cisco ucs scale-up solution for sap hana
TRANSCRIPT
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 93
White Paper
Cisco UCS Scale-Up Solution for SAP HANA
Design and Deploy a SAP HANA Single-Node Solution Based on Standalone Cisco UCS
C460 M4 Rack Servers with RHEL 7.2
October 2016
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 93
Contents
Solution Overview Introduction Audience Purpose of This Document Solution Summary
Infrastructure Overview Cisco UCS C460 M4 Rack Server Physical Components Power Cabling Network Components
Solution Design SAP HANA System Hardware Requirements for the SAP HANA Database
Deployment Hardware and Software Configuration Guidelines
Preparing the SAP HANA Scale-Up Node Configuring the Cisco Integrated Management Controller Configuring RAID Installing the Operating System Performing Post-Installation OS Customization
Installing SAP HANA Important SAP Notes SAP HANA Post-Installation Checkup Tuning the SAP HANA Performance Parameters
Monitoring and Maintenance Operations Hardware Monitoring and Maintenance Upgrading the BIOS and Firmware on the Cisco UCS C460 M4 Monitoring the Operating System Maintaining the Operating System SAP HANA Operation and Maintenance
For More Information
Appendix: Solution Variables Used for This Document
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 93
Executive Summary
Organizations in every industry are generating and using more data than ever before: from customer transactions
and supplier delivery considerations to real-time user-consumption statistics. Without reliable infrastructure that can
store, process, and analyze big data sets in real time, companies are unable to use this information to their
advantage. Using the Cisco Unified Computing System™
(Cisco UCS®) platform, the Cisco UCS Scale-Up Solution
for SAP HANA using the Cisco UCS C460 M4 Rack Server helps companies more easily harness information and
make better business decisions to stay ahead of the competition. Our solutions help improve access to all your
data to accelerate business decision making with policy-based, simplified management; lower deployment risk; and
reduced total cost of ownership (TCO). Our innovations help enable you to unlock the intelligence in your data and
interpret it with a new dimension of context and insight to help you gain a sustainable, competitive business
advantage.
The Cisco® solution for SAP HANA with the Cisco UCS C460 M4 rack-mount server provides a robust platform for
SAP HANA workloads in a single node.
Solution Overview
Introduction
The Cisco UCS C460 M4 scale-up solution provides prevalidated, ready-to-deploy infrastructure, reducing the time
and complexity involved in configuring and validating a traditional data center deployment. The reference
architecture detailed in this document highlights the resiliency and ease of deployment of a SAP HANA solution.
SAP HANA is SAP’s implementation of in-memory database technology. The SAP HANA database takes
advantage of low-cost main memory (RAM), faster access, and data-processing capabilities of multicore
processors to provide better performance for analytical and transactional applications. SAP HANA offers a multiple-
engine query-processing environment that supports relational data (with both row- and column-oriented physical
representations in a hybrid engine) as well as graph and text processing for semistructured and unstructured data
management within the same system. As an appliance, SAP HANA combines software components from SAP
optimized for certified hardware. However, this solution has a preconfigured hardware setup and preinstalled
software package that is dedicated to SAP HANA. In 2013, SAP introduced the SAP HANA Tailored Datacenter
Integration (TDI) option. TDI offers a more open and flexible way to integrate SAP HANA into the data center by
reusing existing enterprise storage hardware, thereby reducing hardware costs. With the introduction of SAP HANA
TDI for shared infrastructure, the Cisco UCS Integrated Infrastructure solution provides the advantages of an
integrated computing, storage, and network stack and the programmability of Cisco UCS. The TDI option enables
organizations to run multiple SAP HANA production systems on a shared infrastructure. It also enables customers
to run SAP application servers and SAP HANA databases hosted on the same infrastructure.
For more information about SAP HANA, see the SAP help portal: http://help.sap.com/hana/.
Audience
The intended audience for this document includes sales engineers, field consultants, professional services staff, IT
managers, partner engineers, and customers deploying the Cisco solution for SAP HANA. External references are
provided wherever applicable, but readers are expected to be familiar with the technology, infrastructure, and
database security policies of the customer installation.
Purpose of This Document
This document describes the steps required to deploy and configure a Cisco data center solution for SAP HANA.
This document showcases one of the variants of Cisco’s solution for SAP HANA: the Scale-Up implementation
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 93
scenario. Although readers of this document are expected to have sufficient knowledge to install and configure the
products used, configuration details that are important to the deployment of this solution are provided in this
document
Solution Summary
The Cisco UCS Scale-Up Solution for SAP HANA is based on the Cisco UCS C460 M4 Rack Server. Tables 1, 2,
and 3 summarize the server specifications and show proposed disk configurations for the SAP HANA use case.
Table 1. Overview of Cisco UCS C460 M4 Server Configuration
CPU Specification 2.20-GHz Intel® Xeon
® processor E7-8890 v4 CPU (Quantity: 2 or 4)
Analytics SAP Business Suite on SAP HANA (SoH)
Possible Memory Configurations ● 32-GB DDR4: Quantity 4 (128 GB)
● 32-GB DDR4: Quantity 8 (256 GB)
● 32-GB DDR4: Quantity 16 (512 GB)
● 32-GB DDR4: Quantity 24 (768 GB)
● 32-GB DDR4: Quantity 32 (1 TB)
● 32-GB DDR4: Quantity 48 (1.5 TB)
● 32-GB DDR4: Quantity 64 (2 TB)
● 32-GB DDR4: Quantity 4 (128 GB)
● 32-GB DDR4: Quantity 8 (256 GB)
● 32-GB DDR4: Quantity 16 (512 GB)
● 32-GB DDR4: Quantity 24 (768 GB)
● 32-GB DDR4: Quantity 32 (1 TB)
● 32-GB DDR4: Quantity 48 (1.5 TB)
● 32-GB DDR4: Quantity 64 (2 TB)
● 32-GB DDR4: Quantity 96 (3 TB)
● 64-GB DDR4: Quantity 64 (4 TB)
Hard-Disk Drive (HDD) Type and Quantity 1.6-TB solid-state disk (SSD) drive: Quantity 12
BIOS Release C460M4.2.0.11.22.02062016063 or later
Cisco Integrated Management Controller (IMC) Firmware
Release 2.0(11.203) or later
LSI MegaRAID Controller Cisco 12-GB SAS modular RAID controller
Network Card Cisco UCS Virtual Interface Card (VIC) 1225: Quantity 2
For 10-Gbps connectivity:
● Onboard Intel 1 Gigabit Ethernet controller: Quantity 2
● Onboard Intel 10BASE-T Ethernet controller: Quantity 2
Power Supply Redundant power supplies: Quantity 4
Table 2. Cisco UCS C460 M4 Proposed Disk Layout
Disk Disk Type Drive Group RAID Level Virtual Drive
Slot (1 through 12) SSD DG0 5 VD0
Table 3. Cisco UCS C460 M4 Proposed Disk Configuration
Drives Used RAID Type Used for File System
12 x 1.6-TB SSD drives RAID 5 Operating system ext3
Data file system XFS
Log file system XFS
SAP Hana shared file system XFS
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 93
Infrastructure Overview
Cisco UCS C460 M4 Rack Server
The Cisco UCS C460 M4 Rack Server (Figure 1) offers industry-leading performance and advanced reliability well
suited for the most demanding enterprise and mission-critical workloads, large-scale virtualization, and database
applications.
Either as a standalone system or in Cisco UCS managed operations, the Cisco UCS C460 M4 offers customers
the benefits of its high-capacity memory when very large memory footprints are required:
● SAP workloads
● Database applications and data warehousing
● Large virtualized environments
● Real-time financial applications
● Java-based workloads
● Server consolidation
The enterprise-class Cisco UCS C460 M4 server extends the capabilities of the Cisco UCS portfolio in a 4-rack-
unit (4RU) form factor. It provides the following:
● Either two or four Intel Xeon processor E7-4800 v2, E7-8800 v2, E7 8890 v3, or E7 8890 v4 CPUs
● Up to 6 terabytes (TB)* of double-data-rate 3 (DDR3) memory in 96 dual in-line memory (DIMM) slots
● Up to 12 small form-factor (SFF) hot-pluggable SAS, SATA, and SSD disk drives
● 10 PCI Express (PCIe) Generation 3 (Gen 3) slots supporting Cisco UCS VICs and third-party adapters and
graphical processing units (GPUs)
● Two Gigabit Ethernet LAN-on-motherboard (LOM) ports
● Two 10 Gigabit Ethernet ports
● One dedicated out-of-band (OOB) management port
* With 64-GB DIMMs
The Cisco UCS C460 M4 server also offers outstanding reliability, availability, and serviceability (RAS) features,
including:
● Tool-free CPU insertion
● Easy-to-use latching lid
● Hot-swappable and hot-pluggable components
● Redundant Cisco Flexible Flash (FlexFlash) Secure Digital (SD) cards
In Cisco UCS managed operations, the Cisco UCS C460 M4 takes advantage of our standards-based unified
computing innovations to significantly reduce customers’ TCO and increase business agility.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 93
Figure 1. Cisco UCS C460 M4 Rack Server
Physical Components
Figures 2, 3, and 4 show the Cisco UCS C460 server components.
Figure 2. Cisco UCS C460 M4 Front View
1 Cooling fans (hot swappable and accessible from the front panel)
8 Power supply status LED
2 Operations panel 9 Network link activity LED
3 Power button and LED 10 SAS and SATA drive bays 1 to 12 (hot swappable)
4 Identification button and LED 11 Keyboard, video, and mouse (KVM) console connector (used with a KVM cable that provides 2 USB connectors, 1 VGA connector, and 1 serial connector)
5 System status LED 12 Pull-out asset tag
6 Fan status LED —
7 Temperature status LED —
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 93
Figure 3. Cisco UCS C460 M4 Rear View
1 PCIe riser 1 (slots 1 to 5)
See PCIe slots information for slot specifications.
6 10 Gigabit Ethernet ports (2)
2 PCIe riser 2 (slots 6 to 10) 7 USB 2.0 ports (3)
3 Serial port (DB-9 connector) 8 1 Gigabit Ethernet ports (2)
4 VGA video port (DB-15 connector) 9 Rear identification LED and button
5 1 Gigabit Ethernet dedicated management port M1
10 Power supplies 1 to 4 (hot swappable and redundant as 2+2)
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 93
Figure 4. Cisco UCS C460 M4 Top View (Open)
1 PCIe riser 1 (slots 1 to 5)
See PCIe slots information for slot specifications.
6 10 Gigabit Ethernet ports (2)
2 PCIe riser 2 (slots 6 to 10) 7 USB 2.0 ports (3)
3 Serial port (DB-9 connector) 8 1 Gigabit Ethernet ports (2)
4 VGA video port (DB-15 connector) 9 Rear identification LED and button
5 1 Gigabit Ethernet dedicated management port M1
10 Power supplies 1 to 4 (hot swappable and redundant as 2+2)
Power Cabling
The standard power supply setup is 1+1. Therefore, both power supplies must be connected to one grid, and the
server tolerates the failure of one power supply. However, a grid failure is not protected.
To protect against a grid failure, each power supply must be plugged in to a completely separate grid connection.
This setup is the preferred installation and is recommended to the customer.
Network Components
The Cisco UCS C460 server is equipped with a management board for remote management over the network. This
board includes virtual KVM access at the hardware level.
The M1 interface must be connected to the console network at the customer’s location.
The server is also equipped with four onboard network interfaces. For this appliance, the following interfaces were
used:
● Two 1 Gigabit Ethernet interfaces (number 8 in Figure 3) are available for management access.
● Two Cisco VICs are available in this rack-mounted server for application access.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 93
The VIC that comes with the Cisco UCS C460 M4 server can be configured to provide multiple virtual network
interface cards (vNICs) as needed by the implemented use case.
Cisco UCS VIC 1225
The Cisco UCS VIC 1225 option was used in the validation system and is also used as an example in this
document. However, other VICs, such as the Cisco UCS VIC 1285 or 1385, are also supported, and the
configuration principles are the same.
A Cisco innovation, the Cisco UCS VIC 1225 (Figure 5) is a dual-port Enhanced Small Form-Factor Pluggable
(SFP+) 10 Gigabit Ethernet and Fibre Channel over Ethernet (FCoE)–capable PCIe card designed exclusively for
Cisco UCS C-Series Rack Servers. The VIC 1225 lets you create multiple vNICs (up to 128) on the converged
network adapter (CNA). This feature allows complete I/O configurations to be provisioned in both virtualized and
nonvirtualized environments using just-in-time provisioning, providing tremendous system flexibility and allowing
consolidation of multiple physical adapters. System security and manageability is improved by providing network
policy and security visibility and portability all the way to the virtual machines.
Figure 5. Cisco UCS VIC 1225
The VICs can be configured to create vNICs, and by default two vNICs are available for each VIC. These have a
bandwidth of 10 Gbps, and depending on the customer network and IP address range, they can be connected and
configured in the operating system (Figure 6).
For both VICs in a pair, a bond device can be created on the operating-system level based on customer-specific
requirements, if any.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 93
Figure 6. Configuring the VICs
Solution Design
This section describes the SAP HANA system requirements defined by SAP and the architecture of the Cisco UCS
solution for SAP HANA.
SAP HANA System
An SAP HANA scale-up system on a single server is the simplest of the installation types. It is possible to run an
SAP HANA system entirely on one host and then scale the system up as needed. All data and processes are
located on the same server and can be accessed locally. The network requirements for this option are at least one
1 Gigabit Ethernet access network and one 10 Gigabit Ethernet storage network.
Hardware Requirements for the SAP HANA Database
SAP defines hardware and software requirements for running SAP HANA systems. For the latest information about
the CPU and memory configurations supported for SAP HANA, see https://global.sap.com/community/ebook/2014-
09-02-hana-hardware/enEN/index.html.
Note: This document does not cover the updated information published by SAP. Additional information is
available at http://saphana.com.
File System Layout
Figure 7 shows the file-system layout and the required storage sizes for installing and operating SAP HANA. When
installing SAP HANA on a host, specify the mount point for the installation binary files (/hana/shared/<sid>), data
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 93
files (/hana/data/<sid>), and log files (/hana/log/<sid>), where <sid> is the instance identifier of the SAP HANA
installation.
Figure 7. Proposed Disk Layout with Partition Mapping
The storage size for the file system is based on the amount of memory on the SAP HANA host.
Here are some sample file system sizes for a single-node system with 3 TB of memory:
● /hana/shared: 1 x memory (3 TB)
● /hana/data: 3 x memory (9 TB)
● /hana/log: 1 x memory (512 GB)*
* For solutions based on the Intel Xeon processor E7-88x0 v4 CPU, the size of the log volume must be as
follows:
● Half of the server memory for systems with 256 GB of memory or less
● Minimum of 512 GB for systems with 512 GB of memory or more
Operating System
SAP HANA supports the following operating systems:
● SUSE Linux Enterprise Server (SLES) for SAP applications
● Red Hat Enterprise Linux (RHEL) for SAP HANA
Note: This document provides installation steps for RHEL 7.2.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 93
Deployment Hardware and Software
Configuration Guidelines
This section is intended to enable you to fully configure the customer environment. In this process, various steps
require you to insert customer-specific naming conventions, IP addresses, and VLAN schemes, as well as to
record appropriate MAC addresses. Table 4 lists the configuration variables that are used throughout this
document. This table can be completed based on the specific site variables and used in implementing the
configuration steps presented in this document.
Table 4. Configuration Variables
Variable Description Customer Implementation Value
<<var_cimc_ip_address>> Cisco UCS C460 M4 server’s CIMC IP address
<<var_cimc_ip_netmask>> Cisco UCS C460 M4 server’s CIMC network netmask
<<var_cimc_gateway_ip>> Cisco UCS C460 M4 server’s CIMC network gateway IP address
<<var_raid5_vd_name>> Name for virtual drive VD0 during RAID configuration
<<var_hostname.domain>> SAP HANA node’s fully qualified domain name (FQDN)
<<var_sys_root-pw>> SAP HANA node’s root password
<<var_lvm_vg_name>> SAP HANA node’s OS logical volume management (LVM) volume group (VG) name
<<var_mgmt_ip_address>> SAP HANA node’s management and administration IP address
<<var_mgmt_nw_netmask>> SAP HANA node’s management network netmask
<<var_mgmt_gateway_ip>> Cisco UCS C460 M4 server’s management and administration network gateway IP address
<<var_mgmt_netmask_prefix>> Netmask prefix in Classless Inter-Domain Routing (CIDR) notation
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 93
Preparing the SAP HANA Scale-Up Node
Configuring the Cisco Integrated Management Controller
To configure the on-board Cisco IMC, you should connect a KVM switch to the server.
1. After everything is connected, turn on the power to the server. The system performs the power-on self-test
(POST) and displays the POST screens (Figures 8 and 9).
Figure 8. BIOS POST Screen
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 93
Figure 9. BIOS POST Screen (Continued)
2. Press F8 to display the CIMC configuration (Figure 10).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 93
Figure 10. Cisco UCS C460 CIMC Configuration View (Local Display)
3. Use the console network IP address <<var_cimc_ip_address>>, netmask <<var_cimc_ip_netmask>>,
and gateway <<var_cimc_gateway_ip>> for the IPv4 settings of the CIMC. Select None for NIC
redundancy.
4. Press F10 to save the configuration and exit the utility.
5. Open a web browser on a computer on the same network with Java and Adobe Flash installed.
6. Enter the CIMC IP address of the Cisco UCS C460 M4 server: http://<<var_cimc_ip_address>>.
7. Enter the login credentials as updated in the CIMC configuration. The default username and password are
admin and password. The IMC home screen appears (Figure 11).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 93
Figure 11. Cisco UCS C460 CIMC Home Screen
8. BIOS Properties: Sample output from the validation system is provided here for reference.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 93
Figure 12. BIOS Parameters
Configuring RAID
The following procedure shows the RAID configuration on the Cisco UCS C460 server used for SAP HANA.
1. From the CIMC page, click Launch KVM Server.
2. Click KVM Console.
3. When the KVM console is launched, click Boot Server (Figure 13).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 93
Figure 13. Cisco UCS KVM Console
4. When prompted, press Ctrl+R to run the MegaRAID Configuration Utility (Figure 14).
Figure 14. Running the MegaRAID Configuration Utility
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 93
5. On the VD Mgmt tab, press F2 to select Operations (Figure 15).
Figure 15. MegaRAID Configuration Utility: Virtual Drive Management
6. Select Create Virtual Drive (Figure 16).
Figure 16. MegaRAID Configuration Utility: Create Virtual Drive
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 93
7. Choose the following options to create a RAID 5 virtual drive (Figure 17):
a. For RAID Level, choose RAID-5.
b. Choose all 12 disks.
c. Name the virtual drive <<var_raid5_vd_name>>.
Figure 17. MegaRAID Configuration Utility: Create RAID 5
8. Click the Advanced option (Figure 18).
a. For Strip Size, choose 256KB.
b. For Read Policy, choose Ahead.
c. For Write Policy, choose Always Write Back.
d. For I/O Policy, choose Cached.
e. For Disk Cache Policy and Emulation, keep the default settings.
f. Choose Initialize.
g. Click OK.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 93
Figure 18. MegaRAID Configuration Utility: Create RAID 5 Advanced Options
9. Click OK to create a new virtual drive page (Figure 19).
Figure 19. MegaRAID Configuration Utility with Virtual Drives
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 93
10. Wait for the initialization process for VD0 to complete, which may take several minutes.
11. Press Esc and select OK to exit the RAID Configuration Utility.
12. Press Ctrl+Alt+Del to reboot the server.
Installing the Operating System
The following procedure shows the RHEL 7.2 operating system installation on local drives. Keep the RHEL 7.2
server DVD handy.
1. On the CIMC page, click Launch KVM Server.
2. Click KVM Console.
3. After the KVM console is launched, click Boot Server.
4. Choose Virtual Media > Activate Virtual Devices.
a. For Unencrypted Virtual Media Session, select Accept this Session and then click Apply.
b. Click Virtual Media and choose Map CD/DVD.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 23 of 93
c. Click Browse to navigate to the ISO media location.
d. Click Map Device.
5. On the initial screen, select Install Red Hat Enterprise Linux 7.2 to begin the installation process
(Figure 20).
Figure 20. Beginning the Installation Process
6. Select the language and keyboard layout that you prefer.
Click Continue. The central Installation Summary page appears. You need to configure various features
(Figure 21).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 24 of 93
Figure 21. Installation Summary
7. Choose Localization > Date & Time. Choose the appropriate region and city. You will configure the
Network Time Protocol (NTP) at a later time. Click Done (Figure 22).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 25 of 93
Figure 22. Date and Time Settings
8. Choose Security > Security Policy. Turn off the security policy (Figure 23).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 26 of 93
Figure 23. Security Policy Settings
9. Choose Software Selection. Retain the default selection: Minimal Install (Figure 24).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 27 of 93
Figure 24. Software Selection Page
10. Choose KDUMP. Deselect the Enable kdump option to disable it (Figure 25).
Figure 25. Kdump Settings
11. Choose System > Installation Destination. Under other storage options, select the option to manually
configure the disk partition layout: I will configure partitioning. Click Done (Figure 26).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 28 of 93
Figure 26. Installation Settings Landing Page
The Manual Partitioning page appears (Figure 27).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 29 of 93
Figure 27. Creating Manual Partitioning
12. You will first create a /boot partition with the standard partition scheme. Change the default partition
scheme from LVM to Standard Partition (Figure 28).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 30 of 93
Figure 28. Choosing the Standard Partition Type
13. Click the + button to choose a /boot partition size of 200MiB. Click Add mount point (Figure 29).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 31 of 93
Figure 29. Entering Mount Point and Capacity Information
14. Change the file system type from the default XFS to ext3 (Figure 30).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 32 of 93
Figure 30. Modifying the File System Type
You need to create a BIOS boot (biosboot) partition to install on a BIOS system in which the disk that contains the
boot loader uses a globally unique identifier (GUID) partition table (GPT). Because the setup here uses a single 16-
TB device, GPT is used by default]. The biosboot partition should be 1 MB in size.
15. Click the + button, select biosboot for Mount Point, and enter 1MiB for Desired Capacity. Then click Add
mount point (Figure 31).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 33 of 93
Figure 31. Creating the biosboot Partition
16. Review the properties and click + to add the next partition (Figure 32).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 34 of 93
Figure 32. Adding the Next Partition
After defining the /boot and biosboot partitions, you will assign the remaining disk space to the LVM as a volume
group and then carve out the root volume, swap volume, and SAP HANA system volumes.
17. Click the + button, select / for Mount Point, and enter 100GiB for Desired Capacity. Then click Add
mount point (Figure 33).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 35 of 93
Figure 33. Creating Root File System of 100 GB
18. Change the device type from Standard Partition to LVM (Figures 34 and 35).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 36 of 93
Figure 34. Preparing to Modify Device Type to LVM
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 37 of 93
Figure 35. Changing Device Type to LVM
19. Next modify the volume group properties. Click Modify under Volume Group (Figure 36).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 38 of 93
Figure 36. Modifying Volume Group Properties
20. Change the name of the volume group from the default rhel to hanavg. Click Save (Figure 37).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 39 of 93
Figure 37. Configuring the Volume Group
21. Change the file system type to ext3 and change the name to rootvol. Click Update Settings (Figure 38).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 40 of 93
Figure 38. Updating the File System Type and Volume Group Name
22. You will now create a 2-GB swap volume. Click the + button, select swap for Mount Point, and enter
2048MiB for Desired Capacity. Then click Add mount point (Figure 39).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 41 of 93
Figure 39. Creating a Swap Volume
23. Change the device type to LVM, verify that hanavg is selected as the volume group, and change the
name to swapvol (Figure 40).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 42 of 93
Figure 40. Updating Swap Volume Properties
24. Next you will create the SAP HANA system’s data, log, and shared volumes. Start by clicking the + button.
Select /hana/data for Mount Point and 9TiB for Desired Capacity. Then click Add mount point
(Figure 41).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 43 of 93
Figure 41. Creating the /hana/data Logical Volume
25. Change the device type to LVM, verifying that hanavg is selected for Volume Group. Change the name to
datalv (Figure 42).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 44 of 93
Figure 42. Updating /hana/data Logical Volume Properties
26. Click the + button, select /hana/log for Mount Point, and enter 512GiB for Desired Capacity. Click Add
mount point (Figure 43).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 45 of 93
Figure 43. Creating the /hana/log Logical Volume
27. Change the device type to LVM, verifying that hanavg is selected for Volume Group. Change the name to
loglv (Figure 44).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 46 of 93
Figure 44. Updating /hana/log Logical Volume Properties
28. Click the + button, select /hana/shared for Mount Point, and enter 3TiB for Desired Capacity. Click Add
mount point (Figure 45).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 47 of 93
Figure 45. Creating the /hana/shared Logical Volume
29. Change the device type to LVM, verifying that hanavg is selected for Volume Group. Change the name to
sharedlv. Click Update Settings (Figure 46).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 48 of 93
Figure 46. Updating /hana/shared Logical Volume Properties
30. Click Done. A summary of your changes appears (Figure 47). Click Accept Changes.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 49 of 93
Figure 47. Summary of Changes in Configuration of Manual Partitions
31. Click the Network and Host Name option on the Installation Summary page (Figure 48).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 50 of 93
Figure 48. Selecting the Network and Host Name Configuration
32. Look for the Ethernet device that is not unplugged, update the desired host name, and click Configure
(Figure 49).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 51 of 93
Figure 49. Updating Host Name Information and Preparing to Configure Ethernet Interface
33. Select the IPv4 settings tab and the netmask and gateway details. Set the method to Manual. Enter the
management IP address, netmask, and gateway details. Click Save (Figure 50).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 52 of 93
Figure 50. Editing Ethernet Interface Properties
34. Turn ON the configured Ethernet interface and verify that it is connected (Figure 51). Then click Done.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 53 of 93
Figure 51. Turning on the Ethernet Interface
35. On the Installation Summary screen, click Begin Installation (Figure 52).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 54 of 93
Figure 52. Beginning Installation
36. As the installation progresses, set the root password (Figures 53 and 54).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 55 of 93
Figure 53. Selecting Root Password to Set the Password
Figure 54. Enter and Confirm the Root User Password
37. The installation process completes. Click Finish (Figure 55).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 56 of 93
Figure 55. Finishing Configuration
Initramfs is generated at this time (Figure 56).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 57 of 93
Figure 56. Initramfs Update
38. Upon completion, you are prompted to reboot the system. Click Reboot (Figure 57)
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 58 of 93
Figure 57. Installation Complete
Performing Post-Installation OS Customization
Follow the steps presented here to cutomize the server in preparation for installing SAP HANA.
Configuring the Host Name
Configure the host name as described here.
1. Use the KVM console to log in to the installed system as the user root with the password
<<var_sys_root-pw>>.
2. Update the /etc/hosts file with an entry matching the host name and IP address of the system (Figure 58).
Figure 58. Sample Hosts File
3. Verify that the set host name is displayed correctly.
The operating system must be configured in such a way that the short name of the server is displayed by
the command hostname -s, and the fully qualified host name is displayed by the command hostname –f.
Figure 59 shows sample output.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 59 of 93
Figure 59. Sample hostname Command Output
Configuring the Network
The Cisco UCS C460 M4 server comes with a pair of Cisco UCS VIC 1225 adapters. In addition to the
administration and management networks, you can optionally have networks for backup, client access, etc. You
can configure additional networks based on customer-specific requirements and use cases.
1. To display an overview of the Ethernet interface configuration, enter the ip addr command. Figure 60
shows sample output.
Figure 60. Sample ip addr Command Output
In RHEL 7, systemd and udev support a number of different naming schemes. By default, fixed names are
assigned based on firmware, topology, and location information: for example, enp72s0, as shown in
Figure 60.
With this naming convention, although names remain fixed even if hardware is added or removed, names
often are more difficult to read than with traditional kernel-native ethX naming: that is, eth0, etc.
Another convention for naming network interfaces, biosdevnames, is available with installation.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 60 of 93
2. Configure boot parameters net.ifnames=0 biosdevname=0 to disable both conventions, to get the
original kernel native network names.
3. Also, you can disable IPv6 support at this time because the solution described here uses IPv4. To do so,
append ipv6.disable=1 to GRUB_CMDLINE_LINUX as shown in Figure 61.
Figure 61. Sample Grub File CMDLINE Parameter Additions
4. Run the grub2-mkconfig command to regenerate the grub.cfg file:
# grub2-mkconfig -o /boot/grub2/grub.cfg
Figure 62 shows the results.
Figure 62. Updating the Grub Configuration:
5. Reboot the system to implement the changes:
# reboot
6. After the system reboots, use the KVM console to log in to the installed system as the user root with the
password <<var_sys_root-pw>>.
The ip addr command shows interfaces in the traditional kernel-native ethX nomenclature (Figure 63).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 61 of 93
Figure 63. Checking the Interface Status with the ip addr Command
A close observation of the output reveals that the previous IP address setting is lost due to the changes in
interface naming that you just made. You will have to again find the interface that has the uplink
connectivity. A check for link status using the ethtool command helps identify the interface that is
connected to the management network (Figure 64).
Figure 64. Using the ethtool Command to Check Link Status
7. Assign <<var_mgmt_ip_address>> as the IP address and enter <<var_mgmt_ip_mask>> as the
subnet mask for the available interface (eth5 in the example here). You can use this configuration
temporarily until you port this interface to a high-availability bond device and create another interface with
Cisco VIC 10-Gbps ports.
8. Go to the network configuration directory and create a configuration for eth5 as shown in the following
example:
#cd /etc/sysconfig/network-scripts
#vi ifcfg-eth5
DEVICE=eth5
TYPE=Ethernet
ONBOOT=yes
BOOTPROTO=static
IPV6INIT=no
USERCTL=no
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 62 of 93
NM_CONTROLLED=no
IPADDR=<<var_mgmt_ip_addr>>
NETMASK=<<var_mgmt_nw_netmask>>
9. Add the default gateway.
#vi /etc/sysconfig/network
NETWORKING=yes
HOSTNAME=<<var_hostname.domain>>
GATEWAY=<<var_mgmt_gateway_ip>>
Configuring the Network Time
Be sure that the time on all components used for SAP HANA is synchronized. Use the same NTP configuration on
all systems.
#vi /etc/ntp.conf
…..
server <NTP-SERVER1 IP>
server <NTP-SERVER2 IP>
#service ntpd stop
#ntpdate ntp.example.com
#service ntpd start
#chkconfig ntpd on
#chkconfig ntpdate on
Configuring the Domain Name System
Configure the Domain Name System (DNS) based on the local requirements.
A sample configuration is shown here. Add the DNS IP address if it is required to access the Internet.
#vi /etc/resolv.conf
DNS1=<<IP of DNS Server1>>
DNS2=<<IP of DNS Server2>>
DOMAIN= <<Domain_name>>
Configuring Bonds for High Availability
To configure a bond for high availability, first view the Ethernet interfaces available in the system.
By examining the hardware and MAC addresses of the interfaces using the ifconfig command and the properties
using ethtool, you can clearly differentiate the interfaces for the two dual-port Cisco UCS VIC 1225 adapters
installed in the server as well as the onboard 1-Gbps interface (Figure 65).
A bond configured with two 1-Gbps ports can be used for the administration, management, and access networks,
and a bond configured with two ports, using one port from each dual-port VIC, can be used for a backup network.
Additional interfaces can be configured on the VICs based on needs.
In the example in Figure 65, the ethtool output for the interfaces showing Fibre Channel support and 10-Gbps
indicates that eth0 through eth3 are VIC ports. In addition, a close observation of their MAC addresses reveals that
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 63 of 93
eth4 and eth5 and that eth6 and eth7 are ports on the same VICs (in both cases, the last octet of the MAC address
differs).
So for high availability, eth0 and eth2 are one possible slave pair for creating a 10-Gbps bond device.
Likewise, 1-Gbps interfaces eth4 and eth5 are potential slave interfaces for a 1-Gbps bond device.
In this section, you will manually create at least these two bond interfaces.
Figure 65. Identifying VIC Ports and Their Supported Link Modes
1. Create 1-Gbps bond device ifcfg-bond0 with eth0 and eth1 as slaves.
a. Create a bond0 configuration file.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 64 of 93
# vi /etc/sysconfig/network-scripts/ifcfg-bond0
DEVICE=bond0
IPADDR=<<var_mgmt_ip_address>>
NETMASK=<<var_mgmt_nw_netmask>>
ONBOOT=yes
HOTPLUG=no
BOOTPROTO=none
USERCTL=no
BONDING_OPTS="miimon=100 mode=1"
NM_CONTROLLED=no
b. Modify the eth4 and eth5 configuration files.
# vi /etc/sysconfig/network-scripts/ifcfg-eth4
DEVICE=eth4
BOOTPROTO=none
ONBOOT=yes
HOTPLUG=no
MASTER=bond0
SLAVE=yes
USERCTL=no
NM_CONTROLLED=no
# vi /etc/sysconfig/network-scripts/ifcfg-eth5
DEVICE=eth5
BOOTPROTO=none
ONBOOT=yes
HOTPLUG=no
MASTER=bond0
SLAVE=yes
USERCTL=no
NM_CONTROLLED=no
c. Test the configuration.
Restart the network service to bring up the bond0 interface. Then enter the following command:
# systemctl restart network.service
To query the current status of the Linux kernel bounding driver, enter the following command:
# cat /proc/net/bonding/bond0
Figure 66 shows sample output.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 65 of 93
Figure 66. Sample Bond Configuration Status Output
To verify the status of the interfaces, enter the ip addr command (Figure 67):
# ip addr
Figure 67. Verifying the Bond Interface Status with the ip addr Command
2. Create 10-Gbps bond device ifcfg-bond1 with eth0 and eth2 as slaves.
a. Create a bond1 configuration file.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 66 of 93
# vi /etc/sysconfig/network-scripts/ifcfg-bond1
DEVICE=bond1
IPADDR=<<ip_address_customer_usecase>>
NETMASK=<<subnet_mask>>
ONBOOT=yes
HOTPLUG=no
BOOTPROTO=none
USERCTL=no
BONDING_OPTS="miimon=100 mode=1"
NM_CONTROLLED=no
b. Modify the eth0 and eth2 configuration files.
# vi /etc/sysconfig/network-scripts/ifcfg-eth0
DEVICE=eth0
BOOTPROTO=none
ONBOOT=yes
HOTPLUG=no
MASTER=bond1
SLAVE=yes
USERCTL=no
NM_CONTROLLED=no
# vi /etc/sysconfig/network-scripts/ifcfg-eth2
DEVICE=eth2
BOOTPROTO=none
ONBOOT=yes
HOTPLUG=no
MASTER=bond1
SLAVE=yes
USERCTL=no
NM_CONTROLLED=no
c. Test the configuration.
Restart the networking service to bring up the bond0 interface. Enter the following command:
# systemctl restart network.service
To query the current status of Linux kernel bounding driver, enter the following command:
# cat /proc/net/bonding/bond1
Updating the Red Hat System and Customizing the OS for SAP HANA
Before you can customize the OS for SAP HANA, you need to update the Red Hat system.
1. Update the Red Hat repository.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 67 of 93
To patch the system, you must first update the repository. Note that the installed system doesn’t include
any update information. For you to patch the Red Hat system, it must be registered and attached to a
valid subscription. The following code will register the installation and update the repository information:
#subscription-manager register --auto-attach
Username: <<username>>
Password: <<password>>
2. To list the repositories subscribed to, use the following command:
#yum repolist
Update only the OS kernel and firmware packages to the latest release that appeared in RHEL 6.7. Set
the release version to 6.7.
#subscription-manager release –set=7.2
3. Apply the latest updates for RHEL 7.2. Typically, the kernel is updated as well.
#yum -y update
4. Reboot the machine and use the new kernel.
5. Install the base package group.
#yum -y groupinstall base
6. Install dependencies in accordance with the SAP HANA Server Installation and Update Guide [refer
attachment
'hana_sps12_Red_Hat_Enterprise_Linux_RHEL_7_x_Configuration_Guide_for_SAP_HANA_en.pdf' as
part of the SAP Note 2009879] Install the numactl package if you are using the benchmark SAP HANA
Hardware Configuration Check Tool (HWCCT).
#yum -y install gtk2 libicu xulrunner sudo tcsh libssh2 expect cairo graphviz
iptraf krb5-workstation libpng12 krb5-libs nfs-utils lm_sensors rsyslog
compat-sap-c++ openssl098e openssl PackageKit-gtk-module libcanberra-gtk2
libtool-ltdl xorg-x11-xauth compat-libstdc++-33 numactl libuuid uuidd
e2fsprogs icedtea-web xfsprogs net-tools bind-utils glibc-devel libgomp
7. Disable Security-Enhanced Linux (SELinux).
To help ensure that SELinux is fully disabled, modify the file /etc/selinux/config:
# sed -i 's/\(SELINUX=enforcing\|SELINUX=permissive\)/SELINUX=disabled/g'
/etc/selinux/config
8. For compatibility reasons, four symbolic links are required. Configure them as shown here:
#ln -s /usr/lib64/libssl.so.0.9.8e /usr/lib64/libssl.so.0.9.8
#ln -s /usr/lib64/libssl.so.1.0.1e /usr/lib64/libssl.so.1.0.1
#ln -s /usr/lib64/libcrypto.so.0.9.8e /usr/lib64/libcrypto.so.0.9.8
#ln -s /usr/lib64/libcrypto.so.1.0.1e /usr/lib64/libcrypto.so.1.0.1
9. Configure tuned to use the profile sap-hana:
# yum install tuned-profiles-sap-hana tuned
# systemctl start tuned
# systemctl enable tuned
# tuned-adm profile sap-hana
10. Disable transparent hugepages (THP) and configure C-states for lower latency in Linux.
a. Modify the file /etc/default/grub and append the following parameter to the line starting with
GRUB_CMDLINE_LINUX (Figure 68):
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 68 of 93
transparent_hugepage=never intel_idle.max_cstate=0 processor.max_cstate=1
Figure 68. Appending Boot Parameters to GRB_CMDLINE_LINUX
b. To implement these changes, rebuild the GRUB2 configuration (Figure 69):
# grub2-mkconfig -o /boot/grub2/grub.cfg
Figure 69. Updating the Grub Configuration
11. Turn off automatic non-uniform memory access (NUMA) balancing and disable the numad user-space
daemon.
# echo "kernel.numa_balancing = 0" >> /etc/sysctl.d/sap_hana.conf
# sysctl -p /etc/sysctl.d/sap_hana.conf
# systemctl stop nomad
# systemctl disable numad
12. Verify that the systemd package is updated to version systemd-219-19.el7_2.4 or later (Figure 70).
Figure 70. Verifying the systemd Package Version
13. Append the following lines to the file /etc/sudoers file, replacing <sidadm> with the appropriate user
name:
Cmnd_Alias SIDALIAS = /sbin/multipath, /sbin/multipathd, /usr/bin/sg_persist,
/bin/mount, /bin/umount, /bin/kill, /usr/sbin/lsof, /sbin/vgchange, /sbin/vgscan
Defaults!SIDALIAS !requiretty
<sidadm> ALL=NOPASSWD: SIDALIAS
14. When you run commands as the <sidadm> user on the command line, the following message appears:
ERROR: ld.so: object '/opt/rh/SAP/lib64/compat-sap-c++.so' from LD_PRELOAD
cannot be preloaded: ignored.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 69 of 93
Due to a bug in the SAP HANA installer, the environment configuration of the <sidadm> user contains a
reference to the compat-sap-c++ library, which is not required in RHEL7. This error message is harmless,
but to get rid of it you can do the following:
a. Remove the following line in the file hdbenv.csh in the home directory of the <sidadm> user:
setenv LD_PRELOAD /opt/rh/SAP/lib64/compat-sap-c++.so
b. Remove the following line in the file hdbenv.sh in the home directory of the <sidadm> user:
LD_PRELOAD=/opt/rh/SAP/lib64/compat-sap-c++.so
export LD_PRELOAD
15. Disable crash dump abortion:
# systemctl disable abrtd
# systemctl disable abrt-ccpp
# systemctl stop abrtd
# systemctl stop abrt-ccpp
16. Disable core file creation. To disable core dumps for all users, open the /etc/security/limits.conf file and
add these lines:
* soft core 0
* hard core 0
17. Enable the sapsys group to create an unlimited number of processes:
echo "@sapsys soft nproc unlimited" > /etc/security/limits.d/99-sapsys.conf
18. To help prevent problems with the firewall during SAP HANA installation, you can disable it completely
with the following commands:
# systemctl stop firewalld
# systemctl disable firewalld
19. Configure the network time and date.
a. Make sure that NTP and its utilities are installed and that chrony is disabled:
# yum -y install ntp ntpdate
# systemctl stop ntpd.service
# systemctl stop chronyd.service
# systemctl disable chronyd.service
b. Edit /etc/ntp.conf and make sure that the server lines reflect your NTP servers:
# grep ^server /etc/ntp.conf
server ntp.example.com
server ntp1.example.com
server ntp2.example.com
c. Force an update to the current time:
# ntpdate ntp.example.com
d. Enable and start the ntpd service:
# systemctl enable ntpd.service
# systemctl start ntpd.service
# systemctl restart systemd-timedated.service
e. Verify that the NTP service is enabled:
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 70 of 93
# systemctl list-unit-files | grep ntp
ntpd.service enabled
ntpdate.service disabled
The ntpdate service script adjusts the time according to the NTP server every time the system is launched.
This process occurs before the regular NTP service is started and helps ensure an exact system time even if
the time deviation is too large to be compensated for by the NTP service.
# echo ntp.example.com >> /etc/ntp/step-tickers
# systemctl enable ntpdate.service
For more information about configuring NTPD on RHEL7, see the chapter “Configuring NTP Using ntpd” in the
RHEL7 System Administrators Guide
20. Reboot the OS.
21. Optionally, remove old kernels after the OS update:
package-cleanup --oldkernels --count=1
Installing SAP HANA
Use the official SAP documentation, which describes the installation process with and without the SAP unified
installer.
For the SAP HANA installation documentation, see SAP HANA Server Installation Guide.
All other SAP installation and administration documentation is available at http://service.sap.com/instguides.
Important SAP Notes
Read the following SAP notes before you start the installation process. These notes contain the latest information
about the installation, as well as corrections to the installation documentation.
The latest SAP notes can be found at https://service.sap.com/notes.
SAP HANA In-Memory Database (IMDB) Notes
SAP Note 1514967: SAP HANA: Central note
SAP Note 1523337: SAP HANA database: Central note
SAP Note 2000003: FAQ: SAP HANA
SAP Note 1730999: Configuration changes in SAP HANA appliance
SAP Note 1514966: SAP HANA 1.0: Sizing SAP in-memory database
SAP Note 1780950: Connection problems due to host name resolution
SAP Note 1743225: SAP HANA: Potential failure of connections with scale-out nodes
SAP Note 1755396: Released disaster tolerant (DT) solutions for SAP HANA with disk replication
SAP Note 1890444: HANA system slow due to CPU power save mode
SAP Note 1681092: Support for multiple SAP HANA databases on a single SAP HANA appliance
SAP Note 1514966: SAP HANA: Sizing the SAP HANA database
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 71 of 93
SAP Note 1637145: SAP BW on HANA: Sizing the SAP HANA database
SAP Note 1793345: Sizing for Suite on HANA
Linux Notes
SAP Note 2235581: SAP HANA: Supported operating systems
SAP Note 2009879: SAP HANA guidelines for RHEL
SAP Note 2292690: Recommended OS settings for RHEL 7.2
SAP Note 2009879: SAP HANA Guidelines for Red Hat Enterprise Linux (RHEL) Operating System
SAP Note 1557506: Linux paging improvements
SAP Note 1726839: SAP HANA database: Potential crash when using XFS file system
SAP Note 1740136: SAP HANA: Wrong mount option may lead to corrupt persistency
SAP Note 1829651: Time-zone settings in SAP HANA scale-out landscapes
SAP Application Notes
SAP Note 1658845: SAP HANA database hardware check
SAP Note 1637145: SAP BW on SAP HANA: Sizing SAP in-memory database
SAP Note 1661202: Support for multiple applications on SAP HANA
SAP Note 1681092: Support for multiple SAP HANA databases on one SAP HANA appliance (also known as Multi
SID)
SAP Note 1577128: Supported clients for SAP HANA 1.0
SAP Note 1808450: Homogenous system landscape for on SAP BW on SAP HANA
SAP Note 1976729: Application component hierarchy for SAP HANA
SAP Note 1927949: Standard behavior for SAP logon tickets
SAP Note 1577128: Supported clients for SAP HANA
Third-Party Software Notes
SAP Note 1730928: Using external software in an SAP HANA appliance
SAP Note 1730929: Using external tools in an SAP HANA appliance
SAP Note 1730930: Using antivirus software in an SAP HANA appliance
SAP Note 1730932: Using backup tools with Backint for SAP HANA
SAP HANA Virtualization Notes
SAP Note 1788665: SAP HANA running on VMware vSphere virtual machines
SAP HANA Post-Installation Checkup
For a SAP HANA system installed with <SID> set to BWL and the system number <nr> set to 00, log in as
<sid>adm ir bwladm and run the commands presented here.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 72 of 93
To Check the SAP HANA Services
bwladm@cishana01-bwl:/usr/sap/BWL/HDB00> /usr/sap/hostctrl/exe//sapcontrol -
nr 00 -function GetProcessList
19.05.2016 11:29:27
GetProcessList
OK
name, description, dispstatus, textstatus, starttime, elapsedtime, pid
hdbdaemon, HDB Daemon, GREEN, Running, 2016 04 13 08:51:49, 866:37:38, 41691
hdbcompileserver, HDB Compileserver, GREEN, Running, 2016 04 13 08:51:56,
866:37:31, 41837
hdbindexserver, HDB Indexserver, GREEN, Running, 2016 04 13 08:52:00,
866:37:27, 41863
hdbnameserver, HDB Nameserver, GREEN, Running, 2016 04 13 08:51:50,
866:37:37, 41711
hdbpreprocessor, HDB Preprocessor, GREEN, Running, 2016 04 13 08:51:56,
866:37:31, 41839
hdbwebdispatcher, HDB Web Dispatcher, GREEN, Running, 2016 04 13 08:53:11,
866:36:16, 42431
hdbxsengine, HDB XSEngine, GREEN, Running, 2016 04 13 08:52:00, 866:37:27,
41865
bwladm@cishana01-bwl:/usr/sap/BWL/HDB00>
To Check the HANA Database (HDB) Information
bwladm@cishana01-bwl:/usr/sap/BWL/HDB00> HDB info
USER PID PPID %CPU VSZ RSS COMMAND
bwladm 59578 59577 0.0 108472 1944 -sh
bwladm 59663 59578 0.0 114080 2020 \_ /bin/sh /usr/sap/BWL/HDB00/HDB
info
bwladm 59692 59663 0.0 118048 1596 \_ ps fx -U bwladm -o
user,pid,ppid,pcpu,vsz,rss,args
bwladm 41683 1 0.0 22188 1640 sapstart
pf=/hana/shared/BWL/profile/BWL_HDB00_cishana01-bwl
bwladm 41691 41683 0.0 582888 290988 \_ /usr/sap/BWL/HDB00/cishana01-
bwl/trace/hdb.sapBWL_HDB00 -d -nw -f /usr/sap/BWL/HDB00/cishana01-
bwl/daemon.ini
bwladm 41711 41691 0.3 54292416 2058900 \_ hdbnameserver
bwladm 41837 41691 0.1 4278472 1243356 \_ hdbcompileserver
bwladm 41839 41691 0.2 11773976 8262724 \_ hdbpreprocessor
bwladm 41863 41691 6.2 22143172 18184604 \_ hdbindexserver
bwladm 41865 41691 0.5 8802064 2446612 \_ hdbxsengine
bwladm 42431 41691 0.1 4352988 823220 \_ hdbwebdispatcher
bwladm 41607 1 0.0 497576 23232 /usr/sap/BWL/HDB00/exe/sapstartsrv
pf=/hana/shared/BWL/profile/BWL_HDB00_cishana01-bwl -D -u bwladm
bwladm@cishana01-bwl:/usr/sap/BWL/HDB00>
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 73 of 93
Tuning the SAP HANA Performance Parameters
After SAP HANA is installed, tune the parameters shown here to get the best performance.
Log in as the SAP HANA system administrator <sid>adm to run the commands.
To Tune the Data File System
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/data/HWL/hdb00001/]".max_parallel_io_requests=256
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/data/HWL/hdb00001/]".async_read_submit=on
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/data/HWL/hdb00001/]".async_write_submit_blocks=all
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/data/HWL/hdb00001/]".async_write_submit_active=on
To Tune the Log File System
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/log/HWL/hdb00001/]".async_read_submit=on
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/log/HWL/hdb00001/]".async_write_submit_blocks=all
bwladm@cishana01:/usr/sap/HWL/HDB00> hdbparam --paramset
fileio"[/hana/log/HWL/hdb00001/]".async_write_submit_active=on
Monitoring and Maintenance Operations
Hardware Monitoring and Maintenance
This section discusses hardware monitoring and maintenance tasks.
Checking Faults and Logs
To check faults and logs, follow these steps.
1. Open your web browser and navigate to the console. Log in with your credentials (Figure 71).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 74 of 93
Figure 71. Cisco CIMC Login Page
2. Choose Server > Faults and Logs (Figure 72).
Figure 72. Faults and Logs Summary Page
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 75 of 93
3. Expand the columns to meet your needs and look for faults with a severity level of Critical. Note the
descriptions. You may find faulty hardware. The Summary section provides an option to launch a KVM
session in the event that you have lost the network connection. From the KVM console, you can work as
in a normal Secure Shell (SSH) session.
4. View the health of the hard drives from the CIMC as shown in Figure 73.
Figure 73. Viewing the Health of the Hard Drives
5. View the RAID levels that are configured and the disks associated with the various RAID levels from the
CIMC as well. This screen also shows the status of individual disks in the RAID level to help you address
any problems (Figure 74).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 76 of 93
Figure 74. Viewing the RAID Levels
Using the MegaCLI Utility
You can use MegaCLI Utility to obtain information from the LSI RAID controller. You can also use it as a
troubleshooting tool. It is a command-line interface (CLI) binary file that is used to communicate with the full LSI
family of RAID controllers. The program is a text-based CLI and consists of a single static binary file.
You need to install the MegaCLI64 program to be able to communicate with the LSI controller. To install this
program, follow these steps:
1. Go to the LSI Downloads page: http://www.avagotech.com/support/download-search.
2. Search on the keyword megacli.
3. Click Management Software and Tools.
4. Download the MegaCLI <<x.xXx> zip file (use the file that is valid for all DOS, Microsoft Windows, Linux,
and FreeBSD operating systems).
5. Unzip the file.
6. The Linux directory contains a Red Hat Package Manager (RPM) file. Copy it to the SAP HANA node
using SFTP.
7. Install the RPM file using the command rpm -ivh <<MegaCli-x.xx.xx-x.noarch.rpm>>.
[root@cishana01 ~]# rpm -ivh MegaCli-8.07.14-1.noarch.rpm
Preparing...
########################################### [100%]
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 77 of 93
1:MegaCli
########################################### [100%]
[root@cishana01 ~]# cd /opt/MegaRAID/MegaCli
[root@cishana01 MegaCli]# ll
total 3228
-rw-r--r--. 1 root 0 Jul 4 22:28 install.log
lrwxrwxrwx. 1 root 48 Jul 4 22:28 libstorelibir-2.so ->
/opt/MegaRAID/MegaCli/libstorelibir-2.so.14.07-0
-rwx------. 1 root 540512 Dec 16 2013 libstorelibir-2.so.14.07-
0
-rwxr-xr-x. 1 root 2720320 Dec 16 2013 MegaCli64
-rw-r--r--. 1 root 32369 Jul 4 22:35 MegaSAS.log
Replacing a Failed Hard Drive
The monitoring tasks may reveal a hard-drive failure. In addition, the color of the LED in the faulty hard drive will
change from green to amber. To replace or install a hot-pluggable hard drive, follow the steps presented here
(Figure 75).
1. Remove the drive that you are replacing or remove a blank panel from an empty bay.
a. Press the release button on the face of the hard drive.
b. Grasp the ejector lever and pull the hard drive tray out of the slot.
c. If you are replacing an existing drive, remove the four drive tray screws that secure the drive to the tray
and then lift the drive out of the tray.
2. Install a new drive.
a. Place a new hard drive in the empty drive tray and replace the four drive-tray screws.
b. Insert the drive tray into the empty drive bay.
c. Push the tray into the slot until the drive connectors are fully seated in the backplane.
d. Press the ejector lever flat to lock the drive and tray in place.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 78 of 93
Figure 75. Replacing a Hard Drive
1 Drive bays 1 to 12
(All bays support SAS and SATA drives.)
2 Drive bays 3, 4, 6, 7, 8, 10, 11, and 12
(At this time, the supported RAID controller can support only 8 drives, which must be in these bays for RAID control.)
Configuring RAID After Replacing a Faulty Disk Drive
After you replace a disk drive, you need to configure RAID.
1. Enter the following command to display the statistics for the MegaRAID controller and the disks.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -EncInfo -aALL
Number of enclosures on adapter 0 -- 1
Enclosure 0:
Device ID : 25
Number of Slots : 12
Number of Power Supplies : 0
Number of Fans : 0
Number of Temperature Sensors : 1
Number of Alarms : 0
Number of SIM Modules : 0
Number of Physical Drives : 12
Status : Normal
Position : 1
Connector Name : Port 0 - 3
Enclosure type : SES
FRU Part Number : N/A
Enclosure Serial Number : N/A
ESM Serial Number : N/A
Enclosure Zoning Mode : N/A
Partner Device Id : 65535
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 79 of 93
Inquiry data :
Vendor Identification : Cisco
Product Identification : UCS-C460-M4
Product Revision Level : 0225
Vendor Specific : x48-65.2.37.0
2. Enter the following command to see a list of the available virtual drives (RAID arrays) configured with the
controller.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -LDInfo -Lall -Aall
Adapter 0 -- Virtual Drive Information:
Virtual Drive: 0 (Target Id: 0)
Name :ucs_hana
RAID Level : Primary-5, Secondary-0, RAID Level Qualifier-3
Size : 15.997 TB
Sector Size : 512
Is VD emulated : No
Parity Size : 1.454 TB
State : Optimal
Strip Size : 256 KB
Number Of Drives : 12
Span Depth : 1
Default Cache Policy: WriteBack, ReadAdaptive, Cached, Write Cache OK if Bad BBU
Current Cache Policy: WriteBack, ReadAdaptive, Cached, Write Cache OK if Bad BBU
Default Access Policy: Read/Write
Current Access Policy: Read/Write
Disk Cache Policy : Disk's Default
Encryption Type : None
PI type: No PI
Is VD Cached: No
3. Enter the following command to view the failed disk in the RAID array. Also, the LED on the failed hard
drive will be amber and blinking. Note the enclosure device ID and the slot number.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDList -aAll | egrep "Enclosure
Device ID:|Slot Number:|Inquiry Data:|Error Count:|state"
Enclosure Device ID: 25
Slot Number: 1
Media Error Count: 0
Other Error Count: 0
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 80 of 93
Firmware state: Online, Spun Up
Inquiry Data: SanDisk LT1600MO C401423398600000ags/T43L
Enclosure Device ID: 25
Slot Number: 2
Media Error Count: 0
Other Error Count: 0
Firmware state: Online, Spun Up
Inquiry Data: SanDisk LT1600MO C401423813520000ags/T43L
Enclosure Device ID: 25
Slot Number: 3
Media Error Count: 0
Other Error Count: 0
Firmware state: Online, Spun Up
Inquiry Data: SanDisk LT1600MO C401424343720000ags/T43L
Enclosure Device ID: 25
Slot Number: 4
Media Error Count: 0
Other Error Count: 0
Firmware state: Offline
Inquiry Data: SanDisk LT1600MO C401424357000000ags/T43L
4. Manually inspect the output for the drive for which the firmware state is not listed as “Online.” Drives that
have been removed will not appear in this list.
5. Prepare to remove the failed disk from the RAID array. In the following example, [25:4] represents the
enclosure device ID, and the disk slot number -a0 points to adapter 0.
a. Set the drive offline, if it is not already offline due to an error.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDOffline -PhysDrv [25:4]
–a0
b. Mark the drive as missing and note the array and row information, which you will need later when you
replace the drive.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDMarkMissing -PhysDrv
[25:4] –a0
EnclId-25 SlotId-4 is marked Missing.
Exit Code: 0x00
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDGetMissing -aALL
Adapter 0 - Missing Physical drives
No. Array Row Size Expected
0 0 1 837353 MB
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 81 of 93
Exit Code: 0x00
c. Prepare the drive for removal.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDPrpRmv -PhysDrv [25:4] –
a0
6. Physically remove the failed disk and insert the new replacement disk. After the new disk is inserted, it will
be considered a foreign disk and is shown with the status “Unconfigured (bad).”
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDList -aAll | egrep
"Enclosure Device ID:|Slot Number:|Inquiry Data:|Error Count:|state"
Enclosure Device ID: 25
Slot Number: 3
Media Error Count: 0
Other Error Count: 0
Firmware state: Online, Spun Up
Inquiry Data: SanDisk LT1600MO C401424343720000ags/T43L
Enclosure Device ID: 25
Slot Number: 4
Media Error Count: 0
Other Error Count: 0
Firmware state: Unconfigured (bad)
Inquiry Data: SanDisk LT1600MO C401424357000000ags/T43L
7. Enter the following commands to make the newly inserted disk usable in a RAID array.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -CfgForeign -Scan -a0
There are 1 foreign configuration(s) on controller 0.
Exit Code: 0x00
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -CfgForeign -Clear -a0
Foreign configuration 0 is cleared on controller 0.
Exit Code: 0x00
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDMakeGood -PhysDrv [252:4] -
a0
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDList -aAll | egrep
"Enclosure Device ID:|Slot Number:|Inquiry Data:|Error Count:|state"
Enclosure Device ID: 25
Slot Number: 3
Media Error Count: 0
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 82 of 93
Other Error Count: 0
Firmware state: Online, Spun Up
Inquiry Data: SanDisk LT1600MO C401424343720000ags/T43L
Enclosure Device ID: 25
Slot Number: 4
Media Error Count: 0
Other Error Count: 0
Firmware state: Unconfigured (good)
Inquiry Data: SanDisk LT1600MO C401424357000000ags/T43L
8. Add the new drive to your RAID virtual drive and start the rebuilding process.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDReplaceMissing -PhysDrv [
25:4] –Array0 –row1 –a0
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDRbld -Start -PhysDrv [25:4] –
a0
9. Verify the progress of the rebuilding operation.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDList -aAll | egrep "Enclosure
Device ID:|Slot Number:|Inquiry Data:|Error Count:|state"
Enclosure Device ID: 25
Slot Number: 3
Media Error Count: 0
Other Error Count: 0
Firmware state: Online, Spun Up
Inquiry Data: SanDisk LT1600MO C401424343720000ags/T43L
Enclosure Device ID: 25
Slot Number: 4
Media Error Count: 0
Other Error Count: 0
Firmware state: Rebuild
Inquiry Data: SanDisk LT1600MO C401424357000000ags/T43L
The drive status should be displayed as “Firmware state: Rebuild.”
a. Enter the following command to see the rebuild status.
cishana01:/opt/MegaRAID/MegaCli # ./MegaCli64 -PDrbld -showprog -
physdrv[9:2] –a0
b. Display the rebuild status with a continuous text GUI message.
cishana01:/opt/MegaRAID/MegaCli #./MegaCli64 -PDrbld -progdsply -physdrv[9:2] –a0
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 83 of 93
10. After the rebuilding process is complete, the disk will be online and participating in the RAID configuration.
Check the status of the disk with the commands in step 9.
Identifying a Faulty DIMM
The memory riser has LEDs that can assist you in isolating a faulty DIMM. Faulty DIMMs are indicated by amber
lights on the DIMM fault LEDs (Figure 76).
Figure 76. Memory Riser LEDs (Top View)
1 Attention button (used for hot swapping)
2 Attention LED (indicates whether hot swapping is safe)
3 Power LED (indicates whether the riser has power)
4 Mirror activity LED (indicates whether memory mirroring is enabled)
5 DIMM fault LEDs 1 through 8 (indicate which DIMM has failed)
Replacing a Failed DIMM
To replace a failed DIMM pair, follow these steps (Figure 77):
1. Remove the DIMMs that you are replacing.
a. Slide the server out the front of the rack far enough so that you can remove the top cover.
b. Remove the top cover.
c. Press the attention button (ATTN) on the top of the memory riser that contains the faulty DIMM.
d. Wait until the attention LED (ATTN) and the power LED turn off.
e. Simultaneously press both green release buttons on the top of the memory riser to release the riser
retaining latches. The latches open at a 45-degree angle when they are released.
f. Lift the memory riser straight up and out of the motherboard connector.
g. Locate the faulty DIMM and remove it from the connector on the memory riser.
2. Install a new DIMM.
a. Insert the DIMM assembly into the connector on the riser.
b. Push the DIMM into the connector until it is seated properly and the white clips on either side of the
connector lock into place.
c. Push the hot-swappable memory riser into the motherboard connector until it is seated and the open
release levers engage the chassis and the CPU cage.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 84 of 93
d. Simultaneously press down on each release lever to put the levers in the closed position. This step
helps ensure that the riser is properly seated in the motherboard connector.
e. Press the attention button on the top of the memory riser. Then wait until the attention LED turns off.
f. Replace the top cover.
g. Replace the server in the rack and replace any cables.
Figure 77. Removing and Replacing DIMMs
1 DIMM slots 2 Memory riser
Upgrading the BIOS and Firmware on the Cisco UCS C460 M4
The Cisco Host Upgrade Utility (HUU) is a tool that upgrades the following firmware:
● Cisco IMC
● System BIOS
● LAN on motherboard (LOM)
● RAID controllers (for any third-party RAID controllers that are installed)
● Cisco UCS VIC 1225
● Intel PCI adapters: i350 quad-port adapter
● LSI: LSI MegaRAID SAS 9361-8i controller
The upgrade utility includes the options to download ISO images for a selected platform on a Microsoft Windows
operating system. The image file for the firmware is embedded in the ISO image, and the utility displays a menu
that allows you to choose the firmware components that you want to upgrade.
Using the Cisco Host Upgrade Utility
You can use the HUU ISO image to upgrade components of the server from the host locally with a writable disk
(DVD or CD), or remotely by mounting the HUU ISO image as a virtual device.
1. Download the HUU ISO file.
a. Navigate to the following URL: http://www.cisco.com/cisco/software/navigator.html.
b. In the middle column, click Servers – Unified Computing.
c. In the right column, click Cisco UCS C-Series Rack-Mount Standalone Server Software.
d. In the right column, choose the name of your server model.
e. Click Unified Computing System (UCS) Server Firmware.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 85 of 93
f. Choose the release number.
g. Click Download Now to download the ucs-server platform-huu-version_number.iso file.
h. Verify the information on the next page. Then click Proceed With Download.
i. Continue through the subsequent screens to accept the license agreement and browse to the
location where you want to save the file.
2. If you want to prepare the ISO image for a local upgrade, complete this step; otherwise, go to step 3.
a. Copy the ISO image onto a writable disk (DVD, USB flash drive, or CD).
b. Connect a VGA monitor and USB keyboard to the Cisco UCS C-Series server.
c. Insert the disk into the DVD drive of the Cisco UCS C-Series server.
d. Proceed to step 4.
3. Prepare the ISO image for a remote upgrade using the KVM console.
a. Use a browser to connect to the IMC GUI software on the server that you are upgrading.
b. In the address field of the browser, enter the CIMC IP address for that server; then enter your
username and password.
c. On the toolbar, click Launch KVM Console to launch the KVM console.
d. On the KVM console, click Virtual Media.
e. Click Add Image and click the ucs-server-name-huu-version_number.iso file.
f. In the Client View area, in the Mapped column, select the check box for the ISO file that you added
and then wait for the mapping process to complete.
g. After the ISO file appears as a mapped remote device, proceed to step 4.
4. Boot the server and press F6 when you are prompted to open the Boot Menu screen.
5. On the Boot Menu screen, choose the prepared ISO image:
● For a local upgrade, choose the physical CD/DVD device and then press Enter.
● For a remote upgrade, choose Cisco vKVM-Mapped vDVD1.22 and press Enter.
The server boots from the selected device.
6. After the HUU boots, the Cisco End-User License Agreement (EULA) appears. Read the EULA and select
one of the following:
● Select “I Agree” to accept the license agreement and proceed with the update.
● Select “I Disagree” to cancel the update process.
After you accept the EULA, the HUU window appears with a list of all the components that are available
for updating.
7. If you want to update all the listed components, click Update all.
8. If you want update specific components from the list, choose the components that you want to update.
9. Click Update.
Note: You should update the BIOS each time that you update the CIMC firmware. You also should update the
IMC each time you update the BIOS firmware. If you update the IMC firmware, after successfully completing the
update, reboot the server to activate the new firmware.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 86 of 93
This step initiates the update process, and the status of the update process is displayed in the Update Status
column. You can also view a more detailed log of a series of activities and statuses involved in updating the
firmware in the Execution Logs section.
10. Reboot the server and click Verify Last Update to verify if the update was successfully completed.
This action compares the previously updated firmware version for each component that was updated
using the HUU with the current version of the firmware on the components and provides the status of the
update.
11. If you want to save the update status log files for later use, click Save Logs.
Log files that contain detailed status information about the update are saved to an external USB device that is
connected to the server physically or through the KVM virtual media.
Note: If an error occurs while the firmware is being updated, you are prompted to save the error log. Click Save
Logs to save the log to an externally connected USB device. This log can be used to identify the cause of the error
and perform troubleshooting.
12. Click Exit to exit from the HUU.
Monitoring the Operating System
You can install monitoring agents, such as Tivoli, on the SAP HANA nodes to integrate the Cisco and SAP HANA
solution into a central enterprise monitoring tool.
Also, you can configure the syslog-ng daemon to send log messages to the existing central log host available on
the customer infrastructure.
Maintaining the Operating System
The customer is responsible for implementing security updates and patches, adding software components, and
changing OS settings that may be requested by SAP for future releases of SAP HANA or that may be required by
Red Hat to help ensure system security and stability. See the related SAP OS notes for required OS settings.
This section describes how to update the OS and the implications of updating OS components. It is not meant to
replace the Linux administration documentation.
Prerequisites
Whenever you change the OS or parts of the OS such as drivers and kernel parameters, be sure that you have a
backup copy of your SAP HANA system, preferably not stored on the appliance. You also should check the related
OS notes and Cisco support channels for additional information.
Some changes may require a reboot and should be applied when SAP HANA is shut down.
Updating the OS and Kernel
Not all updates and patches update the OS kernel. But if a kernel update is necessary, you need to take specific
precautions. During the entire update process, SAP HANA must be shut down.
These are the general steps for updating the kernel:
● Perform these tasks before updating the kernel:
◦ Stop SAP HANA and back up the existing log area (in case the device causes a problem and needs to be
re-created).
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 87 of 93
◦ Unmount /hana/log and clean /etc/fstab.
● Update the kernel.
● Perform these tasks after updating the kernel:
◦ Check the GRUB file and boot sector (menu.lst).
◦ Reboot and check /etc/fstab.
The following steps present the tasks in more detail.
1. Back up the SAP HANA log area.
a. Stop SAP HANA. Then move to the log area and back up the HANA log partition.
cishana01 :~ # cd /hana/log
cishana01 :/hana/log # find . –xdev | cpio –oav > /backup/hana.log.cpio
b. If the backup partition has enough room, choose it. Otherwise, choose an appropriate location for the
backup.
2. Unmount /hana/log.
cishana01 :~ #umount /hana/log
3. Update the kernel.
a. Update the Red Hat system.
Before you patch the system, the repository must be updated. Note that the installed system doesn’t
include any update information. To patch the Red Hat system, it must be registered and attached to a
valid subscription. The following code will register the installation and update the repository information:
#subscription-manager register --auto-attach
Username: <<username>>
Password: <<password>>
b. Update only the OS kernel and firmware packages to the latest release that appeared in RHEL 6.7.
Set the version to Release 7.2.
#subscription-manager release -–set=7.2
c. Apply the latest updates for RHEL 7.2. Typically, the kernel is updated as well.
#yum -y update
4. Reboot the machine and use the new kernel.
5. Optionally, remove the old kernels after the OS update.
#package-cleanup --oldkernels --count=1
SAP HANA Operation and Maintenance
SAP HANA operation and maintenance are described in detail in many related SAP documents. For a complete list
of documentation, see http://help.sap.com/hana.
This document summarizes only a few important operation and maintenance procedures. Most of the procedures
described in this document are CLI procedures and are independent of any GUI requiring an X terminal or other
GUI front end (Microsoft Windows PC, Linux desktop, etc.). CLI procedures can be started using the KVM or any
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 88 of 93
SSH tool such as PuTTY (for Windows) or Terminal (for Mac OS), or any Linux terminal window to connect to the
SAP HANA database system (the appliance).
Monitoring SAP HANA
Three easy CLI methods are available to check the running SAP HANA database.
saphostagent
1. Start a shell and connect to the SAP HANA system as root user.
cishana01:~ # /usr/sap/hostctrl/exe/saphostctrl -function ListDatabases
Instance name: HDB00, Hostname: cishana01, Vendor: HDB, Type: hdb, Release:
1.00.60.0379371
Database name: HAN, Status: Error
cishana01:~ #
2. Get a list of installed HANA instances or databases.
cishana01:~ # /usr/sap/hostctrl/exe/saphostctrl -function ListInstances
Inst Info : HAN - 00 - cishana01 - 740, patch 17, changelist 1413428
cishana01:~ #
3. Using this information (SID and system number), you can use sapcontrol to gather more information
about the running HANA database.
sapcontrol
1. In a shell, use the sapcontrol function GetProcessList to display a list of running HANA OS processes.
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function GetProcessList
19.07.2016 14:54:45
GetProcessList
OK
name, description, dispstatus, textstatus, starttime, elapsedtime, pid
hdbdaemon, HDB Daemon, GREEN, Running, 2016 07 15 11:57:45, 98:57:00, 8545
hdbnameserver, HDB Nameserver, GREEN, Running, 2016 07 15 12:05:27, 98:49:18,
11579
hdbpreprocessor, HDB Preprocessor, GREEN, Running, 2013 08 15 12:05:27, 98:49:18,
11580
hdbindexserver, HDB Indexserver, GREEN, Running, 2016 07 15 12:05:27, 98:49:18,
11581
hdbstatisticsserver, HDB Statisticsserver, GREEN, Running, 2016 07 15 12:05:27,
98:49:18, 11582
hdbxsengine, HDB XSEngine, GREEN, Running, 2016 07 15 12:05:27, 98:49:18, 11583
sapwebdisp_hdb, SAP WebDispatcher, GREEN, Running, 2016 07 15 12:05:27, 98:49:18,
11584
hdbcompileserver, HDB Compileserver, GREEN, Running, 2016 07 15 12:05:27,
98:49:18, 11585
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 89 of 93
You see processes such as hdbdaemon, hdbnameserver, and hdbindexserver that belong to a running
HANA database.
2. You can also get a system instance list, which is more useful for a scale-out appliance.
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function
GetSystemInstanceList
19.07.2016 15:03:12
GetSystemInstanceList
OK
hostname, instanceNr, httpPort, httpsPort, startPriority, features,
dispstatus
cishana01, 0, 50013, 0, 0.3, HDB, GREEN
HDB info
Another important tool is the HDB command, which needs to be issued by the <SID>adm user: the OS user who
owns the HANA database.
As the root user on the HANA appliance, enter the following command:
cishana01:~ # su – hanadm
cishana01:/usr/sap/HAN/HDB00> HDB info
USER PID PPID %CPU VSZ RSS COMMAND
hanadm 61208 61207 1.6 13840 2696 -sh
hanadm 61293 61208 0.0 11484 1632 \_ /bin/sh /usr/sap/HAN/HDB00/HDB info
hanadm 61316 61293 0.0 4904 872 \_ ps fx -U hanadm -o
user,pid,ppid,pcpu,vsz,rss,args
hanadm 8532 1 0.0 20048 1468 sapstart
pf=/hana/shared/HAN/profile/HAN_HDB00_cishana01
hanadm 8545 8532 1.5 811036 290140 \_
/usr/sap/HAN/HDB00/cishana01/trace/hdb.sapHAN_HDB00 -d -nw -f
/usr/sap/HAN/HDB00/cis
hanadm 11579 8545 6.6 16616748 1789920 \_ hdbnameserver
hanadm 11580 8545 1.5 5675392 371984 \_ hdbpreprocessor
hanadm 11581 8545 10.9 18908436 6632128 \_ hdbindexserver
hanadm 11582 8545 8.7 17928872 3833184 \_ hdbstatisticsserver
hanadm 11583 8545 7.4 17946280 1872380 \_ hdbxsengine
hanadm 11584 8545 0.0 203396 16000 \_ sapwebdisp_hdb
pf=/usr/sap/HAN/HDB00/cishana01/wdisp/sapwebdisp.pfl -f /usr/sap/H
hanadm 11585 8545 1.5 15941688 475708 \_ hdbcompileserver
hanadm 8368 1 0.0 216268 75072 /usr/sap/HAN/HDB00/exe/sapstartsrv
pf=/hana/shared/HAN/profile/HAN_HDB00_cishana01 -D -u
This command produces output similar to that from the sapcontrol GetProcessList function, with a little more
information about the process hierarchy.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 90 of 93
Starting and Stopping SAP HANA
Before you stop the SAP HANA appliance, you must be able to stop and start the HANA database. You can use
the commands shown here.
sapcontrol
You can use the sapcontrol functions StartSystem and StopSystem to start and stop a HANA database.
Stop the system with the StopSystem function.
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function StopSystem HDB
19.07.2016 15:05:35
StopSystem
OK
Use the following command to check that the database has stopped:
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function
GetSystemInstanceList
19.07.2016 15:05:58
GetSystemInstanceList
OK
hostname, instanceNr, httpPort, httpsPort, startPriority, features, dispstatus
cishana01, 0, 50013, 0, 0.3, HDB, YELLOW
Wait for the status to be “GRAY.”
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function
GetSystemInstanceList
19.07.2016 15:07:52
GetSystemInstanceList
OK
hostname, instanceNr, httpPort, httpsPort, startPriority, features, dispstatus
cishana01, 0, 50013, 0, 0.3, HDB, GRAY
Alternatively, you can use the HDB info command:
cishana01:~ # su -l hanadm
cishana01:/usr/sap/HAN/HDB00> HDB info
USER PID PPID %CPU VSZ RSS COMMAND
hanadm 61477 61476 2.0 13840 2692 -sh
hanadm 61562 61477 0.0 11484 1632 \_ /bin/sh /usr/sap/HAN/HDB00/HDB info
hanadm 61585 61562 0.0 4904 872 \_ ps fx -U hanadm -o
user,pid,ppid,pcpu,vsz,rss,args
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 91 of 93
hanadm 8368 1 0.0 216784 75220 /usr/sap/HAN/HDB00/exe/sapstartsrv
pf=/hana/shared/HAN/profile/HAN_HDB00_cishana01 -D -u
cishana01:/usr/sap/HAN/HDB00>
You can start the database again with the sapcontrol command StartSystem function.
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function StartSystem HDB
19.07.2016 15:08:48
StartSystem
OK
To check the system status, use the sapcontrol command GetSystemInstanceList function. Wait for status
“GREEN.”
cishana01:~ # /usr/sap/hostctrl/exe/sapcontrol -nr 00 -function
GetSystemInstanceList
19.07.2016 15:10:19
GetSystemInstanceList
OK
hostname, instanceNr, httpPort, httpsPort, startPriority, features, dispstatus
cishana01, 0, 50013, 0, 0.3, HDB, GREEN
HDB
You can use the HDB start and stop commands to stop and start the HANA database.
Use HDB stop to stop the database.
cishana01:~ # su - hanadm
cishana01:/usr/sap/HAN/HDB00> HDB stop
hdbdaemon will wait maximal 300 seconds for NewDB services finishing.
Stopping instance using: /usr/sap/HAN/SYS/exe/hdb/sapcontrol -prot NI_HTTP -nr 00
-function StopWait 400 2
19.07.2016 19:10:37
Stop
OK
In contrast to sapcontrol, this command waits until the database is stopped or started.
cishana01:/usr/sap/HAN/HDB00> HDB start
StartService
Impromptu CCC initialization by 'rscpCInit'.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 92 of 93
See SAP note 1266393.
OK
OK
Starting instance using: /usr/sap/HAN/SYS/exe/hdb/sapcontrol -prot NI_HTTP -nr 00
-function StartWait 2700 2
19.07.2016 19:11:20
Start
OK
Downloading Revisions
To download revisions, you need to connect to the service marketplace and select the software download area to
search for available patches.
Refer to http://help.sap.com/hana/SAP_HANA_Master_Update_Guide_en.pdf for update procedures for SAP
HANA.
For More Information
For more information about SAP HANA, see https://hana.sap.com/abouthana.html.
For information about certified and supported SAP HANA hardware, see
https://global.sap.com/community/ebook/2014-09-02-hana-hardware/enEN/index.html.
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 93 of 93
Appendix: Solution Variables Used for This Document
Before starting the configuration process, you need to collect some specific configuration information. Table 5
provides information to help you assemble the required network and host address, numbering, and naming
information. This worksheet can also be used as a “leave behind” document for future reference.
Table 5. Solution Variables Used in This Document
Variable Description Value Used in the Lab for This Document
<<var_cimc_ip_address>> Cisco UCS C460 M4 server’s CIMC IP address 173.36.215.117
<<var_cimc_ip_netmask>> Cisco UCS C460 M4 server’s CIMC network netmask 255.255.255.0
<<var_cimc_gateway_ip>> Cisco UCS C460 M4 server’s CIMC network gateway IP address
173.36.215.1
<<var_raid5_vd_name>> Name for virtual drive VD0 during RAID configuration ucs_hana
<<var_hostname.domain>> SAP HANA node FQDN cishana01.custdom.local
<<var_sys_root-pw>> SAP HANA node’s root password Saphana1!
<<var_lvm_vg_name>> SAP HANA node’s OS LVM volume group name hanavg
<<var_mgmt_ip_address>> SAP HANA node’s management and administration IP address
173.36.215.118
<<var_mgmt_nw_netmask>> SAP HANA node’s management network netmask 255.255.255.0
<<var_mgmt_gateway_ip>> Cisco UCS C460 M4 server’s management and administration network gateway IP address
173.36.215.1
<<var_mgmt_netmask_prefix>> Netmask prefix in CIDR notation 24
Printed in USA C11-737927-00 10/16