• SAP HANA

saphana
  1. Help Center
  2. SAP HANA
  3. Automatic Deployment User Guide
  4. Single-Node Deployment Without HA Required
  5. Operation Instructions (Deployment Using the CLI)
  6. Uploading a Template and Importing Environment Variables

Uploading a Template and Importing Environment Variables

Scenarios

Before you use the RTS template to deploy SAP HANA automatically, you need to upload the template to OpenStack Heat.

Procedure

  1. Log in to the Heat client.

    If you deploy the Heat client in an ECS, see the required ECS parameters in Table 1.

    Table 1 ECS parameters used by the Heat client

    Parameter

    Description

    Region

    Specifies the region where the ECS is located. Choose a region as required.

    AZ

    Specifies the AZ where the ECS is located. Choose an AZ as required.

    Specifications

    Select General-purpose. Select s1.medium for Flavor Name with 1 vCPU and 4 GB memory or larger.

    DeH

    Select Do not configure.

    Image

    Select Public imageCentOS, and the corresponding image.

    Disk

    Choose Common I/O and 40 GB for the system disk.

    VPC

    Set this parameter as required.

    Security Group

    Set this parameter as required.

    NIC

    Set this parameter as required.

    EIP

    Select Automatically assign.

    Bandwidth

    This parameter is configured only after an EIP is bound to an ECS. This parameter specifies the communication channel bandwidth of the used EIP. Set the parameter as required, for example, 30 Mbit/s.

    Login Mode

    Select Key pairKey pair specifies that a Secure Shell (SSH) key certificate is used for authenticating users who attempt to log in to an ECS. Click View Key Pair and create a key pair on the Key Pair page.

    Auto Recovery

    Set Auto Recovery to Enable.

    Advanced Settings

    Select Configure now.

    User Data Injection

    Assign permissions to user root in user data injection mode so that the user can log in to an ECS using a private key through SSH.

    Select Text and enter the following content in the text box:

    #cloud-config

    disable_root: false

    runcmd:

    - sed -i 's/^PermitRootLogin.*$/PermitRootLogin without-password/' /etc/ssh/sshd_config

    - sed -i '/^KexAlgorithms.*$/d' /etc/ssh/sshd_config

    - service sshd restart

    ECS Group

    Do not configure it in this scenario.

    Tag

    A tag identifies an ECS. Adding tags to an ECS facilitates ECS identification and management.

    Agency Name

    Do not configure it in this scenario.

    ECS Name

    Specifies the ECS name. The ECS name contains a maximum of 13 characters.

    Quantity

    1

    NOTE:

    For details about how to install and deploy the Heat client, see the official community guide.

    https://docs.openstack.org/user-guide/common/cli-install-openstack-command-line-clients.html

    The Heat client has the following version mappings:

    python-heatclient-1.0.0

  2. Download the Heat template package from the OBS bucket or upload the Heat template package to the specified Heat client directory.

    Run the following command to download the Heat template package:

    wget http://obs.otc.t-system.com/obs-sap/hana/cfgandscript/template.zip -P /home/test

    Alternatively, use WinSCP to upload the downloaded Heat template package to the specified Heat client directory.

    Run the following command to decompress the template package:

    unzip template.zip

    Table 2 List of template files

    Template Name

    Description

    SAP-HANA-Resource-VPC.template

    Create a VPC using this template.

    SAP-HANA-Resource-Subnet.template

    Create a subnet using this template.

    SAP-HANA-Resource-SingleNode-SecurityGroup.template

    Create a security group for the HANA single-node scenario using this template.

    SAP-HANA-Resource-ServerGroup.template

    Create an anti-affinity group using this template.

    SAP-HANA-Resource-NFS-SecurityGroup.template

    Create a security group for the NFS server using this template.

    SAP-HANA-Resource-Network.template

    Create a network using this template.

    SAP-HANA-Resource-NatAndStudio-SecurityGroup.template

    Create security groups for the NAT server and HANA Studio server using this template.

    SAP-HANA-Resource-KeyPair.template

    Create a private key file using this template.

    SAP-HANA-Resource-HanaCluster-SecurityGroup.template

    Create a security group for the HANA cluster scenario using this template.

    SAP-HANA-Resource-ElasticIP.template

    Create an EIP using this template.

    SAP-HANA-HanaCluster-NfsServer.template

    Create a security group for the NFS server used in the HANA cluster scenario using this template.

    SAP-HANA-HanaCluster-7Workers1Standby.template

    Create the HANA7+1 cluster with 7 work nodes and 1 standby node.

    SAP-HANA-HanaCluster-6Workers1Standby.template

    Create the HANA6+1 cluster with 6 work nodes and 1 standby node.

    SAP-HANA-HanaCluster-5Workers1Standby.template

    Create the HANA5+1 cluster with 5 work nodes and 1 standby node.

    SAP-HANA-HanaCluster-4Workers1Standby.template

    Create the HANA4+1 cluster with 4 work nodes and 1 standby node.

    SAP-HANA-HanaCluster-3Workers1Standby.template

    Create the HANA3+1 cluster with 3 work nodes and 1 standby node.

    SAP-HANA-BaseNode-NatServer.template

    Create an NAT server ECS using this template.

    SAP-HANA-BaseNode-HanaStudio.template

    Create a HANA Studio server using this template.

    SAP-HANA-BaseNode-HanaNode.template

    Create a single HANA node using this template.

    NOTE:

    This operation is performed by the system administrator.

  3. Import environment variables. The following commands use Deutsche Telekom production environment as an example:

    export OS_AUTH_URL=https://iam.eu-de.otc.t-systems.com/v3

    export OS_PROJECT_NAME=eu-de

    export OS_USER_DOMAIN_NAME=Username

    export OS_PROJECT_DOMAIN_NAME=Domainname

    export OS_USERNAME=Username

    export OS_PASSWORD=UserPassword

    NOTE:
    • OS_AUTH_URL: indicates the IAM URL. For details, see section "Regions and Endpoints" in the Identity and Access Management API Reference.
    • OS_PROJECT_NAME: indicates the project name. You can query the project name on the My Credential page after logging in to the public cloud management console.
    • OS_USER_DOMAIN_NAME: indicates the tenant name of the user. For a common user, enter the username used to log in to the public cloud management console.
    • OS_PROJECT_DOMAIN_NAME: indicates the tenant name of the current user. For a common user, enter the username used to log in to the public cloud management console. For a user using the multi-tenant login mode, enter the enterprise account used to log in to the public cloud management console.
    • OS_USERNAME: indicates the username used to log in to the public cloud management console.
    • OS_PASSWORD: indicates the password used to log in to the public cloud management console, for example, Admin@123.