Skip to content

Commit 58883c7

Browse files
authored
Merge pull request #95249 from rdeltcheva/stilb-haanf-rhel
SAP HA with ANF on RHEL - add recommendation for standard ILB
2 parents 3d82065 + 03e8536 commit 58883c7

File tree

1 file changed

+42
-3
lines changed

1 file changed

+42
-3
lines changed

articles/virtual-machines/workloads/sap/high-availability-guide-rhel-netapp-files.md

Lines changed: 42 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.service: virtual-machines-windows
1414
ms.topic: article
1515
ms.tgt_pltfrm: vm-windows
1616
ms.workload: infrastructure-services
17-
ms.date: 06/14/2019
17+
ms.date: 11/07/2019
1818
ms.author: radeltch
1919

2020
---
@@ -94,7 +94,7 @@ Now it is possible to achieve SAP Netweaver HA by using shared storage, deployed
9494

9595
![SAP NetWeaver High Availability overview](./media/high-availability-guide-rhel/high-availability-guide-rhel-anf.png)
9696

97-
SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA database use virtual hostname and virtual IP addresses. On Azure, a load balancer is required to use a virtual IP address. The following list shows the configuration of the load balancer with separate front-end IPs for (A)SCS and ERS.
97+
SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA database use virtual hostname and virtual IP addresses. On Azure, a load balancer is required to use a virtual IP address. We recommend using [Standard load balancer](https://docs.microsoft.com/azure/load-balancer/quickstart-load-balancer-standard-public-portal). The following list shows the configuration of the load balancer with separate front-end IPs for (A)SCS and ERS.
9898

9999
> [!IMPORTANT]
100100
> Multi-SID clustering of SAP ASCS/ERS with Red Hat Linux as guest operating system in Azure VMs is **NOT supported**. Multi-SID clustering describes the installation of multiple SAP ASCS/ERS instances with different SIDs in one Pacemaker cluster.
@@ -108,6 +108,7 @@ SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA datab
108108
* Probe Port
109109
* Port 620<strong>&lt;nr&gt;</strong>
110110
* Load-balancing rules
111+
* If using Standard Load Balancer, select **HA ports**
111112
* 32<strong>&lt;nr&gt;</strong> TCP
112113
* 36<strong>&lt;nr&gt;</strong> TCP
113114
* 39<strong>&lt;nr&gt;</strong> TCP
@@ -125,6 +126,7 @@ SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA datab
125126
* Probe Port
126127
* Port 621<strong>&lt;nr&gt;</strong>
127128
* Load-balancing rules
129+
* If using Standard Load Balancer, select **HA ports**
128130
* 32<strong>&lt;nr&gt;</strong> TCP
129131
* 33<strong>&lt;nr&gt;</strong> TCP
130132
* 5<strong>&lt;nr&gt;</strong>13 TCP
@@ -180,7 +182,42 @@ In this example, the resources were deployed manually via the [Azure portal](htt
180182

181183
First you need to create the Azure NetApp Files volumes. Deploy the VMs. Afterwards, you create a load balancer and use the virtual machines in the backend pools.
182184

183-
1. Create a Load Balancer (internal)
185+
1. Create load balancer (internal, standard):
186+
1. Create the frontend IP addresses
187+
1. IP address 192.168.14.9 for the ASCS
188+
1. Open the load balancer, select frontend IP pool, and click Add
189+
1. Enter the name of the new frontend IP pool (for example **frontend.QAS.ASCS**)
190+
1. Set the Assignment to Static and enter the IP address (for example **192.168.14.9**)
191+
1. Click OK
192+
1. IP address 192.168.14.10 for the ASCS ERS
193+
* Repeat the steps above under "a" to create an IP address for the ERS (for example **192.168.14.10** and **frontend.QAS.ERS**)
194+
1. Create the backend pools
195+
1. Create a backend pool for the ASCS
196+
1. Open the load balancer, select backend pools, and click Add
197+
1. Enter the name of the new backend pool (for example **backend.QAS**)
198+
1. Click Add a virtual machine.
199+
1. Select Virtual machine.
200+
1. Select the virtual machines of the (A)SCS cluster and their IP addresses.
201+
1. Click Add
202+
1. Create the health probes
203+
1. Port 620**00** for ASCS
204+
1. Open the load balancer, select health probes, and click Add
205+
1. Enter the name of the new health probe (for example **health.QAS.ASCS**)
206+
1. Select TCP as protocol, port 620**00**, keep Interval 5 and Unhealthy threshold 2
207+
1. Click OK
208+
1. Port 621**01** for ASCS ERS
209+
* Repeat the steps above under "c" to create a health probe for the ERS (for example 621**01** and **health.QAS.ERS**)
210+
1. Load-balancing rules
211+
1. Load-balancing rules for ASCS
212+
1. Open the load balancer, select Load-balancing rules, and click Add
213+
1. Enter the name of the new load balancer rule (for example **lb.QAS.ASCS**)
214+
1. Select the frontend IP address for ASCS, backend pool, and health probe you created earlier (for example **frontend.QAS.ASCS**, **backend.QAS** and **health.QAS.ASCS**)
215+
1. Select **HA ports**
216+
1. Increase idle timeout to 30 minutes
217+
1. **Make sure to enable Floating IP**
218+
1. Click OK
219+
* Repeat the steps above to create load balancing rules for ERS (for example **lb.QAS.ERS**)
220+
1. Alternatively, if your scenario requires basic load balancer (internal), follow these steps:
184221
1. Create the frontend IP addresses
185222
1. IP address 192.168.14.9 for the ASCS
186223
1. Open the load balancer, select frontend IP pool, and click Add
@@ -219,6 +256,8 @@ First you need to create the Azure NetApp Files volumes. Deploy the VMs. Afterwa
219256
1. Additional ports for the ASCS ERS
220257
* Repeat the steps above under "d" for ports 32**01**, 33**01**, 5**01**13, 5**01**14, 5**01**16 and TCP for the ASCS ERS
221258

259+
> [!Note]
260+
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections).
222261
223262
> [!IMPORTANT]
224263
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](https://docs.microsoft.com/azure/load-balancer/load-balancer-custom-probe-overview).

0 commit comments

Comments
 (0)