You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/monitor/provider-ha-pacemaker-cluster.md
+22-21Lines changed: 22 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,35 +1,36 @@
1
1
---
2
2
title: Create a High Availability Pacemaker cluster provider for Azure Monitor for SAP solutions
3
-
description: Learn how to configure High Availability (HA) Pacemaker cluster providers for Azure Monitor for SAP solutions.
3
+
description: Learn how to configure high-availability (HA) Pacemaker cluster providers for Azure Monitor for SAP solutions.
4
4
author: MightySuz
5
5
ms.service: sap-on-azure
6
6
ms.subservice: sap-monitor
7
7
ms.topic: how-to
8
8
ms.date: 01/05/2023
9
9
ms.author: sujaj
10
-
#Customer intent: As a developer, I want to create a High Availability Pacemaker cluster so I can use the resource with Azure Monitor for SAP solutions.
10
+
#Customer intent: As a developer, I want to create a high-availability Pacemaker cluster so that I can use the resource with Azure Monitor for SAP solutions.
11
11
---
12
12
13
-
# Create High Availability cluster provider for Azure Monitor for SAP solutions
13
+
# Create high-availability cluster provider for Azure Monitor for SAP solutions
14
14
15
-
In this how-to guide, you learn to create a High Availability (HA) Pacemaker cluster provider for Azure Monitor for SAP solutions. You install the HA agent, then create the provider for Azure Monitor for SAP solutions.
15
+
In this how-to guide, you learn how to create a high-availability (HA) Pacemaker cluster provider for Azure Monitor for SAP solutions. You install the HA agent and then create the provider for Azure Monitor for SAP solutions.
16
16
17
17
## Prerequisites
18
18
19
19
- An Azure subscription.
20
20
- An existing Azure Monitor for SAP solutions resource. To create an Azure Monitor for SAP solutions resource, see the [quickstart for the Azure portal](quickstart-portal.md) or the [quickstart for PowerShell](quickstart-powershell.md).
21
21
22
-
## Install HA agent
22
+
## Install an HA agent
23
23
24
-
Before adding providers for HA (Pacemaker) clusters, install the appropriate agent for your environment in each cluster node.
24
+
Before you add providers for HA (Pacemaker) clusters, install the appropriate agent for your environment in each cluster node.
25
25
26
-
For SUSE-based clusters, install **ha_cluster_provider** in each node. For more information, see [the HA cluster exporter installation guide](https://github.com/ClusterLabs/ha_cluster_exporter#installation). Supported SUSE versions include SLES for SAP 12 SP3 and later versions.
26
+
For SUSE-based clusters, install **ha_cluster_provider** in each node. For more information, see the [HA cluster exporter installation guide](https://github.com/ClusterLabs/ha_cluster_exporter#installation). Supported SUSE versions include SLES for SAP 12 SP3 and later versions.
27
27
28
-
For RHEL-based clusters, install **performance co-pilot (PCP)** and the **pcp-pmda-hacluster**sub package in each node.For more information, see the [PCP HACLUSTER agent installation guide](https://access.redhat.com/articles/6139852). Supported RHEL versions include 8.2, 8.4 and later versions.
28
+
For RHEL-based clusters, install **performance co-pilot (PCP)** and the **pcp-pmda-hacluster**subpackage in each node.For more information, see the [PCP HACLUSTER agent installation guide](https://access.redhat.com/articles/6139852). Supported RHEL versions include 8.2, 8.4, and later versions.
29
29
30
-
For RHEL-based pacemaker clusters, also install [PMProxy](https://access.redhat.com/articles/6139852) in each node.
30
+
For RHEL-based Pacemaker clusters, also install [PMProxy](https://access.redhat.com/articles/6139852) in each node.
31
+
32
+
### Install an HA cluster exporter on RHEL
31
33
32
-
### Install HA Cluster Exporter on RHEL
33
34
1. Install the required packages on the system.
34
35
35
36
```bash
@@ -46,7 +47,7 @@ For RHEL-based pacemaker clusters, also install [PMProxy](https://access.redhat.
46
47
systemctl start pmcd
47
48
```
48
49
49
-
1. Install and enable the HA Cluster PMDA. Replace `$PCP_PMDAS_DIR` with the path where `hacluster` is installed. Use the `find`commandin Linux to find the path.
50
+
1. Install and enable the HA cluster PMDA. Replace `$PCP_PMDAS_DIR` with the path where `hacluster` is installed. Use the `find`commandin Linux to find the path.
50
51
51
52
```bash
52
53
cd$PCP_PMDAS_DIR/hacluster
@@ -66,33 +67,33 @@ For RHEL-based pacemaker clusters, also install [PMProxy](https://access.redhat.
66
67
systemctl start pmproxy
67
68
```
68
69
69
-
1. Data willthenbe collected in the system by PCP. You can export the data using `pmproxy` at `http://<SERVER-NAME-OR-IP-ADDRESS>:44322/metrics?names=ha_cluster`. Replace `<SERVER-NAME-OR-IP-ADDRESS>` with your server name or IP address.
70
+
1. Data isthen collected in the system by PCP. You can export the data by using `pmproxy` at `http://<SERVER-NAME-OR-IP-ADDRESS>:44322/metrics?names=ha_cluster`. Replace `<SERVER-NAME-OR-IP-ADDRESS>` with your server name or IP address.
70
71
71
72
## Prerequisites to enable secure communication
72
73
73
-
To [enable TLS 1.2 or higher](enable-tls-azure-monitor-sap-solutions.md), follow the steps [mentioned here](https://github.com/ClusterLabs/ha_cluster_exporter#tls-and-basic-authentication)
74
+
To [enable TLS 1.2 or higher](enable-tls-azure-monitor-sap-solutions.md), follow the steps in [this article](https://github.com/ClusterLabs/ha_cluster_exporter#tls-and-basic-authentication).
74
75
75
-
## Create provider for Azure Monitor for SAP solutions
76
+
## Create a provider for Azure Monitor for SAP solutions
76
77
77
78
1. Sign in to the [Azure portal](https://portal.azure.com).
78
79
1. Go to the Azure Monitor for SAP solutions service.
79
80
1. Open your Azure Monitor for SAP solutions resource.
80
-
1. In the resource's menu, under **Settings**, select **Providers**.
81
+
1. On the resource's menu, under **Settings**, select **Providers**.
81
82
1. Select **Add** to add a new provider.
82
83
83
-

84
+

84
85
85
86
1. For **Type**, select **High-availability cluster (Pacemaker)**.
86
-
1. *Optional* Select **Enable secure communication**, choose a certificate type
87
+
1. (Optional) Select **Enable secure communication** and choose a certificate type.
87
88
1. Configure providers for each node of the cluster by entering the endpoint URL for **HA Cluster Exporter Endpoint**.
88
89
89
90
1. For SUSE-based clusters, enter `http://<IP-address>:9664/metrics`.
90
91
91
-

92
+

92
93
93
94
1. For RHEL-based clusters, enter `http://<'IP address'>:44322/metrics?names=ha_cluster`.
94
95
95
-

96
+

96
97
97
98
1. Enter the system identifiers, host names, and cluster names. For the system identifier, enter a unique SAP system identifier for each cluster. For the hostname, the value refers to an actual hostname in the VM. Use `hostname -s` for SUSE- and RHEL-based clusters.
98
99
@@ -110,7 +111,7 @@ Use the following troubleshooting steps for common errors.
110
111
111
112
### Unable to reach the Prometheus endpoint
112
113
113
-
When the provider settings validation operation fails with the code ‘PrometheusURLConnectionFailure’:
114
+
When the provider settings validation operation fails with the code `PrometheusURLConnectionFailure`:
114
115
115
116
1. Restart the HA cluster exporter agent.
116
117
@@ -124,7 +125,7 @@ When the provider settings validation operation fails with the code ‘Prometheu
124
125
systemctl enable pmproxy
125
126
```
126
127
127
-
1. Verify that the Prometheus endpoint is reachable from the subnet that provided while creating the Azure Monitor for SAP solutions resource.
128
+
1. Verify that the Prometheus endpoint is reachable from the subnet that you provided when you created the Azure Monitor for SAP solutions resource.
Copy file name to clipboardExpand all lines: articles/sap/monitor/provider-hana.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,21 +10,19 @@ ms.author: sujaj
10
10
#Customer intent: As a developer, I want to create an SAP HANA provider so that I can use the resource with Azure Monitor for SAP solutions.
11
11
---
12
12
13
+
# Configure SAP HANA provider for Azure Monitor for SAP solutions
13
14
14
-
# Configure SAP HANA provider for Azure Monitor for SAP solutions
15
-
16
-
In this how-to guide, you'll learn to configure an SAP HANA provider for Azure Monitor for SAP solutions through the Azure portal.
15
+
In this how-to guide, you learn how to configure an SAP HANA provider for Azure Monitor for SAP solutions through the Azure portal.
17
16
18
17
## Prerequisite to enable secure communication
19
18
20
-
To [enable TLS 1.2 higher](enable-tls-azure-monitor-sap-solutions.md) for SAP HANA provider, follow steps mentioned in this [SAP document](https://www.sap.com/documents/2018/11/b865eb91-287d-0010-87a3-c30de2ffd8ff.html)
19
+
To [enable TLS 1.2 higher](enable-tls-azure-monitor-sap-solutions.md) for the SAP HANA provider, follow the steps in [this SAP document](https://www.sap.com/documents/2018/11/b865eb91-287d-0010-87a3-c30de2ffd8ff.html).
21
20
22
21
## Prerequisites
23
22
24
-
- An Azure subscription.
23
+
- An Azure subscription.
25
24
- An existing Azure Monitor for SAP solutions resource. To create an Azure Monitor for SAP solutions resource, see the [quickstart for the Azure portal](quickstart-portal.md) or the [quickstart for PowerShell](quickstart-powershell.md).
26
25
27
-
28
26
## Configure Azure Monitor for SAP solutions
29
27
30
28
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -34,13 +32,14 @@ To [enable TLS 1.2 higher](enable-tls-azure-monitor-sap-solutions.md) for SAP HA
34
32
1. On the **Providers** tab:
35
33
1. Select **Add provider**.
36
34
1. On the creation pane, for **Type**, select **SAP HANA**.
37
-

38
-
1. Optionally, select **Enable secure communication**, choose the certificate type from the drop-down menu.
39
-
1. For **IP address**, enter the IP address or hostname of the server that runs the SAP HANA instance that you want to monitor. If you're using a hostname, make sure there is connectivity within the virtual network.
40
-
1. For **Database tenant**, enter the HANA database that you want to connect to. It's recommended to use **SYSTEMDB**, because tenant databases don't have all monitoring views. For legacy single-container HANA 1.0 instances, leave this field blank.
35
+
36
+

37
+
1. Optionally, select **Enable secure communication** and choose the certificate type from the dropdown menu.
38
+
1. For **IP address**, enter the IP address or hostname of the server that runs the SAP HANA instance that you want to monitor. If you're using a hostname, make sure there's connectivity within the virtual network.
39
+
1. For **Database tenant**, enter the HANA database that you want to connect to. We recommend that you use **SYSTEMDB** because tenant databases don't have all monitoring views. For legacy single-container HANA 1.0 instances, leave this field blank.
41
40
1. For **Instance number**, enter the instance number of the database (0-99). The SQL port is automatically determined based on the instance number.
42
-
1. For **Database username**, enter the dedicated SAP HANA database user. This user needs the **MONITORING** or **BACKUP CATALOG READ** role assignment. For non-production SAP HANA instances, use **SYSTEM** instead.
43
-
1. For **Database password**, enter the password for the database username. You can either enter the password directly or use a secret inside Azure Key Vault.
41
+
1. For **Database username**, enter the dedicated SAP HANA database user. This user needs the **MONITORING** or **BACKUP CATALOG READ** role assignment. For nonproduction SAP HANA instances, use **SYSTEM** instead.
42
+
1. For **Database password**, enter the password for the database username. You can either enter the password directly or use a secret inside Azure Key Vault.
44
43
1. Save your changes to the Azure Monitor for SAP solutions resource.
Copy file name to clipboardExpand all lines: articles/sap/monitor/provider-ibm-db2.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Create IBM Db2 provider for Azure Monitor for SAP solutions
3
-
description: This article provides details to configure an IBM DB2 provider for Azure Monitor for SAP solutions.
3
+
description: This article provides details to configure an IBM Db2 provider for Azure Monitor for SAP solutions.
4
4
author: MightySuz
5
5
ms.service: sap-on-azure
6
6
ms.subservice: sap-monitor
@@ -10,18 +10,18 @@ ms.author: sujaj
10
10
#Customer intent: As a developer, I want to create an IBM Db2 provider so that I can monitor the resource through Azure Monitor for SAP solutions.
11
11
---
12
12
13
-
# Create IBM Db2 provider for Azure Monitor for SAP solutions
13
+
# Create IBM Db2 provider for Azure Monitor for SAP solutions
14
+
15
+
In this how-to guide, you learn how to create an IBM Db2 provider for Azure Monitor for SAP solutions through the Azure portal.
14
16
15
-
In this how-to guide, you'll learn how to create an IBM Db2 provider for Azure Monitor for SAP solutions through the Azure portal.
16
17
## Prerequisites
17
18
18
-
- An Azure subscription.
19
+
- An Azure subscription.
19
20
- An existing Azure Monitor for SAP solutions resource. To create an Azure Monitor for SAP solutions resource, see the [quickstart for the Azure portal](quickstart-portal.md) or the [quickstart for PowerShell](quickstart-powershell.md).
20
21
21
-
## Create user for DB2 Server
22
+
## Create a user for the Db2 server
22
23
23
-
First, create a new user for your Db2 server, for use by Azure Monitor for SAP solutions. Then, run the following script to provide the new Db2 user with appropriate permissions.
24
-
Make sure to replace `<username>` with the Db2 username.
24
+
First, create a new user for your Db2 server for use by Azure Monitor for SAP solutions. Then run the following script to provide the new Db2 user with appropriate permissions. Make sure to replace `<username>` with the Db2 username.
25
25
26
26
```sql
27
27
GRANT SECADM ON DATABASE TO USER <username>;
@@ -98,27 +98,28 @@ GRANT EXECUTE ON SPECIFIC PROCEDURE SYSPROC.WLM_COLLECT_STATS_WAIT TO ROLE SAPMO
98
98
GRANT EXECUTE ON SPECIFIC PROCEDURE SYSPROC.WLM_SET_CONN_ENV TO ROLE SAPMON;
99
99
100
100
```
101
+
101
102
## Prerequisites to enable secure communication
102
103
103
-
To [enable TLS 1.2 or higher](enable-tls-azure-monitor-sap-solutions.md), follow the steps [mentioned here](https://assets.cdn.sap.com/sapcom/docs/2018/12/d2922a3b-307d-0010-87a3-c30de2ffd8ff.pdf).
104
+
To [enable TLS 1.2 or higher](enable-tls-azure-monitor-sap-solutions.md), follow the steps in [this document](https://assets.cdn.sap.com/sapcom/docs/2018/12/d2922a3b-307d-0010-87a3-c30de2ffd8ff.pdf).
104
105
105
-
## Create IBM Db2 provider
106
+
## Create an IBM Db2 provider
106
107
107
108
To create the IBM Db2 provider for Azure Monitor for SAP solutions:
108
109
109
110
1. Sign in to the [Azure portal](https://portal.azure.com).
110
-
1. Go to the Azure Monitor for SAP solutions service.
111
+
1. Go to the Azure Monitor for SAP solutions service.
111
112
1. Open the Azure Monitor for SAP solutions resource you want to modify.
112
113
1. On the resource's menu, under **Settings**, select **Providers**.
113
114
1. Select **Add** to add a new provider.
114
115
1. For **Type**, select **IBM Db2**.
115
-
1.*Optional* Select **Enable secure communication** and choose a certificate type from the dropdown list.
116
+
1.(Optional) Select **Enable secure communication** and choose a certificate type from the dropdown list.
116
117
1. Enter the IP address for the hostname.
117
118
1. Enter the database name.
118
119
1. Enter the database port.
119
120
1. Save your changes.
120
121
1. Configure more providers for each instance of the database.
0 commit comments