
Before you begin
- Labs create a Google Cloud project and resources for a fixed time
- Labs have a time limit and no pause feature. If you end the lab, you'll have to restart from the beginning.
- On the top left of your screen, click Start lab to begin
In this lab, you will inspect a Google Cloud VMware Engine Private Cloud and explore vSphere, NSX-T, and HCX management appliances.
In this lab, you'll learn how to perform the following tasks:
This is a read-only lab that allows you to connect to a GCVE private cloud. It also allows you to inspect vSphere and other VMware appliances via a jump host. This is not a typical lab where you will be able to create or edit Google Cloud resources. The lab is designed to give you an overview of the GCVE service and how it can be used to support VMware workloads.
Read these instructions. Labs are timed and you cannot pause them. The timer, which starts when you click Start Lab, shows how long Google Cloud resources will be made available to you.
This hands-on lab lets you do the lab activities yourself in a real cloud environment, not in a simulation or demo environment. It does so by giving you new, temporary credentials that you use to sign in and access Google Cloud for the duration of the lab.
To complete this lab, you need:
Since this is a temporary account, which will last only as long as this lab:
In this task you will learn about the permissions required to manage Google Cloud VMware Engine.
Google Cloud VMware Engine uses Google Cloud IAM roles to control access to resources. The following predefined roles are available for Google Cloud VMware Engine:
In a typical environment, the users who will administer the VMware Engine Private Clouds will need to be assigned the VMware Engine Service Admin IAM role.
The VMware Engine Service Viewer role can be used for users who only require Read-Only access to VMware Engine. This configuration has already been set in your lab environment.
The VMware Engine Service Agent role gives permission to manage network configuration, such as establishing network peering, necessary for Google Cloud VMware Engine.
Now that you understand the roles, let's inspect the Google Cloud VMware Engine Private Cloud.
In the Google Cloud Console, ensure your project is set to
Open the Navigation menu () and click IAM & Admin > IAM.
Click Grant Access.
In the "Select a role" dropdown, type VMware.
You should see the following VMware engine roles that we discussed earlier:
This would be the place where you would assign the roles to the users who will be managing the Google Cloud VMware Engine Private Clouds.
Now click Cancel to close the "Grant Access" panel.
Click the Google Cloud logo in the top left corner to return to the Google Cloud Console home page.
You will now inspect a Google Cloud VMware Engine Private Cloud to understand the components that make up the environment.
In the Google Cloud console tab, from the project dropdown, click All and then select qwiklabs-gcve-quiz-lab.
Open the Navigation menu () and click View All Products to expand the menu to the full list of services.
Scroll down to the Compute section, hover over VMware Engine and click the Pin icon to pin VMware Engine to your menu.
Click VMware Engine.
You should see that there is one existing Private Cloud named lab-private-cloud
. This is the Private Cloud that was pre-created for you to inspect in this read-only environment.
Here you can see more detailed information for your selected Private Cloud, such as:
At the bottom of the page there are multiple tabs to choose from which contain more information about your private cloud.
Here you can see the main management servers that make up the Private Cloud, which are
On the Clusters tab you can see the vSphere clusters that make up our Private Cloud. In this lab, you only have a single cluster, however, typically Google Cloud customers will have multiple clusters. On this tab you can also add additional clusters to your Private Cloud.
Here you can see more details about the cluster and the ESXi Nodes that make up the cluster (ESXi Nodes are dedicated bare-metal servers hosted in Google Cloud that provide compute, storage, and networking resources for virtual machines).
Click the back arrow next to the name of your private cloud.
Click the Subnets tab from the left-hand menu.
This tab allows you to see how your Management IP Address range gets distributed. The first /26
is reserved for the System management subnet, which is where all of the management appliances live (for example, vCenter, NSX-T, etc.)
Five subnets to note are the subnets named; service-1 through to service-5. VMware Engine automatically creates these five subnets when you set up a private cloud. You can use these subnets for various purposes, such as setting up storage, backup, disaster recovery, media streaming, or any other services that need high-performance networking in your private cloud.
Here you can assign a public IP to a VM or an appliance running in VMware Engine. Using the public IP, the services running on the VM or appliance can be made available over the internet.
Here you can see the VMware Engine Networks configured in your environment. VMware Engine networks provide network connectivity between one or more private clouds, Google Cloud VPC networks, and on-premises networks.
Private clouds attach to a VMware Engine network at the time of private cloud creation. You can create multiple VMware Engine networks to isolate private clouds and define unique VPC network peerings.
Here you can see any VPC network peerings we have configured within the environment. VPC network peerings define network connectivity between VMware Engine networks, Google VPC networks, and other services.
Network policies determine if your VMware workloads within your private cloud can communicate with the internet. By default, Google Cloud VMware Engine is secure, so internet access is disabled for your workloads. You can enable internet access by specifying allowed IP address ranges (CIDR). More details will be shared on this later in the course.
This allows you to control specific traffic flowing between the internet and your VMware Engine private cloud. These rules act like traffic filters, working alongside the network policies you set to control how data flows in and out of your private cloud. Creating these rules is similar to setting up firewall rules in Google Cloud.
Now that you have inspected a Google Cloud VMware Engine Private Cloud and its components, you will connect to a Windows jumphost to access the management appliances of the Private Cloud.
To access vCenter, NSX manager, and HCX manager, you will use a jumphost. A jumphost is a VM that acts as an intermediary between your local environment and the target machines you want to connect to.
In this lab, the jumphost allows you to establish a secure connection to the VMware Engine Console, as the direct links in the console may only work for those with the correct internal network configuration for connectivity to Google Cloud and their Google Cloud VMware Engine environment.
In the Google Cloud console tab, from the project dropdown, click All and then select
Open the Navigation menu () and click Compute Engine > VM instances.
Ensure you see a VM instance named windows-vm in the list of VM instances.
Click the connect dropdown and select Set Windows Password button.
Leave the Username set to the lab student name.
Click Set.
Copy the generated password and paste it into a text editor or notepad to save it.
Click Close.
Click RDP.
Click Download the RDP file if you will be using a 3rd-party client button.
Open the RDP file you downloaded in your RDP Client. Be sure to connect and use the administrator password you saved in a previous step.
You should now see a similar screen to the one below:
Now that you are connected to the Jump host you will use the Edge browser to access the VMware management appliances of your Private Cloud, vCenter (using the vSphere Client), HCX, and NSX-T.
In this task, you will explore the vCenter Server Appliance for the lab-private-cloud
management cluster.
In the Google Cloud console tab, from the project dropdown, click All and then select qwiklabs-gcve-quiz-lab.
Open the Navigation menu () and click VMware Engine from the pinned services.
Click Go to the new VMware Engine.
From the Private clouds section right click and copy the vCenter server URL:
Switch back to the open RDP session to the Windows jumphost.
Click the Edge browser icon in the task bar at the bottom of the windows.
Click Start without your data to skip personalization.
Click Continue without this data
Click Confirm and start browsing
Paste in the vCenter server URL to connect to vCenter.
Click Launch vSphere Client (HTML5).
Log in to the vSphere client using the following credentials:
student@gve.local
VMwareLab1234!!
Ensure your screen looks like the screenshot below:
Go back to the Google Cloud Console window.
From the Private clouds section right click and copy the NSX Manager URL:
Switch back to the open RDP session to the Windows jumphost.
Open a new Edge browser tab and paste in the NSX Manager URL to connect to the NSX-T console.
Log in to the NSX-T Manager console using the following credentials:
student
VMwareLab1234!
Ensure your screen looks like the screenshot below:
Go back to the Google Cloud Console window.
From the Private clouds section right click and copy the HCX Manager URL:
Switch back to the open RDP session in the Windows jumphost.
Open a new Edge browser tab and paste in the HCX Manager URL to connect to the HCX console.
Log in to the HCX Manager console using the following credentials:
CloudOwner@gve.local
O*A9kCGzKdWLRZxT
Ensure your screen looks like the screenshot below:
In this lab, you successfully navigated the key components of Google Cloud VMware Engine. You explored permissions, inspected private cloud configurations, established connections to jumphosts, and gained hands-on experience with vSphere, NSX-T, and HCX management appliances. This comprehensive exploration equips you with the foundational knowledge to effectively manage and operate VMware environments within the Google Cloud ecosystem. You're now well-prepared to leverage the power of Google Cloud VMware Engine for your organization's virtualization needs.
This content is not currently available
We will notify you via email when it becomes available
Great!
We will contact you via email if it becomes available
One lab at a time
Confirm to end all existing labs and start this one