Category: NSX

  • Install and Configure UMDS 6.5

    VMware vSphere Update Manager Download Service (UMDS) is an optional module of Update Manager. For security reasons and deployment restrictions, vSphere, including Update Manager, might be installed in a secured network that is disconnected from other local networks and the Internet. Update Manager requires access to patch information to function properly. If you are using such an environment, you can install UMDS on a computer that has Internet access to download upgrades, patch binaries, and patch metadata, and then export the downloads to a portable media drive or configure an IIS serverΒ  so that they become accessible to the Update Manager server.

    Pre-requisite

    • Verify that the machine on which you install UMDS has Internet access, so that UMDS can download upgrades, patch metadata and patch binaries.

    • Uninstall older version of UMDS 1.0.x, UMDX 4.x or UMDS 5.x if it is installed on the machine.

    • Create a database instance and configure it before you install UMDS. When you install UMDS on a 64-bit machine, you must configure a 64-bit DSN and test it from ODBC. The database privileges and preparation steps are the same as the ones used for Update Manager.

    • UMDS and Update Manager must be installed on different machines.

    Installation and Configuration

    Mount the vCenter ISO and open it and double-click the autorun.exe file and select vSphere Update Manager > Download Service.

    • (Optional) : Select the option to Use Microsoft SQL Server 2012 Express as the embedded database, and click Install ( if you have not installed as per-requisite)

    2017-11-27 14_27_36-10.139.59.233 - Remote Desktop Connection

    2017-11-27 14_29_05-10.139.59.233 - Remote Desktop Connection2017-11-27 14_30_00-10.139.59.233 - Remote Desktop Connection.png

    2017-11-27 14_32_35-10.139.59.233 - Remote Desktop Connection
    2017-11-27 14_32_49-10.139.59.233 - Remote Desktop Connection
    Specify the Update Manager Download Service proxy settings ( if using proxy ) and click Next.
    2017-11-27 14_33_22-10.139.59.233 - Remote Desktop Connection.png
    Select the Update Manager Download Service installation and patch download directories and click Next.
    Patch Download directories should have around 150 GB free space for successful patch download.
    2017-11-27 14_34_01-10.139.59.233 - Remote Desktop Connection.png

    Β In the warning message about the disk free space, click OK.

    Click Install to begin the installation.

    2017-11-27 14_34_12-10.139.59.233 - Remote Desktop Connection
    Click Finish , that completes the installation.

    Configuring UMDS

    UMDS does not have a GUI interface. All configuration will be done via the command line. To begin configuration, open a command prompt and browse to the directory where UMDS is installed:

    In my case it is installedΒ  at C:\Program Files\VMware\Infrastructure\Update Manager>

    1.png

    # Run command vmware-umds -GΒ  to view the patch store location, the proxy settings and which downloads are enabled. By default it is configured to download host patches for ESX(i) 4 , 5 and 6. i have disabled for 4 and 5.

    2.png downloads can be disabled by running:

    #vmware-umds -S -d embeddedEsx-5.0.0-INTL

    Important commands:

    You can enable or disable all host patch downloads you can run:

    vmware-umds -S –enable-host
    vmware-umds -S –disable-host
    vmware-umds -S –enable-host –enable-va
    vmware-umds -S –disable-host –disable-va

    You can change the patch store location using:

    vmware-umds -S –patch-store c:\Patches

    New URLs can be added, or existing ones removed by using:

    vmware-umds -S –add-url
    vmware-umds -S –remove-url

    To start downloading patches you can us:

    vmware-umds -D

    this command re-downloads the patches between set times to reduce load during core business hours.

    vmware-umds -R –start-time 2010-11-01T00:00:00 –end-time 2010-11-30T23:59:59

    Once you have your patches downloaded, the next step is to how to make them available to Update Manager. There are a couple of ways you can do this depending on your environment. If you wish to export all the downloaded patches to an external drive, for transfer to the Update Manager server, you can do so by running, for example:

    vmware-umds -E –export-store e:\patchsΒ  and then zip it or another way is to configure IIS web server and publish the patch location.

    For IIS , Select Add Roles and Features in your Windows 2012 Server Manager and select the Web Server (IIS) checkbox.

    After IIS installation is completed startΒ Internet Information Services (IIS) Manager which is located in the Administrative Tools.Right click Default Web Site and select Add Virtual Directory , Choose an Alias for the Virtual Directory and select the patch store location as physical path.

    3.png

    In the MIME Types you need to add .vib and .sig asΒ application/octet-stream type. Finally you need to enable Directory Browsing on the Virtual Directory.

    4

    and to start using this shared repository with the Update Manager, login to the vSphere Web Client go to Update ManagerΒ  then to go Admin View – Settings – Download settings and click Edit. Select Use a shared repository and enter the URL (http://IP address/FQDN/VIRTUAL_DIRECTORY).

    5.png

    After clicking OK it will validate the repository and download the metadata of the downloaded patches and then follow your existing process like creation of baselinesΒ  , attach the base lines and patch your hosts.

     

     

     

     

     

     

  • Deploy VMware Cloud Foundation on IBM Cloud – Part -1

    IBM Cloud for VMware Solutions enables you to quickly and seamlessly integrate or migrate your on-premises VMware workloads to the IBM Cloud by using the scalable, secure, and high-performance IBM Cloud infrastructure and the industry-leading VMware hybrid virtualization technology.

    IBM Cloud for VMware Solutions allows you to easily deploy your VMware virtual environments and manage the infrastructure resources on IBM Cloud. At the same time, you can still use your familiar native VMware product console to manage the VMware workloads.

    Deployment Options:

    IBM Cloud for VMware Solutions provides standardized and customizable deployment choices of VMware virtual environments. The following deployment types are offered:

    • VMware Cloud Foundation on IBM Cloud: The Cloud Foundation offering provides a unified VMware virtual environment by using standard IBM Cloud compute, storage, and network resources that are dedicated to each user deployment.
    • VMware vCenter Server on IBM Cloud: The vCenter Server offering allows you to deploy a VMware virtual environment by using custom compute, storage, and network resources to best fit your business needs.
    • VMware vSphere on IBM Cloud: The vSphere on IBM Cloud offering provides a customizable virtualization service that combines VMware-compatible bare metal servers, hardware components, and licenses, to build your own IBM-hosted VMware environment.

    To use IBM Cloud for VMware Solutions to order instances, you must have an IBM Cloud account. The cost of the components that are ordered in your instances is billed to that IBM Cloud account.

    When you order VMware Cloud Foundation on IBM Cloud, an entire VMware environment is deployed automatically. The base deployment consists of four IBM Cloud Bare Metal Servers with the VMware Cloud Foundation stack pre-installed and configured to provide unified software-defined data center (SDDC) platform. Cloud Foundation natively integrates VMware vSphere, VMware NSX, VMware Virtual SAN, and This has been architected based on VMware-validated designs.

    The following image depicts the overall architecture and components of the Cloud Foundation deployment.

    1.png

    Physical infrastructure

    Physical Infrastructure provides the physical compute, storage, and network resources to be used by the virtual infrastructure.

    Virtualization infrastructure (Compute, Storage, and Network)

    Virtualization infrastructure layer virtualizes the physical infrastructure through different VMware products:

    • VMware vSphere virtualizes the physical compute resources.
    • vSAN provides software-defined shared storage based on the storage in the physical servers.
    • VMware NSX is the network virtualization platform that provides logical networking components and virtual networks.

    Virtualization Management

    Virtualization Management consists of vCenter Server, which represents the management layer for the virtualized environment. The same familiar vSphere API-compatible tools and scripts can be used to manage the IBM hosted VMware environment.

    On the IBM Cloud for VMware Solutions console, you can expand and contract the capacity of your instances using the add and remove ESXi server capability. In addition, lifecycle management functions like applying updates and upgrading the VMware components in the hosted environment are also available.

    Cloud Foundation (VCF) Technical specifications

    Hardware (options)

    • Small (Dual Intel Xeon E5-2650 v4 / 24 cores total, 2.20 GHz / 128 GB RAM)
    • Large (Dual Intel Xeon E5-2690 v4 / 28 cores total, 2.60 GHz / 512 GB RAM)
    • User customized (CPU model and RAM) ( up to 1.5 TB of Memory)

    Networking

    • 10 Gbps dual public and private network uplinks
    • Three VLANs: one public and two private
    • Secure VMware NSX Edge Services Gateway

    VSIs ( Virtual Server Instances)

    • One VSI for Windows AD and DNS services

    Storage:

    • Small option: Two 1.9 TB SSD capacity disks
    • Large option: Four 3.8 TB SSD capacity disks
    • User customized option
      • Storage disk: 1.9 or 3.8 TB SSD
      • Disk quantity: 2, 4, 6, or 8
    • Included in all storage options
      • Two 1 TB SATA boot disks
      • Two 960 GB SSD cache disks
      • One RAID disk controller
    • One 2 TB shared block storage for backups that can be scaled up to 12 TB (you can choose whether you want the storage by selecting or deselecting the Veeam on IBM Cloud service)

    IBM-provided VMware licenses or bring your own licenses (BYOL)

    • VMware vSphere Enterprise Plus 6.5u1
    • VMware vCenter Server 6.5
    • VMware NSX Enterprise 6.3
    • VMware vSAN (Advanced or Enterprise) 6.6
    • SDDC Manager licenses
    • Support and Services fee (one license per node)

    As you must be aware that VCF hasΒ strict requirements on the physical infrastructure. That’s the reason, you can deploy instances only in IBM Cloud Data Centers that meet the requirements. VCF can be deployed in these cities data centers –Β Amsterdam, Chennai, Dallas, Frankfurt, HongKong, London, Melbourne, Queretaro, Milan, Montreal, Oslo, Paris, Sao Paulo, Seoul, San Jose, Singapore, Sydney, Tokyo, Toronto, Washington.

    When you order a VCF instance, you can also order additional services on top of VCF

    Veeam on IBM Cloud

    This service helps you manage the backup and restore of all the virtual machines (VMs) in your environment, including the backup and restore of the management components.

    F5 on IBM Cloud

    This service optimizes performance and ensures availability and security for applications with the F5 BIG-IP Virtual Edition (VE).

    FortiGate Security Appliance on IBM Cloud

    This service deploys an HA-pair of FortiGate Security Appliance (FSA) 300 series devices that can provide firewall, routing, NAT, and VPN services to protect the public network connection to your environment.

    Managed Services

    These services enable IBM Integrated Managed Infrastructure (IMI) to deliver dynamic remote management services for a broad range of cloud infrastructures.

    Zerto on IBM Cloud

    This service provides replication and disaster recovery capabilities to help protect your workloads.

    This post covers some basic information about VMware and VCF options available to IBM Cloud , in the next post i will deploy fully automated VCF , till then Happy learning πŸ™‚

  • NSX-T 2.0 – Host Preparation

    A fabric node is a node that has been registered with the NSX-T management plane and has NSX-T modules installed. For a hypervisor host to be part of the NSX-T overlay, it must first be added to the NSX-T fabric.

    As we know NSX-T is vCenter agnostic, the Host Switch is configured from the NSX manager UI. The NSX manager owns the life-cycle of the Host Switch and the Logical Switch creation on these Host Switches.

    • Go to Fabric – > Nodes and check the Hosts tab and Click on ADD

    1

    • Enter Name of the Host , IP address of the host , choose OS tpye , since in this exercise i am adding an ESXi host , so chosen “ESXi” , Enter “root” credentials and most important enter the thumb print and to get the thumb print enter below command on ESXi command prompt – # openssl x509 -in /etc/vmware/ssl/rui.crt -fingerprint -sha256 -noout

    6

    • Click Save.

    2

    • If you do not enter the host thumbprint, the NSX-T UI prompts you to use the default thumbprint in the plain text format retrieved from the host.

    3

    Monitor the progress , it will install NSX binaries on Hosts.

    • Since i am deploying in my Home lab and my ESXi Host was having 12 GB RAM and installation failed because minimum RAM requirement is 16GB.

    4

    • and finally vibs successfully installed.

    5

    Now lets add the host in to Management Plane

    Joining the hypervisor hosts with the management plane ensures that the NSX Manager and the hosts can communicate with each other.

    • Open an SSH session to the NSX Manager appliance andΒ  Log in with the Administrator credentials.On the NSX Manager appliance, run the get certificate api thumbprint command.Β  “The command output is a string of numbers that is unique to this NSX Manager.”Β  Copy this String

    7

    • Now Open an SSH session to the hypervisor host and run the join management-plane command.

    8

    • Provide the following information:
      • Β Hostname or IP address of the NSX Manager with an optional port number
      • Username of the NSX Manager
      • Certificate thumbprint of the NSX Manager
      • Password of the NSX Manager

    9

    • Command will prompt for Password for API user: <NSX-Manager’s-password> and if everything is fine then you should get “Node successfully joined”

    1.png

    Next post i will be targeting to prepare KVM host , till then Happy Learning πŸ™‚

  • NSX-T 2.0 – Deploying NSX Controller

    NSX controllers controls virtual networks and overlay transport tunnels. NSX Controllers are deployed as a cluster of highly available vApps that are responsible for the automated deployment of virtual networks across the entire NSX-T architecture andΒ  to achieve high availability of control plane the NSX Controllers are deployed in a cluster of three instances.

    Deploying the NSX Controller is almost similar to deploying the NSX Manager appliance. I’ve deployed one NSX Controllers onto the same network as the NSX Manager.

    Let’s Start Deploying Controller:

    1 – First login to ESXi using HTML5 Client and run the New Virtual Machine wizard and select β€œDeploy a virtual machine from an OVF or OVA file”

     

    C1

    2 – Enter the name for the NSX-T Controller appliance (nsxc.avnlab.com) and choose NSX-T controller appliance OVA (nsx-controller-2.0.0.0.0.6522091.ova)

    c2

    3 – Choose your storage

    c3

    4 – Choose your Network and disk type

    c4

    5 – Enter various password for β€œRoot User” , β€œadmin User” and β€œaudit User” , we need to setup a complex password.Password complexity requirements are as below:

    • At least eight characters
    • At least one lower-case letter
    • At least one upper-case letter
    • At least one digit
    • At least one special character
    • At least five different characters
    • No dictionary words
    • No palindromes

    c5

    6 – in the same window Enter the β€œHost Name”, Default Gateway, IP address and Other network related information.

    c6

    7 – Review the configuration and click Finish

    c7

    8 – it will take some time and once ova import completesΒ  , you are done.

    c8

    Validate Controller Network Configuration as below:

    1.png

    Connect Controller Cluster to NSX Manager

    Get NSX Manager API thumbprint

    1. Log onto the NSX Manager via SSH using the admin credentials.
    2. Use β€œget certificate api thumbprint” to get the SSL certificate thumbprint. Copy the output to use later
    3. 2.png

    Join NSX Controller to NSX Manager

     

    1. Log on to the NSX Controllers via SSH using the admin credentials.
    2. Use β€œjoin management-plane <NSX Manager> username admin thumbprint <API Thumbprint>β€œ
    3. 3
    4. command will prompt for “admin” password.
    5. Once entered , wait for some time , if all goes well then you will see below “successful” message .
    6. 4
    7. Enter command on NSX Controller as “get managers” to view the connection to Manager
    8. 5
    9. On NSX manager run command “get nodes” to view registration is successful..
    10. 6.png
    11. From the command line using command “get management-cluster status ” you can see the details and their statusΒ  –  Controllers is listed in the control cluster, but the cluster status is β€œUNSTABLE”.
    12. 7.png

    Configure the Controller Cluster:

    To configure the Controller cluster you need to log on to any of the Controllers and initialise the cluster. Since this i am deploying in my Home Lab and have a single cluster , so let’s login to Controller and initialize the the cluster.

     

    1. Log onto the Controller node via SSH using the admin credentials.
    2. Use β€œset control-cluster security-model shared-secret” to configure the shared secret
    3. 8.png
    4. after the secret is configured, use β€œinitialize control-cluster” to promote this node as Master controller
    5. 9
    6. Now , if you see “Control Cluster Status” is “Stable”
    7. 10.png
    8. you can also view in GUI console also..
    9. 11.png

    so now we have completed NSX manager installation , NSX controller installation and their integration.

    Happy Learning πŸ™‚

     

     

  • NSX-T 2.0 – Deploying NSX Manager

    NSX-T has been decoupled from vCenter and is availabe for multiple platforms and since lots of things are happening around SDN, their integration with Micro Services running on containers and kubernetes , so it is right to start getting familiar with NSX-T before customer start adopting it.

    So first step towards learning NSX-T is to read through official documentation and parallelly start deploying NSX-T 2.0 components…here is the deployment flow that i will follow:

    1. Install NSX Manager.
    2. Install NSX Controllers.
    3. Join NSX Controllers with the management plane.
    4. Initialize the control cluster to create a master controller.
    5. Join NSX Controllers into a control cluster. NSX Manager installs NSX-T modules after the hypervisor hosts are added.
    6. Join hypervisor hosts with the management plane. This causes the host to send its host certificate to the management plane.
    7. Install NSX Edges.
    8. Join NSX Edges with the management plane.
    9. Create transport zones and transport nodes.

    So let’s move towards our first step,Β  deploy NSX Manager….

    Here is the System Requirements for NSX-T Manager :
    NSX-T has specific requirements regarding hardware resources and software versions. 1.png

    for My Lab I am going to use Nested ESXi6.5.

    1 – First login to ESXi using HTML5 Client and run the New Virtual Machine wizard and select “Deploy a virtual machine from an OVF or OVA file”

    C1.png

    Enter the name for the NSX-T Manager appliance (nsxtm.avnlab.com) and choose NSX-T Manager appliance OVA (nsx-unified-appliance-2.0.0.0.0.6522097)

    1.png

    Select your storage

    2.png

    Choose your network , Disk type

    3.png

    Enter various password for “Root User” , “admin User” and “audit User” , we need to setup a complex password , else it will ask to enter new password post deployment.

    NOTE – NSX-TΒ  core services on the appliance will not start until a password with sufficient complexity is set.

    Password complexity requirement:

    At least eight characters
    At least one lower-case letter
    At least one upper-case letter
    At least one digit
    At least one special character
    At least five different characters
    No dictionary words
    No palindromes

    4.png

    in the same window Enter the “Hostname” , Rolename will be “nsx-manager” don’t change it.

    5.png

    Enter DNS and NTP server details , enable SSH and root SSH login ( if you required)

    6.png

    and click finish

    7.png

    it will take some time and once ova import completesΒ  , you are done.

    8.png

    Login with IP address that we specified in the installation and Here is your first NSX-T login screen…login with user name “admin” and password that we specified in above steps.11.png

    Accept “End User License Agreement” and click on “Continue”

    10.png

    and here is your first successful NSX-T installation πŸ™‚ Finally, the NSX Manager is deployed.

    12.png

    Happy Learning πŸ™‚

     

     

     

     

  • VCAP6-DCV Deploy Exam Experience

     

    VMW-LGO-CERT-ADV-PRO-6-DATA-CTR-VIRT-DEPLOY-K.jpg

    Took the exam VMware Certified Advanced Professional 6 β€” Data Center Virtualization Deploy exam on 30th August 2017Β  and really happy to share that i have passed this exam too.

    Few tips for everyone who are preparing for the exam:

    Before starting this exam stay relax as you will have to spend lots of time understanding questions and performing tasks as per understanding, so stay relaxed and use all your experaicnce on vSphere , vSANΒ  , vSphere replication and VDP.This is the exam for the people who works on these product on daily basis and understands each and every aspect of vSphere , HA , DRS , vMotion , dvSwtich , some basic understanding of PowerCLIΒ  , troubleshooting , esxi command lines etc..Β  , I would suggest to follow blueprint and practice as much as you can and practice will lead to you towards successes. To get the feel of exam , i would highlyΒ recommend everyone to visitΒ Hands on LabsΒ and test out few labsΒ which will give you a brief idea on how to deal with the desktop during the actual exam.

    WhenΒ writing VCAP6-DCV Deploy exam every seconds count , so I would suggest spend time reading theΒ questions thoroughly before starting the task it’s going to beΒ beneficialΒ at-leastΒ it was in my case because I was able to save a lot of time when doing the tasks.

    Be aware thatΒ CRTL,Β ALTΒ andΒ BACKSPACEΒ are not working go back using arrow keys and then press delete it’sΒ better to make use ofΒ on screen keyboard if you wish to copy and paste.

    Best of luck to everyone who are preparing for the VCAP Deploy exam!!!

  • Upgrade to vRealize Operations 6.6

    First thingΒ  before we start upgrading , we must download vRealize Operations Manager virtual appliance updates for both the operating system and the virtual appliance. You can do this from the same page on where you download vRealize Operations 6.6. Both of these are PAK files that will have file names similar to- vRealize_Operations_Manager-VA-OS-6.6.0.5707160.pakΒ Β Β  and vRealize_Operations_Manager-VA-6.6.0.5707160.pak

    62.png

    Once Download is finished , Follow the steps as below:

    Login to the vROps admin interface at – https://<master-node-FQDN-or-IP-address>/admin and Take the cluster offline.

    2.png

    Cl3.png

    Once the Custer is Offline, Start the upgrade process by clicking on Software Upgrade and Click on “Install a Software Update”

    5

    Click browse and select PAK file , there are two files that we need to download from VMware website , one is OS upgrade and another one is application upgrade.

    61

    let’s first upgrade OS , choose OS upgrade .pak file and Click on Upload.

    63Check the version.

    7.png

    Accept the License , check the Update information

    8

    and Finally Click on Install

    9

    Monitor the installation process.10.png

    Since in my Lab i have many appliances and it took almost half an hour to upgrade the OS of all the appliances, will reboot all the appliances and comeback , once done with OS upgrade ,

    Lets start with application upgrade.

    Please follow the same series of steps, shown above but provide the virtual appliance update PAK file this time. ClickΒ Upload.

    11.png

    Check if we have choosen the right file to upgrade.

    12.png

    Click install in the Last step and finally monitor the upgrade progress…

    13.png

    After some time, the virtual appliance will restart. Once restarted you should log back in to the admin console and here it is all new HTML5 vRealize Operation Manager.

    14.png

    and here is the version information..

    16.png

    that’s it , Happy learning πŸ™‚

     

  • NSX Controllers ?

    In an NSX for vSphere environment, basically the management plane is responsible for providing the GUI interface and the REST API entry point to manage the NSX environment.

    Control Plane

    The control plane includes a three node cluster running the control plane protocols required to capture the system configuration and push it down to the data plane and data plane consists of VIB modules installed in the hypervisor during host preparation.

    NSX Controller stores the following types of tables:

    • VTEP table -keeps track of what virtual network (VNI) is present on which VTEP/hypervisor.
    • MAC table – keeps track of VM MAC to VTEP IP mappings.
    • ARP table – keeps track of VM IP to VM MAC mappings.

    Controllers maintain the routing information by distributing the routing data learned from the control VM to each routing kernel module in the ESXi hosts. The use of the controller cluster eliminates the need for multicast support from the physical network infrastructure. Customers no longer have to provision multicast group IP addresses.Β  They also no longer need to enable PIM routing or IGMP snooping features on physical switches or routers. Logical switches need to be configured in unicast mode to avail of this feature.

    NSX Controllers support an ARP suppression mechanism that reduces the need to flood ARP broadcast requests across the L2 network domain where virtual machines are connected. This is achieved by converting the ARP broadcasts into Controller lookups. If the controller lookup fails, then normal flooding will be used.

    The ESXi host, with NSX Virtual Switch, intercepts the following types of traffic:

    • Virtual machine broadcast
    • Virtual machine unicast
    • Virtual machine multicast
    • Ethernet requests
    • Queries to the NSX Controller instance to retrieve the correct response to those requests

    Each controller node is assigned a set of roles that define the tasks it can implement. By default, each controller is assigned all the following roles:

    • API Provider:Β  Handles HTTP requests from NSX Manager
    • Persistence Server: Persistently stores network state information
    • Logical Manager: Computes policies and network topology
    • Switch Manager: Manages the hypervisors and pushes configuration to the hosts
    • Directory Server: Manages VXLAN and distributed logical routing information

    One of the controller nodes is elected as a leader for each role.so may be controller 1 elected as the leader for the API Provider and Logical Manager.controller 2 as the leader for Persistence Server and Directory Server and controller 3 has been elected as the leader for the Switch Manager role.

    The leader for each role is responsible for allocating tasks to all individual nodes in the cluster. This is called slicing and slicing is being used to increase the scalability characteristics of the NSX architecture , slicing ensure that all the controller nodes can be active at any given time

    123

    The leader of each role maintains a sharding db table to keep track of the workload. The sharding db table is calculated by the leader and replicated to every controller node. It is used by both VXLAN and distributed logical router, known as DLR. The sharding db table may be recalculated at cluster membership changes, role master changes, or adjusted periodically for rebalancing.

    In case of the failure of a controller node, the slices for a given role that were owned by the failed node are reassigned to the remaining members of the cluster.Β  Node failure triggers a new leader election for the roles originally led by the failed node.

    Control Plane Interaction

    • ESXi hosts and NSX logical router virtual machines learn network information and send it to NSX Controller through UWA.
    • The NSX Controller CLI provides a consistent interface to verify VXLAN and logical routing network state information.
    • NSX Manager also provides APIs to programmatically retrieve data from the NSX Controller nodes in future.

    7

    Controller Internal Communication

    The Management Plane communicates to the Controller Cluster over TCP/443.The Management Plane communicates directly with the vsfwd agent in the ESXi host over TCP/5671 using RabbitMQ, to push down firewall configuration changes.

    The controllers communicates to the netcpa agent running in the ESXi host over TCP/1234 to propagate L2 and L3 changes. Netcpa then internally propagates these changes to the respective routing and VXLAN kernel modules in the ESXi host. Netcpa also acts as a middleman between the vsfwd agent and the ESXi kernel modules.

    NSX Manager chooses a single controller node to start a REST API call. Once the connection is established, the NSX Manager transmits the host certificate thumbprint, VNI and logical interface information to the NSX Controller Cluster.

    All the date transmitted by NSX Manager can be found in the file config-by-vsm.xml in the directory /etc/vmware/netcpa on the ESXi host. File /var/log/netcpa.log, can be helpful in troubleshooting the communication path between the NSX Manager, vsfwd and netcpa.

    Netcpa randomly chooses a controller to establish the initial connection that is called core session and thsi core session is used to transmit the Controller Sharding table to the hosts, so they are aware of who is responsible for a particular VNI or routing instance.

    5

    Hope this helps you in understanding NSX Controllers.Happy Learning πŸ™‚

  • Storage Type Comparison

    This is for my beginner friends in vSphere…

    1

    vSphere Features Supported by Storage Type:

    2

    Happy learning πŸ™‚

     

  • NSX Multi-Site L2 Extension option Comparison

    Shared by one of my colleague , really helpful.nsx+multisite+options.PNG

    Happy Learning πŸ™‚