Install the NSX Agent on your Linux VM. This is the first of two steps required to enable NSX to manage your VMs. Currently, only Ubuntu 14.04.05 is supported.

Prerequisites

If you have the Quarantine Policy enabled for your compute VPC, before installing the NSX agent, assign the vm-override-sg security group to the VM to ensure that NSX Cloud does not quarantine this VM by auto-assigning the default security group to the VM. See Manage Quarantine Policy for more information.

Important:

NSX Agent installation on Ubuntu VMs requires internet access for downloading dependencies while installing NSX packages. Make sure your Ubuntu VM has a public IP address.

Procedure

  1. Get the VM’s IP address so you can log in to it using SSH:
    1. From the CSM dashboard, select Cross-Cloud > AWS > <AWS_account_name>
    2. From the VPC section, select <Compute-VPC-Name> Instances
    3. Select an Ubuntu VM.
    4. Locate either the public or private IP address of the VM.
      Note:

      If using a jump host, you do not need the public IP address, you can use the private IP address. This is the preferred method of accessing your workload VMs.

  2. Download the installation script:
    1. Remote log in to the VM with root privileges.
    2. Download the installation script from the PCG: wget http://nsx-gw.vmware.local:8080/factory_default/trusty_amd64/install_nsx_vm_agent.sh

      The default DNS name of PCG is nsx-gw.vmware.local. AWS Route 53 maps this name with the primary PCG's IP address. The secondary PCG’s IP address, if you have one for HA, is also mapped to the same DNS name.

  3. If required, change permissions on the installation script to make it executable, and run it:
    1. chmod +x install_nsx_vm_agent.sh
    2. sudo ./install_nsx_vm_agent.sh

    The script uses eth0 as the default interface. For a list of script options and uninstallation instructions, see NSX Agent Install Script Options for Linux VMs.

What to do next

Apply the nsx:network tag to VMs in AWS