NSX Advanced Load Balancer: NSX-T VLAN Cloud

NSX Advanced Load Balancer ALB Architecture:

  1. Controller: NSX ALB control plane comprises of three controller nodes. The controller is used for management purpose. Controller places virtual service on the data plane component referred to as service engine. Controller nodes communicate with each other and with service engines. Clients access virtual service over required port as shown in the diagram below. Controller to controller latency should be under 10 ms. The health of servers, client connection statistics, and client-request logs collected by the service engines are regularly offloaded to the Controllers.
NSX ALB Controller sizing

Resources allocated to controller VMs affect the number of virtual services and service engines that can be used. Check the table above.

More than one NSX ALB controller cluster will be needed in case number of service engines exceed 400 or number of virtual services exceed 5000.

  1. Service Engine SE: is responsible for handling data traffic. Service engine provides data plane functions such as server load balancing, WAF, GSLB. A maximum of nine interfaces of this VM are available for data traffic with the first interface used for management purpose. Service engines are grouped in service engine groups and a particular virtual service can be placed on corresponding service engine group. Multiple service engine groups can be created on ALB controller to serve different environments, line of business. Number of vCPUs allocated to a deployed service engine will eventually consume NSX ALB license. Controller to service engine latency should be under 75 ms. High availability mode for the service engines is configured under SE group settings. Service engine resource allocation vCPU and memory has direct relationship with ALB performance. Several important parameters go into SE group settings:
  • vCPU, memory and disk per service engine
  • High Availability mode
  • Virtual services per service engine
  • Max number of service engines

In this blog, we will create NSX-T VLAN based cloud on NSX ALB controller.

Bear in mind that you can also create NSX-T cloud backed by overlay networks. NSX-T overlay networking provides key benefits like distributed routing, abstraction from physical network.

One key benefit of creating NSX-T cloud on NSX ALB is that life-cycle management of service engines is handled by ALB Controller; service engines are auto deployed once virtual service is created. Also NSX-T security groups can be used for server pool configuration on NSX ALB. Once NSX-T cloud is created on ALB, controller by itself will upload SE image to content library of vcenter server.

In this lab, I will be using NSX-T VLAN segments. Gateways for the subnets will reside on the physical routers.

vSphere setup in my lab is as below:

vSphere Setup

I have deployed single vcenter server and one NSX manager cluster. These components along with NSX ALB controller typically reside on management cluster. Controller OVA is downloaded from the portal and the three VMs are deployed from vcenter server. Controller clustering is then done and cluster IP is allocated from the same subnet as that of controller nodes. Data plane component of NSX ALB (service engine) is deployed on workload cluster as shown above. Creation of NSX-T cloud on NSX ALB Controller allows auto deployment of this data plane component (service engine).

VLAN Transport Zone on Workload Cluster
Transport Node Profile mapped with the cluster

Servers are prepared for NSX using the above transport node profile on NSX manager.

Servers prepared for NSX
Connectivity of NSX prepared server

Next I will create required NSX VLAN segments from NSX manager and will configure corresponding L3 interface on the physical routers.

NSX VLAN segments created on NSX Manager

Management interface of NSX ALB service engines will be connected to NSX VLAN Segment with VLAN ID 12

Data interface of NSX ALB service engine will be connected to NSX VLAN Segment with VLAN ID 13

In this example, servers are connected to NSX VLAN segment with VLAN ID 13. But your servers can also reside in another NSX-T VLAN segment for example with VLAN ID 14

I will create required user credentials on NSX ALB Controller first.

Create user credentials on NSX ALB Controller

Next I will create NSX-T cloud

NSX configuration in NSX-T Cloud of NSX ALB
vCenter Server config in NSX-T Cloud of NSX ALB
Status of NSX-T Cloud

Assign static IP pools on NSX ALB Controller for:

Service Engine management network and

Service Engine data network

Static IP Pool for service engine management network
Static IP pool for service engine data network

Specify default gateway for data network of service engine under Routing

Default gateway on NSX ALB controller for service engine data network

I will create custom service engine SE group.

SE group settings
Advanced setting of SE group
Custom SE group for NSX-T Cloud

Before creating virtual service on NSX ALB Controller, I will create a dynamic security group in NSX-T based on VM name ‘win’. This security group will be used in server pool configuration of virtual service.

Create dynamic security group based on VM name
Effective members of NSX security group

I will now create virtual service which will then trigger deployment of service engines based on the settings configured in SE group.

Create virtual service

Create server pool while creating virtual service as shown below.

Server pool configuration

Server pool will use NSX-T security group as per below.

Mention NSX-T Security Group in server pool configuration
Server placement network setting in server pool configuration

Continue with Virtual Service configuration:

Server pool on the virtual service.
Place virtual service on custom SE group

Next execute below commands on NSX ALB Controller to configure default route in management vrf of NSX-T cloud

Status of service engines on NSX ALB Controller
Status of virtual service
Connectivity of NSX ALB Service Engines

As shown in figure above, service engine has two networks – one for management and the other for data traffic.

The networks are created from NSX as NSX VLAN segments.

Connectivity of service engine with upstream L3 network

Validation:

Logs on virtual service

Above logs capture:

  • Client IP address
  • Client browser
  • Client OS Type which is Linux
  • Virtual Service IP and port number
  • Client RTT
  • Server RTT
  • Server IP and port number
  • HTTP Request information

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s