...
Intercepting and Logging Email\ | Table of Contents |
1. Abstract | |
---|---|
2. Introduction | |
3. How Interception and Logging Works | |
4. Email Handling Categories | |
5. The Tables |
...
Table ZEMLOG contains the following fields:ZEMLOGField NameData ElementData TypeLengthDescriptionMANDTMANDTCLNT3ClientHOSTSYHOSTCHAR8Host
(system name, e.g. MAPLE, PINE, etc)UNAMEUNAMECHAR12User nameCPROGSYCPROGCHAR40Calling program name (SY-CPROG)TMSTPTZNTSTMPLDEC21UTC time stamp in long decimal form
(a number like YYYYMMDDhhmmss.mmmuuun)EXCEPRS38L_EXCNCHAR30Name of function module exceptionERTXTZERTXTCHAR240Error text
(or a statement of success)RECIPZEMAILTOCHAR80Email "To:" address
(first 80 char)SBJCTZSUBJECTCHAR80Subject line of Email
(first 80 char)ACTIONZACTIONCHAR1Email processing action
(from ZEHCAT)| | E-MAIL HANDLING CATEGORIES | DEVELOPMENT RESOURCES |
...