Using and Managing Vrealize Automation Cloud Assembly
Using and Managing Vrealize Automation Cloud Assembly
14 July 2021
vRealize Automation 8.4
Using and Managing vRealize Automation Cloud Assembly
You can find the most up-to-date technical documentation on the VMware website at:
https://docs.vmware.com/
VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com
©
Copyright 2021 VMware, Inc. All rights reserved. Copyright and trademark information.
VMware, Inc. 2
Contents
2 Tutorials 11
Setting up and testing vSphere infrastructure and deployments 13
Configuring and provisioning a production workload 31
Using tags to manage vSphere resources 38
Adding a cloud template to the vRealize Automation Service Broker catalog with a custom
request form 48
Multi-cloud infrastructure and deployments 59
Part 1: Configure the example infrastructure 59
Part 2: Create the example project 65
Part 3: Design and deploy the example cloud template 66
Configuring VMware Cloud on AWS 83
Configure a basic VMware Cloud on AWS workflow 83
Configure an isolated network in VMware Cloud on AWS 96
Configuring an external IPAM integration for Infoblox 100
Add required extensible attributes in the Infoblox application before deploying the download
package 102
Download and deploy an external IPAM provider package 103
Create a running environment for an IPAM integration point 105
Add an external IPAM integration for Infoblox 106
Configure a network and network profile to use external IPAM for an existing network 110
Define and deploy a cloud template that uses an external IPAM provider range assignment
112
Using Infloblox-specific properties for IPAM integrations in cloud templates 115
Control network data collection by using Infoblox filters 119
VMware, Inc. 3
Using and Managing vRealize Automation Cloud Assembly
VMware, Inc. 4
Using and Managing vRealize Automation Cloud Assembly
How do I configure a network profile to support an on-demand network for an external IPAM
integration 298
How do I configure a network profile to support an existing network for an external IPAM
integration 301
How to add storage profiles 301
Learn more about storage profiles 301
How do I use pricing cards 305
How to create pricing cards for vSphere and VMC 307
How to use tags 311
Creating a tagging strategy 313
Using capability tags in vRealize Automation Cloud Assembly 315
Using constraint tags in vRealize Automation Cloud Assembly 316
Standard tags 318
How vRealize Automation Cloud Assembly processes tags 319
How do I set up a simple tagging structure 319
How to work with resources 321
Compute resources 321
Network resources 321
Security resources 324
Storage resources 326
Machine resources 326
Volume resources 327
Learn more about resources 327
Configuring Multi-provider tenant resources with vRealize Automation 347
How do I create a Virtual Private Zone for vRealize Automation 348
Manage Virtual Private Zone configuration for vRealize Automation tenants 351
Create global image and flavor mapping for vRealize Automation tenants 353
Configure tenant specific image and flavor mappings for vRealize Automation 356
Create extensibility subscriptions for providers or tenants 357
Working with legacy Virtual Private Zones in newer versions of vRealize Automation 358
VMware, Inc. 5
Using and Managing vRealize Automation Cloud Assembly
VMware, Inc. 6
What is vRealize Automation
Cloud Assembly 1
You use vRealize Automation Cloud Assembly to connect to your public and private cloud
providers so that you can deploy machines, applications, and services that you create to
those resources. You and your teams develop cloud-templates-as-code in an environment that
supports an iterative workflow, from development to testing to production. At provisioning time,
you can deploy across a range of cloud vendors. The service is a managed VMware SaaS and
NaaS-based framework.
An overview of vRealize Automation Cloud Assembly includes the following basic functions.
n The Infrastructure tab is where you add and organize your cloud vendor resources and users.
This tab also provides information about deployed cloud templates.
n The Design tab is your development home. You use the canvas and the YAML editor to
develop and then deploy your machines and applications.
n The Marketplace tab provides VMware Solution Exchange cloud templates and images that
help you build your template library and access supporting OVA or OVFs.
n The Extensibility tab is where you can extend and automate your application life cycles. You
can subscribe to events that are used to trigger extensibility actions or vRealize Orchestrator
workflows.
n The Deployments tab shows the current status of your provisioned resources. You can
access details and history that you use to manage your deployments.
n The Tenant Management tab shows the different tenants that you configured if you are a
service provider and enables you allocate or de-allocate virtual private zones.
VMware, Inc. 7
Using and Managing vRealize Automation Cloud Assembly
As a Cloud Assembly administrator, generally referred to as a cloud administrator, you set up the
provisioning infrastructure and create the projects that group users and resources.
n Add your cloud vendor accounts. See Adding cloud accounts to vRealize Automation Cloud
Assembly.
n Determine which regions or datastores are the cloud zones that you want your developers
deploying to. See Learn more about vRealize Automation Cloud Assembly cloud zones.
n Create policies that define the cloud zones. See Chapter 4 Building your vRealize Automation
Cloud Assembly resource infrastructure.
VMware, Inc. 8
Using and Managing vRealize Automation Cloud Assembly
n Create projects that group the developers with the cloud zones. See Using vRealize
Automation Cloud Assembly project tags and custom properties .
As a cloud template developer, you are a member of one or more projects. You create and
deploy templates to the cloud zones associated with one of your projects.
n Develop cloud templates for projects using the canvas. Your project administrator can use
the marketplace to download templates and supporting images from the VMware Solution
Exchange. See Chapter 6 Designing your vRealize Automation Cloud Assembly deployments
and How to use the vRealize Automation Cloud Assembly Marketplace .
n Deploy your cloud templates to project cloud zones based on policies and constraints.
n Manage your deployments, including deleting unused applications. See Chapter 7 Managing
vRealize Automation Cloud Assembly deployments.
Welcome to vRealize Automation Cloud Assembly. If you want an example of how to define the
infrastructure, and then create an deploy a cloud template, see Tutorial: Setting up and testing
multi-cloud infrastructure and deployments in vRealize Automation Cloud Assembly.
VMware, Inc. 9
Using and Managing vRealize Automation Cloud Assembly
Cloud Assembly
Infrastructure
Your cloud
provisioning infrastructure
Cloud Accounts
Region 1 and 2
Projects
Project 1 – Project 2 –
Customer-facing Internal human
e-commerce resources tool
application team team
Project Project
Members Members
Deployed to matching
cloud zones based on
mappings and profiles
Project 1 Project 2
Cloud Templates cloud zone cloud zone
Zones and other Zones and other regions regions
E-commerce Human configurations configurations
application resources tool Deployments
E-commerce application
deployment – Development
VMware, Inc. 10
Cloud Assembly Tutorials
2
The tutorials show you how to perform common tasks that help you become proficient with
vRealize Automation Cloud Assembly.
As you begin, a reminder that in addition to the steps in the tutorials, there is additional
information in this guide. Links are provided to relevant topics.
VMware, Inc. 11
Using and Managing vRealize Automation Cloud Assembly
n Tutorial: Using tags in vRealize Automation Cloud Assembly to manage vSphere resources
n Tutorial: Adding a vRealize Automation Cloud Assembly cloud template to the vRealize
Automation Service Broker catalog with a custom request form
VMware, Inc. 12
Using and Managing vRealize Automation Cloud Assembly
Although this tutorial is just the beginning, you are on the path to delivering self-service
automation and iterative development that works across multiple public and private clouds. This
tutorial focuses on VMware vCenter Server and NSX-T. After you finish this workflow, you can
apply what you've learned to add more types of cloud accounts and deliver more sophisticated
cloud templates.
As you work your way through the steps, we provide data examples. Replace the examples with
values that work in your environment.
You perform all the steps in this tutorial in vRealize Automation Cloud Assembly.
This configuration process is the foundation of your Cloud Assembly development experience.
As you build your infrastructure and mature your cloud template development skills, you will
repeat and expand on this workflow.
n If you have not used the VMware vCenter Server or the VMware Cloud Foundation Quickstart
wizards in the vRealize Automation console, you can do so now.
These wizard-driven workflows include most but not all of the configuration in this tutorial.
This tutorial is a hands-on experience that adds to your understanding of how to put together
a working infrastructure and deploy a workload.
n If you have not yet used the guided setup that is available in vRealize Automation Cloud
Assembly, you can do it now. The guided setup takes you through most but not all of the
procedures that you do in this tutorial. To open the guided setup, click Guided Setup on the
right side of the tab bar.
n Ensure that you have vCenter Server and NSX credentials. For more information about the
permissions that the credentials must have, see Credentials required for working with cloud
accounts in vRealize Automation. If you plan to add additional users to projects, verify that
they are members of the vRealize Automation Cloud Assembly service.
VMware, Inc. 13
Using and Managing vRealize Automation Cloud Assembly
The vCenter Server cloud account provides the vCenter credentials that vRealize Automation
Cloud Assembly uses to discover resources and deploy cloud templates.
For additional information about vCenter Server cloud accounts, see Create a vCenter cloud
account in vRealize Automation.
VMware, Inc. 14
Using and Managing vRealize Automation Cloud Assembly
Remember that these values are only examples. Your values will be specific to your
environment.
f Skip the NSX cloud account. We'll configure that later, linking the vCenter Server account
to the NSX cloud account.
g Click Add.
The NSX-T cloud account provides the NSX-T credentials that vRealize Automation Cloud
Assembly uses to discover network resources and deploy networks with cloud templates.
For more information about NSX-T cloud accounts, see Create a vCenter cloud account in
vRealize Automation.
b Click Add Cloud Account and select either NSX-T or NSX-V. This tutorial uses NSX-T.
VMware, Inc. 15
Using and Managing vRealize Automation Cloud Assembly
These values are only examples. Your values will be specific to your environment.
e To associate the vCenter cloud account you created in the previous step, click Add and
then select the vCenter Account.
VMware, Inc. 16
Using and Managing vRealize Automation Cloud Assembly
Account/regions are how cloud vendors tie resources to isolated regions or datastores. The
account indicates the cloud account type and the region indicates the region or datastore.
vCenter Server uses datastores and the provisioning resources are the selected clusters and
resource pools.
For this tutorial, you must ensure that the cloud zones include the resources that support the
goals of the project development team, and your budget and management requirements.
For more information about cloud zones, see Learn more about vRealize Automation Cloud
Assembly cloud zones.
2 Click the cloud zone that was added for your vCenter Server instance and enter the values.
VMware, Inc. 17
Using and Managing vRealize Automation Cloud Assembly
Policy Default
Don't forget to consult the help if you have questions
about a field value.
Remember that all values are only examples. Your zone specifics will be specific to your
environment.
3 Click the Compute tab and verify that the compute resources are all present.
If you need to exclude one, switch to Manually select compute and add only the ones you
want to include in the cloud zone.
VMware, Inc. 18
Using and Managing vRealize Automation Cloud Assembly
4 Click Save.
5 Repeat the process for any additional cloud zones, but you must ensure unique zone names.
Step 3: Configure the possible resources that are available for the
account/region
You added the account/region to the cloud zone. Now you define the possible machine sizes
(flavor mappings), image mappings, network profiles, and storage profiles for the cloud account.
The mapping and profile definitions are evaluated for a match when you deploy a cloud
template, ensuring that the workload includes the appropriate machine size (flavor), image,
networks, and storage.
Flavors are sometimes referred to as t-shirt sizing. Depending on how your cloud template is
configured, the applied flavor mapping determines the number of CPUs and memory.
For more information about flavor mappings, see Learn more about flavor mappings in
vRealize Automation.
b Click New Flavor Mapping and enter values that define small, medium, and large
machines.
Remember, these are sample values. You must select relevant account/regions and
define the sizing.
VMware, Inc. 19
Using and Managing vRealize Automation Cloud Assembly
c Click Create.
d To create additional sizes, configure medium and large flavor mappings for the account/
region.
The images are the operating system for machines in the cloud template. When you are
working with vCenter Server images, you select vCenter templates.
For more information about image mappings, see Learn more about image mappings in
vRealize Automation.
b Click New Image Mapping and search for the images for the account/region.
Remember, these are sample values. You must select relevant images that were
discovered in your account/region.
VMware, Inc. 20
Using and Managing vRealize Automation Cloud Assembly
Image centos7
c Click Create.
d Repeat the process to create additional image mappings. For example, an ubuntu
mapping for the account/region.
Network profiles define the networks and network settings that are available for an account/
region. The profiles must support the target deployment environments.
This task provides the minimum configuration information for success. If you want more
information about network profiles, start with Learn more about network profiles in vRealize
Automation.
b Click New Network Profile and create a profile for the vCenter Account / Datacenter
account/region.
VMware, Inc. 21
Using and Managing vRealize Automation Cloud Assembly
d Select the NSX networks that you want to make available for the application development
team.
VMware, Inc. 22
Using and Managing vRealize Automation Cloud Assembly
f Click Create.
Storage profiles define the disks for an account/region. The profiles must support the target
deployment environments.
If you want more information about storage profiles, see with Learn more about storage
profiles in vRealize Automation .
b Click New Storage Profile and create a profile for the vCenter Server/Datacenter
account/region.
VMware, Inc. 23
Using and Managing vRealize Automation Cloud Assembly
c Click Create.
n What users need access to the compute resources so that they can create and deploy an
application cloud template? For more information about what the different project roles can
see and do, see Organization and service user roles in vRealize Automation.
n Will the members of the project be creating applications that go from development to
production? What are the necessary resources?
n What cloud zones do they need? What priority and limits should be placed on each zone for
the project?
For this tutorial, we are going to support the Development team as they create and extend an
in-house software application.
VMware, Inc. 24
Using and Managing vRealize Automation Cloud Assembly
This task provides the minimum configuration information for success. If you want more
information about projects, start with Learn more about vRealize Automation Cloud Assembly
projects.
You are not required to add users at the time. But if you want other users to work with cloud
templates, they must be a member of the project.
6 Add the cloud zones that the users can deploy to.
You can also set resource limits for the cloud zone in the project. In the future, you can set
different limits for other projects.
Provisioning priority 1
Instance limit 5
8 Click Create.
VMware, Inc. 25
Using and Managing vRealize Automation Cloud Assembly
9 To verify that the project was added to the cloud zone, select Infrastructure > Configure >
Cloud Zones and open the vCenter Account Zone cloud Zone card so that you can examine
the Projects tab. You should see the Development Project.
The best way to build a cloud template is component-by-component, verifying that it deploys
between each change. This tutorial starts with a simple machine and then iteratively adds more
resources.
The examples in this procedure use the YAML code editor. It is an easier way of providing you
with code snippets. However, if you prefer a use dialog box-driven user interface, click Inputs.
There is so much more that you can do with cloud templates than is provided in this tutorial.
If you want more information, start with Chapter 6 Designing your vRealize Automation Cloud
Assembly deployments.
This tutorial uses vSphere and NSX resource types. These resource types can be deployed only
on vCenter Server cloud account endpoints. You can also use the cloud agnostic resource types
to create cloud templates that can be deployed on any endpoint. For an example of how to
configure the infrastructure and design the template for any endpoint, see Tutorial: Setting up
and testing multi-cloud infrastructure and deployments in vRealize Automation Cloud Assembly.
For a video that illustrates the basic steps in this procedure, see How to design and deploy
a basic cloud template.
3 Enter the Name Development Template, select the Project Development Project, and click
Create.
VMware, Inc. 26
Using and Managing vRealize Automation Cloud Assembly
a From the resource type pane, drag a vSphere Machine to the canvas.
Notice that the Code pane shows the YAML for the machine, with and empty value for
image and predefined CPU and memory properties. You are going to make this template
able so support flexible sizing.
b To select an image value, put your pointer between the single quotes for image and select
centos from the list of images that you configured.
Remember, these are sample values. If you did not configure a centos image, select an
image that you did configure.
c Create a line below the image property and enter or select flavor, then select the small
from the list.
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: small
e Click Test.
Test allows you to validate the syntax and placement of your cloud template. A
successful test does not mean that you can deploy the template without errors.
VMware, Inc. 27
Using and Managing vRealize Automation Cloud Assembly
If the test fails, click Provisioning Diagram and look for the failure points. For more
information about using the diagram to troubleshoot, see Test a basic cloud template.
f Click Deploy.
You can track the progress of the deployment on the DevTemplate deployment details
page or on the Deployments tab.
If the deployment fails, you can troubleshoot the problem and revise your template. See
What can I do if a vRealize Automation Cloud Assembly deployment fails.
Versioning a cloud template is required to make it available in the Service Broker catalog, but
it is useful to have a good version to revert to during development.
b Click Version, enter a Description similar to Simple deployable machine, and click
Create.
c From the resource type pane, drag an NSX Network resource type to the canvas.
Click the small circle on the machine component and drag the connection to the network.
VMware, Inc. 28
Using and Managing vRealize Automation Cloud Assembly
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: small
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks: []
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
f Click Deploy.
c From the resource type pane, drag an vSphere Disk resource type to the canvas.
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
Cloud_vSphere_Machine_1:
VMware, Inc. 29
Using and Managing vRealize Automation Cloud Assembly
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: small
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
f Deploy the template using the name DevTemplate - machine - network - storage.
Enter Machine with existing network and storage disk as the description.
This final version ensures that you can add a working template to the Service Catalog.
Tutorial results
You completed the workflow that configured Cloud Assembly as a working system. You are now
familiar with the following concepts.
n Cloud accounts are the credentials that connect vRealize Automation Cloud Assembly to your
cloud vendor endpoints.
n Cloud zones are the selected compute resources in account/regions that you then assign to
different projects based on the project needs and your goals for managing costs.
n Infrastructure resources are definitions of resources associated with account/regions that are
used in cloud templates.
n Projects are how you give your users access to the cloud zones based on the project's
application development goals.
n Cloud templates are the definitions of your application workloads that you iteratively develop
and deploy.
This tutorial is the foundation of your vRealize Automation Cloud Assembly development
experience. You can use this process to build your infrastructure and mature your cloud template
development skills.
VMware, Inc. 30
Using and Managing vRealize Automation Cloud Assembly
By automating the process for the project deployments, you can more easily manage multiple
projects across various data centers and cloud environments.
You are not required to complete all of the tasks provided here. You can mix and match any of
these tasks, depending on your management goals.
n You successfully performed all of the steps specified in the infrastructure tutorial. See
Tutorial: Setting up and testing vSphere infrastructure and deployments in vRealize
Automation Cloud Assembly.
n You have the Cloud Assembly Administrator role. See Organization and service user roles in
vRealize Automation.
For more about projects, see Chapter 5 Adding and managing vRealize Automation Cloud
Assembly projects.
For a video that illustrates this custom naming example, see How to create a custom
naming template for deployments.
3 Click Create.
4 On the Projects page, click the project name on the tile so that you can configure the project.
VMware, Inc. 31
Using and Managing vRealize Automation Cloud Assembly
5 Click the Users tab and add the users who are members of this project.
a In the Zones section, click Add Zone and add the possible cloud zones where the
workloads are deployed for this project.
b In the Custom Properties section, add a custom property with the name costCenter and
the value DevProject.
${resource.costCenter}-${resource.installedOS}-${###}
The ${resource.installedOS} is based on the operating system selected when you deploy
the cloud template.
7 Click Save.
8 Update the cloud template with an input value for the operating system type.
Input values are the direct way that you can customize the deployment request form for
users and simplify your development process. By creating input values, you can use a
single cloud template to deploy workloads with different configurations. For example, size
or operating system.
This example uses the Development Template from a previous tutorial. See Step 5: Design
and deploy a basic cloud template.
b In the Code pane, update the YAML with the following changes.
In the next step you can see that installedOS input is also used to specify the image.
When you add the strings in the enum section, the values, in this example they are
centos and ubuntu, must match the image names that you defined in Infrastructure >
Configure > Image Mappings. For example, if your image mapping name is CentOS
rather than centos, you should use CentOS in the inputs section.
inputs:
installedOS:
type: string
title: OS Type
VMware, Inc. 32
Using and Managing vRealize Automation Cloud Assembly
resources:
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: ${input.installedOS}
installedOS: ${input.installedOS}
flavor: small
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
c Click Deploy and enter the name Custom name deployment test.
d Click Next.
f Click Deploy.
The machine name in this example is DevProject-centos-026. Just a reminder, this example is
based on the tutorial referenced at the beginning of this task.
VMware, Inc. 33
Using and Managing vRealize Automation Cloud Assembly
These steps cover the basic Active Directory configuration that is related to this AD
machine records tutorial. For more about the Active Directory integration, see How do I
create an Active Directory integration in vRealize Automation Cloud Assembly.
c Enter the name that you are using for this integration.
VMware, Inc. 34
Using and Managing vRealize Automation Cloud Assembly
f Click Add.
3 In the Active Directory integration, click the Projects tab and click Add Project.
This procedure is focused on automating the process for a project. It is not about
customizations that you can do in templates.
d Click Add.
5 Deploy a cloud template for the project and verify that the machine added to the correct
Active Directory OU.
You must have already created a cloud account for vSphere, NSX-V, or NSX-T. See Tutorial:
Setting up and testing vSphere infrastructure and deployments in vRealize Automation Cloud
Assembly or Adding cloud accounts to vRealize Automation Cloud Assembly.
VMware, Inc. 35
Using and Managing vRealize Automation Cloud Assembly
4 Add networks.
d Click Add.
a In the networks list on the Networks tab, click the network name.
b Enter the DNS server IP addresses you want this network to use.
c Click Save.
a In the networks list, select the check box next to the network name.
VMware, Inc. 36
Using and Managing vRealize Automation Cloud Assembly
d Enter a name.
VMware, Inc. 37
Using and Managing vRealize Automation Cloud Assembly
e To define the range, enter the Start IP address and End IP address.
f Click Add.
7 Add the cloud zone containing the associated network account/region that you configured to
your Development project.
8 Deploy a cloud template for the project and verify that the machine is provisioned within the
specified IP range.
You can use of tags to control deployments based on resource capabilities. For example,
as a cloud administrator you want the iteratively developed cloud templates to deploy to
a development-specific resource pool and the production worthy templates to deploy to a
different resource pool.
n Constraint tags are used in cloud templates, defining what resources you want the
deployed resources to consume.
n Label tags
To manage resources, you can add tags as object labels or descriptions. The management
possibilities include better resources searching results, differentiating between similar objects,
annotating objects with custom information, providing information to third-party systems,
creating security grouping membership criteria, ensuring consistency across linked SDDC
domains.
VMware, Inc. 38
Using and Managing vRealize Automation Cloud Assembly
For an example of how to use the same tags to define placement in a multi-cloud environment,
see Tutorial: Setting up and testing multi-cloud infrastructure and deployments in vRealize
Automation Cloud Assembly.
c Locate and click the resource pool that you want to deploy development workloads to.
This tutorial uses the following sample values. Remember that these values are only
examples. Your values will be specific to your environment.
VMware, Inc. 39
Using and Managing vRealize Automation Cloud Assembly
e Repeat the process for the resource pool that you want to deploy production workloads
to and add the env:prod tag.
2 Verify that the capability tags were added to the resource pools in your cloud zone.
b Open the cloud zone associated with the project and click Compute.
In this example, the cloud zone is vCenter Account Cloud Zone and the tags were added
to the two resource pools, wid01-clu01 / Development and wid01-clu01 / Production.
a Select Design > Cloud Templates and then open your template.
VMware, Inc. 40
Using and Managing vRealize Automation Cloud Assembly
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: medium
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 5
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: medium
constraints:
- tag: '${input.placement}'
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
inputs:
placement:
type: string
enum:
- env:dev
- env:prod
default: env:dev
title: Select Placement for Deployment
description: Target Environment
VMware, Inc. 41
Using and Managing vRealize Automation Cloud Assembly
e Verify that the final YAML looks similar to the following example.
formatVersion: 1
inputs:
placement:
type: string
enum:
- 'env:dev'
- 'env:prod'
default: 'env:dev'
title: Select Placement for Deployment
description: Target Environment
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: small
constraints:
- tag: '${input.placement}'
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 5
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
f To try out the tag variable against the available resources, click Test and then select
env:dev.
Repeat the test using env:prod. When both tests are successful, confirm that the
template works by deploying it.
b Enter Deployment Tag Dev as the Deployment Name and click Next.
VMware, Inc. 42
Using and Managing vRealize Automation Cloud Assembly
c Select env:dev in the Select Placement for Deployment drop-down menu and click
Deploy.
5 Verify that the template deployed the resources to the selected resource pool.
c Click the vSphere machine and expand the machine information in the right pane.
d In the General section, locate Compute host and verify that the value matches the
resource pool that matches your env:dev tag.
In this example, the value is wid01-clu01 / Development, illustrating that the workload was
deployed to correct resource pool based on the selected constraint tag.
Adding tags as labels that you can use in vCenter Server and NSX-T
You can add tags to deployments that you can then use to manage resources.
In this example, you add tags to identify the MySQL machine and network. You also add a tag to
identify the web network. Due to how tags work on existing networks compared to on-demand
networks, you have two choices.
n If you use the existing network profile that you used in the previous section, the NGINX:web
tag is not added to existing objects in NSX-T. So you can ignore the verification steps
regarding this tag in NSX-T.
n If you create an on-demand network profile, you can update the network in the YAML to use
the routed/on-demand network. The on-demand network is used in this example so that we
can demonstrate the NGINX:web tag on the new object in NSX-T.
The following YAML is from the previous example except that it uses a routed on-demand
networkType. It includes the constraint tags.
This tutorial uses the following sample values. Remember that these values are only examples.
Your values will be specific to your environment.
formatVersion: 1
inputs:
placement:
VMware, Inc. 43
Using and Managing vRealize Automation Cloud Assembly
type: string
enum:
- 'env:dev'
- 'env:prod'
default: 'env:dev'
title: Select Placement for Deployment
description: Target Environment
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: small
constraints:
- tag: '${input.placement}'
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 5
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: routed
constraints:
- tag: 'net:od'
1 Select Design > Cloud Templates and then open your template.
tags:
- key: db
value: mysql
tags:
- key: db
value: mysql
tags:
- key: NGINX
value: web
VMware, Inc. 44
Using and Managing vRealize Automation Cloud Assembly
formatVersion: 1
inputs:
placement:
type: string
enum:
- 'env:dev'
- 'env:prod'
default: 'env:dev'
title: Select Placement for Deployment
description: Target Environment
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
flavor: small
constraints:
- tag: '${input.placement}'
tags:
- key: db
value: mysql
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
tags:
- key: db
value: mysql
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 5
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: routed
constraints:
- tag: 'net:od'
tags:
- key: NGINX
value: web
7 To verify the tags in the deployment, open the deployment and click the Topology tab.
b Expand the General section for the machine and locate the Tags label.
VMware, Inc. 45
Using and Managing vRealize Automation Cloud Assembly
c Expend the Network section and locate the network Tags column.
d Click the network in the topology and expand the General section to locate the Tag label.
8 To verify the tags in vCenter Server, log in to the vCenter Server instance where this
workload was deployed.
VMware, Inc. 46
Using and Managing vRealize Automation Cloud Assembly
9 To verify the tags in NSX-T, log in to the NSX-T instance where this network is configured.
b To locate the db:mysql tag associated with the NIC, search for mysql.
e To locate the NGINX:web tag associated with segment, search for the network.
f Locate the Segments row and click the number in the tags column.
VMware, Inc. 47
Using and Managing vRealize Automation Cloud Assembly
What to do first
n Verify that you have the infrastructure that supports the your template. If you do not, start
with Tutorial: Setting up and testing vSphere infrastructure and deployments in vRealize
Automation Cloud Assembly and continue with the other tutorials.
n Verify that you tagged some resource pools as env:dev and env:prod. For more information,
see Tutorial: Using tags in vRealize Automation Cloud Assembly to manage vSphere
resources.
n Ensure that you have a deployable cloud template, similar to the one below. This tutorial
starts with the following template.
formatVersion: 1
inputs:
installedOS:
type: string
title: Operating System
description: Select the operating system.
enum:
- centos
- ubuntu
placement:
type: string
enum:
- 'env:dev'
- 'env:prod'
default: 'env:dev'
title: Select Placement for Deployment
VMware, Inc. 48
Using and Managing vRealize Automation Cloud Assembly
1 In vRealize Automation Cloud Assembly, select Design > Cloud Template and create or open
the template provided above.
The sample template is used to explain the different options and includes sample values.
Adapt it to your environment.
2 Add the size variable and define the sizes in the Inputs section.
flavor: '${input.size}'
VMware, Inc. 49
Using and Managing vRealize Automation Cloud Assembly
b In the Inputs section, add a user input name size so that the user can select the size of
the deployment. This is sometimes referred to as the t-shirt size that you defined for the
cloud zones.
size:
type: string
title: Deployment size
description: Select the the deployment t-shirt size.
enum:
- small
- medium
- large
3 Update placement inputs with a descriptive term rather than the tag strings.
These constraint tags will be matched with the capability tags that you added in Tutorial:
Using tags in vRealize Automation Cloud Assembly to manage vSphere resources.
a In the Inputs section, add a user input named placement so that the user can select
development or production as the deployment placement.
This example uses the oneOf attribute, which allows you to present a natural language
label while still submitting strings that the deployment process requires. For example, the
env:dev and env:prod tags.
placement:
type: string
oneOf:
- title: Development
const: 'env:dev'
- title: Production
const: 'env:prod'
default: 'env:dev'
title: Select Deployment Placement
description: Target Environment
4 Review the full YAML to ensure that it looks similar to the following example.
formatVersion: 1
inputs:
installedOS:
type: string
title: Operating system
description: Select the operating system.
enum:
- centos
- ubuntu
placement:
type: string
oneOf:
- title: Development
VMware, Inc. 50
Using and Managing vRealize Automation Cloud Assembly
const: 'env:dev'
- title: Production
const: 'env:prod'
default: 'env:dev'
title: Select Deployment Placement
description: Target Environment
size:
type: string
title: Deployment size
description: Select the the deployment t-shirt size.
enum:
- small
- medium
- large
resources:
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: '${input.installedOS}'
installedOS: '${input.installedOS}'
flavor: '${input.size}'
constraints:
- tag: '${input.placement}'
tags:
- key: db
value: mysql
networks:
- network: '${resource.Cloud_NSX_Network_1.id}'
tags:
- key: db
value: mysql
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
tags:
- key: NGINX
value: web
5 Click Deploy, verify that the second page of the request looks similar to the following
example, and then you can verify that the deployment is in the selected development of
production resource pool after deployment.
VMware, Inc. 51
Using and Managing vRealize Automation Cloud Assembly
1 Select Design > Cloud Template and open the template in the design canvas.
Releasing the cloud template does not automatically add it to vRealize Automation Service
Broker. Releasing it makes is discoverable so the you can add it to the catalog.
VMware, Inc. 52
Using and Managing vRealize Automation Cloud Assembly
Before you can add the template as a catalog item, you must import it into vRealize Automation
Service Broker. You can only import released cloud templates.
1 To open vRealize Automation Service Broker from vRealize Automation Cloud Assembly, click
the applications menu in the upper right corner.
a In vRealize Automation Service Broker, select Content and Policies > Content Sources.
c Enter a Name.
d For the Project, select the Development Project that you created in vRealize Automation
Cloud Assembly.
e Click Validate.
VMware, Inc. 53
Using and Managing vRealize Automation Cloud Assembly
d In the Share Items dialog box, select Cloud Assembly DevProject and click Save.
5 To verify that the Development Template was added to the catalog, click Catalog.
Notice that the inputs that you saw on the cloud template are provided here. The next step is
to customize the request form.
1 To create a custom form in vRealize Automation Service Broker, select Content and Policies
> Content.
2 Click the vertical ellipsis to the left of the Development Template entry and click Customize
form.
a In the canvas, click fields in the canvas and configure the Properties as specified in the
following table.
VMware, Inc. 54
Using and Managing vRealize Automation Cloud Assembly
c Click Save.
4 To ensure the correct results by submitting at least a Development Small and a Production
request, test the form in the catalog.
VMware, Inc. 55
Using and Managing vRealize Automation Cloud Assembly
a Test the Development Small request form by providing a name, Test small in this
example, and selecting CentOS, Development, and Small for the options.
b To verify the Development Small deployment, Select Deployments > Deployments and
click the Test small deployment.
c On the Topology tab, click the Cloud_vSphere_Machine, and then locate the Custom
Properties section in the right pane.
d Test the Production request form by entering a name, Test large in this example, and
select CentOS and Production for the options.
Remember, you configured the form to neither display nor require the user to select the
size.
VMware, Inc. 56
Using and Managing vRealize Automation Cloud Assembly
e To verify the Production deployment, select Deployments > Deployments and click the
Test large deployment.
f On the Topology tab, click the Cloud_vSphere_Machine, and then locate the Custom
Properties section in the right pane.
VMware, Inc. 57
Using and Managing vRealize Automation Cloud Assembly
In step 2, you versioned and released a template, so you are familiar with the process. In step
3, you added it to the catalog. The procedure ties the two steps together as you do iterative
development and update the catalog with the latest version.
You do have the option to make multiple versions available in the catalog.
1 In vRealize Automation Cloud Assembly, version the template that you now want to make
available in the catalog.
a Select Design > Cloud Template and open the template in the design canvas.
c Locate the version that you want to add to the catalog and click Version.
d Enter a Description, select the Release check box, and click Create.
At this point, you have the option to keep the old version in the catalog. If you want
multiple versions, ignore the next step where you Unrelease a version.
e To make only one version of the template available in the catalog, review the version
history list and click Unrelease on every version that you don't want in the catalog.
2 To update the vRealize Automation Service Broker catalog with the latest version, and to
replace any old version, you must collect the new version.
a In vRealize Automation Service Broker, select Content and Policies > Content Sources.
b Click the Cloud Assembly DevProject content source that is used in this tutorial.
c Click Validate.
c At the top of the request form, click the Version and verify the version or versions.
VMware, Inc. 58
Using and Managing vRealize Automation Cloud Assembly
In this example, the application is a WordPress site. Look at the sequential setup to understand
the process that brings the entire design to completion.
Remember that the names and values you see are only examples. You won't be able to use them
letter-by-letter in your own environment.
To fit your own cloud infrastructure and deployment needs, consider where you would make
your own substitutions for the example values.
The infrastructure includes cloud targets, and definitions around the available machines,
networks, and storage that the WordPress site will need.
Procedure
2 Click Add Cloud Account, select Amazon Web Services, and enter values.
Name OurCo-AWS
Description WordPress
Remember that all values are only examples. Your account specifics will vary.
4 Click Add.
VMware, Inc. 59
Using and Managing vRealize Automation Cloud Assembly
5 Edit the newly added account Configuration, and allow provisioning to us-east-1 and us-
west-2 regions.
6 Click Add Cloud Account, select Microsoft Azure, and enter values.
Subscription ID ef2avpf-dfdv-zxlugui1i-g4h0-i8ep2jwp4c9arbfe
Tenant ID dso9wv3-4zgc-5nrcy5h3m-4skf-nnovp40wfxsro22r
Name OurCo-Azure
Description WordPress
8 Click Add.
9 Edit the newly added account Configuration, and allow provisioning to the East US region.
Cloud zones are the resources onto which the project will deploy the machines, networks, and
storage to support the WordPress site.
Procedure
2 Click New Cloud Zone, and enter values for the development environment.
Name OurCo-AWS-US-East
Description WordPress
Remember that all values are only examples. Your zone specifics will vary.
3 Click Compute, and verify that the zones you expect are there.
4 Click Create.
VMware, Inc. 60
Using and Managing vRealize Automation Cloud Assembly
5 Repeat the process twice, with values for the test and production environments.
Name OurCo-AWS-US-West
Description WordPress
Name OurCo-Azure-East-US
Description WordPress
Flavor mapping accounts for different size machine deployments and is informally referred to as
T-shirt sizing.
Procedure
1 Go to Infrastructure > Configure > Flavor Mappings. Each cloud zone needs to allow for
small, medium, and large flavors.
2 Click New Flavor Mapping, and enter values for the development cloud zone.
Account/region OurCo-AWS/us-east-1
Value t2.micro
Account/region OurCo-AWS/us-west-2
Value t2.micro
Account/region OurCo-Azure/East US
Value Standard_A0
Remember that all values are only examples. Your flavors will vary.
VMware, Inc. 61
Using and Managing vRealize Automation Cloud Assembly
3 Click Create.
4 Repeat the process twice, with values for medium and large flavors.
Account/region OurCo-AWS/us-east-1
Value t2.medium
Account/region OurCo-AWS/us-west-2
Value t2.medium
Account/region OurCo-Azure/East US
Value Standard_A3
Account/region OurCo-AWS/us-east-1
Value t2.large
Account/region OurCo-AWS/us-west-2
Value t2.large
Account/region OurCo-Azure/East US
Value Standard_A7
Plan for the operating system by adding image mappings. Each cloud zone needs a Ubuntu
image mapping.
Procedure
2 Click New Image Mapping, and enter values for Ubuntu servers.
Account/region OurCo-AWS/us-east-1
Value ubuntu-16.04-server-cloudimg-amd64
Account/region OurCo-AWS/us-west-2
Value ubuntu-16.04-server-cloudimg-amd64
Account/region OurCo-Azure/East US
Value azul-zulu-ubuntu-1604-923eng
VMware, Inc. 62
Using and Managing vRealize Automation Cloud Assembly
Remember that all values are only examples. Your images will vary.
3 Click Create.
In each profile, the administrator adds a network for the WordPress machines, and a second
network that will sit on the other side of an eventual load balancer. The second network will be
the one that users eventually connect to.
Procedure
2 Click New Network Profile, and create a profile for the development cloud zone.
Name devnets
Description WordPress
Remember that all values are only examples. Your network names will vary.
5 Click Create.
This Wordpress example does not require that you specify network policy or network
security settings.
6 Repeat the process twice, to create a network profile for the Wordpress example test and
production cloud zones. In each case, add the wpnet and appnet-public networks.
Name testnets
Description WordPress
Name prodnets
Description WordPress
VMware, Inc. 63
Using and Managing vRealize Automation Cloud Assembly
The administrator places fast storage at the production zone and general storage at
development and test.
Procedure
2 Click New Storage Profile, and create a profile for the development cloud zone.
Name OurCo-AWS-US-East-Disk
Description WordPress
3 Click Create.
4 Repeat the process to create a profile for the test cloud zone.
Name OurCo-AWS-US-West-Disk
Description WordPress
5 Repeat the process to create a profile for the production cloud zone, which has different
settings because it is an Azure zone.
Name OurCo-Azure-East-US-Disk
VMware, Inc. 64
Using and Managing vRealize Automation Cloud Assembly
Description WordPress
What to do next
Create a project to identify users, and to define provisioning settings. See Part 2: Create the
example vRealize Automation Cloud Assembly project.
Procedure
To successfully add a user, a VMware Cloud Services administrator must have enabled
access to vRealize Automation Cloud Assembly for the user.
n [email protected], Member
n [email protected], Member
n [email protected], Administrator
VMware, Inc. 65
Using and Managing vRealize Automation Cloud Assembly
6 Add the cloud zones that the users can deploy to.
7 Click Create.
8 Go to Infrastructure > Configure > Cloud Zones, and open a zone that you created earlier.
9 Click Projects, and verify that WordPress is a project that is allowed to provision to the zone.
What to do next
The example consists of a WordPress application server, MySQL database server, and
supporting resources. The template starts with a few resources, and then grows as you modify
them and add more resources.
Here are the values from Part 1: Configure the example vRealize Automation Cloud Assembly
infrastructure, the infrastructure that was set by a cloud administrator:
n Development—OurCo-AWS-US-East
n Test—OurCo-AWS-US-West
n Production—OurCo-Azure-East-US
n Flavor mappings with small, medium, and large compute resources for each zone.
VMware, Inc. 66
Using and Managing vRealize Automation Cloud Assembly
n Network profiles with internal and external subnets for each zone.
n Storage on which to deploy; general storage for the development and test zone, and fast
storage for the production zone.
n The example project includes all three cloud zone environments plus the users who can
create designs.
Prerequisites
To follow along, you must be familiar with your own infrastructure values. This example uses
AWS for development and test, and Azure for production. When creating your own cloud
template, substitute your own values, typically set by your cloud administrator.
Procedure
vRealize Automation Cloud Assembly is an infrastructure-as-code tool. You drag resources to the
design canvas to get started. Then, you complete the details using the code editor to the right of
the canvas.
The code editor allows you to type, cut, and paste code directly. If you're uncomfortable editing
code, you can select a resource in the canvas, click the code editor Properties tab, and enter
values there. Values that you enter appear in the code as if you had typed them directly.
Procedure
1 Go to Design > Cloud Templates and click New from > Blank canvas.
VMware, Inc. 67
Using and Managing vRealize Automation Cloud Assembly
4 From the resources on the left of the cloud template design page, drag two cloud agnostic
machines onto the canvas.
The machines serve as WordPress application server (WebTier) and MySQL database server
(DBTier).
5 On the right, edit the machine YAML code to add names, images, flavors, and constraint tags:
resources:
WebTier:
type: Cloud.Machine
properties:
name: wordpress
image: ubuntu
flavor: small
constraints:
- tag: env:dev
DBTier:
type: Cloud.Machine
properties:
name: mysql
image: ubuntu
flavor: small
constraints:
- tag: env:dev
6 Drag a cloud agnostic network to the canvas, and edit its code:
WP-Network-Private:
type: Cloud.Network
properties:
name: WP-Network-Private
networkType: existing
In the canvas, hover over the network block, click and hold the bubble where the line touches
the block, drag to a machine block, and release.
When you create the connection lines, note that network code is automatically added to the
machines in the editor.
VMware, Inc. 68
Using and Managing vRealize Automation Cloud Assembly
In some places, the example infrastructure was set up for multiple options. For example:
VMware, Inc. 69
Using and Managing vRealize Automation Cloud Assembly
You might set a specific option directly in the cloud template, but a better approach is to let
the user select the option at template deployment time. Prompting for user input lets you
create one template that can be deployed many ways, instead of having many hard-coded
templates.
a Create an inputs section in the code so that users can select machine size and target
environment at deployment time. Define the selectable values:
inputs:
env:
type: string
enum:
- env:dev
- env:prod
- env:test
default: env:dev
title: Environment
description: Target Environment
size:
type: string
enum:
- small
- medium
- large
description: Size of Nodes
title: Tier Machine Size
b In the resources section of the code, add ${input.input-name} code to prompt for the user
selection:
resources:
WebTier:
type: Cloud.Machine
properties:
name: wordpress
image: ubuntu
flavor: '${input.size}'
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
DBTier:
type: Cloud.Machine
properties:
name: mysql
image: ubuntu
flavor: '${input.size}'
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
WP-Network-Private:
VMware, Inc. 70
Using and Managing vRealize Automation Cloud Assembly
type: Cloud.Network
properties:
name: WP-Network-Private
networkType: existing
9 Finally, enhance the WebTier and DBTier code using the following examples. The WP-Network-
Private code does not need additional changes.
Note that the enhancements include login access to the database server and deployment-
time cloudConfig initialization scripts.
VMware, Inc. 71
Using and Managing vRealize Automation Cloud Assembly
Component Example
Additional
DBTier Inputs username:
type: string
minLength: 4
maxLength: 20
pattern: '[a-z]+'
title: Database Username
description: Database Username
userpassword:
type: string
pattern: '[a-z0-9A-Z@#$]+'
encrypted: true
title: Database Password
description: Database Password
DBTier
Resource DBTier:
type: Cloud.Machine
properties:
name: mysql
image: ubuntu
flavor: '${input.size}'
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
assignPublicIpAddress: true
remoteAccess:
authentication: usernamePassword
username: '${input.username}'
password: '${input.userpassword}'
cloudConfig: |
#cloud-config
repo_update: true
repo_upgrade: all
packages:
- mysql-server
runcmd:
- sed -e '/bind-address/ s/^#*/#/' -i /etc/mysql/mysql.conf.d/
mysqld.cnf
- service mysql restart
- mysql -e "GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY
'mysqlpassword';"
- mysql -e "FLUSH PRIVILEGES;"
attachedDisks: []
WebTier
Resource WebTier:
type: Cloud.Machine
properties:
name: wordpress
image: ubuntu
flavor: '${input.size}'
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
assignPublicIpAddress: true
cloudConfig: |
#cloud-config
VMware, Inc. 72
Using and Managing vRealize Automation Cloud Assembly
Component Example
repo_update: true
repo_upgrade: all
packages:
- apache2
- php
- php-mysql
- libapache2-mod-php
- php-mcrypt
- mysql-client
runcmd:
- mkdir -p /var/www/html/mywordpresssite && cd /var/www/html && wget
https://wordpress.org/latest.tar.gz && tar -xzf /var/www/html/latest.tar.gz
-C /var/www/html/mywordpresssite --strip-components 1
- i=0; while [ $i -le 10 ]; do mysql --connect-timeout=3 -h $
{DBTier.networks[0].address} -u root -pmysqlpassword -e "SHOW STATUS;" && break
|| sleep 15; i=$((i+1)); done
- mysql -u root -pmysqlpassword -h ${DBTier.networks[0].address} -e
"create database wordpress_blog;"
- mv /var/www/html/mywordpresssite/wp-config-sample.php /var/www/html/
mywordpresssite/wp-config.php
- sed -i -e s/"define( 'DB_NAME',
'database_name_here' );"/"define( 'DB_NAME', 'wordpress_blog' );"/ /var/www/
html/mywordpresssite/wp-config.php && sed -i
-e s/"define( 'DB_USER', 'username_here' );"/"define( 'DB_USER',
'root' );"/ /var/www/html/mywordpresssite/wp-config.php && sed -i
-e s/"define( 'DB_PASSWORD', 'password_here' );"/"define( 'DB_PASSWORD',
'mysqlpassword' );"/ /var/www/html/mywordpresssite/wp-config.php && sed
-i -e s/"define( 'DB_HOST', 'localhost' );"/"define( 'DB_HOST', '$
{DBTier.networks[0].address}' );"/ /var/www/html/mywordpresssite/wp-config.php
- service apache2 reload
formatVersion: 1
inputs:
env:
type: string
enum:
- env:dev
- env:prod
- env:test
default: env:dev
title: Environment
description: Target Environment
size:
type: string
enum:
- small
- medium
- large
description: Size of Nodes
title: Tier Machine Size
username:
type: string
minLength: 4
maxLength: 20
pattern: '[a-z]+'
VMware, Inc. 73
Using and Managing vRealize Automation Cloud Assembly
VMware, Inc. 74
Using and Managing vRealize Automation Cloud Assembly
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
assignPublicIpAddress: true
remoteAccess:
authentication: usernamePassword
username: '${input.username}'
password: '${input.userpassword}'
cloudConfig: |
#cloud-config
repo_update: true
repo_upgrade: all
packages:
- mysql-server
runcmd:
- sed -e '/bind-address/ s/^#*/#/' -i /etc/mysql/mysql.conf.d/mysqld.cnf
- service mysql restart
- mysql -e "GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'mysqlpassword';"
- mysql -e "FLUSH PRIVILEGES;"
attachedDisks: []
WP-Network-Private:
type: Cloud.Network
properties:
name: WP-Network-Private
networkType: existing
What to do next
Test the cloud template by checking the syntax and deploying it.
To be certain that a deployment works the way that you want, you might test and deploy the
cloud template several times. Gradually, you add more resources, retest, and redeploy along the
way.
Prerequisites
Create the basic cloud template. See Create a basic cloud template.
Procedure
The basic cloud template appears, in the design canvas and code editor.
2 To check template syntax, placement, and basic validity, click Test at the lower left.
VMware, Inc. 75
Using and Managing vRealize Automation Cloud Assembly
The test is only a simulation and does not actually deploy virtual machines or other resources.
The test includes a link to a Provisioning Diagram, where you can inspect the simulated
deployment flow and see what occurred. The simulation exposes potential issues, such as not
having any resource capabilities defined that match hard constraints in the cloud template. In
the example error that follows, a cloud zone of capability tag env:dev wasn't found anywhere
in the defined infrastructure.
VMware, Inc. 76
Using and Managing vRealize Automation Cloud Assembly
A successful simulation doesn't guarantee that you can deploy the template without errors.
4 After the template passes the simulation, click Deploy at the lower left.
8 To verify that the template successfully deployed, look under Deployments > Deployments.
If a deployment fails, click its name, and click the History tab to see messages that can help
you troubleshoot.
Some history entries might have the Provisioning Diagram link at the far right. The diagram is
similar to the simulated one, where you inspect the flow chart of vRealize Automation Cloud
Assembly decision points in the provisioning process.
More flow charts are available under Infrastructure > Activity > Requests.
VMware, Inc. 77
Using and Managing vRealize Automation Cloud Assembly
9 To verify that the application is working, open the WordPress start page in a browser.
b To locate the site FQDN or IP address, go to Deployments > Deployments > Topology.
c On the canvas, click the WebTier, and find the IP address in the panel on the right.
d Enter the IP address as part of the full URL to the WordPress start page.
http://{IP-address}/mywordpresssite
or
http://{IP-address}/mywordpresssite/wp-admin/install.php
10 After inspecting WordPress in a browser, if the application needs more work, make template
changes and redeploy using the Update an existing deployment option.
11 Consider versioning the cloud template. You can revert to a working version if a change
causes deployment to fail.
c Click Create.
To review or revert to a version, on the design page, click the Version History tab.
12 With a basic deployment now possible, try your first deployment-time enhancement by
increasing CPU and memory on the application and database servers.
Update to a medium node size for both. Using the same template, select medium at
deployment time, redeploy, and verify the application again.
What to do next
Expand the cloud template into a production-worthy application by adding even more resources.
VMware, Inc. 78
Using and Managing vRealize Automation Cloud Assembly
Prerequisites
Create the basic cloud template and test it. See Create a basic cloud template and Test a basic
cloud template.
Procedure
The basic template appears, in the design canvas and code editor.
2 Make additions and changes, using the code example and figure for guidance.
You use the GUI to drag new resources to the canvas, such as the load balancer, and then
finish the configuration in the code editor.
a Add a count input prompt to make the WordPress application server into a cluster.
3 Deploy, test, and make changes in the same way that you did for the basic cloud template.
You can update existing deployments, or even deploy new instances so that you can
compare deployments.
The goal is to reach a solid, repeatable template that can be used for production
deployments.
VMware, Inc. 79
Using and Managing vRealize Automation Cloud Assembly
formatVersion: 1
inputs:
env:
type: string
enum:
- env:dev
- env:prod
- env:test
default: env:dev
title: Environment
description: Target Environment
size:
type: string
enum:
- small
- medium
- large
description: Size of Nodes
title: Tier Machine Size
username:
type: string
minLength: 4
maxLength: 20
pattern: '[a-z]+'
title: Database Username
description: Database Username
userpassword:
type: string
pattern: '[a-z0-9A-Z@#$]+'
encrypted: true
title: Database Password
description: Database Password
count:
type: integer
default: 2
maximum: 5
minimum: 2
title: WordPress Cluster Size
description: WordPress Cluster Size (Number of Nodes)
storagetype:
type: string
enum:
- storage:general
- storage:fast
description: Archive Storage Disk Type
title: Archive Disk Type
resources:
WebTier:
type: Cloud.Machine
properties:
name: wordpress
image: ubuntu
VMware, Inc. 80
Using and Managing vRealize Automation Cloud Assembly
flavor: '${input.size}'
count: '${input.count}'
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
assignPublicIpAddress: true
cloudConfig: |
#cloud-config
repo_update: true
repo_upgrade: all
packages:
- apache2
- php
- php-mysql
- libapache2-mod-php
- php-mcrypt
- mysql-client
runcmd:
- mkdir -p /var/www/html/mywordpresssite && cd /var/www/html && wget https://wordpress.org/
latest.tar.gz && tar -xzf /var/www/html/latest.tar.gz -C /var/www/html/mywordpresssite --strip-
components 1
- i=0; while [ $i -le 10 ]; do mysql --connect-timeout=3 -h ${DBTier.networks[0].address} -u
root -pmysqlpassword -e "SHOW STATUS;" && break || sleep 15; i=$((i+1)); done
- mysql -u root -pmysqlpassword -h ${DBTier.networks[0].address} -e "create database
wordpress_blog;"
- mv /var/www/html/mywordpresssite/wp-config-sample.php /var/www/html/mywordpresssite/wp-
config.php
- sed -i -e s/"define( 'DB_NAME', 'database_name_here' );"/"define( 'DB_NAME',
'wordpress_blog' );"/ /var/www/html/mywordpresssite/wp-config.php && sed -i
-e s/"define( 'DB_USER', 'username_here' );"/"define( 'DB_USER', 'root' );"/ /var/www/html/
mywordpresssite/wp-config.php && sed -i -e s/"define( 'DB_PASSWORD',
'password_here' );"/"define( 'DB_PASSWORD', 'mysqlpassword' );"/ /var/www/html/mywordpresssite/wp-
config.php && sed -i -e s/"define( 'DB_HOST', 'localhost' );"/"define( 'DB_HOST', '$
{DBTier.networks[0].address}' );"/ /var/www/html/mywordpresssite/wp-config.php
- service apache2 reload
DBTier:
type: Cloud.Machine
properties:
name: mysql
image: ubuntu
flavor: '${input.size}'
constraints:
- tag: '${input.env}'
networks:
- network: '${resource["WP-Network-Private"].id}'
assignPublicIpAddress: true
remoteAccess:
authentication: usernamePassword
username: '${input.username}'
password: '${input.userpassword}'
cloudConfig: |
#cloud-config
repo_update: true
repo_upgrade: all
VMware, Inc. 81
Using and Managing vRealize Automation Cloud Assembly
packages:
- mysql-server
runcmd:
- sed -e '/bind-address/ s/^#*/#/' -i /etc/mysql/mysql.conf.d/mysqld.cnf
- service mysql restart
- mysql -e "GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'mysqlpassword';"
- mysql -e "FLUSH PRIVILEGES;"
attachedDisks: []
LoadBalancer:
type: Cloud.LoadBalancer
properties:
name: myapp-lb
network: '${resource["WP-Network-Public"].id}'
instances:
- '${WebTier.id}'
routes:
- protocol: HTTP
port: '80'
instanceProtocol: HTTP
instancePort: '80'
healthCheckConfiguration:
protocol: HTTP
port: '80'
urlPath: /mywordpresssite/wp-admin/install.php
intervalSeconds: 6
timeoutSeconds: 5
unhealthyThreshold: 2
healthyThreshold: 2
internetFacing: true
WP-Network-Private:
type: Cloud.Network
properties:
name: WP-Network-Private
networkType: existing
WP-Network-Public:
type: Cloud.Network
properties:
name: WP-Network-Public
networkType: public
backup:
type: Cloud.Machine
properties:
name: backup
flavor: '${input.size}'
image: ubuntu
networks:
- network: '${resource["WP-Network-Private"].id}'
attachedDisks:
- source: '${resource.ArchiveDisk.id}'
ArchiveDisk:
type: Cloud.Volume
properties:
name: ArchiveDisk
capacityGb: 5
VMware, Inc. 82
Using and Managing vRealize Automation Cloud Assembly
constraints:
- tag: '${input.storagetype}'
What to do next
Define your own infrastructure and create your own cloud templates.
See Chapter 4 Building your vRealize Automation Cloud Assembly resource infrastructure and
Chapter 6 Designing your vRealize Automation Cloud Assembly deployments.
The procedure requires that a cloud administrator has already configured your organization’s
VMware Cloud on AWS SDDC data center as described in Deploying and Managing a Software-
Defined Data Center in the VMware Cloud on AWS Getting Started documentation.
Look at the sequential setup to understand the process for configuring your environment for
VMware Cloud on AWS. Remember that the values you see are only use case examples. Think
about where you would make your own substitutions, or extrapolate from the example values, in
order to fit your own cloud infrastructure and deployment needs.
A detailed video of a similar workflow is available from VMware Cloud Management Technical
Marketing at How to Configure VMware Cloud on AWS for Cloud Assembly.
Procedure
In this procedure, you configure infrastructure that supports cloud template deployment to
resources in your existing VMware Cloud on AWS environment.
VMware, Inc. 83
Using and Managing vRealize Automation Cloud Assembly
Prerequisites
n Before you can create and configure a VMware Cloud on AWS cloud account in vRealize
Automation Cloud Assembly, you must be part of an organization in an existing VMware
Cloud on AWS SDDC environment. For information about configuring the VMware Cloud on
AWS service, see VMware Cloud on AWS Documentation.
n To facilitate the needed connection between your existing VMware Cloud on AWS host
SDDC in vCenter and a VMware Cloud on AWS cloud account in vRealize Automation Cloud
Assembly, you must provide a network connection, and add firewall rules, by using a VPN or
similar networking means. See Prepare your VMware Cloud on AWS SDDC to connect with
VMware Cloud on AWS cloud accounts in vRealize Automation.
Procedure
1 Prepare your VMware Cloud on AWS SDDC to connect with VMware Cloud on AWS cloud
accounts in vRealize Automation
When using VMware Cloud on AWS cloud accounts in your vRealize Automation Cloud
Assembly on-premises environment, you must create a network connection to support
communication between your SDDC in vCenter and any VMware Cloud on AWS cloud
accounts in vRealize Automation.
2 Create a VMware Cloud on AWS cloud account in vRealize Automation within a sample
workflow
In this step, you create a VMware Cloud on AWS cloud account in vRealize Automation.
3 Create a cloud zone for VMware Cloud on AWS deployments in vRealize Automation
In this step, you create a cloud zone to specify a compute resource that the CloudAdmin
user can access when working with VMware Cloud on AWS in vRealize Automation.
4 Configure network and storage profiles for VMware Cloud on AWS deployments in vRealize
Automation
In this step, you configure a network profile and a storage profile to specify resources that
are available to a VMware Cloud on AWS CloudAdmin user in vRealize Automation.
6 Define a vCenter machine resource in a cloud template design to support VMware Cloud on
AWS deployment in vRealize Automation
In this step, you drag a vCenter machine resource onto the design canvas and add settings
for a VMware Cloud on AWS deployment in vRealize Automation.
Prepare your VMware Cloud on AWS SDDC to connect with VMware Cloud on
AWS cloud accounts in vRealize Automation
When using VMware Cloud on AWS cloud accounts in your vRealize Automation Cloud Assembly
on-premises environment, you must create a network connection to support communication
VMware, Inc. 84
Using and Managing vRealize Automation Cloud Assembly
between your SDDC in vCenter and any VMware Cloud on AWS cloud accounts in vRealize
Automation.
To facilitate the needed connection between your existing VMware Cloud on AWS host SDDC in
vCenter and a VMware Cloud on AWS cloud account in vRealize Automation, you must provide a
network connection between the two elements by using a VPN or similar networking means.
Procedure
1 Configure a VPN connection over the public Internet or AWS Direct connect.
See Configure VPN Connectivity to the On-Premises Data Center and Configure AWS Direct
Connect for VMware Cloud on AWS in VMware Cloud on AWS Networking and Security at
VMware Cloud on AWS Documentation.
2 Verify that the vCenter Server FQDN is resolvable at a private IP address on the management
network.
See Set vCenter Server FQDN Resolution Address in VMware Cloud on AWS Networking and
Security at VMware Cloud on AWS Documentation.
You must configure management gateway firewall rules in the SDDC's VMware Cloud on
AWS console to support communication. The rules must be in the Management Gateway
firewall rules section. Create the firewall rules by using options on the Networking & Security
tab in the SDDC console.
n Limit network traffic to ESXi for HTTPS (TCP 443) services to the discovered IP address of
the vRealize Automation appliance/server or vRealize Automation load balancer VIP.
n Limit network traffic to vCenter for ICMP (All ICMP), SSO (TCP 7444), and HTTPS (TCP
443) services to the discovered IP address of the vRealize Automation appliance/server
or vRealize Automation load balancer VIP.
n Limit network traffic to the NSX-T Manager for HTTPS (TCP 443) services to
the discovered IP address of the vRealize Automation appliance/server or vRealize
Automation load balancer VIP.
NSX Manager CIDR block of on-premises NSX Manager Any (All Traffic)
data center
On pemises to ESXi ping CIDR block of on-premises ESXi Management Only ICMP (All ICMP)
data center
VMware, Inc. 85
Using and Managing vRealize Automation Cloud Assembly
On Premises to ESXi CIDR block of on-premises ESXi Management Only TCP 902
remote console and data center
provisioning
On-premises to SDDC VM CIDR block of on-premises CIDR block of SDDC Any (All Traffic)
data center logical network
SDDC VM to on premises CIDR block of SDDC CIDR block of on-premises Any (All Traffic)
logical network data center
For related information, see VMware Cloud on AWS Networking and Security and VMware
Cloud on AWS Operations Guide at VMware Cloud on AWS Documentation.
Results
After you have configured required gateway access and firewall rules, you can continue with the
process of creating a VMware Cloud on AWS cloud account. See Create a VMware Cloud on
AWS cloud account in vRealize Automation within a sample workflow.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
Prerequisites
n This procedure assumes that you have the required administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter and that
you have enabled HTTPS access on port 443. See Credentials required for working with cloud
accounts in vRealize Automation.
n This procedure assumes that you have the cloud administrator user role. See What are the
vRealize Automation user roles.
n To facilitate the needed connection between your existing VMware Cloud on AWS host
SDDC in vCenter and a VMware Cloud on AWS cloud account in vRealize Automation, you
must provide a network connection, and firewall rules, by using a VPN or similar networking
means. See Prepare your VMware Cloud on AWS SDDC to connect with VMware Cloud
on AWS cloud accounts in vRealize Automation. If you are using an external HTTP Internet
proxy, it must be configured for IPv4.
n If you do not have external Internet access, configure an Internet server proxy. See How do I
configure an Internet proxy server for vRealize Automation.
VMware, Inc. 86
Using and Managing vRealize Automation Cloud Assembly
Procedure
2 Click Add Cloud Account, select VMware Cloud on AWS, and enter values.
Sample values and supporting information are provided in the following table.
VMC API Token 1 Click the i help icon at the end of You can create a new token or use an existing
the VMC API token line and click API token for your organization on the linked API
Tokens page in the help text box to Tokens page.
open the API Tokens tab on your In the Define Scopes section, the minimum
organization's My Account page. required roles for the API token are:
2 Click Generate Token to display the n Organizational Roles
Generate a New API Token options. n Organization Member
3 Enter a new token name, for example n Organization Owner
myinitials_mytoken.
n Service Roles - VMware Cloud on AWS
4 Set the Token TTL to never expire.
n Administrator
If you create a token that is set n NSX Cloud Administrator
to expire, then the VMware Cloud n NSX Cloud Auditor
on AWS operations from vRealize
Automation will stop working when Note Copy, download, or print the generated
the token expires and continue to token. Once you leave this page you cannot
not work until you update the cloud retrieve the generated token.
account with a new token.
Apply the generated or supplied token to
5 In the Define Scopes section, select connect to the available SDDC environment
All Roles. in your organization's VMware Cloud on AWS
subscription and populate the list of SDDC
names.
If the vRealize Automation and VMware
Cloud on AWS services are in different
organizations, you should switch to the
VMware Cloud on AWS organization and then
6 Click Generate. generate the token.
7 In the generated token page, click For more information about API tokens, see
Copy and click Continue. Generate API Tokens.
8 Return to the New Cloud Account
page, paste the copied token into the
VMC API token row, and click Apply
API token.
SDDC name For this example, select Select from the list of available SDDCs from
Datacenter:Datacenter-abz. your VMware Cloud on AWS subscription. The
The valid SDDC name auto-populates the list of SDDCs is based on the VMware Cloud
vCenter and NSX-T FQDN entries. If a on AWS API token.
cloud proxy was already deployed to the NSX-V SDDCs are not supported with vRealize
SDDC, the cloud proxy value also auto- Automation and do not appear in the list of
populates. available SDDCs.
VMware, Inc. 87
Using and Managing vRealize Automation Cloud Assembly
vCenter IP address/ The address auto-populates based on Enter the IP address or FQDN of the vCenter
FQDN your SDDC selection. Server in the specified SDDC.
The IP address defaults to the private IP
address. Based on the type of network
connectivity used to access your SDDC, the
default address might be different than the
IP address of the NSX Manager Server in the
specified SDDC.
NSX Manager IP The address auto-populates based on Specifies the IP address or FQDN of the NSX
address/FQDN your SDDC selection. Manager in the specified SDDC.
The IP address defaults to the private IP
address. Based on the type of network
connectivity used to access your SDDC, the
default address might be different than the
IP address of the NSX Manager Server in the
specified SDDC.
VMware Cloud on AWS cloud accounts
support NSX-T.
vCenter user name The user name auto-populates as Enter your vCenter user name for the
and password [email protected]. specified SDDC if it's different than the
default.
The specified user requires CloudAdmin
credentials. The user does not require
CloudGlobalAdmin credentials.
Enter the user password.
Allow provisioning This information is read-only. Lists available data centers in your specified
to these data VMware Cloud on AWS SDDC environment.
centers
Create a cloud zone De-select the check-box. For this See Learn more about vRealize Automation
example, you will create a cloud zone Cloud Assembly cloud zones.
later in the workflow.
Capability tags Leave this empty. This workflow does not Use tags according to your organization's
use capability tags. tag strategy. See How do I use tags to
manage vRealize Automation Cloud Assembly
resources and deployments and Creating a
tagging strategy.
3 Click Add.
VMware, Inc. 88
Using and Managing vRealize Automation Cloud Assembly
Results
Resources such as machines and volumes are data-collected from the VMware Cloud on AWS
SDDC data center and listed in the Resources section of the vRealize Automation Infrastructure
tab.
What to do next
Create a cloud zone for VMware Cloud on AWS deployments in vRealize Automation.
In VMware Cloud on AWS, the two primary administrator credentials are CloudGlobalAdmin and
CloudAdmin. vRealize Automation Cloud Assembly is designed to support the CloudAdmin user.
Deploy to resources that are available to a VMware Cloud on AWS CloudAdmin user. Do not
deploy to resources that require VMware Cloud on AWS CloudGlobalAdmin credentials.
Cloud zones identify the compute resources onto which a project cloud template deploys
machines, networks, and storage. See Learn more about vRealize Automation Cloud Assembly
cloud zones.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
Prerequisites
n Complete the Create a VMware Cloud on AWS cloud account in vRealize Automation within a
sample workflow procedure.
n This procedure assumes that you have the required administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter. See
Credentials required for working with cloud accounts in vRealize Automation.
n This procedure assumes that you have the cloud administrator user role. See What are the
vRealize Automation user roles.
Procedure
VMware, Inc. 89
Using and Managing vRealize Automation Cloud Assembly
2 Click New Cloud Zone, and enter values for the VMware Cloud on AWS environment.
Name VMC_cloud_zone-1
Capability tags Leave this empty. This workflow does not use capability
tags.
4 As shown in area 1 below, find and select a compute resource that is available to
the CloudAdmin user. For this example, use the resource named Cluster 1/ Compute-
ResourcePool.
6 Filter the compute resources that are used in this cloud zone by entering vmc_placements_abz
in the Filter tags section.
VMware, Inc. 90
Using and Managing vRealize Automation Cloud Assembly
7 Click Save.
For this example, only the compute resource named Cluster 1/ Compute-ResourcePool is
available to the CloudAdmin user.
What to do next
Configure network and storage profiles for VMware Cloud on AWS deployments in vRealize
Automation.
Configure network and storage profiles for VMware Cloud on AWS deployments
in vRealize Automation
In this step, you configure a network profile and a storage profile to specify resources that are
available to a VMware Cloud on AWS CloudAdmin user in vRealize Automation.
While an image and a flavor value are also needed, there is nothing unique about them specific to
VMware Cloud on AWS user credentials. For this example, you'll use a flavor value of small and
an image value of ubuntu-16 when you define the cloud template.
For general information about mappings and profiles, see Chapter 4 Building your vRealize
Automation Cloud Assembly resource infrastructure.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
Prerequisites
n Create a cloud zone. See Create a cloud zone for VMware Cloud on AWS deployments in
vRealize Automation.
n This procedure assumes that you have the required administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter. See
Credentials required for working with cloud accounts in vRealize Automation.
n This procedure assumes that you have the cloud administrator user role. See What are the
vRealize Automation user roles.
VMware, Inc. 91
Using and Managing vRealize Automation Cloud Assembly
Procedure
a Select Infrastructure > Configure > Network Profiles and click New Network Profile.
Name vmc-network1
c Select a network that a VMware Cloud on AWS user with CloudAdmin credentials can
deploy to, for example sddc-cgw-network-1.
VMware, Inc. 92
Using and Managing vRealize Automation Cloud Assembly
Name vmc-storage1
b From the Datastore / Cluster drop-down menu, select the WorkloadDatastore datastore.
For VMware Cloud on AWS in vRealize Automation Cloud Assembly, the storage
policy must use the WorkloadDatastore datastore to support VMware Cloud on AWS
deployment.
What to do next
For information about projects, see How do vRealize Automation Cloud Assembly projects work
at deployment time.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
VMware, Inc. 93
Using and Managing vRealize Automation Cloud Assembly
Prerequisites
n Complete the Configure network and storage profiles for VMware Cloud on AWS
deployments in vRealize Automation procedure.
n This procedure assumes that you have the required administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter. See
Credentials required for working with cloud accounts in vRealize Automation.
n This procedure assumes that you have the cloud administrator user role. See What are the
vRealize Automation user roles.
Procedure
The users need CloudAdmin credentials to their organization's VMware Cloud on AWS
subscription.
n [email protected], Administrator
n [email protected], Member
5 Add the cloud zone that you configured in the earlier step.
Provisioning priority 1
Instances limit 3
What to do next
Create a cloud template to deploy in your VMware Cloud on AWS environment. See Define
a vCenter machine resource in a cloud template design to support VMware Cloud on AWS
deployment in vRealize Automation.
VMware, Inc. 94
Using and Managing vRealize Automation Cloud Assembly
Create a cloud template design that you can deploy to available VMware Cloud on AWS
resources.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
Prerequisites
n This procedure assumes that you have cloud template designer credentials. See What are the
vRealize Automation user roles.
n This procedure assumes that you have VMware Cloud on AWS CloudAdmin credentials
for the target SDDC in vCenter (Datacenter:Datacenter-abz). See Credentials required for
working with cloud accounts in vRealize Automation.
n Configure the resource infrastructure and project as described in the preceding sections.
Procedure
Name vmc-bp_abz
Description 1
Project VMC_proj-1_abz
This is the project that you created earlier, which
supports the cloud zone that you also created earlier.
The project is now associated with the cloud zone,
which in turn is associated with the VMware Cloud on
AWS cloud account/region that you created earlier.
3 Edit the following (bold) cloud template resource code in the machine resource.
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: ubuntu-1604
cpuCount: 1
totalMemoryMB: 1024
folderName: Workloads
The image can be any value that is appropriate to your deployment needs.
You must add the folderName: Workloads statement to the cloud template design code to
support VMware Cloud on AWS deployment. The folderName: Workloads setting supports the
CloudAdmin credentials in the VMware Cloud on AWS SDDC environment and is required.
VMware, Inc. 95
Using and Managing vRealize Automation Cloud Assembly
Note: While the folderName: Workloads setting shown in the above code sample is required,
you can add it directly in the cloud template code as shown above or you can add it in the
associated cloud zone or project. If the setting is specified in more than one of these three
places, the precedence is as follows:
n The project setting overrides the cloud template setting and the cloud zone setting.
Note: You can optionally replace the cpuCount and totalMemoryMB settings with a flavor (sizing)
entry, as shown below:
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: ubuntu-1604
flavor: small
folderName: Workloads
If the cloud zone has the folder value set to Workloads, you do not need to set the
folderName property in the cloud template, unless you want to override the cloud zone folder
value.
What to do next
Expand on this basic VMware Cloud on AWS workflow by adding network isolation. See
Configure an isolated network in VMware Cloud on AWS workflow in vRealize Automation.
When you define your VMware Cloud on AWS cloud account, NSX-T settings configured in your
VMware Cloud on AWS service are available. For information about configuring NSX-T settings in
your VMware Cloud on AWS service, see VMware Cloud on AWS product documentation.
vRealize Automation supports VMware Cloud on AWS with NSX-T. It does not support VMware
Cloud on AWS with NSX-V.
vRealize Automation supports network isolation for VMware Cloud on AWS deployments. It does
not support other network methods for VMware Cloud on AWS.
This extension of the basic VMware Cloud on AWS workflow describes the following methods of
creating an isolated network for use in your cloud template:
VMware, Inc. 96
Using and Managing vRealize Automation Cloud Assembly
Prerequisites
This procedure expands on the basic VMware Cloud on AWS workflow. It uses the same cloud
account and region, cloud zone, project, and network profile that you configured in the Tutorial:
Configuring VMware Cloud on AWS for vRealize Automation workflow.
Procedure
1 Define an isolated network for a VMware Cloud on AWS deployment in vRealize Automation
You can configure network isolation for a VMware Cloud on AWS deployment by using
either of the following procedures:
2 Define a network component in a cloud template to support network isolation for VMware
Cloud on AWS in vRealize Automation
In this step, you drag a network machine component onto a vRealize Automation cloud
template canvas and add settings for an isolated network deployment to your target
VMware Cloud on AWS environment.
You can specify an isolated network by using a security group or by using on-demand network
settings. In this example, you configure network isolation by specifying on-demand network
settings in the network profile. Later, you access the network in a cloud template and use the
cloud template in a VMware Cloud on AWS deployment.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
Prerequisites
n Complete the Configure a basic VMware Cloud on AWS workflow in vRealize Automation
workflow.
n This procedure assumes that you have the required administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter. See
Credentials required for working with cloud accounts in vRealize Automation.
VMware, Inc. 97
Using and Managing vRealize Automation Cloud Assembly
n This procedure assumes that you have the cloud administrator user role. See What are the
vRealize Automation user roles.
Procedure
1 Open the network profile that you used in the basic VMware Cloud on AWS workflow, for
example vmc-network1. See Configure network and storage profiles for VMware Cloud on
AWS deployments in vRealize Automation.
4 Select the Create an on-demand network option and select the default cgw network domain.
Specify an appropriate CIDR and subnet size.
5 Click Save.
When you use this network profile, machines are deployed to a network in the default
network domain. The network is isolated from other networks by using private or outbound
network access.
What to do next
Configure a network component in your cloud template. See Define a network component in a
cloud template to support network isolation for VMware Cloud on AWS in vRealize Automation
You can specify an isolated network by using a security group or by using on-demand network
settings. In this example, you configure network isolation by specifying an on-demand security
group in the network profile. Later, you specify the network in a cloud template and use the
cloud template in a VMware Cloud on AWS deployment.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
Prerequisites
n Complete the Configure a basic VMware Cloud on AWS workflow in vRealize Automation
workflow.
n This procedure assumes that you have the required administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter. See
Credentials required for working with cloud accounts in vRealize Automation.
n This procedure assumes that you have the cloud administrator user role. See What are the
vRealize Automation user roles.
VMware, Inc. 98
Using and Managing vRealize Automation Cloud Assembly
Procedure
1 Open the network profile that you used in the basic VMware Cloud on AWS workflow, for
example vmc-network1. See Configure network and storage profiles for VMware Cloud on
AWS deployments in vRealize Automation .
2 Select the existing network that you used in the basic VMware Cloud on AWS workflow, for
example sddc-cgw-network-1. See Configure network and storage profiles for VMware Cloud
on AWS deployments in vRealize Automation.
5 Click Save.
When you use this network profile, machines are deployed to the selected network and are
isolated by a new security group policy. The new security policy allows private or outbound
network access.
What to do next
Configure a network component in your cloud template. See Define a network component in a
cloud template to support network isolation for VMware Cloud on AWS in vRealize Automation
Add network isolation to the cloud template that you created earlier. The cloud template is
already associated with a project and cloud zone that support deployment to your VMware
Cloud on AWS environment, as well as the network profile and network that you configured for
isolation.
Unless otherwise indicated, the step values that you enter in this procedure are for this example
workflow only.
VMware, Inc. 99
Using and Managing vRealize Automation Cloud Assembly
Prerequisites
n This procedure assumes that you have cloud template designer credentials. See What are the
vRealize Automation user roles.
n This procedure assumes that you have VMware Cloud on AWS CloudAdmin credentials for
the target SDDC in vCenter. See Credentials required for working with cloud accounts in
vRealize Automation.
Procedure
1 Open the cloud template that you created in the previous workflow. See Define a vCenter
machine resource in a cloud template design to support VMware Cloud on AWS deployment
in vRealize Automation.
2 From the components on the left of the cloud template design page, drag a network
component onto the canvas.
3 Edit the network component YAML code to specify a network type of either private or
outbound, as shown in bold.
resources: Cloud_Network_1:
type: Cloud.Network
properties:
name: vmc_isolated
networkType: private
OR
resources: Cloud_Network_1:
type: Cloud.Network
properties:
name: vmc_isolated
networkType: outbound
What to do next
In this procedure, you use an existing IPAM provider package, in this case an Infoblox package,
and an existing running environment to build a provider-specific IPAM integration point. You
configure an existing network and create a network profile to support IP address allocation from
the external IPAM provider. Finally, you create a cloud template that is matched to the network
and network profile and deploy networked machines using IP values obtained from the external
IPAM provider.
Information about how to obtain and configure the IPAM provider package, and how to configure
a running environment that accesses a cloud extensibility proxy to support the IPAM provider
integration, is included as reference.
Remember that the values you see are example values. You won't be able to use them letter-
by-letter in your environment. Think about where you would make your own substitutions, or
extrapolate from the example values, to fit your organization's needs.
Procedure
1 Add required extensible attributes in the Infoblox application for integration with vRealize
Automation
Before you can download and deploy the Infoblox provider package (infoblox.zip) for
integration with vRealize Automation from either the Infoblox website or from the VMware
Marketplace, you must add required extensibility attributes in Infoblox.
2 Download and deploy an external IPAM provider package for use in vRealize Automation
Before you can define an external IPAM integration point in vRealize Automation, you need a
configured IPAM provider package.
5 Configure a network and network profile to use external IPAM for an existing network in
vRealize Automation
You can define an existing network to use IP address values that are obtained from, and
managed by, an external IPAM provider rather than internally from vRealize Automation.
6 Define and deploy a cloud template that uses an external IPAM provider range assignment
in vRealize Automation
You can define a cloud template to obtain and manage IP address assignments from your
external IPAM provider. This example uses Infoblox as the external IPAM provider.
7 Using Infloblox-specific properties and extensible attributes for IPAM integrations in vRealize
Automation cloud templates
You can use Infloblox-specific properties for vRealize Automation projects that contain
external IPAM integrations for Infoblox.
This procedure is applicable if you are creating an external IPAM integration point for Infoblox
integration with vRealize Automation Cloud Assembly.
Before you can use the infoblox.zip download, you must log in to your Infoblox account,
using your organization account administrator credentials, and pre-create the following Infoblox
extensible attributes:
n VMware resource ID
Prerequisites
n Verify that you have an account with Infoblox and that you have the correct access
credentials to your organization's Infoblox account.
n Confirm that the Infoblox WAPI version is supported. IPAM integration with Infoblox depends
on Infoblox WAPI version v2.7. All Infoblox appliances that support WAPI v2.7 are supported.
n Review Using Infloblox-specific properties and extensible attributes for IPAM integrations in
vRealize Automation cloud templates.
Procedure
These are the same administrator user name and password credentials that you specify when
you create an external IPAM integration point in vRealize Automation Cloud Assembly using
the Infrastructure > Connections > Integrations > menu sequence.
2 Use the procedure described in the Infoblox documentation to create the following required
extensible attributes in your Infoblox application.
The procedure is described in the Adding Extensible Attributes section of the Infoblox
documentation topic About Extensible Attributes. Also see Managing Extensible Attributes.
What to do next
After you add the required attributes, you can resume the process of downloading and
deploying the Infloblox package as described in Download and deploy an external IPAM provider
package for use in vRealize Automation.
You can download a provider-specific integration package from your IPAM provider's website,
from the VMware solutions exchange marketplace or, if available, from the vRealize Automation
Marketplace tab.
Note This example uses the VMware-supplied Infoblox package Infoblox.zip, which is available
for download from VMware Marketplace as follows:
n Infoblox plug-in version 1.4 - Compatible with vRealize Automation 8.3.x and providing all the
functionality of previous versions. With this version, you can use the same host name with a
different DNS suffix for two NICs. See plug-in release notes for details.
n Infoblox plug-in version 1.3 - Compatible with vRealize Automation 8.3.x and providing
additional network data collection filters. See Control network data collection by using
Infoblox filters in vRealize Automation.
The Infoblox v1.3 plug-in may be used with vRealize Automation 8.1 or 8.2, but only in select
situations and with caution as described in KB article Infoblox 1.3 Compatibility with vRealize
Automation 8.x (82142).
n vRA Cloud Infoblox plugin version 1.2 - Compatible with vRealize Automation 8.1.x and 8.2.x
n vRA Cloud Infoblox plugin version 1.1 - Compatible with vRealize Automation 8.1.x
n vRA Cloud Infoblox plugin version 1.0 - Compatible with vRealize Automation 8.0.1.x with or
without an internet connection to the global network.
n vRA Cloud Infoblox plugin version 0.4 - Compatible with vRealize Automation 8.0.0.x and
8.0.1.x when there is an internet connection with the global network.
IPAM integration with Infoblox depends on Infoblox WAPI version v2.7. All Infoblox appliances
that support WAPI v2.7 are supported.
For information about how to create an IPAM integration package for other IPAM providers, if
one does not already exist in the Marketplace, see How do I use the IPAM SDK to create a
provider-specific external IPAM integration package for vRealize Automation.
The IPAM provider package contains scripts that are packaged with metadata and other
configurations. The scripts contain the source code used for the operations that vRealize
Automation performs in coordination with the external IPAM provider. Example operations
include Allocate an IP address for a virtual machine, Fetch a list of IP ranges from
the provider, and Update the MAC address of a host record in the provider.
Prerequisites
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider, for example Infoblox or
Bluecat, and that you have the correct access credentials to your organization's account with
the IPAM provider.
n If you are using Infobox as your external IPAM provider, verify that you have added the
required extensible attributes to your Infoblox account before continuing. See Add required
extensible attributes in the Infoblox application for integration with vRealize Automation.
Note A certificate chain issue exists that is derived from how the Python element in the Infoblox
plug-in handles SSL handshakes. For information about the issue and its required actions,
see Knowledge Base Article vRA Cloud Infoblox Plugin throws a certificate chain error during
authentication process (88057).
Procedure
1 Navigate to the correct Infoblox plug-in page, for example Infoblox plugin version 1.4.
See above for the Infoblox plugin options that are available in the VMware Marketplace.
3 If you have not already done so, add the required extensible attributes in Infoblox. See
Add required extensible attributes in the Infoblox application for integration with vRealize
Automation.
Results
The package is now available for you to deploy by using the Integrations > Add Integration >
IPAM > Manage Providers > Import package menu sequence as described in Add an external
IPAM integration for Infoblox in vRealize Automation .
External IPAM integration requires a running environment. When you define the IPAM integration
point, you create a connection between vRealize Automation Cloud Assembly and your IPAM
provider by specifying an available running environment.
Note An Infoblox IPAM integration point requires an actions-based extensibility (ABX) On-Prem
Embedded integration point.
n can connect to IPAM vendor appliances that reside in an on-premises data center behind
a NAT/firewall that is not publicly accessible, for example Infoblox
n slower and slightly less reliable performance than commercial cloud vendors
n cannot connect to IPAM vendor appliances that reside in an on-premises data center
behind a NAT/firewall that is not publicly accessible
n Microsoft Azure
n cannot connect to IPAM vendor appliances that reside in an on-premises data center
behind a NAT/firewall that is not publicly accessible
Prerequisites
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider, for example Infoblox or
Bluecat, and that you have the correct access credentials to your organization's account with
the IPAM provider.
n Verify that you have access to a deployed integration package for your IPAM provider, such
as Infoblox or BlueCat. The deployed package is initially obtained as a .zip download from
your IPAM provider website or from the vRealize Automation Cloud Assembly Marketplace
and then deployed in vRealize Automation Cloud Assembly.
For information about how to deploy the provider package .zip file and make it available as
a Provider value on the IPAM Integration page, see Download and deploy an external IPAM
provider package for use in vRealize Automation.
Procedure
2 Click New Action, enter an action name and description, and specify a project.
For more information about creating extensibility actions, see How to extend and automate
application life cycles with extensibility.
For related information about the running environment, see this Infoblox IPAM Plug-in
1.1 Integration blog video at approximately 24 minutes into the video.
You can use a provider-specific IPAM integration point to obtain and manage IP addresses and
related network characteristics for cloud template deployments.
In this example, you create an external IPAM integration point to support access to your
organization's account with an external IPAM provider. In this example workflow, the IPAM
provider is Infoblox and the provider-specific integration package already exists. While these
instructions are specific to an Infoblox integration, they can be used as reference if creating an
IPAM integration for a different external IPAM provider.
You can obtain a provider-specific integration package from your IPAM provider's website, from
the VMware solutions exchange marketplace or, if available, from the vRealize Automation Cloud
Assembly Marketplace tab.
This example uses the VMware-supplied Infoblox package Infoblox.zip, which is available for
download from the VMware solutions exchange marketplace as follows:
n vRA Cloud Infoblox plugin version 1.1 - supports vRealize Automation 8.1 forward
n vRA Cloud Infoblox plugin version 1.0 - supports vRealize Automation 8.0.1
n vRA Cloud Infoblox plugin version 0.1 - supports vRealize Automation 8.0
Prerequisites
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with external IPAM provider and that you have the correct
access credentials to your organization's account with the IPAM provider.
n Verify that you have access to a deployed integration package for your IPAM provider.
The deployed package is initially obtained as a .zip download from your IPAM provider
website, or from the VMware solutions exchange marketplace, and then deployed to vRealize
Automation.
For information about how to download and deploy the provider package .zip file and make
it available as a Provider value on the IPAM Integration page, see Download and deploy an
external IPAM provider package for use in vRealize Automation.
n Verify that you have access to a configured running environment for the IPAM provider. The
running environment is typically an actions-based extensibility (ABX) On-Prem Embedded
integration point.
For information about running environment characteristics, see Create a running environment
for an IPAM integration point in vRealize Automation.
n Enable required extensible attributes in your Infoblox application. See Add required
extensible attributes in the Infoblox application for integration with vRealize Automation.
n If you do not have external Internet access, you can configure an Internet server proxy. See
How do I configure an Internet proxy server for vRealize Automation.
n Verify that you have the required user credentials to access and use your Infoblox IPAM
product. For example, open the Administration tab in the Infoblox appliance and customize
administrator, groups, and roles entries. You must be a member of a group that has
administrator or superuser permissions or a custom group that has DHCP, DNS, IPAM, and
Grid permissions. These settings allow access to all the functionality that is available in the
Infoblox plug-in, enabling you to create an Infoblox IPAM integration and designers to use
that IPAM integration in cloud templates and deployments. For more information about user
permissions, see your Infoblox product documentation.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Click IPAM.
3 In the Provider drop-down, select a configured IPAM provider package from the list, for
example Infoblox_hrg.
If the list is empty, click Import Provider Package, navigate to an existing provider
package .zip file, and select it. If you do not have the provider .zip file, you can obtain it from
your IPAM provider's web site or from the vRealize Automation Cloud Assembly Marketplace
tab.
For information about how to deploy the provider package .zip file in vCenter and make it
available as a Provider value on the Integration page, see Download and deploy an external
IPAM provider package for use in vRealize Automation.
For information about how to upgrade an existing IPAM integration to use a more recent
version of a vendor's IPAM integration package, see How to upgrade to a newer external
IPAM integration package in vRealize Automation .
4 Enter your administrator user name and password credentials for your account with the
external IPAM provider, along with all other (if any) mandatory fields, such as the host name
of your provider.
In this example, you obtain the host name of your Infoblox IPAM provider using the following
steps:
a In a separate browser tab, log in to your IPAM provider account using your Infoblox
administrator credentials.
c Paste your host name URL in the Hostname field on the IPAM Integration page.
The running environment supports communication between vRealize Automation and the
external IPAM provider.
Note If you use an Amazon Web Services or Microsoft Azure cloud account as the
integration running environment, be sure that the IPAM provider appliance is accessible from
the Internet and is not behind a NAT or firewall and that it has a publicly resolvable DNS
name. If the IPAM provider is not accessible, the Amazon Web Services Lambda or Microsoft
Azure Functions cannot connect to it and the integration will fail. For related information, see
Create a running environment for an IPAM integration point in vRealize Automation.
The IPAM framework only supports an actions-based extensibility (ABX) On-Prem Embedded
running environment.
Note An Infoblox IPAM integration point requires an actions-based extensibility (ABX) On-
Prem Embedded integration point.
The configured cloud account or integration point allows communication between vRealize
Automation and the IPAM provider, in this example Infoblox, through an associated cloud
extensibility proxy. You can select a provider that has already been created or you can
create one.
For information about how to create a running environment, see Create a running
environment for an IPAM integration point in vRealize Automation.
6 Click Validate.
Because this example uses the on-premises actions-based extensibility integration for the
running environment, you can view the validation action.
b Click Activity > Action Runs and select either All Runs or Integration runs from the filter
to note that an endpoint validation action is initiated and running.
7 When prompted to trust the self-signed certificate from the IPAM provider, click Accept.
After you accept the self-signed certificate, the validation action can continue to completion.
8 Enter a Name for this IPAM integration point, such as Infloblox_Integration, and a
Description, such as Infoblox IPAM with ABX integration for team HRG.
A data collection action is imitated. Networks and IP ranges are data-collected from the IPAM
provider. You can view the data collection action as follows:
b Click Activity > Action Runs and note that a data collection action is initiated and running.
You can open and view the action run content.
Results
The provider-specific external IPAM integration is now available for use with networks and
network profiles.
You can define a network to access existing IP settings that you have defined in your
organization's external IPAM provider account. This step expands on the Infoblox provider
integration that you created in the previous step.
In this example, you configure a network profile with existing networks that were data-collected
from vCenter. You then configure these networks to obtain IP information from an external IPAM
provider, in this case Infoblox. Virtual machines that you provision from vRealize Automation that
can be matched with this network profile obtain their IP and other TCP/IP related settings from
the external IPAM provider.
For more information about networks, see Network resources in vRealize Automation. For more
information about network profiles, see How to add network profiles in vRealize Automation and
Learn more about network profiles in vRealize Automation.
For related information, see How do I configure a network profile to support an on-demand
network for an external IPAM integration in vRealize Automation.
Prerequisites
This sequence of steps is shown in the context of an IPAM provider integration workflow. See
Tutorial: Configuring a provider-specific external IPAM integration for vRealize Automation .
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider, for example Infoblox or
Bluecat, and that you have the correct access credentials to your organization's account with
the IPAM provider. In this example workflow, the IPAM provider is Infoblox.
n Verify that you have an IPAM integration point for the IPAM provider. See Add an external
IPAM integration for Infoblox in vRealize Automation .
Procedure
2 On the Networks tab, select an existing network to use with the IPAM provider integration
point. In this example, the network name is net.23.117-only-IPAM.
Listed networks have been data-collected by vRealize Automation from a vCenter in your
organization.
3 To obtain values from the external IPAM provider, verify that except for the Account/region,
Name, and Network domain, all other network settings are empty, including the following:
n CIDR
n Default gateway
n DNS servers
5 From the Network menu, select the network that you just configured, for example net.23.117-
only-IPAM.
6 From the Provider menu, select the Infloblox_Integration IPAM integration point that you
created earlier in the workflow
7 From the now-visible Address Space drop-down menu, select one of the listed network
views.
The network views are obtained from your IPAM provider account. This example uses
the network subnet that you just configured, for example net.23.117-only-IPAM, the
Infloblox_Integration integration point that you created earlier in the workflow, and an
address space named default.
Listed address space values are obtained from the external IPAM provider.
8 From the list of displayed networks that are available for the selected address space, select
one or more networks, for example select 10.23.117.0/24.
For this example, the Domains and DNS Servers column values for the selected network
contain values from Infoblox.
Note If you select a network in Step 3 that had a Domain specified for vRealize Automation,
and then select a network from the external IPAM provider address space that contains a
Domain value, the Domain value in the external IPAM provider network takes precedence
over the Domain specified in vRealize Automation. If the IPAM IP range setting doesn't have
a Domain value, specified in either Cloud Assembly or in the external IPAM provider as
described above, provisioning fails.
For Infoblox, you can use the blueprint property Infoblox.IPAM.Network.dnsSuffix at the
machine level to overwrite the Domain value. For related information, see Using Infloblox-
specific properties and extensible attributes for IPAM integrations in vRealize Automation
cloud templates.
After you provision a machine by using the new address range from the external IPAM
provider, a new record will be visible in the IP Addresses table.
11 To configure a network profile to use the network, click Infrastructure > Configure > Network
Profiles.
12 Name the network profile, for example Infoblox-NP, and add the following sample settings.
n Summary tab
n Add a capability tag for the network profile, for example named infoblox_abx.
Make note of the capability tag, as you must also use it as a cloud template constraint
tag to make the provisioning association in the cloud template.
n Networks tab
n Add the network that you created earlier, for example net.23.117-only-IPAM.
Results
The network and network profile setting are now configured for an existing network type to be
used for the Infoblox IPAM integration in a cloud template design.
In this final step in the external IPAM integration workflow, you define and deploy a
cloud template that connects your previously defined network and network profile to your
organization's Infoblox account to obtain and manage IP address assignments for deployed VMs
from the external IPAM provider rather than from vRealize Automation Cloud Assembly.
This workflow uses Infoblox as the external IPAM provider and in some steps, the example values
are unique to Infoblox, although the intent is that the procedure can be applied to other external
IPAM integrations.
The Automate IPAM and DNS for VMs using VMware vRealize Automation and Infoblox DDI
Infoblox blog provides related information.
After you deploy the cloud template and the VM is started, the IP address used for each VM in
the deployment appears as a network entry in the Resources > Networks page, as a new host
record in the IPAM provider network in your IPAM provider's account, and in the vSphere Web
Client record for each deployed VM in the host vCenter.
Prerequisites
This sequence of steps is shown in the context of an external IPAM provider integration
workflow. See Tutorial: Configuring a provider-specific external IPAM integration for vRealize
Automation .
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider, for example Infoblox or
BlueCat, and that you have the correct access credentials to your organization's account with
the IPAM provider.
n Verify that you have administrator access to the host account and any role requirements
needed to display status records in the vSphere web client record for your deployed VMs in
the host vCenter.
n Verify that you have an IPAM integration point for the external IPAM provider. See Add an
external IPAM integration for Infoblox in vRealize Automation .
n Verify that you have configured a vRealize Automation Cloud Assembly network and network
profile that support external IPAM integration for your intended IPAM integration point. See
Configure a network and network profile to use external IPAM for an existing network in
vRealize Automation .
n Verify that your project and cloud zone are tagged to match tags in the IPAM integration
point and network or network profile. Optionally configure the project to support custom
resource naming.
For more information than provided about the role of a project and cloud zone, as well as
the role of other infrastructure elements in your cloud template, see Tutorial: Setting up and
testing multi-cloud infrastructure and deployments in vRealize Automation Cloud Assembly.
For more information about tagging, see How do I use tags to manage vRealize Automation
Cloud Assembly resources and deployments.
For information about custom naming VMs by using settings in your project, see How to
customize the names of deployed resources using vRealize Automation Cloud Assembly.
Procedure
1 Click Cloud templates > New, enter the following information in the New cloud template
page, and click Create.
n Name = ipam-bpa
n Project = 123VC
2 For this example, add a cloud agnostic machine component and a cloud agnostic network
component to the cloud template canvas and connect the two components.
3 Edit the cloud template code to add a constraint tag to the network component that matches
the capability tag that you added to the network profile. For this example, that tag value is
infoblox_abx.
4 Edit the cloud template code to specify that the network assignment type is static.
When using an external IPAM provider, the assignment: static setting is required.
For this example, the specified IP address 10.23.117.4 is known to be currently available in
the external IPAM address space that we selected for the network in the associated network
profile. While the assignment: static setting is required, the address: valuesetting is not. You
can choose to begin external IP address selection at a particular address value, but doing so
is not required. If you do not specify an address: value setting, the external IPAM provider
selects the next available address in the external IPAM network.
formatVersion: 1
inputs: {}
resources:
Cloud_Network_1:
type: Cloud.Network
properties:
networkType: existing
name: ipam
constraints:
- tag: infoblox_abx
Cloud_Machine_1:
type: Cloud.Machine
properties:
image: ubuntu
flavor: small
networks:
- network: '${resource.Cloud_Network_1.id}'
assignment: static
address: 10.23.117.4
name: '${resource.Cloud_Network_1.name}'
For examples of Infoblox properties that are available for specifying DNS and DHCP settings
in cloud templates, see Using Infloblox-specific properties and extensible attributes for IPAM
integrations in vRealize Automation cloud templates.
6 Click Deploy on the cloud template page, name the deployment Infoblox-1, and click Deploy
on the Deployment Type page.
7 As the cloud template is being deployed, click the Extensibility tab and select Activity >
Action Runs to see the Infoblox_AllocateIP_n extensibility action running.
After the extensibility action is completed and the machine is provisioned, the
Infloblox_Update_n action propagates the MAC address to Infoblox.
8 You can log in to and open your Infoblox account to see the new host record for the IPAM
address in the associated 10.23.117.0/24 network. You can also open the DNS tab in Infoblox
to see the new DNS host record.
9 To verify that the VM is being provisioned, log in to your host vCenter and vSphere Web
Client to locate the provisioned machine and view the DNS name and IP address.
10 To view the new network record in vRealize Automation Cloud Assembly, select
Infrastructure > Resources > Networks and click to open the IP Addresses tab.
11 If you delete the deployment, the IPAM address of VMs in the deployment are released
and the IP addresses are again available to the external IPAM provider for other
allocations. The extensibility action for this event in vRealize Automation Cloud Assembly
is Infoblox_Deallocate.
The following Infloblox properties are available for use with your Infoblox IPAM integrations in
cloud template designs and deployments. You can use them in vRealize Automation to further
control IP address allocation during cloud template deployment. Use of these properties is
optional.
These properties are available and included in the most recent version Infoblox plug-in for
vRealize Automation. For information about Infoblox plug-in versions and where to obtain the
most recent version of the Infoblox plug-in for your IPAM integration in vRealize Automation, see
Download and deploy an external IPAM provider package for use in vRealize Automation.
n Infoblox.IPAM.createFixedAddress
This property enables you to create a fixed address record inside Infoblox. Possible values
are True and False. By default, a host record is created. The default value is False.
n Infoblox.IPAM.Network.dnsView
This property enables you to use a DNS view when creating a host record inside Infoblox.
n Infoblox.IPAM.Network.enableDns
When allocating an IP in Infoblox, this property enables you to also create a DNS record.
Possible values are True and False. The default value is True.
n Infoblox.IPAM.Network.enableDhcp
You can set this option to True to enable the DHCP configuration for the host address.
n Infoblox.IPAM.Network.dnsSuffix
This property enables you to overwrite the domain DHCP option of an Infoblox network with
a new one. This capability is useful if the Infoblox network does not have the domain DHCP
option set or if the the domain DHCP option must be overwritten. The default value is null
(empty string).
When using an external IPAM provider such as Infoblox, you must specify a DNS suffix when
provisioning a machine. While the DNS suffix is required, you can specify it in either of the
following ways:
n Specify the DNS suffix on the vSphere network subnet in vRealize Automation.
n Infoblox.IPAM.Network.hostnameNicSuffix
You can use this property to specify a NIC index suffix when generating a host name.
This allows you to provision a machine with more than one NIC such that the host names for
each NIC are distinguished by a custom-defined suffix. As seen in the following example, you
can provision a machine, for example my-machine, that has 2 NICs so that the host name suffix
for the first NIC is -nic1 and the other is -nic2.
You can also specify a DNS suffix as shown in the example. The
Infoblox.IPAM.Network.dnsSuffix property is used with a value of test.local to
result in the first NIC being named my-machine-nic1.test.local and the other my-machine-
nic2.test.local.
formatVersion: 1
inputs: {}
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
Infoblox.IPAM.Network.dnsSuffix: test.local
Infoblox.IPAM.Network0.hostnameNicSuffix: -nic1
Infoblox.IPAM.Network1.hostnameNicSuffix: -nic2
image: ubuntu
flavor: small
networks:
- network: '${resource.Cloud_Network_1.id}'
deviceIndex: 0
- network: '${resource.Cloud_Network_2.id}'
deviceIndex: 1
Cloud_Network_1:
type: Cloud.Network
properties:
networkType: existing
Cloud_Network_2:
type: Cloud.Network
properties:
networkType: existing
This property was introduced with Infloblox plug-in version 1.3. See Download and deploy an
external IPAM provider package for use in vRealize Automation.
For related information about Infoblox extensible attributes relative to this use case, see
Add required extensible attributes in the Infoblox application for integration with vRealize
Automation.
n Infoblox.IPAM.Network.enableDhcp
n Infoblox.IPAM.Network.dnsView
n Infoblox.IPAM.Network.enableDns
n Infoblox.IPAM.Network.hostnameNicSuffix
For example, to use a different Infoblox.IPAM.Network.dnsView value for each NIC, use a
Infoblox.IPAM.Network<nicIndex>.dnsView entry for each NIC. The following sample shows
different values Infoblox.IPAM.Network.dnsView for two NICs.
formatVersion: 1
inputs: {}
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
Infoblox.IPAM.Network0.dnsView: default
Infoblox.IPAM.Network1.dnsView: my-net
image: ubuntu
flavor: small
networks:
- network: '${resource.Cloud_Network_1.id}'
deviceIndex: 0
- network: '${resource.Cloud_Network_2.id}'
deviceIndex: 1
Cloud_Network_1:
type: Cloud.Network
properties:
networkType: existing
Cloud_Network_2:
type: Cloud.Network
properties:
networkType: existing
By default, the Infoblox integration creates a DNS host record in the default DNS view in Infoblox.
If your Infoblox administrator has created custom DNS views, you can overwrite the default
integration behavior and specify a named view by using the Infoblox.IPAM.Network.dnsView
property in the machine component. For example, you can add the following property to the
Cloud_Machine_1 component to specify a named DNS view in Infoblox.
Cloud_Machine_1:
type: Cloud.Machine
properties:
image: ubuntu
flavor: small
Infoblox.IPAM.Network.dnsView:<dns-view-name>
For information about configuring and using DNS views, see DNS Views in Infoblox product
documentation. For examples in the Infoblox integration workflow, see Define and deploy a cloud
template that uses an external IPAM provider range assignment in vRealize Automation.
n You can specify properties in a project by using the Custom Properties section on your
Infrastructure > Administration > Projects page. Using this method, the specified properties
are applied to all machines that are provisioned in the scope of this project.
n You can specify properties on each machine component in a cloud template. Sample cloud
template code illustrating use of the Infoblox.IPAM.Network.dnsView property is shown
below:
formatVersion: 1
inputs: {}
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
Infoblox.IPAM.Network.dnsView: default
image: ubuntu
cpuCount: 1
totalMemoryMB: 1024
networks:
- network: '${resource.Cloud_Network_1.id}'
Cloud_Network_1:
type: Cloud.Network
properties:
networkType: existing
constraints:
- tag: mk-ipam-demo
vRealize Automation collects data every 10 minutes from the external IPAM system. For Infloblox,
you can filter in several ways to discover and data-collect only a subset of networks that are
used by vRealize Automation operations.
To filter data collection for networks that use Infoblox-generated IP addresses, use the following
properties on the IPAM integration tab. The filter properties are available as you create or edit
the external IPAM integration point for Infoblox.
These filters are only available with vRealize Automation 8.3 and greater and with the Infoblox
v1.3 plug-in. The Infoblox v1.3 plug-in may be used with vRealize Automation 8.1 or 8.2, but only
in select situations and with caution as described in KB article Infoblox 1.3 Compatibility with
vRealize Automation 8.x (82142).
n Infoblox.IPAM.NetworkContainerFilter
n Infoblox.IPAM.NetworkFilter
Filter on networks.
n Infoblox.IPAM.RangeFilter
These options are available for use with the vRA Cloud Infoblox plugin version 1.3.
Be cautious when applying these data collection filters to networks that have already been
data-collected. If you apply filters to prevent some networks from being data-collected, the
networks that are not collected are assumed to be unnecessary and are deleted from vRealize
Automation. The exception are networks that are associated to vRealize Automation subnets.
Previously data-collected networks that are not subsequently discovered and data-collected, for
example because they were filtered out of the data collection task, are deleted from the vRealize
Automation database. However, if the previously data-collected networks are in use in vRealize
Automation, they are not deleted.
These filters are applied as query parameters in the search requests for the different network
objects. You can use any search parameters that Infoblox supports. You filter by CIDR or
extensible attributes that are based on regular expressions or exact matches. The format uses
the Infoblox WAPI filtration format, as described in Infoblox WAPI documentation. Methods of
filtering by CIDR or extensible attributes are shown in the following examples:
n Filter based on extensible attributes for networks, IP ranges, and network containers.
n Match by regular expression (case sensitive and exclude can be combined): *Building!
~:=Data Cent / *Building~:=center
n Filter based on CIDR and extensible attributes using syntax from the above methods of
filtering. Example:
network=192.168.&*Building=Data Center
For more information about using extensible attributes and regular expressions in these
properties, see Infoblox Supported Expressions for Search Parameters and Infoblox REST API
Reference Guide.
When you configure the cloud accounts and integrations, you are configuring the communication
between Cloud Assembly and those target systems.
More details for the service roles is provided below this table.
Organization Owner Can access the console and add Organization console
users to organization.
The organization owner cannot
access a service unless they have a
service role.
More about the Organization User
Roles
Service Administrator Can access the console and has full Organization console
view, update, and delete privileges in
the service.
n Cloud Assembly Service Roles
n Service Broker Service Roles
n Code Stream Service Roles
n vRA Migration Assistant Service
Roles
n Orchestrator Service Roles
n SaltStack Config Service Role
Service User Can access the console and the Organization console
service with limited permissions.
The service member has limited
user interface. What they can see
or do depends on their project
membership.
n Cloud Assembly Service Roles
n Service Broker Service Roles
n Code Stream Service Roles
Service Viewer Can access the console and the Organization console
service in a view-only mode.
n Cloud Assembly Service Roles
n Service Broker Service Roles
n Code Stream Service Roles
n vRA Migration Assistant Service
Roles
n Orchestrator Service Roles
Executor ( vRealize Automation Code Can access the console and manage Organization console
Stream only) pipeline executions.
Code Stream Service Roles
Orchestrator Workflow Designer Can create, run, edit, and delete Organization console
(Orchestrator only) their own vRealize Orchestrator Client
content. Can add their own content
to their assigned group. Does not
have access to the administration
and troubleshooting features of the
vRealize Orchestrator Client.
Orchestrator Service Roles
Project roles Can view and manage project vRealize Automation Cloud Assembly,
resources depending on project role. vRealize Automation Service Broker,
Project roles include administrator, and vRealize Automation Code Stream
member, and viewer.
Organization and service user roles in
vRealize Automation
Custom roles The permissions are defined by the vRealize Automation Cloud Assembly
vRealize Automation Cloud Assembly and vRealize Automation Service
for all the services. Broker
The user must have at least a service
viewer role in the relevant services so
that they can access the service. The
custom roles take precedence over
the service roles.
Custom user roles in vRealize
Automation
The organization roles are global and apply to all services in the organization. The organization-
level roles are Organization owner or Organization Member role.
For more information about the organization roles, see Administering vRealize Automation
The vRealize Automation Cloud Assembly service roles, which are service-specific permissions,
are also assigned at the organization level in the console.
Service Roles
These service roles are assigned by the organization owner.
Role Description
Cloud Assembly Administrator A user who has read and write access to the entire user
interface and API resources. This is the only user role that
can see and do everything, including add cloud accounts,
create new projects, and assign a project administrator.
Cloud Assembly User A user who does not have the Cloud Assembly
Administrator role.
In a vRealize Automation Cloud Assembly project, the
administrator adds users to projects as project members,
administrators, or viewers. The administrator can also add
a project administrator.
Cloud Assembly Viewer A user who has read access to see information but cannot
create, update, or delete values. This is a read-only role
across all projects.
Users with the viewer role can see all the information that
is available to the administrator. They cannot take any
action unless you make them a project administrator or
a project member. If the user is affiliated with a project,
they have the permissions related to the role. The project
viewer would not extend their permissions the way that
the administrator or member role does.
In addition to the service roles, vRealize Automation Cloud Assembly has project roles. Any
project is available in all of the services.
The project roles are defined in vRealize Automation Cloud Assembly and can vary between
projects.
In the following tables, which tells you what the different service and project roles can see
and do, remember that the service administrators have full permission on all areas of the user
interface.
The descriptions of project roles will help you decide what permissions to give your users.
n Project administrators leverage the infrastructure that is created by the service administrator
to ensure that their project members have the resources they need for their development
work.
n Project members work within their projects to design and deploy cloud templates.
n Project viewers are restricted to read-only access, except in a few cases where they can do
non-destructive things like download cloud templates.
Table 3-2. vRealize Automation Cloud Assembly service roles and project roles
Cloud Assembly User
Cloud Cloud User must be a project administrator or
Assembly Assembly member to see and do project-related
UI Context Task Administrator Viewer tasks.
Access Cloud
Assembly
Infrastructure
View projects Yes Yes Yes. Your Yes. Your Yes. Your
projects projects projects
Table 3-2. vRealize Automation Cloud Assembly service roles and project roles (continued)
Cloud Assembly User
Cloud Cloud User must be a project administrator or
Assembly Assembly member to see and do project-related
UI Context Task Administrator Viewer tasks.
Table 3-2. vRealize Automation Cloud Assembly service roles and project roles (continued)
Cloud Assembly User
Cloud Cloud User must be a project administrator or
Assembly Assembly member to see and do project-related
UI Context Task Administrator Viewer tasks.
View machines Yes Yes Yes. Your Yes. Your Yes. Your
projects projects projects
View discovered Yes Yes Yes. Your Yes. Your Yes. Your
storage volumes projects projects projects.
View Kubernetes Yes Yes Yes. Your Yes. Your Yes. Your
clusters and projects projects projects
namespaces
View deployment Yes Yes Yes. Your Yes. Your Yes. Your
request records projects projects projects
Activity - Event View event logs Yes Yes Yes. Your Yes. Your Yes. Your
Logs projects projects projects
Table 3-2. vRealize Automation Cloud Assembly service roles and project roles (continued)
Cloud Assembly User
Cloud Cloud User must be a project administrator or
Assembly Assembly member to see and do project-related
UI Context Task Administrator Viewer tasks.
Marketplace
Extensibility
Deactivate Yes
subscriptions
Table 3-2. vRealize Automation Cloud Assembly service roles and project roles (continued)
Cloud Assembly User
Cloud Cloud User must be a project administrator or
Assembly Assembly member to see and do project-related
UI Context Task Administrator Viewer tasks.
Design
Design Open the Design tab Yes Yes Yes. Your Yes. Your Yes. Your
and see a list of projects projects projects
cloud templates
View cloud Yes Yes Yes. Your Yes. Your Yes. Your
templates projects projects projects
Download cloud Yes Yes Yes. Your Yes. Your Yes. Your
templates projects projects projects
Table 3-2. vRealize Automation Cloud Assembly service roles and project roles (continued)
Cloud Assembly User
Cloud Cloud User must be a project administrator or
Assembly Assembly member to see and do project-related
UI Context Task Administrator Viewer tasks.
View custom Yes Yes Yes. Your Yes. Your Yes. Your
resources projects projects projects
View custom actions Yes Yes Yes. Your Yes. Your Yes. Your
projects projects projects
Deployments
View deployments, Yes Yes Yes. Your Yes. Your Yes. Your
including projects projects projects
deployment details,
deployment history,
price, monitor,
alerts, optimize,
and troubleshooting
information
Alerts
View alerts Yes Yes Yes. Your Yes. Your Yes. Your
projects projects projects
Role Description
Service Broker Administrator Must have read and write access to the entire user
interface and API resources. This is the only user role that
can perform all tasks, including creating a new project and
assigning a project administrator.
Service Broker User Any user who does not have the vRealize Automation
Service Broker Administrator role.
In a vRealize Automation Service Broker project, the
administrator adds users to projects as project members,
administrators, or viewers. The administrator can also add
a project administrator.
Service Broker Viewer A user who has read access to see information but cannot
create, update, or delete values.
Users with the viewer role can see all the information that
is available to the administrator. They cannot take any
action unless you make them a project administrator or
a project member. If the user is affiliated with a project,
they have the permissions related to the role. The project
viewer would not extend their permissions the way that
the administrator or member role does.
In addition to the service roles, vRealize Automation Service Broker has project roles. Any project
is available in all of the services.
The project roles are defined in vRealize Automation Service Broker and can vary between
projects.
In the following tables, which tells you what the different service and project roles can see
and do, remember that the service administrators have full permission on all areas of the user
interface.
Use the following descriptions of project roles will help you as you decide what permissions to
give your users.
n Project administrators leverage the infrastructure that is created by the service administrator
to ensure that their project members have the resources they need for their development
work.
n Project members work within their projects to design and deploy cloud templates.
Access Service
Broker
Console In the console, you can Yes Yes Yes Yes Yes
see and open Service
Broker
Infrastructure
View projects Yes Yes Yes. Your Yes. Your Yes. Your
projects projects projects
Table 3-4. Service Broker Service Roles and Project Roles (continued)
Service Service Broker User
Service Broker Broker User must be a project administrator to
UI Context Task Administrator Viewer see and do project-related tasks.
Content and
Policies
Catalog
View available catalog Yes Yes Yes. Your Yes. Your Yes. Your
items projects projects projects
Table 3-4. Service Broker Service Roles and Project Roles (continued)
Service Service Broker User
Service Broker Broker User must be a project administrator to
UI Context Task Administrator Viewer see and do project-related tasks.
Deployments
View deployments, Yes Yes Yes. Your Yes. Your Yes. Your
including deployment projects projects projects
details, deployment
history, price, monitor,
alerts, optimize,
and troubleshooting
information
Approvals
Role Description
Code Stream Administrator A user who has read and write access to the entire user interface and API resources.
This is the only user role that can see and do everything, including create projects,
integrate endpoints, add triggers, create pipelines and custom dashboards, mark
endpoints and variables as restricted resources, run pipelines that use restricted
resources, and request that pipelines be published in vRealize Automation Service
Broker.
Code Stream Developer A user who can work with pipelines, but cannot work with restricted endpoints or
variables. If a pipeline includes a restricted endpoint or variable, this user must obtain
approval on the pipeline task that uses the restricted endpoint or variable.
Role Description
Code Stream Executor A user who can run pipelines and approve or reject user operation tasks. This user can
resume, pause, and cancel pipeline executions, but cannot modify pipelines.
Code Stream User A user who can access vRealize Automation Code Stream, but does not have any other
privileges in vRealize Automation Code Stream.
Code Stream Viewer A user who has read access to see pipelines, endpoints, pipeline executions, and
dashboards, but cannot create, update, or delete them. A user who also has the Service
viewer role can see all the information that is available to the administrator. They cannot
take any action unless you make them a project administrator or a project member. If
the user is affiliated with a project, they have the permissions related to the role. The
project viewer would not extend their permissions the way that the administrator or
member role does.
In addition to the service roles, vRealize Automation Code Stream has project roles. Any project
is available in all the services.
The project roles are defined in vRealize Automation Code Stream and can vary between
projects.
In the following tables, which tell you what the different service and project roles can see and do,
remember that the service administrators have full permission on all areas of the user interface.
Use the following descriptions of project roles to help you decide what permissions to give your
users.
n Project administrators leverage the infrastructure that is created by the service administrator
to ensure that their project members have the resources they need for their development
work. The project administrator can add members.
n Project viewers can see projects but cannot create, update, or delete them.
All actions except restricted means this role has permission to perform create, read,
update, and delete actions on entities except for restricted variables and endpoints.
Pipelines
Table 3-6. vRealize Automation Code Stream service role capabilities (continued)
Code Code
Code Stream Stream Stream Code
UI Administrator Developer Code Stream Viewer Stream
Context Capabilities role role Executor role role User role
Pipeline
Executio
ns
Custom
Integrati
ons
Endpoint
s
Mark
resources
as
restricted
Dashboar
ds
Table 3-6. vRealize Automation Code Stream service role capabilities (continued)
Code Code
Code Stream Stream Stream Code
UI Administrator Developer Code Stream Viewer Stream
Context Capabilities role role Executor role role User role
Role Description
Migration Assistant Administrator A user who has full view, update, and delete privileges in
the vRA Migration Assistant and Cloud Assembly.
This role must also have at least the Cloud Assembly
Viewer role.
Migration Assistant Viewer A user who has read access to see information but
cannot create, update, or delete values in vRA Migration
Assistant or in Cloud Assembly.
This role must also have at least the Cloud Assembly
Viewer role.
Role Description
Orchestrator Administrator A user who has full view, update, and delete privileges
in vRealize Orchestrator. An administrator can also access
the content created by specific groups.
Orchestrator Viewer A user who has read access to see features and content,
including all groups and group content, but cannot create,
update, run, delete values, or export content.
Orchestrator Workflow Designer A user who can create, run, edit, and delete their own
vRealize Orchestrator Client content. They can add their
own content to their assigned group. The workflow
designer does not have access to the administration
and troubleshooting features of the vRealize Orchestrator
Client.
Role Description
SaltStack Config Administrator A user who can access the SaltStack Config tile on the
console when the integration with Cloud Assembly is
configured. To log in on the SaltStack Config instance, the
user must have SaltStack administrator permissions that
are defined in SaltStack Config.
The user must also have the Cloud Assembly
Administrator role.
n View. A user assigned to a role with this permission can see all the items for all projects in the
selected sections of the user interface. This role is useful for users who need to see accounts,
configurations, or assigned values.
n Manage. A user assigned to a role with this permission can see all the items and has full add,
edit, and delete permissions for all projects in the selected sections of the user interface.
These permissions extend the privileges that are granted by the other roles and are not
restricted by project membership. For example, you can expand a project administrator's
permissions to manage parts of the infrastructure or give a service viewer an ability to review
and respond to approvals requests.
To define the user roles and assign users, open vRealize Automation Cloud Assembly or vRealize
Automation Service Broker as a service administrator and select Infrastructure > Administration
> Custom Roles. You cannot configure the custom roles in vRealize Automation Code Stream,
however the roles apply to all the services.
Infrastructure
Catalog
View Content
Policies
Deployments
Cloud Templates
XaaS
Extensibility
Pipeline
Approval
Use cases: How can user roles help me control access in vRealize
Automation
As a cloud administrator, you want to control the tasks that your users can perform in
vRealize Automation. Depending on your management goals and application development team
responsibilities, there are different ways that you can configure the user roles to support those
goals.
The following vRealize Automation Cloud Assembly and vRealize Automation Service Broker
examples are based on three use cases. These examples provide only enough instruction to
illustrate the application of users roles.
The target audience for these use cases is the cloud administrator, who is also considered the
cloud administrator, and the service administrators.
The use cases build on each other. If you are ready to go directly to use case 3, you might
need to review use cases 1 and 2 to better understand why you configure the roles in the ways
specified.
The purpose of the use cases is to demonstrate user roles, not to provide detailed information
about configuring your infrastructure, managing projects, creating cloud templates, and working
with deployments.
Before you begin, you must understand the levels of user roles that are configured by a cloud
administrator in the vRealize Automation Console.
n Organization Roles
As an organization owner, you must ensure that all users of any of the services are assigned
at least an organization member role.
Role Description
Organization Owner An administrator can add users, change the role of users, and remove users from the
organization. The owner manages which services users have access to.
Organization Member A general user can log in to the organization console. To access the services, an
organization owner must assign the users service roles.
n Service Roles
The service roles control who can access their assigned services.
As an organization owner, you must ensure that the users who need access to the services
are assigned the appropriate role. You use the roles to control how much the user can do in
each service.
Role Description
Cloud Assembly Administrator A user who has read and write access to the entire user
interface and API resources. This is the only user role
that can see and do everything, including add cloud
accounts, create new projects, and assign a project
administrator.
Cloud Assembly User A user who does not have the Cloud Assembly
Administrator role.
In a vRealize Automation Cloud Assembly project,
the administrator adds users to projects as project
members, administrators, or viewers. The administrator
can also add a project administrator.
Cloud Assembly Viewer A user who has read access to see information but
cannot create, update, or delete values. This is a read-
only role across all projects.
Users with the viewer role can see all the information
that is available to the administrator. They cannot
take any action unless you make them a project
administrator or a project member. If the user is
affiliated with a project, they have the permissions
related to the role. The project viewer would not
extend their permissions the way that the administrator
or member role does.
Role Description
Service Broker Administrator Must have read and write access to the entire user
interface and API resources. This is the only user role
that can perform all tasks, including creating a new
project and assigning a project administrator.
Service Broker User Any user who does not have the vRealize Automation
Service Broker Administrator role.
In a vRealize Automation Service Broker project,
the administrator adds users to projects as project
members, administrators, or viewers. The administrator
can also add a project administrator.
Service Broker Viewer A user who has read access to see information but
cannot create, update, or delete values.
Users with the viewer role can see all the information
that is available to the administrator. They cannot
take any action unless you make them a project
administrator or a project member. If the user is
Role Description
Role Description
Code Stream A user who has read and write access to the entire user interface and API resources.
Administrator This is the only user role that can see and do everything, including create projects,
integrate endpoints, add triggers, create pipelines and custom dashboards, mark
endpoints and variables as restricted resources, run pipelines that use restricted
resources, and request that pipelines be published in vRealize Automation Service
Broker.
Code Stream Developer A user who can work with pipelines, but cannot work with restricted endpoints
or variables. If a pipeline includes a restricted endpoint or variable, this user must
obtain approval on the pipeline task that uses the restricted endpoint or variable.
Code Stream Executor A user who can run pipelines and approve or reject user operation tasks. This user
can resume, pause, and cancel pipeline executions, but cannot modify pipelines.
Code Stream User A user who can access vRealize Automation Code Stream, but does not have any
other privileges in vRealize Automation Code Stream.
Code Stream Viewer A user who has read access to see pipelines, endpoints, pipeline executions, and
dashboards, but cannot create, update, or delete them. A user who also has the
Service viewer role can see all the information that is available to the administrator.
They cannot take any action unless you make them a project administrator or a
project member. If the user is affiliated with a project, they have the permissions
related to the role. The project viewer would not extend their permissions the way
that the administrator or member role does.
The project membership determines what infrastructure resources and cloud templates are
available.
Project membership is defined in the service by a user with a service administrator role. The
service administrator must ensure that the users who need access to one or more projects
are assigned the appropriate project role in each project.
Role Description
n Custom roles
The custom roles are created by the vRealize Automation Cloud Assembly to refine the
member and viewer roles.
The procedures provided in these use cases are meant to highlight the user roles. They are not
detailed or definitive procedures for setting up vRealize Automation.
As you configure roles, remember that users who are running API operations are subject to the
roles that you assign here.
Prerequisites
n Verify that you have the Organization Owner role. You must see the Identity and Access
Management tab with you log in to the console. If not, contact the organization owner.
n Verify that you have the service administrator role for the various services. If you are not
certain about your role, contact the organization owner.
When you install vRealize Automation, your Active Directory users are added as part of the
process.
n For a more detailed task and role list for various roles, see Organization and service user roles
in vRealize Automation.
Procedure
1 User role use case 1: Set up the vRealize Automation user roles to support a small
application development team
As a vRealize Automation cloud administrator, you are responsible for managing the
access and the budget for your infrastructure resources. You add yourself and two others
as administrators. This small team can create the infrastructure and develop the cloud
templates that match the business goals of the teams that consume the cloud templates.
You and your small team of administrators then deploy the cloud templates for your non-
administrator consumers. You don't allow non-administrators to access vRealize Automation.
2 User role use case 2: Set up vRealize Automation user roles to support larger development
teams and the catalog
As a vRealize Automation organization owner, you are responsible for managing the access
and the budget for your infrastructure resources. You have a team of cloud template
developers who iteratively create and deploy templates for different projects until they
are ready to deliver to their consumers. You then deliver the deployable resources to the
consumers in a catalog.
3 User role use case 3: Set up vRealize Automation custom user roles to refine system roles
As a vRealize Automation organization owner or service administrator, you manage user
access using the organization and service system roles. However, you also want to create
custom roles to that selected users and perform tasks or see content that is outside of their
system roles.
User role use case 1: Set up the vRealize Automation user roles to support a
small application development team
As a vRealize Automation cloud administrator, you are responsible for managing the access and
the budget for your infrastructure resources. You add yourself and two others as administrators.
This small team can create the infrastructure and develop the cloud templates that match the
business goals of the teams that consume the cloud templates. You and your small team of
administrators then deploy the cloud templates for your non-administrator consumers. You don't
allow non-administrators to access vRealize Automation.
In this use case, you are the organization owner and you have a small team where they all have
the service administrator role.
The following procedure follows one user all the way through the process. You can do each step
for multiple users.
Prerequisites
n Verify that you meet all the prerequisites stipulated in the use case introduction. See Use
cases: How can user roles help me control access in vRealize Automation.
Procedure
The organization member role ensures that the user can access the console and any
services that you add them to. They cannot manage organization users.
Leave the Edit Role page open for this user and continue to the next step.
2 Assign Cloud Assembly Administrator role to yourself and to the one or two other
administrators in this scenario.
The service administrator role has full privileges to add, edit, and delete infrastructure,
projects, cloud templates, and deployments. Defining an administrator role for one person
and the user role for a different person is covered in Scenario 2. This example uses Sylvia.
a Click Add Service Access.
Service Role
3 Create a project in Cloud Assembly that you use to group resources and manage resource
billing for different business groups.
a In the console, click the Services tab, and then click Cloud Assembly.
This user role use case is focused on providing examples of how you can implement user
roles, not on creating the fully defined system.
For information about configuring the infrastructure, see Chapter 4 Building your vRealize
Automation Cloud Assembly resource infrastructure. For more about projects, see
Chapter 5 Adding and managing vRealize Automation Cloud Assembly projects.
e Enter email addresses for the individuals who can help you build and manage the
infrastructure and cloud templates.
As vRealize Automation Cloud Assembly administrators, these two users already have
administrator access to the cloud accounts, infrastructure, and all projects. This step helps
you understand the roles used in the later scenarios. In the later scenarios, you define
project administrator and project member roles, which have different permissions.
g Click the Provisioning tab and add one or more cloud zones.
4 Develop a simple cloud template so that you can test the WebAppTeam project.
This cloud template section is abbreviated. The focus is users and user roles as defined by
projects, not how to create a cloud template.
a Select Cloud Templates > New.
This setting ensures that the cloud template is only available to project members. When
you are ready to provide the cloud templates to other teams, you can select Allow an
administrator to share with any project in this organization. Sharing the cloud template
with other projects means that you do not have to maintain duplicate instances of the
same base templates. You can move cloud templates from development projects to
production projects so that catalog consumers can deploy to production infrastructure
resources.
e Click Create.
f In the cloud template designer, drag the Cloud Agnostic > Machine component to the
canvas.
For more about configuring cloud templates, see Chapter 6 Designing your vRealize
Automation Cloud Assembly deployments.
g Click Deploy.
h Continue iterating on the cloud template until you are ready to provide it to your
consumers.
5 Send the users the log in information using your most common method.
Results
In this use case, you made your two colleagues organization members. You then made Sylvia
a vRealize Automation Cloud Assembly administrator. You made Tony a WebApp project
administrator. This user role configuration only works for small teams where you deliver
deployed applications to your consumers rather than providing them with self-service access
or a catalog.
User role use case 2: Set up vRealize Automation user roles to support larger
development teams and the catalog
As a vRealize Automation organization owner, you are responsible for managing the access and
the budget for your infrastructure resources. You have a team of cloud template developers who
iteratively create and deploy templates for different projects until they are ready to deliver to
their consumers. You then deliver the deployable resources to the consumers in a catalog.
This use case assumes that you understand that use case 1 is an administrator-only use case. You
now want to expand your system to support more teams and larger goals.
n Let developers create and deploy their own application cloud templates during development.
You add yourself as administrator, then add additional users with both the service user and
the service viewer role. Next, you add the users a as project members. The project members
can develop and deploy their own cloud templates.
n Publish cloud templates to a catalog where you make them available for non-developers
to deploy. Now you are assigning user roles for Service Broker. Service Broker provides a
catalog for the cloud template consumers. You can also use it to create policies, including
leases and entitlements, but that functionality is not part of this user role use case.
Prerequisites
n Review first use case. See User role use case 1: Set up the vRealize Automation user roles to
support a small application development team.
n Identify the following users based on what permissions you want them to have:
n cloud template developers who will be vRealize Automation Cloud Assembly users and
viewers
Procedure
If you need instructions, see the User role use case 1: Set up the vRealize Automation user
roles to support a small application development team.
2 Assign the vRealize Automation Cloud Assembly service member role to your cloud template
developers.
Service Role
In this use case, your developers need to see the infrastructure to ensure that they
are building deployable cloud templates. As users that you will assign as project
administrators and project members in the next step, they cannot see the infrastructure.
As service viewers they can see how the infrastructure is configured, but cannot make
any changes. As the cloud administrator, you remain in control, but give them access to
the information they need to develop cloud templates.
3 Create projects in vRealize Automation Cloud Assembly that you use to group resources
users.
In this use case, you create two projects. The first project is PersonnelAppDev and the
second is PayrollAppDev.
a In the console, click the Services tab, and then click Cloud Assembly.
f For the users that you are adding as project members, enter the email address of each
user, separated by a comma, and select User in the Assign role drop-down menu.
g For the designated administrators, select Administrator in the Assign role drop-down
menu and provide the necessary email address.
h Click the Provisioning tab and add one or more cloud zones.
When the cloud template developers who are part of this project deploy a template, it is
deployed to the resources available in the cloud zones. You must ensure that the cloud
zone resources match the needs of the project development team templates.
i Repeat the process to add the PayrollAppDev project with the necessary users and an
administrator.
4 Provide the service user with the necessary login information and verify that the members of
each project can do the following tasks.
c Create a cloud template for the project that they are a member of.
d Deploy the cloud template to the cloud zone resources defined in the project.
If you need instructions, see the User role use case 1: Set up the vRealize Automation user
roles to support a small application development team.
6 Assign roles to a catalog administrator, catalog consumers, and cloud template developers
based on their job.
This role might be you, the cloud administrator, or it might be someone else on your
application development team.
Service Role
Service Role
Service Role
Cloud AssemblyvRealize Automation Cloud Assembly vRealize Automation Cloud Assembly User
7 Create projects in vRealize Automation Cloud Assembly that you use to group resources and
users.
In this use case, you create two projects. The first project is PersonnelAppDev and the
second is PayrollAppDev.
If you need instructions, see the User role use case 2: Set up vRealize Automation user roles
to support larger development teams and the catalog.
If you need instructions, see the User role use case 1: Set up the vRealize Automation user
roles to support a small application development team.
9 Import a vRealize Automation Cloud Assembly cloud template into vRealize Automation
Service Broker.
You must log in as a user with the vRealize Automation Service Broker Administrator role.
a Log in as a user with the vRealize Automation Service Broker Administrator role.
c Select Content and Policies > Content Sources, and click New.
f In the Source project drop-down menu, select PersonnelAppDev and click Validate.
Although the cloud template is already associated with a project, you share it in vRealize
Automation Service Broker to make it available in the catalog.
a Continue as a user with the vRealize Automation Service Broker administrator role.
b In vRealize Automation Service Broker, select Content and Policies > Content Sharing.
c Select the PersonnelAppDev project, which includes the users who must be able to deploy
the cloud template from the catalog.
d Click Add Items and then select the PersonnelApp cloud template to share with the
project members.
e Click Save.
11 Verify that the cloud template is available in the vRealize Automation Service Broker catalog
to the project members.
a Request that a project member log in and click the Catalog tab.
12 Verify that the project member can monitor the deployment process.
a Request that the project member click the Deployments tab and locate their provisioning
request.
b When the cloud template is deployed, verify that the requesting user access the
application.
Results
In this use case, recognizing that need to delegate the cloud template development to the
developers, you add more organization members. You made them vRealize Automation Cloud
Assembly users. You then made them members of relevant projects so that they can create and
deploy cloud templates. As project members, they cannot see or alter the infrastructure that
you continue to manage, but you gave them full service viewer permissions sot that they could
understand the constraints of infrastructure that they are designing for.
In this use case, you configure users with various roles, including the vRealize Automation Service
Broker administrator and users. You then provide the non-developer users with the vRealize
Automation Service Broker catalog.
What to do next
To learn how to define and assign custom roles to user, see User role use case 3: Set up vRealize
Automation custom user roles to refine system roles.
User role use case 3: Set up vRealize Automation custom user roles to refine
system roles
As a vRealize Automation organization owner or service administrator, you manage user access
using the organization and service system roles. However, you also want to create custom roles
to that selected users and perform tasks or see content that is outside of their system roles.
This scenario assumes that you understand the service user and viewer, and the project member
and viewer roles that are defined in use case 2. You can see that they are more restrictive than
the service and project administrator roles used in use case 1. Now you have identified some
local use cases where you want some users to have full management permissions to on some
features, view permissions on others, and you do not want them to even view yet another set of
features. You use custom roles define those permission.
This use case is based on three possible local use cases. This procedure shows you how to
create permissions for the following custom roles.
n Restricted Infrastructure Administrator. You want some service users, who are not service
administrators, to have broader infrastructure permissions. As the administrator, you want
them to help set up cloud zones, images, and flavors. You also want them to be able on
on-board and manage discovered resources. Notice they cannot add cloud accounts or
integrations, they can only define the infrastructure for those endpoints.
n Extensibility Developer. You want some service users to have full permissions to use the
extensibility actions and subscriptions as part of cloud template development for their project
team and for other projects. They will also develop custom resource types and custom
actions for multiple projects.
n XaaS Developer. You want some service users to have full permissions to develop custom
resource types and custom actions for multiple projects.
n Deployment Troubleshooter. You want your project administrators to have permissions they
need to troubleshoot and perform root cause analysis on failed deployments. You give
them manage permissions on non-destructive or less expensive categories such as image
and flavor mappings. You also want the project administrators to have permission to set
approvals and day 2 policies as part of the failed deployment troubleshooting role.
Prerequisites
n Review the vRealize Automation Cloud Assembly and vRealize Automation Service Broker
service roles and project roles tables in What are the vRealize Automation user roles. You
must understand what each service user role can see and do in those services.
n Review the Custom user roles in vRealize Automation descriptions so that you know more
about how you can refine the permissions for your users.
n Review the first use case so that you understand organization roles and the service
administrator roles. See User role use case 1: Set up the vRealize Automation user roles to
support a small application development team.
n Review the second use case so that you understand the service user and project member
roles. See User role use case 2: Set up vRealize Automation user roles to support larger
development teams and the catalog.
n Familiarize yourself with vRealize Automation Service Broker. See Adding content to the
catalog.
Procedure
If you need instructions, see the User role use case 1: Set up the vRealize Automation user
roles to support a small application development team.
2 Assign vRealize Automation Cloud Assembly and vRealize Automation Service Broker service
roles for your cloud template developers and catalog consumers.
If you need instructions, see the User role use case 2: Set up vRealize Automation user roles
to support larger development teams and the catalog.
3 Create projects in vRealize Automation Cloud Assembly that you use to group resources and
users.
The steps below for the custom roles also includes project roles.
If you need instructions for creating projects, see the User role use case 2: Set up vRealize
Automation user roles to support larger development teams and the catalog.
If you need instructions, see the User role use case 1: Set up the vRealize Automation user
roles to support a small application development team.
In this example, you have a user, Tony, who is expert at setting up the infrastructure for
various projects, but you don't want to give him full service permissions. Instead, Tony
builds the core infrastructure the supports the work of all the projects. You give him limited
infrastructure management permissions. Tony, or an outside contractor, might also have
similar permissions for onboarding discovered machines and bringing them under vRealize
Automation management.
a Add Tony to vRealize Automation Cloud Assembly as a service user and viewer.
With his viewer permissions, he can see the underlying cloud accounts and integrations if
he needs to troubleshoot his work, but he cannot make changes.
c To create the custom role, select Infrastructure > Administration > Custom Roles, and
click New Custom Role.
d Enter the name Restricted Infrastructure Administrator and select the following
permissions.
Infrastructure > Manage Cloud Create, update, and delete cloud zones.
Zones
Infrastructure > Manage Flavor Create, update, and delete flavor mappings.
Mappings
Infrastructure > Manage Image Create, update, and delete image mappings.
Mappings
e Click Create.
f On the Custom Roles page, select the Restricted Infrastructure Administrator role and
click Assign.
h Have Tony verify that when he logs in, he can add, edit, and delete values in the areas
defined by the custom role.
In this example, you have several cloud template developers, Sylvia and Igor, who are
knowledgeable about how to use extensibility actions and subscriptions to manage daily
development tasks. They are also experienced with vRealize Orchestrator, so you task
them with providing custom resources and actions for various projects. You give them
additional permissions manage extensibility by managing custom resources and actions, and
by managing extensibility actions and subscriptions.
a Add Sylvia and Igor as vRealize Automation Cloud Assembly users.
b Add them as members of the projects that they are contributing their extensibility skills
to.
c Create a custom user role that you name Extensibility Developer and select the
following permissions.
XaaS > Manage Custom Resources Create, update, or delete custom resources.
XaaS > Manage Resource Actions Create, update, or delete custom actions.
Extensibility > Manage Create, update, or delete extensibility actions and subscriptions. Disable
Extensibility Resources subscriptions. Cancel and delete action runs.
d Click Create.
f Verify that Sylvia and Igor can manage the custom resources and actions, and that they
can manage the various options on the Extensibility tab.
In this example, you give your project administrators more manage permission so that they
can remedy deployment failures for their teams.
a Add your project administrators, Shauna, Pratap, and Wei, as vRealize Automation Cloud
Assembly and vRealize Automation Service Broker service users.
c Create a custom user role that you name Deployment Troubleshooter and select the
following permissions.
Infrastructure > Manage Flavor Create, update, and delete flavor mappings.
Mappings
Infrastructure > Manage Image Create, update, and delete image mappings.
Mappings
Deployments > Manage View all deployments, across projects, and run all day 2 actions on
Deployments deployments and deployment components.
d Click Create.
f Verify that they can manage flavor mappings, image mappings, and policies in vRealize
Automation Service Broker.
Results
In this use case, you configure different users with various roles, including custom roles that
expand their service and project roles.
What to do next
The collected data includes the regions that you later associate with cloud zones.
When you later configure cloud zones, mappings, and profiles, you select the cloud account to
which they are associated.
As a cloud administrator, you create cloud accounts for the projects in which team members
work. Resource information such as network and security, compute, storage, and tags content is
data-collected from your cloud accounts.
Note If the cloud account has associated machines that have already been deployed in the
region, you can bring those machines into vRealize Automation Cloud Assembly management
by using an onboarding plan. See What are onboarding plans in vRealize Automation Cloud
Assembly.
If you remove a cloud account that is used in a deployment, resources that are part of that
deployment become unmanaged.
For all vCenter Server-based cloud accounts - including NSX-V, NSX-T, vCenter, and VMware
Cloud on AWS - the administrator must have vSphere endpoint credentials, or the credentials
under which the agent service runs in vCenter, that provide administrative access to the host
vCenter Server.
For more information about vSphere agent requirements, see VMware vSphere product
documentation.
Table 3-15. Privileges Required for vSphere Agent to Manage vCenter Server Instance
Table 3-15. Privileges Required for vSphere Agent to Manage vCenter Server Instance
(continued)
Table 3-15. Privileges Required for vSphere Agent to Manage vCenter Server Instance
(continued)
For all vCenter Server-based cloud accounts - including NSX-V, NSX-T, vCenter, and VMware
Cloud on AWS - the administrator must have vSphere endpoint credentials, or the credentials
under which the agent service runs in vCenter, that provide administrative access to the host
vCenter Server.
For more information about vSphere agent requirements, see VMware vSphere product
documentation.
Table 3-16. Privileges Required for vSphere Agent to Manage vCenter Server Instance
Table 3-16. Privileges Required for vSphere Agent to Manage vCenter Server Instance
(continued)
Table 3-16. Privileges Required for vSphere Agent to Manage vCenter Server Instance
(continued)
Configure Microsoft Azure for use with vRealize Automation Cloud Assembly
You must gather some information and perform some configuration in order to create a Microsoft
Azure cloud account in vRealize Automation Cloud Assembly.
Procedure
1 Locate and record your Microsoft Azure subscription and tenant IDs.
n Subscription ID - Click the Subscriptions icon on the left toolbar in your Azure portal to
view the subscription ID.
n Tenant ID - Click the Help icon and select Show Diagnostics in your Azure portal. Search
for tenant and record the ID when you have located it.
2 You can create a new storage account and a resource group to get started. Alternatively,
you can create these in blueprints later.
1 In your Azure portal, locate the Storage Accounts icon on the sidebar. Make sure
the correct subscription is selected and click Add. You can also, search for storage
account in the Azure search field.
2 Enter the required information for the storage account. You will need your
subscription ID.
3 Select whether to use an existing resource group or create a new one. Make note of
your resource group name, as you will need it later.
Note Save the location of your storage account as you will need it later.
3 Create a virtual network. Alternatively, if you have a suitable existing network, you can select
that one.
If you are creating a network, you must select Use an Existing Resource Group and specify
the group that you created in the preceding step. Also, select the same location that you
specified previously. Microsoft Azure will not deploy virtual machines or other objects if the
location doesn't match between all applicable components that the object will consume.
a Locate the Virtual Network icon on the left panel and click it or search for virtual network.
Make sure to select the correct subscription and click Add.
b Enter a unique name for your new virtual network and record it for later.
c Enter the appropriate IP address for your virtual network in the Address space field.
f You can modify the other options as necessary, but for most configurations, you can
leave the defaults.
g Click Create.
a Locate the Active Directory icon on the Azure left menu and click it.
c Type a name for your application that complies with Azure name validation.
e The Sign-on URL can be anything that is appropriate for your usage.
f Click Create.
b Click All Settings in the next pane and select Keys from the settings list.
d Click Save and make sure to copy the key value to a safe location as you will be unable to
retrieve it later.
e On the left menu, select API Permissions for the application and click Add a Permission
to create a new permission.
h Under Select permissions select user_impersonation and then click Add Permissions.
6 Authorize your Active Directory application to connect to your Azure subscription so that you
can deploy and manage virtual machines.
a In the left menu, click the Subscriptions icon, and select your new subscription.
You may need to click on the text of the name to get the panel to slide over.
b Select the Access control (IAM) option to see the permissions to your subscription.
g Click Save.
h Add additional roles so that your new application has Owner, Contributor, and Reader
roles.
What to do next
You must install the Microsoft Azure command line interface tools. These tools are freely
available for both Windows and Mac operating systems. See the Microsoft documentation for
more information about downloading and installing these tools.
When you have the command line interface installed, you must authenticate to your new
subscription.
1 Open a terminal window and type your Microsoft Azure login. You will receive a URL and a
shortcode that will allow you to authenticate.
2 In a browser, enter the code that you received from the application on your device.
If you have multiple subscriptions, ensure that the correct one is selected using the azure
account set <subscription-name> command.
5 Before you proceed, you must register the Microsoft.Compute provider to your new Azure
subscription using the azure provider register microsoft.compute command.
If the command times out and generates an error the first time your run it, run it again.
When you have completed configuration, you can use the azure vm image list command to
retrieve available virtual machine image names. You can choose the desired image and record
the URN provided for it and later use it in blueprints.
To view an example use case of how Microsoft Azure cloud account works in vRealize
Automation see Tutorial: Setting up and testing multi-cloud infrastructure and deployments in
vRealize Automation Cloud Assembly.
Prerequisites
n Verify that you have the required administrator credentials and have enabled HTTPS
access on port 443. See Credentials required for working with cloud accounts in vRealize
Automation.
n Verify that you have the required user role. See What are the vRealize Automation user roles.
n Configure a Microsoft Azure account for use with vRealize Automation. See Configure
Microsoft Azure for use with vRealize Automation Cloud Assembly.
n If you do not have external Internet access, configure an Internet server proxy. See How do I
configure an Internet proxy server for vRealize Automation.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts and click Add Cloud Account.
2 Select the Microsoft Azure account type and enter credentials and other values.
3 Click Validate.
5 For efficiency, click Create a Cloud zone for the selected regions.
6 If you need to add tags to support a tagging strategy, enter capability tags. See How do I
use tags to manage vRealize Automation Cloud Assembly resources and deployments and
Creating a tagging strategy.
For more information about how capability tags and constraint tags help control
deployment placements, see the Constraint Tags and Placement video tutorial.
7 Click Save.
Results
The account is added to vRealize Automation, and the selected regions are available for the
specified cloud zone.
What to do next
When you add an Azure cloud account to a cloud template, you can choose to reuse
availability sets if you want. Subscriptions have a limit of 2000 availability sets and 25,000
virtual machines, so it makes sense to reuse availability sets when possible. There are two
YAML properties that you can use to control how deployments use availability sets. The
availabilitySetName property enables you to specify an availability set to use. The second
property is doNotAttachAvailabilitySet which is set to false by default. If this property is set to
true, vRealize Automation will create the deployment with no availability set.
You cannot create a deployment without an availability set if you use a load balancer attached to
the virtual machine.
The following table describes how vRealize Automation behaves depending on whether a
resource group and an availability set are specified in the cloud template.
An availability set cannot exist without being part of a resource group. The availability sets in a
given resource group must have unique names. Availability sets can have the same name only if
they are part of different resource groups.
If you do not specify a resource group name, then vRealize Automation will create a new
resource group, which means that a new availability set must also be created even if a name
is passed. The new set will use the name that is passed.
Table 3-17.
vRealize Automation Cloud Assembly supports Azure disk snapshots for deployed virtual
machines. The following functionalities are supported.
n Create a disk snaphot - supported for both external and compute disks
The vRealize Automation Cloud Assembly options for creating and deleting disk snapshots for
deployed virtual machines appear on the Deployments page Actions menu for Azure-based
deployments.
For authorized users, AWS cloud accounts support access to the AWS GovCloud configuration.
This configuration supports most of the standard vRealize Automation cloud account
functionality with regard to project configuration, tags, and infrastructure. In Cloud Assembly
cloud templates, it does support use of AWS Platform as a Service (PaaS) properties.
Prerequisites
n Verify that you have the required administrator credentials and have enabled HTTPS
access on port 443. See Credentials required for working with cloud accounts in vRealize
Automation.
n Verify that you have the required user role. See What are the vRealize Automation user roles.
n If you do not have external Internet access, configure an Internet server proxy. See How do I
configure an Internet proxy server for vRealize Automation.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts and click Add Cloud Account.
2 Select the AWS account type, and enter credentials and other values.
3 Click Validate.
5 For efficiency, click Create a Cloud zone for the selected regions.
6 If you need to add tags to support a tagging strategy, enter capability tags. See How do I
use tags to manage vRealize Automation Cloud Assembly resources and deployments and
Creating a tagging strategy.
For more information about how capability tags and constraint tags help control
deployment placements, see the Constraint Tags and Placement video tutorial.
7 Click Add.
Results
The account is added to vRealize Automation, and the selected regions are available for the
specified cloud zone.
What to do next
Prerequisites
n Verify that you have the required administrator credentials and have enabled HTTPS
access on port 443. See Credentials required for working with cloud accounts in vRealize
Automation.
n Verify that you have the required user role. See What are the vRealize Automation user roles.
n Verify that you have access to the Google Cloud Platform JSON security key.
n Verify that you have required security information for your Google Cloud Platform
instance. You can obtain most of this information from your instance or from the Google
documentation.
n If you do not have external Internet access, configure an Internet server proxy. See How do I
configure an Internet proxy server for vRealize Automation.
Procedure
1 In vRealize Automation Cloud Assembly, select Infrastructure > Connections > Cloud
Accounts and click Add Cloud Account.
2 Select the Google Cloud Platform account type and enter the appropriate credentials and
related information. Use the service account that was created when the source GCP account
compute engine was initialized.
In vRealize Automation, the project ID is part of the Google Cloud Platform endpoint. You
specify it when you create the cloud account. During data collection of project-specific
private images, the vRealize Automation GCP adapter queries the Google Cloud Platform
API.
3 Click Validate.
5 For efficiency, click Create a Cloud zone for the selected regions.
6 If you need tags to support a tagging strategy, enter capability tags. See How do I use tags
to manage vRealize Automation Cloud Assembly resources and deployments and Creating a
tagging strategy.
For more information about how capability tags and constraint tags help control
deployment placements, see the Constraint Tags and Placement video tutorial.
7 Click Add.
Results
The account is added to vRealize Automation, and the selected regions are available for the
specified cloud zone.
What to do next
The following paragraphs provide some information on deploying a Google Cloud Platform virtual
machine from vRealize Automation Cloud Assembly.
When you add a Google Cloud Platform cloud account to a Cloud Assembly cloud template, you
can use the useSoleTenant YAML property to indicate that you want to deploy a virtual machine
to a sole tenant node. This configuration enables you to isolate virtual machines for security,
privacy or others issues.
To facilitate this functionality, Google Cloud Platform node affinity labels are converted to tags
in Cloud Assembly, and these tags are applied on relevant vRealize Automation availability zones
where node groups reside. When the useSoleTenant property is set to true, constraint tags must
be one of the node affinity labels. Also, to deploy a machine in sole tenant mode, you must
include the useSoleTenant property in the cloud template as well as the constraint tags.
Before using this feature, you must create the appropriate node template and node affinity labels
inGoogle Cloud Platform and then create a node group.
The following YAML example shows how the useSoleTenant property can be used in Cloud
Assembly cloud templates. The constraint tags are the node affinity labels that were auto-
collected from your Google Cloud Platform server.
resources:
Cloud_GCP_Machine_1:
type: Cloud.GCP.Machine
properties:
image: ubuntu
flavor: c2-family
name: demo-vm
useSoleTenant: true
constraints:
-tag: 'env:prod'
-tag: 'region:asia-east1'
For network and security purposes, you can associate a vCenter cloud account with an NSX-T or
NSX-V cloud account.
An NSX-T cloud account can be associated to one or more vCenter cloud accounts. However, an
NSX-V cloud account can only be associated to one vCenter cloud account.
Prerequisites
n Verify that you have the required administrator credentials and have enabled HTTPS
access on port 443. See Credentials required for working with cloud accounts in vRealize
Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have properly configured your ports and protocols to support the
cloud account. See the Ports and Protocols for vRealize Automation topic in Installing
vRealize Automation with vRealize Easy Installer and the Port Requirements topic in
vRealize Automation Reference Architecture Guide in the vRealize Automation product
documentation.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts and click Add Cloud Account.
2 Select the vCenter account type and enter the vCenter Server host IP address.
All data centers that are associated with the account are data-collected. The following
elements are data-collected, as are all vSphere tags for the following elements:
n Machines
n Port groups
n Data stores
4 Select at least one of the available data centers on the specified vCenter Server to allow
provisioning for this cloud account.
5 For efficiency, create a cloud zone for provisioning to the selected data centers.
You can also create cloud zones as a separate step according to your organization's cloud
strategy.
For information about cloud zones, see Learn more about vRealize Automation Cloud
Assembly cloud zones.
You can select the NSX account now, or later when you edit the cloud account.
For information about NSX-V cloud accounts, see Create an NSX-V cloud account in vRealize
Automation.
For information about NSX-T cloud accounts, see Create an NSX-T cloud account in vRealize
Automation.
For information about making association changes after you have deployed a cloud template,
see What happens if I remove an NSX cloud account association in vRealize Automation.
7 If you want to add tags to support a tagging strategy, enter capability tags.
You can add tags now, or later when you edit the cloud account. For information about
tagging, see How do I use tags to manage vRealize Automation Cloud Assembly resources
and deployments.
For more information about how capability tags and constraint tags help control
deployment placements, see the Constraint Tags and Placement video tutorial.
8 Click Save.
Results
The cloud account is added and the selected data centers are available for the specified cloud
zone. Collected data such as machines, networks, storage, and volumes is listed in the Resources
section of the Infrastructure tab.
What to do next
Configure remaining infrastructure resources for this cloud account. See Chapter 4 Building your
vRealize Automation Cloud Assembly resource infrastructure.
An NSX-V cloud account can only be associated to one vCenter cloud account.
The association between NSX-V and a vCenter cloud account must be configured outside of
vRealize Automation, specifically in your NSX application. vRealize Automation doesn't create the
association between NSX and vCenter. In vRealize Automation, you specify an association that
already exists in NSX.
Prerequisites
n Verify that you have the required administrator credentials and have enabled HTTPS
access on port 443. See Credentials required for working with cloud accounts in vRealize
Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have a vCenter cloud account to use with this NSX cloud account. See Create
a vCenter cloud account in vRealize Automation.
n Verify that you have properly configured your ports and protocols to support the
cloud account. See the Ports and Protocols for vRealize Automation topic in Installing
vRealize Automation with vRealize Easy Installer and the Port Requirements topic in
vRealize Automation Reference Architecture Guide in the vRealize Automation product
documentation.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts and click Add Cloud Account.
2 Select the NSX-V account type and enter the NSX-V host IP address.
4 If available, select the vCenter endpoint that represents the vCenter cloud account that you
are associating with this NSX-V account.
Only vCenter cloud accounts that are not currently associated to an NSX-T or NSX-V cloud
account are available for selection.
For information about making association changes after you have deployed a cloud template,
see What happens if I remove an NSX cloud account association in vRealize Automation.
5 If you want to add tags to support a tagging strategy, enter capability tags.
You can add or remove capability tags later. See How do I use tags to manage vRealize
Automation Cloud Assembly resources and deployments.
For information about how capability tags and constraint tags help control deployment
placements, see the Constraint Tags and Placement video tutorial.
6 Click Save.
What to do next
You can create or edit a vCenter cloud account to associate with this NSX cloud account. See
Create a vCenter cloud account in vRealize Automation.
Create and configure one or more cloud zones for use with the data centers that are used by this
cloud account. See Learn more about vRealize Automation Cloud Assembly cloud zones.
Configure infrastructure resources for this cloud account. See Chapter 4 Building your vRealize
Automation Cloud Assembly resource infrastructure.
An NSX-T cloud account can be associated to one or more vCenter cloud accounts. However, an
NSX-V cloud account can only be associated to one vCenter cloud account.
The association between NSX-T and one or more vCenter cloud accounts must be configured
outside of vRealize Automation, specifically in your NSX application. vRealize Automation doesn't
create the association between NSX and vCenter. In vRealize Automation, you specify one or
more configuration associations that already exists in NSX.
When you create an NSX-T cloud account in vRealize Automation, you specify a manager type
and an NSX mode. These selections cannot be changed after you create the cloud account.
You can connect to an NSX-T Global Manager and configure an association between an NSX-T
Global Manager and local managers in the context of the NSX-T federation.
For related information about NSX-T options and capabilities in general, see NSX-T Data Center
product documentation.
To facilitate fault tolerance and high availability in deployments, each NSX-T data center
endpoint represents a cluster of three NSX Managers.
n vRealize Automation can point to one of the NSX Managers. Using this option, one NSX
Manager receives the API calls from vRealize Automation.
n vRealize Automation can point to the Virtual IP of the cluster. Using this option, one NSX
Manager assumes control of the VIP. That NSX Manager receives the API calls from vRealize
Automation. In case of failure, another node in the cluster assumes control of the VIP and
receives the API calls from vRealize Automation.
For more information about VIP configuration for NSX, see Configure a Virtual IP (VIP)
Address for a Cluster in the NSX-T Data Center Installation Guide at VMware NSX-T Data
Center Documentation.
n vRealize Automation can point to a load balancer VIP to load-balance the calls to the three
NSX Managers. Using this option, all three NSX Managers receive API calls from vRealize
Automation.
You can configure the VIP on a third-party load balancer or on an NSX-T load balancer.
For large scale environments, consider using this option to split the vRealize Automation API
calls among the three NSX Managers.
Prerequisites
n Verify that you have the required administrator credentials and have enabled HTTPS
access on port 443. See Credentials required for working with cloud accounts in vRealize
Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have a vCenter cloud account to use with this NSX cloud account. See Create
a vCenter cloud account in vRealize Automation.
n Verify that you have properly configured your ports and protocols to support the
cloud account. See the Ports and Protocols for vRealize Automation topic in Installing
vRealize Automation with vRealize Easy Installer and the Port Requirements topic in
vRealize Automation Reference Architecture Guide in the vRealize Automation product
documentation.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts and click Add Cloud Account.
2 Select the NSX-T account type and specify a cloud account name and description.
3 Enter the host IP address for the NSX-T Manager instance or VIP (see above for information
about the expected behavior that pertains to the NSX Manager and VIP options).
n Global Manager
The Global Manager setting is only available for use with the Policy NSX mode setting. It
is not available when using the Manager NSX mode setting.
The Global setting refers to the NSX-T federation capabilities, including global network
segments. Only NSX-T cloud accounts with the Global setting support NSX-T federation.
When using the Global Manager setting, you are prompted to identify a Local Manager
NSX-T cloud account and an associated vCenter Server cloud account.
You cannot associate a Global Manger NSX-T cloud account with vCenter cloud account,
as you can with an Local Manager NSX-T cloud account. Similar to how a Local Manager
NSX-T cloud account can be associated to multiple vCenter cloud accounts, a Global
Manager NSX-T cloud account can be associated to multiple Local Manager NSX-T cloud
accounts.
n Local Manager
Use the Local setting to define a traditional NSX-T cloud account, which can be
associated to one or more vSphere cloud accounts. You can associate a Global manager
NSX-T cloud account with a Local NSX-T cloud accounts. Note that this is also the setting
to use if you are creating a new and empty target NSX-T cloud account for the purposes
of NSX-V to NSX-T migration.
You cannot change the Manager type setting after you create the cloud account.
The Policy mode is available for NSX-T 3.0 and NSX-T 3.1 forward. This option enables
vRealize Automation to use the additional capabilities available in the NSX-T Policy API.
If you are using NSX-T with a VMware Cloud on AWS cloud account in a cloud template,
the NSX-T cloud account must use the Policy NSX mode.
The Policy setting refers to the NSX-T Policy API form of NSX-T.
n Manager mode
Existing NSX-T endpoints or cloud accounts that are upgraded from an earlier version of
vRealize Automation that did not provide a Policy option are treated as Manager mode
NSX-T cloud accounts.
The Manager mode is supported for NSX-T 2.4, NSX-T 3.0, and NSX-T 3.1 forward.
If you specify Manager mode, use the Manager mode option for other NSX-T cloud
accounts until vRealize Automation introduces a Manager mode to Policy mode migration
path.
Some vRealize Automation options for NSX-T require NSX-T 3.0 or greater, including
adding tags to virtual machine NIC components in the cloud template.
The Manager setting refers to the NSX-T Manager API form of NSX-T.
If you have existing NSX-T cloud accounts that were created prior to the introduction
of the Policy mode in vRealize Automation 8.2, they use the Manager API method. It is
recommended that you wait until the Manager API to Policy API migration tool is made
available in vRealize Automation. If you prefer not to wait, you should replace your existing
NSX-T cloud accounts with new NSX-T cloud accounts that specify the Policy API method.
You cannot change the NSX mode value after you create the cloud account.
7 Click Validate to confirm the credentials in relation to the selected NSX Manager type and
NSX mode.
8 In Associations, add one or more vCenter cloud accounts to associate with this NSX-T cloud
account. You can also remove existing vCenter cloud account associations.
Only vCenter cloud accounts that are not currently associated in vRealize Automation to an
NSX-T or NSX-V cloud account are available for selection.
See What can I do with NSX-T mapping to multiple vCenters in vRealize Automation.
For information about making association changes after you have deployed a cloud template,
or about deleting the cloud account after you have deployed a cloud template, see What
happens if I remove an NSX cloud account association in vRealize Automation.
9 If you want to add tags to support a tagging strategy, enter capability tags.
You can add or remove capability tags later. See How do I use tags to manage vRealize
Automation Cloud Assembly resources and deployments.
For more information about how capability tags and constraint tags help control
deployment placements, see the Constraint Tags and Placement video tutorial.
10 Click Save.
What to do next
You can create or edit a vCenter cloud account to associate with this NSX cloud account. See
Create a vCenter cloud account in vRealize Automation.
Create and configure one or more cloud zones for use with the data centers that are used by this
cloud account. See Learn more about vRealize Automation Cloud Assembly cloud zones.
Configure infrastructure resources for this cloud account. See Chapter 4 Building your vRealize
Automation Cloud Assembly resource infrastructure.
For samples of using NSX-T options in vRealize Automation cloud templates, see Network,
security, and load balancer examples in vRealize Automation cloud templates.
VMware Cloud on AWS requires some unique configuration procedures in vRealize Automation.
To properly configure vRealize Automation for VMware Cloud on AWS, including setting an API
token values for the cloud account and setting gateway firewall rules for its cloud proxy, see the
Tutorial: Configuring VMware Cloud on AWS for vRealize Automation workflow.
Prerequisites
n Verify that you have the required VMware Cloud on AWS administrator credentials, including
VMware Cloud on AWS CloudAdmin credentials for the target SDDC in vCenter and that you
have enabled HTTPS access on port 443. See Credentials required for working with cloud
accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n If you do not have external Internet access, configure an Internet server proxy. See How do I
configure an Internet proxy server for vRealize Automation.
n Verify that you have configured needed access and firewall rules in the SDDC. See Prepare
your VMware Cloud on AWS SDDC to connect with VMware Cloud on AWS cloud accounts in
vRealize Automation.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts, click Add Cloud Account and select
the VMware Cloud on AWS account type.
2 Add the VMC API token for your organization to access the available SDDCs.
You can create a new token or use an existing token for your organization on the linked API
Tokens page. For details, see Create a VMware Cloud on AWS cloud account in vRealize
Automation within a sample workflow.
NSX-V SDDCs are not supported and do not appear in the list.
The vCenter and NSX-T Manager IP address/FQDN values are automatically populated based
on the SDDC.
4 Enter your vCenter user name and password for the specified SDDC if other than the default
value of [email protected].
5 Click Validate to confirm your access rights to the specified vCenter and check that the
vCenter is running.
6 For efficiency, create a cloud zone for provisioning to the selected SDDC.
You can also create cloud zones as a separate step according to your organization's cloud
strategy.
7 If you want to add tags to support a tagging strategy, enter capability tags.
You can add or remove capability tags later. See How do I use tags to manage vRealize
Automation Cloud Assembly resources and deployments.
For more information about how capability tags and constraint tags help control
deployment placements, see the Constraint Tags and Placement video tutorial.
8 Click Save.
Results
The cloud account is added and the selected SDDC is available for the specified cloud zone.
What to do next
To properly configure vRealize Automation for VMware Cloud on AWS, see Tutorial: Configuring
VMware Cloud on AWS for vRealize Automation.
For related information about VMware Cloud on AWS outside of vRealize Automation, see
VMware Cloud on AWS documentation.
A VCF cloud account enables you to incorporate a VCF workload into Cloud Assembly to
facilitate a comprehensive hybrid cloud management solution. Cloud Assembly offers several
entry points from which you can activate the VCF cloud account configuration page. If you
access this page using the Add Cloud Account button on the SDDC integration Workload
Domain tab, the workload is pre-selected, including the basic information for the vCenter and
NSX manager.
Prerequisites
You must have an instance of VMware SDDC Manager 4.1 or higher configured as a vRealize
Automation Cloud Assembly integration for use with this cloud account. For more information,
see Configure a VMware SDDC Manager integration.
Procedure
1 Select Infrastructure > Connections > Cloud Accounts and click Add Cloud Account.
2 Select the VCF Cloud Account type, and enter a Name and Description.
3 Enter the FQDN and credentials for the SDDC manager instance that you are using with this
cloud account.
You can skip this step if you have already configured the SDDC manager instance that you
will use with this account.
4 Select one or more workload domains that you want to use with this VCF cloud account.
5 If you want to have Cloud Assembly use Cloud Foundation managed service credentials
for vCenter and NSX, select Automatically create service credentials. Later, if you want to
change these credentials, you must use the VCF mechanism for password management.
6 Enter the credentials required to access the vCenter associated with this cloud account.
7 Under the NSX Manager heading, enter NSX credentials if you want to manually enter
credentials for the VCF cloud account, or click Create and Validate Service Credentials if
you want Cloud Assembly to create and validate NSX credentials.
8 Enter the credentials required to access the NSX-T network associated with this cloud
account.
11 If applicable, select the data centers that you want to provision to under the Configuration
heading. Click the check box if you want to create a cloud zone for the selected data centers.
12 If you use tags to support a tagging strategy, enter capability tags. See How do I use tags
to manage vRealize Automation Cloud Assembly resources and deployments and Creating a
tagging strategy.
13 Click Save.
Results
This cloud account brings the selected workload domain associated with the specified SDDC
manager into vRealize Automation Cloud Assembly for use.
If you want to manage additional workload domains using vRealize Automation, you must repeat
this processs for each domain.
What to do next
After you configure the VCF cloud account, you can select the account on the main cloud
account page and click Setup Cloud to initiate the VMware Cloud Foundation Quickstart wizard
that will configure your cloud.
For more information about the Quick Start wizard, see How do I get started with vRealize
Automation using the VMware Cloud Foundation Quickstart in Getting Started.
Note If you do not have external Internet access and your integration requires it, you can
configure an Internet server proxy. See How do I configure an Internet proxy server for vRealize
Automation.
vRealize Automation Cloud Assembly supports different flavors of Git integration as described in
the following list. Each of these options is a separate integration.
n BitBucket on-premises
You must have an appropriate local Git repository configured with access for all designated users
in order to set up Git integration with vRealize Automation Cloud Assembly. Also, you must save
your cloud templates in a specific structure in order for them to be detected by Git. To create an
integration with GitLab or GitHub, select Infrastructure > Connections > Integrations in vRealize
Automation Cloud Assembly and then make the appropriate selection. You will need the url and
token for the target repository.
When Git integration is configured with an existing repository, all cloud templates associated
with selected projects become available to qualified users. You can use these templates with an
existing deployment or as the basis of a new deployment. When you add a project, you must
select some properties regarding where and how it is stored in Git.
You can save actions to a Git repository directly from vRealize Automation Cloud Assembly. You
can version action scripts either directly to Git, or you can create versions in vRealize Automation
Cloud Assembly. If you create a version of an action in vRealize Automation Cloud Assembly,
then it is automatically saved to Git as a version. Cloud templates are a bit more complicated,
because you cannot directly add them to a Git integration from vRealize Automation Cloud
Assembly. You must save them directly to a Git instance, and then you can retrieve them from
Git when working with the cloud template management page in vRealize Automation Cloud
Assembly.
n Configure and store cloud templates to be integrated with GitLab correctly. Only valid
templates are imported into GitLab.
n Ensure that the top of your templates include the name: and version: properties.
n Extract an API key for the applicable repository. In your Git account, select your login in the
upper right corner, and navigate to the Settings menu. Select Access Tokens, then name
your token, set an expiration date. Then, select API and create the token. Copy the resulting
value and save it.
The following guidelines must be observed for all cloud templates used with Git integration.
n All cloud template YAML files must use name and version fields.
n If you update a draft cloud template imported from Git, and its content differs from that in the
top version, the draft will not be updated in subsequent syncs and a new version is created. If
you want to update a template and also allow further sync's from Git, then you must create a
new version after final changes.
When GitLab integration is configured with an existing repository, all cloud templates associated
with selected projects become available to qualified users. You can use these templates with an
existing deployment or as the basis of a new deployment. When you add a project, you must
select some properties regarding where and how it is stored in GitLab.
Note You cannot push new or updated cloud templates to the Git repository from vRealize
Automation Cloud Assembly. Also, you cannot push new templates to the repository from
vRealize Automation Cloud Assembly. To add cloud templates to a repository, developers must
use the Git interface.
If you update a draft cloud template imported from Git, and its content differs from that in the
top version, the draft will not be updated in subsequent syncs and a new version is created. If
you want to update a cloud template and also allow further sync's from Git, then you must create
a new version after final changes.
After you set up your cloud templates for use with GitLab and collect required information,
you must set up integration with your GitLab instance. Then, you can import the designated
cloud templates into GitLab. You can view a video demonstration of this procedure at https://
www.youtube.com/watch?v=h0vqo63Sdgg.
Prerequisites
n Extract an API key for the applicable repository. In your GitLab account, select your login in
the upper right corner, and navigate to the Settings menu. Select Access Tokens, then name
your token, set an expiration date. Then, select API and create the token. Copy the resulting
value and save it.
You must have an appropriate local Git repository configured with access for all designated
users in order to set up Git integration with vRealize Automation Cloud Assembly. Also, you must
create and save your cloud templates in a specific structure in order for them to be detected by
GitLab.
n Configure and store cloud templates to be integrated with GitLab correctly. Only valid
templates are imported into GitLab. See How do I use Git integration in vRealize Automation
Cloud Assembly.
Procedure
1 Set up integration with your GitLab environment in vRealize Automation Cloud Assembly.
a Select Infrastructure > Integrations > Add New and choose GitLab.
b Enter the URL for your GitLab instance. For a software as a service GitLab instance, in
most cases, it will be gitlab.com.
c Enter the Token, also known as an API key, for the specified GitLab instance. See the
prerequisites above for information about extracting the token from your GitLab instance.
f Add capability tags if desired. See Using capability tags in vRealize Automation Cloud
Assembly for more information.
g Click Add.
a Select Infrastructure > Integrations and choose the appropriate GitLab integration.
b Select Projects.
d Enter the Repository path within GitLab. Typically, this is the user name of the main
account appended to the repository name.
f If applicable, enter a Folder name. If left blank, all folders are available.
g Enter an appropriate Type. If applicable, enter a folder name. If left blank, all folders are
available.
When you click Next, an automated synchronization task is initiated that imports cloud
templates into the platform.
When the synchronization tasks are complete, a message indicates that the cloud
templates have been imported.
Results
You need a valid GitHub token to configure GitHub integration in vRealize Automation Cloud
Assembly See the GitHub documentation for information about creating and locating your token.
Prerequisites
n Configure and store cloud templates to be integrated with GitHub correctly. Only valid cloud
templates are imported into GitHub. See How do I use Git integration in vRealize Automation
Cloud Assembly.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Select GitHub.
5 If you need to add tags to support a tagging strategy, enter capability tags. See How do I
use tags to manage vRealize Automation Cloud Assembly resources and deployments and
Creating a tagging strategy.
6 Click Add.
a Select Infrastructure > Integrations and choose the appropriate GitHub integration.
b Select Projects.
d Enter the Repository path within GitHub. Typically, this is the user name of the main
account appended to the repository name.
f If applicable, enter a Folder name. If left blank, all folders are available.
An automated synchronization task is initiated that imports cloud templates into the
platform.
When the synchronization tasks are complete, a message indicates that the cloud
templates have been imported.
Results
What to do next
In vRealize Automation Cloud Assembly, you can work with two types of repository items using
Bitbucket integration: VMware cloud templates or ABX action scripts. You must synch projects
that you want to work with before using a Bitbucket integration. ABX actions support write back
to the Bitbucket repository, but you cannot write back cloud templates from the integration. If
you want to create new versions of cloud template files, you must do so manually.
Prerequisites
n Set up an on premises Bitbucket Server deployment with one or more ABX or cloud
template-based projects that you want to use with your deployments. Bitbucket Cloud is
currently not supported.
n Create or designate vRealize Automation Cloud Assembly project to associate your Bitbucket
integration.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Select Bitbucket.
3 Enter the Summary information and Bitbucket credentials on the Bitbucket new integration
Summary page.
5 If you use add tags to support a tagging strategy, enter capability tags. See How do I
use tags to manage vRealize Automation Cloud Assembly resources and deployments and
Creating a tagging strategy.
6 Click Add.
7 Select the Projects tab on the main page for the Bitbucket integration to associate a project
with this Bitbucket integration.
9 Click Next to add a Repository to Bitbucket project and indicate the type of repository you
are adding and then specify the Repository name and Branch, as well as the Folder.
10 Click Add.
If you want to add one or more repositories to a project, click Add Repository.
Results
Bitbucket integration is configured with the specified repository configuration, and you can view
and work with ABX actions and cloud templates contained in configured repositories. When you
add a project to a Bitbucket integration, a synch operation runs to pull the latest versions of ABX
action scripts and cloud template files from the designated repository. The History tab on the
Bitbucket integration page shows records of all synch operations for the integration. By default,
files are automatically synched every 15 minutes,but you can manually synch a file by selecting it
and clicking SYNCH at any time.
What to do next
You can work with ABX actions on the vRealize Automation Cloud Assembly Extensibility page,
and you can work with cloud templates on the Design page. If you save a changed version of an
ABX action on the Extensibility area of vRealize Automation Cloud Assembly, the new version of
the script is created and written back to the repository.
You can create a provider-specific IPAM integration point to manage IP addresses and DNS
settings for cloud template deployments and VMs in vRealize Automation.
For information about how to configure the prerequisites, and an example of how to create a
provider-specific external IPAM integration point within the context of a sample workflow, see
Add an external IPAM integration for Infoblox in vRealize Automation . Note that this workflow is
for an Infoblox IPAM integration but can be used as reference for any external IPAM vendor.
For information about how to create the needed assets to enable external IPAM partners and
vendors to integrate their IPAM solution with vRealize Automation, see How do I use the IPAM
SDK to create a provider-specific external IPAM integration package for vRealize Automation.
Prerequisites
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider, for example Infoblox or
Bluecat, and that you have the correct access credentials to your organization's account with
the IPAM provider.
n Verify that you have access to a deployed integration package for the IPAM provider, such as
Infoblox or BlueCat. The deployed package is initially obtained as a .zip download from your
IPAM provider or from the vRealize Automation Marketplace and then deployed to vRealize
Automation.
n Verify that you have access to a configured running environment for the IPAM provider.
n Verify that you have the required user credentials to access and use the IPAM vendor
product. See your integration vendor's product documentation for information about
required user permissions.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Click IPAM.
3 In the Provider drop-down, select a configured IPAM provider package from the list.
If the list is empty, click Import Provider Package, navigate to an existing provider
package .zip file, and select it. If you do not have the .zip file, you can obtain it from your
provider's web site or from the vRealize Automation Marketplace tab.
4 Enter your administrator user name and password credentials for your account with the
external IPAM provider, along with all other (if any) mandatory fields, such as the host name
of your provider.
5 In the Running Environment drop-down list, select an existing running environment, such as
on-premises actions-based extensibility integration point.
The running environment supports communication between vRealize Automation and the
IPAM provider.
The IPAM framework only supports an actions-based extensibility (ABX) On-Prem Embedded
running environment.
Note If you use an Amazon Web Services or Microsoft Azure cloud account as the
integration running environment, be sure that the IPAM provider appliance is accessible from
the Internet and is not behind a NAT or firewall and that it has a publicly resolvable DNS
name. If the IPAM provider is not accessible, the Amazon Web Services Lambda or Microsoft
Azure Functions cannot connect to it and the integration will fail.
6 Click Validate.
7 When prompted to trust the self-signed certificate from the external IPAM provider, click
Accept.
After you accept the self-signed certificate, the validation action can continue to completion.
8 Enter a name for this IPAM integration point and click Add to save the new IPAM integration
point.
A data collection action is imitated. Networks and IP addresses are data-collected from the
external IPAM provider.
An external IPAM provider or VMware may upgrade a source IPAM integration package for a
particular vendor. For example, the external IPAM integration package for Infoblox has been
upgraded several times. To preserve any existingvRealize Automation infrastructure settings
that use a named IPAM integration point, you can edit an IPAM integration point to source the
updated IPAM integration package, rather than create a new IPAM integration point.
Prerequisites
This procedure assumes that you have already created an external IPAM integration point and
want to upgrade that integration point to use a more recent version of the vendor's IPAM
integration package.
For information about how to create an external IPAM integration point, see Add an external
IPAM integration for Infoblox in vRealize Automation .
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider and that you have the
correct access credentials to your organization's account with that IPAM provider.
n Verify that you have access to a deployed integration package for your IPAM provider. The
deployed package is initially obtained as a .zip download from your IPAM provider website or
from the vRealize Automation Marketplace and then deployed to vRealize Automation.
For information about how to download and deploy the provider package .zip file and make
it available as a Provider value on the IPAM Integration page, see Download and deploy an
external IPAM provider package for use in vRealize Automation.
n Verify that you have access to a configured running environment for the IPAM provider. The
running environment is typically an actions-based extensibility (ABX) On-Prem Embedded
integration point.
For information about running environment characteristics, see Create a running environment
for an IPAM integration point in vRealize Automation.
Procedure
1 Select Infrastructure > Connections > Integrations IPAM and open the existing IPAM
integration point.
You can create only one My VMware integration for each organization.
Prerequisites
You must have a user account with the appropriate permissions for MyVMware.
n For information about assigning user permissions in a My VMware account, see KB 2006977.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Select My VMware.
4 If you require tags to support a tagging strategy, enter capability tags. See How do I use tags
to manage vRealize Automation Cloud Assembly resources and deployments and Creating a
tagging strategy.
5 Click Add.
Results
What to do next
Note You can access the Control Center of the embedded vRealize Orchestrator by navigating
to https://your_vRA_FQDN/vco-controlcenter and logging in as root.
You can also integrate an external vRealize Orchestrator instance for use in your vRealize
Automation extensibility subscriptions and XaaS (Anything as a Service) operations used for
cloud templates.
Prerequisites
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Upgrade or migrate to vRealize Orchestrator 8.3. See Upgrading and Migrating VMware
vRealize Orchestrator.
Procedure
6 Under vRealize Orchestrator URL, enter the fully qualified domain name (FQDN) of your
external vRealize Orchestrator instance.
8 (Optional) If prompted to do so, review the certificate information, and click Accept.
9 (Optional) Add capability tags. For more information on capability tags, see Using capability
tags in vRealize Automation Cloud Assembly.
Note Capability tags can be used to manage multiple vRealize Orchestrator integrations. See
Managing multiple vRealize Orchestrator integrations with project constraints.
10 Click Add.
11 To verify that the integration is configured and that the workflows are added, select
Extensibility > Library > Workflows.
What to do next
2 Select Orchestrator.
3 Select the tab that corresponds to the integrated vRealize Orchestrator instance.
Note vRealize Automation Cloud Assembly users without cloud administrator credentials cannot
see the tab of the integrated vRealize Orchestrator instance.
vRealize Automation Cloud Assembly supports the integration of multiple vRealize Orchestrator
servers that can be used in workflow subscriptions. You can manage what vRealize Orchestrator
integrations are used in cloud templates provisioned by your project with soft or hard project
constraints. For more information on project constraints, see Using vRealize Automation Cloud
Assembly project tags and custom properties .
Prerequisites
n Verify that you have cloud administrator credentials. See What are the vRealize Automation
user roles.
n Add capability tags to your vRealize Orchestrator integrations. See Using capability tags in
vRealize Automation Cloud Assembly.
Procedure
1 Navigate to Infrastructure > Administration > Projects and select your project.
3 Enter the capability tags of your vRealize Orchestrator integrations in the Extensibility
constraints text box and set them as soft or hard project constraints.
4 Click Save.
Results
When you deploy a cloud template, vRealize Automation Cloud Assembly uses the project
constraints to manage what vRealize Orchestrator integrations are used in workflow
subscriptions.
What to do next
Alternatively, you can use capability tags to manage multiple vRealize Orchestrator integrations
on a cloud account level. For more information, see Managing multiple vRealize Orchestrator
integrations with cloud account capability tags.
vRealize Automation Cloud Assembly supports the integration of multiple vRealize Orchestrator
servers that can be used in workflow subscriptions. You can manage what vRealize Orchestrator
integrations are used in workflow subscriptions by adding capability tags to your cloud account.
Prerequisites
n Verify that you have cloud administrator credentials. See What are the vRealize Automation
user roles.
n Add capability tags to your vRealize Orchestrator integrations. See Using capability tags in
vRealize Automation Cloud Assembly.
Procedure
3 Enter the capability tags of the vRealize Orchestrator integrations you want to use.
The capability tags are automatically converted into soft constraints. To use hard constraints
in managing your integrations, you must use project constraints. For more information, see
Managing multiple vRealize Orchestrator integrations with project constraints.
4 Click Save.
Results
When you deploy a cloud template, vRealize Automation Cloud Assembly uses the tagging in
the associated cloud account to manage what vRealize Orchestrator integrations are used in
workflow subscriptions.
Data collection events for vRealize Orchestrator integrations are triggered every 10 minutes.
The data collection gathers data about the workflows included in the library of each vRealize
Orchestrator integration.
Important Verify that you version up a workflow when you are finished editing it. Changes to
non-versioned up workflows are not picked up by the data collector.
You can find information about the last data collection performed on a vRealize Orchestrator
integration by navigating Infrastructure > Connections > Integrations and selecting the specific
integration. You can also trigger a manual data collection event by clicking Start Data Collection.
For more information on vRealize Automation data collection, see How does data collection work
in vRealize Automation.
There are two primary options to working with Kubernetes resources in vRealize Automation
Cloud Assembly. You can integrate VMware Tanzu Kubernetes Grid Integrated Edition (TKGI),
formerly PKS, or Red Hat OpenShift with vRealize Automation Cloud Assembly to configure,
manage and deploy Kubernetes resources. With the second option, you can leverage a
vCenter cloud account to access supervisor namespaces to work with vSphere Project Pacific
Kubernetes-based functionality.You can also integrate external Kubernetes resources in vRealize
Automation Cloud Assembly.
After you create a TKGI or OpenShift integration, applicable Kubernetes clusters become
available in vRealize Automation Cloud Assembly and you can add and create Kubernetes
components to vRealize Automation Cloud Assembly to support management of cluster and
container applications. These applications form the basis of self-service deployments that are
available from the Service Broker catalog.
For Pacific-based supervisor namespaces, users must have access to an applicable vSphere SSO
so that they can log in to a provided link to the supervisor namespace details. Then, they can
download a customized Kubectl with vSphere authentication so they can use their supervisor
namespace.
To use this functionality, you must have a vCenter with vSphere cloud account that has
supervisor namespaces configured. After a users has logged in they can begin working with
applicable namespaces.
n Use Pacific supervisor clusters and namespaces with vRealize Automation Cloud Assembly
Administrators can configure vRealize Automation Cloud Assembly to use supervisor
namespacess from an existing Pacific-enabled vSphere integration so that users can deploy
namespaces in cloud templates and request them in the Service Broker catalog.
n Working with Kubernetes clusters and namespaces in vRealize Automation Cloud Assembly
Cloud administrators can add, view, and manage the configuration of deployed Kubernetes
clusters and namespaces, both generic and Pacific-based, in vRealize Automation Cloud
Assembly.
TKGI integrations enable you to manage TKGI instances on premises and in the cloud and
Kubernetes clusters provisioned on TKGI and external clusters. You must create a Kubernetes
profile and associate it with a project to support policy-based placement of resources.
Prerequisites
n You must have an appropriately configured TKGI server set up with UAA authentication.
n Verify that you have cloud administrator credentials. For more information, see What are the
vRealize Automation user roles.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
3 Enter the IP address or FQDN, and TKGI address for the TKGI cloud account you are creating.
n The IP address is the FQDN or IP address of the TKGI user authentication server.
n The TKGI address is the FQDN or IP address for the main TKGI server.
4 Select whether this TKGI server is local or located in the public cloud or on a private cloud.
5 Enter an appropriate Username and Password for the TKGI server and other related
information..
6 If you use tags to support a tagging strategy, enter capability tags. See How do I use tags
to manage vRealize Automation Cloud Assembly resources and deployments and Creating a
tagging strategy.
7 Click Add.
Results
You can create Kubernetes zones and assign them to a project, or you can discover external
Kubernetes clusters and assign those clusters to projects. In addition, you can add or create
Kubernetes namespaces that facilitate management of clusters among large groups and
organizations.
What to do next
Create or select the appropriate Kubernetes zones, then select one or more clusters or
namespaces, and assign them to a project. After that, you can create and publish cloud
templates to enable users to generate self-service deployments that use Kubernetes.
vRealize Automation Cloud Assembly supports integration with OpenShift versions 3.x.
Prerequisites
n Verify that you have cloud administrator credentials. For more information, see What are the
vRealize Automation user roles.
n VMware supplies resources you can use to create an OpenShift cluster with a cloud template
at the following location: https://flings.vmware.com/enterprise-openshift-as-a-service-on-
cloud-automation-services. You can use clusters created with these resources as global
clusters in the Kubernetes zones to create self-service namespaces.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
4 Select the appropriate Credential Type and enter the approriate credentials.
OpenShift integration supports either OAuth username/password, public key, or bearer token
authentication.
6 If you use tags to support a tagging strategy, enter the appropriate capability tags. See How
do I use tags to manage vRealize Automation Cloud Assembly resources and deployments
and Creating a tagging strategy.
7 Click Add.
Results
When an integration is created, new Kubernetes clusters appear in the relevant section of the
Kubernetes page. You can create Kubernetes zones and assign them to a project. In addition,
you can configure Kubernetes namespaces that facilitate management of clusters among large
groups and organizations.
What to do next
Create or select the appropriate Kubernetes zones, then select one or more clusters or
namespaces, and assign them to a project. After that, you can create and publish cloud
templates to enable users to generate self-service deployments that use Kubernetes.
Cloud administrators can associate Kubernetes zones with TKGI cloud accounts configured for
Cloud Assembly or with external Kubernetes clusters that are not associated with a project.
When you create a Kubernetes zone, you can assign multiple provider-specific resources to the
zone, and these resources will dictate what properties can be set for the newly provisioned
clusters in terms of the number of workers, masters, available CPU, memory, and other
configuration settings. For TKGI providers, these correspond to TKGI plans. An administrator
can also assign multiple clusters to a Kubernetes zone that will be used for placement of newly
provisioned Kubernetes namespaces. The administrator can only assign clusters that are not
onboarded, or not managed by CMX, and are provisioned via the preselected cluster provider.
The administrator can assign multiple Kubernetes zones to a single project, thus making them all
available for placement operations that happen within this project.
You can create Kubernetes zones with supervisor namespaces on vSphere in the same way that
you work with generic Kubernetes namespaces. To add a supervisor namespace to a Kubernetes
zone, you must associate the zone with a vSphere 7 endpoint that contains the desired Pacific
namespace resources.
Service Broker contains a version of the Kubernetes Zone page to enable Service Broker
administrators to access existing Kubernetes zones so they can create placement policies for
Kubernetes namespaces and clusters provisioned from the catalog.
Prerequisites
Configure integration with a suitable VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)
deployment. See Configure VMware Tanzu Kubernetes Grid Integrated Edition Integration in
vRealize Automation Cloud Assembly
Procedure
1 Select Infrastructure > Configure > Kubernetes Zone and click New Kubernetes Zone.
2 Enter the TKGI integration Account name to which you want this zone to apply.
This defines the cloud account or endpoint that is associated with the zone. You can assign
only one endpoint to each zone. If you are working with Supervisor Namespace on vSphere,
you can only select vSphere instances here that contain Supervisor namespaces.
4 Add capability tags if appropriate. See Using capability tags in vRealize Automation Cloud
Assembly for more information.
5 Click Save.
6 Click the On-demand tab and add TKGI plans as appropriate for the zone to use for cluster
provisioning.
You can select one or more plans and assign priorities to them. Lower numbers equal higher
priority. Priority assignments are secondary to tag based selection.
7 Click the Cluster tab and then click the Add Compute button to add Kubernetes or supervisor
clusters to the zone. If you are working with an external cluster, it is automatically onboarded
to vRealize Automation Cloud Assembly when you select it.
You can add Kubernetes namespaces to the cluster on the Kubernetes Clusters page in
vRealize Automation Cloud Assembly.
Results
Kubernetes zones are configured for use with vRealize Automation Cloud Assembly
deployments.
What to do next
1 Select Infrastructure > Administration > Projects and then select the project that you want
to associate with your Kubernetes zone.
3 Click Add Kubernetes Zone and add the zone that you just created. You can multiple zones if
applicable, and you also set the priority on the zones.
4 Click Save.
The Kubernetes Provisioning tab of the vRealize Automation Cloud Assembly Project page
enables you to set limits on the type and number of namespaces users can provision to a
kubernetes zone. You can also select the type of namespaces that can be provisioned to a
zone, either regular namespaces or supervisor namespaces. The Kubernetes Zones table on the
Kubernetes Provisioning tab contains columns that show the current limit settings. To set limits,
click the applicable zone on the table to open a dialog that enables you to choose namespace
and supervisor namespace limits.
Click within the Supports column on the Kubernetes Zones table to select what type of
namespace can be provisioned to the zone.
After you assign a Kubernetes zone to a project, you can use the Cloud Templates page under
the vRealize Automation Cloud Assembly Design tab to provision a deployment based on the
Kubernetes zone and project configuration. This Cloud Templates page includes options to add
a K8S Cluster, K8S Namespace and Supervisor Namespace. Select the appropriate option for the
Kubernetes resource you are working with.
Use Pacific supervisor clusters and namespaces with vRealize Automation Cloud
Assembly
Administrators can configure vRealize Automation Cloud Assembly to use supervisor
namespacess from an existing Pacific-enabled vSphere integration so that users can deploy
namespaces in cloud templates and request them in the Service Broker catalog.
This task describes how to add supervisor clusters with vRealize Automation Cloud Assembly for
use in deployments and how to create or add namespaces that define what vRealize Automation
Cloud Assembly projects and users can access particular Kubernetes resources. This functionality
relies on a suitable vSphere cloud account rather than an integration such as VMware Tanzu
Kubernetes Grid Integrated Edition (TKGI) or Openshift. Supervisor clusters are customized
Kubernetes clusters associated with vSphere. They expose Kubernetes APIs to end users,
and they use ESXI as a platform for worker nodes rather than Linux. Supervisor namespaces
facilitate access control to Kubernetes resources, because it is typically easier to apply policies
to namespaces than to individual virtual machines. You can create multiple namespaces for each
supervisor cluster.
When used with Pacific enabled vSpehere instances, Kubernetes zones define which supervisor
clusters are available for provisioning with a supervisor namespace. Supervisor namespaces
are specific to Pacific enabled vSphere instances. You cannot provision a generic Kubernetes
resource to a Pacific enabled vSphere instance.
vRealize Automation Cloud Assembly users designated as project viewers have view only access
to namespaces, while project members can edit them.
You can configure the supervisor clusters associated with namespaces if desired.
Prerequisites
n To use Pacific namespaces with vRealize Automation Cloud Assembly, you must have a
vSphere 7.x endpoint configured. vSphere is installed as part of a vCenter cloud account. See
Create a vCenter cloud account in vRealize Automation.
n Project Pacific must be enabled on the vSphere cloud account, and it must contain
appropriate supervisor namespaces.
n Both your vCenter and your vRealize Automation deployment should use the same Active
Directory for users to be synched. Though provisioning will still function if this is not the case,
vRealize Automation users will not get automatic access to the namespace.
Procedure
1 Select Infrastructure > Configure > Kubernetes Zone in vRealize Automation Cloud
Assembly.
This page shows managed clusters that are available for use, and enables you to add
additional clusters. You can click on any of the clusters to view their details.
3 Specify the Account details for the target vSphere cloud account.
4 Click the Search icon in the text box to either view all vSphere accounts or search for an
account by name.
6 Add capability tags if appropriate. See Using capability tags in vRealize Automation Cloud
Assembly for more information.
7 Click the Provisioning tab to select the supervisor cluster that will be associated with the
namespaces.
8 Click Add Compute to view and select the available supervisor clusters.
9 Click Add.
10 Select Infrastructure > Administration > Projects and then select the project that you want
to associate with your Kubernetes zone.
12 Click Add Kubernetes Zone and add the zone that you just created. You can multiple zones if
applicable, and you also set the priority on the zones.
13 Click Save.
What to do next
After a namespace is configured, the Infrastructure > Resources > Kubernetes page in vRealize
Automation Cloud Assembly for applicable users displays the namespace. Users can click the
Address link on the Summary tab to open the vSphere Kubernetes CLI Tools to manage
the namespace. Users must be a cloud administrator or a member of the namespace for
the designated project to access a link to the Supervisor namespace details. Also users can
download a customized Kubectl to use the Supervisor namespace. Users can log in to the
supervisor namespace and use it as they would any other namespace, and then create cloud
templates and deploy applications.
To add the namespace to a cloud template select Design > Cloud Template and select an
existing cloud template or create a new one. Then you can select the Supervisor namespace item
on the left menu and drag it to the canvas.
You can assign storage policies to a supervisor namespace using tags. You can add tags, such as
location:local to specify the kubernetes zone you want to use with the deployment and other
tags on your storage profiles such as speed:fast and speed:slow.
formatVersion: 1
resources:
Cloud_SV_Namespace_1:
type: Cloud.SV.Namespace
properties:
name: 'a'
storage:
-profile:
constraints:
- tag: 'speed:fast'
-profile:
liimitMB:1000
constraints:
-tag: 'speed:slow'
This cloud template requests a supervisor namespace with no constrains, and specifies two
storage profiles with it.
After you deploy cloud templates containing a supervisor namespace, users can also request
supervisor namespaces from the Service Broker catalog. Also, you can click on the Deployments
page in Cloud Assembly to view information about the deployment and access a link that
contains the command to run the kubectl for the namespace on vSphere.
Users with cloud administrator privileges can view, add, and manage Kubernetes clusters and
namespaces to which you are entitled access on the Infrastructure > Resources > Kubernetes
page. This page contains tabs for Clusters, Namespaces, Supervisor Clusters and Supervisor
Namespaces. You can select one of these tabs to view and manage the analogous resources.
Most typically, this page facilitates management of deployed clusters and namespaces.
n Cluster: A cluster is a group of Kubernetes nodes distributed across one or more physical
machines. This page shows provisioned and undeployed clusters that have been configured
for use on your vRealize Automation Cloud Assembly instance. You can click on a cluster
to view information about its current status. When you deploy a cluster, it includes a link
to a Kubconfig file that is accessible only for cloud administrators. This file grants full admin
privileges over the cluster including a list of namespaces.
Supervisor clusters are unique to vSphere instances and use ESXI as their worker nodes
instead of Linux.
n Namespaces: Namespaces are virtual clusters that provide administrators with a way to
segregate cluster resources. They facilitate management of resources among large groups of
users and organizations. As a form of role-based access control, a cloud administrator can
enable users to add namespaces to a project when they request a deployment and then
later manage those namespaces from the Kubernetes Clusters page. When you deploy a
namespace, it includes a link to a kubeconfig file that enables valid users, such as developers,
to view and manage some aspects of that namespace.
Supervisor clusters and supervisor namespaces exist only on vSphere instances and provide
Kubernetes-like access to vSphere objects.
A cloud administrator can change the project associated with a Kubernetes namespace or cluster
on this page so that the administrator can provision Kubernetes resources from cloud templates
and Service Broker and then assign them to specific projects for consumption. The administrator
can change the scope of a cluster to make it global or project specific. Global clusters appear
Clusters tab for all Kubernetes zones and are available for selection and provisioning. If a cluster
is global, it can be added to a Kubernetes zone and then used to provision namespaces from the
catalog.
If you are configuring new or existing cluster, you must select whether to connect with a master
IP address or a master hostname.
1 Select Infrastructure > Resources > Kubernetes and confirm that the Clusters tab is active.
If there are any clusters currently configured for your vRealize Automation Cloud Assembly
instance, they appear on this page.
2 If you are adding a new or existing cluster, or deploying a cluster, select the appropriate
option according to the following table.
Deploy Add new clusters to vRealize You must specify the TKGI cloud account that to which this cluster
Automation Cloud Assembly will be deployed as well as the desired plan and the number of
nodes.
Add Configure an existing cluster You must specify the TKGI cloud account, the cluster to use,
Existing to work with your project. and the appropriate project for the targeted developer. Also, you
need to specify the sharing scope. If you want to share globally,
you must configure your Kubernetes zones and namespaces
appropriately.
Add Add a vanilla Kubernetes You must designate a project to which the cluster is associated,
External cluster, that might not be enter the IP address for the desired cluster and select a cloud
associated with TKGI, to proxy and certificate information required to connect to this
vRealize Automation Cloud cluster.
Assembly.
3 Click Add to make the cluster available within vRealize Automation Cloud Assembly.
There are several ways to add Kubernetes namespaces to resources in vRealize Automation
Cloud Assembly. The following procedure outlines one typical method.
1 Select Infrastructure > Resources > Kubernetes and click the Namespaces tab.
2 To add a new namespace, click New Namespace. To add an existing namespace click Add
Namespace.
At this point you have added a namespace for use with Kubernetes resources, but it is not
associated with anything in particular.
4 Specify the Cluster that you want to associate with this namespace.
You can add custom properties on Kubernetes namespaces to support extensibility in several
different ways. You add custom properties when you provision a namespace by creating a Cloud
Assembly cloud template. When you specify a Kubernetes namepsace in a cloud template you
can add properties to the namespace. First, you can right click on the properties in the template
to access the default properties that are part of the cloud template schema. As a second option,
you can add user-defined properties in the properties section of the namespace in the cloud
template.
After deployment, these custom properties appear on the Deployments page in Cloud Assembly
for the applicable deployment.
Finally, you can also add custom properties to a namespace using actions configured on the
Extensibility > Actions page in Cloud Assembly.
1 Select Infrastructure > Resources > Kubernetes in vRealize Automation Cloud Assembly.
3 Specify the Account details for the target vSphere cloud account.
4 Click the Search icon in the Supervisor cluster text box to either view all supervisor clusters or
search for a cluster by name.
6 Select the Supervisor Namespaces tab and click the New Supervisor Namespace button to
add a new namespace.
7 Select the Supervisor Namespaces tab and click the New Supervisor Namespace button to
add a new namespace.
e Use the Available storage policies selection to add storage policies for use with the
namespace.
You can add all available storage policies or select specific policies for use with the
supervisor namespace. Also, you can optionally set a limit on the storage size available
with each available storage policy.
f Click Create.
8 Review the relevant details for the new namespace. You can change the storage policy
configuration if neeeded.
Users and groups that currently have access to the namespace in vSphere are listed on the
Users tab. If new users or groups are added to the project, click the Update Users button on
this tab to update the list. The list is not updated automatically, so you must use the button to
update.
Note Synchronization of users makes sense only if vRealize Automation Cloud Assembly and
vCenter are configured with a common Active Directory/LDAP service.
After a cluster or namespace is configured, the Infrastructure > Resources > Kubernetes page in
vRealize Automation Cloud Assembly displays the clusters and namespaces available to the user.
You can click an individual namespace or cluster to open a page that contains a number or tabs
that show statistics and other information for the resource, and enables you to configure various
options.
The Summary tab for clusters on the Kubernetes page enables administrators to view and, in
some cases, update configuration of a cluster including changing the scope. The Sharing radio
buttons enable you to select either Global (sharable via Kubernetes Zone) or Project (access
limited to a single project). If you select Project, you must also specific the applicable project in
the Project selection below.
Note Changing the sharing configuration may affect the namespaces available on the cluster.
Users can click the Address link on the Summary tab to open the vSphere Kubernetes CLI Tools
to manage the namespace. Users must be a cloud administrator or a member of the namespace
for the designated project to access a link to the Supervisor namespace details. Also users
can download a customized Kubectl to use the Supervisor namespace. Users can log in to the
supervisor namespace and use it as they would any other namespace, and then create cloud
templates and deploy applications.
Adding a Kubernetes cluster that is associated with a project to a cloud template is the most
straightforward method of making Kubernetes resources available to valid users. You can use
tags on clusters to control where they are deployed just as you do with other Cloud Assembly
resources. You can use tags to select a zone and a VMware Tanzu Kubernetes Grid Integrated
Edition (TKGI) plan during the allocation phase of cluster deployment.
Once you add a cluster in this way, it is automatically available to all valid users.
formatVersion: 1
inputs: {}
resources:
Cluster_provisioned_from_tag:
type: Cloud.K8S.Cluster
properties:
hostname: 109.129.209.125
constraints:
-tag: 'placement tag'
port: 7003
workers: 1
connectBy: hostname
The second cloud template examples shows how to set up a template with a variable called
$(input.hostname) so that users can input the desired cluster hostname when requesting a
deployment. Tags can also be used to select a zone and a TKGI plan durring the resource
allocation phase of cluster deployment.
formatVersion: 1
inputs:
hostname:
type: string
title: Cluster hostname
resources:
Cloud_K8S_Cluster_1:
type: Cloud.K8S.Cluster
properties:
hostname: ${input.hostname}
port: 8443
connectBy: hostname
workers: 1
If you want to use namespaces to mange cluster usage, you can set up a variable in the
cloud template called name: ${input.name} to substitute for the namespace name which a user
enters when requesting a deployment. For this sort of deployment, you would create a template
something like the following example:
1 formatVersion: 1
2 inputs:
3 name:
4 type: string
5 title: "Namespace name"
6 resources:
7 Cloud_KBS_Namespace_1:
8 type: Cloud.K8S.Namespace
9 properties:
10 name: ${input.name}
Users can manage deployed clusters via kubeconfig files that are accessible from the
Infrastructure > Resources > Kubernetes Clusters page. Locate the card on the page for the
desired cluster and click Kubeconfig.
{
"title": "Supervisor namespace schema",
"description": "Request schema for provisioning of Supervisor namespace resource",
"type": "object",
"properties": {
"name": {
"title": "Name",
"description": "Alphabetic (a-z and 0-9) string with maximum length of 63 characters. The
character ‘-’ is allowed anywhere except the first or last position of the identifier.",
"type": "string",
"pattern": "^.*\\$\\{.*\\}.*$|^((?!-)[a-z0-9-]{1,63}(?<!-))$",
"ignoreOnUpdate": true
},
"description": {
"title": "Description",
"description": "An optional description of this Supervisor namespace.",
"type": "string",
"ignoreOnUpdate": true
},
"constraints": {
"title": "Constraints",
"description": "To target the correct resources, blueprint constraints are matched against
infrastructure capability tags. Constraints must include the key name. Options include value,
negative [!], and hard or soft requirement.",
"type": "array",
"recreateOnUpdate": true,
"items": {
"type": "object",
"properties": {
"tag": {
"title": "Tag",
"description": "Constraint definition in syntax `[!]tag_key[:tag_value][:hard|:soft]`
\nExamples:\n```\n!location:eu:hard\n location:us:soft\n!pci\n```",
"type": "string",
"recreateOnUpdate": true
}
}
}
},
"limits": {
"title": "Limits",
"description": "Defines namespace resource limits such as pods, services, etc.",
"type": "array",
"recreateOnUpdate": false,
"items": {
"type": "object",
"properties": {
"stateful_set_count": {
"title": "stateful_set_count",
"description": "This represents the new value for 'statefulSetCount' option which is the
maximum number of StatefulSets in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"deployment_count": {
"title": "deployment_count",
"description": "This represents the new value for 'deploymentCount' option which is the
maximum number of deployments in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"cpu_limit_default": {
"title": "cpu_limit_default",
"description": "This represents the new value for the default CPU limit (in Mhz) for
containers in the pod. If specified, this limit should be at least 10 MHz.",
"type": "integer",
"recreateOnUpdate": false
},
"config_map_count": {
"title": "config_map_count",
"description": "This represents the new value for 'configMapCount' option which is the
maximum number of ConfigMaps in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"pod_count": {
"title": "pod_count",
"description": "This represents the new value for 'podCount' option which is the maximum
number of pods in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"job_count": {
"title": "job_count",
"description": "This represents the new value for 'jobCount' option which is the maximum
number of jobs in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"secret_count": {
"title": "secret_count",
"description": "This represents the new value for 'secretCount' option which is the
maximum number of secrets in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"cpu_limit": {
"title": "cpu_limit",
"description": "This represents the new value for 'limits.cpu' option which is equivalent
to the maximum CPU limit (in MHz) across all pods in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"cpu_request_default": {
"title": "cpu_request_default",
"description": "This represents the new value for the default CPU request (in Mhz) for
containers in the pod. If specified, this field should be at least 10 MHz.",
"type": "integer",
"recreateOnUpdate": false
},
"memory_limit_default": {
"title": "memory_limit_default",
"description": "This represents the new value for the default memory limit (in mebibytes)
for containers in the pod.",
"type": "integer",
"recreateOnUpdate": false
},
"memory_limit": {
"title": "memory_limit",
"description": "This represents the new value for 'limits.memory' option which is
equivalent to the maximum memory limit (in mebibytes) across all pods in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"memory_request_default": {
"title": "memory_request_default",
"description": "This represents the new value for the default memory request (in
mebibytes) for containers in the pod.",
"type": "integer",
"recreateOnUpdate": false
},
"service_count": {
"title": "service_count",
"description": "This represents the new value for 'serviceCount' option which is the
maximum number of services in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"replica_set_count": {
"title": "replica_set_count",
"description": "This represents the new value for 'replicaSetCount' option which is the
maximum number of ReplicaSets in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"replication_controller_count": {
"title": "replication_controller_count",
"description": "This represents the new value for 'replicationControllerCount' option
which is the maximum number of ReplicationControllers in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"storage_request_limit": {
"title": "storage_request_limit",
"description": "This represents the new value for 'requests.storage' which is the limit
on storage requests (in mebibytes) across all persistent volume claims from pods in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"persistent_volume_claim_count": {
"title": "persistent_volume_claim_count",
"description": "This represents the new value for 'persistentVolumeClaimCount' option
which is the maximum number of PersistentVolumeClaims in the namespace.",
"type": "integer",
"recreateOnUpdate": false
},
"daemon_set_count": {
"title": "daemon_set_count",
"description": "This represents the new value for 'daemonSetCount' option which is the
maximum number of DaemonSets in the namespace.",
"type": "integer",
"recreateOnUpdate": false
}
},
"additionalProperties": false
}
}
},
"required": [
"name"
]
}
VMware cloud templates support the use of limits with supervisor namespaces. Limits enable
you to control resource usage for CPUs and memory as well as the maximum number of pods
allowed in the namespace by deployed machines.
formatVersion: 1
inputs: {}
resources:
Cloud_SV_Namespace_1:
type: Cloud.SV.Namespace
properties:
name: '${env.deploymentName}'
limits:
- cpu_limit: 1000
cpu_request_default: 800
memory_limit: 2000
memory_limit_default: 1500
pod_count: 200
The following topics are available for subscription on the Extensibility > Library > Event Topics
page in vRealize Automation Cloud Assembly. To view these topics, search for Kubernetes in the
Event Topics Search text box.
Click one of the topics to view the schema for that topic which shows all the information that
is collected and transmitted. There are namespace topics for both Kubernetes namespaces
and supervisor namespaces. You can use any of this schema information to set up various
notifications and management and reporting tasks.
You can set up action scripts for CMX-related actions on the Extensibility > Library > Actions
page. Action scripts can be used for various purposes: for example, to create a DNS record of
Kubernetes cluster provisioning. If you are creating a DNS record, you can use the masternodeips
field from the Kubernetes cluster post provision topic with a REST command in an Action script to
create a DNS record.
The Subscriptions page defines the relationship between the event topics and action scripts.
You can view and manage these components on the Subscriptions page in vRealize Automation
Cloud Assembly
See the vRealize Automation Cloud Assembly extensibility documentation at How to extend and
automate application life cycles with extensibility for more information.
Puppet Integration
To integrate Puppet-based configuration management, you must have a valid instance of
Puppet Enterprise installed on a public or private cloud with a vSphere workload. You must
establish a connection between this external system and your vRealize Automation Cloud
Assembly instance. Then you can make Puppet configuration management available to vRealize
Automation Cloud Assembly by adding it to appropriate blueprints.
The vRealize Automation Cloud Assembly blueprint service Puppet provider installs, configures,
and runs the Puppet agent on a deployed compute resource. The Puppet provider supports both
SSH and WinRM connections with the following prerequisites:
n SSH connections:
n The user name must be either a super user or a user with sudo permissions to run
commands with NOPASSWD.
n WinRM connections:
The DevOps administrator is responsible for managing the connections to a Puppet master
and for applying Puppets roles, or configuration rules, to specific deployments. Following
deployment, virtual machines configured to support configuration management are registered
with the designated Puppet Master.
When virtual machines are deployed, users can add or delete a Puppet Master as an
external system or update projects assigned to the Puppet Master. Finally, appropriate users
can de-register deployed virtual machines from the Puppet Master when the machines are
decommissioned.
Ansible enables host key checking by default. If a host is reinstalled with a different key in the
known_hosts file, an error message appear. If a host is not listed in the known_hosts file, you
must supply the key on start-up. You can disable host key checking with the following setting in
the /etc/ansible/ansible.cfg or ~/.ansible.cfg file:
[defaults]
host_key_checking = False
localhost_warning = False
[paramiko_connection]
record_host_keys = False
[ssh_connection]
#ssh_args = -C -o ControlMaster=auto -o ControlPersist=60s
ssh_args = -o UserKnownHostsFile=/dev/null
To avoid the host key checking errors, set host_key_checking and record_host_keys to False
including adding an extra option UserKnownHostsFile=/dev/null set in ssh_args.In addition, if the
inventory is empty initially, Ansible warns that the host list is empty. This causes the playbook
syntax check to fail.
Ansible vault enables you to store sensitive information, such as passwords or keys, in encrypted
files rather than as plain text. Vault is encrypted with a password. In vRealize Automation Cloud
Assembly, Ansible uses Vault to encrypt data such as ssh passwords for host machines. It
assumes that the path to the Vault password has been set.
You can modify the ansible.cfg file to specify the location of the password file using the
following format.
vRealize Automation Cloud Assembly manages the Ansible inventory file, so you must ensure
that the vRealize Automation Cloud Assembly user has rwx access on the inventory file.
If you want to use a non-root user with vRealize Automation Cloud Assembly open-source
integration, the users require a set of permissions to run the commands used by the vRealize
Automation Cloud Assembly open-source provider. The following commands must be set in the
user's sudoers file.
Defaults:myuser !requiretty
If the user is not part of an admin group that has no askpass application specified, set the
following command in the user's sudoers file.
If you encounter errors or other problems when setting up Ansible integration, refer to
the log.txt file at 'cat~/var/tmp/vmware/provider/user_defined_script/$(ls -t ~/var/tmp/
vmware/provider/user_defined_script/ | head -1)/' on the Ansible Control Machine.
n Red Hat Enterprise Linux 8.0 or later 64-bit (x86), supports only Ansible Tower 3.5 and
greater.
The following is a sample inventory file, which is generated during an Ansible Tower installation.
You may need to modify it for vRealize Automation Cloud Assembly integration uses.
/root/ansible-tower-install/ansible-tower-setup-bundle-3.5.2-1.el8
[tower]
localhost ansible_connection=local
[database]
[all:vars]
admin_password='VMware1!'
pg_host=''
pg_port=''
pg_database='awx'
pg_username='awx'
pg_password='VMware1!'
rabbitmq_port=5672
rabbitmq_vhost=tower
rabbitmq_username=tower
rabbitmq_password='VMware1!'
rabbitmq_cookie=cookiemonster
rabbitmq_use_long_name=false
# isolated_key_generation=true
When you add Puppet Enterprise to Cloud Assembly as an external system, by default it is
available on all projects. You can restrict it to specific projects.
To add a Puppet Enterprise integration, you must have the Puppet master name and the
hostname or IP address of the master.
You can find Puppet logs at the following location in case you need to check them for errors or
information purposes.
Log for create and Logs are on the deployed machine at `~/var/tmp/vmware/provider/user_defined_script/
install related events $(ls -t ~/var/tmp/vmware/provider/user_defined_script/ | head -1)/`.
Refer to the log.txt file for full logs. For detailed Puppet agent logs, refer to https://
puppet.com/docs/puppet/4.8/services_agent_unix.html#logging
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Select Puppet.
For Puppet integration to work properly, the provided credentials must be valid for both the
SSH and the API account. Also, the specified OS and application user accounts must have the
same username and password.
5 Click Add.
Results
What to do next
1 Under Cloud Templates in Cloud Assembly, select Puppet under the Content Management
heading on the cloud template menu and drag the Puppet component to the canvas.
Property Description
Agent Run Interval The frequency at which you want the Puppet agent
to poll the Puppet primary machine for configuration
details to be applied to deployed virtual machines
related to this cloud template.
3 Click the Code tab on the right pane to view the YAML code for the Puppet configuration
properties.
When you add a Puppet component to a cloud template, you can add the installMaster property
to the YAML file to point to a Puppet install master, also known as a compile master. The value
of this property can be the IP address or the hostname of the Puppet compile master. Using this
property provides access to enhanced capabilities for deployed Puppet virtual machines and also
supports additional day two actions.
Puppet_Agent:
type: Cloud.Puppet
properties:
account: PEIntegrationAccount
environment: production
role: 'role::linux_webserver'
host: '${CentOS-Puppet.*}'
username: root
password: password123!
installMaster: my-pe-compile-master.example.com
agentConfiguration:
certName: '${CentOS-Puppet.address}'
osType: linux
count: 1
By default vRealize Automation passes some machine related information to Puppet virtual
machines as facts. For Wiindows machines, this information is very limited. On Linux machines
more information is passed by default, and users can pass additional information using custom
properties.
There are some limitations on what is passed to Puppet machines under Linux. Custom properties
on host resources and on the Puppet agent are passed to Puppet virtual machines. Custom
properties on network resources are not passed to the virtual machine. Items passed include
simple properties, boolean properties as well as custom named and complex types such as
nested maps with arrays.
The following example shows how various custom resources can be called on host resources:
resources:
Puppet-Host:
type: Cloud.AWS.EC2.Instance
properties:
customer_specified_property_on_ec2_resource: "property"
customer_specified_property_on_network_resource_that_should_also_be_a_fact_and_is_boolean: true
CustomerNameStuff: "zone A"
try_map:
key: value
keytwo: value
nested_array:
- one
- two
- true
try_array:
- one
- two
-three:
inner_key: value
If a Puppet purge command results in errors, in most cases, vRealize Automation will ignore
purge errors for nodes and proceed with deletion of the node. Even if a certificate is not found
for a specific node, vRealize Automation will proceed with deletion. If vRealize Automation cannot
proceed with the node deletion for some reason, you can click Delete on the Deployments page
Actions menu to open a dialog that will enable you to proceed with the node deletion. A similar
workflow is executed when you remove a Puppet integration from a cloud template and then
apply the template to the deployment. This workflow triggers a node purge operation that is
handled as described above.
When you integrate Ansible Open Source with vRealize Automation Cloud Assembly, you can
configure it to run one or more Ansible playbooks in a given order when a new machine is
provisioned to automate configuration management. You specify the desired playbooks in the
cloud template for a deployment.
When setting up an Ansible integration, you must specify the Ansible Open Source host machine
as well as the inventory file path that defines information for managing resources. In addition,
you must provide a name and password to access the Ansible Open Source instance. Later,
when you add an Ansible component to a deployment, you can update the connection to use
key-based authentication.
By default, Ansible uses ssh to connect to the physical machines. If you are using Windows
machines as specified in the cloud template with the osType Windows property, the
connection_type variable is automatically set to winrm.
Initially, Ansible integration uses the user/password or user/key credentials provided in the
integration to connect to the Ansible Control Machine. Once the connection is successful, the
provided playbooks in the cloud template are validated for syntax.
If the validation is successful, then an execution folder is created on the Ansible Control
Machine at ~/var/tmp/vmware/provider/user_defined_script/. This is the location from which
scripts run to add the host to the inventory, create the host vars files including setting up the
authentication mode to connect to the host, and finally run the playbooks. At this point, the
credentials provided in the cloud template are used to connect to the host from the Ansible
Control Machine.
Ansible integration supports physical machines that do not use an IP address. For machines
provisioned on public clouds such as AWS, Azure, and GCP, the address property in the created
resource is populated with the machine's public IP address only when the machine is connected
to a public network. For machines not connected to a public network, the Ansible integration
looks for the IP address from the network attached to the machine. If there are multiple networks
attached, Ansible integration looks for the network with the least deviceIndex; that is, the index
of the Network Interface Card (NIC) attached to the machine. If the deviceIndex property is not
specified in the blueprint, the integration uses the first network attached.
See What Is configuration management in vRealize Automation Cloud Assembly for more details
on configuring Ansible Open Source for integration in vRealize Automation Cloud Assembly.
Prerequisites
n The Ansible control machine must use an Ansible version. See the vRealize Automation
Support Matrix for information about supported versions.
n The user must have read/write access to the directory where the Ansible inventory file is
located. In addition, the user must have read/write access to the inventory file, if it exists
already.
n If you are using a non-root user with the sudo option, ensure that the following is set in the
sudoers file:
Defaults:user_name !requiretty
and
n Ensure that host key checking is disabled by setting host_key_checking = False at /etc/
ansible/ansible.cfg or ~/.ansible.cfg.
n Ensure that the vault password is set by adding the following line to the /etc/ansible/
ansible.cfg or ~/.ansible.cfg file:
The vault password file contains the password in plain text and is used only when cloud
templates or deployments provide the username and password combination to use between
ACM and the node as show in the following example.
n To avoid host key failures while trying to run playbooks, it is recommended that you include
the following settings in /etc/ansible/ansible config.
[paramiko_connection]
record_host_keys = False
[ssh_connection]
#ssh_args = -C -o ControlMaster=auto -o ControlPersist=60s
ssh_args = -o UserKnownHostsFile=/dev/null # If you already have any options set
for ssh_args, just add the additional option shown here at the end.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
2 Click Ansible.
3 Enter the Hostname, Inventory File Path and other required information for the Ansible Open
Source instance.
5 Click Add.
Results
What to do next
1 On the cloud template canvas page, select Ansible under the Configuration Management
heading on the cloud template options menu and drag the Ansible component to the canvas.
2 Use the panel on the right to configure the appropriate Ansible properties such as specifying
the playbooks to run.
In Ansible, users can assign a variable to a single host, and then use it later in playbooks. Ansible
Open Source integration enables you to specify these host variable in cloud templates. The
hostVariables property must be in proper YAML format, as expected by the Ansible control
machine, and this content will be placed at the following location:
parent_directory_of_inventory_file/host_vars/host_ip_address/vra_user_host_vars.yml
The default location of the Ansible inventory file is defined in the Ansible account as added
on the Integrations page in Cloud Assembly. The Ansible integration will not validate the
hostVariable YAML syntax in the cloud template, but the Ansible Control Machine will throw an
error when you run a playbook in the case of incorrect format or syntax.
The following cloud template YAML snippet shows an example useage of the hostVariables
property.
Cloud_Ansible_1:
type: Cloud.Ansible
properties:
host: '${resource.AnsibleLinuxVM.*}'
osType: linux
account: ansible-CAVA
username: ${input.username}
password: ${input.password}
maxConnectionRetries: 20
groups:
- linux_vms
playbooks:
provision:
- /root/ansible-playbooks/install_web_server.yml
hostVariables: |
message: Hello ${env.requestedBy}
project: ${env.projectName}
When you create an Ansible Open Source integration, you must provide login information for the
integration user to connect with the Ansible control machine using SSH. To run playbooks with an
integration, you can specify a different user in the integration YAML code. If no user is specified,
vRealize Automation uses the integration user by default.
If you specify a different user, that user should have write access to the Ansible hosts file and
should have permission to create private key files.
When you add an Ansible Open Source tile to a cloud template, vRealize Automation creates
the host entry for the attached virtual machine. By default, vRealize Automation will use the
virtual machine’s resource name to create the host entry, but you can specify any name using
the hostName property in the blueprint YAML. In order to communicate with the machine, vRealize
Automation will create the host variable ansible_host: IP Address for the host entry. You can
override the default behaviour to configure communication using FQDN, by specifying the
keyword ansible_host under hostVariables and providing FQDN as its value. The following YAML
code snippet shows an example of how hostname and FQDN communication can be configured:
Cloud_Ansible:
type: Cloud Ansible
properties:
osType: linux
username: ubuntu
groups:
- sample
hostName: resource name
host: name of host
account: name of account
hostVariables:
ansible_host:Host FQDN
In this example you override the default ansible_host value by providing the FQDN. This may be
useful for users who want Ansible Open Souce to connect to the host machine using the FQDN.
The default value of hostVariables in the YAML will be ansible_host:IP_address and the IP address
is used to communicate with the server.
If the YAML count property is more than 1 for Ansible Open Source, the hostname could be
mapped to any of the respective virtual machine's properties.The following example shows
mapping for a virtual machine resource named Ubuntu-VM if we want its address property to
be mapped to the hostname.
hostname: '${resource.Ubuntu-VM.address[count.index]}'
In cloud templates, ensure that the path to the Ansible playbook is accessible to the user
specified in the integration account. You can use an absolute path to specify the playbook
location, but it is not necessary. An absolute path to the user's home folder is recommended so
that the path remains valid even if the Ansible integration credentials change over time.
Prerequisites
n Grant non-administrator users the appropriate permissions to access Ansible Tower. There
are two options that work for most configurations. Choose the one that is most appropriate
for your configuration.
n Grant users Inventory Administrator and Job Template Administrator roles at the
organization level.
n Grant users Administrator permission for a particular inventory and the Execute role for all
job templates used for provisioning.
n You must configure the appropriate credentials and templates in Ansible Tower for use with
your deployments. Templates can be job templates or workflow templates. Job templates
define the inventory and playbook for use with a deployment. There is a 1:1 mapping between
a job template and a playbook. Playbooks use a YAML-like syntax to define tasks that are
associated with the template. For most typical deployments, use machine credentials for
authentication.
n Select the credential that you already created. These are the credentials of the
machine to be managed by Ansible Tower. For each job template, there can be one
credential object.
n For the Limit selection, select Prompt on Launch. This ensures that the job template
runs against the node being provisioned or de-provisioned from vRealize Automation
Cloud Assembly. If this option is not selected, a Limit is not set error will appear when
the blueprint that contains the job template is deployed.
n Select the credentials that you already created and then define the inventory. Using
Workflow Visualizer, design the workflow template.
For the Limit box of workflow or job templates, generally you can select Prompt on
Launch. This selection ensures that the job or workflow template runs against the node
being provisioned or de-provisioned from vRealize Automation Cloud Assembly.
n You can view the execution of the Job templates or workflow templates invoked from
vRealize Automation Cloud Assembly on the Ansible Tower Jobs tab .
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
3 Enter the Hostname, which can be an IP address, and other required information for the
Ansible Tower instance.
4 Enter the UI-based authentication Username and Password for the applicable Ansible Tower
instance.
7 Click Add.
Results
What to do next
Add Ansible Tower components to the desired cloud templates. You must specify the applicable
job template with execute permission for the user specified in the integration account.
1 On the cloud template canvas page, select Ansible under the Configuration Management
heading on the blueprint options menu and drag the Ansible Tower component to the
canvas.
2 Use the panel on the right to configure the appropriate Ansible Tower properties such as job
templates.
When you add an Ansible Tower tile to a cloud template, vRealize Automation creates the host
entry for the attached virtual machine in the Ansible Tower. By default, vRealize Automation will
use the virtual machine’s resource name to create the host entry, but you can specify any name
using the hostName property in the blueprint YAML. In order to communicate with the machine,
vRealize Automation will create the host variable ansible_host: IP Address for the host entry. You
can override the default behaviour to configure communication using FQDN, by specifying the
keyword ansible_host under hostVariables and providing FQDN as its value. The following YAML
code snippet shows an example of how hostname and FQDN communication can be configured:
Cloud_Ansible_Tower_1:
type: Cloud Ansible Tower
properties:
host: name of host
account: name of account
hostName: resource name
hostVariables:
ansible_host:Host FQDN
In this example you override the default ansible_host value by providing the FQDN. This may be
useful for users who want Ansible Tower to connect to the host machine using the FQDN.
The default value of hostVariables in the YAML will be ansible_host:IP_address and the IP address
is used to communicate with the server.
If the YAML count property is more than 1 for Ansible Tower, the hostname could be mapped
to any of the respective virtual machine's properties.The following example shows mapping for a
virtual machine resource named Ubuntu-VM if we want its address property to be mapped to the
hostname.
hostname: '${resource.Ubuntu-VM.address[count.index]}'
When you add an Ansible Tower component to a cloud template, and you can specify the job
template to call in the cloud template YAML. You can also specify workflow templates or a
combination of job templates and workflow templates. If you don't specify the template type, by
default vRealize Automation assumes that you are calling a job template.
The following YAML snippet shows an example of how a combination of job and workflow
templates can be called in an Ansible Tower cloud template.
Cloud_Ansible_1:
type: Cloud.Ansible.Tower
properties:
host: ‘${resource.CentOS_Machine.*}’
account:
maxConnectionRetries: 2
maxJobRetries: 2
templates:
provision:
- name: My workflow
type: workflow
- name: My job template
We added the maxConnectionsRetries and maxJobRetries to handle Ansible related failures. The
cloud templates accepts the custom value and, in case no value is provided, it uses the default
value. For maxConnectionRetries, the default value is 10, and for maxJobRetries the default value is
3.
Note Earlier versions of vRealize Automation supported the execution of job templates only
using the jobTemplate schema in the cloud template. jobTemplate is now deprecated and might
be removed in future releases. For now, using the jobTemplate property will continue to work as
expected. To run workflow templates and use additional features, it is recommended to use the
templates schema.
Cloud Assembly cloud templates for Ansible Tower integrations include the useDefaultLimit
property with a true or false value to define where Ansible templates are executed. Ansible
templates can be job templates or workflow templates. If this value is set to true, the specified
templates are run against the machine specified in the Limit box on the Ansible Templates page.
If the value is set to false, the templates are run against the provisioned machine, but users
should check the Prompt on Launch checkbox on the Ansible Tower Templates page. By default,
the value of this property is false. The following YAML example shows how the useDefaultLimit
property appears in cloud templates.
templates:
provision:
- name: ping aws_credentials
type: job
useDefaultLimit: false
extraVars: '{"rubiconSurveyJob" : "checkSurvey"}'
In addition, as the preceding example shows, you can use the extraVars property to specify
extra variables or survey variables. This capability can be useful for running templates that
require input. If a user has maintained the survey variable, then you must pass the variable in
the extraVars section of the cloud template to avoid errors.
With vRealize Automation SaltStack Config, you can provision, configure, and deploy software
to your virtual machines at any scale using event-driven automation. You can also use SaltStack
Config to define and enforce optimal, compliant software states across your entire environment.
Installation methods
Before integrating SaltStack Config with vRealize Automation, you must first install it in your
environment.
n Standard installation - Installs the architectural components needed for SaltStack Config in
four or more separate nodes.
n vRealize Suite Lifecycle Manager (vRLCM) installation - Installs SaltStack Config and all of its
architectural components on a single node. This method also installs the Salt master host and
configures a required vRealize Automation property group.
For information about installing SaltStack Config using either installation method, see Installing
and Configuring SaltStack Config.
Note If you are unsure which installation method is best for your system, the standard
installation is recommended. The vRealize Suite Lifecycle Manager installation method is not
recommended for production grade systems with more than 1,000 nodes.
Considerations
Integrated vRealize Automation SaltStack Config is available for vRealize Automation with the
following conditions:
n SaltStack Config runs on Salt, an open-source automation engine. In order to begin using
SaltStack Config for configuration management, you also need to install and run the Salt
minion service on any nodes that you intend to manage using SaltStack Config. See Install
Salt on your infrastructure for more information.
n vRealize Automation does not support multi-tenancy for SaltStack Config currently.
n The vRealize Automation tenant can support one SaltStack Config integration and one Salt
master. The Salt master can support multiple minions.
n Deleting a SaltStack Config integration in vRealize Automation does not check if there are
existing deployments that use the SaltStack Config integration.
Prerequisites
n Verify that you have vRealize Automation administrator credentials and SaltStack Config
administrator credentials (root level access).
You need vRealize Automation administrator credentials and SaltStack Config administrator
credentials (root level access) to create a SaltStack Config integration.
You also need SaltStack Config administrator credentials to open and work in the SaltStack
Config service itself.
You use vRealize Automation credentials to access vRealize Automation and SaltStack Config
credentials to access SaltStack Config.
For information about SaltStack Config administrator credentials, see the Installing and
Configuring SaltStack Config guide.
n Verify that the Salt master to be used in the SaltStack Config integration contains the Master
Plugin.
n Verify that you have the SaltStack Config service administrator role in vRealize Automation.
See What are the vRealize Automation user roles.
n Verify that you have the Cloud Assembly service administrator role in vRealize Automation.
See Organization and service user roles in vRealize Automation.
Note Unlike other vRealize Automation integration types, you cannot add a SaltStack Config
integration by selecting Infrastructure > Connections > Integrations > Add Integration. The
SaltStack Config integration is not available until it has been installed by using either of the two
installation methods described above.
1 In Cloud Assembly, select Infrastructure > Connections > Integrations, select the available
SaltStack Config integration tile, and click Open.
b Enter the SaltStack Config administrator user name and password used to access the
specified host.
The host name value is specified during SaltStack Config installation as the master
address value. It cannot be changed after installation.
c Click Validate to confirm your administrator access to the SaltStack Config integration
host.
d (Optional) Enter capability tags. For information about tagging, see Using constraint tags
in vRealize Automation Cloud Assembly.
e Click Save.
After you save the SaltStack Config integration point, you can then open the SaltStack Config
integration service itself from either the Integrations page or from the vRealize Automation
Service Console.
3 Click the saved integration point to open the SaltStack Config integrated service and access
the host.
4 When prompted to log in to SaltStack Config, enter your SaltStack Config administrator user
name and password.
The SaltStack Config product documentation is available as separate PDFs. Use the SaltStack
Config product documentation to explore ways in which you can leverage SaltStack Config
capabilities in your vRealize Automation cloud templates and deployments.
An Active Directory policy that is associated with a project is applied to all virtual machines
provisioned within the scope of that project. Users can specify one or more tags to selectively
apply the policy to virtual machines that are provisioned to the cloud zones with matching
capability tags.
For on-premises deployments, Active Directory integration enables you to set up a health check
feature that shows the status of the integration and the underlying ABX integration on which
it relies, including the required extensibility cloud proxy. Prior to applying an Active Directory
policy, vRealize Automation Cloud Assembly checks the status of the underlying integrations. If
the integration is healthy, vRealize Automation Cloud Assembly creates the deployed computer
objects in the specified Active Directory. If the integration is unhealthy, the deploy operation
skips the Active Directory phase during provisioning.
Prerequisites
n Active Directory integration requires an LDAP connection to the Active Directory server.
n If you are configuring an Active Directory integration with vCenter on-premises, you must
configure an ABX integration with an extensibility cloud proxy. Select Extensibility > Activity
> Integrations and choose Extensibility Actions On Prem.
n If you are configuring an integration with Active Directory in the cloud, you must have a
Microsoft Azure or Amazon Web Services account.
n You must have a project configured with appropriate cloud zones, and image and flavor
mappings to use with the Active Directory integration.
n The desired OU on your Active Directory must be pre-created before you associated your
Active Directory integration with a project.
Procedure
1 Select Infrastructure > Connections > Integrations and then New Integration.
3 On the Summary tab, enter the appropriate LDAP host and environment names.
5 Enter the appropriate Base DN that specifies the root for the desired Active Directory
resources.
Note You can specify only one DN per Active Directory integration.
8 Click Save.
9 Click the Project tab to add a project to the Active Directory integration.
On the Add Projects dialog, you must select a project name and a relative DN, which is a DN
that exists within the Base DN specified on the Summary tab.
10 Click Save.
Results
You can now associate the project with Active Directory integration to a cloud template. When a
machine is provisioned using this cloud template, it is pre-staged in the specified Active Directory
and Organizational Unit.
You can also implement a tag-based health check for on- premises Active Directory integrations
as follows.
2 Click the Project tab to add a project to the Active Directory integration.
3 Select a project name and a relative DN on the Add Projects dialog. The relative DN must
exist within the specified base DN.
There are two switches on this dialog that enable you to control Active Directory
configuration from cloud templates. Both switches are off by default.
n Override - This switch enables you to override Active Directory properties, specifically
the relative DN in cloud templates. When switched on, you can change the OU specified
in the relativeDN property in the cloud template. When provisioned the machine will be
added to the OU specified in the relativeDN property in the cloud template. The following
example shows the cloud template hierarchy in which this propety appears.
activeDirectory:
relativeDN: OU=ad_integration_machine_override
n Ignore - This switch enables you to ignore the Active Directory configuration for
the project. When switched on, it adds a property to the cloud template called
ignoreActiveDirectory for the associated virtual machine. When this property is set to
true means that the machine is not added to the Active Directory when deployed.
4 Add appropriate tags. These tags are applicable to the cloud zone to which the Active
Directory policy may apply.
5 Click Save.
The Status of the Active Directory integration is displayed for each integration on the
Infrastructure > Connections > Integrations page in vRealize Automation Cloud Assembly.
You can associate the project with Active Directory integration with a cloud template. When a
machine is provisioned using this template, it is pre-staged in the specified Active Directory and
OU.
Prerequisites
n vRealize Automation supports integration only with VMware SDDC manager 4.1 and newer.
Procedure
1 Select Infrastructure > Connections > Integrations and click Add Integration.
3 In the Summary section, enter a Name and Description for the integration.
4 In the SDDC Manager Credentials section, enter the SDDC Mgr IP address/FQDN for the
SDDC Manager server machine.
5 Enter the Username and Password for the admin account to be used to initially connect to
the SDDC Manager. As a best practice, avoid using the administrator account to connect. Use
a different account that has admin privileges in SDDC Manager to create service roles.
These credentials are used to initially set up the connection to the SDDC Manager, and then
service credentials are created to use when connecting from a VCF cloud account.
7 Click Add.
Results
After the integration is created, you can view workloads associated with the SDDC on the
Workload Domain tab that appears on the completed integration page. Also, you can view and
select workloads associated with the integration and then click the Add Cloud Account button to
open a page for creating a VCF cloud account that will use the selected workload.
What to do next
After you configure the VCF cloud account, a Setup Cloud button appears at the top of the
page. Click this button to initiate the VCF cloud setup wizard.
You can integrate one vRealize Automation instance with multiple vRealize Operations Manager
instances, but a vRealize Operations Manager instance can only be connected to one vRealize
Automation instance.
You cannot connect an aggregated vRealize Operations Manager cluster to vRealize Automation.
See the following sections for details. For pricing information, see How to use Pricing Cards.
You enable workload placement at the vSphere based cloud zone level. Only Distributed
Resource Scheduler (DRS) enabled clusters of a cloud zone are eligible for advanced placement
using vRealize Operations Manager.
When using advanced workload placement, you must apply vRealize Automation tagging
in order to implement business intent decisions, instead of using the vRealize Operations
Manager business intent options.
When integrating with vRealize Operations Manager, vRealize Automation continues to follow
its application intent model and its related constraints to filter for target placement. Then, from
within those results, it uses the vRealize Operations Manager recommendation to further refine
placement.
n vRealize Operations Manager does not support workload placement on resource pools in
vCenter Server.
n If vRealize Operations Manager is down, the timeout used for workload placement to call
vRealize Operations Manager might expire.
n Placement doesn't cross multiple cloud zones. vRealize Automation sends one cloud zone to
vRealize Operations Manager for placement recommendations within that single cloud zone.
1 In vRealize Automation Cloud Assembly, connect to your vCenter Server cloud account.
The options are under Infrastructure > Connections > Cloud Accounts.
2 In vCenter Server, verify that DRS enabled clusters exist and are set to fully automated.
3 In vRealize Operations Manager, verify that the same vCenter Server is being managed.
4 In vRealize Automation Cloud Assembly, add the vRealize Operations Manager integration.
To add the integration, you need the vRealize Operations Manager primary node URL below,
plus the login username and password.
https://operations-manager-IP-address-or-FQDN/suite-api
Also synchronize any time that vRealize Automation Cloud Assembly and vRealize Operations
Manager begin managing a new vCenter Server.
6 In vRealize Automation Cloud Assembly, create a cloud zone for the vCenter Server account.
The options are under Infrastructure > Configure > Cloud Zones.
7 Under the cloud zone Summary tab, set the Placement Policy to ADVANCED.
8 Under the Placement Policy, select whether to have vRealize Automation fall back to its
default placement if vRealize Operations Manager returns no recommendations.
filterName: ComputePlacementPolicyAffinityHostFilter
˅ computeLinksBefore
˅ computeLinksAfter
˅ filteredOutHostsReasons
Entry Description
With continuous optimization, you take advantage of workload rebalancing and relocation, and
use vRealize Automation with vRealize Operations Manager beyond initial workload placement.
As virtualization resources move or come under heavier or lighter load, vRealize Automation
provisioned workloads can move as needed.
There is one new CDC for each vRealize Automation vSphere cloud zone.
n The newly created CDC contains every vRealize Automation managed cluster associated with
the cloud zone.
Note Do not manually create a mixed CDC of vRealize Automation and non-vRealize
Automation clusters.
n You use vRealize Operations Manager to run continuous optimization for the newly created
vRealize Automation based CDC.
n Workloads can only be rebalanced or relocated within the same cloud zone or CDC.
n If you have existing placement violations, optimization can fix vRealize Operations
Manager operational intent issues.
n If you have existing placement violations, optimization cannot fix vRealize Operations
Manager business intent issues.
For example, if you used vRealize Operations Manager to manually move a virtual
machine to a cluster that doesn't support your constraints, vRealize Operations Manager
doesn't detect a violation nor try to resolve it.
n This release obeys operational intent at the CDC level. All member vRealize Automation
clusters are optimized to the same settings.
To set a different operational intent for clusters, you must configure them in separate
vRealize Automation CDCs, associated with separate vSphere cloud zones. Having different
test and production clusters might be one example situation.
n vRealize Automation application intent and the constraints defined in vRealize Automation are
honored during any optimization rebalance or relocation operations.
Other than adding the integration within vRealize Automation Cloud Assembly, there are no
separate installation steps for continuous optimization. You may begin configuring and using
vRealize Operations Manager for workload relocation in the new datacenter. See the Continuous
optimization example .
Continuous optimization example
The following example shows a rebalancing workflow for vRealize Automation continuous
optimization with vRealize Operations Manager.
1 From the vRealize Operations Manager home page, click Workload Optimization.
You cannot select or edit Business Intent, which is disabled when the datacenter is for
vRealize Automation optimization.
5 Click Next.
When rebalancing finishes, vRealize Automation refreshes. The Compute Resources page shows
that machines have moved.
In vRealize Operations Manager, the next data collection refreshes the display to show that
optimization is complete.
In vRealize Operations Manager, you can review the operation by clicking Administration >
History > Recent Tasks.
Locate vRealize Automation managed datacenters
You can use vRealize Operations Manager to display only the vRealize Automation managed
datacenters.
Procedure
1 From the vRealize Operations Manager home page, click Workload Optimization.
Reviewing the filtered set of metrics directly in vRealize Automation saves you the task of
accessing or searching vRealize Operations Manager. Although you cannot launch in context
to vRealize Operations Manager, you are of course free to log in and use vRealize Operations
Manager for additional data as needed.
Procedure
2 Under Configured Adapter Instances, verify that you have a vCenter Adapter for the
vSphere cloud zone that vRealize Automation provisions to and that it is receiving data.
4 Enter the vRealize Operations Manager primary node URL, plus the vRealize Operations
Manager login username and password.
https://operations-manager-IP-address-or-FQDN/suite-api
5 Click Deployments > Deployments, select a deployment, and verify that the Monitor tab
appears.
To access monitoring, click a deployment and select the Monitor tab. If the tab is missing, see
Enable vRealize Operations Manager data.
To see alerts, highlight the deployment name at the top of the component tree in the left panel.
n Only Health badges and Health alerts appear. Other alert types such as Efficiency or Risk are
not supported.
To access monitoring, click a deployment and select the Monitor tab. If the tab is missing, see
Enable vRealize Operations Manager data.
To see metrics, expand the component tree on the left, and highlight a virtual machine.
n Metrics are not cached. They come directly from vRealize Operations Manager and might
take a few moments to load.
n Only virtual machine metrics appear. Metrics from other components such as vCloud Director,
Software, or XaaS are not supported.
n Only vSphere virtual machine metrics appear. Other cloud providers such as AWS or Azure
are not supported.
Metrics appear as timeline graphs that show highs and lows for the following measures.
n CPU
n Memory
n Storage IOPS
n Network MBPS
To reveal the specific metric name, click the blue information icon at the upper left corner of the
timeline.
To see metrics provided by vRealize Operations Manager, click a deployment and select the
Monitor tab. If the tab is missing, see Enable vRealize Operations Manager data.
Metrics for the past day, week, or month are available. To zoom in on an area of concern, select a
small area in the lower, shaded part under any metric timeline:
The Insights dashboard and Alerts tab pages provide the real-time capacity and related
awareness information that you need to make management decisions in vRealize Automation
without needing to open vRealize Operations Manager. The information is supplied by the
associated vRealize Operations Manager application.
The Alerts pages displays potential capacity and performance concerns for objects such as cloud
zones, projects, deployments, and virtual machines. They also contain information for project
owners as to which of their deployments can be optimized. Each deployment link opens the
Optimize tab in the deployment, where specific guidance is provided.
The following diagram illustrates the relationship between vRealize Automation resources and
deployments, and the data that the associated vRealize Operations Manager application provides
in vRealize Automation.
n Reclaimable resource capacity, with cost savings, for deployments and projects in a cloud
zone
It also provides an option to alert project owners of deployments that can be optimized.
The Insights dashboard is available for vSphere and VMware Cloud on AWS cloud zones,
provided that the cloud accounts are configured in both vRealize Automation and vRealize
Operations Manager and are being monitored in vRealize Operations Manager.
For details, see: How to use the Insights dashboard to monitor resource capacity and notify
project owners in vRealize Automation .
n Severity
n Status
n Impact
n Type
n Subtype
n Resource
Each filter can be further refined using quick filters. For example, the resource filter can be
further refined by its quick filter types of cloud zone, virtual machine, deployment, and project
resource.
You use combinations of filters and quick filters to control which alerts are available for display.
Some Alerts provide information about, and a link to, deployments that can be optimized.
An individual alert can provide the option to contact the project owner, examine an Insights
dashboard, or take possible actions.
Alerts are available for vSphere and VMware Cloud on AWS resource objects.
For details about how to configure and use integrated alerts, see How to use Alerts to manage
resource capacity, performance, and availability in vRealize Automation and How to use Alerts to
optimize deployments in vRealize Automation.
When you add a cloud account that contains machines that were deployed outside of vRealize
Automation Cloud Assembly, the machines are not managed by Cloud Assembly until you
onboard them. Use an onboarding plan to bring unmanaged machines into vRealize Automation
Cloud Assembly management. You create a plan, populate it with machines, and then run the
plan to import the machines. Using the onboarding plan, you can create a cloud template and can
also create one or many deployments.
You can onboard one or many unmanaged machines in a single plan by selecting machines
manually.
n You can onboard up to 3,500 unmanaged machines within a single onboarding plan per hour.
n You can onboard up to 17,000 unmanaged machines concurrently within multiple onboarding
plans per hour.
Machines that are available for workload onboarding are listed on the Resources > Machines
page relative to a specific cloud account type and region and labeled as Discovered in the
Origin column. Only machines that have been data-collected are listed. After you onboard the
machines, they appear in the Origin column as Deployed.
The person who runs the workload onboarding plan is automatically assigned as the machine
owner.
Onboarding also supports onboarding custom properties, attached disks, changing deployment
owners, and vSphere networks.
n Custom properties - you can set custom properties at the plan and at the individual machine
levels. A custom property set at the machine level overrides the same property on the plan
level.
n Attached disks - If a machine has any non-bootable disks, they are automatically onboarded
with the parent machine. To view non-bootable disks, click the machine name in the plan, and
then navigate to the Storage tab.
n Deployment ownership - Onboarding allows you to change the default deployment owner.
To change the owner, select a deployment from the Deployment tab, click Edit owner, and
select the desired user associated with the project.
Onboarding examples
For examples of onboarding techniques, see Example: Onboard selected machines as a single
deployment in vRealize Automation Cloud Assembly .
A Deployment Onboarded event is created when you run the plan. Using Extensibility tab options,
you can subscribe to these deployment events and perform actions on them.
After onboarding, you can update a project as a day 2 action for onboarded deployments. To
use the change project action, the target project must use the same clound zone resources
as the deployment. You cannot run the change project action on any onboarded deployments
where you made changes after onboarding.
When you create a cloud account, all machines that are associated to it are data-collected
and then displayed on the Infrastructure > Resources > Machines page. If the cloud account
has machines that were deployed outside of vRealize Automation Cloud Assembly, you can
use an onboarding plan to allow vRealize Automation Cloud Assembly to manage the machine
deployments.
Prerequisites
n Verify that you have the required user role. See What are the vRealize Automation user roles.
This procedure involves some of the steps from the basic Wordpress use case. See Tutorial:
Setting up and testing multi-cloud infrastructure and deployments in vRealize Automation
Cloud Assembly.
n Create a project, add users, and assign user roles in the project. See Part 2: Create the
example vRealize Automation Cloud Assembly project.
n Create an Amazon Web Services cloud account for the project. See 1. Add cloud
accounts .
The Amazon Web Services cloud account in this procedure contains machines that were
deployed before the cloud account was added to vRealize Automation Cloud Assembly
and by an application other than vRealize Automation Cloud Assembly.
n Verify that the Machines page contains machines to onboard. See Machine resources in
vRealize Automation.
Procedure
3 Click Create.
4 On the plan's Deployments tab, click Select Machines, choose one or more machines, and
click OK.
5 Select Create one deployment that contains all the machines and click Create.
6 Click the check box next to the new deployment name and click Cloud template....
Note When your onboarding plan uses a vSphere machine, you must edit the cloud
template after the onboarding process is complete. The onboarding process cannot link
the source vSphere machine and its machine template, and the resultant cloud template
will contain the imageRef: "no image available" entry in the cloud template code. The cloud
template cannot be deployed until you specify the correct template name in the imageRef:
field. To make it easier to locate and update the cloud template after the onboarding process
is complete, use the Cloud template name option on the deployment's Cloud template
configuration page. Record the auto-generated cloud template name or enter and record
a cloud template name of your choice. When onboarding is complete, locate and open the
cloud template and replace the "no image available" entry in the imageRef: field with the
correct template name.
9 Click the deployment name check box, click Run, and then click Run again on the Run plan
page.
The selected Amazon Web Services machines are onboarded as a single deployment, with an
accompanying cloud template.
10 Open and examine the cloud template by clicking the Cloud templates tab and then clicking
the cloud template name.
11 Open and examine the deployment by clicking the Deployments tab and then clicking the
deployment name.
For related and additional information about administration methods, such as using working with
users and logs, and joining or leaving the Customer Experience program, see the Administering
vRealize Automation help.
To configure and use public cloud providers such as Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud Platform (GCP) as well as external integration points such as IPAM,
Ansible, and Puppet, with vRealize Automation, you must configure an Internet proxy server to
access the internal vRealize Automation Internet proxy server.
vRealize Automation contains an internal proxy server that communicates with your Internet
proxy server. This server communicates with your proxy server if it has been configured with
the vracli proxy set ... command. If you have not configured an Internet proxy server for your
organization, then the vRealize Automation internal proxy server attempts to connect directly to
the Internet.
You can set up vRealize Automation to use an Internet proxy server by using the supplied vracli
command line utility. Information about how to use the vracli API is available by using the --help
argument in the vracli command line, for examplevracli proxy –-help.
Access to the Internet proxy server requires use of the actions-based extensibility (ABX) On-
Prem Embedded controls that are built into vRealize Automation.
Note Access to Workspace ONE Access (previously named VMware Identify Manager) is not
supported by way of the Internet proxy. You cannot use the vracli set vidm command to access
Workspace ONE Access through the Internet proxy server.
The internal proxy server requires IPv4 as its default IP format. It doesn't require Internet protocol
restrictions, authentication or man-in-the-middle actions on TLS (HTTPS) certificate traffic.
Prerequisites
n Verify that you have an existing HTTP or HTTPS server, that you can use as the Internet
proxy server, in the vRealize Automation network that is able to pass outgoing traffic to
external sites. The connection must be configured for IPv4.
n Verify that the target Internet proxy server is configured to support IPv4 as its default IP
format and not IPv6.
n If the Internet proxy server uses TLS and requires an HTTPS connection with its clients, you
must import the server certificate by using one of the following commands, prior to setting
the proxy configuration.
Procedure
1 Create a proxy configuration for the pods or containers that are used by Kubernetes. In this
example, the proxy server is accessed by using the HTTP scheme.
{
"enabled": true,
"host": "10.244.4.51",
"java-proxy-exclude": "*.local|*.localdomain|localhost|10.244.*|192.168.*|
172.16.*|kubernetes|sc2-rdops-vm06-dhcp-198-120.eng.vmware.com|10.192.204.9|*.eng.vmware.com|sc2-
rdops-vm06-dhcp-204-9.eng.vmware.com|10.192.213.146|sc2-rdops-vm06-dhcp-213-146.eng.vmware.com|
10.192.213.151|sc2-rdops-vm06-dhcp-213-151.eng.vmware.com",
"java-user": null,
"password": null,
"port": 3128,
"proxy-exclude": ".local,.localdomain,localhost,10.244.,192.168.,172.16.,kubernetes,sc2-
rdops-vm06-dhcp-198-120.eng.vmware.com,10.192.204.9,.eng.vmware.com,sc2-
rdops-vm06-dhcp-204-9.eng.vmware.com,10.192.213.146,sc2-rdops-vm06-
dhcp-213-146.eng.vmware.com,10.192.213.151,sc2-rdops-vm06-dhcp-213-151.eng.vmware.com",
"scheme": "http",
"upstream_proxy_host": null,
"upstream_proxy_password_encoded": "",
"upstream_proxy_port": null,
"upstream_proxy_user_encoded": "",
"user": null,
"internal.proxy.config": "dns_v4_first on \nhttp_port 0.0.0.0:3128\nlogformat
squid %ts.%03tu %6tr %>a %Ss/%03>Hs %<st %rm %ru %[un %Sh/%<a %mt\naccess_log stdio:/tmp/
logger squid\ncoredump_dir /\ncache deny all \nappend_domain .prelude.svc.cluster.local\nacl
mylan src 10.0.0.0/8\nacl mylan src 127.0.0.0/8\nacl mylan src 192.168.3.0/24\nacl
proxy-exclude dstdomain .local\nacl proxy-exclude dstdomain .localdomain\nacl proxy-
exclude dstdomain localhost\nacl proxy-exclude dstdomain 10.244.\nacl proxy-exclude dstdomain
192.168.\nacl proxy-exclude dstdomain 172.16.\nacl proxy-exclude dstdomain kubernetes\nacl
proxy-exclude dstdomain 10.192.204.9\nacl proxy-exclude dstdomain .eng.vmware.com\nacl proxy-
Note If you have configured an Internet proxy server for your organization, then
"internal.proxy.config.type": "non-default" appears in the above example instead of
'default'. For security, the password is not shown.
Note If you use the -proxy-exclude parameter, you must edit the default values. For
example, if you want to add acme.com as a domain that cannot be accessed by using the
Internet proxy server, use the following steps:
a Enter vracli proxy default-no-proxy to obtain the default proxy-exclude settings. This is a
list of automatically generated domains and networks.
c Enter vracli proxy set .... --proxy-exclude ... to update the configuration settings.
3 (Optional) Exclude DNS domains, FQDNs, and IP addresses from being accessed by the
Internet proxy server.
Always modify the default values of the proxy-exclude variable using parameter --proxy-
exclude. To add the domain exclude.vmware.com, first use the vrali proxy show command,
then copy the proxy-exclude variable, and add the domain value using the vracli proxy
set ... command as below:
Note Add elements to proxy-exclude instead of replacing values. If you delete proxy-
exclude default values, vRealize Automation does not function properly. If this happens,
delete the proxy configuration and start over.
4 After you set the Internet proxy server with vracli proxy set ... command, you can use the
vracli proxy apply command to update the Internet proxy server configuration and make the
latest proxy settings active.
5 If you have not already done so, activate the script changes by running the following
command:
/opt/scripts/deploy.sh
6 (Optional) If needed, configure the proxy server to support external access on port 22.
To support integrations such as Puppet and Ansible, the proxy server must allow port 22 to
access the relevant hosts.
http_port 0.0.0.0:3128
maximum_object_size 5 GB
cache_dir ufs /var/spool/squid 20000 16 256
coredump_dir /var/spool/squid
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern (Release|Packages(.gz)*)$ 0 20% 2880
refresh_pattern . 0 20% 4320
client_persistent_connections on
server_persistent_connections on
You can associate the same existing NSX-T network to network profiles for different vCenters
and provision a deployment in either vCenter based on constraints. Several examples are listed
below:
n Cloud templates that contain a single machine with multiple NICs that use the same network
profile, where that network profile contains an NSX-T network that spans multiple vCenters.
n Cloud templates that contain a machine on a private network that uses a network profile with
subnet-based isolation and that uses an NSX-T existing network that spans multiple vCenters.
n Cloud templates that contain a single machine on a private network that uses a network
profile with security group-based isolation and that uses an NSX-T network that spans
vCenters.
n Cloud templates that contain a single machine on a routed network that uses a network
profile that contains an NSX-T network that spans multiple vCenters.
n Cloud templates that contain an on-demand load balancer that is defined in a network profile
where the load balancer is applied to all the vCenter machines on the network.
n Cloud templates that contain an on-demand network that is defined in a network profile
where the on-demand network is used by all the vCenters that use the network profile.
n Cloud templates that contain an on-demand security group that optionally contains firewall
rules and where the security group is associated to all the vCenters on the network.
You can configure vRealize Automation internal or external IPAM on the NSX-T network and
share the same IP address for machines that are provisioned in different vCenters.
If no network profile is defined in your system, you can provision a cloud template that contains
multiple machines on different vCenters that share a single existing NSX-T network.
If you remove an association between an NSX cloud account and a vCenter cloud account, the
infrastructure elements are not updated automatically by vRealize Automation. You must update
your existing network profiles to remove the associated NSX objects.
The user interface provides information to help highlight the impacted network profile elements
as follows:
n The object is marked as invalid and the message Some network objects are missing or
invalid. is displayed.
n The objects are removed when you save the network profile.
n If the network profile has app isolation configured, you must update the Isolation policy
settings before the network profile can be saved.
n If the network profile has security groups or load balancers selected, the objects are removed
when you save the network profile.
Existing deployments continue to work as designed for existing components, but will fail when
creating new components, for example in a scale-out operation.
If you re-establish the association, the network profile is repopulated and existing deployments
work as designed.
If you remove the NSX cloud account, the above behavior is the same, but network objects are
marked as missing rather than invalid.
The process for building and deploying a custom IPAM integration package for vRealize
Automation by using the supplied IPAM SDK is described in the Creating and Deploying a
Provider-specific IPAM Integration Package for VMware Cloud Assembly document. As described
in the document, you can download the most recent VMware vRealize Automation Third-Party
IPAM SDK from the VMware code site. The following IPAM SDK packages are available:
Before taking the time to create a vendor-specific IPAM integration package by using the IPAM
SDK, check to see if one already exists for vRealize Automation. You can check for a provider-
specific IPAM integration package on the IPAM provider's website, in the VMware Marketplace
and from the vRealize Automation Marketplace tab.
While the Tutorial: Configuring a provider-specific external IPAM integration for vRealize
Automation example is vendor-specific, it also contains helpful reference information.
vRealize Automation supports connections with Azure VMware Solution (AVS) to move and run
VMware workloads on an Azure cloud environment. AVS was created by Microsoft to support
interface with VMware environments.
Use of AVS is well documented by Microsoft. You can find the documentation here:
To use AVS in vRealize Automation, you must set up both vCenter and NSX-T cloud accounts.
See the following documentation for setting up these cloud accounts:
n Set up vCenter cloud account - Create a vCenter cloud account in vRealize Automation
n Create an NSX-T cloud account - Create an NSX-T cloud account in vRealize Automation
The following procedure outlines the high level steps to configure your environment so that you
can deploy vRealize Automation workloads on AVS.
1 Install and configure Azure VMware Solution based on the vendor instructions as appropriate
for your environment.
2 Create vCenter and NSX-T cloud accounts within your vRealize Automation deployment.
vRealize Automation supports connections with Google Cloud VMware Engine (GCVE) to move
and run VMware workloads on Google Cloud. GCVE was created by Google to support interface
with VMware environments.
Use of GCVE is well documented by Google. You can find the documentation here:
To use GCVE with vRealize Automation, you must set up both vCenter and NSX-T cloud accounts
in vRealize Automation. See the following documentation for setting up these cloud accounts:
n Set up vCenter cloud account - Create a vCenter cloud account in vRealize Automation
n Create an NSX-T cloud account - Create an NSX-T cloud account in vRealize Automation
The following procedure outlines the high level steps to configure your environment so that you
can deploy vRealize Automation workloads on GCVE.
1 Install and configure Google Cloud VMware Engine based on the vendor instructions as
appropriate for your environment.
2 Create vCenter and NSX-T cloud accounts within your vRealize Automation deployment.
vRealize Automation supports connection with Oracle Cloud VMware Solution (OCVS) to move
and run VMware workloads on Oracle Cloud. OCVS was created by Oracle to support interface
with VMware environments.
Use of OCVS is well documented by Oracle. You can find the documentation here:
To use OCVS, you must set up both vCenter and NSX-T cloud accounts. See the following
documentation for setting up these cloud accounts:
n Set up vCenter cloud account - Create a vCenter cloud account in vRealize Automation
n Create an NSX-T cloud account - Create an NSX-T cloud account in vRealize Automation
The following procedure outlines the high level steps to configure your environment so that you
can deploy vRealize Automation workloads on OCVS.
1 Install and configure Oracle Cloud VMware Solution based on the vendor instructions as
appropriate for your environment.
2 Create vCenter and NSX-T cloud accounts within your vRealize Automation deployment.
vRealize Automation supports connection with VMware Cloud on Dell EMC to move and run
VMware workloads.
To use vRealize Automation with VMware Cloud on Dell EMC, you must set up a vCenter cloud
account. See the following documentation for setting up this cloud account:
n Set up vCenter cloud account - Create a vCenter cloud account in vRealize Automation
The following procedure outlines the high level steps to configure your environment so that you
can deploy vRealize Automation workloads on VMware Cloud on Dell EMC.
1 Install and configure VMware Cloud on Dell EMC based on the vendor instructions as
appropriate for your environment.
n How to add cloud zones that define vRealize Automation Cloud Assembly target placement
regions or data centers
n How to add flavor mappings in vRealize Automation to specify common machine sizings
n How to add image mapping in vRealize Automation to access common operating systems
n How to add vRealize Automation Cloud Assembly storage profiles that account for different
requirements
n How do I use tags to manage vRealize Automation Cloud Assembly resources and
deployments
Cloud zones in a specific account region are where your cloud templates deploy workloads. Each
cloud zone is associated with a vRealize Automation Cloud Assembly project.
Select Infrastructure > Configure > Cloud Zones and click Add New Zone.
Cloud zones are specific to a region, you must assign them to a project. There is a many to many
relationship between cloud zones and projects. vRealize Automation Cloud Assembly supports
deployment to the most popular public clouds including Azure, AWS and GCP as well as to
vSphere. See Adding cloud accounts to vRealize Automation Cloud Assembly.
Additional placement controls include placement policy options, capability tags, and compute
tags.
n Placement policy
Placement policy drives host selection for deployments within the specified cloud zone.
n default - Distributes compute resources across clusters and hosts randomly. This
option works at an individual machine level. For example, all machines in a particular
deployment are distributed randomly across the available clusters and hosts that satisfy
the requirements.
n binpack - Places compute resources on the most loaded host that has enough available
resources to run the given compute.
n spread - Provisions compute resources, at a deployment level, to the cluster or host with
the least number of virtual machines. For vSphere, Distributed Resource Scheduler (DRS)
distributes the virtual machines across the hosts. For example, all requested machines
in a deployment are placed on the same cluster, but the next deployment may choose
another vSphere cluster depending on the current load.
If you request a cluster of 3 virtual machines and you select a Spread policy, they should
all be placed on cluster 1. The updated loads become 8 virtual machines for cluster 1, while
the loads for clusters 2 and 3 remain the same at 9 and 6.
Then, if you request an additional 2 virtual machines, they are placed on DRS cluster 3,
which will now have 8 virtual machines. The load for clusters 1 and 3 remain the same at 8
and 9.
If two cloud zones both match all the criterias needed for provisioning, then the placement
logic selects the one with higher priority.
n Capability tags
n Computes
You can view and manage the compute resources that are available to provision workloads,
such as AWS availability zones and vCenter clusters, to this cloud zone.
Note Beginning with the vRealize Automation 8.3 release, cloud zones can no longer
share compute resources. Legacy cloud zones that use shared compute resources are still
supported, but users are prompted to update them to conform with current standards.
Cloud zones that are auto-generated during cloud account creation are associated with the
underlying compute resources after data collection.
If a vCenter compute cluster is DRS-enabled, the cloud zone only displays the cluster in the
list of computes and it does not display the child hosts. If a vCenter compute cluster is not
DRS-enabled, the cloud zone only displays standalone ESXi hosts, if present.
Add compute resources as appropriate for the cloud zone. The Compute tab contains a
filter mechanism that enables you to control how compute resources are included with
cloud zones. Initially, the filter selection is Include all Compute and the list below shows
available compute resources, and they are all available for use in deployments. You have two
additional options for adding compute resources to a cloud zone.
n Manually select compute - Select this option if you want to manually select compute
resources from the list below. After you select them, click Add Compute to add the
resources to the zone. The selected resources are available for use in deployments.
n Dynamically include compute by tags - Select this option if you want to include or exclude
compute resources for the zone based on tags. All compute resources are shown until
you add appropriate tags that match existing tags on compute resources. After you add
one or more tags, compute resources with tags that match the filter are included in the
zone and are available for use in deployments, while those that don't match are excluded.
For either compute option, you can remove one or more of the compute resources shown on
the page by selecting the box to the right and clicking Remove.
Compute tags help to further control placement. You can use tags to filter available compute
resources to only those that match one or more tags, as shown in the following examples.
n Two computes contain the same tag and the tag filter matches the tag used on the two
computes.
n Projects
You can view which projects have been configured to support workload provisioning to this
cloud zone.
After you create a cloud zone, you can validate its configuration.
Insights dashboard
If you have an associated vRealize Operations Manager application that you have configured
to work with vRealize Automation, you can access an Insights dashboard in the cloud zone.
The dashboard displays capacity-related information about resources and deployments for
the vSphere or VMware Cloud on AWS cloud zone, provided that the cloud accounts are
configured in both vRealize Automation and vRealize Operations Manager and are being
monitored in vRealize Operations Manager. To learn more about the Insights dashboard, see
Resource management and deployment optimization using vRealize Operations Manager metrics
in vRealize Automation .
Flavor maps express the deployment sizes that make sense for your environment. One example
might be small for 1 CPU and 2 GB memory and large for 2 CPUs and 8 GB memory for a vCenter
account in a named data center and t2.nano for an Amazon Web Services account in a named
region.
Select Infrastructure > Configure > Flavor Mappings and click New Flavor Mapping.
Flavor mapping lets you create a named mapping that contains similar flavor sizings across your
account regions. For example, a flavor map named standard_small might contain a similar flavor
sizing (such as 1 CPU, 2 GB RAM) for some or all available account/regions in your project. When
you build a cloud template, you pick an available flavor that fits your needs.
To simplify cloud template creation, you can select a pre-configuration option when you add
a new cloud account. When you select the pre-configuration option, your organization's most
popular flavor mapping and image mapping for the specified region are selected.
With regard to image mapping in cloud templates that contain vSphere resources, if there are no
flavor mappings defined for a vSphere cloud zone, you can configure unlimited memory and CPU
by using vSphere-specific settings in the cloud template. If there are flavor mappings defined for
a vSphere cloud zone, the flavor mapping serves as a limit for vSphere-specific configurations in
the cloud template.
Select Infrastructure > Configure > Image Mappings and click New Image Mapping.
Cloud vendor accounts such as Microsoft Azure and Amazon Web Services use images to group
a set of target deployment conditions together, including OS and related configuration settings.
vCenter and NSX-based environments, including VMware Cloud on AWS, use a similar grouping
mechanism to define a set of OS deployment conditions. When you build and eventually deploy
and iterate a cloud template, you pick an available image that best fits your needs.
Organize image mappings for a project by similar operating system settings, tagging strategy,
and functional deployment intent.
For an example of how to define a basic image mapping, see 4. Add image mappings.
To simplify cloud template creation, you can select a pre-configuration option when you add
a new cloud account. When you select the pre-configuration option, your organization's most
popular flavor mapping and image mapping for the specified region are selected.
When you add image information to a cloud template, you use either the image or imageRef entry
in the properties section of a machine component. For example, if you want to clone from a
snapshot, use the imageRef property.
For examples of image and imageRef entries in cloud template code, see Chapter 6 Designing your
vRealize Automation Cloud Assembly deployments.
1 Open the associated Cloud Account/Region by selecting Infrastructure > Connections >
Cloud accounts. Select the existing cloud account/region.
2 Click the Sync Images button and let the action complete.
3 When the action is complete, click Infrastructure > Configure > Image Mapping. Define a
new or edit an existing image mapping and select the cloud account/region from step 1.
5 Configure image mappings settings for the specified cloud account/region on the Image
Mapping page.
Using shared and latest images from a Microsoft Azure image gallery
When creating image mappings for Microsoft Azure, you can select images from a shared Azure
image gallery in the subscription. The images in the drop-down menu are data-collected and
made available based on your selected region.
While shared image galleries can be used across multiple subscriptions, they cannot be listed
in the image mapping drop-down menu across subscriptions. Only the images of a particular
subscription are data-collected and listed in the image mappings list. To use an image from an
image gallery in a different subscription, provide the image ID in the image mapping and use that
image mapping in the cloud template.
For Windows machines, you can use any cloud configuration script format that is supported by
cloudbase-init.
The machine resource in the following sample cloud template code uses an image that contains a
cloud configuration script, the content of which is seen in the image entry.
resources:
demo-machine:
type: Cloud.vSphere.Machine
properties:
flavor: small
image: MyUbuntu16
https://cloud-images.ubuntu.com/releases/16.04/release-20170307/ami-
ubuntu-16.04-1.10.3-00-15269239.ova
cloudConfig: |
ssh_pwauth: yes
chpasswd:
list: |
${input.username}:${input.password}
expire: false
users:
- default
- name: ${input.username}
lock_passwd: false
sudo: ['ALL=(ALL) NOPASSWD:ALL']
groups: [wheel, sudo, admin]
shell: '/bin/bash'
runcmd:
- echo "Defaults:${input.username} !requiretty" >> /etc/sudoers.d/${input.username}
What happens when an image mapping and a cloud template contain a cloud
configuration script
When a cloud template that contains a cloud configuration script uses an image mapping that
contains a cloud configuration script, both scripts are combined. The merge action processes the
contents of the image mapping script first and the contents of the cloud template script second,
with consideration being given to whether the scripts are in #cloud-config format or not.
n For scripts that are in the #cloud-config format, the merge combines the contents of each
module (for example runcmd, users, and write_files) as follows:
n For modules where the contents are a list, the lists of commands from the image mapping
and from the cloud template are merged, excluding commands that are identical in both
lists.
n For modules where the contents are a dictionary, the commands are merged and the
result is a combination of both dictionaries. If the same key exists in both dictionaries, the
key from the image mapping script dictionary is preserved and the key from the cloud
template script dictionary is ignored.
n For modules where the contents are a string, the content values from the image mapping
script are kept and the content values from the cloud template script are ignored.
n For scripts that are in a format other than #cloud-config or when one script is in #cloud-
config format and the other is not, both scripts are combined in a way that the image
mapping script is run first and the cloud template script is run when the image mapping script
is finished.
Note If the publisher content library vCenter is managed by vRealize Automation, then
publisher information is displayed in the image mapping selection grid in the following format:
publisher_content_library_name / content_item_name
If the publisher content library vCenter is not managed by vRealize Automation, then
subscriber information is displayed in the image mapping selection grid in the following format:
subscriber_content_library_name / content_item_name
When you deploy a cloud template that contains a VM template image mapping, vRealize
Automation attempts to access the mapped image in the content library that is closest to the
datastore, and then closest to the host, of the machine to be provisioned. This can include a local
content library as well as a publisher or subscriber content library.
When you deploy a cloud template that contains an OVF template image mapping, OVF images
are accessed as specified in the image mapping row if the image is in a local content library or a
local subscriber of a specified remote publisher content library.
For related information about creating and using vCenter content libraries, see Using Content
Libraries in vSphere product documentation.
Also see VMware blogger articles vSphere Customization with Cloud-init While Using vRealize
Automation 8 or Cloud and Customizing Cloud Assembly Deployments with Cloud-Init.
Select Infrastructure > Configure > Network Profiles and click New Network Profile.
You typically define network profiles to support a target deployment environment, for example
a small test environment where an existing network has outbound access only or a large load-
balanced production environment that needs a set of security policies. Think of a network profile
as a collection of workload-specific network characteristics.
To learn the basic steps for creating a network profile, see 5. Add network profiles. To learn
about the various network profile options, see the following information.
n Named cloud account/region and optional capability tags for the network profile.
n Network policies that define on-demand and other aspects of the network profile.
You determine the network IP management functionality based on the network profile.
Network profile capability tags are matched with constraint tags in cloud templates to help
control network selection. Further, all tags that are assigned to the networks that are collected
by the network profile are also matched with tags in the cloud template to help control network
selection when the cloud template is deployed.
Capability tags are optional. Capability tags are applied to all networks in the network profile, but
only when the networks are used as part of that network profile. For network profiles that do not
contain capability tags, tag matching occurs on the network tags only. The network and security
settings that are defined in the matched network profile are applied when the cloud template is
deployed.
When using static IP, the address range is managed by vRealize Automation. For DHCP, the
IP start and end addresses are managed by the independent DHCP server, not by vRealize
Automation. When using DHCP or mixed network address allocation, the network utilization value
is set to zero. An on-demand network allocated range is based on the CIDR and subnet size
that is specified in the network profile. To support both static and dynamic assignment in the
deployment, the allocated range is divided into two ranges - one for static allocation and another
for dynamic allocation.
Networks
Networks, also referred to as subnets, are logical subdivisions of an IP network. A network
groups a cloud account, IP address or range, and network tags to control how and where to
provision a cloud template deployment. Network parameters in the profile define how machines
in the deployment can communicate with one another over IP layer 3. Networks can have tags.
You can add networks to the network profile, edit aspects of networks that are used by the
network profile, and remove networks from the network profile.
Note For a VMware Cloud Foundation (VCF) cloud account type, you can only add NSX
networks to the network profile, not vSphere networks.
A network domain or transport zone is the distributed virtual switch (dvSwitch) for the
vSphere vNetwork Distributed PortGroups (dvPortGroup). A transport zone is an existing
NSX concept that is similar to terms like dvSwitch or dvPortGroup.
When using an NSX cloud account, the element name on the page is Transport zone,
otherwise it is Network domain.
For standard switches, the network domain or transport zone is the same as the switch itself.
The network domain or transport zone defines the boundaries of the subnets within vCenter.
A transport zone controls which hosts an NSX logical switch can reach to. It can span one
or more vSphere clusters. Transport zones control which clusters and which virtual machines
can participate in the use of a particular network. Subnets that belong to the same NSX
transport zone can be used for the same machine hosts.
n Domain
Represents the vCenter single sign-on domain for a target virtual machine. Domains are
configured by a vCenter administrator during vSphere configuration. The domain determines
the local authentication space in vCenter.
vSphere cloud accounts, and vSphere machine components in the cloud template, support
dual IPv6 and IPv4 internet protocol methods. For example, 192.168.100.14/24 represents the
IPv4 address 192.168.100.14 and its associated routing prefix 192.168.100.0, or equivalently,
its subnet mask 255.255.255.0, which has 24 leading 1-bits. The IPv4 block 192.168.100.0/22
represents the 1024 IP addresses from 192.168.100.0 to 192.168.103.255.
vSphere cloud accounts, and vSphere machine components in the cloud template, support
dual IPv6 and IPv4 internet protocol methods. For example, 2001:db8::/48 represents the
block of IPv6 addresses from 2001:db8:0:0:0:0:0:0 to 2001:db8:0:ffff:ffff:ffff:ffff:ffff.
n Support public IP
Select this option to flag the network as public. Network components in a cloud template that
have a network type: public property are matched to networks that are flagged as public.
Further matching occurs during cloud template deployment to determine network selection.
Select this option to flag the network as a default for the cloud zone. During cloud template
deployment, default networks are preferred over other networks.
n Origin
n Tags
Specifies one or more tags assigned to the network. Tags are optional. Tag matching affect
which networks are available for your cloud template deployments.
Network tags exist on the network item itself, irrespective of the network profile. Network
tags apply to every occurrence of the network they have been added to and to all network
profiles that contain that network. Networks can be instanced into any number of network
profiles. Regardless of network profile residency, a network tag is associated with that
network wherever the network is used.
When you deploy a cloud template, constraint tags in a cloud template's network
components are matched to network tags, including network profile capability tags. For
network profiles that contain capability tags, the capability tags are applied to all the
networks that are available for that network profile. The network and security settings that
are defined in the matched network profile are applied when the cloud template is deployed.
Network Policies
By using network profiles, you can define subnets for existing network domains that contain
static, DHCP, or a mixture of static and DHCP IP address settings. You can define subnets and
specify IP address settings by using the Network Policies tab.
When using NSX-V, NSX-T, or VMware Cloud on AWS, network policy settings are used when
a cloud template requires the networkType: outbound or networkType: private or when an NSX
network requires networkType: routed.
Depending on the associated cloud account, you can use network policies to define settings for
the outbound, private, and routed network types and for on-demand security groups. You can also
use network policies to control existing networks when there is a load balancer associated with
that network.
Outbound networks allow one way access to upstream networks. Private networks do not allow
any outside access. Routed networks allow East/West traffic between the routed networks. The
existing and public networks in the profile are used as the underlying or upstream networks.
Options for the following on-demand selections are described in the Network Profiles on-screen
help and summarized below.
You can use this option when specifying an existing or public network type. cloud templates
that require an outbound, private, or routed network are not matched to this profile.
You can use this option when specifying an outbound, private, or routed network type.
Amazon Web Services, Microsoft Azure, NSX, vSphere, and VMware Cloud on AWS support
this option.
You can use this option when specifying an outbound or private network type.
A new security group is created for matched cloud templates if the network type is outbound
or private.
Amazon Web Services, Microsoft Azure, NSX, and VMware Cloud on AWS support this
option.
Network policy settings can be cloud account type-specific. These settings are described in the
on-screen signpost help and summarized below:
A network domain or transport zone is the distributed virtual switch (dvSwitch) for the
vSphere vNetwork Distributed PortGroups (dvPortGroup). A transport zone is an existing
NSX concept that is similar to terms like dvSwitch or dvPortGroup.
When using an NSX cloud account, the element name on the page is Transport zone,
otherwise it is Network domain.
For standard switches, the network domain or transport zone is the same as the switch itself.
The network domain or transport zone defines the boundaries of the subnets within vCenter.
A transport zone controls which hosts an NSX logical switch can reach to. It can span one
or more vSphere clusters. Transport zones control which clusters and which virtual machines
can participate in the use of a particular network. Subnets that belong to the same NSX
transport zone can be used for the same machine hosts.
n External subnet
An on-demand network with outbound access requires an external subnet that has outbound
access. The external subnet is used to provide outbound access if requested in the cloud
template - it does not control network placement. For example, the external subnet does not
affect the placing of a private network.
n CIDR
CIDR notation is a compact representation of an IP address and its associated routing prefix.
The CIDR value specifies the network address range to be used during provisioning to create
subnets. This CIDR setting on the Network Policies tab accepts IPv4 notation ending in /nn
and containing values between 0 - 32.
n Subnet size
This option specifies the on-demand network size, using IPv4 notation, for each isolated
network in a deployment that uses this network profile. The subnet size setting is available for
internal or external IP address management.
For an on-demand routed network, you must specify a distributed logical network when
using an NSX-V cloud account.
A distributed logical router (DLR) is used to route east/west traffic between on-demand
routed networks on NSX-V. This option is only visible if the account/region value for the
network profile is associated to an NSX-V cloud account.
n IP range assignment
The option is available for cloud accounts that support NSX or VMware Cloud on AWS,
including vSphere.
The IP range setting is available when using an existing network with an external IPAM
integration point.
You can select one of the following three options to specify an IP range assignment type for
the deployment network:
Default and recommended. This mixed option uses the allocated CIDR and Subnet range
settings to configure the DHCP server pool to support half of the address space allocation
using the DHCP (dynamic) method and half of the IP address space allocation using the
Static method. Use this option when some of the machines that are connected to an
on-demand network require assigned static IP addresses and some require dynamic IP
addresses. Two IP ranges are created.
This option is most effective in deployments with machines that are connected to an
on-demand network, where some of the machines are assigned static IPs and other
machines have IPs dynamically assigned by an NSX DHCP server and deployments where
the load balancer VIP is static.
n DHCP (dynamic)
This option uses the allocated CIDR to configure an IP pool on a DHCP server. All the IP
addresses for this network are dynamically assigned. A single IP range is created for each
allocated CIDR.
n Static
This option uses the allocated CIDR to statically allocate IP addresses. Use this option
when a DHCP server is not required to be configured for this network. A single IP range is
created for each allocated CIDR.
n IP blocks
The IP blocks setting is available when using an on-demand network with an external IPAM
integration point.
Using the IP block setting, you can add a named IP block, or range, to the network profile
from your integrated external IPAM provider. You can also remove an added IP block from
the network profile. For information about how to create an external IPAM integration, see
Add an external IPAM integration for Infoblox in vRealize Automation .
n vSphere
External networks are also referred to as existing networks. These networks are data-
collected and made available for selection.
NSX-T uses the tier-0 logical router as a gateway to networks that are external to the NSX
deployment. The tier-0 logical router configures outbound access for on-demand networks.
The specified edge cluster provides routing services. The edge cluster is used to configure
outbound access for on-demand networks and load balancers. It identifies the edge cluster,
or resource pool, where the edge appliance is to be deployed.
The specified edge datastore is used to provision the edge appliance. This setting applies to
NSX-V only.
Tags can be used to specify which networks are available to the cloud template.
Load Balancers
You can add load balancers to the network profile. Listed load balancers are available based on
information that is data-collected from the source cloud account.
If a tag on any of the load balancers in the network profile matches a tag in a load balancer
component in the cloud template, the load balancer is considered during deployment. Load
balancers in a matched network profile are used when a cloud template is deployed.
For more information, see Using load balancer settings in network profiles in vRealize Automation
Cloud Assembly and Network, security, and load balancer examples in vRealize Automation cloud
templates.
Security Groups
When a cloud template is deployed, the security groups in its network profile are applied to the
machines NICs that are provisioned. For an Amazon Web Services-specific network profile, the
security groups in the network profile are available in the same network domain (VPC) as the
networks that are listed on the Networks tab. If the network profile has no networks listed on its
Networks tab, all available security groups are displayed.
You can use a security group to further define the isolation settings for an on-demand private or
outbound network. Security groups are also applied to existing networks.
Listed security groups are available based on information that is data-collected from the source
cloud account or added as an on-demand security group in a project cloud template. For more
information, see Security resources in vRealize Automation.
Security groups are applied to all the machines in the deployment that are connected to the
network that matches the network profile. As there might be multiple networks in a cloud
template, each matching a different network profile, you can use different security groups for
different networks.
Adding a tag to an existing security group allows you to use the security group in a cloud
template Cloud.SecurityGroup component. A security group must have at least one tag or it
cannot be used in a cloud template. For more information, see Security resources in vRealize
Automation and Network, security, and load balancer examples in vRealize Automation cloud
templates.
More information about network profiles, networks, cloud templates, and tags
For more information about network profiles, see other topics in this section of the help as well
as 5. Add network profiles.
For more information about networks, see Network resources in vRealize Automation.
For examples of sample network component code in a cloud template, see Network, security,
and load balancer examples in vRealize Automation cloud templates.
For sample network automation workflows, see the following VMware blog posts:
For more information about tags and tag strategy, see How do I use tags to manage vRealize
Automation Cloud Assembly resources and deployments.
In vRealize Automation, you can define cloud-specific network profiles. See Learn more about
network profiles in vRealize Automation.
Using network and network profile settings, you can control how network IP addresses are used
in vRealize Automation cloud templates and deployments.
While pure IPv4 is supported for all cloud account and integration types, dual stack IPv4 and IPv6
is supported only for vSphere cloud accounts and their endpoints.
IPv6 is currently not supported for use with load balancers, NSX on-demand networks, or
external third-party IPAM providers.
Support for external IPAM providers, such as Infoblox, is available for vendor-specific IPAM
integration points that you create by using the Infrastructure > Connections > Add Integration >
IPAM menu sequence.
Options for defining external IPAM provider address information is available by using the Add
IPAM IP Range option on the Network Policies > Add IPAM IP Range page.
For information about how to create an external IPAM integration point, see How to configure
an external IPAM integration in vRealize Automation . For an example of how to create an IPAM
integration point for a specific IPAM vendor, see Tutorial: Configuring a provider-specific external
IPAM integration for vRealize Automation .
Network types
A network component in a cloud template is defined as one of the following networkType types.
For more information, see Using a network resource in a vRealize Automation cloud template.
For examples of populated cloud templates that contain network component data, see Network,
security, and load balancer examples in vRealize Automation cloud templates.
Public network If the network has constraints, those A network with the supports public
constraints are used to filter the list IP attribute is selected from a
of available networks that have the matching network profile.
supports public IP attribute set. Preference is given to networks that
From the filtered list of networks, are labeled as default.
a random network is selected from Network constraints can be used to
the same provisioning region as the filter existing public networks in the
compute. profile based on their pre-assigned
Preference is given to networks that tags.
are labeled as default.
If after filtering based on constraints
there are no public networks in the
provisioning region, provisioning fails.
Private network Provisioning fails because private A new network or new security group
networks require information from a is created based on settings in the
network profile. matched network profile.
Network constraint tags can be
used to filter network profiles and
networks.
Outbound network Provisioning fails because outbound A new network or new security group
networks require information from a is created based on settings in the
network profile. matched network profile.
Network constraint tags can be
used to filter network profiles and
networks.
On-demand routed network Provisioning fails because routed For NSX-V we need DLR (Distributed
networks require information from a Logical Router) selection.
network profile. For NSX-T and VMware Cloud on
AWS, we require similar on-demand
settings as private and outbound.
Example Wordpress use case with Provisioning occurs as described See above descriptions for existing
existing or public networks for an existing network or public network and public network behavior.
network. See Tutorial: Setting up and
testing multi-cloud infrastructure and
deployments in vRealize Automation
Cloud Assembly.
Example Wordpress use case with Provisioning fails because the See above descriptions for a private
existing or public networks and network requires information from a network and an outbound network.
private or outbound networks network profile. See Tutorial: Setting up and
testing multi-cloud infrastructure and
deployments in vRealize Automation
Cloud Assembly.
Example Wordpress use case with Provisioning fails because a load A new load balancer is created based
load balancer balancer requires information from a on the network profile configuration.
network profile. You can specify an existing load
Provisioning can occur when existing balancer that has been enabled in the
load balancers are present. network profile.
Provisioning fails if you request an
existing load balancer, but none meet
the constraints in the network profile.
See Tutorial: Setting up and
testing multi-cloud infrastructure and
deployments in vRealize Automation
Cloud Assembly.
You can add an existing security group to a network profile. When a cloud template
design uses that network profile, its machines are grouped together as members of the
security group. This method does not require that you add a security group resource to a
cloud template design. You can also use a load balancer in this configuration, For related
information, see Using a load balancer resource in a vRealize Automation cloud template.
You can drag and drop a security group resource on to a cloud template design and bind the
security group resource to a machine NIC by using constraint tags on the existing security
group resource in the cloud template design and on the existing security group in the data-
collected resource. You can also make this association by connecting the objects together
with a connection line on the cloud template design canvas, similar to how you associate
networks to machines on the design canvas.
When you drag and drop a security group resource onto the cloud template design canvas,
it can be of type existing or new. If it’s an existing security group type, you should add a tag
constraint value as prompted. If it's a new security group type, you can configure firewall rules.
n An existing security group allocated with tag constraints and associated with a machine NIC
in the cloud template
For example, you can associate a security group resource with a machine NIC (in a machine
resource)in the cloud template design by matching tags between the two resources.
As an example for NSX-T when tags are specified in the source endpoint, you can use NSX-T
tags specified in your NSX-T application. You can then use an NSX-T tag, specified as a
constraint on a network resource in a cloud template design, where the network resource
is connected to a machine NIC in the cloud template design. NSX-T tags enable you to
dynamically group machines by using a pre-defined NSX-T tag that is data-collected from the
NSX-T source endpoint. Use a logical port when you create the NSX-T tag in NSX-T.
You can add firewall rules to an on-demand security group in the cloud template design.
For information about available firewall rules, see Using a security group resource in a
vRealize Automation cloud template.
Learn more
For information about defining security groups in network profiles, see Learn more about
network profiles in vRealize Automation.
For information about viewing and changing security groups settings in infrastructure resource
pages, see Security resources in vRealize Automation.
For information about defining security groups in cloud template designs, see Using a security
group resource in a vRealize Automation cloud template.
For examples of security group resources in cloud template designs, see Network, security, and
load balancer examples in vRealize Automation cloud templates.
You can add an existing load balancer to a network profile by using the Load Balancer tab.
You can add a load balancer to a cloud template design by associating it to a network profile that
contains one or more load balancers or directly by using a load balancer resource in the cloud
template design canvas or code.
Examples for including a load balancer VIP based on security group use in a
network profile
There are two types of security groups that you can use in a network profile – an existing
security group that you select from the Security Groups tab and an on-demand security group
that you create by using an isolation policy on the Network Policies tab.
When a load balancer VIP is associated to a security group based on network profile settings, the
security group configuration is supplied by the network profile.
One-armed load balancer with VIP on The selected network profile uses The machine NIC and the load
private network, and a machine on isolation policy defined as an on- balancer VIP are added to the
the same private network. demand security group. isolation security group.
One-armed load balancer with VIP on The selected network profile uses The machine NIC and the load
private network, and a machine on an existing security group and uses balancer VIP are added to the
the same private network. isolation policy defined as an on- isolation security group and the
demand security group. existing security group.
Two-armed load balancer with VIP on The selected network profile uses The machine NIC and the load
a public network and machine on a an existing security group and uses balancer VIP are added to the
private network. isolation policy defined as an on- isolation security group and the
demand security group. existing security group.
Two-armed load balancer with VIP on The selected network profile uses an The machine NIC and the load
a public network and a machine on a existing security group. balancer VIP are added to the
private network. existing security group.
Two-armed load balancer, VIP is on Two network profiles: The load balancer lands on network
network 1 and the machine is on n Network profile 1: Uses an profile 1 and the machine lands on
network 2. existing security group 1. network profile 2.
Learn more
For information about adding load balancer resources to a cloud template design, see Using a
load balancer resource in a vRealize Automation cloud template.
For examples of cloud template designs that include load balancers, see Network, security, and
load balancer examples in vRealize Automation cloud templates.
Using an existing integration for a particular external IPAM provider, you can provision on-
demand network to create of a new network in the external IPAM system.
Using this process, you configure a block of IP addresses instead of supplying a parent CIDR
(as is done when usingvRealize Automation's internal IPAM). The IP address block is used during
on-demand network provisioning to segment the new network. The IP blocks are data-collected
from the external IPAM provider, provided the integration supports on-demand networking.
For example, when using an Infoblox IPAM integration, IP blocks represent Infoblox network
containers.
When you use an on-demand network profile and an external IPAM integration in a cloud
template, the following events occur when the cloud template is deployed:
n A network is also created in vRealize Automation, reflecting the new network configuration
from the IPAM provider, including settings such as CIDR and gateway properties.
n The IP address for the deployed virtual machine is fetched from the newly created network.
In this on-demand networking example, you configure a network profile to allow a cloud template
deployment to provision a machine to an on-demand network in vSphere by using Infoblox as the
external IPAM provider.
For related information, see How do I configure a network profile to support an existing network
for an external IPAM integration in vRealize Automation. Both network configuration examples fit
within the overall vendor-specific workflow for external IPAM integration at Tutorial: Configuring
VMware Cloud on AWS for vRealize Automation.
Prerequisites
While the following prerequisites apply to the person who creates or edits the network profile,
the network profile itself would be applicable when used by a cloud template deployment that
contains an IPAM integration. To learn about vendor-specific IPAM integration points, see How to
configure an external IPAM integration in vRealize Automation .
This sequence of steps is shown in the context of an IPAM provider integration workflow. See
Tutorial: Configuring a provider-specific external IPAM integration for vRealize Automation .
n Verify that you have cloud administrator credentials. See Credentials required for working
with cloud accounts in vRealize Automation.
n Verify that you have the cloud administrator user role. See What are the vRealize Automation
user roles.
n Verify that you have an account with the external IPAM provider, for example Infoblox or
Bluecat, and that you have the correct access credentials to your organization's account with
the IPAM provider. In this example workflow, the IPAM provider is Infoblox.
n Verify that you have an IPAM integration point for the IPAM provider and that the IPAM
package used to create the IPAM integration supports on-demand networks. See Add an
external IPAM integration for Infoblox in vRealize Automation .
While the Infoblox IPAM package supports on-demand networks, if you are using an external
IPAM integration for a different provider, verify that their IPAM integration package supports
on-demand networks.
Procedure
1 To configure a network profile, click Infrastructure > Configure > Network Profiles.
3 Click the Summary tab and specify the following sample settings:
This example assumes use of a vSphere cloud account that is not associated with an NSX
cloud account.
n Add a capability tag for the network profile, for example infoblox_ondemandA.
Make note of the capability tag value, as you must also use it as a cloud template
constraint tag to make the network profile association to be used when provisioning
the cloud template.
4 Click the Network Policies tab and specify the following sample settings:
This option allows you to use external IPAM IP blocks. Depending on the cloud account,
new options appear. For example, the following options appear when using a vSphere
cloud account that is associated to an NSX cloud account:
n Transport zone
n Edge cluster
For this example, the vSphere cloud account is not associated to NSX, so the Network
domain menu option appears.
6 Click Add IP Block, which opens the Add IPAM IP Block page.
7 From the Provider menu on the Add IPAM IP Block page, select an existing external IPAM
integration. For example, select the Infloblox_Integration integration point from Add an
external IPAM integration for Infoblox in vRealize Automation in the example workflow.
8 From the Address spaces menu, select one of the available and listed IP blocks, for example
10.23.118.0/24 and add it.
If the IPAM provider supports address spaces, the Address spaces menu appears. For an
Infoblox integration, address spaces are represented by Infoblox network views.
10 Click Create.
Results
A network profile is created that can be used to provision an on-demand network using the
specified external IPAM integration. The following sample cloud template shows a single machine
to be deployed to a network that is defined by this new network profile.
formatVersion: 1
inputs: {}
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
image: ubuntu
flavor: small
networks:
- network: '${resource.Cloud_Network_1.id}'
assignment: static
Cloud_Network_1:
type: Cloud.Network
properties:
networkType: private
constraints:
- tag: infoblox_ondemandA
Note When the cloud template is deployed, the first available network in the specified IP block
is fetched and considered to be the network CIDR. If you are using an NSX network in the cloud
template, you can instead set the CIDR of the network manually by using the network property
networkCidr, as shown below, to manually set a CIDR and override the settings for IP blocks and
subnet size that are specified in the associated network profile.
Cloud_Network_1:
type: Cloud.Network
properties:
networkCidr: 10.10.0.0/16
For related information, see How do I configure a network profile to support an on-demand
network for an external IPAM integration in vRealize Automation.
Storage is usually profiled according to characteristics such as service level or cost, performance,
or purpose, such as backup.
Select Infrastructure > Configure > Storage Profiles and click New Storage Profile.
Storage profiles are organized under cloud-specific regions. One cloud account might have
multiple regions, with multiple storage profiles under each.
Vendor-independent placement is possible. For example, you might have three different vendor
accounts and a region in each. Each region includes a storage profile that is capability tagged as
fast. At provisioning time, a request containing a fast hard constraint tag looks for a matching
fast capability, regardless of which vendor cloud is supplying the resources. A match then applies
the settings from the associated storage profile during creation of the deployed storage item.
Note Different cloud storage might have different performance characteristics but still be
considered the fast offering by the administrator who tagged it.
Capability tags that you add to storage profiles should not identify actual resource targets.
Instead, they describe types of storage. For more about actual resources, see Storage resources
in vRealize Automation.
For example, the following design won't work. The cloud template attempts to use location
constraints to separate the disk, but the deployment returns a No matching placement error
instead.
If you need to place a disk in a different cloud account, use a separate deployment to deploy the
disk.
resources:
Machine1:
type: Cloud.vSphere.Machine
properties:
image: ubuntu
flavor: small
constraints:
- tag: 'location:siteA'
Disk1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
constraints:
- tag: 'location:siteB'
First class disks can exist independent from a vSphere virtual machine. A first class disk
also has life-cycle management capabilities that can operate independently of a virtual
machine. First class disks are available for vSphere 6.7 Update 2 and later, and are currently
implemented in vRealize Automation as an API-only feature.
For information about FCD storage, including the capabilities that are available from the
vRealize Automation API, and links to the API documentation itself, see What can I do with
first class disk storage in vRealize Automation.
n Standard disk
For information about standard disk storage, see What can I do with standard disk storage in
vRealize Automation and What can I do with persistent disk storage in vRealize Automation.
Note For pricing to work on multi-tenant environments, you must have a separate vROPs
instance for each vRA tenant.
Pricing cards define the rates for a pricing policy. The pricing policy can then be assigned to
specific projects to define a total price. After creating a vRealize Operations or CloudHealth
endpoint, a predefined Default Rate Card is available with a cost equal to price configuration on
the Infrastructure > Pricing Cards tab. You can create pricing cards that apply to projects only or
cloud zones. By default, all new pricing cards are applied to projects.
Note If you change the All pricing cards are applied to setting, all existing pricing card
assignments are deleted. Also, if the vRealize Operations endpoint is deleted from Cloud
Assembly, all pricing cards and assignments are also deleted.
The price of a deployment over time appears on both the deployment card and Project as the
month-to-date price, which resets to zero at the beginning of each month. The component cost
breakdowns are available in the deployment details. Providing this information at the deployment
level informs the cloud administrator, but it also helps the members understand the impact their
work might have on budgets and long-term development.
You can choose to display pricing information from users in Cloud Assembly and Service Broker
by selecting the Display pricing information button. If left disabled, the pricing information is
hidden from Cloud Assembly and Service Broker users.
New policies, assignments, and upfront pricing are priced during the next occurring data
collection cycle. By default, the data collection cycle is run every 5 minutes. It can take up to
6-hours for new policies or changes to be updated in projects and deployments.
For an upfront price estimation, the size of boot disk per VM is always 8 GB.
The upfront price of a deployment is a daily price estimate, based on the allocation of a
resource, for a given catalog item before it is deployed. After a catalog item is deployed, you
can view the month-to-date price as an aggregate of the upfront price on the Deployment and
Infrastructure > Projects tabs. Upfront pricing is supported for private cloud resources such as
vSphere Machine and vSphere Disk, Cloud Assembly catalog items, and cloud agnostic items with
vCenter configured for private cloud.
Note Upfront pricing is not supported for public cloud resources, or non-vSphere Machine or
Disk private cloud resources.
To estimate the cost of your deployment, from the Catalog select a catalog item and click
Request > Calculate. If the price is acceptable, click Submit.
For showback purposes, you can use project pricing cards to estimate the total price of all your
projects.
To estimate the cost of a project, on the InfrastructurePricing Card page, next to All pricing cards
are applied to: click Edit and select Projects.
If you change the All pricing cards are applied to setting, all existing pricing card assignments are
deleted. Create pricing cards and assignments using a cost-based approach.
Pricing cards are customizable based on user-selected parameters. After configuring a pricing
card, you can assign it to one or more projects and cloud zones determined by the pricing
strategy.
You can manually refresh the price server at any time on the vROPs Endpoint page,
Infrastructure > Integrations > vROPs Endpoint > . In the vCenter servers section, click Sync.
When manually refreshing the price server using the Sync option, the price is recalculated for all
projects in the organization. Depending on how many projects your organization has this process
might be intensive and take time.
After creating and assigning a pricing card, you can view the price history of your deployments
and projects. To view the price history, navigate to your deployment and click Price. The price
analysis provides an overview and detailed view of the deployment price along with the price
month-to-date value. You can change the graphical representation to display the deployment
price as daily, weekly, or monthly values. Also, you can specify an exact date range or month for
the price history.
Blueprint Component Type Service Name/Object Type Blueprint Resource Type Comments
VMware Managed Cloud vSphere machine Cloud.vSphere.Machine VMC only supports rate-
(VMC) based pricing cards (cost
vSphere disk Cloud.vSphere.Disk based pricing cards are not
supported).
Prerequisites
Before you can create or assign pricing cards, you must configure and enable pricing and
configure currency in vRealize Operations to work with vRealize Automation . When configuring
vRealize Operations with vRealize Automation , ensure that both applications are set to the same
timezone. To configure the timezone in vRealize Operations, enable SSH and log in to each
vRealize Operations node, edit the $ALIVE_Base/user/conf/analytics/advanced.properties
file, and add timeZoneUseInMeteringCalculation = <time zone>.
For pricing to work on multi-tenant environments, you must have a separate vROPs instance for
each vRA tenant.
You must configure a vRealize Operations endpoint before you can configure pricing cards.
To configure the vRealize Operations endpoint navigate to Infrastructure > Connections >
Integrations > Add Integration.
Note When multiple vRealize Operations endpoints are added they must not monitor the same
vCenter.
Procedure
2 On the Summary tab, enter a name and description for the pricing card. Once the policy is
defined on the pricing tab, the Overview table is populated with pricing card rates.
Note The currency unit is determined by the valued selected in vRealize Operations.
3 Optional. Select the Default for unassigned projects? check box to assign this pricing card to
all unassigned projects by default.
Parameter Description
Basic Charges Enter a name and description for your policy. Select
cost or rate based.
n Cost - The cost is defined in vRealize Operations.
If selected, a mulitplication factor is required. For
example, if you select 1.1 as a factor, the cost is
multiplied by 1.1 resulting in a 10% increase to the
calculated cost. The price equation using cost is:
<cost> x <multiplication factor> = Price
n Rate - If selected, you must use absolute values to
determine the cost. The price equation using rate is:
<Rate> = Price. Select a rate interval from the drop
down list to specify how this rate is charged.
In the basic charges section, you define the cost or rate
for CPU, memory, storage, and additional miscellaneous
costs.
Parameter Description
Overall Charges Define any additional charge you would like to add
to the pricing policy. You can add both one time and
recurring charges.
One time charges are not shown in the price estimate of a catalog item or on the summary
tab. Only the daily price estimate for a given catalog item is shown.
5 Click the Assignments tab and click Assign Projects. Select one or more projects to assign
the pricing card to.
Note By default pricing cards are applied to projects. On the Infrastructure > Pricing Cards
tab, you can select to apply pricing cards to cloud zones. If cloud zones were selected, you
would click Assign Cloud Zones on the Assignments tab.
Results
Your new pricing policy appears on the Pricing Cards page. To view or edit the policy details and
configuration click Open.
Fundamentally, tags are labels that you add to vRealize Automation Cloud Assembly items.
You can create any tags that are appropriate for your organization and implementation. Tags
function as much more than labels though, because they control how and where vRealize
Automation Cloud Assembly uses resources and infrastructure to build deployable services. Tags
also support governance within Cloud Assembly.
Tag structure
Structurally, tags must follow the name:value pair convention, but otherwise their construction is
largely free form. Throughout vRealize Automation Cloud Assembly, all tags appear the same,
and tag functionality is determined by context.
For example, tags on infrastructure resources function primarily as capability tags because
vRealize Automation Cloud Assembly uses them to match resources with deployments.
Secondarily, they also identify the resources.
Tag function
The primary function of tags is to express capabilities and constraints that vRealize Automation
Cloud Assembly uses to define deployments. Context determines the function of tags. Tags
placed on cloud zones, network and storage profiles, and individual infrastructure resources
function as capability tags and define desired capabilities for infrastrucutre used in deployments.
Tags placed on cloud templates function as constraints that define resources for deployments.
Also, cloud administrators can place constraint tags on projects to exercise a form of governance
over those projects. These constraint tags are added to other constraints expressed in cloud
templates.
During provisioning, vRealize Automation Cloud Assembly matches these capabilities with
constraints, also expressed as tags, in cloud templates to define deployment configuration.
This tag-based capability and constraint functionality serves as the foundation for deployment
configuration in vRealize Automation Cloud Assembly. For instance, you can use tags to make
infrastructure available only on PCI resources in a particular region.
On a secondary level, tags also facilitate search and identification of storage and network items
and other infrastructure resources.
For example, assume that you are setting up cloud zones and you have many compute resources
available. If you have tagged your compute resources appropriately, you can use the search
function on the Compute tab of the Cloud Zone page to filter the resources that are associated
with that particular cloud zone.
Also, the Cloud Assembly Tag Management page and resource configuration pages contain
search functions that enable you to locate items by tag names. Using logical and human readable
tags for these items is key to facilitating this search and identification function.
Take a look at the following Youtube video for more information and examples of tag usage:
https://youtu.be/4zNQ33RyQio
External tags
vRealize Automation Cloud Assembly might also contain external tags. These tags are imported
automatically from cloud accounts that you associate with a vRealize Automation Cloud
Assembly instance. These tags might be imported from vSphere, AWS, Azure or other external
software products. When imported, these tags are available for use in the same manner as user
created tags.
Managing tags
You can use the Tag Management page in vRealize Automation Cloud Assembly to monitor
and manage your tags library. You can also create tags on this page. In addition, the Tag
Management page is the only page on which you can view and identify external tags.
Tag strategy
To minimize confusion, before creating tags in vRealize Automation Cloud Assembly, devise an
appropriate tag strategy and tagging conventions, so that all users who create and use tags
understand what they mean and how they should be used. See Creating a tagging strategy.
While tagging serves several common purposes, your tagging strategy must be tailored to your
deployment needs, structure, and goals.
n Design and implement a coherent strategy for tagging that relates to the structure of
your business and communicate this plan to all applicable users. A strategy must support
your deployment needs, use clear human readable language, and be understandable to all
applicable users.
n Use simple, clear, and meaningful names and values for tags. For instance, tag names for
storage and network items should be clear and coherent so that users can readily understand
what they are selecting or reviewing tag assignments for a deployed resource.
n Though you can create tags using a name with no value, as a best practice, it is more
appropriate to create an applicable value for each tag name, as this makes the tag usage
clear to other users.
n Avoid creating duplicate or extraneous tags. For example, only create tags on storage items
that relate to storage issues.
Tagging implementation
Map out your primary considerations for a basic tagging strategy. The following list shows typical
considerations to consider when mapping your strategy. Be aware that these considerations
are representative rather than definitive. You might have other considerations that are highly
relevant to your use cases. Your specific strategy must be appropriate for your specific use
cases.
n How many different environments do you deploy to. Typically, you will create tags that
represent each environment.
n How are your compute resources structured and used to support deployments.
n How many different regions or locations do you deploy to. Typically, you will create tags, at
the profile level, that represents each of these different regions or locations.
n How many different storage options are available for deployments, and how do you want to
characterize them. These options should be represented by tags.
n Categorize your networking options and create tags to accommodate all applicable options.
n Typical deployment variables. For example, how many different environments do you deploy
to. Typically, many organizations have Test, Dev, and Production environments at a minimum.
You will want to create and coordinate constraint tags and cloud zone capability tags that
match so that you can easily set up deployments to one or more of these environments.
n Coordinate tags on network and storage resources so that they make logical sense in context
of the network and storage profiles in which they are used. The resource tags can serve as a
finer level of control over the resource deployment.
n Coordinate cloud zone and network profile capability tags, and other capability tags, with
constraint tags. Typically, your administrator will create capability tags for cloud zones and
network profiles first, and then other users can design cloud templates with constraints that
match these capability tags.
After you understand the important considerations for your organization, you can plan
appropriate tag names that address these considerations in a logical manner. Then, create an
outline of your strategy and make it available to all users with privileges to create or edit tags.
As a useful implementation approach, you can begin by tagging all of your compute
infrastructure resources individually. As noted, use logical categories for tag names that relate
to the specific resource. For instance, you might tag storage resources as tier1, tier2, etc. Also,
you might tag compute resources based on their operating system, such as Windows, Linux, etc.
After you tag resources, you can then consider the approach to creating tags for cloud zone and
storage and network profiles that best suits your needs.
You can create capability tags on compute resources, cloud zones, images and image maps,
and networks and network profiles. The pages for creating these resources contain options
for creating capability tags. Alternatively, you can use the Tag Management page in vRealize
Automation Cloud Assembly to create capability tags. Capability tags on cloud zones and
network profiles affect all resources within those zones or profiles. Capability tags on storage
or network components affect only the components on which they are applied.
Typically, capability tags might define characteristics such as location for a compute resource,
adapter type for a network, or tier level for a storage resource. They can also define environment
location or type and any other business considerations. As with your overall tagging strategy,
you should organize your capability tags in a logical manner for your business needs.
vRealize Automation Cloud Assembly matches capability tags from cloud zones with constraints
on cloud templates at deployment time. So, when creating and using capability tags, you must
understand and plan to create appropriate cloud template constraints so that matching will occur
as expected.
For example, the 2. Add cloud zones topic in the Tutorial: Setting up and testing multi-cloud
infrastructure and deployments in vRealize Automation Cloud Assembly included with the
documentation describes how to create dev and test tags for the OurCo-AWS-US-East and
OurCo AWS-US-West cloud zones. In this tutorial, these tags indicate that the OurCo-AWS-
US-East zone is a development environment, and the OurCo-AWS-US_West zone is a test
environment. If you create analogous constraint tags in cloud templates, these capability tags
enable you to direct deployments to the desired environments.
Tag inheritance
Cloud Assembly uses tag inheritance to selectively propagate tags on cloud accounts to other
related resource. Specifically when you create tags on a cloud account, they also become
effective on all storage profiles an compute resources that correspond to that cloud account.
Compute resources
Storage profiles
Cloud Account
vSphere cloud account with all three of the tags: cluster-1, cluster-2, and cluster-3
While consolidating tags on storage profiles and compute resources, Cloud Assembly also takes
into account the cloud account level tags. Hence, the effective tags on all the storage profiles
and computes are cluster-1, cluster-2 and cluster-3 and this is why when we provide any of these
tags as shown in the preceding example, all the storage profiles and computes become eligible
for placement and the machine can land on any of the compute hosts.
As a best practice, to minimize unexpected results and tag clutter, any given tag should be
applied only at the cloud account level if that tag is an appropriate capability for all subordinate
compute and storage resources.
vRealize Automation Cloud Assembly enables you to use constraint tags in two primary ways.
The first way is when configuring projects and images. You can use tags as constraints to
associate resources with the project or image. The second is in cloud templates where tags
specified as constraints are used to select resources for deployments. Constraints applied in both
of these ways are merged in cloud templates to form a set of deployment requirements that
define resources available for a deployment.
If constraint tags on the project conflict with constraint tags on the cloud template, the project
tags take precedence, thus allowing the cloud administrator to enforce governance rules. For
example, if the cloud administrators creates a location:london tag on the project, but a developer
places a location:boston tag on the cloud template, the former will take precedence and the
resource is deployed to infrastructure containing the location:london tag.
You can apply up to three constraints on projects. Project constraints can be hard or soft. By
default they are hard. Hard constraints allow you to rigidly enforce deployment restrictions. If
one or more hard constraints are not met, the deployment will fail. Soft constraints offer a way
to express preferences that will be selected if available, but the deployment won't fail if soft
constraints are not met.
Create constraint tags by using the tag label under a constraint heading in the cloud template
YAML code. Constraint tags from projects are added to the constraint tags created in cloud
templates.
vRealize Automation Cloud Assembly supports a simple string formatting to make using
constraints easier in YAML files:
[!]tag_key[:tag_value][:hard|:soft]
By default vRealize Automation Cloud Assembly creates a positive constraint with hard
enforcement. The tag value is optional, though recommended, as in the rest of the application.
The following WordPress with MySQL example shows YAML constraint tags that specific location
information for compute resources.
name: "wordPressWithMySql"
components:
mysql:
type: "Compute"
data:
name: "mysql"
# ... skipped lines ...
wordpress:
type: "Compute"
data:
name: "wordpress"
instanceType: small
imageType: "ubuntu-server-1604"
constraints:
- tag: "!location:eu:hard"
- tag: "location:us:soft"
- tag: "!pci"
# ... skipped lines ...
For more information about how to work with cloud templates, see Part 3: Design and deploy the
example vRealize Automation Cloud Assembly template.
How hard and soft constraints work in projects and cloud templates
Constraints in both projects and cloud templates can be hard or soft. The preceding code snippet
shows examples of hard and soft constraints. By default all constraints are hard. Hard constraints
allow you to rigidly enforce deployment restrictions. If one or more hard constraints are not met,
the deployment will fail. Soft constraints express preferences that apply if available, but they
won't cause a deployment to fail if not met.
If you have a series of hard and soft constraints on a specific resource type, the soft constraints
can also serve as tie breakers. That is, if multiple resources meet a hard constraint, the soft
constraints are used to select the actual resource used in the deployment.
For example you can specify up to three constraints on a project in any combination of network,
storage and extensibility items. Also, you can select whether each constraint is hard or soft. Let's
say that you create a hard storage constraint with a tag of location:boston. If no storage in the
project matches this constraint, any related deployment will fail.
Standard tags
vRealize Automation Cloud Assembly applies standard tags to some deployments to support
analysis, monitoring, and grouping of deployed resources.
Standard tags are unique within vRealize Automation Cloud Assembly. Unlike other tags, users
do not work with them during deployment configuration, and no constraints are applied. These
tags are applied automatically during provisioning on AWS, Azure, and vSphere deployments.
These tags are stored as system custom properties, and they are added to deployments after
provisioning.
Description Tag
Organization org:orgID
Project project:projectID
Requester requester:username
Description Tag
Deployment deployment:deploymentID
vRealize Automation Cloud Assembly uses a specific order and hierarchy of operations in
resolving tags to create provisioned deployments. Understanding the basics of this process will
help you to implement tags efficiently to create predictable deployments.
The following list summarizes the high level operations and sequence that Cloud Assembly uses
to resolve tags and define a deployment:
n Cloud zones are filtered by several criteria, including availability and profiles; tags in profiles
for the region the zone belongs to are matched at this point.
n Zone and compute capability tags are used to filter the remaining cloud zones by hard
constraints.
n Out of the filtered zones, priority is used to select a cloud zone. If there are several
cloud zones with the same priority, they are sorted by matching soft constraints, using a
combination of the cloud zone and compute capabilities.
n After a cloud zone is selected, a host is selected by matching a series of filters, including hard
& soft constraints as expressed in cloud templates.
Typically, the cloud administrator is the primary individual responsible for creating and
maintaining tags.
This topic refers to the WordPress use case described elsewhere in the vRealize Automation
Cloud Assembly documentation to illustrate how tags can be added to some key items. It
also describes possible alternatives and extensions to the tagging examples that appear in the
WordPress use case.
See Tutorial: Setting up and testing multi-cloud infrastructure and deployments in vRealize
Automation Cloud Assembly for more information about the WordPress use case.
The WordPress use case describes how to place tags on cloud zones and storage and network
profiles. These profiles are like organized packages of resources. Tags placed on profiles apply
to all items within the profile. You can also create and place tags on storage resources and
individual network items as well as on compute resources, but these tags apply only to the
specific resources on which they are placed. When setting up tags, it is usually best to begin by
tagging compute resources, and then you can add tags to profiles and cloud zones later. Also,
you use these tags to filter the list of compute resources for a cloud zone.
For example, while you can place tags on storage profiles as shown in this use case, you can
also place tags on individual storage policies, data stores, and storage accounts. Tags on these
resources enable you to exercise finer control over how storage resources are deployed. During
processing in preparation for deployment, these tags are resolved as a next level of processing
after the profile tags.
As an example of how you might configure a typical customer scenario, you could place a tag
of region: eastern on a network profile. This tag would apply to all resources within that profile.
Then you could place a tag of networktype:pci on a pci network resource within the profile. A
cloud template with constraints of eastern and pci would create deployments that use this pci
network for the eastern region.
Procedure
It is particularly important that you tag compute resources in a logical manner so that you
can find them using the search function on the Compute tab of the Create Cloud Zone page.
Using this search function, you can quickly filter the compute resources associated with a
cloud zone. If you tag Storage and Networks at the profile level, you may not need to tag
individual storage and network resources.
a Select Resources > Compute to view the compute resources that have been imported for
your vRealize Automation Cloud Assembly instance.
b Select each compute resource as appropriate and click Tags to add a tag to the resource.
You can add more than one tag to each resource if appropriate.
c Repeat the previous step for storage and network resources as appropriate.
You can use the same tags for both cloud zones and network profiles, or you can create
unique tags for each item if that makes more sense for your implementation.
In network profiles, you can place tags on the entire profile as well as on subnets within the
profile. Tags applied at the profile level apply to all components, such as subnets, within that
profile. Tags on subnets apply only to the specific subnet on which they are placed. During
tag processing, the profile level tags take precedence over the subnet level tags.
See 2. Add cloud zones5. Add network profiles for information about adding tags to cloud
zones or network profiles.
In this example we create three simple tags that appear throughout the use case
documentation for vRealize Automation Cloud Assembly cloud zone and network profile tags.
These tags identify the environment for the profile components.
n zone:test
n zone:dev
n zone:prod
Typically, storage tags identify the performance level of storage items, such as tier1 or tier2,
or they identify the nature of storage items, such as pci.
See 6. Add storage profiles for information about adding tags to storage profiles.
n usage:general
n usage:fast
Results
After you create a basic tagging structure, you can begin working with it and add or edit tags as
appropriate to refine and extend your tagging capabilities.
The cloud administrator can label resources with capability tags to affect where vRealize
Automation cloud templates are deployed.
The cloud administrator might choose to apply tags directly to the resources to label capabilities
for matching purposes in vRealize Automation provisioning.
After you add a cloud account to your vRealize Automation Cloud Assembly infrastructure, for
example by using the Infrastructure > Connections > Cloud Accounts menu sequence, data
collection discovers the cloud account's network and security information. That information is
then available for to use in networks, network profiles, and other definitions.
Networks are the IP-specific components of an available network domain or transport zone. If
you're an Amazon Web Services or Microsoft Azure user, think of networks as subnets.
You can display information about the networks in your project by using the Infrastructure >
Resources > Networks page.
The vRealize Automation Cloud Assembly Networks page contains information such as:
n Networks and load balancers that are defined externally in the network domain of your cloud
account, for example in vCenter, NSX-T, or Amazon Web Services.
n Networks and load balancers that have been deployed by the cloud administrator.
n IP ranges and other network characteristics that have been defined or modified by your
cloud administrator.
For more information about networks, see the following information, signpost help for various
settings on the Networks page, and Learn more about network profiles in vRealize Automation.
Networks
You can view and edit networks and their characteristics, for example to add tags or remove
support for public IP access. You can also manage network settings such as DNS, CIDR, gateway,
and tag values. You can also define new, and manage existing, IP ranges within a network.
For existing networks you can change the IP range and tag settings by selecting the network's
checkbox and selecting either Manage IP Ranges or Tags. Otherwise you can select the network
itself to edit its information.
Tags provide a means for matching appropriate networks, and optionally network profiles, to
network components in cloud templates. Network tags are applied to every instance of that
network, regardless of any network profiles in which the network may reside. Networks can
be instanced into any number of network profiles. Regardless of network profile residency, a
network tag is associated with that network wherever the network is used. Network tag matching
occurs with other components in the cloud template after the cloud template has been matched
with one or more network profiles.
For global networks, existing and public networks are supported for NSX-T global manager and
local manager cloud accounts and the vCenter cloud accounts that are associated to the local
managers. Local manager representation of stretched networks is defined within a transport
zone. The transport zone is an NSX-T local manager construct that defines the span of NSX-T
networks for vCenter Server hosts and clusters.
vRealize Automation Cloud Assembly enumerates, or data collects, existing and public networks.
You can create a global network by adding an existing or public network on an NSX-T global
manager. The global network can then be consumed by all the associated local managers. Global
networks can span one, all, or a subset of the associated local managers. You can create the
following types of global networks on a global manager:
2 VLAN - a VLAN network applies to a single local manager and the transport zone can be
manually selected.
Global networks are listed on the Infrastructure > Resources page with all the cloud accounts
that they apply to.
As a Day 2 operation, you can reconfigure a network in a cloud template definition from a global
network to a local network and vice versa.
For more information about networks in cloud templates, see Using a network resource in a
vRealize Automation cloud template.
IP Ranges
Use an IP range to define or make changes to the start and end IP address for a particular
network in your organization. You can display and manage IP ranges for listed networks. If the
network is managed by an external IPAM provider, you can manage IP ranges in connection with
the associated IPAM integration point.
Click New IP Range to add an additional IP range to the network. You can specify an internal IP
range, or if there is a valid IPAM integration available you can specify an External IP range.
You cannot include the default gateway in an IP range. The subnet IP range cannot include the
subnet gateway value.
If you are using an external IPAM integration for a particular IPAM provider, you can use the
External IP range to select an IP range from an available external IPAM integration point. This
process is described within the context of an overall external IPAM integration workflow at
Configure a network and network profile to use external IPAM for an existing network in vRealize
Automation .
vRealize Automation allows you to apply and manage an IP address range across multiple
vSphere and NSX networks. Shared IP range support is provided for both internal and external
IPAM. You can set a single IP range on an NSX stretch network such that VMs on that network
can use IP addresses that are assigned from the single IP address even if they are deployed to
different vCenters.
IP Addresses
You can see the IP addresses that are currently used by your organization and display their
status, for example available or allocated. The IP addresses that are displayed are either
IP addresses that are managed internally by vRealize Automation or IP addresses that are
designated for deployments that contain an external IPAM provider integration. External IPAM
providers manage their own IP address allocation.
If the network is managed internally by vRealize Automation, and not by an external IPAM
provider, you can also release IP addresses.
When using internal IPAM and releasing IP addresses, for example after deleting a machine that
had been using the IP addresses, there is a 30 minute wait period between when the addresses
are released and when you can reuse them. The wait period allows for the DNS cache to clear.
The IP addresses can then be allocated to a new machine. You can then provision a machine with
the same IP addresses as the previously deleted machine.
Load Balancers
You can manage information about available load balancers for the account/region cloud
accounts in your organization. You can open and display the configured settings for each
available load balancer. You can also add and remove tags for a load balancer.
Network Domains
The network domains list contains related and non-overlapping networks.
Security groups and firewall rules support network isolation. Security groups are data-collected.
Firewall rules are not data-collected.
Security groups
Using the Infrastructure > Resources > Security menu sequence, you can view on-demand
security groups that have been created in vRealize Automation Cloud Assembly cloud template
designs and existing security groups that were created in source applications, such as NSX-T and
Amazon Web Services. Available security groups are exposed by the data collection process.
You can view the available security groups and add or remove tags for selected security groups.
A cloud template author can assign one or more security groups to a machine NIC to control
security for the deployment.
In the cloud template design the securityGroupType parameter in the security group resource is
specified as existing for an existing security group or new for an on-demand security group.
Existing security groups from the underlying cloud account endpoint, such as NSX-V, NSX-T,
or Amazon Web Services applications, are available for use. On-demand security groups that
were created in your organization's cloud template designs are also data-collected. On-demand
security groups are currently available for NSX-V and NSX-T only.
Existing security groups are displayed and classified in the Origin column as Discovered. On-
demand security groups that you create in vRealize Automation Cloud Assembly, either in a
cloud template or in a network profile, are displayed and classified in the Origin column as
Managed by Cloud Assembly. On-demand security groups that you create as part of a network
profile are internally classified as an isolation security group with pre-configured firewall rules
and are not added to a cloud template design as a security group resource. On-demand security
groups that you create in a cloud template design, and that can contain express firewall rules, are
added as part of a security group resource that is classified as new.
If you edit an existing security group directly in the source application, such an in the source
NSX application rather than in vRealize Automation Cloud Assembly, the updates are not visible
in vRealize Automation Cloud Assembly until you data collection runs and data collects the
associated cloud account or integration point from within vRealize Automation Cloud Assembly.
Data collection runs automatically ever 10 minutes.
A cloud administrator can assign one or more tags to an existing security group to allow it to be
used in a cloud template. A cloud template author can use a Cloud.SecurityGroup resource in a
cloud template design to allocate an existing security group by using tag constraints. An existing
security group requires at least one constraint tag be specified in the security resource in the
cloud template design.
The Applied To column does not contain security groups that are classified or managed by an
NSX Distributed Firewall (DFW). Firewall rules that apply to applications are for east/west DFW
traffic.
Some firewall rules can only be managed in the source application and cannot be edited in
vRealize Automation Cloud Assembly. For example, ethernet, emergency, infrastructure, and
environment rules are managed in NSX-T.
Learn more
For more information about using security groups in network profiles, see Learn more about
network profiles in vRealize Automation.
For information about defining firewall rules, see Using security group settings in network profiles
and cloud template designs in vRealize Automation Cloud Assembly and Using a security group
resource in a vRealize Automation cloud template.
For cloud template design code samples that contain security groups, see Network, security, and
load balancer examples in vRealize Automation cloud templates.
Storage resource capabilities are exposed through tags that typically originate at the source
cloud account. A cloud administrator can choose to apply additional tags directly to storage
resources though, using vRealize Automation Cloud Assembly. The additional tags might label a
specific capability for matching purposes at provisioning time.
vRealize Automation supports standard disk and first class disk capabilities. First class disk is
available for vSphere only.
First class disks that have been data-collected appear on the Volumes resource page. See
Volume resources in vRealize Automation.
Information about all the machines in your projects is available. You can list only your machines or
specify filters to control the display of listed machines.
Unmanaged machines that are associated to cloud accounts in your projects appear in this list, as
do managed machines. The Origin column indicates the machine status.
n Deployed - machines that have been onboarded or provisioned from vRealize Automation
and are considered to be managed machines.
Other machine information, such as custom properties and memory, is also collected and
displayed.
You can use a workload onboarding plan to bring unmanaged machines into vRealize Automation
management.
Disconnected machine NICs are not listed because vRealize Automation requires the presence of
the network switch or subnet information to enumerate the ethernet card. For example, if you
have removed a machine NIC from a deployment, the NIC is not listed.
For information about using onboarding plans to bring unmanaged machines into vRealize
Automation management, see What are onboarding plans in vRealize Automation Cloud
Assembly.
vRealize Automation Cloud Assembly displays volumes or logical drives that originate from two
sources:
You can review capacity and capabilities according to volume or logical drive. The list also
exposes capability tags that originated at the source cloud account or were added in vRealize
Automation Cloud Assembly itself. The volume's status as a first class disk is also noted. For
information about first class disk storage volumes, see What can I do with first class disk storage
in vRealize Automation.
You can discover information about resource data collection and image synchronization for an
existing cloud account in the Status section of its page. Do so by selecting Infrastructure >
Connections > Cloud Accounts and then clicking Open on the existing cloud account of your
choice.
You can open an existing cloud account and see its associated endpoint version in the Status
section of its page. If the associated endpoint has been upgraded, the new endpoint version
is discovered during data collection and reflected in the Status section on the cloud account's
page.
Note Images are internally classified as either public or private. Public images are shared and are
not specific to a particular cloud subscription or organization. Private images are not shared and
are specific to a specific subscription. Public and private images are automatically synchronized
every 24 hours. An option on the cloud account page allows you to trigger synchronization for
private images.
The cloud account page displays when image synchronization was last completed.
To facilitate fault tolerance and high availability in deployments, each NSX-T data center
endpoint represents a cluster of three NSX managers. For related information, see Create an
NSX-T cloud account in vRealize Automation.
For information about adding cloud accounts, see Adding cloud accounts to vRealize Automation
Cloud Assembly.
For information about onboarding unmanaged machines, see What are onboarding plans in
vRealize Automation Cloud Assembly.
How to use the Insights dashboard to monitor resource capacity and notify
project owners in vRealize Automation
A cloud administrator can monitor and manage infrastructure resources and deployment
optimizations within each cloud zone. By visualizing real-time insights, and reviewing suggested
actions for the resources you support, you can proactively help project owners manage their
resource capacity and optimize their deployments.
You can use the Insights dashboard to explore metric data for the resources and deployments
in cloud zones within the projects that you manage. Use that information, provided from
a combination of vRealize Automation and your integrated vRealize Operations Manager
application, to make any needed adjustments to memory, CPUs, and so on, or share that
information with your team so that they can be better informed and make any needed
adjustments.
The Insights dashboard enables you to contact some or all of the project owners who have
deployments in the cloud zone that contain reclaimable resource capacity. The cloud zone
insights display reclaimable capacity for projects and deployments.
Contacted project owners see notification on their deployment's Alerts page. The notification
contains their name and the name of (and link to) each deployment that can be optimized.
The Insights dashboard is available for vSphere and VMware Cloud on AWS cloud zones,
provided that the cloud accounts are configured in both vRealize Automation and vRealize
Operations Manager and are being monitored in vRealize Operations Manager.
Prerequisites
n Review Resource management and deployment optimization using vRealize Operations
Manager metrics in vRealize Automation .
n Verify that you have vRealize Automation cloud administrator credentials and have enabled
HTTPS access on port 443. See Credentials required for working with cloud accounts in
vRealize Automation.
n Verify that you have the vRealize Automation cloud administrator user role. See What are the
vRealize Automation user roles.
About vRealize Operations Manager and the collected resource capacity metrics
vRealize Operations Manager collects capacity metrics for the same infrastructure resources
that you and the teams that you support use in vRealize Automation. By integrating vRealize
Automation with vRealize Operations Manager, the vRealize Operations Manager metric data is
made available and displayed for each managed project in an Insights dashboard within each
cloud zone.
Project data is parsed to the vRealize Automation dashboard from the integrated vRealize
Operations Manager application. The Insights dashboard displays the following information:
n Option to contact owners of some or all of the deployments in a cloud zone that can
be optimized by reclaiming resources, for example by resizing or deleting machines.
Optimization data is calculated in the order of days.
A trend widget displays the compute components of a cloud zone (such as clusters and hosts),
their CPU GHz usage relative to CPU capacity, and their memory GB usage relative to memory
capacity.
Information about the roles that are required to use alerts is available at Custom user roles in
vRealize Automation.
For related information, see Resource management and deployment optimization using vRealize
Operations Manager metrics in vRealize Automation .
Procedure
Open a cloud zone to discover its capacity metrics and optionally fetch information about project
deployments that can be optimized. Data is collected and supplied by the associated vRealize
Operations Manager application.
1 From vRealize Automation Cloud Assembly, click Infrastructure > Configure > Cloud Zones
and select a cloud zone.
The following example displays CPU, memory, and storage capacity information for the
resources that are used by projects in the cloud zone.
3 To notify the project owner of any deployments that can be optimized, click Contact Owner
in the Projects section. Notifications appear on the Alerts tab page.
4 To fetch optimization information about each deployment for the project, click Proceed.
If the project contains deployments that can be optimized, that information is conveyed to
the project owner on the vRealize Automation Cloud Assembly Alerts tab.
Notification information about these resources and deployments is available to the project
owner on the vRealize Automation Cloud Assembly Alerts tab. For this example, that
notification information includes the name of, and a link to, each deployment that can be
optimized, as shown in the following example:
Next steps
Use the information that you have obtained from the Insights dashboard to make any needed
adjustments to the resources that you manage. Open the Alerts page to obtain additional
information, suggested actions, and links to deployments that can be optimized. See How to
use Alerts to manage resource capacity, performance, and availability in vRealize Automation.
You can display a range of alerts provided by the associated vRealize Operations Manager
application. Alerts are available for vSphere and VMware Cloud on AWS resource objects. Use
information in alerts to modify the resources and deployments that you manage, or share that
information with your team so they can modify objects that they manage.
Note To examine and act on project deployments that you should consider optimizing, see How
to use Alerts to optimize deployments in vRealize Automation.
Alerts are currently available for vSphere and VMware Cloud on AWS resource objects only. The
Alerts tab is only available if access to vRealize Operations Manager is configured.
The vRealize Automation alerts threshold values are set in vRealize Operations Manager. Some
vRealize Automation alerts are currently predefined. Alerts notifications are also set in vRealize
Operations Manager. For information about setting alert definitions and configuring notifications,
see vRealize Operations Manager product documentation.
Prerequisites
n Review Resource management and deployment optimization using vRealize Operations
Manager metrics in vRealize Automation .
n Verify that you have vRealize Automation cloud administrator credentials and have enabled
HTTPS access on port 443. See Credentials required for working with cloud accounts in
vRealize Automation.
n Verify that you have the vRealize Automation cloud administrator user role. See What are the
vRealize Automation user roles.
n Configure the roles that are need to manage alerts. See Custom user roles in vRealize
Automation.
The alerts data provided by vRealize Operations Manager includes heath and risk threshold
concerns for cloud templates, deployments, organizations, and projects. It also contains
information about deployments that can be optimized, based on the owner being contacted
by an action taken on the cloud zone Insights tab. See How to use the Insights dashboard to
monitor resource capacity and notify project owners in vRealize Automation .
n Project name
n Deployment name (and link to the deployment) that contain resources that can be optimized
n Suggested actions
n Virtual machines in the deployment that are recommended for reclamation and optimization,
including resource name, idle machines, powered off machines, oversized and undersized
machines, underutilized machines, and machine snapshots
By using the Contact project owners option on the cloud zone Insights dashboard, you can see a
summary of all projects that have reclaimable capacity (CPU, memory, and storage) in the cloud
zone and provide an alert to some or all of the project owners.
Procedure
You can display alerts threshold information about the resources that you manage by using
filtering options on the Alerts page. Alerts data is supplied by your associated vRealize
Operations Manager application. Suggested actions are provided for each alert.
You can also select a deployment from the Deployments to review section to open and optimize
that deployment. See How to use Alerts to optimize deployments in vRealize Automation.
1 From within the vRealize Automation Cloud Assembly service, click the Alerts tab in the main
menu.
2 To control the how alerts are displayed, experiment with the available filters. For example,
select the Resources option from the filters drop-down menu.
3 To display alerts and suggested actions for those alerts, use quick filter options in the
selector panel.
vRealize Operations Manager can monitor time remaining, capacity remaining, reclaimable
capacity, and so on.
The majority of virtual machine alerts pertain to on/off status, latency, and so on.
4 Explore other filter types and their quick filtering options to further control the list of alerts.
n Use the Severity quick filters of critical, immediate, warning, and information.
n Use the Type quick filters of application, hardware, infrastructure, storage, and network.
Next steps
To learn about other actions that are available, see How to use Alerts to optimize deployments in
vRealize Automation.
You can also display capacity Insights for cloud zone-based resources in projects that you
manage. For information about using vRealize Operations Manager- supplied Insights data in
vRealize Automation, see How to use the Insights dashboard to monitor resource capacity and
notify project owners in vRealize Automation .
When you connect vRealize Automation with vRealize Operations Manager, you can access data-
collected information about resources in the projects that you manage. Alerts and insights data
is provided to inform you of various concerns about the projects that you manage, and provide
an easy means to communicate optimization suggestions and supporting data collected from
vRealize Operations Manager to project owners easily and efficiently without ever leaving the
vRealize Automation application. For example, you can see reclaimable resource capacity, with
specific cost savings, for each deployment in a cloud zone. Where a cloud zone contains multiple
deployments that can be optimized, you can notify some or all of the project and deployment
owners.
Deployment optimization alerts can be generated from the Insights dashboard. See How to
use the Insights dashboard to monitor resource capacity and notify project owners in vRealize
Automation . You can contact project owners so that they can open a named deployment to
be optimized from a link provided on the Alerts page. As well, project owners can open their
deployments directly and use the Optimize tab to perform available optimization tasks. Actions
that a project owner can take include reclaiming resources by deleting non-critical deployments,
and stopping further provisioning within a cloud zone.
Note To learn about other resource remediation actions that you can take, see How to use
Alerts to manage resource capacity, performance, and availability in vRealize Automation.
Prerequisites
See How to use Alerts to manage resource capacity, performance, and availability in vRealize
Automation for needed credentials and configuration information for accessing vRealize
Operations Manager data in vRealize Automation.
To request that project owners be alerted of deployments that are optimizeable, see How to
use the Insights dashboard to monitor resource capacity and notify project owners in vRealize
Automation .
About
Each deployment contains an Optimize tab. The following optimization parameters are available:
n Machines that can be rightsized - Displays information and actions for oversized and
undersized machines in the deployment, along with optimization cost savings.
n Machines that are under-utilized - Displays information and actions for idle or powered off
machines in the deployment, along with optimization cost savings.
n Machine snapshots - Displays information and actions for machine snapshots if machines in
the deployment contain snapshots, along with optimization cost savings.
As an administrator, you can notify project owners that they have deployments to optimize.
Notifications appear on the Alerts tab in vRealize Automation Cloud Assembly.
The Alerts tab is only available if access to vRealize Operations Manager is configured. Project
owners can open and optimize their deployments to respond to alerts.
Procedure
You can display alerts threshold information about the resources that you manage by using
filtering options on the Alerts page. Alerts data is supplied by your associated vRealize
Operations Manager application. Suggested actions are provided for each alert. In this example
the project owner opens their deployment from a link supplied on an alert notification. The
deployment's Optimize tab displays available machine parameters to optimize.
1 As a project owner or administrator, click the Alerts tab in the main menu.
2 Find an alert that contains information about a deployment that can be optimized and click
the deployment name from Deployments to review to open that deployment and display its
Optimize tab.
4 If there are underutilized machines, examine and act on idle and powered off machines. You
can power off or delete an undersized deployment.
5 If there are machines that can be rightsized, examine and act on any oversized and
undersized machines in the deployment.
6 If one or more of the machines in the deployment contains a snapshot, you can delete or
export each snapshot.
7 When you are finished, confirm that the deployment has been optimized to your satisfaction
and close the deployment
Next steps
To learn about other actions that are available, see How to use Alerts to manage resource
capacity, performance, and availability in vRealize Automation.
You can also display capacity Insights for cloud zone-based resources in projects that you
manage. For information about using vRealize Operations Manager- supplied Insights data in
vRealize Automation, see How to use the Insights dashboard to monitor resource capacity and
notify project owners in vRealize Automation .
vRealize Automation supports two categories of storage – standard disk and first class disk. First
class disk is only available for vSphere.
n vSphere
When you delete a virtual machine, its dependent and independent non-persistent disks are
also deleted.
When you delete a virtual machine, its independent persistent disks are not deleted.
You can create a snapshot of dependent and independent non-persistent disks. You cannot
create a snapshot of an independent persistent disk.
You can attach an EBS volume to an AWS compute instance or detach an EBS volume from
an AWS compute instance.
When you delete a virtual machine, its attached EBS volume is detached but not deleted.
When you delete a virtual machine, you specify whether to remove its attached storage
disks.
Persistent disks are located independently from your virtual machine instances, so you can
detach or move persistent disks to keep your data even after you delete your instances.
When you delete a virtual machine, its attached disk is detached but not deleted.
For related information, see Learn more about storage profiles in vRealize Automation .
In a cloud template, under a volume, you can add the persistent: true property to have the disk
survive vRealize Automation Cloud Assembly or vRealize Automation Service Broker deletions.
Persistent disks aren't removed during deployment deletion nor Day 2 delete or remove disk
operations.
Because of that, persistent disks can remain in your infrastructure even after a deployment
deletion or disk deletion. To remove them, you can use the following techniques.
n Explicitly pass the purge flag as a query parameter using the DELETE API.
Note that there is no vRealize Automation Cloud Assembly or vRealize Automation Service
Broker user interface for removing them.
vRealize Automation supports two categories of storage disks – standard disk and first class
disk. First class disk functionality is supported for vSphere only. vRealize Automation currently
provides first class disk functionality as an API-only capability.
A first class disk has its own life-cycle management capabilities that operate independently from
a VM. One way that a first class disk differs from an independent persistent disk, is that you can
use a first class disk to create and manage snapshots independent of a VM.
You can create a new vRealize Automation storage profile to support either first class disk
capabilities or standard disk capabilities. See Learn more about storage profiles in vRealize
Automation and Storage resources in vRealize Automation.
You can also add a Cloud.vSphere.Disk first class disk element in your vRealize Automation
cloud templates and deployments to support vSphere first class disks. First class disks that have
been data-collected appear on the Volumes resource page. See Volume resources in vRealize
Automation.
In vCenter, first class disks are also referred to as Improved Virtual Disks (IVD) or managed
virtual disks.
Capabilities
Using vRealize Automation API capabilities, you can:
Related API information about creating and managing first class disk (FCD) storage by using
the vRealize Automation API, including how to define a storage profile to use first class disk
capabilities, is available at code.vmware.com at What are the vRealize Automation Cloud APIs
and how do I use them or by navigating from the following locations:
n API documentation for FCD is available in the First Class Disk (FCD) section of the Virtual Disk
Development Kit Programming Guide.
n Links to API use case documentation for FCD in vRealize Automation are available on the
vRealize Automation API Documentation page for your vRealize Automation release.
n First class disk snapshot hierarchy can only be constructed by using the createdAt API option.
n The minimum VM hardware version required to attach a first class disk is vmx-13 (ESX 6.5
compatible).
In vRealize Automation 8.x, customers can configure mult-tenancy environments using VMware
Life Cycle Manager and Workspace ONE Access. These tools enable users to set up multi-
tenancy and create and configure tenants. After tenants are configured, provider administrators
can create Virtual Private Zones in vRealize Automation Cloud Assembly and then they can
assisgn Zones to tenants using the vRealize Automation Cloud Assembly Manage Tenants
functionality.
n Workspace ONE Access - This product provides the infrastructure support for multi-tenancy
and the Active Directory domain connections that provide user and group management
within tenant organizations.
n vRealize Suite Lifecycle Manager - This product supports the creation and configuration of
tenants for supported products, such as vRealize Automation. In addition, it provides some
certificate management capabilities.
n vRealize Automation - Providers and users log in to vRealize Automation to access tenants in
which they create and manage deployments.
When configuring multi-tenancy, users should be familiar with all three of these products and
their associated documentation.
For more information about working with vRealize Suite Lifecycle Manager and Workspace ONE
Access, see the following.
You can use Virtual Private Zones to allocate resources such as images, networks, and storage
resources. VPZs function much as cloud zone on a per tenant basis but they are designed
specifically for use with multi tenant deployments. For any given project, you can use either
cloud zones or VPZ's but not both. Also, there is a one to one relationship between VPZ's and
tenants. That is, a VPZ can be assigned to only one tenant at a time.
Note You configure image and flavor mappings for a VPZ on the Tenant Management page.
You can create a VPZ with or without NSX. If you create a zone without NSX, there are limits
regarding NSX-related functionality on vSphere endpoints.
Prerequisites
n Enable and configure multi-tenancy on your vRealize Automation deployment using VMware
Life Cycle Manager and VMware Workspace ONE Access.
n If you want to use NSX, you must create an appropriate NSX cloud account in your provider
organization.
Procedure
The VPZ page shows all existing zones and enables you to create zones.
There are four selections on the left side of the page that you can use to configure summary
information and infrastructure components for the zone.
Placement policy drives host selection for deployments within the specified cloud zone.
n Default - Distributes compute resources across clusters and hosts randomly. This
selection works at an individual machine level. For example, all machines in a
particular deployment are distributed randomly across the available clusters and
hosts that satisfy the requirements.
n binpack - Places compute resources on the most loaded host that has enough
available resources to run the given compute.
n spread - Provisions deployment compute resources to the cluster or host with the
least number of virtual machines. For vSphere, Distributed Resource Scheduler (DRS)
distributes the virtual machines across the hosts. For example, all requested machines
in a deployment are placed on the same cluster, but the next deployment might select
another vSphere cluster depending on the current load.
Add compute resources as appropriate for the cloud zone. Initially, the filter selection is
Include all Compute and the following list shows all available compute resources, and they
are allocated to the applicable zone. You have two additional options for adding compute
resources to a cloud zone.
n Manually select compute - Select this menu item if you want to select compute resources
manually from the list below. After you select them, click Add Compute to add the
resources to the zone.
n Dynamically include compute by tags - Select this menu item if you want to select
compute resource to be added to the zone based on tags. All compute resources are
shown until you add appropriate tags. You can select or enter one or more tags in the
Include compute with these tags option.
For either compute selection, you can remove one or more of the compute resources shown
on the page by selecting the box to the right and clicking Remove.
6 Select Storage on the left menu and select the Storage policy and other storage
configurations for the zone.
7 On the left menu, select Network and define the networks and, optionally, a network policy
to use with this zone. You can also configure load balancers and security groups for selected
network policies.
Results
The Virtual Private Zone is created with the specified resource allocations.
What to do next
5 You can set the provision priority and limits on the number of instances, the amount of
memory available and the number of CPUs available.
6 Click Add.
Tenant Management page, administrators can view tenants and VPZ zones and enable or disable
VPZs for tenants.
By default, Virtual Private Zones are not allocated to any tenants. You must allocate VPZ's on this
page in order to use them with your tenants.
When initially created,VPZ's are enabled by default. An enabled VPZ is ready to be allocated and
used with the specified tenant. When VPZ's are disabled, they cannot be used for provisioning or
allocated to a tenant. A VPZ can be disabled but still allocated for a tenant.
When a provider administrator navigates to the Tenant Management page, the page shows all
available tenants and the administrator can select one. After a tenant is selected, the page shows
VPZs currently allocated for that tenant, if any. The administrator can use this page to allocate
VPZs to the selected tenant.
When a VPZ is allocated, tenant administrators can add it to their projects, and it becomes
available for provisioning by tenant users. After a VPZ is allocated to one tenant, it can be
allocated to another tenant.
After a VPZ is enabled, it is ready for use within the specified tenant. Provider administrators
can disable VPZ's to facilitate maintenance or tenant re-configuration, and they can provide
notification to users of the disablement. If you want to make a VPZ unavailable to a tenant on a
more permanent basis, you can de-allocate it. If an existing VPZ is de-allocated from a tenant for
some reason, it cannot be used to create deployments from that tenant.
Prerequisites
n Set up multi-tenancy and create Virtual Private Zones as appropriate for your deployment.
n Configure global image and flavor mappings for the VPZ and tenant configuration using
the image mapping and flavor mapping menu selections on the left side of the Tenant
Management page in Cloud Assembly. See Create global image and flavor mapping for
vRealize Automation tenants
You can override these global assignments now or later using the the tenant specific image
and flavor mapping selections at the top of the Tenant Management page. See Configure
tenant specific image and flavor mappings for vRealize Automation
Procedure
The Tenant Management page shows all tenants configured for the administrator's
organization in a card view.
3 Click the infrastructure management tab to see all allocated VPZ's for the tenant
4 Select Allocate Virtual Private Zone to open a dialog that shows all zones not currently
allocated to tenants. allocate the zone to a tenant.
5 Select one or more zones on the dialog and click Allocate To Tenant.
What to do next
After VPZs are allocated, tenant administrators can assign them to projects.
Provider administrators can use the card view of tenants to monitor and manager status of VPZs.
n If you want to disable a tenant, click Disable on the card for the tenant.
n If you want to de-allocate a tenant, click Deallocate on the card for that tenant.
Global image and flavor mapping enables you to quickly set up mappings that apply to multiple
tenants. You can also quickly update these mappings. The tenant management page also
enables you to create tenant specific image and flavor mappings that can override the default
comfigurations.
Note Image and flavor mappings configured on the Tenant Management page apply only to
tenants as configured and are not applicable to the broader provider organization.
Prerequisites
Procedure
The Tenant Management page shows all tenants configured for the administrator's
organization in a card view.
The Image Mapping page displays all image currently configured for tenants in Cloud
Assembly and imdicates whether the mappings are global or associated with a specific
tenant.
3 Select Add Image Mapping to add an image mapping for use with tenants.
b Enter a name for the image mapping and select the specific image instance or version to
which it relates.
d Select the scope for the image mapping. The scope can be either Alll tenants, or global,
or you can select a specific tenant to which the image mapping will apply.
4 If desired, you can use a cloud configuration script to define custom OS characteristics for
deployments.
For example, based on whether you are deploying a cloud template to a public or private
cloud, you can apply specific user permissions, OS permissions, or other conditions to the
image. A cloud configuration script adheres to a cloud-init format for Linux-based images or
a cloudbase-init format for Windows-based images. See Learn more about image mappings
in vRealize Automation for more information.
6 Select Add Flavor Mapping to add a flavor mapping for use with tenants.
c Select the Size parameters for the flavor mapping you are creating.
You can specify the number of processors and the amount of memory for this flavor.
d Select the scope for the flavor mapping. The scope can be either Alll tenants, or global, or
you can select a specific tenant to which the flavor mapping will apply. All tenants applies
to all tenants in the provider administrator's organization.
Results
After you create global mappings, these mapping will show up on the Flavor Mapping or Tenant
Mapping tabs on the Tenant Management page for applicable tenants.
What to do next
You can edit or delete global image and flavor mappings on this page. To edit a mapping select it
and make the desired changes.
Typically, a cloud administrator configures global image and flavor mappings using the left
navigation links on the Tenant Management page, and these mappings apply across the board
for all of your tenants. In some cases, you may want to create custom, tenant-specific, image and
flavor mappigs for specific tenants and the Tenant Management page suports this option.
Image and flavor mapping are shown on their respective tabs on the Tenant Management page.
Click on any of the existing image and flavor mappings to edit them. To delete an image or flavor
mapping, select the mapping and then click Delete.
Prerequisites
Procedure
2 Select the tenant for which you wish to configure custom image or flavor mapping.
3 Select the Image Mapping link on the top of the page, then click Add Image Mapping.
4 Ensure that the Account/Region specified is correct and add a name for the mapping in the
Image Name text box.
n Click the Available for this tenant only radio button if you want this image mapping to be
available only for use by the selected tenant.
n Click the Shared Across tenants radio button if you want this image mapping to be
available for use by other tenants.
9 Select the Flavor Mapping link at the top of the page and then click Add Flavor Mapping to
create a flavor mapping.
10 Ensure that the Account/Region specified is correct and add a name for the mapping in the
Name text box.
11 Specify the flavor CPU and memory settings in the Value field.
n Click the Available for this tenant only radio button if you want this image mapping to be
available only for use by the selected tenant.
n Click the Shared Across tenants radio button if you want this image mapping to be
available for use by other tenants.
Results
n The Tenant administrator can create a subscription but cannot specify organization scope.
That subscription will be activated on events triggered by tenant only.
n The Provider administrator can create a subscription and specify provider scope. The
subscription will behave just like tenant subscription or non multi-tenant environment. It will
be activated based on events coming from the Provider.
n The Provider can create a subscription and specify the tenant scope. The subscription is
activated based on events coming from any Tenant. It is not activated by events coming from
Provider.
Subscriptions trigger vRealize Orchestrator workflows based on specific events. They do not
invoke extensibility actions. Currently only a single vRealize Orchestrator instance is supported
for any particular provider organization. For more information about events, event topics, and
subscriptions see Extensibility terminology.
Prerequisites
Configure tenants and virtual private zones as appropriate for your deployment.
Procedure
1 In vRealize Automation, navigate to the Subscriptions page and click New Subscription.
You can leave this button in the Off position if you don't want the subscription to be
immediately active.
The organization scope options are either provider or tenant. If you select tenant, then the
project scope is any project and cannot be changed. If you select provider, you can specify
the project scope using the selection at the bottom of the Subscriptions page.
Results
Providers and tenants can view the returned events for a specific deployment on the Events
page in Cloud Assembly. The displayed results depend on your role and the organization scope.
n If organization scope is Provider, then providers will see events based on their actions in
same provider organization.
n If organization scope is Tenant, tenants will see the events, but the provider cannot see them.
Events always live in the organization of the publisher.
2 In the Events page Search box, enter the deployment ID for which you wish to view events.
In vRealize Automation 8.2 users configured image and flavor mappings within VPZs. In newer
versions of vRealize Automation, users create image and flavor mappings on a per-tenant
basis, which increases efficiency and configuration flexibility especially in deployments with large
numbers of tenants. While there is no way to migrate legacy VPZs created invRealize Automation
8.2 there are several options for using them with newer versions of vRealize Automation.
The first, and most flexible, option is to delete the legacy image and flavor mappings from the
older VPZs and re-configure them with new mappings created on the Tenant Management page.
1 Select Infrastructure > Configure > Virtual Private Zones to open the VPZ page.
7 Select Tenant Mapping and create select a global mapping for the applicable tenants or
create a tenant specific mapping.
Alternatively, you can use legacy vPZs with newer versions of vRA in their existing configuration.
The legacy image and flavor mappings still function as configured, but their configuration options
are read only on the VPZ page. This options offers less flexibility than the first option.
Cloud administrators set up the projects, to which they can add users and cloud zones. Anyone
who creates and deploys cloud templates must be a member of at least one project.
Project
Infrastructure
Users and Roles
Access
Project Administrator
Members
Policies
Cloud Zones Cloud Templates
Leases
AWS region 1
Azure region 1
Other
vSphere datastore 1
n How do I add a project for my vRealize Automation Cloud Assembly development team
When you create a cloud template, you first select the project to associate it with. The project
must exist before you can create the cloud template.
Ensure that your projects support the business needs of the development team.
n Does the project provide the resources that support the team's goals. For an example of how
the infrastructure resources and a project support a cloud template, see Tutorial: Setting
up and testing multi-cloud infrastructure and deployments in vRealize Automation Cloud
Assembly.
When you share the deployment with project members, the members can run the same
day 2 action. To manage the ability of members to run day 2 actions, you can create day
2 policies in vRealize Automation Service Broker. The policies apply to vRealize Automation
Cloud Assembly and vRealize Automation Service Broker deployments.
To learn more about the day 2 policies, see How do I entitle deployment users to day 2
actions using policies.
This procedure is based on creating an initial project that includes only the basic configurations.
As your development team creates and deploys their cloud templates, you might modify to the
project. You can add constraints, custom properties, and other options to improve deployment
efficiencies. See the articles available in Learn more about vRealize Automation Cloud Assembly
projects.
Prerequisites
n Verify that you configured the cloud zones. See Chapter 4 Building your vRealize Automation
Cloud Assembly resource infrastructure.
n Verify that you configured the mappings and profiles for the regions that include as cloud
zones for this project. See Chapter 4 Building your vRealize Automation Cloud Assembly
resource infrastructure.
n Verify that you have the necessary permissions to perform this task. See What are the
vRealize Automation user roles.
n Determine who you are designating as the project administrator. To understand what the
project administrator can do in vRealize Automation Cloud Assembly, see What are the
vRealize Automation user roles.
n If you are adding Active Directory groups to projects, verify that you configured Active
Directory groups for your organization. See Edit group role assignments in vRealize
Automation in Administering vRealize Automation. If the groups are not synchronized, they
are not available when you try to add them to a project.
Procedure
1 Select Infrastructure > Administration > Projects, and click New Project.
a To make deployments by project members accessible only to the requesting user, turn
off Deployment sharing. To ensure that you can assign the ownership of a deployment to
another member of the project, verify that the Deployment sharing is turned on.
4 Click the Provisioning tab and add one or more cloud zones.
Add any cloud zones and virtual private zones that contain the resources that support the
cloud templates deployed by the project users.
For each zone, you can set a zone priority and you can limit the amount of resources that
the project can use. The possible limits include the number of instances, memory, and CPUs.
For vSphere cloud zones only, you can configure storage limits for deployed resources that
are based on vSphere VM templates. The storage limits are evaluated with you request
deployment and when you make changes using the resize disk, resize boot disk, remove disk,
and the update count actions. These storage limits do not apply to other resource types such
as AWS, Microsoft Azure, or Google Cloud Platform.
As you add each zone and apply limits, don't limit the project resources so narrowly that the
members cannot deploy their cloud templates.
When your users submit a deployment request, the zones are evaluated to determine which
zones have the resources to support the deployment. If more than one zone supports the
deployment, then the priority is evaluated and the workload is placed on the one with the
higher priority, which is the lowest integer.
5 If the workloads requested for this project take more than two hours to deploy, enter a
longer value for the Timeout.
6 Click Create.
7 To test your project with the project cloud zones, click Test Configuration on the Projects
page.
The simulation runs a standardized hypothetical deployment test against the project cloud
zone resources. If it fails, you can review the details and correct your resource configuration.
What to do next
Get started with cloud templates. See Chapter 6 Designing your vRealize Automation Cloud
Assembly deployments.
The resource tags defined in a project are added to all component resources deployed as part
of that project. You can then use the standard tagging to manage the resources using other
applications, for example, monitor spending cost using CloudHealth, and, importantly, to ensure
compliance.
For example, as a cloud administrator, you want to use an application like CloudHealth to manage
costs. You add the costCenter:eu-cc-1234 tag to a project dedicated to developing a European
Union human resources tool. When the project team deploys from this project, the tag is added
to the deployed resources. You then configure the costing tool to identify and manage the
resources that include this tag. Other projects with other cost centers would have alternative
values to go with the key.
The deployment process looks for tags for the networks and storage that match the project
constraints, and deploys based on matching tags.
The extensibility constraint is used to specify which vRealize Orchestrator integrated instance to
use for extensibility workflows.
n key:value and key:value:hard. Use this tag, in either format, when the cloud template must
be provisioned on resources with the matching capability tag. The deployment process fails
when no matching tag is found. For example, a cloud template deployed by the members
of a project must be provisioned on a PCI-compliant network. You use security:pci. If no
networks are found in the project cloud zones, the deployment fails, ensuring no insecure
deployments.
n key:value:soft. Use this tag when you prefer a matching resource, but you want the
deployment process to proceed without failing and can accept resources where the tag does
not match. For example, you prefer that the project members deploy their cloud templates
to a less expensive storage, but you do not want storage availability to interfere with their
ability to deploy. You use tier:silver:soft. If there is no storage tagged tier:silver in the
project cloud zones, the cloud template still deploys on other storage resources.
n !key:value. Use this tag, with hard or soft, when you want to avoid deploying to resources
with a matching tag.
Importantly, the project constraint tags have a higher priority than the cloud template constraint
tags and override them at deployment time. If you have a cloud template where this must never
happen, you can use the failOnConstraintMergeConflict:true in the template. For example, if your
project has a network loc:london constraint, but the cloud template is loc:mumbai, but rather than
the project location taking precedence, you want the deployment to fail with a constraint conflict
message, you add a property similar to the following sample.
constraints:
- tag: 'loc:mumbai'
failOnConstraintMergeConflict:true
Adding a custom property to a deployment allows you to use the value in the user interface or to
retrieve it using the API so that you can generate reports.
Extensibility can also use a custom property for an extensibility subscription. For more
information about extensibility, see How to extend and automate application life cycles with
extensibility.
A cloud template might have a particular property value that you want to change for a project.
You can provide an alternative name and value as a custom property.
You can also encrypt the property value so that neither you nor your users can see the value
that is included in the deployment. For example, you can encrypt a password that all users in the
project use, but that you do not want visible. After you encrypt the value and save the project,
you cannot unmask or replace the value. If you clear the Encrypted check box, the value is
removed. You must re-enter a value.
The cost information that you see for a project and for the individual deployments appears after
at least one deployment associated with the project is provisioned. The costs are calculated and
updated daily so that you can track the cost of a deployment over time. The initial values are
based on industry benchmarks.
Cloud administrators can adjust the values to reflect your actual costs.
As a cloud administrator who is setting up projects for various teams, you must understand
how projects determine where cloud template components are deployed. This understanding
helps you create projects that support cloud template developers and to troubleshoot failed
deployments.
When you create a cloud template, you first associate it with a project. At deployment time,
the cloud template requirements are evaluated against the project cloud zones to find the best
deployment location.
2 The project evaluates the template and project requirements, for example, flavor, image, and
constraint tags. The requirements are compared to the project cloud zones to locate a zone
that supports the requirements.
3 These zones did not have the resources to support the request.
4 This cloud zone supports the request requirements and the template is deployed to this
cloud zone account region.
As a cloud template developer, you can design templates that target specific cloud vendors, or
make them cloud agnostic. The cloud zones that are assigned to your project determine which
approach you might take. Check with your cloud administrator to make sure that you understand
what kind of resources make up your cloud zones.
In addition, you must create a vRealize Automation Cloud Assembly project that includes those
infrastructure resources as cloud zones.
n How to create a simple vRealize Automation Cloud Assembly template from scratch
You can build a cloud template from a blank canvas or take advantage of existing code.
The code editor allows you to type, cut, copy, and paste code directly. If you're uncomfortable
editing code, you can select a resource in the design canvas, click the code editor Properties tab,
and enter values there. Property values that you enter appear in the code as if you had typed
them directly.
Note that you can copy and paste code from one cloud template to another.
In addition, you can upload, download, and share cloud template YAML code in any way that
makes sense for your site. You can even modify template code using external editors and
development environments.
Note A good way to validate shared template code is to inspect it in the vRealize Automation
Cloud Assembly code editor on the design page.
1 Locate resources.
3 Connect resources.
From the design page, you can also change the cloud template name, version or revert to
versions, clone, or deploy a template.
Resources appear for selection on the left side of the design page.
You can add cloud agnostic resources to a cloud template that contains cloud specific resources
for a particular vendor. Just be aware of what the project cloud zones support in terms of
vendor.
You can connect resources when they are compatible for a connection. For example:
Important A solid line connector requires that the two resources be deployed in the same cloud
zone. If you add conflicting constraints to the resources, deployment might fail.
For example, you can't deploy connected resources where constraint tags force the placement
of one to a zone in us-west-1, and the other to a zone in us-east-1.
Solid or dashed arrows only indicate a dependency, not a connection. For more about
dependencies, see How to set the resource deployment sequence in vRealize Automation Cloud
Assembly.
To connect, hover over the edge of a resource to reveal the connection bubble. Then, click and
drag the bubble to the target resource and release.
In the code editor, additional code for the source resource appears in the target resource code.
In the figure, the SQL machine and private network are connected, so they must be deployed in
the same cloud zone.
The code editor allows you to type code directly or enter property values into a form. To
help with direct code creation, the vRealize Automation Cloud Assembly editor includes syntax
completion and error checking features.
Editor
Hints Example
Available
values
Allowed
properties
Child
properties
Syntax
errors
Ctrl+F to
search
Editor
Hints Example
Optional
parameter
s
Schema For all of the custom properties, you can also refer to the vRealize Automation Resource Type Schema
help on VMware {code}.
The name must be alphanumeric, with no spaces, and only periods, hyphens, and underscores
allowed as special characters.
On the left, select an older version to inspect it in the canvas and code editor. When you find the
version that you want, click Restore. Restoring overwrites the current draft without removing any
named versions.
In vRealize Automation Service Broker, go to Content & Policies > Content Sources.
In the list of sources, click the source for the project that contains the cloud template with the
newly released version.
In vRealize Automation Cloud Assembly, from the Version History view, select a version, and click
Diff. Then, from the Diff against drop-down, select another version to compare to.
Note that you can toggle between reviewing code differences or visual topology differences.
The techniques described here require some comfort with infrastructure code. Fortunately,
vRealize Automation Cloud Assembly code is human readable and fairly easy to follow.
When users supply inputs, you no longer need to save multiple copies of templates that are only
slightly different. In addition, inputs can prepare a template for day 2 operations. See How to use
cloud template inputs for vRealize Automation day 2 updates .
The following inputs show how you might create one cloud template for a MySQL database
server, where users can deploy that one template to different cloud resource environments and
apply different capacity and credentials each time.
In the following example, machine size, operating system, and number of clustered servers are
selectable.
inputs:
wp-size:
type: string
enum:
- small
- medium
description: Size of Nodes
title: Node Size
wp-image:
type: string
enum:
- coreos
- ubuntu
If you're uncomfortable editing code, you can click the code editor Inputs tab, and enter settings
there. The following example shows some inputs for the MySQL database mentioned earlier.
If a property name includes a space, delimit with square brackets and double quotes instead of
using dot notation: ${input["property name"]}
Important In cloud template code, you cannot use the word input except to indicate an input
parameter.
resources:
WebTier:
type: Cloud.Machine
properties:
name: wordpress
flavor: '${input.wp-size}'
image: '${input.wp-image}'
count: '${input.wp-count}'
Property Description
const Used with oneOf. The real value associated with the
friendly title.
encrypted Whether to encrypt the input that the user enters, true or
false.
Passwords are usually encrypted.
You can also create encrypted properties that are
reusable across multiple cloud templates. See How to
create and reference a secret vRealize Automation Cloud
Assembly property.
enum:
- value 1
- value 2
format Sets the expected format for the input. For example,
(25/04/19) supports date-time.
Allows the use of the date picker in vRealize Automation
Service Broker custom forms.
Property Description
title Used with oneOf. The friendly name for a const value. The
title appears on the user input form at deployment time.
Additional examples
String with enumeration
image:
type: string
title: Operating System
description: The operating system version to use.
enum:
- ubuntu 16.04
- ubuntu 18.04
default: ubuntu 16.04
shell:
type: string
title: Default shell
Description: The default shell that will be configured for the created user.
enum:
- /bin/bash
- /bin/sh
count:
type: integer
title: Machine Count
description: The number of machines that you want to deploy.
maximum: 5
minimum: 1
default: 1
Array of objects
tags:
type: array
title: Tags
description: Tags that you want applied to the machines.
items:
type: object
properties:
key:
type: string
title: Key
value:
type: string
title: Value
platform:
type: string
oneOf:
- title: AWS
const: platform:aws
- title: Azure
const: platform:azure
- title: vSphere
const: platform:vsphere
default: platform:aws
username:
type: string
title: Username
description: The name for the user that will be created when the machine is provisioned.
pattern: ^[a-zA-Z]+$
String as password
password:
type: string
title: Password
description: The initial password that will be required to logon to the machine. Configured to
reset on first login.
encrypted: true
writeOnly: true
ssh_public_key:
type: string
title: SSH public key
maxLength: 256
Boolean
public_ip:
type: boolean
title: Assign public IP address
description: Choose whether your machine should be internet facing.
default: false
leaseDate:
type: string
title: Lease Date
format: date-time
Resource flag settings aren't part of the resource object properties schema. For a given resource,
you add the flag settings outside of the properties section as shown.
resources:
Cloud_Machine_1:
type: Cloud.Machine
preventDelete: true
properties:
image: coreos
flavor: small
attachedDisks:
- source: '${resource.Cloud_Volume_1.id}'
Cloud_Volume_1:
type: Cloud.Volume
properties:
capacityGb: 1
forceRecreate Not all update actions require that the existing resource
be removed and a new one be created. If you want an
update to remove the old resource and create a new one,
independent of whether the update would have done so
by default, set this flag to true.
Important Solid or dashed arrows only indicate a dependency, not a connection. To connect
resources so that they communicate, see How to connect cloud template resources in vRealize
Automation Cloud Assembly.
An explicit dependency sets the build order at deployment time, or for scale in or scale out
actions. You can add an explicit dependency using the graphical design canvas or the code
editor.
n Design canvas option—draw a connection starting at the dependent resource and ending at
the resource to be deployed first.
n Code editor option—add a dependsOn property to the dependent resource, and identify the
resource to be deployed first.
Also called a property binding, an implicit dependency controls build order by waiting until the
needed property is available before deploying the dependent resource. You add an implicit
dependency using the code editor.
n Edit the dependent resource, adding a property that identifies the resource and property that
must exist first.
The examples are pruned to show only the important lines. The entire, unedited cloud template
appears at the end.
Examples
At deployment time, allow the user to paste in the encrypted key needed for remote access:
inputs:
sshKey:
type: string
maxLength: 500
resources:
frontend:
type: Cloud.Machine
properties:
remoteAccess:
authentication: publicPrivateKey
sshKey: '${input.sshKey}'
For deploying to VMware Cloud on AWS, set the folder name to the required name of Workload:
inputs:
environment:
type: string
enum:
- AWS
- vSphere
- Azure
- VMC
- GCP
default: vSphere
resources:
frontend:
type: Cloud.Machine
properties:
folderName: '${input.environment == "VMC" ? "Workload" : ""}'
At deployment time, tag the machine with an all-lowercase env tag that matches the selected
environment:
inputs:
environment:
type: string
enum:
- AWS
- vSphere
- Azure
- VMC
- GCP
default: vSphere
resources:
frontend:
type: Cloud.Machine
properties:
constraints:
- tag: '${"env:" + to_lower(input.environment)}'
Set the number of machines in the front-end cluster to one (small) or two (large). Note that the
large cluster is set by process of elimination:
inputs:
envsize:
type: string
enum:
- Small
- Large
resources:
frontend:
type: Cloud.Machine
properties:
count: '${input.envsize == "Small" ? 1 : 2}'
Attach machines to the same Default network by binding to the property found in the network
resource:
resources:
frontend:
type: Cloud.Machine
properties:
networks:
- network: '${resource.Cloud_Network_1.name}'
apitier:
type: Cloud.Machine
properties:
networks:
- network: '${resource.Cloud_Network_1.name}'
Cloud_Network_1:
type: Cloud.Network
properties:
name: Default
networkType: existing
resources:
apitier:
type: Cloud.Machine
properties:
cloudConfig: |
#cloud-config
runcmd:
- export apikey=${base64_encode(input.username:input.password)}
- curl -i -H 'Accept:application/json' -H 'Authorization:Basic :$apikey' http://example.com
resources:
frontend:
type: Cloud.Machine
properties:
cloudConfig: |
runcmd:
- echo ${resource.apitier.networks[0].address}
apitier:
type: Cloud.Machine
properties:
networks:
- network: '${resource.Cloud_Network_1.name}'
frontend:
type: Cloud.Machine
properties:
folderName: '${input.environment == "VMC" ? "Workload" : ""}'
image: ubuntu
flavor: medium
count: '${input.envsize == "Small" ? 1 : 2}'
remoteAccess:
authentication: publicPrivateKey
sshKey: '${input.sshKey}'
cloudConfig: |
packages:
- nginx
runcmd:
- echo ${resource.apitier.networks[0].address}
constraints:
- tag: '${"env:" + to_lower(input.environment)}'
networks:
- network: '${resource.Cloud_Network_1.name}'
apitier:
type: Cloud.Machine
properties:
folderName: '${input.environment == "VMC" ? "Workload" : ""}'
image: ubuntu
flavor: small
cloudConfig: |
#cloud-config
runcmd:
- export apikey=${base64_encode(input.username:input.password)}
- curl -i -H 'Accept:application/json' -H 'Authorization:Basic :$apikey' http://example.com
remoteAccess:
authentication: publicPrivateKey
sshKey: '${input.sshKey}'
constraints:
- tag: '${"env:" + to_lower(input.environment)}'
networks:
- network: '${resource.Cloud_Network_1.name}'
Cloud_Network_1:
type: Cloud.Network
properties:
name: Default
networkType: existing
constraints:
- tag: '${"env:" + to_lower(input.environment)}'
The syntax is only partly represented in the examples shown in How to use expressions to make
cloud template code more versatile in vRealize Automation Cloud Assembly.
Literals
The following literals are supported:
n Integer
n Floating point
n String
\ is escaped as \\
Quotes only need to be escaped inside a string enclosed with the same type of quote, as
shown in the following example.
n Null
Environment variables
Environment names:
n orgId
n projectId
n projectName
n deploymentId
n deploymentName
n blueprintId
n blueprintVersion
n blueprintName
n requestedBy (user)
n requestedAt (time)
Syntax:
env.ENV_NAME
Example:
${env.blueprintId}
Resource variables
Resource variables let you bind to resource properties from other resources.
Syntax:
resource.RESOURCE_NAME.PROPERTY_NAME
Examples:
n ${resource.db.id}
n ${resource.db.networks[0].address}
n ${resource.app.id} (Return the string for non-clustered resources, where count isn't specified.
Return the array for clustered resources.)
Syntax:
self.property_name
Example:
Conditions
Syntax:
Examples:
count.index
Examples:
inputs:
disks:
type: array
minItems: 0
maxItems: 12
items:
type: object
properties:
size:
type: integer
title: Size (GB)
minSize: 1
maxSize: 2048
resources:
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
allocatePerInstance: true
properties:
capacityGb: '${input.disks[count.index].size}'
count: '${length(input.disks)}'
n For more examples, see How vRealize Automation Cloud Assembly creates machine and disk
clusters.
Arithmetic operators
Syntax:
Example:
${(input.count + 5) * 2}
String concatenation
Syntax:
Operators [ ] and .
The expression follows ECMAScript in unifying the treatment of the [ ] and . operators.
Example:
${resource.app.networks[0].address}
In addition, when a property includes a space, delimit with square brackets and double quotes
instead of using dot notation.
Incorrect:
input.operating system
Correct:
input["operating system"]
Construction of map
Syntax:
${{'key1':'value1', 'key2':input.key2}}
Construction of array
Syntax:
${['key1','key2']}
Example:
${[1,2,3]}
Functions
Syntax:
${function(arguments...)}
Example:
${to_lower(resource.app.name)}
Function Description
ceil(number) Returns the smallest (closest to negative infinity) value that is greater than or equal to
the argument and is equal to a mathematical integer
digest(value, type) Return digest of value using supported type (md5, sha1, sha256, sha384, sha512)
Function Description
filter_by(array, filter) Return only the array entries that pass the filter operation
filter_by([1,2,3,4], x => x >= 2 && x <= 3)
returns [2, 3]
filter_by({'key1':1, 'key2':2}, (k,v) => v != 1)
returns [{"key2": 2}]
floor(number) Returns the largest (closest to positive infinity) value that is less than or equal to the
argument and is equal to a mathematical integer
format(format, values...) Return a formatted string using Java Class Formatter format and values.
join(array, delim) Join array of strings with a delimiter and return a string
json_path(value, path) Evaluate path against value using XPath for JSON.
map_to_object(array, Return an array of key:value pairs of the specified key name paired with values from
keyname) another array
map_to_object(resource.Disk[*].id, "source")
returns an array of key:value pairs that has a key field called source paired with disk ID
strings
Note that
map_by(resource.Disk[*].id, id => {'source':id})
returns the same result
Function Description
range(start, stop) Return a series of numbers in increments of 1 that begins with the start number and ends
just before the stop number
replace(string, target, Replace string containing target string with target string
replacement)
slice(array, begin, end) Return slice of array from begin index to end index
split(string, delim) Split string with a delimiter and return array of strings
substring(string, begin, Return substring of string from begin index until end index
end)
Secure access keys and credentials are typical examples of secret properties. Once created and
saved, a secret property value can never be unencrypted or read.
4 Enter a unique property name for the secret, without spaces or special characters.
When typing, the value is obscured by default, which protects it if the screen is shared.
If needed, you can click the eye symbol to reveal and verify a value. After it is saved though,
a secret value becomes encrypted in the database and can never be re-exposed.
7 Click Create.
Note that starting to type the '${secret. characters reveals a selection list of secrets that have
been created for the project.
type: Cloud.Machine
properties:
name: ourvm
image: mint20
flavor: small
remoteAccess:
authentication: publicPrivateKey
sshKey: '${secret.ourPublicKey}'
username: root
To add a secret property to a Terraform configuration, see How to use a secret vRealize
Automation Cloud Assembly property in a Terraform configuration.
For remote access, you can configure one of the following authentication options.
Note In cases where keys need to be copied, you might also create a cloudConfig section
in the cloud template, to automatically copy the keys upon provisioning. The specifics aren't
documented here, but How to automatically initialize a machine in a vRealize Automation Cloud
Assembly template provides general information about cloudConfig.
The username is optional. If you omit it, the system generates a random ID as the username.
Example:
type: Cloud.Machine
properties:
name: our-vm2
image: Linux18
flavor: small
remoteAccess:
authentication: generatedPublicPrivatekey
username: testuser
2 In vRealize Automation Cloud Assembly, provision the machine from its cloud template, and
bring it to a started-up state.
3 Locate the key name in the Deployments > Deployments > Topology properties.
4 Use the cloud provider interface, such as the vSphere client, to access the provisioned
machine command line.
6 Go to the vRealize Automation Cloud Assembly deployment, select the machine, and click
Actions > Get Private Key.
If you need it, here's some background on generating key pairs in Linux and Windows.
The sshKey includes the long alphanumeric found within the public key file key-name.pub.
The username is optional and gets created for you to log in with. If you omit it, the system
generates a random ID as the username.
Example:
type: Cloud.Machine
properties:
name: our-vm1
image: Linux18
flavor: small
remoteAccess:
authentication: publicPrivateKey
sshKey: ssh-rsa Iq+5aQgBP3ZNT4o1baP5Ii+dstIcowRRkyobbfpA1mj9tslf
qGxvU66PX9IeZax5hZvNWFgjw6ag+ZlzndOLhVdVoW49f274/mIRild7UUW...
username: testuser
3 In vRealize Automation Cloud Assembly, provision the machine from its cloud template, and
bring it to a started-up state.
5 Add the public key file to the home folder on the machine. Use the key that you specified in
remoteAccess.sshKey.
6 Verify that the private key file counterpart is present on your local machine.
Be aware that AWS key pairs are region specific. If you provision workloads into us-east-1, the
key pair must exist in us-east-1.
Use the following code as a guideline. This option works for AWS cloud zones only.
type: Cloud.Machine
properties:
image: Ubuntu
flavor: small
remoteAccess:
authentication: keyPairName
keyPair: cas-test
constraints:
- tag: 'cloud:aws'
Although it is less secure, logging in remotely with a username and password might be all that
your situation requires. Be aware that some cloud vendors or configurations might not support
this less secure option.
Set the username and password to the account that you expect to log in with.
Example:
type: Cloud.Machine
properties:
name: our-vm3
image: Linux18
flavor: small
remoteAccess:
authentication: usernamePassword
username: testuser
password: admin123
2 In vRealize Automation Cloud Assembly, provision the machine from its cloud template, and
bring it to a started-up state.
5 From your local machine, open a remote session to the provisioned machine IP address or
FQDN, and log in with the username and password as usual.
You can quickly add a property group to different vRealize Automation Cloud Assembly designs,
which saves the time of adding the same multiple properties one by one. In addition, you
have a single place to maintain or modify the set of properties, which ensures their consistent
application.
Only users with the vRealize Automation Cloud Assembly Administrator role may create, update,
or delete a property group. The administrator can share a property group with an entire
organization or limit its use to only within a project.
Caution A property group might be included in many cloud templates, including ones that are
already released to the catalog. Changes to a property group can affect other users.
n How to create and use an input property group in vRealize Automation Cloud Assembly
Input property groups gather and apply a consistent set of properties at user request time.
Input property groups can include entries for the user to add or select, or they might include
read-only values that are needed by the design.
Properties for the user to edit or select can be readable or encrypted. Read-only properties
appear on the request form but can't be edited. If you want read-only values to remain totally
hidden, use a constant property group instead.
n How to create and use a constant property group in vRealize Automation Cloud Assembly
Constant property groups silently apply known properties. In effect, constant property
groups are invisible metadata. They provide values to your vRealize Automation Cloud
Assembly designs in a way that prevents a requesting user from reading those values or
even knowing that they're present. Examples might include license keys or domain account
credentials.
The two property group types are handled very differently by vRealize Automation Cloud
Assembly. When you create a property group, you must first select whether to create inputs
or constants. You can't create a blended property group nor convert an existing set of properties
and their property group from one type to the other.
How to create and use an input property group in vRealize Automation Cloud
Assembly
vRealize Automation Cloud Assembly input property groups usually include related settings for
the user to enter or select. They might also include read-only values needed by the cloud
template design.
Display Name Add a heading for the entire group of properties, which
appears on the request form.
The panel for adding a new property is very similar to the Inputs tab of the vRealize
Automation Cloud Assembly design page code editor.
Default Value Preset value entry that appears in the request form.
In the following example, the property being added represents the operating system image,
and the requesting user can select from two.
Note The operating systems shown in the example figure must already be part of the
configured vRealize Automation Cloud Assembly infrastructure.
5 Add more properties to the group, and click Save when finished.
1 In the cloud template design page, above the editing area on the right, click the Inputs tab.
Display Name Enter the same heading that you created earlier for
the entire group of properties, which appears on the
request form.
Property groups list Select the property group that you want. Only property
groups that are created and available for your project
appear. Note that constant property groups don't
appear.
4 Click Create.
The process creates cloud template inputs code similar to the following example.
inputs:
pgmachine:
type: object
title: Machine Properties
$ref: /ref/property-groups/machine
pgrequester:
type: object
title: Requester Details
$ref: /ref/property-groups/requesterDetails
You may also enter code directly into the vRealize Automation Cloud Assembly design page, and
take advantage of the automatic prompting as you type $ref: /ref/p... in the code editor.
Depending on what kind of values are in a property group, you might want to reference them
individually. You can enter them separately, by property group name and property name.
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
image: '${input.pgmachine.image}'
flavor: '${input.pgmachine.flavor}'
You can also quickly add an entire set of values to a resource by referencing an entire property
group.
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
requester: '${input.pgrequester}'
Completed code
When you're finished with the inputs and resources, the finished code looks similar to the
following example.
Upon deployment request, your property groups appear for the requesting user to complete.
Property groups in the vRealize Automation Service Broker custom form editor
Input property groups appear within the vRealize Automation Service Broker custom form
interface and are available for customization there. There are no special considerations unique to
property groups when customizing them. vRealize Automation Service Broker users don't even
need to know that the source of the entries is a property group instead of separately created
properties.
See Customize a Service Broker icon and request form for more information.
1 In the instance of vRealize Orchestrator that is embedded with vRealize Automation, create
an action that does what you want.
The vRealize Orchestrator action must only include primitive string, integer, number, and
boolean types. vRealize Orchestrator types are not supported.
In this simple example, the vRealize Orchestrator action collects three inputs and returns a
hard-coded string.
2 In vRealize Automation Cloud Assembly, start the process of creating or editing an input
property group. See How to create and use an input property group in vRealize Automation
Cloud Assembly if necessary.
3 To add the vRealize Orchestrator action inputs to a property group, add new properties, click
the type, and click Constant.
4 After adding the inputs, add a new property, click the type, click External source, and click
Select.
5 In Action, search for and select the vRealize Orchestrator action that you created, and click
Save.
6 Save the property group, and add it to your cloud template. See How to create and use an
input property group in vRealize Automation Cloud Assembly if necessary.
When deploying the cloud template, the vRealize Orchestrator action property group
appears in the input form for the requesting user.
Configurable defaults
To populate the input form with default values, do one of the following when adding the vRealize
Orchestrator action as the external source.
Select the Bind option, and select a property from the drop-down list.
1 In vRealize Orchestrator, create an action that maps the values that you want for the list.
2 In vRealize Automation Cloud Assembly, when adding a property to the group, expand More
Options.
3 For Pairs, click External source, click Select, and add the vRealize Orchestrator action that
you created.
Note If you also create a default value when adding the property, that default must exactly
match one of the enumerated values from the vRealize Orchestrator action.
How to create and use a constant property group in vRealize Automation Cloud
Assembly
vRealize Automation Cloud Assembly constants allow you to silently apply known key-value pairs
to your designs.
The propgroup binding is only used with constant property groups, not input property groups.
Secret properties
If you expect to add an secret property to a property group, create the secret property before
proceeding. See How to create and reference a secret vRealize Automation Cloud Assembly
property.
7 Enter the constant value that you want, and click Create.
n For a secret string value, select from the list of secret properties for the project.
n For the object or array type, replace null with the value that you want.
8 Add more constants to the group, and click Save when finished.
You can quickly add an entire set of constants to a resource by referencing the property group
itself.
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
payerInfo: '${propgroup.payerDetails}'
Alternatively, you can add individual constants from the property group to selected parts of your
design.
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
payerAccount: '${propgroup.payerDetails.payerAccountNumber}'
payerCost: '${propgroup.payerDetails.payerCostCenter}'
payerFed: '${propgroup.payerDetails.payerFederal}'
The property group list and property group editing pages show the number of cloud templates
that include the property group. To see which cloud template would be affected by a change,
click the number.
Before modifying a property group, make sure that the change is acceptable to everyone who is
creating or updating deployments based on the cloud templates listed.
You cannot delete a property group until you manually remove it from all of the cloud templates
in which it is included. To remove a property group from a cloud template, open the cloud
template in the design canvas.
Under the Inputs tab, select and remove the property group. Alternatively, use the code
editor to delete the associated property group in the inputs section of the code.
Use the code editor to delete the associated propgroup entry or entries in the resources
section of the code.
The ability to use different SCSI controllers is important for performance and is required for some
deployment types, such as Oracle Real Application Clusters (RAC).
SCSIController
unitNumber
You also have the option to omit the properties, in which case assignment follows a predictable
default. vRealize Automation Cloud Assembly no longer deploys SCSI disks in random order,
which made them difficult to manage.
SCSI controllers and disks are numbered in order, with zero being first. Each SCSI controller can
support SCSI disks of unit numbers 0–15.
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
cpuCount: 1
totalMemoryMB: 1024
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
- source: '${resource.Cloud_vSphere_Disk_2.id}'
- source: '${resource.Cloud_vSphere_Disk_3.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
SCSIController: SCSI_Controller_2
unitNumber: 0
Cloud_vSphere_Disk_2:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
SCSIController: SCSI_Controller_2
unitNumber: 1
Cloud_vSphere_Disk_3:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
SCSIController: SCSI_Controller_3
unitNumber: 4
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
cpuCount: 1
totalMemoryMB: 1024
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
- source: '${resource.Cloud_vSphere_Disk_2.id}'
- source: '${resource.Cloud_vSphere_Disk_3.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
SCSIController: SCSI_Controller_0
Cloud_vSphere_Disk_2:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
SCSIController: SCSI_Controller_0
Cloud_vSphere_Disk_3:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
SCSIController: SCSI_Controller_1
resources:
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
image: centos
cpuCount: 1
totalMemoryMB: 1024
attachedDisks:
- source: '${resource.Cloud_vSphere_Disk_1.id}'
- source: '${resource.Cloud_vSphere_Disk_2.id}'
- source: '${resource.Cloud_vSphere_Disk_3.id}'
Cloud_vSphere_Disk_1:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
Cloud_vSphere_Disk_2:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
Cloud_vSphere_Disk_3:
type: Cloud.vSphere.Disk
properties:
capacityGb: 1
inputs:
diskProperties:
type: array
minItems: 1
maxItems: 10
items:
type: object
properties:
size:
type: integer
SCSIController:
type: string
title: SCSI Controller
enum:
- SCSI_Controller_0
- SCSI_Controller_1
- SCSI_Controller_2
- SCSI_Controller_3
unitNumber:
type: integer
title: Unit Number
resources:
app:
type: Cloud.vSphere.Machine
allocatePerInstance: true
properties:
flavor: small
image: centos
attachedDisks: '${map_to_object(slice(resource.disk[*].id, 0, 4), ''source'')}'
disk:
type: Cloud.vSphere.Disk
allocatePerInstance: true
properties:
capacityGb: '${input.diskProperties[count.index].size}'
SCSIController: '${input.diskProperties[count.index].SCSIController}'
unitNumber: '${input.diskProperties[count.index].unitNumber}'
count: 4
You can specify the number of cores per virtual socket or the total number of sockets. For
example, your licensing terms might restrict software that is licensed per socket or available
operating systems might only recognize a certain number of sockets so that additional CPUs
must be provisioned as additional cores.
Add the coreCount property to a cloud template in the vSphere machine resource.
The coreCount value must be less than or equal to the CPU count (cpuCount) value specified in
the flavor mapping or in the vSphere machine resource code in the cloud template. For related
information, see Setting the number of cores per CPU in a virtual machine (1010184).
The coreCount property is optional and available only for vSphere machine resources.
Cloud_vSphere_Machine_1:
type: Cloud.vSphere.Machine
properties:
cpuCount: 8
coreCount: 4
Additional information about sockets and cores per socket settings is available in blog article
Virtual Machine vCPU and vNUMA Rightsizing – Guidelines.
Some features described here expand the design capabilities of vRealize Automation Cloud
Assembly while others apply directly to cloud template coding practices.
${project.name}-${resource.siteCode}-${resource.costCenter}-${endpoint.name}-${######}
The identifier, provided in the template as ${######}, shows a six digit identifier. The identifier
is a counter that ensures uniqueness. The counter is global for the organization and increments
across all projects, not only the current project. When you have multiple projects, do not expect
a sequence from 000123 to 000124 for deployments in you current project. You can expect an
increment from 000123 to 000127.
All resource names must be unique. Use the incremental number property to ensure uniqueness.
The numbers increment for all deployments, including those that are named by vRealize
Automation Cloud Assembly. As your system becomes more robust, and because the custom
naming is applied to many resources, including virtual machines, load balancers, security groups,
NATs, gateways, resource groups, and disks, the numbering might appear random, but the
values still ensure uniqueness. The numbers also increment when you run a test deployment.
In addition to the examples provided here, you can also add the user name, the image that
is used, other built-in options, and simple strings. As you build the template, hints regarding
possible options are provided.
Remember that some of the values you see are only use case examples. You won't be able
to use them letter-by-letter in your environment. Think about where you would make your
own substitutions, or extrapolate from the example values, in order to fit your own cloud
infrastructure and deployment management needs.
Prerequisites
n Verify that you know the naming convention that you want to use for deployments from a
project.
n This procedure assumes you have or can create a simple cloud template that you use to test
your custom host prefix naming.
Procedure
3 On the Provisioning tab, locate the Custom Properties section and create the properties for
the site code and cost center values.
This is where you replace the values you see here with ones pertinent to your environment.
a Create a custom property with the name siteCode and the value BGL.
b Add another custom property with the name costCenter and the value IT-research.
4 Locate the Custom Naming section and add the following template.
${project.name}-${resource.siteCode}-${resource.costCenter}-${endpoint.name}-${######}
You can copy in the string, but if this is your first naming template, consider using the hint
text and quick select as you build the template.
5 Deploy a cloud template associated with the project to verify that the custom name is applied
to the resource.
a Click the Design tab, and then click a cloud template associated with the project.
d On the Topology tab, notice that your custom name is the resource name in the right
pane.
6 If you deployed a test cloud template to verify the naming convention, you can delete the
deployment.
What to do next
To deploy clusters of machines and disks, take advantage of the allocatePerInstance How
vRealize Automation Cloud Assembly resource flags can customize a request, and count.index
and map_to_object Cloud template expression syntax in vRealize Automation Cloud Assembly in
your cloud templates.
The following cloud template code examples can serve as guidelines for designs that deploy
clusters.
Cloud_Machine_1:
type: Cloud.Machine
allocatePerInstance: true
properties:
image: ubuntu
flavor: small
count: ${input.count}
attachedDisks: '${map_to_object(slice(resource.disk[*].id, 2*count.index, 2*(count.index + 1)),
"source")}'
disk:
type: Cloud.Volume
allocatePerInstance: true
properties:
count: ${2*input.count}
capacityGb: 5
n Commands—a cloudConfig section in your cloud template code holds the commands that you
want to run.
For an example of how commands and customization specifications interact, see vSphere static
IP address assignment in vRealize Automation Cloud Assembly cloud templates.
Edit the cloud template code directly. The following example points to a cloud-assembly-linux
customization specification for a WordPress host on vSphere.
resources:
WebTier:
type: Cloud.vSphere.Machine
properties:
name: wordpress
cpuCount: 2
totalMemoryMB: 1024
imageRef: 'Template: ubuntu-18.04'
customizationSpec: 'cloud-assembly-linux'
resourceGroupName: '/Datacenters/Datacenter/vm/deployments'
For more about cloudConfig sections in cloud templates, see Configuration commands in vRealize
Automation Cloud Assembly templates.
For an example of how commands and customization specifications interact, see vSphere static
IP address assignment in vRealize Automation Cloud Assembly cloud templates.
Linux cloud-init and Windows Cloudbase-init don't share the same syntax. A cloudConfig section
for one operating system won't work in a machine image of the other operating system.
n Setting a hostname
n Installing packages
You might have an image map and a cloud template where both contain initialization commands.
At deployment time, the commands merge, and vRealize Automation Cloud Assembly runs the
consolidated commands.
When the same command appears in both places but includes different parameters, only the
image map command is run.
See Learn more about image mappings in vRealize Automation for additional details.
Note To ensure correct interpretation of commands, always include the pipe character
cloudConfig: | as shown.
cloudConfig: |
#cloud-config
repo_update: true
repo_upgrade: all
packages:
- apache2
- php
- php-mysql
- libapache2-mod-php
- php-mcrypt
- mysql-client
runcmd:
- mkdir -p /var/www/html/mywordpresssite && cd /var/www/html && wget https://wordpress.org/
latest.tar.gz && tar -xzf /var/www/html/latest.tar.gz -C /var/www/html/mywordpresssite --strip-
components 1
- i=0; while [ $i -le 5 ]; do mysql --connect-timeout=3 -h ${DBTier.networks[0].address} -u
root -pmysqlpassword -e "SHOW STATUS;" && break || sleep 15; i=$((i+1)); done
- mysql -u root -pmysqlpassword -h ${DBTier.networks[0].address} -e "create database
wordpress_blog;"
- mv /var/www/html/mywordpresssite/wp-config-sample.php /var/www/html/mywordpresssite/wp-
config.php
- sed -i -e s/"define( 'DB_NAME', 'database_name_here' );"/"define( 'DB_NAME',
'wordpress_blog' );"/ /var/www/html/mywordpresssite/wp-config.php && sed -i
-e s/"define( 'DB_USER', 'username_here' );"/"define( 'DB_USER', 'root' );"/ /var/www/html/
mywordpresssite/wp-config.php && sed -i -e s/"define( 'DB_PASSWORD',
'password_here' );"/"define( 'DB_PASSWORD', 'mysqlpassword' );"/ /var/www/html/mywordpresssite/wp-
config.php && sed -i -e s/"define( 'DB_HOST', 'localhost' );"/"define( 'DB_HOST', '$
{DBTier.networks[0].address}' );"/ /var/www/html/mywordpresssite/wp-config.php
- service apache2 reload
If a cloud-init script behaves unexpectedly, check the captured console output in /var/log/
cloud-init-output.log when troubleshooting. For more about cloud-init, see the cloud-init
documentation.
For an example of how commands and customization specifications interact, see vSphere static
IP address assignment in vRealize Automation Cloud Assembly cloud templates.
Sample designs
The following designs safely apply a static IP address without any conflict between cloud
template initialization commands and customization specifications. All contain the assignment:
static network setting.
CentOS sample
resources:
wpnet:
type: Cloud.Network
properties:
- ${resource.DBTier.networks[0].address}/$
{resource.wpnet.prefixLength}
gateway4: ${resource.wpnet.gateway}
nameservers:
search: $
{resource.wpnet.dnsSearchDomains}
addresses: ${resource.wpnet.dns}
runcmd:
- netplan apply
- hostnamectl set-hostname --pretty $
{self.resourceName}
- touch /etc/cloud/cloud-init.disabled
networks:
- name: '${wpnet.name}'
assignment: static
network: '${resource.wpnet.id}'
CentOS sample
resources:
wpnet:
type: Cloud.Network
properties:
name: wpnet
networkType: public
constraints:
- tag: sqa
DBTier:
type: Cloud.vSphere.Machine
properties:
flavor: small
image: centos-template
customizeGuestOs: false
cloudConfig: |
- ${resource.DBTier.networks[0].address}/$
{resource.wpnet.prefixLength}
gateway4: ${resource.wpnet.gateway}
nameservers:
search: $
{resource.wpnet.dnsSearchDomains}
addresses: ${resource.wpnet.dns}
runcmd:
- netplan apply
- hostnamectl set-hostname --pretty $
{self.resourceName}
- touch /etc/cloud/cloud-init.disabled
networks:
- name: '${wpnet.name}'
assignment: static
network: '${resource.wpnet.id}'
Neither initialization commands nor customization spec are present to configure network
settings.
n The cloud-init code doesn't contain network assignment commands, and the ovfProperties
property is set.
Initialization commands aren't present, but ovfProperties blocked the customization spec.
n The cloud-init code contains network assignment commands, and the customizeGuestOs
property is missing or set to true.
For example, deploying a machine that is still installing packages and starting a web server might
lead to conditions where a fast user tries to reach the application before it's available.
n The feature uses the cloud-init phone_home module and is available when deploying Linux
machines.
n Phone home can affect deployment order like an explicit dependency, but has more flexibility
around timing and processing options.
See How to set the resource deployment sequence in vRealize Automation Cloud Assembly.
n Your creativity is a factor. Initialization commands might include embedded wait time
between operations, which can be used in concert with phone home.
n Cloud template-based phone home won't work if the machine template already contains
phone_home module settings.
n The machine must have outbound communication access back to vRealize Automation Cloud
Assembly.
To wait for machine initialization by using phone home in vRealize Automation Cloud Assembly,
add a cloudConfigSettings section to the cloud template:
cloudConfigSettings:
phoneHomeShouldWait: true
phoneHomeTimeoutSeconds: 600
phoneHomeFailOnTimeout: true
Property Description
The image creation process varies depending on cloud vendor. The example shown here is for
vSphere.
3 Download Cloudbase-Init.
https://cloudbase.it/cloudbase-init/#download
During installation, enter Administrator as the username, and select the option to run as
LocalSystem.
5 Allow the installation to run, but do not close the final Completed page of the setup wizard.
6 With the Completed page of the setup wizard still open, use Windows to navigate to the
Cloudbase-Init installation path, and open the following file in a text editor.
conf\cloudbase-init-unattend.conf
metadata_services=cloudbaseinit.metadata.services.ovfservice.OvfService
conf\cloudbase-init.conf
first_logon_behaviour=always
. . .
metadata_services=cloudbaseinit.metadata.services.ovfservice.OvfService
. . .
plugins=cloudbaseinit.plugins.windows.createuser.CreateUserPlugin,cloudbaseinit.plugins.windows.se
tuserpassword.SetUserPasswordPlugin,cloudbaseinit.plugins.common.sshpublickeys.SetUserSSHPublicKey
sPlugin,cloudbaseinit.plugins.common.userdata.UserDataPlugin
. . .
12 On the Completed page of the setup wizard, select the options to run Sysprep and to shut
down after Sysprep, then click Finish.
Note VMware has seen cases where running Sysprep prevents deployments of the image
from working.
13 After the virtual machine shuts down, use vSphere to turn it into a template.
Additional details
The following table expands upon the configuration entries made during setup.
Username, CreateUserPlugin, and SetUserPasswordPlugin After Sysprep, first boot uses CreateUserPlugin to
create the username Administrator account with a blank
password. SetUserPasswordPlugin allows Cloudbase-Init
to change the blank password to the remote access
password that will be included in the cloud template.
First Logon Behavior This setting prompts the user to change the password
upon first login.
The example shown here is based on vSphere, but other cloud vendors should be similar.
Prerequisites
n Create infrastructure. In vRealize Automation Cloud Assembly, add your vSphere cloud
account and an associated cloud zone.
n Add flavor and image mappings, and add network and storage profiles.
In your infrastructure, an image mapping must point to the Windows template you created to
support Cloudbase-Init. See How to create an initializable Windows image for vSphere .
If the template isn't listed, go to Cloud Accounts, and synchronize images. Otherwise,
automatic synchronization runs every 24 hours.
n Add a project, add users, and make sure the users can provision to your cloud zone.
For more about creating infrastructure and projects, see the examples in the Tutorial: Setting up
and testing multi-cloud infrastructure and deployments in vRealize Automation Cloud Assembly.
Procedure
1 In vRealize Automation Cloud Assembly, go to the Design tab, and create a new cloud
template.
2 Add a cloudConfig section with the Cloudbase-init commands that you want.
The following command examples create a new file at the Windows C: drive and set the host
name.
resources:
Cloud_Machine_1:
type: Cloud.Machine
properties:
image: cloudbase-init-win-2016
flavor: small
remoteAccess:
authentication: usernamePassword
username: Administrator
password: Password1234@$
cloudConfig: |
#cloud-config
write_files:
content: Cloudbase-Init test
path: C:\test.txt
set_hostname: testname
3 Add remoteAccess properties so that you configure the machine for initial login to Windows.
As mentioned when you created the template, the metadata service picks up the login
credentials and exposes them to CreateUserPlugin and SetUserPasswordPlugin. Note that
the password must meet Windows password requirements.
4 From vRealize Automation Cloud Assembly, test and deploy the cloud template.
5 After deploying, use Windows RDP and the credentials in the template to log in to the new
Windows machine and verify the customization.
In the example above, you would look for the C:\test.txt file, and check the system
properties for the host name.
Note SDK object types can be differentiated from other property types by the colon (":") used
to separate the plug-in name and the type name. For example, AD:UserGroup is an SDK object
type used to manage Active Directory user groups.
You can use the built-in workflows in vRealize Orchestrator, or you can create your own.
Using vRealize Orchestrator to create anything-as-a-service/XaaS workflows means that you can
create a cloud template that adds an Active Directory user to machines at deployment time, or
add a custom F5 load balancer to a deployment.
The resource type of a custom resource must begin with Custom. and each resource type must
be unique. For example, you might set Custom.ADUser as a resource type for a custom resource
that adds Active Directory users. Although the inclusion of Custom. is not validated in the text
box, the string is automatically added if you remove it.
External type
The external type property defines the type of your custom resource. When you select a
Create workflow in your custom resource in vRealize Automation Cloud Assembly, the external
type drop-down appears underneath it. The drop-down includes external type properties, that
are selected from the output parameters of the vRealize Orchestrator workflow. The selected
workflow output properties included in the drop-down must be non-array SDK object types such
as VC:VirtualMachine or AD:UserGroup.
Note When creating custom workflows that use the dynamic type plug-in, verify that their
variables are created by using the DynamicTypesManager.getObject() method.
When you define your custom resources, you also define the scope of the availability of the
select external type. The selected external type can be:
You can only have one external type per defined scope. For example, if you create a custom
resource in your project that uses VC:VirtualMachine as an external type, you cannot create
another custom resource for the same project that uses the same external type. You also cannot
create two shared custom resources that use the same external type.
n The Create workflow must have an output parameter that is an SDK object type, such as
SSH:Host or SQL:Database. If the selected workflow does not pass the validation, you cannot
add Update or Delete workflows, or save your changes to the custom resource.
n The Delete workflow must have an input parameter that is an SDK object type that matches
the external type of the custom resource.
n The Update workflow must have both an input and output parameter that is an SDK object
type that matches the external type of the custom resource.
For example, you can bind the value of an input parameter in your request form to an external
source, such as a vRealize Orchestrator action that retrieves a deployment name or project
name. You can also bind the value of a specific input parameter to the computed value of two
other text boxes included in the same request form.
Note This functionality is available for both custom resources and resource actions. You can
customize the value of the input properties of your request form from the Values tab of the
Request Parameters page of the custom resource or resource action editor.
Custom resources are vRealize Orchestrator objects that you manage through vRealize
Automation with the defined main resource operation workflows. The cloud template service
automatically call up the appropriate vRealize Orchestrator workflows when a create or delete
operation is triggered. You can extend the functionality of the resource type by also selecting
vRealize Orchestrator workflows that can be used as day 2 operations.
This use case uses built-in workflows that are provided in the vRealize Orchestrator library. It
includes prescriptive values or strings to demonstrate how to perform the process. You can
modify them to suit your environment.
For reference purposes, this use case uses a project named DevOpsTesting. You can replace this
sample project with any project in your environment.
Prerequisites
n Verify that you configured a vRealize Orchestrator integration. See Configure a vRealize
Orchestrator integration in Cloud Assembly.
n Verify that the workflows that you are using for the create, update, destroy, and day 2
actions exist in vRealize Orchestrator and run successfully from there.
n In vRealize Orchestrator, locate the resource type used by the workflows. The workflows
included in this custom resource must all use the same resource type. In this use case,
the resource type is AD:User. For more information on resource type validation, see How
to create custom resource types to use in vRealize Automation Cloud Assembly cloud
templates.
n By using the built-in Active Directory workflows in your vRealize Orchestrator integration,
configure an Active Directory server.
n Verify that you know how to configure and deploy a machine cloud template.
Procedure
This step adds the custom resource to the cloud template design canvas as a resources type.
a In vRealize Automation Cloud Assembly, select Design > Custom Resources, and click
New Custom Resource.
Remember, except for the workflow names, these are sample values.
Name AD user
This is the name that appears in the cloud template
resource type palette.
c To enable this resource type in the cloud template resource type list, verify that Activate
option is toggled on.
d Select the Scope setting that makes the resource type available to any project.
e Select the workflows that define the resource and the day 2 actions.
Note The selected day 2 workflows must have an input parameter that is of the same
type as the external type. The external type input is not displayed in the day 2 custom
form requested by the user, as it is automatically bound to the custom resource.
f Review the schema key and type values in the Properties tab so that you understand the
workflow inputs so that you can configure the inputs in the cloud template.
The schema lists the required and optional input values defined in the workflow. The
required input values are included in the cloud template YAML.
In the Create a user workflow, accountName, displayName, and ouContainer are required
input values. The other schema properties are not required. You can also use the schema
to determine where you want to create bindings to other field values, workflows, or
actions. Bindings are not included in this use case.
2 Create a cloud template that adds the user to a machine when you deploy it.
a Select Design > Cloud Templates, and click New from > Blank canvas.
e From the custom resource list on the left of the cloud template design page, drag the AD
user resource type onto the canvas.
Note You can select the custom resource by either scrolling down and selecting it from
the left pane, or searching for it in the Search Resource Types text box. If the custom
resource does not appear, click the refresh button next to the Search Resource Types
text box.
f On the right, edit the YAML code to add the mandatory input values and the password.
Add an inputs section in the code so that users can provide the name of the users that
they are adding. In the following example, some of these values are sample data. Your
values might be different.
inputs:
accountName:
type: string
title: Account name
encrypted: true
displayName:
type: string
title: Display name
password:
type: string
title: Password
encrypted: true
confirmPassword:
type: string
title: Password
encrypted: true
ouContainer:
type: object
title: AD OU container
$data: 'vro/data/inventory/AD:OrganizationalUnit'
properties:
id:
type: string
type:
type: string
g In the resources section, add ${input.input-name} code to prompt for the user selection.
resources:
Custom_ADUser_1:
type: Custom.ADUser
properties:
accountName: '${input.accountName}'
displayName: '${input.displayName}'
ouContainer: '${input.ouContainer}'
password: '${input.password}'
confirmPassword: '${input.confirmPassword}'
e Click Deploy.
4 Monitor the provisioning process to ensure that the user is added to Active Directory.
b Monitor the status of the request and verify the successful deployment.
What to do next
When your tested cloud template is working, you can then begin using the AD user custom
resource with other cloud templates.
Custom resources are vRealize Orchestrator objects that you manage through vRealize
Automation with the defined main resource operation workflows. The cloud template service
automatically call up the appropriate vRealize Orchestrator workflows when a create or delete
operation is triggered. You can extend the functionality of the resource type by also selecting
vRealize Orchestrator workflows that can be used as day 2 operations.
This use case uses built-in workflows provided in the vRealize Orchestrator library. It includes
prescriptive values or strings to demonstrate how to perform the process. You can modify them
to suit your environment.
For reference purposes, this use case uses a project named DevOpsTesting. You can replace the
project with one that you already have.
Prerequisites
n Verify that you configured a vRealize Orchestrator integration. See Configure a vRealize
Orchestrator integration in Cloud Assembly.
n Verify that the workflows that you are using for the create, update, destroy, and day 2
actions exist in vRealize Orchestrator and run successfully from there.
n In vRealize Orchestrator, locate the resource type used by the workflows. The workflows
included in this custom resource must all use the same resource type. In this use case,
the resource type is SSH:Host. For more information on resource type validation, see How
to create custom resource types to use in vRealize Automation Cloud Assembly cloud
templates.
n Verify that you know how to configure and deploy a machine cloud template.
Procedure
1 Create an SSH host custom resource for adding SSH to a cloud template.
This step adds the custom resource to the cloud template design canvas as a resource type.
a In vRealize Automation Cloud Assembly, select Design > Custom Resources, and click
New Custom Resource.
Remember, except for the workflow names, these are sample values.
Table 6-2.
c To enable this resource type in the cloud template resource type list, verify that Activate
option is toggled on.
d Select the Scope setting that makes the resource type available to the DevOpsTesting
project.
Setting Setting
f Review the schema key and type values in the Properties tab so that you understand the
workflow inputs so that you can configure the inputs in the cloud template.
The schema lists the required and optional input values defined in the workflow. The
required input values are included in the cloud template YAML.
In the Add SSH Host workflow, hostname, port, and username are required input values.
The other schema properties are not required. You can also use the schema to determine
where you want to create bindings to other field values, workflows, or actions. Bindings
are not included in this use case.
2 Create a cloud template that adds the SSH host when you deploy it.
a Select Design > Cloud Templates, and click New from > Blank canvas.
e From the custom resource list on the left of the cloud template design page, drag the
SSH Host - DevOpsTesting Project resource type onto the canvas.
Note You can select the custom resource by either scrolling down and selecting it from
the left pane, or searching for it in the Search Resource Types text box. If the custom
resource does not appear, click the refresh button next to the Search Resource Types
text box.
A reminder that the resource type is available because it was configured for the project.
If you were creating a cloud template for another project, you cannot see the resource
type.
f On the right, edit the YAML code to add the mandatory input values.
Add an inputs section in the code so that users can provide the user name and the host
name at deployment time. In this example, the port default is 22. In the following example,
some of these values are sample data. Your values might be different.
inputs:
hostname:
type: string
title: The hostname of the SSH Host
username:
type: string
title: Username
g In the resources section, add ${input.input-name} code to prompt for the user selection.
resources:
Custom_SSHHost_1:
type: Custom.SSHHost
properties:
port: 22
hostname: '${input.hostname}'
username: '${input.username}'
e Click Deploy.
4 Monitor the provisioning process to ensure that the SSH host is included in the deployment.
b Monitor the status of the request and verify the successful deployment.
What to do next
When your tested cloud template is working, you can then begin using the SSH Host custom
resource with other cloud templates.
Day 2 preparation can involve the vRealize Automation Cloud Assembly design interface or make
direct use of cloud template code, or both.
n You can add inputs to cloud template code. Then, any update action to a deployment or
deployed resource asks for fresh input values.
n You can use vRealize Automation Cloud Assembly to design a custom action based on
a vRealize Orchestrator workflow or action. Running the custom action results in vRealize
Orchestrator making changes to the deployment or deployed resource.
How to use cloud template inputs for vRealize Automation day 2 updates
When designing cloud templates, vRealize Automation input parameters allow day 2 users to
re-enter selections from the initial deployment request.
Caution Some property changes cause a resource to be re-created. For example, changing
the connection_string.name under a Cloud.Service.Azure.App.Service deletes the existing resource
and creates a new one.
When designing inputs to support day 2 changes, the schema Models hosted on
code.vmware.com help you locate the properties that delete and re-create resources.
For information on how to create inputs, see How user input can customize a cloud template in
vRealize Automation.
For example, you might deploy to a test network first, then move to a production network. The
technique described here lets you design a cloud template in advance to prepare for such day 2
actions. Note that the machine is moved. It isn't deleted and redeployed.
This procedure only applies to Cloud.vSphere.Machine resources. It won't work for cloud
agnostic machines deployed to vSphere.
Prerequisites
n The vRealize Automation Cloud Assembly network profile must include all subnets that the
machine will connect to. In vRealize Automation Cloud Assembly, you can check networks by
going to Infrastructure > Configure > Network Profiles.
The network profile must be in an account and region that are part of the appropriate
vRealize Automation Cloud Assembly project for your users.
n Tag the two subnets with different tags. The example that follows assumes that test and
prod are the tag names.
n The deployed machine must keep the same IP assignment type. It can't change from static to
DHCP, or vice versa, while moving to another network.
Procedure
1 In vRealize Automation Cloud Assembly, go to Design, and create a cloud template for the
deployment.
2 In the inputs section of the code, add an entry that lets the user select a network.
inputs:
net-tagging:
type: string
enum:
- test
- prod
title: Select a network
3 In the resources section of the code, add the Cloud.Network and connect the vSphere
machine to it.
4 Under the Cloud.Network, create a constraint that references the selection from the inputs.
resources:
ABCServer:
type: Cloud.vSphere.Machine
properties:
name: abc-server
. . .
networks:
- network: '${resource["ABCNet"].id}'
ABCNet:
type: Cloud.Network
properties:
name: abc-network
. . .
constraints:
- tag: '${input.net-tagging}'
5 Continue with your design, and deploy it as you normally would. At deployment, the interface
prompts you to select the test or prod network.
6 When you need to make a day 2 change, go to Deployments > Deployments, and locate the
deployment associated with the cloud template.
8 In the Update panel, the interface prompts you the same way, to select the test or prod
network.
9 To change networks, make your selection, click Next, and click Submit.
provide others. You can create custom resource actions and make them available to users as
day 2 actions.
This example of a custom day 2 resource action is meant to introduce you to the creation
process. To use resource actions effectively, you must be able to create vRealize Orchestrator
workflows and actions that run the tasks you need.
Prerequisites
n Verify that you configured a vRealize Orchestrator integration. See Configure a vRealize
Orchestrator integration in Cloud Assembly.
n Verify that the workflow that you are using for the day 2 action exists in vRealize
Orchestrator and runs successfully there.
Procedure
1 Create a custom resource action that uses vMotion to move a vSphere virtual machine from
one host to another.
a In vRealize Automation Cloud Assembly, select Design > Resource Actions, and click New
Resource Action.
Remember, except for the workflow names, these are sample values.
Name vSphere_VM_vMotion
This is the name that appears in the resource actions
list.
c Click the Activate option to enable this action in the day 2 actions menu for resources
that matches the resource type.
d Select the resource type and workflow that define the day 2 action.
2 Create a binding for the vRealize Orchestrator properties to the vRealize Automation Cloud
Assembly schema properties. vRealize Automation Cloud Assembly day 2 actions support
three types of bindings.
with binding action This option is available only for reference type inputs
such as:
n VC:VirtualMachine
n VC:Folder
The user selects an action that performs the binding.
The selected action must return the same type as the
input parameter. The correct property definition is $
{properties.someProperty}.
In this use case, the binding is a vRealize Orchestrator action that makes the connection
between vRealize Orchestrator VC:VirtualMachine input type used in the workflow and the
vRealize Automation Cloud Assembly Cloud.vSphere.Machine resource type. By setting up the
binding, you make the day 2 action seamless for the user requesting the vMotion action on a
vSphere VM machine. The system provides the name in the workflow so that the user does
not have to do it.
a After selecting the Migrate virtual machine with vMotion workflow, navigate to the
Property Binding pane.
d Click Save.
4 To account for the other input parameters in the workflow, you can customize the request
form that users see when they request the action.
Priority of the migration Label = Priority of the Value options Required = Yes
task task n Value source =
Constant
lowPriority|
Low,defaultPrior
ity|
Default,highPrio
rity|High
c Click Save.
5 To limit when the action is available, you can configure the conditions.
For example, you only want the vMotion action to be available when the machine has four or
fewer CPUs.
a Toggle on Requires condition.
${properties.cpuCount} lessThan 4
If you need complex conditions, see How to build advanced conditions for vRealize
Automation Cloud Assembly custom actions.
c Click Update.
6 Verify that the Move VM action is available for deployed machines that match the criteria.
a Select Deployments.
b Locate a deployment that includes a deployed machine that matches the defined criteria.
d Click actions in the right pane and verity that the Move VM action exists.
How to build advanced conditions for vRealize Automation Cloud Assembly custom actions
As an alternative to the simple conditions list in vRealize Automation Cloud Assembly, the
advanced editor lets you assemble more complex criteria expressions to control when the action
is available.
When creating a new resource action, select Requires condition and Use advanced editor. Then,
enter the criteria expression that you want.
The expression is a clause or list of clauses, each of which is in key-operator-value format. The
preceding figure shows criteria where the target must be powered on and present.
Clauses
and All subclauses need to be true for the Evaluate as true only when both
expression result to be true. properties.powerState is ON and syncStatus
is not MISSING.
matchExpression:
- and:
- key: properties.powerState
operator: eq
value: ON
- key: syncStatus
operator: notEq
value: MISSING
matchExpression:
- or:
- key: properties.powerState
operator: eq
value: ON
- key: properties.powerState
operator: eq
value: OFF
Operators
matchExpression:
- and:
- key: properties.powerState
operator: eq
value: ON
notEq Not equal. Avoid an exact match. Evaluate as true when properties.powerState
is not OFF.
matchExpression:
- and:
- key: properties.powerState
operator: notEq
value: OFF
hasAny Look for a match in a collection of objects. Evaluate as true when the storage.disks array
includes a 100 IOPS EBS object.
matchExpression:
- key: storage.disks
operator: hasAny
value:
matchExpression:
- and:
- key: iops
operator: eq
value: 100
- key: service
operator: eq
value: ebs
matchExpression:
- and:
- key: properties.powerState
operator: in
value: OFF, SUSPEND
matchExpression:
- and:
- key: properties.powerState
operator: notIn
value: OFF, SUSPEND
greaterThan Look for a match over a given threshold. Only Evaluate as true when the first object in the
applies to numeric values. storage.disks array has IOPS over 50.
matchExpression:
- and:
- key: storage.disks[0].iops
operator: greaterThan
value: 50
lessThan Look for a match under a given threshold. Evaluate as true when the first object in the
Only applies to numeric values. storage.disks array has IOPS under 200.
matchExpression:
- and:
- key: storage.disks[0].iops
operator: lessThan
value: 200
greaterThanEquals Look for a match at or above a given Evaluate as true when the first object in the
threshold. Only applies to numeric values. storage.disks array has IOPS of 100 or higher.
matchExpression:
- and:
- key: storage.disks[0].iops
operator: greaterThanEquals
value: 100
lessThanEquals Look for a match at or below a given Evaluate as true when the first object in the
threshold. Only applies to numeric values. storage.disks array has IOPS of 100 or lower.
matchExpression:
- and:
- key: storage.disks[0].iops
operator: lessThanEquals
value: 100
matchesRegex Use a regular expression to look for a match. Evaluate as true when the properties.zone is
us-east-1a or us-east-1c.
matchExpression:
- and:
- key: properties.zone
operator: matchesRegex
value: (us-east-1)+(a|c){1,2}
Examples
The following criteria expression evaluates as true when properties.tags includes a tag of key
key1 and value value1.
The outer expression uses hasAny because properties.tags is an array, and you want to evaluate
as true whenever key1=value1 appears in any of the key-value pairs in the array.
In the inner expression, there are two clauses, one for the key field and one for the value field.
The properties.tags array holds key-value tagging pairs, and you need to match both the key and
value fields.
matchExpression:
- key: properties.tags
operator: hasAny
value:
matchExpression:
- and:
- key: key
operator: eq
value: key1
- key: value
operator: eq
value: value1
The following criteria expression is similar to the previous example, but now evaluates as true
whenever properties.tags includes either a tag of key1=value1 or key2=value2.
matchExpression:
- or:
- key: properties.tags
operator: hasAny
value:
matchExpression:
- and:
- key: key
operator: eq
value: key1
- key: value
operator: eq
value: value1
- key: properties.tags
operator: hasAny
value:
matchExpression:
- and:
- key: key
operator: eq
value: key2
- key: value
operator: eq
value: value2
With vRealize Automation Cloud Assembly Extensibility, you can assign an extensibility action
or vRealize Orchestrator workflow to an event by using subscriptions. When the specified event
occurs, the subscription initiates the action or workflow to run, and all subscribers are notified.
Extensibility Actions
Extensibility actions are small, lightweight scripts of code used to specify an action and how that
action is to perform. You can import extensibility actions from pre-defined vRealize Automation
Cloud Assembly action templates or from a ZIP file. You can also use the action editor to create
custom scripts for your extensibility actions. When multiple action scripts are linked together
in one script, you create an action flow. By using action flows, you can create a sequence of
actions. For information on using action flows, see What is an action flow.
Note The following subscriptions are use case examples and do not cover all extensibility action
functionality.
Enterprise users commonly integrate their Cloud Management Platform with an IT Service
Management (ITSM) and Configuration Management Database (CMDB) platform for compliance.
Following this example, you can integrate vRealize Automation Cloud Assembly with ServiceNow
for CMDB and ITSM by using extensibility action scripts.
Note You can also integrate ServiceNow with vRealize Automation Cloud Assembly by
using vRealize Orchestrator workflows. For information about integrating ServiceNow by using
workflows, see How do I integrate Cloud Assembly for ITSM with ServiceNow using vRealize
Orchestrator workflows.
To create this integration, you use four extensibility action scripts. The first three scripts are
initiated in sequence during provisioning, at the compute provision post event. The fourth script
triggers at the compute removal post event.
For more information on event topics, refer to Event topics provided with vRealize Automation
Cloud Assembly.
Get VM Details
The Get VM details script acquires additional payload details required for CI creation and an
identity token that is stored in Amazon Web Services Systems Manager Parameter Store (SSM).
Also, this script updates customProperties with additional properties for later use.
The Create ServiceNow CMDB CI script passes the ServiceNow instance URL as an input and
stores the instance in SSM to meet security requirements. This script also reads the ServiceNow
CMDB unique record identifier response (sys_id). It passes it as an output and writes the custom
property serviceNowSysId during creation. This value is used to mark the CI as retired when the
instance is destroyed.
Note Additional permissions might need to be allocated to your vRealize Automation services
Amazon Web Services role to allow Lambda to access the SSM Parameter Store.
This script finishes the ITSM integration by passing the ServiceNow instance URL as an input and
storing the ServiceNow credentials as SSM to meet security requirements.
The retire ServiceNow CMDB CI script prompts the ServiceNow to stop and marks the CI as
retired based on the custom property serviceNowSysId that was created in the creation script.
Prerequisites
n Before configuring this integration, filter all event subscriptions with the conditional cloud
template property: event.data["customProperties"]["enable_servicenow"] === "true"
Note This property exists on cloud templates that require a ServiceNow integration.
Procedure
results = requests.post(url,json=payload,headers=headers)
deploymentId = inputs['deploymentId']
resourceId = inputs['resourceIds'][0]
#update customProperties
outputs = {}
outputs['customProperties'] = inputs['customProperties']
outputs['customProperties']['serviceNowCPUCount'] = int(json.loads(resultMachine.text)
["customProperties"]["cpuCount"])
outputs['customProperties']['serviceNowMemoryInMB'] = json.loads(resultMachine.text)
["customProperties"]["memoryInMB"]
return outputs
snowUser = client.get_parameter(Name="serviceNowUserName",WithDecryption=False)
snowPass = client.get_parameter(Name="serviceNowPassword",WithDecryption=True)
table_name = "cmdb_ci_vmware_instance"
url = "https://" + inputs['instanceUrl'] + "/api/now/table/{0}".format(table_name)
headers = {'Content-type': 'application/json', 'Accept': 'application/json'}
payload = {
'name': inputs['customProperties']['serviceNowHostname'],
'cpus': int(inputs['customProperties']['serviceNowCPUCount']),
'memory': inputs['customProperties']['serviceNowMemoryInMB'],
'correlation_id': inputs['deploymentId'],
'disks_size': int(inputs['customProperties']['provisionGB']),
'location': "Sydney",
'vcenter_uuid': inputs['customProperties']['vcUuid'],
'state': 'On',
'sys_created_by': inputs['__metadata']['userName'],
'owned_by': inputs['__metadata']['userName']
}
results = requests.post(
url,
json=payload,
headers=headers,
auth=(snowUser['Parameter']['Value'], snowPass['Parameter']['Value'])
)
print(results.text)
json=payload,
headers=headers,
auth=(snowUser['Parameter']['Value'], snowPass['Parameter']['Value'])
)
print(results.text)
Results
What to do next
When desired, you can retire your CI by using the CMDB configuration item retire action:
results = requests.put(
url,
json=payload,
headers=headers,
auth=(inputs['username'], inputs['password'])
)
print(results.text)
For more information on how you can use extensibility actions to integrate ServiceNow
in vRealize Automation Cloud Assembly, see Extending Cloud Assembly with Action Based
Extensibility for ServiceNow Integration.
As a cloud administrator, you can create deployments that are automatically tagged with
specified inputs and outputs by using extensibility actions and extensibility subscriptions. When
a new deployment is created against the project containing the tag VM subscription, the
deployment event triggers the Tag VM script to run and the tags are automatically applied. This
saves time and promotes efficiency while allowing for easier deployment management.
Prerequisites
Procedure
1 Navigate to Extensibility > Library > Actions > New Action and create an action with the
following parameters.
Parameter Description
Runtime Python
Detail Setting
11 Navigate to Design > Cloud Templates, and create a cloud template from a blank canvas.
12 Add two virtual machines to the cloud template: Application_VM and DB_VM.
14 During deployment, verify that the event is initiated and the extensibility action is run.
15 To verify that the tags were applied correctly, navigate to Infrastructure > Resources >
Machines.
Action-based extensibility provides a lightweight and flexible run-time engine interface where
you can define small scriptable actions and configure them to initiate when events specified in
extensibility subscriptions occur.
You can create these extensibility action scripts of code within vRealize Automation Cloud
Assembly, or on your local environment, and assign them to subscriptions. Extensibility action
scripts are used for more lightweight and simple automation of tasks and steps. For more
information on integrating vRealize Automation Cloud Assembly with a vRealize Orchestrator
server, see Configure a vRealize Orchestrator integration in Cloud Assembly.
You can create extensibility actions by either writing a user-defined action script code or
importing a predefined script code as a .ZIP package. Action-based extensibility supports
Node.js, Python, and PowerShell run-time environments. The Node.js and Python run-times rely
on Amazon Web Services Lambda. Therefore, you must have an active subscription with Amazon
Web Services Identity and Access Management (IAM), and configure Amazon Web Services as
an endpoint in vRealize Automation Cloud Assembly. For information on getting started with
Amazon Web Services Lambda, see ABX: Serverless Extensibility of Cloud Assembly Services.
Extensibility actions are highly customizable, lightweight, and flexible ways to extend application
life cycles by using user-defined script code and action templates. Action templates contain
predefined parameters that help set up the foundation of your extensibility action.
Note Writing user-defined code in the extensibility action editor might require an active
Internet connection.
n Importing a deployment package as a ZIP package for an extensibility action. For information
on creating a ZIP package for extensibility actions, see Create a ZIP package for Python
runtime extensibility actions, Create a ZIP package for Node.js runtime extensibility actions, or
Create a ZIP package for PowerShell runtime extensibility actions.
The following steps describe the procedure for creating an extensibility action that uses Amazon
Web Services as a FaaS provider.
Prerequisites
n Configured Amazon Web Services role for Lambda functions. For example,
AWSLambdaBasicExecutionRole.
Procedure
5 Click Next.
Note To create a custom action without using an action template, select Custom script.
Note For actions imported from a ZIP package, the main function must also include the
name of the script file that contains the entry point. For example, if your main script file
is titled main.py and your entry point is handler (context, inputs), the name of the main
function must be main.handler.
Note For more information on secrets and extensibiltity action constants, see How can
I create secrets for use in extensibility actions and How can I create extensibility action
constants.
Note For PowerShell scripts, you can define your application dependencies so they are
resolved against the PowerShell Gallery repository. To define your application dependencies
so, they are resolvable from the public repository use the following format:
@{
Name = 'Version'
}
e.g.
@{
Pester = '4.3.1'
}
Note For actions imported from a ZIP package, application dependencies are added
automatically.
13 To define timeout and memory limits, enable the Set custom timeout and limits option.
What to do next
After your extensibility action is created and verified, you can assign it to a subscription.
Note Extensibility subscriptions use the latest released version of an extensibility action. After
creating a new version of an action, click Versions on the top-right of the editor window. To
release the version of the action you want to use in your subscription, click Release.
There are two methods of building the script for your extensibility actions:
n Writing your script directly in the extensibility action editor in vRealize Automation Cloud
Assembly.
n Creating your script on your local environment and adding it, with any relevant dependencies,
to a ZIP package.
By using a ZIP package, you can create a custom preconfigured template of action scripts and
dependencies that you can import to vRealize Automation Cloud Assembly for use in extensibility
actions.
Furthermore, you can use a ZIP package in scenarios where modules associated with
dependencies in your action script cannot be resolved by the vRealize Automation Cloud
Assembly service, such as when your environment lacks Internet access.
You can also use a ZIP package to create extensibility actions that contain multiple Python script
files. Using multiple script files can be useful for organizing the structure of your extensibility
action code.
Prerequisites
If you are using Python 3.3 or earlier, download and configure the PIP package installer. See
Python Package Index.
Procedure
1 On your local machine, create a folder for your action script and dependencies.
3 (Optional) Add any dependencies for your Python script to the folder.
a Create a requirements.txt file that contains your dependencies. See Requirements Files.
c Install your requirements.txt file in the script folder by running the following command:
4 In the assigned folder, select your script elements and, if applicable, your requirements.txt
file and compress them to a ZIP package.
Note Both your script and dependency elements must be stored at the root level of the
ZIP package. When creating the ZIP package in a Linux environment, you might encounter
a problem where the package content is not stored at the root level. If you encounter this
problem, create the package by running the zip -r command in your command-line shell.
cd your_script_and_dependencies_folder
zip -r ../your_action_ZIP.zip *
What to do next
Use the ZIP package to create an extensibility action script. See How do I create extensibility
actions.
There are two methods of building the script for your extensibility actions:
n Writing your script directly in the extensibility action editor in vRealize Automation Cloud
Assembly.
n Creating your script in your local environment and adding it, with any relevant dependencies,
to a ZIP package.
By using a ZIP package, you can create a custom preconfigured template of action scripts and
dependencies that you can import to vRealize Automation Cloud Assembly for use in extensibility
actions.
Furthermore, you can use a ZIP package in scenarios where modules associated with
dependencies in your action script cannot be resolved by the vRealize Automation Cloud
Assembly service, such as when your environment lacks Internet access.
Also, you can use packages to create extensibility actions that contain multiple Node.js script
files. Using multiple script files can be useful for organizing the structure of your extensibility
action code.
Procedure
1 On your local machine, create a folder for your action script and dependencies.
3 (Optional) Add any dependencies for your Node.js script to the folder.
a Create a package.json file with dependencies in your script folder. See Creating a
package.json file and Specifying dependencies and devDependencies in a package.json
file.
c Navigate to the folder that you created for the action script and dependencies.
cd /home/user1/zip-action
d Install your package.json file in the script folder by running the following command:
4 In the assigned folder, select your script elements and, if applicable, your node_modules
directory and compress them to a ZIP package.
Note Both your script and dependency elements must be stored at the root level of the
ZIP package. When creating the ZIP package in a Linux environment, you might encounter
a problem where the package content is not stored at the root level. If you encounter this
problem, create the package by running the zip -r command in your command-line shell.
cd your_script_and_dependencies_folder
zip -r ../your_action_ZIP.zip *
What to do next
Use the ZIP package to create an extensibility action script. See How do I create extensibility
actions.
There are two methods of building the script for your extensibility actions:
n Writing your script directly in the extensibility action editor in vRealize Automation Cloud
Assembly.
n Creating your script on your local environment and adding it, with any relevant dependencies,
to a ZIP package.
By using a ZIP package, you can create a custom preconfigured template of action scripts and
dependencies that you can import to vRealize Automation Cloud Assembly for use in extensibility
actions.
Note You do not need to define PowerCLI cmdlets as dependencies or bundle them into a ZIP
package. PowerCLI cmdlets come preconfigured with the PowerShell runtime of your vRealize
Automation Cloud Assembly service.
Furthermore, you can use a ZIP package in scenarios where modules associated with
dependencies in your action script cannot be resolved by the vRealize Automation Cloud
Assembly service, such as when your environment lacks Internet access.
You can also use a ZIP package to create extensibility actions that contain multiple PowerShell
script files. Using multiple script files can be useful for organizing the structure of your
extensibility action code.
Prerequisites
Verify that you are familiar with PowerShell and PowerCLI. You can find a Docker image with
PowerShell Core, PowerCLI 10, PowerNSX, and several community modules and script examples
at Docker Hub .
Procedure
1 On your local machine, create a folder for your action script and dependencies.
2 Add your main PowerShell script with a .psm1 extension to the folder.
return $payload
Note The output of a PowerShell extensibility action is based on the last variable displayed
in the body of the function. All other variables in the included function are discarded.
3 (Optional) Add a proxy configuration to your main PowerShell script by using context
parameters. See Using context parameters to add a proxy configuration in your PowerShell
script.
Note Your PowerShell dependency script must use the .psm1 extension. Use the same name
for the script and the subfolder where the script is saved.
c Download and save the PowerShell module containing your dependencies, by running the
Save-Module cmdlet.
Important Verify that each dependency module is located in a separate subfolder. For
more information on writing and managing PowerShell modules, see How to Write a
PowerShell Script Module.
5 In the assigned folder, select your script elements and, if applicable, your dependency
module subfolders and compress them to a ZIP package.
Note Both your script and dependency module subfolders must be stored at the root
level of the ZIP package. When creating the ZIP package in a Linux environment, you
might encounter a problem where the package content is not stored at the root level. If
you encounter this problem, create the package by running the zip -r command in your
command-line shell.
cd your_script_and_dependencies_folder
zip -r ../your_action_ZIP.zip *
What to do next
Use the ZIP package to create an extensibility action script. See How do I create extensibility
actions.
Certain PowerShell cmdlets might require that you set a network proxy as an environment
variable in your PowerShell function. Proxy configurations are provided to the PowerShell
function with the $context.proxy.host and $context.proxy.host parameters.
You can add these context parameters in the beginning of your PowerShell script.
If the cmdlets support the -Proxy parameter, you can also pass the proxy value directly to the
specific PowerShell cmdlets.
Configure cloud-specific extensibility actions
You can configure extensibility actions to work with your cloud accounts.
When creating an extensibility action, you can configure and link it to various cloud-based
accounts:
n Microsoft Azure
Prerequisites
Procedure
4 In the FaaS provider drop-down menu, select your cloud account provider or select Auto
Select.
Note If you select Auto, the action automatically defines the FaaS provider.
5 Click Save.
Results
Your extensibility action is linked for use with the configured cloud account.
Configure on-premises extensibility actions
You can configure your extensibility actions to use an on-premises FaaS provider instead of an
Amazon Web Services or Microsoft Azure cloud account.
By using an on-premises FaaS provider for your extensibility actions, you can use on-premises
services like LDAP, CMDB, or vCenter data centers in your vRealize Automation Cloud Assembly
extensibility subscriptions.
Procedure
5 Click Next.
What to do next
Use the created extensibility action in your vRealize Automation Cloud Assembly extensibility
subscriptions.
How can I create secrets for use in extensibility actions
You can add encrypted inputs to your extensibility action by using project level secrets.
With secrets, you can add encrypted input values to your extensibility actions. Encryption is
useful for use cases where your inputs are used to manage sensitive data, such as passwords
and certificates. Secrets are available for all FaaS providers and runtimes.
Note You can also add encrypted input values by using action constants. See How can I create
extensibility action constants.
Access to secrets depends on the project that they are created in. Secrets created in Project A,
for example, are accessible only to users included in Project A.
Secrets use the context.getSecret() function to decrypt the secret value when it is added to your
script. This function uses the name of the secret as a parameter. For example, you might use
an secret named abxsecret as an encrypted input parameter in your action. To add this input
parameter to your action script, you must use context.getSecret(inputs["abxsecret"]).
Procedure
c Enter the name of the project that the secret is assigned to.
Note The extensibility action you want to assign the secret to must be part of the same
project as the secret.
g Click Create.
c Search for your secret and add it to the extensibility action inputs.
d Add the secret to the script of the extensibility action by using the context.getSecret()
function.
With extensibility action constants, you can add encrypted input values to your extensibility
actions. Encryption is useful for use cases where your inputs are used to manage sensitive data,
such as passwords and certificates. Constants are available for all FaaS providers and runtimes.
Note Unlike secrets, extensibility action constants can only be used for extensibility secrets. For
more information on secrets, see How can I create secrets for use in extensibility actions.
Extensibility action constants are accessible to all users included in your organization.
Constants use the context.getSecret() function to run as part of your script. This function uses
the name of constant as a parameter. For example, you might use an extensibility action constant
named abxconstant as an encrypted input parameter in your action. To add this input parameter
to your action script, you must use context.getSecret(inputs["abxconstant"]).
Procedure
d Enter a name and value for the constant, and click Save.
c Search for your constant and add it to the extensibility action inputs.
d Add the constant to the script of the extensibility action by using the context.getSecret()
function.
For information on exporting and importing extensibility actions, see Export and import
extensibility actions.
Prerequisites
Create two or more projects in your vRealize Automation Cloud Assembly organization.
Procedure
7 Click Next.
8 Create or import your action script, and save your extensibility action.
Note You can enable or disable sharing from Settings. If the extensibility action is used
in subscriptions, you cannot disable sharing. To disable sharing, you must remove the
extensibility action from your subscriptions.
9 Create an extensibility subscription, add the shared extensibility action, and set the
subscription scope to Any Project.
Note For more information on creating extensibility subscriptions, see Create an extensibility
subscription.
What to do next
You can also import shared extensibility actions as a content source in the vRealize Automation
Service Broker catalog. When you select the source project, enter the project that the
extensibility action was created in. For more information on adding extensibility actions to
vRealize Automation Service Broker, see Add extensibility actions to the Service Broker catalog.
Azure logging for Python-based extensibility actions
You can now use Microsoft Azure 3.x logging functions in your extensibility action script.
Extensibility actions in Cloud Assembly now use the Microsoft Azure 3.x Scripting API which
replaces the previous 1.x version. Microsoft Azure 3.x Scripting API is Linux-based and runs in a
container environment.
Because of this version change, logging functions inserted into the script of extensibility actions
that use Microsoft Azure as a FaaS (Function as a Service) provider work differently. The next
two script samples demonstrate the different logging functions used in the two API versions.
outputs = {
"greeting": greeting
}
return outputs
import logging
outputs = {
"greeting": greeting
}
return outputs
The preceding sample demonstrates that the 3.x version adds the import logging function at the
beginning of the script while replacing the print() function with the logging.info() function. To
continue using logging with extensibility actions created in the Microsoft Azure 1.x API, you must
change the logging functions in your script so it matches the Microsoft Azure 3.x sample.
For more information on logging, see the Azure Functions Python developer guide.
Export and import extensibility actions
With vRealize Automation Cloud Assembly, you can export and import extensibility actions for
use in different projects.
Prerequisites
Procedure
The action script and its dependencies are saved on your local environment as a ZIP file.
b Click Import.
d Click Import.
Note If the imported extensibility action is already assigned to the specified project, you
are prompted to select a conflict resolution policy.
All action flows begin with flow_start and end with flow_end. You can link several extensibility
action scripts together, by using the following action flow elements:
n Fork action flows - Multiple extensibility action scripts or flows that split pathways to
contribute to the same output.
n Join action flows - Multiple extensibility action scripts or flows that join together and
contribute to the same output.
n Conditional action flows - Multiple extensibility action scripts or flows that run after a
condition is satisfied.
version: "1"
flow:
flow_start:
next: action1
action1:
action: <action_name>
next: action2
action2:
action: <action_name>
next: flow_end
version: "1"
flow:
flow_start:
next: forkAction
forkAction:
fork:
next: [action1, action2]
action1:
action: <action_name>
next: action3
action3:
action: <action_name>
next: action4
action4:
action: <action_name>
next: action7
action7:
action: <action_name>
action2:
action: <action_name>
version: "1"
action7:
action: <action_name>
next: joinElement
action8:
action: <action_name>
next: joinElement
joinElement:
join:
type: all
next: action10
action10:
action: <action_name>
next: flow_end
Join Element
In some cases, the condition must be equal to true in order for the action to run. Other cases, as
seen in this example, require parameter values to be met before an action can run. If none of the
conditions are met the action flow fails.
version: 1
id: 1234
name: Test
inputs: ...
outputs: ...
flow:
flow_start:
next: forkAction
forkAction:
fork:
next: [action1, action2]
action1:
action: <action_name>
next: action3
action3:
action: <action_name>
next: action4
action4:
action: <action_name>
next: action7
action7:
action: <action_name>
next: joinElement
action2:
Switch element
action: <action_name>
next: switchAction
switchAction:
switch:
"${1 == 1}": action5
"${1 != 1}": action6
action5:
action: <action_name>
next: action8
action6:
action: <action_name>
next: action8
action8:
action: <action_name>
If an action in your flow fails and the action flow contains an error handler element, an error
message is issued alerting you of the action failure. The error handler is an action on its own. The
following script is an example of an error handler that can be used in an action flow.
errorMsg = inputs["errorMsg"]
flowInputs = inputs["flowInputs"]
outputs = {
"errorMsg": errorMsg,
"flowInputs": flowInputs
}
return outputs
You can view the successful and failed runs on the Action Runs window.
In this example, the flow-with-handler action flow, which contains an error handler element, was
run successfully. However, one of the actions in the flow failed, which then initiated the error
handler to issue an error.
You can view the log of action runs using Extensibility > Activity > Action Runs. You can also
filter the list of action runs by one or more properties at once.
Troubleshooting failed extensibility action runs
If your extensibility action run fails, you can perform troubleshooting steps to correct it.
When an action run fails you might receive an error message, a failed status, and a failed log. If
your action run fails, it is either due to a deployment or code failure.
Problem Solution
Code Failure These failures are a result of invalid scripts or code. Use
the Action run logs to troubleshoot and correct the invalid
scripts.
How do I modify virtual machine properties using a vRealize Orchestrator workflow subscription
You can use an existing vRealize Orchestrator workflow to modify virtual machine properties and
add virtual machines to the active directory.
The event topic parameters define the format of the payload for Event Broker Service (EBS)
messages. To receive and use EBS message payload inside a workflow, you must define the
inputProperties workflow input parameters.
Prerequisites
Procedure
Parameter Value
Name RenameVM
Event topic Select an event topic suitable for the desired vRealize
Orchestrator integration. For example, compute
allocation.
Blocking/Non-blocking Non-blocking
5 Assign and activate your subscription by creating a cloud template or deploying an existing
cloud template.
What to do next
Verify that the workflow initiated successfully by one of the following methods:
n Verify the workflow runs log, Extensibility > Activity > Workflow Runs.
n Open the vRealize Orchestrator client and check workflow status by navigating to the
workflow and verifying the status or by opening the specific logs tab.
How do I integrate Cloud Assembly for ITSM with ServiceNow using vRealize Orchestrator
workflows
Using vRealize Orchestrator hosted workflows, you can integrate vRealize Automation Cloud
Assembly with ServiceNow for ITSM compliance.
Enterprise users commonly integrate their Cloud Management Platform with an IT Service
Management (ITSM) and Configuration Management Database (CMDB) platform for compliance.
Following this example, you can integrate vRealize Automation Cloud Assembly with ServiceNow
for CMDB and ITSM using vRealize Orchestrator hosted workflows. When using vRealize
Orchestrator integrations and workflows, capability tags are especially useful if you have
multiple instances for different environments. For more information on capability tags, See Using
capability tags in vRealize Automation Cloud Assembly.
Note You can also integrate ServiceNow with vRealize Automation Cloud Assembly using
extensibility action scripts. For information about integrating ServiceNow using extensibility
action scripts, see How do I integrate Cloud Assembly with ServiceNow using extensibility
actions.
In this example, the ServiceNow integration is composed of three top-level workflows. Each
workflow has their own subscriptions so that you can update and iterate each component
individually.
n Event subscription entry point - Basic logging, identifies the requesting user and vCenter VM,
if applicable.
n Integration workflow - Separates objects and feeds inputs into the technical workflow,
handles logging, property, and output updates.
n Technical workflow - Downstream system integration for ServiceNow API to create the CMDB
CI, CR, and vRealize Automation Cloud Assembly IaaS API with additional virtual machine
properties outside of the payload.
Prerequisites
Procedure
1 Create and save a configuration file in vRealize Orchestrator that contains common
configuration used in multiple workflows.
2 Save your vRealize Automation Cloud Assembly API token in the same location, as the
configuration file from Step 1.
Note The vRealize Automation Cloud Assembly API token has an expiration.
3 Create a workflow in vRealize Orchestrator with the provided script element. This script
references and locates a REST Host. It also standardizes REST actions that use an optional
parameter of a token, which is added as an extra authorization header.
var ConfigurationElement =
System.getModule("au.com.cs.example").getConfigurationElementByName(configName,configPath);
System.debug("ConfigurationElement:" + ConfigurationElement);
var casToken = ConfigurationElement.getAttributeWithKey("CASToken")["value"]
if(!casToken){
throw "no CAS Token";
}
//REST Template
var opName = "casLogin";
var opTemplate = "/iaas/login";
var opMethod = "POST";
var loginResponse =
System.getModule("au.com.cs.example").executeOp(opLogin,null,postContent,null) ;
try{
var tokenResponse = JSON.parse(loginResponse)['token']
System.debug("token: " + tokenResponse);
} catch (ex) {
throw ex + " No valid token";
}
var opMachine =
System.getModule("au.com.cs.example").createOp(restHost,opName,opMethod,opTemplate);
try{
var vm = JSON.parse(vmResponse);
} catch (ex) {
throw ex + " failed to parse vm details"
}
cpuCount = vm["customProperties"]["cpuCount"];
memoryMB = vm["customProperties"]["memoryInMB"];
This script sends the output cpuCount and memoryMB to the parent workflow and updates the
existing customProperties properties. These values can be used in subsequent workflows
when creating the CMDB.
4 Add the ServiceNow CMDB Create CI script element to your workflow. This element locates
the ServiceNow REST Host using the configuration item, creates a REST operation for the
cmdb_ci_vmware_instance table, creates a string of content object based on workflow inputs
for post data, and outputs the returned sys_id.
//REST Template
var opName = "serviceNowCreatCI";
var opTemplate = "/api/now/table/" + tableName;
var opMethod = "POST";
postContent = JSON.stringify(contentObject);
System.log("JSON: " + postContent);
try{
var cmdbCI = JSON.parse(ciResponse);
} catch (ex) {
throw ex + " failed to parse ServiceNow CMDB response";
}
serviceNowSysId = cmdbCI['result']['sys_id'];
5 Using the output from the child workflow, create a properties object using the existing
customProperties and overwrite the serviceNowSysId property with the value from
ServiceNow. This unique id is used in the CMDB to mark an instance as retired on destroy.
Results
vRealize Automation Cloud Assembly is successfully integrated with ITSM ServiceNow. For more
information on how you can use workflows to integrate ServiceNow in vRealize Automation
Cloud Assembly, see Extending Cloud Assembly with vRealize Orchestrator for ServiceNow
Integration.
vRealize Automation includes an embedded vRealize Orchestrator deployment. You can use the
workflow library of the embedded vRealize Orchestrator deployment in your subscriptions. You
can create, modify, and delete workflows by using the vRealize Orchestrator client.
You can also integrate an external vRealize Orchestrator deployment in vRealize Automation
Cloud Assembly. See Configure a vRealize Orchestrator integration in Cloud Assembly.
Best practices for creating vRealize Orchestrator workflows
A workflow subscription is based on a specific event topic and the event parameters of that
topic. To ensure that the subscriptions initiate the vRealize Orchestrator workflows, you must
configure them with the correct input parameters so that they work with the event data.
Your custom workflow can include all the parameters or a single parameter that consumes all the
data in the payload.
To use a single parameter, configure one parameter with a type of Properties and name
inputProperties.
Your custom workflow can include output parameters that are relevant to subsequent events
necessary for a reply event topic type.
If an event topic expects a reply, the workflow output parameters must match the parameters of
the reply schema.
You can view the logs of your workflow runs by navigating to Extensibility > Activity > Workflow
Runs.
Troubleshooting failed workflow subscriptions
If your workflow subscription fails, you can perform troubleshooting steps to correct it.
Failed workflow runs can cause your workflow subscription not to start or complete successfully.
Workflow run failure can result from several common problems.
Your vRealize Orchestrator You configured a workflow subscription to run 1 Verify that the workflow
workflow subscription did not a custom workflow when the event message subscription is saved
start or complete successfully. is received, but the workflow does not run or correctly.
complete successfully. 2 Verify that the workflow
subscription conditions are
configured correctly.
3 Verify that vRealize
Orchestrator contains the
specified workflow.
4 Verify that the workflow is
configured correctly within
vRealize Orchestrator.
Your approval request You configured a pre-approval or post-approval To successfully run an approval
vRealize Orchestrator workflow workflow subscription to run a vRealize workflow subscription, you
subscription did not run. Orchestrator workflow. The workflow does not must verify that all the
run when a machine that matches the defined components are configured
criteria is requested in the service catalog. correctly.
1 Verify that the approval
policy is active and
correctly applied.
2 Verify that your workflow
subscription is correctly
configured and saved.
3 Review the event logs
for messages related to
approvals.
Your approval request You configured a pre-approval or post-approval 1 Review the logs for
vRealize Orchestrator workflow workflow subscription that runs a specified messages related to
subscription was rejected. vRealize Orchestrator workflow, but the request approvals.
is rejected on the external approval level. 2 Verify that the vRealize
One possible cause is an internal workflow run Orchestrator server is
error in vRealize Orchestrator. For example, the running.
workflow is missing or the vRealize Orchestrator 3 Verify that vRealize
server is not running. Orchestrator contains the
specified workflow.
When a triggering event occurs in your environment, the subscription is initiated and the
specified workflow or extensibility action is run. You can view system events on the event
log, workflow runs in the workflow runs window, and action runs in the action run window.
Subscriptions are project-specific, meaning they are linked to cloud templates and deployments
through the specified project.
Extensibility terminology
As you work with extensibility subscriptions within vRealize Automation Cloud Assembly, you
might encounter some terminology that is specific to the subscriptions and event broker service.
Term Description
Event Topic Describes a set of events that have the same logical
intent and the same structure. Every event is an instance
of an event topic.
You can assign blocking parameters to certain event
topics. For more information, see Blocking event topics.
Payload The event data that contains all the relevant properties
related to that Event Topic.
System Administrator A user with privileges to create, read, update, and delete
tenant workflow subscriptions and system workflow
subscriptions using vRealize Automation Cloud Assembly.
Workflow Subscription Specifies the event topic and conditions that trigger a
vRealize Orchestrator workflow.
Action Subscription Specifies the event topic and conditions that trigger an
extensibility action to run.
Term Description
Extensibility Action A streamlined script of code that can run after an event is
triggered in a subscription. Extensibility actions are similar
to workflows, but are more lightweight. Extensibility
actions can customized from within vRealize Automation
Cloud Assembly.
Action Runs Accessible through the Action Runs tab. An action run
is a detailed log of extensibility actions that have run in
response to triggering events.
vRealize Automation Cloud Assembly extensibility subscriptions can use two broad types of
event topics: non-blocking and blocking event topics. The event topic type defines the behavior
of the extensibility subscription.
Non-blocking event topics only allow you to create non-blocking subscriptions. Non-blocking
subscriptions are triggered asynchronously and you cannot rely on the order that the
subscriptions are triggered in.
Some event topics support blocking. If a subscription is marked as blocking, all messages that
meet the set conditions are not received by any other subscriptions with matching conditions
until the runnable item of the blocking subscription is run.
Blocking subscriptions run in priority order. The highest priority value is 0 (zero). If you have
more than one blocking subscription for the same event topic with the same priority level, the
subscriptions run in a reverse alphabetical order based on the name of the subscription. After all
blocking subscriptions are processed, the message is sent to all the non-blocking subscriptions
at the same time. Because the blocking subscriptions run synchronously, the changed event
payload includes the updated event when the subsequent subscriptions are notified.
You can use blocking event topics to manage multiple subscriptions that are dependent on each
other.
For example, you can have two provisioning workflow subscriptions where the second
subscription depends on the results of the first subscription. The first subscription changes a
property during provisioning, and the second subscription records the new property, such as
a machine name, in a file system. The ChangeProperty subscription is prioritized as 0 and the
RecordProperty is prioritized as 1 because the second subscription uses the results of the first
For blocking event topics, you can add a recovery runnable item to the subscription. The
recovery runnable item in a subscription runs if the primary runnable item fails. For example, you
can create a workflow subscription where the primary runnable item is a workflow that creates
records in a CMDB system such as ServiceNow. Even if the workflow subscription fails, some
records might be created in the CMDB system. In this scenario, a recovery runnable item can be
used to clean up the records left in the CMDB system by the failed runnable item.
For use cases that include multiple subscriptions that are dependent on each other, you can add
a ebs.recover.continuation property to the recovery runnable item. With this property, you
can direct if the Extensibility service must continue with the next subscription in your chain, if the
current subscription fails.
Compute nat post provisioning Yes Issued after a compute NAT resource
is provisioned.
Compute nat post removal Yes Issued after a compute NAT resource
is removed.
Custom resource post provision Yes Issued for post provisioning events
triggered by custom resource
operations.
Custom resource pre provision Yes Issued for pre provisioning events
triggered by custom resource
operations.
Load balancer post provision Yes Issued after the provisioning of a load
balancer.
Load balancer post removal Yes Issued after the removal of a load
balancer.
Event Parameters
After you add an event topic, you can view the parameters of that event topic. These event
parameters define the structure of the event's payload, or inputProperties. Certain event
parameters cannot be modified and are marked as read-only. You can identify these read-only
parameters by clicking the info icon to the right of the parameter.
You can view the extensibility event logs by navigating to Extensibility > Events. You can also
filter the list of events by one or more properties. To view additional details of an individual
event, select the event's ID.
Prerequisites
n The library of the embedded vRealize Orchestrator Client or the library of any integrated
external vRealize Orchestrator instance.
n Existing extensibility action scripts. For more information, see How do I create
extensibility actions.
Procedure
Note Conditions can be created by using a javascript syntax expression. This expression can
include boolean operators, such as "&&" (AND), "||" (OR), "^" (XOR), and "!" (NOT). You can
also use arithmetic operators, such as “==" (equal to), "!=" (not equal to), ">=" (greater
than or equal), "<=" (less than or equal), ">" (greater than), and "<" (lesser than). More
complex boolean expressions can be built out of simpler expressions. To access the event's
payload (data) according to the specified topic parameters, use 'event.data' or any of
the event's header properties: sourceType, sourceIdentity, timeStamp, eventType, eventTopicId,
correlationType, correlationId, description, targetType, targetId, userName, and orgId.
7 (Optional) If applicable, configure the blocking behavior for the event topic.
8 (Optional) To define the project scope of the extensibility subscription, disable Any Project,
and click Add Projects.
Results
Your subscription is created. When an event, categorized by the selected event topic, occurs the
linked vRealize Orchestrator workflow or extensibility action is initiated and all subscribers are
notified.
What to do next
After creating your subscription, you can create or deploy a cloud template to link and use
the subscription. You can also verify the status of the workflow run in the Extensibility tab
within vRealize Automation Cloud Assembly. For subscriptions containing vRealize Orchestrator
workflows, you can also monitor runs and workflow status from the vRealize Orchestrator client.
When your subscription fails, it is commonly a result of errors with your workflow or extensibility
action script.
View topic parameters and payload
You can use a dump subscription topic parameters script to view the specific parameters and
payload of your virtual machine at any given event stage.
Primarily, this script is useful for debugging and verifying available inputs for your vRealize
Orchestrator workflow. To view all parameters of your virtual machine, use the following script
with your workflow:
function dumpProperties(props,lvl){
var keys = props.keys;
var prefix = ""
for (var i=0; i<lvl; i++){
prefix = prefix + "";
}
for (k in keys){
var key = keys[k];
var value = props.get(keys[k])
if ("Properties" == System.getObjectType(value)){
System.log(prefix + key + "[")
dumpProperties(value,(lvl+2));
System.log(prefix+ "]")
} else{
System.log( prefix + key + ":" + value)
}
}
}
dumpProperties(inputProperties, 0)
customProps = inputProperties.get("customProperties")
The Version History tab of the subscription editor can show you the change history of your
subscription, including the user and date of the change. You can also compare different
subscription versions by clicking Compare to. If your subscription fails or is running incorrectly,
the version history can help identify the cause.
The schema is available from the VMware {code} site. Follow the link, and click Models to list the
resource objects that are available for cloud templates, formerly called blueprints.
Often, an example of successful code is your best starting point for further development. When
following an example, make substitutions in order to apply your site settings in terms of resource
names, values, and so on.
vSphere machine
from a snapshot resources:
demo-machine:
image. Append a type: Cloud.vSphere.Machine
forward slash and the properties:
snapshot name. The imageRef: 'demo-machine/snapshot-01'
snapshot image can cpuCount: 1
be a linked clone. totalMemoryMB: 1024
# *************************************************************************
#
# This WordPress cloud template is enhanced with comments to explain its
# parameters.
#
# Try cloning it and experimenting with its YAML code. If you're new to
# YAML, visit yaml.org for general information.
#
# The cloud template deploys a minimum of 3 virtual machines and runs scripts
# to install packages.
#
# *************************************************************************
#
# ------------------------------------------------------------------------
# Templates need a descriptive name and version if
# source controlled in git.
# ------------------------------------------------------------------------
name: WordPress Template with Comments
formatVersion: 1
version: 1
#
# ------------------------------------------------------------------------
# Inputs create user selections that appear at deployment time. Inputs
# can set placement decisions and configurations, and are referenced
# later, by the resources section.
# ------------------------------------------------------------------------
inputs:
#
# ------------------------------------------------------------------------
# Choose a cloud endpoint. 'Title' is the visible
# option text (oneOf allows for the friendly title). 'Const' is the
# tag that identifies the endpoint, which was set up earlier, under the
# Cloud Assembly Infrastructure tab.
# ------------------------------------------------------------------------
platform:
type: string
title: Deploy to
oneOf:
- title: AWS
const: aws
- title: Azure
const: azure
- title: vSphere
const: vsphere
default: vsphere
#
# ------------------------------------------------------------------------
# Choose the operating system. Note that the Cloud Assembly
# Infrastructure must also have an AWS, Azure, and vSphere Ubuntu image
# mapped. In this case, enum sets the option that you see, meaning there's
# no friendly title feature this time. Also, only Ubuntu is available
# here, but having this input stubbed in lets you add more operating
# systems later.
# ------------------------------------------------------------------------
osimage:
type: string
title: Operating System
description: Which OS to use
enum:
- Ubuntu
#
# ------------------------------------------------------------------------
# Set the number of machines in the database cluster. Small and large
# correspond to 1 or 2 machines, respectively, which you see later,
# down in the resources section.
# ------------------------------------------------------------------------
dbenvsize:
type: string
title: Database cluster size
enum:
- Small
- Large
#
# ------------------------------------------------------------------------
# Dynamically tag the machines that will be created. The
# 'array' of objects means you can create as many key-value pairs as
# needed. To see how array input looks when it's collected,
# open the cloud template and click TEST.
# ------------------------------------------------------------------------
Mtags:
type: array
title: Tags
description: Tags to apply to machines
items:
type: object
properties:
key:
type: string
title: Key
value:
type: string
title: Value
#
# ------------------------------------------------------------------------
# Create machine credentials. These credentials are needed in
# remote access configuration later, in the resources section.
# ------------------------------------------------------------------------
username:
type: string
minLength: 4
maxLength: 20
pattern: '[a-z]+'
title: Database Username
description: Database Username
userpassword:
type: string
pattern: '[a-z0-9A-Z@#$]+'
encrypted: true
title: Database Password
description: Database Password
#
# ------------------------------------------------------------------------
# Set the database storage disk size.
# ------------------------------------------------------------------------
databaseDiskSize:
type: number
default: 4
maximum: 10
title: MySQL Data Disk Size
description: Size of database disk
#
# ------------------------------------------------------------------------
# Set the number of machines in the web cluster. Small, medium, and large
# correspond to 2, 3, and 4 machines, respectively, which you see later,
# in the WebTier part of the resources section.
# ------------------------------------------------------------------------
clusterSize:
type: string
enum:
- small
- medium
- large
title: Wordpress Cluster Size
description: Wordpress Cluster Size
#
# ------------------------------------------------------------------------
# Set the archive storage disk size.
# ------------------------------------------------------------------------
archiveDiskSize:
type: number
default: 4
maximum: 10
title: Wordpress Archive Disk Size
description: Size of Wordpress archive disk
#
# ------------------------------------------------------------------------
# The resources section configures the deployment of machines, disks,
# networks, and other objects. In several places, the code pulls from
# the preceding interactive user inputs.
# ------------------------------------------------------------------------
resources:
#
# ------------------------------------------------------------------------
# Create the database server. Choose a cloud agnostic machine 'type' so
# that it can deploy to AWS, Azure, or vSphere. Then enter its property
# settings.
# ------------------------------------------------------------------------
DBTier:
type: Cloud.Machine
properties:
#
# ------------------------------------------------------------------------
# Descriptive name for the virtual machine. Does not become the hostname
# upon deployment.
# ------------------------------------------------------------------------
name: mysql
#
# ------------------------------------------------------------------------
# Hard-coded operating system image to use. To pull from user input above,
#
# ------------------------------------------------------------------------
# Run OS commands or scripts to further configure the database machine,
# via operations such as setting a hostname, generating SSH private keys,
# or installing packages.
# ------------------------------------------------------------------------
cloudConfig: |
#cloud-config
repo_update: true
repo_upgrade: all
packages:
- mysql-server
runcmd:
- sed -e '/bind-address/ s/^#*/#/' -i /etc/mysql/mysql.conf.d/mysqld.cnf
- service mysql restart
- mysql -e "GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'mysqlpassword';"
- mysql -e "FLUSH PRIVILEGES;"
attachedDisks: []
#
# ------------------------------------------------------------------------
# Create the web server. Choose a cloud agnostic machine 'type' so that it
# can deploy to AWS, Azure, or vSphere. Then enter its property settings.
# ------------------------------------------------------------------------
WebTier:
type: Cloud.Machine
properties:
#
# ------------------------------------------------------------------------
# Descriptive name for the virtual machine. Does not become the hostname
# upon deployment.
# ------------------------------------------------------------------------
name: wordpress
#
# ------------------------------------------------------------------------
# Hard-coded operating system image to use. To pull from user input above,
# enter the following instead:
# image: '${input.osimage}'
# ------------------------------------------------------------------------
image: Ubuntu
#
# ------------------------------------------------------------------------
# Hard-coded capacity to use. Note that the Cloud Assembly
# Infrastructure must also have AWS, Azure, and vSphere flavors
# such as small, medium, and large mapped.
# ------------------------------------------------------------------------
flavor: small
#
# ------------------------------------------------------------------------
# Set the web server cluster size by referencing the clusterSize user
# input. Small is 2 machines, medium is 3, and large defaults to 4.
# ------------------------------------------------------------------------
count: '${input.clusterSize== "small" ? 2 : (input.clusterSize == "medium" ? 3 : 4)}'
#
# ------------------------------------------------------------------------
# Set an environment variable to display object information under the
config.php
- sed -i -e s/"define('DB_NAME', 'database_name_here');"/"define('DB_NAME',
'wordpress_blog');"/ /var/www/html/mywordpresssite/wp-config.php && sed -i
-e s/"define('DB_USER', 'username_here');"/"define('DB_USER', 'root');"/ /var/www/html/
mywordpresssite/wp-config.php && sed -i -e s/"define('DB_PASSWORD',
'password_here');"/"define('DB_PASSWORD', 'mysqlpassword');"/ /var/www/html/mywordpresssite/wp-
config.php && sed -i -e s/"define('DB_HOST', 'localhost');"/"define('DB_HOST', '$
{resource.DBTier.networks[0].address}');"/ /var/www/html/mywordpresssite/wp-config.php
- service apache2 reload
#
# ------------------------------------------------------------------------
# Create the network that the database and web servers connect to.
# Choose a cloud agnostic network 'type' so that it can deploy to AWS,
# Azure, or vSphere. Then enter its property settings.
# ------------------------------------------------------------------------
WP_Network:
type: Cloud.Network
properties:
#
# ------------------------------------------------------------------------
# Descriptive name for the network. Does not become the network name
# upon deployment.
# ------------------------------------------------------------------------
name: WP_Network
#
# ------------------------------------------------------------------------
# Set the networkType to an existing network. You could also use a
# constraint tag to target a specific, like-tagged network.
# The other network types are private or public.
# ------------------------------------------------------------------------
networkType: existing
#
# ************************************************************************
#
# VMware hopes that you found this commented template useful. Note that
# you can also access an API to create templates, or query for input
# schema that you intend to request. See the following Swagger
# documentation.
#
# www.mgmt.cloud.vmware.com/blueprint/api/swagger/swagger-ui.html
#
# ************************************************************************
For a summary of cloud template design code options, see vRealize Automation Resource Type
Schema.
These examples illustrate sample network, security group, and load balancer resources within
basic cloud template designs.
Specify a load balance Sample NSX load balancer showing use of logging level,
logging level, algorithm, and algorithm, and size:
size.
resources:
Cloud_LoadBalancer_1:
type: Cloud.NSX.LoadBalancer
properties:
name: myapp-lb
network: '${appnet-public.name}'
instances: '${wordpress.id}'
routes:
- protocol: HTTP port: '80'
loggingLevel: CRITICAL
algorithm: LEAST_CONNECTION
type: MEDIUM
Learn more
For network and security implementation scenarios, see VMware blogs such as these:
n vRealize Automation Cloud Assembly Load Balancer with NSX-T Deep Dive
n Network Automation with Cloud Assembly and NSX – Part 1 (includes use of NSX-T and
vCenter cloud accounts and network CIDR)
n Network Automation with Cloud Assembly and NSX – Part 2 (includes use of existing and
outbound network types)
n Network Automation with Cloud Assembly and NSX – Part 3 (includes use of existing and
on-demand security groups)
n Network Automation with Cloud Assembly and NSX – Part 4 (includes use of existing and
on-demand load balancers)
Select one of the available network resource types based on machine and related conditions in
your vRealize Automation cloud template.
Cloud_Network_1:
type: Cloud.Network
properties:
networkType: existing
Use a cloud agnostic network when you want to specify networking characteristics for a target
machine type that is not, or might not, be connected to an NSX network.
The cloud agnostic network resource is available for these resource types:
n vSphere
n Microsoft Azure
The cloud agnostic network resource is available for these network type (networkType) settings:
n public
n private
n outbound
n existing
Cloud_vSphere_Network_1:
type: Cloud.vSphere.Network
properties:
networkType: existing
Use a vSphere network when you want to specify networking characteristics for a vSphere
machine type (Cloud.vSphere.Machine).
The vSphere network resource is only available for a Cloud.vSphere.Machine machine type.
The vSphere resource is available for these network type (networkType) settings:
n public
n private
n existing
For examples, see Using network settings in network profiles and cloud templates in vRealize
Automation.
Cloud_NSX_Network_1:
type: Cloud.NSX.Network
properties:
networkType: existing
Use an NSX network when you want to attach a network resource to one or more machines that
have been associated to an NSX-V or NSX-T cloud account. The NSX network resource allows
you to specify NSX networking characteristics for a vSphere machine resource that is associated
to an NSX-V or NSX-T cloud account.
The Cloud.NSX.Network resource is available for these network type (networkType) settings:
n public
n private
n outbound
n existing
n routed - Routed networks are only available for NSX-V and NSX-T.
If you want multiple outbound or routed networks to share the same NSX-T Tier-1 router or
NSX-V Edge Service Gateway (ESG), connect a single NSX gateway resource (Cloud.NSX.Gateway)
to the connected networks in the template prior to initial deployment. If you add the gateway
after deployment as a Day 2 or iterative development operation, each network creates its own
router.
You can use the NSX NAT resource in the template to support NAT and DNAT port forwarding
rules.
Cloud agnostic network resource with Azure, AWS, or GCP deployment intent
Public cloud provider VMs can require specific cloud template property combinations that are
not necessarily required in NSX or vSphere-based machine deployments. For examples of cloud
template code that support some of these scenarios, see Network, security, and load balancer
examples in vRealize Automation cloud templates.
The Cloud.NSX.Gateway resource allows you to share the NSX-T Tier-1 router or NSX-V Edge
Service Gateway (ESG) among connected outbound or routed networks in a deployment.
The gateway is often attached to a single outbound or routed network. However, if the gateway
is attached to multiple networks, the networks must be of the same type, for example all
outbound or all routed. The gateway can be connected to multiple machines or load balancers
that are connected to the same outbound or routed networks. The gateway must be connected
to a load balancer on the shared on-demand network so that it can reuse the NSX-T Tier-1 router
or NSX-V Edge Service Gateway (ESG) created by the gateway.
To allow multiple outbound or routed networks to share the same T1 router or Edge, connect a
single Cloud.NSX.Gateway gateway resource to all the networks initially. All the intended networks
and the single gateway must be connected together before you deploy the cloud template,
otherwise each network creates its own router.
For an NSX network that contains an associated compute gateway resource, the gateway
settings are applied to all associated networks in the deployment. A single NSX-T Tier-1 logical
router is created for each deployment and shared by all on-demand networks and load balancers
in the deployment. A single NSX-V Edge is created for each deployment and shared by all the
on-demand networks and load balancers in the deployment.
You can attach the gateway resource to a network as an iterative deployment update. However,
doing so does not create a T1 or Edge router - the initial network deployment creates the router.
For NSX-T networks that do not use an associated gateway resource, multiple on-demand
networks in the cloud template continue to create multiple Tier-1 logical routers in the
deployment.
If the gateway contains NAT rules, you can reconfigure or delete the NAT or DNAT rules for
the Tier 1 router or Edge router. If the gateway is initially deployed with no NAT rules, it has no
available Day 2 actions. Use the
Note The Cloud.NSX.Gateway resource was originally available for DNAT rules. However, use
of the Cloud.NSX.Gateway as a means of defining DNAT rules and port forwarding has been
deprecated. It does remain available for backward compatibility. Use the Cloud.NSX.NAT cloud
template resource for DNAT rules and port forwarding. A warning appears in the cloud template
if you attempt to use the Cloud.NSX.Gateway resource type with NAT rule specifications.
The Cloud.NSX.NAT resource supports DNAT rules and port forwarding when connected to an
outbound NSX-V or NSX-T network.
The NAT rules setting in the resource is natRules:. You can attach the NAT resource to the
gateway resource to configure the natRules: entries on the gateway. DNAT rules that are
specified in the resource use the associated machines or load balancers as their target.
You can reconfigure a machine NIC or compute gateway in an existing deployment to modify
its natRules: settings by adding, reordering, editing or deleting DNAT port forwarding rules.
You cannot use DNAT rules with clustered machines. You can specify DNAT rules for individual
machines within the cluster as part of a Day 2 operation.
For an example of how to move from one network to another, see How to move a deployed
machine to another network.
Learn more
For related information and examples, see Network, security, and load balancer examples in
vRealize Automation cloud templates.
For information about defining network resources, see Network resources in vRealize
Automation.
For information about defining network profiles, see Learn more about network profiles in
vRealize Automation.
For examples of cloud template designs that illustrate sample network resources and settings,
see Network, security, and load balancer examples in vRealize Automation cloud templates.
Cloud_SecurityGroup_1:
type: Cloud.SecurityGroup
properties:
constraints: []
securityGroupType: existing
You specify a security group resource in a cloud template design as either existing
(securityGroupType: existing) or on-demand (securityGroupType: new).
You can add an existing security group directly to your cloud template design or you can use
an existing security group that has been added to a network profile. Existing security groups are
supported for various cloud account types.
For NSX-V and NSX-T, as well as NSX-T with the policy manager switch enabled in combination
with VMware Cloud on AWS, you can add an existing security group or define a new security
group as you design or modify your cloud template. On-demand security groups are supported
for NSX-T and NSX-V, and VMware Cloud on AWS when used with NSX-T policy manager.
For all cloud account types except Microsoft Azure, you can associate one or more security
groups to a machine NIC. A Microsoft Azure virtual machine NIC (machineName) can only be
associated to one security group.
By default, the security group property securityGroupType is set to existing. To create an on-
demand security group, enter new for the securityGroupType property. To specify firewall rules for
an on-demand security group, use the rules property in the Cloud.SecurityGroup section of the
security group resource.
You can associate a security group resource in your cloud template design to one or more
machine resources.
Note If you intend to use a machine resource in your cloud template design to provision to
a Microsoft Azure virtual machine NIC (machineName), you should only associate the machine
resource to a single security group.
You can use an on-demand security group for NSX-V and NSX-T, as well as Amazon Web
Services when used with NSX-T Policy type, to apply a specific set of firewall rules to a
networked machine resource or set of grouped resources. Each security group can contain
multiple named firewall rules. You can use an on-demand security group to specify services or
protocols and ports. Note that you can specify either a service or a protocol but not both. You
can specify a port in addition to a protocol. You cannot specify a port if you specify a service. If
the rule contains neither a service or a protocol, the default service value is Any.
You can also specify IP addresses and IP ranges in firewall rules. Some firewall rule examples are
shown in Network, security, and load balancer examples in vRealize Automation cloud templates.
When you create firewall rules in an NSX-V or NSX-T on-demand security group, the default is
to allow the specified network traffic but to also allow other network traffic. To control network
traffic, you must specify an access type for each rule. The rule access types are:
n Allow (default) - Allows the network traffic that is specified in this firewall rule.
n Deny - Blocks the network traffic that is specified in this firewall rule. Actively tells the client
that the connection is rejected.
n Drop - Rejects the network traffic that is specified in this firewall rule. Silently drops the
packet as if the listener is not online.
For an example design that uses an access: Allow and an access: Deny firewall rule, see Network,
security, and load balancer examples in vRealize Automation cloud templates.
Note A cloud administrator can create a cloud template design that contains only an NSX on-
demand security group and can deploy that design to create a reusable existing security group
resource that members of the organization can add to network profiles and cloud template
designs as an existing security group.
Firewall rules support either IPv4 or IPv6 format CIDR values for source and destination IP
addresses. For an example design that uses IPv6 CIDR values in a firewall rule, see Network,
security, and load balancer examples in vRealize Automation cloud templates.
resources:
Cloud_SecurityGroup_1:
type: Cloud.SecurityGroup
properties:
name: vmc-odsg
securityGroupType: new
rules:
- name: datapath
direction: inbound
protocol: TCP
ports: 5011
access: Allow
source: any
You can also define an existing security group for a networked VMware Cloud on AWS machine
and optionally include constraint tagging, as shown in the following examples:
Cloud_SecurityGroup_2:
type: Cloud.SecurityGroup
properties:
constraints: [xyz]
securityGroupType: existing
Cloud_SecurityGroup_3:
type: Cloud.SecurityGroup
properties:
securityGroupType: existing
constraints:
- tag: xyz
n If a security group is associated with one or more machines in the deployment, a delete
action displays a message stating that the security group cannot be deleted.
n If a security group is not associated with any machine in the deployment, a delete action
displays a message stating that the security group will be deleted from this deployment and
the action cannot be undone. An existing security group is deleted from the cloud template,
while an on-demand security group is destroyed.
You can specify NSX-V security tags by using the key: nsxSecurityTag and a tag value in the
compute resource in the cloud template, as shown in the following example:
tags:
- key: nsxSecurityTag
- value: security_tag_1
- key: nsxSecurityTag
- value: security_tag_2
The specified value must correspond to an NSX-V security tag. If there are no security tags in
NSX-V that match the specified nsxSecurityTag key value, the deployment will fail.
NSX-T does not have a separate security tag. Any tag specified on the compute resource in
the cloud template result in the deployed VM being associated with all tags that are specified in
NSX-T. For NSX-T, including NSX-T with Policy, VM tags are also expressed as a key value pair
in the cloud template. The key setting equates to the scope setting in NSX-T and the value setting
equates to the Tag Name specified in NSX-T.
Note that if you used the vRealize Automation V2T migration assistant to migrate your cloud
accounts from NSX-V to NSX-T, including NSX-T with Policy, the migration assistant creates a
nsxSecurityTag key value pair. In this scenario, or if the nsxSecurityTag is for any reason explicitly
specified in a cloud template for use with NSX-T, including NSX-T with Policy, the deployment
creates a VM tag with an empty Scope setting with a Tag name that matches the value specified.
When you view such tags in NSX-T, the Scope column will be empty.
To avoid confusion, do not use a nsxSecurityTag key pairs when for NSX-T. If you specify an
nsxSecurityTag key value pair for use with NSX-T, including NSX-T with Policy, the deployment
creates a VM tag with an empty Scope setting with a Tag name that matches the value specified.
When you view such tags in NSX-T, the Scope column will be empty.
An app isolation policy is created with a lower precedence. If you apply multiple policies, the
policies with the higher weight will take precedence.
When you create an application isolation policy, an auto-generated policy name is generated.
The policy is also made available for reuse in other cloud template designs and iterations that
are specific to the associated resource endpoint and project. The app isolation policy name
is not visible in the cloud template but it is visible as a custom property on the project page
(Infrastructure > Administration > Projects ) after the cloud template design is deployed.
For the same associated endpoint in a project, any deployment that requires an on-demand
security group for app isolation can use the same app isolation policy. Once the policy is created,
it is not deleted. When you specify an app isolation policy, vRealize Automation searches for the
policy within the project and relative to the associated endpoint - If it finds the policy it reuses
it, if it does not find the policy, it creates it. The app isolation policy name is only visible after its
initial deployment in the project's custom properties listing.
1 In the Cloud Assembly template designer, detach the security group from all its associated
machines in the cloud template.
3 Remove the existing security group constraint tags and/or securityGroupType properties in
the template.
4 Add new security group constraint tags and/or securityGroupType properties in the
template.
5 Associate the new security group constraint tags and/or securityGroupType property
instances to the machines in the template.
Learn more
For information about using a security group for network isolation, see Security resources in
vRealize Automation.
For information about using security groups in network profiles, see Learn more about network
profiles in vRealize Automation and Using security group settings in network profiles and cloud
template designs in vRealize Automation Cloud Assembly.
For examples of using security groups in cloud templates, see Network, security, and load
balancer examples in vRealize Automation cloud templates.
You can use NSX and cloud-agnostic load balancer resources in a cloud template to control load
balancing in a deployment.
The cloud-agnostic load balancer can be deployed across multiple clouds. A cloud-specific
load balancer can specify advanced settings and features that are available only to a
specific cloud/topology. Cloud-specific properties are available in the NSX load balancer
(Cloud.NSX.LoadBalancer) resource type. If you add these properties on a cloud-agnostic load
balancer (Cloud.LoadBalancer), they are ignored if, for example, an Amazon Web Services or
Microsoft Azure load balancer is provisioned, but are respected if an NSX-V or NSX-T load
balancer is provisioned. Choose one of the available load balancer resource types based on
conditions in your vRealize Automation cloud template.
You cannot connect a load balancer resource directly to a security group resource in the design
canvas.
You add a cloud agnostic load balancer by using the Cloud Agnostic > Load Balancer resource
on the cloud template design page. The resource displays in the cloud template code as a
Cloud.LoadBalancer resource type. The default resource displays as:
Cloud_LoadBalancer_1:
type: Cloud.LoadBalancer
properties:
routes: []
network: ''
instances: []
internetFacing: false
You add an NSX load balancer by using the NSX > Load Balancer resource. The resource
displays in the cloud template code as a Cloud.NSX.LoadBalancer resource type. The default
resource displays as:
Cloud_NSX_LoadBalancer_1:
type: Cloud.NSX.LoadBalancer
properties:
routes: []
network: ''
instances: []
Note On-demand load balancers do not support the HTTPS protocol. When using an on-
demand load balancer, the HTTP protocol is used.
n Machine specification
You can specify named machine resources to participate in a load balancing pool.
Alternatively you can specify that a specific machine NIC participate in the load balancer
pool.
This option is available for the NSX load balancer resource (Cloud.NSX.LoadBalancer) only.
This option is available for existing and public network types. On-demand private , routed ,
and outbound network types are also supported.
n resource.Cloud_Machine_1.id
Specifies that the load balancer include the machine identified in the cloud template code
as Cloud_Machine_1.
n resource.Cloud_Machine_2.networks[2].id
Specifies that the load balancer only include the machine identified in the
cloud template code as Cloud_Machine_2 when it is deployed to machine NIC
Cloud_Machine_2.networks[2].
n Logging level
The logging level value specifies a severity level for the error log. The options are NONE,
EMERGENCY, ALERT, CRITICAL, ERROR, WARNING, INFO, DEBUG, and NOTICE. The logging
level value applies to all load balancers in the cloud template. This option is specific to NSX.
For load balancers that have a parent, the parent logging level setting overrides any logging
level setting in its children.
For related information, see topics such as Add Load Balancers in NSX product
documentation.
n Type
Use a load balancer type to specify a scaling size. The default is small. This option is specific
to NSX. For load balancers that have a parent, the parent type setting overrides any type
setting in its children.
n Small
n Medium
n Large
n Extra Large
For related information, see topics such as Scaling Load Balancer Resources in NSX
product documentation.
This option is available for the NSX load balancer resource (Cloud.NSX.LoadBalancer).
Use an algorithm balancing method to control how incoming connections are distributed
among the server pool members. The algorithm can be used on a server pool or directly on a
server. All load balancing algorithms skip servers that meet any of the following conditions:
n The connection limit for the maximum server pool concurrent connections is reached.
n IP_HASH
Selects a server based on a hash of the source IP address and the total weight of all the
running servers.
n LEAST_CONNECTION
n ROUND_ROBIN
Incoming client requests are cycled through a list of available servers capable of handling
the request. Ignores the server pool member weights even if they are configured. Default.
n WEIGHTED_LEAST_CONNECTION
Each server is assigned a weight value that signifies how that server performs relative to
other servers in the pool. The value determines how many client requests are sent to a
server compared to other servers in the pool. This load balancing algorithm focuses on
using the weight value to distribute the load among the available server resources fairly.
By default, the weight value is 1 if the value is not configured and slow start is enabled.
n WEIGHTED_ROUND_ROBIN
Each server is assigned a weight value that signifies how that server performs relative to
other servers in the pool. The value determines how many client requests are sent to a
server compared to other servers in the pool. This load balancing algorithm focuses on
fairly distributing the load among the available server resources.
n URI
The left part of the URI is hashed and divided by the total weight of the running servers.
The result designates which server receives the request. This ensures that a URI is
always directed to the same server if no server goes up or down. The URI algorithm
parameter has two options uriLength=<len> and uriDepth=<dep>. The length parameter
range should be 1<=len<256. The depth parameter range should be 1<=dep<10. Length and
depth parameters are followed by a positive integer number. These options can balance
servers based on the beginning of the URI only. The length parameter indicates that the
algorithm should only consider the defined characters at the beginning of the URI to
compute the hash. The depth parameter indicates the maximum directory depth to be
used to compute the hash. One level is counted for each slash in the request. If both
parameters are specified, the evaluation stops when either is reached.
n HTTPHEADER
HTTP header name is looked up in each HTTP request. The header name in parentheses
is not case-sensitive. If the header is absent or does not contain any value, the round
robin algorithm is applied. The HTTPHEADER algorithm parameter has one option
headerName=<name>.
n URL
URL parameter specified in the argument is looked up in the query string of each HTTP
GET request. If the parameter is followed by an equal sign = and a value, then the value is
hashed and divided by the total weight of the running servers. The result designates
which server receives the request. This process is used to track user identifiers in
requests and ensure that a same user ID is always sent to the same server as long as no
server goes up or down. If no value or parameter is found, then a round robin algorithm is
applied. The URL algorithm parameter has one option urlParam=<url>.
For related information, see topics such as Add a Server Pool for Load Balancing in NSX
product documentation.
n Health monitor
Use the health monitor options to test whether a server is available. Active health monitoring
for HTTP, ICMP, TCP, and UDP protocols is supported. Passive health monitoring is available
for NSX-T only.
n httpMethod
HTTP method to use to detect server status for the health check request. Methods are
GET, HOST, OPTIONS, HEAD, or PUT.
n requestBody
Health check request body content. Used, and required, by HTTP, TCP, and UDP
protocols.
n responseBody
Health check expected response body content. If the received string matches this
response body, the server is considered healthy. Used, and required, by HTTP, TCP, and
UDP protocols.
Note If you use the UDP monitor protocol, the UDP Data Sent and UDP Data Expected
parameters are required. The requestBody and responseBody properties map to these
parameters.
This option is only available for the NSX load balancer resource (Cloud.NSX.LoadBalancer).
For related information, see topics such as Configure an Active Health Monitor in NSX
product documentation.
n Health check
Use health check options to specify how the load balancer performs its heath checks.
This option is only available for the NSX load balancer resource (Cloud.NSX.LoadBalancer).
See Network, security, and load balancer examples in vRealize Automation cloud templates
for a sample of available heath check settings.
If the load balancer computes are attached to an on-demand outbound network, a load
balancer is created for the Tier-1 router of the on-demand network.
If the load balancer computes are attached to an on-demand private network, a new Tier-1
router is created and attached to the Tier-0 router specified in the network profile. The load
balancer is then attached to the Tier-1 router. The Tier-1 router VIP advertisement is enabled
if the VIP is on an existing network. If a private network is configured for DHCP, the private
network and load balancer share the Tier-1 router.
n Existing network
If the load balancer is attached to an existing network, the load balancer is created with
the Tier-1 router of the existing network. A new load balancer is created if there is no load
balancer attached to the Tier-1 router. If the load balancer already exists, new virtual servers
are attached to it. If the existing network is not attached to a Tier-1 router, a new Tier-1 router
is created and attached to a Tier-0 router defined in the network profile, the Tier-1 router VIP
advertisement is not enabled.
vRealize Automation does not support an NSX-T two-arm load balancer (inline load balancer)
on two different existing networks. Note that in a two-arm load balancer scenario, the VIP
uplink is on an existing network while the pool member machines are connected to an
on-demand network. To specify load balancing when using an existing network, you must
configure a one-arm load balancer where the same existing network is used for the load
balancer VIP and the pool member machines. However starting with vRealize Automation
8.4.2, if you are using a load balancer that you've selected in the network profile, you can
load balance between machines on two different existing networks if there is connectivity
between the two existing networks.
For network types of outbound or private, you can specify network isolation settings in a
network profile to emulate a new security group. Because machines are attached to an
existing network and isolation settings are defined in the profile, this option is similar to a load
balancer created on an existing network. The difference is that to enable the data path, the
Tier-1 uplink port IP is added to the isolation security group.
You can specify load balancer settings for NSX-associated networks by using an NSX load
balancer resource in the cloud template design.
To learn more, see VMware blog post vRA Cloud Assembly Load Balancer with NSX-T Deep Dive.
Reconfiguring logging level or type settings when multiple load balancers share an NSX-T Tier 1
or NSX-V Edge
When using a cloud template that contains multiple load balancers which share a Tier-1 router in
the NSX-T endpoint or an Edge router in the NSX-V endpoint, reconfiguring the logging level or
type settings in one of the load balancer resources does not update the settings for the other
load balancers. Mismatched settings cause inconsistencies in NSX. To avoid inconsistencies when
reconfiguring these logging level and/or type settings, use the same reconfiguration values for all
the load balancer resources in the cloud template which share a Tier 1 or Edge in their associated
NSX endpoint.
For a list of common day 2 operations that are available for cloud templates and deployments,
see What actions can I run on vRealize Automation Cloud Assembly deployments.
Learn more
For information about defining load balancer settings in a network profile, see Learn more about
network profiles in vRealize Automation
For examples of cloud template designs that include load balancers, see Network, security, and
load balancer examples in vRealize Automation cloud templates.
This procedure shows an example of how you might create a Puppet enabled deployable
resource that requires username and password authentication. Username and password access
means that the user must manually log in from the compute resource to the Puppet primary
machine in order to invoke Puppet configuration management.
Optionally, you can configure remote access authentication which sets up configuration
management in a cloud template so that the compute resource handles authentication with
the Puppet primary machine. With remote access enabled, the compute resource automatically
generates a key to satisfy password authentication. A valid username is still required.
See AWS Puppet configuration management cloud template examples and vCenter Puppet
configuration cloud template examples for more examples of how you can configure different
Puppet scenarios in vRealize Automation Cloud Assembly blueprints.
Prerequisites
n Add your Puppet Enterprise instance to vRealize Automation Cloud Assembly using the
Integrations feature. See Configure Puppet Enterprise integration in vRealize Automation
Cloud Assembly
Procedure
Username SSH and RBAC user name for Puppet User specific. YAML value is '$
primary machine. {input.username}'
Password SSH and RBAC password for Puppet User specific YAML value is '$
primary machine. {input.password}'
Use sudo commands Select to use sudo commands for the true
for this user procidd.
Description
2 Add the username and password properties to the Puppet YAML as shown in the following
example.
3 Ensure that the value for the remoteAccess property to the Puppet cloud template YAML is
set to authentication: username and password as shown in the example below.
inputs:
username:
type: string
title: Username
description: Username to use to install Puppet agent
default: puppet
password:
type: string
title: Password
default: VMware@123
encrypted: true
description: Password for the given username to install Puppet agent
resources:
Puppet-Ubuntu:
type: Cloud.vSphere.Machine
properties:
flavor: small
imageRef: >-
https://cloud-images.ubuntu.com/releases/16.04/release-20170307/ubuntu-16.04-server-cloudimg-
amd64.ova
remoteAccess:
authentication: usernamePassword
username: '${input.username}'
password: '${input.password}'
Puppet_Agent:
type: Cloud.Puppet
properties:
provider: PEMasterOnPrem
environment: production
role: 'role::linux_webserver'
username: '${input.username}'
password: '${input.password}'
host: '${Puppet-Ubuntu.*}'
useSudo: true
agentConfiguration:
certName: '${Puppet-Ubuntu.address}'
authentication of cloud
inputs:
configuration on any supported username:
Amazon Machine Image. type: string
title: Username
default: puppet
password:
type: string
title: Password
encrypted: true
default: VMware@123
resources:
Webserver:
type: Cloud.AWS.EC2.Instance
properties:
flavor: small
image: centos
cloudConfig: |
#cloud-config
ssh_pwauth: yes
chpasswd:
list: |
${input.username}:${input.password}
expire: false
users:
- default
- name: ${input.username}
lock_passwd: false
sudo: ['ALL=(ALL) NOPASSWD:ALL']
groups: [wheel, sudo, admin]
shell: '/bin/bash'
ssh-authorized-keys:
- ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQDytVL+Q6/+vGbmkXoRpX dmettem@dmettem-
m01.vmware.com
runcmd:
- echo "Defaults:${input.username} !requiretty" >> /etc/
sudoers.d/${input.username}
Puppet_Agent:
type: Cloud.Puppet
properties:
provider: PEOnAWS
environment: production
role: 'role::linux_webserver'
host: '${Webserver.*}'
osType: linux
username: '${input.username}'
password: '${input.password}'
useSudo: true
Authentication of cloud
inputs:
configuration on a custom username:
Amazon Machine Image with an type: string
existing user. title: Username
default: puppet
password:
type: string
title: Password
encrypted: true
default: VMware@123
resources:
Webserver:
type: Cloud.AWS.EC2.Instance
properties:
flavor: small
image: centos
cloudConfig: |
#cloud-config
runcmd:
- sudo sed -e 's/.*PasswordAuthentication no.*/
PasswordAuthentication yes/' -i /etc/ssh/sshd_config
- sudo service sshd restart
Puppet_Agent:
type: Cloud.Puppet
properties:
provider: PEOnAWS
environment: production
role: 'role::linux_webserver'
host: '${Webserver.*}'
osType: linux
username: '${input.username}'
password: '${input.password}'
useSudo: true
remoteAccess.authentication
inputs: {}
authentication on AWS resources:
with generatedPublicPrivateKey Machine:
acces. type: Cloud.AWS.EC2.Instance
properties:
flavor: small
imageRef: ami-a4dc46db
remoteAccess:
authentication: generatedPublicPrivateKey
Puppet_Agent:
type: Cloud.Puppet
properties:
provider: puppet-BlueprintProvisioningITSuite
environment: production
role: 'role::linux_webserver'
host: '${Machine.*}’
osType: linux
username: ubuntu
useSudo: true
agentConfiguration:
runInterval: 15m
certName: ‘${Machine.address}'
useSudo: true
Table 6-5.
password:
type: string
title: Password
encrypted: true
default: VMware@123
resources:
Puppet_Agent:
type: Cloud.Puppet
properties:
provider: PEonAWS
environment: dev
role: 'role::linux_webserver'
username: '${input.username}'
password: '${input.password}'
useSudo: true
host: '${Webserver.*}’
osType: linux
agentConfiguration:
runInterval: 15m
certName: ‘${Machine.address}'
Webserver:
type: Cloud.vSphere.Machine
properties:
cpuCount: 1
totalMemoryMB: 1024
imageRef: >-
https://cloud-images.ubuntu.com/releases/16.04/release-20170307/
ubuntu-16.04-server-cloudimg-amd64.ova
cloudConfig: |
#cloud-config
ssh_pwauth: yes
chpasswd:
list: |
${input.username}:${input.password}
expire: false
users:
- default
- name: ${input.username}
lock_passwd: false
sudo: ['ALL=(ALL) NOPASSWD:ALL']
groups: [wheel, sudo, admin]
shell: '/bin/bash'
ssh-authorized-keys:
- ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAABAQDytVL+Q6+vGbmkXoRpX
[email protected]
runcmd:
- echo "Defaults:${input.username}
The vRealize Automation on-premises product requires users to configure their own Terraform
runtime Kubernetes cluster. Only one Terraform runtime per organization is supported. All
Terraform deployments for that organization use the same runtime.
1 Verify that you have a Kubernetes cluster on which to run the Terraform CLI.
n Enterprise license users have the option to supply a kubeconfig file in order to run the
Terraform CLI on an external Kubernetes cluster.
2 If the Kubernetes cluster is newly added or modified, wait for its data collection to complete.
Data collection retrieves the list of namespaces and other information, and might take up to 5
minutes depending on provider.
3 After data collection completes, go to Infrastructure > Connections > Integrations > Add
Integration, and select the Terraform Runtime card.
4 Enter settings.
Setting Description
Runtime type (Enterprise only) Enterprise license users may select whether to run the
Terraform CLI on a Kubernetes cluster managed by vRealize
Automation or an external one.
Kubernetes cluster (all licenses) For Kubernetes managed by vRealize Automation, select the
cluster in which to run the Terraform CLI.
The cluster and its kubeconfig file must be reachable. You
can validate access to kubeconfig with a GET on /cmx/api/
resources/k8s/clusters/{clusterId}/kube-config.
This option is available for all licenses.
Kubernetes kubeconfig (Enterprise only) For external Kubernetes, paste in the entire contents of the
kubeconfig file for the external cluster.
This option is only available for Enterprise licenses.
To use an external Kubernetes runtime with a proxy server,
see How to add proxy support.
Setting Description
Kubernetes namespace Select the namespace to use within the cluster, for creating
pods that run the Terraform CLI.
CPU request Enter the amount of CPU for running containers. Default is to
250 millicores.
CPU limit Enter the maximum allowable CPU for running containers.
Default is to 250 millicores.
Memory request Enter the amount of memory for running containers. Default
is 512 MB.
Memory limit Enter the maximum allowable memory for running containers.
Default is 512 MB.
6 Click ADD.
Settings are cached. After adding the integration, you can modify settings such as the cluster or
namespace, but it might take up to 5 minutes for a change to be detected and for the Terraform
CLI to run under the new settings.
Validation fails with an error You modified the cluster but left the Always reselect a namespace after
stating that the namespace is previous namespace in the UI. modifying the cluster selection.
invalid.
The namespace drop down is Data collection for the cluster has For a new cluster with existing namespaces,
empty or doesn't list newly not completed. Data collection takes wait up to 5 minutes for data collection to
added namespaces. up to 5 minutes after entering or complete.
modifying the cluster and up to 10 For a new namespace in an existing cluster,
minutes when entering or modifying wait up to 10 minutes for data collection to
the namespace. complete.
If the problem continues, remove the
cluster and re-add it under Infrastructure >
Resources > Kubernetes.
Terraform CLI containers are The Kubernetes API client used by Changes might need up to 5 minutes to take
created in a previous cluster, vRealize Automation is cached for 5 effect.
previous namespace, or with minutes.
previous runtime settings, even
after the integration account
was updated.
Validation or a Terraform Sometimes these errors occur The kubeconfig error can occur for a
deployment operation fails with because the cluster isn't reachable number of reasons and might require
an error stating that kubeconfig from vRealize Automation. engagement with technical support for
is not available. In other cases, user credentials, troubleshooting.
tokens, or certificates are invalid.
3 In the new folder, add the following lines to a new file named Dockerfile.
4 Modify the placeholder values so that the https_proxy and http_proxy environment variables
include the proxy server settings that you use to access the internet.
The protocol will be http or https according to what your proxy server uses, which might not
match the environment variable name of https_proxy or http_proxy.
6 From the empty folder, run the following command. Depending on your account privileges,
you might need to run the command in sudo mode.
7 In vRealize Automation Cloud Assembly, under Infrastructure > Connections > Integrations,
go to your Terraform runtime integration.
8 Create or edit the runtime container settings to use the custom-terraform-runtime:1.0 image:
This process assumes that you have your own Docker registry and can access its repositories
without an internet connection.
The following Dockerfile shows an example of creating a custom image with the Terraform
GCP provider.
Firewall settings or proxy settings can cause the image build to fail. You might need to enable
temporary access to releases.hashicorp.com to download the Terraform provider plug-in
binaries. However, you may use your private registry to supply the plug-in binaries as an
option.
# Download and unzip all required provider plug-ins from hashicorp to provider directory
RUN cd $plugins \
&& wget -q https://releases.hashicorp.com/terraform-provider-google/3.58.0/terraform-provider-
google_3.58.0_linux_amd64.zip \
&& unzip *.zip \
&& rm *.zip
# For "terraform init" configure terraform CLI to use provider plug-in directory and not download
from internet
ENV TF_CLI_ARGS_init="-plugin-dir=$plugins -get-plugins=false"
2 Build, tag, and push the custom container image to your own Docker repository.
3 In vRealize Automation Cloud Assembly, under Infrastructure > Connections > Integrations,
go to your Terraform runtime integration.
4 Create or edit the runtime container settings to add your repository for the custom container
image. The example built custom container image name is registry.ourcompany.com/project1/
image1:latest.
4 Create or edit the Terraform version so that it includes the URL to the Terraform CLI binaries
hosted on your local web server.
To get started, see Preparing for Terraform configurations in vRealize Automation Cloud
Assembly.
Troubleshooting
When deploying, open the deployment in vRealize Automation Cloud Assembly. Under the
History tab, look for Terraform events, and click Show Logs to the right. When your local
Terraform provider is working, the following messages appear in the log.
For a more robust log, you can manually edit the cloud template code to add TF_LOG: DEBUG as
shown in the following example.
resources:
terraform:
type: Cloud.Terraform.Configuration
properties:
providers:
- name: google
# List of available cloud zones: gcp/us-west1
cloudZone: gcp/us-west1
environment:
# Configure terraform CLI debug log settings
TF_LOG: DEBUG
terraformVersion: 0.12.29
configurationSource:
repositoryId: fc569ef7-f013-4489-9673-6909a2791071
commitId: 3e00279a843a6711f7857929144164ef399c7421
sourceDirectory: gcp-simple
1 Prerequisites
Prerequisites
For the vRealize Automation on-premises product to run Terraform operations, you need the
Terraform runtime integration. See Preparing a vRealize Automation Cloud Assembly Terraform
runtime environment.
n Bitbucket on-premises
In your version control repository, create a default directory with one layer of subdirectories,
each with Terraform configuration files. Create one subdirectory per Terraform configuration.
1 Default directory
Don't include a Terraform state file with configuration files. If terraform.tfstate is present,
errors occur during deployment.
In the project Provisioning tab, enable Allow Terraform cloud zone mapping.
Even though credentials are securely transmitted, for additional security, you should leave the
option deactivated if project users don't need to deploy to a cloud account.
Add an integration to the repository offering type where you stored the Terraform
configurations: GitHub, GitLab, or Bitbucket.
When you add your project to the integration, select the Terraform Configurations type, and
identify the repository and branch.
1 Prerequisites
Prerequisites
Set up and integrate your version control repository. See Preparing for Terraform configurations
in vRealize Automation Cloud Assembly.
To create the list of allowable versions, go to Infrastructure > Configure > Terraform Versions.
1 In vRealize Automation Cloud Assembly, go to Design > Cloud Templates and click New from
> Terraform.
3 Click Create.
The Terraform resource appears on the cloud template canvas, with vRealize Automation
Cloud Assembly code that reflects the Terraform configuration to deploy.
If desired, you can add other vRealize Automation Cloud Assembly resources to the cloud
template, to combine Terraform and non-Terraform code into a hybrid design.
Note Updating Terraform configurations in the repository doesn't synchronize the changes
into your cloud template. Automatic synchronization can introduce security risks, such as newly
added sensitive variables.
To capture Terraform configuration changes, rerun the wizard, choose the new commit, and
identify any new sensitive variables.
Approvals—In addition to the expected Terraform phases such as PLAN, ALLOCATE, or CREATE,
vRealize Automation Cloud Assembly introduces governance by means of an approval phase.
See How do I configure Service Broker approval policies for more information about request
approvals.
After deploying, you see an outer resource that represents the overall Terraform component,
with child resources inside for the separate components that Terraform created. The parent
Terraform resource controls the lifecycle of the child resources.
1 In your git repository, add a Terraform configuration source file that references the secret
properties as variables.
In this Terraform configuration source example, API and application keys are the secret
variables.
variable "datadog_api_key" {
description = "Datadog API Key"
}
variable "datadog_app_key" {
description = "Datadog App Key"
}
provider "datadog" {
api_key = "${var.datadog_api_key}"
app_key = "${var.datadog_app_key}"
}
2 In vRealize Automation Cloud Assembly, go to Infrastructure > Administration > Secrets, and
enter your secret property values.
Add secret names and corresponding values. For the names, it's easiest to simply enter the
same name as the variable name from your Terraform source.
If needed, see How to create and reference a secret vRealize Automation Cloud Assembly
property for more details.
3 In vRealize Automation Cloud Assembly, import the Terraform configuration for use in a cloud
template.
Go to Design > Cloud Templates and click New From > Terraform.
Note Even though the variables appear for selection on the last page of the wizard, you do
not need to set the secret variables as sensitive. Secret vRealize Automation Cloud Assembly
variables will already be encrypted and do not need the encryption that the wizard applies.
The example cloud template should look similar to the following code:
inputs:
datadog_api_key:
type: string
description: Datadog API Key
datadog_app_key:
type: string
description: Datadog App Key
resources:
terraform:
type: Cloud.Terraform.Configuration
properties:
variables:
datadog_api_key: '${input.datadog_api_key}'
datadog_app_key: '${input.datadog_app_key}'
providers: []
terraformVersion: 0.12.29
configurationSource:
repositoryId: 0fbf8f5e-54e1-4da3-9508-2b701gf25f51
commitId: ed12424b249aa50439kr1c268942a4616bd751b6
sourceDirectory: datadog
4 In the code editor, for the secret values, manually change input to secret as shown.
terraform:
type: Cloud.Terraform.Configuration
properties:
variables:
datadog_api_key: '${secret.datadog_api_key}'
datadog_app_key: '${secret.datadog_app_key}'
5 In the inputs: section of the code, remove the input entries that were replaced by the
bindings to secret properties.
In addition, the TEST button doesn't validate commit IDs associated with Terraform
configurations.
n The recently released Terraform version 0.13 isn't officially supported yet.
n For a cloud template that includes Terraform configurations, cloning the template to a
different project requires the following workaround.
a In the new project, under the Integrations tab, copy the repositoryId for your integration.
b Open the clone template. In the code editor, replace the repositoryId with the one you
copied.
n In the version control repository, don't include a Terraform state file with configuration files. If
terraform.tfstate is present, errors occur during deployment.
For child resources in a Terraform configuration, only the following subset of day 2 actions are
supported. For details about the actions, look them up in the comprehensive list of actions at
What actions can I run on vRealize Automation Cloud Assembly deployments.
Power Off
Reboot
Reset
Power Off
Restart
Suspend
Power Off
Reboot
Reset
Shutdown
Suspend
Create Snapshot
Delete Snapshot
Revert Snapshot
Power Off
Create Snapshot
Delete Snapshot
A Terraform resource does not The action might not be supported for the Check the provider and
have an expected OOTB day 2 provider and resource type as mentioned in the resource type in the design.
action on the Actions menu. previous list. Wait up to 20 minutes for data
Alternatively, the action might need up to collection to complete.
20 minutes to appear due to the timing of
resource discovery and resource caching.
A Terraform resource does not A resource discovery problem is preventing the Check the project cloud zones
have an expected day 2 action action from appearing. against the cloud zones in the
even after the 20 minutes to One way that happens is when the resource is design.
account for data collection. accidentally created on an out-of-project cloud Go to Infrastructure >
zone. For example, your project only includes Connections > Cloud
a cloud account and region us-east-1 cloud Accounts and check the data
zone, but the Terraform configuration includes collection status and last
a provider block for us-west-1, and you didn't successful collection time for
change it at design time. the cloud account.
Another possibility is that data collection isn't
working.
Even though there are no obvious Occasional, intermittent timing issues and data The problem should resolve
problems with the resource state collection failures are known to occur. itself within 20 minutes.
and data collection, a day 2 action
is deactivated (gray).
The wrong day 2 action is Data collection timing can cause a temporary Wait up to 20 minutes.
deactivated, one that should be mismatch. If you change the power state from
active based on the resource state. outside vRealize Automation, it takes time to
For example, Power Off is enabled, correctly reflect the change.
and Power On is deactivated, even
though the resource was powered
off using the provider interface.
1 Under the default Terraform directory in your git version control repository, add the following
subdirectory structure.
terraform.d/plugins/linux_amd64
By default, terraform init will search that directory for custom provider plug-ins.
Note VMware has seen cases where a custom Terraform provider fails to run and posts a no
such file or directory message.
If that happens, try recompiling your custom provider Go binaries with CGO deactivated (set to
zero). CGO is for Go packages that call C code.
For a project-based example, imagine that you are a project administrator for a Big Data effort.
To assist your team, you locate a Marketplace Hadoop template that you add to the team
project. You then customize the cloud template for your resource environment, and release it.
Then, you import the template into the vRealize Automation Service Broker catalog so that your
team can deploy it.
Continuing with the previous example, your team might need access to a version of Hadoop
itself. You download a Hadoop OVF and add it to cloud account resources such as a vCenter
Server Content Library. You then update any template code that needs to point to the OVF
image.
The deployments include deployed cloud templates and onboarded resources. It is also possible
for resources that are created using the IaaS API to appear as deployments.
If you manage a small number of deployments, the deployment cards provide a graphical view
for managing them. If you manage a large number of deployments, the deployment list and the
resource list provide more a more robust management view.
For example, you can filter based on owner, projects, lease expiration date, or other filtering
options. Or you might want to find all the deployments for two projects with a particular tag.
When you construct the filter for the projects and tag example, the results conform to the
following criteria: (Project1 OR Project2) AND Tag1.
The values that you see in the filter pane depend on the current deployments that you have
permission to view or manage.
Most of the filters and how to use them are relatively obvious. Additional information about
some of these filters is provided below.
4 Switch between the deployment card and the deployment list views.
You can also see deployment costs, expiration dates, and status.
You can switch between the card and list view in the upper right of the page, to the right of
the Sort text box. You can use the list view to manage a large number of deployments on fewer
pages.
Optimizable Resources Only If you integrated vRealize Operations Manager and are
using the integration to identify reclaimable resources,
you can toggle on the filter to limit the list of qualifying
deployments.
Deployment Lifecycle Status The Deployment Lifecycle Status and Last Request
Status filters can be used individually or in combination,
particularly if you manage a large number of
deployments. Examples are included at the end of the
Last Request Status section below.
Deployment Lifecycle Status filters on the current state of
the deployment based on the management operations.
This filter is not available for deleted deployments.
The values that you see in the filter pane depend on the
current state of the listed deployments. You might not
see all possible values. The following list includes all the
possible values. Day 2 actions are included in the Update
status.
n Create - Successful
n Create - In Progress
n Create - Failed
n Update - Successful
n Update - In Progress
n Update - Failed
n Delete - In Progress
n Delete - Failed
Last Request Status filters Last Request Status filters on the last operation or action
that ran on the deployment.
This filter is not available for deleted deployments.
The values that you see in the filter pane depend on the
last operations that ran on the listed deployments. You
might not see all possible values. The following list is all of
the possible values.
n Pending. The first stage of a request where the action
is submitted but the deployment process has not yet
started.
n Failed. The request experienced a failure during any
stage of the deployment process.
n Cancelled. The request was cancelled by a user while
the deployment process was processing and not yet
completed.
n Successful. The request successfully created,
updated, or deleted a deployment.
n In Progress. The deployment process is currently
running. Additional deployment states, for example,
Similar to the deployment list view, you can filter the list, select a resource type, search , sort, and
run actions.
If you click the resource name, you can work with the resource in the context of the deployment
details.
You can locate and manage your deployments using the card list. You can filter or search for
specific deployments, and then run actions on those deployments.
n How do I manage the life cycle of a completed vRealize Automation Cloud Assembly
deployment
Procedure
1 Click Deployments and locate your deployment card using the filter and search, if needed.
If the deployment is in progress, the process bar indicates the number of tasks remaining.
If the deployment completed successfully, the card displays the basic details about the
deployment.
If an approval policy is triggered for your request, you might see the request in an in progress
state with the name of at least one approver. Approval policies are defined in vRealize
Automation Service Broker by your administrator. The approvers are defined in the policy.
The approvers approve requests in vRealize Automation Service Broker. You might also
encounter approvals on day 2 actions.
3 To determine where your resources were deployed, click the deployment name and review
the details on the Topology page.
You will likely need the IP address for the primary component. As you click on each
component, notice the information provided that is specific to the component. In this
example, the IP address is highlighted.
The availability of the external link depends on the cloud provider. Where it is available, you
must have the credential on that provider to access the component.
What to do next
n You can make changes to your deployment. See How do I manage the life cycle of a
completed vRealize Automation Cloud Assembly deployment.
n If your deployment fails, see What can I do if a vRealize Automation Cloud Assembly
deployment fails.
You use this workflow to begin your investigation. The process might reveal that the failure was
due to a transient environmental problem. Redeploying the request after verifying the conditions
have improved resolves this type of problem. In other cases, your investigation might require you
to examine other areas in detail.
As a project member, you can review the request details in vRealize Automation Cloud Assembly.
Procedure
1 To determine if a request failed, click the Deployments tab and locate the deployment card.
b For more information, click the deployment name for the deployment details.
a Review the event tree to see where the provisioning process failed. This tree is useful
when you modify a deployment, but the change fails.
The tree also shows when you run deployment actions. You can use the tree troubleshoot
failed changes.
c If the requested item was a vRealize Automation Cloud Assembly cloud template, the link
to the right of the message opens vRealize Automation Cloud Assembly so that you can
see the Request Details.
3 The Request Details provides the provisioning workflow for failed components so that you
can research the problem.
View and filter deleted deployment history for up to 90 days after deletion
b You can turn on the Dev mode to switch between the simple provisioning workflow and a
more detailed flowchart.
The errors might be in the template construction or they might be related to how your
infrastructure is configured.
What to do next
When the errors are resolved and the cloud template is deployed, you can see information
similar to the following example in the Request Details. To see the request details, select
Infrastructure > Activity > Requests.
Procedure
You use the deployment details to understand how the resources are deployed and what
changes have been made. You can also see pricing information, the current health of the
deployment, and if you have any resources that need to be modified.
n Topology tab. You can use the Topology tab to understand the deployment structure
and resources.
n History tab. The History tab includes all the provisioning events and any events related to
actions that you run after requested item is deployed. If there are any problems with the
provisioning process, the History tab events will help you with troubleshoot the failures.
n Pricing tab. You can use the pricing card to understand how much your deployment is
costing your organization. Pricing information is based on vRealize Operations Manager or
CloudHealth integrations.
n Monitor tab. The Monitor tab data provides information about the health of your
deployment based on data from vRealize Operations Manager.
n Alerts tab. The Alerts tab provides active alerts on the deployment resources. You can
dismiss the alert or add reference notes. The alerts are based on data from vRealize
Operations Manager.
n Optimize tab. The Optimize tab provides utilization information about your deployment
and offers suggestions for reclaiming or otherwise modifying the resources to optimize
resource consumption. The optimization information is based on data from vRealize
Operations Manager.
3 If you determine that a deployment is too costly in its current configuration and you want to
resize a component, select the component on the topology page and then select Actions >
Resize on the component page.
The available actions depend on the component, the cloud account, and your permissions.
4 As part of your development life cycle, one of your deployments is no longer needed. To
remove the deployment and reclaim resources, select Actions > Delete.
5 To view your deleted deployments, click the filter on the Deployments tab, and then turn on
Deleted Deployments Only toggle.
The list of deployments is now limited to those that are deleted. You might want to review
the history of a particular deployment. For example, to retrieve the name of a deleted
machine.
What to do next
To learn more about possible actions, see What actions can I run on vRealize Automation Cloud
Assembly deployments.
The available actions also depend on what your administrator entitled you to run.
As an administrator or project administrator, you can set up Day 2 Actions policies in vRealize
Automation Service Broker. See How do I entitle consumers to Service Broker day 2 action
policies
You might also see actions that are not included in the list. These are likely custom actions added
by your administrator. For example, a How to create a vRealize Automation Cloud Assembly
resource action to vMotion a virtual machine.
Add Disk Machines n Amazon Web Service Add additional disks to existing virtual machines.
n Google Cloud Platform If you add a disk to an Azure machine, the persistent disk
n Microsoft Azure or non-persistent disk is deployed in the resource group
that includes the machine.
n VMware vSphere
When you add a disk to an Azure machines, you can also
encrypt the new disk using the Azure disk encryption set
configured in the storage profile.
When you add a disk to vSphere machines, you can select
the SCSI controller, the order of which was set in the
cloud template and deployed. You can also specify the
unit number for the new disk. You cannot specify a unit
number without a selected controller. If you do not select
a controller or provide a unit number, the new disk is
deployed to first available controller and assigned then
next available unit number on that controller.
If you add a disk to a vSphere machine for a project
with defined storage limits, the added machine is not
considered as part of the storage limits. Only resized disks
are considered.
If you use VMware Storage DRS (SDRS) and the datastore
cluster is configured in the storage profile, you can add
disks on SDRS to vSphere machines.
Cancel n Deploym n Amazon Web Service Cancel a deployment or a day 2 action on a deployment
ents n Google Cloud Platform or a resource while the request is being processed.
n Various n Microsoft Azure You can cancel the request on the deployment card or in
resource the deployment details. After you cancel the request, it
n VMware vSphere
types in appears as a failed request on the Deployments tab. Use
deploym the Delete action to release any deployed resources and
ents clean up your deployment list.
Canceling a request that you think has been running
too long is one method for managing deployment time.
However, it is more efficient to set the Request Timeout
in the projects. The default timeout is two hours. You
can set if for a longer period of time if the workload
deployment for a project requires more time.
Change Deployment n Amazon Web Service Change the lease expiration date and time.
Lease s n Microsoft Azure When a lease expires, the deployment is destroyed and
n VMware vSphere the resources are reclaimed.
Lease policies are set in vRealize Automation Service
Broker.
Change Deployment n Amazon Web Service Changes to deployment owner to the selected user. The
Owner s n Google Cloud Platform selected user must be a member of the same project that
deployed the request.
n Microsoft Azure
If you want to assign a service administrator or project
n VMware vSphere
administrator as the owner, you must add them as a
project member.
When a cloud template designer deploys a template, the
designer is both the requester and the owner. However, a
requester can make another project member the owner.
You can use policies to control what an owner can do
with a deployment, giving them permissions that are more
restrictive or less restrictive.
Change Deployment n Amazon Web Service The change project action is only available for
Project s n Google Cloud Platform deployments with onboarded resources. The onboarded
deployments can include only machines and disks. The
n Microsoft Azure
action is not available for deployed cloud templates nor
n VMware vSphere
migrated deployments.
If you make any changes to the deployment resources, for
example, add a disk, you cannot run the change project
action.
Change the project of an onboarded deployment. This
action allows you to change individual deployments from
the onboarding project to a different project.
Action constraints:
n The initiating user must have permission to run the
change project action.
n If you are an administrator moving the deployment,
you could move the deployment to a project where
the owner is not a member and therefore loses
access. You can add the user to the target project or
move the deployment to a project where they are a
member.
n The target project cloud zones must be the same as
the source project cloud zones. If they are not, any
future day 2 actions involving cloud account / region
resources that you run might not work.
Change Machines n VMware vSphere You can associate and dissociate security groups with
Security machine networks in a deployment. The change action
Groups applies to existing and on-demand security groups for
NSX-V and NSX-T. This action is available only for single
machines, not machine clusters.
To associate a security group with the machine network,
the security group must be present in the deployment.
Dissociating a security group from all networks of all
machines in a deployment does not remove the security
group from the deployment.
These changes do not affect security groups applied as
part of the network profiles.
This action changes the machine's security group
configuration without recreating the machine. This is a
non-destructive change.
n To change the machine's security group configuration,
select the machine in the topology pane, then click
the Action menu in the right pane and select Change
Security Groups. You can now add or remove the
association on the security groups with the machine
networks.
Connect Machines n VMware vSphere Open a remote session on the selected machine.
to Review the following requirements for a successful
Remote connection.
Console n As a deployment consumer, verify that the
provisioned machine is powered on.
Create Machines n Microsoft Azure Create a snapshot of a virtual machine disk or a storage
Disk and disks disk.
Snapsho n For machines, you create snapshots for individual
t machine disks, including boot disk, image disks, and
storage disks.
n For storage disks, you create snapshots of
independent managed disks, not unmanaged disks.
In addition to providing a snapshot name, you can also
provide the following information for the snapshot:
n Incremental Snapshot. Select the check box to create
a snapshot of the changes since the last snapshot
rather full snapshot.
n Resource Group. Enter the name of the target
resource group where you want to create the
snapshot. By default, the snapshot is created in the
same resource group that is used by the parent disk.
n Encryption Set Id. Select the encryption key for the
snapshot. By default, the snapshot is encrypted with
the same key that is used by the parent disk.
n Tags. Enter any tags that will help you manage the
snapshots in Microsoft Azure.
Create Machines n Google Cloud Platform Create a snapshot of the virtual machine.
Snapsho n VMware vSphere If you are allowed only two snapshots in vSphere and you
t already have them, this command is not available until you
delete a snapshot.
NSX n NSX Delete the NAT port forwarding rules from an NSX-T or
Gateway NSX-V gateway.
Machines n Amazon Web Service Delete a machine or load balancer from a deployment.
and load n Microsoft Azure This action might result in an unusable deployment.
balancers n VMware vSphere
n VMware NSX
Security n NSX-T If the security is not associated with any machine in the
groups n NSX-V deployment, the process removes the security group from
the deployment.
n If the security group is on-demand, then it is
destroyed on the endpoint.
n If the security group is shared, the action fails.
Delete Machines n Microsoft Azure Delete an Azure virtual machine disk or managed disk
Disk and disks snapshot.
Snapsho This action is available when there is at least one
t snapshot.
Edit Deployment n Amazon Web Service Add or modify resource tags that are applied to individual
Tags s n Microsoft Azure deployment resources.
n VMware vSphere
Get Terraform n Amazon Web Service Display the Terraform state file.
Terrafor Configuratio n Google Cloud Platform To view any changes that were made to the Terraform
m State n machines on the cloud platforms that they were deployed
n Microsoft Azure
on and update the deployment, you first run the Refresh
n VMware vSphere
Terraform State action, and then run this Get Terraform
State action.
When the file is displayed in a dialog box. The file is
available for approximately 1 hour before you need to run
a new refresh action. You can copy it if you need it for
later.
You can also view the file on the deployment History tab.
Select the Get Terraform State event on the Events tab,
and then click Request Details. If the file is not expired,
click View content. If the file is expired, run the Refresh
and Get actions again.
Power Deployment n Amazon Web Service Power off the deployment without shutting down the
Off s n Microsoft Azure guest operating systems.
n VMware vSphere
Machines n Amazon Web Service Power off the machine without shutting down the guest
n Google Cloud Platform operating systems.
n Microsoft Azure
n VMware vSphere
Power Deployment n Amazon Web Service Power on the deployment. If the resources were
On s n Microsoft Azure suspended, normal operation resumes from the point at
which they were suspended.
n VMware vSphere
Machines n Amazon Web Service Power on the machine. If the machine was suspended,
n Google Cloud Platform normal operation resumes from the point at which the
machine was suspended.
n Microsoft Azure
n VMware vSphere
Reboot Machines n Amazon Web Service Reboot the guest operating system on a virtual machine.
n VMware vSphere For a vSphere machine, VMware Tools must be installed
on the machine to use this action.
Reconfig Load n Amazon Web Service Change the load balancer size and logging level.
ure Balancers n Microsoft Azure You can also add or remove routes, and change the
n VMware NSX protocol, port, health configuration, and member pool
settings.
For NSX load balancers, you can enable or disable the
health check and modify the health options. For NSX-T,
you can set the check to active or passive. NSX-V does
not support passive health checks.
NSX n NSX-T Add, edit, or delete the NAT port forwarding rules from an
Gateway n NSX-V NSX-T or NSX-V gateway.
port
forwarding
Refresh Terraform n Amazon Web Service Retrieve the latest iteration of the Terraform state file.
Terrafor Configuratio n Google Cloud Platform To retrieve any changes that were made to the Terraform
m State n machines on the cloud platforms that they were deployed
n Microsoft Azure
on and update the deployment, you first run this Refresh
n VMware vSphere
Terraform State action.
To view the file, run the Get Terraform State action on the
configuration.
Use the deployment history tab to monitor the refresh
process.
Remove Machines n Amazon Web Service Remove disks from existing virtual machines.
Disk n Google Cloud Platform If you run the day 2 action on a deployment that is
n Microsoft Azure deployed as vSphere machines and disks, the disk count
is reclaimed as it applies to project storage limits. The
n VMware vSphere
project storage limits do not apply to additional disks that
you added after deployment as a day 2 action.
Reset Machines n Amazon Web Service Force a virtual machine restart without shutting down the
n Google Cloud Platform guest operating system.
n VMware vSphere
Resize Machines n Amazon Web Service Increase or decrease the CPU and memory of a virtual
n Microsoft Azure machine.
Resize Machines n Amazon Web Service Increase or decrease the size of your boot disk medium.
Boot n Google Cloud Platform If you run the day 2 action on a deployment that is
Disk deployed as vSphere machines and disks, and the action
n Microsoft Azure
fails with a message similar to “The requested storage
n VMware vSphere
is more than the available storage placement,” it is likely
due to the defined storage limits on your vSphere VM
templates that are defined in the project. The project
storage limits do not apply to additional disks that you
added after deployment as a day 2 action.
Resize Storage disk n Amazon Web Service Increase the capacity of a storage disk.
Disk n Google Cloud Platform If you run the day 2 action on a deployment that is
deployed as vSphere machines and disks, and the action
fails with a message similar to “The requested storage
is more than the available storage placement,” it is likely
due to the defined storage limits on your vSphere VM
templates that are defined in the project. The project
storage limits do not apply to additional disks that you
added after deployment as a day 2 action.
Machines n Amazon Web Service Increase or decrease the size of disks included in the
n Google Cloud Platform machine image template and any attached disks.
n Microsoft Azure
n VMware vSphere
Restart Machines n Microsoft Azure Shut down and restart a running machine.
Revert to Machines n Google Cloud Platform Revert to a previous snapshot of the machine.
Snapsho n VMware vSphere You must have an existing snapshot to use this action.
t
Run Managed n Puppet Enterprise Run the selected task on machines in your deployment.
Puppet resources The tasks are defined in your Puppet instance. You
Task must be able to identify the task and provide the input
parameters.
Shutdow Machines n VMware vSphere Shut down the guest operating system and power off the
n machine. VMware Tools must be installed on the machine
to use this action.
Suspend Machines n Microsoft Azure Pause the machine so that it cannot be used and does not
n VMware vSphere consume any system resources other than the storage it
is using.
Update Deployment n Amazon Web Service Change the deployment based on the input parameters.
s n Microsoft Azure For an example, see How to move a deployed machine to
n VMware vSphere another network.
If the deployment is based on vSphere resources, and the
machine and disks include the count option, storage limits
defined in the project might apply when you increase
the count. If the action fails with a message similar
to “The requested storage is more than the available
storage placement,” it is likely due to the defined storage
limits on your vSphere VM templates that are defined in
the project. The project storage limits do not apply to
additional disks that you added after deployment as a day
2 action.
Update Machines n Amazon Web Service Add, modify, or delete a tag that is applied to an
Tags and disks n Microsoft Azure individual resource.
n VMware vSphere
Unregist Machines n Amazon Web Service The unregister action is only available for onboarded
er n Google Cloud Platform deployment machines.