You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-suse-pacemaker.md
+44-23Lines changed: 44 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -384,6 +384,9 @@ Run the following commands on the nodes of the new cluster that you want to crea
384
384
[...]
385
385
```
386
386
387
+
> [!NOTE]
388
+
> If the SBD_DELAY_START property value is set to "no", change the value to "yes". You must also check the SBD service file to ensure that the value of TimeoutStartSec is greater than the value of SBD_DELAY_START. For more information, see [SBD file configuraton](https://documentation.suse.com/sle-ha/15-SP5/html/SLE-HA-all/cha-ha-storage-protect.html#pro-ha-storage-protect-sbd-config)
389
+
387
390
1. **[A]** Create the `softdog` configuration file.
388
391
389
392
```bash
@@ -409,39 +412,39 @@ This section applies only if you want to use an SBD device with an Azure shared
409
412
$Location = "MyAzureRegion"
410
413
```
411
414
412
-
1. Define the size of the disk based on available disk size for Premium SSDs. In this example, P1 disk size of 4G is mentioned.
415
+
2. Define the size of the disk based on available disk size for Premium SSDs. In this example, P1 disk size of 4G is mentioned.
413
416
414
417
```bash
415
418
$DiskSizeInGB = 4
416
419
$DiskName = "SBD-disk1"
417
420
```
418
421
419
-
1. With parameter -MaxSharesCount, define the maximum number of cluster nodes to attach the shared disk for the SBD device.
422
+
3. With parameter -MaxSharesCount, define the maximum number of cluster nodes to attach the shared disk for the SBD device.
420
423
421
424
```bash
422
425
$ShareNodes = 2
423
426
```
424
427
425
-
1. For an SBD device that uses LRS for an Azure premium shared disk, use the following storage SkuName:
428
+
4. For an SBD device that uses LRS for an Azure premium shared disk, use the following storage SkuName:
426
429
427
430
```bash
428
431
$SkuName = "Premium_LRS"
429
432
```
430
433
431
-
1. For an SBD device that uses ZRS for an Azure premium shared disk, use the following storage SkuName:
434
+
5. For an SBD device that uses ZRS for an Azure premium shared disk, use the following storage SkuName:
@@ -468,7 +471,21 @@ If you want to deploy resources by using the Azure CLI or the Azure portal, you
468
471
469
472
### Set up an Azure shared disk SBD device
470
473
471
-
1. **[A]** Make sure that the attached disk is available.
474
+
1. **[A]** Install iSCSI package.
475
+
476
+
```bash
477
+
sudo zypper install open-iscsi
478
+
```
479
+
480
+
2. **[A]** Enable the iSCSI and SBD services.
481
+
482
+
```bash
483
+
sudo systemctl enable iscsid
484
+
sudo systemctl enable iscsi
485
+
sudo systemctl enable sbd
486
+
```
487
+
488
+
3. **[A]** Make sure that the attached disk is available.
472
489
473
490
```bash
474
491
# lsblk
@@ -491,7 +508,7 @@ If you want to deploy resources by using the Azure CLI or the Azure portal, you
491
508
[5:0:0:0] disk Msft Virtual Disk 1.0 /dev/sdc
492
509
```
493
510
494
-
1. **[A]** Retrieve the IDs of the attached disks.
511
+
4. **[A]** Retrieve the IDs of the attached disks.
495
512
496
513
```bash
497
514
# ls -l /dev/disk/by-id/scsi-* | grep sdc
@@ -501,15 +518,15 @@ If you want to deploy resources by using the Azure CLI or the Azure portal, you
501
518
502
519
The commands list device IDs for the SBD device. We recommend using the ID that starts with scsi-3. In the preceding example, the ID is **/dev/disk/by-id/scsi-3600224804208a67da8073b2a9728af19**.
503
520
504
-
1. **[1]** Create the SBD device.
521
+
5. **[1]** Create the SBD device.
505
522
506
523
Use the device ID from step 2 to create the new SBD devices on the first cluster node.
@@ -529,13 +546,16 @@ If you want to deploy resources by using the Azure CLI or the Azure portal, you
529
546
[...]
530
547
```
531
548
532
-
1. Create the `softdog` configuration file.
549
+
> [!NOTE]
550
+
> If the SBD_DELAY_START property value is set to "no", change the value to "yes". You must also check the SBD service file to ensure that the value of TimeoutStartSec is greater than the value of SBD_DELAY_START. For more information, see [SBD file configuraton](https://documentation.suse.com/sle-ha/15-SP5/html/SLE-HA-all/cha-ha-storage-protect.html#pro-ha-storage-protect-sbd-config)
551
+
552
+
7. Create the `softdog` configuration file.
533
553
534
554
```bash
535
555
echo softdog | sudo tee /etc/modules-load.d/softdog.conf
536
556
```
537
557
538
-
1. Load the module.
558
+
8. Load the module.
539
559
540
560
```bash
541
561
sudo modprobe -v softdog
@@ -561,7 +581,7 @@ To create a service principal, do the following:
561
581
2. Select **App registrations**.
562
582
3. Select **New registration**.
563
583
4. Enter a name for the registration, and then select **Accounts in this organization directory only**.
564
-
5. For **Application type**, select **Web**, enter a sign-on URL (for example, *http://localhost*), and then select **Add**.
584
+
5. For **Application type**, select **Web**, enter a sign-on URL (for example, *<http://localhost>*), and then select **Add**.
565
585
The sign-on URL isn't used and can be any valid URL.
566
586
6. Select **Certificates and secrets**, and thenselect**New client secret**.
567
587
7. Enter a description for a new key, select**Two years**, and thenselect**Add**.
@@ -934,7 +954,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
934
954
> The 'pcmk_host_map' option is required in the command only if the hostnames and the Azure VM names are *not* identical. Specify the mapping in the format *hostname:vm-name*.
935
955
> Refer to the bold section in the following command.
936
956
937
-
#### [Managed identity](#tab/msi)
957
+
#### [Managed identity](#tab/msi)
938
958
939
959
```bash
940
960
# replace the bold strings with your subscription ID and resource group of the VM
@@ -947,7 +967,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
947
967
sudo crm configure property stonith-timeout=900
948
968
```
949
969
950
-
#### [Service principal](#tab/spn)
970
+
#### [Service principal](#tab/spn)
951
971
952
972
```bash
953
973
# replace the bold strings with your subscription ID, resource group of the VM, tenant ID, service principal application ID and password
@@ -959,7 +979,7 @@ Make sure to assign the custom role to the service principal at all VM (cluster
959
979
960
980
sudo crm configure property stonith-timeout=900
961
981
```
962
-
982
+
963
983
---
964
984
965
985
If you're using fencing device, based on service principal configuration, read [Change from SPN to MSI for Pacemaker clusters using Azure fencing](https://techcommunity.microsoft.com/t5/running-sap-applications-on-the/sap-on-azure-high-availability-change-from-spn-to-msi-for/ba-p/3609278) and learn how to convert to managed identity configuration.
> After you've configured the Pacemaker resources for the azure-events agent, if you place the cluster in or out of maintenance mode, you might get warning messages such as:
0 commit comments