Operating VMware Cloud Director
VMware Cloud Director tenant portal overview
The VMware Cloud Director™ tenant portal is used for administration of your organization and to create and configure virtual machines (VMs), vApps, and networks within vApps.
You can also configure advanced networking capabilities that are provided by VMware NSX® for vSphere® within a VMware Cloud Director environment. With the tenant portal, you can also create and manage catalogs, vApps, and virtual data center (VDC) templates.
Roles, permissions, and users
To access VMware Cloud Director, use single sign-on with your IBM Cloud credentials as the default authentication and authorization mechanism. For a list of the IBM Cloud Identity and Access Management (IAM) Director tenant portal roles and authorizations that are associated with each role see Managing IAM access for VCF as a Service. Organization administrators can create local users that are authenticated by the tenant portal as opposed to IBM Cloud IBM Cloud and can also create additional customized roles that can be assigned against local users.
For more information about roles and permissions, see VMware Cloud Director tenant portal roles and rights.
Modifying your email settings
The Organization Administrator must modify email notification settings to the organization SMTP server.
For more information about modifying SMTP server settings, see Modify your email settings.
Catalogs
A catalog is a container for vApp templates and media files in an organization. Organization administrators and catalog authors can create catalogs in an organization. Catalog contents can be shared with other users or organizations in the VMware Cloud Foundation (VCF) as a Serviceinstallation. Or they can be published externally for access by organizations outside the VCF as a Service installation.
VCF as a Service contains private catalogs, shared catalogs, and externally accessible catalogs. Private catalogs include vApp templates and media files that you can share with other users in the organization. If a system administrator enables catalog-sharing for your organization, you can share an organization catalog to create a catalog accessible to other organizations in the VCF as a Service installation.
If a system administrator enables external catalog publishing for your organization, you can publish an organization catalog for access by organizations outside the VCF as a Service installation. An organization outside the VCF as a Service installation must subscribe to an externally published catalog to access its contents.
Each organization has access to the VCF as a Service public catalog. The catalog contains IBM-compliant images that are configured, secured, and ready for use.
VCF as a Service public catalog
Each organization has access to the VCF as a Service public catalog. The catalog contains IBM-compliant images that are configured, secured, and ready for use.
Review the following considerations for VCF as a Service:
- Public templates that are configured to services on the IBM private network require an extra configuration step to enable VM access to the IBM Services network. For more information, see Enabling VM access to IBM Cloud Services by using the private network.
- Public templates require a minimum level of customization to establish the initial administrator password. For more information, see Changing the guest OS customization properties of a VM.
The public catalog contains vApp templates for the following components:
Image | Version |
---|---|
CentOS | 7.x |
Microsoft® Windows® | 2022 Standard |
Microsoft Windows | 2019 Standard |
Microsoft Windows | 2016 Standard |
Red Hat Enterprise Linux® | 9.3 |
Red Hat Enterprise Linux | 8.1 |
Red Hat Enterprise Linux | 7.7 |
Rocky Linux | 9.4 |
Rocky Linux | 8.1 |
CentOS and Rocky templates
The templates that are provided in the public catalog have the following characteristics:
- Latest updates installed
- VMware tools installed
- YUM repository enabled configured to the IBM private network YUM repository
- NTP server that is configured to the IBM private network NTP Server
Microsoft Windows templates
The Microsoft Windows templates that are provided in the public catalog have the following characteristics:
- Latest updates installed
- Windows update enabled configured to the IBM private network Windows update server
- VMware tools installed
- Windows Remote Desktop disabled
- Firewall activated
- Windows Defender activated
- NTP server that is configured to the IBM private network NTP Server
- Windows license configured to activate and receive updates by using the IBM Service Network Microsoft Key Management Server (KMS) and not the internet Microsoft KMS
Red Hat Enterprise Linux templates
The Red Hat Enterprise Linux (RHEL) templates that are provided in the public catalog have the following characteristics:
- Latest updates installed
- VMware tools installed
- Firewall activated
- NTP server that is configured to the IBM private network servers
After you deploy the VM on the tenant portal, register the Red Hat VM with your RHEL activation key in IBM RHEL Capsule Server. To register the Red Hat VM with your RHEL activation key, you must enable VM access to connect to the IBM service network. For more information, see Enabling VM access to IBM Cloud Services by using the private network.
Complete the following steps to register the Red Hat VM with your RHEL activation key.
- In the VMware Solutions console, click Resources > VCF as a Service from the left navigation panel.
- From the Virtual data centers tab, locate and click the Cloud Director instance name.
- On the Summary tab, locate the Red Hat activation key in the Site details panel and click the Copy to clipboard icon.
- Run the following commands from the Red Hat VM.
uuid=$(uuidgen)
echo {\"dmi.system.uuid\": \"$uuid\"} > /etc/rhsm/facts/uuid_override.facts
cat /etc/rhsm/facts/uuid_override.facts
Ensure the contents of the uuid_override.facts contains a generated UUID.subscription-manager register --org="customer" --activationkey="ACTIVATION_KEY" --force
WhereACTIVATION_KEY
is the Red Hat activation key that you copied to the clipboard.
You can still use another RHEL Capsule Server or a satellite server if you already have an RHEL subscription outside of IBM. Charges for the RHEL license are incurred against RHEL VMs that are running in a VDC.
Defining catalogs and policies
To create a catalog, you must have either the Organizational Administrator or Catalog Author tenant portal role.
For more information about defining catalogs and policies, see Working with catalogs.
Uploading your media or templates
OVF packages can be uploaded to a catalog as a vApp template to make the template available to users. For more information, see Create a vApp template from an OVF file.
Media files, such as ISO disk images and FLP diskette drive images, can be uploaded to a catalog as a media file. For more information, see Working with media files.
The maximum import size is 750 GB. Large image files or templates might take a long time to upload. For assistance with files larger than 750 GB, open an IBM Support ticket by following the steps in Getting help and support.
Virtual machines
When you use the tenant portal, you can create a VM or provision a VM from a template.
For more information, see Create a standalone virtual machine.
Customizing virtual machine properties
You can edit the properties of a VM, including the VM name and description, hardware and network settings, and operating system settings for a guest.
For more information about working with VMs, see Working with virtual machines.
If you use the tenant portal (Guest OS Customization) to change your Windows Administrator password, ensure that you adhere to Windows complexity requirements. If you change the password in the tenant portal without doing so, the password does not work in the Windows VM template.
Changing the general properties of a virtual machine
You can change the name, description, storage policy, and other general properties of a VM.
Switching between storage properties
Some disk settings cannot be changed while the VM is powered on. For example, you can increase the disk size while the VM is powered on, but you cannot decrease the disk size unless the VM is powered off. A message displays if you must power off the VM before you modify a disk setting. For more information, see Power off a virtual machine.
For more information about changing a storage policy, see Change the general properties of a virtual machine.
If you must power off the VM before you change a storage policy, power the VM back on after the VM is moved to the new storage policy. For more information, see Power on a virtual machine.
Changing the hardware properties of a virtual machine
You can change the hardware properties of a VM, number of vCPUs, memory, hard disk allocation, and network configuration.
Changing the Guest OS Customization properties of a virtual machine
Guest OS customization is optional for all platforms. It is required for VMs that must join a Windows domain when the VMs are being powered on.
When you use an IBM template to create the VM, use the Guest OS Customization panel to acquire or set the unique password for the OS instance. Ensure that the option Enable guest customization is selected and then use one of the Password Reset options to establish the initial administrator credential.
For more information, see Change the guest OS customization properties of a virtual machine.
Changing the advanced properties of a virtual machine
In the Advanced settings, you can configure the resource allocation settings (shares, reservation, and limit) to determine the amount of virtual CPU (vCPU), memory, and storage resources provided for a VM.
For more information, see Edit virtual machine properties.
Using IBM templates
Password requirements apply if the VM is deployed from the IBM templates that are provided in the public catalog. You must use the initial password that was generated during power-on when you first log in to the VM. You can find this password on the VM details page.
If you use the tenant portal Password Reset field to change your Windows Administrator password, ensure that you adhere to Windows complexity requirements. If you change the password in the tenant portal without doing so, the password does not work in the Windows VM template.
- From the Guest OS Customization panel, click EDIT.
- From the Edit Guest Properties panel, locate the password in the Specify password field.
- After a successful login with the initial password, return to the Edit Guest Properties panel to reset the password and log in again with the new password.
vApps
A vApp consists of one or more VMs that communicate over a network and use resources and services in a VDC. Create the vApp and then add VMs and networks.
You can add VMs and networks to the vApp.
For more information about vApps, see Working with vApps.
Networking
For a complete tutorial on how to create VDC networks inside of your VDC, create VMs to attach to your VDC network, and configure NAT and firewall rules on your edge gateway, see Configuring a virtual data center in VMware Cloud Foundation as a Service using the VMware Cloud Director Console.
Enabling VM access to IBM Cloud services by using the private network
You can configure vApps and VMs running inside of the VDC to use the IBM Cloud private network to access IBM Cloud services. Accessing IBM Cloud services through a private network can save on outbound public networking costs and can provide a higher degree of reliability and security. Virtual data centers route to the IBM Cloud private network through a VDC service network that is configured as an available external network on the VDC edge.
The following services are available.
Service | IP address (Endpoint) |
---|---|
Microsoft Windows Update Server | 161.26.4.21 |
Microsoft Key Management Server | 161.26.96.8, 161.26.96.9 |
Red Hat Capsule Server | 161.26.96.25 |
DNS | 161.26.0.10 (rs1.adn.networklayer.com ) and 161.26.0.11 (rs2.adn.networklayer.com ) |
Ubuntu and Debian APT Mirrors | 161.26.0.6 (mirrors.adn.networklayer.com) |
RHEL and CentOS YUM repo | 161.26.0.6 (mirrors.adn.networklayer.com) |
NTP | 161.26.0.6 (time.adn.networklayer.com) |
IBM Cloud Object Storage | s3.direct.xxx.cloud-object-storage.appdomain.cloud |
The VDC must have an edge (public-private or private-only) to enable access to the service network. NAT and firewall rules for private network connectivity are established as a default during the VDC creation.
Creating a vApp network for VCF as a Service
If not already completed, create a vApp containing at least two VMs before you complete the following procedure. For more information, see Working with vApps.
- From the left panel of the tenant portal, click Data Centers.
- From the Virtual Data Center details page, click the VDC where you want to create the vApp network.
- From the Compute section of the left panel, click vApps.
- Click the vApp that you want to add a vApp network to.
- Click the Networks tab, and click NEW in the vApp Fencing section.
- On the Add Network to window, select OrgVDC Network and select the network name.
- Click Add.
For more information, see Working with networks in a vApp.
Allocating public IP addresses for NAT rules and for VPNs
Every VCF as a Service VDC with a public edge is provided with eight public IP addresses. To enable the eight addresses for use in the edge NAT rules or the Virtual Private Network (VPN) rules, you must first allocate the public addresses.
You must perform these steps as a user who has the Manage Manual IP Reservation permission. IBM default roles Manager, Administrator, Director Network Admin, and Director Security Admin all have this permission.
-
From the left panel of the tenant portal, click Networking.
-
At the top of the right panel, select IP Spaces.
-
Click the IP space name that's associated with the VDC's edge. If you have multiple VDCs with a public edge, you can identify which IP space name is associated to the edge when the first three characters of the IP Space name match the data center that the VDC is created in. For example, t04 matches tokyo04.
You can also use the V00 value in the name, if needed. Under Configuration on the Edge Gateway details page, click General. The Provider Gateway name has a VRF000 value. Use the number in that value, for example vfr015. In this example, use the pattern t04-xxx-V15-xxx to locate the correct IP Space entry.
-
From the Allocation section on the IP Spaces details page, select Floating IPs.
-
At the top of the table, click REQUEST.
-
Each VDC is assigned eight public IP addresses. The request dialog supports a maximum of five IPs per request operation. To ensure that all eight IP addresses are allocated, first request five IPs, then repeat the request for the remaining three IPs.
Using VPNs to connect VMware workloads to IBM Cloud
You can use VPNs to connect your VMware workloads through the public network to VCF as a Service single-tenant and multitenant instances.
Creating a route-based IPsec VPN against the VDC edge gateway over the public internet for VCF as a Service
The following steps outline a validated process. Many different configurations work and depending on the remote side of the IPsec tunnel, different configurations might be required.
Before you begin, ensure that any edge public egress rules don't use Any
for the Internal IP value. The rules must specify a CIDR of the internal VDC network that supports SNAT egress.
- From the left panel of the tenant portal, click Data Centers.
- From the Virtual Data Center details page, click the VDC where you want to create a route-based IPsec VPN.
- From the left panel of the VDC, expand Networking and click Edges.
- From the Services section, click IPSec VPN.
- Click NEW and complete the following fields for the IPsec VPN tunnel.
-
For General Settings, complete the following selections and click NEXT.
- For Name and Description, provide details that help to describe the VPN.
- For Type, select Route Based.
- For Security Profile, use the default.
- For Status, toggle to enable.
- For Logging, toggle to disable.
-
For Peer Authentication Mode, complete the following selections and click NEXT.
- For Authentication Mode, select Pre-Shared Key. You must also use this value on the other side of the VPN tunnel.
- For Pre-Shared Key, enter a secure value that is also used on the other side of the VPN tunnel.
-
For Endpoint Configuration, complete the following selections and click NEXT.
- For Local Endpoint, enter an available and unused public IP address. The public IP address must also be allocated in IP Spaces Floating IPs.
- For Remote Endpoint, enter a public IP address from the remote side of the VPN. The address on the remote side of the VPN is called the Local IP Address. Leave the Remote ID field empty.
- For Virtual Tunnel Interfaces (VTI) Tunnel Interface, set the value to a
/30
or/31
network in the link-local ranges (169.254.0.0/16). Don't reuse the same tunnel interfaces. Consider the following examples.
Tunnel interface examples Local interface Remote interface 169.254.101.1/30 169.254.101.2/30 169.254.110.5/30 169.254.110.6/30 169.254.120.9/30 169.254.120.10/30 169.254.139.13/30 169.254.130.14/30 -
Review the settings for accuracy and click FINISH.
-
- From the Routing section in the left panel, click Static Routes.
- Click NEW and complete the following fields for the new static route.
- For the General tab, complete the following selections.
- For Name and Description, provide details that help to describe the static route.
- For Network, enter the remote network that the VPN is connecting with. For example,
192.168.47.0/24
. - Ensure that the Route Advertised field is toggled off.
- For the Next Hops tab, complete the following selections.
- For IP Address, enter the tunnel IP address of the remote tunnel. For example,
169.254.101.1
. - For Admin Distance, enter 1.
- For Scope, leave the field empty.
- For IP Address, enter the tunnel IP address of the remote tunnel. For example,
- Click SAVE.
- For the General tab, complete the following selections.
Creating a route-based IPsec VPN against the VDC provider gateway over the public internet for VCF as a Service
You can use the VMware Cloud Director tenant portal to autoconfigure a route-based IPsec VPN tunnel on a provider gateway. The configuration automatically creates an IPsec VPN tunnel, IP space uplink, and the associated BGP prefixes, maps, and neighbor in VMware Cloud Director. VMware Cloud Director uses IP spaces for defining the networks that are advertised through the IPsec VPN tunnel.
Any edge gateway egress NAT rules take precedence. For example, if the edge gateway has a SNAT egress rule to send target traffic to a different location than the IPsec tunnel, that rule takes precedence and traffic does not use the IPsec tunnel.
The following steps outline a validated process. Many different configurations work and depending on the remote side of the IPsec VPN tunnel, different configurations might be required.
Step 1: Creating an IP Space
- From the left panel of the tenant portal, click Networking.
- At the top of the right panel, select IP Spaces.
- Click New at the top of the IP Spaces table.
- For General, complete the following selections and click NEXT.
- For Name and Description, provide details that help to describe the VPN.
- For Network Topology, complete the following selections and click NEXT.
- Select Route Advertisement Allowed to enable.
- Keep the Default Autoconfiguration Rules disabled.
- For Scope, complete the following sections and click NEXT.
- For Internal Scope, enter the VDC network CIDR of the local VDC to share over the VPN. For example,
192.168.19.0/24
. - For External Scope, enter the CIDR of the remote network to share over the VPN. For example,
192.168.47.0/24
.
- For Internal Scope, enter the VDC network CIDR of the local VDC to share over the VPN. For example,
- For IP Ranges, complete the following sections and click NEXT. You can leave this field blank to share the complete network that is identified for internal scope or you can specify only to share a range in the internal scope.
- For IP Prefixes, complete the following sections and click NEXT. You can leave this field blank to share the complete network that is identified for internal scope or you can specify to share the IP range in the prefix identified.
- Review the settings for accuracy and click FINISH.
- For General, complete the following selections and click NEXT.
Step 2: Creating the Provider Gateway IPsec VPN
- From the left panel of the tenant portal, click Networking.
- At the top of the right panel, select Provider Gateways.
- Click the provider gateway that is associated with te VDC. If you have multiple VDCs, complete the following steps to identify the correct provider gateway.
- From the left panel of the tenant portal, click Data Centers.
- From the Virtual Data Center details page, click the VDC where you want to create a provider gateway IPsec VPN.
- From the left panel of the VDC, expand Networking and click Edges.
- Under Configuration on the Edge Gateway details page, click General. Locate the Provider Gateway name.
- From the Services section, select IPSec VPN.
- Above the IPSec VPN table, click AUTOCONFIGURE.
- For Name, enter a description for the VPN.
- For IP Space, select the previously created IP Space entry from the dropdown.
- For Remote Endpoint, enter a public IP address from the remote end of the VPN.
- For Local Endpoint, enter an available and unused public IP address from the VDC. The public IP address must be allocated in IP Spaces Floating IPs.
- For Pre-Shared Key, enter a secure value.
- For Local Tunnel Interface, it is recommended to use the default value. Both sides of the VPN tunnel must use different values. For example, the local side uses
192.168.200.1/30
and the remote side uses192.168.200.2/30
. - For Remote VTI Address, enter the IP address that is used in the other side of the VPN tunnel. In most cases, the default value is best. For example,
192.168.200.2
. - For BGP Neighbor Remote AS Number, enter a typical BGP number such as
65001
. You must provide different local and remote BGP numbers. - For BGP Neighbor Local AS Number, enter a typical BGP number such as
65002
. You must provide different local and remote BGP numbers.
- Review the settings for accuracy and click FINISH.
Creating a policy-based IPsec VPN against the VDC edge gateway over the public internet for VCF as a Service
The following steps outline a validated process. Many different configurations work and depending on the remote side of the IPsec tunnel, different configurations might be required.
Before you begin, ensure that any edge public egress rules don't use Any
for the Internal IP value. The rules must specify a CIDR of the internal VDC network that supports SNAT egress.
- From the left panel of the tenant portal, click Data Centers.
- From the Virtual Data Center details page, click the VDC where you want to create a policy-based IPsec VPN.
- From the left panel of the VDC, expand Networking and click Edges.
- From the Services section, click IPSec VPN.
- Click NEW and complete the following fields for the IPsec VPN tunnel.
- For General Settings, complete the following selections and click NEXT.
- For Name and Description, provide details that help to describe the VPN.
- For Type, select Policy Based.
- For Security Profile, use the default.
- For Status, toggle to enable.
- For Logging, toggle to disable.
- For Peer Authentication Mode, complete the following selections and click NEXT.
- For Authentication Mode, select Pre-Shared Key. You must also use this value on the other side of the VPN tunnel.
- For Pre-Shared Key, enter a secure value that is also used on the other side of the VPN tunnel.
- For Endpoint Configuration, complete the following selections and click NEXT.
- For Local Endpoint IP Address, enter an available and unused public IP address. The public IP address must also be allocated in IP Spaces Floating IPs.
- For Local Endpoint Networks, enter the VDC network CIDR of the local VDC to share over the VPN. For example,
192.168.19.0/24
. - For Remote Endpoint IP Address, enter a public IP address from the remote side of the VPN. The address on the remote side of the VPN is called the Local IP Address.
- For Remote Endpoint Networks, enter the VDC network CIDR of the remote VDC to share over the VPN. For example,
192.168.47.0/24
. - For Remote ID, leave the field empty.
- Review the settings for accuracy and click FINISH.
- For General Settings, complete the following selections and click NEXT.
Creating an L2 VPN against the VDC edge gateway over the public internet for VCF as a Service
The following steps outline a validated process. Many different configurations work and depending on the remote side of the L2 VPN, different configurations might be required.
Before you begin, ensure that any edge public egress rules don't use Any
for the Internal IP value. The rules must specify a CIDR of the internal VDC network that supports SNAT egress.
Procedure to configure the L2 VPN server
- From the left panel of the tenant portal, click Data Centers.
- From the Virtual Data Center details page, click the VDC where you want to create a L2 VPN.
- From the left panel of the VDC, expand Networking and click Edges.
- From the Services section, click L2 VPN.
- Click NEW and complete the following fields for the L2 VPN tunnel.
-
For Choose Session Mode, set the session mode to Server for the L2 VPN. You set the other side to Client in the procedure to configure the L2 VPN client.
-
For General Settings, complete the following selections and click NEXT.
- For Name and Description, provide details that help to describe the VPN.
- For Pre-Shared Key, enter a secure value.
- For State, toggle to enable.
-
For Endpoint Setup, complete the following selections.
- For Local Endpoint, enter a free and unused public IP address. The public IP address must be allocated in IP Spaces Floating IPs.
- For Tunnel Interface CIDR, set the value to a
/30
or/31
network in the link-local ranges (169.254.0.0/16). Don't reuse the same tunnel interfaces. Consider the following examples:- 169.254.101.1/30
- 169.254.110.5/30
- 169.254.120.9/30
- 169.254.139.13/30
- For Remote IP, enter a public IP address from the remote side of the VPN. The address on the remote side of the VPN is called the Local IP Address.
- For Initiation Mode select one of the three options (Initiator, Respond Only or On Demand) and click NEXT.
-
For Org VDC Networks, select the VDC network to participate in the L2 VPN and click NEXT.
Both ends of the L2 VPN must use the same network IP ranges with unique IP assignments to servers and VMs across both ends of the VPN. For example, the L2 VPN connects one end of the tunnel with a network that uses
192.168.50.10-192.168.50.100
to the other end with network that uses192.168.50.101-192.168.50.190
. -
Review the settings for accuracy and click FINISH.
-
Procedure to configure the L2 VPN client
- From the left panel of the tenant portal, click Data Centers.
- From the Virtual Data Center details page, click the VDC where you want to create the L2 VPN.
- From the left panel of the VDC, expand Networking and click Edges.
- From the Services section, click L2 VPN.
- Click NEW and complete the following fields for the L2 VPN tunnel.
-
For Choose Session Mode, set the session mode to Client for the L2 VPN. The other side is Server.
-
For General Settings, complete the following selections and click NEXT.
- For Name and Description, provide details that help to describe the VPN.
- For Peer Code, use the value from the server side of the L2 VPN. If the server side is a Director VDC, complete the following steps from the VDC that is the server-side of the L2 VPN.
- From the left panel of the VDC, expand Networking and click Edges.
- From the Services section, select L2 VPN and select the L2 VPN Server from the list.
- Above the table, click Copy peer code.
- Paste the peer code value in the client L2 VPN Peer Code input* field.
- For State, toggle to enable.
-
For Endpoint Setup, complete the following selections and click NEXT.
- For Local Endpoint, enter an available and unused public IP address. The IP address is the same address that is used in the L2 VPN server config as the Remote IP. The IP address must also be allocated in IP Spaces Floating IPs.
- For Remote IP, enter a public IP address from the remote side of the L2 VPN. The address on the Server side of the VPN is called the Local IP Address.
-
For Org VDC Networks, complete the following selections and click NEXT.
- Select the VDC network to extend over the L2 VPN.
Both ends of the L2 VPN must use the same network IP ranges with unique IP assignments to servers and VMs across both ends of the VPN. For example, the L2 VPN connects one end of the tunnel with a network that uses
192.168.50.10-192.168.50.100
to the other end with network that uses192.168.50.101-192.168.50.190
.- For Tunnel ID, use incrementing numbers for each L2 VPN tunnel. For the first tunnel, use
1
. For the second tunnel, use2
and so on.
-
Review the settings for accuracy and click FINISH.
-
Accessing Operations Manager
The Operations Manager service is enabled by default. From the VMware Cloud Director tenant portal, click More > Operations Manager to access the Operations Manager web UI.
Use Operations Manager to view VDC, vApp, and VM level metrics and to export metric data. You can use this data to isolate resource usage and to help understand billing charges.
For more information about using Operations Manager, see Using VMware Chargeback as a Tenant.