You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
These artefacts are intented to help you provision a SAP S/4HANA Public Cloud edition on AWS and to provision an AWS RDS (SQL Server database) along with our SAP installation.
The testing and GitHub documentation were technically performed by Isaac Arnault, EMEA Managing Director for Data, AI and Analytics at HUBIA (Consulting IT firm for Data, AI, BI and Analytics) in France. This gist is mainly dedicated to HUBIA's Clients' teams and its prospective customers.
Without any further due let's get started.
To deploy SAP S/4HANA on the AWS Cloud using Terraform, you'll need to create several configuration files.
Existing Files
main.tf: This is the primary configuration file where you define your providers, resources, and modules.
variables.tf: This file contains all the variables used in your configuration.
outputs.tf: This file defines the outputs of your Terraform configuration.
providers.tf: This file specifies the providers you will use (e.g., AWS).
ec2.tf: This file defines the EC2 instances for SAP S/4HANA.
security_groups.tf: This file defines the security groups and rules.
Additional Files
rds.tf: This file configures an RDS instance running SQL Server, which will serve as the database for SAP S/4HANA.
userdata.sh: This script runs on the EC2 instance after it’s launched to install and configure SAP S/4HANA and connect it to the SQL Server database.
sap_installation.tf: This file provisions the EC2 instance for SAP S/4HANA and uses the user data script to handle the post-deployment configuration.
Modules Directory
modules/ec2/main.tf: This file defines the EC2 instance resource for SAP S/4HANA, specifying the AMI ID, instance type, key name, and security group IDs.
modules/ec2/variables.tf: This file contains the variables used in the EC2 module configuration.
Author
Isaac Arnault - Suggesting a way to deploy SAP S/4HANA Public Edition on AWS
Host resources that need direct access to the internet, such as NAT Gateway.
Private Subnets:
Host resources that should not be directly accessible from the internet, such as EC2 instances running SAP S/4HANA and the RDS database.
Internet Gateway
Attached to the VPC to provide internet connectivity to instances in public subnets.
NAT Gateway
Placed in a public subnet to allow instances in private subnets to connect to the internet for updates or other needs without exposing them to direct internet access.
Security Groups
SAP S/4HANA Security Group:
Allows traffic on ports needed for SAP application (e.g., SSH (22), HTTP (80)).
SQL Server Security Group:
Allows traffic on port 1433 for SQL Server communication.
EC2 Instances
Deployed in private subnets to run the SAP S/4HANA application.
Configured using a user data script to install and set up SAP S/4HANA.
RDS Instance
Deployed in private subnets with SQL Server engine.
Configured with appropriate security groups to allow communication with SAP S/4HANA EC2 instances.
Key Pair
Used to SSH into the EC2 instances for management and configuration.
IAM Roles and Policies
Applied to EC2 instances and other resources to manage permissions and access control.
AWS Solution Architecture Diagram
To visually represent the architecture, here is a textual description that can be used to create an architecture diagram:
VPC with a CIDR block, divided into multiple subnets.
Public Subnets containing:
NAT Gateway connected to the Internet Gateway.
Private Subnets containing:
EC2 Instances for SAP S/4HANA.
RDS Instance for SQL Server.
Security Groups attached to the respective instances and RDS:
SAP S/4HANA Security Group allowing traffic on necessary ports.
SQL Server Security Group allowing traffic on port 1433.
Here is a summary of the steps to set up and deploy SAP S/4HANA on AWS using the provided Terraform configuration files, including connecting it to a SQL Server database:
Step-by-Step Installation Guide
Step 1. Prepare Your Environment
Install Terraform: Ensure Terraform is installed on your machine. You can download it from the official Terraform website.
AWS CLI Configuration: Configure the AWS CLI with your credentials.
bash$ aws configure
Step 2. Clone the GitHub Repository
Create a GitHub repository and clone it to your local machine.
bash$ git clone <your-repo-url> $ cd <your-repo-directory>
Step 3. Create the Terraform Configuration Files
main.tf: Define the main infrastructure, including providers and VPC setup.
variable "aws_region" {
description = "The AWS region to deploy resources."
default = "us-west-2"
}
variable "ami_id" {
description = "The AMI ID for the EC2 instances."
default = "ami-0abcdef1234567890"
}
variable "instance_type" {
description = "The instance type for the EC2 instances."
default = "r5.large"
}
variable "key_name" {
description = "The key name for SSH access."
default = "my-key"
}
variable "db_username" {
description = "The username for the SQL Server database."
default = "admin"
}
variable "db_password" {
description = "The password for the SQL Server database."
default = "ChangeMe123!"
}
outputs.tf
Define outputs of the Terraform configuration.
hcl
output "vpc_id" {
value = module.vpc.vpc_id
}
output "public_subnets" {
value = module.vpc.public_subnets
}
output "private_subnets" {
value = module.vpc.private_subnets
}
output "ec2_instance_id" {
value = module.ec2.instance_id
}
providers.tf
Specify the providers you will use.
```
provider "aws" {
region = var.aws_region
}
```
Contains the variables used in the EC2 module configuration.
hcl
variable "vpc_id" {
description = "The VPC ID where the instance will be deployed."
}
variable "subnets" {
description = "The subnets where the instance will be deployed."
}
variable "ami_id" {
description = "The AMI ID for the instance."
}
variable "instance_type" {
description = "The instance type for the instance."
}
variable "key_name" {
description = "The key name for SSH access."
}
variable "security_group_ids" {
description = "The security group IDs for the instance."
}
Step 5. Initialize and Apply the Configuration****
Initialize Terraform: Run terraform init to initialize the configuration.
bash$ terraform init
Plan the Deployment: Run terraform plan to see the execution plan.
bash$ terraform plan
Apply the Configuration: Run terraform apply to apply the configuration and deploy the infrastructure.
`bash`
`$ terraform apply`
Step 6. Post-Deployment****
Verify Deployment: After the Terraform configuration is applied, verify that the EC2 instance for SAP S/4HANA is running and the RDS instance is available.
Check User Data Script: Ensure the user data script (userdata.sh) has run successfully on the EC2 instance and that SAP S/4HANA is installed and configured properly.
Directory structureyaml
terraform-sap-s4hana<br>
├── main.tf: Primary configuration file for providers, resources, and modules.<br>
├── variables.tf: Variables used in the configuration.<br>
├── outputs.tf: Outputs of the Terraform configuration.<br>
├── providers.tf: Specifies the providers used (e.g., AWS).<br>
├── ec2.tf: Defines the EC2 instances for SAP S/4HANA.<br>
├── security_groups.tf: Defines the security groups and rules.<br>
├── rds.tf: Configures an RDS instance running SQL Server for the SAP S/4HANA database.<br>
├── userdata.sh: Script to install and configure SAP S/4HANA and connect it to SQL Server.<br>
├── sap_installation.tf: Provisions the EC2 instance for SAP S/4HANA and runs the user data script.<br>
└── modules<br>
└── ec2<br>
├── main.tf: Defines the EC2 instance resource for SAP S/4HANA.<br>
└── variables.tf: Variables used in the EC2 module configuration.
```
<p>By following these steps, you will have a comprehensive setup for deploying SAP S/4HANA on AWS, including post-deployment configuration to connect it to a SQL Server database. <br>Adjust the userdata.sh script and other configurations based on your specific requirements and environment.</p>
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters