VMware Engine stretched private clouds
A Google Cloud VMware Engine stretched private cloud is a private cloud that is stretched across two data zones and a witness zone, all within the same Google Cloud region. Stretched private clouds use vSphere and vSAN stretched clusters to provide compute and storage high availability against zone-level failures. All clusters of a stretched private cloud are considered VMware Engine stretched clusters, including the primary cluster.
Stretched private cloud operation
All of the clusters of a stretched private cloud are stretched across the same two data zones and share the same witness zone. Each stretched cluster has its own set of data nodes in each data zone, and each stretched cluster has a witness node in the witness zone. Any two zones in a given Google Cloud region are more than 10Km geodesic distance apart but have less than 5 msec RTT latency between them.
The witness node is managed by VMware Engine and runs on a Compute Engine instance running ESXi in nested mode. You do not need to specify a witness zone and do not have to manage the lifecycle of the witness node.
Each of the three zones used by a stretched cluster are independent failure domains. The main benefit of this setup is that a cluster stretched across the three zones can survive a complete failure of any single zone.
Stretched private cloud node configuration
Stretched clusters have an equal number of nodes in data zones. For example, three nodes in each data site - denoted as 3+3, or four nodes in each data site, denoted as 4+4. Configurations such as 4+3, therefor, are not allowed in Google Cloud VMware Engine stretched private clouds. A stretched cluster in Google Cloud VMware Engine must have a minimum of six data nodes (3+3) and a maximum of 28 (14+14) data nodes.
Stretched private cloud environment
You manage your stretched private clouds through the VMware Engine portal. All stretched clusters in a stretched Private Cloud have half of their capacity in each zone - for example, an 8 node stretched cluster in a stretched private cloud must have four (4) nodes in each zone. Only an identical number of nodes from each zone can be added and removed from the stretched clusters. For example, you can add two nodes to each zone or remove three nodes from each zone in a stretched cluster.
A stretched private cloud can have multiple stretched clusters, but each must have exactly two Google Cloud zones for data nodes and one zone for the witness node.
vSAN data encryption in stretched private clouds
vSAN data encryption at rest is enabled by default in all stretched clusters of a stretched private cloud. By default, a Google key provider is used for vSAN encryption. This key provider uses Cloud Key Management Service and is deployed in a highly available configuration across two zones. You can also use any external 3P Cloud KMS server (deployed as an HA pair across the two zones) and manage it yourself.
Storage policies in stretched private clouds
The management VMs of a stretched private cloud run on the first stretched cluster (for example, 'cluster 0'). The management VMs are affixed to the primary site of the stretched cluster using affinity rules and are configured with the following storage policy:
- Site Disaster tolerance=1 (protect against one site failure)
- FTT=1 (for a six-node stretched ('cluster 0'))
- FTT=2 (for a node stretched greater than or equal to 10 ('cluster 0'))
The default storage policy in a stretched cluster for workload VMs also follows the previous policy.
You can create new storage policies for workload VMs, and each stretched cluster in a stretched private cloud can use different storage policies.
What's next
- Learn about VLANs and subnets.