You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-suse-pacemaker.md
+33-27Lines changed: 33 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.subservice: sap-vm-workloads
10
10
ms.topic: article
11
11
ms.workload: infrastructure-services
12
12
ms.custom: devx-track-azurepowershell
13
-
ms.date: 10/09/2023
13
+
ms.date: 01/22/2024
14
14
ms.author: radeltch
15
15
---
16
16
@@ -596,18 +596,22 @@ Use the following content for the input file. You need to adapt the content to y
596
596
597
597
### **[A]** Assign the custom role
598
598
599
-
#### Using Managed Identity
599
+
Use managed identity or service principal.
600
+
601
+
#### [Managed identity](#tab/msi)
600
602
601
603
Assign the custom role "Linux Fence Agent Role" that was created in the last chapter to each managed identity of the cluster VMs. Each VM system-assigned managed identity needs the role assigned for every cluster VM's resource. For detailed steps, see [Assign a managed identity access to a resource by using the Azure portal](../../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). Verify each VM's managed identity role assignment contains all cluster VMs.
602
604
603
605
> [!IMPORTANT]
604
606
> Be aware assignment and removal of authorization with managed identities [can be delayed](../../active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization) until effective.
605
607
606
-
#### Using Service Principal
608
+
#### [Service principal](#tab/spn)
607
609
608
610
Assign the custom role *Linux fence agent Role* that you already created to the service principal. Do *not* use the *Owner* role anymore. For more information, see [Assign Azure roles by using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
609
611
610
-
Make sure to assign the custom role to the service principal at all VM (cluster node) scopes.
612
+
Make sure to assign the custom role to the service principal at all VM (cluster node) scopes.
613
+
614
+
---
611
615
612
616
## Install the cluster
613
617
@@ -929,39 +933,41 @@ Make sure to assign the custom role to the service principal at all VM (cluster
929
933
> The 'pcmk_host_map' option is required in the command only if the hostnames and the Azure VM names are *not* identical. Specify the mapping in the format *hostname:vm-name*.
930
934
> Refer to the bold section in the following command.
931
935
932
-
If using **managed identity**for your fence agent, run the following command
936
+
#### [Managed identity](#tab/msi)
933
937
934
-
```bash
935
-
# replace the bold strings with your subscription ID and resource group of the VM
938
+
```bash
939
+
# replace the bold strings with your subscription ID and resource group of the VM
If you're using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
964
+
If you're using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
959
965
960
-
> [!IMPORTANT]
961
-
> The monitoring and fencing operations are deserialized. As a result, if there's a longer-running monitoring operation and simultaneous fencing event, there's no delay to the cluster failover because the monitoring operation is already running.
966
+
> [!IMPORTANT]
967
+
> The monitoring and fencing operations are deserialized. As a result, if there's a longer-running monitoring operation and simultaneous fencing event, there's no delay to the cluster failover because the monitoring operation is already running.
962
968
963
-
> [!TIP]
964
-
>The Azure fence agent requires outbound connectivity to the public endpoints, as documented, along with possible solutions, in [Public endpoint connectivity for VMs using standard ILB](./high-availability-guide-standard-load-balancer-outbound-connections.md).
969
+
> [!TIP]
970
+
>The Azure fence agent requires outbound connectivity to the public endpoints, as documented, along with possible solutions, in [Public endpoint connectivity for VMs using standard ILB](./high-availability-guide-standard-load-balancer-outbound-connections.md).
0 commit comments