Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Kathy Barthelt

Infor LN & Baan Tips & Tricks for Technology: Using audit files in the Exchange module

The audit server logs all database actions that change the contents of a table in so-called audit files. The Exchange module can use these audit files, which are useful in a multisite environment because the databases on all sites must have identical data. These audit files can also be used in data conversions.

Only the updates in a specific period are exchanged, which leads to an improvement in performance. Specify this period in the Export Data (Non-Regular) (daxch0233m000) and Export Data (on a Regular Basis) (daxch0234m000) sessions. Changes such as insert, update, and delete are processed and written into the ASCII files. Actions such as drop, clear, and create tables are ignored.

Audit control data is added to the resulting ASCII file. This data consists of a batchline ID, transaction ID, sequence ID, and an indicator. The control data is added at the beginning of each line and is formatted like other data fields such as the enclosing and separator characters.

An update writes two lines to the ASCII file. One line contains the key fields and old values of the updated fields. The other line contains the new values of the key fields and updated fields, even if a key field does not change.

The batchline ID is used for recognition when processing the ASCII files. The transaction and sequence IDs are used to ensure that the transactions are replayed in the same order as on the exporting site. The indicator defines the type of action that is executed on the table. Use the letter I to insert; use the letter D to delete; use the letter U to update with old values; and use the letter N to update with new values.

Previous Article Infor LN & Baan Tips & Tricks for Operations: Copying EBOMs - Which copying method should I use?
Next Article Infor LN & Baan Tips & Tricks for Finance: Problem Invoices
Print
46163 Rate this article:
5.0
Kathy Barthelt

Kathy BartheltKathy Barthelt

Other posts by Kathy Barthelt

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

In the ever-evolving landscape of manufacturing, cyber threats have become a formidable challenge, with a notable spike in ransomware attacks catching many off guard. These sophisticated attacks deploy tactics that are often new and bewildering to manufacturers, pushing the boundaries of what we thought we knew about cybersecurity in the industry. Let's dive into how these advanced threats are reshaping our approach to digital defense in manufacturing.

https://www.industryweek.com/technology-and-iiot/cybersecurity/article/21284176/a-new-wave-of-cyber-attacks-five-actions-to-take-now

Are you keeping up with all things LX?

Get updates on product bulletins, alerts, and announcements regarding the Infor LX product line and related products and technologies such as Infor OS, System i Workspace Anywhere, WebTop, IDF, Operating Systems, and Java support as it relates to Infor LX, please follow this knowledge base article: KB 1397381.

This was updated as recently as February 23, 2024!

FirstLast

Tips: LN | Baan

Categories