Skip to content

Commit 03b5d32

Browse files
Merge pull request #263298 from dennispadia/dp-hanalbupdate
Update load balancer steps
2 parents 5335c2d + fde16d1 commit 03b5d32

7 files changed

+373
-144
lines changed

articles/sap/workloads/disaster-recovery-sap-hana.md

Lines changed: 36 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -7,28 +7,30 @@ ms.service: sap-on-azure
77
ms.subservice: sap-vm-workloads
88
ms.workload: infrastructure-services
99
ms.topic: how-to
10-
ms.date: 12/08/2023
10+
ms.date: 01/16/2024
1111
ms.custom: template-how-to-pattern
1212
---
1313

1414
# Add HSR third site to HANA Pacemaker cluster
1515

1616
This article describes requirements and setup of a third HANA replication site to complement an existing Pacemaker cluster. Both SUSE Linux Enterprise Server (SLES) and RedHat Enterprise Linux (RHEL) specifics are covered.
1717

18-
## Overview
18+
## Overview
1919

2020
SAP HANA supports system replication (HSR) with more than two sites connected. You can add a third site to an existing HSR pair, managed by Pacemaker in a highly available setup. You can deploy the third site in a second Azure region for disaster recovery (DR) purposes.
2121

2222
Pacemaker and HANA cluster resource agent manage the first two sites. Pacemaker cluster doesn't control the third site.
2323

24-
SAP HANA supports a third system replication site in two modes.
24+
SAP HANA supports a third system replication site in two modes.
25+
2526
- [Multi-target](https://help.sap.com/docs/SAP_HANA_PLATFORM/6b94445c94ae495c83a19646e7c3fd56/ba457510958241889a459e606bbcf3d3.html) replicates data changes from primary to more than one target system. Third site connected to primary, replication in a star topology.
2627
- [Multi-tier](https://help.sap.com/docs/SAP_HANA_PLATFORM/6b94445c94ae495c83a19646e7c3fd56/f730f308fede4040bcb5ccea6751e74d.html) is a two-tier replication. A cascading, or sometimes referred to as chained setup, of three different HANA tiers. Third site connects to secondary.
28+
2729
For more information, see [SAP HANA availability across Azure regions](./sap-hana-availability-across-regions.md#combine-availability-within-one-region-and-across-regions) for more conceptual details about HANA HSR within one and across different regions.
2830

2931
## Prerequisites for SLES
3032

31-
Requirements for a third HSR site are different between HANA scale-up and HANA scale-out.
33+
Requirements for a third HSR site are different between HANA scale-up and HANA scale-out.
3234

3335
> [!NOTE]
3436
> Requirements in this chapter are only valid for a Pacemaker enabled landscape. Without Pacemaker, SAP HANA version requirements apply for the chosen replication mode.
@@ -42,7 +44,7 @@ Requirements for a third HSR site are different between HANA scale-up and HANA s
4244

4345
## Prerequisites for RHEL
4446

45-
Requirements for a third HSR site are different between HANA scale-up and HANA scale-out.
47+
Requirements for a third HSR site are different between HANA scale-up and HANA scale-out.
4648

4749
> [!NOTE]
4850
> Requirements in this chapter are only valid for a Pacemaker enabled landscape. Without Pacemaker, SAP HANA version requirements apply for the chosen replication mode.
@@ -60,18 +62,23 @@ Failure of the third node won't trigger any cluster action. Cluster detects the
6062
Example of a multi-target system replication system. For more information, see [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/4e9b18c116aa42fc84c7dbfd02111aba/2e6c71ab55f147e19b832565311a8e4e.html).
6163
![Diagram showing an example of a HANA scale-up multi-target system replication system.](./media/sap-hana-high-availability/sap-hana-high-availability-scale-up-hsr-multi-target.png)
6264

63-
1. Deploy Azure resources for the third node. Depending on your requirements, you can use a different Azure region for disaster recovery purposes.
64-
Steps required for the third site are similar to [virtual machines for HANA scale-up cluster](./sap-hana-high-availability.md#deploy-for-linux). Third site will use Azure infrastructure, operating system and HANA version matching the existing Pacemaker cluster, with the following exceptions:
65+
1. Deploy Azure resources for the third node. Depending on your requirements, you can use a different Azure region for disaster recovery purposes.
66+
67+
Steps required for the third site are similar to [virtual machines for HANA scale-up cluster](./sap-hana-high-availability.md#prepare-the-infrastructure). Third site will use Azure infrastructure, operating system and HANA version matching the existing Pacemaker cluster, with the following exceptions:
68+
6569
- No load balancer deployed for third site and no integration with existing cluster load balancer for the VM of third site
6670
- Don't install OS packages SAPHanaSR, SAPHanaSR-doc and OS package pattern ha_sles on third site VM
6771
- No integration into the cluster for VM or HANA resources of the third site
6872
- No HANA HA hook setup for third site in global.ini
69-
70-
2. Install SAP HANA on third node.
73+
74+
2. Install SAP HANA on third node.
75+
7176
Same HANA SID and HANA installation number must be used for third site.
72-
73-
3. With SAP HANA on third site installed and running, register the third site with the primary site.
77+
78+
3. With SAP HANA on third site installed and running, register the third site with the primary site.
79+
7480
The example uses SITE-DR as the name for third site.
81+
7582
```bash
7683
# Execute on the third site
7784
su - hn1adm
@@ -80,12 +87,14 @@ Example of a multi-target system replication system. For more information, see [
8087
```
8188

8289
4. Verify HANA system replication shows both secondary and third site.
90+
8391
```bash
8492
# Verify HANA HSR is in sync, execute on primary
8593
sudo su - hn1adm -c "python /usr/sap/HN1/HDB03/exe/python_support/systemReplicationStatus.py"
8694
```
8795

8896
5. Check the SAPHanaSR attribute for third site. SITE-DR should show up with status SOK in the sites section.
97+
8998
```bash
9099
# Check SAPHanaSR attribute on any cluster managed host (first or second site)
91100
sudo SAPHanaSR-showAttr
@@ -100,7 +109,7 @@ Example of a multi-target system replication system. For more information, see [
100109
# HN1-SITE2 SOK
101110
# SITE-DR SOK
102111
```
103-
112+
104113
Cluster detects the replication status of connected sites and the monitored attributed can change between SOK and SFAIL. No cluster action if the replication to DR site fails.
105114

106115
## HANA scale-out: Add HANA multi-target system replication for DR purposes
@@ -112,19 +121,23 @@ Failure of the third node won't trigger any cluster action. Cluster detects the
112121
Example of a multi-target system replication system. For more information, see [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/4e9b18c116aa42fc84c7dbfd02111aba/2e6c71ab55f147e19b832565311a8e4e.html).
113122
![Diagram showing an example of a HANA scale-out multi-target system replication system.](./media/sap-hana-high-availability/sap-hana-high-availability-scale-out-hsr-multi-target.png)
114123
115-
1. Deploy Azure resources for the third site. Depending on your requirements, you can use a different Azure region for disaster recovery purposes.
116-
Steps required for the HANA scale-out on third site are mirroring steps to deploy the [HANA scale-out cluster](./sap-hana-high-availability-scale-out-hsr-suse.md#set-up-the-infrastructure). Third site will use Azure infrastructure, operating system and HANA installation steps for SITE1 of the scale-out cluster, with the following exceptions:
124+
1. Deploy Azure resources for the third site. Depending on your requirements, you can use a different Azure region for disaster recovery purposes.
125+
126+
Steps required for the HANA scale-out on third site are mirroring steps to deploy the [HANA scale-out cluster](./sap-hana-high-availability-scale-out-hsr-suse.md#prepare-the-infrastructure). Third site will use Azure infrastructure, operating system and HANA installation steps for SITE1 of the scale-out cluster, with the following exceptions:
127+
117128
- No load balancer deployed for third site and no integration with existing cluster load balancer for the VMs of third site
118129
- Don't install OS packages SAPHanaSR-ScaleOut, SAPHanaSR-ScaleOut-doc and OS package pattern ha_sles on third site VMs
119130
- No majority maker VM for third site, as there's no cluster integration
120131
- Create NFS volume /hana/shared for third site exclusive use
121132
- No integration into the cluster for VMs or HANA resources of the third site
122133
- No HANA HA hook setup for third site in global.ini
123-
124-
You must use the same HANA SID and HANA installation number for third site.
125-
126-
2. With SAP HANA scale-out on third site installed and running, register the third site with the primary site.
134+
135+
You must use the same HANA SID and HANA installation number for third site.
136+
137+
2. With SAP HANA scale-out on third site installed and running, register the third site with the primary site.
138+
127139
The example uses SITE-DR as the name for third site.
140+
128141
```bash
129142
# Execute on the third site
130143
su - hn1adm
@@ -133,12 +146,14 @@ Example of a multi-target system replication system. For more information, see [
133146
```
134147
135148
3. Verify HANA system replication shows both secondary and third site.
149+
136150
```bash
137151
# Verify HANA HSR is in sync, execute on primary
138152
sudo su - hn1adm -c "python /usr/sap/HN1/HDB03/exe/python_support/systemReplicationStatus.py"
139153
```
140154
141155
4. Check the SAPHanaSR attribute for third site. SITE-DR should show up with status SOK in the sites section.
156+
142157
```bash
143158
# Check SAPHanaSR attribute on any cluster managed host (first or second site)
144159
sudo SAPHanaSR-showAttr
@@ -153,7 +168,7 @@ Example of a multi-target system replication system. For more information, see [
153168
# HANA_S1 1674815869 4 hana-s1-db1 PRIM P
154169
# HANA_S2 30 4 hana-s2-db1 SOK S
155170
```
156-
171+
157172
Cluster detects the replication status of connected sites and the monitored attributed can change between SOK and SFAIL. No cluster action if the replication to DR site fails.
158173
159174
## Autoregistering third site
@@ -164,10 +179,10 @@ SAP provides since HANA 2 SPS 04 parameter `register_secondaries_on_takeover`. W
164179

165180
For HSR [multi-tier](https://help.sap.com/docs/SAP_HANA_PLATFORM/6b94445c94ae495c83a19646e7c3fd56/f730f308fede4040bcb5ccea6751e74d.html), no automatic SAP HANA registration of the third site exists. You need to manually register the third site to the current secondary, to keep HSR replication chain for multi-tier.
166181

167-
![Diagram flow showing how a HANA auto-registartion works with a third site during a takeover.](./media/sap-hana-high-availability/sap-hana-high-availability-hsr-third-site-auto-register.png)
182+
![Diagram flow showing how a HANA auto-registration works with a third site during a takeover.](./media/sap-hana-high-availability/sap-hana-high-availability-hsr-third-site-auto-register.png)
168183

169184
## Next steps
170185

171186
- [Disaster recovery overview and infrastructure](./disaster-recovery-overview-guide.md)
172187
- [Disaster recovery for SAP workloads](./disaster-recovery-sap-guide.md)
173-
- [High-availability architecture and scenarios for SAP NetWeaver](./sap-hana-availability-across-regions.md)
188+
- [High-availability architecture and scenarios for SAP NetWeaver](./sap-hana-availability-across-regions.md)

articles/sap/workloads/sap-hana-high-availability-netapp-files-suse.md

Lines changed: 30 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: sap-on-azure
1111
ms.subservice: sap-vm-workloads
1212
ms.topic: tutorial
1313
ms.workload: infrastructure-services
14-
ms.date: 09/15/2023
14+
ms.date: 01/16/2024
1515
ms.author: ampatel
1616
---
1717

@@ -60,7 +60,7 @@ Read the following SAP Notes and papers first:
6060
- [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md)
6161
- [Azure Virtual Machines planning and implementation for SAP on Linux](./planning-guide.md)
6262

63-
>[!NOTE]
63+
> [!NOTE]
6464
> This article contains references to a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
6565
6666
## Overview
@@ -108,12 +108,12 @@ As you create your Azure NetApp Files for SAP HANA Scale-up systems, be aware of
108108

109109
The throughput of an Azure NetApp Files volume is a function of the volume size and service level, as documented in [Service level for Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-service-levels.md).
110110

111-
While designing the infrastructure for SAP HANA on Azure with Azure NetApp Files, be aware of the recommendations in [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md#sizing-for-hana-database-on-azure-netapp-files).
111+
While designing the infrastructure for SAP HANA on Azure with Azure NetApp Files, be aware of the recommendations in [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md#sizing-for-hana-database-on-azure-netapp-files).
112112

113-
The configuration in this article is presented with simple Azure NetApp Files Volumes.
113+
The configuration in this article is presented with simple Azure NetApp Files Volumes.
114114

115115
> [!IMPORTANT]
116-
> For production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
116+
> For production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
117117
118118
> [!NOTE]
119119
> All commands to mount /hana/shared in this article are presented for NFSv4.1 /hana/shared volumes.
@@ -144,46 +144,36 @@ The following instructions assume that you've already deployed your [Azure virtu
144144
- Volume hanadb2-log-mnt00001 (nfs://10.3.1.4:/hanadb2-log-mnt00001)
145145
- Volume hanadb2-shared-mnt00001 (nfs://10.3.1.4:/hanadb2-shared-mnt00001)
146146

147+
## Prepare the infrastructure
148+
149+
The resource agent for SAP HANA is included in SUSE Linux Enterprise Server for SAP Applications. An image for SUSE Linux Enterprise Server for SAP Applications 12 or 15 is available in Azure Marketplace. You can use the image to deploy new VMs.
147150

148-
## Deploy Linux virtual machine via Azure portal
151+
### Deploy Linux VMs manually via Azure portal
149152

150153
This document assumes that you've already deployed a resource group, [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md), and subnet.
151154

152-
Deploy virtual machines for SAP HANA. Choose a suitable SLES image that is supported for HANA system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
155+
Deploy virtual machines for SAP HANA. Choose a suitable SLES image that is supported for HANA system. You can deploy VM in any one of the availability options - virtual machine scale set, availability zone or availability set.
153156

154157
> [!IMPORTANT]
155158
> Make sure that the OS you select is SAP certified for SAP HANA on the specific VM types that you plan to use in your deployment. You can look up SAP HANA-certified VM types and their OS releases in [SAP HANA Certified IaaS Platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120). Make sure that you look at the details of the VM type to get the complete list of SAP HANA-supported OS releases for the specific VM type.
156159
157-
During VM configuration, we won't be adding any disk as all our mount points are on NFS shares from Azure NetApp Files. Also, you have an option to create or select exiting load balancer in networking section. If you're creating a new load balancer, follow below steps -
158-
159-
1. To set up standard load balancer, follow these configuration steps:
160-
1. First, create a front-end IP pool:
161-
1. Open the load balancer, select **frontend IP configuration**, and select **Add**.
162-
2. Enter the name of the new front-end IP (for example, **hana-frontend**).
163-
3. Set the **Assignment** to **Static** and enter the IP address (for example, **10.3.0.50**).
164-
4. Select **OK**.
165-
5. After the new front-end IP pool is created, note the pool IP address.
166-
2. Create a single back-end pool:
167-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
168-
2. Enter the name of the new back-end pool (for example, **hana-backend**).
169-
3. Select **NIC** for Backend Pool Configuration.
170-
4. Select **Add a virtual machine**.
171-
5. Select the virtual machines of the HANA cluster.
172-
6. Select **Add**.
173-
7. Select **Save**.
174-
3. Next, create a health probe:
175-
1. Open the load balancer, select **health probes**, and select **Add**.
176-
2. Enter the name of the new health probe (for example, **hana-hp**).
177-
3. Select TCP as the protocol and port 625**03**. Keep the **Interval** value set to 5.
178-
4. Select **OK**.
179-
4. Next, create the load-balancing rules:
180-
1. Open the load balancer, select **load balancing rules**, and select **Add**.
181-
2. Enter the name of the new load balancer rule (for example, **hana-lb**).
182-
3. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend** and **hana-hp**).
183-
1. Increase idle timeout to 30 minutes
184-
4. Select **HA Ports**.
185-
5. Make sure to **enable Floating IP**.
186-
6. Select **OK**.
160+
### Configure Azure load balancer
161+
162+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow below steps, to setup standard load balancer for high availability setup of HANA database.
163+
164+
#### [Azure Portal](#tab/lb-portal)
165+
166+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
167+
168+
#### [Azure CLI](#tab/lb-azurecli)
169+
170+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
171+
172+
#### [PowerShell](#tab/lb-powershell)
173+
174+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
175+
176+
---
187177

188178
For more information about the required ports for SAP HANA, read the chapter [Connections to Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6/latest/en-US/7a9343c9f2a2436faa3cfdb5ca00c052.html) in the [SAP HANA Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6) guide or SAP Note [2388694](https://launchpad.support.sap.com/#/notes/2388694).
189179

@@ -194,7 +184,9 @@ For more information about the required ports for SAP HANA, read the chapter [Co
194184
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
195185
196186
> [!IMPORTANT]
197-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md). See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
187+
>
188+
> - Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter `net.ipv4.tcp_timestamps` to `0`. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md) and SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
189+
> - To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, you should update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
198190
199191
## Mount the Azure NetApp Files volume
200192

0 commit comments

Comments
 (0)