VMware Cloud On AWS - Fundamentals
VMware Cloud On AWS - Fundamentals
VMware Cloud On AWS - Fundamentals
1. Click on the AWS bookmark
2. Click the IAM user name field
3. Type [email protected]
4. Click the Password field
5. Type VMware1!
6. Click Sign In
7. Click the Find Services search box
8. Type vpc
9. Click VPC
10. Click the VPCs link
11. Click Create VPC in the top menu bar
12. Click the Name tag field
13. Type VSLAB-VPC
14. Click the IPv4 CIDR block field
15. Type 172.20.0.0/16
16. Click Create
17. Click Close
Notice that the subnets are a subset of the VPC CIDR block.
Create Subnets
Create Endpoint
Next, we will associate the three Subnets previously created with the
VPC's Main Route Table. The Route Table contains a set of rules,
called routes that are used to determine where the network traffic is
directed.
Now that the AWS VPC and all other required components and
configurations are finished, we will sign in to the VMware Cloud
Services console to deploy our SDDC.
Add Users
1. Click Services
2. Click VMware Cloud on AWS
3. Click VSLAB-SDDC
4. Click ADD HOST
5. Click the Number of Hosts to Add dropdown listbox
6. Click 1
7. Click the scrollbar
8. Click ADD HOSTS
9. Click the browser refresh button and note the Successfully
added host(s) message in the top right
To return to the lab, click the link in the top right corner or close this
browser tab.
MODULE 2 - CONFIGURE SDDC NETWORKING
AND SECURITY
The orange boxes show where to click, and the left and right arrow keys can
also be used to move through the simulation in either direction.
We will create three routed network segments for our Web Tier, App Tier, and
Database Tier.
A DX connection over a private VIF can be used for all traffic between your
on-premises data center and your SDDC. It terminates in your connected
Amazon VPC, provides a private IP address space, and uses BGP to
advertise routes in your SDDC and learn routes in your on-premise data
center.
A DX connection over a public VIF is typically used only for traffic between
your on-premises data center and public AWS services, which you cannot
access over a private VIF. It terminates at the AWS region level in the region
occupied by your connected Amazon VPC, and uses BGP to advertise AWS
global routes.
VMC Networking & Security inventory groups, like AWS Security Groups,
give you a way to create named groups of management or workload VMs that
you can reference in firewall rules.
1. Click Groups
2. Click Management Groups
3. Click ADD GROUP
4. Click the Name field
5. Type On-Prem
6. Click the Members field
7. Type 172.16.0.0/16
8. Click SAVE
We will create management gateway firewall rules to allow traffic from on-
prem to the SDDC's ESXi management, NSX-T, and vCenter Server.
We will create a compute gateway firewall rule to allow traffic over AWS Direct
Connect (private VIF).
1. Click to continue
2. Click the network icon
3. Click vDS-Mgmt
4. Click ACTIONS
5. Click Distributed Port Group
6. Click New Distributed Port Group
7. Click the Name field
8. Hit Enter to paste VSLAB-L2VPN-PublicPG
9. Click NEXT
10. Click the VLSAN type dropdown listbox
11. Click VLAN
12. Click the VLAN ID field
13. Type 1631
14. Click NEXT
15. Click FINISH
16. Click ACTIONS
17. Click Distributed Port Group
18. Click New Distributed Port Group
19. Click the Name field
20. Hit Enter to paste VSLAB-L2VPN-TrunkPG
21. Click NEXT
22. Click the VLAN type dropdown listbox
23. Click VLAN trunking
24. Click the VLAN trunk range field
25. Type 1606
26. Click the checkbox next to Customize default policies
configuration
27. Click NEXT
28. Click the Forged transmits dropdown listbox
29. Click Accept
30. Click NEXT
31. Click NEXT
32. Click NEXT
33. Click NEXT
34. Click NEXT
35. Click NEXT
36. Click FINISH
37. Click the scroll bar
38. Click the scroll bar to expand it
39. Click VSLAB-L2VPN-TrunkPG01
40. Click the scroll bar on the Ports table
41. Click the ellipsis under Name to see the details about the port group
It is also required to configure a sink port in the distributed trunk port group
you created above. This has already been completed. For detailed
instructions see: Configure a Sink Port
In addition to data center migration, you can use an extended L2VPN network
for disaster recovery, or for dynamic access to cloud computing resources as
needed (often referred to as "cloud bursting).
An L2VPN on the Compute Gateway can extend up to 100 of your on-
premises networks. VMware Cloud on AWS uses NSX-T to provide the
L2VPN server in your cloud SDDC. L2VPN client functions can be provided
by a standalone NSX Edge that you download and deploy into your on-
premises data center.
We will create a layer 2 VPN, add an extended segment and install and
configure the NSX standalone edge.
1. Click to continue
2. Click VIEW DETAILS
3. Click Networking & Security
4. Click the arrow next to VPN
5. Click Layer 2
6. Click ADD VPN TUNNEL
7. Click the Local IP Address dropdown listbox
8. Click Private IP1 (10.2.192.13)
9. Click the Remote Public IP field
10. Hit Enter to paste 172.16.31.199
11. Click SAVE
12. Click standalone edge
13. Click Copy link address
14. Click OK
15. Click the inner scroll bar
16. Click ADD EXTENDED SEGMENT
17. Click the Segment Name field
18. Type VLAN-1606
19. Click the Tunnel ID field
20. Type 1606
21. Click SAVE
22. Click DOWNLOAD CONFIG
23. Click YES
24. Click the L2Vpn_L2VPN_config.txt downloaded file
25. Click Format
26. Click Word Wrap
27. Click the text to highlight all of the text that needs to be copied (this
will be copied to the clipboard)
28. Click the minimize button
29. Click the + to open a new browser window
30. Click the address bar
31. Hit Enter
32. Click the scroll bar
33. Click Download Now to download the NSX Standalone Edge Client
34. Click the X to close the browser window
35. Click File Explorer on the taskbar
36. Click Downloads folder
37. Click nsx-l2vpn-client-ovf-13281489.tar.gz to copy the NSX
standalone edge client to VMC folder
38. Click New Volume (E:)
39. Click VMC
40. Click to paste the nsx-l2vpn-client-ovf-13281489.tar.gz file
41. Click nsx-l2vpn-client-ovf-13281489.tar.gz to open the NSX
standalone edge client we downloaded
42. Click 7-Zip
43. Click Open archive
44. Click nsx-l2vpn-client-ovf-13...
45. Click on the selected files
46. Click Extract
47. Click the Copy to: field
48. Type L2VPN-Edge-Client
49. Click OK
50. Click the X to close 7-Zip
51. Click L2VPN-Edge-Client
52. Click the empty space to paste the files
53. Click New
54. Click Folder
55. Type NSX-l2t-client-xlarge and hit Enter
56. Click on the selected files to copy them
57. Click NSX-l2t-client-xlarge
58. Click the empty space to paste the files
59. Click L2VPN-Edge-Client
60. Click the selected files
61. Click NSX-l2t-client-xlarge
62. Click the empty space to paste the files
63. Click the + to open a new browser window
64. Click the address bar
65. Type sc2vc01
66. Click s2vc01.vslab.local
67. Click vSphere Client (HTML5) - partial functionality
68. Click the User name field
69. Type [email protected]
70. Click the Password field
71. Type VMware1!
72. Click Login
73. Click the double down arrows to close the Recent Tasks
74. Click the arrow next to SC2
75. Click the arrow next to Management
76. Click Management
77. Click ACTIONS
78. Click Deploy OVF Template...
79. Click the radio button next to Local file
80. Click Choose Files
81. Click NSX-l2t-client-xlarge
82. Click the selected files
83. Click Open
84. Click NEXT
85. Click the Virtual machine name field
86. Type VSLAB-SDDC-L2VPN-Client
87. Click NEXT
88. Click the arrow next to Management
89. Click NSX
90. Click NEXT
91. Click the scroll bar
92. Click NEXT
93. Click SC2MGMT03
94. Click NEXT
95. Click the Trunk dropdown listbox
96. Click VSLAB-L2VPN-TrunkPG
97. Click the Public dropdown listbox
98. Click VSLAB-L2VPN-PublicPG
99. Click NEXT
100. Click the CLI "admin" User Password field
101. Hit Enter to paste the password
102. Click the CLI "admin" User Confirm Password field
103. Hit Enter to paste the password
104. Click the CLI "enable" User Password field
105. Hit Enter to paste the password
106. Click the CLI "enable" User Confirm Password field
107. Hit Enter to paste the password
108. Click the CLI "root" User Password field
109. Hit Enter to paste the password
110. Click the CLI "root" User Confirm Password field
111. Hit Enter to paste the password
112. Click the scroll bar
113. Click the IP Address field
114. Type 172.16.31.199
115. Click the Prefix Length field
116. Type 24
117. Click the Default Gateway field
118. Type 172.16.31.1
119. Click the scroll bar
120. Click the DNS IP Address field
121. Type 172.16.31.6
122. Click the scroll bar
123. Click the Egress Optimized IP Address field
124. Type 172.16.6.1
125. Click the Peer Address field
126. Hit enter to paste 10.2.192.13
127. Click the Peer Code field
128. Click the Notepad on the taskbar
129. Click the selected text
130. Click Copy
131. Click the minimize button
132. Click the Peer Code field
133. Hit Enter to paste the text
134. Click the scroll bar
135. Click the Sub Interfaces VLAN (Tunnel ID) field a
136. Type 1606(1606)
137. Click the scroll bar
138. Click the HA Index dropdown listbox
139. Click 0
140. Click the scroll bar
141. Click NEXT
142. Click FINISH
143. Click the double up arrows to open the Recent Tasks
144. Click the double down arrows to close the Recent Tasks
145. Click the arrow next to NSX
146. Click VSLAB-SDDC...
147. Click Power
148. Click Power On
149. Click the VMware Cloud on AWS SDDC browser tab
150. Click the Refresh button to see the Status change to Up
151. Click the Information button
152. Click the vSphere - VSLAB-SDDC-L2VPN browser tab
153. Click Launch Web Console
154. Click the login field
155. Type admin and hit enter
156. Hit enter again
157. Type in command prompt show service l2vpn and hit enter
158. Type in command prompt enable and hit enter
159. Hit enter again
160. Type in command prompt conf t and hit enter
161. Type in command prompt l2vpn and hit enter
162. Type in command prompt show sub-interface and hit enter
163. Type in command prompt show configuration l2vpn and hit enter
164. Type in command prompt quit and hit enter
165. Type in command prompt quit and hit enter
166. Hit enter
167. Click the VMware Cloud on AWS SDDC browser tab
168. Click VIEW STATISTICS to view traffic statistics for the L2 VPN
169. Click the X to close the window
To return to the lab, click the link in the top right corner or close this browser
tab.
The orange boxes show where to click, and the left and right arrow keys can
also be used to move through the simulation in either direction.
1. Click SDDC-Datacenter
2. Click Cluster-1
3. Click Compute-ResourcePool
4. Click Deploy OVF Template
5. Click the radio button next to Local file
6. Click Choose Files
7. Click This PC
8. Click the scroll bar
9. Click the Data drive under Network locations
10. Click the VMs folder
11. Click the FIN-WEB-01 folder
12. Click to select all four files
13. Click Open
14. Click NEXT
15. Click NEXT to create the VM in the Workloads folder
16. Click NEXT to create the VM in the Compute-ResourcePool
17. Click NEXT
18. Click the Select virtual disk format dropdown listbox
19. Click Thin Provision
20. Click WorkloadDatastore
21. Click NEXT
22. Click the Destination Network field
23. Click WEB-172-18-200
24. Click NEXT
25. Click FINISH
26. Click Compute-ResourcePool
27. Click the double up arrows to open the Recent Tasks window and
note the Deploy OVF Template task executing
VMware Cloud on AWS includes two vSAN datastores, one for the
management VMs (vsanDatastore) and one for the workload VMs
(WorkloadDatastore). Both datastores share the same underlying storage
devices and consume from the same pool of free space.
1. Click to continue
2. Click Menu
3. Click Policies and Profiles
4. Click VM Storage Policies
5. Click Create VM Storage Policy
6. Click the Name field and
7. Type Compute - DB - RAID 5
8. Click NEXT
9. Click the checkbox next to Enable rules for "vSAN" storage
10. Click NEXT
11. Click the dropdown list box for Failures to tolerate
12. Click 1 failure - RAID-5 (Erasure Coding)
13. Click Advanced Policy Rules
14. Click the dropdown list box for Number of disk stripes per object
15. Click 2
16. Click NEXT
17. Click NEXT
18. Click FINISH
For vSphere Tags and Attributes, VMware Cloud on AWS supports the same
set of tasks as an on-premises SDDC. Tags and categories can span multiple
vCenter Server instances. When you use Hybrid Linked Mode, tags and tag
categories are maintained across your linked domain. That means the on-
premises SDDC and the VMware Cloud on AWS SDDC share tags and tag
attributes.
We will create two categories and tags for each category. The categories will
be used for assigning affinity and anti-affinity compute policies.
1. Click Menu
2. Click Tags & Custom Attributes
3. Click CATEGORIES
4. Click NEW
5. Click the Category Name field
6. Type Affinity
7. Click the check box next to All objects
8. Click the check box next to Virtual Machine
9. Click OK
10. Click NEW
11. Click the Category Name field
12. Type AntiAffinity
13. Click the check box next to All objects
14. Click the check box next to Virtual Machine
15. Click OK
16. Click TAGS
17. Click NEW
18. Click the Name field
19. Type Finance - note the Category field is set to Affinity
20. Click OK
21. Click NEW
22. Click the Name field
23. Type Sharepoint - note the Category field is set to Affinity
24. Click OK
25. Click NEW
26. Click the Name field
27. Type Database
28. Click the dropdown list box for Category
29. Click AntiAffinity
30. Click OK
31. Click NEW
32. Click the Name field
33. Type Sharepoint-Web
34. Click the dropdown list box for Category
35. Click AntiAffinity
36. Click OK
1. Click Menu
2. Click Hosts and Clusters
3. Click FIN-APP-01
4. Click Tags & Custom Attributes
5. Click Assign Tag
6. Click the check box next to the Finance Affinity tag
7. Click ASSIGN
8. Click FIN-DB-01
9. Click Tags & Custom Attributes
10. Click Assign Tag
11. Click the check box next to the Finance Affinity tag
12. Click ASSIGN
13. Click SHAREPOINT-APP-01
14. Click Tags & Custom Attributes
15. Click Assign Tag
16. Click the check box next to the Sharepoint Affinity tag
17. Click ASSIGN
18. Click SHAREPOINT-DB-01
19. Click Tags & Custom Attributes
20. Click Assign Tag
21. Click the check box next to the Sharepoint Affinity tag
22. Click ASSIGN
23. Click SHAREPOINT-WEB-01A
24. Click Tags & Custom Attributes
25. Click Assign Tag
26. Click the check box next to the Sharepoint-Web AntiAffinity tag
27. Click ASSIGN
28. Click SHAREPOINT-WEB-01B
29. Click Tags & Custom Attributes
30. Click Assign Tag
31. Click the check box next to the Sharepoint-Web AntiAffinity tag
32. Click ASSIGN
33. Click FIN-DB-01
34. Click Tags & Custom Attributes
35. Click Assign Tag
36. Click the check box next to the Database AntiAffinity tag
37. Click ASSIGN
38. Click SHAREPOINT-DB-01
39. Click Tags & Custom Attributes
40. Click Assign Tag
41. Click the check box next to the Database AntiAffinity tag
42. Click ASSIGN
We will create compute policies for the categories and tags we created to
either enforce that VMs run on the same hosts (affinity) or on different hosts
(anti-affinity).
1. Click Menu
2. Click Policies and Profiles
3. Click Compute Policies
4. Click ADD
5. Click the dropdown list box for Policy type
6. Click VM - VM affinity
7. Click the Name field
8. Type Finance-App-DB
9. Click the dropdown list box for Category
10. Click Affinity
11. Click CREATE
12. Click ADD
13. Click the dropdown list box for Policy type
14. Click VM - VM affinity
15. Click the Name field and
16. Type SHAREPOINT-APP-DB
17. Click the dropdown list box for Category
18. Click Affinity
19. Click the dropdown list box for Tag
20. Click Sharepoint
21. Click CREATE
22. Click ADD
23. Click the dropdown list box for Policy type
24. Click VM - VM anti affinity
25. Click the Name field and
26. Type DB-Separation
27. Click the dropdown list box for Category
28. Click AntiAffinity
29. Click CREATE
30. Click VIEW AS TABLE
31. Click ADD
32. Click the dropdown list box for Policy type
33. Click VM - VM anti affinity
34. Click the Name field
35. Type Sharepoint-Web-Servers
36. Click the dropdown list box for Category
37. Click AntiAffinity
38. Click the dropdown list box for Tag
39. Click Sharepoint-Web
40. Click CREATE
We will create several workload groups for our workload VMs to be used with
a distributed firewall.
We will create distributed firewall rules to allow traffic between specific VMs
for the Sharepoint application.
Inbound Network Address Translation (NAT) allows you to map internet traffic
to a public-facing IP address and port to a private IP address and port inside
your SDDC's compute network.
We will request a public IP for Finance web server and create a NAT rule and
a compute gateway firewall rule to allow traffic to the webserver.
Log Intelligence
The VMware Log Intelligence Service enables you to collect and analyze logs
generated in your SDDC.
For more information about using VMware Log Intelligence, see the VMware
Log Intelligence Documentation.
1. Click to continue
2. Click VMware Log Intelligence
3. Click the double arrows on the left-hand navigation menu
4. Click Log Management
5. Click NSXT
6. Click the switch next to Enable NSX-T firewall logs
7. Click SAVE
8. Click Home
9. Click Explore Logs
10. Click Home
To return to the lab, click the link in the top right corner or close this browser
tab.
The orange boxes show where to click, and the left and right arrow keys can
also be used to move through the simulation in either direction.
Configure DNS
Domain Name System (DNS) planning is critical for any cloud environment,
and it is important for management and compute workloads in VMware Cloud
on AWS to function properly. Google DNS servers are set up initially when
the SDDC is first deployed.
We will install the vCenter Cloud Gateway Appliance and use it to link from
the on-premises data center to the cloud SDDC. In this case, Active Directory
groups are mapped from the on-premises environment to the cloud, and it is
not required to add Active Directory as an identity source in your cloud
vCenter Server.
1. Click to continue
2. Click ui-installer
3. Click win32
4. Click the scroll bar
5. Click installer.exe
6. Click GET STARTED
7. Click START
8. Click the check box next to I accept the terms of the license
agreement
9. Click NEXT
10. Click in the Password field
11. Type VMware1!
12. Click NEXT
13. Click YES
14. Click the arrow next to SC2
15. Click John-Taylor
16. Click the down arrow next to sc2vc03.vslab.local
17. Click NEXT
18. Click BCA2
19. Click NEXT
20. Click in the VM name field
21. Type vslab-addc-gw01
22. Click in the Set root password field
23. Type VMware1!
24. Click in the Confirm root password field
25. Type VMware1!
26. Click NEXT
27. Click the scroll bar
28. Click NEXT
29. Click the scroll bar
30. Click in the Network field
31. Select vDS-1631
32. Click NEXT
33. Click NEXT
34. Click in the Single Sign-On password field
35. Type VMware1!
36. Click NEXT
37. Click YES
38. Click FINISH
We will cold migrate a powered off virtual machine to VMware Cloud on AWS
and power it on there.
1. Click the arrow next to sc2vc03.vslab.local
2. Click the scroll bar
3. Click JT_UBUNTU_01
4. Click Migrate...
5. Click the radio button next to Change both compute resource and
storage
6. Click NEXT
7. Click vcenter-sddc-34-210-230-88.vmwarevmc.com
8. Click the arrow next to SDDC-Datacenter
9. Click the arrow next to Cluster-1
10. Click Compute-ResourcePool
11. Click the scroll bar
12. Click NEXT
13. Click WorkloadDatastore
14. Click NEXT
15. Click Workloads
16. Click NEXT
17. Click the dropdown list box under Destination Network
18. Click VLAN-1606
19. Click NEXT
20. Click FINISH
21. Click in the Search in all environments field
22. Type JT_
23. Click JT_UBUNTU_01
24. Click the scroll bar
25. Click Summary
26. Click JT_UBUNTU_01
27. Click Power
28. Click Power On
29. Click the scroll bar
1. Click JT_WEB_01
2. Click Migrate...
3. Click the radio button next to Change both compute resource and
storage
4. Click NEXT
5. Click the arrow next to vcenter-sddc-34-210-230-
88.vmwarevmc.com
6. Click the arrow next to SDDC-Datacenter
7. Click the arrow next to Cluster-1
8. Click Compute-ResourcePool
9. Click NEXT
10. Click WorkloadDatastore
11. Click NEXT
12. Click Workloads
13. Click NEXT
14. Click the dropdown list box under Destination Network
15. Click VLAN-1606
16. Click NEXT
17. Click NEXT
18. Click FINISH
19. Click the scroll bar
We will modify one of the settings for Elastic DRS in our VMware Cloud on
AWS SDDC.
To return to the lab, click the link in the top right corner or close this browser
tab.