You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/sap-hana-high-availability-netapp-files-suse.md
+27-37Lines changed: 27 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ Read the following SAP Notes and papers first:
60
60
-[NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md)
61
61
-[Azure Virtual Machines planning and implementation for SAP on Linux](./planning-guide.md)
62
62
63
-
>[!NOTE]
63
+
>[!NOTE]
64
64
> This article contains references to a term that Microsoft no longer uses. When the term is removed from the software, we’ll remove it from this article.
65
65
66
66
## Overview
@@ -108,12 +108,12 @@ As you create your Azure NetApp Files for SAP HANA Scale-up systems, be aware of
108
108
109
109
The throughput of an Azure NetApp Files volume is a function of the volume size and service level, as documented in [Service level for Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-service-levels.md).
110
110
111
-
While designing the infrastructure for SAP HANA on Azure with Azure NetApp Files, be aware of the recommendations in [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md#sizing-for-hana-database-on-azure-netapp-files).
111
+
While designing the infrastructure for SAP HANA on Azure with Azure NetApp Files, be aware of the recommendations in [NFS v4.1 volumes on Azure NetApp Files for SAP HANA](./hana-vm-operations-netapp.md#sizing-for-hana-database-on-azure-netapp-files).
112
112
113
-
The configuration in this article is presented with simple Azure NetApp Files Volumes.
113
+
The configuration in this article is presented with simple Azure NetApp Files Volumes.
114
114
115
115
> [!IMPORTANT]
116
-
> For production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
116
+
> For production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
117
117
118
118
> [!NOTE]
119
119
> All commands to mount /hana/shared in this article are presented for NFSv4.1 /hana/shared volumes.
@@ -144,46 +144,36 @@ The following instructions assume that you've already deployed your [Azure virtu
The resource agent for SAP HANA is included in SUSE Linux Enterprise Server for SAP Applications. An image for SUSE Linux Enterprise Server for SAP Applications 12 or 15 is available in Azure Marketplace. You can use the image to deploy new VMs.
147
150
148
-
## Deploy Linux virtual machine via Azure portal
151
+
###Deploy Linux VMs manually via Azure portal
149
152
150
153
This document assumes that you've already deployed a resource group, [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md), and subnet.
151
154
152
-
Deploy virtual machines for SAP HANA. Choose a suitable SLES image that is supported for HANA system. You can deploy VM in any one of the availability options - scale set, availability zone or availability set.
155
+
Deploy virtual machines for SAP HANA. Choose a suitable SLES image that is supported for HANA system. You can deploy VM in any one of the availability options - virtual machine scale set, availability zone or availability set.
153
156
154
157
> [!IMPORTANT]
155
158
> Make sure that the OS you select is SAP certified for SAP HANA on the specific VM types that you plan to use in your deployment. You can look up SAP HANA-certified VM types and their OS releases in [SAP HANA Certified IaaS Platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120). Make sure that you look at the details of the VM type to get the complete list of SAP HANA-supported OS releases for the specific VM type.
156
159
157
-
During VM configuration, we won't be adding any disk as all our mount points are on NFS shares from Azure NetApp Files. Also, you have an option to create or select exiting load balancer in networking section. If you're creating a new load balancer, follow below steps -
158
-
159
-
1. To set up standard load balancer, follow these configuration steps:
160
-
1. First, create a front-end IP pool:
161
-
1. Open the load balancer, select **frontend IP configuration**, and select **Add**.
162
-
2. Enter the name of the new front-end IP (for example, **hana-frontend**).
163
-
3. Set the **Assignment** to **Static** and enter the IP address (for example, **10.3.0.50**).
164
-
4. Select **OK**.
165
-
5. After the new front-end IP pool is created, note the pool IP address.
166
-
2. Create a single back-end pool:
167
-
1. Open the load balancer, select **Backend pools**, and then select **Add**.
168
-
2. Enter the name of the new back-end pool (for example, **hana-backend**).
169
-
3. Select **NIC** for Backend Pool Configuration.
170
-
4. Select **Add a virtual machine**.
171
-
5. Select the virtual machines of the HANA cluster.
172
-
6. Select **Add**.
173
-
7. Select **Save**.
174
-
3. Next, create a health probe:
175
-
1. Open the load balancer, select **health probes**, and select **Add**.
176
-
2. Enter the name of the new health probe (for example, **hana-hp**).
177
-
3. Select TCP as the protocol and port 625**03**. Keep the **Interval** value set to 5.
178
-
4. Select **OK**.
179
-
4. Next, create the load-balancing rules:
180
-
1. Open the load balancer, select **load balancing rules**, and select **Add**.
181
-
2. Enter the name of the new load balancer rule (for example, **hana-lb**).
182
-
3. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend** and **hana-hp**).
183
-
1. Increase idle timeout to 30 minutes
184
-
4. Select **HA Ports**.
185
-
5. Make sure to **enable Floating IP**.
186
-
6. Select **OK**.
160
+
### Configure Azure load balancer
161
+
162
+
During VM configuration, you have an option to create or select exiting load balancer in networking section. Follow below steps, to setup standard load balancer for high availability setup of HANA database.
163
+
164
+
#### [Azure Portal](#tab/lb-portal)
165
+
166
+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
167
+
168
+
#### [Azure CLI](#tab/lb-azurecli)
169
+
170
+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
171
+
172
+
#### [PowerShell](#tab/lb-powershell)
173
+
174
+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
175
+
176
+
---
187
177
188
178
For more information about the required ports for SAP HANA, read the chapter [Connections to Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6/latest/en-US/7a9343c9f2a2436faa3cfdb5ca00c052.html) in the [SAP HANA Tenant Databases](https://help.sap.com/viewer/78209c1d3a9b41cd8624338e42a12bf6) guide or SAP Note [2388694](https://launchpad.support.sap.com/#/notes/2388694).
189
179
@@ -194,7 +184,7 @@ For more information about the required ports for SAP HANA, read the chapter [Co
194
184
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity for Virtual Machines using Azure Standard Load Balancer in SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
195
185
196
186
> [!IMPORTANT]
197
-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md). See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
187
+
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter `net.ipv4.tcp_timestamps` to `0`. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md). See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
Copy file name to clipboardExpand all lines: articles/sap/workloads/sap-hana-high-availability-scale-out-hsr-suse.md
+26-40Lines changed: 26 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ The presented configuration shows three HANA nodes on each site, plus majority m
73
73
74
74
The HANA shared file system `/hana/shared` in the presented architecture can be provided by [Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-introduction.md) or [NFS share on Azure Files](../../storage/files/files-nfs-protocol.md). The HANA shared file system is NFS mounted on each HANA node in the same HANA system replication site. File systems `/hana/data` and `/hana/log` are local file systems and aren't shared between the HANA DB nodes. SAP HANA will be installed in non-shared mode.
75
75
76
-
For recommended SAP HANA storage configurations, see [SAP HANA Azure VMs storage configurations](./hana-vm-operations-storage.md).
76
+
For recommended SAP HANA storage configurations, see [SAP HANA Azure VMs storage configurations](./hana-vm-operations-storage.md).
77
77
78
78
> [!IMPORTANT]
79
79
> If deploying all HANA file systems on Azure NetApp Files, for production systems, where performance is a key, we recommend to evaluate and consider using [Azure NetApp Files application volume group for SAP HANA](hana-vm-operations-netapp.md#deployment-through-azure-netapp-files-application-volume-group-for-sap-hana-avg).
@@ -93,7 +93,7 @@ As `/hana/data` and `/hana/log` are deployed on local disks, it isn't necessary
93
93
94
94
If you're using Azure NetApp Files, the NFS volumes for `/hana/shared`, are deployed in a separate subnet, [delegated to Azure NetApp Files](../../azure-netapp-files/azure-netapp-files-delegate-subnet.md): `anf` 10.23.1.0/26.
95
95
96
-
## Set up the infrastructure
96
+
## Prepare the infrastructure
97
97
98
98
In the instructions that follow, we assume that you've already created the resource group, the Azure virtual network with three Azure network subnets: `client`, `inter` and `hsr`.
99
99
@@ -117,8 +117,9 @@ In the instructions that follow, we assume that you've already created the resou
117
117
When the VM is deployed via Azure portal, the network interface name is automatically generated. In these instructions for simplicity we'll refer to the automatically generated, primary network interfaces, which are attached to the `client` Azure virtual network subnet as **hana-s1-db1-client**, **hana-s1-db2-client**, **hana-s1-db3-client**, and so on.
118
118
119
119
> [!IMPORTANT]
120
-
> Make sure that the OS you select is SAP-certified for SAP HANA on the specific VM types you're using. For a list of SAP HANA certified VM types and OS releases for those types, go to the [SAP HANA certified IaaS platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120) site. Click into the details of the listed VM type to get the complete list of SAP HANA-supported OS releases for that type.
121
-
> If you choose to deploy `/hana/shared` on NFS on Azure Files, we recommend to deploy on SLES15 SP2 and above.
120
+
>
121
+
> * Make sure that the OS you select is SAP-certified for SAP HANA on the specific VM types you're using. For a list of SAP HANA certified VM types and OS releases for those types, go to the [SAP HANA certified IaaS platforms](https://www.sap.com/dmc/exp/2014-09-02-hana-hardware/enEN/#/solutions?filters=v:deCertified;ve:24;iaas;v:125;v:105;v:99;v:120) site. Click into the details of the listed VM type to get the complete list of SAP HANA-supported OS releases for that type.
122
+
> * If you choose to deploy `/hana/shared` on NFS on Azure Files, we recommend to deploy on SLES 15 SP2 and above.
122
123
123
124
2. Create six network interfaces, one for each HANA DB virtual machine, in the `inter` virtual network subnet (in this example, **hana-s1-db1-inter**, **hana-s1-db2-inter**, **hana-s1-db3-inter**, **hana-s2-db1-inter**, **hana-s2-db2-inter**, and **hana-s2-db3-inter**).
124
125
@@ -157,54 +158,39 @@ In the instructions that follow, we assume that you've already created the resou
157
158
158
159
6. Start the HANA DB virtual machines
159
160
160
-
### Deploy Azure Load Balancer
161
+
### Configure Azure load balancer
161
162
162
-
1. We recommend using standard load balancer. Follow these configuration steps to deploy standard load balancer:
163
+
During VM configuration, you have an option to create or selectexitingload balancerin networking section. Follow below steps, to setup standard load balancerfor high availability setup of HANA database.
163
164
164
-
1. First, create a front-end IP pool:
165
+
> [!NOTE]
166
+
>
167
+
>* For HANA scale out, selectthe NIC forthe `client` subnet when adding the virtual machinesin the backend pool.
168
+
>* The full set of commandin Azure CLI and PowerShell adds the VMs with primary NIC in the backend pool.
165
169
166
-
1. Open the load balancer, select**frontend IP pool**, and select**Add**.
167
-
2. Enter the name of the new front-end IP pool (for example, **hana-frontend**).
168
-
3. Set the **Assignment** to **Static** and enter the IP address (for example, **10.23.0.27**).
169
-
4. Select **OK**.
170
-
5. After the new front-end IP pool is created, note the pool IP address.
170
+
#### [Azure Portal](#tab/lb-portal)
171
171
172
-
2. Create a single back-end pool:
172
+
[!INCLUDE [Configure Azure standard load balancer using Azure portal](../../../includes/sap-load-balancer-db-portal.md)]
173
173
174
-
1. Open the load balancer, select**Backend pools**, and thenselect**Add**.
175
-
2. Enter the name of the new back-end pool (for example, **hana-backend**).
176
-
3. Select **NIC**for Backend Pool Configuration.
177
-
4. Select **Add a virtual machine**.
178
-
5. Select the virtual machines of the HANA cluster (the NICs for the `client` subnet).
179
-
6. Select **Add**.
180
-
7. Select **Save**.
174
+
#### [Azure CLI](#tab/lb-azurecli)
181
175
182
-
3. Next, create a health probe:
176
+
[!INCLUDE [Configure Azure standard load balancer using Azure CLI](../../../includes/sap-load-balancer-db-azurecli.md)]
183
177
184
-
1. Open the load balancer, select**health probes**, and select**Add**.
185
-
2. Enter the name of the new health probe (for example, **hana-hp**).
186
-
3. Select **TCP** as the protocol and port 625**03**. Keep the **Interval** value set to 5.
187
-
4. Select **OK**.
178
+
#### [PowerShell](#tab/lb-powershell)
188
179
189
-
4. Next, create the load-balancing rules:
180
+
[!INCLUDE [Configure Azure standard load balancer using PowerShell](../../../includes/sap-load-balancer-db-powershell.md)]
190
181
191
-
1. Open the load balancer, select**load balancing rules**, and select**Add**.
192
-
2. Enter the name of the new load balancer rule (for example, **hana-lb**).
193
-
3. Select the front-end IP address, the back-end pool, and the health probe that you created earlier (for example, **hana-frontend**, **hana-backend** and **hana-hp**).
194
-
4. Increase idle timeout to 30 minutes.
195
-
5. Select **HA Ports**.
196
-
6. Make sure to **enable Floating IP**.
197
-
7. Select **OK**.
182
+
---
198
183
199
-
> [!IMPORTANT]
200
-
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
184
+
> [!IMPORTANT]
185
+
> Floating IP is not supported on a NIC secondary IP configuration in load-balancing scenarios. For details see [Azure Load balancer Limitations](../../load-balancer/load-balancer-multivip-overview.md#limitations). If you need additional IP address for the VM, deploy a second NIC.
201
186
202
-
> [!NOTE]
203
-
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity forVirtual Machines using Azure Standard Load Balancerin SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
187
+
> [!NOTE]
188
+
> When VMs without public IP addresses are placed in the backend pool of internal (no public IP address) Standard Azure load balancer, there will be no outbound internet connectivity, unless additional configuration is performed to allow routing to public end points. For details on how to achieve outbound connectivity see [Public endpoint connectivity forVirtual Machines using Azure Standard Load Balancerin SAP high-availability scenarios](./high-availability-guide-standard-load-balancer-outbound-connections.md).
204
189
205
-
> [!IMPORTANT]
206
-
> Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter **net.ipv4.tcp_timestamps** to **0**. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
207
-
> See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
190
+
> [!IMPORTANT]
191
+
>
192
+
>* Do not enable TCP timestamps on Azure VMs placed behind Azure Load Balancer. Enabling TCP timestamps will cause the health probes to fail. Set parameter `net.ipv4.tcp_timestamps` to `0`. For details see [Load Balancer health probes](../../load-balancer/load-balancer-custom-probe-overview.md).
193
+
>* See also SAP note [2382421](https://launchpad.support.sap.com/#/notes/2382421).
> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe?view=azure-cli-latest) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig?view=azps-11.1.0) command.
30
+
> Health probe configuration property numberOfProbes, otherwise known as "Unhealthy threshold" in Portal, isn't respected. So to control the number of successful or failed consecutive probes, set the property "probeThreshold" to 2. It is currently not possible to set this property using Azure portal, so use either the [Azure CLI](/cli/azure/network/lb/probe) or [PowerShell](/powershell/module/az.network/new-azloadbalancerprobeconfig) command.
0 commit comments