VMware Cloud Expert

Tanzu Setup

Updated on

Introduction

TASKS

Task 1- Confirm SDDC creation and Access to vCenter
  1. Log into the VMCEXPERT VCDR Org assigned to your workshop (VMCEXPERT1-VCDR01, VMCEXPERT2-VCDR01, VMCEXPERT3-VCDR01)
  2. Click View Details
  3. Confirm the following:
    1. There are 4 Nodes deployed in the SDDC
    2. Tanzu Service Activated Successfully
      (If the service is not activated you can activate manually or contact us in the Slack Channel).
    3. The SDDC has Large Appliances
  1. Click the Networking and Security tab
  2. Click Groups --> Management Groups and create the following groups
Group Name Members
Jumphost {IP Address of your On-Prem VPN Endpoint for your environment} I.E 66.216.10.X 
On-Prem Mgmt-Net 192.168.110.0/24
10.10.6.0/24
Environment On-Prem VPN Endpoint IP
VMCEXPERT1 66.216.10.116
VMCEXPERT2 66.216.10.117
VMCEXPERT3 66.216.10.120
  1. Click Gateway Firewall --> Management Gateway and create the following Firewall rule to allow access to vCenter
  1. Click Open vCenter
  2. Click Show Credentials
    • Copy the cloudadmin user password
  3. Click Open vCenter
  4. Login as:
  5. Confirm the following
    1. There are 4-nodes in the cluster
    2. There is a Namespaces ResourcePool
    3. There is a kubernetes Content Library
Task 2 - *OPTIONAL* - Activate Tanzu Services

In the event that Tanzu services have not been activated or if the activation failed, you can perform the activation manually. Below are the steps and setting

  1. In the Summary tab of the SDDC, Click the Actions drop-down
  2. Click Activate Tanzu Kubernetes Grid
  3. Use the following values to configure the Networks:
Network CIDR
Service CIDR 10.240.12.0/24
Namespace CIDR 10.240.8.0/22
Ingress CIDR 10.240.4.0/22
Egress CIDR 10.240.0.0/22
  1.  Click Validate and Proceed
  2.  Click Activate Tanzu Kubernetes Grid

Creating the software defined networking and the TKG Supervisor cluster takes roughly 20 minutes to complete.

Task 3 - Setup VPN to Tanzu Desktops (SDDC)

Each lab kit now has an additional Desktop (Tanzu Desktop). Students access this desktop from their VDI session (There is a rdp shortcut to it on their desktop). These desktops are configured on the 10.10.6.0/24 network. There is a vPod router (10.10.6.1) that these desktops use as a gateway. This router also acts as a VPN endpoint to the Desktop. In VMC you setup the VPN to point to this endpoint.

Below is the IP permanent IP address of the vPod Router for Each environment.

Environment On-Prem VPN Endpoint (Router) IP
VMCEXPERT1 66.216.10.116
VMCEXPERT2 66.216.10.117
VMCEXPERT3 66.216.10.120
  1. In the SDDC, click the Networking and Security Tab
  2. Click VPN
  3. Click Add VPN
  4. Enter the following values for the VPN Configuration:
    • NAME:  Tanzu VPN
    • Remote Public IP: {Router IP for your Environment} See the table above
    • BGP Local IP/Prefix Length: 169.254.111.30/30
    • BGP Remote IP: 169.254.111.29
    • BGP Neighbor ASN: 65001
    • Preshared Key: VMwareNinja1!
  5. Click Save

Please record and notify us of the LOCAL IP ADDRESS (SDDC VPN ENDPOINT IP) You will need to update the VPN configuration On-Prem to match the SDDC. Temporarily disable the VPN until you have configured the VPN settings On-Prem

Once the Matching configuration is set on the On-Prem router, you can enable the VPN session for the SDDC and refresh the status

Task 4 - Setup VPN to Tanzu Desktop (On-Prem)

Once you've successfully created the VPN session in your VCDR SDDC in VMC on AWS, you'll then configure the VPN endpoint in the On-Prem environment to instantiate the VPN between both sites.

In this task, you will configure the On-Prem VPN endpoint on the Tanzu VyOS router. A saved SSH connection to the VyOS router has been created and can be accessed via MTPutty and a template with the commands to configure the router can be found on the desktop of the Instructor's VDI desktop (32)

A complete video recording of the on-prem configuration can be found here. It is also embedded and attached below

If you haven't already, connect to the Instructor's VDI session as documented below

  1. Go to https://vdi.27virtual.net and login as:
    • Username: vmcexpert#-32
    • Password: {Your_On-Prem_VDI_Password}
  2. Select your VDI Desktop
  3. Launch google chrome browser
  4. Go to https://vmc.vmware.com/console/sddcs, login and select the your Environment VCDR Org
  5. Click View Details
  6. Click Networking & Security --> VPN
  7. Select the Info icon next to Public IP, then copy and save the SDDC VPN Local Gateway IP
  1. On the desktop open Notepad and paste in the IP copied in the previous step
  2. Launch MTPutty
  3. Launch the saved SSH session to the VyOS router
  1. Type config to put the router in configuration mode
  2. Resize or minimize the MTPutty window
  3. On the desktop open the Tanzu VPN Setup Files folder
  4. Open and copy the content of the VYOS Tanzu Template for... VPN file
  5. Paste the content into another Notepad instance
  6. On the Keyboard press CTRL+H
  7. Type X.X.X.X in the find field and
  8. Paste in the {saved IP from step 7} in the Replace with field
  9. Click Replace All
  1. Copy all the line that start with set vpn
  2. Paste them into the MTPutty  session to the VyOS router
  3. Press Enter (This will configure the VPN Endpoint to your SDDC)
  1. Return to Notepad and copy the next set of commands under the set vpn commands  (commit through reboot)
  2. Press Enter
  3. When Prompted Type Y to reboot the Router
  4. Close the MTPutty session when prompted

Wait for approximately 2 minutes (120 seconds)before proceeding to the nest steps

  1. In the Browser window with the VMC Console, enable the VPN session
  2. Refresh the configuration
  3. Your VPN should now report as up ans healthy
Task 5 - Setup Firewall rules

To allow access between the Kubernetes Pod, External access to the pods as well as access to vCenter we need to setup a few groups (Compute and Management) as well as Firewall rules.  

  1. In the SDDC click the Networking and Security Tab
  2. Click Groups
  3. Click Add Group
  4. Define the following Compute Groups:
    1. Tanzu Egress
      • Group Name: Tanzu Egress
      • Group Type: IP Address
      • Members: 10.240.0.0/22
    2. Tanzu Egress
      • Group Name: Tanzu Ingress
      • Group Type: IP Address
      • Members: 10.240.4.0/22
    3. RFC 1918
      • Group Name: RFC1918
      • Group Type: IP Address
      • Members:
        1. 10.0.0.0/8
        2. 172.16.0.0/12
        3. 192.168.0.0/16
  5. Click Management Groups
  6. Confirm that Jumphost and On-Prem Mgmt-Net exist and are properly populated
  7. Click Add Group
  8. Define the following Management Group
    1. RFC 1918
      • Group Name: RFC1918
      • Group Type: IP Address
      • Members:
        1. 10.0.0.0/8
        2. 172.16.0.0/12
        3. 192.168.0.0/16
  1. Click Gateway Firewall
  2. Add/Modify the following Compute Gateway Firewall rules
Name Sources Destination Services Applied To Action
Tanzu Ingress Any Tanzu Ingress ANY All Uplinks Allow
Tanzu Egress Tanzu Egress ANY ANY All Uplinks
Allow
Intranet Access RFC1918 RFC1918 ANY All Uplinks
Allow
Internet Access RFC1918 ANY http
https
All Uplinks
Allow
Default VTI Rule


VPN Tunnel Interface Allow
  1. Publish the rule
  2. Click Management Gateway
  3. Confirm the On-Prem to vCenter rule exists and is defined appropriately
  4. Add a rule to allow access from the Pods. Define the rule as follows:
    • Name: Internal to vCenter
    • Source: RFC1918
    • Destination: vCenter
    • Services: HTTPS, SSO
  5. Publish the rule
  1. Click DNS
  2. Click the 3 vertical dots next to Management Gateway DNS Forwarder
  3. Click Edit
  4. Set Server IP 1 to 10.10.6.50
  5. Clear Server IP 2
  6. Click Save
Task 6 - Add AD Identity Source

Students will use individual domain accounts when working with Tanzu. To make this possible, the On-Prem AD (27 Virtual.net) needs to be added as an Identity source and the domain users need to be assigned rights in vCenter

  1. In the SDDC Console, Click Open vCenter
  2. Copy the CloudAdmin Password
  3. Log into vCenter as:
  4. Click the Hamburger Menu --> Administration
  5. In the Left pane under Single Sign-on, click Configuration
  6. Click the Identity Sources tab
  7. Click Add to add the On-Premises AD as an Identity Source using the values below
    • Identity Source name: 27 Virtual
    • Base Distinguished name for Users: dc=27virtual,dc=net
    • Base Distinguished name for Groups: dc=27virtual,dc=net
    • Domain Name: 27virtual.net
    • Domain Alias: 27Virtual
    • Username: [email protected]
    • Password: VMwareNinja1!
    • Primary Server URL: ldap://10.10.6.50
  8. Click Add
  1. Click Global Permissions
  2. Click Add
  3. Add and assign a user the CloudGlobalAdmin role by choosing the following:
    • Domain: 27virtual.net
    • User/Group: vmcexpert#-users (i.e. vmcexpert3-users)
    • Role: CloudGlobalAdmin
    • Click Propagate to children
  1. Click the Hamburger Menu --> Inventory
  2. Select the vCenter Server --> Permissions Tab
  3. Click Add
  4. Add and assign a user the CloudAdmin role by choosing the following:
    • Domain: 27virtual.net
    • User/Group: vmcexpert#-users (i.e. vmcexpert3-users)
    • Role: CloudAdmin
    • Click Propagate to children
Task 7 - Create a single Namespace
  1. In vCenter click The Hamburger Menu --> Workload Management
  2. Click Create Namespace
  3. Select the Cluster (Cluster-1)
  4. Name the namespace vmcexpert3-32
  5. Click Create
  1. Click Add Permission in the Permission tile
  2. Add the associated user account by selecting the following:
    • Identity Source: 27virtual.net
    • User/Group Search: vmcexpert#-xx (i.e. vmcexpert3-01)
    • Role: Owner
  3. Click OK
  1. Click Add Storage in the Storage Tile
  2. Select vSAN Default Storage Policy
  3. Click OK
  4. Click Add VM Class in the VM Service Tile
  5. Select the following VM Classes
    • best-effort-medium
    • best-effort-small
    • best-effort-xsmall
  6. Click OK

Conclusion

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.