You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ SAP Testing Automation is designed as a scalable framework to orchestrate and va
23
23
>
24
24
> The High Availability testing scenario in the SAP Testing Framework is **generally available (GA)**, while the Configuration Checks scenario is currently in **public preview**.
25
25
26
-
### High Availability Testing
26
+
### High Availability Testing
27
27
28
28
In the SAP Testing Automation Framework, thorough validation of high availability SAP HANA scale-up and SAP Central Services failover mechanism in a two node pacemaker cluster can be performed, ensuring the system operates correctly across different situations.
Copy file name to clipboardExpand all lines: docs/CONFIGURATION_CHECKS.md
+22-31Lines changed: 22 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,10 @@
1
1
# SAP Configuration Checks
2
2
3
-
## Overview
4
-
5
3
SAP Configuration Checks is an integral part of the SAP Testing Automation framework, providing comprehensive validation of SAP system configurations on Azure infrastructure. This module ensures that SAP Database and SAP Central Services deployments meet enterprise requirements for compliance before entering production. This tool is designed to identify misconfigurations, deviations from best practices, and potential issues that could impact system's stability and performance.
6
4
7
5
This tool is a new version of the existing [Quality Checks scripts](https://github.com/Azure/SAP-on-Azure-Scripts-and-Utilities/tree/main/QualityCheck), re-architected to provide a extensible, and maintainable solution. It leverages Python for core logic and Ansible for orchestration.
8
6
9
-
## Purpose
7
+
## Overview
10
8
11
9
Configuration validation serves as a critical quality gate in the SAP deployment lifecycle by:
12
10
@@ -20,30 +18,27 @@ Configuration validation serves as a critical quality gate in the SAP deployment
20
18
The configuration checks are organized into logical groups that can be executed independently or all at once. The main categories are:
21
19
22
20
1.**Infrastructure**
23
-
24
-
- While not a separate execution category, infrastructure checks are performed as part of the other categories.
-**Storage**: Use of Premium SSD/Ultra Disk, Write Accelerator, disk caching policies, and redundancy settings.
27
24
28
25
2.**Database**
29
-
30
26
- Validates SAP HANA or IBM DB2 specific settings.
31
27
-**SAP HANA**: Checks memory allocation, system replication parameters, and Pacemaker cluster configurations (resource agents, fencing, constraints).
32
28
-**IBM DB2**: Verifies hardware requirements, system language, and OS tuning parameters.
33
29
34
30
3.**Central Services**
31
+
- Validates the configuration of ASCS (ABAP SAP Central Services) and ERS (Enqueue Replication Server) instances.
32
+
- Checks for virtual hostname configuration, file system mount options, and service startup ordering.
35
33
36
-
- Validates the configuration of ASCS (ABAP SAP Central Services) and ERS (Enqueue Replication Server) instances.
37
-
38
-
- Checks for virtual hostname configuration, file system mount options, and service startup ordering.
34
+
4.**Application Servers**
35
+
- Validates the configuration of the application server instances.
39
36
37
+
> [!NOTE]
38
+
>
39
+
> High Availability (HA) configuration checks and functional tests are currently supported only for SAP HANA databases. For IBM DB2 databases, only non-HA configuration checks are available.
40
40
41
-
3.**Application Servers**
42
-
- Validates the configuration of the application server instances.
43
-
44
-
45
-
> **Note**: High Availability (HA) configuration checks and functional tests are currently supported only for SAP HANA databases. For IBM DB2 databases, only non-HA configuration checks are available.
46
-
41
+
## Pre-requisites
47
42
48
43
### 1. Setup Configuration
49
44
@@ -55,20 +50,18 @@ Update the `TEST_TYPE` parameter in [`vars.yaml`](./../vars.yaml) file to `Confi
55
50
56
51
Follow the steps (2.1 - 2.2) in [Setup Guide for SAP Testing Automation Framework](./SETUP.MD#2-system-configuration) to configure your system details.
57
52
58
-
> **Note**: High Availability (HA) configuration checks and functional tests are currently supported only for SAP HANA databases. For IBM DB2 databases, only non-HA configuration checks are available.
59
-
60
53
### 3. Required Access and Permissions (required)
61
54
62
-
Effective configuration validation requires that the management server's managed identity (system or user assigned) has read permissions on all target Azure resources. This allows the framework to inspect the settings of services including, but not limited to, Azure Load Balancers, storage solutions (Managed Disks, Azure Files, Azure NetApp Files), and network infrastructure. Lacking the necessary access will prevent the configuration checks from identifying potential misconfigurations in the environment. For more details on configuring system assigned managed identity vs user assigned managed identity, see [Setup Guide for SAP Testing Automation Framework](./SETUP.MD#configuring-access-using-managed-identity).
55
+
Effective configuration validation requires that the management server's managed identity (system or user assigned) has read permissions on all target Azure resources. This allows the framework to inspect the settings of services including, but not limited to, Azure Load Balancers, storage solutions (Managed Disks, Azure Files, Azure NetApp Files), and network infrastructure. Lacking the necessary access will prevent the configuration checks from identifying potential misconfigurations in the environment. For more details on configuring system assigned managed identity vs user assigned managed identity, see [Setup Guide for SAP Testing Automation Framework](./SETUP.MD#4-identity-and-authorization).
63
56
64
57
1. Depending on the type of managed identity method you want to use, configure managed identity on management server
65
-
-[Configuring access using system-assigned managed identity](./SETUP.MD#configuring-access-using-system-assigned-managed-identity).
66
-
-[Configuring access using user-assigned managed identity](SETUP.MD#configuring-access-using-user-assigned-managed-identity).
58
+
-[Configuring access using user-assigned managed identity](./SETUP.MD#option-1-user-assigned-managed-identity).
59
+
-[Configuring access using system-assigned managed identity](./SETUP.MD#option-2-system-assigned-managed-identity).
67
60
2. Grant the managed identity (system- or user-assigned) the built-in **Reader** role on every resource group that contains SAP system components (VMs, managed disks, load balancers, virtual network, shared storage such as Azure NetApp Files or Azure Files). If everything resides in a single resource group, one assignment there is sufficient; if components are split across multiple resource groups, add a **Reader** role assignment on each resource group to allow the configuration checks to read and validate all infrastructure settings.
68
61
69
-
### 4. Azure Login (required)
62
+
##Test Execution
70
63
71
-
Ensure that you are logged into Azure CLI on the management server VM with the appropriate subscription context:
64
+
You first need to make sure that you are logged into Azure CLI on the management server VM with the appropriate subscription context:
72
65
73
66
```bash
74
67
# Login to Azure using System Assigned Managed Identity
@@ -81,8 +74,6 @@ az login --identity -u <client-id-of-user-assigned-managed-identity>
81
74
az account set --subscription <subscription-id>
82
75
```
83
76
84
-
### 5. Test Execution
85
-
86
77
To execute the script, run following command:
87
78
88
79
```bash
@@ -105,7 +96,7 @@ To execute the script, run following command:
After the test execution completes, a detailed HTML report is generated. The report provide the summary of each test cases that got executed for each VM.
111
102
@@ -118,21 +109,21 @@ After the test execution completes, a detailed HTML report is generated. The rep
118
109
```bash
119
110
cd WORKSPACES/SYSTEM/<SYSTEM_CONFIG_NAME>/quality_assurance/
120
111
```
121
-
112
+
122
113
2.**Find your report file:**
123
114
124
115
The report file is named using the following format:
125
116
126
-
```
117
+
```html
127
118
all_{DISTRO}_{INVOCATION_ID}.html
128
119
```
129
120
130
121
-`DISTRO`: Linux distribution (SLES or RHEL)
131
122
132
123
-`INVOCATION_ID`: A unique identifier (Group invocation ID) for the test run which is logged at the end of test execution. Find example screenshot below:
Copy file name to clipboardExpand all lines: docs/HIGH_AVAILABILITY.md
+29-17Lines changed: 29 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,9 +30,21 @@ Follow the steps in the [Setup Guide for SAP Testing Automation Framework](./SET
30
30
31
31
### 3. Configure the System for HA Testing
32
32
33
-
1.Update the `TEST_TYPE` parameter in the `vars.yaml` file to `SAPFunctionalTests` to enable the High Availability test scenarios.
34
-
2.Follow the steps in the [System Configuration section of the Setup Guide](./SETUP.MD#2-system-configuration) to provide the details of your SAP system.
33
+
1. Update the `TEST_TYPE` parameter in the `vars.yaml` file to `SAPFunctionalTests` to enable the High Availability test scenarios.
34
+
2. Follow the steps in the [System Configuration section of the Setup Guide](./SETUP.MD#2-system-configuration) to provide the details of your SAP system.
35
35
36
+
### 4. Required Access and Permission (required for Load Balancer)
37
+
38
+
In the High Availability testing scenario, one of the test cases validates the configuration of the Azure Load Balancer used in the SAP high availability setup. To retrieve the properties of the Azure Load Balancer, the management server VM must have read access to it.
39
+
40
+
Access can be granted by configuring a managed identity for the management server. For more information on setting up system-assigned or user-assigned managed identities, see [Setup Guide for SAP Testing Automation Framework](./SETUP.MD#4-identity-and-authorization).
41
+
42
+
1. Depending on the type of managed identity method you want to use, configure managed identity on management server.
43
+
44
+
-[Configuring access using user-assigned managed identity](./SETUP.MD#option-1-user-assigned-managed-identity).
45
+
-[Configuring access using system-assigned managed identity](./SETUP.MD#option-2-system-assigned-managed-identity).
46
+
47
+
1. Grant the managed identity (system- or user-assigned) the built-in **Reader** role on the Azure load balancer used in the SAP high availability cluster configuration.
36
48
37
49
## Test Execution
38
50
@@ -56,26 +68,26 @@ Execute the tests using the `sap_automation_qa.sh` script from the `scripts` dir
56
68
57
69
Upon completion, the framework generates a detailed HTML report that summarizes the PASS/FAIL status of each test case and provides detailed execution logs.
58
70
59
-
1.**Navigate to the workspace directory for your SAP system.**
71
+
1.**Navigate to the workspace directory for your SAP system.**
60
72
61
-
Replace `<SYSTEM_CONFIG_NAME>` with the name of your SAP system configuration (e.g., `DEV-WEEU-SAP01-X00`).
73
+
Replace `<SYSTEM_CONFIG_NAME>` with the name of your SAP system configuration (e.g., `DEV-WEEU-SAP01-X00`).
62
74
63
-
```bash
64
-
cd WORKSPACES/SYSTEM/<SYSTEM_CONFIG_NAME>/quality_assurance/
65
-
```
75
+
```bash
76
+
cd WORKSPACES/SYSTEM/<SYSTEM_CONFIG_NAME>/quality_assurance/
0 commit comments