安全方面 SAP Integrated Business Planning for Supply Chain 2105 股份有限公司或其关联公司版权所有,保留所有权利。 the BEST RUN 2021 SAP © 内容

Total Page:16

File Type:pdf, Size:1020Kb

安全方面 SAP Integrated Business Planning for Supply Chain 2105 股份有限公司或其关联公司版权所有,保留所有权利。 the BEST RUN 2021 SAP © 内容 安全指南 PUBLIC (公共) 文档版本: 1.5 – 2021-07-16 安全方面 SAP Integrated Business Planning for Supply Chain 2105 股份有限公司或其关联公司版权所有,保留所有权利。 THE BEST RUN 2021 SAP SAP 2021 © 内容 1 安全方面................................................................... 5 2 技术系统架构................................................................6 3 身份和访问管理...............................................................7 3.1 用户验证...................................................................9 3.2 用户权限和许可..............................................................11 角色和权限...............................................................12 数据过滤器...............................................................12 3.3 基本概念.................................................................. 48 员工...................................................................48 业务用户................................................................49 业务角色................................................................49 业务目录................................................................50 限制...................................................................69 3.4 用于身份和访问管理的应用......................................................82 维护员工(旧版本)........................................................82 维护员工................................................................84 信息生命周期管理......................................................... 84 维护业务用户.............................................................90 维护业务角色.............................................................93 业务目录................................................................98 业务角色模板............................................................100 用户组.................................................................101 显示技术用户............................................................102 IAM 信息系统............................................................105 显示限制类型............................................................106 显示通信场景............................................................106 显示权限跟踪............................................................107 IAM 关键指标............................................................107 维护已删除的业务用户......................................................108 管理升级后的业务角色更改...................................................112 管理用户许可............................................................116 我的许可............................................................... 118 3.5 常见问题..................................................................119 PUBLIC 安全方面 2 公共 内容 管理员任务..............................................................119 与 Identity Authentication 服务集成............................................120 与 SAP Identity Access Governance 集成.........................................121 与 Identity Provisioning 服务集成.............................................. 121 登录到 Excel 加载项........................................................122 用户配置...............................................................122 业务目录和 Fiori 应用...................................................... 124 业务角色和限制类型.......................................................124 许可过滤器和属性许可......................................................126 与 SAP Jam 集成..........................................................127 4 数据中心和外部审计的安全.....................................................128 5 数据集成................................................................. 130 5.1 病毒扫描..................................................................132 6 集成的安全通信.............................................................133 6.1 内向集成的安全通信..........................................................133 6.2 外向集成的安全通信..........................................................133 6.3 维护证书信任列表........................................................... 134 6.4 维护客户端证书.............................................................135 7 客户端保护................................................................136 7.1 维护保护允许清单........................................................... 136 7.2 管理内容安全策略........................................................... 137 冻结模式下的内容安全策略 (CSP)..............................................138 8 数据保护和数据隐私......................................................... 140 8.1 词汇表....................................................................141 8.2 主数据记录................................................................143 8.3 业务用户记录...............................................................144 8.4 相关业务目录...............................................................145 8.5 HTTP 会话期间的数据保护..................................................... 147 9 数据加密................................................................. 148 9.1 使用密钥管理服务切换到自控加密................................................148 10 安全审计日志记录...........................................................152 10.1 显示安全审计日志........................................................... 152 如何显示审计分析报告......................................................153 如何配置个性化视图.......................................................153 10.2 显示静态系统审计........................................................... 155 安全方面 PUBLIC 内容 公共 3 10.3 与 NTP 服务保持时间同步......................................................155 11 漏洞管理..................................................................157 11.1 客户启动的渗透测试..........................................................158 PUBLIC 安全方面 4 公共 内容 1 安全方面 目标受众 ● 技术顾问 ● 安全顾问 ● 系统管理员 为什么需要安全性? 安全始终是包括产品开发、计划和质量保证在内的所有 SAP 产品整个产品生命周期中的重要元素。与其他 SAP 产品类似,SAP Integrated Business Planning for Supply Chain (SAP IBP) 旨在在经受来自 Web 的攻击和来自云 的攻击的情况下均保护数据安全。 SAP 关注 SAP IBP 系统架构内的安全问题和数据保护。作为用户,需要确保: ● 创建相应业务角色并将其分配至业务用户 ● 保护正在运行适用于 Microsoft Excel 的 SAP IBP 加载项的客户端 ● 针对从中导入数据的系统设置安全数据集成 (面向数据服务的 SAP Cloud Integration) 相关信息 已发行平台: SAP Trust Center 我的信任中心 面向数据服务的 SAP Cluld 集成 - 安全指南 安全方面 PUBLIC 安全方面 公共 5 2 技术系统架构 SAP Integrated Business Planning (IBP) 是在 SAP 公有云或 hyperscaler 系统中运行的云产品。 由于来自 SAP 的云解决方案处理来自核心业务流程的业务数据,因此 SAP 恪守以下安全和质量需求: ● 业务数据安全地存储在 SAP 数据中心或客户的首选 hyperscaler 系统中。 ● 需要访问业务数据的用户必须对自己进行身份验证,并且其身份必须由 Identity Authentication 服务或企业 预置身份提供者验证,具体视实际系统架构而定。 ● 用户只能针对已分配许可的业务角色和许可执行操作和查看或编辑数据。有关详细信息,请参阅第 9 页 上的“用户验证”。 ● 客户数据始终属于客户。 使用唯一的客户特定 URL 可以访问来自 SAP 的云解决方案。通信通过 SAP Cloud Support 开发和维护的 SAP 数据中心中的反向代理组件 SAP Web Dispatcher 进行传输。设备和 SAP Cloud 之间的通信由顶尖开放加密标准和 协议(如传输层安全 (TLS))担保和保护。客户可通过 IBP Excel 加载项或使用 Web 浏览器访问 IBP。 IBP 提供多个面向 SAP S/4HANA 和其他 SAP Cloud 或客户服务的集成选项。要了解更多,请转到第 130 页上 的“数据集成”。 IBP 由 SAP HANA 提供支持。所有客户数据存储在 HANA 数据库中,且受 SAP Cloud 的安全基础架构和操作过 程保护。 系统架构 PUBLIC 安全方面 6 公共 技术系统架构 3 身份和访问管理 身份和访问管理 (IAM) 是一组工具的总称,允许您管理对 Fiori 应用的用户访问并指定用户可在应用中执行和查 看的内容。 IAM 的主要元素是业务目录、业务角色和业务用户。为组织中的每位员工提供可分配有业务角色的业务用户。 业务角色包含一些限制,指定允许哪些活动以及每个角色的哪些数据集可用。对于每个业务角色,可分配提供应用 访问权限的业务目录。 下图说明了如何组合这些元素: IAM 的主要元素 用户不需要了解 IAM 授予的访问权限 - 打开快速启动板时,他们只能看到可用的应用。同样,在应用内,用户 仅有权查看或使用可见的数据集和活动的命令。 示例 下图说明了 IAM 中的可能场景: 安全方面 PUBLIC 身份和访问管理 公共 7 IAM 中的可能场景 在此示例中进行以下操作: ● 将两个应用分配到业务目录。 ● 基于不同的限制创建两个不同的业务角色,但是这两者都提供对同一业务目录的访问权限,反过来业务目录也 提供对两个不同应用的访问权限。因此,两个业务角色提供对两个 Fiori 应用的访问权限,但为其施加不同的限 制。 ● 为每个业务角色分配不同的许可过滤器。 ● 创建员工。 ● 基于员工创建业务用户。 ● 将两个业务角色都分配给其中一个业务用户,并将其中一个业务角色分配给其他业务用户。 ● 为每个业务用户分配附加许可过滤器。 ● 将两个业务用户都分配给同一用户组。 上线 想要以管理员的身份使用 SAP Integrated Business Planning,您需要以下条件: ● 用于激活管理员用户的定制 URL 和用于 Identity Authentication 服务的管理控制台的 URL。此信息会以激 活电子邮件的形式发送至 IT 联系人。 ● 用于登录 SAP Integrated Business Planning 的定制 URL。此信息将发送到贵组织的 IT 联系人。 激活管理员用户之后,按第 9 页上的“用户验证”中所述创建员工和业务用户。 详细信息 要了解应用中需要执行的任务的详细信息,请参阅 SAP Community Network (SCN) 中的身份和访问管理 FAQ ,或 YouTube 的 SAP IBP - 演示视频 播放列表中的视频。 PUBLIC 安全方面 8 公共 身份和访问管理 3.1 用户验证 可以通过浏览器或适用于 Microsoft Excel 的 SAP IBP 加载项访问 SAP Integrated Business Planning。在这两种情 况下,都需要用户验证。 注意 适用于 Microsoft Excel 的 SAP IBP 加载项不支持含交互式验证的代理验证。如果贵组织需要使用验证方法 的代理服务器访问 Internet,请按照 SAP Note 2092187 中的步骤进行操作。 在为您的用户提供 SAP Integrated Business Planning 访问权限时,您可以选择以下场景之一: 使用 SAP Cloud Platform Identity Authentication 服务验证 如果组织还未实施企业身份提供者,可以通过 SAP Cloud Platform Identity Authentication 服务提供给用户访 问权限,此服务由 SAP Integrated Business Planning 提供。 可以通过以下操作将用户上载至 Identity Authentication: 1. 在“维护员工”应用中创建员工。 2. 基于“维护业务用户”应用中的员工创建业务用户。 3. 使用“维护业务用户”应用中的“下载”按钮将用户列表下载到 CSV 文件。 4. 登录到“身份验证管理控制台”并打开“导入用户”应用。 5. 上载 CSV 文件。 之后,用户将收到一封含有定向到 Identity Authentication 登录屏幕的 URL 和登录到 Identity Authentication 的凭据的电子邮件。登录之后,将自动重新定向到 SAP Integrated Business Planning。 SAP Integrated Business Planning 还支持使用与企业身份提供者的标识联合来通过 SAP Cloud Platform Identity Authentication 服务支持身份联合。有关详细信息,请参阅 https://help.sap.com/viewer/product/ IDENTITY_AUTHENTICATION/Cloud/en-US 的 SAP Cloud Identity 服务文档的以下部分 ● “Identity Authentication” “用户指南” “操作指南” “企业身份提供者” “配置身份联合” ● “Identity Authentication” “操作指南” “配置租户设置” “配置 Kerberos 验证” 注意 SAP Integrated Business Planning 中密码的使用由 Identity Authentication 应用的企业密码策略定义。 有关详细信息,请参阅位于 https://help.sap.com/viewer/product/IDENTITY_AUTHENTICATION/ Cloud/en-US 的 SAP Cloud Identity 服务文档,路径为: “Identity Authentication” “操作指南” “配置密 码策略” “针对应用程序设置密码策略。” 安全方面 PUBLIC 身份和访问管理 公共 9 利用企业身份提供者验证 如果组织已经实施了企业身份提供者 (IdP),则 Identity Authentication 将充当身份提供者和 SAP Integrated Business Planning 之间的代理。在此场景中需要进行以下操作: 1. 在企业 IdP 中创建要求的用户。 2. 在“企业身份提供者”应用中将企业 IdP 配置为受信任的 IdP,并在“应用程序”应用中将其选中以供 Identity Authentication 使用。 有关详细信息,请参阅位于 https://help.sap.com/viewer/product/IDENTITY_AUTHENTICATION/Cloud/en- US 的 SAP Cloud Identity 服务文档,路径为: “Identity Authentication” “操作指南” “企业身份提供 者。” 3. 打开 SAP Integrated Business Planning 并在“维护员工”应用中创建员工。 4. 基于“维护业务用户”应用中的员工创建业务用户。进行此操作时,请确保输入的用户名与在企业身份提供者中 的登录名完全一致。 注意 IBP Excel 加载项使用嵌入式 Microsoft Internet Explorer 11。因此,仅当企业身份提供者使用 Internet Explorer 11 兼容的 Javascript 进行验证时,才能在适用于 Microsoft Excel 的 SAP IBP
Recommended publications
  • Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE College India
    Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE college India. India. Abstract: In this paper we reviewed the technical and service aspects of different Cloud providers and presents the comparisons of these selected service offerings in cloud computing. By this User can have good understanding regarding services provided to avoid bottlenecks are also obstacles that could limit the growth. This comparison of cloud service providers, to serve as a starting point for user looking to take throw service and for Selecting the better one for there need into cloud environment . Keywords: Cloud Computing, Service Vendors, Cloud Services. I. Introduction As the use of computers in our day-to-day life has increased, the computing resources that we need also grown up. It was costly to buy a mainframe and computer‘s, it became important to find the alternative ways to get the greatest return on the investment, allowing multiple users to share among both the physical access to the computer from multiple terminals and to share the CPU time, eliminating periods of inactivity, which became known in the industry as time- sharing[1]. The origin of the term cloud computing is vague, but it appears to derive from the way of drawings of stylized clouds to denote networks in diagrams of computing and communications systems.Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application‘s to a ‗cloud‘ of computers.
    [Show full text]
  • Magic Quadrant for Enterprise High-Productivity Application Platform As a Service
    This research note is restricted to the personal use of [email protected]. Magic Quadrant for Enterprise High- Productivity Application Platform as a Service Published: 26 April 2018 ID: G00331975 Analyst(s): Paul Vincent, Van Baker, Yefim Natis, Kimihiko Iijima, Mark Driver, Rob Dunie, Jason Wong, Aashish Gupta High-productivity application platform as a service continues to increase its footprint across enterprise IT as businesses juggle the demand for applications, digital business requirements and skill set challenges. We examine these market forces and the leading enterprise vendors for such platforms. Market Definition/Description Platform as a service (PaaS) is application infrastructure functionality enriched with cloud characteristics and offered as a service. Application platform as a service (aPaaS) is a PaaS offering that supports application development, deployment and execution in the cloud. It encapsulates resources such as infrastructure. High- productivity aPaaS (hpaPaaS) provides rapid application development (RAD) features for development, deployment and execution — in the cloud. High-productivity application platform as a service (hpaPaaS) solutions provide services for declarative, model-driven application design and development, and simplified one-button deployments. They typically create metadata and interpret that metadata at runtime; many allow optional procedural programming extensions. The underlying infrastructure of these solutions is opaque to the user as they do not deal with servers or containers directly. The rapid application development (RAD) features are often referred to as "low-code" and "no-code" support. These hpaPaaS solutions contrast with those for "high-control" aPaaS, which need professional programming — "pro-code" support, through third-generation languages (3GLs) — and provide transparent access to the underlying infrastructure.
    [Show full text]
  • Microsoft License Mobility Through Software Assurance
    Microsoft License Mobility through SoftwareLicense Assurance Mobility through Software Assurance LICENSE MOBILITY THR OUGH SOFTWARE ASSURANCE Authorized Mobility Partners Customers can choose either Microsoft Azure or an Authorized Mobility Partner to utilize the benefits of License Mobility through Software Assurance. On the following pages is a current list of partners who are authorized to assist Microsoft Volume Licensing customers to deploy their dedicated application server workloads using License Mobility through Software Assurance. Please check with Microsoft Azure or these partners to confirm which services they offer and if they serve your region. If your partner is not currently listed, refer them to the License Mobility through Software Assurance website to complete the Microsoft License Mobility Partner Authorization process. For more information, contact your Microsoft account manager or preferred reseller. Note to Partners: If your information below needs to be updated, please contact your Services Provider License Agreement (SPLA) reseller. July 2017 Microsoft Volume Licensing License Mobility through Software Assurance Authorized Mobility Partner Partner home page Microsoft Azure azure.microsoft.com/en-us/pricing/license-mobility/ @XYZ Pty Ltd www.xyznetworks.net.au «@ scriptum» Ltd www.claster.tel «Data center - AVIS» Limited Liabilty Company www.avis-dc.ru 1ST DNS Ltd www.1stdomains.co.uk 2000 Computers & Networks Pty Ltd www.2000cn.com.au 24 Solutions AB www.24solutions.se 24/7 Business Support Ltd www.247businesssupport.co.uk 2AT B.V. www.2at.nl 2CIT IT-specialist AB www.2cit.se 2E2 (IOM) LIMITED www.2e2.co.im 3 PRO d.o.o. www.3pro.hr 3 Step IT Oy www.nevtor.com 321 Internet Pty Ltd www.321.com.au 3-IT bvba www.3-it.be 3M Cogent, Inc www.cogentsystems.com 3NT Solution LLP www.3nt.com 3rdmill Pty Ltd www.3rdmill.com.au 4 Dimensions A/S www.4dim.it 4d Innovations Group (Pty) Ltd www.eset.co.za 4D TECH (PTY)LTD www.4dtech.co.za 4net AG www.4net.ch 5NINES DATA LLC www.5nines.com 7digital Limited www.7digital.com 7Technology Sp.
    [Show full text]
  • Bernd Himmelsbach VP Cloud Architecture & Engineering, SAP
    OpenStack in Production Bernd Himmelsbach VP Cloud Architecture & Engineering, SAP October, 2016 © 2016 SAP SE or an SAP affiliate company. All rights reserved. 1 Agenda SAP Figures Situation 2014 OpenStack and SAP Converged Cloud as the „Holy Grail“ Challenges & Opportunities through OpenStack Solution approach © 2016 SAP SE or an SAP affiliate company. All rights reserved. 2 Agenda SAP Figures Situation 2014 OpenStack and SAP Converged Cloud as the „Holy Grail“ Challenges & Opportunities through OpenStack Solution approach © 2016 SAP SE or an SAP affiliate company. All rights reserved. 3 Some High Level Figures of SAP 80k+ employees 70+ data centers 7+ PB RAM capacity 100+ PB Storage capacity 90+ PB backup capacity Multiple multi billion USD acquisitions during the last years (successfactors, Ariba, Concur…) © 2016 SAP SE or an SAP affiliate company. All rights reserved. 4 Agenda SAP Figures Situation 2014 OpenStack and SAP Converged Cloud as the „Holy Grail“ Challenges & Opportunities through OpenStack Solution approach © 2016 SAP SE or an SAP affiliate company. All rights reserved. 5 2014: SAP’s Cloud Infrastructure Challenge 23 Clouds Cloud A Cloud B Cloud C One Cloud Application Lifecycle Management Manual Semi-automated Automated E2E LifeCycle installation/upgrades installation/upgrades installation/upgrades Automation Hybrid Multi- OpenSource + VMware IaaS Management VMware vSphere Home-Grown + XEN Hypervisor, vSphere Public/Private IaaS Infrastructure Harmonized Cloud Architecture DC1 DC2 … DC … DC DC1 DCn Architecture Building Block Server & Storage Farm (HANA) Cell Capacity / Utilization Data Center Locations WDF/ROT, Dublin, NSQ WDF/ROT, Ashburn, WDF/ROT, NSQ, Tokyo, All SAP Data Centers Culpepper Sydney © 2016 SAP SE or an SAP affiliate company.
    [Show full text]
  • Red Hat Certified Cloud & Service Provider Program:: Technical and Operations Guide
    Red Hat Certified Cloud & Service Provider Program Technical and Operations Guide October 2020 Version 1.32 Table of Contents DISCLAIMER . 1 1. INTRODUCTION . 2 2. RELEASE NOTES . 3 2.1. NEW OFFERINGS . 3 2.2. CHANGES & UPDATES . 3 3. CCSP PROGRAM OVERVIEW . 4 4. CCSP PRODUCT OFFERINGS . 5 4.1. CCSP PRODUCT OFFERINGS OVERVIEW . 5 4.1.1. CCSP PRODUCT CATALOG 5 4.1.2. CCSP OFFERING RULES 6 5. CCSP PRODUCT DETAILS AND REQUIREMENTS. 8 5.1. INFRASTRUCTURE PRODUCTS . 8 5.1.1. RED HAT ENTERPRISE LINUX 8 5.1.2. RED HAT ENTERPRISE LINUX ADD-ONS 10 5.1.3. RED HAT ENTERPRISE LINUX FOR POWER 12 5.1.4. RED HAT ENTERPRISE LINUX FOR Z SYSTEMS 13 5.1.5. RED HAT ENTERPRISE LINUX FOR Z SYSTEMS EXTENDED LIFE CYCLE SUPPORT ADD-ON 14 5.1.6. RED HAT ENTERPRISE LINUX FOR IBM SYSTEM Z AND LINUXONE WITH COMPREHENSIVE ADD-ONS 15 5.1.7. RED HAT OPENSTACK PLATFORM 16 5.1.8. RED HAT OPENSTACK PLATFORM EXTENDED LIFE CYCLE SUPPORT ADD-ON 17 5.1.9. RED HAT VIRTUALIZATION 18 5.1.10. RED HAT VIRTUALIZATION FOR IBM POWER 19 5.2. CLOUD-NATIVE APPLICATION PLATFORMS, APPLICATION DEVELOPMENT, AND MIDDLEWARE . 20 5.2.1. RED HAT OPENSHIFT CONTAINER PLATFORM 20 5.2.2. RED HAT OPENSHIFT CONTAINER PLATFORM FOR POWER 21 5.2.3. RED HAT OPENSHIFT CONTAINER PLATFORM BUNDLES 22 5.2.4. RED HAT MIDDLEWARE 23 5.2.5. RED HAT MIDDLEWARE EXTENDED LIFE CYCLE SUPPORT ADD-ONS 25 5.2.6. RED HAT MIDDLEWARE BUNDLES 26 5.2.7.
    [Show full text]
  • Cloud Computing Bible
    Barrie Sosinsky Cloud Computing Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-90356-8 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.
    [Show full text]
  • 安全方面 SAP Integrated Business Planning 2011 股份有限公司或其关联公司版权所有,保留所有权利。
    安全指南 PUBLIC (公共) 文档版本: 1.5 – 202-01-15 安全方面 SAP Integrated Business Planning 2011 股份有限公司或其关联公司版权所有,保留所有权利。 THE BEST RUN 2020 SAP SAP 2020 © 内容 1 安全方面...................................................................4 2 技术系统架构................................................................5 3 用户许可................................................................... 7 3.1 角色和权限..................................................................8 3.2 管理用户许可................................................................8 3.3 我的许可...................................................................10 3.4 数据过滤器.................................................................10 许可过滤器...............................................................11 管理属性许可.............................................................26 4 数据中心和外部审计的安全..................................................... 36 5 数据集成.................................................................. 37 6 安全通信..................................................................39 6.1 内向集成的安全通信.......................................................... 39 6.2 外向集成的安全通信.......................................................... 39 6.3 维护证书信任列表............................................................40 6.4 “维护保护白名单”............................................................40 6.5 管理内容安全策略............................................................41 冻结模式下的内容安全策略 (CSP).............................................. 42 7 数据保护和数据隐私..........................................................44 7.1 词汇表....................................................................45
    [Show full text]
  • Deploying SAP HANA on Red Hat Virtualization a Guide to Deploying SAP HANA on Red Hat Virtualization 4.2 and 4.3
    Deploying SAP HANA on Red Hat Virtualization A guide to deploying SAP HANA on Red Hat Virtualization 4.2 and 4.3 Abstract: This guide contains information about SAP HANA hardware requirements and best practices. It includes examples of SAP HANA and RHV-specific configuration settings and deployment options to consider when using the two products together. Date: August, 2020 Version: 2.1.3 Copyright © 2020 Red Hat, Inc. Red Hat, Red Hat Enterprise Linux, the Red Hat logo, and JBoss are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries. Linux​® ​ is the registered trademark of Linus Torvalds in the U.S. and other countries. Contents Introduction 4 Hardware requirements 4 Configuring the BIOS settings of the RHV hosts 4 Installing and configuring RHV hosts 7 Verifying system requirements for the RHV host 7 Installing the RHV host 7 Updating the kernel 7 Setting the kernel boot options 8 Deploying a new RHV host 9 Changing an existing RHV host 9 Setting the tuned profile for RHV host 11 Information on C-States 11 Configuring Skylake-specific settings 13 Configuring an RHV cluster running SAP HANA 13 Disabling KSM on the host manually 14 Installing required hooks for the virtual guests 15 Sizing Guidelines for VMs 19 Influence of Hyperthreading 19 Reviewing the performance degradation between virtual and bare metal systems 19 Observations with SAP’s BWH performance test 20 Storage Setup 21 Storage variant A: Controller passthrough 21 Setting up Fibre Channel HBA passthrough for
    [Show full text]
  • Oracle Linux Virtualization Manager
    Oracle Linux Virtualization Manager Oracle Linux Virtualization Manager is a server virtualization management platform that can be easily deployed to configure, monitor, and manage an Oracle Linux Kernel-based Virtual Machine (KVM) environment. Oracle Linux Key Features KVM and Oracle Linux Virtualization Manager provide a modern, open source, Leading high performance alternative to proprietary server virtualization solutions price/performance with zero licensing costs. using a modern, low overhead An Oracle Linux Premier Support subscription provides customers access to architecture based award-winning Oracle support resources for Oracle Linux Virtualization on the KVM hypervisor Manager, KVM, Oracle Linux, zero-downtime patching with Ksplice, cloud Self-Hosted native tools such as Kubernetes and Kata Containers, clustering tools, Oracle Engine offers a Linux Manager, and Oracle Enterprise Manager. All this and lifetime software hyper-converged management support is included in a single cost-effective support offering. For customers solution with high with an Oracle Cloud Infrastructure subscription, Oracle Linux Premier availability for the support is included at no additional cost. Unlike many other commercial Linux Manager distributions, Oracle Linux is easy to download and completely free to use, Full REST API allows greater distribute, and update. automation and interoperability Oracle Linux KVM Support for secure live migration and Starting with Oracle Linux Release 7 with the Unbreakable Enterprise Kernel (UEK) Release storage live 5, Oracle Linux KVM has been enhanced to deliver leading performance and security for migration hybrid and multi-cloud deployments. Users can take a previously deployed Oracle Linux VM high system and turn the operating environment into a KVM host, or a KVM configuration can availability be set up from a base Oracle Linux installation.
    [Show full text]
  • Chapter 1 Cloud Computing
    Contents 1 Cloud computing 1 1.1 Overview ............................................... 1 1.2 History of cloud computing ...................................... 1 1.2.1 Origin of the term ....................................... 2 1.2.2 The 1950s ........................................... 2 1.2.3 The 1990s ........................................... 2 1.3 Similar concepts ............................................ 3 1.4 Characteristics ............................................. 3 1.5 Service models ............................................ 4 1.5.1 Infrastructure as a service (IaaS) ............................... 5 1.5.2 Platform as a service (PaaS) ................................. 5 1.5.3 Software as a service (SaaS) ................................. 5 1.6 Cloud clients .............................................. 5 1.7 Deployment models .......................................... 6 1.7.1 Private cloud ......................................... 6 1.7.2 Public cloud .......................................... 6 1.7.3 Hybrid cloud ......................................... 6 1.7.4 Others ............................................. 7 1.8 Architecture .............................................. 7 1.8.1 Cloud engineering ....................................... 7 1.9 Security and privacy .......................................... 7 1.10 The future ............................................... 8 1.11 The cloud revolution is underway ................................... 8 1.12 See also ...............................................
    [Show full text]
  • Media and Communications Supply Chain Analysis
    Media and Communications Supply Chain Analysis Ovum Report to DBCDE 24 June 2013 – Final report Project Number CYTE0678 Table of contents 1 Key Findings 4 2 Project Background 5 2.1 Scope of the project 5 2.2 Structure of the report 5 2.1 Why the supply chain matters 5 3 Supply chain trends: top-level assessment 7 3.1 Key findings 7 3.2 The traditional supply chain 9 3.3 The emerging supply chain 11 3.4 Competition and innovation 15 3.4.1. Competition 15 3.4.2. Innovation 17 3.5 Consumer implications: top level assessment 18 3.5.1. Revenue models 18 3.5.2. Privacy, security and consumer protection 19 3.5.3. Universal service, local content and community standards 20 4 Supply chain trends: the role of infrastructure and devices 22 4.1 Key findings 22 4.2 The traditional infrastructure supply chain 22 4.3 The emerging infrastructure supply chain 24 4.3.1. Cloud IT infrastructure and platforms 25 4.3.2. IP connectivity and the software defined network 29 4.3.3. Devices and the managed device platform 33 4.3.4. The vendor landscape 35 4.4 Competition and innovation 36 4.4.1. Competition 36 4.4.2. Innovation 38 4.5 Consumer implications 38 4.5.1. Consumer revenue models 38 4.5.3. Service availability and consumer recourse 39 5 Supply chain trends: an industry-level assessment 41 2 5.1 Voice and Messaging Services 41 5.1.1. The traditional supply chain 41 5.1.2.
    [Show full text]
  • IBM Storage: Product Guide
    IBM Storage Product guide Contents 3 Introduction 5 Portfolio 7 Storage for data and AI 11 Storage for hybrid cloud 18 Data Resilience 22 Storage for IBM Z 26 Storage for SAP HANA 30 Storage for containers 35 Storage networking 39 Converged infrastructure 42 IBM Services for storage 43 Conclusion IBM Storage is the Storage right foundation for your data-driven made hybrid cloud. simple Introduction Every day you face a complex mix of events that IBM® Storage simplifies your data infrastructure What’s possible Storage for hybrid cloud can affect business outcomes, like managing using an underlying software foundation to Reduce complexity with container-enabled growing data and LOB applications, maintaining strengthen and streamline the storage in your with IBM Storage enterprise storage, deployed seamlessly core IT applications and uncovering competitive hybrid cloud environment, using a simplified across on-premises and hybrid cloud advantage. All of these demands put pressure on approach to containerization, management storage environments. your storage infrastructure’s performance, and data protection. capacity and security. AI and data Simplify your infrastructure with optimized efficiency to drive faster results that are massively scalable and globally available from edge to inference. Data resilience Maximize backup storage efficiency, data security and performance with maximum uptime and resilience while lowering costs. Storage for containers Surpass your business goals with speed, productivity and agility, all enabled by a security-rich,
    [Show full text]