360 likes | 957 Views
AX 2012 OVERVIEW. Presented by Vishy Grandhi. Training Outline. Lesson 1: AX Overview Lesson 2: Role based security Lesson 3: Monitoring Troubleshooting. AX Overview : Objectives. At the end of this lesson you will have an understanding about The components of an AX system
E N D
AX 2012 OVERVIEW Presented by VishyGrandhi
Training Outline • Lesson 1: AX Overview • Lesson 2: Role based security • Lesson 3: Monitoring • Troubleshooting
AX Overview: Objectives • At the end of this lesson you will have an understanding about • The components of an AX system • Extended System architecture • Model driven architecture
AX Overview: AX Components • AX is a 3-tier system consisting of the following components • Database (SQL Server) • AOS (Business logic execution service) • Client (AX Rich client, EP, .NET Business Connector)
AX Overview: AX Components • AX Database • It is an OLTP db • Stores business data • Stores Metadata and application code
AX Overview: AX Components • AOS • Application object server • It provides a runtime for execution of X++ code • Manages security • Session management • Web services end point
AX Overview: AX Components • Clients • AX Rich client installed on client desktop/citrix/RDP • Enterprise Portal • Microsoft Office products (Through Dynamics AX add-on) • .NET Business Connector
AX Overview: Model driven architecture • AX has a unique model and layer architecture that enables easy customization while ensuring protection of code and easy upgrade • Layers • Models
AX Overview: Models • Model is a new concept in AX 2012 • Logical separation of code objects • Multiple ISV code segregation • Multiple project code segregation
AX Overview: Wrap-up • We have looked at the components that make up AX System • Architecture of AX – Layers and Models • Extended system architecture
Role based security: Objectives • At the end of this lesson you will have an understanding about • Role based security • Roles assignment to users
Role based security : Definitions • Entry Points • Permissions • Privileges • Duties • Roles
Role based security : Entry Points • Menu items • Web content items • Service operations • SSRS reports
Role based security : Process Cycles • Process cycles are used in rich client to make it easier for a system administrator to view and find related duties when setting up security. • Conversion cycle • Cost accounting cycle • Expenditure cycle • Human capital management cycle • Information Technology cycle • Revenue cycle
Setup new user: Objectives • At the end of this lesson you would have a good understanding of the following • Setup a new user • Assign the user appropriate role • Modify roles, duties and privileges
Monitoring: Objectives • At the end of this lesson you will have an understanding about • Monitoring Hardware • Monitoring Database • Monitoring Dynamics AX
Monitoring: Hardware • Use System Monitor (Perfmon) to monitor Windows, SQL Server and AX Counters. A few important counters • % Privileged Time • % Processor Time • Available Mbytes • Page Faults/sec • Avg. Disk Queue Length • % Disk Time • Bytes Total/Sec • Buffer Cache Hit Ratio (Sql) • User Connections • SQL Compilations • Active Sessions (AX) • Total Sessions • Number of client requests • Fatal session exception (EP) • Session allocation rate • Web part execution rate
Monitoring: Database • SQL Server Profiler can be used to identify performance issues with queries, any deadlocks and general tracing. • A few events for tracing • Deadlock • Data File Autogrow • Log File Autogrow • Showplan XML • Sp:StmtStarting/Completed • Sql:StmtStarting/Completed • Problems that can be detected include • High number of reads/writes • Long running queries • Execution plans
Monitoring: Database • Other tools available include • SQL Dynamic Management Views • Sp_who, sp_lock • DBCC CACHESTATS, DBCC TRACEON, DBCC TRACEOFF, DBCC TRACESTATUS • SQLIO – Disk performance test tool • SQLIOSim – Disk Stress Test Tool • SQL Server logs
Monitoring: Dynamics AX • AX Trace Parser
Troubleshooting: Overview • Common performance related issues that are noticed in Dynamics AX • Blocking and deadlocking • Disk I/O bottlenecks • High CPU utilization • Large number of roundtrips to database • High memory usage when run in IL • Problems that can be detected include • High number of reads/writes • Long running queries • Execution plans
Recipes: List of recipes • The following recipes are included in this presentation • Create a new user • Assign role to a user
Recipe: Create a new user • Select only System User and Employee roles. • Click Next. • Select Accounts receivable administrator profile in Same profile in all companies. This defines Vishy'srole center. • Click Next. • Click Finish • Start • Open the Microsoft Dynamics AX client. • Open the Users form. System Administration > Common > Users > Users. • Click New > Import in the Action Pane. • Click Next. • Select the domain name contoso.com. • Enter Vishyfor the first name. • Click Next. • Click Select all. • Click Next. • Click Next.
Recipe: Assign role to a user • Open the Microsoft Dynamics AX client. • Go to System Administration > Common > Users > Users. • Double-click VishyGrandhi in the grid to edit his record. • Click Assign roles in the User's role section of the form. • Select Accounts receivable manager and click OK. • Finish.
Summary of Training • We have looked at AX components and system architecture • We have also explored model driven architecture • We have looked at Role based security in AX • We explored the different security elements • Finally we created a new user and assigned him/her roles