Vmware Operationalizing NSX
Vmware Operationalizing NSX
Vmware Operationalizing NSX
VMware NSX®
Foreword by Bruce Davie, Vice President & CTO, VMware Asia, Pacific, Japan
Operationalizing
VMware NSX®
Program Managers
Katie Holms
Shinie Shaw
Technical Writer
Rob Greanias
Graphics Manager
Elaine Tai
Production Manager
Sappington
| V
Operations Tools...............................................................................................................61
vRealize Network Insight..............................................................................................61
vRealize Operations....................................................................................................... 66
vRealize Log Insight....................................................................................................... 66
Partner Ecosystem Tools............................................................................................ 69
Chapter 7 - Conclusion............................................................................................... 71
Where to go for more information.........................................................................72
Index.......................................................................................................................................75
List of Tables
Table 3.1 Architecture roles............................................................................................18
Table 3.2 Engineering roles........................................................................................... 20
Table 3.3 Administrator roles........................................................................................23
Table 3.4 Sample team structure KPIs.....................................................................26
Table 4.1 Sample proactive performance and availability monitoring
KPIs...................................................................................................................32
Table 4.2 Sample proactive capacity monitoring and planning KPIs......33
Table 4.3 Sample change management optimization KPIs..........................36
Table 4.4 Sample configuration management optimization KPI...............37
Table 4.5 Sample integrated NSX provisioning optimization KPIs.......... 40
Table 4.6 Sample incident management impact KPIs.....................................42
Table 4.7 Sample compliance management impact KPI............................... 46
Table 5.1 Sample on-boarding impact KPI............................................................52
Table 5.2 Sample application on-boarding impact KPI................................. 54
Table 6.1 Sample Native Tools troubleshooting capabilities........................59
Table 6.2 Sample vSphere-based troubleshooting capabilities................ 60
Table 7.1 Reference............................................................................................................72
VI |
List of Figures
Figure 1.1 Typical beginning state and target end state.................................. 3
Figure 3.1 Cross-domain and cross-functional silos.........................................13
Figure 3.2 Blended team..................................................................................................14
Figure 3.3 Getting started...............................................................................................15
Figure 4.1 Example of vRealize Network Insight’s 360° visibility..............31
Figure 4.2 Example of micro-secgmentation in a multi-application
deployment...................................................................................................35
Figure 4.3 vRealize Automation and NSX..............................................................38
Figure 4.4 vRealize Automation and NSX integrated capability...............39
Figure 4.5 Distributed Firewall Event Summary in vRealize Log Insight....
44
Figure 4.6 Auditing for access attemps using vRealize Log Insight....... 44
Figure 4.7 Firewall rule membership changes over time in vRealize
Network Insight..........................................................................................45
Figure 4.8 Creating change alerts for auditing in vRealize Network
Insight............................................................................................................. 46
Figure 5.1 Separation between dev/test and production environments...
50
Figure 5.2 Isolated Tenant environments................................................................51
Figure 6.1 NSX tool ecosystem...................................................................................58
Figure 6.2 360° topology view....................................................................................62
Figure 6.3 Example Palo Alto Networks VRF configuration........................62
Figure 6.4 Example best practice checklist failure listing............................ 64
Figure 6.6 Customer best practice checklist-based problems detected...
65
Figure 6.7 NSX Overview dashboard in vRealize Log Insight.....................67
Figure 6.8 Distributed Firewall Overview dashboard in vRealize Log
Insight..............................................................................................................67
Figure 6.9 Firewall Actions log details in vRealize Log Insight.................. 68
| VII
About the Author
Kevin Lees is the field Chief Technologist for IT
Operations Transformation at VMware, focused
on how customers optimize the way they operate
VMware-supported environments and solutions.
He is responsible for defining, communicating,
and evangelizing VMware’s IT Operations
Transformation vision and strategy as it relates to
operational (integrated organization, people,
process, and application of VMware technology)
approaches and best practices. Kevin also serves
as an advisor to global customer senior
executives for their IT operations transformation
initiatives. Additionally, he leads the IT
Transformation activities in VMware’s Global Field
Office of the CTO.
| IX
Content Contributors
Vyenkatesh (Venky) Deshpande works as a Sr.
Product line manager in the Networking and Security
Business Unit at VMware. Venky focuses on the
operational aspects of the NSX platform and drives
the product requirements and partnership effort with
the eco system. He has helped many NSX customers
evolve their organizations from People and Process
point of view such that they are successful in
operationalizing NSX. Venky has more than 15 years of
experience in the networking industry and has
expertise in building products and solutions for the
campus, wan and data center networks.
Additional Contributors:
Bode Fatona Chris McCain
Neil Mansukhani Bill Erdman
Paul Wiggett
X |
| XI
Acknowledgements
It takes the knowledge and resources of multiple
individuals to successfully create a guide like
Operationalizing VMware NSX. I would like to thank the
following people for their support in developing and
reviewing the material included:
Preface | XIII
Foreword
The idea of network virtualization has been around
since at least the early 2000s, but commercial
adoption of the technology really took off around
2012. The launch of Nicira’s “Network Virtualization
Platform (NVP)” and subsequent acquisition of Nicira
by VMware brought network virtualization to a broad
audience. In 2013, VMware formally launched NSX™,
the network virtualization platform, which is now an
increasingly common choice for the delivery of
networking and security services.
XIV |
Which brings me to this book. Operationalizing NSX is
essential if a customer is to benefit from the
capabilities of network virtualization. As with many
disruptive technologies, the true benefits accrue when
processes change to make most use of new
capabilities. Kevin Lees has spent his career helping
customers transform their IT operations, and now
brings his focus to this timely topic. This book brings
together the lessons learned over five years of
changing the way networks are built and operated,
and should be read by anyone who is serious about
deploying NSX and realizing the many benefits it can
bring.
Foreword | XV
Chapter 1
Introduction
CHAPTER 1 - Introduction | 1
What does “Operationalizing NSX” mean
Operationalizing NSX refers to what happens after the design and
implementation of NSX as a software defined networking and security
infrastructure. The term “day 2 operations” is often used to refer to
what happens after design and implementation of NSX, but to best
leverage NSX’s capabilities it is important to think beyond just day 2
operations.
2 |
Figure 1.1 Typical beginning state and target end state
CHAPTER 1 - Introduction | 3
What it will teach
This goal of this guide is to present what is required to operationalize
an NSX environment from an introductory perspective. References to
more detailed documentation will be provided where applicable.
Why it matters
For companies who have invested in NSX and the broader SDDC suite,
the technology enables them to provide greater value to developers,
application owners, and even end users. It is in their best interest to
derive the greatest value from this investment. The guidance provided
in this book will help individuals understand how best to unlock the
business value of NSX and SDDC. Software-defined solutions are the
future; this book can help individuals build onto their career skillset
while increasing their immediate personal value to their employer.
How to proceed
Different sections are more valuable to different readers. Organization
level decision makers would benefit from the entire book for context
and increased understanding of how to unlock NSX’s potential.
“Measuring Results” and “People Considerations” are of primary
importance, followed by “Intelligent Operations.” Managers interested
in optimizing operational processes should focus on the process
related sections in “Intelligent Operations.” Technically-inclined
individuals can focus in on the monitoring and troubleshooting
sections of “Intelligent Operations.”
4 |
CHAPTER 1 - Introduction | 5
6 |
Chapter 2
Measuring Progress
For example, create a load balancer and apply it to the front end of a
specific application. How long would it take to perform those steps in
the physical world? How long would it take to purchase, burn-in,
configure, and deploy a load balancer for a new application? Compare
that to defining and deploying a software-based load balancer in NSX.
What were the savings – in time and money – in pure deployment time
as well as cost of both people and licensing? An examination such as
this will help make the concept real.
8 |
business outcomes. Further incentivize success through
acknowledgement and recognition down the management chain.
Market success laterally across IT to both quiet the naysayers and
increase involvement as application of the virtualized network and
security expands. Finally, do not forget about business stakeholders.
Be sure to actively communicate and market success to them if it
provides a demonstrable business outcome to which they can relate.
Focus on quick wins and share the results up the management chain,
down the management chain, and laterally to other teams within IT.
People Considerations
This can extend beyond putting full solutions in production which can
be still more problematic. One customer applied a subset of this
process to developing new and modifying existing vRealize®
Operations Manager™ dashboards. Operations had to provide
requirements to a tools engineering team who provided the dashboard
two months later. Once the operations team received the dashboard, it
no longer provided what they needed.
12 |
Team construction
VMware recommends a new team structure to leverage NSX
capabilities in the context of a Software Defined Datacenter. The goal
is a blended or integrated team; a team consisting not only of cross-
functional technical skills but cross-domain roles. This is aimed at
creating a much closer relationship between architecture, engineering,
and operations for an SDDC-based environment including NSX. This
team will serve as the focal point for all decisions and actions
regarding the environment.
The same is true for breaking down technical silos and creating a
blended, cross-functional team. This concept is shown in Figure 3.2.
Relying on hand-offs between systems, network, security, and storage
to accomplish a result in a software defined infrastructure is
antithetical to achieving agility and speed of execution. Where a line of
business wants to rapidly begin developing a new mobile application
to address customer feedback, waiting for IT to deliver infrastructure
does not a happy customer make. Functional team ticket system- and
backlog-driven tasking does not lend itself to taking advantage of NSX
capabilities. These must become a thing of the past to be successful in
a software defined data center.
14 |
security start to represent a larger percentage of the overall
infrastructure and become more business critical.
Start with a small, blended tiger team focused on a single use case for
a specific application or service, then expand over time.
The next chapter details the skills necessary to affect this, but from a
functional perspective, compute, network, storage, and security should
all be represented on the team responsible for the SDDC. The bigger
challenge may be getting security representation on the team. This is
often the more controversial of the two when creating a blended team
with all the functional skills represented. The argument is for general IT
security policy creation, monitoring, auditing, and enforcement to
remain with the IT InfoSec team while the NSX-based implementation,
monitoring, and remediation of IT security policy should reside on the
blended team for operational agility, efficiency, and speed of
execution.
Including a security role for NSX in a blended team may seem less
obvious, but its absence will inhibit success.
16 |
If operating model optimization is not an inherent component of a
larger NSX or SDDC initiative, fall back on the same approach
described to simply get started with NSX. Create a tiger team focused
around a single activity or process that addresses the business
justification. Create a baseline, track metrics, then sell the results in the
context of demonstrable IT and business outcomes.
18 |
Role Responsibilities Skillsets and Education
Cloud • Identify and prioritize use cases • Cross-domain skills (e.g.,
Security and business requirements to virtualized network & security,
Architect address with virtualized security vSphere, virtual distributed
switching, access control)
• Determine technical security
requirements and translate • Education
them into security policies and
°° Data Center Virtualization
standards; plan and guide the
Fundamentals
implementation of these
security controls and solutions °° NSX Install, Configure, &
Manage or NSX for
• Design standards and templates
Internetworking Experts Fast
for automated virtualized
Track
security provisioning and
configuration management °° NSX: Troubleshooting and
Operations
• Verify virtualized security
solutions; develop and °° NSX security-related
implement efficient validation Hands-on Labs
controls and tests
• Determine auditing and
reporting processes for
virtualized security impacting
compliance
• Provide level 3 support as
needed to work within defined
SLA or OLA resolution period
• Conduct security risk
assessments for cloud
workloads and infrastructure;
provide authoritative advice
and guidance on security
strategies to manage the
identified risk
The Network Engineer and Security Engineer roles are key for blended
teams, whether they be specifically NSX-focused or broader SDDC-
focused. These network and security specializations are focused on the
engineer roles regardless of whether they are providing deeper
network and security subject matter expertise to the architect roles or
designing profiles and policies implemented by the administrator roles.
20 |
Role Responsibilities Skillsets and Education
Cloud • Translates IT security policies • Cross-domain skills (i.e.,
Security into security controls virtualized security, vSphere,
Engineer appropriate to SDDC-based access control)
cloud environment
• Education
• Designs, implements, deploys,
°° Data Center Virtualization
configures, and monitors the
Fundamentals
security solutions and
procedures for the SDDC- °° NSX Install, Configure, &
based cloud environment Manage or NSX for
Internetworking Experts
• Assists the Cloud Security
Fast Track
Architect role in designing and
planning the cloud security °° NSX: Troubleshooting and
architecture, security policies, Operations
and security processes.
°° NSX (security-related),
• Works with the Cloud vRealize Operations,
Automation & Integration vRealize Log Insight, &
Developer role to develop the vRealize Network Insight
workflows that orchestrate the Hands-on Labs
security controls according to
• Certification: VCP-NV
the security policy; develop
security monitoring and
remediation solutions,
workflows and integrations.
• Investigate identified security
breaches in accordance with
established procedures;
recommend and implement
any required action
• Work with the IT security
functional team to ensure that
cloud security services
integrate with existing tools
and processes; validate that
these fulfil IT security &
compliance requirements
• Manage security information
– including logging, auditing,
and reporting capabilities
• Diagnose and analyze root
cause of security-related
issues; apply patches and fixes
as needed
• Implement routine, approved,
and exception security-related
changes in the virtualized
infrastructure
• Assess and test upgrades and
patches for virtualized
networking and security
infrastructure and tools
The final two roles are the Network Administrator and Security
Administrator. In addition to day to operations (e.g., backup & restore,
upgrade & patching), the administrator roles are heavily focused on
proactively monitoring and remediation of the virtualized network and
security infrastructure. They are also responsible for working with the
engineer and developer roles to customize the monitoring tools,
continuously improve their proactive and predictive capabilities. The
goal is to minimize the actual number of incident tickets received by
identifying and remediating issues before they become service or
application disrupting.
22 |
Table 3.3 Administrator roles
24 |
Culture & mindset
Culture and mindset is the equivalent of the organization’s DNA – the
values and beliefs that shape how people behave and create the
organization’s culture. This is the single most impactful factor
influencing success or failure for adoption of software defined
networking and security. It is also the most difficult to change. This is
one of the first things to assess when getting serious about
implementing NSX.
How can an organization move toward this state? There are entire
books devoted to answering this question, but some guidance
includes:
• The members initially selected for the blended team must be like-
minded change agents; they must be open-minded and passionate
about instituting the culture
Objective KPI
Self-sufficient • % of escalations resolved These KPIs provide a measure of
team within the blended team blended team efficiency in
resolving issues versus the
• Average time to resolve
baseline of how long it
escalations with the
previously took to resolve
blended team
escalations across siloed teams.
26 |
CHAPTER 3 - People Considerations | 27
28 |
Chapter 4
Process Considerations
Intelligent Operations
Most IT organizations cannot break out of firefighting mode and are
constantly reacting to monitoring events and alerts generated in their
environment. They are also plagued with laborious operational tasks
consisting of error-prone manual steps. Applying this mode of
operation to a NSX-based environment will not deliver the full benefit
of software defined networking and security. It will minimize the agility
and speed of execution opportunities provided by NSX software
defined networking capabilities. The concept of “Intelligent
Operations” refers to a modern, proactive mode of operation that
optimizes and automates processes and workflows to take advantage
of software defined networking and security capabilities. This is
contrasted against a more traditional reactive mode of operation with
its constant focus on break fix activities and lack of time for innovation
and improvement. It is also about using the right tools for the job –
tools purpose built for Intelligent Operations in a software-defined
infrastructure.
30 |
Figure 4.1 Example of vRealize Network Insight’s 360° visibility
What if the NSX Edge device providing the load balancing or VPN
service supporting an application starts trending towards lower
throughput or high latency? One effective tool to monitor the NSX
Edge device is vRealize® Operations Manager™. vRealize Operations
Manager can monitor the NSX Edge as a virtual machine, taking
advantage of vRealize Operations Manager’s intelligent analytics
engine. The intelligent analytics engine can learn the normal behavior
of the NSX Edge VM, then alert when trends outside of its learned
behavior or exhibits anomalous behavior.
While monitoring will identify issues with the NSX Edge VM, it may not
be straightforward to link the problem back to the application in the
environment. Use of vRealize Network Insight to review the status of all
application components in the full end-to-end path will greatly aid in
proactively managing application performance and availability.
Objective KPI
Proactive • Number of performance- These KPIs provide a measure of
performance related issues detected and the effectiveness of proactive
monitoring resolved before they become performance monitoring over
service or application time.
impacting incidents
• % reduction in performance-
related incidents month over
month
32 |
on inter-site network throughput and latency. NSX Controllers are also
sensitive to disk latency, which should be monitoring in both single and
multi-site environments.
KPIs
Table 4.2 Sample proactive capacity monitoring and planning KPIs
Objective KPI
Proactive • Number of capacity-related These KPIs provide a measure of
capacity issues detected and resolved proactive capacity monitoring
monitoring before they become service effectiveness for example of the
or application impacting Edge cluster. (Requires Proactive
incidents Issue Resolution checkbox along
with Capacity Incident Category
• % reduction in reported
in ITSM tool)
capacity-related incidents
month over month
Change management
Software defined networking and security can and will have an impact
on change management. NSX is software-based, leading to fewer
change management activities in the physical network. This can
reduce the overall change scope, lessening the impact on
• Emergency firewall rules used for quarantine and/or allow rules for
example
34 |
Figure 4.2 Example of micro-secgmentation in a multi-application deployment
KPIs
Table 4.3 Sample change management optimization KPIs
Objective KPI
Positive impact • Ratio of terminated changes This KPI provides a measure of
on change to successful changes blended team efficiency in
management planning and executing changes
by having a versus the baseline of the same
blended team metric for changes involving
siloed teams.
Configuration management
The software defined nature of NSX simplifies configuration
management when coupled with automation. When using vRealize
Automation to perform workload deployments, all the software-
defined, logical components are tracked in blueprints that can be put
under version control. Configuration information can be automatically
inserted, updated, and marked as decommissioned or deleted in a
CMDB as part of a vRealize Orchestrator workflow invoked from
vRealize Automation. Either in conjunction with vRealize Automation
blueprints or used stand-alone, Puppet manifests, Chef recipes, or
Ansible playbooks can be used to keep NSX-related configurations
consistent. Any of these configuration management tools can
automatically check for and remediate configuration drift.
KPIs
Table 4.4 Sample configuration management optimization KPI
Objective KPI
A change record • Number of configuration Whether updating a blueprint,
should exist for any changes without a Puppet manifest, Chef recipe,
configuration corresponding change Ansible playbook, or creating or
changes record changing a configuration item in a
CMDB, there should be a record in
the change management tool. The
change record could have been
manually or automatically created.
KPIs
Table 4.5 Sample integrated NSX provisioning optimization KPIs
Objective KPI
Decrease • End-to-end monthly average This KPI should show a decrease
average end- workload provisioning time in pre-provisioning and post-
to-end provisioning due to automating
workload what had been manual network
provisioning and security-related activities.
time due to
automating and
continuously
improving
network and
security-related
steps.
Objective KPI
Decreased time • % of escalations resolved This KPI provides a measure of
to troubleshoot within the blended team how effective the blended
and remediate team is in resolving incidents.
• Average time to resolve
an incident due
escalations with the blended
to blended team
team
Compliance management
Isolation of application for security or regulatory compliance is a major
use case for NSX micro-segmentation and specifically distributed
firewalls. Integration of NSX distributed firewall rules with Active
Directory allows for granular application access based on AD user
groups. NSX distributed firewall rules can control application
communication, allowing communication between application tiers
while simultaneous restricting external inbound access based on port
groups and other attributes. Distributed firewall rules are defined in
NSX security policies and can be applied using NSX security groups.
These security groups include all tiers associated with a multi-tier
application, simplifying comprehensive application isolation. For an
excellent treatment of NSX micro-segmentation – including designing
and defining NSX security policies and security groups – see Wade
Holmes’ “VMware NSX Micro-segmentation: Day 1”. This book can be
downloaded from the URL provided in Table 7.1 in the “Where to go for
more information” section.
Once security policies are created and applied to security groups, how
are they managed on an ongoing basis? How best to monitor access
and communication activity while supporting audit requests? There are
several recommended solutions depending on the tools available in the
environment.
vRealize Log Insight also supports interactive analysis using logs in real
time. In an example audit for access attempts shown in Figure 4.6,
172.16.60.22 (Web-03a) issued a ping to 172.16.60.12 (Web-04a) that
was dropped due to FW rule # 1009
Figure 4.6 Auditing for access attemps using vRealize Log Insight
Figure 4.7 Firewall rule membership changes over time in vRealize Network Insight
Figure 4.8 Creating change alerts for auditing in vRealize Network Insight
KPIs
Table 4.7 Sample compliance management impact KPI
Objective KPI
Zero instances • Average amount of time to This KPI provides a measure of
of improper detect and remediate the efficiency of identifying,
communication improper communication with validating, and remediating
with or or between applications changes to application access or
between communication
applications in
the NSX-based
environment
Consuming NSX
The end goal for operationalizing NSX is to support its use. This section
provides high-level considerations and guidance for consuming NSX
capabilities. This is approached from four perspectives:
• Create the primary VMware NSX Edge services gateway. This will
act as the new organization’s provider logical router (PLR) and
logical switch that form the transit network connecting to the
distributed logical router.
50 |
uplink to the transit network.
• Create any known tenant networks and connect them to the NSX
for vSphere distributed logical router.
• NSX for vSphere distributed logical router (DLR) — The NSX for
vSphere distributed logical router is optimized for forwarding in
the virtualized space (i.e., east-west communication between VMs)
on VXLAN- or VLAN-backed port groups.
KPIs
Objective KPI
Decrease the • Average time to add a new These KPIs provide a measure
amount of user or group to the NSX- of the effectiveness of
time it takes to based infrastructure automating the on-boarding of
add a tenant groups of users, and/or tenants
• Average time to add a new
tenant to the NSX-based
infrastructure
Applications
On-boarding applications is as much about setting up the NSX-based
environment as it is about working with the application owners. Ideally,
the development, test, integration test, user acceptance testing, and
staging environments are also established. This is a critical capability
that many organizations bypass. Assuming an application is already
virtualized, the high-level steps for on-boarding an application include:
52 |
coupled are the components? Does it require stateful or
stateless communications?
• Design and configure new NSX security policies for the application
The line items “Design and configure any NSX networking services…”
and “Design and configure any NSX Security Policies” can be critical,
non-trivial activities depending on an application’s complexity. To
assist in this area, vRealize Log Insight and vRealize Network Insight
can be used for micro-segmentation planning along with a new tool
introduced in NSX for vSphere 6.3 – Application Rule Manager.
Application Rule Manager provides a new way to quickly create
security rulesets for new and existing applications. From a scalability
perspective, it works extremely well to analyze and build larger
rulesets quicker vRealize Log Insight, though it is still preferable to use
vRealize Network Insight for large scale ruleset development. For a
quick primer on using all three to develop micro-segmentation
rulesets, review Geoff Wilmington’s book VMware NSX Micro-
segmentation Day 2 Guide, listed in Table 7.1 in the “Where to go for
more information” section.
KPIs
Table 5.2 Sample application on-boarding impact KPI
Objective KPI
Decrease the • Average time to on-board a This KPI provides a measure of
amount of new application to an NSX- a team’s level of maturity in
time it takes to based infrastructure their understanding and use of
on-board an NSX in on-boarding new
application applications
Services
Services in this context refer to user consumable services like
Infrastructure as a Service, Platform as a Service, Digital Workspace as
a Service, and Data Analytics as a Service. They may also refer to NSX-
specific offerings (e.g., Load Balancer as a Service). On-boarding user
consumable services starts with the definition of the service. A 360°
service definition approach that includes all relevant stakeholders is
recommended. These stakeholders could be from a line of business, IT,
finance, marketing, or other organizations depending on the specific
service. Involving all interested parties during the service definition
dramatically increases the probability of success. This is more effective
than traditional IT approaches of either collecting requirements and
developing the service in isolation or developing a service without
talking to the business.
54 |
Regardless of the approach taken, the process is comparable to that
for on-boarding an application. If vRealize Automation capabilities are
being used for service instantiation, map the service architecture and
design resulting from the service definition to modular blueprints.
vRealize Automation blueprints can be nested, so creating modular
blueprints lends itself to potential reusability when creating other
services. There is also the option of using user input to modify the VM
and its environment as provisioned from the blueprint. User input such
as application type or target production environment could dictate the
security policies and security group assignment. NSX capabilities can
also be exposed directly for end-user selection, such as the use of a
load balancer.
58 |
NSX Controller, NSX Edge). Each NSX component can be configured
via a single login, using the vCenter UI or using the REST API against
NSX Manager. In a cross-vCenter NSX environment with multiple NSX
Managers, a given NSX Manager can retrieve information from other
NSX Managers about universal objects, while its own local objects
remain private.
Operation Tool
Logical network health • NSX plugin to vCenter UI
• NSX Manager Central CLI
vSphere Tools
The next layer up is the NSX monitoring and troubleshooting toolset
provided by vSphere. These tools are best accessed with the vSphere
Web Client and vSphere CLI. The NSX Manager to vCenter initial
connection process installs a web client plug-in for NSX on the
vSphere Web Client server. NSX-specific capabilities are available from
vSphere Web Client> Networking & Security.
Operation Tool
Overall health of NSX vSphere Web Client> Networking & Security >
components Dashboard
Detailed health of logical vSphere CLI (e.g., esxcli)
network
Status of communication vSphere Web Client> Networking & Security>
between NSX components Installation > Host Preparation
Performance issues vSphere CLI (e.g., esxtop)
NOTE
For a comprehensive guide to NSX troubleshooting using
the tools listed above, download the NSX Troubleshooting
Guide referenced in Table 7.1 in the “Where to go for more
information” section.
60 |
VMware vRealize Intelligent
Operations Tools
The next level of the NSX monitoring and troubleshooting stack is
VMware product tools. There are three VMware products for NSX
monitoring and troubleshooting:
• vRealize Operations
vRealize Network Insight was purpose built for NSX monitoring and
troubleshooting; it is the primary NSX monitoring and troubleshooting
product for intelligent operations.
• End-to-end troubleshooting
The 360° visibility capabilities function across both the underlay (i.e.,
physical) and overlay (i.e., virtual) network fabric to troubleshoot and
optimize network performance. This is based on selecting a source and
destination object between which it provides visibility across both the
virtual and physical layers. Figure 6.2 gives an example of an object’s
layer 3 and layer 4 path.
62 |
In this example, traffic flows between objects as well as physical and
virtual port path performance metrics. There is also a time machine
feature to look at the state of the path between the selected objects at
a given point in time. Objects allow drill down to view specific
information about problems, changes, firewall rules, applicable flow
paths, and localized topology.
Drilling down through the rollup view provides access details about
best practice checklist-based problems. The topology view includes a
consolidated topology for cross-vCenter, multi-NSX Manager
environments. The topology view allows for a quick drill down into NSX
components – such as logical distributed routers or VXLANs – to see
64 |
all the issues that have occurred based on violating the best practice
checklist rules.
They could see the NSX controller is subjected to two firewall rules.
The first rule is the ALLOW> ANY from Lab to Lab. This rule takes
priority as Sequence Number 1.
The second rule is Sequence number 12, a lower priority that will not
enforce the Lab Web to Lab DB> DBService> DENY rule. This was an
easy fix to ensure Lab Web did not have direct access to the
DBService, as they only wanted access through their middleware tier.
This example illustrates proactive operations; identifying conflicting
firewall policies and resolving them before they become service
impacting. In this case, it is preventing a developer from potentially
writing code assuming direct access to a database service that would
not be available in production.
Figure 6.7 shows the out-of-the-box top dashboard for NSX within
vRealize Log Insight.
66 |
Figure 6.7 NSX Overview dashboard in vRealize Log Insight
Figure 6.9 also demonstrates vRealize Log Insight’s filtering power. The
Filter allows a user to dynamically extract any field from the data using
regular expression. The extracted fields can be used for selection,
projection, and aggregation. The Fields pane on the right side of the
screen allows for customization in search and display of data
classifications and keywords.
68 |
Partner Ecosystem Tools
NSX has a growing ecosystem of technology partners that have
integrated monitoring, troubleshooting, logging, and auditing
functionality. For the latest list of tools, please reference table 7.1
on page 72.
Conclusion
CHAPTER 7 - Conclusion | 71
Where to go for more information
Description Reference
NSX https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.3/
Troubleshooting com.vmware.nsx.troubleshooting.doc/GUID-22AA06B4-
Guide 2AA7-4A23-8AF8-D2D81CB72FBA.html
Automation https://communities.vmware.com/docs/DOC-31921
Leveraging NSX
REST API
72 |
CHAPTER 7 - Conclusion | 73
74 |
Index
A D
Active Directory 42, 43, 52 Digital transformation 2
Agile 1 Distributed firewall 33, 42, 43
API 22, 37, 38, 41, 55, 59
Application-centric 30, 32 E
Application Rule Manager 54 Event Broker Service 40
Audit 23, 37, 42, 43, 44, 45
I
B Incident Management 41
Blended team 13, 14, 15, 16, 17, 18, Intelligent analytics 31, 66
19, 24, 25, 26, 36, 41, 42, 53 Intelligent Operations 4, 29
Blueprint 15, 34, 35, 37, 53, 55
Business stakeholders 9, 11, 25, 35 M
Mindset 2, 3, 11, 25, 30, 32, 41
C
Monitoring and troubleshooting
Cloud 4, 57, 58, 60, 61, 66
Cloud Architect 17
N
Cloud Automation & Integration
Developer 19, 20, 21 , 22 , 23 NSX
NSX Central CLI 58
Cloud Management Platform
55 NSX Edge 31 , 32 , 33 , 50, 51 ,
59, 66
Cloud Network Administrator
23 NSX Native Tools 58
Cloud Network Architect 18 , NSX Troubleshooting Guide
20 60
Cloud Network Engineer 20,
23 O
Index | 75
R vRealize Orchestrator 22 ,
REST API 37, 38, 41, 55, 59 36 , 40, 41
Roles and skillsets 3, 24 vSphere
vSphere Tools 58 , 60
S vSphere Web Client 42 , 43 ,
Security 60
Security group 39, 55 , 63 X
security policy 16 , 21
XaaS 40
Software Defined Datacenter 1, 13
Software defined networking and
security 1, 2, 11, 14, 15, 17, 25,
26, 29, 30, 32, 61
T
Team structure 3, 13, 26
Tiger team 8, 15, 16, 17
Tooling 2, 3
V
VMware
NSX
NSX Central CLI 58
NSX Edge 31 , 32 , 33 , 50, 51 ,
59, 66
NSX Native Tools 58
NSX Troubleshooting Guide
60
vRealize
vRealize Automation 34, 36 ,
38 , 39, 40, 53 , 55
vRealize intelligent operations
tools 29
vRealize Log Insight 21 , 23 ,
24, 37, 41 , 43 , 44, 54, 58 , 61 ,
66 , 67, 68
vRealize Network Insight 21 ,
23 , 24, 30, 31 , 41 , 45 , 46 , 54,
58 , 61 , 63 , 65 , 66
vRealize Operations Manager
31 , 41
76 |
Index | 77
As part of VMware’s Software Defined Data Center, NSX provides software
defined networking and security capabilities that deliver previously
unheard of levels of flexibility and agility. To fully leverage these
capabilities in a sustained manner, certain operational optimizations should
be considered.
Operationalizing VMware NSX brings together knowledge and guidance for
optimizing the ongoing operations of the VMware NSX component of a
software defined data center. It addresses both tactical optimizations –
such as tooling for monitoring and troubleshooting – and strategic
organization – including team structure, culture, roles, responsibilities, and
skillsets – all while supporting ITSM process considerations.
NSX has already helped over a thousand organizations improve the
network and security posture of their software defined data center by
fundamentally changing the way they approach network and security.
Operationalizing VMware NSX is your roadmap to fully realizing the
benefits provided by a software defined data center running NSX. You will
find proven insights and recommendations for optimizing the way you
organize and operate the environment, unlocking its full potential to
provide the flexibility and agility your business stakeholders require.
ISBN-10: 0-9986104-3-7
ISBN-13: 978-0-9986104-36
ISBN 9780998610436
Cover design: VMware
51299 >
Cover photo: Vertigo3d / iStock
www.vmware.com/go/run-nsx
9 780998 610436
$12.99