Skip to content

Commit e7dcbb0

Browse files
committed
Appended changes in additional documents
1 parent 108fcf7 commit e7dcbb0

5 files changed

+56
-80
lines changed

articles/sap/workloads/sap-hana-high-availability-netapp-files-suse.md

Lines changed: 27 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Read the following SAP Notes and papers first:
6060
- [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md)
6161
- [Azure Virtual Machines planning and implementation for SAP on Linux](./planning-guide.md)
6262

63-
>[!NOTE]
63+
> [!NOTE]
6464
> This article contains references to a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
6565
6666
## Overview
@@ -108,12 +108,12 @@ As you create your Azure NetApp Files for SAP HANA Scale-up systems, be aware of
108108

109109
The throughput of an Azure NetApp Files volume is a function of the volume size and service level, as documented in [Service level for Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-service-levels.md).
110110

111-
While designing the infrastructure for SAP HANA on Azure with Azure NetApp Files, be aware of the recommendations in [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md#sizing-for-hana-database-on-azure-netapp-files).
111+
While designing the infrastructure for SAP HANA on Azure with Azure NetApp Files, be aware of the recommendations in [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md#sizing-for-hana-database-on-azure-netapp-files).
112112

113-
The configuration in this article is presented with simple Azure NetApp Files Volumes.
113+
The configuration in this article is presented with simple Azure NetApp Files Volumes.
114114

115115
> [!IMPORTANT]
116-
> For production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
116+
> For production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
117117
118118
> [!NOTE]
119119
> All commands to mount /hana/shared in this article are presented for NFSv4.1 /hana/shared volumes.
@@ -144,46 +144,36 @@ The following instructions assume that you've already deployed your [Azure virtu
144144
- Volume hanadb2-log-mnt00001 (nfs://10.3.1.4:/hanadb2-log-mnt00001)
145145
- Volume hanadb2-shared-mnt00001 (nfs://10.3.1.4:/hanadb2-shared-mnt00001)
146146

147+
## Prepare the infrastructure
148+
149+
The resource agent for SAP HANA is included in SUSE Linux Enterprise Server for SAP Applications. An image for SUSE Linux Enterprise Server for SAP Applications 12 or 15 is available in Azure Marketplace. You can use the image to deploy new VMs.
147150

148-
## Deploy Linux virtual machine via Azure portal
151+
### Deploy Linux VMs manually via Azure portal
149152

150153
This document assumes that you've already deployed a resource group, [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md), and subnet.
151154

152-
Deploy virtual machines for SAP HANA. Choose a suitable SLES image that is supported for HANA system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
155+
Deploy virtual machines for SAP HANA. Choose a suitable SLES image that is supported for HANA system. You can deploy VM in any one of the availability options - virtual machine scale set, availability zone or availability set.
153156

154157
> [!IMPORTANT]
155158
> Make sure that the OS you select is SAP certified for SAP HANA on the specific VM types that you plan to use in your deployment. You can look up SAP HANA-certified VM types and their OS releases in [SAP HANA Certified IaaS Platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120). Make sure that you look at the details of the VM type to get the complete list of SAP HANA-supported OS releases for the specific VM type.
156159
157-
During VM configuration, we won't be adding any disk as all our mount points are on NFS shares from Azure NetApp Files. Also, you have an option to create or select exiting load balancer in networking section. If you're creating a new load balancer, follow below steps -
158-
159-
1. To set up standard load balancer, follow these configuration steps:
160-
1. First, create a front-end IP pool:
161-
1. Open the load balancer, select **frontend IP configuration**, and select **Add**.
162-
2. Enter the name of the new front-end IP (for example, **hana-frontend**).
163-
3. Set the **Assignment** to **Static** and enter the IP address (for example, **10.3.0.50**).
164-
4. Select **OK**.
165-
5. After the new front-end IP pool is created, note the pool IP address.
166-
2. Create a single back-end pool:
167-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
168-
2. Enter the name of the new back-end pool (for example, **hana-backend**).
169-
3. Select **NIC** for Backend Pool Configuration.
170-
4. Select **Add a virtual machine**.
171-
5. Select the virtual machines of the HANA cluster.
172-
6. Select **Add**.
173-
7. Select **Save**.
174-
3. Next, create a health probe:
175-
1. Open the load balancer, select **health probes**, and select **Add**.
176-
2. Enter the name of the new health probe (for example, **hana-hp**).
177-
3. Select TCP as the protocol and port 625**03**. Keep the **Interval** value set to 5.
178-
4. Select **OK**.
179-
4. Next, create the load-balancing rules:
180-
1. Open the load balancer, select **load balancing rules**, and select **Add**.
181-
2. Enter the name of the new load balancer rule (for example, **hana-lb**).
182-
3. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend** and **hana-hp**).
183-
1. Increase idle timeout to 30 minutes
184-
4. Select **HA Ports**.
185-
5. Make sure to **enable Floating IP**.
186-
6. Select **OK**.
160+
### Configure Azure load balancer
161+
162+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow below steps, to setup standard load balancer for high availability setup of HANA database.
163+
164+
#### [Azure Portal](#tab/lb-portal)
165+
166+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
167+
168+
#### [Azure CLI](#tab/lb-azurecli)
169+
170+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
171+
172+
#### [PowerShell](#tab/lb-powershell)
173+
174+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
175+
176+
---
187177

188178
For more information about the required ports for SAP HANA, read the chapter [Connections to Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6/latest/en-US/7a9343c9f2a2436faa3cfdb5ca00c052.html) in the [SAP HANA Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6) guide or SAP Note [2388694](https://launchpad.support.sap.com/#/notes/2388694).
189179

@@ -194,7 +184,7 @@ For more information about the required ports for SAP HANA, read the chapter [Co
194184
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
195185
196186
> [!IMPORTANT]
197-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md). See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
187+
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter `net.ipv4.tcp_timestamps` to `0`. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md). See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
198188
199189
## Mount the Azure NetApp Files volume
200190

articles/sap/workloads/sap-hana-high-availability-scale-out-hsr-suse.md

Lines changed: 26 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ The presented configuration shows three HANA nodes on each site, plus majority m
7373

7474
The HANA shared file system `/hana/shared` in the presented architecture can be provided by [Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-introduction.md) or [NFS share on Azure Files](../../storage/files/files-nfs-protocol.md). The HANA shared file system is NFS mounted on each HANA node in the same HANA system replication site. File systems `/hana/data` and `/hana/log` are local file systems and aren't shared between the HANA DB nodes. SAP HANA will be installed in non-shared mode.
7575

76-
For recommended SAP HANA storage configurations, see [SAP HANA Azure VMs storage configurations](./hana-vm-operations-storage.md).
76+
For recommended SAP HANA storage configurations, see [SAP HANA Azure VMs storage configurations](./hana-vm-operations-storage.md).
7777

7878
> [!IMPORTANT]
7979
> If deploying all HANA file systems on Azure NetApp Files, for production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
@@ -93,7 +93,7 @@ As `/hana/data` and `/hana/log` are deployed on local disks, it isn't necessary
9393

9494
If you're using Azure NetApp Files, the NFS volumes for `/hana/shared`, are deployed in a separate subnet, [delegated to Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-delegate-subnet.md): `anf` 10.23.1.0/26.
9595

96-
## Set up the infrastructure
96+
## Prepare the infrastructure
9797

9898
In the instructions that follow, we assume that you've already created the resource group, the Azure virtual network with three Azure network subnets: `client`, `inter` and `hsr`.
9999

@@ -117,8 +117,9 @@ In the instructions that follow, we assume that you've already created the resou
117117
When the VM is deployed via Azure portal, the network interface name is automatically generated. In these instructions for simplicity we'll refer to the automatically generated, primary network interfaces, which are attached to the `client` Azure virtual network subnet as **hana-s1-db1-client**, **hana-s1-db2-client**, **hana-s1-db3-client**, and so on.
118118

119119
> [!IMPORTANT]
120-
> Make sure that the OS you select is SAP-certified for SAP HANA on the specific VM types you're using. For a list of SAP HANA certified VM types and OS releases for those types, go to the [SAP HANA certified IaaS platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120) site. Click into the details of the listed VM type to get the complete list of SAP HANA-supported OS releases for that type.
121-
> If you choose to deploy `/hana/shared` on NFS on Azure Files, we recommend to deploy on SLES15 SP2 and above.
120+
>
121+
> * Make sure that the OS you select is SAP-certified for SAP HANA on the specific VM types you're using. For a list of SAP HANA certified VM types and OS releases for those types, go to the [SAP HANA certified IaaS platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120) site. Click into the details of the listed VM type to get the complete list of SAP HANA-supported OS releases for that type.
122+
> * If you choose to deploy `/hana/shared` on NFS on Azure Files, we recommend to deploy on SLES 15 SP2 and above.
122123
123124
2. Create six network interfaces, one for each HANA DB virtual machine, in the `inter` virtual network subnet (in this example, **hana-s1-db1-inter**, **hana-s1-db2-inter**, **hana-s1-db3-inter**, **hana-s2-db1-inter**, **hana-s2-db2-inter**, and **hana-s2-db3-inter**).
124125

@@ -157,54 +158,39 @@ In the instructions that follow, we assume that you've already created the resou
157158

158159
6. Start the HANA DB virtual machines
159160

160-
### Deploy Azure Load Balancer
161+
### Configure Azure load balancer
161162

162-
1. We recommend using standard load balancer. Follow these configuration steps to deploy standard load balancer:
163+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow below steps, to setup standard load balancer for high availability setup of HANA database.
163164

164-
1. First, create a front-end IP pool:
165+
> [!NOTE]
166+
>
167+
> * For HANA scale out, select the NIC for the `client` subnet when adding the virtual machines in the backend pool.
168+
> * The full set of command in Azure CLI and PowerShell adds the VMs with primary NIC in the backend pool.
165169

166-
1. Open the load balancer, select **frontend IP pool**, and select **Add**.
167-
2. Enter the name of the new front-end IP pool (for example, **hana-frontend**).
168-
3. Set the **Assignment** to **Static** and enter the IP address (for example, **10.23.0.27**).
169-
4. Select **OK**.
170-
5. After the new front-end IP pool is created, note the pool IP address.
170+
#### [Azure Portal](#tab/lb-portal)
171171

172-
2. Create a single back-end pool:
172+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
173173

174-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
175-
2. Enter the name of the new back-end pool (for example, **hana-backend**).
176-
3. Select **NIC** for Backend Pool Configuration.
177-
4. Select **Add a virtual machine**.
178-
5. Select the virtual machines of the HANA cluster (the NICs for the `client` subnet).
179-
6. Select **Add**.
180-
7. Select **Save**.
174+
#### [Azure CLI](#tab/lb-azurecli)
181175

182-
3. Next, create a health probe:
176+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
183177

184-
1. Open the load balancer, select **health probes**, and select **Add**.
185-
2. Enter the name of the new health probe (for example, **hana-hp**).
186-
3. Select **TCP** as the protocol and port 625**03**. Keep the **Interval** value set to 5.
187-
4. Select **OK**.
178+
#### [PowerShell](#tab/lb-powershell)
188179

189-
4. Next, create the load-balancing rules:
180+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
190181

191-
1. Open the load balancer, select **load balancing rules**, and select **Add**.
192-
2. Enter the name of the new load balancer rule (for example, **hana-lb**).
193-
3. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend** and **hana-hp**).
194-
4. Increase idle timeout to 30 minutes.
195-
5. Select **HA Ports**.
196-
6. Make sure to **enable Floating IP**.
197-
7. Select **OK**.
182+
---
198183

199-
> [!IMPORTANT]
200-
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
184+
> [!IMPORTANT]
185+
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
201186

202-
> [!NOTE]
203-
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
187+
> [!NOTE]
188+
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
204189

205-
> [!IMPORTANT]
206-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
207-
> See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
190+
> [!IMPORTANT]
191+
>
192+
> * Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter `net.ipv4.tcp_timestamps` to `0`. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
193+
> * See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
208194

209195
### Deploy NFS
210196

includes/sap-load-balancer-db-azurecli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@ az network nic ip-config address-pool add --address-pool MyBackendPool --ip-conf
2424
az network nic ip-config address-pool add --address-pool MyBackendPool --ip-config-name DBVm2IpConfigName --nic-name DBVm2NicName -g MyResourceGroup --lb-name MyLB
2525
```
2626

27+
</br>
2728
<details>
28-
2929
<summary>Expand to view full CLI code</summary>
3030

3131
```azurecli-interactive

includes/sap-load-balancer-db-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@ Follow [create load balancer](../articles/load-balancer/quickstart-load-balancer
2727

2828
> [!NOTE]
2929
>
30-
> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe?view=azure-cli-latest) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig?view=azps-11.1.0) command.
30+
> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig) command.

includes/sap-load-balancer-db-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ $db_rule = New-AzLoadBalancerRuleConfig -Name MyDBRuleName -Probe $db_healthprob
2626
$lb = New-AzLoadBalancer -ResourceGroupName MyResourceGroup -Name MyLB -Location MyRegion -Sku 'Standard' -FrontendIpConfiguration $db_fip -BackendAddressPool $bePool -LoadBalancingRule $db_rule -Probe $db_healthprobe
2727
```
2828

29+
</br>
2930
<details>
30-
3131
<summary>Expand to view full PowerShell code</summary>
3232

3333
```azurepowershell-interactive

0 commit comments

Comments
 (0)