top of page

ODBC for SAP HANA trouble shooting Communication link failure; -10709 Connection failed

Error message:


HANA ODBC Test Connection Error SQLSTATE: 08S01 NATIVE ERROR: -10709 MESSAGE TEXT: [SAP AG][LIBODBCHDB DLL][HDBODBC] Communication link failure;-10709 Connection failed (RTE:[89006] System call 'connect' failed, rc=10060: A connection attempt failed because the connected party did not properly respond after a period of time, or establish).


Background


Our Objective is to Install ODBC and access SAP HANA on cloud. We faced this error. It took some time to solve. Information available on internet did not help.

System: Windows on-prem

Server: SAP HANA Express Edition Azure VM

Connectivity: ODBC

When trying to configure ODBC on windows. We continuously got above error message.


Solution:


Configure inbound security rule of SAP HANA VM at azure portal.

Check Inbound Port Rules

·      Ensure there is an inbound security rule that allows traffic on port 30115:(for unknown reasons, inbound security rule config for port 30015 did not help)

· Source: Any (or specify the IP range of your on-premises network)

· Source port ranges: *

· Destination: Any

· Destination port ranges: 30115

· Protocol: TCP

· Action: Allow

· Priority: Ensure it has a lower priority number (e.g., 1000) so it’s not overridden by other rules.

Name: A meaningful name like Allow-SAP-HANA-ODBC


How did we debug this error?


Step 1

On windows command line, when you run the following command

./nmap -p 30115 20.41.250.16

You should see the output as follows

PORT           STATE          SERVICE

30115/tcp      open           unknown

 

Instead, if you see the output as follows, then it will not work

PORT           STATE                     SERVICE

30115/tcp      close/filtered           unknown

(As mentioned, for unknown reasons, inbound security rule config for port 30015 did not help. The state was always in close state)

Step 2

Login to terminal of azure VM. Give the following command. You should see the output as follows

sudo iptables -L -nChain INPUT (policy ACCEPT)target              prot opt source               destination        ACCEPT        tcp  --  0.0.0.0/0               0.0.0.0/0            tcp dpt:30115

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page