You've probably delved into various ECS documents detailing high availability (HA) and disaster recovery (DR) strategies for SAP applications. However, ensuring robust network connectivity between your on-premises setup or any cloud provider and ECS is equally crucial but often overlooked (we can argue on that over a coffee!). Let's explore how to enhance your network's resilience and redundancy, focusing on common connectivity methods I’ve seen and routing strategies especially for a RISE with SAP Private Cloud Edition.
For network architects wrangling with ECS on connectivity design and decisions. Background networking knowledge is essential. I won’t discuss more on the connectivity concepts but will detail elements that you can leverage to enhance the resilience & redundancy of your network connectivity to ECS
ECS recommends that customers treat the ECS network, where SAP systems reside, as a logical extension of their own network infrastructure. As a result of this (as of this writing), ECS does not natively offer advanced routing techniques, tunnel monitoring tools, or automated tunnel failover mechanisms. Instead, the responsibility for designing and implementing the desired redundancy and resiliency in connectivity rests with you, the customer. This entails leveraging additional (third-party) tools and appropriately configuring your on-premises/hyperscaler network equipment in collaboration with ECS to achieve the required level of network resilience.
In the rush to get projects off the ground, many organizations establish a basic VPN tunnel to connect their on-premises infrastructure to the SAP RISE environment, often relying on a single tunnel. This "quick fix" approach, while expedient, can introduce several challenges:
These issues are particularly pronounced during brownfield migration projects, where reliable and high-performance connectivity is vital for efficient data migration to ECS.
To bolster your network's resilience, consider the following strategies:
Example scenario with redundant VPN tunnel
Effective routing is key to maximizing the benefits of your redundant VPN setup: For routing, using protocols like BGP dynamically adjusts routing tables based on network conditions, ensuring efficient use of available tunnels. For policy-based routing, add static route and weight the backup route. Honestly, though, you'll save yourself a world of headaches by leaning into dynamic routing with BGP
If you’re choosing to have active-active VPN tunnel, then each of those routes can be assigned different costs or priority, and the edge device will handle the traffic. It can be round-robin, load balancing or simple failover although the suggested one is simple failover.
Note traffic sent through one tunnel might return via another, leading to asymmetric routing. This can cause problems, especially with stateful firewalls that expect return traffic on the same interface.
By using route preference techniques such as AS path prepending can influence the preferred path for incoming traffic. For instance, using AS path prepending to make one tunnel less preferred, guiding traffic through the desired path. Also, ECMP (Equal-Cost Multi-Path) allows for load balancing across multiple paths of equal cost, distributing traffic evenly and reducing the risk of asymmetry.
Continuously monitoring the performance of each VPN tunnel and adjusting routing preferences based on metrics like latency, jitter, and packet loss might be required. This proactive approach ensures that traffic uses the most efficient and stable paths.
And you don't have to go it alone! There are some excellent tools out there to help you out. You can use any tools like Palo Alto Networks – Tunnel Monitoring where Palo Alto firewalls offer built-in tunnel monitoring features like ICMP probing, Dead Peer Detection (DPD) and also Automatic failover. Similarly, ManageEngine OpManager provides Real-Time Monitoring with alerts and notifications. Also, SolarWinds Network Performance Monitor (NPM) provides Site-to-Site VPN Monitoring.
When it comes to hyperscaler connectivity, that's a whole different ballgame! Think of it less about ECS and more about the specific cloud provider's playbook. For the nitty-gritty details, your best bet is to dive into hyperscaler documentation and get that done by ECS.
Refer to this to know more on AWS Direct Connect Resiliency. Decide on the architecture and ask ECS to configure the resiliency model when they order the Direct Connect Connection. Depending on if you’re working with AWS Direct Connect Partner, you might want to involve them as well in the discussions.
For Express Route redundancy, refer Express Route Private Peering. With the decided architecture you might want to work with ECS to ensure advertised routes over ExpressRoute circuit is visible on ECS side. For weighted path, you’ll have to work with ECS to get it configured, and for AS path prepending, on the less preferred tunnel, configure a route-map to prepend your AS number multiple times.
Got other connectivity curiosities you'd like me to poke into for SAP ECS? Drop a comment below—I'm always happy to write another blog post about it! If this post sparked more questions than answers (or just got your tech gears grinding), don't hesitate to reach out! I'm happy to chat more about ECS and dive deeper into any technical topics you have in mind
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
User | Count |
---|---|
35 | |
22 | |
16 | |
15 | |
8 | |
7 | |
7 | |
7 | |
6 | |
6 |