Skip to content

Commit f503565

Browse files
authored
Merge pull request #180347 from pvrk/Nov2021
FQDN updates
2 parents 1a4db93 + 881ba6e commit f503565

File tree

4 files changed

+6
-65
lines changed

4 files changed

+6
-65
lines changed

articles/backup/azure-backup-architecture-for-sap-hana-backup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ See the [high-level architecture of Azure Backup for SAP HANA databases](./sap-h
4646
1. Also, ensure that the [other pre-requisites](./tutorial-backup-sap-hana-db.md#prerequisites) are fulfilled.
4747

4848
>[!Important]
49-
>Ensure that the prerequisite to set up the right network connectivity is met. See the recommendation on [how to set up Azure VMs running in SAP HANA with additional network components to use the backup offering](./tutorial-backup-sap-hana-db.md#set-up-network-connectivity).
49+
>Ensure that the prerequisite to set up the right network connectivity is met. See the recommendation on [how to set up Azure VMs running in SAP HANA with additional network components to use the backup offering](./backup-azure-sap-hana-database.md#establish-network-connectivity).
5050
5151
1. See the details about [what the pre-registration script does](./tutorial-backup-sap-hana-db.md#what-the-pre-registration-script-does). If you attempt to configure backup for SAP HANA databases without running this script, you might receive the error _UserErrorHanaScriptNotRun_.
5252

articles/backup/backup-azure-sap-hana-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The following table lists the various alternatives you can use for establishing
4343
| Allow access to service FQDNs/IPs | No additional costs <br><br> Works with all network security appliances and firewalls | A broad set of IPs or FQDNs may be required to be accessed |
4444
| Use an HTTP proxy | Single point of internet access to VMs | Additional costs to run a VM with the proxy software |
4545
| [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) | Can be used for Azure Storage (= Recovery Services vault). <br><br> Provides large benefit to optimize performance of data plane traffic. | Can’t be used for Azure AD, Azure Backup service. |
46-
| Network Virtual Appliance | Can be used for Azure Storage, Azure AD, Azure Backup service. <br><br> **Data plane** <ul><li> Azure Storage: `*.blob.core.windows.net`, `*.queue.core.windows.net` </li></ul> <br><br> **Management plane** <ul><li> Azure AD: Allow access to FQDNs mentioned in sections 56 and 59 of [Microsoft 365 Common and Office Online](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&preserve-view=true#microsoft-365-common-and-office-online). </li><li> Azure Backup service: `.backup.windowsazure.com` </li></ul> <br>Learn more about [Azure Firewall service tags](../firewall/fqdn-tags.md). | Adds overhead to data plane traffic and decrease throughput/performance. |
46+
| Network Virtual Appliance | Can be used for Azure Storage, Azure AD, Azure Backup service. <br><br> **Data plane** <ul><li> Azure Storage: `*.blob.core.windows.net`, `*.queue.core.windows.net`, `*.blob.storage.azure.net` </li></ul> <br><br> **Management plane** <ul><li> Azure AD: Allow access to FQDNs mentioned in sections 56 and 59 of [Microsoft 365 Common and Office Online](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&preserve-view=true#microsoft-365-common-and-office-online). </li><li> Azure Backup service: `.backup.windowsazure.com` </li></ul> <br>Learn more about [Azure Firewall service tags](../firewall/fqdn-tags.md). | Adds overhead to data plane traffic and decrease throughput/performance. |
4747

4848
More details around using these options are shared below:
4949

articles/backup/tutorial-backup-sap-hana-db.md

Lines changed: 3 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This tutorial shows you how to back up SAP HANA databases running on Azure VMs t
2222
Make sure you do the following before configuring backups:
2323

2424
* Identify or create a [Recovery Services vault](backup-sql-server-database-azure-vms.md#create-a-recovery-services-vault) in the same region and subscription as the VM running SAP HANA.
25-
* Allow connectivity from the VM to the internet, so that it can reach Azure, as described in the [set up network connectivity](#set-up-network-connectivity) procedure below.
25+
* Allow connectivity from the VM to the internet, so that it can reach Azure, as described in the [set up network connectivity](backup-azure-sap-hana-database.md#establish-network-connectivity) section.
2626
* Ensure that the combined length of the SAP HANA Server VM name and the Resource Group name doesn't exceed 84 characters for Azure Resource Manager (ARM_ VMs (and 77 characters for classic VMs). This limitation is because some characters are reserved by the service.
2727
* A key should exist in the **hdbuserstore** that fulfills the following criteria:
2828
* It should be present in the default **hdbuserstore**. The default is the `<sid>adm` account under which SAP HANA is installed.
@@ -36,65 +36,6 @@ Make sure you do the following before configuring backups:
3636
>[!NOTE]
3737
>The preregistration script installs the **compat-unixODBC234** for SAP HANA workloads running on RHEL (7.4, 7.6 and 7.7) and **unixODBC** for RHEL 8.1. [This package is located in the RHEL for SAP HANA (for RHEL 7 Server) Update Services for SAP Solutions (RPMs) repo](https://access.redhat.com/solutions/5094721). For an Azure Marketplace RHEL image the repo would be **rhui-rhel-sap-hana-for-rhel-7-server-rhui-e4s-rpms**.
3838
39-
## Set up network connectivity
40-
41-
For all operations, an SAP HANA database running on an Azure VM requires connectivity to the Azure Backup service, Azure Storage, and Azure Active Directory. This can be achieved by using private endpoints or by allowing access to the required public IP addresses or FQDNs. Not allowing proper connectivity to the required Azure services may lead to failure in operations like database discovery, configuring backup, performing backups, and restoring data.
42-
43-
The following table lists the various alternatives you can use for establishing connectivity:
44-
45-
| **Option** | **Advantages** | **Disadvantages** |
46-
| --------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
47-
| Private endpoints | Allow backups over private IPs inside the virtual network <br><br> Provide granular control on the network and vault side | Incurs standard private endpoint [costs](https://azure.microsoft.com/pricing/details/private-link/) |
48-
| NSG service tags | Easier to manage as range changes are automatically merged <br><br> No additional costs | Can be used with NSGs only <br><br> Provides access to the entire service |
49-
| Azure Firewall FQDN tags | Easier to manage since the required FQDNs are automatically managed | Can be used with Azure Firewall only |
50-
| Allow access to service FQDNs/IPs | No additional costs <br><br> Works with all network security appliances and firewalls | A broad set of IPs or FQDNs may be required to be accessed |
51-
| Use an HTTP proxy | Single point of internet access to VMs | Additional costs to run a VM with the proxy software |
52-
| [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) | Can be used for Azure Storage (= Recovery Services vault). <br><br> Provides large benefit to optimize performance of data plane traffic. | Can’t be used for Azure AD, Azure Backup service. |
53-
| Network Virtual Appliance | Can be used for Azure Storage, Azure AD, Azure Backup service. <br><br> **Data plane** <ul><li> Azure Storage: `*.blob.core.windows.net`, `*.queue.core.windows.net` </li></ul> <br><br> **Management plane** <ul><li> Azure AD: Allow access to FQDNs mentioned in sections 56 and 59 of [Microsoft 365 Common and Office Online](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&preserve-view=true#microsoft-365-common-and-office-online). </li><li> Azure Backup service: `.backup.windowsazure.com` </li></ul> <br>Learn more about [Azure Firewall service tags](../firewall/fqdn-tags.md). | Adds overhead to data plane traffic and decrease throughput/performance. |
54-
55-
More details around using these options are shared below:
56-
57-
### Private endpoints
58-
59-
Private endpoints allow you to connect securely from servers inside a virtual network to your Recovery Services vault. The private endpoint uses a private IP from the VNET address space for your vault. The network traffic between your resources inside the virtual network and the vault travels over your virtual network and a private link on the Microsoft backbone network. This eliminates exposure from the public internet. A private endpoint is assigned to a specific subnet of a virtual network and can't be used for Azure Active Directory. Read more on private endpoints for Azure Backup [here](./private-endpoints.md).
60-
61-
### NSG tags
62-
63-
If you use Network Security Groups (NSG), use the *AzureBackup* service tag to allow outbound access to Azure Backup. In addition to the Azure Backup tag, you also need to allow connectivity for authentication and data transfer by creating similar [NSG rules](../virtual-network/network-security-groups-overview.md#service-tags) for Azure AD (*AzureActiveDirectory*) and Azure Storage(*Storage*). The following steps describe the process to create a rule for the Azure Backup tag:
64-
65-
1. In **All Services**, go to **Network security groups** and select the network security group.
66-
67-
1. Select **Outbound security rules** under **Settings**.
68-
69-
1. Select **Add**. Enter all the required details for creating a new rule as described in [security rule settings](../virtual-network/manage-network-security-group.md#security-rule-settings). Ensure the option **Destination** is set to *Service Tag* and **Destination service tag** is set to *AzureBackup*.
70-
71-
1. Select **Add** to save the newly created outbound security rule.
72-
73-
You can similarly create [NSG outbound security rules](../virtual-network/network-security-groups-overview.md#service-tags) for Azure Storage and Azure AD. For more information on service tags, see [this article](../virtual-network/service-tags-overview.md).
74-
75-
### Azure Firewall tags
76-
77-
If you're using Azure Firewall, create an application rule by using the *AzureBackup* [Azure Firewall FQDN tag](../firewall/fqdn-tags.md). This allows all outbound access to Azure Backup.
78-
79-
### Allow access to service IP ranges
80-
81-
If you choose to allow access service IPs, refer to the IP ranges in the JSON file available [here](https://www.microsoft.com/download/confirmation.aspx?id=56519). You'll need to allow access to IPs corresponding to Azure Backup, Azure Storage, and Azure Active Directory.
82-
83-
### Allow access to service FQDNs
84-
85-
You can also use the following FQDNs to allow access to the required services from your servers:
86-
87-
| Service | Domain names to be accessed |
88-
| -------------- | ------------------------------------------------------------ |
89-
| Azure Backup | `*.backup.windowsazure.com` |
90-
| Azure Storage | `*.blob.core.windows.net` <br><br> `*.queue.core.windows.net` |
91-
| Azure AD | Allow access to FQDNs under sections 56 and 59 according to [this article](/office365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online) |
92-
93-
### Use an HTTP proxy server to route traffic
94-
95-
> [!NOTE]
96-
> Currently, there is no proxy support for SAP HANA. Please consider other options such as private end points if you wish to remove outbound connectivity requirements for database backups via Azure backup in HANA VMs.
97-
9839
## Understanding backup and restore throughput performance
9940

10041
The backups (log and non-log) in SAP HANA Azure VMs provided via Backint are streams to Azure Recovery Services vaults (which internally use Azure Storage Blob) and so it is important to understand this streaming methodology.
@@ -181,13 +122,13 @@ Here's a summary of steps required for completing the pre-registration script ru
181122
| `<sid>`adm (OS) | HANA OS | Run the command:<br> `hdbuserstore List` | Check if the result includes the default store as below: <br><br> `KEY SYSTEM` <br> `ENV : <hostname>:3<Instance#>13` <br> `USER : SYSTEM` |
182123
| Root (OS) | HANA OS | Run the [Azure Backup HANA pre-registration script](https://go.microsoft.com/fwlink/?linkid=2173610). | `./msawb-plugin-config-com-sap-hana.sh -a --sid <SID> -n <Instance#> --system-key SYSTEM` |
183124
| `<sid>`adm (OS) | HANA OS | Run the command: <br> `hdbuserstore List` | Check if result includes new lines as below: <br><br> `KEY AZUREWLBACKUPHANAUSER` <br> `ENV : localhost: 3<Instance#>13` <br> `USER: AZUREWLBACKUPHANAUSER` |
184-
| Azure Contributor | Azure portal | Configure NSG, NVA, Azure Firewall, and so on to allow outbound traffic to Azure Backup service, Azure AD, and Azure Storage. | [Set up network connectivity](#set-up-network-connectivity) |
125+
| Azure Contributor | Azure portal | Configure NSG, NVA, Azure Firewall, and so on to allow outbound traffic to Azure Backup service, Azure AD, and Azure Storage. | [Set up network connectivity](backup-azure-sap-hana-database.md#establish-network-connectivity) |
185126
| Azure Contributor | Azure portal | Create or open a Recovery Services vault and then select HANA backup. | Find all the target HANA VMs to back up. |
186127
| Azure Contributor | Azure portal | Discover HANA databases and configure backup policy. | For example: <br><br> Weekly backup: Every Sunday 2:00 AM, retention of weekly 12 weeks, monthly 12 months, yearly 3 years <br> Differential or incremental: Every day, except for Sunday <br> Log: every 15 minutes retained for 35 days |
187128
| Azure Contributor | Azure portal | Recovery Service vault – Backup Items – SAP HANA | Check backup jobs (Azure Workload). |
188129
| HANA Admin | HANA Studio | Check Backup Console, Backup catalog, backup.log, backint.log, and globa.ini | Both SYSTEMDB and Tenant database. |
189130

190-
After running the pre-registration script successfully and verifying, you can then proceed to check [the connectivity requirements](#set-up-network-connectivity) and then [configure backup](#discover-the-databases) from Recovery services vault
131+
After running the pre-registration script successfully and verifying, you can then proceed to check [the connectivity requirements](backup-azure-sap-hana-database.md#establish-network-connectivity) and then [configure backup](#discover-the-databases) from Recovery services vault
191132

192133
## Create a Recovery Services vault
193134

articles/virtual-machines/workloads/sap/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ SAP systems often contain sensitive business data. It is rarely acceptable for V
4040

4141
Examples of scenarios, requiring access to Azure public end point are:
4242
- Azure Fence Agent requires access to **management.azure.com** and **login.microsoftonline.com**
43-
- [Azure Backup](../../../backup/tutorial-backup-sap-hana-db.md#set-up-network-connectivity)
43+
- [Azure Backup](../../../backup/backup-azure-sap-hana-database.md#establish-network-connectivity)
4444
- [Azure Site Recovery](../../../site-recovery/azure-to-azure-about-networking.md#outbound-connectivity-for-urls)
4545
- Using public repository for patching the Operating system
4646
- The SAP application data flow may require outbound connectivity to public end point

0 commit comments

Comments
 (0)