{"id":725,"date":"2013-07-25T23:25:18","date_gmt":"2013-07-26T05:25:18","guid":{"rendered":"http:\/\/benincosa.com\/blog\/?p=725"},"modified":"2014-11-19T11:24:32","modified_gmt":"2014-11-19T17:24:32","slug":"nexus-1000v-a-kinder-gentler-approach","status":"publish","type":"post","link":"https:\/\/benincosa.com\/?p=725","title":{"rendered":"Nexus 1000v &#8211; A kinder gentler approach"},"content":{"rendered":"<p>One of the issues skeptical Server Administrators have with the 1000v is that they don&#8217;t like the management interface being subject to a virtual machine. \u00a0Even though the 1000v can be configured so that if the VSM gets disconnected\/powered-off\/blownup the system ports can still be forwarded. \u00a0But that is voodoo. \u00a0Most say: \u00a0Give me a simple access port so I can do my business.<\/p>\n<p>I&#8217;m totally on board with this level of thinking. \u00a0After all, we don&#8217;t want any Jr. Woodchuck network engineer to be taking down our virtual management layer. \u00a0So let&#8217;s keep it simple.<\/p>\n<p>In fact! \u00a0You may not want Jr. Woodchuck Networking engineer to be able to touch your production VLANs for your production VMs. \u00a0Well, here&#8217;s a solution for you: \u00a0You don&#8217;t want to do the networking, but you don&#8217;t want the networking guy to do the networking either. \u00a0So how can we make things right? \u00a0Why not just ease into it. \u00a0The diagram below, presents, the NIC level of how you can configure your ESXi hosts:<\/p>\n<p><a href=\"http:\/\/benincosa.com\/blog\/wp-content\/uploads\/2013\/07\/Screen-Shot-2013-07-25-at-10.35.17-PM.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-735\" title=\"Screen Shot 2013-07-25 at 10.35.17 PM\" src=\"http:\/\/benincosa.com\/blog\/wp-content\/uploads\/2013\/07\/Screen-Shot-2013-07-25-at-10.35.17-PM.png\" alt=\"\" width=\"500\" \/><\/a><\/p>\n<p>Here, is what is so great about this configuration. \u00a0The VMware administrator can use things &#8220;business as usual&#8221; with the first 6 NICs.<\/p>\n<p>Management A\/B teams up with vmknic0 with IP address 192.168.40.101. \u00a0This is the management interface and used to talk to vCenter. \u00a0This is not controlled by the Nexus 1000v. \u00a0Business as usual here.<\/p>\n<p>IP Storage A\/B teams up with vmknic1 with IP address 192.168.30.101. This is to communicate with storage devices (NFS, iSCSI). \u00a0Not controlled by Nexus 1000v. \u00a0Business as usual.<\/p>\n<p>VM Traffic A\/B team up. \u00a0This is a trunking interface and all kinds of VLANs pass through here. \u00a0This is controlled either by a virtual standard switch or using VMware&#8217;s distributed Virtual Switch. \u00a0Business as usual. \u00a0You as the VMware administrator don&#8217;t have to worry about anything a Jr. Woodchuck Nexus 1000v administrator might do.<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter\" src=\"http:\/\/images4.wikia.nocookie.net\/__cb20130630170834\/disney-microheroes\/images\/thumb\/4\/43\/JuniorWoodchucks_RichB.png\/185px-JuniorWoodchucks_RichB.png\" alt=\"\" width=\"185\" height=\"113\" \/><\/p>\n<p>Now, here&#8217;s where its all good. \u00a0With UCS you can create another vmknic2 with IP address 192.168.10.101. \u00a0This is our link that is managed by the Nexus 1000v. \u00a0In UCS we would configure this as a trunk port with all kinds of VLANs enabled over it. \u00a0This can use the same VNIC Template that the standard VM-A and VM-B used. \u00a0Same VLANs, etc.<\/p>\n<p>(Aside: \u00a0Some people would be more comfortable with 8 vNICs, Then you can do vMotion over its own native VMware interface. \u00a0In my lab this is 192.168.20.101)<\/p>\n<p>The difference is that this IP address 192.168.10.101 belongs on our Control &amp; Packet VLAN. \u00a0This is a back end network that the VSM will communicate with the VEM over. \u00a0Now, the only VM kernel interface that we need to have controlled by the Nexus 1000v is the 192.168.10.101 IP address. \u00a0And this is isolated from the rest of the virtualization stack. \u00a0So if we want to move a machine over to the other virtual switch, we can do that with little problem. \u00a0A simple edit of the VMs configuration can change it back.<\/p>\n<p>Now, the testing can coexist on a production environment because the VMs that are being tested are running over the 1000v. \u00a0Now you can install the VSG, DCNM, the ASA 1000v, and all that good vPath stuff, and test it out.<\/p>\n<p>From the 1000v, I created a port profile called &#8220;uplink&#8221; that I assign to these two interfaces:<\/p>\n<blockquote><p>port-profile type ethernet uplink<br \/>\nvmware port-group<br \/>\nswitchport mode trunk<br \/>\nswitchport trunk allowed vlan 1,501-512<br \/>\nchannel-group auto mode on mac-pinning<br \/>\nno shutdown<br \/>\nsystem vlan 505<br \/>\nstate enabled<\/p><\/blockquote>\n<p>By making it a system VLAN, I make it so that this control\/packet VLAN stays up.  For the vmknic (192.168.10.101) I also created a port profile for control:<\/p>\n<blockquote><p>port-profile type vethernet L3-control<br \/>\ncapability l3control<br \/>\nvmware port-group<br \/>\nswitchport mode access<br \/>\nswitchport access vlan 505<br \/>\nno shutdown<br \/>\nsystem vlan 505<br \/>\nstate enabled<\/p><\/blockquote>\n<p>This allows me to migrate the vmknic over from being managed by VMware to being managed by the Nexus 1000v.  My VSM has an IP address on the same subnet as vCenter (even though its layer 3)<\/p>\n<blockquote><p>n1kv221# sh interface mgmt 0 brief<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\nPort     VRF          Status IP Address                            Speed    MTU<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\nmgmt0    &#8212;           up     192.168.40.31                         1000     1500<\/p><\/blockquote>\n<p>Interestingly enough, when I do the sh module vem command, it shows up with the management interface:<\/p>\n<blockquote><p>Mod  Server-IP        Server-UUID                           Server-Name<br \/>\n&#8212;  &#8212;&#8212;&#8212;&#8212;&#8212;  &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;  &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<br \/>\n3    192.168.40.102   00000000-0000-0000-cafe-00000000000e  192.168.40.102<br \/>\n4    192.168.40.101   00000000-0000-0000-cafe-00000000000f  192.168.40.101<\/p><\/blockquote>\n<p>On the VMware side, too, it shows up with the management interface: 192.168.40.101<\/p>\n<p><a href=\"http:\/\/benincosa.com\/blog\/wp-content\/uploads\/2013\/07\/Screen-Shot-2013-07-25-at-10.36.58-PM.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-737\" title=\"Screen Shot 2013-07-25 at 10.36.58 PM\" src=\"http:\/\/benincosa.com\/blog\/wp-content\/uploads\/2013\/07\/Screen-Shot-2013-07-25-at-10.36.58-PM.png\" alt=\"\" width=\"352\" height=\"257\" \/><\/a><\/p>\n<p>Even though I only migrated the 192.168.10.101 vmknic over.<\/p>\n<p>This configuration works great. \u00a0It provides a nice opportunity for the networking team to get with it and start taking back control of the access layer. \u00a0And it provides the VMware\/Server team a clear path to move VMs back to a network they&#8217;re more familiar with if they are not yet comfortable with the 1000v.<\/p>\n<p>Let me know what you think about this set up.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the issues skeptical Server Administrators have with the 1000v is that they don&#8217;t like the management interface being subject to a virtual machine. \u00a0Even though the 1000v can be configured so that if the VSM gets disconnected\/powered-off\/blownup the system ports can still be forwarded. \u00a0But that is voodoo. \u00a0Most say: \u00a0Give me a&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[990,147,1,101,39],"tags":[186,184,981,185],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/benincosa.com\/index.php?rest_route=\/wp\/v2\/posts\/725"}],"collection":[{"href":"https:\/\/benincosa.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/benincosa.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/benincosa.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/benincosa.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=725"}],"version-history":[{"count":5,"href":"https:\/\/benincosa.com\/index.php?rest_route=\/wp\/v2\/posts\/725\/revisions"}],"predecessor-version":[{"id":2759,"href":"https:\/\/benincosa.com\/index.php?rest_route=\/wp\/v2\/posts\/725\/revisions\/2759"}],"wp:attachment":[{"href":"https:\/\/benincosa.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/benincosa.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/benincosa.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}