Skip to content

Commit aacb3b7

Browse files
authored
Merge pull request #263435 from dennispadia/dp-applbupdate
Update load balancer steps in ASCS/ERS document
2 parents dc3ab53 + a1d6309 commit aacb3b7

9 files changed

+660
-423
lines changed

articles/sap/workloads/high-availability-guide-suse-multi-sid.md

Lines changed: 76 additions & 72 deletions
Large diffs are not rendered by default.

articles/sap/workloads/high-availability-guide-suse-netapp-files.md

Lines changed: 46 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: sap-on-azure
99
ms.subservice: sap-vm-workloads
1010
ms.topic: article
1111
ms.workload: infrastructure-services
12-
ms.date: 09/15/2023
12+
ms.date: 01/17/2024
1313
ms.author: radeltch
1414
---
1515

@@ -126,17 +126,50 @@ When considering Azure NetApp Files for the SAP Netweaver on SUSE High Availabil
126126
* Azure NetApp Files feature isn't zone aware yet. Currently Azure NetApp Files feature isn't deployed in all Availability zones in an Azure region. Be aware of the potential latency implications in some Azure regions.
127127
* Azure NetApp Files volumes can be deployed as NFSv3 or NFSv4.1 volumes. Both protocols are supported for the SAP application layer (ASCS/ERS, SAP application servers).
128128

129-
## Deploy Linux VMs manually via Azure portal
129+
## Prepare infrastructure
130+
131+
The resource agent for SAP Instance is included in SUSE Linux Enterprise Server for SAP Applications. An image for SUSE Linux Enterprise Server for SAP Applications 12 or 15 is available in Azure Marketplace. You can use the image to deploy new VMs.
132+
133+
### Deploy Linux VMs manually via Azure portal
130134

131135
This document assumes that you've already deployed a resource group, [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md), and subnet.
132136

133-
Deploy virtual machines for SAP ASCS, ERS, and application server instances. Choose a suitable SLES image that is supported with your SAP system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
137+
Deploy virtual machines with SLES for SAP Applications image. Choose a suitable version of SLES image that is supported for SAP system. You can deploy VM in any one of the availability options - virtual machine scale set, availability zone, or availability set.
138+
139+
### Configure Azure load balancer
140+
141+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow the steps below to configure a standard load balancer for the high-availability setup of SAP ASCS and SAP ERS.
142+
143+
#### [Azure portal](#tab/lb-portal)
144+
145+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-ascs-ers-portal.md)]
146+
147+
#### [Azure CLI](#tab/lb-azurecli)
148+
149+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-ascs-ers-azurecli.md)]
150+
151+
#### [PowerShell](#tab/lb-powershell)
152+
153+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-ascs-ers-powershell.md)]
154+
155+
---
156+
157+
> [!IMPORTANT]
158+
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
159+
160+
> [!NOTE]
161+
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
162+
163+
> [!IMPORTANT]
164+
>
165+
> * Don't enable TCP time stamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set the `net.ipv4.tcp_timestamps` parameter to `0`. For details, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
166+
> * To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, you should update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
134167
135168
## Disable ID mapping (if using NFSv4.1)
136169

137170
The instructions in this section are only applicable, if using Azure NetApp Files volumes with NFSv4.1 protocol. Perform the configuration on all VMs, where Azure NetApp Files NFSv4.1 volumes will be mounted.
138171

139-
1. Verify the NFS domain setting. Make sure that the domain is configured as the default Azure NetApp Files domain, that is, **`defaultv4iddomain.com`** and the mapping is set to **nobody**.
172+
1. Verify the NFS domain setting. Make sure that the domain is configured as the default Azure NetApp Files domain that is, **`defaultv4iddomain.com`** and the mapping is set to **nobody**.
140173

141174
> [!IMPORTANT]
142175
> Make sure to set the NFS domain in `/etc/idmapd.conf` on the VM to match the default domain configuration on Azure NetApp Files: **`defaultv4iddomain.com`**. If there's a mismatch between the domain configuration on the NFS client (i.e. the VM) and the NFS server, i.e. the Azure NetApp configuration, then the permissions for files on Azure NetApp volumes that are mounted on the VMs will be displayed as `nobody`.
@@ -172,56 +205,7 @@ The instructions in this section are only applicable, if using Azure NetApp File
172205
173206
## Setting up (A)SCS
174207
175-
In this example, the resources were deployed manually via the [Azure portal](https://portal.azure.com/#home) .
176-
177-
### Deploy Azure Load Balancer manually via Azure portal
178-
179-
After you deploy the VMs for your SAP system, create a load balancer. Use VMs created for SAP ASCS/ERS instances in the backend pool.
180-
181-
1. Create load balancer (internal, standard):
182-
1. Create the frontend IP addresses
183-
1. IP address 10.1.1.20 for the ASCS
184-
1. Open the load balancer, select frontend IP pool, and click Add
185-
2. Enter the name of the new frontend IP pool (for example **frontend.QAS.ASCS**)
186-
3. Set the Assignment to Static and enter the IP address (for example **10.1.1.20**)
187-
4. Click OK
188-
2. IP address 10.1.1.21 for the ASCS ERS
189-
* Repeat the steps above under "a" to create an IP address for the ERS (for example **10.1.1.21** and **frontend.QAS.ERS**)
190-
2. Create a single back-end pool:
191-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
192-
2. Enter the name of the new back-end pool (for example, **backend.QAS**).
193-
3. Select **NIC** for Backend Pool Configuration.
194-
4. Select **Add a virtual machine**.
195-
5. Select the virtual machines of the ASCS cluster.
196-
6. Select **Add**.
197-
7. Select **Save**.
198-
3. Create the health probes
199-
1. Port 620**00** for ASCS
200-
1. Open the load balancer, select health probes, and click Add
201-
2. Enter the name of the new health probe (for example **health.QAS.ASCS**)
202-
3. Select TCP as protocol, port 620**00**, keep Interval 5
203-
4. Click OK
204-
2. Port 621**01** for ASCS ERS
205-
* Repeat the steps above under "c" to create a health probe for the ERS (for example 621**01** and **health.QAS.ERS**)
206-
4. Load-balancing rules
207-
1. Create a backend pool for the ASCS
208-
1. Open the load balancer, select Load-balancing rules and click Add
209-
2. Enter the name of the new load balancer rule (for example **lb.QAS.ASCS**)
210-
3. Select the frontend IP address for ASCS, backend pool, and health probe you created earlier (for example **frontend.QAS.ASCS**, **backend.QAS** and **health.QAS.ASCS**)
211-
4. Select **HA ports**
212-
5. Increase idle timeout to 30 minutes
213-
6. **Make sure to enable Floating IP**
214-
7. Click OK
215-
* Repeat the steps above to create load balancing rules for ERS (for example **lb.QAS.ERS**)
216-
217-
> [!IMPORTANT]
218-
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
219-
220-
> [!NOTE]
221-
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
222-
223-
> [!IMPORTANT]
224-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
208+
Next, you'll prepare and install the SAP ASCS and ERS instances.
225209

226210
### Create Pacemaker cluster
227211

@@ -262,7 +246,7 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
262246

263247
2. **[A]** Update SAP resource agents
264248

265-
A patch for the resource-agents package is required to use the new configuration, that is described in this article. You can check, if the patch is already installed with the following command
249+
A patch for the resource-agents package is required to use the new configuration that is described in this article. You can check, if the patch is already installed with the following command
266250

267251
```bash
268252
sudo grep 'parameter name="IS_ERS"' /usr/lib/ocf/resource.d/heartbeat/SAPInstance
@@ -622,7 +606,9 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
622606
623607
9. **[1]** Create the SAP cluster resources.
624608
625-
If using enqueue server 1 architecture (ENSA1), define the resources as follows:
609+
Depending on whether you are running an ENSA1 or ENSA2 system, select respective tab to define the resources. SAP introduced support for [ENSA2](https://help.sap.com/docs/ABAP_PLATFORM_NEW/cff8531bc1d9416d91bb6781e628d4e0/6d655c383abf4c129b0e5c8683e7ecd8.html), including replication, in SAP NetWeaver 7.52. Starting with ABAP Platform 1809, ENSA2 is installed by default. For ENSA2 support, see SAP Note [2630416](https://launchpad.support.sap.com/#/notes/2630416).
610+
611+
#### [ENSA1](#tab/ensa1)
626612
627613
```bash
628614
sudo crm configure property maintenance-mode="true"
@@ -670,9 +656,7 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
670656
sudo crm configure property maintenance-mode="false"
671657
```
672658
673-
SAP introduced support for enqueue server 2, including replication, as of SAP NW 7.52. Starting with ABAP Platform 1809, enqueue server 2 is installed by default. See SAP note [2630416](https://launchpad.support.sap.com/#/notes/2630416) for enqueue server 2 support.
674-
675-
If using enqueue server 2 architecture ([ENSA2](https://help.sap.com/viewer/cff8531bc1d9416d91bb6781e628d4e0/1709%20001/en-US/6d655c383abf4c129b0e5c8683e7ecd8.html)), define the resources as follows:
659+
#### [ENSA2](#tab/ensa2)
676660
677661
> [!NOTE]
678662
> If you have a two-node cluster running ENSA2, you have the option to configure priority-fencing-delay cluster property. This property introduces additional delay in fencing a node that has higher total resoure priority when a split-brain scenario occurs. For more information, see [SUSE Linux Enteprise Server high availability extension administration guide](https://documentation.suse.com/sle-ha/15-SP3/single-html/SLE-HA-administration/#pro-ha-storage-protect-fencing).
@@ -722,7 +706,9 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
722706
sudo crm configure property maintenance-mode="false"
723707
```
724708
725-
If you're upgrading from an older version and switching to enqueue server 2, see SAP note [2641019](https://launchpad.support.sap.com/#/notes/2641019).
709+
---
710+
711+
If you're upgrading from an older version and switching to enqueue server 2, see SAP note [2641019](https://launchpad.support.sap.com/#/notes/2641019).
726712

727713
> [!NOTE]
728714
> The higher timeouts, suggested when using NFSv4.1 are necessary due to protocol-specific pause, related to NFSv4.1 lease renewals. For more information, see [NFS in NetApp Best practice](https://www.netapp.com/media/10720-tr-4067.pdf).

0 commit comments

Comments
 (0)