|
2 | 2 | title: SAP ASCS/SCS multi-SID HA with WSFC and Azure shared disk | Microsoft Docs
|
3 | 3 | description: Learn about multi-SID high availability for an SAP ASCS/SCS instance with Windows Server Failover Clustering and an Azure shared disk.
|
4 | 4 | services: virtual-machines-windows,virtual-network,storage
|
5 |
| -documentationcenter: saponazure |
6 | 5 | author: rdeltcheva
|
7 | 6 | manager: juergent
|
8 |
| -editor: '' |
9 |
| -tags: azure-resource-manager |
10 |
| -keywords: '' |
11 | 7 | ms.assetid: cbf18abe-41cb-44f7-bdec-966f32c89325
|
12 | 8 | ms.service: sap-on-azure
|
13 | 9 | ms.subservice: sap-vm-workloads
|
14 |
| -ms.topic: article |
15 |
| -ms.tgt_pltfrm: vm-windows |
16 |
| -ms.workload: infrastructure-services |
17 |
| -ms.date: 12/16/2022 |
| 10 | +ms.date: 01/19/2024 |
18 | 11 | ms.author: radeltch
|
19 | 12 | ms.custom: H1Hack27Feb2017, devx-track-azurepowershell
|
20 | 13 | ---
|
@@ -145,59 +138,35 @@ The steps in this article remain the same for both deployment types. But if your
|
145 | 138 |
|
146 | 139 | ### Create an Azure internal load balancer
|
147 | 140 |
|
148 |
| -SAP ASCS, SAP SCS, and SAP ERS2 use virtual host names and virtual IP addresses. On Azure, a [load balancer](../../load-balancer/load-balancer-overview.md) is required to use a virtual IP address. |
149 |
| -We strongly recommend using a [standard load balancer](../../load-balancer/quickstart-load-balancer-standard-public-portal.md). |
| 141 | +For multi-sid configuration of SAP SID, PR2, you could use the same internal load balancer that you have created for SAP SID, PR1 system. For the ENSA1 architecture on Windows, you would need only one virtual IP address for SAP ASCS/SCS. On the other hand, the ENSA2 architecture necessitates two virtual IP addresses - one for SAP ASCS and another for ERS2. |
| 142 | + |
| 143 | +Configure additional frontend IP and load balancing rule for SAP SID, PR2 system on the existing load balancer using following guidelines. This section assume that that the configuration of standard internal load balancer for SAP SID, PR1 is already in place as described in [create load balancer](./sap-high-availability-infrastructure-wsfc-shared-disk.md#create-azure-internal-load-balancer). |
| 144 | + |
| 145 | +1. Open the same standard internal load balancer that you have created for SAP SID, PR1 system. |
| 146 | +2. **Frontend IP Configuration:** Create frontend IP (example: 10.0.0.45). |
| 147 | +3. **Backend Pool:** Backend Pool is same as that of SAP SID PR1 system. |
| 148 | +4. **Inbound rules:** Create load balancing rule. |
| 149 | + - Frontend IP address: Select frontend IP |
| 150 | + - Backend pool: Select backend pool |
| 151 | + - Check "High availability ports" |
| 152 | + - Protocol: TCP |
| 153 | + - Health Probe: Create health probe with below details |
| 154 | + - Protocol: TCP |
| 155 | + - Port: [for example: 620<Instance-no.> for SAP SID, PR2 ASCS] |
| 156 | + - Interval: 5 |
| 157 | + - Probe Threshold: 2 |
| 158 | + - Idle timeout (minutes): 30 |
| 159 | + - Check "Enable Floating IP" |
| 160 | +5. Applicable to only ENSA2 architecture: Create additional frontend IP (10.0.0.44), load balancing rule (use 621<Instance-no.> for ERS2 health probe port) as described in point 1 and 3. |
| 161 | + |
| 162 | +> [!NOTE] |
| 163 | +> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig) command. |
150 | 164 |
|
151 |
| -You need to add configuration to the existing load balancer for the second SAP SID instance, PR2, for ASCS, SCS, or ERS. The configuration for the first SAP SID, PR1, should be already in place. |
152 |
| - |
153 |
| -#### (A)SCS PR2 [instance number 02] |
154 |
| - |
155 |
| -- Front-end configuration: |
156 |
| - - Static ASCS/SCS IP address 10.0.0.45. |
157 |
| -- Back-end configuration: |
158 |
| - - Already in place. The VMs were added to the back-end pool during configuration of SAP SID PR1. |
159 |
| -- Probe port: |
160 |
| - - Port 620*nr* [62002]. Leave the default options for protocol (TCP), interval (5), and unhealthy threshold (2). |
161 |
| -- Load-balancing rules: |
162 |
| - - If you're using a standard load balancer, select high-availability (HA) ports. |
163 |
| - - If you're using a basic load balancer, create load-balancing rules for the following ports: |
164 |
| - - 32*nr* TCP [3202] |
165 |
| - - 36*nr* TCP [3602] |
166 |
| - - 39*nr* TCP [3902] |
167 |
| - - 81*nr* TCP [8102] |
168 |
| - - 5*nr*13 TCP [50213] |
169 |
| - - 5*nr*14 TCP [50214] |
170 |
| - - 5*nr*16 TCP [50216] |
171 |
| - |
172 |
| - - Associate load-balancing rules with the PR2 ASCS front-end IP address, the health probe, and the existing back-end pool. |
173 |
| - |
174 |
| - - Make sure that idle timeout is set to the maximum value of 30 minutes, and that floating IP (direct server return) is enabled. |
175 |
| - |
176 |
| -#### ERS2 PR2 [instance number 12] |
177 |
| - |
178 |
| -Because ERS2 is clustered, you must configure the ERS2 virtual IP address on an Azure internal load balancer in addition to the preceding SAP ASCS/SCS IP address. This section applies only if you're using the ERS2 architecture for PR2. |
179 |
| - |
180 |
| -- New front-end configuration: |
181 |
| - - Static SAP ERS2 IP address 10.0.0.46. |
182 |
| - |
183 |
| -- Back-end configuration: |
184 |
| - - The VMs were already added to the internal load balancer's back-end pool. |
185 |
| - |
186 |
| -- New probe port: |
187 |
| - - Port 621*nr* [62112]. Leave the default options for protocol (TCP), interval (5), and unhealthy threshold (2). |
188 |
| - |
189 |
| -- New load-balancing rules: |
190 |
| - - If you're using a standard load balancer, select HA ports. |
191 |
| - - If you're using a basic load balancer, create load-balancing rules for the following ports: |
192 |
| - - 32*nr* TCP [3212] |
193 |
| - - 33*nr* TCP [3312] |
194 |
| - - 5*nr*13 TCP [51212] |
195 |
| - - 5*nr*14 TCP [51212] |
196 |
| - - 5*nr*16 TCP [51212] |
197 |
| - |
198 |
| - - Associate load-balancing rules with the PR2 ERS2 front-end IP address, the health probe, and the existing back-end pool. |
| 165 | +> [!IMPORTANT] |
| 166 | +> A floating IP address isn't supported on a network interface card (NIC) secondary IP configuration in load-balancing scenarios. For details, see [Azure Load Balancer limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need another IP address for the VM, deploy a second NIC. |
199 | 167 |
|
200 |
| - - Make sure that idle timeout is set to the maximum value of 30 minutes, and that floating IP (direct server return) is enabled. |
| 168 | +> [!NOTE] |
| 169 | +> When VMs without public IP addresses are placed in the back-end pool of an internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity unless you perform additional configuration to allow routing to public endpoints. For details on how to achieve outbound connectivity, see [Public endpoint connectivity for virtual machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md). |
201 | 170 |
|
202 | 171 | ### Create and attach a second Azure shared disk
|
203 | 172 |
|
|
0 commit comments