Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Intercepting and Logging Email\
via Z_SENDMAIL

Table of Contents

1. Abstract

2. Introduction

3. How Interception and Logging Works

4. Email Handling Categories

5. The Tables

...

Table ZEMLOG contains the following fields:ZEMLOGField NameData ElementData TypeLengthDescriptionMANDTMANDTCLNT3ClientHOSTSYHOSTCHAR8Host
(system name, e.g. MAPLE, PINE, etc)UNAMEUNAMECHAR12User nameCPROGSYCPROGCHAR40Calling program name (SY-CPROG)TMSTPTZNTSTMPLDEC21UTC time stamp in long decimal form
(a number like YYYYMMDDhhmmss.mmmuuun)EXCEPRS38L_EXCNCHAR30Name of function module exceptionERTXTZERTXTCHAR240Error text
(or a statement of success)RECIPZEMAILTOCHAR80Email "To:" address
(first 80 char)SBJCTZSUBJECTCHAR80Subject line of Email
(first 80 char)ACTIONZACTIONCHAR1Email processing action
(from ZEHCAT)| | E-MAIL HANDLING CATEGORIES | DEVELOPMENT RESOURCES |

...