• /
  • EnglishEspañolFrançais日本語한국어Português
  • ログイン今すぐ開始

Additional configuration

Complete these configuration tasks for each monitored system.

Upload authorization role

  1. Use SAP transaction PFCG.

  2. Go to Role > Upload and upload the file _NEWR_DATA_PROVIDER.SAP from the installation package.

  3. Confirm that the role /NEWR/DATA_PROVIDER loads.

    A screenshot displaying the authorization role upload
  4. Select the change icon in SAP icon after the role loads.

  5. On the Authorizations tab, select change icon in SAP Change Authorization Data, and then activate it using the activate icon in SAP icon.

    A screenshot displaying the authorization tab and Change Authorization Data in SAP upload
  6. If a profile name is suggested, select the green check icon.

  7. Verify that Profile(s) were updated appears on the status bar.

Create New Relic RFC user ID

After you activate the authorization profile, use transaction SU01 to create a new RFC user ID (for example, NR4SAPDP). Set the user type to System or Communication and add the role /NEWR/DATA_PROVIDER.

A screenshot displaying the creation of a new RFC user in SAP

Create RFC destinations for monitored systems

Use transaction SM59 to create an RFC destination for each monitored system.

  1. Select ABAP Connections and then select the Create icon to set up a new RFC destination.

  2. Enter a descriptive RFC Destination name. We recommend: NR_<SYSID>CLNT<CLNT#>

  3. Set Connection Type to 3 - ABAP Connection.

  4. On the Technical Settings tab, enter:

    • Target Host (fully qualified domain or IP) and Instance No.
    • Gateway Host and Service if necessary.
    A screenshot displaying the how to create RFC destinations for monitored systems
  5. On the Logon & Security tab, enter the RFC user (NR4SAPDP) and password.

  6. Select Save.

  7. Go to Utility > Test > Connection Test and Authorization Test.

    • Expected result: Both tests show successful status.

Set HTTP destination to New Relic cloud

Use transaction SM59 to set up HTTPS connections to the New Relic API endpoints.

重要

Create individual RFC destinations for Events, Logs, Metrics, and Traces separately.

  1. Enter a Destination Name (for example, NR_API_EVENT).

  2. Set Connection Type to G (HTTP Connections to External Server).

  3. Enter Target Host, Service No. as 443 (see standard port for HTTPS), and Path Prefix (see installation readiness checklist for details).

  4. If you need a proxy, configure it on the Technical Settings tab.

  5. On the Security Options tab, select the Active option for SSL.

    A screenshot displaying the connection setup for HTTP destination to New Relic
  6. If needed, download the root certificate from New Relic and add it to SAP using transaction STRUST.

  7. Select Connection Test to verify the connection.

    • Expected result: A successful connection prompts you to enter logon data.
    • If test times out: Check your firewall settings.
  8. Repeat this procedure for all New Relic API endpoints.

Create BTP/CloudALM authentication endpoint

Follow the instructions below based on the service:

  1. Note the clientId, clientsecret, and tokenurl from the downloaded Service Key.

  2. Go to tokenurl in a web browser and download the necessary certificates (Digicert root, global, and SAP on demand).

    A screenshot displaying the connection setup for BTP process integration runtime
  3. Use transaction STRUST to upload the three certificates one by one, then select Add to Certificate List.

  4. Select Save.

  5. Use transaction SMICM and go to Administration > ICM > Exit Soft > Global to restart all ICM processes.

    A screenshot displaying the Administration ICM
  6. Use transaction SM59 to create a new RFC connection under HTTP Connections to External Server.

  7. Split the tokenurl into the host and path prefix, then append the path prefix with ?grant_type=client_credentials.

  8. Set Service No. to 443.

    A screenshot displaying the Service No.
  9. On the Login & Security tab, select Basic Authentication and enter clientId and clientsecret as the username and password.

  10. Set Secure Protocol status to Active and save the configuration.

  11. Select Connection Test.

  1. Note the clientId, clientsecret, and url from the downloaded Service Key.

  2. Go to the url in a web browser and download the Digicert root, global, and SAP on demand certificates.

    A screenshot displaying the connection setup for CloudALM API
  3. Use transaction STRUST to upload the three certificates one by one, then select Add to Certificate List.

  4. Select Save.

  5. Use transaction SMICM and go to Administration > ICM > Exit Soft > Global to restart all ICM processes.

    A screenshot displaying the Administration ICM
  6. Use transaction SM59 to create a new RFC connection.

  7. Enter the url as Target host and set Service No. to 443. Set Path Prefix to /oauth/token?grant_type=client_credentials.

    A screenshot displaying the SM59 configuration
  8. On the Login & Security tab, select Basic Authentication and enter clientId and clientsecret as the username and password.

  9. Set Secure Protocol status to Active and save the configuration.

  10. Select Connection Test.

Create database connection

Use transaction DBACOCKPIT to define the remote HANA Database connections.

  1. Double-click Database Connections and select Add.

    A screenshot displaying the Database Connection
  2. Enter a Connection Name (preferably the same as the SAP system ID).

  3. Select HANA Database as the Database System.

  4. Enter Database user ID (for example, NRAGENT) and password.

  5. Enter Database Host and SQL Port.

    A screenshot displaying the SAP Connection Name
  6. Select Save, and then select Test to verify the connection.

    • Expected result: Connection test shows successful status.
Copyright © 2026 New Relic株式会社。

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.