检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If the startup passwords of the servers at the new production site are different from those at the current DR site, manually change the passwords of the servers at the new production site on the ECS console, restart the ECSs, and the new passwords will take effect.
We assume that you have the following knowledge or skills: Basic SAP concepts, operations of SAP applications and the SAP HANA database, and deployment and supported DR solutions HUAWEI CLOUD ECS, EVS, IMS, SFS, OBS, SDRS, CSBS, and VBS.
We assume that you have the following knowledge or skills: Basic SAP concepts, operations of SAP applications and the SAP HANA database, and deployment and supported DR solutions HUAWEI CLOUD ECS, EVS, IMS, SFS, OBS, SDRS, CSBS, and VBS.
Network Configuration Security group A security group implements access control for ECSs within a security group or in different security groups, enhancing ECS security.
This section uses an SAP HANA system with SAP HANA Studio installed on a Windows ECS as an example to describe how to use the backup data to restore SAP HANA. For details about operation requirements and notes, see SAP HANA Database Backup and Recovery released by SAP.
On the ECS homepage, choose Learn more > Getting Started > Initializing an EVS Disk (Linux) to view the hard disk initialization information. Procedure Use PuTTY to log in to the NAT server with an EIP bound. Ensure that user root and the password are used for authentication.
Procedure Log in to the active SAP HANA ECS hana001.
To support the Split Brain Detection (SBD) function, each ECS is bound to a SCSI disk and iSCSI configuration is required for SBD. For details, see Configuring iSCSI (Cross-AZ HA Deployment). Parent topic: Scheme
CPU usage of all instances in an AS group/Number of vCPUs of all instances in the AS group 85% NOTE: HUAWEI CLOUD monitors the ECS CPU usage every minute. If the CPU usage of ECSs in an AS group exceeds 85% for five consecutive times, scaling is triggered.
Figure 1 Obtaining the path in which the backup file is stored Log in to the ECS where the backup file is stored as user root and switch to the administrator account for logging in to the SAP HANA system.
- WinSCP Uploads key files to ECSs. https://www.winscp.net PuTTY and PuTTYgen Used for logging in to an ECS and running commands. https://www.chiark.greenend.org.uk/~sgtatham/putty/download.html OBS Browser+ Used for uploading the SAP NetWeaver and SAP HANA installation packages
On the HUAWEI CLOUD console, log in to the ECS as the root user using VNC, right-click, and choose Open in Terminal. Go to the swpm directory and run the ./sapinst command. Open a browser, enter https://host name:4237/sapinst/docs/index.html in the address box, and press Enter.
Log in to the SAP HANA ECS and check whether the IP address of the DNS server is configured in the /etc/resolv.conf file. If not, write the IP address of the DNS server into the /etc/resolv.conf file. Parent topic: Resource Preparation
This section uses an SAP HANA system with SAP HANA Studio installed on a Windows ECS as an example to describe how to completely back up SAP HANA data. For details about operation requirements and notes, see SAP HANA Database Backup and Recovery released by SAP.
For details, see section Logging In to a Linux ECS Using an SSH Key. On the local computer, install the WinSCP software. Upload the certificate private key file (.pem file) to the NFS server.
Enter the AK and SK of the HUAWEI CLOUD account of the destination ECS and the password of the HTTP proxy server as prompted. Create and view the AK and SK on the management console.
NAT Server Provides the capability to switch to the HANA ECS using SSH. It allows you to switch to an SAP HANA node from the NAT server using Secure Shell (SSH). SFS Scalable File Service (SFS) provides the file sharing service.
Parameter description Name Description Example Value Region Select the region where the destination ECS is located. By default, the region is the one set for the current migration project, but you can select another region if needed.
The security groups must be configured according to the "minimum permission" principle so that a minimum number of ECS ports are opened. Figure 4 shows an example for configuring the security groups. You need to configure them based on your own ports.
The security groups must be configured according to the "minimum permission" principle so that a minimum number of ECS ports are opened. Figure 4 shows an example for configuring the security groups. You need to configure them based on your own ports.