This is an overview of the manual deployment process that you need to follow to set up your provider and tenant Google Cloud projects, configure them, deploy an SDDC, and associate it with VMware Cloud Director service.
The procedures below provide the information that you need to successfully configure VMware Cloud Director service with Google Cloud VMware Engine, but do not include the full set of steps and instructions for working with the Google Cloud Console or with NSX Manager. For detailed instructions, follow the relevant links to the Google Cloud documentation and to the NSX Administration Guide guide.
Prerequisites
Configure the Provider Project
To start using your Google Cloud VMware Engine resources, you must configure your provider cloud and your provider management network.
Procedure
Set Up a Google Cloud VMware Engine SDDC
To start providing resources for tenants to consume, you must create an SDDC.
Procedure
Configure the Tenant Project
To provide resources to the tenant project, configure the tenant service network and the peering connection.
Procedure
What to do next
Create a Jump Host in the Provider Project and Allow Network Access
You can use the jump host in the provider project for controlled access to vCenter Server, NSX Manager, and other services in remote networks.
Procedure
Create a VMware Cloud Director Instance
Create at least one VMware Cloud Director instance for every region for which you plan to allocate cloud resources on a per-tenant basis.
Procedure
- Create a VMware Cloud Director instance in the region where your Google Cloud VMware Engine capacity resides. See How Do I Create a VMware Cloud Director Instance.
- Update your VMware Cloud Director instance domain name. See How Do I Customize the DNS and Certificate Settings of VMware Cloud Director Instance.
Associate the SDDC via VMware Reverse Proxy
To use infrastructure resources that are not publicly accessible and have only outbound access to the internet within your VMware Cloud Director service environment, you must set up your VMware Cloud Director instance to use VMware proxy service.
Procedure
Results
Deploy and Configure IPsec Tunnel
Deploy and configure a VPN appliance in the tenant project to connect to the tier-1 gateway in the provider VDC though an IPsec tunnel.
Procedure
Configure IPsec VPN and Tenant Firewall Rules in NSX Manager
To secure the network connectivity of tenant workloads, configure IPsec VPN and firewall rules.
Procedure
- Configure IPsec VPN in the VMware Cloud Director instance that is managing the Google Cloud VMware Engine SDDC. See Configure NSX Policy-Based IPSec VPN.
- Through the provider jump host, log in to NSX Manager as admin, and configure firewall rules in the tenant tier-1 gateway. See Add a Gateway Firewall Policy and Rule in the NSX Administration Guide.
- Add a firewall rule.
- As source, add the remote tenant project's CIDR block.
- In the Destination column, select Any.
- In the Services column, select Any.
- In the Action column, select Allow.
- Add an outbound firewall rule.
- As source, select Any for any local network or alternatively, it can be locked down to a single CIDR.
- In the Destination column, enter the CIDR block for the Google Cloud Platform tenant project.
- In the Action column, select Allow.
- Publish both rules.
- Add a firewall rule.