This section provides information on how you can access the VMware Telco Cloud Service Assurance UI in Azure through Bastion.
In Azure, if
VMware Telco Cloud Service Assurance needs to be accessed through the Bastion, you need to perform below additional steps.
Procedure
- Once the VMware Telco Cloud Service Assurance is associated with a DNS name post deployment, the VMware Telco Cloud Service Assurance can be accessed from any network using tunnel IP. Provided that the VMware Telco Cloud Service Assurance DNS resolves to corresponding tunnel IP. The FQDN has to be a resolvable IP within the cluster.
- AKS LB to be pre-configured with a DNS name. If not, AKS does provide means to associate AKS LB with DNS name,both for Public and Internal IP Configuration.
- Accessing the VMware Telco Cloud Service Assurance UI:
- On the Windows Client VM where VMware Telco Cloud Service Assurance UI will be launched, update the C:\Windows\System32\drivers\etc\hosts file with the AlternateIP <TCSA-DNSName> if accessed through the tunnel.
- Post that, launch the VMware Telco Cloud Service Assurance UI using the
<TCSA-DNSName>
.For example: https://<TCSA-DNSName>
.
- If the Windows Client VM is in same network as that of VMware Telco Cloud Service Assurance UI, then no need of any DNS mapping on the client host. The VMware Telco Cloud Service Assurance UI can be launched using the
<TCSA-DNSName>
.