/AWS1/CL_EVS=>CREATEENVIRONMENT()
¶
About CreateEnvironment¶
Amazon EVS is in public preview release and is subject to change.
Creates an Amazon EVS environment that runs VCF software, such as SDDC Manager, NSX Manager, and vCenter Server.
During environment creation, Amazon EVS performs validations on DNS settings, provisions VLAN subnets and hosts, and deploys the supplied version of VCF.
It can take several hours to create an environment. After the deployment completes, you can configure VCF in the vSphere user interface according to your needs.
You cannot use the dedicatedHostId
and placementGroupId
parameters together in the same CreateEnvironment
action. This results in a ValidationException
response.
Method Signature¶
IMPORTING¶
Required arguments:¶
iv_vpcid
TYPE /AWS1/EVSVPCID
/AWS1/EVSVPCID
¶
A unique ID for the VPC that the environment is deployed inside.
Amazon EVS requires that all VPC subnets exist in a single Availability Zone in a Region where the service is available.
The VPC that you specify must have a valid DHCP option set with domain name, at least two DNS servers, and an NTP server. These settings are used to configure your VCF appliances and hosts. The VPC cannot be used with any other deployed Amazon EVS environment. Amazon EVS does not provide multi-VPC support for environments at this time.
Amazon EVS does not support the following Amazon Web Services networking options for NSX overlay connectivity: cross-Region VPC peering, Amazon S3 gateway endpoints, or Amazon Web Services Direct Connect virtual private gateway associations.
Ensure that you specify a VPC that is adequately sized to accommodate the {evws} subnets.
iv_serviceaccesssubnetid
TYPE /AWS1/EVSSUBNETID
/AWS1/EVSSUBNETID
¶
The subnet that is used to establish connectivity between the Amazon EVS control plane and VPC. Amazon EVS uses this subnet to validate mandatory DNS records for your VCF appliances and hosts and create the environment.
iv_vcfversion
TYPE /AWS1/EVSVCFVERSION
/AWS1/EVSVCFVERSION
¶
The VCF version to use for the environment. Amazon EVS only supports VCF version 5.2.1 at this time.
iv_termsaccepted
TYPE /AWS1/EVSBOOLEAN
/AWS1/EVSBOOLEAN
¶
Customer confirmation that the customer has purchased and will continue to maintain the required number of VCF software licenses to cover all physical processor cores in the Amazon EVS environment. Information about your VCF software in Amazon EVS will be shared with Broadcom to verify license compliance. Amazon EVS does not validate license keys. To validate license keys, visit the Broadcom support portal.
it_licenseinfo
TYPE /AWS1/CL_EVSLICENSEINFO=>TT_LICENSEINFOLIST
TT_LICENSEINFOLIST
¶
The license information that Amazon EVS requires to create an environment. Amazon EVS requires two license keys: a VCF solution key and a vSAN license key. The VCF solution key must cover a minimum of 256 cores. The vSAN license key must provide at least 110 TiB of vSAN capacity.
VCF licenses can be used for only one Amazon EVS environment. Amazon EVS does not support reuse of VCF licenses for multiple environments.
VCF license information can be retrieved from the Broadcom portal.
io_initialvlans
TYPE REF TO /AWS1/CL_EVSINITIALVLANS
/AWS1/CL_EVSINITIALVLANS
¶
The initial VLAN subnets for the Amazon EVS environment.
For each Amazon EVS VLAN subnet, you must specify a non-overlapping CIDR block. Amazon EVS VLAN subnets have a minimum CIDR block size of /28 and a maximum size of /24.
it_hosts
TYPE /AWS1/CL_EVSHOSTINFOFORCREATE=>TT_HOSTINFOFORCREATELIST
TT_HOSTINFOFORCREATELIST
¶
The ESXi hosts to add to the environment. Amazon EVS requires that you provide details for a minimum of 4 hosts during environment creation.
For each host, you must provide the desired hostname, EC2 SSH keypair name, and EC2 instance type. Optionally, you can also provide a partition or cluster placement group to use, or use Amazon EC2 Dedicated Hosts.
io_connectivityinfo
TYPE REF TO /AWS1/CL_EVSCONNECTIVITYINFO
/AWS1/CL_EVSCONNECTIVITYINFO
¶
The connectivity configuration for the environment. Amazon EVS requires that you specify two route server peer IDs. During environment creation, the route server endpoints peer with the NSX edges over the NSX uplink subnet, providing BGP-based dynamic routing for overlay networks.
io_vcfhostnames
TYPE REF TO /AWS1/CL_EVSVCFHOSTNAMES
/AWS1/CL_EVSVCFHOSTNAMES
¶
The DNS hostnames for the virtual machines that host the VCF management appliances. Amazon EVS requires that you provide DNS hostnames for the following appliances: vCenter, NSX Manager, SDDC Manager, and Cloud Builder.
iv_siteid
TYPE /AWS1/EVSSTRING
/AWS1/EVSSTRING
¶
The Broadcom Site ID that is allocated to you as part of your electronic software delivery. This ID allows customer access to the Broadcom portal, and is provided to you by Broadcom at the close of your software contract or contract renewal. Amazon EVS uses the Broadcom Site ID that you provide to meet Broadcom VCF license usage reporting requirements for Amazon EVS.
Optional arguments:¶
iv_clienttoken
TYPE /AWS1/EVSCLIENTTOKEN
/AWS1/EVSCLIENTTOKEN
¶
This parameter is not used in Amazon EVS currently. If you supply input for this parameter, it will have no effect.
A unique, case-sensitive identifier that you provide to ensure the idempotency of the environment creation request. If you do not specify a client token, a randomly generated token is used for the request to ensure idempotency.
iv_environmentname
TYPE /AWS1/EVSENVIRONMENTNAME
/AWS1/EVSENVIRONMENTNAME
¶
The name to give to your environment. The name can contain only alphanumeric characters (case-sensitive), hyphens, and underscores. It must start with an alphanumeric character, and can't be longer than 100 characters. The name must be unique within the Amazon Web Services Region and Amazon Web Services account that you're creating the environment in.
iv_kmskeyid
TYPE /AWS1/EVSSTRING
/AWS1/EVSSTRING
¶
A unique ID for the customer-managed KMS key that is used to encrypt the VCF credential pairs for SDDC Manager, NSX Manager, and vCenter appliances. These credentials are stored in Amazon Web Services Secrets Manager.
it_tags
TYPE /AWS1/CL_EVSREQUESTTAGMAP_W=>TT_REQUESTTAGMAP
TT_REQUESTTAGMAP
¶
Metadata that assists with categorization and organization. Each tag consists of a key and an optional value. You define both. Tags don't propagate to any other cluster or Amazon Web Services resources.
io_serviceaccesssecgroups
TYPE REF TO /AWS1/CL_EVSSVCACCESSSECGROUPS
/AWS1/CL_EVSSVCACCESSSECGROUPS
¶
The security group that controls communication between the Amazon EVS control plane and VPC. The default security group is used if a custom security group isn't specified.
The security group should allow access to the following.
TCP/UDP access to the DNS servers
HTTPS/SSH access to the host management VLAN subnet
HTTPS/SSH access to the Management VM VLAN subnet
You should avoid modifying the security group rules after deployment, as this can break the persistent connection between the Amazon EVS control plane and VPC. This can cause future environment actions like adding or removing hosts to fail.
RETURNING¶
oo_output
TYPE REF TO /aws1/cl_evscreateenvresponse
/AWS1/CL_EVSCREATEENVRESPONSE
¶
Domain /AWS1/RT_ACCOUNT_ID Primitive Type NUMC
Examples¶
Syntax Example¶
This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.
DATA(lo_result) = lo_client->/aws1/if_evs~createenvironment(
io_connectivityinfo = new /aws1/cl_evsconnectivityinfo(
it_pvtrouteserverpeerings = VALUE /aws1/cl_evsroutesrvpeerlist_w=>tt_routeserverpeeringlist(
( new /aws1/cl_evsroutesrvpeerlist_w( |string| ) )
)
)
io_initialvlans = new /aws1/cl_evsinitialvlans(
io_edgevtep = new /aws1/cl_evsinitialvlaninfo( |string| )
io_expansionvlan1 = new /aws1/cl_evsinitialvlaninfo( |string| )
io_expansionvlan2 = new /aws1/cl_evsinitialvlaninfo( |string| )
io_hcx = new /aws1/cl_evsinitialvlaninfo( |string| )
io_nsxuplink = new /aws1/cl_evsinitialvlaninfo( |string| )
io_vmkmanagement = new /aws1/cl_evsinitialvlaninfo( |string| )
io_vmmanagement = new /aws1/cl_evsinitialvlaninfo( |string| )
io_vmotion = new /aws1/cl_evsinitialvlaninfo( |string| )
io_vsan = new /aws1/cl_evsinitialvlaninfo( |string| )
io_vtep = new /aws1/cl_evsinitialvlaninfo( |string| )
)
io_serviceaccesssecgroups = new /aws1/cl_evssvcaccesssecgroups(
it_securitygroups = VALUE /aws1/cl_evssecuritygroups_w=>tt_securitygroups(
( new /aws1/cl_evssecuritygroups_w( |string| ) )
)
)
io_vcfhostnames = new /aws1/cl_evsvcfhostnames(
iv_cloudbuilder = |string|
iv_nsx = |string|
iv_nsxedge1 = |string|
iv_nsxedge2 = |string|
iv_nsxmanager1 = |string|
iv_nsxmanager2 = |string|
iv_nsxmanager3 = |string|
iv_sddcmanager = |string|
iv_vcenter = |string|
)
it_hosts = VALUE /aws1/cl_evshostinfoforcreate=>tt_hostinfoforcreatelist(
(
new /aws1/cl_evshostinfoforcreate(
iv_dedicatedhostid = |string|
iv_hostname = |string|
iv_instancetype = |string|
iv_keyname = |string|
iv_placementgroupid = |string|
)
)
)
it_licenseinfo = VALUE /aws1/cl_evslicenseinfo=>tt_licenseinfolist(
(
new /aws1/cl_evslicenseinfo(
iv_solutionkey = |string|
iv_vsankey = |string|
)
)
)
it_tags = VALUE /aws1/cl_evsrequesttagmap_w=>tt_requesttagmap(
(
VALUE /aws1/cl_evsrequesttagmap_w=>ts_requesttagmap_maprow(
key = |string|
value = new /aws1/cl_evsrequesttagmap_w( |string| )
)
)
)
iv_clienttoken = |string|
iv_environmentname = |string|
iv_kmskeyid = |string|
iv_serviceaccesssubnetid = |string|
iv_siteid = |string|
iv_termsaccepted = ABAP_TRUE
iv_vcfversion = |string|
iv_vpcid = |string|
).
This is an example of reading all possible response values
lo_result = lo_result.
IF lo_result IS NOT INITIAL.
lo_environment = lo_result->get_environment( ).
IF lo_environment IS NOT INITIAL.
lv_environmentid = lo_environment->get_environmentid( ).
lv_environmentstate = lo_environment->get_environmentstate( ).
lv_statedetails = lo_environment->get_statedetails( ).
lv_timestamp = lo_environment->get_createdat( ).
lv_timestamp = lo_environment->get_modifiedat( ).
lv_arn = lo_environment->get_environmentarn( ).
lv_environmentname = lo_environment->get_environmentname( ).
lv_vpcid = lo_environment->get_vpcid( ).
lv_subnetid = lo_environment->get_serviceaccesssubnetid( ).
lv_vcfversion = lo_environment->get_vcfversion( ).
lv_boolean = lo_environment->get_termsaccepted( ).
LOOP AT lo_environment->get_licenseinfo( ) into lo_row.
lo_row_1 = lo_row.
IF lo_row_1 IS NOT INITIAL.
lv_solutionkey = lo_row_1->get_solutionkey( ).
lv_vsanlicensekey = lo_row_1->get_vsankey( ).
ENDIF.
ENDLOOP.
lv_string = lo_environment->get_siteid( ).
lv_checkresult = lo_environment->get_environmentstatus( ).
LOOP AT lo_environment->get_checks( ) into lo_row_2.
lo_row_3 = lo_row_2.
IF lo_row_3 IS NOT INITIAL.
lv_checktype = lo_row_3->get_type( ).
lv_checkresult = lo_row_3->get_result( ).
lv_timestamp = lo_row_3->get_impairedsince( ).
ENDIF.
ENDLOOP.
lo_connectivityinfo = lo_environment->get_connectivityinfo( ).
IF lo_connectivityinfo IS NOT INITIAL.
LOOP AT lo_connectivityinfo->get_pvtrouteserverpeerings( ) into lo_row_4.
lo_row_5 = lo_row_4.
IF lo_row_5 IS NOT INITIAL.
lv_routeserverpeering = lo_row_5->get_value( ).
ENDIF.
ENDLOOP.
ENDIF.
lo_vcfhostnames = lo_environment->get_vcfhostnames( ).
IF lo_vcfhostnames IS NOT INITIAL.
lv_hostname = lo_vcfhostnames->get_vcenter( ).
lv_hostname = lo_vcfhostnames->get_nsx( ).
lv_hostname = lo_vcfhostnames->get_nsxmanager1( ).
lv_hostname = lo_vcfhostnames->get_nsxmanager2( ).
lv_hostname = lo_vcfhostnames->get_nsxmanager3( ).
lv_hostname = lo_vcfhostnames->get_nsxedge1( ).
lv_hostname = lo_vcfhostnames->get_nsxedge2( ).
lv_hostname = lo_vcfhostnames->get_sddcmanager( ).
lv_hostname = lo_vcfhostnames->get_cloudbuilder( ).
ENDIF.
lv_string = lo_environment->get_kmskeyid( ).
lo_serviceaccesssecuritygr = lo_environment->get_serviceaccesssecgroups( ).
IF lo_serviceaccesssecuritygr IS NOT INITIAL.
LOOP AT lo_serviceaccesssecuritygr->get_securitygroups( ) into lo_row_6.
lo_row_7 = lo_row_6.
IF lo_row_7 IS NOT INITIAL.
lv_securitygroupid = lo_row_7->get_value( ).
ENDIF.
ENDLOOP.
ENDIF.
LOOP AT lo_environment->get_credentials( ) into lo_row_8.
lo_row_9 = lo_row_8.
IF lo_row_9 IS NOT INITIAL.
lv_string = lo_row_9->get_secretarn( ).
ENDIF.
ENDLOOP.
ENDIF.
ENDIF.