Introduction

Purpose

The purpose of this document is to outline the infrastructure and network architecture for SyWay project.

Scope

This document describes the high-level infrastructure and network design for SAP RISE and non-RISE deployments. It also covers the network design for specialized integration scenarios and deployment in China region.

Out of scope:

Assumptions

Overview

SyWay systems can be classified into 3 hosting models:

Hosting model

Description

SAP RISE1

S/4HANA and SAP applications that are hosted in SAP RISE cloud tenants and managed by SAP.

Non-RISE

On-premise applications that cannot be hosted in SAP RISE and are hosted in Azure tenants managed by Syensqo IT.

SaaS

Applications that follow the SaaS model and are access from the internet

1See KDD026 - SAP S/4HANA Deployment Model for the comparison between various deployment options for S/4HANA and the decision.

In addition to the different hosting models, SyWay systems can be deployed to 1 or more regions (North America, Europe and China). The figure below describes how SyWay systems are deployed across Syensqo’s network.

Infrastructure Architecture

SAP RISE

Overview

S/4HANA is hosted in SAP RISE along with supporting connectors and web dispatchers. SyWay project would leverage a common Sandbox, Development landscape that are deployed in Europe region and individual Integration Testing, Training, UAT, Parallel Testing and Production systems that are deployed to all three regions.

The table below lists the landscape, systems and the corresponding system ID (SID) for the three different regions.

Region

Landscape

Systems

S/4HANA (HANA DB)

Web Dispatcher

SAP Cloud connector

SAP Data Provisioning Agent

SAC Agent

OpenText Connector

Europe

Sandbox

ERS (HRS)

WRS

N/A

N/A

N/A

N/A

Development

ERD (HRD)

WRD

CRD1

DRD1

SRD1

ORD1

Integration Testing

ERT (HRT)

WRT

N/A

N/A

N/A

N/A

Training

ER2 (HR2)

WR2

N/A

N/A

N/A

N/A

UAT

ERQ (HRQ)

WRQ

N/A

N/A

N/A

N/A

Parallel Testing

ER1 (HR1)

WR1

N/A

N/A

N/A

N/A

Production

ERP (HRP)

WRP & WRH

CRP

DRP

SRP

ORP



North America

Integration Testing

EXT (HXT)

WXT

CXD1

DXD1

SXD1

TBC1

Training

EX2 (HX2)

WX2

N/A

N/A

N/A

N/A

UAT

EXQ (HXQ)

WXQ

N/A

N/A

N/A

N/A

Parallel Testing

EX1 (HX1)

WX1

N/A

N/A

N/A

N/A

Production

EXP (HXP)

WXP

CXP

DXP

SXP

TBC



China

Integration Testing

ECT (HCT)

WCT

CCD1

DCD1

SCD1

OCD1

Training

EC2 (HC2)

WC2

N/A

N/A

N/A

N/A

UAT

ECQ (HCQ)

WCQ

N/A

N/A

N/A

N/A

Parallel Testing

EC1 (HC1)

WC1

N/A

N/A

N/A

N/A

Production

ECP (HCP)

WCP

CCP

DCP

SCP

OCP

 1System shared across all non-PRD systems

Landscape Provisioning

The following diagrams illustrates the different RISE landscapes that are provision for the different phases. Post Go-Live, INT and PAR landscapes will be decommissioned and a 5 tier landscape will be maintained.

Europe

High Availability and Disaster Recovery

The table below summaries the SLA for HA and DR for production and non-production systems

LandscapeAvailability SLARPORTO
Production99.9%0Contractually-guaranteed: 12 hours
Achievable: ~10 minutes
Non-Production98%N/AN/A

S/4HANA

In SAP RISE, High Availability (HA) and Disaster Recovery (DR) is applicable to Production instances. For SyWay project, S/4HANA Production is provisioned with the following RISE add-ons.

With these add-ons, S/4HANA production is deployed across 2 availability zones with synchronous database replication and automated fail-over via pacemaker clusters as shown below.

The table below describes how HA is achieved for the different components.

ComponentHA Design
Web DispatcherDeployed to both AZs in active-active configuration and Azure load balancer is used to distribute incoming HTTP traffic to both instances.
S/4HANA Application serversTwo application servers are deployed to each AZs in an active-active configuration.
S/4HANA Message server (SCS & ERS)Pacemaker cluster is configured between SCS and ERS servers to ensure SCS & ERS services fails over accordingly in the event of a failure.
SAPMNT Shared folderNetApp files is used to host the SAPMNT shared folder and is mounted across all S/4HANA application, SCS and ERS servers.
HANA DBTwo HANA nodes are deployed across 2 AZs in an active-standby configuration. HANA synchronous replication is configured to replicate data from the active to standby node. Pacemaker cluster is configured to ensure that the standby node is promoted to active node in the event of a failure.

SAP Connectors

Two instances of SAP Cloud connectors are deployed across 2 AZs and configured as active-standby nodes. In the event of a failure, the standby node will take over as active node

Further clarification is required from SAP RISE team post system build regarding HA for the following components.

SAP RISE VM Details

RegionAzure RegionSIDPurposePhysical HostnameVirtual HostnameCPUMemory/GBOS
EuropeNorth Europe (Dublin)ERDApp Serverhec42v303048.irl.sap.eu.cloud.syensqo.com (172.16.33.48)

vhysqerdci.sap.eu.cloud.syensqo.com (172.16.33.49)

vhysqerdcs.sap.eu.cloud.syensqo.com (172.16.33.50)

832SUSE SLES15
HRDHANA DB

hec42v302672.irl.sap.eu.cloud.syensqo.com (172.16.33.37)

 vhysqerddb.sap.eu.cloud.syensqo.com (172.16.33.51)

vhysqhrddb01.sap.eu.cloud.syensqo.com (172.16.33.42)

vhysqhrddb.sap.eu.cloud.syensqo.com (172.16.33.43)

32256SUSE SLES15
WRDWeb Dispatcher

hec42v302675.irl.sap.eu.cloud.syensqo.com (172.16.33.40)

vhysqwrdwd01.sap.eu.cloud.syensqo.com (172.16.33.44)

28SUSE SLES15
CRDCloud Connector

hec42v302678.irl.sap.eu.cloud.syensqo.com (172.16.33.45)

vhysqcrdcc01.sap.eu.cloud.syensqo.com (172.16.33.46)

28SUSE SLES15
DRDData Provisioning Agent

hec42v302676.irl.sap.eu.cloud.syensqo.com (172.16.33.41)

vhysqdrddpa01.irl.sap.eu.cloud.syensqo.com (172.16.33.47)

416SUSE SLES15
SRDSAC Agent hec42v302674.irl.sap.eu.cloud.syensqo.com (172.16.33.39)

vhysqsrdweb01.irl.sap.eu.cloud.syensqo.com (172.16.33.38)

416SUSE SLES15

Non-RISE

Systems that follow an IaaS or on-premises deployment model and are not hosted in SAP RISE, are hosted in Syensqo’s Azure subscription. The following systems are classified as Non-RISE:

Network Architecture 

Overview

The figure below describes the overall network connectivity for SAP RISE and non-RISE Azure VNets.


The table below lists down the regional hub and Azure edge location for NAM, EMEA and China regions.

RegionMegaport LocationAzure Edge location
EuropeParis Equinix PA2/3 & Paris Interxion PAR5Dublin
North AmericaAshburn Equinix DC4 & Reston Core Site VA1TBC
ChinaTBCTBC

IP Allocation

SAP RISE 

The 172.16.32.0/19 IP range has been allocated for SAP RISE globally. The following table lists down the IP allocation for the different regions and subnets.

RISE RegionRegion IP Allocation RISE SubnetSubnet IP AllocationRangeUsable Hosts
Europe172.16.32.0/22Production

172.16.34.0/25

172.16.34.0 - 172.16.34.127

126

Production (HA components)

172.16.34.128/25

172.16.34.128 - 172.16.34.255

126

ECS Services

172.16.32.0/24

172.16.32.0 - 172.16.32.255

254

Sandbox

172.16.33.0/27

172.16.37.0 - 172.16.37.63

30

Development

172.16.33.64/27

172.16.33.64 - 172.16.33.127

30

Integration Test

172.16.33.128/27

172.16.33.128 - 172.16.33.191

30

QA / UAT

172.16.33.192/27

172.16.33.192 - 172.16.33.255

30

Pre-Production

172.16.34.0/27

172.16.34.0 - 172.16.34.63

30

Training

172.16.34.64/27

172.16.34.64 - 172.16.34.127

30

Unassigned

172.16.37.128/25

172.16.37.128 - 172.16.37.255

126

Unassigned

172.16.38.0/24

172.16.38.0 - 172.16.38.255

254

North America

172.16.36.0/22

TBCTBC172.16.36.0 - 172.16.39.255TBC
China172.16.40.0/22TBCTBC172.16.40.0 - 172.16.43.255TBC
Unassigned172.16.44.0/22-

-

172.16.44.0 - 172.16.47.255

1022

Unassigned172.16.48.0/20-

-

172.16.48.0 - 172.16.63.255

4094

DNS Architecture

Domain Name

The following domains names are used for the respective RISE regions.

RISE RegionSAP RISE DomainNon-RISE Domain
Europe

*.sap.eu.cloud.syensqo.com

TBC

North America

*.sap.us.cloud.syensqo.com

TBC

China 

*.sap.cn.cloud.syensqo.com

TBC

DNS Integration

SAP RISE supports 3 different DNS integration types: DNS Zone Transfer, Conditional DNS Forwarding and DNS Domain Delegation.

Conditional DNS Forwarding has been chosen for Syensqo for the following reasons:

The table below lists the Syensqo and SAP DNS servers that are integrated.

RegionSyensqo Primary DNSSAP RISE DNS
Europe

Primary - 172.18.164.7 (DNS_EMEA_01)

Secondary - 172.18.164.22 (DNS_EMEA_02)

DNS –CSN-A-HA IP - 172.16.32.14 (vhysqirlcsna-ha.irl.sap.eu.cloud.syensqo.com)

DNS –CSN-B-HA IP - 172.16.32.30 (vhysqirlcsnb-ha.irl.sap.eu.cloud.syensqo.com)

DNS –CSN-C-HA IP - 172.16.32.46 (vhysqirlcsnc-ha.irl.sap.eu.cloud.syensqo.com)

North America

Primary - 172.19.113.69 (DNS_US_01)

Secondary - 172.19.113.86 (DNS_US_02)

TBC
China

Primary - 172.23.193.86 (DNS_APAC_02)

Secondary - 172.23.193.70 (DNS_APAC_01)

TBC

Network Firewall

For SyWay project, the following firewalls will be leveraged to manage the corresponding traffic.

Firewall

Network Traffic

Regional Hub Firewall

  • Incoming network traffic to SAP RISE..

  • Outgoing network traffic from SAP RISE.

Syensqo Azure Firewall

  • Incoming network traffic to Non-RISE and NextLabs vNETs.

  • Outgoing network traffic from Non-RISE and NextLabs vNETs.

Internet Traffic

All inbound and outbound internet traffic are filtered by the firewalls hosted in Megaport except for integration scenarios mentioned in integration section.

Outbound Internet Traffic

If the external application requires source IP to be whitelisted before accepting the connection, a public IP can be assigned at the respective firewall.

Inbound Internet traffic

Currently there is no requirements for inbound internet traffic to SAP RISE and non-RISE systems. This type of integration will be considered if there are no other alternatives and the purpose of this section to document the approach if the need arises. 

User Access

The following sections describes how SAP RISE and non-RISE systems are access by users within (internal) and outside (external) Syensqo network. For SaaS application access, users can access them through their existing internet access. 

These section cover the network perspective and does not include the authentication processes where single sign-on will be configured with Syensqo Identity provider.

Internal Access

End users will access SyWay systems via browser, mobile app or SAPGUI (for S/4HANA) (refer KDD036). The figure below describes the network traffic from user's terminal to SyWay systems.

SAP RISE Web Access:

SAP RISE SAPGUI Access

Non-RISE Access:

SaaS:

External Access

No direct external access from the internet is enabled for SyWay systems hosted in RISE. Users with a Syensqo-issued device can access systems hosted in RISE from outside the Syensqo network via ZScaler Private Access (ZPA).

SAP has deployed ZPA App Connectors in the RISE vNET, and allows connections from Syensqo's Zscaler Exchange as shown below.

Integration

The following sections describes the network design and flow for the following integration scenarios.

SAP Cloud Connector

The SAP Cloud connector are deployed in SAP RISE and acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and S/4HANA.

To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it.

EIM Data Provisioning Agent

EIM Data Provisioning Agent (DPA) is used to integrate S/4HANA and SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere. 

DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.   

OpenText Connector

OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS.

The HTTPS protocol is used for communication between all components. 

SAP Router

SAP has configured a VPN connection between the Syensqo SAP RISE tenant and SAP's Management network (used by SAP support). SAP Router is deployed in SAP RISE to manage SAP support's connection to SAP systems.