Book Image

VMware NSX Cookbook

By : Bayu Wibowo, Tony Sangha
Book Image

VMware NSX Cookbook

By: Bayu Wibowo, Tony Sangha

Overview of this book

This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator.
Table of Contents (19 chapters)
Title Page
Packt Upsell
Foreword
Contributors
Preface
Index

Using NSX Endpoint Monitoring


In this recipe, we will configure NSX endpoint monitoring for our selected and supported virtual machines.

Getting ready

You will need to have the following access and configurations present before proceeding with this recipe:

  • Access to the vSphere Web Client.
  • NSX administrator or enterprise administrator access.
  • Flow Monitoring should be enabled - see the previous recipe on how to enable Flow Monitoring in NSX.
  • The NSX enterprise license must be applied.
  • The guest VM should be using one of the supported guest operating systems—Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 2012, or Windows 2016.

Note

Endpoint monitoring currently does not support Linux OS.

  • VMware tools must be installed in the guest VM.
  • A guest introspection service VM must be deployed in the cluster where the guest VM resides.
  • A security group must be created as the endpoint monitoring will monitor a particular security group.
  • A guest VM must be added to the security group that will...