Status

 In Progress

OwnerNADAR-ext, Parvati 
StakeholdersThe business stakeholders involved in making, reviewing, and endorsing this decision. Type @ to mention people by name

Purpose

The purpose of this document is to define the conversion approach to create Project Definition (CAPEX, OPEX) in S/4 HANA.

Project Definition is the framework of the Work breakdown structure in SAP. Project Definition holds the default, header information such as Start and end date and scope of the Projects.

 As per Syensqo design below are the list of project scenarios.

CAPITAL/ Operational  Expense
Operational Expense
Statistical Expense
Intercompany Recharges
Provisional Expense

 As per Syensqo design below are the types of project.

Project TypeDescription
11Direct Asset Purchase
12Restructuring Provision
13Safety and Environment Provision
14IAS19 Provision
15Intercompany Recharge
16Capital Lease
17Industrial Projects
RINew Product Introduction
RIProduct & Process Improvement
RICustomer and business support
RIOPD Opportunity Development
18IT Project
19Turnaround Projects
20Contingency
21Variation
22Environmental Fines
23Social Fines
24Corruption Fines
25Waste
26Demolition - Recurring
27Demolition - Non -Recurring
28Marketing
29Budgeted Maintenance
30Continous Improvement
31Operational Performance improvement
32Site impact of Strikes
33Campaigns


Conversion Scope

The scope of this document covers the approach for converting active Project Definition (CAPEX, OPEX) from Legacy Source Systems into S/4HANA following the Master Data Design Standard- Project Definition.

The data from legacy system includes:

All the projects below will be migrated from legacy source systems (PF2 and WP2) into S/4HANA –

Active Capex / Opex Projects, 

Closed project that have cost in current year

The data from legacy system excludes:

  1. Exclusion Criteria 1
  2. Exclusion Criteria 2
  3. Exclusion Criteria n


List of source systems and approximate number of records
SourceScope

Source Approx No. of Records

Target SystemTarget Approx

No. of Records

PF2 and WP2

All Active Capex / Opex Projects, 

Closed project that have cost in current year


S/4HANA















Additional Information

Multi-language Requirement

Summarize Multi-language Requirement/s, if any

Document Management

As per CNV-1025

Legal Requirement

Summarize Legal Requirement/s, if any

Special Requirements



Target Design


The technical design of the target for this conversion approach.

TableFieldData ElementField DescriptionData TypeLengthRequirement
PROJPSPIDPS_PSPIDProject definitionCHAR24Mandatory
PROJPOST1PS_POST1DescriptionCHAR40
PROJSTSPRPS_STSPRWBS status profileCHAR8
PROJVERNRPS_VERNRNo. of Person Resp.NUM8


PROJASTNRPS_ASTNRApplicant no.CHAR25


PROJVBUKRPS_VBUKRCompany codeCHAR4


PROJVKOKRPS_VKOKRControlling areaCHAR4


PROJ


PRCTRPRCTRProfit CenterCHAR10


PROJPWHIEPS_PWHIEProject CurrencyCHAR5


PROJPLFAZPS_PLFAZ_CHGStart dateDATS8


PROJPLSEZ

PS_PLSEZ_CHG

Finish dateDATS8


PROJWERKSWERKS_DPlantCHAR4


PROJ

KALIDFABKLFactory CalendarCHAR2


PROJPROFLPROFIDPROJProject ProfileCHAR7


PROJBPROFBP_BPROFILBudget ProfileCHAR6


PROJBESTAPS_BESTANDProject stockCHAR1


PROJ-XSTAT

PS_XSTAT

StatisticalCHAR1


PROJPPROF

BP_PPROFIL

Planning ProfileCHAR6


PROJPLINTPLINTIntegrated PlanningCHAR1


PROJFUNC_AREAFKBERFunctional AreaCHAR16


PROJZLEGACYID
Legacy Project IDCHAR
































Data Cleansing

All data cleansing should take place in the data source system as defined in this document, unless system limitations prevent it.

If data cleansing is managed outside of the source system (e.g. Syniti Migrate, 3rd Party Vendor, DCT), the necessary documentation must be produced and appended to this deliverable for sign-off.

IDCriticalityError Message/Report DescriptionRuleOutputSource System


























Conversion Process

The high-level process is represented by the diagram below:

Summarize High-Level Process. Include diagrams, where applicable. Include information supporting details of Extract, Transform and Load specific to the Data Object


Data Privacy and Sensitivity

Summarize Data Privacy and Sensitivity Requirements, if any


Extraction

Extract data from a source into Syniti Migrate. There are 2 possibilities:

  1. The data exists. Syniti Migrate connects to the source and loads the data into Syniti Migrate. There are 3 methods:
    1. Perform full data extraction from relevant tables in the source system(s).
    2. Perform extraction through the application layer.
    3. Only if Syniti Migrate; cannot connect to the source, data is loaded to the repository from the provided source system extract/report.
  2. The data does not exist (or cannot be converted from its current state). The data is manually collected by the business directly in Syniti Migrate. This is to be conducted using DCT (Data Collection Template) in Syniti Migrate

The agreed Relevancy criteria is applied to the extracted records to identify the records that are applicable for the Target loads

Extraction Run Sheet

Req #Requirement DescriptionTeam Responsible













Selection Screen

If applicable, this section will give the details on any selection screen parameters, including the parameter type, that are required to be entered to ensure consistent data extracts.
Selection Ref ScreenParameter NameSelection TypeRequirementValue to be entered/set





















Data Collection Template (DCT)

Target Ready Data Collection Template will be created for Data Object data with exception of some fields which require transformation as mentioned in the transformation rule.

<Object> DCT Rules

Field NameField DescriptionRule












Extraction Dependencies

List the steps that need to occur before extraction can commence

Item #Step DescriptionTeam Responsible













Transformation

The Target fields are mapped to the applicable Legacy field that will be its source, this is a 3-way activity involving the Business, Functional team and Data team. This identifies the transformation activity required to allow Syniti Migrate to make the data Target ready:

  1. Perform value mapping and data transformation rules.
    1. Legacy values are mapped to the to-be values (this could include a default value)
    2. Values are transformed according to the rules defined in Syniti Migrate
  2. Prepare target-ready data in the structure and format that is required for loading via prescribed Load Tool. This step also produces the load data ready for business to perform Pre-load Data Validation

Transformation Run Sheet

Item #Step DescriptionTeam Responsible













Transformation Rules

Rule #Source systemSource TableSource FieldSource DescriptionTarget SystemTarget TableTarget FieldTarget DescriptionTransformation Logic









































Transformation Mapping

Use the exact name and reference this section in the “Transformation rules” above
Mapping Table NameMapping Table Description








Transformation Dependencies

List the steps that need to occur before transformation can commence
Item #Step DescriptionTeam Responsible













Pre-Load Validation

Project Team

The following pre-load validations will be performed by the Project Team.

Completeness

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Accuracy

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Business

The following pre-load validations will be performed by the business.

Completeness

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Accuracy

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Load

The load process includes:

  1. Execute the automated data load into target system using load tool or product the load file if the load must be done manually
  2. Once the data is loaded to the target system, it will be extracted and prepared for Post Load Data Validation

Load Run Sheet

Item #Step DescriptionTeam Responsible













Load Phase and Dependencies

Identify the phase as to “when” the load for this object will occur. <Pre-Cutover, Cutover, Post Cutover> and list the steps that need to occur before the load can commence

Configuration

List the Configurations required before loading can commence

Item #Configuration Item






Conversion Objects

Object #Preceding Object Conversion Approach

list the exact title of the conversion object of only the immediate predecessor – this will then confirm the DDD (Data Dependency Diagram)




Error Handling

The table below depicts some possible system errors for this data object during data load. All data load error is to be logged as defect and managed within the Defect Management

Error TypeError DescriptionAction Taken










Post-Load Validation

Project Team

The following post-load validations will be performed by the Project Team.

Completeness

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Accuracy

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Business

The following post-load validations will be performed by the business.

Completeness

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Accuracy

TaskAction
titlespecific details of what and how the task needs to be performed e.g. which reports are being used etc.





Key Assumptions

  • Master Data Standard is up to date as on the date of documenting this conversion approach and data load.
  • Data Object is in scope based on data design and any exception requested by business.

Any additional key assumptions.


See also

Insert links and references to other documents which are relevant when trying to understand this decision and its implications. Other decisions are often impacted, so it's good to list them here with links. Attachments are also possible but dangerous as they are static documents and not updated by their authors.

Change log