You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-suse-nfs.md
+25-41Lines changed: 25 additions & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: sap-on-azure
9
9
ms.subservice: sap-vm-workloads
10
10
ms.topic: article
11
11
ms.workload: infrastructure-services
12
-
ms.date: 06/20/2023
12
+
ms.date: 01/17/2024
13
13
ms.author: radeltch
14
14
---
15
15
@@ -92,45 +92,27 @@ This document assumes that you've already deployed a resource group, [Azure Virt
92
92
93
93
Deploy two virtual machines for NFS servers. Choose a suitable SLES image that is supported with your SAP system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
94
94
95
-
### Deploy Azure Load Balancer manually via Azure portal
96
-
97
-
After you deploy the VMs for your SAP system, create a load balancer. Use VMs created for NFS servers in the backend pool.
98
-
99
-
1. Create a Load Balancer (internal). We recommend [standard load balancer](../../load-balancer/load-balancer-overview.md).
100
-
1. Follow these instructions to create standard Load balancer:
101
-
1. Create the frontend IP addresses
102
-
1. IP address 10.0.0.4 for NW1
103
-
1. Open the load balancer, select frontend IP pool, and click Add
104
-
2. Enter the name of the new frontend IP pool (for example **nw1-frontend**)
105
-
3. Set the Assignment to Static and enter the IP address (for example **10.0.0.4**)
106
-
4. Click OK
107
-
2. IP address 10.0.0.5 for NW2
108
-
* Repeat the steps above for NW2
109
-
2. Create a single back-end pool:
110
-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
111
-
2. Enter the name of the new back-end pool (for example, **nw-backend**).
112
-
3. Select **NIC** for Backend Pool Configuration.
113
-
4. Select **Add a virtual machine**.
114
-
5. Select the virtual machines of the cluster.
115
-
6. Select **Add**.
116
-
7. Select **Save**.
117
-
3. Create the health probes
118
-
1. Port 61000 for NW1
119
-
1. Open the load balancer, select health probes, and click Add
120
-
2. Enter the name of the new health probe (for example **nw1-hp**)
121
-
3. Select TCP as protocol, port 610**00**, keep Interval 5
122
-
4. Click OK
123
-
2. Port 61001 for NW2
124
-
* Repeat the steps above to create a health probe for NW2
125
-
4. Load balancing rules
126
-
1. Open the load balancer, select load-balancing rules and click Add
127
-
2. Enter the name of the new load balancer rule (for example **nw1-lb**)
128
-
3. Select the frontend IP address, backend pool, and health probe you created earlier (for example **nw1-frontend**. **nw-backend** and **nw1-hp**)
129
-
4. Increase idle timeout to 30 minutes
130
-
5. Select **HA Ports**.
131
-
6.**Make sure to enable Floating IP**
132
-
7. Click OK
133
-
* Repeat the steps above to create load balancing rule for NW2
95
+
### Configure Azure load balancer
96
+
97
+
Follow [create load balancer](../../load-balancer/quickstart-load-balancer-standard-internal-portal.md#create-load-balancer) guide to set up a standard load balancer for a NFS server high availability. During the setup of load balancer, consider following points.
98
+
99
+
1.**Frontend IP Configuration:** Create two frontend IP. Select the same virtual network and subnet as your NFS server.
100
+
2.**Backend Pool:** Create backend pool and add NFS server VMs.
101
+
3.**Inbound rules:** Create two load balancing rule, one for NW1 and another for NW2. Follow the same steps for both load balancing rules.
102
+
* Frontend IP address: Select frontend IP
103
+
* Backend pool: Select backend pool
104
+
* Check "High availability ports"
105
+
* Protocol: TCP
106
+
* Health Probe: Create health probe with below details (applies for both NW1 and NW2)
107
+
* Protocol: TCP
108
+
* Port: [for example: 61000 for NW1, 61001 for NW2]
109
+
* Interval: 5
110
+
* Probe Threshold: 2
111
+
* Idle timeout (minutes): 30
112
+
* Check "Enable Floating IP"
113
+
114
+
> [!NOTE]
115
+
> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig) command.
134
116
135
117
> [!IMPORTANT]
136
118
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
@@ -139,7 +121,9 @@ After you deploy the VMs for your SAP system, create a load balancer. Use VMs cr
139
121
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
140
122
141
123
> [!IMPORTANT]
142
-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
124
+
>
125
+
> * Don't enable TCP time stamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set the `net.ipv4.tcp_timestamps` parameter to `0`. For details, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
126
+
> * To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, you should update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
0 commit comments