You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -640,10 +640,16 @@ Make sure to assign the custom role to the service principal at all VM (cluster
640
640
```
641
641
642
642
> [!NOTE]
643
-
> On SLES 15 SP4 check the version of *crmsh* and *pacemaker* package, and make sure that the miniumum version requirements are met:
644
643
>
645
-
> - crmsh-4.4.0+20221028.3e41444-150400.3.9.1 or later
646
-
> - pacemaker-2.1.2+20211124.ada5c3b36-150400.4.6.1 or later
644
+
> For **SLES 15 SP4**, verify the versions of the `crmsh` and `pacemaker` packages to ensure they meet the minimum version requirements:
645
+
>
646
+
> - `crmsh-4.4.0+20221028.3e41444-150400.3.9.1` or later
647
+
> - `pacemaker-2.1.2+20211124.ada5c3b36-150400.4.6.1` or later
648
+
649
+
> [!IMPORTANT]
650
+
>
651
+
> - **SLES 12 SP5:** If python-azure-core-1.23.1-**2.12.8** is installed, the Azure fence agent may fail to start in a Pacemaker cluster, displaying the error message “Azure Resource Manager Python SDK not found or not accessible” in /var/log/messages. Follow the instructions in [SUSE KBA 21532](https://www.suse.com/support/kb/doc/?id=000021532) for more details.
652
+
> - **SLES 15 SP4+:** After updating the OS, the Azure libraries for Python might use the Python 3.11 interpreter, causing the Azure fence agent to fail to start in a Pacemaker cluster. The error message “Azure Resource Manager Python SDK not found or not accessible” will appear in /var/log/messages. Follow the instructions in [SUSE KBA 21504](https://www.suse.com/support/kb/doc/?id=000021504) for more details.
647
653
648
654
2. **[A]** Install the component, which you need for the cluster resources.
649
655
@@ -770,20 +776,30 @@ Make sure to assign the custom role to the service principal at all VM (cluster
770
776
>
771
777
> Earlier versions will not work correctly with a managed identity configuration.
772
778
773
-
10. **[A]** Install the Azure Python SDK and Azure Identity Python module.
Install the Azure Python SDK on SLES 12 SP4 or SLES 12 SP5:
781
+
For **SLES 12 SP5**, if you are using `fence-agents` version `4.9.0+git.1624456340.8d746be9-3.41.3`or later, and for**SLES 15 SP4 and newer**, you need to install the `fence-agents-azure-arm` package. This package will include all required dependencies.
776
782
777
783
```bash
778
-
# You might need to activate the public cloud extension first
784
+
#On SLES 12 SP5 with fence-agents version 4.9.0+git.1624456340.8d746be9-3.41.3 or higher. You might need to activate the public cloud extension first
779
785
SUSEConnect -p sle-module-public-cloud/12/x86_64
780
-
sudo zypper install python-azure-mgmt-compute
781
-
sudo zypper install python-azure-identity
786
+
sudo zypper install fence-agents-azure-arm
787
+
788
+
# On SLES 15 SP4 and later. You might need to activate the public cloud extension first. In this example, the SUSEConnect
11. **[A]** Install the Azure Python SDK and Azure Identity Python module.
794
+
795
+
For **SLES 12 SP5**, if your `fence-agents` version is lower then`4.9.0+git.1624456340.8d746be9-3.41.3`, and for**SLES 15 SP3 and below**, you need to install below additional packages.
785
796
786
797
```bash
798
+
# You might need to activate the public cloud extension first
799
+
SUSEConnect -p sle-module-public-cloud/12/x86_64
800
+
sudo zypper install python-azure-mgmt-compute
801
+
sudo zypper install python-azure-identity
802
+
787
803
# You might need to activate the public cloud extension first. In this example, the SUSEConnect command is for SLES 15 SP1
@@ -795,10 +811,10 @@ Make sure to assign the custom role to the service principal at all VM (cluster
795
811
> You can check the extension by running `SUSEConnect ---list-extensions`.
796
812
> To achieve the faster failover times with the Azure fence agent:
797
813
>
798
-
> - On SLES 12 SP4 or SLES 12 SP5, install version 4.6.2 or later of the *python-azure-mgmt-compute* package.
814
+
> - On SLES 12 SP5, install version 4.6.2 or later of the *python-azure-mgmt-compute* package.
799
815
> - If your *python-azure-mgmt-compute or python**3**-azure-mgmt-compute* package version is 17.0.0-6.7.1, follow the instructions in [SUSE KBA](https://www.suse.com/support/kb/doc/?id=000020377) to update the fence-agents version and install the Azure Identity client library for Python module if it is missing.
800
816
801
-
11. **[A]** Set up the hostname resolution.
817
+
12. **[A]** Set up the hostname resolution.
802
818
803
819
You can either use a DNS server or modify the */etc/hosts* file on all nodes. This example shows how to use the */etc/hosts* file.
804
820
@@ -822,7 +838,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
822
838
10.0.0.7 prod-cl1-1
823
839
```
824
840
825
-
12. **[1]** Install the cluster.
841
+
13. **[1]** Install the cluster.
826
842
827
843
- If you're using SBD devices for fencing (for either the iSCSI target server or Azure shared disk):
828
844
@@ -851,7 +867,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
851
867
# Do you wish to configure an administration IP (y/n)? n
852
868
```
853
869
854
-
13. **[2]** Add the node to the cluster.
870
+
14. **[2]** Add the node to the cluster.
855
871
856
872
```bash
857
873
sudo crm cluster join
@@ -861,13 +877,13 @@ Make sure to assign the custom role to the service principal at all VM (cluster
861
877
# /root/.ssh/id_rsa already exists - overwrite (y/n)? n
862
878
```
863
879
864
-
14. **[A]** Change the hacluster password to the same password.
880
+
15. **[A]** Change the hacluster password to the same password.
865
881
866
882
```bash
867
883
sudo passwd hacluster
868
884
```
869
885
870
-
15. **[A]** Adjust the corosync settings.
886
+
16. **[A]** Adjust the corosync settings.
871
887
872
888
```bash
873
889
sudo vi /etc/corosync/corosync.conf
@@ -949,14 +965,14 @@ Make sure to assign the custom role to the service principal at all VM (cluster
949
965
#### [Managed identity](#tab/msi)
950
966
951
967
```bash
952
-
# Adjust the command with your subscription ID and resource group of the VM
968
+
# Adjust the command with your subscription ID and resource group of the VM
@@ -972,7 +988,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
972
988
sudo crm configure property stonith-timeout=900
973
989
```
974
990
975
-
---
991
+
---
976
992
977
993
If you're using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
0 commit comments