Skip to content

Commit 3cf6f57

Browse files
authored
Merge pull request #84057 from rdeltcheva/sles15
Additional packages installation for SLES15 with Azure Fence agent
2 parents 8e3480c + 2be8b16 commit 3cf6f57

File tree

1 file changed

+29
-7
lines changed

1 file changed

+29
-7
lines changed

articles/virtual-machines/workloads/sap/high-availability-guide-suse-pacemaker.md

Lines changed: 29 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,14 @@ ms.author: sedusch
3232

3333
There are two options to set up a Pacemaker cluster in Azure. You can either use a fencing agent, which takes care of restarting a failed node via the Azure APIs or you can use an SBD device.
3434

35-
The SBD device requires at least one additional virtual machine that acts as an iSCSI target server and provides an SBD device. These iSCSI target servers can however be shared with other Pacemaker clusters. The advantage of using an SBD device is a faster failover time and, if you are using SBD devices on-premises, does not require any changes on how you operate the pacemaker cluster. You can use up to three SBD devices for a Pacemaker cluster to allow an SBD device to become unavailable, for example during OS patching of the iSCSI target server. If you want to use more than one SBD device per Pacemaker, make sure to deploy multiple iSCSI target servers and connect one SBD from each iSCSI target server. We recommend using either one SBD device or three. Pacemaker will not be able to automatically fence a cluster node if you only configure two SBD devices and one of them is not available. If you want to be able to fence when one iSCSI target server is down, you have to use three SBD devices and therefore three iSCSI target servers.
35+
The SBD device requires at least one additional virtual machine that acts as an iSCSI target server and provides an SBD device. These iSCSI target servers can however be shared with other Pacemaker clusters. The advantage of using an SBD device is a faster failover time and, if you are using SBD devices on-premises, doesn't require any changes on how you operate the pacemaker cluster. You can use up to three SBD devices for a Pacemaker cluster to allow an SBD device to become unavailable, for example during OS patching of the iSCSI target server. If you want to use more than one SBD device per Pacemaker, make sure to deploy multiple iSCSI target servers and connect one SBD from each iSCSI target server. We recommend using either one SBD device or three. Pacemaker will not be able to automatically fence a cluster node if you only configure two SBD devices and one of them is not available. If you want to be able to fence when one iSCSI target server is down, you have to use three SBD devices and therefore three iSCSI target servers.
3636

37-
If you do not want to invest in one additional virtual machine, you can also use the Azure Fence agent. The downside is that a failover can take between 10 to 15 minutes if a resource stop fails or the cluster nodes cannot communicate which each other anymore.
37+
If you don't want to invest in one additional virtual machine, you can also use the Azure Fence agent. The downside is that a failover can take between 10 to 15 minutes if a resource stop fails or the cluster nodes cannot communicate which each other anymore.
3838

3939
![Pacemaker on SLES overview](./media/high-availability-guide-suse-pacemaker/pacemaker.png)
4040

4141
>[!IMPORTANT]
42-
> When planning and deploying Linux Pacemaker clustered nodes and SBD devices, it is essential for the overall reliability of the complete cluster configuration that the routing between the VMs involved and the VM(s) hosting the SBD device(s) is not passing through any other devices like [NVAs](https://azure.microsoft.com/solutions/network-appliances/). Otherwise, issues and maintenance events with the NVA can have a negative impact on the stability and reliability of the overall cluster configuration. In order to avoid such obstacles, do not define routing rules of NVAs or [User Defined Routing rules](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview) that route traffic between clustered nodes and SBD devices through NVAs and similar devices when planning and deploying Linux Pacemaker clustered nodes and SBD devices.
42+
> When planning and deploying Linux Pacemaker clustered nodes and SBD devices, it is essential for the overall reliability of the complete cluster configuration that the routing between the VMs involved and the VM(s) hosting the SBD device(s) is not passing through any other devices like [NVAs](https://azure.microsoft.com/solutions/network-appliances/). Otherwise, issues and maintenance events with the NVA can have a negative impact on the stability and reliability of the overall cluster configuration. In order to avoid such obstacles, don't define routing rules of NVAs or [User Defined Routing rules](https://docs.microsoft.com/azure/virtual-network/virtual-networks-udr-overview) that route traffic between clustered nodes and SBD devices through NVAs and similar devices when planning and deploying Linux Pacemaker clustered nodes and SBD devices.
4343
>
4444
4545
## SBD fencing
@@ -50,7 +50,7 @@ Follow these steps if you want to use an SBD device for fencing.
5050

5151
You first need to create the iSCSI target virtual machines. iSCSI target servers can be shared with multiple Pacemaker clusters.
5252

53-
1. Deploy new SLES 12 SP1 or higher virtual machines and connect to them via ssh. The machines do not need to be large. A virtual machine size like Standard_E2s_v3 or Standard_D2s_v3 is sufficient. Make sure to use Premium storage the OS disk.
53+
1. Deploy new SLES 12 SP1 or higher virtual machines and connect to them via ssh. The machines don't need to be large. A virtual machine size like Standard_E2s_v3 or Standard_D2s_v3 is sufficient. Make sure to use Premium storage the OS disk.
5454

5555
Run the following commands on all **iSCSI target virtual machines**.
5656

@@ -395,6 +395,28 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
395395
<pre><code>sudo zypper install fence-agents
396396
</code></pre>
397397

398+
>[!IMPORTANT]
399+
> If using Suse Linux Enterprise Server for SAP 15, be aware that you need to activate additional module and install additional component, that is prerequisite for using Azure Fence Agent. To learn more about SUSE modules and extensions see [Modules and Extensions explained](https://www.suse.com/documentation/sles-15/singlehtml/art_modules/art_modules.html). Follow the instructions bellow to install Azure Python SDK.
400+
401+
The following instructions on how to install Azure Python SDK are only applicable for Suse Enterprise Server for SAP **15**.
402+
403+
- If you are using Bring-Your-Own-Subscription, follow these instructions
404+
405+
<pre><code>
406+
#Activate module PackageHub/15/x86_64
407+
sudo SUSEConnect -p PackageHub/15/x86_64
408+
#Install Azure Python SDK
409+
sudo zypper in python3-azure-sdk
410+
</code></pre>
411+
412+
- If you are using Pay-As-You-Go subscription, follow these instructions
413+
414+
<pre><code>#Activate module PackageHub/15/x86_64
415+
zypper ar https://download.opensuse.org/repositories/openSUSE:/Backports:/SLE-15/standard/ SLE15-PackageHub
416+
#Install Azure Python SDK
417+
sudo zypper in python3-azure-sdk
418+
</code></pre>
419+
398420
1. **[A]** Setup host name resolution
399421

400422
You can either use a DNS server or modify the /etc/hosts on all nodes. This example shows how to use the /etc/hosts file.
@@ -440,7 +462,7 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
440462
<pre><code>sudo passwd hacluster
441463
</code></pre>
442464

443-
1. **[A]** Configure corosync to use other transport and add nodelist. Cluster does not work otherwise.
465+
1. **[A]** Configure corosync to use other transport and add nodelist. Cluster doesn't work otherwise.
444466

445467
<pre><code>sudo vi /etc/corosync/corosync.conf
446468
</code></pre>
@@ -507,7 +529,7 @@ The STONITH device uses a Service Principal to authorize against Microsoft Azure
507529

508530
### **[1]** Create a custom role for the fence agent
509531

510-
The Service Principal does not have permissions to access your Azure resources by default. You need to give the Service Principal permissions to start and stop (deallocate) all virtual machines of the cluster. If you did not already create the custom role, you can create it using [PowerShell](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-powershell) or [Azure CLI](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-cli)
532+
The Service Principal doesn't have permissions to access your Azure resources by default. You need to give the Service Principal permissions to start and stop (deallocate) all virtual machines of the cluster. If you did not already create the custom role, you can create it using [PowerShell](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-powershell) or [Azure CLI](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-cli)
511533

512534
Use the following content for the input file. You need to adapt the content to your subscriptions that is, replace c276fc76-9cd4-44c9-99a7-4fd71546436e and e91d47c4-76f3-4271-a796-21b4ecfe3624 with the Ids of your subscription. If you only have one subscription, remove the second entry in AssignableScopes.
513535

@@ -533,7 +555,7 @@ Use the following content for the input file. You need to adapt the content to y
533555

534556
### **[A]** Assign the custom role to the Service Principal
535557

536-
Assign the custom role "Linux Fence Agent Role" that was created in the last chapter to the Service Principal. Do not use the Owner role anymore!
558+
Assign the custom role "Linux Fence Agent Role" that was created in the last chapter to the Service Principal. Don't use the Owner role anymore!
537559

538560
1. Go to [https://portal.azure.com](https://portal.azure.com)
539561
1. Open the All resources blade

0 commit comments

Comments
 (0)