You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/workloads/sap/high-availability-guide-suse-pacemaker.md
+25-21Lines changed: 25 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.topic: article
13
13
ms.tgt_pltfrm: vm-windows
14
14
ms.workload: infrastructure-services
15
15
ms.custom: subject-rbac-steps
16
-
ms.date: 10/26/2022
16
+
ms.date: 12/05/2022
17
17
ms.author: radeltch
18
18
19
19
---
@@ -541,12 +541,17 @@ Make sure to assign the custom role to the service principal at all VM (cluster
541
541
<pre><code>sudo zypper update
542
542
</code></pre>
543
543
544
-
1.**[A]** Install the component, which you'll need for the cluster resources.
544
+
> [!NOTE]
545
+
> On SLES 15 SP04 check the version of *crmsh* and *pacemaker* package, and make sure that the miniumum version requirements are met:
546
+
> - crmsh-4.4.0+20221028.3e41444-150400.3.9.1 or later
547
+
> - pacemaker-2.1.2+20211124.ada5c3b36-150400.4.6.1 or later
548
+
549
+
2.**[A]** Install the component, which you'll need for the cluster resources.
545
550
546
551
<pre><code>sudo zypper in socat
547
552
</code></pre>
548
553
549
-
1.**[A]** Install the azure-lb component, which you'll need for the cluster resources.
554
+
3.**[A]** Install the azure-lb component, which you'll need for the cluster resources.
550
555
551
556
<pre><code>sudo zypper in resource-agents
552
557
</code></pre>
@@ -556,7 +561,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
556
561
> -**SLES 12 SP4/SP5**: The version must be resource-agents-4.3.018.a7fb5035-3.30.1 or later.
557
562
> -**SLES 15/15 SP1**: The version must be resource-agents-4.3.0184.6ee15eb2-4.13.1 or later.
558
563
559
-
1.**[A]** Configure the operating system.
564
+
4.**[A]** Configure the operating system.
560
565
561
566
a. Pacemaker occasionally creates many processes, which can exhaust the allowed number. When this happens, a heartbeat between the cluster nodes might fail and lead to a failover of your resources. We recommend increasing the maximum number of allowed processes by setting the following parameter:
562
567
@@ -589,7 +594,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
589
594
vm.swappiness = 10
590
595
</code></pre>
591
596
592
-
1.**[A]** Configure *cloud-netconfig-azure* for the high availability cluster.
597
+
5.**[A]** Configure *cloud-netconfig-azure* for the high availability cluster.
593
598
594
599
>[!NOTE]
595
600
> Check the installed version of the *cloud-netconfig-azure* package by running **zypper info cloud-netconfig-azure**. If the version in your environment is 1.3 or later, it's no longer necessary to suppress the management of network interfaces by the cloud network plug-in. If the version is earlier than 1.3, we recommend that you update the *cloud-netconfig-azure* package to the latest available version.
@@ -604,7 +609,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
604
609
CLOUD_NETCONFIG_MANAGE="no"
605
610
</code></pre>
606
611
607
-
1.**[1]** Enable SSH access.
612
+
6.**[1]** Enable SSH access.
608
613
609
614
<pre><code>sudo ssh-keygen
610
615
@@ -616,7 +621,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
616
621
sudo cat /root/.ssh/id_rsa.pub
617
622
</code></pre>
618
623
619
-
1.**[2]** Enable SSH access.
624
+
7.**[2]** Enable SSH access.
620
625
621
626
<pre><code>sudo ssh-keygen
622
627
@@ -631,13 +636,13 @@ Make sure to assign the custom role to the service principal at all VM (cluster
631
636
sudo cat /root/.ssh/id_rsa.pub
632
637
</code></pre>
633
638
634
-
1.**[1]** Enable SSH access.
639
+
8.**[1]** Enable SSH access.
635
640
636
641
<pre><code># insert the public key you copied in the last step into the authorized keys file on the first server
637
642
sudo vi /root/.ssh/authorized_keys
638
643
</code></pre>
639
644
640
-
1.**[A]** Install the *fence-agents* package if you're using a fencing device, based on the Azure fence agent.
645
+
9.**[A]** Install the *fence-agents* package if you're using a fencing device, based on the Azure fence agent.
641
646
642
647
<pre><code>sudo zypper install fence-agents
643
648
</code></pre>
@@ -651,7 +656,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
651
656
> SLES 15 SP1 and higher: fence-agents 4.5.2+git.1592573838.1eee0863 or later.
652
657
> Earlier versions will not work correctly with a managed identity configuration.
653
658
654
-
1.**[A]** Install the Azure Python SDK and Azure Identity Python module.
659
+
10.**[A]** Install the Azure Python SDK and Azure Identity Python module.
655
660
656
661
Install the Azure Python SDK on SLES 12 SP4 or SLES 12 SP5:
657
662
<pre><code># You might need to activate the public cloud extension first
@@ -665,7 +670,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
>Depending on your version and image type, you might need to activate the public cloud extension for your OS release before you can install the Azure Python SDK.
@@ -674,7 +679,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
674
679
> - On SLES 12 SP4 or SLES 12 SP5, install version 4.6.2 or later of the *python-azure-mgmt-compute* package.
675
680
> - If your *python-azure-mgmt-compute or python**3**-azure-mgmt-compute* package version is 17.0.0-6.7.1, follow the instructions in [SUSE KBA](https://www.suse.com/support/kb/doc/?id=000020377) to update the fence-agents version and install the Azure Identity client library for Python module if it is missing.
676
681
677
-
1.**[A]** Set up the hostname resolution.
682
+
11.**[A]** Set up the hostname resolution.
678
683
679
684
You can either use a DNS server or modify the */etc/hosts* file on all nodes. This example shows how to use the */etc/hosts* file.
680
685
@@ -696,11 +701,11 @@ Make sure to assign the custom role to the service principal at all VM (cluster
696
701
<b>10.0.0.7 prod-cl1-1</b>
697
702
</code></pre>
698
703
699
-
1.**[1]** Install the cluster.
704
+
12.**[1]** Install the cluster.
700
705
701
706
- If you're using SBD devices for fencing (for either the iSCSI target server or Azure shared disk):
702
707
703
-
<pre><code>sudo ha-cluster-init -u
708
+
<pre><code>sudo crm cluster init
704
709
# ! NTP is not configured to start at system boot.
If you only kill the message server once, it will be restarted by sapstart. If you kill it often enough, Pacemaker will eventually move the ASCS instance to the other node. Run the following commands as root to clean up the resource state of the ASCS and ERS instance after the test.
1074
+
If you only kill the message server once, it will be restarted by sapstart. If you kill it often enough, Pacemaker will eventually move the ASCS instance to the other node, in case of ENSA1. Run the following commands as root to clean up the resource state of the ASCS and ERS instance after the test.
If you only run the command once, sapstart will restart the process. If you run it often enough, sapstart will not restart the process and the resource will be in a stopped state. Run the following commands as root to clean up the resource state of the ERS instance after the test.
0 commit comments