AWS for SAP
Tag: SAP
Microsoft SQL Server HA design and configuration for SAP on AWS
During my time as part of the AWS Professional Services SAP Global Specialty Practice, one of the key things I’ve found that customers look for is a high availability (HA) set up for their business/mission-critical SAP applications. In this blog post, we will talk about the HA design and configuration option for customers running […]
Terraform your SAP Infrastructure on AWS
Infrastructure as Code Customers’ SAP systems are critical for business operations, so when architects and administrators plan their deployments and operations there is a focus on following SAP best practices. Moreover, as workload requirements change, teams must iterate and adapt quickly to provision the required infrastructure keeping in mind all the security tenets, performance best […]
AWS, SAP, and APN partner innovation: It’s still day one
A foundation of strong relationships with SAP and AWS Partner Network (APN) SAP Competency Partners has allowed us to deliver value to the ever evolving needs of SAP customers. It is still “day one” for AWS and SAP.
SAP backups on AWS using Commvault – architecture and core component deployment
In this blog series, we cover best practices for customers to use Commvault to back up and recover their SAP instances securely. Customers who run SAP on AWS today have various backup solutions available to back up their SAP instances. Some use cloud-native AWS services while others continue to use their enterprise backup solutions like […]
Reducing downtime with Oracle XTTS method for cross-platform SAP migrations
In this blog, we provide high-level steps on how to reduce downtime for cross platform SAP migrations by using Oracle XTTS method with Incremental Merge. Using the approach described, we were able to migrate our customer’s critical 16TB SAP workload from AIX/Oracle on-premises to OEL/Oracle on AWS within a 24 hour cutover window.
AWS DevOps tools for SAP, Part 2: SAP Fiori Apps
In this blog series, we’ve shown how to leverage the AWS DevOps Tooling such as AWS CodePipeline, AWS CodeCommit, AWS CodeBuild and AWS CodeDeploy as serverless CI/CD toolset to orchestrate, build, validate, approve, and deploy SAP Fiori based applications. With this fully managed AWS solution, our customers can focus on innovating and transforming their business rather than worrying about managing and maintaining servers for mission critical SAP applications.
Lower costs, improve reliability and availability, and increase performance for SAP workloads
SAP on AWS customers can now enjoy better performance and faster workflows with higher storage and network bandwidths for EC2 High Memory instances certified by SAP; significant cost savings for EC2 Standard Reserved Instances or EC2 Instance Saving Plans; and a 99.99% Amazon Elastic File System availability guarantee. We’ve also certified Amazon EC2 C5a instances for SAP, which offer the lowest cost per x86 vCPU in the Amazon EC2 portfolio and launched AWS Backint Agent for SAP HANA to backup business-critical SAP HANA database to Amazon S3.
SAP monitoring: A serverless approach using Amazon CloudWatch
This blog post shows you a way to monitor SAP ABAP-based systems with Amazon CloudWatch. It also provides an out-of-the box solution with a baseline of SAP application metrics that can be deployed through the AWS Serverless Application Repository and AWS CloudFormation.
AWS DevOps tools for SAP, Part 1: Cloud Foundry Apps
In part 1 of this blog series, we’ll show you how to leverage the AWS DevOps Tooling such as AWS CodePipeline, AWS CodeCommit, Amazon SNS and AWS CodeBuild as serverless CI/CD toolset to orchestrate, build, validate, approve, and deploy.
How to integrate Amazon WorkSpaces with SAP Single Sign-On
SAP Single Sign-On allows users to have secure access to SAP and non-SAP systems using centralized authentication whether the systems are on-premises or in the cloud. SAP Single Sign-On provides the simplicity to manage users’ authentication, secure data communication, and integrate with two-factor and risk-based authentication. This includes possession of mobile phone and RSA SecurID […]