VRA and the Automation

2019-06-10
>

Purpose of this articles giving idea what automation solution you can offer from my developed use case so far.
VRA as any other products in the market keep evolving, so whatever seems so difficult to automate in the past might became very easy to accomplish in current or future state.

This diagram shown developed use cases.

VRA Lifecycle

Here’s some descriptions of automation process on VRA

Request Submitted

Two options for triggering VRA request

  1. Using VRO to trigger VRA request, and then make user interface using VRO presentation. This method usually called XaaS Wrapper.
  2. Using third party or even build your own user interface and then trigger the VRA API or even you can trigger VRO API that already being wrapped and simplified.

Pre-Approval States

Normally out of the box pre-approval is already enough for most of the use cases. Here’s some use case that might require using external approval as trigger:

  1. Integration with third party solutions for approval mechanism –> personally I haven’t got chance to test or receive any project request for this use case.
  2. Ability to modify input parameters. We can leverage Manual User Actions as method of approving the request.

Post-Approval States

Deployment Post approval states is the last states before releasing deployment to the requestor. So if we have software authoring as part of the solutions, then the step that possible for triggering automation is during post-approval states.
Here’s some use case that might require automation triggered after software authoring states:

  1. Trigger third party application only after software successfully triggered
  2. Checklist email for all customization request

Grouping of the use case:

Notification method

  1. Email notification
  2. Telegram notification through private channel

IPAM & DNS

  1. Vital QIP
  2. Infoblox

Hostname Generator

  1. Using VRO as logic
  2. Third Party Application

Windows Active Directory

  1. Computer Object for OU Placement (either for hardening or object placement)
  2. Windows DNS

Virtual Machine Modification

  1. Utilize SCSI Controller for VM best practice
  2. Add into DRS group

User Management

  1. Create Windows/Linux Local User
  2. Generate Random Password and sent it to the requestor
  3. Assign privileges for the user (local or domain). Sudoers for Linux, grouping for Windows

Integration with VMware Solutions

  1. Create VROPS custom group and assign the policy
  2. NSX Firewall management

Common Use Case

  1. Filesystem creation (LVM)

Backup Software

  1. EMC Networker

Configuration Manager

  1. Ansible tower (AWX)

CMDB

  1. BMC Atrium (ADDM)

Privilage Access Management

  1. Cyberark Password Vault

Other Specific Use Case

  1. Windows SCOM
  2. Manual Service Request (refer to my blog for more information about manual service request)
  3. Checklist of automation status (success/failure)

Software Automation:

Here’s List of third-party software applications that has been automated. Also, combination of two tier or three tier applications

Web/App:

  1. Apache HTTPD on Linux and Windows
  2. Apache Tomcat on Linux and Windows
  3. IBM Web Server on Linux
  4. IBM WebSphere MQ on Linux
  5. IBM WAS on Linux
  6. IIS on Windows
  7. JBOSS EAP on Linux
  8. Oracle Weblogic on Windows

Database:

  1. DB2 on Linux
  2. SQL Server on Windows
  3. Oracle DB on Linux
  4. 2 nodes SQL Server Always on Availability Group on Windows
  5. 2 nodes Enterprise DB using EFM