Gig XP

Plan your SAP infrastructure on Azure – Architecture & Documentations

Plan your SAP infrastructure on Azure

In this article, we will cover the collective considerations for deploying SAP infrastructure on Azure.

Azure SAP Design Tips

  1. Use certified Azure VM types
    • Database (Any DB), Application: DS11 v2-DS15 v2 VM, GS1-GS5 VM, E_v3, and M series
    • Database (HANA): GS5 VM, E_v3 series, and M series
  2. ExpressRoute is recommended for stable network latency, bandwidth & performance
  3. Set up high availability and disaster recovery solutions as needed
    • Database HA/DR: SQL Server AlwaysOn, HANA System Replication, Oracle Data Guard, etc
    • ASCS HA: Windows failover cluster with SIOS DataKeeper, Linux cluster, Windows 2016 failover cluster with SOFS (preliminary / DEV environment)
    • File DR: File replication tool
    • VM DR: Azure Site Recovery (Azure to Azure)
  4. Use Premium Storage to VMs running Database
  5. Consider additional storage space to store backup
    • Short-term: local storage (same storage as SAP database files)
    • Long-term: Cool storage, Azure Backup Vault

Basic Understanding of SAP Infrastructure on Azure

Architecture Recommendations

Planning

Possible system types for deploying SAP NetWeaver based applications within public cloud environments could be of the below scenarios:

  1. Medium-sized production systems
  2. Development systems
  3. Testing systems
  4. Prototype systems
  5. Learning / Demonstration systems

As a first step, customers need to verify the following items:

As a second step, Azure resources and bandwidth limitations need to be compared to the original resource consumption of on-premises systems. Therefore, the customers need to be familiar with the various capabilities of the Azure types supported with SAP in the area of:

Security Considerations

For infrastructure security, data is safeguarded in transit and at rest. To encrypt Windows and Linux IaaS virtual machine disks, you can use Azure Disk Encryption. Azure Disk Encryption uses the BitLocker feature of Windows and the DM-Crypt function of Linux to provide volume level encryption for the operating system and also the data disks. The solution also works with “Azure Key Vault” to help you constrain and manage the disk-encryption keys and secrets in your Key Vault subscription service. Data on the virtual machine disks are encrypted at rest in your Azure storage.

Service Port Name Example <nn> = 01 Default Range (min-max) Comment
Dispatcher sapdp<nn> see * 3201 3200 – 3299 SAP Dispatcher, used by SAP GUI for Windows and Java
Message server sapms<sid> see ** 3600 free sapms<anySID> sid = SAP-System-ID
Gateway sapgw<nn> see * 3301 free SAP gateway, used for CPIC and RFC communication
SAP router sapdp99 3299 free Only CI (central instance) Service names can be reassigned in /etc/services to an arbitrary value after installation.

*) nn = SAP Instance Number

**) sid = SAP-System-ID

Load Balancer

SAP has advocated single-stack application servers for years, so very few applications run on a dual-stack deployment model nowadays. The Azure load balancer implements the high availability cluster for the SAP Web Dispatcher. Load balancing of traffic to the application servers is handled within SAP. For traffic from SAP GUI clients connecting to a SAP server via DIAG and Remote Function Calls (RFC), the SCS message server balances the load by creating SAP App Server Logon Groups.

SMLG is an SAP ABAP transaction used to manage the logon load balancing capability of SAP Central Services.

The backend pool of the logon group has more than one ABAP application server. Clients accessing ASCS cluster services connect to the Azure load balancer through a front-end IP address.

The ASCS cluster virtual network name also has an IP address. This address can be associated with an additional IP address on the Azure load balancer so that the cluster can be managed remotely. SAP Web Dispatcher handles load balancing of HTTP(S) traffic to dual-stack servers (ABAP and Java).

NICs

Assign one administration NIC to a management subnet, and assign a data communication NIC to a separate subnet. For configuration details, see Create and manage a Windows virtual machine that has multiple NICs.

SAP landscape management functions require segregation of server traffic on different NICs. For example, business data should be separated from administrative traffic and backup traffic. Assigning multiple NICs to different subnets enables this data segregation. For more information, see “Network” in Building High Availability for SAP NetWeaver and SAP HANA.

Azure Storage

With all database server VMs, we recommend using Azure Premium Storage for consistent read/write latency. For SAP application servers, including the (A)SCS virtual machines, you can use Azure Standard Storage, because application execution takes place in memory and uses disks for logging only.

For best reliability, we recommend using Azure Managed Disks. Managed disks ensure that the disks for VMs within an availability set are isolated to avoid single points of failure.

To achieve high IOPS and disk bandwidth throughput, the standard practices in storage volume performance optimization apply to Azure storage layout. For example, striping multiple disks together to create a larger disk volume improves IO performance. Enabling the read cache on storage containers that changes infrequently enhances the speed of data retrieval. For details about performance requirements, see SAP note 1943937 – Hardware Configuration Check Tool.

Online Resource:

https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/sap/

SAP HANA on Azure Large Instances Design Tips

  1. Note backend ExpressRoute and NFS Storage are included in HANA Large Instances offering
  2. Note the same ExpressRoute Gateway is used for connections to both users/on-prem and backend HANA
  3. Use storage snapshot for HANA DB backup
  4. Add one blade to have HANA System Replication for local HA
  5. Add one blade (w storage) or just storage in DR site to have HANA Storage Replication for disaster recovery
  6. Use HANA volume encryption as needed
  7. Run reverse proxy in a VM (e.g., NGINX) if users need direct access to HANA Large Instances (e.g., HANA Studio)
  8. Wait for HANA System Replication support for better RPO

Operating Systems and RDBMS Supported on Microsoft Azure

Operating Systems

RDBMS supported on Windows:

RDBMS supported on Linux:

Deployment Phase steps to follow before Large Instances deployment

  1. Create Virtual Network in Azure VM
  2. Establish a secure connection between Virtual Network and HANA Large Instances servers
  3. Deploy a jump box with Linux console in Azure VM to access HANA servers
  4. Deploy a Linux patching server in Azure VM to activate Linux OS licenses and patch in HANA servers
  5. Setup NTP server for time synchronization
  6. Install SAP HANA in HANA servers
  7. Install SAP application software in Azure VM
  8. Set up snapshot backup from SAP HANA Studio
  9. Create Support Request (SR) from Azure Portal

References & Footnotes-

https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/sap/sap-netweaver

https://docs.microsoft.com/en-us/azure/virtual-machines/workloads/sap/planning-guide