You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/automation/configure-control-plane.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ The control plane for the [SAP on Azure Deployment Automation Framework](deploym
21
21
22
22
## Deployer
23
23
24
-
The [deployer](deployment-framework.md#deployment-components) is the execution engine of the [SAP automation framework](deployment-framework.md). It's a pre-configured virtual machine (VM) that is used for executing Terraform and Ansible commands. When using Azure DevOps the deployer is a self-hosted agent.
24
+
The [deployer](deployment-framework.md#deployment-components) is the execution engine of the [SAP automation framework](deployment-framework.md). It's a preconfigured virtual machine (VM) that is used for executing Terraform and Ansible commands. When using Azure DevOps the deployer is a self-hosted agent.
25
25
26
26
The configuration of the deployer is performed in a Terraform tfvars variable file.
27
27
@@ -108,8 +108,8 @@ This table shows the parameters related to the deployer virtual machine.
Copy file name to clipboardExpand all lines: articles/sap/automation/configure-system.md
+23-22Lines changed: 23 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,14 +43,14 @@ To configure this topology, define the database tier values and define `scs_serv
43
43
44
44
### High Availability
45
45
46
-
The Distributed (Highly Available) deployment is similar to the Distributed architecture. In this deployment, the database and/or SAP Central Services can both be configured using a highly available configuration using two virtual machines each with Pacemaker clusters or in case of Windows with Windows Failover clustering.
46
+
The Distributed (Highly Available) deployment is similar to the Distributed architecture. In this deployment, the database and/or SAP Central Services can both be configured using a highly available configuration using two virtual machines each with Pacemaker clusters or Windows Failover clustering.
47
47
48
48
To configure this topology, define the database tier values and set `database_high_availability` to true. Set `scs_server_count = 1` and `scs_high_availability` = true and
49
49
`application_server_count` >= 1
50
50
51
51
## Environment parameters
52
52
53
-
The table below contains the parameters that define the environment settings.
53
+
This section contains the parameters that define the environment settings.
54
54
55
55
56
56
> [!div class="mx-tdCol2BreakAll "]
@@ -65,7 +65,7 @@ The table below contains the parameters that define the environment settings.
65
65
66
66
## Resource group parameters
67
67
68
-
The table below contains the parameters that define the resource group.
68
+
This section contains the parameters that define the resource group.
69
69
70
70
71
71
> [!div class="mx-tdCol2BreakAll "]
@@ -113,10 +113,10 @@ The database tier defines the infrastructure for the database tier, supported da
113
113
> |`database_vm_db_nic_ips`| Defines the IP addresses for the database servers (database subnet). | Optional ||
114
114
> |`database_vm_db_nic_secondary_ips`| Defines the secondary IP addresses for the database servers (database subnet). | Optional ||
115
115
> |`database_vm_admin_nic_ips`| Defines the IP addresses for the database servers (admin subnet). | Optional ||
116
-
> |`database_vm_image`| Defines the Virtual machine image to use, see below.| Optional ||
116
+
> |`database_vm_image`| Defines the Virtual machine image to use. | Optional ||
117
117
> |`database_vm_authentication_type`| Defines the authentication type (key/password). | Optional ||
118
118
> |`database_use_avset`| Controls if the database servers are placed in availability sets. | Optional | default is false |
119
-
> |`database_use_ppg`| Controls if the database servers will be placed in proximity placement groups. | Optional | default is true |
119
+
> |`database_use_ppg`| Controls if the database servers are placed in proximity placement groups.| Optional | default is true |
120
120
> |`database_vm_avset_arm_ids`| Defines the existing availability sets Azure resource IDs. | Optional | Primarily used with ANF pinning |
121
121
> |`hana_dual_nics`| Controls if the HANA database servers will have dual network interfaces. | Optional | default is true |
122
122
@@ -168,7 +168,7 @@ The application tier defines the infrastructure for the application tier, which
168
168
> |`scs_server_app_admin_nic_ips`| List of IP addresses for the SCS servers (admin subnet). | Optional ||
169
169
> |`scs_server_loadbalancer_ips`| List of IP addresses for the scs load balancer (app subnet). | Optional ||
170
170
> |`scs_server_use_ppg`| Controls if the SCS servers are placed in availability sets. | Optional ||
171
-
> |`scs_server_use_avset`| Controls if the SCS servers will be placed in proximity placement groups.| Optional ||
171
+
> |`scs_server_use_avset`| Controls if the SCS servers are placed in proximity placement groups.| Optional ||
172
172
> |`scs_server_tags`| Defines a list of tags to be applied to the SCS servers. | Optional ||
173
173
174
174
### Application server parameters
@@ -185,7 +185,7 @@ The application tier defines the infrastructure for the application tier, which
185
185
> |`application_server_nic_secondary_ips[]`| List of secondary IP addresses for the application servers (app subnet). | Optional ||
186
186
> |`application_server_app_admin_nic_ips`| List of IP addresses for the application server (admin subnet). | Optional ||
187
187
> |`application_server_use_ppg`| Controls if application servers are placed in availability sets. | Optional ||
188
-
> |`application_server_use_avset`| Controls if application servers will be placed in proximity placement | Optional ||
188
+
> |`application_server_use_avset`| Controls if application servers are placed in proximity placement groups.| Optional ||
189
189
> |`application_server_tags`| Defines a list of tags to be applied to the application servers. | Optional ||
190
190
191
191
### Web dispatcher parameters
@@ -198,12 +198,12 @@ The application tier defines the infrastructure for the application tier, which
198
198
> |`webdispatcher_server_sku`| Defines the Virtual machine SKU to use. | Optional ||
199
199
> |`webdispatcher_server_image`| Defines the Virtual machine image to use. | Optional ||
200
200
> |`webdispatcher_server_zones`| Defines the availability zones to which the web dispatchers are deployed. | Optional ||
201
-
> |`webdispatcher_server_app_nic_ips[]`| List of IP addresses for the web dispatcher server (app/web subnet). | Optional ||
202
-
> |`webdispatcher_server_nic_secondary_ips[]`| List of secondary IP addresses for the web dispatcher server (app/web subnet). | Optional ||
203
-
> |`webdispatcher_server_app_admin_nic_ips`| List of IP addresses for the web dispatcher server (admin subnet). | Optional ||
204
-
> |`webdispatcher_server_use_ppg`| Controls if web dispatchers are placed in availability sets. | Optional ||
205
-
> |`webdispatcher_server_use_avset`| Controls if web dispatchers will be placed in proximity placement |Optional||
206
-
> |`webdispatcher_server_tags`| Defines a list of tags to be applied to the web dispatcher servers. | Optional ||
201
+
> |`webdispatcher_server_app_nic_ips[]`| List of IP addresses for the web dispatcher server (app/web subnet). | Optional ||
202
+
> |`webdispatcher_server_nic_secondary_ips[]`| List of secondary IP addresses for the web dispatcher server (app/web subnet). | Optional ||
203
+
> |`webdispatcher_server_app_admin_nic_ips`| List of IP addresses for the web dispatcher server (admin subnet). | Optional ||
204
+
> |`webdispatcher_server_use_ppg`| Controls if web dispatchers are placed in availability sets. | Optional ||
205
+
> |`webdispatcher_server_use_avset`| Controls if web dispatchers are placed in proximity placement groups.| Optional||
206
+
> |`webdispatcher_server_tags`| Defines a list of tags to be applied to the web dispatcher servers. | Optional ||
207
207
208
208
## Network parameters
209
209
@@ -215,7 +215,7 @@ The automation framework can either deploy the virtual network and the subnets (
215
215
216
216
Ensure that the virtual network address space is large enough to host all the resources.
217
217
218
-
The table below contains the networking parameters.
218
+
This section contains the networking parameters.
219
219
220
220
221
221
> [!div class="mx-tdCol2BreakAll "]
@@ -251,9 +251,9 @@ The table below contains the networking parameters.
251
251
252
252
## Key Vault Parameters
253
253
254
-
If you don't want to use the workload zone key vault but another one, this can be added in the system's tfvars file.
254
+
If you don't want to use the workload zone key vault but another one, you can define the key vault's Azure resource identifier in the system's tfvars file.
255
255
256
-
The table below defines the parameters used for defining the Key Vault information.
256
+
This section defines the parameters used for defining the Key Vault information.
257
257
258
258
> [!div class="mx-tdCol2BreakAll "]
259
259
> | Variable | Description | Type | Notes |
@@ -265,9 +265,9 @@ The table below defines the parameters used for defining the Key Vault informati
265
265
266
266
### Anchor virtual machine parameters
267
267
268
-
The SAP on Azure Deployment Automation Framework supports having an Anchor virtual machine. The anchor virtual machine will be the first virtual machine to be deployed and is used to anchor the proximity placement group.
268
+
The SAP on Azure Deployment Automation Framework supports having an Anchor virtual machine. The anchor virtual machine is the first virtual machine to be deployed and is used to anchor the proximity placement group.
269
269
270
-
The table below contains the parameters related to the anchor virtual machine.
270
+
This section contains the parameters related to the anchor virtual machine.
271
271
272
272
273
273
> [!div class="mx-tdCol2BreakAll "]
@@ -319,7 +319,8 @@ By default the SAP System deployment uses the credentials from the SAP Workload
319
319
> |`license_type`| Specifies the license type for the virtual machines. | Possible values are `RHEL_BYOS` and `SLES_BYOS`. For Windows the possible values are `None`, `Windows_Client` and `Windows_Server`. |
320
320
> |`use_zonal_markers`| Specifies if zonal Virtual Machines will include a zonal identifier. 'xooscs_z1_00l###' vs 'xooscs00l###'| Default value is true. |
321
321
> |`proximityplacementgroup_names`| Specifies the names of the proximity placement groups ||
322
-
> |`proximityplacementgroup_arm_ids`| Specifies the Azure resource identifiers of existing proximity placement groups||
322
+
> |`proximityplacementgroup_arm_ids`| Specifies the Azure resource identifiers of existing proximity placement groups ||
323
+
> |`use_simple_mount`| Specifies if Simple mounts are used (Applicable for SLES 15 SP# or newer) | Optional |
323
324
324
325
325
326
## NFS support
@@ -389,7 +390,7 @@ By default the SAP System deployment uses the credentials from the SAP Workload
389
390
390
391
## Terraform parameters
391
392
392
-
The table below contains the Terraform parameters, these parameters need to be entered manually if not using the deployment scripts.
393
+
This section contains the Terraform parameters, these parameters need to be entered manually if not using the deployment scripts.
393
394
394
395
395
396
> [!div class="mx-tdCol2BreakAll "]
@@ -413,9 +414,9 @@ High availability configurations use Pacemaker with Azure fencing agents.
413
414
414
415
### Fencing agent configuration
415
416
416
-
SDAF supports using either managed identities or service principals for fencing agents. The following section describe how to configure each option.
417
+
SDAF supports using either managed identities or service principals for fencing agents. The following section describes how to configure each option.
417
418
418
-
By defining the variable 'use_msi_for_clusters' to true the fencing agent will use managed identities. This is the recommended option.
419
+
Setting the variable 'use_msi_for_clusters' to true makes the fencing agent use managed identities.
419
420
420
421
If you want to use a service principal for the fencing agent set that variable to false.
0 commit comments