VCD RoundTable

Episode 13 - Revolutionizing Networking with VCD 10.5: Deep Dive into NSX and Upcoming Events

August 10, 2023 vCD RoundTable Team Season 2023 Episode 13
VCD RoundTable
Episode 13 - Revolutionizing Networking with VCD 10.5: Deep Dive into NSX and Upcoming Events
Show Notes Transcript Chapter Markers

Ready to revolutionize your networking game? We've got a phenomenal session in store that's chock-full of insights on the incredible new networking features of VCD 10.5. From the NSX Federation and self-service HTTP policies for tenants to the magic of NSX Advanced Load Balancer, this episode is a treasure trove of networking knowledge. We'll also talk about the support for up to four NSX manager instances in a single virtual data center group, and what it means for you. Plus, we'll discuss upcoming conferences such as VMware Explorer and how you can connect with us there.

But that's not all. We've taken a deep dive into the world of NSX, discussing the boons of stateless T0 and how it can be configured in an active-active manner. We also explore the limitations of configuring a NAT rule and why the NSX V2T migration is so critical. We wrap up with a sneak peek into our forthcoming sessions featuring Sascha's take on CSE, Tanzu, and their integrations, and Alain's special on Showback, Chargeback, Aria Operations. This episode is a must-listen for all network professionals and tech enthusiasts. Listen in, and elevate your networking know-how to new heights!

Speaker 1:

Hello and welcome to another episode of the VCD Roundtable. After our last episode, where we covered everything new around VCD 10.5, today's session is exclusively around VCD and networking and all the new good and fancy features we get with version 10.5 and some of the features which came before and which we just wanted to recap a bit and talk a bit about Before we get started. A reminder VCD not VCD VMware Explorer is just around the corner, in a few weeks in Las Vegas and then a couple of months back in Barcelona. We'd like to meet up with everybody, so reach out to us on social media and then we can see what we can do at one of these conferences to get together. With that being said, who's on the session today? Let me get started with myself. I know that's not how you should do it, but it's the easiest way around. My name is Steve Sanford. I'm CEO of the Common Division Group, one of the lead architects around anything, service provider and cloud director in our team. I'm more focused on the business side how we do product packaging and a bunch of other things, but also when it comes to, let's say, the more legacy designs. With that being said, I'm handing over to Sascha for his introduction for today Hi my name is Sascha Schwung.

Speaker 2:

I'm a partner and cloud architect at Common Division doing a lot of stuff about architecture of cloud, director environments, Greenfield, V2T, migrations and also the Tanzu stuff. So container service extension and so on. I will hand over to Tobi.

Speaker 3:

My name is Tobi Barschek. I'm a solution architect and partner at Common Division main focus on the whole networking story. So Steven, nsx, nsx-lb, but also, on the other hand, the whole cloud director story and I would like to hand over to Matthias.

Speaker 4:

Hi, I'm Matthias partner, common Division cloud architect, focusing on VCD, nsx and the automation around those products. I love that one legacy architecture. If you believe that VCD-1.5, I go to Inkvines. Don't worry, joach, please continue yeah.

Speaker 5:

I'm not zero. Oh my that old. I'm Joach Leib. I'm a technical product manager at VMware, covering cloud director and all the different integrations and extensions that we have, and with that back to you.

Speaker 1:

Yves, good, yeah. So VCD since version 1.0, I remember the early, early, early, early, early days. Back then we thought it's the perfect tool for enterprises and commercial. Now we think it's the perfect tool for the first providers and we try to get away from the other ones, but they'll still think it's a mistake. But anyways, nevertheless, let's talk about the networking pieces of NSX-10.5. And let me just throw out one of the items which we started to cover already in the 10.5 what's New session the NSX Federation piece and VDC groups and everything else. So who's going to pick up that topic to be first? Because I guess it's better that I'm not talking about that one.

Speaker 3:

Yeah, and I will start. So we have now, finally, the whole support for NSX Federation. So what does this mean? On one hand, we have now the ability to import more than one NSX manager into our VCD environment, what is not really 100% true, because at the end, we need to have the whole Federation configured outside of our cloud director environment and then we need just to import the global Federation manager node to our VCD and VCD will now be able to discover hey, okay, this is a federated environment and he can then utilize the NSX Federation environment in his data center groups. And this is already one important part of what we need. To be fair, we need it mainly since NSX T or now the final name is just NSX4 is there to be able to utilize the distributed firewall and stuff like this. So we need to go with a clear data center group, absolutely independent if we just have one or VDC or if we have multiple organization. Virtual data centers. Federation also is only supported If we have the ability to utilize data center groups and NSX Federation. There is one limitation that's called limitation we can only have at the moment. We can only have up to four NSX manager instances in a single virtual data center group, which means more than four locations with different managed by dedicated NSX environments, are currently not supported inside Cloud Director. I'm not really have the limit out of my head what is supported from an NSX team perspective, but I have something in mind up to eight, I think up to eight environments are currently supported in Federation from an NSX point of view. From a Cloud Director point of view, in a single organization, we see we can have up to four NSX manager instances. So we have now a clear possibility to really support availability groups fully separated, not what we have done mainly in the past, saying okay, we have our regions and we have our availability zones, but at the end we have just a single NSX environment stretched across the regions, stretched across availability zones. We can now really have dedicated environments in each region, each availability zone, and then have the global NSX Federation supported inside Cloud Director. So that's the starting point and, from my perspective, one of the biggest improvements regarding the whole networking story in 10.5. Sarsha, would you like to add something?

Speaker 2:

No, I think yeah, federation use that, all about it and it will become very interesting for most of the customers. I want to add the parts that NSX Advanced Load Balancer. So now with 10.5, we have the self-service HTTP policies so that tenants or customers can manage their own policies. So with the starting of NSX ALB we had it still as a provider managed service so the provider can configure all the HTTP policies, but now with 10.5, all tenants are able to configure their own HTTP policies over Cloud Director and I think that is a very important part in the first step to really use the load balancer with more features than only load balancing. Though that was a big question in the last months from customers and service providers, because many service providers said I don't want to manage this for the customers or I'm not able to manage all of this for the customers, and now we have it that the customer can do it by self-service and from my perspective, that is the first step in the right direction to give the customers more options to configure their load balancers and I hope there will become more features added to the self-service over Cloud Director from NSX ALB.

Speaker 4:

Yes, maybe coming back a little bit on this exploration, because what Toby mentioned is the whole story about availability zones and if you have a federated infrastructure, from my perspective the combination with VCDA enables customers or tenants to build a new product. I can build my own self-service asynchronous replication from one availability zone to another without re-IPing my systems if I need to start to fail over and stuff. I think that's an interesting new approach, especially for service providers, and repackage or provide new products to their customers. So I think that kind of business thinking will change products we will see provided by SAPs in the future. Yeah, in terms of additional features in the networking space, I would like to go the firewall part, because what many tenants or what service providers told me what many tenants are asking for? How can I add an IP address into a firewall rule as a source or destination? So in the good old days it was not possible because you just had to add the IP address into a group and so on and so forth. Now with TEN5 and the new UI, we have the ability to add individual IP addresses as a source and or destination into a firewall rule and I think that's a really nice improvement enabling tenants creating more granular firewall rules to improve their security. I think that adds a lot of easier management of firewall rules sets.

Speaker 5:

Yeah, there are some additional improvements in the firewall UI. That's something where we get a lot of feedback, of course, from partners, service provider partners and their customers. So, for example, it's easier to order specific rules in the firewall UI now, and just that handling gets better and better and there's also one pretty huge improvement for when it comes to the firewall rules. So from a VCD product perspective, we are of course working very closely with the NSX team to in future adopt the tenancy capabilities or the NSX projects concept to map them to tenants in Cloud Director, but that will take another couple of versions to be released. So until then in past it was very hard to create some specific logging mechanisms or dashboards for, especially for the firewall. Now, with VCD 10.5, we introduced some logging ID for a firewall rule that maps to the rule ID in NSX and that now allows to really have some tenant specific information in each log message that comes from the firewall and with that you can use your favorite logging analyzer tool that you want to create some filters or dashboards to really to create some log lists just for firewall rules of a specific tenant Really powerful and very, very often requested feature.

Speaker 4:

The last step would be having a multi-tenant locking infrastructure. That would be awesome, but you can still have one instance per tenant. That works perfectly fine.

Speaker 1:

Good IP spaces. Who wants to cover IP spaces and the news around that one?

Speaker 4:

Yes. So the news around IP spaces is mainly the migration UI wizard enabling the service provider to migrate the provider gateway, configured IP ranges or assigned IP addresses into the new IP space mechanism. So that's the enhancement in 10.5. Again, ip spaces. What is possible to do with IP spaces? Pretty short, the service provider configures IP ranges which can be requested by tenants as floating IP addresses for their needs. Like I would like to instantiate a new service, I need a new public IP address. I can just request one floating IP address or I can just subnet certain ranges and enable customers to request IP ranges within their own cloud directory UI. In the past, if a tenant needed a new IP address or a new IP range like it's either public or private I always had to discuss with my service provider please assign an IP address or please assign an IP range, which costs. Like you need to open a ticket additional work, someone has to do it, work on the ticket. So it was a pretty lengthy process. And now, if the tenant needs an additional IP address, just click request new and use it. And, as Fabian would like to say, kachin, right, with the usage meter. You just charge for the public IP address or even an IP range. I think that's pretty cool. That's the whole story around IP spaces. I can just say please use it. They are an awesome feature from my perspective. And now with 10.5, just use the UI wizard and migrate over your legacy stuff or your legacy IP management within VCD to the new IP spaces environment.

Speaker 5:

Also be aware that the latest version of the Terraform provider now supports IP spaces, so that you can automate them through the Terraform infrastructure as code concept.

Speaker 4:

Yeah, thanks for that.

Speaker 1:

Good, so BGP is another topic. We wanted to cover some of the BGP changes.

Speaker 4:

Yeah, so BGP? The big enhancements from my perspective in BGP is just the ability to manage route maps and community lists from the VCD UI. In the past those BGP features provided by the ZX were consumed as a managed service. That's the nice term, for the service provider configures the stuff, or as Eve refers to it, as fully featured API integration. Now we can use those two additional tabs to consume or to configure route maps and community lists from the Cloud Director UI. Do we have anything to add on that?

Speaker 3:

Yes, just a small limitation at the moment, because we should really have this in mind. What Matthias mentioned absolutely correctly, but please have in mind, only on provider managed gatevisper. At the moment this IP spaces, as mentioned before, ip as a service. We should change to IP spaces. Then we have now the capability inside Cloud Director, on a provider managed gateway, that or on a provider gateway, not on a provider managed gateway on a provider gateway with BGP enabled, that we can configure all of the enhanced BGP stuff directly in the Cloud Director UI.

Speaker 4:

You mean a dedicated gateway? Yes, all right. I think that's mainly covering the BGP part. If you have a dedicated provider gateway or dedicated T0, you have the BGP enabled within the VCD UI. With 10.5, you have two additional tabs One is a community list and the other one is a roadmap.

Speaker 1:

Good what I still have on my list. I mean, I know you covered already quite a bit of the firewall rules, Matthias, and you also already have not one of us to ensure the auto-configured nut rules.

Speaker 4:

So I haven't mentioned those. So what is about the auto rules? You can, if you enable it, and of course you need to have to use IP spaces, otherwise it's not working. You can enable the automated rule configuration for NAT rules like source and destination NAT on edge gateways and provider gateways within the environment. That's the whole idea with it, because you can enable those rules to automatically configure NATing based on external and internal scopes. That's the idea behind that. In the past you had to do it manually, especially the no NAT rules, the no NAT rules, yeah.

Speaker 2:

If you mentioned the part with the firewall rules UI that we can now add source and destination IP ranges directly in the firewall rules and don't need to specify IP sets before. So, yeah, many times we created firewall rules and need to go back to create an IP space for that. So that's a really good improvement of the firewall rules UI in 10.05 from my perspective.

Speaker 1:

The other thing which I had on my list for today's session, and again, I'm not sure if we want to cover all the networking pieces, but someone added to the list stateless T0. Why and how?

Speaker 3:

I think it was Sasha and myself. So, sasha, it's now your part.

Speaker 2:

You can talk better about that. We have another part. Later on we will talk about V2T migration. What have you said?

Speaker 3:

What's the idea behind? So in the past, it was always only possible if you go with the T0 active standby configuration to utilize NAT configuration on your T0 gateway. This is since the release of NSX4, which is the new name of NSXT or the final name of NSXT, whatever you would like to call it we have now the possibility to utilize or to configure stateful and stateless NAT directly on our T0 gateway, also in an active-active manner. So we don't need to reconfigure our T0 gateway to an active standby. We can leave it in a negative configuration but still have the capability of utilizing NAT on one hand and on the other hand and that's from my perspective, the more or the better improvement is also that we have now the capability of utilizing proxy app and this is what Sasha will cover from the migration perspective that we now can also utilize proxy app on an active-active configuration. So this is the improvement from an NSX perspective and before I hand over to Sasha, I would like to add a big limitation I discovered last week and this is also not 100%, not related to Cloud Director, because this is, from my perspective and big issue and I would already call it a bug inside NSX if you create a NAT rule. I'm really talking now about the NAT rule because it is possible in the firewall rules, but it is not possible in a NAT rule. If you would like to configure NAT rule, let's, for example, go with passive FTP or passive FTP and you would like to open a port range in your NAT rule, saying, hey, I would like to have from 50,000 up to 51,000, all of the ports open and I would like to create a single NAT rule, which is possible in, or was possible in, nsxv. This is not possible at the moment in NSXT. So if you would like to open, for example, 1000 ports for your passive FTP, at the moment you need to create 1000 NAT rules not an ideal solution. So now I'm finished. I would like to hand over to Sasha.

Speaker 4:

Just one thing behind that headline, because on top in NSXV I have the ability to migrate a stateful T0 into a stateless T0, which enables certain features within NSX, like also firewall and stuff like this. Guys, you need to be careful because the T0 is always provider managed, keep that in mind. And the stateless T0 always requires stateless T1. So the question is, and we need to figure out, what if I import a stateless T0 into VCD and then create an edge gateway, because that's a T1 behind the T0. So it's not pretty clear within the release notes and, just being honest, we don't know what the real behavior will be. Maybe Yerke has a few insights, maybe yes, maybe no. So be careful with the whole stateless T0 story. If you want to use stateless T0 and all these features, you need to have a stateless T1 behind that. So currently we suggest please import the segments as external networks and provide those to the customer. The whole network stack needs to be consumed as a managed service from a tenant perspective. Be careful with those configurations. And last but not least, stateless T0 is a one-way ticket to help. If you migrate a stateful T0 into a stateless, it remains a stateless. There is no way back except of delete stuff, but if you use Terraform that's pretty fastly done. Remove and rebuild objects. All right, sachin, that's your turn.

Speaker 2:

Yeah. So I want to say, with the proxy app, that's very important for the NSX V2T migrations, so we don't have to go with an active, passive T0. And that is a big benefit now for the upcoming NSX V2T migrations though, that we can work with active, active T0s there. And, yeah, we are still doing a lot of V2T migrations. And I think, yeah, we have the migration tool. We currently have support with the migration tool. We heard that there is something with the migration tool in the future that will become out of support, so that we have no longer support for the migration tool. So I want to say it's very important to start latest now to do your NSX V2T migration. That is a very important part that we can do the migration with the full support of VMware, with the migration tool.

Speaker 4:

So the proxy app Sacha just to add a bit more precision to the phrasing proxy app is available on an active active state for T0. T0, yeah. So because we now need to be very precisely on the phrasing, because that not anybody thinks like, oh, I need to use a T0 stateless for proxy app, which might not be ideal because it's again a one-by-tick to hell.

Speaker 3:

And also one last thing, because this was something Sacha and I discussed last time. Yes, you can reconfigure an active standby T0 gateway to an active active T0. But please have in mind that you need to disconnect all of your tier one gateways, so this is nothing which can be done quickly in place. So you need to have a maintenance window where all of the tier one gateways gets disconnected. Then you can reconfigure your tier zero and reattach your tier one gateways.

Speaker 4:

But that's just a minor impact. All right, cool. I think that's a bit summing up the whole networking space. A lot of cool features, especially in terms of new stuff in security, logging, monitoring, ip spaces. But again, we added a lot of topics to the how do we call it? A managed service consumption of certain networking features. So again, always keep in mind what can be done from a tenant perspective, what needs to be consumed as a fully managed service and create new product packaging using the new NSX Federation and create availability so that they will customers to migrate workloads and create their own HA solutions within your own SP space. So, summing up, I assume famous last words, some closing statements. Maybe, europe, you want to start.

Speaker 5:

Yeah, very happy about the finally improvements in the firewall UI because that has been a lot of feedback that we got over the last couple of months, so happy to get that in, toby.

Speaker 3:

Yeah, also thanks for your attention and, on the other hand, more than happy that more and more of the networking story becomes now part of Cloud Director or inside the Cloud Director UI. So let's see what will come in the future. Sosha.

Speaker 2:

Yeah, thank you for joining us and we'll be happy to join you or meet you in Las Vegas. Reach out to us and let's have a meeting in Vegas.

Speaker 1:

Was. That being said, I think nothing else for me to add. Again, would love to welcome most of you in Vegas for individual sessions, meetings, et cetera. I think we covered quite a bit on the networking piece. Just to give you a bit of a heads up, in one of our next episodes Sosha is going to cover a lot more around CSE, tanzu and those integrations, and we will also do a little special special with Alain from our team who is going to cover more on Showbag, chargebag, aria operations, integration and a lot of these different things, and so we have already quite a few topics lined up for some of the next sessions. Looking forward to it and, with that being said, goodbye and hope to see you all in Vegas in a few days.

VCD 10.5 Networking Features and Improvements
Migration in NSX
Upcoming Topics and Events in Vegas