Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Part05-(Picture and text) configuration Endpoint for vRealize Automation Center 6.2.1 Series

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Once the initialization architecture is complete, it is time to prepare the configuration phase. The first thing that needs to be configured is Endpoint, because Endpoint is the source reader interface for external computing resources. Many Endpoints types supported by vRealizeAutomation Center 6.2.1 include:

OvSphere

OCitrix XenServer

O RedHat Virtualization Manager

OSCVMM

O Hardware

OStorage

OAmazon EC2

O.

This article explains how to add vSphereEndpoint to vRA for external computing resource providers. The steps are as follows:

1. First, log in to the vRA server using the IaaSAdministrator account configured in Part05. Because only this account has permission to configure things related to IaaSInfrastructure, other accounts do not have permission.

2. After logging in to the vRA management interface, the first thing to do is to enter the License required by Infrastructure, click Administration > Licensing, and click Add License, as shown in the following figure:

3. After the License input is completed, you can continue. Click Infrastructure > Endpoints > Ednpoins. As shown in the following figure, you can add a new Endpoint with many options, but in this case, we can select the last option:

4. In the action of step 3, the window shown in the following figure will pop up, which contains a series of messages:

O Name- vCenter

OAddress-https://vcsa.vmanager.cn/sdk

OCredentials-enter the account permissions required to access computing resources

If you need to integrate with NSX or vCNS, you can check the Specifymanager fornetwork and security platform option and enter the message of NSX or vCNS. If not, you don't need to pay attention to this one.

5. When you select the Credentials option in step 3, the window shown in the following figure will pop up. This window is set to Credentials, click NewCredentials in this window, and then type:

O Name- to facilitate identification, it is recommended to enter vCenter directly

ODescription-this can be set according to use, permission level, and scope of scope, or not

O UserName-[url=mailto: the correct format should be xxxx@xxxx.xx] the correct format should be xxxx@ xxxx.xx [/ url]. Note that the account here must have permission to access the Endpoint vcsa. If not, it will not be able to effectively obtain computing resources.

OPassword-two password confirmations are required

In theory, so far, Endpoint has been successfully added. However, there is one more thing to configure in IaaS, that is, FabricGroup, which we emphasized in the previous course is responsible for materializing the resources of Endpoints so that we can call

6. Click Infrastructure > Groups > Fabric Groups to go to the add window of FabricGroup, and enter the following message in the NewFabricGroup window shown in the figure below:

O Name- enter the name of the Fabric Group you intend to define, which can be defined by use or associated with Tenant

ODescription-describe the resource information of this Fabric Group, but leave it empty

OFabric administrators-this option sets which user has the right to manage this FabricGroup. The detailed concept of permission has been discussed in our training course.

OComputes resources-Select computing resources. You can add computing resources from both Endpoints and Agents by checking it.

After clicking Ok, you can complete the creation of FabricGroup.

So far, the addition of IaaSEndpoints has been completed, to be continued.

Virtual Human: focus on Virtualization and Cloud Computing

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report