The Intelligent Logging and Analytics for VMware Cloud Foundation validated solution has objectives to deliver prescriptive content about the solution so that it is fast to deploy and is suitable for use in production environments.

VMware Validated Solution Objective

Description

Main objective

Provide logging, analytics and reporting for VMware Cloud Foundation infrastructure components.

VMware Cloud Foundation architecture support

  • vSAN ReadyNodes

    • Consolidated

    • Standard

      • Single VMware Cloud Foundation instance

      • Multiple VMware Cloud Foundation instances with NSX Federation

      • Single or multiple VMware Cloud Foundation instances with multiple availability zones

  • VxRail Nodes

    • Standard

      • Single VMware Cloud Foundation instance

      • Multiple VMware Cloud Foundation instances with NSX Federation

      • Single or multiple VMware Cloud Foundation instances with multiple availability zones

Workload domain type support

  • Management Workload domain

  • VI Workload domain

Scope of guidance

  • Detailed design for solution components.

  • Deployment and initial configuration of intelligent logging and analytics components for management and VI workload domains.

  • Operational guidance for solution components, such as operational verification, password management, and certificate management.

  • Solution interoperability with solution components, such as monitoring and life cycle.

Scope of implementation

  • Deployment and configuration of solution components:

    • vRealize Log Insight

    • Content Packs

  • Configuration of logging of VMware Cloud Foundation components:

    • ESXi

    • vCenter Server

    • NSX-T Data Center

    • SDDC Manager

    • vRealize Suite Lifecycle Manager

    • Workspace ONE Access

Cloud type

Private Cloud

Number of logging Sources

200

Load Balancing

vRealize Log Insight Integrated Load Balancer

Overall availability

99%

Authentication, authorization, and access control

  • Use of Workspace ONE Access for authentication.

  • Use of security groups and roles for least-privilege access control.

  • Use of service accounts and least-privilege access control for solution integration.

Certificate signing

Certificates are signed by a certificate authority (CA) that consists of a root and intermediate certificate authority layers.