The out of the box vCAC –> NSX integration requires the use of Multi-Machine blueprints. Multi-Machine blueprints are basically a blueprint that pulls together one of more single-machine blueprint. In order to create a three tier web application like the one I will be walking through we will need three standard blueprints to utilize within our Multi-Machine blueprint. In the below example will be configuring a Multi-Machine blueprint that will deploy an NSX Edge Gateway on to it’s own reservation and then deploy three different blueprints each onto a different network specific to it’s tier. Example below:
I will be walking through how to create a Multi-Machine blueprint that will build out the equivalent of the above diagrams Multi-Machine App.
Continue reading “vRealize Automation – vCAC 6.1 / NSX 6.1 – Creating a Multi-Machine Blueprint w/NSX Routed Gateway Support”
Routed Network Profiles have a very specific function. Routed Network Profiles are used in conjunction with NSX and Multi-Machine vCAC blueprints. Routed Network Profiles are used to define the networks that will be used by the Multi-Machine component machines. These networks will sit behind a deployed NSX Edge Gateway that is deployed as part of the Multi-Machine deployment.
While creating a Routed Network profile you will need to select an External Network Profile for the Routed Network profile to use. The External Network Profile is used to assign the IP address to the Uplink Interface of the NSX Edge Gateway that is deployed as part of a Multi-Machine Request. Routed Network Profiles also consists of IP Network Ranges, not IP address ranges.
IP Network Ranges are used to allocate a Range of IP’s to be used for a specific component Machine. An example would be if you have a web server component in a Multi-Machine blueprint and you want to deploy two of them. If the range was a /30 network range you would have two IP addresses available for your two web servers
Below is a diagram representing the Architecture of NSX when using Routed Network Profiles in vCAC. The External Network Profile that is defined in a Routed Network Profile if depicted as the Purple network in the diagram. As you can see in the diagram this is the Logical Network that connects the vCAC deployed routers to the pre-existing NSX Edge. The Green, Orange, and Blue networks represent the Routed Networks that are assigned from the Routed Network Profile.
Continue reading “vRealize Automation – vCAC 6.1 / NSX6.1 – Routed Network Profiles”
External Network profiles in vCAC enable you to create a range of IP addresses that can used to statically assign IP address to provisioned workloads in your environment. There are two part to an External Network Profile. There is the Network Profile Information in which you specify the network specific information such as netmask, gateway, DNS Server, Suffixes, and WINs Servers. Then there is the IP ranges these can be one contiguous range of IP address or multiple ranges within the subnet that are broken up.
The Network profile is then assigned to a network within a Reservation and any machine provisioned to that reservation an attached to a network will get it’s IP information form the assigned Network profile. There are a number of ways to utilize External Network Profiles within vCAC , below are some examples:
Continue reading “vRealize Automation – vCAC 6.1 – External Network Profiles”
In my previous NSX articles we covered installing and configuring NSX, We discussed deploying/configuring Transport Zones, Logical Switches, Logical Routers, Edge Gateways, and connecting the Logical and Edge Gateways. With all these completed we now have an environment that with the appropriate routes and transport traffic from our physical network to our logical networks that we deployed. The missing price is the routes. We could go and configure a bunch of static routes throughout all the NSX routers and our physical routers, but that wouldn’t be fun. It also wouldn’t be automated. In this post I am going to walk through configuring the NSX routers to use OSPF for route distribution.
Continue reading “VMware NSX 6.1 for vSphere – Configuring OSPF route distribution”
This article builds on my previous article Deploying an Edger Gateway. In this article we are going to connect the Edge router we deployed in my previous post to the Logical Router we deployed in the post Deploying Logical Distributed Routers. In order to link these together we will need to deploy a Logical Switch to be used as a transit network between the Edge Gateway and the Logical Router.
Connecting the Logical and Edge Router
Continue reading “VMware NSX 6.1 for vSphere – Connecting logical and Edge Routers”
So far we have deployed (2) Logical Switches and (1) Distributed Logical Router and deployed a VM on to each logical switch. Our VM’s can communicate with each other across the Distributed Logical Router, but they can’t communicate to anything else. What we now need to do is deploy an Edge Gateway that we will configure to communicate upstream to the physical network and downstream to the logical network. Where we could technically just connect the Distributed Logical Router upstream to your physical network, it’s not really a best practice approach and it’s not a supported approach when integrating with vCAC.
Continue reading “VMware NSX 6.1 for vSphere – Deploying an Edge Gateway”
In this walk-through we will be deploying a logical router and configuring routing between (2) logical networks that we created in an earlier post. Logical routers consist of two components. A virtual appliance that is deployed into your vSphere environment. In the MoaC lab all routers are deployed to our management cluster and the vSphere Kernel module. Remember the host preparations we performed as part of the NSX installation? That was installing the NSX kernel modules.
The NSX Logical Routers Perform East-West (VM-VM) routing as well and North-South Routing. The East-West routing performed by the Logical Routers afford you some extra efficiencies by allowing VM-VM communications across different subnets to happen at the vSphere Kernel when those vm’s reside on the same host. You can also gain efficiencies when communicating between vm’s on different hosts as well. Traffic for the communications will traverse host to host instead of needing to go out to a physical router on the network and then to the other vm. In the post you will witness this as we place a virtual machine on each of the logical switches we created and the Logical Router performs routing between the two networks right in the hosts kernel. Although this specific post focuses on the East-West routing within the Logical Router we will be covering the North-South routing configuration in another post.
Continue reading “VMware NSX 6.1 for vSphere – Deploying Logical Distributed Routers”
NSX Logical Switches can be looked at as the equivalent of a virtual VLAN. They identify the networks that you will be connecting your virtual machines to that ride over your VXLAN Transport Zones. Each Logical Switch is assigned a Segment ID that is similar to a VLAN ID. The difference is the packet encapsulation. Each of the exercises I will be writing build on top of the previous. If you are reading this and are looking for the preceding articles click here.
During this walk-through you are going to configure (2) Logical Switches that we will use in a later article where we are going to configure Logical Routing. For this article we will only be configuring the Logical Switches.
In my previous article I walked through configuring Transport Zones. I’m going to be using the Desktop Cluster Transport Zone that I created in that article. I will be creating (2) Logical switches in the MoaC Lab Attached the Desktop-Transport-Zone.
Continue reading “VMware NSX 6.1 for vSphere – Deploying Logical Switches”
If you are familiar with “Network Scopes” from vCNS then “Transport Zones” should be familiar to you. If not here is some useful information to know regarding these Zones.
Transport Zones dictate which clusters can participate in the use of a particular network. Prior to creating your transport zones some thought should go into your network layout and what you want to be available to each cluster. Below are some different scenarios for transport zones.
In the “MoaC” environment I have three clusters. There is a Management Cluster in which all management servers are hosted included all components of NSX which will include all Logical and Edge routers that we have not yet configured, but this concept is important to know. I will not be placing any routers in any other cluster than my management cluster. I then have a Services cluster which will be hosting all of my provisioned machines that are not part of the core infrastructure, and finally I have a desktop cluster in which I will be hosting VDI desktop instances.
Continue reading “VMware NSX 6.1 for vSphere – Setting up Transport Zones”
I know your excited to get right down to the meat of the installtion, but there is some housekeeping that we need to get out of the way first. There are a number of pre-requisites that we need to ensure exist in the environment first.
- A properly configured vCenter Server with at least one cluster. (Ideally (2) clusters – (1) Management Cluster & 1(1) Cluster for everything else.)
- Cluster should have at least (2) hosts. (More would be better. Memory will be important)
- You will need to be using Distributed Virtual Switches (DvSwitch) NOT Standard vSwitches.
- If you are NOT running vSphere 5.5 you will need to have your physical switches configured for Multicast. (Unicast requires vSphere 5.5)
- You will need a vLAN on your physical network that you can utilize for VXLAN.
To give you an idea below is the configuration for the “MoaC” lab that I will be working in.
- vCenter 5.5 U2b
- (3) Clusters
- Management Cluster with (2) vSphere ESXi 5.5 U2 Hosts
- 32GB Memory
- Cluster only DvSwitch using NIC Teaming
- Services Cluster with (4) vSphere ESXi 5.5 U2 Hosts
- 196GB Memory
- Cluster only DvSwitch using LAG.
- Desktop Cluster with (2) vSphere ESXi 5.5 U2 Hosts
- 112GB Memory
- Cluster only DvSwitch using LAG.
- Physical vLAN trunked to all vSphere hosts in all clusters.
Continue reading “VMware NSX 6.1 for vSphere Step-By-Step Installation”