文档章节

Tagging recommendations for SAP on AWS

o
 osc_ao91jbnq
发布于 03/19 20:03
字数 1013
阅读 3
收藏 0
gt

行业解决方案、产品招募中!想赚钱就来传!>>>

https://amazonaws-china.com/blogs/awsforsap/tagging-recommendations-for-sap-on-aws/


Customers running SAP on AWS often ask us if we’ve seen reusable trends in tagging strategies for SAP workloads. Tags are simple labels consisting of a customer-defined key and an optional value. Tags enable customers to assign metadata to cloud resources, making it easier to manage, search, and filter existing resources.

In this post, we outline the benefits of tagging and provide recommendations for customers and partners deploying SAP workloads on AWS. Recommended tags are based on practices we’ve seen across a number of our engagements. Customers can directly use all of these tags or modify them to fit their own needs.

Tagging benefits

  • Customers use tags for operation and deployment automation activities, such as snapshots of storage volumes, OS patching, and AWS System Manager automation. SAP customers can also use tags for automating the start/stop of SAP servers, running cron jobs, and monitoring/alerting capabilities.
  • Partners use AWS tags for solution deployment. High availability cluster, backup, and monitoring solutions often rely on AWS resource tags for their operations.
  • AWS billing reports support the use of tags. Customers can create cost allocation tags that help identify pricing of AWS resources based on individual accounts, resources, business units, and SAP environments.
  • AWS Identity and Access Management (IAM) policies support tag-based conditions, enabling customers to constrain permissions based on specific tags and their values. IAM user or role permissions can include conditions to limit access to development, test, or production environments or Amazon Virtual Private Cloud (Amazon VPC) networks based on their tags.
  • Tags can be assigned to identify resources that require heightened security risk management practices. For example, Amazon Elastic Compute Cloud (Amazon EC2) instances hosting applications that process sensitive or confidential data. This can enable automated compliance checks to ensure that proper access controls are in place or that patch compliance is up-to-date.

Tagging considerations

  • Tags can be applied anytime: Tags can be created and applied after a resource is created. However, no information is captured between the time the resource was created and when the tag was applied.
  • Tags are not retroactive: Cost allocation reports are only available from the point in time they were activated. If cost allocation is activated in October, no information from September is displayed.
  • Tags are static snapshots in time: Changes made to tags after a report is executed are not reflected in previous reports.
  • Tags must be denoted for cost allocation: After creating a new tag, it must be asked/activated/added as a cost allocation tag. If it is not, it is not visible in Detailed Billing Reports (DBR) or AWS Cost Explorer.

Tagging strategies

  • Define naming convention: Tags are case-sensitive, so define standards for your AWS resources. For example, tag key names should use upper CamelCase (or PascalCase) for manual creation. CamelCase combines words/abbreviations by beginning each word with a capital letter, such as MiscMetadata and SupportEndpoints.
  • Standardize delimiters: Do not use delimiters as part of tag values. This works well with case-sensitive tags.
  • Use concatenated/compound tagging: Combine multiple values for a tag key (Owner = JohnDoe | johndoe@company.com | 8005551234). PascalCase should be used to standardize compound tags.

Tagging suggestions

Note: We can use a “<customer name>:” prefix – to clearly differentiate company-defined tags from tags defined by AWS or required by third-party tools a customer may use.

Tag Name <customer name>:name
Purpose Identifies the resource name. Can be the hostname of the SAP server.
Values String
Example: aws2sql01
Cost Allocation Tag? Yes
Tag Name <customer name>:sap-product
Purpose Identifies the SAP product running for SAP Resource.
Values String
Examples: ecc, bw, po, solman, content-server
Cost Allocation Tag? Yes
Tag Name <customer name>:sid
Purpose Identifies the SAP system SID.
Values String
Cost Allocation Tag? No
Tag Name <customer name>:landscape-type
Purpose Identifies the SAP landscape type support or project.
Values String
Examples: n, n+1, n+2
Cost Allocation Tag? No
Tag Name <customer name>:ha-node
Purpose Identifies the HA cluster node.
Values String
Examples: primary, secondary, disaster recovery (DR)
Cost Allocation Tag? No
Tag Name <customer name>:backup
Purpose Identifies the backup policy for the server.
Values String
Examples: daily-full, daily-incremental, weekly-full
Cost Allocation Tag? No
Tag Name <customer name>:environment-type
Purpose Identifies whether the resource is part of a production or non-production type of environment.
Values String
Examples: lab, development, staging, production
Cost Allocation Tag? No
Tag Name <customer name>:created-by
Purpose For tracking the AWS account ID, IAM user name, or IAM role that created the resource.
Values String
Examples: account-id, user name, role session name
Cost Allocation Tag? Yes
Tag Name <customer name>:application
Purpose Identifies the resource application name.
Values String
Example: sap
Cost Allocation Tag? Yes
Tag Name <customer name>:app-tier
Purpose The tier key is used to designate the functional tier of the associated AWS resource. This key provides another way to deconstruct AWS spending to understand how each infrastructure subcomponent contributes to overall cost. Also used for determining backup and disaster-recovery requirements. It is also useful for threat modeling when using tools such as AWS Tiros.
Values String
Examples: Web, app, data, network, other
Cost Allocation Tag? No
Tag Name <customer name>:cost-center
Purpose Identifies the cost center of the department that is billed for the resource.
Values Numeric cost center code
Cost Allocation Tag? Yes

Additional tagging options

Customers can also consider tags for poweroff-time, poweron-time, business-stream, resource-owner-email, and support-team-email with their AWS resources.

The screenshot below shows an examples of some tags that have been set up. In this example, abc is the company name.

This is an image of sample tags that have been set up for ABC company. Tags include app-tier, application, backup, cost-center, created-by, environment-type, ha-node, landscape-type, resource-owner-email, product, sid, and support-team-email.

Figure 1: SAP Server Tagging Example

Conclusion

Tagging strategies differ from customer to customer depending on their needs. Our SAP Professional Services practice has found it useful to provide a prescriptive starting point for customers to build from. The most important aspects of tagging are defining what works for your organization and remaining precise and accurate. Please also review tag restrictions while preparing the tagging strategy for your SAP workloads.

Let us know if you have any comments or questions—we value your feedback.

o
粉丝 0
博文 68
码字总数 0
作品 0
私信 提问
加载中
请先登录后再评论。
轻量级的双向绑定工具 —— ukulelejs

几个月前ukulelejs初具雏形的时候,作者就在oschina推过,博客链接请戳 经过几个的不断完善和内部项目实践,ukujs已经趋于稳定,并可以投入生产环境中使用。今天带着全新的官网,再次来推荐一...

熊丸子
2015/10/21
671
15
学习Android开发平台需要了解的体系结构和源码结构

本文转自迅为iTOP-4412开发板实战书籍:http://www.topeetboard.com 下面这张图出自Google官方,展示了Android系统的主要组成部分。 可以看出,Android系统架构由5部 分组成,分别是:Linux...

歌之王子殿下
2016/07/19
365
0
《Spring Cloud Netflix》 -- 服务注册和服务发现-Eureka的常用配置

一、版本的说明 Angel版本对应Spring Boot 1.2.x,可以使用Spring Boot 1.3.x; Brixton版本对应Spring Boot 1.3.x,可以使用Spring Boot 1.4.x; Camden版本对应Spring Boot 1.4.x,可以使用...

芝麻绿豆
2017/04/23
781
2
开源搜索系统--Red-Piranha

Red-Piranha是一个开源搜索系统,它能够真正"学习"你所要查找的是什么.Red-Piranha 可作为你桌面系统(Windows,Linux与Mac)的个人搜索引擎,或企业内部网搜索引擎,或为你的网站提供搜索功能,或作...

匿名
2009/01/30
3.7K
0
文档管理系统--DocDoku

DocDoku 是一个 Java 开发的文档管理系统,用于管理、分析和生成文档,提供: Version control Check-in/check-out Metadata management Full text search Tagging BPM document template fe......

匿名
2010/05/17
1.1W
0

没有更多内容

加载失败,请刷新页面

加载更多

数据库—从注入到提权的全家桶套餐

这是 酒仙桥六号部队 的第 55 篇文章。 全文共计5397个字,预计阅读时长17分钟。 前言 偶然看到了最新的数据库流行度排名,发现在前5名的关系型数据库中,日常渗透测试见到最多的便是MySQL,...

一名白帽的成长史
前天
0
0
Linux安装 jdk tomcat mysql

安装 jdk # 华为云镜像jdk下载:https://repo.huaweicloud.com/java/jdk/# 1. 上传jdk解压至 /usr/local# 2. vim /etc/profile export JAVA_HOME=/usr/local/jdk export PATH=......

codeccb
1分钟前
0
0
「MoreThanJava」Day 5:面向对象进阶-继承详解

「MoreThanJava」 宣扬的是 「学习,不止 CODE」,本系列 Java 基础教程是自己在结合各方面的知识之后,对 Java 基础的一个总回顾,旨在 「帮助新朋友快速高质量的学习」。 当然 不论新老朋友...

我没有三颗心脏
前天
0
0
了解 JS 压缩图片,这一篇就够了

△ 是新朋友吗?记得先点web前端学习圈关注我哦~ 前言 公司的移动端业务需要在用户上传图片是由前端压缩图片大小,再上传到服务器,这样可以减少移动端上行流量,减少用户上传等待时长,优化...

web前端学习圈
今天
0
0
int32的最大值是多少? - What is the maximum value for an int32?

问题: I can never remember the number. 我永远记不住这个数字。 I need a memory rule. 我需要一个记忆规则。 解决方案: 参考一: https://stackoom.com/question/Obf/int-的最大值是多少...

javail
4分钟前
0
0

没有更多内容

加载失败,请刷新页面

加载更多

返回顶部
顶部