NSX 4.2 Multitenancy Series – Part 8: Resource Sharing in NSX VPC

Welcome to part-7 of the NSX Multi-tenancy series. The last post of this series discussed how NSX VPC is created and how subnets are carved out from the allocated IP blocks. 

In this post, I will discuss how resource sharing works in VPC. 

If you are not following along, I encourage you to read the earlier parts of this series from the below links:

1: NSX Multi-tenancy Introduction

2: Multi-tenancy Design Models

3: Creating NSX Projects

4: Distributed Security in NSX Project

5: NSX Virtual Private Cloud Overview

6: NSX VPC Networking

7: Creating NSX VPCs

When a VPC is created, a default share is created automatically in the parent project. This share contains the private and external IP blocks, Tier-0 gateway, and edge cluster, which the VPC can consume.

The public block is created in the default space by the Enterprise Admin and shared to the project/vpc. A private IP block is created and shared by the Project Admin.Read More

NSX 4.2 Multitenancy Series – Part 7: Creating NSX VPC’s

Welcome to part-7 of the NSX Multi-tenancy series. The last post of this series discussed how networking works in NSX VPC and the concept of subnets. 

In this post, I will demonstrate how to create an NSX VPC and setup networking for the project workloads. 

If you are not following along, I encourage you to read the earlier parts of this series from the below links:

1: NSX Multi-tenancy Introduction

2: Multi-tenancy Design Models

3: Creating NSX Projects

4: Distributed Security in NSX Project

5: NSX Virtual Private Cloud Overview

6: NSX VPC Networking

To recap from the previous post, a VPC can have public and private subnets for workload connectivity.

The Enterprise Admin creates public subnets in the default space and allocates them to the Project, which can then be consumed by the NSX VPC. Also, the Enterprise Admin whitelists the approved subnets for advertising them to the northbound routers. Read More

NSX 4.2 Multitenancy Series – Part 6: NSX VPC Networking

Welcome to part-6 of the NSX Multi-tenancy series. The last post of this series discussed NSX VPC architecture and its use cases and the benefits that it provides.

In this post, I will walk you through how networking works inside an NSX VPC.

If you are not following along, I encourage you to read the earlier parts of this series from the below links:

1: NSX Multi-tenancy Introduction

2: Multi-tenancy Design Models

3: Creating NSX Projects

4: Distributed Security in NSX Project

5: NSX Virtual Private Cloud Overview

VPC Networking Overview

In an NSX Project, each VPC has its own set of networking and security policies. Subnets within an NSX VPC represent independent layer 2 broadcast domains.

The Enterprise Admin creates and allocates IP address blocks (public & private) to the project. These IP blocks are consumed by the workloads in VPC. The application owners do not need to have a thorough understanding of the subnets or know how to create CIDRs for project workloads because the NSX platform handles this automatically.Read More

NSX 4.2 Multitenancy Series – Part 5: NSX Virtual Private Cloud (VPC) Overview

Welcome to part-5 of the multi-tenancy series. The last post of this series discussed distributed security in NSX Projects and how to implement DFW rules to allow inbound/outbound connection for the project workloads. In this post, I will discuss NSX Virtual Private Clouds (VPCs).

If you are not following along, you can read the earlier parts of this series from the below links:

1: NSX Multitenancy Introduction

2: Multitenancy Design Models

3: Creating NSX Projects

4: Distributed Security in NSX Project

NSX Virtual Private Clouds (VPCs)

NSX VPC is an abstraction layer that makes it easier to create self-contained virtual private cloud networks within an NSX Project so that networking and security services may be used in a self-service model.

This feature allows each tenant to define its own subnets, networking services, and firewall rules (DFW/Gateway). This simplifies network and security management, giving users a self-service model similar to public cloud environments. Read More

NSX 4.2 Multitenancy Series – Part 4: NSX Projects Distributed Security

In the last post of this series, I discussed how to create NSX Projects and apply RBAC and Quota policies to them. I also touched base briefly on the project’s security (DFW) aspect.

In this post, I will discuss the project’s security in greater detail. 

If you are not following along, you can read the earlier parts of this series from the below links:

1: NSX Multitenancy Introduction

2: Multitenancy Design Models

3: Creating NSX Projects

One of the key purposes of the Project feature is to allow security policy management to be delegated to the project admin to avoid the danger of rules being applied to the wrong virtual machines.

When an NSX project is created by the Enterprise Admin, the system generates default Distributed & Gateway firewall rules to regulate the default behavior of east-west and north-south traffic for the VMs in the NSX project.  The firewall rules in a project apply only to the VMs created in that project and don’t impact VMs created in other projects or the default space.Read More

NSX 4.2 Multitenancy Series – Part 3: NSX Projects

Welcome to part-3 of the NSX Multi-tenancy series. Parts 1 & 2 of this series were theoretical and mainly focused on multi-tenancy architecture and design models. This part focuses on hands-on, with topics such as creating NSX projects, applying RBAC policies, and creating networking constructs within the project. 

If you are not following along, you can read the earlier parts of this series from the below links:

1: NSX Multitenancy Introduction

2: Multitenancy Design Models

Environment Details

This is a full-fledged NSX deployed environment based on the design documented here; thus, I am not covering the implementation details again. 

The lab is deployed as per the below BOM 

Component Version
VMware ESXi 8.0 Update 3d 
vCenter Server 8.0 Update 3d 
vSAN 8.0 Update 3d 
VMware NSX 4.2.1.2
Backbone Router vYOS 1.5
AD + DNS Server Windows Server 2022

I am using the multi-tenancy with shared provider tier-0 gateway design for this post, where tenants will share the tier-0 gateway and the edge clusters from the provider.Read More

NSX 4.2 Multitenancy Series – Part 2: Design Models

Welcome to part-2 of the NSX Multi-tenancy series. While part-1 focused on the NSX Multi-tenancy solution and its architecture, part 2 will walk you through the multi-tenancy design models.

After the Project is created and the RBAC policies have been applied, the project admin creates the tier-1 gateways and segments for their workloads. Since the tier-0 gateway and edge clusters cannot be created inside a project, the Enterprise Admin is responsible for sharing these objects from the default space with the projects.

Multi-tenancy Design Models

There are 2 design models available as of today for implementing multi-tenancy:

  1. Multi-tenancy with shared Provider (T0 / VRF) gateway.
  2. Multi-tenancy with dedicated Provider (T0 / VRF) gateway.

In both designs, the data plane is shared. Multi-tenancy with an isolated data plane is not yet supported. 

Based on the design models discussed above, tenants can leverage shared or dedicated edge clusters to create networking constructs in a project.Read More

NSX 4.2 Multitenancy Series – Part 1: Introduction

What is Multi-tenancy?

Multi-tenancy is an architecture in which a single software application instance serves multiple customers, each called a tenant. A multi-tenant architecture allows several instances of an application to function in a shared environment. This design works because each tenant is physically integrated but logically independent. This means that a single instance of the software will run on one server and then serve multiple tenants.

Multi-tenancy in VMware NSX

Although Multi-tenancy was first introduced in NSX 4.0.1, it has been available at the data plane layer for several years. VMware NSX uses multi-tiered routing model with logical separation between the different gateways (tier-0 & tier-1) to provide networking connectivity, and these gateways, when deployed as per a specific design, provide isolation to user apps from each other.

For e.g, features like VRF, that allows for having a separate routing domain per tenant, or deploying Tier-1 gateways per application/environment (dev/test/prod) to achieve segmentation.Read More

One Node (ESXi) Management Domain Deployment in VMware Cloud Foundation

Those who are familiar with VMware Cloud Foundation (VCF) are aware that deploying the management domain requires a minimum of 4 ESXi hosts. In a production environment, this is not a problem, but in resource-crunched Lab/PoC environments, it is very difficult to deploy the full-fledged management domain.

In this blog post, I am going to demonstrate how to deploy a VCF management domain with just a single ESXi host in a nested lab. This tidbit will be very helpful for the folks who want to test VCF but don’t have adequate resources available in the lab.

I am following VCF 5.1.1 BOM for my deployment. I will cover resource requirements as well as touch base on the nested ESXi configuration. Let’s get started!!!

Nested ESXi Configuration

1: Resource Allocation

The nested ESXi was deployed with 96 GB Memory and 14 CPUs, 2 network adapters, and 1000 GB SSD storage. Although 96 GB is a bit less especially if you plan to deploy NSX Edges later after the SDDC bringup.Read More

Upgrade VCD Data Solutions Extension from 1.3 to 1.4

In my first post of the VCD Data Solution Extension (DSE) series, I discussed the architecture and installation workflow of DSE 1.3. The second post of the series covered the steps of deploying DSE in an airgap environment.

DSE 1.4.0 introduced exciting new features, especially around backup and restoring database instances. You can read the DSE 1.4.0 release notes for the full list of the new features.

In this post, I will walk through the steps of upgrading DSE from 1.3.0 to 1.4.0. The following steps explain the DSE upgrade workflow.  

Step 1: Download the DSE 1.4 Installation File

Download the DSE 1.4.0 installation binary from here

Step 2: Upgrade DSE Add-On

Login to the VCD provider portal, and navigate to More > Solution Add-On Management page. Click on the upload button to upload the DSE 1.4.0 iso file.

Click on the Browse File button, locate the iso file, and click on the Upload button.Read More