vRA 8 + NSX-T Blog Series Part 6: vRA 8 Blueprint with On-demand Security Group
You can create a vRA 8 blueprint to deploy machines and place them in an on-demand NSX-T security group.
Demo Product Versions
- vSphere 6.5 U3
- vRA 8.0.1 (including vRSLCM and vIDM)
- NSX-T 2.5.1
- vSAN 6.6.1
- NSX-T account connected
- Basic infrastructure configured (Projects, Cloud Zones, Flavor Mappings, Image Mappings)
- logical network(s) configured
- Create or edit a network profile.
- Select “Create an on-demand security group” in the network profile.
- Create a blueprint with Cloud Agnostic Machine and NSX Network objects.
- Create inputs in the blueprint to customize the machine name.
Demo / Example
Configure Network Profile
- Go to “Infrastructure” > “Network Profiles” (under Configure) and click “+ NEW NETWORK PROFILE”. (or you can choose to edit an existing network profile that has existing networks).
- Choose an account/region and give the profile a name.
- Configure existing networks.
- Go to “Network Policies” tab and select “Create an on-demand security group” radio button.
- Save the network profile.
Create and Configure Blueprint
- Go to “Blueprints” and Click “+ NEW” to create a new blueprint. (or you can choose to use an existing blueprint that uses existing networks).
- Give a name to the blueprint and choose a project.
- Drag on a Cloud Agnostic Machine and a NSX Network onto the canvas. Note that you do not need to add the Security Group object to the blueprint.
- Connect the Cloud Agnostic Machine to the NSX Network on the canvas.
- On the right side in the YAML file, choose an image and size for the machine.
- network:, add the line
assignment: staticto give a static IP address to the machine.
- For the network, choose
- Click “TEST”.
- Click “DEPLOY” to create a new deployment.
- Give it a deployment name, choose “Current Draft”, the cick “DEPLOY”.
- Once deployed, log into NSX-T UI and go to “Advanced Networking & Security” > “Inventory” > Groups”. You will see that a new security group has been created with the name starting with “isolation-securitygroup”.
- Go to “Security” > “Distributed Firewall”.
- You will see that a new firewall section has been created for the security group that has just been created. If you set the
networkTypein the blueprint as
private, you will see that the rules reject all inbound and outbound traffic. If you set the
outbound, the rules will allow outbound traffic and reject only the inbound traffic.
Demo / Example Blueprint YAML File