Skip to content

Commit 5b2e5c3

Browse files
committed
PR comments
1 parent eabbe60 commit 5b2e5c3

File tree

1 file changed

+51
-51
lines changed

1 file changed

+51
-51
lines changed

articles/virtual-machines/workloads/sap/automation-configure-system.md

Lines changed: 51 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ Configuration for the [SAP deployment automation framework on Azure](automation-
1515

1616
The automation supports both creating resources (greenfield deployment) or using existing resources (brownfield deployment).
1717

18-
For the greenfield scenario the automation defines default names for resources, however some resource names may be defined in the tfvars file.
19-
For the brownfield scenario the Azure resource identifiers for the resources must be specified.
18+
For the greenfield scenario, the automation defines default names for resources, however some resource names may be defined in the tfvars file.
19+
For the brownfield scenario, the Azure resource identifiers for the resources must be specified.
2020

2121

2222
## Deployment topologies
@@ -31,21 +31,21 @@ The automation framework can be used to deploy the following SAP architectures:
3131

3232
In the Standalone architecture all the SAP roles are installed on a single server.
3333

34-
To configure this topology define the database tier values and set `enable_app_tier_deployment` to false.
34+
To configure this topology, define the database tier values and set `enable_app_tier_deployment` to false.
3535

3636
### Distributed
3737

38-
In the distributed architecture you can separate the database server and the application tier. The application tier can further be separated in two by having SAP Central Services on a virtual machine and one or more application servers.
39-
To configure this topology define the database tier values and define `scs_server_count` = 1, `application_server_count` >= 1
38+
The distributed architecture has a separate database server and application tier. The application tier can further be separated by having SAP Central Services on a virtual machine and one or more application servers.
39+
To configure this topology, define the database tier values and define `scs_server_count` = 1, `application_server_count` >= 1
4040

4141
### High Availability
4242

4343
The Distributed (Highly Available) deployment is similar to the Distributed architecture but either the database or SAP Central Services are both highly available using two virtual machines each with Pacemaker clusters.
4444

45-
To configure this topology define the database tier values and set `database_high_availability` to true. Set `scs_server_count = 1` and `scs_high_availability` = true and
45+
To configure this topology, define the database tier values and set `database_high_availability` to true. Set `scs_server_count = 1` and `scs_high_availability` = true and
4646
`application_server_count` >= 1
4747

48-
## Environment Parameters
48+
## Environment parameters
4949

5050
The table below contains the parameters that define the environment settings and the resource naming.
5151

@@ -60,7 +60,7 @@ The table below contains the parameters that define the environment settings and
6060
> | 'name_override_file' | Name override file | Optional |
6161
6262

63-
## Resource Group Parameters
63+
## Resource group parameters
6464

6565
The table below contains the parameters that define the resource group.
6666

@@ -72,7 +72,7 @@ The table below contains the parameters that define the resource group.
7272
> | `resource_group_arm_id` | Azure resource identifier for an existing resource group | Optional |
7373
7474

75-
### Database Tier Parameters
75+
### Database tier parameters
7676

7777
The database tier defines the infrastructure for the database tier, supported database backends are:
7878

@@ -118,7 +118,7 @@ The Virtual Machine and the operating system image is defined using the followin
118118
}
119119
```
120120

121-
### Common Application Tier Parameters
121+
### Common application tier parameters
122122

123123
The application tier defines the infrastructure for the application tier, which can consist of application servers, central services servers and web dispatch servers
124124

@@ -134,7 +134,7 @@ The application tier defines the infrastructure for the application tier, which
134134
> | `app_tier_use_DHCP` | Controls if Azure subnet provided IP addresses should be used (dynamic) | Optional | |
135135
> | `app_tier_dual_nics` | Defines if the application tier server will have two network interfaces | Optional | |
136136
137-
### SAP Central Services Parameters
137+
### SAP Central services parameters
138138

139139

140140
> [!div class="mx-tdCol2BreakAll "]
@@ -154,7 +154,7 @@ The application tier defines the infrastructure for the application tier, which
154154
> | `scs_server_no_avset` | Controls scs server availability set placement | Optional | |
155155
> | `scs_server_tags` | Defines a list of tags to be applied to the scs servers | Optional | |
156156
157-
### Application Server Parameters
157+
### Application server parameters
158158

159159

160160
> [!div class="mx-tdCol2BreakAll "]
@@ -170,7 +170,7 @@ The application tier defines the infrastructure for the application tier, which
170170
> | `application_server_no_avset` | Controls application server availability set placement | Optional | |
171171
> | `application_server_tags` | Defines a list of tags to be applied to the application servers | Optional | |
172172
173-
### Web Dispatcher Parameters
173+
### Web dispatcher parameters
174174

175175

176176
> [!div class="mx-tdCol2BreakAll "]
@@ -186,50 +186,50 @@ The application tier defines the infrastructure for the application tier, which
186186
> | `webdispatcher_server_no_avset` | Defines web dispatcher availability set placement | Optional | |
187187
> | `webdispatcher_server_tags` | Defines a list of tags to be applied to the web dispatcher servers | Optional | |
188188
189-
## Network Parameters
189+
## Network parameters
190190

191191
If the subnets are not deployed using the workload zone deployment, they can be added in the system's tfvars file.
192192

193-
The automation framework supports both creating the virtual network and the subnets for new environment deployments (Green field) or using an existing virtual network and existing subnets for existing environment deployments (Brown field) or a combination of for new environment deployments and for existing environment deployments.
194-
- For the green field scenario, the virtual network address space and the subnet address prefixes must be specified
195-
- For the brown field scenario, the Azure resource identifier for the virtual network and the subnets must be specified
193+
The automation framework can either deploy the virtual network and the subnets for new environment deployments (greenfield) or using an existing virtual network and existing subnets for existing environment deployments (brownfield).
194+
- For the greenfield scenario, the virtual network address space and the subnet address prefixes must be specified
195+
- For the brownfield scenario, the Azure resource identifier for the virtual network and the subnets must be specified
196196

197-
Ensure that the virtual network address space is large enough to host all the resources
197+
Ensure that the virtual network address space is large enough to host all the resources.
198198

199199
The table below contains the networking parameters.
200200

201201

202202
> [!div class="mx-tdCol2BreakAll "]
203203
> | Variable | Description | Type | Notes |
204204
> | -------------------------------- | -------------------------------------------------------------------- | --------- | ------ |
205-
> | `network_logical_name` | The logical name of the network | Required | |
206-
> | `network_address_space` | The address range for the virtual network | Mandatory | For new environment deployments |
207-
> | `admin_subnet_name` | The name of the 'admin' subnet | Optional | |
208-
> | `admin_subnet_address_prefix` | The address range for the 'admin' subnet | Mandatory | For new environment deployments |
209-
> | `admin_subnet_arm_id` | The Azure resource identifier for the 'admin' subnet | Mandatory | For existing environment deployments |
210-
> | `admin_subnet_nsg_name` | The name of the 'admin' Network Security Group name | Optional | |
205+
> | `network_logical_name` | The logical name of the network. | Required | |
206+
> | `network_address_space` | The address range for the virtual network. | Mandatory | For new environment deployments |
207+
> | `admin_subnet_name` | The name of the 'admin' subnet. | Optional | |
208+
> | `admin_subnet_address_prefix` | The address range for the 'admin' subnet. | Mandatory | For new environment deployments |
209+
> | `admin_subnet_arm_id` | The Azure resource identifier for the 'admin' subnet. | Mandatory | For existing environment deployments |
210+
> | `admin_subnet_nsg_name` | The name of the 'admin' Network Security Group name. | Optional | |
211211
> | `admin_subnet_nsg_arm_id` | The Azure resource identifier for the 'admin' Network Security Group | Mandatory | For existing environment deployments |
212-
> | `db_subnet_name` | The name of the 'db' subnet | Optional | |
213-
> | `db_subnet_address_prefix` | The address range for the 'db' subnet | Mandatory | For new environment deployments |
214-
> | `db_subnet_arm_id` | The Azure resource identifier for the 'db' subnet | Mandatory | For existing environment deployments |
215-
> | `db_subnet_nsg_name` | The name of the 'db' Network Security Group name | Optional | |
216-
> | `db_subnet_nsg_arm_id` | The Azure resource identifier for the 'db' Network Security Group | Mandatory | For existing environment deployments |
217-
> | `app_subnet_name` | The name of the 'app' subnet | Optional | |
218-
> | `app_subnet_address_prefix` | The address range for the 'app' subnet | Mandatory | For new environment deployments |
219-
> | `app_subnet_arm_id` | The Azure resource identifier for the 'app' subnet | Mandatory | For existing environment deployments |
220-
> | `app_subnet_nsg_name` | The name of the 'app' Network Security Group name | Optional | |
221-
> | `app_subnet_nsg_arm_id` | The Azure resource identifier for the 'app' Network Security Group | Mandatory | For existing environment deployments |
222-
> | `web_subnet_name` | The name of the 'web' subnet | Optional | |
223-
> | `web_subnet_address_prefix` | The address range for the 'web' subnet | Mandatory | For new environment deployments |
224-
> | `web_subnet_arm_id` | The Azure resource identifier for the 'web' subnet | Mandatory | For existing environment deployments |
225-
> | `web_subnet_nsg_name` | The name of the 'web' Network Security Group name | Optional | |
226-
> | `web_subnet_nsg_arm_id` | The Azure resource identifier for the 'web' Network Security Group | Mandatory | For existing environment deployments |
227-
228-
\* = Required for for existing environment deployments deployments
229-
230-
### Anchor Virtual Machine Parameters
231-
232-
The SAP deployment automation framework supports having an Anchor Virtual Machine. The anchor Virtual machine will be the first virtual machine to be deployed and is used to anchor the proximity placement group.
212+
> | `db_subnet_name` | The name of the 'db' subnet. | Optional | |
213+
> | `db_subnet_address_prefix` | The address range for the 'db' subnet. | Mandatory | For new environment deployments |
214+
> | `db_subnet_arm_id` | The Azure resource identifier for the 'db' subnet. | Mandatory | For existing environment deployments |
215+
> | `db_subnet_nsg_name` | The name of the 'db' Network Security Group name. | Optional | |
216+
> | `db_subnet_nsg_arm_id` | The Azure resource identifier for the 'db' Network Security Group. | Mandatory | For existing environment deployments |
217+
> | `app_subnet_name` | The name of the 'app' subnet. | Optional | |
218+
> | `app_subnet_address_prefix` | The address range for the 'app' subnet. | Mandatory | For new environment deployments |
219+
> | `app_subnet_arm_id` | The Azure resource identifier for the 'app' subnet. | Mandatory | For existing environment deployments |
220+
> | `app_subnet_nsg_name` | The name of the 'app' Network Security Group name. | Optional | |
221+
> | `app_subnet_nsg_arm_id` | The Azure resource identifier for the 'app' Network Security Group. | Mandatory | For existing environment deployments |
222+
> | `web_subnet_name` | The name of the 'web' subnet. | Optional | |
223+
> | `web_subnet_address_prefix` | The address range for the 'web' subnet. | Mandatory | For new environment deployments |
224+
> | `web_subnet_arm_id` | The Azure resource identifier for the 'web' subnet. | Mandatory | For existing environment deployments |
225+
> | `web_subnet_nsg_name` | The name of the 'web' Network Security Group name. | Optional | |
226+
> | `web_subnet_nsg_arm_id` | The Azure resource identifier for the 'web' Network Security Group. | Mandatory | For existing environment deployments |
227+
228+
\* = Required for existing environment deployments
229+
230+
### Anchor virtual machine parameters
231+
232+
The SAP deployment automation framework supports having an Anchor virtual machine. The anchor virtual machine will be the first virtual machine to be deployed and is used to anchor the proximity placement group.
233233

234234
The table below contains the parameters related to the anchor virtual machine.
235235

@@ -256,7 +256,7 @@ version="latest"
256256
}
257257
```
258258

259-
### Authentication Parameters
259+
### Authentication parameters
260260

261261
By default the SAP System deployment uses the credentials from the SAP Workload zone. If the SAP system needs unique credentials, you can provide them using these parameters.
262262

@@ -269,7 +269,7 @@ By default the SAP System deployment uses the credentials from the SAP Workload
269269
> | `automation_path_to_private_key` | Path to existing private key | Optional |
270270
271271

272-
## Other Parameters
272+
## Other parameters
273273

274274

275275
> [!div class="mx-tdCol2BreakAll "]
@@ -282,23 +282,23 @@ By default the SAP System deployment uses the credentials from the SAP Workload
282282
> | `use_zonal_markers` | Specifies if zonal Virtual Machines will include a zonal identifier. 'xooscs_z1_00l###' vs 'xooscs00l###'| Default value is true. |
283283
284284

285-
## NFS Support
285+
## NFS support
286286

287287
> [!div class="mx-tdCol2BreakAll "]
288288
> | Variable | Description | Type |
289289
> | ---------------------------------- | ----------------------------------------------------------------------- | ----------- |
290290
> | `NFS_provider` | Defines what NFS backend to use, the options are 'AFS' for Azure Files NFS or 'ANF' for Azure NetApp files. |
291291
> | `sapmnt_volume_size` | Defines the size (in GB) for the 'sapmnt' volume | Optional |
292292
293-
### Azure Files NFS Support
293+
### Azure files NFS Support
294294

295295

296296
> [!div class="mx-tdCol2BreakAll "]
297297
> | Variable | Description | Type |
298298
> | ---------------------------------- | ----------------------------------------------------------------------- | ----------- |
299299
> | `azure_files_storage_account_id` | If provided the Azure resource ID of the storage account for Azure Files | Optional |
300300
301-
## Terraform Parameters
301+
## Terraform parameters
302302

303303
The table below contains the Terraform parameters, these parameters need to be entered manually if not using the deployment scripts.
304304

@@ -316,7 +316,7 @@ The table below contains the Terraform parameters, these parameters need to be
316316

317317
The high availability configuration for the database tier and the SCS tier is configured using the `database_high_availability` and `scs_high_availability` flags.
318318

319-
High availability configurations use Pacemaker with Azure fencing agents. The fencing agents should be configured to use a unique service principal with permissions to stop and start virtual machines. For more information see [Create Fencing Agent](high-availability-guide-suse-pacemaker.md#create-an-azure-fence-agent-stonith-device)
319+
High availability configurations use Pacemaker with Azure fencing agents. The fencing agents should be configured to use a unique service principal with permissions to stop and start virtual machines. For more information, see [Create Fencing Agent](high-availability-guide-suse-pacemaker.md#create-an-azure-fence-agent-stonith-device)
320320

321321
```azurecli-interactive
322322
az ad sp create-for-rbac --role="Linux Fence Agent Role" --scopes="/subscriptions/<subscriptionID>" --name="<prefix>-Fencing-Agent"

0 commit comments

Comments
 (0)