{"id":1937,"date":"2014-08-30T23:47:45","date_gmt":"2014-08-30T23:47:45","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=1937"},"modified":"2015-05-03T09:53:35","modified_gmt":"2015-05-03T09:53:35","slug":"job-class","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/job-class\/","title":{"rendered":"Job Class"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>Job Class plays an important role in background job processing and helps in scheduling and executing high priority jobs even during peak hours.<\/p>\n<p>Jobs can be classified into three types of job classes based on the priority of the jobs.<\/p>\n<p>The three types of job classes are:<\/p>\n<ul>\n<li>Class A<\/li>\n<li>Class B<\/li>\n<li>Class C<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Job Class A is the highest priority job, followed by Job Class B which is followed by Job Class C (lowest and default priority for most jobs). Job classes are very useful and\u00a0we need to reserve some of the background work processes for scheduling more critical\/high priority jobs (Class A jobs).\u00a0This can ensure that class A jobs will always have free processes so that they can be executed. They\u00a0can be processed as well by normal background processes.<\/p>\n<p>To schedule jobs with higher priority, users must have\u00a0batch administrator access. Following authorization is required for this purpose:<\/p>\n<p>Authorization object &#8211; <strong>S_BTCH_ADM <\/strong>(BTCADMIN\u00a0=\u00a0Y)<\/p>\n<p>&nbsp;<\/p>\n<p>The advantage of having work processes reserved for class A jobs is that even when there\u00a0are many released jobs of class C waiting to be processed because all work processes are\u00a0busy with other jobs , these normal priority jobs will not use the reserved work processes\u00a0Intended for jobs with the class A. Therefore , even in high load background situations,\u00a0administrators can release important jobs by assigning a higher priority job class.<\/p>\n<p><strong>What are\u00a0the advantages of having Class A job?<\/strong> &#8211; As we discussed earlier that Class A jobs are the jobs which hold highest priority and we reserve some of the background processes for scheduling high priority jobs. Hence, during the peak hours when there are many released jobs of Class C and all work processes are busy with other jobs, these high priority jobs (Class A Jobs) can use the reserved background work processes for processing their jobs. Therefore, even in high load situations, the administrators can release important jobs by assigning them a higher priority Class.<\/p>\n<p>&nbsp;<\/p>\n<p>Points to note:<\/p>\n<ul>\n<li>We can reserve any number of background work processes for Class A jobs.<\/li>\n<li>Reserving work processes for class A jobs does not reserve any particular work process in a server for class A jobs, but rather makes sure a certain number of work processes is free at all times. This can be done via tcode RZ04 (Operation Modes). We will discuss more about Operation Modes (RZ04) in our later post.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Job Class plays an important role in background job processing and helps in scheduling and executing high priority jobs even during peak hours. Jobs can be classified into three types of job classes based on the priority of the jobs. The three types of&nbsp;<a class=\"read-more\" href=\"https:\/\/sapsecurityanalyst.com\/WP\/job-class\/\">&hellip;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1937"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=1937"}],"version-history":[{"count":7,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1937\/revisions"}],"predecessor-version":[{"id":1944,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/1937\/revisions\/1944"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=1937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}