vSphere with Tanzu (VKS) integration with NSX-T Part-2
vSphere with Tanzu (VKS) integration with NSX-T Part-2
Introduction
In the first part of this series, we enabled vSphere with Tanzu on a compute cluster. This allowed developers to use this cluster to run K8s and container-based applications. Vsphere with Tanzu is using the functionality of NSX-T as a networking solution, vSAN as storage solution and so on.
In this part of the blog, we will set up a new Namespace for developers. Developers have two options. They can deploy their container-based application using a vSphere Pod. Alternatively, they can create a K8s cluster on top of a Namespace. In this blog, we will limit the resources a Namespace can use.
Diagram
To deploy, Kubernetes on the vsphere cluster, we have provisioned three ESXi hosts. These hosts are connected to DSwitch (vDS) on uplink-1 (vmnic0), uplink-2 (vmnic1) and are prepared for NSX-T consumption. The compute cluster is already enabled for vSphere HA (default settings), and DRS (fully automated). An edge is already deployed “SA-EDGE-01“. A Tier-0 (K8s-Tier-0) is already deployed. It is connected to the physical environment via BGP. All routes are redistributed to the physical router. For storage purposes, a vSAN (OSA) datastore has been created to provider storage to the K8s Pods

In the first blog, we already enabled the workload management via vSphere client. A cluster of three supervisor cluster has been deployed and a VIP is assigned to to this cluster. NSX-T native load balancing is being used to load balance traffic to this cluster.
NB: In the upcoming part, we will validate the prerequisites required. This will enable workload management for the VI workload domain via SDDC manager.
Configuration
Before we continue, we need to verify the creation of supervisor cluster. To verify, navigate to the Workload Management > Clusters. Cluster SA-Compute-01 is already enabled for vSphere with Tanzu or VMware Kubernetes services (VKS). The supervisor cluster is accessible via IP address 192.168.30.33 or by FQDN resolving to this IP address.

Let’s create our first Namespace “namespace-01“. To create a namespace, navigate to Workload Management > Namespaces, and click on Create Namespace.

A new namespace will be created on top of compute cluster “SA-Compute-01“, and give a name to the namespace “namespace-01”.

Our first namespace “namespace-01” has been created.

Now is the right time to give our developer team access to the Namespace. They can start creating their container-based application using vSphere Pod. They can also build a Kubernetes-based cluster, using either VKS (VMware Kubernetes Services) or Tanzu Kubernetes Grid Service. To add permission, Click on Add Permissions.

Now, lets storage policies vSphere Pod or K8s cluster can use. To add the storage policies, Click on Add Storage.

K8s Storage Policy is our SPBM (Storage based policy management) with FTT=1, Raid=1 policy on the vSAN datastore.
We can enforce limits on CPU, memory, and storage that a namespace will consume. Nevertheless, in this series, we are not enforcing any limits to our newly created namespace.

At last we need to allocate a VM class to our namespace. We can assign multiple VM classes to.a namespace. This VM class will be used by VKS to provide size to K8s worker and control node.

In our lab, we selected best-effort-small VM class for our namespace “namespace-01” due to resource constraints.
Until now, we successfully enabled “Workload Management” and built our first namespace “namespace-01“.

We haven’t configured any vSphere Pod and VKS cluster on our namespace. We will provision our vSphere Pod in our upcoming part of this series.
Let’s verify the same namespace using Kubectl command line interface.

Summary
In the first part of this series, we enabled vSphere with Tanzu on a compute cluster. This allowed developers to use this cluster to run K8s and container-based applications. Vsphere with Tanzu leverages the functionality of NSX-T as a networking solution, vSAN as storage solution and so on.
In this part, we successfully created our first namespace called namespace-01. We also provided necessary permissions, storage policies, VM classes, and resource limits. We can also add content library to our VM class.
In upcoming parts, we will provision vSphere pods, TKG cluster, allowing Harbor repository, and our first application using K8s. We will also verify the requirements from SDDC manager to allow VMware Kubernetes services on VI workload domain.
Comments
Post a Comment