Get started with Azure Application Consistent Snapshot tool

This article provides a guide for installing the Azure Application Consistent Snapshot tool that you can use with Azure NetApp Files.

Getting the snapshot tools

It's recommended customers get the most recent version of the AzAcSnap Installer from Microsoft.

The self-installation file has an associated AzAcSnap Installer signature file. This file is signed with Microsoft's public key to allow for GPG verification of the downloaded installer.

Once these downloads are completed, then follow the steps in this guide to install.

Verifying the download

The installer has an associated PGP signature file with an .asc filename extension. This file can be used to ensure the installer downloaded is a verified Microsoft provided file. The Microsoft PGP Public Key used for signing Linux packages has been used to sign the signature file.

The Microsoft PGP Public Key can be imported to a user's local as follows:

wget https://packages.microsoft.com/keys/microsoft.asc
gpg --import microsoft.asc

The following commands trust the Microsoft PGP Public Key:

  1. List the keys in the store.
  2. Edit the Microsoft key.
  3. Check the fingerprint with fpr.
  4. Sign the key to trust it.
gpg --list-keys

Listed keys:

----<snip>----
pub rsa2048 2015- 10 - 28 [SC]
BC528686B50D79E339D3721CEB3E94ADBE1229CF
uid [ unknown] Microsoft (Release signing) gpgsecurity@microsoft.com
gpg --edit-key gpgsecurity@microsoft.com

Output from interactive gpg session signing Microsoft public key:

gpg (GnuPG) 2.1.18; Copyright (C) 2017 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
pub rsa2048/EB3E94ADBE1229CF
created: 2015- 10 - 28 expires: never usage: SC
trust: unknown validity: unknown
[ unknown] (1). Microsoft (Release signing) <gpgsecurity@microsoft.com>

gpg> fpr
pub rsa2048/EB3E94ADBE1229CF 2015- 10 - 28 Microsoft (Release signing)
<gpgsecurity@microsoft.com>
Primary key fingerprint: BC52 8686 B50D 79E3 39D3 721C EB3E 94AD BE12 29CF

gpg> sign
pub rsa2048/EB3E94ADBE1229CF
created: 2015- 10 - 28 expires: never usage: SC
trust: unknown validity: unknown
Primary key fingerprint: BC52 8686 B50D 79E3 39D3 721C EB3E 94AD BE12 29CF
Microsoft (Release signing) <gpgsecurity@microsoft.com>
Are you sure that you want to sign this key with your
key "XXX XXXX <xxxxxxx@xxxxxxxx.xxx>" (A1A1A1A1A1A1)
Really sign? (y/N) y

gpg> quit
Save changes? (y/N) y

The PGP signature file for the installer can be checked as follows:

gpg --verify azacsnap_installer_v5.0.run.asc azazsnap_installer_v5.0.run
gpg: Signature made Sat 13 Apr 2019 07:51:46 AM STD
gpg: using RSA key EB3E94ADBE1229CF
gpg: Good signature from "Microsoft (Release signing)
<gpgsecurity@microsoft.com>" [full]

For more information about using GPG, see The GNU Privacy Handbook.

Supported scenarios

The snapshot tools can be used in the following Supported scenarios for HANA Large Instances and SAP HANA with Azure NetApp Files.

Snapshot Support Matrix from SAP

The following matrix is provided as a guideline on which versions of SAP HANA are supported by SAP for Storage Snapshot Backups.

Database type Minimum database versions Notes
Single Container Database 1.0 SPS 12, 2.0 SPS 00
MDC Single Tenant 2.0 SPS 01 or later versions where MDC Single Tenant supported by SAP for storage/data snapshots.*
MDC Multiple Tenants 2.0 SPS 04 or later where MDC Multiple Tenants supported by SAP for data snapshots.

* SAP changed terminology from Storage Snapshots to Data Snapshots from 2.0 SPS 02

Important things to remember

  • After the setup of the snapshot tools, continuously monitor the storage space available and if necessary, delete the old snapshots on a regular basis to avoid storage fill out.
  • Always use the latest snapshot tools.
  • Use the same version of the snapshot tools across the landscape.
  • Test the snapshot tools to understand the parameters required and their behavior, along with the log files, before deployment into production.
  • When setting up the HANA user for backup, you need to set up the user for each HANA instance. Create an SAP HANA user account to access HANA instance under the SYSTEMDB (and not in the SID database) for MDC. In the single container environment, it can be set up under the tenant database.
  • Customers must provide the SSH public key for storage access. This action must be done once per node and for each user under which the command is executed.
  • The number of snapshots per volume is limited to 250.
  • If manually editing the configuration file, always use a Linux text editor such as "vi" and not Windows editors like Notepad. Using Windows editor may corrupt the file format.
  • Set up hdbuserstore for the SAP HANA user to communicate with SAP HANA.
  • For DR: The snapshot tools must be tested on DR node before DR is set up.
  • Monitor disk space regularly
    • Automated log deletion is managed with the --trim option of the azacsnap -c backup for SAP HANA 2 and later releases.
  • Risk of snapshots not being taken - The snapshot tools only interact with the node of the SAP HANA system specified in the configuration file. If this node becomes unavailable, there's no mechanism to automatically start communicating with another node.
    • For an SAP HANA Scale-Out with Standby scenario it's typical to install and configure the snapshot tools on the primary node. But, if the primary node becomes unavailable, the standby node will take over the primary node role. In this case, the implementation team should configure the snapshot tools on both nodes (Primary and Stand-By) to avoid any missed snapshots. In the normal state, the primary node will take HANA snapshots initiated by crontab. If the primary node fails over those snapshots will have to be executed from another node, such as the new primary node (former standby). To achieve this outcome, the standby node would need the snapshot tool installed, storage communication enabled, hdbuserstore configured, azacsnap.json configured, and crontab commands staged in advance of the failover.
    • For an SAP HANA HSR HA scenario, it's recommended to install, configure, and schedule the snapshot tools on both (Primary and Secondary) nodes. Then, if the Primary node becomes unavailable, the Secondary node will take over with snapshots being taken on the Secondary. In the normal state, the Primary node will take HANA snapshots initiated by crontab. The Secondary node would attempt to take snapshots but fail as the Primary is functioning correctly. But, after Primary node failover, those snapshots will be executed from the Secondary node. To achieve this outcome, the Secondary node needs the snapshot tool installed, storage communication enabled, hdbuserstore configured, azacsnap.json configured, and crontab enabled in advance of the failover.

Guidance provided in this document

The following guidance is provided to illustrate the usage of the snapshot tools.

Taking snapshot backups

Snapshots are tested for both single SID and multi SID.

Performing disaster recovery

Next steps