- Red Hat Enterprise Linux for SAP Solutions
- Your business relies on your SAP environment
- Consistency across your organization
- Record-setting performance
- High availability
- Efficient, proactive management
- Enterprise stability for critical business environments
- World-class support
- Learn more
- Product variant
- Red Hat Enterprise Linux for SAP Solutions
- Open. For business.
- Red Hat Enterprise Linux for SAP Solutions helps you:
- Features & benefits
- Standardize on a single, open platform
- Continuous availability for SAP applications
- Operational efficiencies with automation
- Achieving enterprise-grade performance
- Focus on SAP application life cycle
- Keep learning
- Red Hat solutions for SAP
- Accelerate SAP operations with Red Hat Ansible Automation Platform
- Reduce downtime for SAP HANA with Red Hat technology
- SAP customer success stories
- Red Hat Enterprise Linux for SAP Solutions
- Hello World!
- Overview
- The Red Hat Enterprise Linux for SAP Solutions includes:
- WHY RED HAT FOR SAP?
- HIGH AVAILABILITY
- EFFICIENT AND PROACTIVE MANAGEMENT
- RECORD-BREAKING PERFORMANCE
- ENTERPRISE STABILITY FOR BUSINESS-CRITICAL ENVIRONMENTS
- Red Hat Customer Portal
- Log in to Your Red Hat Account
- Red Hat Account
- Customer Portal
- Select Your Language
- Red Hat Enterprise Linux System Roles for SAP
- Contents
- 1. Overview
- 2. Installation
- 3. New features in version 3
- 4. Known issues
- 4.1. Roles produce limited output when running in check mode
- 4.2. Extended check (=assert) parameters are not recognized in previous versions of the roles
- 4.3. Role sap-preconfigure fails if DNS domain is not set on the managed node
- 4.4. The assertion for getting the current status of the CPU Governor for performance (x86_64 platform only) fails
- 5. Quick Start
- 5.1. Prepare the Control Node
- 5.2. Configure the local system
- Prepare the local system for the installation of SAP NetWeaver
- 5.3. Verify the local system
- Verify if the local system is configured correctly for the installation of SAP NetWeaver
- 5.4. Configure remote systems
- Prepare the control node and ssh access to all managed nodes
- Prepare one or more remote servers (managed nodes) for the Installation of SAP HANA
- 5.5. Verify a remote system
- 6. Detailed Description
- 6.1. System Roles and SAP Notes
- 6.2. Implemented SAP Notes
- 6.3. Role variables
- Kernel related variables in sap-hana-preconfigure
- 7. Examples
- 7.1. Prepare two systems for SAP HANA
- 7.2. Configure four systems for SAP NetWeaver
- 7.3. Report the SAP HANA notes compliance status of a RHEL system
Red Hat Enterprise Linux for SAP Solutions
Red Hat Enterprise Linux is the
commercial Linux distribution
in public cloud environments.
Red Hat Enterprise Linux for
SAP Solutions is an optimized
offering that includes:
- The Red Hat Enterprise
Linux operating system. - High Availability Add-On
for increased uptime. - Red Hat Smart Management
for life-cycle management. - Red Hat Insights for
proactive issue identification
and remediation. - Update Services for SAP
Solutions up to four years. - In-place upgrades and live
patching for critical and
important security issues.
Your business relies on your SAP environment
Your SAP® landscape is the core of critical business operations like enterprise resource planning, supply-chain management, and customer experience administration, as well as complex, real-time analytics use cases. The underlying infrastructure of your SAP landscape can greatly affect how well it supports your business. You need a reliable foundation that delivers stability, performance, security, and availability at scale.
Standardizing on Red Hat’s integrated portfolio across your entire infrastructure can help you optimize your environment and operations while preparing for digital leadership. Combining an intelligent operating system with predictive management tools and SAP-specific content, Red Hat® Enterprise Linux® for SAP Solutions provides a single, consistent foundation for SAP and non-SAP workloads.
Consistency across your organization
Your underlying operating system impacts how well your SAP applications perform. Whether you are deploying new applications or migrating existing SAP applications to SAP S/4HANA®, a consistent, reliable platform can streamline operations and management, increase stability, and reduce costs.
Record-setting performance
A high-performance foundation is required for SAP applications to provide the most value to your business. Red Hat Enterprise Linux for SAP Solutions delivers superior performance for SAP applications. In fact, Red Hat Enterprise Linux running on Intel® Xeon® Scalable processors also holds world records for SAP BW Edition of SAP HANA® V3 in total data load and transformation runtime, total complex query phase runtime, and query executions per hour. 1
Red Hat Enterprise Linux also fully supports Intel Optane® DC persistent memory file system direct access (FS-DAX) for additional performance gains. Persistent memory delivers higher density, speeds database warm-up tasks, and reduces total cost of ownership (TCO) for operational tasks.
High availability
SAP workloads are critical for your business and downtime is unacceptable. The Red Hat Enterprise Linux High Availability Add-On — included with Red Hat Enterprise Linux for SAP Solutions — is an automated high availability solution that reduces unplanned downtime in scale-up and scale-out SAP HANA, SAP S/4HANA, and SAP Netweaver deployments. Using SAP HANA’s native high-availability capabilities, the add-on offers a standards-based approach for ensuring SAP application reliability in both on-premise and cloud environments.
Red Hat Enterprise Linux also includes in-place upgrade capabilities and live kernel patching for important and critical Common Vulnerabilities and Exposures (CVEs), further increasing business continuity and availability.
Efficient, proactive management
To be effective, all systems in your SAP landscape must be up-to-date and in compliance with security and regulatory policies. Red Hat Enterprise Linux for SAP Solutions includes Red Hat Smart Management and Red Hat Insights to help you achieve this.
Red Hat Smart Management combines Red Hat Satellite with cloud-based remediation capabilities, allowing you to provision, patch, configure, and control your development, test, and production systems based on Red Hat Enterprise Linux. You can also ensure that all systems have the latest security patches, quickly remediate configuration drift, and audit your systems at any point in time.
Red Hat Insights delivers predictive operating system analytics that help you proactively identify and remediate a variety of threats to avoid outages, unplanned downtime, and security and compliance risks. Red Hat Insights incorporates years of Red Hat support experience — including SAP-specific knowledge and best practices — to identify vulnerabilities before they impact critical operations.
Enterprise stability for critical business environments
SAP certifies applications to operating system minor releases, making continual upgrades problematic for production environments. Red Hat Update Services provides up to four years of support — including security patches and critical fixes — for select minor releases of Red Hat Enterprise Linux. When you upgrade to a new minor release, binary compatibility and kernel stability ensure that your system remains stable and that both SAP and custom applications continue to execute smoothly.
World-class support
IT issues can cause costly downtime. With Red Hat, support is simple and hassle-free. Red Hat works with SAP and certified hardware and cloud providers to deliver integrated support for your entire environment. Support teams work together to identify underlying issues and resolve problems quickly.
Learn more
Red Hat Enterprise Linux for SAP Solutions delivers more value for your organization. Through partnership and joint engineering with SAP, Red Hat gives you a reliable, security-focused foundation to optimize your SAP landscape, encourage ongoing innovation, and prepare for future change.
Источник
Product variant
Red Hat Enterprise Linux for SAP Solutions
Red Hat® Enterprise Linux® for SAP Solutions combines the reliability, scalability, and performance of Linux with technologies that meet the specific requirements of SAP workloads. It’s certified for integration with SAP S/4HANA® and built on the same foundation as the world’s leading enterprise Linux platform, Red Hat Enterprise Linux.
Red Hat for SAP
Open. For business.
With Red Hat Enterprise Linux for SAP Solutions, you get access to SAP-specific repositories that contain additional packages to make the best of your SAP HANA, SAP NetWeaver, and SAP S/4HANA solutions. This subscription includes the Red Hat High Availability Add-on, Red Hat Insights (automate analytics collection with SAP-focused rules to proactively identify and remediate threats to security, compliance, performance, availability, and stability), and Red Hat Smart Management.
Red Hat Enterprise Linux for SAP Solutions helps you:
- Avoid downtimes with live kernel patching
- Reduce time to configure the operating system for SAP workloads with Red Hat Enterprise Linux system roles
- Be flexible with update services for SAP solutions
- Get real-time risk assessments related to performance
- Harden your environment with a built-in security/vulnerability scanner
Features & benefits
Standardize on a single, open platform
A single subscription model and operating system provide a cost-effective, consistent platform that streamlines operations and increases stability. Standardizing your SAP environments on Red Hat Enterprise Linux gives you the consistency you need to conquer complexity no matter where or how you choose to deploy: on-premise, virtualized, or in cloud environments.
Continuous availability for SAP applications
With the Red Hat High Availability Add-on in Red Hat Enterprise Linux for SAP Solutions, you can deploy your SAP solutions in various highly available scale-up and scale-out configurations to minimize costly downtimes. By leveraging in-place upgrades and kernel live-patching, you can upgrade your operating system and apply critical kernel patches on-the-fly without taking your system offline.
Operational efficiencies with automation
Red Hat Enterprise Linux system roles for SAP provide a prescriptive and automated way to easily install, configure and manage your Red Hat Enterprise Linux environment for SAP applications. These system roles can be used with Red Hat Ansible Engine and Red Hat Ansible Tower to boost productivity and scale SAP deployments on Red Hat Enterprise Linux using automation.
Achieving enterprise-grade performance
Red Hat Enterprise Linux for SAP Solutions provides several capabilities to improve TCO for your SAP workloads including SAP-specific performance tunings, support for Intel Optane DC Persistent Memory (pMEM) File System DAX (FS-DAX), and Virtual PMEM on IBM Power architectures. These benefits can be seen in several industry-leading benchmark results published by hardware vendors.
Focus on SAP application life cycle
Red Hat Enterprise Linux for SAP Solutions includes update services, providing a stable foundation and support for certain minor releases for up to four years from general availability.
Red Hat works with SAP and certified hardware and cloud providers to deliver integrated support for your entire environment. Support teams work together to identify the underlying issue and resolve the problem quickly and efficiently.
Keep learning
Red Hat solutions for SAP
From ERP and Finance to SAP Intelligence Technologies like AI/ML or IoT, or whichever SAP business solution your company is using, Red Hat can help on every stage of your journey in becoming an intelligent enterprise.
Accelerate SAP operations with Red Hat Ansible Automation Platform
Manual operations can result in poor performance, potential downtime, and increased security risks for your SAP landscape. Red Hat Ansible Automation Platform helps you streamline operations across your SAP and IT environments.
Reduce downtime for SAP HANA with Red Hat technology
Using SAP HANA’s native replication capabilities, Red Hat Enterprise Linux High Availability Add-On offers a standards-based approach for ensuring SAP application reliability in on-premise and cloud environments.
SAP customer success stories
See how our customers—some of the largest enterprises in the world—have increased performance, improved scalability, and reduced costs with Red Hat’s SAP solutions.
Источник
Red Hat Enterprise Linux for SAP Solutions
Access all of the special bits you need for SAP development on RHEL
Hello World!
Build Something Today
Let’s walk through everything you need to build your first application.
Overview
The Red Hat Enterprise Linux for SAP Solutions includes:
- Red Hat Enterprise Linux server operating system
- Technical components to support SAP HANA®, SAP S/4HANA®, and business apps workloads
- High Availability solutions for SAP HANA, SAP S/4HANA, and SAP business apps
- Smart Management Add-On for Red Hat Satellite systems life-cycle management
- Red Hat Insights for proactive issue identification and remediation
- Update Services for SAP Solutions
WHY RED HAT FOR SAP?
Standardizing your entire SAP environment on Red Hat Enterprise Linux for SAP Solutions streamlines operations and reduces costs. Red Hat Enterprise Linux for SAP Solutions includes key capabilities designed to support the demands of SAP environments.
HIGH AVAILABILITY
SAP applications are business-critical, and downtime is unacceptable. The Red Hat Enterprise Linux High Availability Add-On is included with Red Hat Enterprise Linux for SAP Solutions. This add-on supports SAP workloads, including business applications, SAP HANA, and SAP S/4HANA. Using Pacemaker, the High Availability Add-On offers a standards-based approach that ensures the availability of SAP systems.
EFFICIENT AND PROACTIVE MANAGEMENT
Red Hat Enterprise Linux for SAP Solutions includes the Smart Management Add-On for Red Hat Satellite life-cycle management. Smart Management is the client add-on element of the Red Hat Satellite management platform, which together with Red Hat Satellite Server, allows you to provision, patch, configure, and fully control all of your Red Hat Enterprise Linux development, test, and production systems.
Red Hat Insights, combined with Red Hat Satellite, enhances how enterprises manage their SAP environments. Red Hat Insights is a unique tool that offers a new paradigm of proactive management, identifying issues and offering automated resolutions for vulnerabilities in your environment before business operations are impacted.
RECORD-BREAKING PERFORMANCE
High performance is a key requirement for SAP applications. Red Hat and SAP engineers work side by side in the Linux Lab to ensure that SAP applications running on Red Hat Enterprise Linux achieve record-breaking performance across hardware platforms. Red Hat holds world records for the top performance of SAP applications.
ENTERPRISE STABILITY FOR BUSINESS-CRITICAL ENVIRONMENTS
Stability is critical for SAP landscapes, and Red Hat Enterprise Linux for SAP Solutions has you covered. Because SAP certifies its applications on minor releases of the operating system, Red Hat Enterprise Linux for SAP Solutions includes Update Services, which ensures the stability and security of your SAP systems. Update Services provides up to four years of support on minor releases, during which customers receive security patches and critical fixes.
When you move to a new minor release, binary compatibility ensures that the system remains stable. Your application programming interfaces (APIs) and application binary interfaces are unaffected. In this way, Red Hat Enterprise Linux for SAP Solutions ensures kernel stability and smooth execution of both SAP applications and custom applications.
Источник
Red Hat Customer Portal
Log in to Your Red Hat Account
Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.
If you are a new customer, register now for access to product evaluations and purchasing capabilities.
Need access to an account?
If your company has an existing Red Hat account, your organization administrator can grant you access.
Red Hat Account
Customer Portal
For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.
Select Your Language
Red Hat Enterprise Linux System Roles for SAP
Contents
1. Overview
Red Hat Enterprise Linux (RHEL) 7 RHEA-2019:3190 introduced RHEL System Roles for SAP to assist with remotely or locally configuring a RHEL system for the installation of SAP HANA or SAP NetWeaver software. RHEL System Roles for SAP development is based on the Linux System Roles upstream project.
RHEL System Roles is a collection of roles executed by Ansible to assist administrators with server configuration right after the servers have been installed. These roles are provided in the RHEL Extras repository. In contrast, RHEL System Roles for SAP is provided in the RHEL for SAP Solutions subscription and can be used by Ansible Engine and Ansible Tower to manage RHEL systems.
The Red Hat Enterprise Linux subscription provides support for RHEL System Roles with Ansible Engine, which is available in the Ansible Engine repository (e.g. ansible-2-for-rhel-8-$(uname -m)-rpms ). However, if you require full support for the Ansible Engine itself, a separate Red Hat Ansible Automation Subscription is necessary. Additional information is available at Top Support Policies for Red Hat Ansible Automation.
The following RHEL System Roles for SAP are fully supported on control nodes running RHEL 8.2 and later:
— sap-preconfigure
— sap-netweaver-preconfigure
— sap-hana-preconfigure
The RHEL System Roles for SAP, just like the RHEL System Roles, are installed and run from a central node referred to as the control node (which can be Ansible Tower, Red Hat Satellite, or a RHEL 8 or RHEL 7 host). The control node connects to the local host and/or to one or more remote hosts (called managed nodes in the context of Ansible), and performs installation and configuration steps on them. It is recommended that you use the latest major release of RHEL on the control node (RHEL 8) and use the latest version of the roles either from the rhel-system-roles-sap RPM or from Red Hat Automation Hub. The RHEL System Roles for SAP and Ansible packages do not need to be installed on the systems that are being managed/configured.
See the following table for the support status:
Control Node | Managed Node | Support Status |
---|---|---|
RHEL 8.4 or later | RHEL 8.0 or later | fully supported |
RHEL 8.4 or later | RHEL 7.6 or later | fully supported |
RHEL 8.4 or later | RHEL 7.5 or earlier | not supported |
RHEL 8.3 or earlier | RHEL (any release) | not supported† |
† Note: For control nodes running RHEL 7.8, RHEL 7.9, or RHEL 8.1, you can use the previous versions of rhel-system-roles-sap which are in Tech Preview support status. Please find the instructions for these versions here.
For control nodes running RHEL 8.2 or RHEL 8.3, you can use version 2 of rhel-system-roles-sap which is fully supported. Please find the instructions for this version here.
See the table below for the supported hardware/virtualization/cloud platforms of the managed node:
Hardware platform | Bare Metal/Virtualization/ Cloud platform | Support Status |
---|---|---|
x86_64 | bare metal, Red Hat Virtualization/libvirt, VMware ESX, Red Hat Certified Cloud and Service Providers | fully supported |
ppc64le | PowerVM LPARs | fully supported |
s390x | zVM guest | fully supported: sap-preconfigure, sap-netweaver-preconfigure |
Note: The roles are designed to be used right after the initial installation of a managed node. Do not run these roles against a SAP or other production system. The role will enforce a certain configuration on the managed node(s), which might not be intended.
Note: Before applying the roles on a managed node, verify that the RHEL release on the managed node is supported by the SAP software version that you are planning to install.
2. Installation
Use this procedure to install the Ansible Engine and the RHEL System Roles for SAP.
1) Use subscription-manager to list the available Ansible Engine repositories.
# subscription-manager refresh
# subscription-manager repos —list | grep ansible
2) Permanently enable the Ansible Engine repository and the RHEL for SAP Solutions repository using Red Hat Subscription Manager.
Note: The generic version «2» of the Ansible Engine repository provides the latest release of the 2.X stream but it is also possible to specify a certain minor Ansible Engine version such as 2.9.
# subscription-manager repos —enable=ansible-2-for-rhel-8-$(uname -m)-rpms —enable=rhel-8-for-$(uname -m)-sap-solutions-rpms
3) Install Ansible Engine and RHEL System Roles for SAP:
# dnf install ansible rhel-system-roles-sap
The rhel-system-roles-sap package is installed to the following locations where is the name of the individual role; for example, sap-hana-preconfigure . Each role includes a README file that explains all variables and how to use the role.
Documentation: /usr/share/doc/rhel-system-roles-sap/
Ansible Roles: /usr/share/ansible/roles/
3. New features in version 3
Version 3.1 has the following new features compared to version 2:
The three roles now support an assertion run, so they can be used to compare the settings of a managed node to the applicable SAP notes. While Ansible supports setting and verifying any modification made to a managed node by design, it can be useful to report the SAP notes compliance of a SAP system from time to time without modifying the system configuration, for example to ensure that system settings are still in place after a manual modification of system parameters. The roles can either fail at each detected violation, or they can report failures but continue running and finally report the number of failures (if any).
The roles sap-preconfigure and sap-hana-preconfigure now support a reboot of the managed node if there have been software installations which require it.
Role sap-preconfigure only remounts file system /dev/shm if necessary.
Role sap-netweaver-preconfigure now supports the installation of packages which are required for Adobe Document Services.
The role sap-hana-preconfigure no longer sets the SELinux state. This is already done in role sap-preconfigure.
Configuring role sap-hana-preconfigure for using tuned and/or modifying the boot command line has been simplified.
Role sap-hana-preconfigure now supports activating tuned profile sap-hana and also modifying the boot command line. This provides greater flexibility when setting latency related parameters.
Role sap-hana-preconfigure now supports checking if the RHEL minor release is supported for SAP HANA. This behavior can be overridden so that any RHEL 7.6 or greater managed node can be prepared for SAP HANA.
Role sap-hana-preconfigure now supports setting kernel parameters for NetApp NFS as per SAP Note 3024346.
4. Known issues
4.1. Roles produce limited output when running in check mode
Running roles in check mode will not show all changes which are performed on a system when running in normal mode, as some Ansible modules have no or just partial support for check mode. For example, tasks will not report the values of kernel parameters. For more information on the Ansible check mode, please refer to https://docs.ansible.com/ansible/latest/user_guide/playbooks_checkmode.html.
To overcome this restriction, the sap*preconfigure roles can now run in an extended check (=assert) mode.
4.2. Extended check (=assert) parameters are not recognized in previous versions of the roles
The roles can run in an assert mode, in which case they do not modify managed nodes but report the compliance of a node with the applicable SAP notes. When running assert mode playbooks with previous versions (1.x or 2.x) of the roles, assert parameters are ignored, causing the roles to modify the managed nodes instead of only checking them. As roles can also be installed in other than the default locations (e.g. using git), it is recommended that you not only check if version 3 of package rhel-system-roles-sap is installed but also that the playbooks you are using are calling the roles in their correct, default locations, which is under /usr/share/ansible/roles .
For displaying the role path which is used when running the role so that you can verify if it is corresponding to the installed version, you can use the following procedure:
Run the command (replace PLAYBOOK.YML by the actual name of the playbook and HOSTNAME by the name of the managed node):
# ansible-playbook PLAYBOOK.YML -l HOSTNAME —step -vv
Answer the first question with «N»:
Perform task: TASK: Gathering Facts (N)o/(y)es/(c)ontinue: N
and the second question with «y»:
Perform task: TASK: sap-preconfigure : include os specific vars (N)o/(y)es/(c)ontinue: y
This will display the absolute path name of file tasks/main.yml and then abort the play (because the vars file could not be found).
Example output:
4.3. Role sap-preconfigure fails if DNS domain is not set on the managed node
In case there is no DNS domain set on the managed node, which is typically the case on cloud systems, the role sap-preconfigure will fail in task Verify that the DNS domain is set. To avoid this, set variable sap_domain in file /usr/share/ansible/roles/sap-preconfigure/defaults/main.yml or run the ansible-playbook command with line parameter
-e «sap_domain=example.com» (with the domain name being example.com in this case — please replace it by your domain name).
4.4. The assertion for getting the current status of the CPU Governor for performance (x86_64 platform only) fails
When running role sap-hana-preconfigure in assert mode against a x86_64 managed node, it might incorrectly report that the current status of the CPU Governor for performance is not as expected.
(sap-hana-preconfigure issue #180)
5. Quick Start
Use this procedure to configure or verify one or more systems for the installation of SAP NetWeaver or SAP HANA.
5.1. Prepare the Control Node
RHEL System Roles for SAP requires that the Ansible control node uses locale C or en_US.UTF-8 to display system messages in English. Run the following command on the local host to check the current setting:
# locale
The output should display either C or en_US.UTF-8 in the line starting with LC_MESSAGES= . If the locale command does not produce the expected output, run the following command on the local host before executing the ansible-playbook command:
# export LC_ALL=C
Or
# export LC_ALL=en_US.UTF-8
5.2. Configure the local system
Prepare the local system for the installation of SAP NetWeaver
1) Make sure that there is no production software running on the system. The roles will enforce a certain configuration on the system, which typically is intended only right after the installation of RHEL and before the initial installation of SAP software.
2) In case you would like to preserve the original configuration of the server, perform a backup. Typically, these roles are run right after the installation of RHEL, so a backup should not be necessary.
3) Create a YAML file named sap-netweaver.yml with the following content:
Note that the correct indentation (e.g. 2 spaces in front of roles: ) is essential.
5) Make sure there is at least 20480 MB of swap space configured on the local system.
6) Run the RHEL System Roles sap-preconfigure and sap-netweaver-preconfigure to prepare the managed nodes for the installation of SAP NetWeaver.
# ansible-playbook sap-netweaver.yml
At the end of the playbook run, the command will report that a reboot is required because role sap-preconfigure has changed the SELinux state from enabled to disabled , according to SAP note 2772999.
7) Reboot the managed nodes so that the new SELinux state will become effective. If you set the role variable sap_preconfigure_reboot_ok to yes, the role will reboot the server as the last step of its execution.
Note: By changing role variable sap_preconfigure_selinux_state from the default disabled to permissive before or at the time of running the playbook, you can have the role sap-preconfigure set the SELinux state to permissive , which is also allowed for SAP NetWeaver on RHEL 8. See the Examples section in this document for more information on setting role variables.
5.3. Verify the local system
In addition to configuring RHEL systems, the RHEL System Roles for SAP can also be used to verify that RHEL systems are configured correctly.
Verify if the local system is configured correctly for the installation of SAP NetWeaver
Use the following procedure to get a report of a server’s compliance with applicable SAP notes for SAP NetWeaver:
1) Create a YAML file named sap-netweaver.yml with the following content:
2) Make sure you are using RHEL System Roles for SAP version 3.
Because the extended check (=assert) parameters are not recognized in previous versions of the roles, it is important that you do not run this playbook with a previous version of RHEL System Roles for SAP. Otherwise, the system configuration could unintentionally be modified. Please follow the steps outlined in chapter 4.2 to verify that you are using RHEL System Roles for SAP version 3 or later, and that the roles are not called from other locations than the default role paths.
3) Run the following command:
In case you would like to get a more compact output, you can filter the output to just display the essential FAIL or PASS information for each assertion. If you are using a terminal with dark background, replace all occurrences of color code [30m in the following command sequence by [37m . Otherwise, the output of some lines will be unreadable due to dark font on dark background.
In case you accidentally ran the above command on a terminal with dark background, you can re-enable the default white font again with the following command:
5.4. Configure remote systems
Prepare the control node and ssh access to all managed nodes
1) Verify that the managed nodes are correctly set up for installing Red Hat software packages from a Red Hat Satellite server or the Red Hat Customer Portal.
2) Make sure that you can log in via the ssh command to all managed nodes from the Ansible control node without using a password. See the man pages for ssh-copy-id and man ssh if you need more information about this topic.
Prepare one or more remote servers (managed nodes) for the Installation of SAP HANA
1) Verify that there is no production software running on any of the managed nodes you want to configure.
2) Make sure that the version of SAP HANA you will be installing is supported for the RHEL major and minor release which is installed on the managed nodes. For information on supported RHEL releases for SAP HANA, see SAP note 2235581.
3) In case you would like to preserve the original configuration of any of the servers, perform a backup of the server(s). Typically, these roles are run right after installation, so a backup should not be necessary.
4) Create an inventory file or modify file /etc/ansible/hosts so that it contains the name of a group of hosts and each host which you intend to configure (=managed node) in a separate line (example for three hosts in a host group named sap_hana ):
5) Use some simple commands to verify that you can log in to all three hosts using ssh without password:
# ssh host01 uname -a
# ssh host02 hostname
# ssh host03 echo test
6) Create a YAML file named sap-hana.yml with the following content:
Note that the correct indentation (e.g. 2 spaces in front of roles: ) is essential.
7) Run the RHEL System Roles sap-preconfigure and sap-hana-preconfigure to prepare the managed nodes for the installation of SAP HANA.
Note: Do not run these roles against an SAP or other production system. The role will enforce a certain configuration on the managed node(s), which typically is intended only right after the installation of RHEL and before the initial installation of SAP software.
# ansible-playbook sap-hana.yml
At the end of the playbook run, the command will report for each managed node that a reboot is required, for example because role sap-preconfigure has changed the SELinux state from enabled to disabled (as per requirement in SAP notes 2292690 or 2777782).
8) Reboot the managed nodes so that the new SELinux state will become effective.
5.5. Verify a remote system
It is recommended to verify each host separately. Follow the steps in chapter 5.3 but use the following yml file:
and use the ansible-playbook command line option -l to specify the name of the remote host to verify, as in:
# ansible-playbook sap-hana.yml -l host01
6. Detailed Description
This chapter describes the RHEL System Roles for SAP in detail.
The purpose of the three roles sap-preconfigure, sap-netweaver-preconfigure, and sap-hana-preconfigure is described in the following table:
System Role | Purpose |
---|---|
sap-preconfigure | Install software and perform all configuration steps which are required for the installation of SAP NetWeaver and SAP HANA. |
sap-netweaver-preconfigure | Install software and perform all configuration steps which are required for the installation of SAP NetWeaver only. |
sap-hana-preconfigure | Install additional software and perform additional configuration steps which are required for SAP HANA only. |
6.1. System Roles and SAP Notes
The following table contains the System Role and the corresponding action or SAP Note for the RHEL release of the managed node.
System Role | SAP Note for RHEL 7 | SAP Note for RHEL 8 |
sap-preconfigure | SAP Note 2002167 | SAP Note 2772999 |
SAP Note 1391070 | ||
SAP Note 0941735 (TMPFS only) | ||
sap-netweaver-preconfigure | SAP Note 2526952 (tuned profiles only) | SAP Note 2526952 (tuned profiles only) |
sap-hana-preconfigure | Install required packages as per documents SAP HANA 2.0 running on RHEL 7.x and SAP HANA SPS 12 running on RHEL 7.x which are attached to SAP Note 2009879 | Install required packages for SAP HANA as mentioned in SAP Note 2772999 |
ppc64le only: Install additional required packages as per https://www14.software.ibm.com/support/customercare/sas/f/lopdiags/home.html | ppc64le only: Install additional required packages as per https://www14.software.ibm.com/support/customercare/sas/f/lopdiags/home.html | |
Perform configuration steps as per documents SAP HANA 2.0 running on RHEL 7.x and SAP HANA SPS 12 running on RHEL 7.x which are attached to SAP Note 2009879 | ||
ppc64le only: SAP Note 2055470 | ppc64le only: SAP Note 2055470 | |
SAP Note 2292690 | SAP Note 2777782 | |
SAP Note 2382421 | SAP Note 2382421 |
6.2. Implemented SAP Notes
The following table contains the SAP Note and its purpose and scope. The RHEL column indicates the specific RHEL releases that the SAP Note supports.
SAP Note | RHEL | Title | Purpose and scope | |
7 | 8 | |||
2002167 | X | Red Hat Enterprise Linux 7.x: Installation and Upgrade | General RHEL 7 installation and configuration steps before installing SAP NetWeaver | |
1391070 | X | Linux UUID solutions | Installation and configuration of uuidd | |
0941735 | X | SAP memory management system for 64-bit Linux systems | SAP and Linux kernel parameters and TMPFS for SAP NetWeaver | |
2772999 | X | Red Hat Enterprise Linux 8.x: Installation and Configuration | General RHEL 8 installation and configuration steps, including uuidd, before installing SAP NetWeaver or SAP HANA | |
2526952 | X | X | Red Hat Enterprise Linux for SAP Solutions | Description of RHEL for SAP Solutions, including tuned-profiles |
2009879 | X | SAP HANA Guidelines for Red Hat Enterprise Linux (RHEL) Operating System | Kernel and OS settings for SAP HANA on RHEL 6.x and RHEL 7.x | |
2055470 | X | X | HANA on POWER Planning and Installation Specifics — Central Note | Specific installation and configuration steps for SAP HANA on POWER |
2292690 | X | SAP HANA DB: Recommended OS settings for RHEL 7 | Specific package requirements, Kernel and OS settings for SAP HANA on RHEL 7.x | |
2777782 | X | SAP HANA DB: Recommended OS Settings for RHEL 8 | Specific package requirements, Kernel and OS settings for SAP HANA on RHEL 8.x | |
2382421 | X | X | Optimizing the Network Configuration on HANA- and OS-Level | Network-related kernel settings for SAP HANA |
6.3. Role variables
In each role, default variable settings can be modified to change the behavior of the role. The README.md file of each role, located in directory /usr/share/ansible/roles/ , describes the purpose of these variables as well as their default settings. The variables are defined and can be changed in each role’s file main.yml in directory /usr/share/ansible/roles/ /defaults in an inventory file, in your playbooks, or by using the ansible-playbook command line parameter —extra-vars or -e . See the next section for examples.
Some of the variables are described in more detail below to explain their behavior and dependencies:
Kernel related variables in sap-hana-preconfigure
Kernel variables can be set either in the kernel command line via grub, or using tuned profile sap-hana. Use the following combinations of these variables in /usr/share/ansible/roles/sap-hana-preconfigure/defaults/main.yml for the cases described below:
Case 1: Use tuned profile sap-hana only
In case you would like to use tuned profile sap-hana only, leave the default settings in place:
Case 2: Use tuned profile sap-hana and also modify the kernel command line
In case you would like to use tuned and also modify the kernel command line, just modify variable sap_hana_preconfigure_modify_grub_cmdline_linux from not set or no to yes . By default, this will trigger command grub2-mkconfig .
sap_hana_preconfigure_modify_grub_cmdline_linux: yes
Case 3: Modify the kernel command line and do not use tuned
In case you would like to modify the kernel command line and not switch to tuned profile sap-hana (this will lead to all kernel settings to be configured statically), change sap_hana_preconfigure_use_tuned from yes to no . By default, this will trigger the command grub2-mkconfig .
sap_hana_preconfigure_use_tuned: no
7. Examples
As a preparation step for these examples, follow the instructions in section Quick Start, chapter Prepare the control node and ssh access to all managed nodes of this document.
7.1. Prepare two systems for SAP HANA
You want to configure RHEL 7.6 x86_64 server (managed node) hana-x-76 and RHEL 8.1 ppc64le (POWER9) PowerVM LPAR (managed node) hana-p-81 for the installation of SAP HANA. You have already verified in SAP note 2235581 that these RHEL releases are supported for the SAP HANA version you want to install, and you have also verified that your hardware vendor has certified the hardware for this SAP HANA version. You need to run the roles sap-preconfigure and sap-hana-preconfigure .
You would like the role sap-hana-preconfigure to enable the required repositories for SAP HANA and also set the RHEL minor release to the currently installed level (7.6 and 8.1) so a yum update will not cause the managed nodes to be updated beyond these minor releases. You also want the role to update to the latest software level of that minor RHEL release. Instead of the default behavior of the role, which is to not modify grub but only use tuned to set kernel and other parameters, you would like to use tuned and also modify the boot command line for SAP HANA. And you want the roles to reboot the managed nodes if necessary.
Use the following steps:
1) Verify that there is no production software running on any of the two managed nodes.
2) In case you would like to preserve the original configuration of any of the managed nodes, perform a backup of the server(s). Typically, these roles are run right after RHEL installation, so a backup should not be necessary.
3) Create an inventory file or modify file /etc/ansible/hosts so that it contains the following lines (in this example, the hosts have not been made part of a specific host group):
4) Use some simple commands to verify that you can log in to all three hosts using ssh without password:
# ssh hana-x-76 uname -a
# ssh hana-p-81 uname -a
5) Create a YAML file named sap-hana.yml with the following content:
Note that the correct indentation (e.g. 2 spaces in front of roles: ) is essential.
6) Run the following ansible-playbook command to configure the two managed nodes. Note that in this example, — hosts: all is used in the playbook and there is no group name for the hosts in file /etc/ansible/hosts , so the names of the hosts have to be specified after the -l command line parameter:
# ansible-playbook -l hana-x-76,hana-p-81 sap-hana.yml
7.2. Configure four systems for SAP NetWeaver
You want to configure the three RHEL 7.7 x86_64 systems (managed nodes) sap-test , sap-qa , and sap-prod (test, QA, and production) and RHEL 8.2 s390x system (managed node) sap-test-z for the installation of SAP NetWeaver. For system sap-test-z , you do not have access to the root user but to a user with id 0 and with name root2 . You need to run the roles sap-preconfigure and sap-netweaver-preconfigure .
The default behavior of the role sap-preconfigure is to not update the managed node to the latest RHEL software level but you would llike to update all four managed nodes to the latest RHEL software version. You do not want to fail the roles in case less than 20480 MB of swap space is configured, and you do not want to fail the roles in case a reboot is required. Use the following steps:
1) Verify that there is no other production software running on any of the four managed nodes.
2) In case you would like to preserve the original configuration of any of the servers, perform a backup of the managed nodes(s). Typically, these roles are run right after RHEL installation, so a backup should not be necessary.
3) Create an inventory file or modify file /etc/ansible/hosts so that it contains the following lines:
4) Use some simple commands to verify that you can log in to all four managed nodes using ssh without password:
# ssh sap-test uname -a
# ssh sap-qa uname -a
# ssh sap-prod uname -a
# ssh root2@sap-test-z uname -a
5) Create a YAML file named sap-netweaver.yml with the following content:
Note that the correct indentation (e.g. 2 spaces in front of roles: ) is essential.
6) Run the following ansible-playbook command to configure the four managed nodes as described above:
# ansible-playbook sap-netweaver.yml -e » <'sap_preconfigure_update': yes,
‘sap_preconfigure_fail_if_reboot_required’: no,
‘sap_netweaver_preconfigure_fail_if_not_enough_swap_space_configured’: no>»
7) Reboot all four managed nodes to make sure all required configuration changes are in effect.
7.3. Report the SAP HANA notes compliance status of a RHEL system
You have configured your RHEL 8.2 system hana-x-82 for SAP HANA manually and you would like to check if your system is compliant with the applicable SAP notes. You need to run the roles sap-preconfigure and sap-hana-preconfigure in assert mode.
Use the following steps:
1) Create an inventory file or modify file /etc/ansible/hosts so that it contains the following lines (in this example, the hosts have not been made part of a specific host group):
hana-x-82
2) Use a simple command to verify that you can log in to all the system using ssh without password:
3) Create a YAML file named sap-hana-assert.yml with the following content:
Note that the correct indentation (e.g. two spaces in front of roles:) is essential.
4) Verify that you are using version 3 or later of the RHEL System Roles for SAP:
- Make sure that you have installed version 3 of the RHEL System Roles for SAP:
- Run the following command:
Answer the first question with «N»:
Perform task: TASK: Gathering Facts (N)o/(y)es/(c)ontinue: N
and the second question with «y»:
Perform task: TASK: sap-preconfigure : include os specific vars (N)o/(y)es/(c)ontinue: y
This will display the absolute path name of file tasks/main.yml and then abort the play (because the vars file could not be found). The path name must be /usr/share/ansible/roles/sap-preconfigure/tasks/main.yml.
5) Run the verification and filter the default ansible-playbook output to only display essential verification information. If you are using a terminal with dark background, replace all occurrences of color code [30m in the following command sequence by [37m. Otherwise, the output of some lines will be unreadable (dark font on dark background).
Источник