Select a VM for a production SAP HANA database.
→Use Mv2-series or M-series VMs for large databases (>4TB). Use SAP-certified Edsv5-series VMs for smaller production HANA databases (<4TB).
Why: M-series/Mv2-series are SAP-certified for large memory workloads. Edsv5-series offers a cost-effective certified option for smaller HANA instances. Other series (D, F, L) are not certified for production HANA databases.
Reference↗
Select a VM for an SAP NetWeaver application server.
→Use Edsv5-series or Ddsv5-series VMs. Size based on SAPS requirements from SAP EarlyWatch Alert reports or SAP Quick Sizer.
Why: E-series and D-series VMs provide a balanced CPU-to-memory ratio suitable for SAP application server workloads and are SAP-certified for NetWeaver.
Ensure minimal network latency between SAP application servers and the database server.
→Deploy all related VMs (app servers, ASCS/ERS, database) within a single Proximity Placement Group (PPG).
Why: PPGs physically co-locate VMs in the same datacenter, minimizing network round-trip time to meet SAP's sub-millisecond latency requirement between application and database tiers.
Provide a shared file system for the /hana/shared volume in a SAP HANA scale-out deployment.
→Use Azure NetApp Files (ANF) with the NFS protocol.
Why: ANF is the SAP-certified, high-performance, shared NFS storage solution required for HANA scale-out configurations. Block storage like Managed Disks cannot be used for this purpose.
Provide a highly available shared file system for /sapmnt and the global transport directory (/usr/sap/trans).
→Use Azure NetApp Files (NFS) or Azure Files Premium (NFS). For Windows, use Azure Files Premium (SMB) or SOFS cluster.
Why: These services provide managed, highly available file shares with the required performance and protocol support (NFS for Linux, SMB for Windows), eliminating the need to build and manage a separate file server cluster.
Design storage for production SAP HANA /hana/data and /hana/log volumes requiring high IOPS and sub-millisecond latency.
→Use Azure Ultra Disk or Premium SSD v2 managed disks. For /hana/log on M-series VMs, Premium SSD with Write Accelerator is also a valid option.
Why: Ultra Disk and Premium SSD v2 meet the stringent IOPS, throughput, and sub-millisecond latency KPIs defined by SAP for production HANA workloads. Standard storage tiers are not supported.
Design a secure network architecture for SAP workloads, isolating production from non-production environments.
→Use a hub-spoke topology. Deploy SAP systems in dedicated spoke VNets for each environment (Prod, QA, Dev). Use Network Security Groups (NSGs) to enforce strict traffic rules between subnets.
Why: This provides strong network isolation at the VNet level and fine-grained traffic control with NSGs, following security best practices and the Azure Landing Zone concept.
Deploy SAP landscapes on Azure using an Infrastructure as Code (IaC) approach for consistency and automation.
→Use the official SAP on Azure Deployment Automation Framework, which leverages Terraform and Ansible. Alternatively, build custom Bicep or Terraform modules.
Why: The framework provides pre-built, SAP-validated templates for deploying the entire landscape (control plane, workload zones, SAP systems), reducing manual effort and ensuring adherence to best practices.
Securely publish SAP Fiori or other web-based SAP applications to external users over the internet.
→Use Azure Application Gateway with the Web Application Firewall (WAF) enabled.
Why: App Gateway provides Layer 7 load balancing, SSL termination, and WAF protection against common web vulnerabilities, making it the ideal and secure entry point for web-based SAP applications.
Deploy an extremely large SAP HANA database (>12 TB memory) that exceeds Azure VM capacity.
→Use SAP HANA on Azure Large Instances (HLI). Connectivity requires an ExpressRoute circuit connecting the HLI stamp to an Azure VNet via an ExpressRoute gateway.
Why: HLI are purpose-built, bare-metal servers providing the massive memory and performance needed for the largest HANA workloads, which are beyond the scale of current virtualized infrastructure.
Deploy an SAP system across Availability Zones while still minimizing latency within each zone.
→Create a separate Proximity Placement Group (PPG) for the resources in each Availability Zone. Pin each PPG to its respective zone.
Why: A single PPG cannot span zones. This approach ensures low-latency co-location of resources *within* a zone, while still achieving high availability *across* zones.
Create and distribute standardized, patched, and pre-configured VM images for SAP deployments across multiple regions.
→Use Azure Image Builder to define a repeatable image creation process. Store and replicate the resulting managed images using Azure Compute Gallery.
Why: This provides a version-controlled, automated "golden image" factory, ensuring consistency and reducing deployment time compared to manually configuring each new VM.
Provide secure RDP/SSH administrative access to SAP VMs without exposing them to the public internet.
→Deploy Azure Bastion (Standard SKU) into a dedicated subnet within the SAP virtual network. Use Bastion to connect to VMs via the Azure portal or native clients.
Why: Bastion acts as a secure, managed jump box, eliminating the need for public IP addresses on SAP VMs or complex VPN setups for administrative access, thereby reducing the attack surface.
Encrypt SAP data volumes using customer-managed encryption keys.
→Use Azure Disk Encryption with a customer-managed key (CMK) stored in Azure Key Vault. This can be combined with SAP HANA native encryption for defense-in-depth.
Why: This configuration gives the customer full control over the data encryption keys, meeting stringent compliance and security requirements for key lifecycle management.