Skip to content

Commit 63612f7

Browse files
Merge pull request #263876 from dennispadia/dp-slespacemakerupdate
SLES pacemaker document formatting
2 parents b2ebfe9 + c71df6f commit 63612f7

File tree

1 file changed

+33
-27
lines changed

1 file changed

+33
-27
lines changed

articles/sap/workloads/high-availability-guide-suse-pacemaker.md

Lines changed: 33 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: sap-vm-workloads
1010
ms.topic: article
1111
ms.workload: infrastructure-services
1212
ms.custom: devx-track-azurepowershell
13-
ms.date: 10/09/2023
13+
ms.date: 01/22/2024
1414
ms.author: radeltch
1515
---
1616

@@ -596,18 +596,22 @@ Use the following content for the input file. You need to adapt the content to y
596596
597597
### **[A]** Assign the custom role
598598
599-
#### Using Managed Identity
599+
Use managed identity or service principal.
600+
601+
#### [Managed identity](#tab/msi)
600602
601603
Assign the custom role "Linux Fence Agent Role" that was created in the last chapter to each managed identity of the cluster VMs. Each VM system-assigned managed identity needs the role assigned for every cluster VM's resource. For detailed steps, see [Assign a managed identity access to a resource by using the Azure portal](../../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). Verify each VM's managed identity role assignment contains all cluster VMs.
602604
603605
> [!IMPORTANT]
604606
> Be aware assignment and removal of authorization with managed identities [can be delayed](../../active-directory/managed-identities-azure-resources/managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization) until effective.
605607
606-
#### Using Service Principal
608+
#### [Service principal](#tab/spn)
607609
608610
Assign the custom role *Linux fence agent Role* that you already created to the service principal. Do *not* use the *Owner* role anymore. For more information, see [Assign Azure roles by using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
609611
610-
Make sure to assign the custom role to the service principal at all VM (cluster node) scopes.
612+
Make sure to assign the custom role to the service principal at all VM (cluster node) scopes.
613+
614+
---
611615
612616
## Install the cluster
613617
@@ -929,39 +933,41 @@ Make sure to assign the custom role to the service principal at all VM (cluster
929933
> The 'pcmk_host_map' option is required in the command only if the hostnames and the Azure VM names are *not* identical. Specify the mapping in the format *hostname:vm-name*.
930934
> Refer to the bold section in the following command.
931935

932-
If using **managed identity** for your fence agent, run the following command
936+
#### [Managed identity](#tab/msi)
933937

934-
```bash
935-
# replace the bold strings with your subscription ID and resource group of the VM
938+
```bash
939+
# replace the bold strings with your subscription ID and resource group of the VM
936940
937-
sudo crm configure primitive rsc_st_azure stonith:fence_azure_arm \
938-
params msi=true subscriptionId="subscription ID" resourceGroup="resource group" \
939-
pcmk_monitor_retries=4 pcmk_action_limit=3 power_timeout=240 pcmk_reboot_timeout=900 pcmk_delay_max=15 pcmk_host_map="prod-cl1-0:prod-cl1-0-vm-name;prod-cl1-1:prod-cl1-1-vm-name" \
940-
op monitor interval=3600 timeout=120
941+
sudo crm configure primitive rsc_st_azure stonith:fence_azure_arm \
942+
params msi=true subscriptionId="subscription ID" resourceGroup="resource group" \
943+
pcmk_monitor_retries=4 pcmk_action_limit=3 power_timeout=240 pcmk_reboot_timeout=900 pcmk_delay_max=15 pcmk_host_map="prod-cl1-0:prod-cl1-0-vm-name;prod-cl1-1:prod-cl1-1-vm-name" \
944+
op monitor interval=3600 timeout=120
941945
942-
sudo crm configure property stonith-timeout=900
943-
```
946+
sudo crm configure property stonith-timeout=900
947+
```
944948

945-
If using **service principal** for your fence agent, run the following command
949+
#### [Service principal](#tab/spn)
946950

947-
```bash
948-
# replace the bold strings with your subscription ID, resource group of the VM, tenant ID, service principal application ID and password
951+
```bash
952+
# replace the bold strings with your subscription ID, resource group of the VM, tenant ID, service principal application ID and password
949953
950-
sudo crm configure primitive rsc_st_azure stonith:fence_azure_arm \
951-
params subscriptionId="subscription ID" resourceGroup="resource group" tenantId="tenant ID" login="application ID" passwd="password" \
952-
pcmk_monitor_retries=4 pcmk_action_limit=3 power_timeout=240 pcmk_reboot_timeout=900 pcmk_delay_max=15 pcmk_host_map="prod-cl1-0:prod-cl1-0-vm-name;prod-cl1-1:prod-cl1-1-vm-name" \
953-
op monitor interval=3600 timeout=120
954+
sudo crm configure primitive rsc_st_azure stonith:fence_azure_arm \
955+
params subscriptionId="subscription ID" resourceGroup="resource group" tenantId="tenant ID" login="application ID" passwd="password" \
956+
pcmk_monitor_retries=4 pcmk_action_limit=3 power_timeout=240 pcmk_reboot_timeout=900 pcmk_delay_max=15 pcmk_host_map="prod-cl1-0:prod-cl1-0-vm-name;prod-cl1-1:prod-cl1-1-vm-name" \
957+
op monitor interval=3600 timeout=120
954958
955-
sudo crm configure property stonith-timeout=900
956-
```
959+
sudo crm configure property stonith-timeout=900
960+
```
961+
962+
---
957963

958-
If you're using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
964+
If you're using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
959965
960-
> [!IMPORTANT]
961-
> The monitoring and fencing operations are deserialized. As a result, if there's a longer-running monitoring operation and simultaneous fencing event, there's no delay to the cluster failover because the monitoring operation is already running.
966+
> [!IMPORTANT]
967+
> The monitoring and fencing operations are deserialized. As a result, if there's a longer-running monitoring operation and simultaneous fencing event, there's no delay to the cluster failover because the monitoring operation is already running.
962968
963-
> [!TIP]
964-
>The Azure fence agent requires outbound connectivity to the public endpoints, as documented, along with possible solutions, in [Public endpoint connectivity for VMs using standard ILB](./high-availability-guide-standard-load-balancer-outbound-connections.md).
969+
> [!TIP]
970+
>The Azure fence agent requires outbound connectivity to the public endpoints, as documented, along with possible solutions, in [Public endpoint connectivity for VMs using standard ILB](./high-availability-guide-standard-load-balancer-outbound-connections.md).
965971
966972
## Configure Pacemaker for Azure scheduled events
967973

0 commit comments

Comments
 (0)