modify Jobs Executions Page (Inactive)
Figure 6b: Modify Jobs Executions Page (Activated)
Figure 7: Create Threshold Override from Failed Jobs Page
Figure 8: Failed Jobs Overrides (Create Override Without Template)
Figure 9: Create New Override for Failed Jobs
Figure 10: Failed Jobs Overrides (Create Override Using a Template)
Figure 11: Failed Jobs Threshold Default Settings Templates
Figure 12: Threshold Override Template
Figure 13: BusinessObjects Systems View in Service Grid
Figure 14: Heartbeat Chart in Service Grid
Figure 15: BOBJ Authentication View in Service Grid
Figure 16: BOBJ Connections View in Service Grid
Figure 17: Crypto Keys View in Service Grid
Figure 18: BOBJ Enterprise Nodes View in Service Grid
Figure 19: Monitor Failed Jobs Chart & Failed Jobs View in Service Grid
Figure 20: Failed Jobs Page
Figure 21: BOBJ License Keys View in Service Grid
Figure 22: BOBJ Probes View in Service Grid
Figure 23: BOBJ Health Explorer