Summary: How to setup vCenter 6.5 in Azure.
Date: Around 2017
Refactor: 29 April 2025: Checked links and formatting.
After installing a Active Directory Domain Controller in Azure and setting up a Setup a Point To Site VPN to Azure it's time for something else. On the Windows 10 client I installed a couple of ESXi 6.5 hosts so of course I want to manage them with vCenter. But since I lack the serious resource requirements of vCenter on my Windows 10 laptop I decided to run the vCenter in Azure. Why? Because I can… Or at least, because I want to.
Note: Even though you could use parts of this manual as a howto on various subjects do not consider this a manual for a production environment. While trying to set this up I encountered many difficulties and in the end I did not fully complete on my original goal. It was however fun to do and I learned I lot while doing this so if that is your goal please continue and have fun.
Note that this will make your RDP connection get lost if you connect directly through Azure. You can also start a remote desktop connection from another server (like this)
Note2: From the next day forward I could connect to the server directly again. Maybe I was just a little impatient.
First we need to set the Domain Controller configured here as the DNS server for the vCenter server and set the correct DNS settings:
It is a requirement for vCenter that the correct DNS records are set for the vCenter server. The name of the server and the DNS record need to match exactly:
A freshly deployed server is always a standalone, so we need to make this server a member of the domain:
READ THIS CAREFULLY: Now if you follow this tutorial for your home lab continue, but if you are looking to deploy a production deployment please read this carefully. I will install a single vCenter server, meaning that I will host both the Platform Controller and vCenter service onto one server. That is supported (although I don't think it's supported to run it in Azure) but only for small deployments. If you have a bigger environment than a couple of hosts and a few dozen VMs check here for the supported topologies for vCenter 6.5. I actually did a different deployment (two locations, much bigger) a little time ago with vSphere 6/vCenter 6/SRM6: vSphere 6 and SRM 6 Installation and Configuration.
Installation software: VMware-VIM-all-6.5.0-4602587.iso
It's always a good idea to run a specific service under a designated service account. On the domain controller create a account considering these requirements:
When the installation is done we need to check if the services are indeed running under the installation account:
hmmm… There seems to be a bug with the installation, none of the services is running under the service account:
Now I want that administrators from Active Directory can log on to the environment and admin it, to do so we have to configure an Identity Source. We do that through the vSphere Web Client but as that needs Flash and we don't want to run Flash on a server we'll do that from a Windows 10 client which has Flash Player integrated (test it on https://get.adobe.com/flashplayer ). In Setup a Point To Site VPN to Azure we already connected a Windows 10 client to the Azure tenant, so on the client, connect to the Azure Tenant through VPN and navigate to the vSphere Web Client on https://azurevc01.shift.local/vsphere-client/
Note that you might get an error that the host cannot be found, which is probably caused if you do not have set up DNS correctly on your client. Note that is not part of your domain (see Setup a Point To Site VPN to Azure for the setup). The easiest way to solve it right now is to follow these steps:
10.0.0.5 azurevc01.shift.local azurevc01
Now you should be able to access the vSphere Web Client, so follow these steps to setup Active Directory as an Identity Source:
You can test this now by logging off and try to log in to the vSphere Web Client as the user you added.
Note: Because you made the AD Identity Source the default you don't need to add the domain to your login name (SHIFT\adminsjoerd)
To avoid the browser messages regarding an invalid/untrusted certificate follow these steps to import the CA root certificate in the rusted Root Certification Authorities store:
Now restart the browser and check that the message is gone.
Note that this is how far I came. I have a verified working vCenter, but how hard I tried, I could not get a host added to the inventory. But I did get all requirements in place, so read on if you want to know about managing firewalls, Azure Network Security Groups etc.
I have a standard setup for installing ESXi hosts, which I followed here.
Now the main trouble here was deciding on how to configure the network. You have basically two choices, NAT and bridged. Because of the downsides of NAT I first opted for bridging. However, it turned out that bridging had a even bigger disadvantage. If you followed this manual and you check the network adapter that was added for the VPN you'll notice it is a PPP adapter. This is basically a modem, and are only capable of running 1 IP address. And therefore, you can't bridge it. No way. Tried, Googled, tried again. No luck. So I had no choice but to go for NAT, even though it has these disadvantages:
Now that is a lot of work, so I concentrated on just getting it to work on the first host.
This step was done for the bridging option and should be adjusted for the NAT option. Which actually means you can't add the hosts in DNS. Because of the NAT, all hosts will be known under the same IP address. So you could add that one, but if you do add it with the IP address of the VPN Client (for example 192.168.1.7)
First we'll add the DNS records on the DNS server:
Now to add the correct DNS records, still in DNS manager, right-click the Forward Lookup Zones and expand it:
Skip this step and the next one. Keep the host on NAT.
First we will modify the network settings of the ESXI host in VMware Workstation:
When the host is started follow these steps to set the static IP and DNS settings
To configure NAT for vCenter and ESXi communication on VMware workstation follow these steps:
Now repeat these steps port the following ports:
We'll start with port 22 to test communication between vCenter server and the ESXi hosts
Follow these steps to open port 22 in the Azure Network Security Group:
During the installation of vCenter, the correct firewall rules were already created. But doublechecking is always a good idea:
So just check if the ports are blocked by a rule…
Follow these steps to open port 22 for the client:
The new rule is automatically enabled and now you should be able to make a SSH connection from the vCenter server in Azure to the ESXi host on your local workstation. Please note that you need to use the IP address assigned to the Azure VPN client to connect to:
Repeat each of these steps for each of these ports:
Don't forget there are 4 places for port configuration: - NAT translation - Network security group in azure - Outbound firewall rule op vCenter Server - Inbound firewall rule op Windows 10 Azure Client
Now as you could see above in the screenshot I had a connection between the vCenter Server and the ESXi host on both port 22 and 902. However, after adding a datacenter to the vCenter environment I tried to add a host. It did found the host, I even got a warning on the host's certificate but I could not add it. I kept getting this error:
Cannot complete login due to an incorrect user name or password
Of course the credentials are correct and I suspect the problem is still somewhere in the opening of ports, in the installation or just simply using a Point to Site VPN between vCenter and ESXi. I also did try a lot of different things in the process to fix it so I might have even broke it even further while trying to break it. Logfiles did not supply a simple solution and the vSphere Client (the old one) is no longer working with vSphere 6.6. So I did not solve the issue, so if someone has an idea just drop me a message and I'm sure I'll try it.