The out of the box vCAC –> NSX integration requires the use of Multi-Machine blueprints. Multi-Machine blueprints are basically a blueprint that pulls together one of more single-machine blueprint. In order to create a three tier web application like the one I will be walking through we will need three standard blueprints to utilize within our Multi-Machine blueprint. In the below example will be configuring a Multi-Machine blueprint that will deploy an NSX Edge Gateway on to it’s own reservation and then deploy three different blueprints each onto a different network specific to it’s tier. Example below:
I will be walking through how to create a Multi-Machine blueprint that will build out the equivalent of the above diagrams Multi-Machine App.
What is the cloud client you ask? The CloudClient is a verb based command-line utility aimed at simplifying interactions with multiple product api’s. The CloudClient also provides common security, exception handling, json, & CVS support. Currently vRealize Automation (vRA)( Formerly vCAC), Site Recovery Manager (SRM), & vRealize Orchestrator (vRO)(Formerly vCO).
Creating an Amazon AWS Endpoint is really just assigning the credentials you would like to use to communicate with Amazon. vCAC already knows how to communicate with Amazon, it just doesn’t know what it needs to authenticate. To create the AWS Enpoint perform the following steps:
Creating an Amazon AWS credential has a few extra steps then a general set of credentials. You will need to login to your AWS account and access your Acess Key Id as well as your Secret Access Key to be utilized in the creation. The steps below outline the process to create an Amazon AWS set of credentials.
In this article we are going to be creating a vSphere Clone Blueprint. To do this we need to have a few things in place before we begin. Within the blueprint configuration there is a template picker that will allow you to pick form the available templates in your environment. In order for templates to show up in the template picker there are some items that need to be configured in the vCAC environment. You will need to have the following already configured:
In this article we are going to cover how to install the vCAC 6.0.x Linux Guest Operations Agent. The Linux Guest Operations agent is used to perform post provisioning tasks inside the Linux Guest Operating system as part of the vCAC provisioning process. The Linux guest agent runs after the vSphere Customization Specifications runs to perform additional configuration tasks against the machine. There are three common built in features of the guest agent that are commonly used. THose are:
Partition, Format, & Mount additional disks added to the machine.
Configure additional network interfaces added to the machine< ./li>
Execute scripts within the guest to install applications, or perform additional configuration.
Creating a blueprint for VCHS has a few pieces to it that are a little different that creating a standard vSphere blueprint. We need to start by creating a component blueprint that will then be utilized by the blueprint that we will publish to the catalog. The reason for this so you could potentially create multi-component application blueprints that can be requested from your users. If you use the vCloud Director integration you will recognize the similarities. This article provides a brief run through of creating a basic VCHS blueprint that can be provisioned against VMware’s VCHS cloud service. Continue reading “vCloud Automation Center – vCAC 6.0 – Creating a VMware VCHS blueprint”
That big ole title pretty much says it all. In this article I’m going to walk through how to deploy RHEL (Centos) Linux onto a Physical HP Server over the iLo interface using Kickstart. When provisioning to Physical servers such as an HP Proliant DL360 there are two methods built into vCAC. One is the use of PXE boot, and the other is via the iLo interface.
There are pro and cons to both PXE and remote mounting an ISO over the iLo interface. PXE has the obvious cons of the network requirements, having a PXE server available and if you want true flexibility you will need to do a little custom work. ISO mount over iLo tend to be a bit slower due to the over head of remote mounting a ISO and the speed of the iLo interface. In this article I will be covering remote mounting an ISO over iLo, but I will be covering PXE is a later article.
What do we need
To start we need the Physical HP server to be racked and cabled up. It’s iLo interface should be configured and licensed, the network interfaces should be cabled in and the switches should be configured for the appropriate Vlans etc. The drives in the server should also be initialized. vCAC will not create any raid groups etc for you, you must do this manually. My examples also requires a web server that can be utilized to store the needed files on the network.
Entitlements are what allow you to give users/groups access to Services and/or Blueprints as well as determine what actions they can perform with them. Entitlements offer a significant amount of flexibility in how you provide access to services through the catalog, who can access those services, what actions they can perform, and what is any approvals are required.
Entitlements are made up of three components. Services, Catalog Items, and Actions. You can choose to entitle complete Services which encompass all Items within the service or just select catalog Items. You can also determine what actions the users that belong to the entitle can perform against all the catalog items that are a part of the entitlement. Keep this in mind if you want to have catalog items with lesser or more available actions you will need to put them in different entitlements.
Within entitlements you also have the ability to assign approvals to Services, Catalog Items, and actions. Again keep in mind that you may want to have different approval policies for different groups of people for the same catalog items, this would require a different entitlement for each.
Go to Administration -> Catalog Management -> Entitlements and select the + sign next to Entitlements at the top of the page.
When the page opens give your entitlement a name, set the status as active, select the business group that it relates to, and assign the AD users/groups that you would like to grant access to the entitlement. Once completed select next.
Next on the Items & Approvals screen is where we will entitle the services, catalog items, & Actions. If you entitle an entire service you do not need to add the catalog items from the service under catalog items. If you would like to add some of the catalog items form a service, do not entitle the service, but entitle just the catalog items you would like. You will notice that there are a large amount of actions you can choose from and some are specific to certain types of catalog items. You should be aware of the different types of items and provide the appropriate actions for that item.
Once you are finished adding service, catalog items, & actions to your entitlement click add to create your service. Once created the assigned users can go to the catalog and request the items made available.
When we created a blueprint we had to publish the blueprint. Publishing the blueprint allows it to become available as a catalog item that we can assign to a service and later entitle a user to have access to. In this article we will be assigning the blueprint to a service and enabling it as a catalog item. This will not make it show up in the catalog just yet, but creates a relationship between the blueprint and the service for which it will be published under. Continue reading “vCloud Automation Center – vCAC 6.0 – Enabling Catalog Items”