vRealize Automation 8: Network Profiles – Existing Network

Table of Contents:

Tags:

Introduction

The first and most easy way to use a Network Profile, is to deploy in an existing network. In that case there are no network components that needs to be created on the fly, hence the configuration is easy.

The following instructions will show how to create a Network Profile and configure it accordingly.

  1. Go to the Infrastructure > Network Profiles page and click on [+ New Network Profile]
  2. On the Summary page, provide the following information:
    • Account / region
    • Name
    • Optionally a description
    • Capabilities, which have to match constraints on a blueprint
  3. On the Networks page, add the appropriate existing networks. Remember, if you have more than more network, tags can be used as blueprint constraints in order to match to tagged networks to avoid ambiguity.
  4. On the Network Polices page, there is no need to do perform any configuration.
  5. Click on Create
The image shows a "New Network Profile" creation screen from vRealize Automation 8, with tabs for "Summary," "Networks," "Network Policies," "Load Balancers," and "Security Groups" across the top. The "Summary" tab is selected, indicating the section where basic information about the new network profile is provided. The fields include "Account / region" with an icon and text indicating 'SC labs / SCLABS', the "Name" of the profile as 'NP_Default', and a "Description" box containing the text 'This is the default network'. Below, there is a "Capabilities" section where "Capability tags" are displayed with one tag entered as 'network:standard', suggesting this tag is used to match network profile capabilities to constraint tags in service blueprints. The bottom of the screen features "CREATE" and "CANCEL" buttons, allowing the user to finalize the creation of the new network profile or abandon it.
The image displays the "New Network Profile" configuration screen in vRealize Automation 8, with the "Network Policies" tab selected. Users are provided with options for network creation, specifically for outbound and private networks. The first option, "Do not create on-demand network or on-demand security group," is selected, indicating that no automatic network or security group will be created with this profile. The other options to "Create an on-demand network" or "Create an on-demand security group" are not selected. Under the "Network Resources" section, there are search fields for "External network," "Compute Resources," "Edge cluster," and "Edge datastore," all empty and awaiting input. At the bottom of the interface are "CREATE" and "CANCEL" buttons, allowing the user to either save the new network profile or discard the changes.

Once the network profile has been created, you can go to the blueprint and add a Network element. The following yams shows the code, for an ElasticSearch Deployment (we skip the code to install ElasticSeach) that goes to a specific existing network (we use tags to identify the currect network profile):

formatVersion: 1
name: ElasticStack
version: 1
description: Installs Elastic Stack on a single machine
inputs:
  image:
    type: string
    enum:
      - ubuntu1604
      - Ubuntu1804
    description: Image/OS required
    title: Image/OS
    default: Ubuntu1804
  flavor:
    type: string
    enum:
      - small
      - medium
    description: Choose the size of the machine
    title: Flavor
    default: medium
  network:
    type: string
    title: Network
    description: Input the network tag information
    default: 'network:vlan41'
  region:
    type: string
    description: Input the region that the resources belong to
    title: Region
    default: 'region:sc-central-1'
  key:
    type: string
    title: Public Key
    description: Input Public Key outputted from the script
    default: ENTER-PUBLIC-KEY
  name:
    type: string
    title: VM Name
    description: Name of the virtual machine
resources:
  Elastic_Stack_NODE:
    type: Cloud.Machine
    properties:
      name: elastic_stack_node
      flavor: '${input.flavor}'
      image: '${input.image}'
      cloudConfig: |
        #cloudconfig
        repo_update: true
        repo_upgrade: all
        package_update: true
        package_upgrade: all
        hostname: ${input.name}
        manage_etc_hosts: true

        runcmd:
        - echo "${input.key}" >> /root/.ssh/authorized_keys
        - echo "${input.key}" >> /home/ubuntu/.ssh/authorized_keys
        - chmod 400 /root/.ssh/vmware.pub
      networks:
        - name: '${Elastic_Stack_Network.name}'
          tags: []
          network: '${resource.Elastic_Stack_Network.id}'
          securityGroups: []
          assignPublicIpAddress: false
      constraints:
        - tag: '${input.region}'
  Elastic_Stack_Network:
    type: Cloud.Network
    properties:
      name: Elastic_Stack_Network
      networkType: existing
      constraints:
        - tag: '${input.network}'

Autor

Dr. Guido Söldner

Geschäftsführer

Guido Söldner ist Geschäftsführer und Principal Consultant bei Söldner Consult. Sein Themenfeld umfasst Cloud Infrastruktur, Automatisierung und DevOps, Kubernetes, Machine Learning und Enterprise Programmierung mit Spring.