This page explains how to prepare a Cloud Connector managed system for the execution of the Simple System Integration
Currently the following monitoring application are supported for Cloud Connector systems:
| Task | Operation |
|---|---|
| Run Outside Discovery on the Host | As prerequisites, you shall install the SAP Host Agent and run Outside Discovery as described in Preparing Outside Discovery page. |
| Install Cloud Connector | Follow the documentation for Cloud Connector (Monitoring, Operator's Guide, Configuration) for defining named admin users and monitoring users. Only monitoring users must be assigned to the role sccmonitoring |
| Check if an SLDR is needed | As prerequisites, you need to choose, according to your landscape, if an SLDR is required see page Preparing System Landscape Data Router. |
| Configure Data Supplier to send the payload | The Cloud Connector utilizes the SAP Host Agent - Outside Discovery to transfer the SLD payload to target systems. A prerequisite for this process is a properly configured Outside Discovery. The necessary SLD payload XML file will be registered at SAP Host Agent. This registration is accomplished by specifying the filesystem location of the local SAP Host Agent within the Cloud Connector administration UI under Configuration - Reporting (set active and maintain path). See details also in Cloud Connector Documentation. |
| Create a Technical User | The technical user in SCC is needed for monitor data. SAP Cloud Connector utilizes external user administration frameworks (like LDAP). It is possible to design a dedicated monitoring user there. Follow the instructions given in the documentation for Cloud Connector User Administration. In case the above described scenario is not available or necessary, it is also possible to use the default administrative logon user for monitoring data collection. |
| Edit Configuration in Simple System Integration | Enter values for the following parameters:
|
| Grant access to Cloud Connector files and folders | Ensure that sapadm user has at least read access to the following directories/files:
Remark: only relevant if permissions are not inherited, but granted individually. |