Other Topics vRealize Automation vRealize Orchestrator

Integrating NSX with vRealize Automation-Part II

Why this post?

Dear Readers, this is the second and last part of the series on integrating NSX with vRealize Automation. Initially I thought of writing three separate blogs on this topic covering Integration, Consumption and Result. But then due to the size I decided to put a video and few screenshots. This reduced the size to a great extent and hence I will club part II and III in this post.

In this post I am going to cover the after integration parts. That is, how to consume NSX entities in vRealize Automation Blueprints and then show the end result.

Pre-Requisites:

As mentioned in the first part, before you can use the NSX entities, you need to configure and use them in the reservation. So first you need to configure network profile and then in Reservation map those profiles to the portgroups created and exposed by NSX. Note: The Logical Switch you create in NSX will be exposed and listed as a portgroupĀ here in vRA (at the end of the day, those logical switches are portgroups created in dvSwitch).

Also note, the security policies created in NSX will be available in reservation tab. So the security profiles you want to use in a Business Group needs to be selected in Reservation tab. Once selected, they will be available to be consumed in Blueprints.

Once the above is done we will further go ahead and use those entities in Blueprint.

Configuring the vRA Blueprint with NSX

For this example the following scenario is taken:

  • This is a multi-tier blueprint with Web, App and DB components in it
  • The Web and App tier will multiple machines in cluster so that they can scale when needed
  • The Web tier will use a Dynamic Load balancer. So whenever an instance is deployed from this Blueprint, a load balancer will be deployed for this
  • All the VM’s created from this blueprint will be under activity monitoring security policy.
  • SSH port will be automatically blocked to all the VM’s through Block-SSH security policy.

The below video shows the steps to create the blueprint and use NSX entities. It also covers publishing, entitlement and “Request for Catalog item” as well.

Steps Used for Configuration:
  • Create a New Blueprint,Ā use NSX settings
  • In the designer form use 3 vSphere Machines (one for each category)
  • Make subsequent modification in each of them (used clone and linked clone methods of create a VM)
  • Added network and configured them
  • Added security policies and configured them
  • Added load balancer and made required configuration
  • Publish the blueprint, entitle it and then from Catalog consume the entity
Result of NSX Integration:

Provided below are the screenshots from the deployment stage.

For example I have taken a Multi-Machine blueprint named Multimachine-Web. It has the same configuration as that of the above example. To request for the item go to Catalog and click on Request.
NSX - 1

Click on Submit to request for the item.

NSX - 2

The request is successfully submitted.

NSX - 3

Go to Requests tab to check for the request. Click on the request number to get more details.

result-5

Click on “Execution Information” to get detailed step by step execution information.

result-6

In details information you can check completed, pending and failed (if any) steps.

result-7

result-8

At the backend, in vCenter we can get the new entities that are being created.

result-8-1

The job successfully completed.

result-9

Let’s check the details of a VM

result-14

This is the Web component, it automatically got two IP’s

 

result-16

Details of On-demand load balancer.

result-17

Here we can see that the created VM is connected to the respective Logical Switch.

result-18

A separate logical switch has been created for On-Demand routed network.

result-19

A new edge gateway has been created for On-Demand Load Balancer.

result-20

The parameters for monitoring on Edge.

result-21

The load balancer is automatically configured.

result-22

Pools are configured in Load Balancer.

result-23

Virtual Servers are configured with IP

result-24

Created VM’s are automatically added to the security Policies.

result-1-1

This concludes this series for NSX integration with vRealize Automation and consumption of NSX provided entities using vRA blueprint.

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *