Power Virtual Server for SAP HANA - variation 'SAP ready PowerVS'
The SAP-ready PowerVS variation of the Power Virtual Server for SAP HANA creates a basic and expandable SAP system landscape. The variation builds on the foundation of the VPC landing zone and Power Virtual Server with VPC landing zone. PowerVS instances for SAP HANA and SAP NetWeaver are deployed and pre-configured for SAP installation.
Services such as DNS, NTP, and NFS runs in VPC.
The transit gateway provides the network bridge between the IBM Power infrastructure and the IBM Cloud® VPC and public internet.
The resulting SAP landscape leverages services such as Activity Tracker, Cloud Object Storage, Key Management from the VPC landing zone and the network connectivity configuration. Additionally, it will also setup SCC Workload Protection if the feature was enabled during the landing zone deployment.
Architecture diagram
Design requirements
IBM Cloud Power Virtual Servers (PowerVS) is a public cloud offering that allows an enterprise to establish its own private IBM Power computing environment on shared public cloud infrastructure. Due to its scalability and resilience, PowerVS is the premium platform for SAP workloads in the cloud world. The reference architecture for 'Power Virtual Server for SAP HANA' - variation 'SAP ready PowerVS' is designed to provide PowerVS Linux instances prepared and configured for SAP HANA and SAP NetWeaver workloads according to the best practices and requirements using IBM Cloud® deployable architectures framework.
Components
VPC for SAP - architecture decisions
| Requirement | Component | Choice | Alternative choice |
|---|---|---|---|
|
Edge VPC service with network services security group. | Create a separate security group service where public internet connectivity is allowed to be configured | |
|
Edge VPC service with management security group. | Create a separate security group where SSH connectivity from outside is allowed | |
|
Client to site VPN, NFS as a service(NFSaaS) and security groups | Create a client to site VPN and VPE full strict security groups rules without direct public internet connectivity and without direct SSH access | |
|
Linux operating system | Red Hat Enterprise Linux (RHEL) | |
|
Bastion host VPC instance | Create a Linux VPC instance that acts as a bastion host. Configure ACL and security group rules to allow SSH connectivity (port 22). Add a public IP address to the VPC instance. Allow connectivity from a restricted and limited number of public IP addresses. Allow connectivity from IP addresses of the Schematics engine nodes | |
|
Network services VPC instance | Create a Linux VPC instance that can host management components. Preconfigure ACL and security group rules to allow traffic over private networks only. | Configure application load balancer to act as proxy server manually, Modify number of virtual server instances and allowed ports in preset or perform the modifications manually |
|
Secure landing zone components | Create a minimum set of required components for a secure landing zone | Create a modified set of required components for a secure landing zone in preset |
|
IBM Cloud® monitoring instance and Monitoring Host VPC Instance | Optionally, create or import an existing IBM Cloud® monitoring instance (customer provided details) and create and pre-configure the Monitoring Host VPC instance to collect information and send it to the IBM Cloud® monitoring instance. | |
|
IBM Cloud® Security and Compliance Center Workload Protection and SCC Workload Protection agent on all VPC instances in the deployment. | Optionally, create an IBM Cloud® Security and Compliance Center Workload Protection instance and install and setup the SCC Workload Protection agent on all VPC instances in the deployment (bastion, network services, monitoring hosts). |
PowerVS workspace for SAP - architecture decisions
| Requirement | Component | Choice | Alternative choice |
|---|---|---|---|
|
Transit gateway | Set up a local transit gateway | |
|
Management network | Configure private network with default configurations | |
|
Backup network | Configure separate private network with default configurations. Network characteristics might be adapted by the users manually (for example to improve throughput) | |
|
Custom OS images | Import up to three images from COS into the PowerVS workspace. | Modify the optional input parameters that specify the list of custom OS images and the COS configuration and credentials . |
|
Preloaded SSH public key | Preload customer specified SSH public key |
PowerVS networks for SAP - architecture decisions
| Requirement | Component | Choice | Alternative choice |
|---|---|---|---|
|
SAP network | Create a separate SAP network for each SAP system. Tune SAP network in operating system according to SAP on Power best practices. | For very large SAP systems more than one SAP network may be needed. |
|
Backup network | Attach backup network that was created with the PowerVS workspace in 'Power infrastructure for deployable architecture' | For large landscapes with several SAP systems more than one backup network may be needed. |
|
Management network | Attach management network that was created with the PowerVS workspace in 'Power infrastructure for deployable architecture' |
PowerVS instances for SAP - architecture decisions
| Requirement | Component | Choice | Alternative choice |
|---|---|---|---|
|
PowerVS instance |
|
Allow customer to specify additional parameters, like non-standard file system sizes |
|
PowerVS instance |
|
Allow customer to specify additional parameters, like non-standard file system sizes |
|
IBM Cloud® Security and Compliance Center Workload Protection, Sysdig agent on all PowerVS instances in the deployment. | Optionally, install and configure the sysdig agent on PowerVS instances in the deployment | The automation automatically picks up the configuration from the landing zone. If SCC Workload Protection is enabled in the landing zone, the Sysdig agent will be installed and configured on all PowerVS instances in this deployment. |
Key and password management architecture decisions
| Requirement | Component | Choice | Alternative choice |
|---|---|---|---|
|
Public SSH key - provided by customer. Private SSH key - provided by customer. | Ask customer to specify the keys. Accept the input as secure parameter or as reference to the key stored in IBM Cloud Secure Storage Manager. Do not print SSH keys in any log files. Do not persist private SSH key. |
Compliance
This deployable architecture is certified for SAP deployments.
Next steps
Install the SAP system.