Configure VMware Cloud Director Service in Azure VMware Solution
In this article, learn how to configure VMware Cloud Director service in Azure VMware Solution.
Prerequisites
Plan and deploy a VMware Cloud Director Service Instance in your preferred region using the process described here. How Do I Create a VMware Cloud Director Instance
Note
VMware Cloud Director Instances can establish connections to Azure VMware Solution private clouds in regions where the round-trip time (RTT) latency remains under 150 ms.
Plan and deploy Azure VMware Solution private cloud using the following links:
After successfully gaining access to both your VMware Cloud Director instance and Azure VMware Solution private cloud, you can then proceed to the next section.
Plan and prepare Azure VMware Solution private cloud for VMware Reverse proxy
VMware Reverse proxy VM is deployed within the Azure VMware Solution private cloud and requires outbound connectivity to your VMware Cloud director Service Instance. Plan how you would provide this internet connectivity.
Public IP on NSX Edge can be used to provide outbound access for the VMware Reverse proxy VM as shown in this article. Learn more on, How to configure a public IP in the Azure portal and Outbound Internet access for VMs
VMware Reverse proxy can acquire an IP address through either DHCP or manual IP configuration.
Optionally create a dedicated Tier-1 router for the reverse proxy VM segment.
Prepare your Azure VMware Solution private cloud for deploying VMware Reverse proxy VM OVA
Obtain NSX cloud admin credentials from Azure portal under VMware credentials. Then, sign in to NSX Manager.
Create a dedicated Tier-1 router (optional) for VMware Reverse proxy VM.
Create a segment for VMware Reverse proxy VM.
- Sign in to Azure VMware Solution NSX Manager and under segments, select ADD SEGMENT
- Provide name, Connected Gateway, Transport Zone and Subnet information and then select save.
Optionally enable segment for DHCP by creating a DHCP profile and setting DHCP config. You can skip this step if you use static IPs.
Add two NAT rules to provide an outbound access to VMware Reverse proxy VM to reach VMware cloud director service. You can also reach the management components of Azure VMware Solution private cloud such as vCenter Server and NSX that are deployed in the management plane.
- Create NOSNAT rule,
- Provide name of the rule and select source IP. You can use CIDR format or specific IP address.
- Under destination port, use private cloud network CIDR.
- Create SNAT rule
- Provide name and select source IP.
- Under translated IP, provide a public IP address.
- Set priority of this rule higher as compared to the NOSNAT rule.
- Select Save.
- Create NOSNAT rule,
Ensure on Tier-1 gateway, NAT is enabled under router advertisement.
Configure gateway firewall rules to enhance security.
Generate and Download VMware Reverse proxy OVA
- What follows is a step-by-step procedure and how to obtain the required information on Azure portal and how to use it to generate VMware Reverse proxy VM.
Prerequisites on VMware cloud service
- Verify you're assigned the network administrator service role. See Managing Roles and Permissions and make changes using VMware Cloud Services Console.
- If you're accessing VMware Cloud Director service through VMware Cloud Partner Navigator, verify that you're a Provider Service Manager user and that you're assigned the provider:admin and provider:network service roles.
- See How do I change the roles of users in my organization in the VMware Cloud Partner Navigator documentation.
Procedure
Sign in to VMware Cloud Director service.
Select Cloud Director Instances.
In the card of the VMware Cloud Director instance for which you want to configure a reverse proxy service, select Actions > Generate VMware Reverse Proxy OVА.
The Generate VMware Reverse proxy OVA wizard opens. Fill in the required information.
Enter Network Name
- Network name is the name of the NSX segment you created in previous section for reverse proxy VM.
Enter the required information such as vCenter FQDN, Management IP for vCenter, NSX FQDN or IP and more hosts within the private cloud to proxy.
vCenter and NSX IP address of your Azure VMware Solution private cloud can be found under Azure portal -> manage-> VMware credentials
To find FQDN of vCenter of your Azure VMware Solution private cloud, sign in to the vCenter using VMware credential provided on Azure portal.
In vSphere Client, select vCenter, which displays FQDN of the vCenter Server.
To obtain FQDN of NSX, replace vc with nsx. NSX FQDN in this example would be, “nsx.f31ca07da35f4b42abe08e.uksouth.avs.azure.com”
Obtain ESXi management IP addresses and CIDR for adding IP addresses in allowlist when generating reverse proxy VM OVA.
Enter a list of any other IP addresses that VMware Cloud Director must be able to access through the proxy, such as ESXi hosts to use for console proxy connection. Use new lines to separate list entries.
Tip
To ensure that future additions of ESXi hosts don't require updates to the allowed targets, use a CIDR notation to enter the ESXi hosts in the allow list. This way, you can provide any new host with an IP address that is already allocated as part of the CIDR block.
Once you gathered all the required information, add the information in the VMware Reverse proxy OVA generation wizard in the following diagram.
Select Generate VMware Reverse Proxy OVА.
On the Activity log tab, locate the task for generating an OVА and check its status. If the status of the task is Success, select the vertical ellipsis icon and select View files.
Download the reverse proxy OVA.
Deploy VMware Reverse proxy VM
- Transfer reverse proxy VM OVA you generated in the previous section to a location from where you can access your private cloud.
- Deploy reverse proxy VM using OVA.
- Select appropriate parameters for OVA deployment for folder, computer resources, and storage.
- For network, select appropriate segment for reverse proxy.
- Under customize template, use DHCP or provide static IP if you aren't planning to use DHCP.
- Enable SSH to sign in to reverse proxy VM.
- Provide root password.
- Once VM is deployed, power it on and then sign in using the root credentials provided during OVA deployment.
- Sign in to the VMware Reverse proxy VM and use the command transporter-status.sh to verify that the connection between CDs instance and Transporter VM is established.
- The status should indicate "UP." The command channel should display "Connected," and the allowed targets should be listed as "reachable."
- Next step is to associate Azure VMware Solution private cloud with the VMware Cloud Director Instance.
Associate Azure VMware Solution private cloud with VMware Cloud Director Instance via VMware Reverse proxy
This process pools all the resources from Azure private Solution private cloud and creates a provider virtual datacenter (PVDC) in CDs.
Sign in to VMware Cloud Director service.
Select Cloud Director Instances.
In the card of the VMware Cloud Director instance for which you want to associate your Azure VMware Solution private cloud, select Actions and then select Associate datacenter via VMware reverse proxy.
Review datacenter information.
Select a proxy network for the reverse proxy appliance to use. Ensure correct NSX segment is selected where reverse proxy VM is deployed.
In the Data center name text box, enter a name for the private cloud that you want to associate with datacenter. The name entered is only used to identify the data center in the VMware Cloud Director inventory, so it doesn't need to match the private cloud name entered when you generated the reverse proxy appliance OVA.
Enter the FQDN for your vCenter Server instance.
Enter the URL for the NSX Manager instance and wait for a connection to establish.
Select Next.
Under Credentials, enter your user name and password for the vCenter Server endpoint.
Enter your user name and password for NSX Manager.
To create infrastructure resources for your VMware Cloud Director instance, such as a network pool, an external network and a provider VDC, select Create Infrastructure.
Select Validate Credentials. Ensure that validation is successful.
Confirm that you acknowledge the costs associated with your instance, and select Submit.
Check activity log to note the progress.
Once this process is completed, you should see that your VMware Azure Solution private cloud is securely associated with your VMware Cloud Director instance.
When you open the VMware Cloud Director instance, the vCenter Server and the NSX Manager instances that you associated are visible in Infrastructure Resources.
A newly created Provider VDC is visible in Cloud Resources.
In your Azure VMware solution private cloud, when logged into vCenter Server you see that a Resource Pool is created as a result of this association.
You can use your VMware cloud director instance provider portal to configure tenants such as organizations and virtual data center.
What’s next
Configure tenant networking on VMware Cloud director service on Azure VMware solution using link Enable VMware Cloud Director service with Azure VMware Solution.
Learn more about VMware cloud director service using VMware Cloud Director Service Documentation
To learn about Cloud director Service provider admin portal, Visit VMware Cloud Director™ Service Provider Admin Portal Guide.