diff --git a/roles/sap_general_preconfigure/README.md b/roles/sap_general_preconfigure/README.md
index 3511e61e9..46622bebf 100644
--- a/roles/sap_general_preconfigure/README.md
+++ b/roles/sap_general_preconfigure/README.md
@@ -432,7 +432,7 @@ The IPV4 address to be used for updating or checking `/etc/hosts` entries.
### sap_general_preconfigure_db_group_name
- _Type:_ `str`
-Use this variable to specify the name of the RHEL group which is used for the database processes.
+(RedHat specific) Use this variable to specify the name of the RHEL group which is used for the database processes.
If defined, it will be used to configure process limits as per step
Configuring Process Resource Limits
diff --git a/roles/sap_general_preconfigure/defaults/main.yml b/roles/sap_general_preconfigure/defaults/main.yml
index a016e7c68..e8db802c6 100644
--- a/roles/sap_general_preconfigure/defaults/main.yml
+++ b/roles/sap_general_preconfigure/defaults/main.yml
@@ -79,7 +79,7 @@ sap_general_preconfigure_envgroups: "{{ __sap_general_preconfigure_envgroups }}"
# Example: See README.md
sap_general_preconfigure_packages: "{{ __sap_general_preconfigure_packages }}"
-# The list of packages to install.
+# The list of packages to be installed.
# The default for this variable is set in the vars file which corresponds to the detected OS version.
sap_general_preconfigure_min_package_check: true
@@ -164,11 +164,20 @@ sap_general_preconfigure_domain: "{{ sap_domain | d(ansible_domain) }}"
# The DNS domain name to be used for updating or checking `/etc/hosts` entries.
# sap_general_preconfigure_db_group_name: (not defined by default)
-# Use this variable to specify the name of the RHEL group which is used for the database processes.
+# (RedHat specific) Use this variable to specify the name of the RHEL group which is used for the database processes.
# If defined, it will be used to configure process limits as per step
# Configuring Process Resource Limits
# Example: See README.md
+sap_general_preconfigure_run_grub2_mkconfig: true
+# By default, the role will run `grub2-mkconfig` to update the Grub configuration if necessary.
+# Set this parameter to `false` if this is not desired.
+
+# (SUSE specific) Version of saptune to install.
+# It is recommended to install latest version by keeping this variable empty.
+# This will replace the current installed version if present, even downgrade if necessary.
+sap_general_preconfigure_saptune_version: ''
+
# in SAP Note 2369910 SAP requires English locale
# If you want to define the locale set this to e.g. en_US.UTF-8
sap_general_preconfigure_default_locale: ""
diff --git a/roles/sap_general_preconfigure/handlers/main.yml b/roles/sap_general_preconfigure/handlers/main.yml
index e54f6dd56..e99721976 100644
--- a/roles/sap_general_preconfigure/handlers/main.yml
+++ b/roles/sap_general_preconfigure/handlers/main.yml
@@ -1,52 +1,136 @@
# SPDX-License-Identifier: Apache-2.0
---
-# handlers file for sap_general_preconfigure
+
+# BEGIN - GRUB section
+- name: "Check if server is booted in BIOS or UEFI mode"
+ ansible.builtin.stat:
+ path: /sys/firmware/efi
+ get_checksum: false
+ register: __sap_general_preconfigure_register_stat_sys_firmware_efi
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - sap_general_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: Debug BIOS or UEFI
+ ansible.builtin.debug:
+ var: __sap_general_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - sap_general_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Run grub-mkconfig (BIOS mode)"
+ ansible.builtin.command:
+ cmd: grub2-mkconfig -o /boot/grub2/grub.cfg
+ register: __sap_general_preconfigure_register_grub2_mkconfig_bios_mode
+ changed_when: true
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ notify: __sap_general_preconfigure_reboot_handler
+ when:
+ - not __sap_general_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_general_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Debug grub-mkconfig BIOS mode"
+ ansible.builtin.debug:
+ var: __sap_general_preconfigure_register_grub2_mkconfig_bios_mode.stdout_lines,
+ __sap_general_preconfigure_register_grub2_mkconfig_bios_mode.stderr_lines
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - not __sap_general_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_general_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Set the grub.cfg location RHEL"
+ ansible.builtin.set_fact:
+ __sap_general_preconfigure_uefi_boot_dir: /boot/efi/EFI/redhat/grub.cfg
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - ansible_distribution == 'RedHat'
+
+- name: "Set the grub.cfg location SLES"
+ ansible.builtin.set_fact:
+ __sap_general_preconfigure_uefi_boot_dir: /boot/efi/EFI/BOOT/grub.cfg
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - ansible_distribution == 'SLES' or ansible_distribution == 'SLES_SAP'
+
+- name: "Run grub-mkconfig (UEFI mode)"
+ ansible.builtin.command:
+ cmd: "grub2-mkconfig -o {{ __sap_general_preconfigure_uefi_boot_dir }}"
+ register: __sap_general_preconfigure_register_grub2_mkconfig_uefi_mode
+ changed_when: true
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ notify: __sap_general_preconfigure_reboot_handler
+ when:
+ - __sap_general_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_general_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Debug grub-mkconfig UEFI"
+ ansible.builtin.debug:
+ var: __sap_general_preconfigure_register_grub2_mkconfig_uefi_mode.stdout_lines,
+ __sap_general_preconfigure_register_grub2_mkconfig_uefi_mode.stderr_lines
+ listen: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - __sap_general_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_general_preconfigure_run_grub2_mkconfig | d(true)
+
+# END - GRUB section
+
- name: Reboot the managed node
ansible.builtin.reboot:
test_command: /bin/true
listen: __sap_general_preconfigure_reboot_handler
when:
- - sap_general_preconfigure_reboot_ok|d(false)
+ - sap_general_preconfigure_reboot_ok | d(false)
+
# Kernel update triggers zypper purge-kernels and lock after reboot.
- name: Wait for Zypper lock to be released
ansible.builtin.command:
cmd: zypper info zypper
- retries: 60
- timeout: 5
+ retries: 20
+ timeout: 30
listen: __sap_general_preconfigure_reboot_handler
when:
- ansible_os_family == 'Suse'
- sap_general_preconfigure_reboot_ok | d(false)
changed_when: false
+
- name: Let the role fail if a reboot is required
ansible.builtin.fail:
msg: Reboot is required!
listen: __sap_general_preconfigure_reboot_handler
when:
- - sap_general_preconfigure_fail_if_reboot_required|d(true)
- - not sap_general_preconfigure_reboot_ok|d(false)
+ - sap_general_preconfigure_fail_if_reboot_required | d(true)
+ - not sap_general_preconfigure_reboot_ok | d(false)
- name: Show a warning message if a reboot is required
ansible.builtin.debug:
msg: "WARN: Reboot is required!"
listen: __sap_general_preconfigure_reboot_handler
when:
- - not sap_general_preconfigure_fail_if_reboot_required|d(true)
- - not sap_general_preconfigure_reboot_ok|d(false)
+ - not sap_general_preconfigure_fail_if_reboot_required | d(true)
+ - not sap_general_preconfigure_reboot_ok | d(false)
+
+- name: Unmask packagekit.service
+ ansible.builtin.systemd_service:
+ name: packagekit.service
+ masked: false
+ listen: __sap_general_preconfigure_packagekit_handler
+
# Reasons for noqa:
# - command-instead-of-module: We want to avoid non-ansible.builtin modules where possible
# - no-changed-when: Remounting does not do any harm and does not affect idempotency.
- name: Remount /dev/shm # noqa command-instead-of-module no-changed-when
- ansible.builtin.command: mount -o remount /dev/shm
+ ansible.builtin.command:
+ cmd: mount -o remount /dev/shm
listen: __sap_general_preconfigure_mount_tmpfs_handler
tags: molecule-idempotence-notest
- name: Check if /dev/shm is available
- ansible.builtin.command: df -h /dev/shm
+ ansible.builtin.command:
+ cmd: df -h /dev/shm
register: __sap_general_preconfigure_command_df_shm_result
changed_when: false
listen: __sap_general_preconfigure_mount_tmpfs_handler
diff --git a/roles/sap_general_preconfigure/tasks/SLES/assert-configuration.yml b/roles/sap_general_preconfigure/tasks/SLES/assert-configuration.yml
index d4e8b9341..eb316d43a 100644
--- a/roles/sap_general_preconfigure/tasks/SLES/assert-configuration.yml
+++ b/roles/sap_general_preconfigure/tasks/SLES/assert-configuration.yml
@@ -10,6 +10,6 @@
- name: Assert - Include configuration actions for required sapnotes
ansible.builtin.include_tasks: "sapnote/assert-{{ sap_note_line_item.number }}.yml"
- with_items: "{{ __sap_general_preconfigure_sapnotes_versions | difference(['']) }}"
+ loop: "{{ __sap_general_preconfigure_sapnotes_versions | difference(['']) }}"
loop_control:
loop_var: sap_note_line_item
diff --git a/roles/sap_general_preconfigure/tasks/SLES/assert-installation.yml b/roles/sap_general_preconfigure/tasks/SLES/assert-installation.yml
index 6aa787615..464f076c9 100644
--- a/roles/sap_general_preconfigure/tasks/SLES/assert-installation.yml
+++ b/roles/sap_general_preconfigure/tasks/SLES/assert-installation.yml
@@ -1,96 +1,57 @@
# SPDX-License-Identifier: Apache-2.0
---
+- name: Get list of what provides packages # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "rpm -q --whatprovides {{ item }}"
+ register: __sap_general_preconfigure_register_whatprovides
+ changed_when: false
+ ignore_errors: true
+ loop: "{{ sap_general_preconfigure_packages }}"
+
+
+# Both sap_general_preconfigure_packages and __sap_general_preconfigure_min_pkgs are checked at same time.
- name: Assert that all required packages are installed
ansible.builtin.assert:
- that: line_item in ansible_facts.packages
- fail_msg: "FAIL: Package '{{ line_item }}' is not installed!"
- success_msg: "PASS: Package '{{ line_item }}' is installed."
- with_items:
- - "{{ sap_general_preconfigure_packages }}"
- loop_control:
- loop_var: line_item
+ that: item in ansible_facts.packages
+ or __sap_general_preconfigure_register_whatprovides.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Package '{{ item }}' is not installed!"
+ success_msg: "PASS: Package '{{ item }}' is installed."
+ loop: "{{ sap_general_preconfigure_packages if not sap_general_preconfigure_min_package_check | bool
+ else ((sap_general_preconfigure_packages | d([])) + (__sap_general_preconfigure_min_pkgs | d([])) | map(attribute='0') | unique) }}"
ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
-- name: Minimum required package version check
+
+# Availability of minimum packages is checked above.
+- name: Assert that all minimum required packages are installed with minimum version
+ ansible.builtin.assert:
+ that:
+ - __version is version(item[1], '>=')
+ fail_msg: "FAIL: Minimum package version '{{ item[0] }}-{{ item[1] }}' is not installed! Current version: '{{ __version }}'"
+ success_msg: "PASS: Minimum package version '{{ item[0] }}-{{ item[1] }}' is installed."
+ vars:
+ __version: "{{ ansible_facts.packages[item[0]][0]['version'] ~ '-' ~ ansible_facts.packages[item[0]][0]['release']
+ ~ '.' ~ ansible_facts.packages[item[0]][0]['arch']}}"
+ loop: "{{ __sap_general_preconfigure_min_pkgs }}"
when:
- sap_general_preconfigure_min_package_check | bool
- __sap_general_preconfigure_min_pkgs | d([])
- block:
-
-# Reason for noqa: We can safely fail at the last command in the pipeline.
- - name: Assert - Create a list of minimum required package versions to be installed # noqa risky-shell-pipe
-# How does it work?
-# 1 - Print the required package name and version with a prefix "1" followed by a space.
-# 2 - In the same output sequence, list all installed versions of this package with a prefix "2" followed by a space.
-# 3 - Replace all occurrences of ".el" by ".0.0" so that the sort -V correctly sorts packages with ".el" in its name
-# 4 - Sort the list by the name and version.
-# 5 - Replace ".0.0" by ".el" again to get back the original names.
-# 6 - Store the last installed version of the package in variable latestpkg.
-# 7 - Store the last content of column 1 in variable col1, the last content of column 2 in variable col2,
-# and the last number of fields in variable _nf.
-# 8 - case 1: If the last number of output fields is greater than 2, it indicates that the package is not installed
-# because the output of "rpm -q" will be similar to "package XXX is not installed".
-# 8 - case 2a: If the first column of the last line of the output is "1", it means that the required package is
-# the latest of all required and installed versions of the package, so it means that the package needs
-# to be updated.
-# 8 - case 2b: If the first column of the last line of the output is "2", it means that at least of the installed
-# versions the package is equal to or greater than the required package version.
- ansible.builtin.shell: |
- (echo "1 {{ pkg[0] }}-{{ pkg[1] }}";rpm -q --qf "%{NAME}-%{VERSION}-%{RELEASE}\n" {{ pkg[0] }} |
- awk '{printf ("2 %s\n", $0)}') |
- awk '{gsub ("\\.el", ".0.0"); print}' |
- sort -k 2 -k 1 -V |
- awk '{gsub ("\\.0\\.0", ".el"); col1=$1; col2=$2; _nf=NF}
- $1==2{latestpkg=$2}
- END {
- if (_nf>2) {
- printf ("Package '\''{{ pkg[0] }}'\'' needs to be installed as {{ pkg[0] }}-{{ pkg[1] }}!\n")
- } else {
- if (col1==1) {
- printf ("Package '\''{{ pkg[0] }}'\'' needs to be updated to %s! Currently installed latest version: %s.\n", $2, latestpkg)
- }
- if (col1==2) {
- printf ("Package '\''{{ pkg[0] }}'\'' is already installed as {{ pkg[0] }}-{{ pkg[1] }} or later. Currently installed latest version: %s.\n", latestpkg)
- }
- }
- }'
- with_list: "{{ __sap_general_preconfigure_min_pkgs }}"
- loop_control:
- loop_var: pkg
- check_mode: false
- register: __sap_general_preconfigure_register_minpkglist_assert
- changed_when: false
-
- - name: Assert that minimum required package versions are installed
-# If the output includes the string "is already installed" (case 2b), we have a PASS. Otherwise, it's a FAIL.
- ansible.builtin.assert:
- that: "'is already installed' in line_item.stdout"
- fail_msg: "FAIL: {{ line_item.stdout }}"
- success_msg: "PASS: {{ line_item.stdout }}"
- with_items: "{{ __sap_general_preconfigure_register_minpkglist_assert.results }}"
- loop_control:
- loop_var: line_item
- label: ""
- ignore_errors: true
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
-- name: Report if no minimum required package version is defined for this RHEL release
- ansible.builtin.debug:
- msg: "INFO: No minimum required package version defined (variable __sap_general_preconfigure_min_pkgs)."
- ignore_errors: true
- when: not __sap_general_preconfigure_min_pkgs | d([])
-# Reason for noqa: The yum module appears to not support the check-update option
- name: Get info about possible package updates # noqa command-instead-of-module
- ansible.builtin.command: yum check-update
- register: __sap_general_preconfigure_register_yum_check_update_assert
+ ansible.builtin.command:
+ cmd: zypper -q patch-check
+ timeout: 120
+ retries: 5
+ register: __sap_general_preconfigure_register_zypper_check_update_assert
changed_when: false
- ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
+ ignore_errors: true # true, because unpatched system is always error.
when: sap_general_preconfigure_update
- name: Assert that there are no more possible package updates
ansible.builtin.assert:
- that: __sap_general_preconfigure_register_yum_check_update_assert is success
+ that: __sap_general_preconfigure_register_zypper_check_update_assert.rc == 0
fail_msg: "FAIL: System needs to be updated!"
success_msg: "PASS: There are no more outstanding package updates."
ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
@@ -99,45 +60,18 @@
- name: Report if checking for possible package updates is not requested
ansible.builtin.debug:
msg: "INFO: Not checking for possible package updates (variable sap_general_preconfigure_update)."
- ignore_errors: true
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
when: not sap_general_preconfigure_update
-- name: "Assert - Set needs-restarting command in case of RHEL 7"
- ansible.builtin.set_fact:
- __sap_general_preconfigure_fact_needs_restarting_command_assert: "needs-restarting -r"
- when:
- - ansible_os_family == 'RedHat'
- - ansible_distribution_major_version == '7'
-
-- name: "Assert - Set needs-restarting command in case of RHEL 8 or RHEL 9, except RHEL 8.0"
- ansible.builtin.set_fact:
- __sap_general_preconfigure_fact_needs_restarting_command_assert: "yum needs-restarting -r"
- when:
- - ansible_os_family == 'RedHat'
- - (ansible_distribution_major_version == '8' or
- ansible_distribution_major_version == '9'
- )
- - ansible_distribution_version != '8.0'
-
-- name: "Assert - Set customized needs-restarting command in case of RHEL 8.0"
- ansible.builtin.set_fact:
- __sap_general_preconfigure_fact_needs_restarting_command_assert: "_IKRNL=$(rpm -q --last kernel | awk 'NR==1{sub(/kernel-/,\"\"); print $1}');
- _CKRNL=$(uname -r); if [ ${_IKRNL} != ${_CKRNL} ]; then exit 1; else exit 0; fi"
- when:
- - ansible_os_family == 'RedHat'
- - ansible_distribution_version == '8.0'
-
-- name: Assert - Display the command for checking a reboot requirement
- ansible.builtin.debug:
- var: __sap_general_preconfigure_fact_needs_restarting_command_assert
# Reason for noqa: The command to be executed might contain pipes
-- name: Assert - Determine if the system needs to be restarted # noqa command-instead-of-shell
- ansible.builtin.shell: "{{ __sap_general_preconfigure_fact_needs_restarting_command_assert }}"
+- name: Determine if the system needs to be restarted # noqa command-instead-of-shell
+ ansible.builtin.shell:
+ cmd: "zypper ps"
register: __sap_general_preconfigure_register_needs_restarting_assert
changed_when: false
check_mode: false
- ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
+ ignore_errors: true # true, because output is too large.
- name: Assert that system needs no restart
ansible.builtin.assert:
@@ -145,3 +79,15 @@
fail_msg: "FAIL: System needs to be restarted!"
success_msg: "PASS: System needs no restart."
ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
+
+
+- name: Assert saptune is at requested version
+ ansible.builtin.assert:
+ that: ansible_facts.packages['saptune'][0]['version'] == sap_general_preconfigure_saptune_version
+ fail_msg: "FAIL: saptune version installed is {{ ansible_facts.packages['saptune'][0]['version']
+ }} but the version {{ sap_general_preconfigure_saptune_version }} was expected"
+ success_msg: "PASS: the installed version of saptune meets the expected version: {{ sap_general_preconfigure_saptune_version }}"
+ when:
+ - __sap_general_preconfigure_use_saptune
+ - sap_general_preconfigure_saptune_version is defined
+ - sap_general_preconfigure_saptune_version | length > 0
diff --git a/roles/sap_general_preconfigure/tasks/SLES/configuration.yml b/roles/sap_general_preconfigure/tasks/SLES/configuration.yml
index cde628b48..dfcf3ef4f 100644
--- a/roles/sap_general_preconfigure/tasks/SLES/configuration.yml
+++ b/roles/sap_general_preconfigure/tasks/SLES/configuration.yml
@@ -7,6 +7,6 @@
- name: Configure - Include configuration actions for required sapnotes
ansible.builtin.include_tasks: "sapnote/{{ sap_note_line_item.number }}.yml"
- with_items: "{{ __sap_general_preconfigure_sapnotes_versions | difference(['']) }}"
+ loop: "{{ __sap_general_preconfigure_sapnotes_versions | difference(['']) }}"
loop_control:
loop_var: sap_note_line_item
diff --git a/roles/sap_general_preconfigure/tasks/SLES/generic/grub_update.yml b/roles/sap_general_preconfigure/tasks/SLES/generic/grub_update.yml
new file mode 100644
index 000000000..81469d3a1
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/SLES/generic/grub_update.yml
@@ -0,0 +1,39 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+# Generic task for updating GRUB configuration using provided list
+
+- name: Update existing GRUB entries
+ ansible.builtin.lineinfile:
+ path: /etc/default/grub
+ regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=".*?)(\b{{ item.split("=")[0] }}=[^ ]*\b)(.*")'
+ line: '\1{{ item }}\3'
+ backrefs: true
+ register: __sap_general_preconfigure_grub_update
+ loop: "{{ __sap_general_preconfigure_grub_cmdline }}"
+
+
+- name: Get current contents of GRUB
+ ansible.builtin.slurp:
+ path: /etc/default/grub
+ register: __sap_general_preconfigure_grub_contents
+
+
+- name: Add new GRUB entries
+ ansible.builtin.lineinfile:
+ path: /etc/default/grub
+ regexp: '^GRUB_CMDLINE_LINUX_DEFAULT="(.*?)"'
+ line: 'GRUB_CMDLINE_LINUX_DEFAULT="\1 {{ item }}"'
+ backrefs: true
+ register: __sap_general_preconfigure_grub_add
+ loop: "{{ __sap_general_preconfigure_grub_cmdline }}"
+ when: item not in (__sap_general_preconfigure_grub_contents.content | b64decode)
+
+
+- name: Trigger grub update if necessary # noqa no-changed-when
+ ansible.builtin.command:
+ cmd: /bin/true
+ notify: __sap_general_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - (__sap_general_preconfigure_grub_update.results | selectattr('changed', 'equalto', true) | list | length > 0)
+ or (__sap_general_preconfigure_grub_add.results | selectattr('changed', 'equalto', true) | list | length > 0)
diff --git a/roles/sap_general_preconfigure/tasks/SLES/generic/saptune_install.yml b/roles/sap_general_preconfigure/tasks/SLES/generic/saptune_install.yml
new file mode 100644
index 000000000..ac87da3fa
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/SLES/generic/saptune_install.yml
@@ -0,0 +1,46 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1275776 - Linux: Preparing SLES for SAP environments
+
+- name: Get contents of /etc/products.d/baseproduct
+ ansible.builtin.stat:
+ path: /etc/products.d/baseproduct
+ register: __sap_general_preconfigure_register_baseproduct
+
+
+- name: Set fact if baseproduct contains SLES without SLES_SAP
+ ansible.builtin.set_fact:
+ __sap_general_preconfigure_use_saptune: false
+ when:
+ - '"SLES_SAP" not in __sap_general_preconfigure_register_baseproduct.stat.lnk_target'
+ - '"SLES" in __sap_general_preconfigure_register_baseproduct.stat.lnk_target
+ and ansible_distribution_major_version | int < 16'
+
+
+- name: Block to ensure saptune is installed
+ when: __sap_general_preconfigure_use_saptune | d(true)
+ block:
+ - name: Ensure latest saptune is installed
+ ansible.builtin.package:
+ name: saptune
+ state: present
+ when:
+ - sap_general_preconfigure_saptune_version is undefined
+ or sap_general_preconfigure_saptune_version | length == 0
+
+ - name: Ensure specific saptune version is installed
+ ansible.builtin.package:
+ name: "saptune={{ sap_general_preconfigure_saptune_version }}"
+ state: present
+ when:
+ - sap_general_preconfigure_saptune_version is defined
+ - sap_general_preconfigure_saptune_version | length > 0
+
+
+- name: Block to ensure sapconf is installed
+ when: not __sap_general_preconfigure_use_saptune | d(true)
+ block:
+ - name: Ensure sapconf is installed
+ ansible.builtin.package:
+ name: "sapconf"
+ state: present
diff --git a/roles/sap_general_preconfigure/tasks/SLES/generic/saptune_takeover.yml b/roles/sap_general_preconfigure/tasks/SLES/generic/saptune_takeover.yml
new file mode 100644
index 000000000..3ab54e1b7
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/SLES/generic/saptune_takeover.yml
@@ -0,0 +1,93 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1275776 - Linux: Preparing SLES for SAP environments
+
+- name: Execute saptune_check - before takeover
+ ansible.builtin.command:
+ cmd: saptune_check
+ register: __sap_general_preconfigure_register_saptune_check_before
+ when: __sap_general_preconfigure_use_saptune
+ changed_when: false
+ failed_when: false
+
+- name: Takeover and enable saptune
+ when:
+ - __sap_general_preconfigure_use_saptune
+ - __sap_general_preconfigure_register_saptune_check_before.rc != 0
+ block:
+ - name: Ensure sapconf is stopped and disabled
+ ansible.builtin.systemd:
+ name: sapconf
+ state: stopped
+ enabled: false
+ when: "'sapconf' in ansible_facts.packages"
+
+ - name: Make sure that sapconf and tuned are stopped and disabled
+ ansible.builtin.command:
+ cmd: "saptune service takeover"
+ register: __sap_general_preconfigure_register_saptune_takeover
+ changed_when: __sap_general_preconfigure_register_saptune_takeover.rc == 0
+
+ # saptune_check can fail if sapconf is in failed state
+ - name: Check if sapconf.service is failed # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: systemctl is-failed sapconf.service
+ register: __sap_general_preconfigure_register_sapconf_failed
+ changed_when: false
+ ignore_errors: true
+
+ - name: Execute systemctl reset-failed sapconf.service # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: systemctl reset-failed sapconf.service
+ when: __sap_general_preconfigure_register_sapconf_failed.rc == 0
+ changed_when: true
+
+ - name: Ensure saptune is running and enabled
+ ansible.builtin.systemd:
+ name: saptune
+ state: started
+ enabled: true
+
+ - name: Ensure saptune_check executes correctly
+ ansible.builtin.command:
+ cmd: saptune_check
+ register: __sap_general_preconfigure_register_saptune_check_after
+ changed_when: false
+
+
+- name: Check active saptune solution
+ when:
+ - __sap_general_preconfigure_use_saptune
+ - __sap_general_preconfigure_register_saptune_check_before.rc == 0
+ or (__sap_general_preconfigure_register_saptune_check_after.rc == 0)
+ block:
+ - name: Discover active solution
+ ansible.builtin.command:
+ cmd: saptune solution enabled
+ register: __sap_general_preconfigure_register_saptune_status
+ changed_when: false
+
+ - name: Set fact for active solution
+ ansible.builtin.set_fact:
+ # Capture the first block on none whitespace
+ __sap_general_preconfigure_register_solution_configured:
+ "{{ (__sap_general_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
+
+ - name: Show configured solution
+ ansible.builtin.debug:
+ var: __sap_general_preconfigure_register_solution_configured
+
+
+- name: Enable sapconf
+ when: not __sap_general_preconfigure_use_saptune
+ block:
+ - name: Enable sapconf service
+ ansible.builtin.systemd:
+ name: sapconf
+ state: started
+ enabled: true
+
+ - name: Restart sapconf service
+ ansible.builtin.systemd:
+ name: sapconf
+ state: restarted
diff --git a/roles/sap_general_preconfigure/tasks/SLES/installation.yml b/roles/sap_general_preconfigure/tasks/SLES/installation.yml
index 4f9daed97..a6d992494 100644
--- a/roles/sap_general_preconfigure/tasks/SLES/installation.yml
+++ b/roles/sap_general_preconfigure/tasks/SLES/installation.yml
@@ -1,80 +1,76 @@
# SPDX-License-Identifier: Apache-2.0
---
+- name: Gather service facts
+ ansible.builtin.service_facts:
+
+# Service packagekit is part of PackageKit-backend-zypp (SLE-Module-Desktop-Applications)
+# This service creates zypper locks and causes package install failures.
+# Service cannot be disabled and we have to mask its execution.
+- name: Mask packagekit.service when present
+ ansible.builtin.systemd_service:
+ name: packagekit.service
+ masked: true
+ when: "'packagekit.service' in ansible_facts.services"
+ notify: __sap_general_preconfigure_packagekit_handler
+
+
+- name: Wait for stop of packagekit.service
+ ansible.builtin.shell: |
+ set -o pipefail && bash -c '
+ while (ps aux | grep "[z]ypper" | grep -v grep) || (ps aux | grep "/usr/lib/packagekitd" | grep -v grep) ||
+ ([ -f /var/run/zypp.pid ] && [ -s /var/run/zypp.pid ]); do
+ sleep 10;
+ done'
+ register: __packagekit_service_check
+ changed_when: false
+ until: __packagekit_service_check.rc == 0
+ retries: 60
+ when: "'packagekit.service' in ansible_facts.services"
+
+
- name: Ensure that the required packages are installed
ansible.builtin.package:
state: present
- name: "{{ sap_general_preconfigure_packages }}"
+ name: "{{ sap_general_preconfigure_packages if not sap_general_preconfigure_min_package_check | bool
+ else ((sap_general_preconfigure_packages | d([])) + (__sap_general_preconfigure_min_pkgs | d([])) | map(attribute='0') | unique) }}"
+
-- name: Ensure that the minimum required package versions are installed
+- name: Install minimum packages if required
+ ansible.builtin.package:
+ name: '{{ line_item[0] }}>={{ line_item[1] }}'
+ state: present
+ loop: "{{ __sap_general_preconfigure_min_pkgs }}"
+ loop_control:
+ loop_var: line_item
when:
- sap_general_preconfigure_min_package_check|bool
- - __sap_general_preconfigure_min_pkgs|d([])
- block:
-
-# Reason for noqa: We can safely fail at the last command in the pipeline.
- - name: Create a list of minimum required package versions to be installed # noqa risky-shell-pipe
-# How does it work?
-# 1 - Print the required package name and version with a prefix "1" followed by a space.
-# 2 - In the same output sequence, list all installed versions of this package with a prefix "2" followed by a space.
-# 3 - Replace all occurrences of ".el" by ".0.0" so that the sort -V correctly sorts packages with ".el" in its name
-# 4 - Sort the list by the name and version.
-# 5 - Replace ".0.0" by ".el" again to get back the original names.
-# 6 - Store the last installed version of the package in variable latestpkg.
-# 7 - Store the last content of column 1 in variable col1, the last content of column 2 in variable col2,
-# and the last number of fields in variable _nf.
-# 8 - case 1: If the last number of output fields is greater than 2, it indicates that the package is not installed
-# because the output of "rpm -q" will be similar to "package XXX is not installed".
-# 8 - case 2a: If the first column of the last line of the output is "1", it means that the required package is
-# the latest of all required and installed versions of the package, so it means that the package needs
-# to be updated.
-# 8 - case 2b: If the first column of the last line of the output is "2", it means that at least of the installed
-# versions the package is equal to or greater than the required package version.
- ansible.builtin.shell: |
- (echo "1 {{ pkg[0] }}-{{ pkg[1] }}";rpm -q --qf "%{NAME}-%{VERSION}-%{RELEASE}\n" {{ pkg[0] }} |
- awk '{printf ("2 %s\n", $0)}') |
- awk '{gsub ("\\.el", ".0.0"); print}' |
- sort -k 2 -k 1 -V |
- awk '{gsub ("\\.0\\.0", ".el"); col1=$1; col2=$2; _nf=NF}
- $1==2{latestpkg=$2}
- END {
- if (_nf>2) {
- printf ("{{ pkg[0] }}-{{ pkg[1] }}\n")
- } else {
- if (col1==1) {
- printf ("{{ pkg[0] }}-{{ pkg[1] }}\n")
- }
- }
- }'
- with_list: "{{ __sap_general_preconfigure_min_pkgs }}"
- loop_control:
- loop_var: pkg
- check_mode: false
- register: __sap_general_preconfigure_register_minpkglist
- changed_when: false
-
- - name: Display the content of the minimum package list variable
- ansible.builtin.debug:
- var: __sap_general_preconfigure_register_minpkglist
-
- - name: Install minimum packages if required
- ansible.builtin.package:
- name: "{{ line_item.stdout }}"
- state: present
- with_items: "{{ __sap_general_preconfigure_register_minpkglist.results }}"
- loop_control:
- loop_var: line_item
-
-# Reason for noqa: Both yum and dnf support "state: latest"
+ - __sap_general_preconfigure_min_pkgs | d([])
+
+
+# Reason for noqa: Zypper supports "state: latest"
- name: Ensure that the system is updated to the latest patchlevel # noqa package-latest
ansible.builtin.package:
state: latest
name: "*"
- when: sap_general_preconfigure_update
+ register: __sap_general_preconfigure_register_update_latest
+ when: sap_general_preconfigure_update | bool
+
+
+# 1275776 - Linux: Preparing SLES for SAP environments
+- name: Install saptune if available
+ ansible.builtin.include_tasks:
+ file: generic/saptune_install.yml
+
+- name: Takeover and enable saptune if available
+ ansible.builtin.include_tasks:
+ file: generic/saptune_takeover.yml
+
# Reason for noqa: The command to be executed might contain pipes
- name: Determine if the system needs to be restarted # noqa command-instead-of-shell
- ansible.builtin.shell: "zypper ps"
+ ansible.builtin.shell:
+ cmd: "zypper ps"
register: __sap_general_preconfigure_register_needs_restarting
ignore_errors: true
changed_when: false
@@ -84,6 +80,8 @@
ansible.builtin.debug:
var: __sap_general_preconfigure_register_needs_restarting
+
+# sap_general_preconfigure_fact_reboot_required is used by follow up role: sap_hana_preconfigure
- name: Set the reboot requirement flag to false
ansible.builtin.set_fact:
sap_general_preconfigure_fact_reboot_required: false
@@ -91,14 +89,21 @@
- name: For needs-restarting - Set the flag that reboot is needed to apply changes
ansible.builtin.set_fact:
sap_general_preconfigure_fact_reboot_required: true
- when: __sap_general_preconfigure_register_needs_restarting is failed
+ when:
+ - __sap_general_preconfigure_register_needs_restarting is failed
+ or __sap_general_preconfigure_register_update_latest.changed
- name: For needs-restarting - Display the content of sap_general_preconfigure_fact_reboot_required
ansible.builtin.debug:
var: sap_general_preconfigure_fact_reboot_required
+
- name: Call Reboot handler if necessary
- ansible.builtin.command: /bin/true
+ ansible.builtin.command:
+ cmd: /bin/true
notify: __sap_general_preconfigure_reboot_handler
changed_when: true
- when: __sap_general_preconfigure_register_needs_restarting is failed
+ when:
+ - __sap_general_preconfigure_register_needs_restarting is failed
+ or __sap_general_preconfigure_register_needs_restarting.rc == 102
+ or __sap_general_preconfigure_register_update_latest.changed
diff --git a/roles/sap_general_preconfigure/tasks/sapnote/2578899.yml b/roles/sap_general_preconfigure/tasks/sapnote/2578899.yml
new file mode 100644
index 000000000..af6699a16
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/sapnote/2578899.yml
@@ -0,0 +1,28 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+
+- name: Configure - Display SAP note number 2578899 and its version
+ ansible.builtin.debug:
+ msg: "SAP note {{ (__sap_general_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2578899$') | first).number }}
+ (version {{ (__sap_general_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2578899$') | first).version }}):
+ SUSE Linux Enterprise Server 15: Installation Note"
+ tags:
+ - always
+
+- name: Set fact for SAP note number 2578899
+ ansible.builtin.set_fact:
+ __sap_general_preconfigure_services_2578899:
+ - uuidd.socket
+ - sysstat
+ - sysctl-logger.service
+
+ __sap_general_preconfigure_grub_cmdline_2578899: []
+ # I/O Scheduler parameter is already part of default saptune and sapconf configuration.
+ # - "elevator=noop"
+
+- name: Import tasks from '2578899/installation.yml'
+ ansible.builtin.import_tasks: 2578899/installation.yml
+
+- name: Import tasks from '2578899/configuration.yml'
+ ansible.builtin.import_tasks: 2578899/configuration.yml
diff --git a/roles/sap_general_preconfigure/tasks/sapnote/2578899/assert-configuration.yml b/roles/sap_general_preconfigure/tasks/sapnote/2578899/assert-configuration.yml
new file mode 100644
index 000000000..10f2911f0
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/sapnote/2578899/assert-configuration.yml
@@ -0,0 +1,84 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+# ansible_facts.services do not work for socket services!
+# uuidd.socket is not found, while uuidd.service service is.
+- name: Check status of services - Active # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "systemctl is-active {{ item }}"
+ loop: "{{ __sap_general_preconfigure_services_2578899 }}"
+ register: __sap_general_preconfigure_register_services_active
+ changed_when: false
+ ignore_errors: true # Disabled is RC 1
+
+- name: Check status of services - Enabled # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "systemctl is-enabled {{ item }}"
+ loop: "{{ __sap_general_preconfigure_services_2578899 }}"
+ register: __sap_general_preconfigure_register_services_enabled
+ changed_when: false
+ ignore_errors: true # Disabled is RC 1
+
+- name: Assert that services are running and enabled
+ ansible.builtin.assert:
+ that:
+ - __sap_general_preconfigure_register_services_active.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ - __sap_general_preconfigure_register_services_enabled.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Service '{{ item }}' is not running or not enabled!"
+ success_msg: "PASS: Package '{{ item }}' is running and enabled."
+ loop: "{{ __sap_general_preconfigure_services_2578899 }}"
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
+
+
+- name: Verify SAP Note using saptune
+ when: __sap_general_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Verify SAP note 2578899 using saptune
+ ansible.builtin.command:
+ cmd: saptune note verify --show-non-compliant 2578899
+ register: __sap_general_preconfigure_saptune_verify_2578899
+ changed_when: false
+ ignore_errors: true
+
+ - name: Assert that SAP note 2578899 is verified by saptune
+ ansible.builtin.assert:
+ that: "{{ __sap_general_preconfigure_saptune_verify_2578899.rc == 0 }}"
+ success_msg: "PASS: SAP note 2578899 is verified by saptune."
+ fail_msg: |
+ "FAIL: SAP note 2578899 is not verified by saptune! See details below:"
+ {{ __sap_general_preconfigure_saptune_verify_2578899.stdout_lines }}
+ {{ __sap_general_preconfigure_saptune_verify_2578899.stderr_lines }}
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
+
+
+- name: Verify SAP Note without using saptune
+ when: not __sap_general_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Gather kernel parameters
+ ansible.builtin.setup:
+ filter: ansible_kernel
+
+ - name: Assert that kernel parameter pid_max is set to 4194304
+ ansible.builtin.assert:
+ that:
+ - "ansible_kernel.sysctl['kernel.pid_max'] == '4194304'"
+ fail_msg: "FAIL: Kernel parameter kernel.pid_max is not set to 4194304!"
+ success_msg: "PASS: Kernel parameter kernel.pid_max is set to 4194304."
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
+
+ - name: Get current contents of GRUB
+ ansible.builtin.slurp:
+ path: /etc/default/grub
+ register: __sap_general_preconfigure_grub_contents
+
+ - name: Assert that GRUB cmdline parameters are set
+ ansible.builtin.assert:
+ that:
+ - "'{{ item }}' in __sap_general_preconfigure_grub_contents.content | b64decode | string"
+ fail_msg: "FAIL: GRUB cmdline parameter {{ item }} is not set!"
+ success_msg: "PASS: GRUB cmdline parameter {{ item }} is set."
+ loop: "{{ __sap_general_preconfigure_grub_cmdline_2578899 }}"
+ when: __sap_general_preconfigure_grub_cmdline_2578899 | length > 0
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
diff --git a/roles/sap_general_preconfigure/tasks/sapnote/2578899/assert-installation.yml b/roles/sap_general_preconfigure/tasks/sapnote/2578899/assert-installation.yml
new file mode 100644
index 000000000..37fbe90cb
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/sapnote/2578899/assert-installation.yml
@@ -0,0 +1,18 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+- name: Get list of what provides packages # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "rpm -q --whatprovides {{ item }}"
+ register: __sap_general_preconfigure_register_whatprovides
+ changed_when: false
+ loop: "{{ __sap_general_preconfigure_packages_2578899 }}"
+
+- name: Assert that all required packages are installed
+ ansible.builtin.assert:
+ that: item in ansible_facts.packages
+ or __sap_general_preconfigure_register_whatprovides.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Package '{{ item }}' is not installed!"
+ success_msg: "PASS: Package '{{ item }}' is installed."
+ loop: "{{ __sap_general_preconfigure_packages_2578899 }}"
+ ignore_errors: "{{ sap_general_preconfigure_assert_ignore_errors | d(false) }}"
diff --git a/roles/sap_general_preconfigure/tasks/sapnote/2578899/configuration.yml b/roles/sap_general_preconfigure/tasks/sapnote/2578899/configuration.yml
new file mode 100644
index 000000000..c8fea7a86
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/sapnote/2578899/configuration.yml
@@ -0,0 +1,52 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+- name: Ensure that the services are enabled and started
+ ansible.builtin.systemd:
+ name: "{{ item }}"
+ state: started
+ enabled: true
+ loop: "{{ __sap_general_preconfigure_services_2578899 }}"
+
+
+- name: Execute task to update GRUB entries
+ ansible.builtin.include_tasks:
+ file: ../../SLES/generic/grub_update.yml
+ vars:
+ __sap_general_preconfigure_grub_cmdline: "{{ __sap_general_preconfigure_grub_cmdline_2578899 }}"
+ when: __sap_general_preconfigure_grub_cmdline | length > 0
+
+
+- name: Apply SAP note 2578899 using saptune
+ when: __sap_general_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Apply SAP note 2578899 using saptune
+ ansible.builtin.command:
+ cmd: saptune note apply 2578899
+ changed_when: true
+
+ - name: Verify SAP note 2578899 using saptune
+ ansible.builtin.command:
+ cmd: saptune note verify 2578899
+ register: __sap_general_preconfigure_saptune_verify_2578899
+ changed_when: false
+ ignore_errors: true
+
+ - name: Display error if saptune verify failed
+ ansible.builtin.debug:
+ msg: |
+ {{ __sap_general_preconfigure_saptune_verify_2578899.stdout_lines }}
+ {{ __sap_general_preconfigure_saptune_verify_2578899.stderr_lines }}
+ when:
+ __sap_general_preconfigure_saptune_verify_2578899.rc != 0
+
+
+- name: Configuration changes without saptune
+ when: not __sap_general_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Increase kernel.pid_max to 4194304
+ ansible.builtin.command:
+ cmd: sysctl -w kernel.pid_max=4194304
+ changed_when: true
diff --git a/roles/sap_general_preconfigure/tasks/sapnote/2578899/installation.yml b/roles/sap_general_preconfigure/tasks/sapnote/2578899/installation.yml
new file mode 100644
index 000000000..164296bec
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/sapnote/2578899/installation.yml
@@ -0,0 +1,7 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+- name: Ensure that the required packages are installed
+ ansible.builtin.package:
+ name: "{{ __sap_general_preconfigure_packages_2578899 }}"
+ state: present
diff --git a/roles/sap_general_preconfigure/tasks/sapnote/assert-2578899.yml b/roles/sap_general_preconfigure/tasks/sapnote/assert-2578899.yml
new file mode 100644
index 000000000..38242e56c
--- /dev/null
+++ b/roles/sap_general_preconfigure/tasks/sapnote/assert-2578899.yml
@@ -0,0 +1,28 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+
+- name: Assert - Display SAP note number 2578899 and its version
+ ansible.builtin.debug:
+ msg: "SAP note {{ (__sap_general_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2578899$') | first).number }}
+ (version {{ (__sap_general_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2578899$') | first).version }}):
+ SUSE Linux Enterprise Server 15: Installation Note"
+ tags:
+ - always
+
+- name: Set fact for SAP note number 2578899
+ ansible.builtin.set_fact:
+ __sap_general_preconfigure_services_2578899:
+ - uuidd.socket
+ - sysstat
+ - sysctl-logger.service
+
+ __sap_general_preconfigure_grub_cmdline_2578899: []
+ # I/O Scheduler parameter is already part of default saptune and sapconf configuration.
+ # - "elevator=noop"
+
+- name: Import tasks from '2578899/assert-installation.yml'
+ ansible.builtin.import_tasks: 2578899/assert-installation.yml
+
+- name: Import tasks from '2578899/assert-configuration.yml'
+ ansible.builtin.import_tasks: 2578899/assert-configuration.yml
diff --git a/roles/sap_general_preconfigure/vars/SLES_15.yml b/roles/sap_general_preconfigure/vars/SLES_15.yml
new file mode 100644
index 000000000..3dd7e974b
--- /dev/null
+++ b/roles/sap_general_preconfigure/vars/SLES_15.yml
@@ -0,0 +1,30 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server 15
+
+__sap_general_preconfigure_sapnotes_versions:
+ - { number: '2369910', version: '18' }
+
+__sap_general_preconfigure_packages:
+ - uuidd
+ - tcsh
+ - psmisc
+ - nfs-utils
+ - bind-utils
+ - hostname
+
+# Packages specific for SAP Note 2578899
+# Their services are enabled using __sap_general_preconfigure_services_2578899
+__sap_general_preconfigure_packages_2578899:
+ - uuidd
+ - sysstat
+ - sysctl-logger
+
+__sap_general_preconfigure_min_pkgs: []
+__sap_general_preconfigure_packagegroups:
+__sap_general_preconfigure_envgroups:
+__sap_general_preconfigure_kernel_parameters_default: []
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+__sap_general_preconfigure_use_saptune: false
diff --git a/roles/sap_general_preconfigure/vars/SLES_SAP_15.yml b/roles/sap_general_preconfigure/vars/SLES_SAP_15.yml
new file mode 100644
index 000000000..1f2dcb57a
--- /dev/null
+++ b/roles/sap_general_preconfigure/vars/SLES_SAP_15.yml
@@ -0,0 +1,37 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server for SAP Applications 15
+
+__sap_general_preconfigure_sapnotes_versions:
+ # 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+ - { number: '2578899', version: '50' }
+ # 2369910 - SAP Software on Linux: General information
+ - { number: '2369910', version: '18' }
+
+__sap_general_preconfigure_packages:
+ # Mandatory patterns
+ - patterns-server-enterprise-sap_server
+
+ # Recommended packages
+ - tcsh
+ - psmisc
+
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+
+# Packages specific for SAP Note 2578899
+# Their services are enabled using __sap_general_preconfigure_services_2578899
+__sap_general_preconfigure_packages_2578899:
+ - uuidd
+ - sysstat
+ - sysctl-logger
+
+__sap_general_preconfigure_min_pkgs: []
+__sap_general_preconfigure_packagegroups:
+__sap_general_preconfigure_envgroups:
+__sap_general_preconfigure_kernel_parameters_default: []
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+__sap_general_preconfigure_use_saptune: true
diff --git a/roles/sap_general_preconfigure/vars/SLES_SAP_16.yml b/roles/sap_general_preconfigure/vars/SLES_SAP_16.yml
new file mode 100644
index 000000000..9b97b66c7
--- /dev/null
+++ b/roles/sap_general_preconfigure/vars/SLES_SAP_16.yml
@@ -0,0 +1,32 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server for SAP Applications 16
+
+__sap_general_preconfigure_sapnotes_versions: []
+
+__sap_general_preconfigure_packages:
+ # Mandatory patterns
+ - patterns-sap-base_sap_server
+
+ # Recommended packages
+ - tcsh
+ - psmisc
+
+ # 2578899 is not updated for SLES 16 yet.
+ - uuidd
+ - sysstat
+ - sysctl-logger
+
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+
+
+__sap_general_preconfigure_min_pkgs: []
+__sap_general_preconfigure_packagegroups:
+__sap_general_preconfigure_envgroups:
+__sap_general_preconfigure_kernel_parameters_default: []
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+__sap_hana_preconfigure_use_saptune: true
diff --git a/roles/sap_general_preconfigure/vars/Suse.yml b/roles/sap_general_preconfigure/vars/Suse.yml
deleted file mode 100644
index f43013ded..000000000
--- a/roles/sap_general_preconfigure/vars/Suse.yml
+++ /dev/null
@@ -1,23 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-# Variables specific to following versions:
-# - SUSE Linux Enterprise Server for SAP Applications 15
-# - SUSE Linux Enterprise Server 15
-# - SUSE Linux Enterprise Server for SAP Applications 16
-# - SUSE Linux Enterprise Server 16
-
-__sap_general_preconfigure_sapnotes_versions:
- - { number: '2369910', version: '18' }
-
-__sap_general_preconfigure_packages:
- - uuidd
- - tcsh
- - psmisc
- - nfs-utils
- - bind-utils
- - hostname
-
-__sap_general_preconfigure_min_pkgs:
-__sap_general_preconfigure_packagegroups:
-__sap_general_preconfigure_envgroups:
-__sap_general_preconfigure_kernel_parameters_default:
diff --git a/roles/sap_hana_preconfigure/README.md b/roles/sap_hana_preconfigure/README.md
index 52014f2a4..64b4bacdc 100644
--- a/roles/sap_hana_preconfigure/README.md
+++ b/roles/sap_hana_preconfigure/README.md
@@ -203,7 +203,7 @@ Available values:
- _Type:_ `bool`
- _Default:_ `false`
-Check the RHEL release against parameter `sap_hana_preconfigure_supported_rhel_minor_releases`, which is a list of
+(RedHat specific) Check the RHEL release against parameter `sap_hana_preconfigure_supported_rhel_minor_releases`, which is a list of
known SAP HANA supported RHEL minor releases. By default, the role will display a message and continue running if
the RHEL release is not part of that list. If set to `true`, the role will fail in such a case.
@@ -211,13 +211,13 @@ the RHEL release is not part of that list. If set to `true`, the role will fail
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA supported RHEL minor releases.
+(RedHat specific) Use this parameter to set your own list of SAP HANA supported RHEL minor releases.
### sap_hana_preconfigure_enable_sap_hana_repos
- _Type:_ `bool`
- _Default:_ `false`
-Set to 'true' to enable the SAP HANA required RHEL repos.
+(RedHat specific) Set to 'true' to enable the SAP HANA required RHEL repos.
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_use_hana_repos`.
@@ -225,7 +225,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA required RHEL 7 repos on x86_64'
+(RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 7 repos on x86_64'
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
@@ -233,7 +233,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA required RHEL 7 repos on ppc64le'
+(RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 7 repos on ppc64le'
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
@@ -241,7 +241,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA required RHEL 8 repos on x86_64'
+(RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 8 repos on x86_64'
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
@@ -249,7 +249,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA required RHEL 8 repos on ppc64le'
+(RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 8 repos on ppc64le'
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
@@ -257,7 +257,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA required RHEL 9 repos on x86_64'
+(RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 9 repos on x86_64'
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
@@ -265,7 +265,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-Use this parameter to set your own list of SAP HANA required RHEL 9 repos on ppc64le'
+(RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 9 repos on ppc64le'
This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
@@ -273,7 +273,7 @@ The related parameters are `sap_general_preconfigure_enable_repos` and `sap_gene
- _Type:_ `bool`
- _Default:_ `false`
-Use this parameter to set the RHEL minor release, which is required for SAP HANA.
+Use this parameter to set the minor release, which is required for SAP HANA.
The related parameter is `sap_general_preconfigure_set_minor_release`.
### sap_hana_preconfigure_create_directories
@@ -306,7 +306,8 @@ how the variable `sap_hana_preconfigure_create_directories` (see above) is set.<
- _Type:_ `list` with elements of type `str`
- _Default:_ (set by platform/environment specific variables)
-List of RHEL packages to be installed for SAP HANA. For RHEL 8 and later, you can choose to install either the default list
+The list of packages to be installed.
+For RHEL 8 and later, you can choose to install either the default list
or a list of the minimum required packages for SAP HANA server (parameter `__sap_hana_preconfigure_packages_min_install`).
### sap_hana_preconfigure_min_package_check
@@ -323,7 +324,7 @@ Set this parameter to `false` if you want to ignore these requirements.
Set this parameter to `true` to update the system to the latest package levels.
By setting the parameter `sap_general_preconfigure_set_minor_release` of the
role `sap_general_preconfigure` to `true`, you can install the most recent package updates
-without updating to a more recent RHEL minor release.
+without updating to a more recent minor release.
### sap_hana_preconfigure_reboot_ok
- _Type:_ `bool`
@@ -401,7 +402,7 @@ Set this parameter to `false` to use static kernel settings
- _Type:_ `str`
- _Default:_ `'sap-hana'`
-Name of the SAP HANA tuned tuned profile to enable (RHEL).
+(RedHat specific) Name of the SAP HANA tuned tuned profile to enable.
### sap_hana_preconfigure_modify_grub_cmdline_linux
- _Type:_ `bool`
@@ -420,12 +421,12 @@ Set this parameter to `false` if this is not desired.
- _Type:_ `str`
- _Default:_ ``
-Override the default setting for THP, which is determined automatically by the role, depending on the RHEL version.
+Override the default setting for THP, which is determined automatically by the role, depending on the OS version.
### sap_hana_preconfigure_db_group_name
- _Type:_ `str`
-Use this parameter to specify the name of the RHEL group which is used for the database processes.
+(RedHat specific) Use this parameter to specify the name of the RHEL group which is used for the database processes.
It will be used to configure process limits as per step "Configuring Process Resource Limits" of SAP note 2772999.
Example:
diff --git a/roles/sap_hana_preconfigure/defaults/main.yml b/roles/sap_hana_preconfigure/defaults/main.yml
index 393a1b016..c1032241c 100644
--- a/roles/sap_hana_preconfigure/defaults/main.yml
+++ b/roles/sap_hana_preconfigure/defaults/main.yml
@@ -100,7 +100,8 @@ sap_hana_preconfigure_modify_selinux_labels: true
# how the variable `sap_hana_preconfigure_create_directories` (see above) is set.
sap_hana_preconfigure_packages: "{{ __sap_hana_preconfigure_packages }}"
-# List of RHEL packages to be installed for SAP HANA. For RHEL 8 and later, you can choose to install either the default list
+# The list of packages to be installed.
+# For RHEL 8 and later, you can choose to install either the default list
# or a list of the minimum required packages for SAP HANA server (parameter `__sap_hana_preconfigure_packages_min_install`).
sap_hana_preconfigure_min_package_check: true
diff --git a/roles/sap_hana_preconfigure/handlers/main.yml b/roles/sap_hana_preconfigure/handlers/main.yml
index 4f3887f6f..df7ed65a0 100644
--- a/roles/sap_hana_preconfigure/handlers/main.yml
+++ b/roles/sap_hana_preconfigure/handlers/main.yml
@@ -1,6 +1,7 @@
# SPDX-License-Identifier: Apache-2.0
---
+# BEGIN - GRUB section
- name: "Check if server is booted in BIOS or UEFI mode"
ansible.builtin.stat:
path: /sys/firmware/efi
@@ -18,7 +19,8 @@
- sap_hana_preconfigure_run_grub2_mkconfig | d(true)
- name: "Run grub-mkconfig (BIOS mode)"
- ansible.builtin.command: grub2-mkconfig -o /boot/grub2/grub.cfg
+ ansible.builtin.command:
+ cmd: grub2-mkconfig -o /boot/grub2/grub.cfg
register: __sap_hana_preconfigure_register_grub2_mkconfig_bios_mode
changed_when: true
listen: __sap_hana_preconfigure_regenerate_grub2_conf_handler
@@ -51,7 +53,8 @@
- ansible_distribution == 'SLES' or ansible_distribution == 'SLES_SAP'
- name: "Run grub-mkconfig (UEFI mode)"
- ansible.builtin.command: "grub2-mkconfig -o {{ __sap_hana_preconfigure_uefi_boot_dir }}"
+ ansible.builtin.command:
+ cmd: "grub2-mkconfig -o {{ __sap_hana_preconfigure_uefi_boot_dir }}"
register: __sap_hana_preconfigure_register_grub2_mkconfig_uefi_mode
changed_when: true
listen: __sap_hana_preconfigure_regenerate_grub2_conf_handler
@@ -70,17 +73,22 @@
- sap_hana_preconfigure_run_grub2_mkconfig | d(true)
- name: "Run grubby for enabling TSX"
- ansible.builtin.command: grubby --args="tsx=on" --update-kernel=ALL
+ ansible.builtin.command:
+ cmd: grubby --args="tsx=on" --update-kernel=ALL
changed_when: true
listen: __sap_hana_preconfigure_grubby_update_handler
notify: __sap_hana_preconfigure_reboot_handler
- name: "Run grubby for setting THP to '{{ __sap_hana_preconfigure_fact_thp }}'"
- ansible.builtin.command: grubby --args="transparent_hugepage={{ __sap_hana_preconfigure_fact_thp }}" --update-kernel=ALL
+ ansible.builtin.command:
+ cmd: grubby --args="transparent_hugepage={{ __sap_hana_preconfigure_fact_thp }}" --update-kernel=ALL
changed_when: true
listen: __sap_hana_preconfigure_grubby_thp_handler
notify: __sap_hana_preconfigure_reboot_handler
+# END - GRUB section
+
+
- name: Reboot the managed node
ansible.builtin.reboot:
test_command: /bin/true
@@ -88,18 +96,20 @@
when:
- sap_hana_preconfigure_reboot_ok | d(false)
+
# Kernel update triggers zypper purge-kernels and lock after reboot.
- name: Wait for Zypper lock to be released
ansible.builtin.command:
cmd: zypper info zypper
- retries: 60
- timeout: 5
+ retries: 20
+ timeout: 30
listen: __sap_hana_preconfigure_reboot_handler
when:
- ansible_os_family == 'Suse'
- sap_hana_preconfigure_reboot_ok | d(false)
changed_when: false
+
- name: Let the role fail if a reboot is required
ansible.builtin.fail:
msg: Reboot is required!
@@ -115,3 +125,9 @@
when:
- not sap_hana_preconfigure_fail_if_reboot_required | d(true)
- not sap_hana_preconfigure_reboot_ok | d(false)
+
+- name: Unmask packagekit.service
+ ansible.builtin.systemd_service:
+ name: packagekit.service
+ masked: false
+ listen: __sap_hana_preconfigure_packagekit_handler
diff --git a/roles/sap_hana_preconfigure/meta/argument_specs.yml b/roles/sap_hana_preconfigure/meta/argument_specs.yml
index 098aa7db4..a074d52a7 100644
--- a/roles/sap_hana_preconfigure/meta/argument_specs.yml
+++ b/roles/sap_hana_preconfigure/meta/argument_specs.yml
@@ -86,7 +86,7 @@ argument_specs:
sap_hana_preconfigure_min_rhel_release_check:
default: false
description:
- - Check the RHEL release against parameter `sap_hana_preconfigure_supported_rhel_minor_releases`, which is a list of
+ - (RedHat specific) Check the RHEL release against parameter `sap_hana_preconfigure_supported_rhel_minor_releases`, which is a list of
- known SAP HANA supported RHEL minor releases. By default, the role will display a message and continue running if
- the RHEL release is not part of that list. If set to `true`, the role will fail in such a case.
required: false
@@ -95,7 +95,7 @@ argument_specs:
sap_hana_preconfigure_supported_rhel_minor_releases:
default: "{{ __sap_hana_preconfigure_supported_rhel_minor_releases }}"
description:
- - Use this parameter to set your own list of SAP HANA supported RHEL minor releases.
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA supported RHEL minor releases.
required: false
type: list
elements: str
@@ -103,7 +103,7 @@ argument_specs:
sap_hana_preconfigure_enable_sap_hana_repos:
default: false
description:
- - Set to 'true' to enable the SAP HANA required RHEL repos.
+ - (RedHat specific) Set to 'true' to enable the SAP HANA required RHEL repos.
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_use_hana_repos`.
required: false
@@ -112,7 +112,7 @@ argument_specs:
sap_hana_preconfigure_req_repos_redhat_7_x86_64:
default: "{{ __sap_hana_preconfigure_req_repos_redhat_7_x86_64 }}"
description:
- - Use this parameter to set your own list of SAP HANA required RHEL 7 repos on x86_64'
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 7 repos on x86_64'
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
required: false
@@ -122,7 +122,7 @@ argument_specs:
sap_hana_preconfigure_req_repos_redhat_7_ppc64le:
default: "{{ __sap_hana_preconfigure_req_repos_redhat_7_ppc64le }}"
description:
- - Use this parameter to set your own list of SAP HANA required RHEL 7 repos on ppc64le'
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 7 repos on ppc64le'
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
required: false
@@ -132,7 +132,7 @@ argument_specs:
sap_hana_preconfigure_req_repos_redhat_8_x86_64:
default: "{{ __sap_hana_preconfigure_req_repos_redhat_8_x86_64 }}"
description:
- - Use this parameter to set your own list of SAP HANA required RHEL 8 repos on x86_64'
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 8 repos on x86_64'
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
required: false
@@ -142,7 +142,7 @@ argument_specs:
sap_hana_preconfigure_req_repos_redhat_8_ppc64le:
default: "{{ __sap_hana_preconfigure_req_repos_redhat_8_ppc64le }}"
description:
- - Use this parameter to set your own list of SAP HANA required RHEL 8 repos on ppc64le'
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 8 repos on ppc64le'
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
required: false
@@ -152,7 +152,7 @@ argument_specs:
sap_hana_preconfigure_req_repos_redhat_9_x86_64:
default: "{{ __sap_hana_preconfigure_req_repos_redhat_9_x86_64 }}"
description:
- - Use this parameter to set your own list of SAP HANA required RHEL 9 repos on x86_64'
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 9 repos on x86_64'
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
required: false
@@ -162,7 +162,7 @@ argument_specs:
sap_hana_preconfigure_req_repos_redhat_9_ppc64le:
default: "{{ __sap_hana_preconfigure_req_repos_redhat_9_ppc64le }}"
description:
- - Use this parameter to set your own list of SAP HANA required RHEL 9 repos on ppc64le'
+ - (RedHat specific) Use this parameter to set your own list of SAP HANA required RHEL 9 repos on ppc64le'
- This parameter is deprecated because the role sap_general_preconfigure can be used for this purpose.
- The related parameters are `sap_general_preconfigure_enable_repos` and `sap_general_preconfigure_req_repos`.
required: false
@@ -172,7 +172,7 @@ argument_specs:
sap_hana_preconfigure_set_minor_release:
default: false
description:
- - Use this parameter to set the RHEL minor release, which is required for SAP HANA.
+ - Use this parameter to set the minor release, which is required for SAP HANA.
- The related parameter is `sap_general_preconfigure_set_minor_release`.
required: false
type: bool
@@ -210,7 +210,7 @@ argument_specs:
sap_hana_preconfigure_packages:
default: "{{ __sap_hana_preconfigure_packages }}"
description:
- - List of RHEL packages to be installed for SAP HANA. For RHEL 8 and later, you can choose to install either the default list
+ - List of packages to be installed for SAP HANA. For RHEL 8 and later, you can choose to install either the default list
- or a list of the minimum required packages for SAP HANA server (parameter `__sap_hana_preconfigure_packages_min_install`).
required: false
type: list
@@ -230,7 +230,7 @@ argument_specs:
- Set this parameter to `true` to update the system to the latest package levels.
- By setting the parameter `sap_general_preconfigure_set_minor_release` of the
- role `sap_general_preconfigure` to `true`, you can install the most recent package updates
- - without updating to a more recent RHEL minor release.
+ - without updating to a more recent minor release.
required: false
type: bool
@@ -322,7 +322,7 @@ argument_specs:
sap_hana_preconfigure_tuned_profile:
default: 'sap-hana'
description:
- - Name of the SAP HANA tuned tuned profile to enable (RHEL).
+ - (RedHat specific) Name of the SAP HANA tuned tuned profile to enable.
required: false
type: str
@@ -344,7 +344,7 @@ argument_specs:
sap_hana_preconfigure_thp:
default: ''
description:
- - Override the default setting for THP, which is determined automatically by the role, depending on the RHEL version.
+ - Override the default setting for THP, which is determined automatically by the role, depending on the OS version.
choices:
- ''
- 'always'
@@ -355,7 +355,7 @@ argument_specs:
sap_hana_preconfigure_db_group_name:
description:
- - Use this parameter to specify the name of the RHEL group which is used for the database processes.
+ - (RedHat specific) Use this parameter to specify the name of the group which is used for the database processes.
- It will be used to configure process limits as per step "Configuring Process Resource Limits" of SAP note 2772999.
example:
sap_hana_preconfigure_db_group_name: 'dba'
@@ -385,7 +385,7 @@ argument_specs:
sap_hana_preconfigure_saptune_azure:
default: false
description:
- - On Azure, TCP timestamps, reuse and recycle should be disabled (SLES for SAP Applications).
+ - (SUSE specific) On Azure, TCP timestamps, reuse and recycle should be disabled (SLES for SAP Applications).
- Set this parameter to `true` on Azure.
required: false
type: bool
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/assert-configuration.yml b/roles/sap_hana_preconfigure/tasks/SLES/assert-configuration.yml
index b2e96401f..f8f72c340 100644
--- a/roles/sap_hana_preconfigure/tasks/SLES/assert-configuration.yml
+++ b/roles/sap_hana_preconfigure/tasks/SLES/assert-configuration.yml
@@ -1,41 +1,47 @@
# SPDX-License-Identifier: Apache-2.0
---
-- name: Populate service facts
- ansible.builtin.service_facts:
-- name: Assert that saptune is running and enabled
- ansible.builtin.assert:
- that:
- - "ansible_facts.services['saptune.service'].state == 'running'"
- - "ansible_facts.services['saptune.service'].status == 'enabled'"
- fail_msg: "FAIL: the service 'saptune' is not configured as expected"
- success_msg: "PASS: the service 'saptune' is configured as expected"
+- name: Assert that saptune solution is correct
+ when: __sap_hana_preconfigure_use_saptune
+ block:
+ - name: Discover active solution
+ ansible.builtin.command:
+ cmd: saptune solution enabled
+ register: __sap_hana_preconfigure_register_saptune_status
+ changed_when: false
+ ignore_errors: true
-- name: Run saptune_check
- ansible.builtin.command: saptune_check
- register: __sap_hana_preconfigure_register_saptune_check
- changed_when: false
- failed_when: false
+ - name: Set fact for active solution
+ ansible.builtin.set_fact:
+ # Capture the first block on none whitespace
+ __sap_hana_preconfigure_register_solution_configured:
+ "{{ (__sap_hana_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
-- name: Assert that saptune_check executed correctly
- ansible.builtin.assert:
- that: __sap_hana_preconfigure_register_saptune_check.rc == 0
- fail_msg: "FAIL: the command saptune_check fails"
- success_msg: "PASS: the command saptune_check executes as expected"
+ - name: Assert that active solution is the expected solution
+ ansible.builtin.assert:
+ that: __sap_hana_preconfigure_register_solution_configured == sap_hana_preconfigure_saptune_solution
+ fail_msg: "FAIL: the configured saptune solution is '{{ __sap_hana_preconfigure_register_solution_configured
+ }}'' and does not match the expected solution '{{ sap_hana_preconfigure_saptune_solution }}'"
+ success_msg: "PASS: the configured saptune solution matches the expected solution '{{ sap_hana_preconfigure_saptune_solution }}'"
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
-- name: Discover active solution
- ansible.builtin.command: saptune solution enabled
- register: __sap_hana_preconfigure_register_saptune_status
- changed_when: false
+ - name: Verify saptune solution
+ ansible.builtin.command:
+ cmd: "saptune solution verify {{ sap_hana_preconfigure_saptune_solution }}"
+ register: __sap_hana_preconfigure_register_saptune_verify
+ changed_when: false
+ failed_when: false
+ when:
+ - __sap_hana_preconfigure_register_solution_configured == sap_hana_preconfigure_saptune_solution
-- name: Set solution fact
- ansible.builtin.set_fact:
- __sap_hana_preconfigure_saptune_configured_solution:
- "{{ (__sap_hana_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
-- name: Assert that active solution is the expected solution
- ansible.builtin.assert:
- that: __sap_hana_preconfigure_saptune_configured_solution == sap_hana_preconfigure_saptune_solution
- fail_msg: "FAIL: the configured saptune solution is '{{ __sap_hana_preconfigure_saptune_configured_solution
- }}'' and does not match the expected solution '{{ sap_hana_preconfigure_saptune_solution }}'"
- success_msg: "PASS: the configured saptune solution matches the expected solution '{{ sap_hana_preconfigure_saptune_solution }}'"
+ - name: Assert that saptune solution is verified by saptune
+ ansible.builtin.assert:
+ that: "{{ __sap_hana_preconfigure_register_saptune_verify.rc == 0 }}"
+ success_msg: "PASS: saptune solution {{ sap_hana_preconfigure_saptune_solution }} is verified by saptune."
+ fail_msg: |
+ "FAIL: active saptune solution is not verified by saptune! See details below:"
+ {{ __sap_hana_preconfigure_register_saptune_verify.stdout_lines }}
+ {{ __sap_hana_preconfigure_register_saptune_verify.stderr_lines }}
+ when:
+ - __sap_hana_preconfigure_register_solution_configured == sap_hana_preconfigure_saptune_solution
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/assert-installation.yml b/roles/sap_hana_preconfigure/tasks/SLES/assert-installation.yml
index c04f406a5..0afa3f598 100644
--- a/roles/sap_hana_preconfigure/tasks/SLES/assert-installation.yml
+++ b/roles/sap_hana_preconfigure/tasks/SLES/assert-installation.yml
@@ -1,18 +1,68 @@
# SPDX-License-Identifier: Apache-2.0
---
-# Capture all patterns along with their install status
-- name: Get zypper pattern information
- ansible.builtin.command: zypper patterns
- register: __sap_hana_preconfigure_zypper_patterns
+
+- name: Get list of what provides packages # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "rpm -q --whatprovides {{ item }}"
+ register: __sap_hana_preconfigure_register_whatprovides
+ changed_when: false
+ ignore_errors: true
+ loop: "{{ sap_hana_preconfigure_packages }}"
+
+
+- name: Assert that all required packages are installed
+ ansible.builtin.assert:
+ that: item in ansible_facts.packages
+ or __sap_hana_preconfigure_register_whatprovides.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Package '{{ item }}' is not installed!"
+ success_msg: "PASS: Package '{{ item }}' is installed."
+ loop: "{{ sap_hana_preconfigure_packages }}"
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
+
+
+- name: Get info about possible package updates # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: zypper -q patch-check
+ timeout: 120
+ retries: 5
+ register: __sap_hana_preconfigure_register_zypper_check_update_assert
changed_when: false
+ ignore_errors: true # true, because unpatched system is always error.
+ when: sap_hana_preconfigure_update
-# Count the number of times the sap-hana pattern appears to be installed in the output.
-# It is OK for it to appear more than once
-- name: Assert the sap-hana pattern is installed
+- name: Assert that there are no more possible package updates
ansible.builtin.assert:
- that: __sap_hana_preconfigure_zypper_patterns.stdout_lines | select('match', 'i.*sap-hana.*') | length != 0
- fail_msg: "FAIL: the sap-hana pattern is not installed"
- success_msg: "PASS: the sap-hana pattern is installed"
+ that: __sap_hana_preconfigure_register_zypper_check_update_assert.rc == 0
+ fail_msg: "FAIL: System needs to be updated!"
+ success_msg: "PASS: There are no more outstanding package updates."
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
+ when: sap_hana_preconfigure_update
+
+- name: Report if checking for possible package updates is not requested
+ ansible.builtin.debug:
+ msg: "INFO: Not checking for possible package updates (variable sap_hana_preconfigure_update)."
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
+ when: not sap_hana_preconfigure_update
+
+
+# Reason for noqa: The command to be executed might contain pipes
+- name: Determine if the system needs to be restarted # noqa command-instead-of-shell
+ ansible.builtin.shell:
+ cmd: "zypper ps"
+ retries: 60
+ timeout: 5
+ register: __sap_hana_preconfigure_register_needs_restarting_assert
+ changed_when: false
+ check_mode: false
+ ignore_errors: true # true, because output is too large.
+
+- name: Assert that system needs no restart
+ ansible.builtin.assert:
+ that: __sap_hana_preconfigure_register_needs_restarting_assert is success
+ fail_msg: "FAIL: System needs to be restarted!"
+ success_msg: "PASS: System needs no restart."
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
+
- name: Assert saptune is at requested version
ansible.builtin.assert:
@@ -21,5 +71,6 @@
}} but the version {{ sap_hana_preconfigure_saptune_version }} was expected"
success_msg: "PASS: the installed version of saptune meets the expected version: {{ sap_hana_preconfigure_saptune_version }}"
when:
+ - __sap_hana_preconfigure_use_saptune
- sap_hana_preconfigure_saptune_version is defined
- sap_hana_preconfigure_saptune_version | length > 0
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/configuration.yml b/roles/sap_hana_preconfigure/tasks/SLES/configuration.yml
index c58c71598..336e7f573 100644
--- a/roles/sap_hana_preconfigure/tasks/SLES/configuration.yml
+++ b/roles/sap_hana_preconfigure/tasks/SLES/configuration.yml
@@ -1,94 +1,5 @@
# SPDX-License-Identifier: Apache-2.0
---
-- name: Takeover saptune and enable
- when: __sap_hana_preconfigure_run_saptune
- block:
- - name: Ensure sapconf is stopped and disabled
- ansible.builtin.systemd:
- name: sapconf
- state: stopped
- enabled: false
- when: "'sapconf' in ansible_facts.packages"
-
- - name: Make sure that sapconf and tuned are stopped and disabled
- ansible.builtin.command: "saptune service takeover"
- register: __sap_saptune_takeover
- changed_when: __sap_saptune_takeover.rc == 0
-
- - name: Ensure saptune is running and enabled
- ansible.builtin.systemd:
- name: saptune
- state: started
- enabled: true
-
- - name: Ensure saptune_check executes correctly
- ansible.builtin.command: saptune_check
- changed_when: false
-
- - name: Discover active solution
- ansible.builtin.command: saptune solution enabled
- register: __sap_hana_preconfigure_register_saptune_status
- changed_when: false
-
- - name: Set fact for active solution
- ansible.builtin.set_fact:
- # Capture the first block on none whitespace
- __sap_hana_preconfigure_fact_solution_configured:
- "{{ (__sap_hana_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
-
- - name: Show configured solution
- ansible.builtin.debug:
- var: __sap_hana_preconfigure_fact_solution_configured
-
-- name: Set GRUB entries
- when: __sap_hana_preconfigure_run_saptune
- block:
- # Reason for noqa:
- # no-changed-when: the regex do a check on the element before apply the
- # changed item, this prevent a replace to an element that is already in
- # the configuration
- - name: Set GRUB entries # noqa no-changed-when
- ansible.builtin.lineinfile:
- path: /etc/default/grub
- regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=(?!.* {{ item }}).*). *$'
- line: "\\1 {{ item }}\""
- backrefs: true
- register: set_grub_entries
- with_items:
- - "splash=silent"
- - "mitigations=auto"
- - "quiet"
- - "numa_balancing=disable"
- - "transparent_hugepage=never"
- - "intel_idle.max_cstate=1"
- - "processor.max_cstate=1"
- - "audit=1"
-
- # Reason for noqa:
- # no-changed-when: there is already a check on the `when` argument that
- # loop over all the results of the previous task and if some of the results
- # changed the grub configuration file the `GRUB_post-update_configuration`
- # handler will be notify, in the other hands if none of the item changed
- # the configuration file no handler will be notify
- - name: Trigger grub update if necessary # noqa no-changed-when
- ansible.builtin.command: /bin/true
- notify: __sap_hana_preconfigure_regenerate_grub2_conf_handler
- when: set_grub_entries.results | selectattr('changed', 'equalto', true) | list | length > 0
-
-- name: Enable sapconf
- when: not __sap_hana_preconfigure_run_saptune
- block:
- - name: Enable sapconf service
- ansible.builtin.systemd:
- name: sapconf
- state: started
- enabled: true
-
- - name: Restart sapconf service
- ansible.builtin.systemd:
- name: sapconf
- state: restarted
-
# If this is a cluster node on Azure, we need to override to disable tcp timestamps, reuse and recycle.
# This can be done by copying the sapnote file 2382421 from /usr/share/saptune/notes to /etc/saptune/override
# The value can then override in the in the new file
@@ -109,29 +20,61 @@
net.ipv4.tcp_tw_reuse = 0
when:
- sap_hana_preconfigure_saptune_azure
+ - __sap_hana_preconfigure_use_saptune
+
- name: Apply saptune solution
- when: __sap_hana_preconfigure_run_saptune
+ when: __sap_hana_preconfigure_use_saptune
block:
- - name: Check if saptune solution needs to be applied
- ansible.builtin.command: "saptune solution verify {{ sap_hana_preconfigure_saptune_solution }}"
- register: __sap_hana_preconfigure_register_saptune_verify
- changed_when: false # We're only checking, not changing!
- failed_when: false # We expect this to fail if it has not previously been applied
+ - name: Discover active solution
+ ansible.builtin.command:
+ cmd: saptune solution enabled
+ register: __sap_hana_preconfigure_register_saptune_status
+ changed_when: false
+
+ - name: Set fact for active solution
+ ansible.builtin.set_fact:
+ # Capture the first block on none whitespace
+ __sap_hana_preconfigure_register_solution_configured:
+ "{{ (__sap_hana_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
+
- - name: Ensure no solution is currently applied
- ansible.builtin.command: "saptune solution revert {{ __sap_hana_preconfigure_fact_solution_configured }}"
+ - name: Revert solution when different to sap_hana_preconfigure_saptune_solution
+ ansible.builtin.command:
+ cmd: "saptune solution revert {{ __sap_hana_preconfigure_register_solution_configured }}"
changed_when: true
when:
- - __sap_hana_preconfigure_fact_solution_configured != 'NONE'
- - __sap_hana_preconfigure_register_saptune_verify.rc != 0
+ - __sap_hana_preconfigure_register_solution_configured != 'NONE'
+ - __sap_hana_preconfigure_register_solution_configured != sap_hana_preconfigure_saptune_solution
+
+
+ - name: Verify saptune solution
+ ansible.builtin.command:
+ cmd: "saptune solution verify {{ sap_hana_preconfigure_saptune_solution }}"
+ register: __sap_hana_preconfigure_register_saptune_verify
+ changed_when: false
+ failed_when: false
+ when:
+ - __sap_hana_preconfigure_register_solution_configured == sap_hana_preconfigure_saptune_solution
+
- name: Ensure saptune solution is applied
- ansible.builtin.command: "saptune solution apply {{ sap_hana_preconfigure_saptune_solution }}"
+ ansible.builtin.command:
+ cmd: "saptune solution apply {{ sap_hana_preconfigure_saptune_solution }}"
changed_when: true
when:
- - __sap_hana_preconfigure_register_saptune_verify.rc != 0
+ - __sap_hana_preconfigure_register_solution_configured != sap_hana_preconfigure_saptune_solution
+ or __sap_hana_preconfigure_register_saptune_verify.rc != 0
+
- name: Ensure solution was successful
- ansible.builtin.command: "saptune solution verify {{ sap_hana_preconfigure_saptune_solution }}"
- changed_when: false # We're only checking, not changing!
+ ansible.builtin.command:
+ cmd: "saptune solution verify {{ sap_hana_preconfigure_saptune_solution }}"
+ changed_when: false
+
+
+- name: Configure - Include configuration actions for required sapnotes
+ ansible.builtin.include_tasks: "sapnote/{{ sap_note_line_item.number }}.yml"
+ loop: "{{ __sap_hana_preconfigure_sapnotes_versions | difference(['']) }}"
+ loop_control:
+ loop_var: sap_note_line_item
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/generic/grub_update.yml b/roles/sap_hana_preconfigure/tasks/SLES/generic/grub_update.yml
new file mode 100644
index 000000000..db9f67fa6
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/SLES/generic/grub_update.yml
@@ -0,0 +1,39 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+# Generic task for updating GRUB configuration using provided list
+
+- name: Update existing GRUB entries
+ ansible.builtin.lineinfile:
+ path: /etc/default/grub
+ regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=".*?)(\b{{ item.split("=")[0] }}=[^ ]*\b)(.*")'
+ line: '\1{{ item }}\3'
+ backrefs: true
+ register: __sap_hana_preconfigure_grub_update
+ loop: "{{ __sap_hana_preconfigure_grub_cmdline }}"
+
+
+- name: Get current of GRUB
+ ansible.builtin.slurp:
+ path: /etc/default/grub
+ register: __sap_hana_preconfigure_grub_contents
+
+
+- name: Add missing GRUB entries
+ ansible.builtin.lineinfile:
+ path: /etc/default/grub
+ regexp: '^GRUB_CMDLINE_LINUX_DEFAULT="(.*?)"'
+ line: 'GRUB_CMDLINE_LINUX_DEFAULT="\1 {{ item }}"'
+ backrefs: true
+ register: __sap_hana_preconfigure_grub_add
+ loop: "{{ __sap_hana_preconfigure_grub_cmdline }}"
+ when: item not in (__sap_hana_preconfigure_grub_contents.content | b64decode)
+
+
+- name: Trigger grub update if necessary # noqa no-changed-when
+ ansible.builtin.command:
+ cmd: /bin/true
+ notify: __sap_hana_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - (__sap_hana_preconfigure_grub_update.results | selectattr('changed', 'equalto', true) | list | length > 0)
+ or (__sap_hana_preconfigure_grub_add.results | selectattr('changed', 'equalto', true) | list | length > 0)
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/generic/saptune_install.yml b/roles/sap_hana_preconfigure/tasks/SLES/generic/saptune_install.yml
new file mode 100644
index 000000000..09495de02
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/SLES/generic/saptune_install.yml
@@ -0,0 +1,46 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1275776 - Linux: Preparing SLES for SAP environments
+
+- name: Get contents of /etc/products.d/baseproduct
+ ansible.builtin.stat:
+ path: /etc/products.d/baseproduct
+ register: __sap_hana_preconfigure_register_baseproduct
+
+
+- name: Set fact if baseproduct contains SLES without SLES_SAP
+ ansible.builtin.set_fact:
+ __sap_hana_preconfigure_use_saptune: false
+ when:
+ - '"SLES_SAP" not in __sap_hana_preconfigure_register_baseproduct.stat.lnk_target'
+ - '"SLES" in __sap_hana_preconfigure_register_baseproduct.stat.lnk_target
+ and ansible_distribution_major_version | int < 16'
+
+
+- name: Block to ensure saptune is installed
+ when: __sap_hana_preconfigure_use_saptune | d(true)
+ block:
+ - name: Ensure latest saptune is installed
+ ansible.builtin.package:
+ name: saptune
+ state: present
+ when:
+ - sap_hana_preconfigure_saptune_version is undefined
+ or sap_hana_preconfigure_saptune_version | length == 0
+
+ - name: Ensure specific saptune version is installed
+ ansible.builtin.package:
+ name: "saptune={{ sap_hana_preconfigure_saptune_version }}"
+ state: present
+ when:
+ - sap_hana_preconfigure_saptune_version is defined
+ - sap_hana_preconfigure_saptune_version | length > 0
+
+
+- name: Block to ensure sapconf is installed
+ when: not __sap_hana_preconfigure_use_saptune | d(true)
+ block:
+ - name: Ensure sapconf is installed
+ ansible.builtin.package:
+ name: "sapconf"
+ state: present
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/generic/saptune_takeover.yml b/roles/sap_hana_preconfigure/tasks/SLES/generic/saptune_takeover.yml
new file mode 100644
index 000000000..25a328471
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/SLES/generic/saptune_takeover.yml
@@ -0,0 +1,93 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1275776 - Linux: Preparing SLES for SAP environments
+
+- name: Execute saptune_check - before takeover
+ ansible.builtin.command:
+ cmd: saptune_check
+ register: __sap_hana_preconfigure_register_saptune_check_before
+ when: __sap_hana_preconfigure_use_saptune
+ changed_when: false
+ failed_when: false
+
+- name: Takeover and enable saptune
+ when:
+ - __sap_hana_preconfigure_use_saptune
+ - __sap_hana_preconfigure_register_saptune_check_before.rc != 0
+ block:
+ - name: Ensure sapconf is stopped and disabled
+ ansible.builtin.systemd:
+ name: sapconf
+ state: stopped
+ enabled: false
+ when: "'sapconf' in ansible_facts.packages"
+
+ - name: Make sure that sapconf and tuned are stopped and disabled
+ ansible.builtin.command:
+ cmd: "saptune service takeover"
+ register: __sap_hana_preconfigure_register_saptune_takeover
+ changed_when: __sap_hana_preconfigure_register_saptune_takeover.rc == 0
+
+ # saptune_check can fail if sapconf is in failed state
+ - name: Check if sapconf.service is failed # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: systemctl is-failed sapconf.service
+ register: __sap_hana_preconfigure_register_sapconf_failed
+ changed_when: false
+ ignore_errors: true
+
+ - name: Execute systemctl reset-failed sapconf.service # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: systemctl reset-failed sapconf.service
+ when: __sap_hana_preconfigure_register_sapconf_failed.rc == 0
+ changed_when: true
+
+ - name: Ensure saptune is running and enabled
+ ansible.builtin.systemd:
+ name: saptune
+ state: started
+ enabled: true
+
+ - name: Ensure saptune_check executes correctly
+ ansible.builtin.command:
+ cmd: saptune_check
+ register: __sap_hana_preconfigure_register_saptune_check_after
+ changed_when: false
+
+
+- name: Check active saptune solution
+ when:
+ - __sap_hana_preconfigure_use_saptune
+ - __sap_hana_preconfigure_register_saptune_check_before.rc == 0
+ or (__sap_hana_preconfigure_register_saptune_check_after.rc == 0)
+ block:
+ - name: Discover active solution
+ ansible.builtin.command:
+ cmd: saptune solution enabled
+ register: __sap_hana_preconfigure_register_saptune_status
+ changed_when: false
+
+ - name: Set fact for active solution
+ ansible.builtin.set_fact:
+ # Capture the first block on none whitespace
+ __sap_hana_preconfigure_register_solution_configured:
+ "{{ (__sap_hana_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
+
+ - name: Show configured solution
+ ansible.builtin.debug:
+ var: __sap_hana_preconfigure_register_solution_configured
+
+
+- name: Enable sapconf
+ when: not __sap_hana_preconfigure_use_saptune
+ block:
+ - name: Enable sapconf service
+ ansible.builtin.systemd:
+ name: sapconf
+ state: started
+ enabled: true
+
+ - name: Restart sapconf service
+ ansible.builtin.systemd:
+ name: sapconf
+ state: restarted
diff --git a/roles/sap_hana_preconfigure/tasks/SLES/installation.yml b/roles/sap_hana_preconfigure/tasks/SLES/installation.yml
index 270fe3eec..d358844d6 100644
--- a/roles/sap_hana_preconfigure/tasks/SLES/installation.yml
+++ b/roles/sap_hana_preconfigure/tasks/SLES/installation.yml
@@ -1,76 +1,76 @@
# SPDX-License-Identifier: Apache-2.0
---
-# Reason for noqa: Both yum and dnf support "state: latest"
+
+- name: Gather service facts
+ ansible.builtin.service_facts:
+
+# Service packagekit is part of PackageKit-backend-zypp (SLE-Module-Desktop-Applications)
+# This service creates zypper locks and causes package install failures.
+# Service cannot be disabled and we have to mask its execution.
+- name: Mask packagekit.service when present
+ ansible.builtin.systemd_service:
+ name: packagekit.service
+ masked: true
+ when: "'packagekit.service' in ansible_facts.services"
+ notify: __sap_hana_preconfigure_packagekit_handler
+
+
+- name: Wait for stop of packagekit.service
+ ansible.builtin.shell: |
+ set -o pipefail && bash -c '
+ while (ps aux | grep "[z]ypper" | grep -v grep) || (ps aux | grep "/usr/lib/packagekitd" | grep -v grep) ||
+ ([ -f /var/run/zypp.pid ] && [ -s /var/run/zypp.pid ]); do
+ sleep 10;
+ done'
+ register: __packagekit_service_check
+ changed_when: false
+ until: __packagekit_service_check.rc == 0
+ retries: 60
+ when: "'packagekit.service' in ansible_facts.services"
+
+
+- name: Ensure that the required packages are installed
+ ansible.builtin.package:
+ state: present
+ name: "{{ sap_hana_preconfigure_packages }}"
+
+
+# Reason for noqa: Zypper supports "state: latest"
- name: Ensure that the system is updated to the latest patchlevel # noqa package-latest
ansible.builtin.package:
state: latest
name: "*"
when: sap_hana_preconfigure_update | bool
-# SAP Note 2892338
-- name: Ensure package insserv-compat exists
- ansible.builtin.package:
- state: present
- name: insserv-compat
-
-# -----------
-- name: Get contents of /etc/products.d/baseproduct
- ansible.builtin.stat:
- path: /etc/products.d/baseproduct
- register: sles_baseproduct
- when: ansible_os_family == 'Suse'
-- name: Set fact if baseproduct contains SLES without SLES_SAP
- ansible.builtin.set_fact:
- __sap_hana_preconfigure_run_saptune: false
- when:
- - '"SLES_SAP" not in sles_baseproduct.stat.lnk_target'
- - '"SLES" in sles_baseproduct.stat.lnk_target'
- - ansible_os_family == 'Suse'
-
-# - name: Output
-# ansible.builtin.debug:
-# msg:
-# - "OS Family: {{ ansible_os_family }}"
-# - "saptune: {{ __sap_hana_preconfigure_run_saptune }}"
-# - "link: {{ sles_baseproduct.stat.lnk_target }}"
+# 1275776 - Linux: Preparing SLES for SAP environments
+- name: Install saptune if available
+ ansible.builtin.include_tasks:
+ file: generic/saptune_install.yml
-- name: Prepare saptune
- when:
- - __sap_hana_preconfigure_run_saptune
- block:
+- name: Takeover and enable saptune if available
+ ansible.builtin.include_tasks:
+ file: generic/saptune_takeover.yml
- - name: Ensure saphana pattern is installed
- community.general.zypper:
- type: pattern
- name: sap-hana
- state: present
- force: true
- - name: Ensure latest saptune is installed
- community.general.zypper:
- type: package
- name: saptune
- state: present
- when:
- - sap_hana_preconfigure_saptune_version is undefined
- or sap_hana_preconfigure_saptune_version | length == 0
+# Reason for noqa: The command to be executed might contain pipes
+- name: Determine if the system needs to be restarted # noqa command-instead-of-shell
+ ansible.builtin.shell:
+ cmd: "zypper ps"
+ register: __sap_hana_preconfigure_register_needs_restarting
+ ignore_errors: true
+ changed_when: false
+ check_mode: false
- - name: Ensure specific saptune version is installed
- community.general.zypper:
- type: package
- name: "saptune={{ sap_hana_preconfigure_saptune_version }}"
- state: present
- force: true
- when:
- - sap_hana_preconfigure_saptune_version is defined
- - sap_hana_preconfigure_saptune_version | length > 0
+- name: Display the output of the reboot requirement check
+ ansible.builtin.debug:
+ var: __sap_hana_preconfigure_register_needs_restarting
-- name: Ensure sapconf is installed
- community.general.zypper:
- type: package
- name: "sapconf"
- state: present
- force: true
+- name: Call Reboot handler if necessary
+ ansible.builtin.command:
+ cmd: /bin/true
+ notify: __sap_hana_preconfigure_reboot_handler
+ changed_when: true
when:
- - not __sap_hana_preconfigure_run_saptune
+ - __sap_hana_preconfigure_register_needs_restarting is failed
+ or __sap_hana_preconfigure_register_needs_restarting.rc == 102
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/1275776/configuration.yml b/roles/sap_hana_preconfigure/tasks/sapnote/1275776/configuration.yml
deleted file mode 100644
index de00bca37..000000000
--- a/roles/sap_hana_preconfigure/tasks/sapnote/1275776/configuration.yml
+++ /dev/null
@@ -1,33 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-
-# - name: "1275776 - Tips & Advice (start sapconf)"
-# ansible.builtin.service:
-# name: sapconf
-# enabled: true
-# state: started
-
-- name: "1275776 - Configuration saptune"
- ansible.builtin.command: "saptune daemon start"
- register: __sap_hana_preconfigure_register_saptune_daemon
- changed_when: __sap_hana_preconfigure_register_saptune_daemon.rc == 0
-
-- name: "1275776 - Configuration saptune sap note 2382421"
- ansible.builtin.command: "saptune note apply 2382421"
- register: __sap_hana_preconfigure_register_saptune_2382421
- changed_when: __sap_hana_preconfigure_register_saptune_2382421.rc == 0
-
-- name: "1275776 - Configuration saptune sap note 2578899"
- ansible.builtin.command: "saptune note apply 2578899"
- register: __sap_hana_preconfigure_register_saptune_2578899
- changed_when: __sap_hana_preconfigure_register_saptune_2578899.rc == 0
-
-- name: "1275776 - Configuration saptune sap note 2684254"
- ansible.builtin.command: "saptune note apply 2684254"
- register: __sap_hana_preconfigure_register_saptune_2684254
- changed_when: __sap_hana_preconfigure_register_saptune_2684254.rc == 0
-
-- name: "1275776 - Configuration saptune sap note 941735"
- ansible.builtin.command: "saptune note apply 941735"
- register: __sap_hana_preconfigure_register_saptune_941735
- changed_when: __sap_hana_preconfigure_register_saptune_941735.rc == 0
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/1275776/installation.yml b/roles/sap_hana_preconfigure/tasks/sapnote/1275776/installation.yml
deleted file mode 100644
index e4b24f0c9..000000000
--- a/roles/sap_hana_preconfigure/tasks/sapnote/1275776/installation.yml
+++ /dev/null
@@ -1,5 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-- name: 1275776 - Installation saptune
- ansible.builtin.package:
- name: "saptune"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/1944799.yml b/roles/sap_hana_preconfigure/tasks/sapnote/1944799.yml
new file mode 100644
index 000000000..acb8d079f
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/1944799.yml
@@ -0,0 +1,15 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1944799 - SAP HANA Guidelines for SLES Operating System Installation
+
+- name: Configure - Display SAP note number 1944799 and its version
+ ansible.builtin.debug:
+ msg: "SAP note {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^1944799$') | first).number }}
+ (version {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^1944799$') | first).version }}):
+ SAP HANA Guidelines for SLES Operating System Installation"
+
+- name: Import tasks from '1944799/installation.yml'
+ ansible.builtin.import_tasks: 1944799/installation.yml
+
+# - name: Import tasks from '1944799/configuration.yml'
+# ansible.builtin.import_tasks: 1944799/configuration.yml
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/1944799/assert-installation.yml b/roles/sap_hana_preconfigure/tasks/sapnote/1944799/assert-installation.yml
new file mode 100644
index 000000000..174d913b8
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/1944799/assert-installation.yml
@@ -0,0 +1,18 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+- name: Get list of what provides packages # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "rpm -q --whatprovides {{ item }}"
+ register: __sap_hana_preconfigure_register_whatprovides
+ changed_when: false
+ loop: "{{ __sap_hana_preconfigure_packages_1944799 }}"
+
+- name: Assert that all required packages are installed
+ ansible.builtin.assert:
+ that: item in ansible_facts.packages
+ or __sap_hana_preconfigure_register_whatprovides.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Package '{{ item }}' is not installed!"
+ success_msg: "PASS: Package '{{ item }}' is installed."
+ loop: "{{ __sap_hana_preconfigure_packages_1944799 }}"
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/1944799/configuration.yml b/roles/sap_hana_preconfigure/tasks/sapnote/1944799/configuration.yml
deleted file mode 100644
index 51a15ea73..000000000
--- a/roles/sap_hana_preconfigure/tasks/sapnote/1944799/configuration.yml
+++ /dev/null
@@ -1,2 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/1944799/installation.yml b/roles/sap_hana_preconfigure/tasks/sapnote/1944799/installation.yml
index c4d2ba26b..569951658 100644
--- a/roles/sap_hana_preconfigure/tasks/sapnote/1944799/installation.yml
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/1944799/installation.yml
@@ -1,49 +1,8 @@
# SPDX-License-Identifier: Apache-2.0
---
-# base pattern defined in installation pdf
-# sap-hana and sap_server added by SVA (Thomas Bludau)
-# show zypper patterns
-- name: "1944799 - PDF 8.1 Package List Pattern Also 3.5 Software selection"
+- name: Ensure that the required packages are installed
ansible.builtin.package:
- name: "{{ packages }}"
- type: pattern
- vars:
- packages:
- - gnome_basic
- - base
- - enhanced_base
- - apparmor
- - 32bit
- - yast2_basis
- - sw_management
- - fonts
- - x11
- - sap-hana
- - sap_server
-
-# Requires SLE-Module-Legacy15 Module
-- name: "1944799 - PDF 8.1 Package List Packages (SLE-Module-Legacy15)"
- ansible.builtin.package:
- name: "{{ packages }}"
- type: package
- vars:
- packages:
- - libssh2-1
- - libopenssl1_1
- - libstdc++6
- - libatomic1
- - libgcc_s1
- - libltdl7
- - insserv
- - numactl
- - system-user-uuidd
- - unzip
-
-- name: 1944799 - Install recommended packages
- ansible.builtin.package:
- name: "{{ packages }}"
- type: package
- vars:
- packages:
- - tcsh
+ state: present
+ name: "{{ item }}"
+ loop: "{{ __sap_hana_preconfigure_packages_1944799 }}"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2578899/configuration.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2578899/configuration.yml
deleted file mode 100644
index 7ee50bfb0..000000000
--- a/roles/sap_hana_preconfigure/tasks/sapnote/2578899/configuration.yml
+++ /dev/null
@@ -1,32 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-
-- name: 2588899 - I/O scheduler
- ansible.builtin.lineinfile:
- path: /etc/default/grub
- backup: yes
- backrefs: yes
- state: present
- regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=(?!.* {{ line_item }}).*). *$'
- line: "\\1 {{ line_item }}\""
- with_items:
- - "elevator=noop"
- notify: __sap_hana_preconfigure_regenerate_grub2_conf_handler
- when: ansible_architecture == "x86_64" and
- ansible_os_family == 'Suse' and
- ansible_distribution_major_version == '15'
- tags: grubconfig
- loop_control:
- loop_var: line_item
-
-- name: 2578899 - sysstat - monitoring data
- ansible.builtin.service:
- name: sysstat
- enabled: true
- state: started
-
-- name: 2578899 - UUID daemon
- ansible.builtin.service:
- name: uuidd
- enabled: true
- state: started
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2578899/installation.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2578899/installation.yml
deleted file mode 100644
index 76685b377..000000000
--- a/roles/sap_hana_preconfigure/tasks/sapnote/2578899/installation.yml
+++ /dev/null
@@ -1,24 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-# Requires SLE-Module-Legacy15 Module
-- name: "2578899 - SAP HANA database"
- ansible.builtin.package:
- name: "{{ packages }}"
- type: package
- vars:
- packages:
- - libssh2-1
- - libopenssl1_1
-
-
-- name: 2578899 - sysstat - monitoring data
- ansible.builtin.package:
- name: "sysstat"
-
-- name: 2578899 - UUID daemon
- ansible.builtin.package:
- name: "uuidd"
-
-- name: 2578899 - insserv-compat package
- ansible.builtin.package:
- name: "insserv-compat"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2684254.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2684254.yml
new file mode 100644
index 000000000..09d9f8af2
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/2684254.yml
@@ -0,0 +1,33 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 2684254 - SAP HANA DB: Recommended OS settings for SLES 15 / SLES for SAP Applications 15
+
+- name: Configure - Display SAP note number 2684254 and its version
+ ansible.builtin.debug:
+ msg: "SAP note {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2684254$') | first).number }}
+ (version {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2684254$') | first).version }}):
+ SAP HANA DB: Recommended OS settings for SLES 15 / SLES for SAP Applications 15"
+
+- name: Set fact for SAP note number 2684254 - THP
+ ansible.builtin.set_fact:
+ # THP has different settings for each SP
+ __sap_hana_preconfigure_grub_cmdline_2684254_thp:
+ "{{ 'never' if ansible_distribution_version is version('15.4', '<=') else 'madvise' }}"
+
+- name: Set fact for SAP note number 2684254 - GRUB
+ ansible.builtin.set_fact:
+ __sap_hana_preconfigure_grub_cmdline_2684254:
+ - "numa_balancing=disable"
+ - "transparent_hugepage={{ sap_hana_preconfigure_thp | d(__sap_hana_preconfigure_grub_cmdline_2684254_thp) }}"
+ - "intel_idle.max_cstate=1"
+ - "processor.max_cstate=1"
+ - "splash=silent"
+ - "mitigations=auto"
+ - "quiet"
+ - "audit=1"
+
+- name: Import tasks from '2684254/installation.yml'
+ ansible.builtin.import_tasks: 2684254/installation.yml
+
+- name: Import tasks from '2684254/configuration.yml'
+ ansible.builtin.import_tasks: 2684254/configuration.yml
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2684254/assert-configuration.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/assert-configuration.yml
new file mode 100644
index 000000000..b9f8b1b29
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/assert-configuration.yml
@@ -0,0 +1,43 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+- name: Verify SAP Note using saptune
+ when: __sap_hana_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Verify SAP note 2684254 using saptune
+ ansible.builtin.command:
+ cmd: saptune note verify --show-non-compliant 2684254
+ register: __sap_hana_preconfigure_saptune_verify_2684254
+ changed_when: false
+ ignore_errors: true
+
+ - name: Assert that SAP note 2684254 is verified by saptune
+ ansible.builtin.assert:
+ that: "{{ __sap_hana_preconfigure_saptune_verify_2684254.rc == 0 }}"
+ success_msg: "PASS: SAP note 2684254 is verified by saptune."
+ fail_msg: |
+ "FAIL: SAP note 2684254 is not verified by saptune! See details below:"
+ {{ __sap_hana_preconfigure_saptune_verify_2684254.stdout_lines }}
+ {{ __sap_hana_preconfigure_saptune_verify_2684254.stderr_lines }}
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
+
+
+- name: Verify SAP Note without using saptune
+ when: not __sap_hana_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Get current contents of GRUB
+ ansible.builtin.slurp:
+ path: /etc/default/grub
+ register: __sap_hana_preconfigure_grub_contents
+
+ - name: Assert that GRUB cmdline parameters are set
+ ansible.builtin.assert:
+ that:
+ - "'{{ item }}' in __sap_hana_preconfigure_grub_contents.content | b64decode | string"
+ fail_msg: "FAIL: GRUB cmdline parameter {{ item }} is not set!"
+ success_msg: "PASS: GRUB cmdline parameter {{ item }} is set."
+ loop: "{{ __sap_hana_preconfigure_grub_cmdline_2684254 }}"
+ when: __sap_hana_preconfigure_grub_cmdline_2684254 | length > 0
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2684254/assert-installation.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/assert-installation.yml
new file mode 100644
index 000000000..05acd314d
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/assert-installation.yml
@@ -0,0 +1,18 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+- name: Get list of what provides packages # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "rpm -q --whatprovides {{ item }}"
+ register: __sap_hana_preconfigure_register_whatprovides
+ changed_when: false
+ loop: "{{ __sap_hana_preconfigure_packages_2684254 }}"
+
+- name: Assert that all required packages are installed
+ ansible.builtin.assert:
+ that: item in ansible_facts.packages
+ or __sap_hana_preconfigure_register_whatprovides.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Package '{{ item }}' is not installed!"
+ success_msg: "PASS: Package '{{ item }}' is installed."
+ loop: "{{ __sap_hana_preconfigure_packages_2684254 }}"
+ ignore_errors: "{{ sap_hana_preconfigure_assert_ignore_errors | d(false) }}"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2684254/configuration.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/configuration.yml
index ce8da0002..38b44d6a5 100644
--- a/roles/sap_hana_preconfigure/tasks/sapnote/2684254/configuration.yml
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/configuration.yml
@@ -1,80 +1,76 @@
# SPDX-License-Identifier: Apache-2.0
---
-- name: Disable numa_balancing at boot
- ansible.builtin.lineinfile:
- path: /etc/default/grub
- backup: yes
- backrefs: yes
- state: present
- regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=(?!.* {{ line_item }}).*). *$'
- line: "\\1 {{ line_item }}\""
- with_items:
- - "numa_balancing=disable"
- notify: __sap_hana_preconfigure_regenerate_grub2_conf_handler
- when: ansible_architecture == "x86_64" and
- ansible_os_family == 'Suse' and
- ansible_distribution_major_version == '15'
- tags: grubconfig
- loop_control:
- loop_var: line_item
-
-- name: Disable transparent hugepages at boot
- ansible.builtin.lineinfile:
- path: /etc/default/grub
- backup: yes
- backrefs: yes
- state: present
- regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=(?!.* {{ line_item }}).*). *$'
- line: "\\1 {{ line_item }}\""
- with_items:
- - "transparent_hugepage=never"
- notify: __sap_hana_preconfigure_regenerate_grub2_conf_handler
- when: ansible_architecture == "x86_64" and
- ansible_os_family == 'Suse' and
- ansible_distribution_major_version == '15'
- tags: grubconfig
- loop_control:
- loop_var: line_item
-
-- name: Disable intel c states in grub config
- ansible.builtin.lineinfile:
- path: /etc/default/grub
- backup: yes
- backrefs: yes
- state: present
- regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=(?!.* {{ line_item }}).*). *$'
- line: "\\1 {{ line_item }}\""
- with_items:
- - "processor.max_cstate=1"
- - "intel_idle.max_cstate=1"
- notify: __sap_hana_preconfigure_regenerate_grub2_conf_handler
- when: ansible_architecture == "x86_64" and
- ansible_os_family == 'Suse' and
- ansible_distribution_major_version == '15'
- tags: grubconfig
- loop_control:
- loop_var: line_item
-
-
-# Intel Systems only
-# - name: "Configure CPU Governor for Performance now"
-# command: cpupower frequency-set -g performance
-# register: __sap_hana_preconfigure_register_sles15_cpupower_frequency_set
-# ignore_errors: True
-
-- name: "Energy Performance Bias (EPB, applies to Intel-based systems only)"
- ansible.builtin.lineinfile:
- path: /etc/init.d/boot.local
- mode: "0744"
- line: 'cpupower set -b 0'
- state: present
- create: yes
-
-- name: Kernel samepage merging (KSM)
- ansible.builtin.lineinfile:
- dest: /etc/init.d/boot.local
- mode: "0744"
- line: echo 0 > /sys/kernel/mm/ksm/run
- state: present
- create: yes
+- name: Execute task to update GRUB entries
+ ansible.builtin.include_tasks:
+ file: ../../SLES/generic/grub_update.yml
+ vars:
+ __sap_hana_preconfigure_grub_cmdline: "{{ __sap_hana_preconfigure_grub_cmdline_2684254 }}"
+ when: __sap_hana_preconfigure_grub_cmdline | length > 0
+
+
+- name: Apply SAP note 2684254 using saptune
+ when: __sap_hana_preconfigure_use_saptune | d(true)
+ block:
+
+ - name: Apply SAP note 2684254 using saptune
+ ansible.builtin.command:
+ cmd: saptune note apply 2684254
+ changed_when: true
+
+ - name: Verify SAP note 2684254 using saptune
+ ansible.builtin.command:
+ cmd: saptune note verify 2684254
+ register: __sap_hana_preconfigure_saptune_verify_2684254
+ changed_when: false
+ ignore_errors: true
+
+ - name: Display error if saptune verify failed
+ ansible.builtin.debug:
+ msg: |
+ {{ __sap_hana_preconfigure_saptune_verify_2684254.stdout_lines }}
+ {{ __sap_hana_preconfigure_saptune_verify_2684254.stderr_lines }}
+ when:
+ __sap_hana_preconfigure_saptune_verify_2684254.rc != 0
+
+
+- name: Configuration changes without saptune
+ when: not __sap_hana_preconfigure_use_saptune | d(true)
+ block:
+
+ # The KSM feature helps reduce physical memory overhead by detecting memory pages with identical content.
+ # The feature is useful for VMs, but the space-time tradeoff does not pay off for HDB instances not running in VMs.
+ # Kernel samepage merging is usually deactivated by default.
+ - name: Disable Kernel samepage merging (KSM)
+ ansible.builtin.lineinfile:
+ dest: /etc/init.d/boot.local
+ mode: "0744"
+ line: echo 0 > /sys/kernel/mm/ksm/run
+ state: present
+ create: true
+
+
+- name: "(Optional) Set governor to performance - Intel"
+ ansible.builtin.debug:
+ msg: |
+ SAP Recommends setting governor to performance mode on physical Intel servers.
+ This setting is not mandatory for smaller systems, where energy savings are of consideration.
+
+ You can configure it using following methods:
+ - Execute: saptune note apply 2684254
+ - Append command to /etc/init.d/boot.local: cpupower frequency-set -g performance
+
+ Result can be validated by executing: cpupower frequency-info
+
+
+- name: "(Optional) Set Energy Performance Bias to performance - Intel"
+ ansible.builtin.debug:
+ msg: |
+ SAP Recommends setting Energy Performance Bias to performance mode on physical Intel servers.
+ This setting is not mandatory for smaller systems, where energy savings are of consideration.
+
+ You can configure it using following methods:
+ - Execute: saptune note apply 2684254
+ - Append command to /etc/init.d/boot.local: cpupower set -b 0
+
+ Result can be validated by executing: cpupower info
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/2684254/installation.yml b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/installation.yml
index d3de8971b..a0f92caf2 100644
--- a/roles/sap_hana_preconfigure/tasks/sapnote/2684254/installation.yml
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/2684254/installation.yml
@@ -1,10 +1,8 @@
# SPDX-License-Identifier: Apache-2.0
---
-# Additional notes for the installation of HANA 1.0 SPS12 and HANA 2.0 SPS03
-- name: 2777782 - Additional notes for the installation of HANA 1.0 SPS12 and HANA 2.0 SPS03
+
+- name: Ensure that the required packages are installed
ansible.builtin.package:
- name: "{{ packages }}"
- vars:
- packages:
- - libopenssl1_1
- - libssh2-1
+ state: present
+ name: "{{ item }}"
+ loop: "{{ __sap_hana_preconfigure_packages_2684254 }}"
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/assert-1944799.yml b/roles/sap_hana_preconfigure/tasks/sapnote/assert-1944799.yml
new file mode 100644
index 000000000..a4410ca93
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/assert-1944799.yml
@@ -0,0 +1,15 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1944799 - SAP HANA Guidelines for SLES Operating System Installation
+
+- name: Assert - Display SAP note number 1944799 and its version
+ ansible.builtin.debug:
+ msg: "SAP note {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^1944799$') | first).number }}
+ (version {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^1944799$') | first).version }}):
+ SAP HANA Guidelines for SLES Operating System Installation"
+
+- name: Import tasks from '1944799/assert-installation.yml'
+ ansible.builtin.import_tasks: 1944799/assert-installation.yml
+
+# - name: Import tasks from '1944799/assert-configuration.yml'
+# ansible.builtin.import_tasks: 1944799/assert-configuration.yml
diff --git a/roles/sap_hana_preconfigure/tasks/sapnote/assert-2684254.yml b/roles/sap_hana_preconfigure/tasks/sapnote/assert-2684254.yml
new file mode 100644
index 000000000..09188349c
--- /dev/null
+++ b/roles/sap_hana_preconfigure/tasks/sapnote/assert-2684254.yml
@@ -0,0 +1,33 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 2684254 - SAP HANA DB: Recommended OS settings for SLES 15 / SLES for SAP Applications 15
+
+- name: Assert - Display SAP note number 2684254 and its version
+ ansible.builtin.debug:
+ msg: "SAP note {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2684254$') | first).number }}
+ (version {{ (__sap_hana_preconfigure_sapnotes_versions | selectattr('number', 'match', '^2684254$') | first).version }}):
+ SAP HANA DB: Recommended OS settings for SLES 15 / SLES for SAP Applications 15"
+
+- name: Set fact for SAP note number 2684254 - THP
+ ansible.builtin.set_fact:
+ # THP has different settings for each SP
+ __sap_hana_preconfigure_grub_cmdline_2684254_thp:
+ "{{ 'never' if ansible_distribution_version is version('15.4', '<=') else 'madvise' }}"
+
+- name: Set fact for SAP note number 2684254 - GRUB
+ ansible.builtin.set_fact:
+ __sap_hana_preconfigure_grub_cmdline_2684254:
+ - "numa_balancing=disable"
+ - "transparent_hugepage={{ sap_hana_preconfigure_thp | d(__sap_hana_preconfigure_grub_cmdline_2684254_thp) }}"
+ - "intel_idle.max_cstate=1"
+ - "processor.max_cstate=1"
+ - "splash=silent"
+ - "mitigations=auto"
+ - "quiet"
+ - "audit=1"
+
+- name: Import tasks from '2684254/assert-installation.yml'
+ ansible.builtin.import_tasks: 2684254/assert-installation.yml
+
+- name: Import tasks from '2684254/assert-configuration.yml'
+ ansible.builtin.import_tasks: 2684254/assert-configuration.yml
diff --git a/roles/sap_hana_preconfigure/vars/SLES_15.yml b/roles/sap_hana_preconfigure/vars/SLES_15.yml
index 1f98593b5..0bf33eec7 100644
--- a/roles/sap_hana_preconfigure/vars/SLES_15.yml
+++ b/roles/sap_hana_preconfigure/vars/SLES_15.yml
@@ -4,29 +4,93 @@
# - SUSE Linux Enterprise Server for SAP Applications 15
# - SUSE Linux Enterprise Server 15
-__sap_hana_preconfigure_sapnotes:
-# - "{% if ansible_architecture == 'ppc64le' %}2055470{% endif %}"
- - "1944799"
- - "2578899"
- - "1275776"
- - "2684254"
+__sap_hana_preconfigure_sapnotes_versions:
+ # 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+ # Already included in sap_general_preconfigure
+
+ # 1944799 - SAP HANA Guidelines for SLES Operating System Installation
+ - { number: '1944799', version: '19' }
+ # 2684254 - SAP HANA DB: Recommended OS settings for SLES 15 / SLES for SAP Applications 15
+ - { number: '2684254', version: '19' }
+
+ # SAP Notes applicable to HANA saptune solution:
+ # 941735 1771258 1868829 1980196 2578899 2684254 2382421 2534844 2993054 1656250
+
+ # 941735 - SAP memory management system for 64-bit Linux systems
+ # kernel.shmall, kernel.shmmax are already default.
+ # ShmFileSystemSizeMB, VSZ_TMPFS_PERCENT are optional parameters for /dev/shm
+
+ # 1771258 - Linux: User and system resource limits
+ # Limits are created by applying saptune solution or predefined in sapconf.
-__sap_hana_preconfigure_min_pkgs:
__sap_hana_preconfigure_packages:
- # SAP NOTE 2772999
- # SAP NOTE 2292690
- # SAP NOTE 22455582
-#
-# libtool ltdl: https://answers.sap.com/questions/476177/hana-db-installation-ended-with-exit-code-127.html
-# it is required since HANA 2 SPS 03, and as such installed in general
+ # Mandatory patterns
+ - patterns-server-enterprise-sap_server
+
+ # Recommended packages
+ - tcsh
+ - psmisc
+
+ # 3139184 - Linux: systemd integration for sapstartsrv and SAP Host Agent
+ - polkit
-#
-# Intel needs additional packages over x86_64
-#
+ # Recommended for System monitoring
+ - cpupower
+ # - "{{ 'libcpupower0' if ansible_distribution_version.split('.')[1] | int < 6 else 'libcpupower1' }}"
+ - "{{ 'libcpupower0' if ansible_distribution_version is version('15.6', '<') else 'libcpupower1' }}"
+ - libsensors4
-__sap_hana_preconfigure_grub_file: /tmp/grub
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+
+# Packages specific for SAP Note 1944799
+__sap_hana_preconfigure_packages_1944799:
+ - libssh2-1
+ - libopenssl1_1
+ - insserv-compat
+ # Following packages are part of pattern patterns-sap-hana available on SLES_SAP_15
+ - autoyast2-installation
+ - bc
+ - cryptctl
+ - expect
+ - gtk2
+ - insserv-compat
+ - libatomic1
+ - libgcc_s1
+ - libicu
+ - libjpeg62
+ - libpng12-0
+ - libstdc++6
+ - chrony
+ - numactl
+ - sudo
+ - sysstat
+ - tcsh
+ - xfsprogs
+ - xrdp
+ - yast2-ncurses
+
+
+# Following packages are not relevant for SAP Note 1944799
+# patterns-gnome-gnome_basic - SLE-Module-Desktop-Applications15-SP6-Pool
+# patterns-base-enhanced_base - SLE-Module-Basesystem15-SP6-Pool
+# patterns-base-apparmor - SLE-Module-Basesystem15-SP6-Pool
+# patterns-base-32bit - SLE-Module-Basesystem15-SP6-Pool
+# patterns-yast-yast2_basis - SLE-Module-Basesystem15-SP6-Pool
+# patterns-base-sw_management - SLE-Module-Basesystem15-SP6-Pool
+# patterns-fonts-fonts - SLE-Module-Basesystem15-SP6-Pool
+# patterns-base-x11 - SLE-Module-Basesystem15-SP6-Pool
+
+
+# Packages specific for SAP Note 2684254
+__sap_hana_preconfigure_packages_2684254:
+ - libssh2-1
+ - libopenssl1_1
+ - insserv-compat
+
+__sap_hana_preconfigure_min_pkgs:
# SLES_SAP is using saptune, but SLES is using sapconf.
-# Default value true runs saptune, but installation.yml auto-detects base product and adjusts.
-__sap_hana_preconfigure_run_saptune: true
+__sap_hana_preconfigure_use_saptune: false
diff --git a/roles/sap_hana_preconfigure/vars/SLES_SAP_15.yml b/roles/sap_hana_preconfigure/vars/SLES_SAP_15.yml
new file mode 100644
index 000000000..096a081f0
--- /dev/null
+++ b/roles/sap_hana_preconfigure/vars/SLES_SAP_15.yml
@@ -0,0 +1,64 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server for SAP Applications 15
+
+__sap_hana_preconfigure_sapnotes_versions:
+ # 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+ # Already included in sap_general_preconfigure
+
+ # 1944799 - SAP HANA Guidelines for SLES Operating System Installation
+ - { number: '1944799', version: '19' }
+ # 2684254 - SAP HANA DB: Recommended OS settings for SLES 15 / SLES for SAP Applications 15
+ - { number: '2684254', version: '19' }
+
+ # SAP Notes applicable to HANA saptune solution:
+ # 941735 1771258 1868829 1980196 2578899 2684254 2382421 2534844 2993054 1656250
+
+ # 941735 - SAP memory management system for 64-bit Linux systems
+ # kernel.shmall, kernel.shmmax are already default.
+ # ShmFileSystemSizeMB, VSZ_TMPFS_PERCENT are optional parameters for /dev/shm
+
+ # 1771258 - Linux: User and system resource limits
+ # Limits are created by applying saptune solution or predefined in sapconf.
+
+
+__sap_hana_preconfigure_packages:
+ # Mandatory patterns
+ - patterns-server-enterprise-sap_server
+ - patterns-sap-hana
+
+ # Recommended packages
+ - tcsh
+ - psmisc
+
+ # 3139184 - Linux: systemd integration for sapstartsrv and SAP Host Agent
+ - polkit
+
+ # Recommended for System monitoring
+ - cpupower
+ # - "{{ 'libcpupower0' if ansible_distribution_version.split('.')[1] | int < 6 else 'libcpupower1' }}"
+ - "{{ 'libcpupower0' if ansible_distribution_version is version('15.6', '<') else 'libcpupower1' }}"
+ - libsensors4
+
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+
+# Packages specific for SAP Note 1944799
+__sap_hana_preconfigure_packages_1944799:
+ - libssh2-1
+ - libopenssl1_1
+ - insserv-compat
+
+# Packages specific for SAP Note 2684254
+__sap_hana_preconfigure_packages_2684254:
+ - libssh2-1
+ - libopenssl1_1
+ - insserv-compat
+
+
+__sap_hana_preconfigure_min_pkgs:
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+__sap_hana_preconfigure_use_saptune: true
diff --git a/roles/sap_hana_preconfigure/vars/SLES_SAP_16.yml b/roles/sap_hana_preconfigure/vars/SLES_SAP_16.yml
new file mode 100644
index 000000000..b0678a8e6
--- /dev/null
+++ b/roles/sap_hana_preconfigure/vars/SLES_SAP_16.yml
@@ -0,0 +1,36 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server for SAP Applications 16
+
+__sap_hana_preconfigure_sapnotes_versions: []
+
+__sap_hana_preconfigure_min_pkgs:
+
+__sap_hana_preconfigure_packages:
+ # Mandatory patterns
+ - patterns-sap-DB
+
+ # Recommended packages
+ - tcsh
+ - psmisc
+
+ # 2578899 is not updated for SLES 16 yet.
+ - uuidd
+ - sysstat
+ - sysctl-logger
+
+ # 3139184 - Linux: systemd integration for sapstartsrv and SAP Host Agent
+ - polkit
+
+ # Recommended for System monitoring
+ - cpupower
+ - libcpupower1
+ - libsensors4
+
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+__sap_hana_preconfigure_use_saptune: true
diff --git a/roles/sap_netweaver_preconfigure/defaults/main.yml b/roles/sap_netweaver_preconfigure/defaults/main.yml
index a1bea12c0..cda4678cc 100644
--- a/roles/sap_netweaver_preconfigure/defaults/main.yml
+++ b/roles/sap_netweaver_preconfigure/defaults/main.yml
@@ -16,6 +16,24 @@ sap_netweaver_preconfigure_rpath: '/usr/sap/lib'
sap_netweaver_preconfigure_use_adobe_doc_services: false
+sap_netweaver_preconfigure_packages: "{{ __sap_netweaver_preconfigure_packages }}"
+# The list of packages to be installed.
+
+# Set this parameter to `true` to update the system to the latest package levels.
+sap_netweaver_preconfigure_update: false
+
+# Set to `true` if you want to perform a reboot at the end of the role, if necessary.
+sap_netweaver_preconfigure_reboot_ok: false
+
+# If `sap_netweaver_preconfigure_reboot_ok` is set to `false`, which is the default, a reboot requirement should not
+# remain unnoticed. For this reason, we let the role fail. Set this parameter to `false` to override this behavior.
+# Can be useful if you want to implement your own reboot handling.
+sap_netweaver_preconfigure_fail_if_reboot_required: true
+
+# By default, the role will run `grub2-mkconfig` to update the Grub configuration if necessary.
+# Set this parameter to `false` if this is not desired.
+sap_netweaver_preconfigure_run_grub2_mkconfig: true
+
# (SUSE specific) Version of saptune to install.
# It is recommended to install latest version by keeping this variable empty.
# This will replace the current installed version if present, even downgrade if necessary.
diff --git a/roles/sap_netweaver_preconfigure/handlers/main.yml b/roles/sap_netweaver_preconfigure/handlers/main.yml
index 1c3157ad6..cdc2b8462 100644
--- a/roles/sap_netweaver_preconfigure/handlers/main.yml
+++ b/roles/sap_netweaver_preconfigure/handlers/main.yml
@@ -1,3 +1,119 @@
# SPDX-License-Identifier: Apache-2.0
---
-# handlers file for sap_netweaver_preconfigure
+
+# BEGIN - GRUB section
+- name: "Check if server is booted in BIOS or UEFI mode"
+ ansible.builtin.stat:
+ path: /sys/firmware/efi
+ get_checksum: false
+ register: __sap_netweaver_preconfigure_register_stat_sys_firmware_efi
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - sap_netweaver_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: Debug BIOS or UEFI
+ ansible.builtin.debug:
+ var: __sap_netweaver_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - sap_netweaver_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Run grub-mkconfig (BIOS mode)"
+ ansible.builtin.command:
+ cmd: grub2-mkconfig -o /boot/grub2/grub.cfg
+ register: __sap_netweaver_preconfigure_register_grub2_mkconfig_bios_mode
+ changed_when: true
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ notify: __sap_netweaver_preconfigure_reboot_handler
+ when:
+ - not __sap_netweaver_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_netweaver_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Debug grub-mkconfig BIOS mode"
+ ansible.builtin.debug:
+ var: __sap_netweaver_preconfigure_register_grub2_mkconfig_bios_mode.stdout_lines,
+ __sap_netweaver_preconfigure_register_grub2_mkconfig_bios_mode.stderr_lines
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - not __sap_netweaver_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_netweaver_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Set the grub.cfg location RHEL"
+ ansible.builtin.set_fact:
+ __sap_netweaver_preconfigure_uefi_boot_dir: /boot/efi/EFI/redhat/grub.cfg
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - ansible_distribution == 'RedHat'
+
+- name: "Set the grub.cfg location SLES"
+ ansible.builtin.set_fact:
+ __sap_netweaver_preconfigure_uefi_boot_dir: /boot/efi/EFI/BOOT/grub.cfg
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - ansible_distribution == 'SLES' or ansible_distribution == 'SLES_SAP'
+
+- name: "Run grub-mkconfig (UEFI mode)"
+ ansible.builtin.command:
+ cmd: "grub2-mkconfig -o {{ __sap_netweaver_preconfigure_uefi_boot_dir }}"
+ register: __sap_netweaver_preconfigure_register_grub2_mkconfig_uefi_mode
+ changed_when: true
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ notify: __sap_netweaver_preconfigure_reboot_handler
+ when:
+ - __sap_netweaver_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_netweaver_preconfigure_run_grub2_mkconfig | d(true)
+
+- name: "Debug grub-mkconfig UEFI"
+ ansible.builtin.debug:
+ var: __sap_netweaver_preconfigure_register_grub2_mkconfig_uefi_mode.stdout_lines,
+ __sap_netweaver_preconfigure_register_grub2_mkconfig_uefi_mode.stderr_lines
+ listen: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - __sap_netweaver_preconfigure_register_stat_sys_firmware_efi.stat.exists
+ - sap_netweaver_preconfigure_run_grub2_mkconfig | d(true)
+
+# END - GRUB section
+
+
+- name: Reboot the managed node
+ ansible.builtin.reboot:
+ test_command: /bin/true
+ listen: __sap_netweaver_preconfigure_reboot_handler
+ when:
+ - sap_netweaver_preconfigure_reboot_ok | d(false)
+
+
+# Kernel update triggers zypper purge-kernels and lock after reboot.
+- name: Wait for Zypper lock to be released
+ ansible.builtin.command:
+ cmd: zypper info zypper
+ retries: 20
+ timeout: 30
+ listen: __sap_netweaver_preconfigure_reboot_handler
+ when:
+ - ansible_os_family == 'Suse'
+ - sap_netweaver_preconfigure_reboot_ok | d(false)
+ changed_when: false
+
+
+- name: Let the role fail if a reboot is required
+ ansible.builtin.fail:
+ msg: Reboot is required!
+ listen: __sap_netweaver_preconfigure_reboot_handler
+ when:
+ - sap_netweaver_preconfigure_fail_if_reboot_required | d(true)
+ - not sap_netweaver_preconfigure_reboot_ok | d(false)
+
+- name: Show a warning message if a reboot is required
+ ansible.builtin.debug:
+ msg: "WARN: Reboot is required!"
+ listen: __sap_netweaver_preconfigure_reboot_handler
+ when:
+ - not sap_netweaver_preconfigure_fail_if_reboot_required | d(true)
+ - not sap_netweaver_preconfigure_reboot_ok | d(false)
+
+- name: Unmask packagekit.service
+ ansible.builtin.systemd_service:
+ name: packagekit.service
+ masked: false
+ listen: __sap_netweaver_preconfigure_packagekit_handler
diff --git a/roles/sap_netweaver_preconfigure/tasks/RedHat/assert-installation.yml b/roles/sap_netweaver_preconfigure/tasks/RedHat/assert-installation.yml
index 2c1f8eac1..0ab28d0c5 100644
--- a/roles/sap_netweaver_preconfigure/tasks/RedHat/assert-installation.yml
+++ b/roles/sap_netweaver_preconfigure/tasks/RedHat/assert-installation.yml
@@ -7,7 +7,7 @@
fail_msg: "FAIL: Package '{{ line_item }}' is not installed!"
success_msg: "PASS: Package '{{ line_item }}' is installed."
with_items:
- - "{{ __sap_netweaver_preconfigure_packages }}"
+ - "{{ sap_netweaver_preconfigure_packages }}"
loop_control:
loop_var: line_item
ignore_errors: "{{ sap_netweaver_preconfigure_assert_ignore_errors | d(false) }}"
diff --git a/roles/sap_netweaver_preconfigure/tasks/RedHat/installation.yml b/roles/sap_netweaver_preconfigure/tasks/RedHat/installation.yml
index bbd3763b0..3107d1b45 100644
--- a/roles/sap_netweaver_preconfigure/tasks/RedHat/installation.yml
+++ b/roles/sap_netweaver_preconfigure/tasks/RedHat/installation.yml
@@ -4,7 +4,7 @@
- name: Ensure required packages for SAP NetWeaver are installed
ansible.builtin.package:
state: present
- name: "{{ __sap_netweaver_preconfigure_packages }}"
+ name: "{{ sap_netweaver_preconfigure_packages }}"
- name: Ensure required packages for Adobe Document Services are installed, x86_64 only
ansible.builtin.package:
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/assert-configuration.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/assert-configuration.yml
index 8c0ff3c3c..44f5362ee 100644
--- a/roles/sap_netweaver_preconfigure/tasks/SLES/assert-configuration.yml
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/assert-configuration.yml
@@ -1,54 +1,57 @@
# SPDX-License-Identifier: Apache-2.0
---
-- name: Populate service facts
- ansible.builtin.service_facts:
-- name: Assert that saptune is running and enabled
- ansible.builtin.assert:
- that:
- - "ansible_facts.services['saptune.service'].state == 'running'"
- - "ansible_facts.services['saptune.service'].status == 'enabled'"
- fail_msg: "FAIL: the service 'saptune' is not configured as expected"
- success_msg: "PASS: the service 'saptune' is configured as expected"
-
-- name: Run saptune_check
- ansible.builtin.command: saptune_check
- register: __sap_netweaver_preconfigure_register_saptune_check
- changed_when: false
- failed_when: false
-
-- name: Assert that saptune_check executed correctly
- ansible.builtin.assert:
- that: "__sap_netweaver_preconfigure_register_saptune_check.rc == 0"
- fail_msg: "FAIL: the command saptune_check fails"
- success_msg: "PASS: the command saptune_check executes as expected"
-
-- name: Discover active solution
- ansible.builtin.command: saptune solution enabled
- register: __sap_netweaver_preconfigure_register_saptune_status
- changed_when: false
-
-- name: Set solution fact
- ansible.builtin.set_fact:
- __sap_netweaver_preconfigure_saptune_configured_solution: "{{ (__sap_netweaver_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
+- name: Assert that saptune solution is correct
+ when: __sap_netweaver_preconfigure_use_saptune
+ block:
+ - name: Discover active solution
+ ansible.builtin.command:
+ cmd: saptune solution enabled
+ register: __sap_netweaver_preconfigure_register_saptune_status
+ changed_when: false
+ ignore_errors: true
+
+ - name: Set fact for active solution
+ ansible.builtin.set_fact:
+ # Capture the first block on none whitespace
+ __sap_netweaver_preconfigure_register_solution_configured:
+ "{{ (__sap_netweaver_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
+
+ - name: Assert that active solution is the expected solution
+ ansible.builtin.assert:
+ that: __sap_netweaver_preconfigure_register_solution_configured == sap_netweaver_preconfigure_saptune_solution
+ fail_msg: "FAIL: the configured saptune solution is '{{ __sap_netweaver_preconfigure_register_solution_configured
+ }}'' and does not match the expected solution '{{ sap_netweaver_preconfigure_saptune_solution }}'"
+ success_msg: "PASS: the configured saptune solution matches the expected solution '{{ sap_netweaver_preconfigure_saptune_solution }}'"
+ ignore_errors: "{{ sap_netweaver_preconfigure_assert_ignore_errors | d(false) }}"
+
+ - name: Verify saptune solution
+ ansible.builtin.command:
+ cmd: "saptune solution verify {{ sap_netweaver_preconfigure_saptune_solution }}"
+ register: __sap_netweaver_preconfigure_register_saptune_verify
+ changed_when: false
+ failed_when: false
+ when:
+ - __sap_netweaver_preconfigure_register_solution_configured == sap_netweaver_preconfigure_saptune_solution
+
+
+ - name: Assert that saptune solution is verified by saptune
+ ansible.builtin.assert:
+ that: "{{ __sap_netweaver_preconfigure_register_saptune_verify.rc == 0 }}"
+ success_msg: "PASS: saptune solution {{ sap_netweaver_preconfigure_saptune_solution }} is verified by saptune."
+ fail_msg: |
+ "FAIL: active saptune solution is not verified by saptune! See details below:"
+ {{ __sap_netweaver_preconfigure_register_saptune_verify.stdout_lines }}
+ {{ __sap_netweaver_preconfigure_register_saptune_verify.stderr_lines }}
+ when:
+ - __sap_netweaver_preconfigure_register_solution_configured == sap_netweaver_preconfigure_saptune_solution
-- name: Discover active solution
- ansible.builtin.command: saptune solution enabled
- register: __sap_netweaver_preconfigure_register_saptune_status
- changed_when: false
-
-- name: Set fact for active solution
- ansible.builtin.set_fact:
- __sap_netweaver_preconfigure_fact_solution_configured: "{{ (__sap_netweaver_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}" # Capture the first block on none whitespace
-
-- name: Assert that active solution is the expected solution
- ansible.builtin.assert:
- that: __sap_netweaver_preconfigure_fact_solution_configured == sap_netweaver_preconfigure_saptune_solution
- fail_msg: "FAIL: the configured saptune solution is '{{ __sap_netweaver_preconfigure_saptune_configured_solution }}'' and does not match the expected solution '{{ sap_netweaver_preconfigure_saptune_solution }}'"
- success_msg: "PASS: the configured saptune solution matches the expected solution '{{ sap_netweaver_preconfigure_saptune_solution }}'"
- name: Assert that adequate swap is configured
ansible.builtin.assert:
- that: ansible_swaptotal_mb > sap_netweaver_preconfigure_min_swap_space_mb|int
- fail_msg: "FAIL: A minimum of {{ sap_netweaver_preconfigure_min_swap_space_mb }}MiB is required but only {{ ansible_swaptotal_mb }}MiB was discovered"
- success_msg: "PASS: the system has at least {{ sap_netweaver_preconfigure_min_swap_space_mb }}MiB of swap configured"
+ that: ansible_swaptotal_mb > (sap_netweaver_preconfigure_min_swap_space_mb | int)
+ fail_msg: "FAIL: A minimum of {{ sap_netweaver_preconfigure_min_swap_space_mb
+ }}MiB is required but only {{ ansible_swaptotal_mb }}MiB was discovered"
+ success_msg: "PASS: the system has at least {{ sap_netweaver_preconfigure_min_swap_space_mb
+ }}MiB of swap configured"
+ when: sap_netweaver_preconfigure_fail_if_not_enough_swap_space_configured
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/assert-installation.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/assert-installation.yml
index 077317a4b..f6984173b 100644
--- a/roles/sap_netweaver_preconfigure/tasks/SLES/assert-installation.yml
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/assert-installation.yml
@@ -1,20 +1,76 @@
# SPDX-License-Identifier: Apache-2.0
---
-#- name: Enable Debugging
-# debug:
-# verbosity: "{{ debuglevel }}"
-#
-#Capture all patterns along with their install status
-- name: Ensure required packages for SAP NetWeaver are installed
+- name: Get list of what provides packages # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: "rpm -q --whatprovides {{ item }}"
+ register: __sap_netweaver_preconfigure_register_whatprovides
+ changed_when: false
+ ignore_errors: true
+ loop: "{{ sap_netweaver_preconfigure_packages }}"
+
+
+- name: Assert that all required packages are installed
+ ansible.builtin.assert:
+ that: item in ansible_facts.packages
+ or __sap_netweaver_preconfigure_register_whatprovides.results | selectattr('item', 'equalto', item) | map(attribute='rc') | first == 0
+ fail_msg: "FAIL: Package '{{ item }}' is not installed!"
+ success_msg: "PASS: Package '{{ item }}' is installed."
+ loop: "{{ sap_netweaver_preconfigure_packages }}"
+ ignore_errors: "{{ sap_netweaver_preconfigure_assert_ignore_errors | d(false) }}"
+
+
+- name: Get info about possible package updates # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: zypper -q patch-check
+ timeout: 120
+ retries: 5
+ register: __sap_netweaver_preconfigure_register_zypper_check_update_assert
+ changed_when: false
+ ignore_errors: true # true, because unpatched system is always error.
+ when: sap_netweaver_preconfigure_update
+
+- name: Assert that there are no more possible package updates
ansible.builtin.assert:
- that: package in ansible_facts.packages
- loop: "{{ __sap_netweaver_preconfigure_packages }}"
- loop_control:
- loop_var: package
+ that: __sap_netweaver_preconfigure_register_zypper_check_update_assert.rc == 0
+ fail_msg: "FAIL: System needs to be updated!"
+ success_msg: "PASS: There are no more outstanding package updates."
+ ignore_errors: "{{ sap_netweaver_preconfigure_assert_ignore_errors | d(false) }}"
+ when: sap_netweaver_preconfigure_update
+
+- name: Report if checking for possible package updates is not requested
+ ansible.builtin.debug:
+ msg: "INFO: Not checking for possible package updates (variable sap_netweaver_preconfigure_update)."
+ ignore_errors: "{{ sap_netweaver_preconfigure_assert_ignore_errors | d(false) }}"
+ when: not sap_netweaver_preconfigure_update
+
+
+# Reason for noqa: The command to be executed might contain pipes
+- name: Determine if the system needs to be restarted # noqa command-instead-of-shell
+ ansible.builtin.shell:
+ cmd: "zypper ps"
+ retries: 60
+ timeout: 5
+ register: __sap_netweaver_preconfigure_register_needs_restarting_assert
+ changed_when: false
+ check_mode: false
+ ignore_errors: true # true, because output is too large.
+
+- name: Assert that system needs no restart
+ ansible.builtin.assert:
+ that: __sap_netweaver_preconfigure_register_needs_restarting_assert is success
+ fail_msg: "FAIL: System needs to be restarted!"
+ success_msg: "PASS: System needs no restart."
+ ignore_errors: "{{ sap_netweaver_preconfigure_assert_ignore_errors | d(false) }}"
+
- name: Assert saptune is at requested version
ansible.builtin.assert:
that: ansible_facts.packages['saptune'][0]['version'] == sap_netweaver_preconfigure_saptune_version
- fail_msg: "FAIL: saptune version installed is {{ ansible_facts.packages['saptune'][0]['version'] }} but the version {{ sap_netweaver_preconfigure_saptune_version }} was expected"
+ fail_msg: "FAIL: saptune version installed is {{ ansible_facts.packages['saptune'][0]['version']
+ }} but the version {{ sap_netweaver_preconfigure_saptune_version }} was expected"
success_msg: "PASS: the installed version of saptune meets the expected version: {{ sap_netweaver_preconfigure_saptune_version }}"
+ when:
+ - __sap_netweaver_preconfigure_use_saptune
+ - sap_netweaver_preconfigure_saptune_version is defined
+ - sap_netweaver_preconfigure_saptune_version | length > 0
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/configuration.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/configuration.yml
index 5463a1100..5c7bf7ce6 100644
--- a/roles/sap_netweaver_preconfigure/tasks/SLES/configuration.yml
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/configuration.yml
@@ -1,82 +1,61 @@
# SPDX-License-Identifier: Apache-2.0
---
-- name: Takover saptune and enable
- when: __sap_netweaver_preconfigure_run_saptune
- block:
- - name: Ensure sapconf is stopped and disabled
- ansible.builtin.systemd:
- name: sapconf
- state: stopped
- enabled: false
- when: "'sapconf' in ansible_facts.packages"
-
- - name: Make sure that sapconf and tuned are stopped and disabled
- ansible.builtin.command: "saptune service takeover"
- register: __sap_saptune_takeover
- changed_when: __sap_saptune_takeover.rc == 0
-
- - name: Ensure saptune is running and enabled
- ansible.builtin.systemd:
- name: saptune
- state: started
- enabled: true
-
- - name: Ensure saptune_check executes correctly
- ansible.builtin.command: saptune_check
- changed_when: false
+- name: Apply saptune solution
+ when: __sap_netweaver_preconfigure_use_saptune
+ block:
- name: Discover active solution
- ansible.builtin.command: saptune solution enabled
+ ansible.builtin.command:
+ cmd: saptune solution enabled
register: __sap_netweaver_preconfigure_register_saptune_status
changed_when: false
- name: Set fact for active solution
ansible.builtin.set_fact:
# Capture the first block on none whitespace
- __sap_netweaver_preconfigure_fact_solution_configured:
+ __sap_netweaver_preconfigure_register_solution_configured:
"{{ (__sap_netweaver_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
- - name: Check if saptune solution needs to be applied
- ansible.builtin.command: "saptune solution verify {{ sap_netweaver_preconfigure_saptune_solution }}"
- register: __sap_netweaver_preconfigure_register_saptune_verify
- changed_when: false # We're only checking, not changing!
- failed_when: false # We expect this to fail if it has not previously been applied
- - name: Ensure no solution is currently applied
- ansible.builtin.command: "saptune solution revert {{ __sap_netweaver_preconfigure_fact_solution_configured }}"
+ - name: Revert solution when different to sap_netweaver_preconfigure_saptune_solution
+ ansible.builtin.command:
+ cmd: "saptune solution revert {{ __sap_netweaver_preconfigure_register_solution_configured }}"
changed_when: true
when:
- - __sap_netweaver_preconfigure_fact_solution_configured != 'NONE'
- - __sap_netweaver_preconfigure_register_saptune_verify.rc != 0
+ - __sap_netweaver_preconfigure_register_solution_configured != 'NONE'
+ - __sap_netweaver_preconfigure_register_solution_configured != sap_netweaver_preconfigure_saptune_solution
+
+
+ - name: Verify saptune solution
+ ansible.builtin.command:
+ cmd: "saptune solution verify {{ sap_netweaver_preconfigure_saptune_solution }}"
+ register: __sap_netweaver_preconfigure_register_saptune_verify
+ changed_when: false
+ failed_when: false
+ when:
+ - __sap_netweaver_preconfigure_register_solution_configured == sap_netweaver_preconfigure_saptune_solution
+
- name: Ensure saptune solution is applied
- ansible.builtin.command: "saptune solution apply {{ sap_netweaver_preconfigure_saptune_solution }}"
+ ansible.builtin.command:
+ cmd: "saptune solution apply {{ sap_netweaver_preconfigure_saptune_solution }}"
changed_when: true
when:
- - __sap_netweaver_preconfigure_register_saptune_verify.rc != 0
+ - __sap_netweaver_preconfigure_register_solution_configured != sap_netweaver_preconfigure_saptune_solution
+ or __sap_netweaver_preconfigure_register_saptune_verify.rc != 0
- - name: Ensure solution was successful
- ansible.builtin.command: "saptune solution verify {{ sap_netweaver_preconfigure_saptune_solution }}"
- changed_when: false # We're only checking, not changing!
-- name: Enable sapconf
- when: not __sap_netweaver_preconfigure_run_saptune
- block:
- - name: Enable sapconf service
- ansible.builtin.systemd:
- name: sapconf
- state: started
- enabled: true
+ - name: Ensure solution was successful
+ ansible.builtin.command:
+ cmd: "saptune solution verify {{ sap_netweaver_preconfigure_saptune_solution }}"
+ changed_when: false
- - name: Restart sapconf service
- ansible.builtin.systemd:
- name: sapconf
- state: restarted
- name: Warn if not enough swap space is configured
ansible.builtin.fail:
msg: "The system has only {{ ansible_swaptotal_mb }} MB of swap space configured,
- which is less than the minimum required amount of {{ sap_netweaver_preconfigure_min_swap_space_mb }} MB for SAP NetWeaver!"
+ which is less than the minimum required amount of {{ sap_netweaver_preconfigure_min_swap_space_mb
+ }} MB for SAP NetWeaver!"
ignore_errors: true
when:
- ansible_swaptotal_mb < sap_netweaver_preconfigure_min_swap_space_mb|int
@@ -85,7 +64,8 @@
- name: Fail if not enough swap space is configured
ansible.builtin.fail:
msg: "The system has only {{ ansible_swaptotal_mb }} MB of swap space configured,
- which is less than the minimum required amount of {{ sap_netweaver_preconfigure_min_swap_space_mb }} MB for SAP NetWeaver!"
+ which is less than the minimum required amount of {{ sap_netweaver_preconfigure_min_swap_space_mb
+ }} MB for SAP NetWeaver!"
when:
- ansible_swaptotal_mb < sap_netweaver_preconfigure_min_swap_space_mb|int
- sap_netweaver_preconfigure_fail_if_not_enough_swap_space_configured|d(true)
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/generic/grub_update.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/generic/grub_update.yml
new file mode 100644
index 000000000..6ef1aa8f5
--- /dev/null
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/generic/grub_update.yml
@@ -0,0 +1,39 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+
+# Generic task for updating GRUB configuration using provided list
+
+- name: Update existing GRUB entries
+ ansible.builtin.lineinfile:
+ path: /etc/default/grub
+ regexp: '^(GRUB_CMDLINE_LINUX_DEFAULT=".*?)(\b{{ item.split("=")[0] }}=[^ ]*\b)(.*")'
+ line: '\1{{ item }}\3'
+ backrefs: true
+ register: __sap_netweaver_preconfigure_grub_update
+ loop: "{{ __sap_netweaver_preconfigure_grub_cmdline }}"
+
+
+- name: Get current of GRUB
+ ansible.builtin.slurp:
+ path: /etc/default/grub
+ register: __sap_netweaver_preconfigure_grub_contents
+
+
+- name: Add missing GRUB entries
+ ansible.builtin.lineinfile:
+ path: /etc/default/grub
+ regexp: '^GRUB_CMDLINE_LINUX_DEFAULT="(.*?)"'
+ line: 'GRUB_CMDLINE_LINUX_DEFAULT="\1 {{ item }}"'
+ backrefs: true
+ register: __sap_netweaver_preconfigure_grub_add
+ loop: "{{ __sap_netweaver_preconfigure_grub_cmdline }}"
+ when: item not in (__sap_netweaver_preconfigure_grub_contents.content | b64decode)
+
+
+- name: Trigger grub update if necessary # noqa no-changed-when
+ ansible.builtin.command:
+ cmd: /bin/true
+ notify: __sap_netweaver_preconfigure_regenerate_grub2_conf_handler
+ when:
+ - (__sap_netweaver_preconfigure_grub_update.results | selectattr('changed', 'equalto', true) | list | length > 0)
+ or (__sap_netweaver_preconfigure_grub_add.results | selectattr('changed', 'equalto', true) | list | length > 0)
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/generic/saptune_install.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/generic/saptune_install.yml
new file mode 100644
index 000000000..7ba569cc2
--- /dev/null
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/generic/saptune_install.yml
@@ -0,0 +1,46 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1275776 - Linux: Preparing SLES for SAP environments
+
+- name: Get contents of /etc/products.d/baseproduct
+ ansible.builtin.stat:
+ path: /etc/products.d/baseproduct
+ register: __sap_netweaver_preconfigure_register_baseproduct
+
+
+- name: Set fact if baseproduct contains SLES without SLES_SAP
+ ansible.builtin.set_fact:
+ __sap_netweaver_preconfigure_use_saptune: false
+ when:
+ - '"SLES_SAP" not in __sap_netweaver_preconfigure_register_baseproduct.stat.lnk_target'
+ - '"SLES" in __sap_netweaver_preconfigure_register_baseproduct.stat.lnk_target
+ and ansible_distribution_major_version | int < 16'
+
+
+- name: Block to ensure saptune is installed
+ when: __sap_netweaver_preconfigure_use_saptune | d(true)
+ block:
+ - name: Ensure latest saptune is installed
+ ansible.builtin.package:
+ name: saptune
+ state: present
+ when:
+ - sap_netweaver_preconfigure_saptune_version is undefined
+ or sap_netweaver_preconfigure_saptune_version | length == 0
+
+ - name: Ensure specific saptune version is installed
+ ansible.builtin.package:
+ name: "saptune={{ sap_netweaver_preconfigure_saptune_version }}"
+ state: present
+ when:
+ - sap_netweaver_preconfigure_saptune_version is defined
+ - sap_netweaver_preconfigure_saptune_version | length > 0
+
+
+- name: Block to ensure sapconf is installed
+ when: not __sap_netweaver_preconfigure_use_saptune | d(true)
+ block:
+ - name: Ensure sapconf is installed
+ ansible.builtin.package:
+ name: "sapconf"
+ state: present
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/generic/saptune_takeover.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/generic/saptune_takeover.yml
new file mode 100644
index 000000000..0ea0bb115
--- /dev/null
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/generic/saptune_takeover.yml
@@ -0,0 +1,93 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# 1275776 - Linux: Preparing SLES for SAP environments
+
+- name: Execute saptune_check - before takeover
+ ansible.builtin.command:
+ cmd: saptune_check
+ register: __sap_netweaver_preconfigure_register_saptune_check_before
+ when: __sap_netweaver_preconfigure_use_saptune
+ changed_when: false
+ failed_when: false
+
+- name: Takeover and enable saptune
+ when:
+ - __sap_netweaver_preconfigure_use_saptune
+ - __sap_netweaver_preconfigure_register_saptune_check_before.rc != 0
+ block:
+ - name: Ensure sapconf is stopped and disabled
+ ansible.builtin.systemd:
+ name: sapconf
+ state: stopped
+ enabled: false
+ when: "'sapconf' in ansible_facts.packages"
+
+ - name: Make sure that sapconf and tuned are stopped and disabled
+ ansible.builtin.command:
+ cmd: "saptune service takeover"
+ register: __sap_netweaver_preconfigure_register_saptune_takeover
+ changed_when: __sap_netweaver_preconfigure_register_saptune_takeover.rc == 0
+
+ # saptune_check can fail if sapconf is in failed state
+ - name: Check if sapconf.service is failed # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: systemctl is-failed sapconf.service
+ register: __sap_netweaver_preconfigure_register_sapconf_failed
+ changed_when: false
+ ignore_errors: true
+
+ - name: Execute systemctl reset-failed sapconf.service # noqa command-instead-of-module
+ ansible.builtin.command:
+ cmd: systemctl reset-failed sapconf.service
+ when: __sap_netweaver_preconfigure_register_sapconf_failed.rc == 0
+ changed_when: true
+
+ - name: Ensure saptune is running and enabled
+ ansible.builtin.systemd:
+ name: saptune
+ state: started
+ enabled: true
+
+ - name: Ensure saptune_check executes correctly
+ ansible.builtin.command:
+ cmd: saptune_check
+ register: __sap_netweaver_preconfigure_register_saptune_check_after
+ changed_when: false
+
+
+- name: Check active saptune solution
+ when:
+ - __sap_netweaver_preconfigure_use_saptune
+ - __sap_netweaver_preconfigure_register_saptune_check_before.rc == 0
+ or (__sap_netweaver_preconfigure_register_saptune_check_after.rc == 0)
+ block:
+ - name: Discover active solution
+ ansible.builtin.command:
+ cmd: saptune solution enabled
+ register: __sap_netweaver_preconfigure_register_saptune_status
+ changed_when: false
+
+ - name: Set fact for active solution
+ ansible.builtin.set_fact:
+ # Capture the first block on none whitespace
+ __sap_netweaver_preconfigure_register_solution_configured:
+ "{{ (__sap_netweaver_preconfigure_register_saptune_status.stdout | regex_search('(\\S+)', '\\1'))[0] | default('NONE') }}"
+
+ - name: Show configured solution
+ ansible.builtin.debug:
+ var: __sap_netweaver_preconfigure_register_solution_configured
+
+
+- name: Enable sapconf
+ when: not __sap_netweaver_preconfigure_use_saptune
+ block:
+ - name: Enable sapconf service
+ ansible.builtin.systemd:
+ name: sapconf
+ state: started
+ enabled: true
+
+ - name: Restart sapconf service
+ ansible.builtin.systemd:
+ name: sapconf
+ state: restarted
diff --git a/roles/sap_netweaver_preconfigure/tasks/SLES/installation.yml b/roles/sap_netweaver_preconfigure/tasks/SLES/installation.yml
index 72981ca44..49807a05e 100644
--- a/roles/sap_netweaver_preconfigure/tasks/SLES/installation.yml
+++ b/roles/sap_netweaver_preconfigure/tasks/SLES/installation.yml
@@ -1,55 +1,76 @@
# SPDX-License-Identifier: Apache-2.0
---
-- name: Ensure required packages for SAP NetWeaver are installed
+- name: Gather service facts
+ ansible.builtin.service_facts:
+
+# Service packagekit is part of PackageKit-backend-zypp (SLE-Module-Desktop-Applications)
+# This service creates zypper locks and causes package install failures.
+# Service cannot be disabled and we have to mask its execution.
+- name: Mask packagekit.service when present
+ ansible.builtin.systemd_service:
+ name: packagekit.service
+ masked: true
+ when: "'packagekit.service' in ansible_facts.services"
+ notify: __sap_netweaver_preconfigure_packagekit_handler
+
+
+- name: Wait for stop of packagekit.service
+ ansible.builtin.shell: |
+ set -o pipefail && bash -c '
+ while (ps aux | grep "[z]ypper" | grep -v grep) || (ps aux | grep "/usr/lib/packagekitd" | grep -v grep) ||
+ ([ -f /var/run/zypp.pid ] && [ -s /var/run/zypp.pid ]); do
+ sleep 10;
+ done'
+ register: __packagekit_service_check
+ changed_when: false
+ until: __packagekit_service_check.rc == 0
+ retries: 60
+ when: "'packagekit.service' in ansible_facts.services"
+
+
+- name: Ensure that the required packages are installed
ansible.builtin.package:
state: present
- name: "{{ __sap_netweaver_preconfigure_packages }}"
+ name: "{{ sap_netweaver_preconfigure_packages }}"
-- name: Get contents of /etc/products.d/baseproduct
- ansible.builtin.stat:
- path: /etc/products.d/baseproduct
- register: sles_baseproduct
- when: ansible_os_family == 'Suse'
-- name: Setfact if baseproduct contains SLES without SLES_SAP
- ansible.builtin.set_fact:
- __sap_netweaver_preconfigure_run_saptune: false
- when:
- - '"SLES_SAP" not in sles_baseproduct.stat.lnk_target'
- - '"SLES" in sles_baseproduct.stat.lnk_target'
- - ansible_os_family == 'Suse'
+# Reason for noqa: Zypper supports "state: latest"
+- name: Ensure that the system is updated to the latest patchlevel # noqa package-latest
+ ansible.builtin.package:
+ state: latest
+ name: "*"
+ when: sap_netweaver_preconfigure_update | bool
-- name: Prepare saptune
- when:
- - __sap_netweaver_preconfigure_run_saptune
- block:
- - name: Ensure latest saptune is installed
- community.general.zypper:
- type: package
- name: saptune
- state: present
- when:
- - sap_netweaver_preconfigure_saptune_version is undefined
- or sap_netweaver_preconfigure_saptune_version | length == 0
-
- - name: Ensure specific saptune version is installed
- community.general.zypper:
- type: package
- name: "saptune={{ sap_netweaver_preconfigure_saptune_version }}"
- state: present
- force: true
- when:
- - sap_netweaver_preconfigure_saptune_version is defined
- - sap_netweaver_preconfigure_saptune_version | length > 0
-
-
-- name: Ensure sapconf is installed
- community.general.zypper:
- type: package
- name: "sapconf"
- state: present
- force: true
+# 1275776 - Linux: Preparing SLES for SAP environments
+- name: Install saptune if available
+ ansible.builtin.include_tasks:
+ file: generic/saptune_install.yml
+
+- name: Takeover and enable saptune if available
+ ansible.builtin.include_tasks:
+ file: generic/saptune_takeover.yml
+
+
+# Reason for noqa: The command to be executed might contain pipes
+- name: Determine if the system needs to be restarted # noqa command-instead-of-shell
+ ansible.builtin.shell:
+ cmd: "zypper ps"
+ register: __sap_netweaver_preconfigure_register_needs_restarting
+ ignore_errors: true
+ changed_when: false
+ check_mode: false
+
+- name: Display the output of the reboot requirement check
+ ansible.builtin.debug:
+ var: __sap_netweaver_preconfigure_register_needs_restarting
+
+- name: Call Reboot handler if necessary
+ ansible.builtin.command:
+ cmd: /bin/true
+ notify: __sap_netweaver_preconfigure_reboot_handler
+ changed_when: true
when:
- - not __sap_netweaver_preconfigure_run_saptune
+ - __sap_netweaver_preconfigure_register_needs_restarting is failed
+ or __sap_netweaver_preconfigure_register_needs_restarting.rc == 102
diff --git a/roles/sap_netweaver_preconfigure/tasks/sapnote/1275776/configuration.yml b/roles/sap_netweaver_preconfigure/tasks/sapnote/1275776/configuration.yml
deleted file mode 100644
index 14f2b1308..000000000
--- a/roles/sap_netweaver_preconfigure/tasks/sapnote/1275776/configuration.yml
+++ /dev/null
@@ -1,18 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-
-# - name: "1275776 - Tips & Advice (start sapconf)"
-# ansible.builtin.service:
-# name: sapconf
-# enabled: true
-# state: started
-
-- name: "1275776 - Configuration saptune"
- ansible.builtin.command: "saptune daemon start"
- register: __sap_hana_preconfigure_register_saptune_daemon
- changed_when: __sap_hana_preconfigure_register_saptune_daemon.rc == 0
-
-# - name: "1275776 - Configuration saptune sap note 2382421"
-# ansible.builtin.command: "saptune note apply 2382421"
-# register: __sap_hana_preconfigure_register_saptune_2382421
-# changed_when: __sap_hana_preconfigure_register_saptune_2382421.rc == 0
diff --git a/roles/sap_netweaver_preconfigure/tasks/sapnote/1275776/installation.yml b/roles/sap_netweaver_preconfigure/tasks/sapnote/1275776/installation.yml
deleted file mode 100644
index 8e26bee9f..000000000
--- a/roles/sap_netweaver_preconfigure/tasks/sapnote/1275776/installation.yml
+++ /dev/null
@@ -1,6 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-
-- name: 1275776 - Installation saptune
- ansible.builtin.package:
- name: "saptune"
diff --git a/roles/sap_netweaver_preconfigure/vars/SLES_15.6.yml b/roles/sap_netweaver_preconfigure/vars/SLES_15.6.yml
deleted file mode 100644
index 42032de73..000000000
--- a/roles/sap_netweaver_preconfigure/vars/SLES_15.6.yml
+++ /dev/null
@@ -1,43 +0,0 @@
-# SPDX-License-Identifier: Apache-2.0
----
-# Variables specific to following versions:
-# - SUSE Linux Enterprise Server for SAP Applications 15 SP6
-# - SUSE Linux Enterprise Server 15 SP6
-
-__sap_netweaver_preconfigure_sapnotes:
- - "1275776"
-
-__sap_netweaver_preconfigure_packages:
- # Mandatory packages
- - tcsh
- - acl
- - insserv-compat
- - system-user-uuidd
- - uuidd
- # gcc packages
- - libstdc++6
- - libatomic1
- - libgcc_s1
- - libltdl7
- # System monitoring
- - sysstat
- - cpupower
- - libcpupower1
- - libsensors4
- # Patterns
- - patterns-base-basesystem
- - patterns-server-enterprise-sap_server
- - patterns-yast-yast2_basis
- # Additional packages
- - procmail
- # Not needed but kept for compatibility
- - hicolor-icon-theme
- - yast2-auth-client
- - yast2-auth-server
- - yast2-theme
- - yast2-vpn
-
-
-# SLES_SAP is using saptune, but SLES is using sapconf.
-# Default value true runs saptune, but installation.yml auto-detects base product and adjusts.
-__sap_netweaver_preconfigure_run_saptune: true
diff --git a/roles/sap_netweaver_preconfigure/vars/SLES_15.yml b/roles/sap_netweaver_preconfigure/vars/SLES_15.yml
index cc632e33f..d69afdd9a 100644
--- a/roles/sap_netweaver_preconfigure/vars/SLES_15.yml
+++ b/roles/sap_netweaver_preconfigure/vars/SLES_15.yml
@@ -1,42 +1,49 @@
# SPDX-License-Identifier: Apache-2.0
---
# Variables specific to following versions:
-# - SUSE Linux Enterprise Server for SAP Applications 15
# - SUSE Linux Enterprise Server 15
-__sap_netweaver_preconfigure_sapnotes:
- - "1275776"
+__sap_netweaver_preconfigure_sapnotes_versions: []
+ # 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+ # Already included in sap_general_preconfigure
+
+ # SAP Notes applicable to NETWEAVER saptune solution:
+ # 941735 1771258 2578899 2993054 1656250 900929
+
+ # 941735 - SAP memory management system for 64-bit Linux systems
+ # kernel.shmall, kernel.shmmax are already default.
+ # ShmFileSystemSizeMB, VSZ_TMPFS_PERCENT are optional parameters for /dev/shm
+
+ # 1771258 - Linux: User and system resource limits
+ # Limits are created by applying saptune solution or predefined in sapconf.
+
+ # 900929 - Linux: STORAGE_PARAMETERS_WRONG_SET and "mmap() failed"
+ # Parameter vm.max_map_count=2147483647 is already default value.
+
__sap_netweaver_preconfigure_packages:
- # Mandatory packages
+ # Mandatory patterns
+ - patterns-server-enterprise-sap_server
+
+ # Recommended packages
- tcsh
- acl
- - insserv-compat
- - system-user-uuidd
- - uuidd
- # gcc packages
+ - insserv-compat # Support for System V init scripts
- libstdc++6
- libatomic1
- libgcc_s1
- - libltdl7
- # System monitoring
- - sysstat
+
+ # Recommended for System monitoring
- cpupower
- - libcpupower0
+ - "{{ 'libcpupower0' if ansible_distribution_version is version('15.6', '<') else 'libcpupower1' }}"
- libsensors4
- # Patterns
- - patterns-base-basesystem
- - patterns-server-enterprise-sap_server
- - patterns-yast-yast2_basis
+
# Additional packages
+ - nfs-utils
+ - bind-utils
- procmail
- # Not needed but kept for compatibility
- - hicolor-icon-theme
- - yast2-auth-client
- - yast2-auth-server
- - yast2-theme
- - yast2-vpn
+ - libltdl7
+
# SLES_SAP is using saptune, but SLES is using sapconf.
-# Default value true runs saptune, but installation.yml auto-detects base product and adjusts.
-__sap_netweaver_preconfigure_run_saptune: true
+__sap_netweaver_preconfigure_use_saptune: true
diff --git a/roles/sap_netweaver_preconfigure/vars/SLES_SAP_15.yml b/roles/sap_netweaver_preconfigure/vars/SLES_SAP_15.yml
new file mode 100644
index 000000000..013b5854e
--- /dev/null
+++ b/roles/sap_netweaver_preconfigure/vars/SLES_SAP_15.yml
@@ -0,0 +1,50 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server for SAP Applications 15
+
+__sap_netweaver_preconfigure_sapnotes_versions: []
+ # 2578899 - SUSE Linux Enterprise Server 15: Installation Note
+ # Already included in sap_general_preconfigure
+
+ # SAP Notes applicable to NETWEAVER saptune solution:
+ # 941735 1771258 2578899 2993054 1656250 900929
+
+ # 941735 - SAP memory management system for 64-bit Linux systems
+ # kernel.shmall, kernel.shmmax are already default.
+ # ShmFileSystemSizeMB, VSZ_TMPFS_PERCENT are optional parameters for /dev/shm
+
+ # 1771258 - Linux: User and system resource limits
+ # Limits are created by applying saptune solution or predefined in sapconf.
+
+ # 900929 - Linux: STORAGE_PARAMETERS_WRONG_SET and "mmap() failed"
+ # Parameter vm.max_map_count=2147483647 is already default value.
+
+
+__sap_netweaver_preconfigure_packages:
+ # Mandatory patterns
+ - patterns-server-enterprise-sap_server
+ - patterns-sap-nw
+
+ # Recommended packages
+ - tcsh
+ - acl
+ - insserv-compat # Support for System V init scripts
+ - libstdc++6
+ - libatomic1
+ - libgcc_s1
+
+ # Recommended for System monitoring
+ - cpupower
+ - "{{ 'libcpupower0' if ansible_distribution_version is version('15.6', '<') else 'libcpupower1' }}"
+ - libsensors4
+
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+ - procmail
+ - libltdl7
+
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+__sap_netweaver_preconfigure_use_saptune: true
diff --git a/roles/sap_netweaver_preconfigure/vars/SLES_SAP_16.yml b/roles/sap_netweaver_preconfigure/vars/SLES_SAP_16.yml
new file mode 100644
index 000000000..542988519
--- /dev/null
+++ b/roles/sap_netweaver_preconfigure/vars/SLES_SAP_16.yml
@@ -0,0 +1,40 @@
+# SPDX-License-Identifier: Apache-2.0
+---
+# Variables specific to following versions:
+# - SUSE Linux Enterprise Server for SAP Applications 16
+
+__sap_netweaver_preconfigure_sapnotes_versions: []
+
+__sap_netweaver_preconfigure_packages:
+ # Mandatory patterns
+ - patterns-sap-APP
+
+ # Recommended packages
+ - tcsh
+ - psmisc
+ - acl
+ - uuidd
+
+ # 2578899 is not updated for SLES 16 yet.
+ - uuidd
+ - sysstat
+ - sysctl-logger
+
+ # 3139184 - Linux: systemd integration for sapstartsrv and SAP Host Agent
+ - polkit
+
+ # Recommended for System monitoring
+ - cpupower
+ - libcpupower1
+ - libsensors4
+
+ # Additional packages
+ - nfs-utils
+ - bind-utils
+ - procmail
+ - libltdl7
+
+
+# SLES_SAP is using saptune, but SLES is using sapconf.
+# Default value true runs saptune, but installation.yml auto-detects base product and adjusts.
+__sap_netweaver_preconfigure_use_saptune: true