You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-suse-netapp-files.md
+46-60Lines changed: 46 additions & 60 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: sap-on-azure
9
9
ms.subservice: sap-vm-workloads
10
10
ms.topic: article
11
11
ms.workload: infrastructure-services
12
-
ms.date: 09/15/2023
12
+
ms.date: 01/17/2024
13
13
ms.author: radeltch
14
14
---
15
15
@@ -126,17 +126,50 @@ When considering Azure NetApp Files for the SAP Netweaver on SUSE High Availabil
126
126
* Azure NetApp Files feature isn't zone aware yet. Currently Azure NetApp Files feature isn't deployed in all Availability zones in an Azure region. Be aware of the potential latency implications in some Azure regions.
127
127
* Azure NetApp Files volumes can be deployed as NFSv3 or NFSv4.1 volumes. Both protocols are supported for the SAP application layer (ASCS/ERS, SAP application servers).
128
128
129
-
## Deploy Linux VMs manually via Azure portal
129
+
## Prepare infrastructure
130
+
131
+
The resource agent for SAP Instance is included in SUSE Linux Enterprise Server for SAP Applications. An image for SUSE Linux Enterprise Server for SAP Applications 12 or 15 is available in Azure Marketplace. You can use the image to deploy new VMs.
132
+
133
+
### Deploy Linux VMs manually via Azure portal
130
134
131
135
This document assumes that you've already deployed a resource group, [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md), and subnet.
132
136
133
-
Deploy virtual machines for SAP ASCS, ERS, and application server instances. Choose a suitable SLES image that is supported with your SAP system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
137
+
Deploy virtual machines with SLES for SAP Applications image. Choose a suitable version of SLES image that is supported for SAP system. You can deploy VM in any one of the availability options - virtual machine scale set, availability zone, or availability set.
138
+
139
+
### Configure Azure load balancer
140
+
141
+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow the steps below to configure a standard load balancer for the high-availability setup of SAP ASCS and SAP ERS.
142
+
143
+
#### [Azure portal](#tab/lb-portal)
144
+
145
+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-ascs-ers-portal.md)]
146
+
147
+
#### [Azure CLI](#tab/lb-azurecli)
148
+
149
+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-ascs-ers-azurecli.md)]
150
+
151
+
#### [PowerShell](#tab/lb-powershell)
152
+
153
+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-ascs-ers-powershell.md)]
154
+
155
+
---
156
+
157
+
> [!IMPORTANT]
158
+
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
159
+
160
+
> [!NOTE]
161
+
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
162
+
163
+
> [!IMPORTANT]
164
+
>
165
+
> * Don't enable TCP time stamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set the `net.ipv4.tcp_timestamps` parameter to `0`. For details, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
166
+
> * To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, you should update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
134
167
135
168
## Disable ID mapping (if using NFSv4.1)
136
169
137
170
The instructions in this section are only applicable, if using Azure NetApp Files volumes with NFSv4.1 protocol. Perform the configuration on all VMs, where Azure NetApp Files NFSv4.1 volumes will be mounted.
138
171
139
-
1. Verify the NFS domain setting. Make sure that the domain is configured as the default Azure NetApp Files domain, that is, **`defaultv4iddomain.com`** and the mapping is set to **nobody**.
172
+
1. Verify the NFS domain setting. Make sure that the domain is configured as the default Azure NetApp Files domain that is, **`defaultv4iddomain.com`** and the mapping is set to **nobody**.
140
173
141
174
> [!IMPORTANT]
142
175
> Make sure to set the NFS domain in `/etc/idmapd.conf` on the VM to match the default domain configuration on Azure NetApp Files: **`defaultv4iddomain.com`**. If there's a mismatch between the domain configuration on the NFS client (i.e. the VM) and the NFS server, i.e. the Azure NetApp configuration, then the permissions for files on Azure NetApp volumes that are mounted on the VMs will be displayed as `nobody`.
@@ -172,56 +205,7 @@ The instructions in this section are only applicable, if using Azure NetApp File
172
205
173
206
## Setting up (A)SCS
174
207
175
-
In this example, the resources were deployed manually via the [Azure portal](https://portal.azure.com/#home) .
176
-
177
-
### Deploy Azure Load Balancer manually via Azure portal
178
-
179
-
After you deploy the VMs for your SAP system, create a load balancer. Use VMs created for SAP ASCS/ERS instances in the backend pool.
180
-
181
-
1. Create load balancer (internal, standard):
182
-
1. Create the frontend IP addresses
183
-
1. IP address 10.1.1.20 for the ASCS
184
-
1. Open the load balancer, select frontend IP pool, and click Add
185
-
2. Enter the name of the new frontend IP pool (for example **frontend.QAS.ASCS**)
186
-
3. Set the Assignment to Static and enter the IP address (for example **10.1.1.20**)
187
-
4. Click OK
188
-
2. IP address 10.1.1.21 for the ASCS ERS
189
-
* Repeat the steps above under "a" to create an IP address for the ERS (for example **10.1.1.21** and **frontend.QAS.ERS**)
190
-
2. Create a single back-end pool:
191
-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
192
-
2. Enter the name of the new back-end pool (for example, **backend.QAS**).
193
-
3. Select **NIC** for Backend Pool Configuration.
194
-
4. Select **Add a virtual machine**.
195
-
5. Select the virtual machines of the ASCS cluster.
196
-
6. Select **Add**.
197
-
7. Select **Save**.
198
-
3. Create the health probes
199
-
1. Port 620**00** for ASCS
200
-
1. Open the load balancer, select health probes, and click Add
201
-
2. Enter the name of the new health probe (for example **health.QAS.ASCS**)
202
-
3. Select TCP as protocol, port 620**00**, keep Interval 5
203
-
4. Click OK
204
-
2. Port 621**01** for ASCS ERS
205
-
* Repeat the steps above under "c" to create a health probe for the ERS (for example 621**01** and **health.QAS.ERS**)
206
-
4. Load-balancing rules
207
-
1. Create a backend pool for the ASCS
208
-
1. Open the load balancer, select Load-balancing rules and click Add
209
-
2. Enter the name of the new load balancer rule (for example **lb.QAS.ASCS**)
210
-
3. Select the frontend IP address for ASCS, backend pool, and health probe you created earlier (for example **frontend.QAS.ASCS**, **backend.QAS** and **health.QAS.ASCS**)
211
-
4. Select **HA ports**
212
-
5. Increase idle timeout to 30 minutes
213
-
6. **Make sure to enable Floating IP**
214
-
7. Click OK
215
-
* Repeat the steps above to create load balancing rules for ERS (for example **lb.QAS.ERS**)
216
-
217
-
> [!IMPORTANT]
218
-
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
219
-
220
-
> [!NOTE]
221
-
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
222
-
223
-
> [!IMPORTANT]
224
-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
208
+
Next, you'll prepare and install the SAP ASCS and ERS instances.
225
209
226
210
### Create Pacemaker cluster
227
211
@@ -262,7 +246,7 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
262
246
263
247
2. **[A]** Update SAP resource agents
264
248
265
-
A patch for the resource-agents package is required to use the new configuration, that is described in this article. You can check, if the patch is already installed with the following command
249
+
A patch forthe resource-agents package is required to use the new configuration that is describedin this article. You can check, if the patch is already installed with the following command
@@ -622,7 +606,9 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
622
606
623
607
9. **[1]** Create the SAP cluster resources.
624
608
625
-
If using enqueue server 1 architecture (ENSA1), define the resources as follows:
609
+
Depending on whether you are running an ENSA1 or ENSA2 system, select respective tab to define the resources. SAP introduced support for [ENSA2](https://help.sap.com/docs/ABAP_PLATFORM_NEW/cff8531bc1d9416d91bb6781e628d4e0/6d655c383abf4c129b0e5c8683e7ecd8.html), including replication, in SAP NetWeaver 7.52. Starting with ABAP Platform 1809, ENSA2 is installed by default. For ENSA2 support, see SAP Note [2630416](https://launchpad.support.sap.com/#/notes/2630416).
SAP introduced support for enqueue server 2, including replication, as of SAP NW 7.52. Starting with ABAP Platform 1809, enqueue server 2 is installed by default. See SAP note [2630416](https://launchpad.support.sap.com/#/notes/2630416) for enqueue server 2 support.
674
-
675
-
If using enqueue server 2 architecture ([ENSA2](https://help.sap.com/viewer/cff8531bc1d9416d91bb6781e628d4e0/1709%20001/en-US/6d655c383abf4c129b0e5c8683e7ecd8.html)), define the resources as follows:
659
+
#### [ENSA2](#tab/ensa2)
676
660
677
661
> [!NOTE]
678
662
> If you have a two-node cluster running ENSA2, you have the option to configure priority-fencing-delay cluster property. This property introduces additional delay in fencing a node that has higher total resoure priority when a split-brain scenario occurs. For more information, see [SUSE Linux Enteprise Server high availability extension administration guide](https://documentation.suse.com/sle-ha/15-SP3/single-html/SLE-HA-administration/#pro-ha-storage-protect-fencing).
@@ -722,7 +706,9 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
If you're upgrading from an older version and switching to enqueue server 2, see SAP note [2641019](https://launchpad.support.sap.com/#/notes/2641019).
709
+
---
710
+
711
+
If you're upgrading from an older version and switching to enqueue server 2, see SAP note [2641019](https://launchpad.support.sap.com/#/notes/2641019).
726
712
727
713
> [!NOTE]
728
714
> The higher timeouts, suggested when using NFSv4.1 are necessary due to protocol-specific pause, related to NFSv4.1 lease renewals. For more information, see [NFS in NetApp Best practice](https://www.netapp.com/media/10720-tr-4067.pdf).
0 commit comments