The appendix aggregates design decisions that determine the deployment configuration to support Cross Cloud Mobility for VMware Cloud Foundation validated solution. You can use this design decisions list for reference related to the end state of the environment and potentially to track your level of adherence to the design and any justification for deviations.
Deployment Specification
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-CFG-001 |
Deploy the HCX Connector appliance in the default management vSphere cluster. |
Required to establish secure communication between the VMware Cloud Foundation instance and VMware HCX. |
The HCX Connector must be able to connect to the internet through a firewall. |
CCM-CDP-CFG-002 |
Protect the HCX Connector appliance by using vSphere High Availability. |
Supports the availability objective without requiring manual intervention during an ESXi host failure. |
None. |
CCM-CDP-CFG-003 |
Place the HCX Connector appliance in a designated virtual machine folder. |
Provides organization of the appliances in the management domain vSphere inventory. |
You must create the virtual machine folder before or during deployment. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-CFG-004 |
When using two availability zones, add the HCX Connector appliance to the VM group of the first availability zone. |
Ensures that the HCX Connector appliance runs in the primary availability zone hosts group. |
After the implementation of the second availability zone for the management domain, you must update the VM group for the primary availability zone virtual machines to include the HCX Connector appliance. |
Network Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-NET-001 |
Place the HCX Connector appliance on the management VLAN. |
|
None. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-NET-002 |
Allocate statically assigned IP addresses from the management VLAN to the HCX Connector appliance. |
Using statically assigned IP addresses ensures stability of the deployment and simplifies maintenance and tracking. |
Requires precise IP address management. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-NET-003 |
Configure forward and reverse DNS records for the HCX Connector appliance IP address. |
Ensures the appliance is accessible by using a fully qualified domain name instead of using IP addresses only. |
|
CCM-CDP-NET-004 |
Configure DNS servers on the HCX Connector appliance. |
Ensures the appliance has accurate name resolution. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-NET-005 |
Configure NTP servers for the HCX Connector appliance. |
|
|
VMware Cloud on AWS Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-AWS-CFG-001 |
Deploy a VMware Cloud on AWS mobility SDDC with a minimum of two nodes. |
Ensures that the pre-provisioned mobility SDDC remains available. A single node expires after 60 days. |
A pre-provisioned mobility SDDC consumes infrastructure that incurs a regular charge. |
CCM-AWS-CFG-002 |
Configure the management gateway to allow access to VMware Cloud on AWS mobility SDDC vCenter Server over the internet. |
Ensures users can access the vCenter Server UI of the mobility SDDC over the internet. |
You must manually manage access to the vCenter Server by using an NSX group. |
VMware HCX Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-HCX-CFG-001 |
Register the HCX Connector with the VI workload domain vCenter Server. |
Registering the HCX Connector with vCenter Server installs the plug-ins to integrate HCX with vCenter Server. |
None. |
CCM-HCX-CFG-002 |
Register the HCX Connector with the VI workload domain NSX Manager. |
Registering the HCX Connector with NSX Manager is required to enable the networking configuration. |
None. |
CCM-HCX-CFG-003 |
Register the HCX Connector with the Single Sign-On Domain of the VI workload domain vCenter Server. |
By registering the HCX Connector with Single Sign-On, you can create dedicated VMware HCX roles within vCenter Server. |
None. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-HCX-CFG-004 |
Pair the HCX Connector with the HCX Cloud service. |
Required to establish unidirectional communication between the VMware Cloud Foundation instance and the HCX Cloud service to create a Service Mesh. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-HCX-CFG-005 |
Create a management network profile using the management network distributed switch port group and assign Management and HCX Uplink traffic types. |
Provides management network configuration details used when deploying VMware HCX service appliances. |
None. |
CCM-HCX-CFG-006 |
Assign the management network profile a pool of 5 IP address from the VI workload domain management VLAN. |
Provides a pool of IP addresses that can dynamically be assigned to the VMware HCX service appliances. |
Requires the allocation of a static pool of IP addresses from the VI workload domain management VLAN. |
CCM-HCX-CFG-007 |
Create a vMotion network profile using the vMotion network distributed switch port group and assign vMotion traffic type. |
Provides vMotion network configuration details used when deploying VMware HCX service appliances. |
None. |
CCM-HCX-CFG-008 |
Assign the vMotion network profile a pool of 5 IP address from the VI workload domain vMotion VLAN. |
Provides a pool of IP addresses that can dynamically be assigned to the VMware HCX service appliances. |
Requires the allocation of a static pool of IP addresses from the VI workload domain vMotion VLAN. |
CCM-HCX-CFG-009 |
Create a compute profile and activate all available VMware HCX services. |
Provides the compute, storage, and network settings that VMware HCX uses to deploy the interconnect-dedicated appliances when a Service Mesh is added. |
Services that can be activated are dependent on the VMware HCX license applied during the activation of the HCX Connector. |
CCM-HCX-CFG-010 |
Assign the VI workload domain cluster as a resource to the compute profile. |
Provides compute capacity for the interconnect-dedicated appliances when a Service Mesh is added. |
None. |
CCM-HCX-CFG-011 |
Assign a vSphere resource pool as a container to the compute profile. |
Provides a container to group the interconnect-dedicated appliances and the ability to configure resource priorities. |
You must manually create a resource pool before configuring the compute profile. |
CCM-HCX-CFG-012 |
Assign a virtual machine folder as a container to the compute profile. |
Provides organization of the appliances in the management domain vSphere inventory. |
You must manually create a virtual machine folder before configuring the compute profile. |
CCM-HCX-CFG-013 |
Assign the management and vMotion network profiles to the compute profile. |
Provides network settings for the interconnect-dedicated appliances when a Service Mesh is added. |
None. |
CCM-HCX-CFG-014 |
Create a Service Mesh between the VMware Cloud Foundation instance and VMware Cloud on AWS SDDC. |
Provides an interconnect between on-premises and the VMware Cloud on AWS environments to enable extending VMware Cloud Foundation networks to facilitate workload mobility without the need to re-IP application virtual machines. |
None. |
Life Cycle Management Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-CDP-LCM-001 |
Manually upgrade the HCX Connector appliance using the built-in tools. |
An upgrade package must be downloaded and applied to the HCX appliance to perform an upgrade. |
None. |
CCM-CDP-LCM-002 |
Use the VMware Cloud Services automatic over-the-air service to perform the upgrades to the HCX Connector appliance. |
The VMware HCX service pushes upgrades automatically. |
None. |
Information Security and Access Control Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-IAM-SEC-001 |
Limit the use of local accounts for interactive or API access, and solution integration. |
Local accounts are not specific to user identity and do not offer complete auditing from an endpoint back to the user identity. |
You must define and manage service accounts, security groups, group membership, and security controls in Active Directory. |
CCM-IAM-SEC-002 |
Limit the scope and privileges for accounts used for interactive or API access, and solution integration. |
The principle of least privilege is a critical aspect of access management and must be part of a comprehensive defense-in-depth security strategy. |
You must define and manage custom roles and security controls to limit the scope and privileges used for interactive access or solution integration. |
CCM-IAM-SEC-003 |
Assign VMware Cloud on AWS service roles to designated users. |
To provide access to the VMware Cloud on AWS service, you assign users to service roles. |
You must maintain the service roles required for users of your organization. |
CCM-IAM-SEC-004 |
Assign VMware HCX service roles to designated users. |
To provide access to the VMware HCX service, you assign users to service roles. |
You must maintain the service roles required for users of your organization. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-IAM-SEC-005 |
Define a custom vCenter Server role for VMware HCX with minimum privileges required to support the registration of a vCenter Server. |
VMware HCX integrates with each VI workload domain vCenter Server instance using a minimum set of privileges required to support registration and management. |
|
CCM-IAM-SEC-006 |
Assign the custom vCenter Server role to an Active Directory user account as a service account for each VI workload domain vCenter Server instance for application-to-application communication between VMware HCX and vCenter Server. |
|
You must maintain the life cycle, availability, and security controls for the account in Active Directory. |
CCM-IAM-SEC-007 |
Assign the default Enterprise Admin role in NSX Manager to a service account for each VI workload domain NSX Manager instance for application-to-application communication between VMware HCX and NSX. |
VMware HCX integrates with each VI workload domain NSX Manager instance using a minimum set of privileges required to support registration and management. |
None. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-IAM-SEC-008 |
Configure the local user password expiration policy for each HCX Connector appliance. |
|
You must manage the local user password expiration settings on each HCX Connector appliance by using the appliance console. |
CCM-IAM-SEC-009 |
Configure the local user password complexity policy for each HCX Connector appliance. |
|
You must manage the local user password complexity settings on each HCX Connector appliance by using the appliance console. |
CCM-IAM-SEC-010 |
Configure the local user account lockout policy for each HCX Connector appliance. |
|
You must manage the local user account lockout settings on each HCX Connector appliance by using the appliance console. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-IAM-SEC-011 |
For each vCenter Server, change the VMware HCX service account password on a recurring or event-initiated schedule. |
To maintain a secure platform, you must rotate the VMware HCX service account passwords on a regular basis |
Performing password rotation for a service account is a manual process. You update the associated credentials in the HCX Connector appliance. |
CCM-IAM-SEC-012 |
For each NSX Manager, change the VMware HCX service account password on a recurring or event-initiated schedule. |
To maintain a secure platform, you must rotate the VMware HCX service account passwords on a regular basis. |
Performing password rotation for a service account is a manual process. You update the associated credentials in the HCX Connector appliance. |
CCM-IAM-SEC-013 |
Change the HCX Connector appliance root and admin passwords on a recurring or event-initiated schedule. |
The password for the HCX Connector appliance root and admin accounts never expires based on the default password expiration policy. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-IAM-SEC-014 |
Replace the default self-signed certificate with a CA-signed certificate during the deployment of the HCX Connector appliance. |
Ensures that all communication to the user interface of the HCX Connector appliance is encrypted. |
|
CCM-IAM-SEC-015 |
Use an SHA-2 or higher algorithm when signing certificates. |
The SHA-1 algorithm is considered less secure and is deprecated. |
Not all certificate authorities support SHA-2. |
CCM-IAM-SEC-016 |
Rotate the CA-signed certificate of the HCX Connector appliance on a recurring or event-initiated schedule. |
Ensures that all communication to the user interface of the HCX Connector appliance and between the components continues to be encrypted with a non-expired or non-compromised certificate. |
|
Solution Interoperability
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-MON-IOM-001 | Add a Ping adapter for the HCX Connector appliance. |
Provides metrics on the availability of the HCX Connector appliance. |
You must add the adapter instances manually. |
CCM-MON-IOM-002 |
Configure the Ping adapter for the HCX Connector appliance to use the local-instance collector group. |
Offloads data collection for local management components from the analytics cluster. |
None. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
CCM-BCK-HCX-001 |
Configure an FTP server using the SFTP protocol as a target for the HCX Connector. |
Provides an external target for storing backup sets. |
An external FTP server supporting SFTP must be available in the environment. |
CCM-BCK-HCX-002 |
Configure a backup schedule for the HCX Connector. |
Ensures regular backups, which facilitate recovery, are performed. |
None. |