You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/sap-hana-high-availability-netapp-files-red-hat.md
+26-35Lines changed: 26 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.subservice: sap-vm-workloads
9
9
ms.topic: article
10
10
ms.tgt_pltfrm: vm-linux
11
11
ms.workload: infrastructure
12
-
ms.date: 07/11/2023
12
+
ms.date: 01/17/2024
13
13
ms.author: radeltch
14
14
---
15
15
@@ -148,46 +148,37 @@ The following instructions assume that you already deployed your [Azure virtual
148
148
> All commands to mount `/hana/shared` in this article are presented for NFSv4.1 `/hana/shared` volumes.
149
149
> If you deployed the `/hana/shared` volumes as NFSv3 volumes, don't forget to adjust the mount commands for `/hana/shared` for NFSv3.
150
150
151
-
## Deploy Linux virtual machine via the Azure portal
151
+
## Prepare the infrastructure
152
152
153
-
This document assumes that you already deployed a resource group, [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md), and a subnet.
153
+
Azure Marketplace contains images qualified for SAP HANA with the High Availability add-on, which you can use to deploy new VMs by using various versions of Red Hat.
154
154
155
-
Deploy VMs for SAP HANA. Choose a suitable RHEL image that's supported for a HANA system. You can deploy a VM in any one of the availability options: scale set, availability zone, or availability set.
155
+
### Deploy Linux VMs manually via the Azure portal
156
+
157
+
This document assumes that you've already deployed a resource group, an [Azure virtual network](../../virtual-network/virtual-networks-overview.md), and a subnet.
158
+
159
+
Deploy VMs for SAP HANA. Choose a suitable RHEL image that's supported for the HANA system. You can deploy a VM in any one of the availability options: virtual machine scale set, availability zone, or availability set.
156
160
157
161
> [!IMPORTANT]
158
162
>
159
163
> Make sure that the OS you select is SAP certified for SAP HANA on the specific VM types that you plan to use in your deployment. You can look up SAP HANA-certified VM types and their OS releases in [SAP HANA Certified IaaS Platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120). Make sure that you look at the details of the VM type to get the complete list of SAP HANA-supported OS releases for the specific VM type.
160
164
161
-
During VM configuration, we won't add any disk because all our mount points are on NFS shares from Azure NetApp Files. Also, you can create or select an existing load balancer in the networking section. If you're creating a new load balancer, follow these steps:
162
-
163
-
1. To set up a Standard load balancer, follow these configuration steps:
164
-
1. First, create a front-end IP pool:
165
-
1. Open the load balancer, select **frontend IP pool**, and select **Add**.
166
-
1. Enter the name of the new front-end IP pool (for example, **hana-frontend**).
167
-
1. Set **Assignment** to **Static** and enter the IP address (for example, **10.32.0.10**).
168
-
1. Select **OK**.
169
-
1. After the new front-end IP pool is created, note the pool IP address.
170
-
1. Create a single back-end pool:
171
-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
172
-
1. Enter the name of the new back-end pool (for example, **hana-backend**).
173
-
1. Select **NIC** for **Backend Pool Configuration**.
174
-
1. Select **Add a virtual machine**.
175
-
1. Select the VMs of the HANA cluster.
176
-
1. Select **Add**.
177
-
1. Select **Save**.
178
-
1. Next, create a health probe:
179
-
1. Open the load balancer, select **health probes**, and select **Add**.
180
-
1. Enter the name of the new health probe (for example, **hana-hp**).
181
-
1. Select **TCP** as the protocol and port 625**03**. Keep the **Interval** value set to **5**.
182
-
1. Select **OK**.
183
-
1. Next, create load-balancing rules:
184
-
1. Open the load balancer, select **load balancing rules**, and select **Add**.
185
-
1. Enter the name of the new load balancer rule (for example, **hana-lb**).
186
-
1. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend**, and **hana-hp**).
187
-
1. Increase the idle timeout to **30 minutes**.
188
-
1. Select **HA Ports**.
189
-
1. Make sure to enable **Floating IP**.
190
-
1. Select **OK**.
165
+
### Configure Azure load balancer
166
+
167
+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow below steps, to setup standard load balancer for high availability setup of HANA database.
168
+
169
+
#### [Azure Portal](#tab/lb-portal)
170
+
171
+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
172
+
173
+
#### [Azure CLI](#tab/lb-azurecli)
174
+
175
+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
176
+
177
+
#### [PowerShell](#tab/lb-powershell)
178
+
179
+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
180
+
181
+
---
191
182
192
183
For more information about the required ports for SAP HANA, read the chapter [Connections to Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6/latest/en-US/7a9343c9f2a2436faa3cfdb5ca00c052.html) in the [SAP HANA Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6) guide or SAP Note [2388694](https://launchpad.support.sap.com/#/notes/2388694).
193
184
@@ -198,7 +189,7 @@ For more information about the required ports for SAP HANA, read the chapter [Co
198
189
> When VMs without public IP addresses are placed in the back-end pool of an internal (no public IP address) instance of Standard Azure Load Balancer, there's no outbound internet connectivity, unless more configuration is performed to allow routing to public endpoints. For more information on how to achieve outbound connectivity, see [Public endpoint connectivity for virtual machines using Standard Azure Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
199
190
200
191
> [!IMPORTANT]
201
-
> Don't enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps could cause the health probes to fail. Set the parameter **net.ipv4.tcp_timestamps** to **0**. For more information, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md). See also SAP Note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
192
+
> Don't enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps could cause the health probes to fail. Set the parameter **net.ipv4.tcp_timestamps** to **0**. For more information, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md) and SAP Note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
Copy file name to clipboardExpand all lines: articles/sap/workloads/sap-hana-high-availability-netapp-files-suse.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,7 +186,7 @@ For more information about the required ports for SAP HANA, read the chapter [Co
186
186
> [!IMPORTANT]
187
187
>
188
188
> - Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter `net.ipv4.tcp_timestamps` to `0`. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md) and SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
189
-
> - To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, you should update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
189
+
> - To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
Copy file name to clipboardExpand all lines: articles/sap/workloads/sap-hana-high-availability-rhel.md
+13-34Lines changed: 13 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.subservice: sap-vm-workloads
10
10
ms.topic: article
11
11
ms.workload: infrastructure
12
12
ms.custom: devx-track-python
13
-
ms.date: 11/21/2023
13
+
ms.date: 01/17/2024
14
14
ms.author: radeltch
15
15
---
16
16
# High availability of SAP HANA on Azure VMs on Red Hat Enterprise Linux
@@ -83,57 +83,37 @@ The SAP HANA System Replication setup uses a dedicated virtual hostname and virt
83
83
* Front-end IP address: 10.0.0.13 for hn1-db
84
84
* Probe port: 62503
85
85
86
-
## Deploy for Linux
86
+
## Prepare the infrastructure
87
87
88
88
Azure Marketplace contains images qualified for SAP HANA with the High Availability add-on, which you can use to deploy new VMs by using various versions of Red Hat.
89
89
90
90
### Deploy Linux VMs manually via the Azure portal
91
91
92
92
This document assumes that you've already deployed a resource group, an [Azure virtual network](../../virtual-network/virtual-networks-overview.md), and a subnet.
93
93
94
-
Deploy VMs for SAP HANA. Choose a suitable RHEL image that's supported for the HANA system. You can deploy a VM in any one of the availability options: scale set, availability zone, or availability set.
94
+
Deploy VMs for SAP HANA. Choose a suitable RHEL image that's supported for the HANA system. You can deploy a VM in any one of the availability options: virtual machine scale set, availability zone, or availability set.
95
95
96
96
> [!IMPORTANT]
97
97
>
98
98
> Make sure that the OS you select is SAP certified for SAP HANA on the specific VM types that you plan to use in your deployment. You can look up SAP HANA-certified VM types and their OS releases in [SAP HANA Certified IaaS Platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120). Make sure that you look at the details of the VM type to get the complete list of SAP HANA-supported OS releases for the specific VM type.
99
99
100
-
During VM configuration, you can create or select an existing load balancer in the networking section. If you're creating a new load balancer, follow these steps:
100
+
### Configure Azure load balancer
101
101
102
-
1. Create a front-end IP pool:
102
+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow below steps, to setup standard load balancer for high availability setup of HANA database.
103
103
104
-
1. Open the load balancer, select **frontend IP pool**, and select **Add**.
105
-
1. Enter the name of the new front-end IP pool (for example, **hana-frontend**).
106
-
1. Set **Assignment** to **Static** and enter the IP address (for example, **10.0.0.13**).
107
-
1. Select **OK**.
108
-
1. After the new front-end IP pool is created, note the pool IP address.
104
+
#### [Azure Portal](#tab/lb-portal)
109
105
110
-
1. Create a single back-end pool:
106
+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
111
107
112
-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
113
-
1. Enter the name of the new back-end pool (for example, **hana-backend**).
114
-
1. Select **NIC** for **Backend Pool Configuration**.
115
-
1. Select **Add a virtual machine**.
116
-
1. Select the VMs of the HANA cluster.
117
-
1. Select **Add**.
118
-
1. Select **Save**.
108
+
#### [Azure CLI](#tab/lb-azurecli)
119
109
120
-
1. Create a health probe:
110
+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
121
111
122
-
1. Open the load balancer, select **health probes**, and select **Add**.
123
-
1. Enter the name of the new health probe (for example, **hana-hp**).
124
-
1. Select **TCP** as the protocol and port 625**03**. Keep the **Interval** value set to **5**.
125
-
1. Select **OK**.
112
+
#### [PowerShell](#tab/lb-powershell)
126
113
127
-
1. Create the load-balancing rules:
114
+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
128
115
129
-
1. Open the load balancer, select **load balancing rules**, and select **Add**.
130
-
1. Enter the name of the new load balancer rule (for example, **hana-lb**).
131
-
1. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend**, and **hana-hp**).
132
-
1. Increase the idle timeout to **30 minutes**.
133
-
1. Select **HA Ports**.
134
-
1. Increase the idle timeout to **30 minutes**.
135
-
1. Make sure to enable **Floating IP**.
136
-
1. Select **OK**.
116
+
---
137
117
138
118
For more information about the required ports for SAP HANA, read the chapter [Connections to Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6/latest/en-US/7a9343c9f2a2436faa3cfdb5ca00c052.html) in the [SAP HANA Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6) guide or SAP Note [2388694][2388694].
139
119
@@ -144,8 +124,7 @@ For more information about the required ports for SAP HANA, read the chapter [Co
144
124
> When VMs without public IP addresses are placed in the back-end pool of an internal (no public IP address) instance of Standard Azure Load Balancer, there's no outbound internet connectivity unless more configuration is performed to allow routing to public endpoints. For more information on how to achieve outbound connectivity, see [Public endpoint connectivity for VMs using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
145
125
146
126
> [!IMPORTANT]
147
-
> Don't enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps could cause the health probes to fail. Set the parameter **net.ipv4.tcp_timestamps** to **0**. For more information, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
148
-
> See also SAP Note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
127
+
> Don't enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps could cause the health probes to fail. Set the parameter `net.ipv4.tcp_timestamps` to `0`. For more information, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md) and SAP Note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
0 commit comments