Skip to content

Commit bc36880

Browse files
committed
Minor edits
1 parent a3af458 commit bc36880

1 file changed

Lines changed: 10 additions & 13 deletions

File tree

articles/sap/workloads/high-availability-guide-standard-load-balancer-outbound-connections.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Examples of scenarios, requiring access to Azure public end point are:
3939
- Azure Fence Agent requires access to **management.azure.com** and **login.microsoftonline.com**
4040
- [Azure Backup](../../backup/backup-azure-sap-hana-database.md#establish-network-connectivity)
4141
- [Azure Site Recovery](../../site-recovery/azure-to-azure-about-networking.md#outbound-connectivity-for-urls)
42-
- Using public repository for patching the Operating system
42+
- Using public repository for patching the operating system
4343
- The SAP application data flow may require outbound connectivity to public end point
4444

4545
If your SAP deployment doesn’t require outbound connectivity to public end points, you don’t need to implement extra configuration. It's sufficient to create internal standard SKU Azure Load Balancer for your high availability scenario, assuming that there's also no need for inbound connectivity from public end points.
@@ -50,19 +50,16 @@ If your SAP deployment doesn’t require outbound connectivity to public end poi
5050
5151
## Prerequisites
5252

53-
Read the following articles first:
53+
**Azure Standard Load Balancer**:
5454

55-
**Azure Standard Load Balancer**
55+
* [Azure Standard Load Balancer overview](../../load-balancer/load-balancer-overview.md) - Comprehensive overview of Azure Standard Load balancer, important principles, concepts, and tutorials.
56+
* [Outbound connections in Azure](../../load-balancer/load-balancer-outbound-connections.md#scenarios) - Scenarios on how to achieve outbound connectivity in Azure.
57+
* [Load balancer outbound rules](../../load-balancer/load-balancer-outbound-connections.md#outboundrules)- Explains the concepts of load balancer outbound rules and how to create outbound rules.
5658

57-
* [Azure Standard Load Balancer overview](../../load-balancer/load-balancer-overview.md) - Comprehensive overview of Azure Standard Load balancer, important principles, concepts, and tutorials.
58-
* [Outbound connections in Azure](../../load-balancer/load-balancer-outbound-connections.md#scenarios) - Scenarios on how to achieve outbound connectivity in Azure.
59-
* [Load balancer outbound rules](../../load-balancer/load-balancer-outbound-connections.md#outboundrules)- Explains the concepts of load balancer outbound rules and how to create outbound rules.
60-
61-
**Azure Firewall**
62-
63-
* [Azure Firewall Overview](../../firewall/overview.md)- overview of Azure Firewall.
64-
* [Tutorial: Deploy and configure Azure Firewall](../../firewall/tutorial-firewall-deploy-portal.md) - instructions on how to configure Azure Firewall via Azure portal.
59+
**Azure Firewall**:
6560

61+
* [Azure Firewall Overview](../../firewall/overview.md)- overview of Azure Firewall.
62+
* [Tutorial: Deploy and configure Azure Firewall](../../firewall/tutorial-firewall-deploy-portal.md) - instructions on how to configure Azure Firewall via Azure portal.
6663
* [Virtual Networks - User defined rules](../../virtual-network/virtual-networks-udr-overview.md#user-defined) - Azure routing concepts and rules.
6764
* [Security Groups Service Tags](../../virtual-network/network-security-groups-overview.md#service-tags) - how to simplify your Network Security Groups (NSG) and Firewall configuration with service tags.
6865

@@ -202,8 +199,6 @@ You could use proxy to allow Pacemaker calls to the Azure management API public
202199
- Depending on the location of the proxy, it may introduce extra latency in the calls from the Azure Fence Agent to the Azure Management API. If your corporate proxy is still on the premises, while your Pacemaker cluster is in Azure, measure latency and consider, if this solution is suitable for you.
203200
- If there isn’t already highly available corporate proxy in place, we don't recommend this option as the customer would be incurring extra cost and complexity. If you decide to deploy extra proxy solution, to allow outbound connectivity from Pacemaker to Azure Management public API, you need to make sure the proxy is highly available. The latency from the VMs to the proxy is low.
204201

205-
---
206-
207202
### Pacemaker configuration with Proxy
208203

209204
There are many different Proxy options available in the industry. Step-by-step instructions for the proxy deployment are outside of the scope of this document. In the following example, we assume that your proxy is responding to **MyProxyService** and listening to port **MyProxyPort**.
@@ -247,6 +242,8 @@ To allow pacemaker to communicate with the Azure management API, perform the fol
247242
sudo pcs property set maintenance-mode=false
248243
```
249244

245+
---
246+
250247
## Other options
251248

252249
If outbound traffic is routed via third party, URL-based firewall proxy:

0 commit comments

Comments
 (0)