Configure NSX Advanced Load Balancer Controller cluster to provide a highly available control plane for the NSX Advanced Load Balancer.
Prerequisites
Deploy three Controller VMs in the management domain.
Reserve one IP in the management network to be assigned as the Controller cluster VIP which will be used as a single end point to manage NSX Advanced Load Balancer.
To guarantee priority recovery of the Controller VMs, configure VM Override rules with the following properties:
Set VM Restart Policy to ‘Medium’.
Set Host Isolation Response to ‘Disable’.
Procedure
Initialize the first NSX Advanced Load Balancer Controller VM
In a web browser, log in to the first Controller by using https://sfo-m01-avic01a.sfo.rainpole.io/.
Note:While the system is booting up, a blank web page or a 503-status code may appear. Wait for about 5 to 10 minutes and then follow the instructions below for the setup wizard.
Once the NSX Advanced Load Balancer welcome screen appears, create an 'admin' account by specifying the following information and click on Create Account:
Setting
Value
username
admin
Password
<COMPLEX_PASSWORD>
Confirm Password
<COMPLEX_PASSWORD>
Email Address
Specify the administrator email address
Specify the DNS and NTP information and click on Next.
Setup SMTP source as 'Local Host' with From Address as [email protected] and click onNext.
Under Tenant Settings select Share IP route doman across tenets.
- Under Service Engines are managed within the select Provider.
- Under Tenet Access to Service Engine select Read Access.
- Click Save.
The UI will log into the NSX Advanced Load Balancer Controller dashboard.
Configure an NSX Advanced Load Balancer Controller cluster.
Navigate to
and select Edit.Specify the 'Name' of the cluster as sfo-m01-avic.
Specify the 'Controller Cluster IP' that had been reserved.
Add the following details for each of the three NSX Advanced Load Balancer Controller nodes.
Setting
Value
IP
<CONTROLLER_IP_ADDRESS>
Name
sfo-m01-avic01a (sfo-m01-avic01b and sfo-m01-avic01c)
Password
Leave blank
Public IP
Leave blank
Click on Save. It will take a few minutes for the services to restart and the Controller cluster to be up.
In a web browser, log in to the Controller cluster VIP by using https://sfo-m01-avic01.sfo.rainpole.io/.
Navigate to
and ensure all the Controllers show ‘State’ as ‘Active’ which represents a healthy Controller cluster.
Setup the Controller cluster Portal Certificate. By default, the Controller cluster Portal will be setup with a self-signed certificate. It is recommended to setup a trusted CA signed certificate for the Controller cluster Portal.
Note:Steps to sign a CSR by a Trusted CA are not covered in this document.
In a web browser, log in to the Controller cluster VIP by using https://sfo-m01-avic01.sfo.rainpole.io/.
Navigate to CREATE and select on Controller Certificate.
and click onSelect Type as ‘CSR’ and specify the following information:
Setting
Value
Name
sfo-m01-avic01-portal-certificate
Common Name
sfo-m01-avic01.sfo.rainpole.io
Click on SAVE to generate a Certificate Signing Request.
Click on Edit (pencil icon) on the sfo-m01-avic01-portal-certificate and copy the CSR.
Take the copied CSR and get it signed from a trusted CA. This will generate a signed Certificate. Copy the signed Certificate to be used for the Controller cluster portal.
Click on Paste text and paste the copied signed certificate.
Click on SAVE.
Navigate to System Access Settings.
and editRemove the pre-existing SSL/TLS Certificate entries (these are the self-signed Controller cluster portal certificates) and select the sfo-m01-avic01-portal-certificate certificate from the drop-down.
Click on SAVE.
Refresh the browser to re-negotiate TLS with the Controller cluster portal. The signed Certificate should be presented by the Controller cluster portal.
Setup the Controller Cluster Secure Channel Certificate. By default, the Controller cluster will be setup with a self-signed certificate to be used for communication between the Controllers and the Service Engines. It is recommended to setup a trusted CA signed certificate for the Controller cluster Secure Channel.
Note:Steps to sign a CSR by a Trusted CA are not covered in this document.
In a web browser, log in to the Controller cluster VIP by using https://sfo-m01-avic01.sfo.rainpole.io/.
Navigate to CREATE and select Controller Certificate.
and click onSelect Type as ‘CSR’ and specify the following information:
Setting
Value
Name
sfo-m01-avic01-secure-channel-certificate
Common Name
sfo-m01-avic01.sfo.rainpole.io
Click SAVE to generate a Certificate Signing Request.
Click on Edit (pencil icon) on the sfo-m01-avic01-secure-channel-certificate and copy the CSR.
Take the copied CSR and get it signed from a trusted CA. This will generate a signed Certificate. Copy the complete signed Certificate bundle to be used for the Controller cluster portal.
Click on Paste text and paste the copied complete signed Certificate bundle.
Click on SAVE
Navigate to System Access Settings.
and editRemove the pre-existing Secure Channel SSL/TLS Certificate entry (this is the self-signed Controller cluster secure channel certificates) and select the sfo-m01-avic01-secure-channel-certificate Certificate from the drop-down.
Click on SAVE.
All Service Engines that will be created will use this certificate to authenticate the Controller cluster.