The design decisions determine the deployment configuration, resource sizing, and automation support of VMware Aria Automation in the SDDC.
Deployment Specification
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CFG-001 |
Deploy VMware Aria Automation as a cluster of three nodes in the default management vSphere cluster. |
VMware Aria Automation can manage one or more VMware Cloud Foundation instances from a single implementation. The VMware Aria Automation deployment can also manage VMware Cloud on AWS and public cloud instances, if network access is permitted. |
|
PCA-VAA-CFG-002 |
Deploy VMware Aria Automation in a VMware Aria Suite Lifecycle logical environment in VMware Cloud Foundation mode. |
|
|
PCA-VAA-CFG-003 |
Protect the VMware Aria Automation cluster virtual machines by using vSphere High Availability. |
Supports the availability objectives for VMware Aria Automation without requiring manual intervention during an ESXi host failure event. |
None. |
PCA-VAA-CFG-004 |
Apply vSphere Distributed Resource Scheduler anti-affinity rules for the VMware Aria Automation cluster virtual machines. |
vSphere Distributed Resource Scheduler prevents the VMware Aria Automation cluster virtual machines from residing on the same ESXi host and risking the high availability of the deployment. |
|
PCA-VAA-CFG-005 |
Add a VM group for the VMware Aria Automation cluster virtual machines and set a VM rule to restart the Workspace ONE Access VM group before the VMware Aria Automation VM group. |
You can define the startup order of virtual machines regarding the service dependency. The startup order ensures that vSphere High Availability powers on the virtual machines for VMware Aria Automation in an order that respects product dependencies. |
You must manage the VM group and VM rules for the VMware Aria Automation cluster virtual machines. |
PCA-VAA-CFG-006 |
Place the VMware Aria Automation cluster virtual machines in a designated virtual machine folder. |
Provides the organization of the VMware Aria Automation cluster virtual machines in the management domain vSphere inventory. |
You must create the virtual machine folder during or after the deployment. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CFG-007 |
When using two availability zones, add the VMware Aria Automation cluster virtual machines to the VM group for the first availability zone. |
Ensures that, by default, the VMware Aria Automation cluster virtual machines are powered on in the primary availability zone hosts group. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CFG-008 |
Deploy the VMware Aria Automation cluster nodes as medium-size or larger appliances. |
A medium-size VMware Aria Automation appliance is typically sufficient, but can be scaled-up for increased workload scalability. |
|
Network Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-NET-001 |
Place the VMware Aria Automation cluster nodes on the cross-instance NSX network segment. |
Provides a consistent deployment model for management applications and a potential to extend to a second VMware Cloud Foundation instance for disaster recovery. |
You must use an implementation of NSX to support this networking configuration. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-NET-002 |
Allocate statically assigned IP addresses from the cross-instance NSX segment to the VMware Aria Automation cluster nodes and the NSX load balancer virtual server. |
Using statically assigned IP addresses ensures stability of the deployment and makes it simpler to maintain and easier to track. |
Requires precise IP address management. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-NET-003 |
Configure forward and reverse DNS records for each VMware Aria Automation cluster node IP address and for the NSX load balancer virtual server IP address. |
VMware Aria Automation is accessible by using a fully qualified domain name instead of by using IP addresses only. |
|
PCA-VAA-NET-004 |
Configure DNS servers for each VMware Aria Automation cluster node. |
Ensures that VMware Aria Automation has accurate name resolution on which its services are dependent. |
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-NET-005 |
Use the small-size NSX load balancer that is configured by SDDC Manager on the dedicated NSX Tier-1 gateway in the management domain to load balance the clustered Workspace ONE Access deployment, to also load balance the connections across the VMware Aria Automation cluster nodes. |
|
You must use the NSX load balancer that is configured by SDDC Manager and the integration with VMware Aria Suite Lifecycle to support this network configuration. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-NET-006 |
Configure NTP servers for each VMware Aria Automation cluster node. |
|
|
Life Cycle Management
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-LCM-001 |
|
|
|
PCA-VAA-LCM-002 |
Use VMware Aria Suite Lifecycle to apply VMware Aria Automation patches and hot fixes. |
Patches, updates, and hot fixes for VMware Aria Automation are not managed by SDDC Manager. |
Before applying the updates to VMware Aria Automation, you must use VMware Aria Suite Lifecycle to automate the download or manually upload the product binaries to VMware Aria Suite Lifecycle. |
VMware Aria Automation Assembler Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-001 |
Establish and publish a well-defined strategy, implementation, and taxonomy for the tagging of cloud resources. |
With capability and constraint tags, you can organize and activate cloud resources and profiles for resource consumption by using the declarative nature of cloud templates to define deployment configurations. |
Your strategy must account for external tags, for example, vSphere and NSX tags, and internal user-defined tags managed through VMware Aria Automation Assembler. |
PCA-VAA-CA-CFG-002 |
Apply constraint tags to the cloud template YAML structure. |
During a provisioning operation, capabilities are matched with constraints, each expressed as tags, in cloud templates and images to determine the deployment configuration. |
You must manage the capability tags on your cloud resources, such as cloud zones, storage and storage profiles, networks and network profiles. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-003 |
Add a cloud account for the vCenter Server instance for each VI workload domain in each VMware Cloud Foundation instance. |
You can integrate the vCenter Server instance for each VI workload domains with VMware Aria Automation for provisioning. |
|
PCA-VAA-CA-CFG-004 |
Add a cloud account for the NSX Manager cluster for each VI workload domain in each VMware Cloud Foundation instance.
Note:
For an environment with NSX Federation, add a cloud account for each VI workload domain NSX Local Manager cluster. |
You can integrate the NSX Manager cluster for one or more VI workload domains with VMware Aria Automation for provisioning. |
|
PCA-VAA-CA-CFG-005 |
Use the default |
|
None. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-006 |
Create a cloud zone for each VI workload domain. |
Provides provisioning on a specific workload domain. |
None. |
PCA-VAA-CA-CFG-007 |
Add tags to each cloud zone. |
Ensures that deployments can be targeted for a designated cloud account region. |
|
PCA-VAA-CA-CFG-008 |
For each cluster added to a VI workload domain, add tags to the vSphere cluster. |
|
|
PCA-VAA-CA-CFG-009 |
Add a workload folder in the vCenter Server data center for each VI workload domain. |
Ensures that cloud templates that do not include the |
Note:
The destination folder, where the cloud templates are deployed, must exist. The destination folder cannot be created by VMware Aria Automation Assembler without extensibility. |
PCA-VAA-CA-CFG-010 |
Use the |
|
Does not provide advanced workload placement across cloud zones and the related cloud accounts. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-011 |
Use the default integration to the VMware Aria Automation Orchestrator cluster that is embedded in VMware Aria Automation. |
The use of the embedded VMware Aria Automation Orchestrator cluster has the following advantages over the use of an external VMware Aria Automation Orchestrator instance:
Using the embedded instance of VMware Aria Automation Orchestrator is applicable in most use cases. For information about the use cases for using the external VMware Aria Automation Orchestrator, refer to the product documentation. |
It might be less efficient to run a workflow in a multi-instance deployment from a centralized cluster. However, it is simpler to manage. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-012 |
For each project, add one or more cloud zones based on the project requirements and allowed cloud resources. |
Provides one or more cloud zones and their resources for project consumption. |
None. |
PCA-VAA-CA-CFG-013 |
For each project, set a provisioning priority for each cloud zone based on your deployment prioritization. |
Prioritizes one cloud zone over another within a project. The default priority is 0 (highest priority). |
You must manage the provisioning priority for each cloud zone in each project. |
PCA-VAA-CA-CFG-014 |
For each project, set limits for the project cloud zones as required. |
Sets the maximum number of workload instances and resources provisioned in the cloud zone for the project. The default limit is 0 (unlimited). |
If a value greater than 0 (unlimited) is used for the instance or resource limit, you must manage the limit for each cloud zone in each project when requirements change. |
PCA-VAA-CA-CFG-015 |
For each project, specify network, storage, and extensibility constraints that must be applied to all requests in the project. |
Ensures proper placement of the workloads in a project and its cloud zones. |
If the same constraint or the same constraint category is specified in both the project, for example, |
PCA-VAA-CA-CFG-016 |
For each project, add one or more custom properties, for example, |
Custom properties can be used for provisioning or capturing additional metadata. For example, for reporting or extensibility actions. |
If the same custom property is specified in both the project, for example, |
PCA-VAA-CA-CFG-017 |
For each project, add a custom naming template to be used for virtual machine names provisioned in the project. |
The template provides a custom virtual machine name and does not affect the host name of the virtual machine.
Note:
Custom naming can also be managed using extensibility. |
The template substitutes auto-generated virtual machine names by using available properties, such as resource properties, custom properties, endpoint properties, project properties, and a random number with a specified number of digits. You must ensure that the template generates unique names for this project and between other projects. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-018 |
Create standardized flavor mappings based on a common taxonomy and deployment intent. |
Provides a simple, natural language naming to define common deployment size specifications. |
You must publish and communicate the updates to cloud template developers and consumers. |
PCA-VAA-CA-CFG-019 |
For each flavor mapping, add all applicable account regions. |
Provides a simple, natural language naming to define common deployment size specifications when used in a specific account region. |
You must maintain the mapping for any image mapping create or update operation. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-020 |
Use the vSphere content library to synchronize machine images across VI workload domains and VMware Cloud Foundation instances. |
|
|
PCA-VAA-CA-CFG-021 |
Create standardized image mappings based on similar operating systems, functional deployment intent, and cloud zone availability. |
You can create a simple taxonomy to map images to cloud templates. |
You must publish and communicate the image-mapping standards and updates to cloud template developers. |
PCA-VAA-CA-CFG-022 |
For each machine image in an image mapping, add a constraint tag, if applicable. |
Refines the machine image selection in an image mapping by matching constraints. |
You must manage multiple machine images in each account region based on the use of constraint tags in your organization. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-023 |
For each account region, add one or more network profiles based on network characteristics available for consumption. |
You can add networks with predefined characteristics that can be consumed during a deployment process. |
You must manage network profiles for each account region as updated across VMware Cloud Foundation instances. |
PCA-VAA-CA-CFG-024 |
For each network in a network profile, add one or more capability tags. |
You use capability tags to manage the workload network placement logic during the deployment process. |
You must manage capability tagging on each network profile for workflow placement selection during a deployment process. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-025 |
For each account region, add one or more storage profiles based on storage characteristics available for consumption. |
You can add storage with defined characteristics that can be consumed during a deployment process. |
You must manage storage profiles for each account region as storage is added, removed, and updated across VMware Cloud Foundation instances. |
PCA-VAA-CA-CFG-026 |
For each storage profile, add one or more capability tags. |
You use capability tags to manage the workload storage placement logic during the deployment process. |
You must manage capability tagging on each storage profile for the workflow placement logic during a deployment process. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-CA-CFG-027 |
Use the embedded on-premises functions-as-a-service (FaaS) provider in VMware Aria Automation for action-based extensibility. |
You can use the native VMware Aria Automation functions-as-a-service provider for the execution of lightweight actions through event subscriptions without the requirement for a public cloud account provider, such as Amazon Web Services Lambda or Microsoft Azure Functions. |
The use of action-based extensibility requires the VMware Aria Automation instance to have outbound access to the Internet to pull container images from publicly available Internet repositories, for example, to resolve any dependencies included in the actions. If VMware Aria Automation is deployed on an isolated network that does not allow outbound traffic to the Internet, an HTTP proxy must be configured and applied using the vracli proxy command option. |
VMware Aria Automation Service Broker Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SB-CFG-001 |
Add a cloud template content source for each VMware Aria Automation Assembler project where cloud templates are authored and released. |
Provides the ability to share released cloud templates with project members or other projects. |
None. |
PCA-VAA-SB-CFG-002 |
Add an extensibility actions content source for each VMware Aria Automation Assembler project where actions are authored and released. |
Provides the ability to share released actions with project members. |
None. |
PCA-VAA-SB-CFG-003 |
Add a VMware Aria Automation Orchestrator workflows content source for each VMware Aria Automation Assembler project, as required. |
Provides the ability to share specific workflows with project members. |
None. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SB-CFG-004 |
For each shared content item, customize the form based on the catalog item and user experience requirements. |
You can create an intuitive user experience by using simple and discoverable forms that capture additional user inputs and in-form validations. |
Requires customization of request forms per catalog item. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SB-CFG-005 |
Identify and apply goals for your organization and each project based on the applicability of available policy types. |
By understanding how the policies are processed, you can meet organizational goals without creating an excessive and unmanageable number of policies. |
For each policy type, you must determine the applicability and your organizational goals to design policy enforcement and scope that results in the desired effective policy. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SB-CFG-006 |
Configure VMware Aria Automation Service Broker to use an outbound (SMTP) mail server to route notifications for system events. |
VMware Aria Automation event notifications are provided by email for an enhanced user experience. |
You must configure an SMTP server to relay messages from VMware Aria Automation. |
VMware Aria Automation Orchestrator Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-VAAO-CFG-001 |
Register each VI workload domain vCenter Server instance with the embedded VMware Aria Automation Orchestrator instance. Do not use per session authentication. |
Required for communication from the embedded VMware Aria Automation Orchestrator to the VI workload domain vCenter Server instances. |
|
Information Security and Access Control Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-001 |
Limit the use of the local accounts for both interactive or API access and solution integration. |
Local accounts are not specific to user identity and do not offer complete auditing from an endpoint back to the user identity. |
You must define and manage service accounts, security groups, group membership, and security controls in Active Directory. |
PCA-VAA-SEC-002 |
Limit the scope and privileges for accounts used for both interactive or API access and solution integration. |
The principle of least privilege is a critical aspect of access management and must be part of a comprehensive defense-in-depth security strategy. |
You might need to define and manage custom roles and security controls to limit the scope and privileges used for interactive access or solution integration. |
PCA-VAA-SEC-003 |
Assign Active Directory user accounts to security groups following your organization's access policies |
Allows Active Directory security groups to be assigned to roles in SDDC components for streamlined management of access and administrative privileges. |
You must define and manage security groups, group membership, and security controls in Active Directory. |
PCA-VAA-SEC-004 |
Assign Active Directory security groups to default or custom roles, as applicable, for interactive or API access to solution components based on your organization's business and security requirements. |
|
|
PCA-VAA-SEC-005 |
Activate VMware Aria Automation integration with Active Directory by using the clustered Workspace ONE Access deployment. |
|
|
PCA-VAA-SEC-006 |
Assign VMware Aria Automation organization service and project roles to designated Active Directory. security groups synchronized to the clustered Workspace ONE Access deployment. |
By assigning Active Directory security groups to organization and service roles, you can simplify and manage user access to VMware Aria Automation based on the Active Directory security group membership. |
You must define and manage the security groups, group membership, and security controls in Active Directory for those directory services objects used by VMware Aria Automation. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-007 |
Define a custom vCenter Server role for VMware Aria Automation that has minimum privileges required to support a vCenter Server cloud account. |
VMware Aria Automation integrates with VI workload domain vCenter Server instances in VMware Cloud Foundation instances using the minimum set of privileges and permissions scope required to support the cloud account. |
|
PCA-VAA-SEC-008 |
For each VMware Cloud Foundation instance, use an Active Directory user account as a service account for each vCenter Server for application-to-application communication from VMware Aria Automation to vCenter Server. |
Provides the following access control features:
|
|
PCA-VAA-SEC-009 |
Assign vCenter Server global permissions for the VMware Aria Automation-to-vCenter Server integration accounts for each VMware Cloud Foundation instance. |
VMware Aria Automation accesses VI workload domain vCenter Server instances with the minimum set of permissions that are required to support a vCenter Server cloud account. |
|
PCA-VAA-SEC-010 |
Use an Active Directory user account as an integration account for each NSX Manager cluster for application-to-application communication from VMware Aria Automation to NSX. |
Provides the following access control features:
|
Important:
This solution is based on the use of Active Directory over LDAP with SSL used as the identity provider using Workspace ONE Access. If Active Directory Federation Services (ADFS) is used as an identity provider for NSX Manager, VMware Aria Automation cannot authenticate to an NSX Manager. A limitation exists where API-based logins to a system that uses a third-party identity provider, for example, ADFS with Workspace ONE Access. The username and password cannot be sent over SAML to the identity provider for authentication. |
PCA-VAA-SEC-011 |
Assign the NSX Manager Enterprise admin role to the VMware Aria Automation-to-NSX integration accounts for VI workload domains. |
VMware Aria Automation accesses designated VI workload domain NSX Manager clusters in VMware Cloud Foundation instances with the minimum set of permissions that are required to support NSX in the NSX Manager cloud accounts. |
You must configure and manage the integration of Workspace ONE Access with NSX.
Important:
This solution is based on the use of Active Directory over LDAP with SSL used as the identity provider using Workspace ONE Access. If Active Directory Federation Services (ADFS) is used as an identity provider for NSX Manager, VMware Aria Automation cannot authenticate to NSX Manager. A limitation exists where API-based logins to a system that uses a third-party identity provider, for example, ADFS with Workspace ONE Access. The user name and password cannot be sent over SAML to the identity provider for authentication. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-012 |
For each VMware Cloud Foundation instance, use an Active Directory user account as a service account for each VI workload domain vCenter Server for application-to-application communication from VMware Aria Automation Orchestrator to vCenter Server. |
Provides the following access control features:
|
|
PCA-VAA-SEC-013 |
|
Allows only accounts defined in the Active Directory security group membership to administer the VMware Aria Automation Orchestrator instance. |
You must define and manage security groups, group membership, and security controls in Active Directory. |
PCA-VAA-SEC-014 |
Create and apply a custom vSphere role for the service account used to add VI workload domain vCenter Server instances to the VMware Aria Automation Orchestrator configuration. |
VMware Aria Automation Orchestrator integrates with VI workload domain vCenter Servers instances using the minimum set of privileges required to support the vCenter Server registration. |
|
PCA-VAA-SEC-015 |
Assign vCenter Server global permissions for the VMware Aria Automation Orchestrator-to-vCenter Server integration accounts for VMware Cloud Foundation instance workload domains. |
|
|
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-016 |
Configure the password expiration policy for the VMware Aria Automation appliances. |
|
You can manage the password expiration policy on the VMware Aria Automation appliances by using the virtual appliance console or a Secure Shell (SSH) client. |
PCA-VAA-SEC-017 |
Configure the password complexity policy for the VMware Aria Automation appliances. |
|
You can manage the password complexity policy on the VMware Aria Automation appliances by using the virtual appliance console or a Secure Shell (SSH) client. |
PCA-VAA-SEC-018 |
Configure the account lockout policy for the VMware Aria Automation appliances. |
|
You can manage the account lockout policy on the VMware Aria Automation appliances by using the virtual appliance console or a Secure Shell (SSH) client. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-019 |
Change the VMware Aria Automationroot password on a recurring or event-initiated schedule by using the SDDC Manager user interface or API. |
|
By using SDDC Manager, you manage the password change or automate password rotation schedule for the VMware Aria Automationroot account in accordance with your organizational policies and regulatory standards. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-020 |
Use a certificate authority signed certificate containing the FQDNs of the VMware Aria Automation cluster nodes and the virtual server FQDN in the SAN attributes, when deploying VMware Aria Automation. |
Ensures that all communications to the externally facing VMware Aria Automation browser-based UI and API, and between the components, are encrypted. |
|
PCA-VAA-SEC-021 |
Use a SHA-2 or higher algorithm for certificate signing. |
The SHA-1 algorithm is considered less secure and has been deprecated. |
Not all certificate authorities support SHA-2 or higher. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-SEC-022 |
Import the certificate authority root certificate to the embedded VMware Aria Automation Orchestrator instance in VMware Aria Automation. |
|
If the certificate authority certificate is reissued, you must import an updated certificate to the embedded VMware Aria Automation Orchestrator instance in VMware Aria Automation. |
Solution Interoperability Design
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-MON-001 |
Configure the VMware Aria Automation integration in VMware Aria Operations. |
|
You must manage the password life cycle of this endpoint. |
PCA-VAA-MON-002 |
Configure the VMware Aria Automation integration in VMware Aria Operations to use the default collector group. |
Cross-instance components are configured to use the default collector group. |
The load on the analytics cluster, though minimal, increases. |
PCA-VAA-MON-003 |
Add an integration in VMware Aria Automation Assembler for VMware Aria Operations deployment. |
|
|
PCA-VAA-MON-004 |
Use the |
By default, the workload placement evaluation uses the VMware Aria Operations recommendation. |
|
PCA-VAA-MON-005 |
Add a Ping adapter for the VMware Aria Automation cluster nodes. |
Provides metrics on the availability of VMware Aria Automation nodes. |
You must add the adapter instances manually. |
Design Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-MON-006 |
Assign the Organization Owner default role and the Assembler administrator service role to an enterprise directory service account user for the application-to-application communication from VMware Aria Operations to VMware Aria Automation. |
Provides the following access control features:
|
None. |
PCA-VAA-MON-007 |
Assign the ReadOnly role to an Active Directory user account as an integration account for the application-to-application communication from VMware Aria Automation to VMware Aria Operations. |
Provides the following access control features:
|
Important:
This solution is based on the use of Active Directory over LDAP with SSL used as the identity provider using Workspace ONE Access. If Active Directory Federation Services (ADFS) is used as an identity provider for VMware Aria Operations, VMware Aria Automation cannot authenticate to VMware Aria Operations. A limitation exists where API-based logins to a system that uses a third-party identity provider, for example, ADFS with Workspace ONE Access. The user name and password cannot be sent over SAML to the identity provider for authentication. |
Decision ID |
Design Decision |
Design Justification |
Design Implication |
---|---|---|---|
PCA-VAA-LOG-001 |
Use the VMware Aria Operations for Logs content pack for VMware Aria Automation. |
|
None. |
PCA-VAA-LOG-002 |
Use the default configuration to transmit logs from VMware Aria Automation to the adjacent VMware Aria Operations for Logs in the VMware Cloud Foundation instance using the VMware Aria Operations for Logs ingestion API, |
|
The default configuration is unencrypted. To ensure that the transmission of logs between VMware Aria Automation and VMware Aria Operations for Logs is encrypted using SSL, you must update the default configuration for VMware Aria Automation to send logs to VMware Aria Operations for Logs using the ingestion API, For example, on the primary VMware Aria Automation cluster node, run the command See Configuring Log Forwarding to vRealize Log Insight in the VMware Aria Automation documentation. |
PCA-VAA-LOG-003 |
Use the VMware Aria Operations for Logs content pack for VMware Aria Automation Orchestrator. |
|
None. |
PCA-VAA-LOG-004 |
Configure a dedicated agent group in the VMware Aria Operations for Logs cluster to include all FQDNs of the VMware Aria Automation cluster nodes. |
|
Adds minimal load to VMware Aria Operations for Logs. |