Skip to content

Commit caaa7e9

Browse files
Merge pull request #212176 from rdeltcheva/azfnc-msi-1
Add link to blog on how to convert to MSI based fence device, other …
2 parents c421b06 + 592cb3a commit caaa7e9

File tree

2 files changed

+14
-10
lines changed

2 files changed

+14
-10
lines changed

articles/virtual-machines/workloads/sap/high-availability-guide-rhel-pacemaker.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: article
1313
ms.tgt_pltfrm: vm-windows
1414
ms.workload: infrastructure-services
1515
ms.custom: subject-rbac-steps
16-
ms.date: 08/29/2022
16+
ms.date: 09/22/2022
1717
ms.author: radeltch
1818

1919
---
@@ -182,7 +182,7 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
182182
sudo pcs cluster start --all
183183
</code></pre>
184184

185-
If building a cluster on **RHEL 8.X**, use the following commands:
185+
If building a cluster on **RHEL 8.x**, use the following commands:
186186
<pre><code>sudo pcs host auth <b>prod-cl1-0</b> <b>prod-cl1-1</b> -u hacluster
187187
sudo pcs cluster setup <b>nw1-azr</b> <b>prod-cl1-0</b> <b>prod-cl1-1</b> totem token=30000
188188
sudo pcs cluster start --all
@@ -232,7 +232,7 @@ The following items are prefixed with either **[A]** - applicable to all nodes,
232232
The fencing device uses either a managed identity for Azure resource or service principal to authorize against Microsoft Azure.
233233

234234
### Using Managed Identity
235-
To create a managed identity (MSI), [create a system-assigned](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) managed identity for each VM in the cluster. Should a system-assigned managed identity already exist, it will be used. User assigned managed identities should not be used with Pacemaker at this time.
235+
To create a managed identity (MSI), [create a system-assigned](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) managed identity for each VM in the cluster. Should a system-assigned managed identity already exist, it will be used. User assigned managed identities should not be used with Pacemaker at this time. Fence device, based on managed identity is supported on RHEL 7.9 and RHEL 8.x.
236236

237237
### Using Service Principal
238238
Follow these steps to create a service principal, if not using managed identity.
@@ -252,7 +252,7 @@ Follow these steps to create a service principal, if not using managed identity.
252252

253253
### **[1]** Create a custom role for the fence agent
254254

255-
Neither managed identity nor service principal have permissions to access your Azure resources by default. You need to give the managed identity or service principal permissions to start and stop (power-off) all virtual machines of the cluster. If you did not already create the custom role, you can create it using [PowerShell](../../../role-based-access-control/custom-roles-powershell.md) or [Azure CLI](../../../role-based-access-control/custom-roles-cli.md)
255+
Neither managed identity nor service principal has permissions to access your Azure resources by default. You need to give the managed identity or service principal permissions to start and stop (power-off) all virtual machines of the cluster. If you did not already create the custom role, you can create it using [PowerShell](../../../role-based-access-control/custom-roles-powershell.md) or [Azure CLI](../../../role-based-access-control/custom-roles-cli.md)
256256

257257
Use the following content for the input file. You need to adapt the content to your subscriptions that is, replace *xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx* and *yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy* with the Ids of your subscription. If you only have one subscription, remove the second entry in AssignableScopes.
258258

@@ -320,15 +320,15 @@ op monitor interval=3600
320320

321321
#### [Service Principal](#tab/spn)
322322

323-
For RHEL **7.X**, use the following command to configure the fence device:
323+
For RHEL **7.x**, use the following command to configure the fence device:
324324
<pre><code>sudo pcs stonith create rsc_st_azure fence_azure_arm login="<b>login ID</b>" passwd="<b>password</b>" \
325325
resourceGroup="<b>resource group</b>" tenantId="<b>tenant ID</b>" subscriptionId="<b>subscription id</b>" \
326326
<b>pcmk_host_map="prod-cl1-0:prod-cl1-0-vm-name;prod-cl1-1:prod-cl1-1-vm-name"</b> \
327327
power_timeout=240 pcmk_reboot_timeout=900 pcmk_monitor_timeout=120 pcmk_monitor_retries=4 pcmk_action_limit=3 pcmk_delay_max=15 \
328328
op monitor interval=3600
329329
</code></pre>
330330

331-
For RHEL **8.X**, use the following command to configure the fence device:
331+
For RHEL **8.x**, use the following command to configure the fence device:
332332
<pre><code>sudo pcs stonith create rsc_st_azure fence_azure_arm username="<b>login ID</b>" password="<b>password</b>" \
333333
resourceGroup="<b>resource group</b>" tenantId="<b>tenant ID</b>" subscriptionId="<b>subscription id</b>" \
334334
<b>pcmk_host_map="prod-cl1-0:prod-cl1-0-vm-name;prod-cl1-1:prod-cl1-1-vm-name"</b> \
@@ -338,6 +338,8 @@ op monitor interval=3600
338338

339339
---
340340

341+
If you are using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
342+
341343
> [!TIP]
342344
> Only configure the `pcmk_delay_max` attribute in two node Pacemaker clusters. For more information on preventing fence races in a two node Pacemaker cluster, see [Delaying fencing in a two node cluster to prevent fence races of "fence death" scenarios](https://access.redhat.com/solutions/54829).
343345
@@ -359,7 +361,7 @@ op monitor interval=3600
359361
> [!TIP]
360362
> This section is only applicable, if it is desired to configure special fencing device `fence_kdump`.
361363
362-
If there is a need to collect diagnostic information within the VM , it may be useful to configure additional fencing device, based on fence agent `fence_kdump`. The `fence_kdump` agent can detect that a node entered kdump crash recovery and can allow the crash recovery service to complete, before other fencing methods are invoked. Note that `fence_kdump` is not a replacement for traditional fence mechanisms, like Azure Fence Agent when using Azure VMs.
364+
If there is a need to collect diagnostic information within the VM, it may be useful to configure additional fencing device, based on fence agent `fence_kdump`. The `fence_kdump` agent can detect that a node entered kdump crash recovery and can allow the crash recovery service to complete, before other fencing methods are invoked. Note that `fence_kdump` is not a replacement for traditional fence mechanisms, like Azure Fence Agent when using Azure VMs.
363365

364366
> [!IMPORTANT]
365367
> Be aware that when `fence_kdump` is configured as a first level fencing device, it will introduce delays in the fencing operations and respectively delays in the application resources failover.

articles/virtual-machines/workloads/sap/high-availability-guide-suse-pacemaker.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: article
1313
ms.tgt_pltfrm: vm-windows
1414
ms.workload: infrastructure-services
1515
ms.custom: subject-rbac-steps
16-
ms.date: 08/30/2022
16+
ms.date: 09/22/2022
1717
ms.author: radeltch
1818

1919
---
@@ -472,7 +472,7 @@ This section applies only if you want to use a fencing device with an Azure fenc
472472
This section applies only if you're using a fencing device that's based on an Azure fence agent. The fencing device uses either a managed identity or a service principal to authorize against Microsoft Azure.
473473

474474
#### Using managed identity
475-
To create a managed identity (MSI), [create a system-assigned](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) managed identity for each VM in the cluster. Should a system-assigned managed identity already exist, it will be used. User assigned managed identities should not be used with Pacemaker at this time.
475+
To create a managed identity (MSI), [create a system-assigned](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) managed identity for each VM in the cluster. Should a system-assigned managed identity already exist, it will be used. User assigned managed identities should not be used with Pacemaker at this time. Fence device, based on managed identity is supported on SLES 15 SP1 and above.
476476

477477
#### Using service principal
478478

@@ -640,7 +640,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
640640
641641
>[!IMPORTANT]
642642
> If using managed identity, the installed version of the *fence-agents* package must be fence-agents 4.5.2+git.1592573838.1eee0863 or later. Earlier versions will not work correctly with a managed identity configuration.
643-
> Currently only SLES 15 SP1 and older are supported for managed identity configuration.
643+
> Currently only SLES 15 SP1 and newer are supported for managed identity configuration.
644644
645645
1. **[A]** Install the Azure Python SDK and Azure Identity Python module.
646646

@@ -823,6 +823,8 @@ Make sure to assign the custom role to the service principal at all VM (cluster
823823
sudo crm configure property stonith-timeout=900
824824
</code></pre>
825825

826+
If you are using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
827+
826828
> [!IMPORTANT]
827829
> The monitoring and fencing operations are deserialized. As a result, if there's a longer-running monitoring operation and simultaneous fencing event, there's no delay to the cluster failover because the monitoring operation is already running.
828830

0 commit comments

Comments
 (0)