Deploying a Software-Defined Data Center is the first step for using the VMware Cloud on AWS GovCloud service. After you deploy the SDDC, you can view information about it and perform management tasks.
There are a couple of things to consider before you deploy an SDDC.
Connected AWS Account
When you deploy a VMware Cloud on AWS GovCloud SDDC, it is created in an AWS GovCloud account and VPC dedicated to your organization and managed by VMware. You must also link the SDDC to an AWS GovCloud and VPC that you own. This VPC, which we call the Connected Amazon VPC, provides SDDC workloads with access to AWS networks and services.
AWS VPC Configuration and Availability Requirements
- The subnet must be in an AWS Availability Zone (AZ) where VMware Cloud on AWS GovCloud is available. Start by creating a subnet in every AZ in the AWS Region where the SDDC will be created. It helps you identify all AZs where an SDDC can be deployed and select the one that best meets your SDDC placement needs, whether you want to keep your VMC workloads close to or isolated from your AWS workloads running in a particular AZ. See Creating a Subnet in Your VPC in the AWS documentation for information about how to use the Amazon VPC console to create a subnet in your VPC.
- The subnet must exist in the connected AWS account. It cannot be one owned by and shared from another account.
- The AWS account being linked must have sufficient capacity to create a minimum of 17 ENIs per SDDC in each region where an SDDC is deployed. Although you cannot provision more than 16 hosts in a cluster, SDDC operations including planned maintenance and Elastic DRS can require us to temporarily add as many as 16 more hosts, so we recommend using an account that has sufficient capacity for 32 ENIs per SDDC per region.
- We recommend dedicating a /26 CIDR block to each SDDC and not using that subnet for any other AWS services or EC2 instances. Because some of the IP addresses in this block are reserved for internal use, a /26 CIDR block is the smallest subnet that can accommodate SDDC IP address requirements.
- By default, AWS services or instances that communicate with the SDDC must be on VPC subnets associated with the main route table of the connected VPC. To use a custom route table, enable AWS Managed Prefix List Mode. See Enable AWS Managed Prefix List Mode for more information. By default, AWS limits the size of the main route table to 50 routes. Because the main route table must accommodate an entry for each routed SDDC network segment as well as the management network CIDR and any additional routes you create directly in your AWS account, the default limit might not be adequate for your SDDC networks, especially if you connect more than one SDDC to the VPC. You can request a route table size increase as described in Amazon VPC quotas.
- If necessary, you can link multiple SDDCs to a VPC if the VPC subnet used for ENI connectivity has a large enough CIDR block to accommodate them. Because all SDDCs in a VPC use the same main route table, make sure that network segments in those SDDCs do not overlap with each other or the VPC's primary CIDR block. Workload VMs on routed SDDC networks can communicate with all subnets in the VPC's primary CIDR block, but are unaware of other CIDR blocks that might exist in the VPC.
VMware Site Recovery for VMware Cloud on AWS GovCloud
You can now use your VMware Cloud on AWS SDDC on AWS GovCloud region as a recovery site for disaster recovery events using VMware Site Recovery. For operational limitations of VMware Site Recovery, see VMware Configuration Maximums. For more information on how to install, configure and manage VMware Site Recovery on your recovery SDDC, see VMware Site Recovery Documentation.