You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -94,7 +94,7 @@ Now it is possible to achieve SAP Netweaver HA by using shared storage, deployed
94
94
95
95

96
96
97
-
SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA database use virtual hostname and virtual IP addresses. On Azure, a load balancer is required to use a virtual IP address. The following list shows the configuration of the load balancer with separate front-end IPs for (A)SCS and ERS.
97
+
SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA database use virtual hostname and virtual IP addresses. On Azure, a load balancer is required to use a virtual IP address. We recommend using [Standard load balancer](https://docs.microsoft.com/azure/load-balancer/quickstart-load-balancer-standard-public-portal). The following list shows the configuration of the load balancer with separate front-end IPs for (A)SCS and ERS.
98
98
99
99
> [!IMPORTANT]
100
100
> Multi-SID clustering of SAP ASCS/ERS with Red Hat Linux as guest operating system in Azure VMs is **NOT supported**. Multi-SID clustering describes the installation of multiple SAP ASCS/ERS instances with different SIDs in one Pacemaker cluster.
@@ -108,6 +108,7 @@ SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA datab
108
108
* Probe Port
109
109
* Port 620<strong><nr></strong>
110
110
* Load-balancing rules
111
+
* If using Standard Load Balancer, select **HA ports**
111
112
* 32<strong><nr></strong> TCP
112
113
* 36<strong><nr></strong> TCP
113
114
* 39<strong><nr></strong> TCP
@@ -125,6 +126,7 @@ SAP NetWeaver ASCS, SAP NetWeaver SCS, SAP NetWeaver ERS, and the SAP HANA datab
125
126
* Probe Port
126
127
* Port 621<strong><nr></strong>
127
128
* Load-balancing rules
129
+
* If using Standard Load Balancer, select **HA ports**
128
130
* 32<strong><nr></strong> TCP
129
131
* 33<strong><nr></strong> TCP
130
132
* 5<strong><nr></strong>13 TCP
@@ -180,7 +182,42 @@ In this example, the resources were deployed manually via the [Azure portal](htt
180
182
181
183
First you need to create the Azure NetApp Files volumes. Deploy the VMs. Afterwards, you create a load balancer and use the virtual machines in the backend pools.
182
184
183
-
1. Create a Load Balancer (internal)
185
+
1. Create load balancer (internal, standard):
186
+
1. Create the frontend IP addresses
187
+
1. IP address 192.168.14.9 for the ASCS
188
+
1. Open the load balancer, select frontend IP pool, and click Add
189
+
1. Enter the name of the new frontend IP pool (for example **frontend.QAS.ASCS**)
190
+
1. Set the Assignment to Static and enter the IP address (for example **192.168.14.9**)
191
+
1. Click OK
192
+
1. IP address 192.168.14.10 for the ASCS ERS
193
+
* Repeat the steps above under "a" to create an IP address for the ERS (for example **192.168.14.10** and **frontend.QAS.ERS**)
194
+
1. Create the backend pools
195
+
1. Create a backend pool for the ASCS
196
+
1. Open the load balancer, select backend pools, and click Add
197
+
1. Enter the name of the new backend pool (for example **backend.QAS**)
198
+
1. Click Add a virtual machine.
199
+
1. Select Virtual machine.
200
+
1. Select the virtual machines of the (A)SCS cluster and their IP addresses.
201
+
1. Click Add
202
+
1. Create the health probes
203
+
1. Port 620**00** for ASCS
204
+
1. Open the load balancer, select health probes, and click Add
205
+
1. Enter the name of the new health probe (for example **health.QAS.ASCS**)
206
+
1. Select TCP as protocol, port 620**00**, keep Interval 5 and Unhealthy threshold 2
207
+
1. Click OK
208
+
1. Port 621**01** for ASCS ERS
209
+
* Repeat the steps above under "c" to create a health probe for the ERS (for example 621**01** and **health.QAS.ERS**)
210
+
1. Load-balancing rules
211
+
1. Load-balancing rules for ASCS
212
+
1. Open the load balancer, select Load-balancing rules, and click Add
213
+
1. Enter the name of the new load balancer rule (for example **lb.QAS.ASCS**)
214
+
1. Select the frontend IP address for ASCS, backend pool, and health probe you created earlier (for example **frontend.QAS.ASCS**, **backend.QAS** and **health.QAS.ASCS**)
215
+
1. Select **HA ports**
216
+
1. Increase idle timeout to 30 minutes
217
+
1.**Make sure to enable Floating IP**
218
+
1. Click OK
219
+
* Repeat the steps above to create load balancing rules for ERS (for example **lb.QAS.ERS**)
220
+
1. Alternatively, if your scenario requires basic load balancer (internal), follow these steps:
184
221
1. Create the frontend IP addresses
185
222
1. IP address 192.168.14.9 for the ASCS
186
223
1. Open the load balancer, select frontend IP pool, and click Add
@@ -219,6 +256,8 @@ First you need to create the Azure NetApp Files volumes. Deploy the VMs. Afterwa
219
256
1. Additional ports for the ASCS ERS
220
257
* Repeat the steps above under "d" for ports 32**01**, 33**01**, 5**01**13, 5**01**14, 5**01**16 and TCP for the ASCS ERS
221
258
259
+
> [!Note]
260
+
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](https://docs.microsoft.com/azure/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections).
222
261
223
262
> [!IMPORTANT]
224
263
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](https://docs.microsoft.com/azure/load-balancer/load-balancer-custom-probe-overview).
0 commit comments