You can add up to seven secondary NSX Managers in a cross-vCenter NSX environment. Universal objects configured on the primary NSX Manager are synchronized to the secondary NSX Managers.
NSX Managers can have one of four roles:
To view the role of an NSX Manager, log in to the vCenter linked to the NSX Manager, and navigate to Management tab. The role is displayed in the Role column in the NSX Managers section. If there is no Role column shown, the NSX Manager has the standalone role.and select the
There should be at least two NSX Managers, one with the primary role and one with the standalone or transit role.
The version of the NSX Managers (the primary NSX Manager and NSX Managers that will be assigned the secondary role) must match.
The node IDs of the primary NSX Manager and the NSX Managers that will be assigned the secondary role must be present and different. NSX Manager instances deployed from OVA files have unique node IDs. An NSX Manager deployed from a template (as in when you convert a virtual machine to a template) will have the same node ID as the original NSX Manager used to create the template, and these two NSX Managers cannot be used in the same cross-vCenter NSX installation.
Each NSX Manager must be registered with a separate and unique vCenter Server.
The UDP ports used for VXLAN must be the same for all NSX Managers.
When assigning the secondary role to a NSX Manager, the vCenter linked to it must not have any deployed NSX Controllers.
The segment ID pool of the NSX Manager being assigned the secondary role must not overlap with the segment ID pools of the primary NSX Manager or the segment ID pool of any other secondary NSX Manager .
The NSX Manager being assigned the secondary role must have the standalone or transit role.
You can view the NSX Manager node ID with the following REST API call:
You can view the UDP ports used for VXLAN with the following REST API call:
- Log in to the vCenter linked to the primary NSX Manager.
- Navigate to Management tab. and select the
- Click the primary NSX Manager. Then select .
- Enter the IP address, user name, and password of the secondary NSX Manager.
- Click OK.
- Check that the certificate thumbprint matches the certificate of the vCenter Server.
If you installed a CA-signed certificate on the CA server, you are presented with the thumbprint of the CA-signed certificate. Otherwise, you are presented with a self-signed certificate.
- After successful registration the role changes from Standalone to Secondary.
If your vCenter Server systems are in Enhanced Linked Mode, you can see the roles of all NSX Managers associated with those vCenter Server systems from thetab.
If your environment does not employ Enhanced Linked Mode, log in to the vCenter linked to the secondary NSX Manager to view the NSX Manager's role.Note:
Initially, the controller status will show disconnected. Wait a few seconds and then refresh the vSphere Web Client and the status will change to Normal.
- Log out of the vSphere Web Client and back in to ensure that the vSphere Web Client displays the new NSX Manager roles.