After you perform software maintenance in your environment, verify that the configured SFOMGMT-LB01 and LAXMGMT-LB01 load balancer NSX Edges are intact.

About this task

The configuration of the two NSX edges is almost identical. The only difference is that the OneArmLB interface of the LAXMGMT-LB01 NSX Edge must be in the disconnected state.

Table 1. NSX Manager Instances and Load Balancer NSX Edges

Region

NSX Manager Instance

IP Address

Load Balancer

Region A

NSX Manager for the management cluster

172.16.11.65

SFOMGMT-LB01

Region B

NSX Manager for the management cluster

172.17.11.65

LAXMGMT-LB01

Procedure

  1. Log in to vCenter Server by using the vSphere Web Client.
    1. Open a Web browser and go to https://mgmt01vc01.sfo01.rainpole.local/vsphere-client.
    2. Log in using the following credentials.

      Setting

      Value

      User name

      administrator@vsphere.local

      Password

      vsphere_admin_password

  2. Verify that the settings for the interface of the SFOMGMT-LB01 load balancer are intact.
    1. In the Navigator, click Networking & Security and click NSX Edges.
    2. Select 172.16.11.65 from the NSX Manager drop-down menu.
    3. Double-click the SFOMGMT-LB01 NSX Edge device.
    4. Click the Manage tab, click Settings, and select Interfaces.
    5. Select the OneArmLB interface and click the Edit icon.
    6. Verify that the following interface settings are intact.

      Setting

      SFOMGMT-LB01

      Name

      OneArmLB

      Type

      Internal

      Connected To

      Mgmt-xRegion01-VXLAN

      Connectivity Status

      Connected

      Primary IP Address

      192.168.11.2

      Secondary IP Address

      192.168.11.35,192.168.11.59,192.168.11.56,192.168.11.65,192.168.11.53

      Subnet Prefix Length

      24

      MTU

      9000

      Send ICMP Redirect

      Selected

  3. Verify that the SFOMGMT-LB01 load balancer settings are intact.
    1. Click the Manage tab, click Load Balancer, and select Global Configuration.
    2. Verify that Load Balancer Status is Enabled.
    3. Select Application Profiles.
    4. Select an application profile and click Edit for all configured entries to verify that the following settings are intact.

      Setting

      vRealize-https

      VROPS_HTTPS

      VROPS_REDIRECT

      Type

      HTTPS

      HTTPS

      HTTP

      Enable SSL Passthrough

      Selected

      Selected

      N/A

      HTTP Redirect URL

      N/A

      N/A

      https://vrops-cluster-01.rainpole.local/vcops-web-ent/login.action

      Persistence

      Source IP

      Source IP

      Source IP

      Expires in (Seconds)

      120

      1800

      1800

      Client Authentication

      Ignore

      Ignore

      N/A

    5. Select Service Monitoring.
    6. Select a Service Monitor and click Edit for all configured entries to verify that the following settings are intact. 

      The following settings are same for all Service Monitors:

      • Interval = 3

      • Method = GET 

      • Type = HTTPS

      Service Monitor Name

      Timeout

      Max Retries

      Expected

      URL

      Receive

      vra-iaas-mgr-443-monitor

      9

      3

      /VMPSProvision

      ProvisionService

      vra-iaas-web-443-monitor

      9

      3

      /wapi/api/status/web

      REGISTERED

      vra-svr-443-monitor

      9

      3

      /vcac/services/api/health

      vra-vro-8281-monitor

      9

      3

      204

      /vco/api/healthstatus

      RUNNING

      VROPS_MONITOR

      5

      2

      /suite-api/api/deployment/node/status

      ONLINE

    7. Select Pools and click Show Pool Statistics and verify that the Status of each pool is UP.
    8. Select a pool and click Edit for all configured entries to verify that the following settings are intact.

      The following settings are same for all pools:

      • Enable member = Yes

      • Weight = 1

      Pool Name

      Algorithm

      Monitors

      Members

      Port

      Monitor Port

      Member Name

      IP address

      vra-svr-443

      IP-HASH

      vra-svr-443-monitor

      vra01svr01a

      192.168.11.51

      443

      443

      vra01svr01b

      192.168.11.52

      vra-iaas-web-443

      IP-HASH

      vra-iaas-web-443-monitor

      vra01iws01a

      192.168.11.54

      443

      443

      vra01iws01b

      192.168.11.55

      vra-iaas-mgr-443

      IP-HASH

      vra-iaas-mgr-443-monitor

      vra01ims01a

      192.168.11.57

      443

      443

      vra01ims01b

      192.168.11.58

      vra-vro-8281

      IP-HASH

      vra-vro-8281-monitor

      vra01vro01a

      192.168.11.63

      8281

      8281

      vra01vro01b

      192.168.11.64

      vra-svr-8444

      IP-HASH

      vra-svr-443-monitor

      vra01svr01a

      192.168.11.51

      8444

      443

      vra01svr01b

      192.168.11.52

      VROPS_POOL

      LEASTCONN

      VROPS_MONITOR

      vrops-mstrn-01

      192.168.11.31

      443

      443

      vrops-repln-02

      192.168.11.32

      vrops-datan-03

      192.168.11.33

      vrops-datan-04

      192.168.11.34

    9. Select Virtual Servers.
    10. Select a virtual server and click Edit for all configured entries to verify that the following settings are intact.

      Virtual Server Name

      Application Profile

      IP Address

      Protocol

      Port

      Default Pool

      vra-iaas-mgr-443

      vRealize-https

      192.168.11.59

      HTTPS

      443

      vra-iaas-mgr-443

      vra-iaas-web-443

      vRealize-https

      192.168.11.56

      HTTPS

      443

      vra-iaas-web-443

      vra-svr-443

      vRealize-https

      192.168.11.53

      HTTPS

      443

      vra-svr-443

      vra-svr-8444

      vRealize-https

      192.168.11.53

      HTTPS

      8444

      vra-svr-8444

      vra-vro-8281

      vRealize-https

      192.168.11.65

      HTTPS

      8281

      vra-vro-8281

      VROPS_VIRTUAL_SERVER

      VROPS_HTTPS

      192.168.11.35

      HTTPS

      443

      VROPS_POOL

      VROPS_REDIRECT

      VROPS_REDIRECT

      192.168.11.35

      HTTP

      80

      NONE

  4. Verify the settings for the LAXMGMT-LB01 NSX Edge.
    1. In the Navigator, click Networking & Security and click NSX Edges.
    2. Select 172.17.11.65 from the NSX Manager drop-down menu.
    3. Double-click the LAXMGMT-LB01 NSX Edge device.
    4. Click the Manage tab, click Settings, and select Interfaces.
    5. Select the OneArmLB interface and click the Edit icon.
    6. Verify that the following interface settings are intact.

      Setting

      LAXMGMT-LB01

      Name

      OneArmLB

      Type

      Internal

      Connected To

      Mgmt-xRegion01-VXLAN

      Connectivity Status

      Disconnected

      Primary IP Address

      192.168.11.2

      Secondary IP Address

      192.168.11.35,192.168.11.59,192.168.11.56,192.168.11.65,192.168.11.53

      Subnet Prefix Length

      24

      MTU

      9000

      Send ICMP Redirect

      Selected

    7. Verify that the LAXGMT-LB01 load balancer settings are intact by using the values in the previous step.