You can use the SAP system trace (system trace for short) to record internal system activities. You can call the system trace using transaction ST01. You can also use transaction ST01 to display the non-actively displayed trace file.
Hint
For system monitoring and problem analysis, we recommend that you use the system log or the developer trace.
The System Trace Is Used to Analyze the Following:
You select the components to be logged on the initial screen. You can use the system trace for tracing authorization checks. If the trace is activated for the authorization check, all authorization checks performed by the system are recorded. During the evaluation, you can identify which authorizations the system checked at which times. The following detailed information is also provided: Date, time, work process number, user, authorization object, program, line, number of authorization values, and authorization values.
Hint
For tracing authorization checks exclusively, you can use transaction STAUTHTRACE
.You can use the SQL trace to follow how the Open SQL commands in reports and transactions are converted to standard SQL commands and the parameters with which the SQL commands are transferred to the database system in use. The results of the SQL command are also logged, such as the return code and the number of records found, inserted, or deleted by the database. Logging the execution time and the call point in the application program allows you to perform more advanced evaluations.
With the enqueue trace, you can follow which lock instructions the SAP system performs on which lock objects, and which parameters the system uses for these locks. The program that triggered the lock, the owner of the lock, and the time that the enqueue server required to release the lock again are all also logged in the trace file.
You can use the RFC trace to follow which remote calls the SAP system executes, and the instance on which these calls are executed. From the trace recording, you can see which function modules were called remotely by the program to be analyzed and whether the RFC call was successfully executed. The total time required for the execution of the remote call and the number of bytes sent and received during the RFC are also logged in the trace file.