As mentioned in my initial blog post on SovLabs, you would have to create custom code in vRO to support the automation of many of the additional steps like custom naming, IPAM, DNS, AD, Load Balancer, but with SovLabs software modules this is really easy. Below are my notes for the prerequisites and the initial installation of the SovLabs modules.
Some prerequisites needs to be completed before installing the plugin:
- Configure the vRO service accounting in vRA
- Login to the root vRA tenant
- Click Administration -> Users & Groups > Custom Groups
- Create a Custom Group
- Enter a group name and description.
- DO NOT put spaces in the group name.
- Select the following roles listed in the Add Roles to this Group box
- Tenant Administrator
- XaaS Architect
- Click Next
- Type in the vRO service account or vRO service account group
- If this account does not appear make sure it is sync’d.
- Click Add
- Configure vRO endpoint in vRA
- I have an enterprise install with external vRO so I am assuming you already setup the external vRO server in vRA.
- Login to vRA tenant
- Click Infrastructure tab > Endpoints > Endpoints
- Click on New > Orchestration > vRealize Orchestrator
- Enter the information
- Click on New Custom Property.
- Name: VMware.VCenterOrchestrator.Priority
- Value: (number, 1 being highest priority)
- Click OK
- Configure extensibility message timeout in vRA
- Login to vRA tenant
- Click Infrastructure tab -> administration -> Global Settings
- Click the Extensibility lifecycle message timeout row
- Click the Edit button
- Input a value that will be greater than the longest event workflow subscription timeout (e.g. 04:00:00)
- For the timeout setting to take affect, restart the vCloud Automation Center Service first on the primary manager service server and then on secondary.
- Execution permission in vRO
- This is necessary for vRO to execute external applications and perform actions like ping.
- These steps also need to be performed on all vRO nodes.
- SSH/Putty vRO server as root
- Modify the vmo.properties file:
- vi /etc/vco/app-server/vmo.properties
- Press the i key on the keyboard
- Copy & paste the following line to the end file:
- com.vmware.js.allow-local-process=true
- Press the esc key on the keyboard
- Type in :wq! and press the Enter key
- Modify the js-io-rights.conf file:
- vi /etc/vco/app-server/js-io-rights.conf
- Press the i key on the keyboard
- Copy & paste the following line to the end file:
- +rwx /tmp
- Press the esc key on the keyboard
- Type in :wq! and press the Enter key
- Ensure that the file has the appropriate permissions:
- cd /etc/vco/app-server
- chown vco:vco js-io-rights.conf
- chmod 640 js-io-rights.conf
- Restart the vRO server(s)
- service vco-server restart
- EMC and Kerberos configuration in vRO
- There are some additional steps that you need perform if you are using EMC FEHC 3 and 4, as well as Kerberos.
- I am not using these so will skip but documentation provides all the information needed.
- http://docs.sovlabs.com/vRA7x/current.html#4.2-first-install
- Configure vRA Endpoints in vRO (use vRO to create workflows in order to interact with vRA)
- Perform the following once in vRO for each vRA tenant
- Login to vRO Client
- Select Design mode
- Click workflow tab
- Run workflow: /Library/vRelease Automation/Configuration/Add a vRA host
- Enter vRA host name
- Host URL
- Automatically install Certs = yes
- Session mode = shared session
- Tenant name
- Username and password
- username@domain.com
- Rest of fields not mentioned just leave default
- Click Submit
- If this fails make sure the service account is searchable in vRA directory users and groups.
- Add an IaaS host in vRO
- Perform the following once in vRO for each vRA tenant
- Login to vRO Client
- Select the Design mode
- Click Workflow tab
- Run workflow: /Library/vRealize Automation/Infrastructure Administration/Configuration/Add an IaaS host
- Enter Host Name (IaaS Host FQDN)
- Enter Host URL (https://IaaS Host FQDN)
- Automatically install Certs = yes
- Use proxy = no
- Click Next
- Default connection settings = yes
- Click Next
- Host authentication type = NTLM
- For the NTLM, is it a local user or an LDAP/AD user?
- If it’s local, you use user@tenant
- You can also use SSO
- Enter Username and password
- for Username only specify the username and do not add the domain
- Workstation leave blank
- Enter domain name for NTLM authentication
- Click Submit
- Environment setup
- Review the documentation for additional setup configurations.
- http://docs.sovlabs.com/vRA7x/current.html#4.2-first-install
- Firewall configurations provided in documentation
- WinRM setup for SovLabs modules utilizing any Windows servers in the environment (for AD, DNS, IPAM, Puppet and etc.)
- Configuration of Windows member server when direct access to AD server is not permitted in the environment.