Part 2: Expending vSAN 6.6 Datastore after initial VCSA bootstrap

This post is in continuation with my previous post “Bootstrap vCenter Server Appliance 6.5 on vSAN 6.6” ,refer to the below link:

Bootstrap vCenter Server Appliance 6.5 on vSAN 6.6

I will cover the expansion of the vSAN datastore created during the VCSA bootstrap in the previous blog post.

The first thing after vCenter deployment is to add the hosts in vCenter and configure the VMkernel interface for vSAN traffic (and any other VMkernel interface) on each host. I have personally configured the VMK interface on the standard switches and later migrated them to the VDS (I am not covering the standard to distributed switch migration in this post).

This is how VMkernel networking looks on hosts:

1.png2.png3.png4.png

Now turn on the vSAN by clicking on edit option under Cluster -> VSAN –> General -> Edit

1.png

Cluster –> configure -> under vSAN click on Disk management ->claim disks

1

In manual mode vSAN will show you all the eligible HDD and SSD which can be claimed from the Hosts in the cluster with vSAN VMK configured

1.png

Above is the list of all the HDD from the 3 hosts, to claim the HDD simply click on “claim for capacity tier”.

1.png

Similarly we can claim all the flash resources from the eligible host by clicking on “claim for cache tier” .

1.png

Once you claim the SSD and HDD resources, vSAN will start the creation of the disk groups, you can see this in the vCenter recent tasks:

1.png

Go to the vSAN Datastore summary to confirm if the total capacity is reflecting the storage from all vSAN host in the cluster.

1.png

That’s all for this. Let me know if you have any feedback’s and do share this is you consider the posts worth sharing.

Part 1: Bootstrap vCenter Server Appliance 6.5 on vSAN 6.6:

I have recently installed vSphere 6.5 and vSAN 6.6 in our lab, I have got 4 vSAN Hybrid ready nodes ,  which I will use to setup a vSAN cluster.

Most interesting thing with the 6.5 vSphere release apart from the HTML client and other enhancements  is the ability to bootstrap VCSA on a target host by creating a vSAN datastore. With earlier version we used to deploy the VCSA on a temporary data store and later storage vMotioed to the vSAN datastore.

“Jase McCarty” has written a cool blog on the same, you can refer to the below link for details:

Bootstrap the VCSA onto vSAN 6.6

However, I will try to cover the deployment in more details including all the screenshot which can help people deploying vSAN 6.6 for the first time. So let’s get started.

I have installed ESXi 6. 5 on all 4 nodes. It’s time to install the vCenter to configure the vSAN Cluster.

Mount the VCSA installer and run the installer.exe file:1

Wizard is similar to previous VCSA 6.x install until we reach the “Install – Stage 1: Deploy PSC” page:11.png

1

I am deploying the External PSC appliance, however the process is similar for Embedded PSC as well.1

The Screenshot is self-explanatory, I am deploying the vCenter appliance on ESXi host “172.24.1.101” .

1

Select yes for the certificate warning.

1.png

1

This is where we will be creating a vSAN datastore locally on the host and install VCSA. Note that during bootstrapping, you don’t need to have vSAN Network configured on all the nodes. At this moment vSAN Datastore is local to the host, I will cover in another blog post how to expand the vSAN Datastore by claiming the disk from other nodes in the cluster.

1

 

1.png

Provided you are using a vSAN compatible controller and Drives, ESXi will detect the flash and HDD resources in the server. In case ESXi is not detecting Flash or HDD, you can manually tag local storage resources as SSD or HDD in this step. For checking the vSAN compatibility, refer to the link below:

VMware Compatibility Guide

 

1.png

Enter the required networking details for the PSC, make sure to configure the DNS host name resolution (forward and reverse) of PSC before deployment .

1.png

Finish and wait, the deployment took less than 5 minutes

1

1.png

1.png

Looking at the host client, I can now see a new “vSAN datastore” and PSC getting deployed on newly created vSAN Datastore.

1

Once done, we need to configure the appliance size and SSO in stage 2, refer to the below screenshots:

1

1

1.png

Here you can either join the PSC to an existing SSO (if exists) to run a linked mode configuration or if it is a new deployment select the “create new SSO domain”.

1.png

1.png

That’s it for PSC deployment, now we need to run the same installer, this time we will install the vCenter server.

1.png

1.png

1

1

1.png

Select the vSAN datastore created during the PSC installation.

1.png

Enter the network configuration for the vCenter server:

1.png

1.png

1.png

Finish and wait, you can actually see the VCSA deployment progress by login in to the target host.

1.png

1.png

1.png

1.png

1.png

With this now we need to configure the SSO for the vCenter server to complete the deployment.

1

1.png

That’s it for this post , I have covered the expansion of vSAN datastore by claiming storage resources from rest of the hosts in below post :

Expending vSAN 6.6 Datastore after initial VCSA bootstrap

Migrating from vCenter Server Embedded PSC to External PSC in vCenter Server 6

For the past few weeks i am working on enhancing my VMware home lab setup to be more scalable and enterprise grade , which gave me an opportunity to migrate the embededd PSC to external to extend my vCenter Single Sign-On domain with more vCenter Server instances to support multi site NSX and SRM use cases, you can reconfigure and repoint the existing vCenter Server instance to an external Platform Services Controller.

Few things to note before starting the migration :

  • The process is relatively straightforwad but remember there is no coming back once you migrate the embedded PSC to external .
  • Make Sure to take the snapshot of vCenter Server , in case anything gone wrong during the migration you can revert back vCenter to the last working state
  • Non Ephemeral virtual port groups are not supported by the PSC , as a workaround we need to create a new Ephemeral port group in the same VLAN (if using VLANs) as vCenter server network for the sake of deployment of new PSC . You can migrate the PSC network to non ephemeral port group after the migration completes successfully .

 

This is what I am running in my lab currently , a vCenter server appliance with embedded PSC:

1

I want to achieve the below topology with External PSC:

1

Lets start this by installing the external Platform Services Controller instance as a replication partner of the existing embedded Platform Services Controller instance in the same vCenter Single Sign-On site.

Mount the VCSA ISO and start the installation .

1.png

Enter the credentials of the ESXi host where you are planning to deploy the PSC appliance.

1

Acceppt the self sigh certificate .

1

1

Here select “Install Platform Service Controller” .1.png

Select Join an SSO domain in an existing vCenetr PSC:

1

Join the exsiting site and select the SSO site name:

1

1

1.png

As I have explained before e, if you have not created a Ephemeral virtual port group you will  not be able to select a network to deploy the new PSC.

1.png

Go back to vCenter and create a Distributed port group with Ephemeral port binding which will be used for the PSC Deployment.

1.png

Enter the standard networking parameters and complete the deployment wizard.

1.png

1.png

Click on finish and wait for the deployment completion . This process will take approx: 8-10 minutes.

1

You will get the below screen once PSC deployed successfully.

1

Now , Log in to the vCenter Server instance with an embedded Platform Services Controller.Verify that all Platform Services Controller services are running by executing the below command:

service-control –status –all

1

The final step is to run the below command to repoint the embedded PSC to new deployed external PSC:

cmsso-util reconfigure –repoint-psc psc_fqdn_or_static_ip –username username –domain-name domain_name –passwd password [–dc-port port_number]

Use the  –dc-port  option if the external Platform Services Controller runs on a custom HTTPS port. The default value of the HTTPS port is 443.

1.png

If you have followed all the instructions mentioned above, you will get the below success message: “vCenter Server has been successfully reconfigured and repointed to the external PSC 172.18.36.17 .

1

That was it , PSC has been successfully migrated from Embedded to external! I hope it was helpful .

VMware vRealize Network Insight 3.4 Installation & Initial setup

vRealize Network Insight (vRNI) delivers intelligent operations for your software defined network environment (specially NSX). In short, it does what vRealize Operations does for your virtualized environment, but only to the SDN environment. With the help of this product you can optimize network performance and availability with visibility and analytics across virtual and physical networks. Provide planning and recommendations for implementing micro-segmentation security, plus operational views to quickly and confidently manage and scale VMware NSX deployment.

This product comes with the following two OVA files.

VMware_vRealize_Network_Insight_3.4_platform.ova

VMware_vRealize_Network_Insight_3.4_proxy.ova

Below are the system requirement for the OVA deployment.

System Requirements:

  • vRealize Network Insight Platform OVA:

– 8 cores – Reservation 4096 Mhz

– 32 GB RAM – Reservation – 16GB

– 750 GB – HDD, Thin provisioned

  • vRealize Network Insight Proxy OVA
  • 4 cores – Reservation 2048 Mhz
  • 10 GB RAM – Reservation – 5GB
  • 150 GB – HDD, Thin provisioned
  • VMware vCenter Server (version 5.5 and 6.0).
  • vCenter Server Credentials with privileges:
  • Distributed Switch: Modify
  • dvPort group: Modify
  • VMware ESXi:
  • 5.5 Update 2 (Build 2068190) and above
  • 6.0 Update 1b (Build 3380124) and above
  • VMware Tools is installed on all the virtual machines in the data center. This helps in identifying the VM to VM traffic.

The deployment is relatively straight forward, similar to deploying any other OVA.

11

Select the Data center

1.pngFor my environment, I am going with the medium configuration.1.png

1.png

Select the datastore to be used by the virtual appliance.

1.png

I am going with the thin provisioning option, however I would strongly recommend to use for thick provision in production environment.1

 

1.png

Below, simply enter the basic networking details.

1.png

Once done, click on finish and wait for the virtual appliance deployment completion.1.png

You can open the virtual appliance console to check the progress of appliance deployment.

1.png

Once Appliance is successfully deployed and powered on, go to the configuration screen by going to https://<IP or FQDN of the appliance> . The first thing is to enter the vRNI license and click on validate.

1

Once the license is validated, setup the admin password for the appliance login.  Click on activate

1.png

Next, you need to generate the secret for the proxy VM. Click on Generate button to generate the Secret.

1.png

Copy the shared secret. Platform Appliance will wait for the deployment of Proxy VM. It will keep looking for it till the time proxy VM is deployed.

Let’s go ahead and deploy the Proxy VM .I will not cover the Proxy VM deployment again, it’s relatively straight forward and similar to the platform appliance deployment.

During Proxy Appliance deployment under property, you need to paste the shared secret generated during the platform virtual appliance

1.png1

Once the deployment is done and the Proxy VM is up and running, it is automatically sensed in the main configuration page.1.png

Click on finish and login to the vRNI GUI using “admin@local” user and password that you have setup initially.1.png1.png

First thing after logging in to the appliance for the first time is adding the data sources (vCenter Server and NSX manager).

On the top right corner, click on Profile -> settings ->Data Sources ->Add new data sources.1.png

1.png

Enter the vCenter server admin credentials and validate to check if vRNI is able to connect to vCenter Server successfully 1.png

1.png

1.png

1.png

Similarly add NSX manager as a data source to vRNI and validate.1.png

1.png

1.png

1.png

This conclude the vRNI appliance deployment and initial configuration.

AirWatch 9.0 Installation: Part 3 – Application Server Configuration:

AirWatch application server primarily consist of 2 servers “Device services server” and “Admin Console server”.

We can install both the roles on a single server or on dedicated servers (recommended for production environments). In my case I am installing both the roles on single server.

Install URL Rewrite Module 2.0

The URL Rewrite Module 2.0 cannot be installed until the IIS role is installed.

  1. Navigate to http://www.iis.net/downloads/microsoft/url-rewrite#additionalDownloads and download the

Appropriate version for your install.

  1. Run the installer and accept the defaults for installation.

Run the AirWatch installer on each application server.  In my case I am using single server for AirWatch Device Services server and AirWatch Console server.11.png1.png11

You can expand both the roles and select/deselect the roles you want to add .1

Application server Installation is straight forward , just follow the installation wizard and you should be good to go .111.png111.png1.png1.png1

Once you see the success messgae , open google chrome (don’t use IE) and enter the FQDN of your device services server .1.png

You should see the AirWatch admin console login screen as shown above.  For the first login, default username is “administrator” and password is “AirWatch” all in lower case. Once logged in you will be asked to change the password.

Now you are good to enroll your devices and perform Device, Application and Content management.

I hope this was helpful, do share if you liked it.

AirWatch Installation: Part 2 – SSL Certificate configuration for Device Services and console Server

Generating CSR for SSL Certificate.

Before generating the CSR for SSL certificate, make sure to add the IIS role on device services and console server.1.png

Select Server on the left and double click on “server certificate” under IIS1.png1.png

Click on “create certificate request” .1.png

Under common  name , use the exact domain name which you have bought form a public domain provider , this will be the public DNS name of your AirWatch Device services server.1

Select bit length of 2048.1

Now we have the CSR ready .

Processing Certificate Signing Request with Certificate Authority

I am using comodo SSL certificate for this installation. comodo SSL are trusted by both Apple and Android devices and certified by Airwatch as well .

The good part is you can register for a 90 days free trail license for testing before making a purchase.I have also bought public DNS for the AirWatch Device Services server from GoDaddy (awemm.redingtonvault.com). You need the domain before you can apply for the SSL certificate.1.png

Here is have used the CSR I have generated in previous step.1.png1.png

Enter the domain you have bought here to complete the wizard, SSL certificate will be issued against this domain.1

1.png

1.png

Once you complete the process, SSL certificate along with root and intermediate certificate will be emailed to you on successful domain validation.

Configuring SSL Certificate on Application server (Device Services Server):

First we will configure the root certificate:

Open the MMC console – File – Add/Remove sanp-in1.png

Use computer account.1

Click on certificate on left hand side and select add ..

1.png1

Once this done, go to certificate – trusted root certificate – right click on trusted root certificate – select all task and import1.png1.png

Follow the wizard and import the root certificate .1.png1.png

Browse to the location of root certifcate , select and open1.png1.png111

Similarly import the intermidiate certificate  by right clicking on intermidiate certificate folder .follow the the above process , once the import is done close the MMC console.

Now we will install the SSL certificate for our domain.1.png1.png1.png1.png1.png

Once certificate request is completed, you can see your SSL certificate is visible under server certificates as highlighted above.

Next step is to perform https binding for default website.1.png

Under sites, select “Default website” – click on binding on right hand side.1

Click add, change the type to https. Mentioned the FQDN of host and select your SSL certificate.1.png11.png

For testing, write the FQDN of your device services server with HTTPS and you should be able to see the green secure lock. Refer to the above screenshot.

 

In the Next part, I will cover the application server configuration.

AirWatch 9.0 Installation: Part 1 – Database Configuration

The first component for Airwatch initial setup is to configure the SQL database. Below are the SQL Server Software Requirements:

  • SQL Server 2008 R2, SQL Server 2012, or SQL Server 2014 (in 2012 compatibility mode) with Client Tools

(SQL Management Studio, Reporting Services, Integration Services, SQL Server Agent, latest service packs). Ensure the SQL Servers are 64-bit (OS and SQL Server). SQL Server 2008 R2 or higher is required for reports.

  • Currently only Standard and Enterprise Editions are supported.
  • .NET 4.5.2 through 4.6.2 is required to run the database installer.
  • Ensure the SQL Server Agent Windows service is set to Automatic or Automatic (Delayed) as the Start type for the service. If set to Manual, it has to be manually started before database installation.

TCP/IP should be enabled

  • Use TCP/IP to connect to the database and disable Named Pipes. In SQL Server Configuration Manager, navigate to SQL Server Network Configuration and select Protocols for MSSQLSERVER.1 

     

    Once the prerequisites in place, we can start the database configuration.

    Creating the Database

    To create the database, you must perform the following steps with an administrator account that has the correct read/write permissions.

    1. On the SQL Server, open SQL Server Management Studio.
    2. Log in using your user name and password.
    3. Click Connect.
    4. Right-click Databases and select New Database.

    1.png

    1. Enter AirWatch as the Database name
    2. Scroll to the right side of Database files, select the … next to Autogrowth for AirWatch, and change File Growth to

    “In Megabytes” and the size to 128, then select OK.

  • 1.png

    Select Options, and select SQL_Latin1_General_CP1_C1_AS and select Close.1.pngNow we will Create AirWatch SQL Service Account and Assign DB Owner Roles

    – Log in to the DB server containing the AirWatch database.

    – Navigate to Security > Login, right-click, and select New Login.

    1.png. Select whether to use your Windows account or local SQL Server account for authentication. For SQL Server authentication, enter your user credentials.

    . Select the AirWatch database as the Default database.1.png

    -Navigate to the Server Roles tab. Select server role as Public.1.png

    -Select User Mapping.

    -Select the AirWatch Database. Then, select the db_owner role.1

    Select the msdb Database. Then, select the SQLAgentUserRole and db_datareader roles.1.png

    AirWatch Database Setup Utility

    Once all prerequisites are met, such as creating the database and the AirWatch

    SQL account and assigning DB owner roles used for installation, run the AirWatch database setup utility.

    It’s really simple installation (no brainer) , simply run the executable and follow the installation wizard1

    You can see above, Airwatch Database utility will install any pending component upon execution.

    11.png1.png1.pngMake sure to select correct database catalog and user have proper rights to make changes to the AirWatch database instance.11

    That’s all for database configuration for Airwatch . In Part 2 I will cover the SSL certificate and domain configuration for Device services server.