VCF 9 – Depot Configuration and Binary Management in VCF Operations

In older versions of VCF (4.x & 5.x), before you deploy any of the Aria suite components, you have to download the binaries online or download the binaries manually and upload them into VMware Aria Suite Lifecycle, followed by binary mapping. Then, you can leverage these binaries to install, upgrade, or patch products from the Aria suite.

In VCF 9, this functionality has been moved to the unified VCF Operations component. All VCF fleet-related configurations/tasks are now performed through the VCF Operations. Using VCF operations, you can configure an online depot (token-based) or an offline depot for binary management. A depot serves as a source for downloading installation, upgrade, and patch binaries. You must set up a depot before downloading and installing components like VCF Operations for Logs and VCF Operations for Networks.

Only one depot connection can be ACTIVE at a time. If a depot is already ACTIVE, you must disconnect it before switching the depot to Online or Offline.Read More

Spread the Love

VCF-9 – Part 6: Deploying Workload Domain

Welcome to part 6 of the VCF-9 series. The previous post in this series discussed the ESXi host commissioning process. Now it’s time to put those hosts into action by creating a workload domain. This post will guide you on creating a new workload domain. 

If you are not following along, I encourage you to read the earlier parts of this series from the links below:

1: VCF-9 Architecture & Deployment Models

2: VCF Installer Walk-through

3: VCF-9 Networking Models

4: NSX Edge Cluster Deployment

5: ESXi Host Commission in VCF

A typical VCF deployment includes a management domain and one or more VI workload domains. Each VI workload domain can be configured with specific resources, network configurations, and policies to support its intended workloads. The VI workload domains are isolated from the management domain and are used for hosting business applications and providing cloud-like operations within a private data center.Read More

Spread the Love

VCF-9 – Part 5: ESXi Host Commision – What’s Changed?

Welcome to part 5 of the VCF-9 series. The previous post in this series discussed the new method of deploying the Edge cluster and the transit gateway. In this post, I will discuss the process of commissioning an ESXi host.

If you are not following along, I encourage you to read the earlier parts of this series from the links below:

1: VCF-9 Architecture & Deployment Models

2: VCF Installer Walk-through

3: VCF-9 Networking Models

4: NSX Edge Cluster Deployment

In the VCF world, host commissioning refers to the process of adding physical servers (with ESXi installed) to the SDDC Manager inventory to create a pool of available capacity for workload domains and clusters. Starting with VCF-9, VMware has announced the deprecation of the SDDC manager and moved the majority of the day-1 & day-2 configurations to VCF operations. As part of this change, the process of ESXi host commissioning has also changed, and this feature has been moved to the vCenter server UI. Read More

Spread the Love

VCF-9 – Part 4: NSX Edge Cluster Deployment

Welcome to part 4 of the VCF-9 series. The previous post in this series discussed the networking models (VPC Networking and Segment Networking) and the key differences between them. In this post, I will discuss deploying NSX Edges through a built-in wizard in the vCenter UI. 

If you are not following along, I encourage you to read the earlier parts of this series from the links below:

1: VCF-9 Architecture & Deployment Models

2: VCF Installer Walk-through

3: VCF-9 Networking Models

In previous VCF releases, NSX Edges were deployed through SDDC Manager using the UI/JSON. VCF-9 has introduced a newer way of deploying NSX Edge VMs, and the deployment can now be performed through vCenter UI to simplify the process, particularly for centralized external network connectivity. However, installation and configuration via the NSX Manager is still possible. 

You will notice one change when deploying Edges through vCenter Server, i.e., instead of creating a tier-1 gateway, the wizard deploys a Transit Gateway.Read More

Spread the Love

VCF-9 – Part 3: Networking Models

Welcome to part 3 of the VCF-9 series. Part 1 of this series dived into VCF-9 architecture and deployment models, and Part 2 showcased the deployment of a VCF instance using the new VCF installer. In this post, I will discuss the networking models available in VCF-9.

If you are not following along, I encourage you to read the earlier parts of this series from the links below:

1: VCF-9 Architecture & Deployment Models

2: VCF Installer Walk-through

In VCF 9, NSX introduces two networking object models: VPC Networking and Segment Networking.

VPC Networking: The VPC networking model offers a streamlined approach for configuring networking and security services, making it accessible even to non-networking experts. It aligns with the user experience found in public cloud platforms and integrates seamlessly within the VCF stack. Cloud users can interact with the VPC model through the NSX UI/API, vCenter UI, VCF Automation, or Supervisor cluster.Read More

Spread the Love

VCF-9 – Part 2: VCF Installer Walk-through

Welcome to part 2 of the VCF-9 series. In part 1, I discussed what’s new in VCF-9 and the deployment models and cluster topologies supported by VCF. In this post, I will walk through the deployment of VCF using the new VCF installer tool. 

The cloud builder tool that was included with earlier VCF editions has been replaced by the VCF installer. The new installer offers a whole new experience for deploying VCF instances and is lightweight. VCF-9 deployment methodology is more robust, well-designed, and efficient than the previous Excel-based Cloud Builder method. The installer can deploy VCF instances via UI or through JSON files and supports both brownfield and greenfield deployments. The installer also includes an improved built-in validation.

The VCF installer is available in the OVA file format and can be downloaded from here.

Prepping the Environment

Network & VLANs

I am using a VyOS router to provide network connectivity to my nested lab and have configured the following VLANs.Read More

Spread the Love

VCF-9 – Part 1: Introduction & Architecture

Introduction

VCF-9 was introduced at VMware Explore 2024, marking a pivotal advancement in how enterprises build and manage private clouds. Designed to simplify and consolidate IT environments, VCF 9 promises faster deployment, streamlined consumption, and simplified management—all while boosting security and cost-efficiency. VCF-9 is aimed at allowing organizations to manage their entire infrastructure as a single, unified system.

Some of the key features of VCF-9 are:

1: Streamlined Infrastructure: One Platform, Many CapabilitiesVCF 9 integrates compute, networking, storage, and automation into a unified framework. This helps two main audiences:

  • Infrastructure teams can automate and simplify private cloud deployment.
  • Platform engineers & developers benefit from a self-service environment for VMs, containers, and Kubernetes workloads.

2: Tailored Experiences for Cloud Admins and Engineers

  • Cloud Admins: Gain a consolidated control center to manage capacity, policies, tenants, and security—all from a single console. Diagnostic tools and topology maps accelerate issue resolution.
  • Platform Engineers: Can self-provision environments across traditional VMs and modern container stacks.
Read More
Spread the Love

NSX 4.x VRF Gateways – Part 5: Inter-VRF BGP Route Leaking

Welcome to part 5 of the NSX VRF series. In part 4, I discussed Inter-VRF routing that enables communication between VRF gateways in NSX by exchanging the routes that are not BGP, e.g., connected, NAT, and static routes, etc. In this post, I will discuss how route exchange can be facilitated over BGP. 

If you are not following along, I encourage you to read the earlier parts of this series from the links below:

1: NSX VRF Gateway – Architecture & Configuration

2: VRF Config Validation & Traffic Flows

3: VRF Route Leaking

4: Inter-VRF Routing

Introduction

Inter-VRF BGP route leaking allows routes learned in one VRF to be advertised to another VRF over BGP to enable communication between the isolated VRFs. It’s achieved through configuring BGP on Tier-0 VRF gateways and utilizing route maps and community lists to control the route leaking process. 

BGP route leaking supports leaking both IPv4 & IPv6 address families.Read More

Spread the Love

NSX 4.X VRF Issue “Overlapping Trunk VLAN on Logical Switch”

I came across an interesting issue while configuring VRF gateways in NSX 4.x. The configuration was erroring out with the message “Logical Switch trunk-vlan overlapping with another Logical Switch in the same underlying Edge host-switch is not allowed. Change VLAN configuration.”

After configuring the Tier-0 VRF Gateways, the parent Tier-0 went down.

Also, 2 out of 4 interfaces on the VRF gateway were stuck in the configuring state. 

The Cause

The main cause of this issue was that I created 2 trunked segments for northbound connectivity and allowed the same range of VLANs on them.

This method used to work perfectly fine in NSX 3.x. I have blogged on this topic earlier. So, I was wondering why the same steps are not working.

While troubleshooting, I came across this post by Graham Smith on Broadcom’s community channel. He has provided the resolution in his blog post here.

In NSX 3.x,Read More

Spread the Love

NSX 4.x VRF Gateways – Part 4: Inter-VRF Routing

Welcome to part 4 of the NSX VRF series. In part 3, I discussed VRF route leaking that allows communication between 2 data plane isolated VRF gateways in NSX. 

In this post, I will discuss Inter-VRF routing.

If you are not following along, I encourage you to read the earlier parts of this series from the links below:

1: NSX VRF Gateway – Architecture & Configuration

2: VRF Config Validation & Traffic Flows

3: VRF Route Leaking

Inter-VRF routing was first introduced in NSX 4.1.0, and it allows exchanging routes between VRFs. The route exchange happens between VRFs over an internally plumbed Inter-VRF transit link. 

You can configure Inter-VRF routing between:

  • Parent Tier-0 gateway and Tier-0 VRF gateway.
  • From Tier-0 VRF gateway to parent Tier-0 gateway.
  • From one Tier-0 VRF gateway to another Tier-0 VRF gateway.

To exchange routes between the gateways, you can use one of the following methods:

  • Inter-VRF Route Advertisement – Advertise routes that are not BGP, such as static, connected, NAT, etc, that are available as inter-vrf static routes on the connected gateway.
Read More
Spread the Love