VMware Cloud on AWS vSAN

Deploying the vSAN Witness Appliance within VMware Cloud on AWS

vSAN Witness Appliance

Shortly after clarifying that VMware Cloud on AWS is a supported hosting environment for the vSAN Witness Appliance, there was a rush of inquiries into what is involved in its’ setup.

Deploying a vSAN Witness Appliance in VMware Cloud on AWS is a straightforward process.  Since the Witness Appliance is running as a client workload inside VMC, we need to ensure network connectivity between the Compute Gateway (CGW) and every remote vSphere host.

VMware Cloud on AWS supports a robust collection of connectivity options from IPSec VPN to AWS Direct Connect and everything in between. However you choose to connect the remote site to the VMC SDDC. Once basic network connectivity is established, the CGW Firewall must be configured to allow the Witness traffic through. Before we get into the ports and protocols used, lets briefly review the network architecture of the vSAN Witness Appliance.

 

vSAN Witness Network configuration

The vSAN Witness Appliance comes preconfigured with two VMkernel Adapters connected to dedicated Virtual Switches making it easier to separate the Management traffic from the vSAN Witness communications.

vSAN Witness Appliance

If using a single subnet, both adapters can be attached to the same network without issue. See the vSAN Stretched Cluster Guide for more information on designing a Stretched Cluster deployment and the networking considerations therein.

Regardless of the number of networks and underlying connectivity, the CGW firewall needs to be configured to allow the Witness Appliance in to and out of the VMC SDDC.

 

Firewall configuration for the vSAN Witness Appliance

A complete listing of the Ports and Protocols used by VMware vSphere can be found in the vSphere 6.7 Security documentation, as well as the vSAN Specific ports and their uses. Table 1 lists the minimum firewall rules required to enable the vSAN Witness out of the CGW firewall.

 

Table 1) vSAN Witness Network Ports and traffic flow

Source

Destination Protocol Port

Description

vCenter

Witness – Mgmt

UDP

902

vSphere Web Client

vCenter Witness – Mgmt

TCP

443

vSphere Web Client

vCenter

Witness – Mgmt

TCP

902

vSphere Web Client

vCenter

Witness – Mgmt TCP 9080

I/O Filter Service

Witness – Mgmt vCenter TCP 443

vSphere Web Client

Witness – Mgmt vCenter TCP 902

vSphere Web Client

Witness – Mgmt vCenter TCP 9080

I/O Filter Service

Witness – vSAN vSphere TCP 2233

vSAN Transport

vSphere

Witness – vSAN TCP 2233

vSAN Transport

vSphere

Witness – vSAN UDP 12321

vSAN Clustering Service

Witness – vSAN

vSphere UDP 12321

vSAN Clustering Service

Witness – vSAN vSphere ICMP

vSAN Health Check

vSphere

Witness – vSAN ICMP

vSAN Health Check

 

Putting it all together

 

To deploy a vSAN Witness Appliance within VMware Cloud on AWS, start by deploying the witness OVA just as you would on-premises.

 

vSAN Witness Appliance

Once the ova is finished deploying, Create the relevant rules to allow the witness communications through the Compute Gateway firewall.

vSAN Witness Appliance

 

Finally, Add the new vSAN Witness Appliance to the destination vCenter and configure the Stretched Cluster appropriately.

vSAN Witness Appliance

 

I hope this helps accelerate your Witness deployments inside VMware Cloud on AWS. For more information about vSAN Stretched Clusters or the vSAN Witness in general, check out StorageHub.

@glnsize