Skip to content

Commit ab98b84

Browse files
committed
changes to HA NFS server
1 parent d774704 commit ab98b84

File tree

1 file changed

+25
-41
lines changed

1 file changed

+25
-41
lines changed

articles/sap/workloads/high-availability-guide-suse-nfs.md

Lines changed: 25 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: sap-on-azure
99
ms.subservice: sap-vm-workloads
1010
ms.topic: article
1111
ms.workload: infrastructure-services
12-
ms.date: 06/20/2023
12+
ms.date: 01/17/2024
1313
ms.author: radeltch
1414
---
1515

@@ -92,45 +92,27 @@ This document assumes that you've already deployed a resource group, [Azure Virt
9292

9393
Deploy two virtual machines for NFS servers. Choose a suitable SLES image that is supported with your SAP system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
9494

95-
### Deploy Azure Load Balancer manually via Azure portal
96-
97-
After you deploy the VMs for your SAP system, create a load balancer. Use VMs created for NFS servers in the backend pool.
98-
99-
1. Create a Load Balancer (internal). We recommend [standard load balancer](../../load-balancer/load-balancer-overview.md).
100-
1. Follow these instructions to create standard Load balancer:
101-
1. Create the frontend IP addresses
102-
1. IP address 10.0.0.4 for NW1
103-
1. Open the load balancer, select frontend IP pool, and click Add
104-
2. Enter the name of the new frontend IP pool (for example **nw1-frontend**)
105-
3. Set the Assignment to Static and enter the IP address (for example **10.0.0.4**)
106-
4. Click OK
107-
2. IP address 10.0.0.5 for NW2
108-
* Repeat the steps above for NW2
109-
2. Create a single back-end pool:
110-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
111-
2. Enter the name of the new back-end pool (for example, **nw-backend**).
112-
3. Select **NIC** for Backend Pool Configuration.
113-
4. Select **Add a virtual machine**.
114-
5. Select the virtual machines of the cluster.
115-
6. Select **Add**.
116-
7. Select **Save**.
117-
3. Create the health probes
118-
1. Port 61000 for NW1
119-
1. Open the load balancer, select health probes, and click Add
120-
2. Enter the name of the new health probe (for example **nw1-hp**)
121-
3. Select TCP as protocol, port 610**00**, keep Interval 5
122-
4. Click OK
123-
2. Port 61001 for NW2
124-
* Repeat the steps above to create a health probe for NW2
125-
4. Load balancing rules
126-
1. Open the load balancer, select load-balancing rules and click Add
127-
2. Enter the name of the new load balancer rule (for example **nw1-lb**)
128-
3. Select the frontend IP address, backend pool, and health probe you created earlier (for example **nw1-frontend**. **nw-backend** and **nw1-hp**)
129-
4. Increase idle timeout to 30 minutes
130-
5. Select **HA Ports**.
131-
6. **Make sure to enable Floating IP**
132-
7. Click OK
133-
* Repeat the steps above to create load balancing rule for NW2
95+
### Configure Azure load balancer
96+
97+
Follow [create load balancer](../../load-balancer/quickstart-load-balancer-standard-internal-portal.md#create-load-balancer) guide to set up a standard load balancer for a NFS server high availability. During the setup of load balancer, consider following points.
98+
99+
1. **Frontend IP Configuration:** Create two frontend IP. Select the same virtual network and subnet as your NFS server.
100+
2. **Backend Pool:** Create backend pool and add NFS server VMs.
101+
3. **Inbound rules:** Create two load balancing rule, one for NW1 and another for NW2. Follow the same steps for both load balancing rules.
102+
* Frontend IP address: Select frontend IP
103+
* Backend pool: Select backend pool
104+
* Check "High availability ports"
105+
* Protocol: TCP
106+
* Health Probe: Create health probe with below details (applies for both NW1 and NW2)
107+
* Protocol: TCP
108+
* Port: [for example: 61000 for NW1, 61001 for NW2]
109+
* Interval: 5
110+
* Probe Threshold: 2
111+
* Idle timeout (minutes): 30
112+
* Check "Enable Floating IP"
113+
114+
> [!NOTE]
115+
> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig) command.
134116
135117
> [!IMPORTANT]
136118
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
@@ -139,7 +121,9 @@ After you deploy the VMs for your SAP system, create a load balancer. Use VMs cr
139121
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
140122
141123
> [!IMPORTANT]
142-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
124+
>
125+
> * Don't enable TCP time stamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set the `net.ipv4.tcp_timestamps` parameter to `0`. For details, see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
126+
> * To prevent saptune from changing the manually set `net.ipv4.tcp_timestamps` value from `0` back to `1`, you should update saptune version to 3.1.1 or higher. For more details, see [saptune 3.1.1 – Do I Need to Update?](https://www.suse.com/c/saptune-3-1-1-do-i-need-to-update/).
143127
144128
### Create Pacemaker cluster
145129

0 commit comments

Comments
 (0)