Deploy Secure Workload Software Appliance in VMware vSphere

Deploy Secure Workload Software Appliance in VMware vSphere

You can deploy the Secure Workload Software Appliance using the vSphere Client or the vSphere Web Client. The Secure Workload Software Appliance for VMware is distributed using the Open Virtualization Format (OVF), which is a standard method of packaging and deploying virtual machines.

End-to-End deployment workflow

The workflow illustrates the process for deploying the Secure Workload Software Appliance in VMware vSphere.

Table 1. Deployment Steps

Workflow Steps

Description

Prepare for Deployment

Prepare the datacenter, configure storage, and networks

Deploy the Infrastructure Management in VMware vSphere

Download the Infrastructure Management Open Virtual Appliance (OVA) package available from Cisco.com and deploy the OVA using the VMware vSphere web interface.

Deploy the Secure Workload Cluster

Deploy the Secure Workload cluster through the Infrastructure Management interface.

Install Secure Workload Software Appliance

Deploy the Secure Workload software Appliance through the Infrastructure Management interface.

Prepare for deployment

To deploy the Secure Workload Software Appliance in VMware vSphere, your setup must meet these requirements.

System requirements

Hypervisor

  • VMware vSphere version 7.0 and 8.0.

  • Download the Secure Workload Software Appliance installation OVA file for VMware vSphere from the Secure Workload Downloads page.

Software Appliance resource specifications

Table 2. Software Appliance resource specifications

Resource Specification

Workloads <= 20,000

Workloads <= 40,000

Comments

Total vCPU 590 814

all non–end-of-support (EOS) x86-64 CPUs since calendar year 2020

Total Memory 4996 Gib 6852Gib preferred DDR4 or higher memory
Total Usable Storage 78101 GB 118101GB 35k+ IOPs @4K Payload (Read), 25k+ IOPs @4k Payload (Write) and Thin Provisioning), supports iSCSI, FC storages and internal storage

Network

3 (10Gb)

3 (10Gb)

Total number of Hosts

Min 3, Preferred 6

Min 3, Preferred 6

Hypervisor

VMware ESXi

VMware ESXi

SPECint_rate2017

Minimum 1,526

Minimum 2,092

For references, see Cisco Secure Workload Datasheet.


Note


Secure Workload supports all non–end-of-support (EOS) CPUs released from calendar year 2020 onward.


Network specifications

All hosts in the cluster must be equipped with at least 10 Gigabit Ethernet (GbE) interfaces and have the following three virtual networks available for Secure Workload operations.

Management network

The management network (virtual network) is designed specifically for management and administrative purposes. It facilitates secure access for system administrators to perform routine management tasks and critical operations. This network provides a secure and isolated channel for infrastructure configuration, deployment, ongoing management, and decommissioning activities.

Public network

Dedicated or shared public network for external cluster traffic that must be reachable from sensors and clients and have access to the vCenter. This network is used for Secure Workload application access. You must specify a minimum subnet of /28 for 20,000 scale factor and /27 for 40,000 scale factor. If the external network is dedicated with the full range of IP addresses being available, then eight IP addresses are automatically consumed as shown in the following tables.


Note


If the public network is shared, you must define specific available addresses.


Table 3. Public Subnet (/27) and IP Mapping for 20,000 scale factor

IP Address

Description

1st

Gateway

2nd and 3rd

Reserved

4th

Web UI Virtual IP

5th

Sensor Management Virtual IP

6th

Collector-1

7th

Collector-2

8th

Collector-3

9th

Collector-4

10th

Collector-5

11th

Collector-6

12th

Application Interface -1

13th

Application Interface -2

14th

Adhoc-Kafka

30th

Orchestrator-publicIP

Table 4. Public Subnet (/27) and IP Mapping for 40,000 scale factor

IP Address

Description

1st

Gateway

2nd and 3rd

Reserved

4th

Web UI Virtual IP

5th

Sensor Management Virtual IP

6th

Collector-1

7th

Collector-2

8th

Collector-3

9th

Collector-4

10th

Collector-5

11th

Collector-6

12th

Collector-7

13th

Collector-8

14th

Application Interface -1

15th

Application Interface -2

16th

Adhoc-Kafka

30th

Orchestrator-publicIP

Private network

Set up a dedicated private network for internal cluster communication. Make sure your network is not routable or shared. You must use a subnet of /16 (255.255.0.0) for your dedicated network.

VMware vSphere Configuration Settings

Each VMware vSphere deployment can have different requirements, constraints, and best practices depending on your setup. The Secure Workload installer does not change any configuration in the vSphere deployment.

Recommendations for VMware vSphere configuration.

  • Enable the VMware vSphere Distributed Resource Scheduler (DRS), vSphere high availability (HA) for host failure, and vMotion on the cluster where Secure Workload will be deployed. This will help provide availability and performance for instances in the Secure Workload cluster.

  • Ensure datastores are highly available and durable so that they store data redundantly and resist hardware failure.

VMware vSphere Permissions

This section defines what actions a user or service can perform within the vSphere environment. We recommend creating a dedicated user account for the Secure Workload installer and assigning only the minimum required permissions needed for installation.

The following permissions are commonly assigned for Secure Workload installation:

  • Content library

  • Datastore

  • Folder/create folder

  • Network\assign network

  • Resource and tasks

  • Virtual Machine

  • dvPort Group

  • vApp

  • vSphere Tagging (Labeling)

VMware vSphere Objects and Permissions

Table 5. Objects and Permissions

vSphere Objects

Permissions

Content Library

Add or delete library item

Datastore

  • Allocate space

  • Browse datastore

  • Configure datastore

  • Low level file operations

  • Move datastore

  • Remove datastore

  • Remove file

  • Rename datastore

  • Update virtual machine files

  • Update virtual machine metadata

Folder

  • Create folder

  • Delete folder

  • Move folder

  • Rename folder

vSphere Tagging

Assign or Unassign vSphere Tag on Object

Network

  • Assign network

  • Configure

  • Move network

  • Remove

Resource

  • Apply recommendation

  • Assign vApp to resource pool

  • Assign virtual machine to resource pool

  • Create resource pool

  • Migrate powered off virtual machine

  • Migrate powered on virtual machine

  • Modify resource pool

  • Move resource pool

  • Query vMotion

  • Remove resource pool

  • Rename resource pool

Scheduled task

  • Create tasks

  • Modify task

  • Remove task

  • Run task

Profile-driven storage

  • Profile-driven storage update

  • Profile-driven storage view

Tasks

  • Create task

  • Update task

vApp

Import

Virtual machine

  • Change Configuration

    • Acquire disk lease

    • Add existing disk

    • Add new disk

    • Add or remove device

    • Advanced configuration

    • Change CPU count

    • Change Memory

    • Change Settings

    • Change Swapfile placement

    • Change resource

    • Configure Host USB device

    • Configure Raw device

    • Configure managedBy

    • Display connection settings

    • Extend virtual disk

    • Modify device settings

    • Query Fault Tolerance compatibility

    • Query unowned files

    • Reload from path

    • Remove disk

    • Rename

    • Reset guest information

    • Set annotation

    • Toggle disk change tracking

    • Toggle fork parent

    • Upgrade virtual machine compatibility

  • Edit Inventory

    • Create from existing

    • Create new

    • Move

    • Register

    • Remove

    • Unregister

  • Interaction

    • Answer question

    • Backup operation on virtual machine

    • Configure CD media

    • Configure floppy media

    • Connect devices

    • Console interaction

    • Create screenshot

    • Defragment all disks

    • Drag and drop

    • Guest operating system management by VIX API

    • Inject USB HID scan codes

    • Install VMware Tools

    • Pause or Unpause

    • Perform wipe or shrink operations

    • Power off

    • Power on

    • Record session on virtual machine

    • Replay session on virtual machine

    • Reset

    • Resume Fault Tolerance

    • Suspend

    • Suspend Fault Tolerance

    • Test failover

    • Test restart Secondary VM

    • Turn off Fault Tolerance

    • Turn on Fault Tolerance

  • Provisioning

    • Allow disk access

    • Allow file access

    • Allow read-only disk access

    • Allow virtual machine download

    • Allow virtual machine files upload

    • Clone template

    • Clone virtual machine

    • Create template from virtual machine

    • Customize guest

    • Deploy template

    • Mark as template

    • Mark as virtual machine

    • Modify customization specification

    • Promote disks

    • Read customization specifications

Infrastructure Management parameters

The Secure Workload Infrastructure Management or Manager helps in provisioning and managing the virtual machines that comprise your Secure Workload cluster within your VMware vSphere environment.

The table list and describe key parameters required for Secure Workload Infrastructure Manager operation in a VMware vSphere environment.

Table 6. Configure Parameters

Field

Description

CSW Cluster Name

The Cluster Name refers to the folder you create in VMware vSphere to organize your deployment. It must follow these naming rules:

  • Use alphanumeric characters only (A–Z, a–z, 0–9)

  • Cannot begin with a number

  • Maximum length is 8 characters

Additionally, ensure that the password does not contain the '@' character.

vSphere Port

The port used to connect to the vSphere host. This field is optional and defaults to 443.

vSphere Host

The IP address or hostname of the VMware vCenter server. 

vSphere User

The username for the VMware vSphere account that has the necessary roles to upload files and create virtual machines. 

vSphere Password

The password for the VMware vSphere account.

vSphere Datacenter

The name of target VMware vSphere datacenter.

vSphere Cluster

The cluster where Secure Workload virtual machines will be placed.

vSphere VM Folder Name

The folder where Secure Workload virtual machines will be placed. (nested folders not supported).

vSphere Datastore Folder Name

The datastore folder where disk images and state files are stored.

vSphere Datastore

The datastore for virtual machine storage allocation.

vSphere Disk Mode

Determines how a virtual machine's virtual disk space (thick or thin) is allocated and managed on the datastore.

vSphere Management Network

The network dedicated to the administrative plane of vSphere environment.

vSphere Private Network

The internal network for communication among Secure Workload virtual machines.

vSphere Public Network

The network that clients, sensors, and other external systems uses to communicate with the Secure Workload cluster.

DNS Servers

The IP addresses of the Domain Name System servers that the Secure Workload cluster uses to resolve hostnames to IP addresses for internal and external communication.

Private IP Subnet

The IP address range designated for the internal, private network communication among the virtual machines within the Secure Workload cluster.

Max Scale

Select the scale factor from 20,000 or 40,000.

Configuration for Software Appliance setup UI

Site Information

Site Information refers to the comprehensive collection of network, vSphere environment, and optional advanced configuration parameters that the Cisco Secure Workload Infrastructure Manager requires to successfully deploy and integrate the Secure Workload cluster.

Network tab

The Network tab configures the Secure Workload cluster's external network. The external network defines the subnet used for external communication. This subnet must be according to the scale factor.

If you do not configure external IP addresses manually in the Advanced tab, the system uses automatic assignment with the following rules:

  • IP addresses are allocated automatically.

  • The first and last three IP addresses in the subnet are skipped.

  • Usable IP addresses start from the fourth IP address and go up to the 4th-to-last IP address.

  • The first usable IP address in the subnet is always used as the gateway.

Example:

If you specify the subnet 192.168.1.0/28:

  • 192.168.1.1 will be used as the gateway.

  • IP addresses based on subnet will be assigned automatically.

Advanced tab

The Advanced tab allows you to manually configure external IP addresses for the deployment instead of relying on automatic assignment. This is useful when using a shared subnet for the public network and you need precise control over which IP addresses are allocated.


Note


The Advanced Tab is optional. If not configured, the system will automatically assign external IP addresses based on the rules defined in the Network Tab.


Deploy the Infrastructure Management OVA

Use this procedure to deploy the Infrastructure Management Open Virtual Appliance (OVA), a single-file package based on the Open Virtualization Format (OVF) template, using the VMware vSphere web interface.

Before you begin

Procedure


Step 1

Log in to the VMware vSphere web interface.

Step 2

Create a new folder with the intended site name of the cluster to organize your deployment.

Step 3

Initiate the OVF Template deployment.

  1. Right-click the target cluster where you want to deploy the OVA.

  2. Select Deploy OVF Template.

Step 4

Perform these steps in the Deploy OVF Template wizard.

  1. Select an OVF template

    Choose Local File and then Upload Files to browse and select the downloaded OVA file from your local system. Click Next.

  2. Select a name and folder

    1. Enter the Infrastructure virtual machine name.

    2. Select the Secure Workload deployment folder that carries the cluster site name. Click Next.

  3. Select a compute resource

    Choose the host or cluster where the virtual machine will run. This determines the compute resources allocated to the virtual machine. Click Next.

  4. Review details

    Review the details of the OVF template, including hardware requirements and any warnings or information and click Next.

  5. License agreements

    Review the licensing agreement, and if you agree to the terms, click Accept and click Next.

  6. Select storage

    Choose the datastore that you want for the deployment. You can leave all other options at their default settings, unless the environment requires other settings. Click Next.

  7. Select networks

    Choose the appropriate network mapping for each category and click Next.

    • Configuration: Enter the routable network where the infrastructure manager can be reached during the deployment phase of the cluster bring up. Use a network that is different from the public network.

    • Private: Enter the non-routed internal network that Secure Workload will use for internal communication.

    • Public: Enter the routable network where the GUI, collectors, and virtual IP addresses will be reachable.

  8. Customize template

    Enter the infrastructure manager reachability details for the configuration network and click Next.

    • IP Address: Enter the dotted quad notation of the IP address for the infrastructure manager.

    • Netmask: Enter the dotted quad notation of the netmask for the network.

    • Gateway: Enter the dotted quad notation gateway IP for the orchestrator on the configuration network.

  9. Ready to complete

    Confirm all of your configuration parameters and click Finish.

    The Infrastructure Management OVF deployment begins. The deployment typically completes within a few minutes.

    Note

     

    You may need to refresh the VMware vSphere session to access the virtual machine.

Step 5

Power on the deployed Secure Workload Infrastructure Management virtual machine.

  • Right-click the virtual machine, select Power, and then choose Power On. The IP address configured in step #4.h responds to ping requests within a few minutes.

Step 6

Access the Secure Workload Infrastructure Management interface.

  • Open a browser and navigate to https://<infrastructure-manager-ipaddress/admin>. The ipaddress is as defined in the step #4.h.


The Cisco Secure Workload Infrastructure Management Setup page appears.

What to do next

Deploy Cisco Secure Workload Cluster.

Provision the Infrastructure Manager for Cisco Secure Workload cluster

Use this procedure to deploy the the Secure Workload cluster through the Infrastructure Management interface.

Before you begin

Procedure


Step 1

In a browser enter the Infrastrcture Management IP address using the format https://infrastructure-manager-ipaddress/admin.

The Cisco Secure Workload Infrastructure Management Setup page appears.

Step 2

Configure Infrastructure Parameters. Define and set all necessary vSphere configuration parameters for the cluster infrastructure, specifying where the cluster will be provisioned. For more information on each parameter, see Configuration Parameters for the Infrastructure Maanger.

Step 3

Upload the tetration_os_ova_k9 RPM file.

Step 4

Perform Pre Provision validations.

Select Pre Provision to run a validation check. This ensures that all the prerequisites are met before deployment.

Step 5

Initiate Cluster Deployment.

Select Provision to begin cluster provisioning and deployment. This action creates the virtual machines for the cluster.

Note

 

Destroy Cluster permanently deletes the cluster and all its associated resources, including virtual Machines, storage, and network configurations.


The cluster is deployed and virtual machines are created in the VMware vSphere.

What to do next

Install Secure Workload Software Appliance on the virtual machines.

Cluster provisioning Status panels

During and after the cluster provisioning, you can monitor its progress and details in the status panels.

  • Current Status: Provides real-time feedback on the active provisioning action, its current state, and the specific progress being made. For example, VMs created successfully.

  • Instances: Displays comprehensive details of all virtual machine instances provisioned as part of the Secure Workload cluster.

  • Logs: Offers detailed operational logs that provide granular, step-by-step information and events related to the entire provisioning process.

Install Secure Workload Software Appliance

Use this procedure to deploy the the Secure Workload software Appliance through the Infrastructure Management interface.

Before you begin

Procedure


Step 1

In a browser enter the Infrastructure Management IP address using the format https://infrastructure-manager-ipaddress/admin.

The Cisco Secure Workload Infrastructure Management Setup page appears.

Step 2

From the menu, choose UI Setup.

Step 3

Upload the five RPMs individually. Ensure each upload completes successfully before you proceed. Click Continue after all the RPMs are uploaded and installed.

Step 4

Configure the cluster site.

  1. Enter the Site Name and SSH Public Key and click Continue.

  2. Add the Email/Username & SMTP details and click Continue.

  3. Refer to the Site Information for each of the fields in the the Advanced, Network, Service, Security, and UI tabs and fill in the required cluster information. Click Continue.

Step 5

In Pre Deploy Config, the system runs a validation check. Click Continue.


The Secure Workload software appliance is installed on the virtual machines that were created on VMware vSphere.


Note


It takes a few hours to deploy the Secure Workload software appliance on all the virtual machines.