You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/workloads/sap/high-availability-guide-suse-pacemaker.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -472,7 +472,7 @@ This section applies only if you want to use a fencing device with an Azure fenc
472
472
This section applies only if you're using a fencing device that's based on an Azure fence agent. The fencing device uses either a managed identity or a service principal to authorize against Microsoft Azure.
473
473
474
474
#### Using managed identity
475
-
To create a managed identity (MSI), [create a system-assigned](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) managed identity for each VM in the cluster. Should a system-assigned managed identity already exist, it will be used. User assigned managed identities should not be used with Pacemaker at this time. Fence device, based on managed identity is supported on SLES 15 SP1 and above.
475
+
To create a managed identity (MSI), [create a system-assigned](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) managed identity for each VM in the cluster. Should a system-assigned managed identity already exist, it will be used. User assigned managed identities should not be used with Pacemaker at this time. Azure fence agent, based on managed identity is supported for SLES 12 SP5 and SLES 15 SP1 and above.
476
476
477
477
#### Using service principal
478
478
@@ -639,9 +639,11 @@ Make sure to assign the custom role to the service principal at all VM (cluster
639
639
> The installed version of the *fence-agents* package must be 4.4.0 or later to benefit from the faster failover times with the Azure fence agent, when a cluster node is fenced. If you're running an earlier version, we recommend that you update the package.
640
640
641
641
>[!IMPORTANT]
642
-
> If using managed identity, the installed version of the *fence-agents* package must be fence-agents 4.5.2+git.1592573838.1eee0863 or later. Earlier versions will not work correctly with a managed identity configuration.
643
-
> Currently only SLES 15 SP1 and newer are supported for managed identity configuration.
644
-
642
+
> If using managed identity, the installed version of the *fence-agents* package must be
643
+
> SLES 12 SP5: fence-agents 4.9.0+git.1624456340.8d746be9-3.35.2 or later
644
+
> SLES 15 SP1 and higher: fence-agents 4.5.2+git.1592573838.1eee0863 or later.
645
+
> Earlier versions will not work correctly with a managed identity configuration.
646
+
645
647
1.**[A]** Install the Azure Python SDK and Azure Identity Python module.
646
648
647
649
Install the Azure Python SDK on SLES 12 SP4 or SLES 12 SP5:
@@ -799,7 +801,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
799
801
> The 'pcmk_host_map' option is required in the command only if the hostnames and the Azure VM names are *not* identical. Specify the mapping in the format *hostname:vm-name*.
800
802
> Refer to the bold section in the following command.
801
803
802
-
If using **managed identity** for your fence agent, run the following command (SLES 15 SP1 and newer, only)
804
+
If using **managed identity** for your fence agent, run the following command
803
805
<pre><code>
804
806
# replace the bold strings with your subscription ID and resource group of the VM
0 commit comments