NSX Uncovered – Part 2, Solution Overview

Network virtualization is by no means a new concept for VMware. Think about it for a moment — wherever vSphere (or any other VMware T1 or T2 hypervisor) has been implemented, a virtual switch exists and connects guest VMs to the physical world. That’s more than 500,000 customers globally, millions of vSphere hosts, and many more millions of virtual network ports backed by a standard (vSwitch) or distributed virtual switch (dvSwitch). In fact, if you count the network ports provisioned by vSphere and logically assigned to VM nics, one can argue that VMware is one of the top datalink providers on earth. Okay, perhaps that’s a stretch, but you get my point! VMware virtual networks have existed just about as long as VMware itself. And since the very beginning, there has been no shortage of innovation. The vSwitch has evolved in many ways, leading to new technologies, increased scope and scale, distributed architectures, open protocol support, ecosystem integration, and massive adoption. Over the years VMware has continued to introduce new networking technologies through organic maturity and strategic acquisition — ESXi platform security, dvSwitch (and associated services), vShield, vCloud Networking and Security (vCNS), etc. — and leveraged 3rd party integration into partner solutions, such as Cisco’s Nexus 1000v (a solution brought to market by tight collaboration between VMware and Cisco).…

NSX Uncovered – Part 1, Introduction

VMware’s Network Virtualization Platform, NSX, is an immensely powerful technology that can transform a datacenter’s infrastructure and streamline network service delivery across the enterprise. NSX’s scope, scale, and capability will easily impress techies, CCIE’s, and IT stakeholders alike. NSX changes the topology of a traditional hardware-bound network by eliminating the dependency on all that “intelligence” baked into proprietary hardware. Instead, the logic and associated services are delivered through a software control plane. Separating the control and data planes effectively reduces the physical network to a glorified IP packet forwarder.

With that said, it is also important to understand that NSX is not a re-write of your network and the fundamental concepts it is built upon. The abstraction of the logic from the physical underpinnings is a modern approach to designing, building, and servicing network architectures, but the fundamentals — the protocols, tools, concepts, etc. — are still at play. And for that reason, i’m often baffled when I enter into a debate with a “traditional” network engineer about the ins-and-outs of physical vs. virtual networking technologies like NSX. What I quickly realize is they are not defending the concepts or technology, they are defending their skill set. It’s a fear or reluctance of straying from what they know best.…

vCloud Automation Center 6.0 POC and Detailed Implementation Guide

In keeping up with my extracurricular doc-building activities, I am happy to release the latest iteration of my vCAC implementation guide for the deployment and configuration of vCAC 6.0. This unofficial Proof of Concept and Detailed Implementation guide is provided, with no guarantees (or support), to assist with the end-to-end implementation of vCloud Automation Center 6.0 in a pre-configured vSphere 5.x environment.

The guide walks through – in plenty of detail – vCAC 6.0’s deployment, concepts, technologies, and features as they would be used in a real-world implementation. This document can also double as an unofficial hands-on training guide which covers:

– New Features in vCAC 6.0
– Deployment Architecture
– Implementation on VMware platforms (vSphere)
– IaaS and XaaS Configuration
– Usage and Navigation
– Advanced Concepts and Use Cases…

vCAC 6.0 Implementation, Part 4 – Configuring vCAC IaaS Component

To continue the momentum, now we dive into installing the IaaS components of vCAC.  Part 4 of this series walks you through the vCAC IaaS Installation Wizard, which is a significant improvement from previous versions. A few configuration details and GO!

Again, the IaaS engine in vCAC 6 is the .NET-based component that is similar to previous versions of vCAC 5.x. For vCAC 6.0, IaaS is consumed through vCAC’s primary framework.  From VMware’s vCAC 6.0 Documentation:

Infrastructure as a Service (IaaS) enables the rapid modeling and provisioning of servers and desktops across virtual and physical, private and public, or hybrid cloud infrastructure. Modeling is accomplished by creating a machine blueprint, which is a complete specification for a virtual, cloud, or physical machine. Blueprints are published as catalog items in the common service catalog. When a user requests a machine based on one of these blueprints, IaaS handles the provisioning of the machine.
IaaS also allows you to comprehensively manage the machine life cycle from a user request and administrative approval through decommissioning and resource reclamation. Built-in configuration and extensibility features also make IaaS a highly flexible means of customizing machine configurations and integrating machine provisioning and management with other enterprise-critical systems such as load balancers, configuration management databases (CMDBs), ticketing systems, IP Address management systems, or Domain Name System (DNS) servers.

vCAC 6.0 Implementation, Part 3 – Configuring vCAC IaaS Prereqs

Moving right along (and behind schedule), Part 3 of this series will walk through the configuration of all the prerequisite requirements for the Windows-based IaaS component.

The IaaS engine is a .NET-based component that resembles (an uncanny resemblance) previous versions of vCAC 5.x. For vCAC 6.0, IaaS is consumed through vCAC’s primary framework (deployed via the vCAC Virtual Appliance) once it is installed and registered. The prerequisites for IaaS are identical to previous vCAC versions, which I’ve covered in detail in the vCAC 5.2 Detailed Installation Guide.

Review: VMware’s vCloud Automation Center 6.0 solution is made up of 3 core components:

  • vCAC VA – Delivered as a Virtual Appliance (.OVA), vCAC’s primary interface for administration and user self-service. Also includes an imbedded vCO server.
  • vCAC ID – Delivered as a Virtual Appliance (.OVA), vCAC’s stand-alone Single Sign-On engine, which provides multi-tenant LDAP and Active Directory authentication services for vCAC tenants.
  • vCAC IaaS – Windows Installable (.exe), vCAC’s IaaS engine for heterogeneous infrastructure as a service — setup is covered in Part 3 and 4 in the series

NOTE: this video guide was created using vCAC BETA builds and some of the steps will differ from the generally-available builds.  I will try to update all the videos pre-GA.…

vCAC 6.0 Implementation, Part 2 – Configuring vCAC’s VA’s

VMware’s vCloud Automation Center 6.0 solution is made up of 3 core components:

  • vCAC VA – Delivered as a Virtual Appliance (.OVA), vCAC’s primary interface for administration and user self-service. Also includes an imbedded vCO server.
  • vCAC ID – Delivered as a Virtual Appliance (.OVA), vCAC’s stand-alone Single Sign-On engine, which provides multi-tenant LDAP and Active Directory authentication services for vCAC tenants.
  • vCAC IaaS – Windows Installable (.exe), vCAC’s IaaS engine for heterogeneous infrastructure as a service (covered in detail in Parts 3 & 4).
source: vCAC 6.0 Install and Configure [beta] documentation

 

Additional components to the solution (based on licensing) include the vCAC Financial Management engine (delivered as an .OVA), and the Appication Provisioning engine (also an .OVA).  Both are covered much later.

Part 2 of this series will dive into the the configuration/integration of the vCAC VA and ID/SSO VA components.

NOTE: this video guide was created using vCAC BETA builds and some of the steps will differ from the generally-available builds.  I will try to update all the videos pre-GA.

Other videos available in this series:

 

++++
@virtualjad

vCAC 6.0 Implementation, Part 1 – Deploying vCAC and ID (SSO) Appliances

VMware’s vCloud Automation Center (vCAC) 6.0 release is just around the corner and the anticipation for what’s next is tremendous.  vCAC 6.0 introduces a brand-new interface, new concepts, new echosystem integrations, and the quickest path to realizing the benefits of the Software-Defined Datacenter.  And then there’s XaaS — the killer technology that will allow cloud shops to deliver their entire datacenter operation as a governed, entitled, life-cycled service.

To learn more about vCAC 6.0, visit VMware’s cloud management blog.

vCAC 6.0 has been in beta for a couple of months and continues to peek the interests of several early adopters.  Being the beta code that it is, there are several caveats and gotchas with the implementation that can sneak up at you.  To help mitigate those gotchas, I have created a set of videos that will help through the implementation of an end-to-end vCAC 6.0 solution.  The 10 videos in the series will cover the following topics:

I will be rolling out these videos as they get through editing…aiming for 1/week.

To get us started, here’s Part 1 – Deploying vCAC and ID (SSO) Appliances..…

VMware vCloud Automation Center 5.2 Detailed Installation Guide

VMware announced the release of vCloud Automation Center (vCAC) 5.2 in April, a dot-release follow on to vCAC 5.1.  This release shipped with it several improvements, bug fixes, tighter vCloud Director integration, and so on.  Some of the highlights include, but not limited to:

  • Deeper integrations with vCloud Director – vCAC 5.1 added basic support for consuming vCD as an Endpoint to enable vApp deployments into VDC’s. Although functional, the options were limited, especially with “day 2” management of vApps. vCAC 5.2 adds greater functionality, deployment options, support for all three VDC allocation models (PAYG, Allocation Pool, Reservation Pool), and the ability to manage individual machine within the vApp independently…a much needed addition.
  • Added support for vCloud Networking & Security (vCNS) use cases – vCNS integration brings with it the ability to discover vCNS network entities, such as VXLAN and security groups. This enables the consumption of these networks as part of an application deployment model for greater control and security.
  • Support for KVM (RHEV) Hypervisor – Adding native support for KVM as a platform continues vCAC’s trend towards the “manage all infrastructures” model and adds to vCAC’s already extensive native (“out of the box”) support for heterogeneous infrastructure…with much more to come.