You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/high-availability-guide-windows-azure-files-smb.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Microsoft and SAP now fully support Azure Files premium Server Message Block (SM
21
21
22
22
There are special requirements for sizing Azure Files premium SMB shares. This article contains specific recommendations on how to distribute workloads, choose an adequate storage size, and meet minimum installation requirements for Azure Files premium SMB.
23
23
24
-
High-availability (HA) SAP solutions need a highly available file share for hosting *sapmnt*, *transport*, and *interface* directories. Azure Files premium SMB is a simple Azure platform as a service (PaaS) solution for shared file systems for SAP on Windows environments. You can use Azure Files premium SMB with availability sets and availability zones. You can also use Azure Files premium SMB for disaster recovery (DR) scenarios to another region.
24
+
High-availability (HA) SAP solutions need a highly available file share for hosting *sapmnt*, *transport*, and *interface* directories. Azure Files premium SMB is a simple Azure platform as a service (PaaS) solution for shared file systems for SAP on Windows environments. You can use Azure Files premium SMB with availability sets and availability zones. You can also use Azure Files premium SMB for disaster recovery (DR) scenarios to another region.
25
25
26
26
> [!NOTE]
27
27
> Clustering SAP ASCS/SCS instances by using a file share is supported for SAP systems with SAP Kernel 7.22 (and later). For details, see SAP Note [2698948](https://launchpad.support.sap.com/#/notes/2698948).
@@ -68,7 +68,7 @@ Here are prerequisites for the installation of SAP NetWeaver HA systems on Azure
68
68
69
69
The Active Directory administrator should create, in advance, three domain users with Local Administrator rights and one global group in the local Windows Server Active Directory instance.
70
70
71
-
`[email protected]` has Domain Administrator rights and is used to run *SAPinst*, *\<sid>adm*, and *SAPService\<SID>* as SAP system users and the *SAP_\<SAPSID>_GlobalAdmin* group. The SAP Installation Guide contains the specific details required for these accounts.
71
+
`[email protected]` has Domain Administrator rights and is used to run *SAPinst*, *\<sid>adm*, and *SAPService\<SID>* as SAP system users and the *SAP_\<SAPSID>_GlobalAdmin* group. The SAP Installation Guide contains the specific details required for these accounts.
72
72
73
73
> [!NOTE]
74
74
> SAP user accounts should not be Domain Administrator. We generally recommend that you don't use *\<sid>adm* to run SAPinst.
@@ -82,7 +82,7 @@ The Active Directory administrator or Azure administrator should check Synchroni
82
82
The Azure administrator should complete the following tasks:
83
83
84
84
1. On the **Basics** tab, create a storage account with either premium zone-redundant storage (ZRS) or locally redundant storage (LRS). Customers with zonal deployment should choose ZRS. Here, the administrator needs to make the choice between setting up a **Standard** or **Premium** account.
85
-
85
+
86
86

87
87
88
88
> [!IMPORTANT]
@@ -100,7 +100,7 @@ The Azure administrator should complete the following tasks:
100
100
101
101

102
102
103
-
1. If necessary, add a DNS A record into Windows DNS for `<storage_account_name>.file.core.windows.net`. (This might need to be in a new DNS zone.) Discuss this topic with the DNS administrator. The new zone should not update outside an organization.
103
+
1. If necessary, add a DNS A record into Windows DNS for `<storage_account_name>.file.core.windows.net`. (This might need to be in a new DNS zone.) Discuss this topic with the DNS administrator. The new zone should not update outside an organization.
104
104
105
105

106
106
@@ -116,15 +116,15 @@ The Azure administrator should complete the following tasks:
116
116
* Before the user runs the script, confirm that this Active Directory domain user account is synchronized with Microsoft Entra ID. An example of this would be to open the Azure portal and go to Microsoft Entra users, check that the user `[email protected]` exists, and verify the Microsoft Entra user account.
117
117
* Grant the Contributor role-based access control (RBAC) role to this Microsoft Entra user account for the resource group that contains the storage account that holds the file share. In this example, the user `[email protected]` is granted the Contributor role to the respective resource group.
118
118
* The user should run the script while logged on to a Windows Server instance by using an Active Directory domain user account with the permission as specified earlier.
119
-
119
+
120
120
In this example scenario, the Active Directory administrator would log on to the Windows Server instance as `[email protected]`. When the administrator is using the PowerShell command `Connect-AzAccount`, the administrator connects as user `[email protected]`. Ideally, the Active Directory administrator and the Azure administrator should work together on this task.
121
-
121
+
122
122

123
123
124
124

125
125
126
126
> [!IMPORTANT]
127
-
> When a user is running the PowerShell script command `Connect-AzAccount`, we highly recommend entering the Microsoft Entra user account that corresponds and maps to the Active Directory domain user account that was used to log on to a Windows Server instance.
127
+
> When a user is running the PowerShell script command `Connect-AzAccount`, we highly recommend entering the Microsoft Entra user account that corresponds and maps to the Active Directory domain user account that was used to log on to a Windows Server instance.
128
128
129
129
After the script runs successfully, go to **Storage** > **File Shares** and verify that **Active Directory: Configured** appears.
130
130
@@ -138,7 +138,7 @@ The Azure administrator should complete the following tasks:
138
138
139
139

140
140
141
-
You can find the *DOMAIN\CLUSTER_NAME$* account by selecting **Computers** under **Object types**.
141
+
You can find the *DOMAIN\CLUSTER_NAME$* account by selecting **Computers** under **Object types**.
142
142
143
143

144
144
@@ -161,8 +161,8 @@ An SAP Basis administrator should complete these tasks:
161
161
162
162
1.[Install the Windows cluster on ASCS/ERS nodes and add the cloud witness](sap-high-availability-infrastructure-wsfc-shared-disk.md#install-and-configure-windows-failover-cluster).
163
163
2. The first cluster node installation asks for the Azure Files SMB storage account name. Enter the FQDN `<storage_account_name>.file.core.windows.net`. If SAPinst doesn't accept more than 13 characters, the SWPM version is too old.
164
-
3.[Modify the SAP profile of the ASCS/SCS instance](sap-high-availability-installation-wsfc-shared-disk.md#10822f4f-32e7-4871-b63a-9b86c76ce761).
165
-
4.[Update the probe port for the SAP \<SID> role in Windows Server Failover Cluster (WSFC)](sap-high-availability-installation-wsfc-shared-disk.md#10822f4f-32e7-4871-b63a-9b86c76ce761).
164
+
3.[Modify the SAP profile of the ASCS/SCS instance](sap-high-availability-installation-wsfc-shared-disk.md#add-a-probe-port).
165
+
4.[Update the probe port for the SAP \<SID> role in Windows Server Failover Cluster (WSFC)](sap-high-availability-installation-wsfc-shared-disk.md#add-a-probe-port).
166
166
5. Continue with SWPM installation for the second ASCS/ERS node. SWPM requires only the path of the profile directory. Enter the full UNC path to the profile directory.
167
167
6. Enter the UNC profile path for the database and for the installation of the primary application server (PAS) and additional application server (AAS).
168
168
7. The PAS installation asks for the *transport* host name. Provide the FQDN of a separate storage account name for the *transport* directory.
0 commit comments