VMware Validated Design For Software-Defined Data Center Installationa and Configuration (PDFDrive)
VMware Validated Design For Software-Defined Data Center Installationa and Configuration (PDFDrive)
EN-002169-00
VMware Validated Design Deployment Guide for Region A
You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
[email protected]
© 2016 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright
and intellectual property laws. This product is covered by one or more patents listed at
http://www.vmware.com/download/patents.html.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective
companies.
VMware, Inc.
3401 Hillview Avenue
Palo Alto, CA 94304
www.vmware.com
Page 2 of 545
VMware Validated Design Deployment Guide for Region A
Contents
Page 3 of 545
VMware Validated Design Deployment Guide for Region A
Page 4 of 545
VMware Validated Design Deployment Guide for Region A
Note The VMware Validated Design Deployment Guide for Region A is compliant and validated
with certain product versions. See Introducing VMware Validated Design for more information
about supported product versions.
VMware Validated Design Deployment Guide for Region A is intended for cloud architects,
infrastructure administrators and cloud administrators who are familiar with and want to use VMware
software to deploy in a short time and manage an SDDC that meets the requirements for capacity,
scalability, backup and restore, and extensibility for disaster recovery support.
Page 5 of 545
VMware Validated Design Deployment Guide for Region A
Page 6 of 545
VMware Validated Design Deployment Guide for Region A
Hostname FQDN IP
Setting Value
Hostname FQDN IP
Setting Value
Hostname FQDN IP
Page 7 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Page 8 of 545
VMware Validated Design Deployment Guide for Region A
Repeat all steps for all hosts in the data center. Enter the respective values for each host that you
configure.
Page 9 of 545
VMware Validated Design Deployment Guide for Region A
Set IP address, subnet mask, gateway, DNS server, and FQDN for the ESXi host.
Procedure
Open the DCUI on the physical ESXi host mgmt01esx01.
a. Open a console window to the host.
b. Press F2 to enter the DCUI.
c. Enter root as login name, enter the esxi_root_user_password, and press Enter.
Configure the network.
a. Select Configure Management Network and press Enter.
b. Select VLAN (Optional) and press Enter.
c. Enter 1611 as VLAN ID for the Management Network and press Enter.
Setting Value
IP 172.16.11.101
Page 10 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Hostname mgmt01esx01
Repeat all steps for all hosts in the management, compute, and edge pods. Enter the respective
values from the prerequisites section for each host that you configure.
Page 11 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password esxi_root_user_password
b. Click vSphere Standard Switch, and click Properties next to the vSwitch0.
c. In the vSwitch0 Properties window, click Add.
d. In the Add Network Wizard, on the Connection Type page, select VMkernel, and click
Next.
e. In the VMkernel - Connection Settings page, enter the following settings, and click Next.
Setting Value
VLAN ID 1613
f. In the VMkernel - IP Connection Settings page, enter the following settings, and click Next.
Page 12 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
IP Address 172.16.13.101
Setting Value
Password esxi_root_user_password
b. In the Time Configuration dialog box, select the NTP Client Enabled check box, and click
Options.
Page 13 of 545
VMware Validated Design Deployment Guide for Region A
c. In the NTP Daemon (ntpd) Options dialog box, select General on the left, and select Start
and stop with host as the Startup Policy.
d. In the NTP Daemon (ntpd) Options dialog box, select NTP Settings, and click Add.
e. Enter ntp.sfo01.rainpole.local and ntp.lax01.rainpole.local, and click OK.
f. Select the Restart NTP service to apply changes check box, and click OK.
Page 14 of 545
VMware Validated Design Deployment Guide for Region A
Modify the default Virtual SAN storage policy to force provisioning of Virtual SAN datastore
without generating errors.
esxcli vsan policy setdefault -c vdisk -p "((\"hostFailuresToTolerate\" i1)
(\"forceProvisioning\" i1))"
esxcli vsan policy setdefault -c vmnamespace -p "((\"hostFailuresToTolerate\"
i1) (\"forceProvisioning\" i1))"
esxcli vsan policy getdefault
List the devices and determine the device name for the SSD and HDD. These disks will be used
to provision the Virtual SAN datastore.
vdq -q
Identify all devices that can be used by Virtual SAN.
Page 15 of 545
VMware Validated Design Deployment Guide for Region A
IsSSD 1 0
Generate the Virtual SAN cluster UUID and create the Virtual SAN cluster.
python -c 'import uuid; print str(uuid.uuid4());'
Note You need the $UUID_GENERATED from the generated output for the next command.
esxcli vsan cluster join -u <UUID_GENERATED>
esxcli vsan cluster get
Page 16 of 545
VMware Validated Design Deployment Guide for Region A
Create Virtual SAN datastore using available SSD and HDD disks determined from previous step.
esxcli vsan storage add -s <SSD_Device_name> -d <HDD_Device Name>
Virtual SAN datastore is now created and ready for the Management vCenter Server installation.
Page 17 of 545
VMware Validated Design Deployment Guide for Region A
2.2.1 Deploy the External Platform Services Controller for the Management
vCenter Server in Region A
You must first install the external Platform Services Controller instance for the management cluster by
using the vCenter Server appliance ISO file.
Procedure
Log in to the Windows host that has access to your data center as an administrator.
Install the VMware Client Integration Plug-in.
a. Browse the vCenter Server Appliance ISO file.
b. Navigate to the vcsa directory.
c. Start the VMware-ClientIntegrationPlugin-x.x.x.exe file.
d. Follow the prompts and finish the installation.
Start the VMware vCenter Server Appliance Deployment Wizard.
a. Browse to the vCenter Server Appliance ISO file.
b. Open the vcsa-setup.html file in a Web browser.
c. Click Install to start the installation.
Page 18 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password esxi_root_user_password
c. In the Certificate Warning dialog box, click Yes to accept the host certificate.
d. On the Set up virtual machine page, enter the following settings, and click Next.
Setting Value
Page 19 of 545
VMware Validated Design Deployment Guide for Region A
OS password mgmtpsc_root_password
e. On the Select deployment type page, under External Platform Services Controller, select
the Install Platform Services Controller radio button, and click Next.
f. On the Set up Single Sign-on (SSO) page, select the Create a new SSO Domain radio
button, enter the following settings, and click Next.
Setting Value
Page 20 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Page 21 of 545
VMware Validated Design Deployment Guide for Region A
j. On the Ready to complete page, review the configuration, and click Finish to start the
deployment.
2.2.2 Join the Platform Services Controller for the Management vCenter
Server to the Active Directory in Region A
After you have successfully installed the Platform Services Controller instance, you must add the
appliance to your Active Directory domain. After that add the Active Directory domain as an identity
source to vCenter Single Sign-On. When you do, users in the Active Directory domain are visible to
vCenter Single Sign-On and can be assigned permissions to view or manage SDDC components.
Procedure
Log in to the Platform Services Controller administration interface.
a. Open a Web browser and go https://mgmt01psc01.sfo01.rainpole.local/psc.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Add the management Platform Services Controller instance to the Active Directory domain.
a. In the Navigator, click Appliance Settings, click the Manage tab, and click the Join button.
b. In the Join Active Directory Domain dialog box, enter the following settings, and click OK.
Setting Value
Domain sfo01.rainpole.local
Password ad_admin_password
Page 22 of 545
VMware Validated Design Deployment Guide for Region A
b. Log in to the VMware vCenter Server Appliance administration interface with the following
credentials.
Setting Value
Password mgmtpsc_root_password
Page 23 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
To verify that the Platform Services Controller successfully joined the domain, click Appliance
Settings, and click the Manage tab.
Setting Value
Page 24 of 545
VMware Validated Design Deployment Guide for Region A
d. Under Identity Sources, select the rainpole.local identity source, and click Set as Default
Domain to make rainpole.local the default domain.
Page 25 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password esxi_root_user_password
c. In the Certificate Warning dialog box, click Yes to accept the host certificate.
d. On the Set up virtual machine page, enter the following settings, and click Next.
Page 26 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
OS password mgmtvc_root_password
e. On the Select deployment type page, under External Platform Services Controller, select
the Install vCenter Server (Requires External Platform Services Controller) radio button
and click Next.
f. On the Configure Single Sign-On (SSO) page, enter the following values, and click Next.
Setting Value
Page 27 of 545
VMware Validated Design Deployment Guide for Region A
g. On the Select appliance size page, select Small (up to 100 hosts, 1,000 VMs), and click
Next.
h. On the Select datastore page, select the vsanDatastore datastore, select the Enable Thin
Disk Mode check box and click Next.
i. On the Configure database page, select Use an embedded database (PostgreSQL) radio
button and click Next.
j. On the Network Settings page, enter the following settings and click Next.
Page 28 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
k. On the Ready to complete page, review the configuration, and click Finish to start the
deployment.
Add new licenses for this vCenter Server instance and the management cluster ESXi hosts.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Page 29 of 545
VMware Validated Design Deployment Guide for Region A
f. On the Enter license keys page, enter license keys for vCenter Server and ESXi, one per
line, and click Next.
Page 30 of 545
VMware Validated Design Deployment Guide for Region A
g. On the Edit license name page, enter a descriptive name for each license key and click
Next.
h. On the Ready to complete page, review your entries and click Finish.
Assign the newly added licenses to the respective assets.
a. Click the Assets tab.
b. Select the vCenter Server instance, and click the Assign License icon.
Page 31 of 545
VMware Validated Design Deployment Guide for Region A
c. Select the vCenter Server license that you entered in the previous step, and click OK.
Assign the vCenterAdmins domain group to the vCenter Server Administrator role.
a. In the Navigator, click Home.
b. Click Hosts and Clusters.
c. Select the mgmt01vc01.sfo01.rainpole.local tree.
d. Click the Manage tab, click Permissions, and click the Add icon.
e. In the mgmt01vc01.sfo01.rainpole.local - Add Permission dialog box, click the Add button.
f. In the Select Users/Groups dialog box, select SFO01 from the Domain drop-down menu.
g. In the search box, enter vCenterAdmins and press Enter.
h. Select vCenterAdmins and click Add.
Page 32 of 545
VMware Validated Design Deployment Guide for Region A
i. Click OK.
j. In the mgmt01vc01.sfo01.rainpole.local - Add Permission dialog box, select
Administrator as Assigned Role and select the Propagate to children check box.
k. Click OK.
Page 33 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Name SFO01-Comp01
Page 34 of 545
VMware Validated Design Deployment Guide for Region A
c. On the Connection settings page, enter the following credentials, and click Next.
Setting Value
Password esxi_root_user_password
Page 35 of 545
VMware Validated Design Deployment Guide for Region A
e. On the Host summary page, review the host information, and click Next.
f. On the Assign license page, select the ESXi license key that you entered during the vCenter
Server deployment, and click Next.
g. On the Lockdown mode page, leave default, and click Next.
h. On the Resource pool page, leave default, and click Next.
i. On the Ready to complete page, review your entries, and click Finish.
Repeat the previous step for the three remaining hosts to add them to the management cluster.
Object FQDN
f. In the Join Domain dialog box, enter the following settings and click OK.
Setting Value
Domain sfo01.rainpole.local
Password ad_admin_password
Page 36 of 545
VMware Validated Design Deployment Guide for Region A
Repeat the previous step to add all remaining hosts to the domain.
Object FQDN
Page 37 of 545
VMware Validated Design Deployment Guide for Region A
h. Repeat the step to apply the Virtual SAN Default Storage Policy on the mgmt01vc01.sfo01
virtual machine.
Reset the Virtual SAN Storage Policy to default for the ESXi host that is used for Bootstrap.
a. Open an SSH connection to the ESXi host mgmt01esx01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password esxi_root_user_password
Page 38 of 545
VMware Validated Design Deployment Guide for Region A
c. Run the following command to determine the current Virtual SAN storage policy.
esxcli vsan policy getdefault
d. Modify the default Virtual SAN storage policy to force provisioning of Virtual SAN datastore.
esxcli vsan policy setdefault -c vdisk -p "((\"hostFailuresToTolerate\"
i1))"
esxcli vsan policy setdefault -c vmnamespace -p
"((\"hostFailuresToTolerate\" i1))"
esxcli vsan policy getdefault
Setting Value
Password vsphere_admin_password
Page 39 of 545
VMware Validated Design Deployment Guide for Region A
c. On the Name and location page, enter vDS-Mgmt as the name, and click Next.
d. On the Select version page, ensure the Distributed switch version - 6.0.0 radio button is
selected, and click Next.
e. On the Edit settings page, enter the following settings, and click Next.
Setting Value
Number of uplinks 2
f. On the Ready to complete page, review your entries, and click Finish.
Edit the settings of the vDS-Mgmt distributed switch.
a. Right-click the vDS-Mgmt distributed switch, and select Settings > Edit Settings.
b. Click the Advanced tab.
c. Enter 9000 as MTU (Bytes) value, and click OK.
Create port groups in the vDS-Mgmt distributed switch for the management traffic types.
a. Right-click the vDS-Mgmt distributed switch, and select Distributed Port Group > New
Distributed Port Group.
b. Create port groups with the following settings, and click Next.
Note The port group for VXLAN traffic is automatically created later during the configuration of the
NSX Manager for the management cluster.
Page 40 of 545
VMware Validated Design Deployment Guide for Region A
c. On the Ready to complete page, review your entries, and click Finish.
Change the port groups to use the Route Based on Physical NIC Load teaming algorithm.
a. Right-click the vDS-Mgmt distributed switch and select Distributed Port Group > Manage
Distributed Port Groups.
b. On the Select port group policies page, select Teaming and failover and click Next.
c. Click the Select distributed port groups button, add all port groups and click Next.
d. On the Teaming and failover page, select Route based on physical NIC load from the
Load balancing drop-down menu, and click Next.
Page 41 of 545
VMware Validated Design Deployment Guide for Region A
e. Click Finish.
Connect the ESXi hosts to the vDS-Mgmt distributed switch by migrating their VMkernel and
virtual machine network adapters.
a. Right-click the vDS-Mgmt distributed switch, and click Add and Manage Hosts.
b. On the Select task page, select Add hosts, and click Next
Page 42 of 545
VMware Validated Design Deployment Guide for Region A
g. On the Select network adapter tasks page, ensure that both Manage physical adapters
(Template mode) and Manage VMkernel adapters (template mode) check boxes are
checked, and click Next.
h. On the Manage physical network adapters (template mode) page, click vmnic1, and click
Assign uplink.
i. In the Select an Uplink for vmnic1 dialog box, select Uplink 1, and click OK.
j. On the Manage physical network adapters (template mode) page, click Apply to all, and
click Next.
Configure the VMkernel network adapters, edit the existing, and add new adapters as needed.
a. On the Manage VMkernel network adapters (template mode) page, click vmk0, and
click Assign port group.
b. Select vDS-Mgmt-Management, and click OK.
c. On the Manage VMkernel network adapters (template mode) page, select vmk0 and click
Edit adapter.
d. In vmk0 - Edit Settings page, under Port properties and select the Management traffic
check box.
e. In vmk0 - Edit Settings page, click NIC Settings, enter an MTU value of 1500 and click OK.
f. On the Manage VMkernel network adapters (template mode) page, click On this switch
and click New adapter.
g. On the Add Networking page, select Select an existing network, browse to select the vDS-
Mgmt-vMotion port group, click OK, and click Next.
h. On the Port properties page, select the vMotion traffic check box, and click Next.
i. On the IPv4 settings page, select Use static IPv4 settings, enter IP address
172.16.12.101, subnet 255.255.255.0, and click Next.
j. Click Finish.
A vmk1 adapter is created.
k. On the Manage VMkernel network adapters (template mode) page, select vmk1, and click
Edit adapter.
l. In vmk1 - Edit Settings page, click NIC Settings, enter an MTU value of 9000, and click OK.
Page 43 of 545
VMware Validated Design Deployment Guide for Region A
m. Repeat steps 7.h. - 7.n. to create the remaining VMkernel network adapters.
n. In the Manage physical network adapters (template mode) page, click Apply to all.
o. In the mgmt01esxi01...configuration to other hosts dialog box, enter the IPv4 addresses
for each of the VMkernel adapters, and click OK
vmk0 172.16.11.102#3
vmk1 172.16.12.102#3
vmk2 172.16.13.102#3
vmk3 172.16.15.102#3
vmk4 172.16.16.102#3
Page 44 of 545
VMware Validated Design Deployment Guide for Region A
q. On the Ready to complete page, review your entries, and click Finish.
Migrate the Management Platform Services Controller and vCenter Server instances from the
standard switch to the distributed switch.
a. Right-click the vDS-Mgmt distributed switch, and click Migrate VM to Another Network.
b. On the Select source and destination networks page, browse the following networks, and
click Next.
Page 45 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
j. Click OK.
Page 46 of 545
VMware Validated Design Deployment Guide for Region A
Page 47 of 545
VMware Validated Design Deployment Guide for Region A
Migrate the last physical adapter from the standard switch to the vDS-Mgmt distributed switch.
a. In the Navigator, click Networking and expand the SFO01 data center.
b. Right-click the vDS-Mgmt distributed switch and select Add and Manage Hosts.
c. On the Select task page, select Manage host networking, and click Next.
d. On the Select hosts page, click Attached hosts.
e. In the Select member hosts dialog box, select all ESXi hosts, and click OK.
f. On the Select hosts page, click Next.
g. On the Select network adapter tasks page, select Manage physical adapters, and click
Next.
h. On the Manage physical network adapters page, under
mgmt01esx01.sfo01.rainpole.local, select vmnic0, and click Assign uplink.
i. In the Select an Uplink dialog box, select dvUplink2, and click OK.
j. Assign uplinks for the 3 remaining hosts to reassign their physical adapters to the distributed
switch, and click Next.
k. On the Analyze Impact page, click Next.
l. On the Ready to complete page, click Finish.
Page 48 of 545
VMware Validated Design Deployment Guide for Region A
2.2.6 Change the Default Domain Administration Group on the ESXi Hosts in
the Management Cluster in Region A
Change the default ESX Admins group to achieve greater levels of security by removing a known
administrative access point.
Procedure
Log in to vCenter Server, by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Repeat the process for all remaining hosts in the management cluster.
Page 49 of 545
VMware Validated Design Deployment Guide for Region A
Object FQDN
Setting Value
Password vsphere_admin_password
Page 50 of 545
VMware Validated Design Deployment Guide for Region A
Option Value
Folder /V2D_vDP_MgmtA_4TB
Server 172.16.15.251
g. On the Host accessibility page, select all the hosts that require access to the datastore, and
click Next.
Page 51 of 545
VMware Validated Design Deployment Guide for Region A
h. On the Ready to complete page, review the configuration, and click Finish.
Setting Value
Password vsphere_admin_password
Page 52 of 545
VMware Validated Design Deployment Guide for Region A
d. In the New Folder dialog box, enter vRA01 as name, and click OK.
e. Repeat the step to create the remaining folders.
Page 53 of 545
VMware Validated Design Deployment Guide for Region A
2.3.1 Deploy the NSX Manager for the Management Cluster NSX Instance in
Region A
You must first deploy the NSX Manager virtual appliance. After the NSX Manager is successfully
deployed you must connect it to the Management vCenter Server instance.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
d. In the mgmt01vc01.sfo01.rainpole.local - Add Permission dialog box, click the Add button.
e. In the Select Users/Groups dialog box, select RAINPOLE from the Domain drop-down
menu.
Page 54 of 545
VMware Validated Design Deployment Guide for Region A
h. Click OK.
i. In the mgmt01vc01.sfo01.rainpole.local - Add Permission dialog box, select
Administrator as Assigned Role and select the Propagate to children check box.
j. Click OK.
Open the Deploy OVF Template wizard.
a. In the Navigator, expand the entire mgmt01vc01.sfo01.rainpole.local tree
b. Right-click the SFO01-Mgmt01 cluster, and click Deploy OVF Template.
Page 55 of 545
VMware Validated Design Deployment Guide for Region A
Use the Deploy OVF Template wizard to deploy the NSX Manager virtual appliance.
a. On the Select source page, click the Browse button, select the VMware NSX Manager .ova
file, and click Next.
b. On the Review details page, select the Accept extra configuration option check box, and
click Next.
c. On the Accept License Agreements page, click Accept, and then click Next.
d. On the Select name and folder page, enter the following settings, and click Next.
Setting Value
Name mgmt01nsxm01.sfo01
e. On the Select storage page, enter the following settings and click Next.
Page 56 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Datastore SFO01A-VSAN01-MGMT01
f. On the Setup networks page, under Destination, select vDS-Mgmt-Management and click
Next.
g. On the Customize template page, expand all options, enter the following settings, and click
Next.
Setting Value
Hostname mgmt01nsxm01.sfo01.rainpole.local
Page 57 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
h. On the Ready to complete page, select the Power on after deployment check box, and
click Finish.
Setting Value
Password mgmtnsx_admin_password
Setting Value
Page 58 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Password svc-nsxmanager_password
Setting Value
Password svc-nsxmanager_password
Page 59 of 545
VMware Validated Design Deployment Guide for Region A
Log out from the Management vCenter Server session in the vSphere Web Client.
Page 60 of 545
VMware Validated Design Deployment Guide for Region A
2.3.2 Deploy the NSX Controllers for the Management Cluster NSX Instance in
Region A
After the NSX Manager is successfully connected to the Management vCenter Server, you deploy
three NSX Controller nodes that form the NSX Controller cluster. Deploy every node only after the
previous one is successfully deployed.
Procedure
Log in to the Management vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Page 61 of 545
VMware Validated Design Deployment Guide for Region A
c. Click the Manage tab, click Grouping Objects, click IP Pools, and click the Add New IP
Pool icon.
d. In the Add Static IP Pool dialog box, enter the following settings, and click OK.
Setting Value
Name Mgmt01-NSXC01
Gateway 172.16.11.253
Prefix Length 24
Note You configure a password only during the deployment of the first controller. The other
controllers will use the same password.
Setting Value
Datacenter SFO01
Datastore SFO01A-VSAN01-MGMT01
Connected To vDS-Mgmt-Management
IP Pool Mgmt01-NSXC01
Password mgmtnsx_controllers_password
Page 62 of 545
VMware Validated Design Deployment Guide for Region A
d. After the Status of the controller node changes to Normal, repeat the step and deploy the
remaining two NSX Controller nodes in the controller cluster with the same configuration.
Configure DRS affinity rules for the NSX Controller nodes.
a. Go back to the Home page.
b. In the Navigator, click Hosts and Clusters, and expand the
mgmt01vc01.sfo01.rainpole.local tree.
c. Select the SFO01-Mgmt01 cluster, and click the Manage tab.
d. Under Configuration, click VM/Host Rules.
e. Click Add.
f. In the SFO01-Mgmt01 - Create VM/Host Rule dialog box, enter the following settings, and
click Add.
Setting Value
Name Mgmt_NSX_Controllers
g. In the Add Rule Member dialog box, select the check box next to each of the three NSX
Controller virtual machines, and click OK.
h. In the SFO01-Mgmt01 - Create VM/Host Rule dialog box, click OK.
2.3.3 Prepare the ESXi Hosts in the Management Cluster for NSX in Region A
You must install the NSX kernel modules on the management cluster ESXi hosts to be able to use
NSX.
Procedure
Page 63 of 545
VMware Validated Design Deployment Guide for Region A
Log in to the Management vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Install the NSX kernel modules on the management cluster ESXi hosts.
a. In the Navigator, click Networking & Security.
b. In the Navigator, click Installation, and click the Host Preparation tab.
c. Select 172.16.11.65 from the NSX Manager drop-down menu.
d. Under Installation Status, click Install for SFO01-Mgmt01 clusters
Verify that the Installation Status column shows the NSX version for all hosts in the cluster to
confirm that NSX kernel modules are successfully installed.
2.3.4 Configure the NSX Logical Network for the Management Cluster in
Region A
After all the deployment tasks are ready, you must configure the NSX logical network. Complete this
process in three main steps:
Configure the Segment ID allocation.
Configure the VXLAN networking.
Configure the transport zone.
Procedure
Log in to the Management vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
Page 64 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Page 65 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Switch vDS-Mgmt
VLAN 1614
MTU 9000
VTEP 2
Setting Value
Page 66 of 545
VMware Validated Design Deployment Guide for Region A
Mark this object for Universal Synchronization Yes (select check box)
Page 67 of 545
VMware Validated Design Deployment Guide for Region A
2.3.5.1. Create a Universal Logical Switch for Use as the Transit Network in Region A
Create a Universal Logical Switch for use as the Transit Network
Procedure
Log in to the Management vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Page 68 of 545
VMware Validated Design Deployment Guide for Region A
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Page 69 of 545
VMware Validated Design Deployment Guide for Region A
On the Name and description page, enter the following settings, and click Next.
On the Settings page, enter the following settings, and click Next.
Setting Value
Password edge_admin_password
On the Configure deployment page, select the Large radio button to specify the Appliance
Size, and click the Add icon.
The Add NSX Edge Appliance dialog box appears.
In the Add NSX Edge Appliance dialog box, enter the following settings, and click OK.
Setting Value
Datastore SFO01A-VSAN01-MGMT01
Page 70 of 545
VMware Validated Design Deployment Guide for Region A
Click Next.
On the Configure Interfaces page, click the Add icon to configure the Uplink01 interface, enter
the following settings, and click OK.
Click the Add icon once again to configure the Uplink02 interface, enter the following settings,
and click OK.
Page 71 of 545
VMware Validated Design Deployment Guide for Region A
Click the Add icon a third time to configure the UDLR interface, enter the following settings, and
click OK.
Click Next.
On the Default gateway settings page, deselect the Configure Default Gateway check box,
and click Next.
On the Firewall and HA page, click Next.
On the Ready to complete page, review the configuration settings you entered, and click Finish.
Page 72 of 545
VMware Validated Design Deployment Guide for Region A
Repeat this procedure using the settings for the NSX Edge device labeled SFOMGMT-ESG02.
Upon repeating the procedure to configure SFOMGMT-ESG02, the Ready to complete page in
the New NSX Edge wizard will display the configuration values shown in the following illustration.
Page 73 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Procedure
Log in to the Management vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Page 74 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Local AS 65003
Page 75 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Weight 60
Keep Alive Time 4 The keep alive value set on the first Top of
Rack Switch.
Hold Down 12 The hold down time set on the first Top of
Time Rack Switch.
Password BGP_password
Page 76 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Weight 60
Keep Alive Time 4 The keep alive value set on the first Top of
Rack Switch.
Hold Down 12 The hold down time set on the first Top of
Time Rack Switch.
Password BGP_password
Page 77 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
IP Address 192.168.10.4
Remote AS 65003
Weight 60
Hold Down 3
Time
Password BGP_password
Page 78 of 545
VMware Validated Design Deployment Guide for Region A
Page 79 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Prefix Any
Learner BGP
Protocol
OSPF Deselected
ISIS Deselected
Connected Selected
Action Permit
Page 80 of 545
VMware Validated Design Deployment Guide for Region A
The route redistribution configuration is now visible in the Route Redistribution table. Confirm
that the configuration values you entered are correct.
Setting Value
Page 81 of 545
VMware Validated Design Deployment Guide for Region A
Password edge_admin_password
Run the show ip bgp neighbors command to display information about the BGP connections
to neighbors.
The BGP State will display Established, UP if you have peered with the upstream switches.
Note You have not yet created the Universal Distributed Logical Router (UDLR), so it will not
display the Established, UP status message.
Run the show ip route command to verify that you are receiving routes using BGP, and that
there are multiple routes to BGP learned networks.
You verify multiple routes to BGP learned networks by locating the same route using a different IP
address. The IP addresses are listed after the word via in the right-side column of the routing
table output. In the image below there are two different routes to the following BGP networks:
0.0.0.0/0 and 172.27.22.0/24.
You can identify BGP networks by the letter B in the left-side column. Lines beginning with C
(connected) have only a single route.
Page 82 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Name UDLR01
Page 83 of 545
VMware Validated Design Deployment Guide for Region A
On the Settings page, enter the following settings, and click Next.
Setting Value
Password udlr_admin_password
Setting Value
Datastore SFO01A-VSAN01-MGMT01
Page 84 of 545
VMware Validated Design Deployment Guide for Region A
On the Configure deployment page, and click the Add icon a second time to add a second NSX
Edge device.
The Add NSX Edge Appliance dialog box appears.
In the Add NSX Edge Appliance dialog box, enter the following settings, and click OK.
Setting Value
Datastore SFO01A-VSAN01-MGMT01
Page 85 of 545
VMware Validated Design Deployment Guide for Region A
On the Configure interfaces page, under HA Interface Configuration, click Change and
connect to vDS-Mgmt-Management.
On the Configure interfaces page enter the following configuration settings, and click Next.
a. Click the Add icon.
The Add Interface dialog box appears.
b. Enter the following settings in the Add Interface dialog box, and click OK.
Setting Value
Name Uplink
Type Uplink
MTU 9000
Page 86 of 545
VMware Validated Design Deployment Guide for Region A
In the Default gateway settings page, deselect Configure Default Gateway, and click Next.
In the Ready to complete page, click Finish.
2.3.5.7. Configure Universal Distributed Logical Router for Dynamic Routing in Region A
Configure the universal distributed logical router (UDLR) to use dynamic routing.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
Page 87 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Page 88 of 545
VMware Validated Design Deployment Guide for Region A
Local AS 65003
Weight 60 60
Page 89 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
OSPF Deselected
BGP Selected
On the Route Redistribution page, select the default OSPF entry and click the Edit button.
Select BGP from the Learner Protocol drop-down menu, and click OK.
Page 90 of 545
VMware Validated Design Deployment Guide for Region A
2.3.5.8. Verify Establishment of BGP for the Universal Distributed Logical Router in Region A
The universal distributed logical routers (UDLR) needs to establish a connection to Edge Services
Gateway before BGP updates can be exchanged. Verify that the UDLR is successfully peering, and
that BGP routing has been established.
Procedure
Log in to the UDLR by using a Secure Shell (SSH) client.
a. Open an SSH connection to UDLR01, the UDLR whose peering and BGP configuration you
want to verify.
b. Log in using the following credentials.
Setting Value
Password udlr_admin_password
Run the show ip bgp neighbors command to display information about the BGP and TCP
connections to neighbors. The BGP State will display Established, UP if you have
successfully peered with the Edge Service Gateway.
Run the show ip route command to verify that you are receiving routes using BGP, and that
there are multiple routes to BGP learned networks.
You verify multiple routes to BGP learned networks by locating the same route using a different IP
address. The IP addresses are listed after the word via in the right-side column of the routing
table output. In the image below there are two different routes to the following BGP networks:
0.0.0.0/0, 172.27.11.0/24,172.27.12.0/24, and 172.27.22.0/24.
Page 91 of 545
VMware Validated Design Deployment Guide for Region A
You can identify BGP networks by the letter B in the left-side column. Lines beginning with C
(connected) have only a single route.
Page 92 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Page 93 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Create a Universal Logical Switch for workloads that move between sites.
a. Under Inventories, click Networking & Security.
b. In the Navigator, click Logical Switches.
c. Select 172.16.11.65 from the NSX Manager drop-down menu.
d. Click the Add icon to create a new Logical Switch.
e. In the New Logical Switch dialog box, enter the following settings, and click OK.
Setting Value
Name Mgmt-xRegion01-VXLAN
Create a Universal Logical Switch for workloads that are specific to Region A.
a. Under Inventories, click Networking & Security.
b. In the Navigator, click Logical Switches.
Page 94 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Name Mgmt-RegionA01-VXLAN
Setting Value
Name Mgmt-xRegion01
Type Internal
Page 95 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Name Mgmt-RegionA01
Type Internal
Page 96 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Password vsphere_admin_password
Setting Value
Page 97 of 545
VMware Validated Design Deployment Guide for Region A
Name SFOMGMT-LB01
On the Settings page, enter the following settings, and click Next.
Setting Value
Password edge_admin_password
On the Configure deployment page, perform the following configuration steps, and click Next.
a. Select SFO01 from the Datacenter drop-down menu.
b. Select the Large radio button to specify the Appliance Size.
c. Click the Add icon, enter the following settings, and click OK.
Page 98 of 545
VMware Validated Design Deployment Guide for Region A
Setting Value
Datastore SFO01A-VSAN01-MGMT01
d. To create a second appliance, click the Add icon again, make the same selections in the New
NSX Appliance dialog box, and click OK.
On the Configure Interfaces page, click the Add icon to configure the OneArmLB interface,
enter the following settings, and click OK.
Setting Value
Name OneArmLB
Type Internal
Connected To Mgmt-xRegion01-VXLAN
MTU 9000
Page 99 of 545
VMware Validated Design Deployment Guide for Region A
Click Next.
On the Default gateway settings page, enter the following settings, and click Next.
Setting Value
Gateway IP 192.168.11.1
MTU 9000
On the Firewall and HA page, select the following settings, and click Next.
Setting Value
Logging Disable
vNIC any
On the Ready to complete page, review the configuration settings you entered, then click Finish.
In the Edit load balancer global configuration dialog box, select Enable Load Balancer and
click OK.
2.4.1 Deploy the External Platform Services Controller for the Compute
vCenter Server in Region A
You must first install the external Platform Services Controller instance for the compute cluster by
using the vCenter Server appliance ISO file.
Procedure
Log in to the Windows host that has access to your data center as an administrator.
Start the VMware vCenter Server Appliance Deployment wizard.
a. Browse to the vCenter Server Appliance .iso file.
b. Open the vcsa-setup.html file in a Web browser.
c. Click Install to start the installation.
b. On the Connect to target server page, enter the following settings, and click Next.
Setting Value
Password esxi_root_user_password
c. In the Certificate Warning dialog box, click Yes to accept the host certificate.
d. On the Set up virtual machine page, enter the following settings, and click Next.
Setting Value
OS password comppsc_root_password
e. On the Select deployment type page, under External Platform Services Controller, select
the Install Platform Services Controller radio button, and click Next.
f. On the Set up Single Sign-on (SSO) page, select the Join an SSO domain in an existing
vCenter 6.0 platform services controller radio button, enter the following settings, and
click Next.
Setting Value
Port 443
g. On the Single Sign-on site page, select the Join an existing site radio button,
select SFO01 from the drop-down list, and click Next.
h. On the Select appliance size page, click Next, as there is only one appliance size for the
Platform Services Controller.
i. On the Select datastore page, select the SFO01A-VSAN01-MGMT01 datastore to deploy
the Platform Services Controller on, select the Enable Thin Disk Mode check box, and
click Next.
j. On the Network Settings page, enter the following settings, and click Next.
Setting Value
k. On the Ready to complete page, review the configuration, and click Finish to start the
deployment.
2.4.2 Join the Platform Services Controller for the Compute vCenter Server to
the Active Directory in Region A
After you have successfully installed the external Platform Services Controller for the compute cluster,
you must join it to the Active Directory.
Procedure
Log in to the Platform Services Controller administration interface.
a. Open a Web browser and go to https://comp01psc01.sfo01.rainpole.local/psc.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Add the Compute Platform Services Controller instance to the Active Directory domain.
a. In the Navigator, click Appliance Settings, click the Manage tab, and click the Join button.
b. In the Join Active Directory Domain dialog box, enter the following settings, and click OK.
Setting Value
Domain sfo01.rainpole.local
Password ad_admin_password
b. Log in to the VMware vCenter Server Appliance administration interface using the following
credentials.
Setting Value
Password comppsc_root_password
Setting Value
Password vsphere_admin_password
To verify that the Platform Services Controller successfully joined the domain, click Appliance
Settings, and click the Manage tab.
Setting Value
Password esxi_root_user_password
c. In the Certificate Warning dialog box, click Yes to accept the host certificate.
d. On the Set up virtual machine page, enter the following settings, and click Next.
Setting Value
OS password compvc_root_password
e. On the Select deployment type page, under External Platform Services Controller, select
the Install vCenter Server (Requires External Platform Services Controller) radio button,
and click Next.
f. On the Configure Single Sign-On (SSO) page, enter the following values, and click Next.
Setting Value
g. On the Select appliance size page, select Large (up to 1,000 hosts, 10,000 VMs), and
click Next.
i. On the Configure database page, select Use an embedded database (PostgreSQL) radio
button, and click Next.
j. On the Network Settings page, enter the following settings, and click Next.
Setting Value
k. On the Ready to complete page, review the configuration, and click Finish to start the
deployment.
Log in to the Compute vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Assign new licenses for this vCenter Server instance and the compute and edge clusters ESXi
hosts, if a license was not assigned during Management vCenter Server deployment.
a. In the Navigator, click Home.
b. Click Licensing.
c. Click the Licenses tab.
Note Verify that you have the licenses required for this functionality. Talk to your VMware
representative for details.
f. Select the vCenter Server instance, and click the Assign License icon.
g. Select the vCenter Server license that you entered in the previous step, and click OK.
Assign the vCenter Server Administrator role to the vCenterAdmins domain group.
a. In the Navigator, click Home.
b. Click Hosts and Clusters.
c. Select the comp01vc01.sfo01.rainpole.local tree.
d. Click the Manage tab, click Permissions, and click the Add icon.
e. In the comp01vc01.sfo01.rainpole.local - Add Permission dialog box, click the Add button.
f. In the Select Users/Groups dialog box, select SFO01 from the Domain drop-down menu.
g. In the search box, enter vCenterAdmins, and press Enter.
h. Select vCenterAdmins, and click Add.
i. Click OK.
j. In the comp01vc01.sfo01.rainpole.local - Add Permission dialog box, select
Administrator as Assigned Role and select the Propagate to children check box.
k. Click OK.
Setting Value
Password vsphere_admin_password
Setting Value
Name SFO01-Comp01
Setting Value
Name SFO01-Edge01
c. On the Connection settings page, enter the following credentials, and click Next.
Setting Value
Password esxi_root_user_password
Object FQDN
Object FQDN
f. In the Join Domain dialog box, enter the following settings and click OK.
Setting Value
Domain sfo01.rainpole.local
Password ad_admin_password
Object FDQN
Object FDQN
d. In the Configure Virtual SAN dialog box, select Automatic in the Disk Claiming drop-down
menu, and click Next.
e. Verify that all hosts have Virtual SAN enabled VMkernel adapters and click Next.
2.4.5 Create a vSphere Distributed Switch for the Compute Cluster in Region
A
After all ESXi hosts have been added to the clusters, create vSphere Distributed Switches. Start with
creating the switch for the compute cluster.
Procedure
Log in to the Compute vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Number of uplinks 2
f. On the Ready to complete page, review your entries, and click Finish.
Edit the settings of the vDS-Comp distributed switch.
a. Right-click the vDS-Comp distributed switch, and select Settings > Edit Settings.
b. Click the Advanced tab.
c. Enter 9000 as MTU (Bytes) value, and click OK.
Create new port groups in the vDS-Comp distributed switch.
a. Right-click the vDS-Comp distributed switch, and select Distributed Port Group > New
Distributed Port Group.
b. Create port groups with the following settings, and click Next.
Note The port group for VXLAN traffic is automatically created later during the configuration of the
NSX Manager for the compute and edge clusters.
c. On the Ready to complete page, review your entries, and click Finish.
Change the port groups to use the Route Based on Physical NIC Load teaming algorithm.
a. Right-click the vDS-Comp distributed switch and select Distributed Port Groups > Manage
Distributed Port Groups.
b. Select Teaming and failover and click Next.
c. Click the Select Distributed Port Groups button, add all port groups and click Next.
d. Select Route based on on physical NIC load under Load Balancing and click Next.
Attach the ESXi hosts to the vDS-Comp distributed switch by migrating their VMkernel and virtual
machine network adapters.
a. Right-click the vDS-Comp distributed switch, and click Add and Manage Hosts.
b. On the Select task page, select Add hosts, and click Next.
k. On the Manage VMkernel network adapters (template mode) page, click vmk0, and
click Assign port group.
vmk0 172.16.21.102#3
vmk1 172.16.22.102#3
vmk2 172.16.25.102#3
e. In the Edit Cluster Settings dialog box, under Virtual Machine Monitoring, select VM
Monitoring Only from the drop-down menu.
f. Under Virtual Machine Monitoring, expand the Admission Control settings.
g. Under Admission Control settings, select Define failover capacity by reserving a
percentage of the cluster resources, and enter the following settings.
Setting Value
h. Click OK.
Upgrade Network I/O Control to version 3.
a. In the Navigator, click Networking, and click the SFO01 data center.
b. Click the vDS-Comp distributed switch.
c. Click the Manage tab and click Resource Allocation.
d. Click the Upgrade link next to Version: 2.
e. Click Next in the Upgrade Network I/O Control Overview dialog.
f. Click Next in the Upgrade Network I/O Control Validate prerequisites dialog.
g. Click Finish in the Upgrade Network I/O Control Ready to complete dialog.
Define Network I/O Control shares for the different traffic types on the vDS-Comp distributed
switch.
a. In the Navigator, click the Networking icon, and click the SFO01 data center.
b. Click the vDS-Comp distributed switch.
c. Click the Manage tab, and click Resource Allocation.
d. Under System Traffic, edit each of the following traffic types with the values.
Migrate the last physical adapter from the standard switch to the vDS-Comp distributed switch.
a. In the Navigator, click Networking and expand SFO01 data center.
b. Right-click the vDS-Comp distributed switch and select Add and Manage hosts.
c. On the Select task page, select Manage host networking, and click Next.
d. On the Select hosts page, click Attached hosts.
e. In the Select member hosts dialog box, select all ESXi hosts, and click OK.
f. On the Select hosts page, click Next.
g. On the Select network adapter tasks page, select Manage Physical adapters only, and
click Next.
h. On the Manage physical network adapters page, under
comp01esx01.sfo01.rainpole.local, select vmnic0, and click Assign uplink.
i. In the Select an Uplink dialog box, select dvUplink2, and click OK.
j. Assign uplinks for the 3 remaining hosts to reassign their vmnics, and click Next.
k. On the Analyze Impact page, click Next.
l. On the Ready to complete page, click Finish.
2.4.6 Create a vSphere Distributed Switch for the Edge Cluster in Region A
After the vSphere distributed switch for the compute cluster is configured, create vSphere distributed
switch for the edge cluster.
Procedure
Log in to the Compute vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Number of uplinks 2
f. On the Ready to complete page, review your entries, and click Finish.
Edit the settings of the vDS-Edge distributed switch.
a. Right-click the vDS-Edge distributed switch, and select Settings > Edit Settings.
b. Click the Advanced tab.
c. Enter 9000 as MTU (Bytes) value, and click OK.
Create new port groups in the vDS-Edge distributed switch.
a. Right-click the vDS-Edge distributed switch, and select Distributed Port Group > New
Distributed Port Group.
b. Create port groups with the following settings.
Note VXLAN port group will be created later during NSX Manager (Compute Cluster)
configuration.
c. On the Ready to complete page, review your entries, and click Finish.
Change Port Groups to use the Route Based on Physical NIC Load teaming algorithm.
a. Right-click the vDS-Comp Distributed Switch and select Distributed Port Groups > Manage
Distributed Port Groups.
b. Select Teaming and failover and click Next.
c. Click the Select Distributed Port Groups button and add all port groups and click Next.
d. Select Route based on on physical NIC load under Load Balancing and click Next.
e. Click Finish.
Attach the ESXi hosts to the vDS-Edge distributed switch by migrating their VMkernel and virtual
machine network adapters.
a. Right-click the vDS-Edge distributed switch, and click Add and Manage Hosts.
b. On the Select task page, select Add hosts, and click Next.
k. On the Manage VMkernel network adapters (template mode) page, click vmk0, and
click Assign port group.
vmnic Source Port Group Destination port group Port Properties MTU
vmk0 172.16.31.102#3
vmk1 172.16.32.102#3
vmk2 172.16.33.102#3
e. In the Edit Cluster Settings dialog box, under Virtual Machine Monitoring, select VM
Monitoring Only from the drop-down menu.
f. Under Virtual Machine Monitoring, expand the Failure conditions and VM response
setting.
g. Select Power off and restart VMs from the Response for Host Isolation drop-down menu.
Setting Value
j. Click OK.
Upgrade Network I/O Control to version 3.
a. In the Navigator, click Networking, and click the SFO01 data center.
b. Click the vDS-Edge distributed switch.
c. Click the Manage tab and click Resource Allocation.
d. Click the Upgrade link next to Version: 2.
e. Click Next in the Upgrade Network I/O Control Overview dialog.
f. Click Next in the Upgrade Network I/O Control Validate prerequisites dialog.
g. Click Finish in the Upgrade Network I/O Control Ready to complete dialog.
Define Network I/O Control Share values for the different traffic types on the vDS-
Edge distributed switch.
a. In the Navigator, click the Networking icon, and click the SFO01 data center.
b. Click the vDS-Edge distributed switch.
c. Click the Manage tab, and click Resource Allocation.
d. Under System Traffic, edit each of the following traffic types with the values from the table.
Migrate the last physical adapter from the standard switch to the vDS-Edge distributed switch.
a. In the Navigator, click Networking and expand SFO01 datacenter.
b. Right-click the vDS-Edge distributed switch and select Add and Manage hosts.
c. On the Select task page, select Manage host networking, and click Next.
d. On the Select hosts page, click Attached hosts.
e. In the Select member hosts dialog box, select all four ESXi hosts, and click OK.
f. On the Select hosts page, click Next.
g. On the Select network adapter tasks page, select Manage Physical adapters only, and
click Next.
h. On the Manage physical network adapters page, under
edge01esx01.sfo01.rainpole.local, select vmnic0, and click Assign uplink.
i. In the Select an Uplink dialog box, select dvUplink2, and click OK.
j. Assign uplinks for the 3 remaining hosts to reassign their vmnics, and click Next.
k. On the Analyze Impact page, click Next.
l. On the Ready to complete page, click Finish.
2.4.7 Change the Default Domain Administration Group on the ESXi Hosts in
the Compute and Edge Clusters in Region A
Change the default ESX Admins group to achieve greater levels of security by removing a known
administrative access point.
Procedure
Log in to the Compute vCenter Server, by using the vSphere Web Client.
a. Open a Web browser and go
to https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Repeat the steps for all remaining hosts in the compute and edge clusters.
Object FQDN
Setting Value
Password vsphere_admin_password
Setting Value
Folder /V2D_vRA_ComputeA_1TB
Server 172.16.25.251
g. On the Host accessibility page, select all the hosts that require access to the datastore, and
click Next.
h. On the Ready to complete page, review the configuration, and click Finish.
Setting Value
Password vsphere_admin_password
f. In the Lockdown Mode dialog box, select the Normal radio button, and click OK.
Repeat the previous step to enable normal lockdown mode for all remaining hosts in the data
center.
Object FQDN
2.5 Deploy and Configure the Compute and Edge Clusters NSX
Instance in Region A
Deploy the NSX Manager for the Compute and Edge Clusters NSX Instance in Region A
Deploy the NSX Controllers for the Compute and Edge Clusters NSX Instance in Region A
Prepare the ESXi Hosts in the Compute and Edge Clusters for NSX in Region A
Configure the NSX Logical Network for the Compute and Edge Clusters in Region A
Configure NSX Dynamic Routing in Compute and Edge Clusters in Region A
2.5.1 Deploy the NSX Manager for the Compute and Edge Clusters NSX
Instance in Region A
You must first deploy the NSX Manager virtual appliance. After the NSX Manager is successfully
deployed you must connect it to the Management vCenter Server instance.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
d. In the comp01vc01.sfo01.rainpole.local - Add Permission dialog box, click the Add button.
e. In the Select Users/Groups dialog box, select RAINPOLE from the Domain drop-down
menu.
f. In the search text box, enter svc-nsxmanager, and press Enter.
The svc-nsxmanager is returned in the search results.
g. Select svc-nsxmanager, click the Add button, and click OK.
Use the Deploy OVF Template wizard to deploy the NSX Manager virtual appliance.
a. On the Select source page, click the Browse button, select the VMware NSX Manager .ova
file, and click Next.
b. On the Review details page, select the Accept extra configuration option check box, and
click Next.
c. On the Accept License Agreements page, click Accept, and click Next.
d. On the Select name and folder page, enter the following settings, and click Next.
Setting Value
Name comp01nsxm01.sfo01
e. On the Select storage page, enter the following settings, and click Next.
Setting Value
Datastore SFO01A-VSAN01-MGMT01
Setting Value
Hostname comp01nsxm01.sfo01.rainpole.local
h. On the Ready to complete page, select the Power on after deployment check box, and
click Finish.
Setting Value
Password compnsx_admin_password
Setting Value
Password vsphere_admin_password
Setting Value
Password svc-nsxmanager_password
Setting Value
Password svc-nsxmanager_password
Log out from the vCenter Server session in the vSphere Web Client.
2.5.2 Deploy the NSX Controllers for the Compute and Edge Clusters NSX
Instance in Region A
After the NSX Manager is successfully connected to the Compute vCenter Server, you must deploy
the three NSX Controller nodes that form the NSX Controller cluster. It is important to deploy every
node only after the previous one is successfully deployed.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Using a Web browser go to https://comp01vc01.sfo01.rainpole.local/vsphere-
client.
b. Log in with the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Name Edge01-NSXC01
Gateway 172.16.31.253
Prefix Length 24
c. In the Add Controller page, enter the following settings and click OK.
Note You may only configure the password during the deployment of the first controller. The other
controllers will use the same password.
Setting Value
Datacenter SFO01
Datastore SFO01A-VSAN01-EDGE01
Connected To vDS-Edge-Management
IP Pool Edge01-NSXC01
Password compnsx_controllers_password
d. After the Status of the controller node changes to Normal, repeat the step and deploy the
remaining two NSX Controller nodes, with the same configuration, that form the controller
cluster.
f. In the SFO01-Edge01 - Create VM/Host Rule dialog box, enter the following settings, and
click Add.
Setting Value
Name Edge_NSX_Controllers
g. In the Add Rule Member dialog box, select the three NSX Controller VMs, and click OK.
h. In the SFO01-Edge01 - Create VM/Host Rule dialog box, click OK.
2.5.3 Prepare the ESXi Hosts in the Compute and Edge Clusters for NSX in
Region A
You install the NSX kernel modules on the compute and edge clusters ESXi hosts so that you are
able to use NSX.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Using a Web browser go to https://comp01vc01.sfo01.rainpole.local/vsphere-
client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Install the NSX kernel modules on the compute and edge clusters ESXi hosts.
a. In the Navigator, click Networking & Security.
b. In the Navigator, click Installation, then click the Host Preparation tab.
c. Change the NSX Manager that you edit to 172.16.11.66.
d. Under Installation Status, click Install for both the SFO01-Edge01 and SFO01-Comp01
clusters.
Verify that the Installation Status column shows the NSX version for all hosts in the cluster o
confirm the successful installation of the NSX kernel modules.
2.5.4 Configure the NSX Logical Network for the Compute and Edge Clusters
in Region A
After all the deployment tasks are ready, you must configure the NSX logical network. Complete this
process in three main steps:
Configure the Segment ID allocation.
Configure the VXLAN networking.
Configure the transport zone.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Setting Value
Switch vDS-Comp
VLAN 1624
MTU 9000
VTEP 2
c. Under VXLAN, click Not Configured on the row labelled SFO01-Edge01, enter the following
settings, and click OK.
Setting Value
Switch vDS-Edge
VLAN 1634
MTU 9000
VTEP 2
Setting Value
2.5.5 Configure NSX Dynamic Routing in Compute and Edge Clusters (Region
A)
NSX for vSphere creates a network virtualization layer on top of which all virtual networks are created.
This layer is an abstraction between the physical and virtual networks. You configure NSX dynamic
routing within the compute and edge clusters, deploying two NSX Edge devices and a Universal
Distributed Logical Router (UDLR).
Create a Universal Logical Switch for Use as the Transit Network in Compute and Edge Clusters
in Region A
Deploy NSX Edge Devices for North-South Routing in Compute and Edge Clusters in Region A
Disable the Firewall Service in the Compute and Edge Clusters in Region A
Enable and Configure the Border Gateway Protocol in the Compute and Edge Clusters in Region
A
Verify Peering of Upstream Switches and Establishment of BGP in Compute and Edge Clusters in
Region A
Deploy the Universal Distributed Logical Router in the Compute and Edge Clusters in Region B
Configure Universal Distributed Logical Router for Dynamic Routing in Compute and Edge
Clusters in Region A
Verify Establishment of BGP for the Universal Distributed Logical Router in the Compute and
Edge Clusters in Region A
2.5.5.1. Create a Universal Logical Switch for Use as the Transit Network in Compute and Edge
Clusters in Region A
Create a universal logical switch for use as the transit network.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
Setting Value
Password vsphere_admin_password
Setting Value
2.5.5.2. Deploy NSX Edge Devices for North-South Routing in Compute and Edge Clusters in
Region A
Deploy NSX Edge Devices for North-South routing in the compute and edge clusters.
Repeat this procedure two times to deploy two NSX Edge devices: SFOEDGE-ESG01 and
SFOEDGE-ESG02.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Settings page, enter the following settings, and click Next.
Setting Value
Password edge_admin_password
On the Configure deployment page, select the Large radio button to specify the Appliance
Size, and click the Add icon.
The Add NSX Edge Appliance dialog box appears.
In the Add NSX Edge Appliance dialog box, enter the following settings, and click OK.
Setting Value
Datastore SFO01A-VSAN01-EDGE01
Click Next.
Click the Add icon to configure the Uplink01 interface, enter the following settings, and click OK.
Click the Add icon once again to configure the Uplink02 interface, enter the following settings,
and click OK.
Click the Add icon a third time to configure the UDLR interface, enter the following settings, and
click OK.
Click Next.
On the Default gateway settings page, deselect the Configure Default Gateway check box,
and click Next.
On the Firewall and HA page click Next.
On the Ready to complete page, review the configuration settings you entered, then click Finish.
Repeat this procedure using the settings for the NSX Edge device labeled SFOMGMT-ESG02.
Upon repeating the procedure to configure SFOMGMT-ESG02, the Ready to complete page in the
New NSX Edge wizard will display the configuration values shown in the following illustration.
2.5.5.3. Disable the Firewall Service in the Compute and Edge Clusters in Region A
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
2.5.5.4. Enable and Configure the Border Gateway Protocol in the Compute and Edge Clusters
in Region A
The Border Gateway Protocol (BGP) is a protocol for exchanging routing information between
gateway hosts (each with its own router) in a network of autonomous systems (AS). BGP is often the
protocol used between gateway hosts on the Internet.
Repeat this procedure two times to enable BGP for both NSX Edge devices: SFOEDGE-ESG01 and
SFOEDGE-ESG02.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Local AS 65000
Setting Value
IP Address 172.27.11.1 This is the IP address of the first Top of Rack Switch.
Remote AS 65001 This is the remote AS of the first Top of Rack Switch.
Weight 60
Keep Alive Time 4 The keep alive value set on the Top of Rack Switch.
Hold Down Time 12 The hold down time set on the Top of Rack Switch.
Password BGP_password
Setting Value
Remote AS 65001 This is the remote AS of the second Top of Rack Switch.
Weight 60
Keep Alive Time 4 The keep alive value set on the Top of Rack Switch.
Hold Down Time 12 The hold down time set on the Top of Rack Switch.
Password BGP_password
Setting Value
IP Address 192.168.100.4
Remote AS 65000
Weight 60
Password BGP_password
In the New Redistribution criteria dialog box, enter the following settings, and click OK.
Setting Value
Prefix Any
OSPF Deselected
ISIS Deselected
Connected Selected
Action Permit
2.5.5.5. Verify Peering of Upstream Switches and Establishment of BGP in Compute and Edge
Clusters in Region A
The NSX Edge devices need to establish a connection to each of it's upstream BGP switches before
BGP updates can be exchanged. Verify that the NSX Edges devices are successfully peering, and
that BGP routing has been established.
You repeat this procedure two times for each of the NSX Edge devices: SFOEDGE-ESG01 and
SFOEDGE-ESG02.
Procedure
Log in to the NSX Edge device using a Secure Shell (SSH) client.
a. Open an SSH connection to the NSX Edge device whose peering and BGP configuration you
want to verify. For example, SFOMGMT-ESG01.
Setting Value
Password edge_admin_password
Run the show ip bgp neighbors command to display information about the BGP connections
to neighbors. The BGP State will display Established, UP if you have peered with the
upstream switches.
Note You have not yet created the Universal Distributed Logical Router (UDLR), so it will not
display the Established, UP status message.
Run the show ip route command to verify that you are receiving routes using BGP, and that
there are multiple routes to BGP learned networks.
You verify multiple routes to BGP learned networks by locating the same route using a different IP
address. The IP addresses are listed after the word via in the right-side column of the routing
table output. In the image below there are two different routes to the following BGP networks:
0.0.0.0/0 and 172.27.22.0/24.
You can identify BGP networks by the letter B in the left-side column. Lines beginning with C
(connected) have only a single route.
2.5.5.6. Deploy the Universal Distributed Logical Router in the Compute and Edge Clusters in
Region A
Deploy the Universal Distributed Logical Router (UDLR).
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Name UDLR01
On the Settings page, enter the following settings, and click Next.
Setting Value
Password udlr_admin_password
Setting Value
Datastore SFO01A-VSAN01-EDGE01
On the Configure deployment page, and click the Add icon a second time to add a second NSX
Edge device.
The Add NSX Edge Appliance dialog box appears.
In the Add NSX Edge Appliance dialog box, enter the following settings, and click OK.
Setting Value
Datastore SFO01A-VSAN01-EDGE01
On the Configure interfaces page, under HA Interface Configuration, click Change and
connect to vDS-Edge-Management.
On the Configure interfaces page enter the following configuration settings, and click Next.
a. Click the Add icon.
The Add Interface dialog box appears.
b. Enter the following settings in the Add Interface dialog box, and click OK.
Setting Value
Name Uplink
Type Selected
MTU 9000
In the Default gateway settings page, deselect Configure Default Gateway, and click Next.
In the Ready to complete page, click Finish.
2.5.5.7. Configure Universal Distributed Logical Router for Dynamic Routing in Compute and
Edge Clusters in Region A
Configure the universal distributed logical router (UDLR) to use dynamic routing.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
b. Click the Edit button under Dynamic Routing Configuration, select Uplink as the Router
ID, and click OK.
c. Click Publish Changes.
Setting Value
Local AS 65000
You repeat this step two times to configure the UDLR for both NSX Edge devices: SFOEDGE-
ESG01 and SFOEDGE-ESG02.
Weight 60 60
Setting Value
OSPF Deselected
BGP Selected
On the Route Redistribution page, select the default OSPF entry and click the Edit button.
Select BGP from the Learner Protocol drop-down menu, and click OK.
2.5.5.8. Verify Establishment of BGP for the Universal Distributed Logical Router in the
Compute and Edge Clusters in Region A
The universal distributed logical router (UDLR) needs to establish a connection to Edge Services
Gateway before BGP updates can be exchanged. Verify that the UDLR is successfully peering, and
that BGP routing has been established.
Procedure
Log in to the UDLR by using a Secure Shell (SSH) client.
a. Open an SSH connection to UDLR01, the UDLR whose peering and BGP configuration you
want to verify.
b. Log in using the following credentials.
Setting Value
Password udlr_admin_password
Run the show ip bgp neighbors command to display information about the BGP and TCP
connections to neighbors. The BGP State will display Established, UP if you have
successfully peered with the Edge Service Gateway.
Run the show ip route command to verify that you are receiving routes using BGP, and that
there are multiple routes to BGP learned networks.
You verify multiple routes to BGP learned networks by locating the same route using a different IP
address. The IP addresses are listed after the word via in the right-side column of the routing
table output. In the image below there are two different routes to the following BGP networks:
0.0.0.0/0, 172.16.35.0/24, 172.27.13.0/24, and 172.27.22.0/24.
You can identify BGP networks by the letter B in the left-side column. Lines beginning with C
(connected) have only a single route.
2.5.6 Test the Compute and Edge Clusters NSX Configuration in Region A
Test the configuration of the NSX logical network using a ping test. A ping test checks if two hosts in a
network can reach each other.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
example, that a certificate warning appears when a user connects to a vCenter Server system by
using the vSphere Web Client.
Infrastructure administrators connect to different SDDC components, such as vCenter Server systems
or a Platform Services Controller from a Web browser to perform configuration, management and
troubleshooting. The authenticity of the network node to which the administrator connects must be
confirmed with a valid TLS/SSL certificate.
In this design, you replace user-facing certificates with certificates that are signed by a custom
Microsoft Certificate Authority (CA). You do not replace certificates for machine-to-machine
communication. If necessary, you can manually mark these certificates as trusted.
Certificate replacement covers the following VMware products from the virtual infrastructure layer:
Platform Services Controller (both management pod and compute pod)
vCenter Server system (both management pod and compute pod)
VMware NSX Manager (both management pod and compute pod)
Prerequisite
This VMware Validated Design sets up the CA on the Active Directory (AD) server
dc01rpl.rainpole.local, which is running Microsoft Windows Server 2012 R2.
Verify that you installed Microsoft Server 2012 R2 with Active Directory Services enabled.
Verify that your AD Server is installed and configured with the Certificate Authority Service role
and the Certificate Authority Web Enrolment role.
If a different Microsoft CA already exists in your environment, you can use that CA instead.
Procedure
1. Use Remote Desktop Protocol to connect to the CA server dc01rpl.rainpole.local as the
AD administrator with the ad_admin_password password.
2. Click Start > Run, type certtmpl.msc, and click OK.
3. In the Certificate Template Console, under Template Display Name, right-click Web Server
and click DuplicateTemplate.
4. In the Duplicate Template window, leave Windows Server 2003 Enterprise selected for
backward compatibility and click OK.
5. In the Properties of New Template dialog, click the General tab.
6. In the Template display name text box, enter VMware as the name of the new template.
7. Click the Extensions tab and specify extensions information:
a. Select Application Policies and click Edit.
b. Select Server Authentication, click Remove, and click OK.
c. Select Key Usage and click Edit.
d. Click the Signature is proof of origin (nonrepudiation) check box.
e. Leave the default for all other options.
f. Click OK.
8. Click the Subject Name tab, ensure that the Supply in the request option is selected, and click
OK to save the template.
9. To add the new template to your CA, click Start > Run, type certsrv.msc, and click OK.
10. In the Certification Authority window, expand the left pane if it is collapsed.
11. Right-click Certificate Templates and select New > Certificate Template to Issue.
12. In the Enable Certificate Templates dialog, in the Name column, select the VMware certificate
that you just created and click OK.
Setting Value
Password ad_admin_password
Procedure
Log in to a Windows host that has access to both the AD server and the Platform Services
Controllers as an administrator.
Generate a CSR by using the vSphere Certificate Manager utility.
a. Open a Secure Shell (SSH) connection to the Platform Services Controller by using an SSH
client.
b. Log in using the following credentials.
/usr/lib/vmware-vmca/bin/certificate-manager
f. Select Option 1 (Replace Machine SSL certificate with Custom Certificate), enter the
default vCenter Single Sign-On user name [email protected] and the
vsphere_admin password.
g. Select Option 1 (Generate Certificate Signing Request(s) and Key(s) for Machine SSL
certificate), and provide the directory /tmp/ssl to save the certificate signing request and
private key to.
h. Provide the following settings to configure certool.cfg which the vSphere Certificate
Manager uses for the CSR generation, and close the vSphere Certificate Manager.
Country US US
IP Address - -
Host Command
Submit the CSR to the parent Windows domain controller CA and save the generated CA-signed
certificate chain.
a. Copy the .csr file to the C:\certs directory on the Windows host that you use to access
the Platform Services Controller and the AD server.
Use the scp command, FileZilla, or WinSCP to copy the file.
b. Open a Web browser, and go to http://dc01rpl.rainpole.local/CertSrv/.
c. If prompted, log in as the AD administrator with the ad_admin_password password.
d. Follow the steps in Obtain Custom Certificates for the Management Components in Region A
to enroll the certificate for this Platform Services Controller with the AD-CA server.
Save the certificate and Root64.cer files to the /tmp/ssl directory on the Platform Services
Controller.
Use the scp command, FileZilla, or WinSCP to copy the files.
After Status shows 100% Completed on the Platform Services Controller, restart all services on
the vCenter Server instance that is connected to this Platform Services Controller.
a. Open a Secure Shell (SSH) connection to the vCenter Server instance by using an SSH
client.
Setting Value
Password vc_root_password
shell
chsh -s /bin/bash root
d. Run these commands to restart all services on the vCenter Server instance.
service-control --stop –all
service-control --start –all
After you replace the certificate of the NSX Manager for the management cluster, repeat the steps
to generate a CSR file, generate CA-signed certificate and replace the default certificate on the
second Platform Services Controller.
vCenter Server CSR File Name Certificate File Name Replacement Order
Procedure
Log in to a Windows host that has access to both the AD server and the vCenter Server instance
as an administrator.
Generate a CSR for the vCenter Server instance by using the VMware Certificate Manager utility.
a. Open a Secure Shell (SSH) connection to the vCenter Server instance by using an SSH
client.
b. Log in using the following credentials.
Setting Value
Password vc_root_password
mgmt01vc01.sfo01.rainpole.local 172.16.11.61
comp01vc01.sfo01.rainpole.local 172.16.11.63
h. Select Option 1 (Generate Certificate Signing Request(s) and Key(s) for Machine SSL
certificate), and provide the directory /tmp/ssl to save the certificate signing request and
private key to.
i. Provide the following settings to configure certool.cfg which the vSphere Certificate Manager
uses for the CSR generation, and close the vSphere Certificate Manager.
Setting Value
Country US
Name mgmt01vc01.sfo01.rainpole.local
OrgUnit Rainpole.local
State California
IP Address -
Email [email protected]
Hostname mgmt01vc01.sfo01.rainpole.local
Host Command
Submit the CSR to the parent Windows domain controller CA and save the generated CA-signed
certificate chain.
Use the scp command, FileZilla, or WinSCP to copy the file.
a. Open a Web browser, and go to http://dc01rpl.rainpole.local/CertSrv/.
b. If prompted, log in as the AD administrator with the ad_admin_password password.
c. Follow the steps in Obtain Custom Certificates for the Management Components in Region A
to enroll the certificate for this vCenter Server with the AD-CA server.
Save the certificate and Root64.cer files to the /tmp/ssl directory on the vCenter Server instance.
Use the scp command, FileZilla, or WinSCP to copy the files.
After Status shows 100% Completed, wait several minutes until all vCenter Server services are
restarted.
After you replace the certificate on the compute Platform Services Controller, repeat the steps to
generate a CSR file, generate a CA-signed certificate and replace the default certificate on the
second vCenter Server.
Procedure
Log in to a Windows host that has access to both the AD server and the NSX Manager instances
as an administrator.
On the Windows host, log in to the NSX Manager Web interface.
a. Open a Web browser and go to following URL.
Setting Value
Password nsx_mngr_admin_password
Algorithm RSA
Organization Rainpole
Name
State Name CA
Country Code US
mgmt01nsxm01.sfo01.rainpole.local mgmt01nsxm01.sfo01_ssl.csr
comp01nsxm01.sfo01.rainpole.local comp01nsxm01.sfo01_ssl.csr
Follow the steps in the Obtain Custom Certificates for the Management Components in Region "
section to enroll the certificate of this NSX Manager instance
Save the signed certificates to the local c:\certs\nsx\sfo directory.
mgmt01nsxm01.sfo01.rainpole.local mgmt01nsxm01.sfo01.cer
Root64.cer
comp01nsxm01.sfo01.rainpole.local comp01nsxm01.sfo01.cer
Root64.cer
Combine the certificate file with the CA's root certificate file into a single file as follows.
a. Open a command prompt and navigate to the directory c:\certs\nsx\sfo.
b. Run the following command.
From the Web browser that is connected to the NSX Manager interface, with the Manage tab and
the SSL Certificate setting still selected on the left, click Import and provide your chained
certificate file.
mgmt01nsxm01.sfo01.rainpole.local mgmt01nsxm01.sfo01.chain.cer
comp01nsxm01.sfo01.rainpole.local comp01nsxm01.sfo01.chain.cer
Setting Value
Password nsx_mngr_admin_password
Setting Value
Password vsphere_admin_password
Setting Value
Password svc-nsxmanager_password
IP address 172.16.11.81
FQDN mgmt01vdp01.sfo01.rainpole.local
Prerequisite Value
Installation Package Download the .ova file of the vSphere Data Protection virtual appliance
on the machine where you use the vSphere Web Client.
Setting Value
Password vsphere_admin_password
Cluster SFO01-Mgmt01
On the Review details page, examine the virtual appliance details, such as product, version,
download and disk size, and click Next.
On the Accept License Agreements page, accept the end user license agreements and
click Next.
On the Select name and folder page, enter a node name, select the inventory folder for the
virtual appliance, and click Next.
Setting Value
Name mgmt01vdp01
Select the SFO01A-NFS01-VDP01 NFS datastore provisioned for vSphere Data Protection, leave
thin provisioned virtual disk format and the default VM storage policy, and click Next.
On the Setup networks page, select the vDS-Mgmt-Management distributed port group from
the Isolated Network drop-down menu, select IPv4 from the IP protocol drop-down menu, and
click Next.
On the Customize template page, enter the networking settings for the virtual appliance, and
click Next.
On the Ready to complete page, verify that the settings are correct, select the Power on after
deployment check box, and click Finish.
Setting Value
Password changeme
b. Deselect the Use vCenter for SSO authentication check box and enter the settings for
VMware Single Sign-On on the Management Platform Services Controller.
c. Click Test Connection and in the success message box, click OK.
d. On the vCenter Registration page, click Next.
On the Create Storage page, select Create new storage and in the Capacity text box select 4
TB and click Next.
On the Device Allocation page, from the Provision drop-down menu, select Thin and click
Next.
On the CPU and Memory page, leave the default settings and click Next.
On the Product Improvement page, select Enable Customer Experience Improvement
Program and click Next.
On the Ready to Complete page, select Run performance analysis on storage configuration
and Restart the appliance if successful, and click Next.
Setting Value
Password vsphere_admin_password
c. On the vSphere Web Client Home page, verify that the VDP icon is available.
Setting Value
Password vsphere_admin_password
e. Run the following command in the vi editor to save the file and exit the editor.
:wq!
f. In the console, restart the SSH service to update the running configuration.
/etc/init.d/sshd restart
Generate a certificate signing request (CSR) vdpcsr.csr by running the following two
commands.
When prompted for the keystore password use changeit.
a. /usr/java/latest/bin/keytool -genkeypair -v -alias tomcat -keyalg RSA
-sigalg SHA256withRSA -keystore /root/.keystore -storepass changeit -
keypass changeit -validity 3650 -dname "CN=vdp-mgmt-
01.sfo01.rainpole.local, OU=rainpole.local, O=Rainpole Inc., L=Palo
Alto, S=CA, C=US"
b. /usr/java/latest/bin/keytool -certreq -keyalg RSA -alias tomcat -file
vdpcsr.csr
Submit the CSR to the Windows domain controller CA.
a. Run the following console command.
cat vdpcsr.csr
b. Copy the output from -----BEGIN CERTIFICATE REQUEST----- to -----END CERTIFICATE
REQUEST----- inclusive.
On the Certificate Issued page, select the Base 64 encoded radio box, click the Download
certificate chain link and save the file as a vdp.p7b.
If the save as dialog does not appear, the signed certificate is saved as certnew.p7b in your
default downloads folder. Rename the file to vdp.p7b.
Copy the vdp.p7b certificate file to the /root folder on the vSphere Data Protection virtual
appliance. You can use scp, FileZilla or WinSCP.
Import the certificate.
a. Run the following console command.
/usr/java/latest/bin/keytool -import -alias tomcat -keystore
/root/.keystore -file /root/vdp.p7b
b. When prompted for the keystore password, use changeit.
c. When prompted to trust the certificate, type yes and press Enter.
/usr/local/avamar/bin/addFingerprint.sh
This script does not return any output.
Start the vSphere Data Protection services.
emwebapp.sh --start
Table 7. IP Addresses and Host Name for the Analytics Cluster in Region A
Table 8. IP Addresses and Host Name for the Remote Collectors in Region A
Deployment Prerequisites
Verify that your environment satisfies the following prerequisites to deployment vRealize Operations
Manager.
Prerequisite Value
Installation Package Download the .ova file of the vRealize Operations Manager virtual appliance
on the machine where you use the vSphere Web Client.
License Verify that you have obtained a license that covers the use of vRealize
Operations Manager.
Active Directory Verify that you have a parent active directory with the SDDC user roles
configured for the rainpole.local domain.
Certification Configure the root Active Directory domain controller as a certificate authority
Authority for the environment.
3.1.2 Deploy the Virtual Appliance for Each Node of the Analytics Cluster in
Region A
Use the vSphere Web Client to deploy each vRealize Operations Manager node as a virtual appliance
on the management cluster in Region A.
You repeat the deployment for each of the four analytics nodes: master, master replica, data node 1
and data node 2.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Review details page, examine the virtual appliance details, such as product, version,
download and disk size, and click Next.
On the Accept License Agreements page, accept the end user license agreements and click
Next.
On the Select name and folder page, enter a node name, select the inventory folder for the
virtual appliance, and click Next.
Name Role
Object Value
Folder vROps01
On the Select configuration page, from the Configuration drop-down menu, select the Medium
deployment configuration of the virtual appliance, and click Next.
On the Select a resource page, select the SFO01-Mgmt01 management cluster as the resource
to run the virtual appliance, and click Next.
On the Select storage page, select the datastore indicated in the table below, and click Next.
Object Value
On the Setup networks page, select the distributed port group on the vDS-Mgmt distributed
switch that ends with vROps01-VXLAN, and click Next.
On the Customize template page, select the time zone and set IPv4 settings for the virtual
appliance.
a. From the Timezone setting drop-down menu, select the Etc/UTC time zone.
b. In the Networking Properties Enter section, configure the following IPv4 settings.
192.168.11.32 vrops-repln-02
192.168.11.33 vrops-datan-03
192.168.11.34 vrops-datan-04
Verify that the settings for deployment are correct, and click Finish.
After the virtual appliance is deployed, expand the data disk of the virtual appliance to collect and
store data from a large number of virtual machines.
a. In the vSphere Web Client, navigate to the virtual appliance object.
b. Right-click the virtual appliance and select the Edit Settings menu item.
c. In the Edit Settings dialog box, next to Hard disk 2 increase the size of the virtual appliance
disk from 250 GB to 1 TB, and click OK.
Right-click the virtual appliance object and select the Power > Power On.
During the power-on process, the virtual appliance expands the vRealize Operations
Manager data partition as well.
Repeat this procedure to deploy the vRealize Operations Manager virtual appliance for the next
node in the analytics cluster.
[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = DNS:vrops-cluster-01, IP: 192.168.11.35, DNS:vrops-cluster-
01.rainpole.local, DNS:vrops-mstrn-01.rainpole.local, DNS:vrops-mstrn-01,
DNS:vrops-repln-02.rainpole.local, DNS:vrops-repln-02, DNS:vrops-datan-
03.rainpole.local, DNS:vrops-datan-03, DNS:vrops-datan-04.rainpole.local,
DNS:vrops-datan-04
[ req_distinguished_name ]
countryName = US
stateOrProvinceName = CA
localityName = Palo Alto
0.organizationName = Rain Pole Inc.,
organizationalUnitName = rainpole.local
commonName = vrops-cluster-01.rainpole.local
Setting Value
Password vsphere_admin_password
Setting Value
Password vrops_master_root_password
Use the vrops01.key private key and the vrops01.cfg configuration file to create a Certificate
Signing Request (CSR) and save it as a vrops01.pem file.
openssl req -new -key vrops01.key -out vrops01.pem -config vrops01.cfg
Submit the CSR to the Windows domain controller CA.
a. Run the following console command.
cat vrops01.pem
b. Copy the output from -----BEGIN CERTIFICATE REQUEST----- to -----END CERTIFICATE
REQUEST----- inclusive.
Setting Value
Password domain_admin_password
e. Paste the request in the Saved Request text box, select VMware from the Certificate
Template drop-down menu, and click Submit.
On the Certificate Issued page, select Base 64 encoded, click on Download certificate, and
save the certificate as vrops01.cer on your computer.
If the Save As dialog box does not appear, the signed certificate is saved as certnew.cer in
your computer's Download folder. Rename the file as vrops01.cer.
Setting Value
Password domain_admin_password
Select Base 64, click on Download CA Certificate, and save the certificate as rootca.cer on
your computer.
If the Save As dialog box does not appear, the CA certificate is saved as certnew.cer to your
computers Download folder. Rename the file as rootca.cer.
Copy the vrops01.cer and rootca.cer certificate files to the /root/vrops01 folder on the
master virtual appliance. You can use scp, FileZilla or WinSCP.
In the master node console, create a vrops01-chain.pem file in the /root/vrops01 folder
that contains the signed certificate, CA certificate and private key file.
The order of the certificates in a PEM file must follow the certificate chain sequence starting from
the own certificate up to the root CA certificate. vrops01.cer must be first, rootca.cer next
and vrops01.key last.
cat vrops01.cer rootca.cer vrops01.key > vrops01-chain.pem
Copy the vrops01-chain.pem file to your computer. You can use scp, FileZilla or WinSCP.
Stop the SSH service on the master node virtual appliance by running the service sshd stop
command.
service sshd stop
The next time you attempt to log in to the master virtual appliance, the SSH connection will not be
established.
On the Getting Started page, review the steps for creating a cluster, and click Next.
On the Set Administrator Password page, type and confirm the password for admin user
account.
On the Choose Certificate page, select the Install a certificate radio button, click Browse,
select the vrops01-chain.pem file, and click Next.
After the setup imports and validates the certificate, notice that the certificate has a common
name, vrops-cluster-01.rainpole.local, and a subject alternate name that contains
vrops-mstrn-01.rainpole.local for the master node.
On the Deployment Settings page, configure the following settings, and click Next.
Setting Value
When the configuration process completes, the vRealize Operations Manager Administration
console opens.
Click System Status in the Administration panel.
The virtual appliance instance acting as the master node appears in the Nodes in the vRealize
Operations Manager Cluster list.
Procedure
Open a Web browser and, go to https://vrops-repln02.rainpole.local.
In the initial setup page, click Expand an Existing Installation.
On the Getting Started page, review the steps for creating a cluster, and click Next.
On the Node Settings and Cluster Info page, configure the settings of the node in the analytics
cluster.
a. In the Node Name text box, enter the DNS short name vrops-repln-02.
This is the short form of the DNS name.
b. From the Node type drop-down menu, select Data.
Note Although you are configuring the replica node, the vRealize Operations Manager setup
considers the replica as data node until you enable high availability.
c. In the Master node IP address or FQDN text box, enter the master node FQDN vrops-
mstrn-01.rainpole.local and click Validate.
The certificate of the master node displays in the text box.
d. Verify that the master certificate is correct, and click Accept this certificate.
e. Click Next.
On the Username and Password page, select the Use cluster administrator user name and
password radio button, enter the vrops_admin_password for the admin user, and click Next.
In the vRealize Operations Manger Initial Setup wizard, click Expand an Existing Installation.
On the Getting Started page, review the steps for creating a cluster, and click Next.
On the Node Settings and Cluster Info page, configure the settings of the node in the analytics
cluster.
a. In the Node Name text box, enter the short form of the DNS name for the data node.
On the Username and password page, select the Use cluster administrator user name and
password radio button, enter the vrops_admin_password for the admin user, and click Next.
On the Ready to complete page, click Finish.
When the configuration process completes, the vRealize Operations Manager Administration
console opens.
Click System Status in the Administration panel.
The virtual appliance instance acting as the data node appears in the Nodes in the vRealize
Operations Manager Cluster list.
Setting Value
Password vsphere_admin_password
On the Review details page, examine the virtual appliance details, such as product, version,
download and disk size, and click Next.
On the Accept License Agreements page, accept the end user license agreements and
click Next.
On the Select name and folder page, enter a node name, select the inventory folder for the
virtual appliance, and click Next.
Setting Value
Folder vROps01RC
On the Select configuration page, from the Configuration drop-down menu, select Remote
Collector (Standard), and click Next.
On the Select a resource page, select the SFO01-Mgmt01 management cluster as the resource
to run the virtual appliance, and click Next.
On the Select storage page, select the datastore indicated in the table below, and click Next.
Setting Value
On the Setup networks page, select the distributed port group on the vDS-Mgmt distributed
switch that ends with Mgmt-RegionA01-VXLAN, and click Next.
On the Customize template page, select the time zone and set the IPv4 settings for the virtual
appliance.
a. From the Timezone setting drop-down menu, select the Etc/UTC time zone.
b. In the Networking Properties section, configure the following IPv4 settings.
Setting Value
On the Ready to complete page, verify that the settings for deployment are correct and
the Power on after deployment check box is selected, and click Finish.
Repeat the steps to deploy the second remote collector appliance.
On the Getting Started page, review the steps for creating a cluster, and click Next.
On the Note Settings and Cluster Info page, configure the settings of the node in the analytics
cluster.
a. In the Node Name text box, еnter the DNS short name for the remote collector node.
On the Username and Password page, select Use cluster administrator user name and
password radio button, type the vrops_admin_password for the admin user, and click Next.
On the Ready to complete page, click Finish.
After configuration of the second remote collector is complete, the cluster on the System Status
page of the administration user interface consists of the following nodes: vrops-mstrn-01, vrops-
repln-02, vrops-datan-03, vrops-datan-04, and the remote collectors vrops-rmtcol-01 and
vrops-rmtcol-02.
Setting Value
Password vsphere_admin_password
Navigate to the mgmt01vc01.sfo01.rainpole.local vCenter Server object, and under the SFO01
data center object select the SFO01-Mgmt01 cluster.
On the Manage tab, click the Settings tab.
Under the Configuration group of settings, select VM/Host Rules.
In the VM/Host Rules list, click the Add button above the rules list and add a new anti-affinity rule
called vropscluster-antiaffinity-rule for the four vRealize Operations Manager
Analytics analytics virtual machines, and click OK.
Setting Value
Name vropscluster-antiaffinity-rule
vrops-mstrn-01
vrops-repln-02
Members
vrops-datan-03
vrops-datan-04
In the VM/Host Rules list, click the Add button above the rules list and add a new anti-affinity rule
called vropscollectors-antiaffinity-rule for the two remote collector virtual machines of vRealize
Operations Manager, and click OK.
Setting Value
Name vropscollectors-antiaffinity-rule
vrops-rmtcol-01
Members
vrops-rmtcol-02
Setting Value
Password vrops_admin_password
On the System Status page, the cluster status is Not Started, and the high availability of the
cluster is Disabled.
Setting Value
vrops-repln-02 Selected
High availability becomes enabled after several minutes. vrops-mstrn-01 is the master, vrops-
repln-02 is the master replica, and the remaining nodes are data nodes.
Setting Value
Password vrops_admin_password
On the Welcome page of the vRealize Operations Manager Configuration wizard, examine the
process overview, and click Next.
On the Accept EULA page, accept the end user license agreement, and click Next.
On the Enter Product License Key page, enter vRealize Operations manager product license
key.
a. Select Product Key and enter the license key.
b. Click Validate License Key, and click Next.
Setting Value
Password vrops_admin_password
In the Add New Collector Group dialog box, configure the following settings, and click Save.
Setting Value
Name SFO01
vrops-rmtcol-01 Selected
vrops-rmtcol-02 Selected
If you access vRealize Operations Manager from an external location, import the certificate.
You can use Certificate Manager on Windows or Keychain Access on MAC OS X. The certificate
is required for connection to the external VIP address of the load balancer.
Setting Value
Password vsphere_admin_password
Setting Value
Name VROPS_HTTPS
Type HTTPS
Persistence Source IP
Setting Value
Name VROPS_MONITOR
Interval 3
Timeout 5
Retries 2
Type HTTPS
Method GET
URL /suite-api/api/deployment/node/status
Setting Value
Name VROPS_POOL
Algorithm LEASTCONN
Monitors VROPS_MONITOR
c. Under Members, click the Add icon to add the pool members.
d. In the New Member dialog box, add one member for each node of the analytics cluster and
click OK.
Setting Value
Name vrops-mstrn-01
vrops-repln-02
vrops-datan-03
vrops-datan-04
IP Address 192.168.11.31
192.168.11.32
192.168.11.33
192.168.11.34
Port 443
Weight 1
Max Connections 8
Min Connections 8
After you add the analytics cluster nodes to the pool, you see them in the Members table.
e. In the New Pool dialog box, click OK.
Add a virtual server.
a. On the Load Balancer tab of the SFOMGMT-LB01 device, select Virtual Servers and click
the Add icon.
b. In the New Virtual Server dialog box, configure the settings of the virtual server for the
analytics cluster and click OK.
Option Value
Name VROPS_VIRTUAL_SERVER
IP Address 192.168.11.35
Click Select IP Address, select OneArmLB from the drop-down menu
and then select 192.168.11.35 IP for the virtual NIC.
Protocol HTTPS
Port 443
Connection Limit 0
You can connect to the analytics cluster at the public Virtual Server IP address over
HTTPS: https://vrops-cluster-01.rainpole.local.
Setting Value
Name VROPS_REDIRECT
Type HTTP
Persistence Source IP
c. On the Load Balancer tab of the SFOMGMT-LB01 device, select Virtual Servers and click
Add.
Setting Name
Name VROPS_REDIRECT
IP Address 192.168.11.35
Protocol HTTP
Port 80
Connection Limit 0
You can connect to the analytics cluster at the public Virtual Server IP address over HTTP at
the http://vrops-cluster-01.rainpole.local address.
Verify the pool configuration by examining the pool statistics which reflects the status of the
components behind the load balancer.
a. Log out and log in again to the vSphere Web Client.
b. From the Home menu, select Networking & Security.
c. On the NSX Home page, click NSX Edges and select 172.16.11.65 from the NSX Manager
drop-down menu at the top of the NSX Edges page.
d. On the NSX Edges page, double-click the SFOMGMT-LB01 NSX edge.
e. On Manage tab, click the Load Balancer tab.
f. Click Pools and click Show Pool Statistics.
g. In the Pool and Member Status dialog box, select VROPS_POOL pool.
You see that the load balancer pool is up.
Setting Value
Password vsphere_admin_password
In the vSphere Web Client, navigate to the vCenter Server object in Region A.
In the Add Permission dialog box, click the Add button to add permissions to a user or a group.
In the Select Users/Groups dialog box, from the Domain drop-down menu, select RAINPOLE
and in the filter box type svc.
From the list of users and groups, select svc-vrops, click the Add button, and click OK.
In Add Permission dialog box, from the Assigned Role drop-down menu, select Read-only, and
click OK.
Repeat the steps for the other vCenter Server instance in Region A.
The svc-vrops user has read-only access to all objects in vCenter Server.
Setting Value
Password vsphere_admin_password
In the left pane of vRealize Operations Manager, click Administration, and click Solutions.
From the solution table on the Solutions page, select the VMware vSphere solution, and
click Configure.
Name mgmt01vc01-sfo01
Name comp01vc01-sfo01
c. Click the Add icon, and configure the collection credentials for connection to the vCenter
Servers.
Password svc-vrops-password
Password svc-vrops-password
Setting Value
Password vsphere_admin_password
On the Solutions page, select VMware vSphere from the solution table to view the collection
State and collection status.
The collection state indicates whether vRealize Operations Manager should be collecting data for
the object. The collection status value indicates whether vRealize Operations Manager is
receiving data for the object. An object has a status value only if its collection state is Collecting.
The Collection State column for the vCenter Adapters displays Collecting, and the
Collection Status column displays Data receiving.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration, and click Solutions.
On the Solutions page, click the Add icon
On the Select Solutions page from the Add Solution wizard, browse to the .pak file of the
vRealize Operations Manager Management Pack for vRealize Log Insight and click Upload.
On the End User License Agreement page, accept the license agreement and click Next.
Installation of the management pack starts. You see the progress of the installation on the Install
page.
After the installation is complete, click Finish on the Install page.
The VMware vRealize Operations Management Pack for Log Insight solution appears on the
Solutions page of the vRealize Operations Manager user interface.
Verify that the NSX Manager is installed and configured for the management cluster, and for the
compute and edge clusters.
Verify that vRealize Operations Manager is deployed and its analytics cluster is started.
Verify that the remote collector nodes for Region A are deployed and grouped.
Verify that vRealize Log Insight is deployed
Verify that the management pack for vRealize Log Insight is installed in vRealize Operations
Manager.
Procedure
Install the vRealize Operations Manager Management Pack for NSX for vSphere in Region A
Add NSX-vSphere Adapter Instances to vRealize Operations Manager for Region A
Add Network Devices Adapter to vRealize Operations Manager for Region A
3.5.1 Install the vRealize Operations Manager Management Pack for NSX for
vSphere in Region A
Install the .pak file for the management pack for NSX for vSphere to add the management pack as a
solution to vRealize Operations Manager.
Procedure
Log in to vRealize Operations Manager.
a. Open a Web browser and go to https://vrops-cluster-01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Solutions.
On the Solutions page, click the Add icon.
On the Select Solutions page from the Add Solution wizard, browse to the .pak file of the
vRealize Operations Manager Management Pack for NSX for vSphere and click Upload.
After the NSX management pack file has been uploaded, you see details about the management
pack.
You see the Management Pack for NSX-vSphere solution on the Solutions page of the vRealize
Operations Manager user interface.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration, and click Solutions.
On the Solutions page, select the Management Pack for NSX-vSphere from the solution table,
and click Configure.
In Manage Solution - Management Pack for NSX-vSphere dialog box, from the Adapter Type
table at the top, select NSX-vSphere Adapter.
Empty settings for the NSX-vSphere Adapter appear under Instance Settings if vRealize
Operations Manager does not have NSX-vSphere Adapters configured.
Under Instance Settings, enter the settings for connection to the NSX Manager for the
management cluster or to the NSX Manager for the compute and edge clusters.
a. If you already have added another NSX-vSphere Adapter, click the Add icon to add an
adapter setting.
b. Enter the name, description, the FQDN of NSX Manager and the FQDN of the vCenter Server
that is connected to the NSX Manager.
You enable automatic log forwarding to Log Insight for log data related to NSX for vSphere.
Description -
VC Host mgmt01vc01.sfo01.rainpole.local
Description -
VC Host comp01vc01.sfo01.rainpole.local
c. Click the Add icon and configure the credentials for the connection to NSX Manager and
vCenter Server, and click OK.
d. Click Test Connection to validate the connection to the Management NSX Manager or
Compute NSX Manager. The NSX Manager certificate appears.
e. In the Review and Accept Certificate dialog box, verify the NSX certificate information and
click OK.
f. Click OK in the test connection dialog box.
g. Expand the Advanced Settings section of settings, and from the Collectors/Groups drop-
down menu, select the SFO01 group.
h. Click Save Settings and click OK in the information box that appears.
i. Repeat the steps to create an NSX-vSphere Adapter for the second NSX Manager.
In the Manage Solution - Management Pack for NSX-vSphere dialog box, click Close.
The two NSX-vSphere Adapters are available on the Solutions page of the vRealize Operations
Manager user interface. The Collection State of the adapters is Collecting and
the Collection Status is Data receiving.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Solutions.
On the Solutions page, select the Management Pack for NSX-vSphere from the solution table,
and click Configure.
In Manage Solution - Management Pack for NSX-vSphere dialog box, from the Adapter Type
table at the top, select Network Devices Adapter.
Under Instance Settings, enter the settings for SNMP connection to the Network Devices for the
management cluster.
a. Enter the name, description, SNMP Version and credentials.
Setting Value
Description
b. Click the Add icon, and configure the credentials for connection to the Network Devices
Adapter, and click OK.
Credentials Value
For SNMPv1 and SNMPv2 devices, enter a comma-separated list of community names (default is
public)
For SNMPv3 devices, provide SNMPv3 credentials in addition to the settings for SNMPv1 and
SNMPv2
c. Click Test Connection to verify the settings, and if the test is successful click the OK button.
d. Expand the Advanced Settings section of settings, and from the Collectors/Groups drop-
down menu, select the SFO01 group.
e. Click Save Settings and click OK in the information box that appears.
In the Manage Solution - Management Pack for NSX-vSphere dialog box, click Close.
The Network Devices Adapter appears on the Solutions page of the vRealize Operations
Manager user interface. The adapter is collecting data about the network devices in Region A of
the SDDC. The Collection State of the adapter is Collecting and the Collection Status is
Data receiving.
3.6.1 Install the vRealize Operations Manager Management Pack for vRealize
Automation in Region A
Install the .pak file for vRealize Operations Manager Management Pack for vRealize Automation so it
becomes a solution in vRealize Operations Manager.
Procedure
Log in to vRealize Operations Manager.
a. Open a Web browser and go to https://vrops-cluster-01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Solutions.
On the Solutions page, click the Add icon
On the Select Solution page of the Add Solution wizard, browse to the vRealize Operations
Manager Management Pack for vRealize Automation the .pak file, and click Upload.
After the vRealize Automation management pack file has been uploaded, you see details about
the management pack.
The vRealize Automation Management Pack solution appears on the Solutions page of the
vRealize Operations Manager user interface.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Solutions.
From the solution table on the Solutions page, select the vRealize Automation Management
Pack solution and click Configure.
In Manage Solution - vRealize Automation Management Pack dialog box, from the Adapter
Type table at the top, select vRealize Automation MP.
Under Instance Settings, enter the settings for connection to vRealize Automation.
a. Enter the name, FQDN of vRealize Automation front-end portal and Tenants.
Setting Value
Description -
Tenants rainpole
b. Click the Add icon, and configure the credentials for connection to vRealize Automation. Click
OK.
Credential Value
3.7.1 Install the vRealize Operations Manager Management Pack for Storage
Devices in Region A
Install the .pak file of the management pack for storage devices to add the management pack as a
solution to vRealize Operations Manager.
Prerequisites
Download the .pak file for the vRealize Operations Manager Management Pack for Storage
Devices from VMware Solutions Exchange.
Verify that vRealize Operations Manager is deployed and its analytics cluster is started.
Verify that the remote collector nodes for Region A are deployed and grouped.
Procedure
Log in to vRealize Operations Manager.
a. Open a Web browser and go to https://vrops-cluster-01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Solutions.
On Solutions page, click the Add icon.
On the Select Solution page from the Add Solution wizard, browse to the .pak file of the
vRealize Operations Manager Management Pack for Storage Devices and click Upload.
After the file of the management pack for storage devices has been uploaded, you see details
about the management pack.
In the confirmation dialog box, click Yes to confirm that you are about to install an unsigned
solution for vRealize Operations Manager.
On the End User License Agreement page, accept the license agreement and click Next.
The installation of the management pack starts. You see its progress on the Install page.
After the installation is complete, click Finish on the Install page.
The Management Pack for Storage Devices solution appears on the Solutions page of the
vRealize Operations Manager user interface.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration, then click Solutions.
On the Solutions page, select the Management pack for Storage Devices from the solution
table and click the Configure .
In the Manage Solution - Management Pack for Storage Devices dialog box, from the Adapter
Type table at the top, select Storage Devices.
Under Instance Settings, enter the settings for connection to the Management vCenter Server or
to the Compute vCenter Server.
a. Enter the name, description, and FQDN of the vCenter Server instance.
b. Click the Add icon, and configure the credentials for connection to the vCenter Server, and
click OK.
Credential Value
Password vsphere_admin_password
c. Click Test Connection to validate the connection to the Management vCenter Server or the
Compute vCenter Server, and click OK.
d. In the Review and Accept Certificate dialog box, verify the vCenter Server certificate
information and click OK.
e. Expand the Advanced Settings section of settings, and from the Collectors/Groups drop-
down menu, select the SFO01 remote collector group.
f. Click Save Settings and click OK in the information box that appears.
In the Manage Solution - Management Pack for Storage Devices dialog box, click Close.
The Storage Devices adapters appear on the Solutions page of the vRealize Operations
Manager user interface. The Collection State of the adapters is Collecting and
the Collection Status is Data receiving.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Authentication
Sources.
In the Authentication Sources page, click the Add icon.
In the Add Source for User and Group Import dialog box, enter the settings for the
RAINPOLE.LOCAL and SFO01.RAINPOLE.LOCAL Active Directories.
Click the Test button to test the connection to the domain controller and in the Info success
message click OK.
In the Add Source for User and Group Import dialog box, click OK.
The two Active Directories are available.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Access Control.
On the Access Control page, click the User Groups tab.
On the Roles, and Objects page, assign the ReadOnly role to the vCAdmins user group.
a. Click the Select Role drop-down.
b. Select the ReadOnly item.
c. Click Assign this role to the group.
Select Allow access to all objects in the system to configure read-only access of the
vCAdmins user group on all objects.
Click Finish.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Access Control.
On the Access Control page, click the User Accounts tab.
Click the Import Users icon.
On the Import Users page, import the vROps-Admin user.
a. From the Import From drop-down menu, select SFO01.RAINPOLE.LOCAL.
b. Select the Basic option for the search query.
c. In the Search String text box, enter vrops and click Search.
The search results contain the [email protected] user.
d. In the search result, select the [email protected] entry.
e. Click Next.
In the Assign Groups and Permissions page, assign the ContentAdmin role to the vROps-
[email protected] user.
a. Click the Objects tab
b. Select the ContentAdmin item from the Select Role drop-down menu.
c. Select Assign this role to the user.
d. Select Allow access to all objects in the system.
Click Finish.
Setting Value
Password vrops_admin_password
In the left pane of vRealize Operations Manager, click Administration and click Outbound Alert
Settings.
On the Outbound Alert Settings page, click the Add icon to create an outbound alert instance.
In the Add/Edit Outbound Alert Instance dialog box, configure the settings for the Standard
Email Plug-in, and click OK.
Click the Test button to verify the connection with the SMTP server.
After the verification completes, click Save.
Table 9. IP Addresses and Host Name for the Analytics Cluster in Region A
Deployment Prerequisites
Prerequisite Value
Installation Package Download the .ova file of the vRealize Log Insight virtual appliance on
the machine where you use the vSphere Web Client.
License Obtain a license that covers the use of vRealize Log Insight.
Active Directory Verify that you have a parent and child Active Directory domain controllers
configured with the role-specific SDDC users and groups for the
rainpole.local domain.
Certification Authority Configure the Active Directory domain controller as a certificate authority
for the environment.
E-mail account Provide an email account to send vRealize Log Insight notifications from.
4.1.2 Deploy the Virtual Appliance for Each Node in the vRealize Log Insight
Cluster in Region A
Use the vSphere Web Client to deploy each vRealize Log Insight node as a virtual appliance on the
management cluster in Region A.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Review details page, examine the virtual appliance details, such as product, version,
download size, and disk size, and click Next.
On the Accept License Agreements page, accept the end user license agreements and
click Next.
On the Select name and folder page make the following selections, and click Next.
a. Enter a name for the node according to its role.
Name Role
Setting Value
Folder vRLI01
On the Select configuration page, from the Configuration drop-down menu, select
the Medium deployment configuration, and click Next.
On the Setup a resource page, select the SFO01-Mgmt01 management cluster as the resource
to run the virtual appliance on, and click Next.
Property Value
b. In the Other Properties section, enter and confirm a password for the root user.
The password must contain at least 8 characters, and must include:
*one uppercase character
*one lowercase character
*one digit
*one special character.
Use this password when you log in to the console of the vRealize Log Insight virtual
appliance.
c. Click Next.
Right-click the virtual appliance object and select the Power > Power On menu item.
During the power-on process, the virtual appliance expands the vRealize Log Insight Manager
logs partition.
Repeat the steps to deploy the vRealize Log Insight virtual appliance for the next node in the
cluster.
4.1.3 Configure a DRS Anti-Affinity Rule for vRealize Log Insight in Region A
To protect the vRealize Log Insight cluster from a host-level failure, configure vSphere DRS to run the
worker virtual appliances on different hosts in the management cluster.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. In a browser, go to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Navigate to the mgmt01vc01.sfo01.rainpole.local vCenter Server object, and under the SFO01
data center object select the SFO01-Mgmt01 cluster.
On the Manage tab, click the Settings tab.
Under the Configuration group of settings, select VM/Host Rules.
In the VM/Host Rules list, click the Add button above the rules list and add a new anti-affinity rule
called vrli-antiaffinity-rule for the vrli-mstr01, rli-wrkr-01 and vrli-wrkr-02 virtual
machines, and click OK.
Setting Value
Name vrli-antiaffinity-rule
Members vrli-mstr-01
vrli-wrkr-01
vrli-wrkr-02
Procedure
Open a Web browser and go to https://vrli-mstr-01.sfo01.rainpole.local.
The initial configuration wizard opens.
On the Setup page, click Next.
After the deployment is launched, on the Admin Credentials page, set the email address and the
password of the admin user, and click Save and Continue.
The password must contain at least 8 characters, and contain one uppercase character, one
lowercase character, one number, and one special character.
On the License page, enter the license key, click Add New License Key, and click Continue.
On the General Configuration page, enter email addresses to receive system notifications on
from vRealize Log Insight, and click Save and Continue.
Setting Value
On the Time Configuration page, enter the following settings and click Save and Continue.
Setting Value
On the SMTP Configuration page, specify the properties of an SMTP server to enable outgoing
alerts and system notification emails, and to test the email notification.
a. Set the connection setting for the SMTP server that will send the email messages from
vRealize Log Insight. Contact your system administrator for details about the email server.
SSL (SMTPS) Sets whether encryption should be enabled for the SMTP
transport option connection.
b. To verify that the SMTP configuration is correct, type a valid email address and click
Send Test Email.
vRealize Log Insight sends a test email to the address that you provided.
On the Join Existing Deployment page, enter the mater node FQDN vrli-mstr-
01.sfo01.rainpole.local and click Go.
The worker node sends a request to the vRealize Log Insight master node to join the existing
deployment.
After the worker node contacts the master node, click the Click here to access the
Cluster Management page link.
The login page of the vRealize Log Insight user interface opens.
Log in to the vRealize Log Insight UI by using the following credentials.
Setting Value
Password vrli_admin_password
After you join the first worker node to the cluster, the user interface displays a warning message
that another worker node must be added.
Repeat the steps to join the second worker node to the cluster.
After you add the second worker node, the Cluster page of the vRealize Log Insight UI contains
the master and worker nodes as components of the cluster.
4.1.6 Enable the Integrated Load Balancer of vRealize Log Insight in Region A
After you join the master and the worker nodes to create a vRealize Log Insight cluster, enable the
Integrated Load Balancer (ILB) for balancing incoming ingestion traffic of syslog data among the Log
Insight nodes and for high availability.
Procedure
Log in to the vRealize Log Insight UI.
a. Open a Web browser and go to https://vrli-mstr-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
In the New Virtual IP dialog box, enter the following settings and click Save.
Setting Value
IP 192.168.31.10
FQDN vrli-cluster-01.sfo01.rainpole.local
Setting Value
Password vrli_admin_password
On the Authentication page, enable the support for Active Directory and configure the settings
for connection to the Active Directory domain controller.
a. Configure the Active Directory connection settings according to the details from your IT
administrator.
Setting Value
Password svc_loginsight_password
4.2.1 Generate a CA-Signed SSL Certificate for vRealize Log Insight in Region
A
To create a CA-signed certificate for vRealize Log Insight, generate a certificate signing request
(CSR) on the Linux appliance for the master node and use the root Windows AD domain controller
to sign the certificate.
Procedure
On your computer, create a configuration file for OpenSSL certificate request generation,
called vrli-sfo.cfg. Because all nodes in the cluster share the same certificate, the Subject
Alternative Name field, subjectAltName, of the uploaded certificate must contain the IP
addresses and FQDNs of all nodes and of the load balancer. For common name, use the full
domain name of the integrated load balancer.
[ req ]
default_bits = 2048
default_keyfile = rui.key
distinguished_name = req_distinguished_name
encrypt_key = no
prompt = no
string_mask = nombstr
req_extensions = v3_req
[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = digitalSignature, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth, clientAuth
subjectAltName = DNS:vrli-cluster-01, IP:192.168.31.10, DNS: vrli-cluster-
01.sfo01.rainpole.local, DNS:vrli-mstr-01.sfo01.rainpole.local, DNS:vrli-mstr-
01, DNS:vrli-wrkr-01.sfo01.rainpole.local, DNS:vrli-wrkr-01, DNS:vrli-wrkr-
02.sfo01.rainpole.local, DNS:vrli-wrkr-02
[ req_distinguished_name ]
countryName = US
stateOrProvinceName = CA
localityName = Palo Alto
organizationName = Rainpole Inc.,
organizationalUnitName = rainpole.local
commonName = vrli-cluster-01.sfo01.rainpole.local
Log in to the vrli-mstr-01.sfo01.rainpole.local over SSH with the root user name
and vrli_master_root_password password.
Create a sub-directory called vrli in the root home directory and navigate to it.
mkdir /root/vrli
cd /root/vrli
From the /root/vrli folder, generate an RSA private key that is 2048 bits long, and save it as
a vrli.key file.
openssl genrsa -out vrli.key 2048
Copy the vrli-sfo.cfg to the /root/vrli folder on the master node virtual appliance.
You can use scp, FileZilla or WinSCP.
Use the vrli.key private key and the vrli-sfo.cfg configuration file to create a CSR and
save it as a vrli.pem file to the /root/vrli folder.
openssl req -new -key vrli.key -out vrli.pem -config vrli-sfo.cfg
The /root/vrli folder contains the vrli-sfo.cfg, vrli.key and vrli.pem files.
Submit the CSR to the Windows domain controller CA.
a. Run the following console command.
cat vrli.pem
b. Copy the output from -----BEGIN CERTIFICATE REQUEST----- to -----END CERTIFICATE
REQUEST----- inclusive.
On the Certificate Issued page, download the signed server certificate as a vrli.cer file in
Base 64 encoding.
If the save as dialog does not appear, the signed certificate is saved as certnew.cer in your
downloads folder. Rename the file to vrli.cer.
Copy the vrli.cer and rootca.cer certificate files to the /root/vrli folder on the master
virtual appliance. You can use scp, FileZilla or WinSCP.
In the SSH console to the master node, create a vrli-chain.pem file in
the /root/vrli folder that contains the signed certificate, CA certificate and private key file.
The order of the certificates in a PEM file must follow the certificate chain sequence starting from
the own certificate up to the root CA certificate. vrli.cer must be first, rootca.cer next
and vrli.key last.
cat vrli.cer rootca.cer vrli.key > vrli-chain.pem
Setting Value
Password vrli_admin_password
In the vRealize Log Insight UI, click the configuration drop-down menu icon and
select Administration.
To review the certificate, click the padlock in the address bar of the browser, and verify that
the Subject Alternative Name contains the names of the vRealize Log Insight cluster nodes.
4.3.1 Configure User Privileges in vSphere for Integration with vRealize Log
Insight for Region A
To collect log information from the vCenter Server instances and ESXi hosts in Region A, you must
assign a role to the svc-loginsight AD user on the vCenter Server objects. The svc-loginsight
user account is specifically dedicated to collecting log information from vCenter Server and ESXi.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
b. In the Clone Role Read-only dialog box, enter LogInsight in the Role name text box.
c. Select the Host.Configuration.Advanced settings, Host.Configuration.Change
settings, Host.Configuration.Network configuration and Host.Configuration.Security
profile and firewall privileges.
These host privileges allow vRealize Log Insight to configure the syslog service on the ESXi
hosts.
d. Click OK.
Assign the LogInsight role to the svc-loginsight user on the Management vCenter Server
and Compute vCenter Server.
a. In the vSphere Web Client, navigate to the vCenter Server object in Region A.
c. In the Add Permission dialog box, click the Add button to assign a role to a user or a group.
d. In the Select Users/Groups dialog box, from the Domain drop-down menu,
select RAINPOLE, and in the filter box type svc.
e. From the list of users and groups, select the svc-loginsight AD user, click the Add button,
and click OK.
f. In the Add Permission dialog box, from the Assigned Role drop-down menu, select Log
Insight, select Propagate to children, and click OK.
g. Repeat the step to assign permissions for the svc-loginsight user on the other vCenter Server
instance.
Setting Value
Password vrli_admin_password
Setting Value
Hostname mgmt01vc01.sfo01.rainpole.local
comp01vc01.sfo01.rainpole.local
Username [email protected]
Password svc-loginsight_user_password
b. Click Advanced Options and examine the list of ESXi hosts that are connected to the
vCenter Server instance to verify that you connect to the correct vCenter Server.
c. Click Add vCenter Server to add a new settings form and repeat the steps to add the
settings for the second vCenter Server instance in Region A.
Click Save.
A progress dialog box appears.
Click OK in the confirmation dialog box that appears after vRealize Log Insight contacts the
vCenter Server instances.
You see the vSphere dashboards under the VMware - vSphere content pack dashboard
category.
4.3.3 Configure vCenter Server to Forward Log Events to vRealize Log Insight
Install the vRealize Log Insight agent to collect and forward events to vRealize Log Insight on the
vCenter Server instances and Platform Services Controllers in the data center.
By installing the Log Insight agent on vCenter Server and Platform Services Controller, you collect log
data that is related to the vCenter Server operation.
Procedure
Download the Linux agent of vRealize Log Insight.
a. Open a Web browser and go to https://vrli-cluster-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
c. In the vRealize Log Insight UI, click the configuration drop-down menu icon and select
Administration.
d. Under Management, click Agents.
e. On the Agents page, click the Download Log Insight Agent Version 3.3.1 link.
f. In the Download Log Insight Agent Version 3.3.1 dialog box, click Linux BIN (32-bit/64-
bit) and save the .bin file on your computer.
a. In the vRealize Log Insight UI, click the configuration drop-down menu icon and select
Administration.
b. Under Management, click Agents.
c. On the Agents page, from the Agents drop-down list at the top select vSphere 6.x - vCenter
(Linux) Complete.
You see the agent configuration template file.
d. Under the agent configuration text box, click Copy Template, and in the Copy Agent Group
dialog box click Copy.
e. In the agent filter, set filter attribute to Hostname, the operator to matches, and the value to
the host name for each vCenter Server or Platform Services Controller appliance for the
region that you are working in.
f. Scroll down to the bottom of the page and click the Save New Group button.
Install the Log Insight agent on the vCenter Server Appliance or Platform Services Controller
appliance.
a. Connect to the appliance over SSH.
b. Use the roo t user name and app lia nce _ro ot _pas swo rd password to log in.
c. Copy the .bin file of the agent to the /root folder of the vCenter Server Appliance or the
Platform Services Controller appliance.
You can use scp, FileZilla or WinSCP.
d. Run the following console commands to make the agent .bin file executable.
cd /root
chmod +x VMware-Log-Insight-Agent-3.3.1-3636434_192.168.31.10.bin
e. Install the agent by running the following command.
./VMware-Log-Insight-Agent-3.3.1-3636434_192.168.31.10.bin
Verify whether the /etc/liagent.ini file is configured to send logs to vRealize Log Insight.
a. Verify that the [server] section contains the following hostname parameter
hostname=vrli-cluster-01.sfo01.rainpole.local (for Region A
appliances)
hostname=vrli-cluster-51.lax01.rainpole.local (for Region B
appliances)
b. If the hostname parameter is not available, add it and save the changes to
/etc/liagent.ini.
Repeat steps 3 and 4 for each appliance.
Verify that the appliances are in the vSphere 6.x - vCenter (Linux) Complete agent group in
vRealize Log Insight.
a. Open a Web browser and go to https://vrli-mstr-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
c. In the vRealize Log Insight UI, click the configuration drop-down menu icon and select
Administration.
d. Under Management, click Agents.
e. On the Agents page, from the Agents drop-down menu select vSphere 6.x - vCenter
(Linux) Complete.
f. Verify that the appliances are registered on the page.
4.4 Install the vRealize Log Insight Content Pack for Virtual SAN
in Region A
Install the content pack for VMware Virtual SAN to add the dashboards for viewing log information in
vRealize Log Insight.
Procedure
Log in to the vRealize Log Insight user interface.
a. Open a Web browser and go to https://vrli-cluster-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
In the vRealize Log Insight user interface, click the configuration drop-down menu icon and
select Content Packs.
Under Content Pack Marketplace, select Marketplace.
In the list of content packs, locate the VMware - VSAN content pack and click its icon.
In the Install Content Pack dialog box, click Install.
After the installation is complete, the VMware - VSAN content pack appears in the Installed Content
Packs list on the left.
Virtual SAN log information becomes available without additional configuration. The integration
between vRealize Log Insight and vSphere accommodates the transfer of Virtual SAN log information
automatically.
Setting Value
Password vrli_admin_password
In the vRealize Log Insight UI, click the configuration drop-down menu icon and
select Administration.
Setting Value
Hostname vrops-cluster-01.rainpole.local
Password vrops_admin_password
Click Save.
A progress dialog box appears.
4.6.1 Install the vRealize Log Insight Content Pack for vRealize Operations
Manager
Install the content pack for vRealize Operations Manager to add the dashboards for viewing log
information in vRealize Log Insight.
Procedure
Log in to the vRealize Log Insight user interface.
a. Open a Web browser and go to https://vrli-cluster-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
In the vRealize Log Insight UI, click the configuration drop-down menu icon and select
Content Packs.
Under Content Pack Marketplace, select Marketplace.
In the list of content packs, locate the VMware - vR Ops 6.x content pack and click its icon.
In the Install Content Pack dialog box, click Install.
After the installation is complete, the VMware - vR Ops 6.x content pack appears in
the Installed Content Packs list on the left.
[filelog|ANALYTICS-analytics]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"ANALYTICS","vmw_vr_ops_clustername":"<YOUR CLUSTER
NAME HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR
[filelog|COLLECTOR-collector]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"COLLECTOR","vmw_vr_ops_clustername":"<YOUR CLUSTER
NAME HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR
NODE NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include = collector.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|COLLECTOR-collector_wrapper]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"COLLECTOR","vmw_vr_ops_clustername":"<YOUR CLUSTER
NAME HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR
NODE NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include = collector-wrapper.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\.\d{3}
[filelog|COLLECTOR-collector_gc]
directory = /data/vcops/log
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"COLLECTOR","vmw_vr_ops_clustername":"<YOUR CLUSTER
NAME HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR
NODE NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
include = collector-gc*.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\w]\d{2}:\d{2}:\d{2}\.\d{3}
[filelog|WEB-web]
directory = /data/vcops/log
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"WEB","vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
include = web*.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|GEMFIRE-gemfire]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"GEMFIRE","vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include = gemfire*.log*
exclude_fields=hostname
[filelog|VIEW_BRIDGE-view_bridge]
tags =
{"vmw_vr_ops_appname":"vROps","vmw_vr_ops_logtype":"VIEW_BRIDGE","vmw_vr_ops
_clustername":"<YOUR CLUSTER NAME HERE>",
[filelog|VCOPS_BRIDGE-vcops_bridge]
tags =
{"vmw_vr_ops_appname":"vROps","vmw_vr_ops_logtype":"VCOPS_BRIDGE","vmw_vr_op
s_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include = vcops-bridge*.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|SUITEAPI-api]
directory = /data/vcops/log
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"SUITEAPI","vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
include = api.log*;http_api.log*;profiling_api.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|SUITEAPI-suite_api]
directory = /data/vcops/log/suite-api
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"SUITEAPI","vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
include = *.log*
exclude_fields=hostname
event_marker=^\d{2}-\w{3}-\d{4}[\s]\d{2}:\d{2}:\d{2}\.\d{3}
[filelog|ADMIN_UI-admin_ui]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"ADMIN_UI","vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/casa
include = *.log*;*_log*
exclude_fields=hostname
[filelog|CALL_STACK-call_stack]
tags = {"vmw_vr_ops_appname":"vROps","vmw_vr_ops_logtype":"CALL_STACK",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>","vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>","vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/callstack
include = analytics*.txt;collector*.txt
exclude_fields=hostname
[filelog|TOMCAT_WEBAPP-tomcat_webapp]
tags =
{"vmw_vr_ops_appname":"vROps","vmw_vr_ops_logtype":"TOMCAT_WEBAPP","vmw_vr_o
ps_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/product-ui
include = *.log*;*_log*
exclude_fields=hostname
[filelog|OTHER-other1]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"OTHER","vmw_vr_ops_clustername":"<YOUR CLUSTER NAME
HERE>", "vmw_vr_ops_clusterrole":"Master","vmw_vr_ops_nodename":"<YOUR NODE
NAME HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include =
aim*.log*;calltracer*.log*;casa.audit*.log*;distributed*.log*;hafailover*.lo
g;his*.log*;installer*.log*;locktrace*.log*;opsapi*.log*;query-service-
timer*.log*;queryprofile*.log*;vcopsConfigureRoles*.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|OTHER-other2]
tags = {"vmw_vr_ops_appname":"vROps", "vmw_vr_ops_logtype":"OTHER",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include = env-checker.log*
exclude_fields=hostname
event_marker=^\d{2}\D{1}\d{2}\D{1}\d{4}\s\d{2}:\d{2}:\d{2}
[filelog|OTHER-other3]
tags = {"vmw_vr_ops_appname":"vROps", "vmw_vr_ops_logtype":"OTHER",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log
include = gfsh*.log*;HTTPPostAdapter*.log*;meta-
gemfire*.log*;migration*.log*
exclude_fields=hostname
[filelog|OTHER-watchdog]
tags = {"vmw_vr_ops_appname":"vROps", "vmw_vr_ops_logtype":"OTHER",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/vcops-watchdog
include = vcops-watchdog.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|ADAPTER-vmwareadapter]
tags = {"vmw_vr_ops_appname":"vROps", "vmw_vr_ops_logtype":"ADAPTER",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/adapters/VMwareAdapter
include = *.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|ADAPTER-vcopsadapter]
tags = {"vmw_vr_ops_appname":"vROps", "vmw_vr_ops_logtype":"ADAPTER",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/adapters/VCOpsAdapter
include = *.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
[filelog|ADAPTER-openapiadapter]
tags = {"vmw_vr_ops_appname":"vROps", "vmw_vr_ops_logtype":"ADAPTER",
"vmw_vr_ops_clustername":"<YOUR CLUSTER NAME HERE>",
"vmw_vr_ops_clusterrole":"Master", "vmw_vr_ops_nodename":"<YOUR NODE NAME
HERE>", "vmw_vr_ops_hostname":"<YOUR VROPS HOSTNAME HERE>"}
directory = /data/vcops/log/adapters/OpenAPIAdapter
include = *.log*
exclude_fields=hostname
event_marker=^\d{4}-\d{2}-\d{2}[\s]\d{2}:\d{2}:\d{2}\,\d{3}
b. In the node-specific liagent.ini file, change the following parameters and save the file.
proto Protocol that the [server] section Remove the ; comment in front of
agent uses to the parameter to set the log protocol
send events to to cfapi.
the Log Insight
server.
vmw_vr_ops_ Role that the each [filelog|section_na Set to Master, Replica, Data or
clusterrole vRealize me] section Remote Collector.
Operations
Manager node
vmw_vr_ops_ Name of the each [filelog|section_na Replace each <YOUR NODE NAME
nodename vRealize me] section HERE> with the following name:
Operations vrops-mstrn-01 for the master
Manager node node
that is set during vrops-repln-02 for the replica
node initial node
configuration vrops-datan-03 for data node 1
vrops-datan-04 for data node 2
vrops-rmtcol-01 for remote
collector 1
vrops-rmtcol-02 for remote
collector 2
[server]
; Log Insight server hostname or ip address
; If omitted the default value is LOGINSIGHT
hostname=vrli-cluster-01.sfo01.rainpole.local
; Set protocol to use:
; cfapi - Log Insight REST API
; syslog - Syslog protocol
; If omitted the default value is cfapi
;
proto=cfapi
; Log Insight server port to connect to. If omitted the default value
is:
; for syslog: 512
; for cfapi without ssl: 9000
; for cfapi with ssl: 9543
port=9000
For example, on the master replica node you change the [filelog|ANALYTICS-analytics]
section that is related to the logs files of the analytics module as follows.
[filelog|ANALYTICS-analytics]
tags = {"vmw_vr_ops_appname":"vROps",
"vmw_vr_ops_logtype":"ANALYTICS","vmw_vr_ops_clustername":"vrops-cluster-
01", "vmw_vr_ops_clusterrole":"Replica","vmw_vr_ops_nodename":"vrops-repln-
02", "vmw_vr_ops_hostname":"vrops-repln-02.rainpole.local"}
directory = /data/vcops/log
include = analytics*.log*
exclude_fields=hostname
Setting Value
Password vsphere_admin_password
d. Right-click the appliance node and select Open Console to open the remote console to the
appliance.
e. Press ALT+F1 to switch to the command prompt.
f. If the node is not the master, at the command prompt, log in by using the root user name
and an empty password, and change the default empty password.
You must change the default password of the root user because you log in for the first time
to the virtual appliance console.
g. Start the SSH service by running the command:
service sshd start
h. Close the virtual appliance console.
Apply the Log Insight agent configuration.
a. On the appliance, replace the liagent.ini file in the /var/lib/loginsight-
agent folder with the node-specific file on your computer.
You can use scp, FileZilla or WinSCP.
b. Restart the Log Insight agent on node by running the following console command as the root
user.
/etc/init.d/liagentd restart
c. Stop the SSH service on the virtual appliance by running the following command.
service sshd stop
Repeat the steps for each of the remaining five vRealize Operations Manager nodes.
You see log information about the operation of vRealize Operations Manager on the VMware - vR
Ops 6.x Log Insight dashboards.
Configure the NSX Edge Instances to Foward Log Events to vRealize Log Insight in Region A
4.7.1 Install the vRealize Log Insight Content Pack for NSX for vSphere
Install the content pack for NSX for vSphere to add the dashboards for viewing log information in
vRealize Log Insight.
Log in to the vRealize Log Insight user interface.
a. Open a Web browser and go to https://vrli-cluster-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
In the vRealize Log Insight UI, click the configuration drop-down menu icon and
select Content Packs.
Under Content Pack Marketplace, select Marketplace.
In the list of content packs, locate the VMware - NSX-vSphere content pack and click its icon.
In the Install Content Pack dialog box, click Install.
After the installation is complete, the VMware - NSX-vSphere content pack appears in the
Installed Content Packs list on the left.
4.7.2 Configure NSX Managers to Forward Log Events to vRealize Log Insight
in Region A
Configure the NSX Manager for the management cluster and the NSX Manager for the compute and
edge clusters to send audit logs and system events to vRealize Log Insight in Region A.
Procedure
Log in to the NSX Manager appliance UI.
a. Open a Web browser and go to the following URL.
Setting Value
Password mngnsx_admin_password
compnsx_admin_password
On the main page of the appliance UI, click Manage Appliance Settings.
Under Settings, click General, and in the Syslog Server pane, click Edit.
In the Syslog Server dialog box, configure vRealize Log Insight as a syslog server by specifying
the following settings and click OK.
Setting Value
Port 514
Protocol UDP
b. In the Basic Authorization dialog box, enter the following credentials, select Remember
me and click Okay.
Setting Value
Username admin
Password mngnsx_admin_password
compnsx_admin_password
d. In the Request Header dialog box, enter the following header details and click Okay.
Name Content-Type
Value application/xml
Contact the NSX Manager to retrieve the IDs of the associated NSX Controllers.
a. In the Request pane, from the Method drop-down menu, select GET.
b. In the URL text box, enter the following URL, and click Send.
The RESTClient sends a query to the NSX Manager about the installed NSX controllers.
c. After the NSX Manager sends a response back, click the Response Body (Preview) tab
under Response. The response body contains a root <controllers> XML element which
groups the details about the three controllers that form the controller cluster.
d. Within the <controllers> element, locate the <controller> element for each controller
and write down the content of the id element.
Controller IDs have the controller-id format where id represents the sequence number
of the controller in the cluster, for example, controller-2.
e. Repeat the steps for the other NSX Manager.
For each NSX Controller, send a request to configure vRealize Log Insight as a remote syslog
server.
a. In the Request pane, from the Method drop-down menu, select POST, and in the URL text
box, enter the following URL.
b. In the Request pane, paste the following request body in the Body text box and click Send.
<controllerSyslogServer>
<syslogServer>vrli-cluster-01.sfo01.rainpole.local</syslogServer>
<port>514</port>
<protocol>UDP</protocol>
<level>INFO</level>
</controllerSyslogServer>
c. Repeat the steps for the next NSX Controller.
b. After the NSX Manager sends a response back, click the Response Body (Preview) tab
under Response. The response body contains a root <controllerSyslogServer>
element which represents the settings for the remote syslog server on the NSX Controller.
c. Verify that the value of the <syslogServer> element is vrli-cluster-
01.sfo01.rainpole.local.
d. Repeat the steps for the next NSX Controller.
4.7.4 Configure the NSX Edge Instances to Foward Log Events to vRealize
Log Insight in Region A
Configure the Edge Services Gateways, Universal Distributed Logical Router and Load Balancer of
Management and Compute NSX Manager instances to forward log information to vRealize Log
Insight in Region A.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a browser and go to https://mgmt01vc01.sfo01.rainpole.local/vsphere-
client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Configure the log forwarding on each edge service gateway of Management and Compute NSX
Managers instances.
a. Double-click the edge device to open its user interface.
b. On the NSX Edge device page, click the Manage tab, click Settings, and click
Configuration.
c. In the Details panel, click Change next to Syslog servers.
d. In the Edit Syslog Servers Configuration dialog box, in the Syslog Server 1 text box enter
vrli-cluster-01.sfo01.rainpole.local and from the Protocol drop-down menu, select udp.
e. Click OK.
f. Repeat the steps for the remaining NSX Edge devices of Management and Compute NSX
Manager instances.
The vRealize Log Insight user interface starts showing log data in the NSX-vSphere-Overview
dashboard available under the VMware - NSX-vSphere group of content pack dashboards.
4.8.1 Install the vRealize Log Insight Content Pack for vRealize Automation in
Region A
Install the following content packs for vRealize Automation and vRealize Orchestrator to add the
dashboards for viewing log information in vRealize Log Insight.
Procedure
Log in to the vRealize Log Insight user interface.
a. Open a Web browser and go to https://vrli-cluster-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
In the vRealize Log Insight UI, click the configuration drop-down menu icon and
select Content Packs.
Under Content Pack Marketplace, select Marketplace.
In the list of content packs, locate the VMware - vRA 7 content pack and click its icon.
In the Install Content Pack dialog box, click Install.
4.8.2 Install and Configure vRealize Log Insight Windows Agents in Region A
Install the vRealize Log Insight agent on the Windows virtual machines for the Distributed Execution
Manager, IaaS Manager Service, IaaS Web Server, IaaS Microsoft SQL Server and the vSphere
proxy agents. Configure Log Insight Windows Agents from the vRealize Log Insight web interface.
Procedure
Download the Windows agent for vRealize Log Insight to your Jump Host.
a. Open a Web browser and go to https://vrli-cluster-01.sfo01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrli_admin_password
b. Copy Log Insight Agent Version 3.3.1 .msi file from the jump host and paste it in the
vRealize Automation Windows VM.
c. Double-click the .msi file to run the installer.
d. In the VMware vRealize Log Insight Agent Setup wizard, accept the license agreement and
click Next.
e. With the Log Insight host name (vli-cluster-01.sfo01.rainpole.local) shown in the Host text
box, click Install.
Setting Value
Password vrli_admin_password
e. From the drop down on the top, select vRealize Automation 7 - Windows from the
Available Templates section.
g. In the Copy Agent Group dialog box, enter vRA7 - Windows Agent Group in the name text
box and click Copy.
i. Click Refresh and verify that all the agents listed in the filter appear in the Agents list.
All VMware vRA 7 dashboards become available on the vRealize Log Insight Home page.
Procedure
Edit the liagent.ini file on the first vRealize Automation virtual appliance.
a. Open an SSH connection to the virtual appliance by using the following settings.
Setting Value
Password vra_applianceA_root_password
Setting Value
Password vrli_admin_password
g. In the Copy Agent Group dialog box, enter vRA7 - Linux Agent Group in the name field
and click Copy.
i. Click Refresh and verify that all the agents listed in the filter are showing up in the Agents
list.
All VMware vRA 7 dashboards become available on the vRealize Log Insight Home page.
Host A https://vra01vro01b.rainpole.local:8283/vco-controlcenter
Host B https://vra01vro01a.rainpole.local:8283/vco-controlcenter
Procedure
Log in to the vRealize Orchestrator Control Center.
a. Open a Web browser and go to https://vra01vro01a.rainpole.local:8283/vco-
controlcenter.
b. Log in using the following credentials.
Setting Value
Password hostA_root_password
Setting Value
Host vrli-cluster-01.sfo01.rainpole.local
Port 514
Facility LOCAL0
Threshold INFO
Setting Value
Password vrli_admin_password
c. In the vRealize Log Insight user interface, select VMware - Orchestrator, from the Content
Pack Dashboards drop-down menu.
d. Verify that the Server nodes grouped by hostname dashboard, shows the vRealize
Orchestrator hosts.
Server nodes grouped by hostname dashboard becomes available immediately. Other dashbaords
get populated as they get respective events.
Setting Value
Password vrli_admin_password
In the vRealize Log Insight UI, click the configuration drop-down menu icon and
select Administration.
Configure retention threshold notification.
Log Insight continually estimates how long data can be retained with the currently available pool
of storage. If the estimation drops below the retention threshold of one week, Log Insight
immediately notifies the administrator that the amount of searchable log data is likely to drop.
a. Under Configuration, click General.
b. On the General Configuration page, under the Alerts section select the Send a notification
when capacity drops below check box next to the Retention Notification
Threshold settings, and enter a 1-week period in the text box underneath.
c. Click Save.
c. In the Archive Location text box, enter the path in the form of nfs://nfs-server-
address/V2D_vRLI_MgmtA_1TB to an NFS partition where logs will be archived.
d. Click Test next to the Archive Location text box to verify that the share is accessible.
e. Click Save.
192.168.11.52 vra01svr01b.rainpole.local
192.168.11.55 vra01iws01b.rainpole.local
192.168.11.58 vra01ims01b.rainpole.local
192.168.11.61 vra01dem02.rainpole.local
192.168.11.64 vra01vro01b.rainpole.local
Table 11. IP Addresses and Host Name for the vRA Proxy Agents and vRB Data Collector in
Region A
192.168.31.53 vra01ias02.sfo01.rainpole.local
172.17.11.251 ntp.lax01.rainpole.local
172.17.11.252
Deployment Prerequisites
Verify that your environment satisfies the following prerequisites to deployment vRealize Automation.
Prerequisite Value
Installation package Download the vRealize Automation virtual appliance .ova file.
Download the vRealize Orchestrator virtual appliance .ova file.
Download the vRealize Business virtual appliance .ova file.
License Verify that you have obtained a license that covers the use of vRealize
Automation.
Active directory Verify that you have a parent active directory with the SDDC user roles
configured for the rainpole.local domain.
Verify the existence of the svc-vra user in the rainpole.local domain.
Verify the existence of the svc-vro user in the rainpole.local domain.
Certification authority Configure the root Active Directory domain controller as a certificate
authority for the environment.
Procedure
Prepare the vRealize Certificate Generation Tool.
a. Log in to the machine that you set up for certificate generation.
b. Download the vRealize Certificate Generation Tool.
For information how to download and use the vRealize Certificate Generation Tool, see
http://kb.vmware.com/kb/2107816.
c. Extract the downloaded vRealize Certificate Generation Tool .zip file.
d. Copy the certgen.sh file and place it in the /tmp directory.
e. Change the certgen.sh permissions to execute by using the chmod u+x certgen.sh
command.
chmod u+x certgen.sh
Run the vRealize Certificate Generation Tool.
a. Run the certgen.sh script.
./certgen.sh
b. Enter the following values when prompted.
Prompt Value
Enter State/Country CA
c. Enter all of the host names for the solution for which you are generating certificates.
Submit the vrealize.csr file to the Windows domain controller CA, and request a signed
certificate.
a. Log in to the Windows host that has access to the AD-CA server as an administrator.
b. By using Filezilla or Winscp copy the vrealize.csr file from the virtual appliance that you
use for certificate generation to the local Downloads directory.
c. Open the vrealize.csr file, and copy the text that begins -----BEGIN CERTIFICATE
REQUEST----- to -----END CERTIFICATE REQUEST----- inclusive.
Setting Value
Password domain_admin_password
e. Paste the request in the Saved Request text box, select VMware from the Certificate
Template drop-down menu, and click Submit.
f. On the Certificate Issued page, select the Base 64 encoded radio button, and click
Download certificate chain.
If the Save As dialog box does not appear, the signed certificate is saved as certnew.p7b
in your computer's Downloads folder.
Export the certificates from the certnew.p7b file to Root64.cer and vrealize.crt.
a. Double-click the downloads\certnew.p7b file to open it in certmgr.
b. Right-click the root certificate rainpole-DC01RPL-CA and select All Tasks > Export.
The Certificate Export Wizard appears.
e. On the File to Export page, enter Root64.cer in the File name text box and click Next.
f. Repeat the export process to export the VMware vRealize certificate to the Downloads
directory, as vrealize.cer.
Product Folder
Remove all files from the /tmp directory, except the certgen.sh file.
Repeat the procedure to generate certificate files for the remaining products.
When finished you must have the following folders and files.
5.1.3 SQL Server Configuration for the Cloud Management Platform in Region
A
Microsoft SQL Server Recommendations in Region A
Assign the SQL Server System Role to vRealize Automation in Region A
Create a SQL Server Database for vRealize Orchestrator in Region A
Configure Network Access for Distributed Transaction Coordinator in Region A
Disable Windows Firewall for vRealize Automation in Region A
5.1.3.2. Assign the SQL Server System Role to vRealize Automation in Region A
Assign the SQL Server system role sysadmin to the vRealize Automation service account. vRealize
Automation uses the SQL Server system role privilege to create and execute scripts on the SQL
Server database. By default, only users who are members of the sysadmin system role, or the
db_owner or db_ddladmin database roles can create objects in the database.
Procedure
Log in to the VRA01MSSQL01.rainpole.local by using a Remote Desktop Protocol (RDP)
client.
a. Open an RDP connection to the virtual machine VRA01MSSQL01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password windows_administrator_password
From the Start menu, click All Programs, click Microsoft SQL Server, and click SQL Server
Management Studio.
Note If SQL Server Management Studio doesn't appear in your All Programs menu, you may not
have successfully installed SQL Server Management Studio. Verify that you have
successfully installed SQL Server Management Studio, and then continue with this procedure.
In the Connect to Server dialog box, leave the default value of the Server Name text box,
select Windows Authentication from the Authentication drop-down menu, and click Connect.
Note During the SQL Server installation, Database Engine configuration wizard prompts you to
provide the user name and password for the SQL server administrator (rainpole\svc-
vra). If this user was not added during the SQL Server installation, select SQL
Authentication from the Authentication drop-down menu, and enter the user name sa in
the User name text box, and the password sa_password in the Password text box.
In Object Explorer, expand the folder for the server instance VRA01MSSQL01.
Right-click the Security folder, select New, and then select Login.
The Login Properties dialog box opens.
In the Object Explorer Details pane, select the Server Role page.
From the Server roles list item field select the sysadmin check box, and click OK.
Setting Value
Password windows_administrator_password
From the Start menu, click All Programs, click Microsoft SQL Server, and click SQL Server
Management Studio.
Note If SQL Server Management Studio doesn't appear in your All Programs menu, you may not
have successfully installed SQL Server Management Studio. Verify that you have
successfully installed SQL Server Management Studio, and then continue with this procedure.
In the Connect to Server dialog box, leave the default value of the Server Name text box,
select Windows Authentication from the Authentication drop-down menu, and click Connect.
Note During the SQL Server installation, Database Engine configuration wizard prompts you to
provide the user name and password for the SQL server administrator (rainpole\svc-
vra). If this user was not added during the SQL Server installation, select SQL
Authentication from the Authentication drop-down menu, and enter the user name sa in
the User name text box, and the password sa_password in the Password text box.
In Object Explorer, expand the folder for the server instance VRA01MSSQL01.
Right-click the Databases folder, and click New Database.
The New Database dialog box displays.
On the General page of the New Database dialog box, enter VRODB-01 in the Database name
text box.
Setting Value
In the Object Explorer Details pane, expand the VRODB-01 database server.
Enter the User name text box type the vRealize Orchestrator service account name
rainpole\svc-vro.
Setting Value
Setting Value
Password windows_administrator_password
From the Windows Start menu select Run, and type comexp.msc in the Open text box and click
OK.
The Component Services manager displays. Component Services lets you manage
Component Object Model (COM+) applications.
Using the navigation tree in the left-side pane, expand Component Services > Computers > My
Computer > Distributed Transaction List > Local DTC.
Setting Value
Setting Value
Password windows_administrator_password
From the Windows Start menu select Run, and type WF.msc in the Open text box, and click OK.
The Windows Firewall with Advanced Security window displays. You use Windows Firewall
with Advanced Security to configure firewall properties for each network profile.
Allow Access to Microsoft SQL Server on TCP Port 1433.
a. In the navigation pane right-click Windows Firewall with Advanced Security, then right-
click Inbound Rules, and then click New Rule in the action pane.
b. On the Rule Type dialog box, select Port, and then click Next.
c. On the Protocol and Ports dialog box, select TCP. Select Specific local ports, and then
type the port number of 1433. Click Next.
d. On the Action dialog box, select Allow the connection, and then click Next.
e. On the Profile dialog box, select all profiles (Domain, Private, Public), and then click Next.
f. On the Name dialog box, type a name and description for this rule, and then click Finish.
Allow Access to Microsoft Distributed Transaction Coordinator.
a. In the navigation pane right-click Windows Firewall with Advanced Security, then right-
click Inbound Rules, and then click New Rule in the action pane.
b. On the Rule Type dialog box, select Predefined, then select Distributed Transaction
Coordinator, and then click Next.
c. On the Predefined Rules dialog box, select all rules for Distributed Transaction
Coordinator (RPC-EPMAP), Distributed Transaction Coordinator (RPC), Distributed
Transaction Coordinator(TCP-In) Click Next.
d. On the Action dialog box, select Allow the connection, and then click Finish.
Exit Windows Firewall with Advanced Security window.
Setting Value
Password vsphere_admin_password
In the Navigator pane, select vCenter Inventory Lists > vCenter Servers.
Right-click the comp01vc01.sfo01.rainpole.local instance and select Add Permissions.
In the Add Permission dialog box, click the Add button.
The Select Users/Groups dialog box appears.
Select RAINPOLE from the Domain drop-down menu, and in the Show Users First text box
enter svc to filter user and group names.
Select svc-vra and svc-vro from the User/Group list, click the Add button and click OK.
In the Add Permission dialog box, select Administrator from the Assigned Role drop-down
menu and click OK.
The svc-vra and svc-vro users now have the Administrator privilege on the Compute vCenter
Server in Region A.
Setting Value
Password vsphere_admin_password
In the Navigator pane, select Networking & Security > NSX Managers.
Double-click the 172.16.11.66 Compute NSX Manager.
Click Manage, click Users, and click the Add icon.
The Assign Role wizard appears.
On the Identify User page, select the Specify a vCenter User radio button, enter svc-
[email protected] in the User text box, and click Next.
On the Select Roles page, select the Enterprise Administrator radio button, and click Finish.
The rainpole\svc-vra user is now configured as an Enterprise Administrator for the compute
cluster NSX instance, and appears in the lists of users and roles.
5.3.1.1. Add Virtual IP Addresses to the NSX Load Balancer Interface in Region A
As the first step of configuring load balancing, you add virtual IP Addresses to the edge interfaces.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
In the Edit NSX Edge Interface dialog box, add the VIP addresses of the vRealize Automation
nodes in the Secondary IP Addresses text box.
Setting Value
Setting Value
Password vsphere_admin_password
Click the Add icon and in the New Profile dialog box, enter the following values.
Setting Value
Name vRealize-https
Type HTTPS
Persistence Source IP
Procedure
Log in to vCenter Server by using the vSphere Web Client.
Setting Value
Password vsphere_admin_password
Click the Add icon and in the New Service Monitor dialog box, enter the following values, and
click OK.
Setting Value
Name vra-svr-443-monitor
Interval 3
Timeout 9
Max Retries 3
Type HTTPS
Expected 204
Method GET
URL /vcac/services/api/health
No vra01svr01b 192.168.11.52 1
No vra01vro01b 192.168.11.64 1
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Click the Add icon and in the New Pool dialog box, enter the following values.
Setting Value
Name vra-svr-443
Algorithm IP-HASH
Monitors NONE
Under Members, click the Add icon to add the first pool member.
In the New Member dialog, specify the following values, and click OK.
Setting Value
Name vra01svr01a
Port 443
Weight 1
Under Members, click the Add icon to add the second pool member.
In the New Member dialog box, enter the following values, click OK and click OK to save the
vRealize Automation server pool.
Setting Description
Name vra01svr01b
Port 443
Weight 1
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Click the Add icon and in the New Virtual Server dialog box, enter the following values, and click
OK.
Setting Value
Name vra-svr-443
IP Address 192.168.11.53
Protocol HTTPS
Port 443
The server includes the vRealize Automation appliance product console, which provides a single
portal for self-service provisioning and management of cloud services, authoring, administration, and
governance.
During deployment of the virtual appliances, a PostgreSQL appliance database is created
automatically on the first vRealize Automation appliance. A replica database can be installed on a
second vRealize Automation appliance to create a high-availability environment.
Perform this procedure twice to deploy two appliances by using the configuration values for host A for
the first appliance, and the configuration values for host B for the second appliance.
VM Storage Policy Virtual SAN Default Storage Virtual SAN Default Storage
Policy Policy
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Review details page, examine the virtual appliance details, such as product, version,
download and disk size, and click Next.
On the Accept License Agreements page, accept the end user license agreements and
click Next.
On the Select name and folder page, type in the following information, and click Next.
Name vra01svr01a.rainpole.local
On the Customize template page, configure the following values and click Next.
Hostname vra01svr01a.rainpole.local
DNS 172.16.11.5,172.17.11.5
On the Ready to complete page, review the configuration settings you specifed, do not select
Power on after deployment, and click Finish.
Wait until the vRealize Automation appliance virtual machine is completely powered on. This may
take several minutes.
From the Virtual Machine Console, verify that vra01svr01a.rainpole.local uses the
configuration settings you specified.
Repeat the procedure to deploy the second vRealize Automation virtual machine
vra01svr01b.rainpole.local.
Setting Value
Password vsphere_admin_password
Setting Value
On the Set Registration Information page, enter the following settings, and click Next.
Setting Value
Name Rainpole
Organization Rainpole IT
On the Set Computer Name page, select the Enter a name in the Clone/Deploy wizard radio
button, and click Next.
On the Enter Windows License page, enter the following settings, and click Next.
If you are using Microsoft License Server, or have multiple single license keys, leave the Product
Key text box blank.
Setting Value
Setting Value
On the Set Administrator Password page, enter the following settings, and click Next.
Setting Value
Password local_administrator_pwd
On the Time Zone page, select (GMT) Coordinated Universal Time from the Time Zone drop-
down menu, and click Next.
Setting Value
Prompt the user for an address when the specification is used Selected
Setting Value
b. Enter rainpole.local in the For all connections with TCP/IP enabled text box and click
the Add button.
c. Enter sfo01.rainpole.local in the For all connections with TCP/IP enabled text box and
click the Add button.
d. Enter lax01.rainpole.local in the For all connections with TCP/IP enabled text box
and click the Add button.
e. Click OK to save settings and close the Edit Network dialog box, and click Next.
On the Set Workgroup or Domain page, enter the following settings, and click Next.
Setting Value
Username [email protected]
Password ad_admin_password
On the Set Operating System options page, select the Generate New Security ID (SID) check
box, and click Next.
On the Ready to Complete page, review the settings you entered, and click Finish.
The customization specification you created is listed in the Customization Specification Manager,
and can be used to customize virtual machine guest operating systems.
5.3.3.1.2. Create a Customization Specification File for IaaS Proxy Agent Servers
Create a vSphere Image Customization template to use with your vRealize Automation IaaS Proxy
Agent deployment.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
On the Set Registration Information page, enter the following settings, and click Next.
Setting Value
Name Rainpole
Organization Rainpole IT
On the Set Computer Name page, select the Enter a name in the Clone/Deploy wizard radio
button, and click Next.
On the Enter Windows License page, enter the following settings, and click Next.
If you are using Microsoft License Server, or have multiple single license keys, leave the Product
Key text box blank.
Setting Values
On the Set Administrator Password page, enter the following settings, and click Next.
Setting Value
Password local_administrator_pwd
On the Time Zone page, select (GMT) Coordinated Universal Time from the Time Zone drop
down menu, and click Next.
In the Edit Network dialog box, on the IPv4 page, specify the following settings and click DNS.
Setting Value
Prompt the user for an address when the specification is used Selected
Setting Value
b. Enter rainpole.local in the For all connections with TCP/IP enabled text box and click
the Add button.
c. Enter sfo01.rainpole.local in the For all connections with TCP/IP enabled text box
and click the Add button.
d. Enter lax01.rainpole.local in the For all connections with TCP/IP enabled text box
and click the Add button.
e. Click OK to save settings and close the Edit Network dialog box, and click Next.
On the Set Workgroup or Domain page, enter credentials that have administrative privileges in
the domain, and click Next.
Setting Value
Username [email protected]
Password ad_admin_password
On the Set Operating System options page, select the Generate New Security ID (SID) check
box, and click Next.
On the Ready to Complete page, review the settings that you entered, and click Finish
The customization specification you created is listed in the Customization Specification Manager,
and can be used to customize virtual machine guest operating systems.
fully redundant vRealize Automation deployment requires eight virtual machines that run on Windows.
Repeat this procedure eight times by using the information in the following table to create eight VMs.
Prerequisites
Verify that you have created the Windows 2012 R2 template VM windows2012r2-template.
See Virtual Machine Template Specifications.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Select a name and folder page of the Deploy From Template wizard, specify a name
and location for the virtual machine:
a. Enter vra01iws01a.rainpole.local in the Enter a name for the virtual machine text
box.
b. In the Select a location for the virtual machine pane, select the vRA01 folder in the SFO01
datacenter under mgmt01vc01.sfo01.rainpole.local and click Next.
On the Select a compute resource page, select SFO01-Mgmt01 and click Next.
On the Select storage page, select the datastore on which to create the virtual machine's disks.
a. Select Virtual SAN Default Storage Policy from the VM Storage Policy drop-down menu.
b. Select the SFO01A-VSAN01-MGMT01 Virtual SAN datastore from the datastore table and
click Next.
On the Select Clone options page, select the Customize the operating system check box, and
click Next.
On the Customize guest OS page, select the vra7-template from the table, and click Next.
On the User Settings page, enter the following values, and click Next.
Settings Value
Right-click the virtual machine vra01iws01a.rainpole.local, and select Power > Power on.
From the Virtual Machine Console, verify that vra01iws01a.rainpole.local reboots, and uses
the configuration settings you specified. After the Windows customization process completes, a
clean desktop appears.
Log in to the Windows operating system and perform final verification and customization.
a. Verify that the IP address, computer name, and domain correct.
Procedure
Log in to the Windows IaaS VM.
a. Connect to vra01iws01a.rainpole.local over RDP.
b. Log in with the local administrator credentials that you specified during the creation of the
customization specification process.
Download the vRealize Management Agent.
a. Open a Web browser and go to
https://vra01svr01a.rainpole.local:5480/installer.
b. Download the Management Agent Installer .msi package.
Install the vRealize Management Agent.
a. Start the vCAC-IaaSManagementAgent-Setup.msi installer.
b. On the Welcome page, click Next to start the install process.
c. On the EULA page, select the I accept the terms of this agreement check box and click
Next.
d. On the Destination Folder page, click Next to install in the default path.
e. On the Management Site Service page, enter the following settings and click Load.
Setting Value
Password vra_appA_root_password
Select the I confirm the fingerprint matches the Management Site Service SSL certificate
check box, and click Next.
On the Management Agent Account Configuration page, enter the following credentials and
click Next.
Setting Value
Username rainpole\svc-vra
Password svc-vra_password
Setting Value
Password vra_appA_root_password
On the Welcome to the vRealize Automation Installation Wizard page, click Next.
On the End User License Agreement page, accept the terms of the agreement and click Next.
On the Deployment Type page, specify the following settings and click Next.
Setting Value
On the Installation Prerequisites page, specify the following time server settings, click Change
Time Settings, and click Next.
Setting Value
On the Discovered Hosts page, verify that all Windows IaaS VMs are listed and that the time
offset is within the -1 / 0 / 1 values and click Next.
The Time Offset column shows the time delta between the vRealize Automation appliance and
the Windows IaaS VMs. Time synchronization is critical. If there are values outside of the
acceptable values, remediate those before you proceed.
On the vRealize Appliances page, enter the following settings to add the second vRealize
Appliance based on the table below, click Next.
Setting Value
Host vra01svr01b.rainpole.local
Password vra_appB_root_password
On the Server Roles page, select the respective check boxes for each server based on their role
and click Next.
Hosts Role
vra01dem01.rainpole.local DEM
vra01dem02.rainpole.local DEM
vra01ias01.sfo01.rainpole.local Agent
vra01ias02.sfo01.rainpole.local Agent
On the Prerequisite checker page, verify that the Windows servers for IaaS components are
correctly configured.
a. Click Run and wait for the prerequisite checker to complete.
On the Single Sign-On page, enter and confirm vra_administrator_password for the default
tenant account [email protected], and click Next.
On the IaaS Host page, enter the following values and click Next.
Setting Value
On the Microsoft SQL Server page,specify the following settings, click Validate, wait for
successful validation, and click Next.
Setting Value
On the Web Role page, enter the following settings for the IaaS servers, click Validate, wait for
successful validation, and click Next.
Setting Value
Port 443
On the Manager Service page, specify the following settings for the IaaS Web servers, click
Validate, wait for successful validation, and click Next.
On the Distributed Execution Managers page, click the Add icon as needed, specify the
following settings, click Validate, wait for successful validation, and click Next.
On the Agents page, specify the following settings, click Validate, wait for successful validation,
and click Next.
On the next three certificates configuration pages, configure the certificates for all vRealize
Automation.
Because you used the vRealize Certificate Generation Tool during Configure SSL
Certificate for vRealize Business Server in Region A, you complete the three different pages for
certificate configuration of the different nodes by using the same process and values from the
vrealize.key file for the Private Key and the vrealize.pem file for all certificates stored in
the vro folder.
a. On the vRealize Appliance Certificate page, specify the following settings, click Save
Imported Certificate, and click Next.
Setting Value
Passphrase vra_cert_passphrase
b. Repeat the step on the Web Certificate and the Manager Service Certificate pages.
On the Create Snapshots page, do not close the wizard and make snapshots of all vRealize
Automation VMs.
a. Log in to the Management vCenter Server by using the vSphere Web Client.
b. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
Setting Value
Password vsphere_admin_password
Setting Value
vra01svr01a.rainpole.local VRA01
vra01svr01b.rainpole.local VRA01
vra01iws01a.rainpole.local VRA01
vra01iws01b.rainpole.local VRA01
vra01ims01a.rainpole.local VRA01
vra01ims01b.rainpole.local VRA01
vra01dem01.rainpole.local VRA01
vra01dem02.rainpole.local VRA01
vra01ias01.sfo01.rainpole.local VRA01IAS
vra01ias02.sfo01.rainpole.local VRA01IAS
After you create snapshots of all VMs, return to the vRealize Automation Installation wizard.
On the Create Snapshots page, click Next.
On the Installation Details page, click Install.
On the Installation Details page, verify that all items complete successfully and click Next.
On the Licensing page, enter your vRealize_Automation_License_Key, click Submit Key, and
click Next.
Setting Value
Password vra_administrator_password
On the Tenants page, click the default tenant vsphere.local to edit its settings.
Click the Local users tab and click New to add a local user to the default tenant.
In the User Details dialog, specify the following settings, click OK, and click Next.
Setting Value
Email [email protected]
Setting Value
Password itac-localdefaultadmin_password
For the first.connector, click Join Domain, specify the following settings and click Join Domain.
Setting Value
rainpole.local
For the first.connector-Clone, click Join Domain, specify the following settings and click Join
Domain.
Setting Value
rainpole.local
Setting Value
Password vra_administrator_password
On the General tab, enter the following settings for the Rainpole tenant, and click Submit and
Next.
Setting Value
Name Rainpole
On the Local Users tab, click New to add a local user for the tenant.
In the User Details dialog box, specify the following settings, click OK, and click Next.
Setting Value
Email [email protected]
Setting Value
Password itac-localrainpoleadmin_password
Setting Value
Authentication Yes
Certificates Deselected
On the Select the Domains page, select rainpole.local (RAINPOLE) and click Next.
e. Click Next.
On the Select the Users you would like to sync page, enter the users DNs to sync.
a. Click the Add icon to add the distinguished name to the search criteria.
b. In the Specify the user DNs text box, enter cn=users,dc=rainpole,dc=local, click the Add
icon on the same row, and click Next.
Setting Value
Password itac-localrainpoleadmin_password
Setting Value
In the Idp Hostname text box, enter vra01svr01.rainpole.local as this is hostname of the load
balancer and click Save.
Setting Value
Password vra_administrator_password
On the Tenants page, click the Rainpole tenant to edit its settings.
Click the Administrators tab, to assign domain user groups for tenant and infrastructure
administrators.
a. Enter ug-ITAC-TenantAdmins in the Tenant administrators search text box and press
Enter.
b. Enter ug-ITAC-TenantAdmins in the IaaS administrators search text box and press Enter.
c. Click Finish.
Setting Value
Password vra_administrator_password
Navigate to Administration, click Branding, and deselect the Use default check box.
On the Header tab specify the following settings for the header branding.
Setting Value
Click the Footer tab, specify the following settings for the footer banding and click Finish.
Setting Value
Setting Value
Password vra_administrator_password
In the New Email Server dialog box, select Email - Inbound and click OK.
On the New Inbound Email page, specify the following values, click Test Connection to verify
that the settings are correct, and click OK.
Setting Value
Name Rainpole-Inbound
Security Deselected
Protocol IMAP
Password vra_administrator_password
On the Email Servers page, click New to configure the outbound server settings.
In the New Email Server dialog box, select Email - Outbound and click OK.
On the New Outbound Email page, specify the following values, click Test Connection to verify
that the settings are correct, and click OK.
Setting Value
Name Rainpole-Outbound
Setting Value
Server Port 25
Authentication Selected
Password vra_administrator_password
Prerequisites
Verify that you have successfully generated a CA-Signed certificate for vRealize Orchestrator.
See Generate Certificates for the Cloud Management Platform (Region A).
Verify that you have created an empty SQL Server database for vRealize Orchestrator. See
Create a SQL Server Database for vRealize Orchestrator (Region A).
Verify that you have downloaded the NSX Plug-in for vRealize Orchestrator .vmoapp file.
Procedure
Deploy the vRealize Orchestrator Virtual Appliances in Region A
Configure the Certificate for vRealize Orchestrator in Region A
Configure NTP for vRealize Orchestrator in Region A
Install the NSX Plugin for vRealize Orchestrator in Region A
Configure Component Registry Authentication for vRealize Orchestrator Host A in Region A
Configure the vRealize Orchestrator Cluster in Region A
Configure Component Registry Authentication for vRealize Orchestrator Host B in Region A
Add Compute vCenter Server Instance to vRealize Orchestrator in Region A
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. In a Web browser, go to https://mgmt01vc01.sfo01.rainpole.local/vsphere-
client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Accept License Agreements page, accept the end user license agreements and click
Next.
On the Select name and folder page, enter the following information for the host that you deploy
and click Next.
On the Ready to complete page, review the configuration settings, check Power on the
appliance after deployment and click Finish.
Repeat the procedure for Host B.
Host A https://vra01vro01a.rainpole.local:8283/vco-controlcenter
Host B https://vra01vro01b.rainpole.local:8283/vco-controlcenter
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to https://vra01vr01a.rainpole.local:8283/vco-
config.
b. Log in using the following credentials.
Setting Value
Password hostA_root_password
Host A https://vra01vro01a.rainpole.local:5480
Host B https://vra01vro01b.rainpole.local:5480
Procedure
Log in to vRealize Orchestrator Appliance management console.
a. Open a Web browser and go to https://vra01vro01a.rainpole.local:5480.
b. Log in using the following credentials.
Setting Value
Password hostA_root_password
Procedure
Log in to the vRealize Orchestrator Control Center.
a. Open a Web browser and go to https://vra01vro01a.rainpole.local:8283/vco-
controlcenter.
b. Log in using the following credentials.
Setting Value
Password hostA_root_password
Procedure
Log in to the vRealize Orchestrator Control Center.
a. Open a Web browser and go to https://vra01vr01a.rainpole.local:8283/vco-
controlcenter.
b. Log in using the following credentials.
Setting Value
Password hostA_root_password
d. Click Accept Certificate, enter the following credentials of the vRealize Automation
administrator account, and click Register.
Setting Value
Password vra_administrator_password
e. In the Admin group text box, enter vRO and click Search.
f. From the drop-down menu, select rainpole.local\ug-vROAdmins and click Save Changes.
Restart the vRealize Orchestrator appliance for the changes to take effect.
a. Click Home and under Manage, click Startup Options.
b. On the Startup Options page, click Restart.
Setting Value
Password svc-vra_password
A green banner with the following text appears: "Info: The user has administrative rights in
vRealize Orchestrator" that confirms that configuration is successful.
You perform these steps only on Host A. When you set up clustering for Host A and Host B, the
certificate is copied to Host B.
Procedure
Log in to the vRealize Orchestrator Control Center.
a. Open a Web browser and go to https://vra01vr01a.rainpole.local:8283/vco-
controlcenter.
b. Log in using the following credentials.
Setting Value
Password hostA_root_password
Setting Value
Organization Rainpole
Country Code US
5.6.1.6.2. Configure the SQL Server Database for vRealize Orchestrator in Region A
To create a vRealize Orchestrator cluster, you must configure your deployment to use a shared
database that accepts multiple connections. A shared database can accept connections from different
vRealize Orchestrator instances.
Perform the procedure twice to configure the SQL Server database for both vRealize Orchestrator
appliances.
Procedure
Log in to the vRealize Orchestrator Control Center.
a. Open a Web browser and go to https://vra01vro01a.rainpole.local:8283/vco-
controlcenter.
Setting Value
Password hostA_root_password
Setting Value
Password svc_vro_password
Domain rainpole.local
Setting Value
Password hostA_root_password
Setting Value
Hostname vra01vro01b.rainpole.local
Password hostB_root_pwd
Restart the vRealize Orchestrator appliance for the changes to take effect.
a. Click Home and under Manage, click Startup Options.
b. On the Startup Options page, click Restart.
Note For the second host on the cluster (host B), you configure the component registration after
you set up the cluster.
Procedure
Log in to the vRealize Orchestrator Control Center.
a. Open a Web browser and go to https://vra01vr01b.rainpole.local:8283/vco-
controlcenter.
Setting Value
Password hostB_root_password
d. Click Accept Certificate, enter the vRealize Automation administration information, and click
Register.
Setting Value
Password vra_administrator_password
e. In the Admin group text box, enter vRO and click Search.
f. From the drop-down menu, select rainpole.local\ug-vROAdmins and click Save Changes.
Restart the vRealize Orchestrator appliance for the changes to take effect.
a. Click Home and under Manage, click Startup Options.
b. On the Startup Options page, click Restart.
Test user administrative rights in vRealize Orchestrator.
a. Click Home and under Manage, click Configure Authentication Provider.
b. On the Test Login tab, enter the following credentials and click Test.
Setting Value
Password svc-vra_password
A green banner with the following text appears: "Info: The user has administrative rights in
vRealize Orchestrator" that confirms that configuration is successful.
Setting Value
Password svc-vra_password
In the left pane, click Workflows, and navigate to Library > vCenter > Configuration.
a. Right-click the Add a vCenter Server instance workflow and click Start Workflow.
b. On the Set the vCenter Server Instance page, configure the following settings and click
Next.
Setting Value
c. On the Set the connection properties page, configure the following settings, and click
Submit.
Setting Value
Verify that the workflow completed successfully, click the Inventory tab and expand vCenter
Server.
You see the vCenter Server instance that you just added.
Setting Value
Password vra_administrator_password
Setting Value
Name vra01vro01.rainpole.local
Host vra01vro01.rainpole.local
Port 8281
Authentication Single-Sign On
Click Update to save the settings and click OK to accept the warning message that appears.
If configuration is successful, confirmation message for successful configuration appears.
Setting Value
Password itac_tenantadmin_password
Domain rainpole.local
Setting Value
Password svc_vra_password
Setting Value
Name vra01vro01.rainpole.local
Address https://vra01vro01.rainpole.local:8281/vco
c. Enter the following settings for the custom property, click Save, and click OK.
Setting Value
Name VMware.VCenterOrchestrator.Priority
Value 1
Encrypted Deselected
VM Storage Policy Virtual SAN Default Storage Policy Virtual SAN Default Storage Policy
Procedure
Log into vCenter Server using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
On the Select source page, select Local file, browse to the location of the vRealize Business
virtual appliance .ova file on your file system, and click Next.
On the Review details page, examine the virtual appliance details, such as product, version,
download and disk size, and click Next.
On the Accept License Agreements page, accept the end user license agreements and click
Next.
On the Select name and folder page, enter the following information, and click Next.
Setting Value
Name vrb01svr01.rainpole.local
On the Setup networks page, select the distributed port group that ends with Mgmt-
xRegion01-VXLAN from the Destination drop-down menu and click Next.
On the Customize template page, configure the following values and click Next.
Setting Value
Currency USD
On the Ready to complete page, review the configuration settings you specifed, select Power
on after deployment, and click Finish
Repeat the procedure to deploy the vRealize Business Data Collector
vra01buc01.sfo01.rainpole.local.
Procedure
Log in to the vRealize Business server by using a Secure Shell (SSH) client.
a. Open an SSH connection to the virtual machine vra01bus01.rainpole.local.
b. Log in using the following credentials.
Setting Value
Password vrb_server_root_password
Setting Value
Password vrb_server_root_password
Setting Value
A success message appears that informs you that the SSL certificate was successfully
configured.
Note If the common Name text box displays a wrong common name, ignore it.
Click the System tab and click Reboot for the changes to take effect.
Server https://vra01bus01.rainpole.local:5480
Procedure
Log in to the vRealize Business Server virtual appliance management interface.
a. Open a Web browser and go to https://vra01bus01.rainpole.local:5480.
b. Log in using the following credentials.
Setting Value
Password vrb_server_root_password
Setting Value
Repeat the procedure on the vRealize Business Data Collector virtual appliance
vra01buc01.sfo01.rainpole.local.
Setting Value
Password vrb_server_root_password
Navigate to the vRealize Automation tab and enter the following credentials to register with
vRealize Automation server.
Setting Value
Hostname vra01svr01.rainpole.local
5.7.6 Register the vRealize Business Data Collector with the Server in Region
A
After vRealize Business is integrated with vRealize Automation connect the two appliances of
vRealize Business.
Because a tenant is configured in vRealize Automation, registration of the vRealize Business Data
Collector appliance with the Server is performed by using the following procedure:
Grant an added role to the tenant admin, enter product license key, and generate a one-time
key from vRealize Automation.
Register the Data Collector to the vRealize Business Server.
Procedure
Log in to vRealize Automation as a tenant admin.
a. Open a Web browser and go to
https://vra01svr01.rainpole.local/vcac/org/rainpole.
b. Log in using the following credentials.
Setting Value
Password TenantAdmin_password
Domain rainpole.local
Navigate to Administration > Users & Groups > Directory Users & Groups.
In the search text box, enter ug-ITAC-TenantAdmins.
Setting Value
Password vrb_server_root_password
Setting Value
5.7.7 Connect vRealize Business with the Compute vCenter Server in Region
A
vRealize Business requires communication with the Compute vCenter Server to collect data from the
entire cluster. You perform this operation by using the vRealize Business Data Collector console.
Procedure
Log in to the vRealize Business Data Collector console.
a. Open a Web browser and go to
https://vra01buc01.sfo01.rainpole.local:9443/dc-ui.
b. Log in using the following credentials.
Setting Value
Password vrb_server_root_password
Click Manage Private Cloud Connections, select vCenter Server, and click the Add icon.
In the Add vCenter Server Connection dialog box, enter the following settings, and click Save.
Setting Value
Name comp01vc01.sfo01.rainpole.local
Username [email protected]
Password svc_vra_password
A VM-Host anti-affinity (or affinity) rule specifies a relationship between a group of virtual machines
and a group of hosts. Anti-affinity rules force specified virtual machines to remain apart during failover
actions, and are a requirement for high availability.
Perform the procedure six times to create six unique anti-affinity rules.
Table 12. Anti-affinity Rules for the Cloud Management Platform
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go to
https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Under VM/Host Rules, click Add to create a virtual machine anti-affinity rule.
In the Edit VM/Host Rule dialog box, specify the first rule for the vRealize Automation virtual
appliances.
a. In the Name text box, enter vra-svr.
b. Select the Enable rule check box.
c. Select Separate Virtual Machines, from the Type drop-down menu.
d. Click Add, select the vra01svr01a.rainpole.local and vra01svr01b.rainpole.local virtual
machines, click OK, and click OK.
vra-svr-8444 vra-svr-443-monitor -
Procedure
Log in to vCenter Server with the vSphere Web Client.
Setting Value
Password vsphere_admin_password
In the Navigator, click Networking & Security, and select NSX Edges.
Select 172.16.11.65 from the NSX Manager drop-down menu, and double-click SFOMGMT-LB01
to edit its settings.
Click the Manage tab, click Load Balancer, and select Pools.
From the pools table, select the vra-svr-443 server pool, and click Edit.
In the Edit Pool dialog box, configure the monitor, and enable the member that is not enabled.
a. From the Monitors drop-down menu, select vra-svr-443-monitor.
b. From the Members table, select vra01svr01b and click Edit.
c. In the Edit Member dialog box, select the Enable Member check box, click OK, and click
OK.
Repeat the procedure to configure health monitor and enable the second member for the
remaining server pools.
Setting Value
Password vsphere_admin_password
vra01svr01a.rainpole.local VRA01
vra01svr01b.rainpole.local VRA01
vra01iws01a.rainpole.local VRA01
vra01iws01b.rainpole.local VRA01
vra01ims01a.rainpole.local VRA01
vra01ims01b.rainpole.local VRA01
vra01dem01.rainpole.local VRA01
vra01dem02.rainpole.local VRA01
vra01ias01.sfo01.rainpole.local VRA01
vra01ias02.sfo01.rainpole.local VRA01
Configure a Content Library in the First Compute vCenter Server Instance in Region A
Import the Virtual Machine Template OVF Files in Region A
Setting Value
Password vsphere_admin_password
2. From the Home page, click Content Libraries, and click the Create new library icon.
The New Library wizard opens.
3. On the Name page, specify the following settings and click Next.
Setting Value
Name SFO01-ContentLib01
4. On the Configure library page, specify the following settings, and click Next.
Setting Value
Password ContentLib01_password
5. On the Add storage page, click the Select a datastore radio button, select the SFO01A-NFS01-
VRALIB01 datastore to store the content library, and click Next.
Prerequisites
Verify that you have prepared the OVF templates, as specified in the Virtual Machine Template
Specifications section.
Procedure
1. Log in to the vCenter Server using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Use the following credentials to log in.
Setting Value
Password vsphere_admin_password
2. From the Home page, click Content Libraries, and click the Objects tab.
Procedure
Log in to vCenter Server by using the vSphere Web Client.
a. Open a Web browser and go
to https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Name Production-Web-VXLAN
Setting Value
Password itac-localrainpoleadmin_password
Domain vsphere.local
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Note You have not yet configured a vCenter Endpoint, so no compute resource is currently
available for you to select. You will configure the vCenter Endpoint when you add a compute
vCenter to vRealize Automation.
Setting Value
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Setting Value
Number of Digits 5
Next Number 1
Click the New icon to create a default machine prefix for the Development group using the
following settings and click the Save icon.
Setting Value
Number of Digits 5
Next Number 1
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Setting Value
Name Production
On the Infrastructure tab, select Prod- from the Default machine prefix drop-down menu, and
click Finish.
Setting Value
Name Development
On the Infrastructure tab, select Dev- from the Default machine prefix drop-down menu, and
click Finish.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Setting Value
Name SFO-Production-Policy
Click the New icon, configure the following settings, and click the Save icon.
Setting Value
Name SFO-Development-Policy
Click the New icon, configure the following settings, and click the Save icon.
Setting Value
Name SFO-Edge-Policy
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Setting Value
Password svc_vra_password
Setting Value
Password svc_vra_password
Navigate to Infrastructure > Endpoints > Endpoints and click New > Virtual > vSphere
(vCenter).
On the New Endpoint - vSphere (vCenter) page, create a vSphere Endpoint with the following
settings, and click OK.
Note The vSphere Endpoint Name must be identical to the name that you used to install the proxy
agent. See Install IaaS vSphere Proxy Agents.
Setting Value
Name comp01vc01.sfo01.rainpole.local
Address https://comp01vc01.sfo01.rainpole.local/sdk
Procedure
Log in to the vRealize Automation Rainpole portal.
a. Open a Web browser and go to
https://vra01svr01.rainpole.local/vcac/org/rainpole.
b. Log in using the following credentials.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
On the Edit Fabric Group page, select both SFO01-Comp01 (compute cluster) and SFO01-
Edge01 (edge cluster) from the Compute Resources table, and click OK.
Note It may take sevral minutes for vRealize Automation to connect to the Compute vCenter Server
system and associated clusters. If you are still not able to see the compute and edge clusters
after sufficient time has passed, try to restart both proxy agent services in the virtual
machines vra01ias01.sfo01.rainpole.local and
vra01ias02.sfo01.rainpole.local.
Wait for the data collection process to complete and verify that the Status for both Inventory and
Network and Security Inventory shows Succeeded.
Repeat this procedure to perfrom data collection for the SFO01-Edge01 edge cluster.
Procedure
Log in to the vRealize Automation Rainpole portal.
a. Open a Web browser and go
to https://vra01svr01.rainpole.local/vcac/org/rainpole.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Navigate to Infrastructure > Reservations > Network Profiles and click New > External.
On the New Network Profile - External page, enter the following values for the profile you are
creating on the General tab.
Description External Network profile for External Network profile for External Network profile for
Web Tier of Production DB Tier of Production App Tier of Production
Business Group Business Group Business Group
Description External Network profile for External Network profile for External Network profile for
Web Tier of Development DB Tier of Development App Tier of Development
Business Group Business Group Business Group
On the IP Ranges tab, click the New button, enter the following values for the profile you are
creating, and click OK.
Description Static IP range for Web Tier Static IP range for DB Tier Static IP range for App Tier
of Production Group of Production Group of Production Group
Description Static IP range for Web Tier Static IP range for DB Tier Static IP range for App Tier
of Development Group of Development Group of Development Group
Verify that all the static IP addresses are added to the profile and click OK.
Perform this procedure twice to create reservations for both the Production and Development
business groups.
Group Name
Production SFO01-Comp01-Prod-Res01
Development SFO01-Comp01-Dev-Res01
Procedure
Log in to the vRealize Automation Rainpole portal.
a. Open a Web browser and go
to https://vra01svr01.rainpole.local/vcac/org/rainpole.
b. Log in using the following credentials.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Navigate to Infrastructure > Reservations > Reservations and click New > Virtual > vSphere.
On the New Reservation - vSphere page, click the General tab, and configure the following
values.
vxw-dvs-xxxxx-Production-Web-VXLAN Ext-Net-Profile-Production-Web
vxw-dvs-xxxxx-Production-DB-VXLAN Ext-Net-Profile-Production-DB
vxw-dvs-xxxxx-Production-App-VXLAN Ext-Net-Profile-Production-App
vxw-dvs-xxxxx-Development-Web-VXLAN Ext-Net-Profile-Development-Web
vxw-dvs-xxxxx-Development-DB-VXLAN Ext-Net-Profile-Development-DB
vxw-dvs-xxxxx-Development-App-VXLAN Ext-Net-Profile-Development-App
Repeat this procedure to create a reservation for the Development Business Group.
Use the same memory and storage configuration settings for both reservations.
Group Name
Production SFO01-Edge01-Prod-Res01
Development SFO01-Edge01-Dev-Res01
Procedure
Log in to the vRealize Automation Rainpole portal.
a. Open a Web browser and go
to https://vra01svr01.rainpole.local/vcac/org/rainpole.
b. Log in using the following credentials.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Navigate to Infrastructure > Reservations > Reservations and click New > Virtual > vSphere.
On the New Reservation - vSphere page, click the General tab, and configure the following
values for your business group.
vxw-dvs-xxxxx-Production-Web-VXLAN Ext-Net-Profile-Production-Web
vxw-dvs-xxxxx-Production-DB-VXLAN Ext-Net-Profile-Production-DB
vxw-dvs-xxxxx-Production-App-VXLAN Ext-Net-Profile-Production-App
vxw-dvs-xxxxx-Development-Web-VXLAN Ext-Net-Profile-Development-Web
vxw-dvs-xxxxx-Development-DB-VXLAN Ext-Net-Profile-Development-DB
vxw-dvs-xxxxx-Development-App-VXLAN Ext-Net-Profile-Development-App
Setting Value
Password vsphere_admin_password
Setting Value
Area America
Setting Value
Password vsphere_admin_password
Setting Value
Domain sfo01.rainpole.local
Password admin_pwd
On the Set Operating System Options page, select Generate New Security ID (SID), and click
Next.
Click Finish to save your changes.
The customization specification that you created is listed in the Customization Specification
Manager.
Procedure
1. Log in to the vCenter Server using the vSphere Web Client.
a. Open a Web browser and go to https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
9. In the Select name and location page, use the same template name.
Note Use the same template name to create a common service catalog that works across
different vCenter Server instances within your datacenter environment.
10. Select VM Templates as the folder for this virtual machine, and click Next.
11. On the Select a resource page, select the compute cluster you want to deploy the virtual
machine to.
Important: Do not select an Edge Cluster.
12. On the Review details page, verify the template details and click Next.
13. On the Select storage page, select the SFO01A-NFS01-VRALIB01 datastore and Thin
Provisioning form the Select virtual disk format drop-down menu.
14. On the Select networks dialog, select VM Network for the Destination Network, and click Next.
Note vRealize Automation will change the network according to the blueprint configuration.
15. On the Ready to complete page, review the configurations you made for the virtual machine, and
click Finish.
A new task for creating the virtual machine appears in the Recent Tasks pane. After the task is
complete, the new virtual machine is created.
16. Repeat this procedure for all of the VM Templates in the content library.
Procedure
1. Log in to the vCenter Server using the vSphere Web Client.
a. Open a Web browser and go to
https://comp01vc01.sfo01.rainpole.local/vsphere-client.
b. Log in using the following credentials.
Setting Value
Password vsphere_admin_password
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Navigate to Infrastructure > Reservations > Network Profiles and click New > External.
The New Service page appears.
In the New Service page, configure the following settings, and click OK.
Setting Value
Status Active
Procedure
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Click the Administration tab, and click Catalog Management > Entitlement.
Click New.
The New Entitlement page appears.
On the New Entitlement page, select the Details tab, configure the following values, and click
Next.
Note After you enter the Users & Groups label ug-ITAC-TenantAdmins, it changes in the display,
as shown in the screen shot below.
Repeat this procedure to create an entitlement for the Development business group. Use the
same Entitled Actions as for the Production business group.
Procedure
Log in to the vRealize Automation portal.
a. Open a Web browser and go
to https://vra01svr01.rainpole.local/vcac/org/rainpole.
b. Log in using the following credentials.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Setting Value
Archive (days) 15
Minimum 30
Maximum 270
Click the General tab, configure the following settings, and click Save
Setting Value
Click the Build Information tab, configure the following settings, and click Save.
Setting Value
Action Clone
Click the Machine Resources tab, configure the following settings, and click Save.
CPU 2 4
Click the Storage tab, configure the following settings, and click Save.
Storage (GB) 40 60
f. Select the Network tab, click New, and configure the following settings.
Setting Value
Network ExtNetProfileProductionWeb
Address 172.21.11.123
g. Click Save.
h. Click Finish to save Blueprint successfully.
Select the blueprint and click Publish.
Procedure
Log in to the vRealize Automation portal.
a. Open a Web browser and go
to https://vra01svr01.rainpole.local/vcac/org/rainpole.
b. Log in using the following credentials.
Setting Value
Password itac-tenantadmin_password
Domain rainpole.local
Select the Administration tab and navigate to Catalog Management > Catalog Items.
On the Configure Catalog Items pane, select the Windows Server 2012 R2 - SFO Prod
blueprint in the Catalog Items list and click Configure.
On the General tab of the Configure Catalog Items dialog box, select SFO Service Catalog
from the Service drop-down menu, and click OK.
Select the Catalog tab and verify that the blueprint is listed in the Service Catalog.
Repeat this procedure to associate all of the blueprints with their entitlement.