Other considerations
This sections provides information about other considerations when connecting to RISE.
Topics
SAP Business Technology Platform (BTP) with RISE on AWS
You can use SAP Business Technology Platform BTP services on AWS to extend the
functionality of the RISE with SAP. SAP recommends SAP Cloud Connector to connect RISE
with SAP VPC with SAP BTP via internet. When both RISE with SAP and SAP BTP run on AWS
(in the same AWS region or different AWS regions),
the network traffic is encrypted and contained within AWS Global Network, without going
through the internet (see the following diagram). This provides better security and
performance for any integration use-cases between RISE with SAP and SAP BTP. For more
information, see Amazon VPC FAQs - Does traffic go over
the internet when two instances communicate using public IP addresses or when isntances
communicate with a public AWS service endpoint ?
As displayed in the preceding diagram, you can configure Transit Gateway to handle
both RISE and BTP network traffic. For more information, see How to route internet traffic from on-premise via Amazon VPC?
SAP also offers SAP Private Link Service for SAP BTP on AWS. SAP Private Link connects SAP BTP on AWS with a secure connection without using public IPs in your AWS account.
You can connect to an AWS endpoint service from an SAP BTP application running on
Cloud Foundry. By establishing this connection, you can directly connect to AWS services,
or for example, to an S/4HANA system. For a complete list of supported AWS services, see
Consume Amazon Web Services in SAP BTP
You can establish a secure and private communication between SAP BTP and AWS
services with SAP Private Link Service
SAP Private Link for AWS currently supports connections initiated from SAP BTP Cloud Foundry to AWS.
For AWS services across AWS Regions, you can create a VPC in the same AWS Region
as your SAP BTP Cloud Foundry Runtime, and connect these VPCs via VPC peering or
AWS Transit Gateway. For a list of supported Regions, see Regions and API Endpoints Available for the Cloud Foundry Environment
SAP Private Link Service is a paid service offered by SAP on SAP BTP. For more information see:
SAP Discovery Center – Services – SAP Private Link Service
Cost associated to AWS Services in the AWS account - managed by the Customer to facilitate cross region connectivity for example the AWS Network Load Balancer, or Transit Gateway vary. For more information on price, see the dedicated pricing pages of the listed AWS Services.
Connecting to cloud solutions or SaaS from RISE
When modernizing the SAP landscape, you may subscribe to several SAP cloud solutions or SaaS from independent software vendors to complement RISE with SAP solution.
When the cloud solutions are running on AWS (in the same AWS region or different AWS regions),
the connectivity from RISE with SAP is kept within the AWS global network without requiring
internet connectivity. The connectivity is retained through the provided squid proxy server
within RISE with SAP VPC.For more information, see
Amazon VPC FAQs - Does traffic go over the internet when two instances communicate using
public IP addresses or when isntances communicate with a public AWS service endpoint ?
If your cloud is running on other data centre or with another cloud service provider, then you need internet connectivity.
SaaS cloud solutions do not offer connectivity via VPN, Direct Connect or any other means of private connectivity. You can implement a centralized egress to internet architecture to manage this connectivity. For more information, see Centralized egress to internet .
Connectivity patterns for multi-cloud to RISE
In a complex connectivity scenario, you may need to integrate RISE with SAP setup with on-premises, AWS-hosted systems, and a variety of SaaS solutions and other cloud service providers.
Managing connectivity directly from the AWS environment decouples dependencies with on-premises networking infrastructure, improving availability and resiliency of the overall landscape.
You can use public or private connectivity to connect multi-cloud with RISE.
Public connectivity
Connectivity is routed over the public internet. This pattern is typically used for connectivity from RISE with SAP to SaaS solutions that runs across multiple clouds. When building connectivity routed over the public internet, consider the following:
-
ensure that all communication is encrypted
-
protect end-points by using AWS services, such as Elastic Load Balancers and AWS Shield
-
monitor endpoints using Amazon CloudWatch
-
ensure that traffic between two public IP addresses hosted on AWS is routed over the AWS network
Private connectivity
The following three are the options to establish private connectivity between different cloud service providers:
-
Site-to-site VPN encrypted tunnel routed over public internet
-
private interconnect using AWS Direct Connect in a managed infrastructure (use Azure ExpressRoute for Azure and Google Dedicated Interconnect for Google Cloud Platform)
-
private interconnect using an AWS Direct Connect in a facility with a multi-cloud connectivity provider
The following diagram describes the factors to choose a multi-cloud connectivity method.
For more information, see Designing private network connectivity between AWS and Microsoft
Azure
How to implement chargeback capability for connectivity to RISE
If you are a company with subsidiaries, you may have different RISE contracts, leading to deployments in separate AWS accounts while requiring an interlinked network connectivity. In this instance, you must deploy Transit Gateway connection in a Landing Zone (multi-account) setup. It can scale your RISE deployment and integrate with multiple RISE with SAP VPCs.
Transit Gateway Flow Logs enables effective cost management. Transit Gateway Flow Logs can be integrated with Cost and Usage Report (CUR) that can be attributed as chargeback to the business units. For more information, see Logging network traffic using Transit Gateway Flow Logs .
The preceding diagram displays how Transit Gateway can be used to connect multiple RISE with SAP VPCs and provide chargeback capability through the Flow Logs.
For more information, see the following blogs:
Use the following steps to enable this setup:
-
Enable Transit Gateway Flow Logs. For more information, see Create a flow log that publishes to Amazon S3.
-
Setup Cost and Usage Reporting and setup Athena to utilize the reporting. For more information, see Creating Cost and Usage Reports and Querying Cost and Usage Reports using Amazon Athena .
-
Obtain the Transit Gateway data processing charge per-account.
-
Decide a cost allocation strategy - distribute costs evenly across all accounts or distribute proportionally across all accounts.
-
Calculate the total network traffic and percentage allocation per account using AWS Transit Gateway
query. -
Estimate cost per account, by collecting from CloudWatch that collects Network In(Upload) and NetworkOut(Download).
-
NetworkIn(Upload) + NetworkOut(Download) per usage account/ total data processed in network account
-
% of usage x total cost = chargeback cost per usage account
-
-
Integrating Domain Name System to RISE and Route 53 consideration
Domain Name System (DNS) translates domain names and IP addresses in both ways such as (www.amazon.com as 1.2.3.4 in IPv4 or 1200:ab00:1024:1::b410:e6b1 in IPv6). There are two methods available to integrate DNS to RISE:
-
DNS Zone Transfer: This method replicates the DNS databases across a set of DNS Servers. It can provide higher availability, redundancy and higher SLA. In a typical RISE environment, you delegate a sub-domain (example. *.sap.customer.com) to the RISE DNS Servers. If one server becomes unavailable, other servers can continue to provide DNS services without interruption. If a customer is using Route 53, which does not support Zone Transfer, customer need to set up Route 53 inbound resolver together with a Route 53 private hosted zone and provide the resolver IPs to SAP for routing purposes, you can find out more in the DNS Conditional Forwarding as below.
-
DNS Conditional Forwarding (also called IP Forward): The DNS servers only forward queries for specific domain names that is not part of its own name space. (example: Amazon Route 53 forwards DNS query of *.sap.customer.com to RISE DNS Servers). This allows for more precise control over how DNS queries are handled, especially in complex network environments. Amazon Route 53 Resolver supports both public and private DNS resolution, facilitates hybrid cloud setups, and enhances availability, performance, and security for AWS resources and on-premises networks.
Here is a reference architecture on how to integrate Amazon Route 53 with RISE.
For more details, refer to the following AWS documentation: