Set up Google Cloud to work with your Bare Metal Solution environment
When your Bare Metal Solution environment is ready, you are notified by Google Cloud. The notification includes the internal IP addresses of your new servers.
These instructions show you how to do the following tasks that are required to connect to your Bare Metal Solution environment:
- Create redundant VLAN attachments to the Bare Metal Solution environment.
- Create a jump host VM instance in your VPC network.
- Use SSH or RDP to log in to your Bare Metal Solution servers from the jump host VM instance.
After you are connected to your servers, validate the configuration of your Bare Metal Solution order.
Before you begin
To connect to and configure your Bare Metal Solution environment, you need:
- A Google Cloud project with billing enabled. You can create a project on the project selector page in the Google Cloud console.
- A Virtual Private Cloud (VPC) network. This is the VPC network that you named when you placed your order for Bare Metal Solution. If you need to create the VPC network, see Using VPC networks.
- The following information that is provided to you by Google Cloud
when your Bare Metal Solution is ready:
- The IP addresses of your bare-metal servers.
- The temporary passwords for each of your bare-metal servers.
Create the VLAN attachments for the Cloud Interconnect connection
To access your Bare Metal Solution servers, you need to create VLAN attachments in the same region as your servers and pre-activate them. When you create the VLAN attachments, the system generates pairing keys that you need to share with Google Cloud. Google Cloud uses these pairing keys to activate the connection between your Bare Metal Solution environment and your VPC network.
The VLAN attachments (also known as InterconnectAttachments
) allocate VLANs on
the Partner Interconnect connection.
Currently, individual Bare Metal Solution interconnect VLAN attachments support a maximum speed of 10 Gbps. To achieve higher throughput into a VPC network, you can configure multiple attachments into the VPC network. For each BGP session, you should use the same MED values to allow the traffic to use ECMP over all of the configured interconnect attachments.
Console
If you don't already have Cloud Router instances in the network and region that you are using with Bare Metal Solution, you need to create one for each VLAN attachment. When you create the routers, specify
16550
as the ASN for each Cloud Router.For instructions, see Creating Cloud Routers.
Go to the Cloud Interconnect VLAN attachments tab in the Google Cloud console.
Go to VLAN attachments tabClick Create VLAN attachment at the top of the Google Cloud console.
Select Partner Interconnect to create Partner VLAN attachments, and then click Continue.
Click I already have a service provider.
Select Create a redundant pair of VLANs. Both attachments can serve traffic, and you can route the traffic to load-balance between them. If one attachment goes down, for example during scheduled maintenance, the other attachment continues to serve traffic. For more information, see the Redundancy section in the Partner Interconnect Overview page.
For the Network and Region fields, select the VPC network and Google Cloud region where your attachments will connect to.
Specify the details for each of your VLAN attachments.
- Cloud Router — A Cloud Router to associate
with this attachment.
- You can only choose a Cloud Router in the
VPC network and region that you selected with an
ASN of
16550
. - You can assign only one Cloud Router per attachment. For a pair of VLAN attachments, you need two Cloud Routers.
- You can only choose a Cloud Router in the
VPC network and region that you selected with an
ASN of
- VLAN attachment name — A name for each attachment. The names
are displayed in the Google Cloud console and used by the Google Cloud CLI
to reference the attachments, such as
my-attachment-1
andmy-attachment-2
. - Description — Information about each VLAN attachment.
- Maximum transmission unit (MTU) — The maximum packet size for network transmission. The default size is 1440.
- Cloud Router — A Cloud Router to associate
with this attachment.
Click Create to create the attachments, which takes a few moments to complete.
After creation is complete, copy the pairing keys. The keys include an alpha-numeric code, the name of the region, and the number of the network availability zone, for example
/1
or/2
. You'll share these keys with Google Cloud.Pre-activate both attachments by selecting Enable. When you pre-activate the attachments, they start passing traffic immediately after Google Cloud completes your Bare Metal Solution configuration.
Click OK to view a list of your VLAN attachments.
After Google Cloud notifies you that your Bare Metal Solution servers are ready, go to the VLAN attachments tab in the Google Cloud console.
Go to VLAN attachments tabLook for the
Status
column, which should appear asUp
for your attachments. If the status of your attachments appears asDown
, enable the attachments as follows:- Click the name of the first VLAN attachment to view its details page.
- Click Enable.
- Click VLAN attachment details to return to the main VLAN attachments tab.
- Click the name of the second VLAN attachment to view its details page.
- Click Enable.
gcloud
If you don't already have Cloud Router instances in the network and region that you are using with Bare Metal Solution, create one for each VLAN attachment. Use
16550
as the ASN number:gcloud compute routers create router-name \ --network vpc-network-name \ --asn 16550 \ --region region
For more information, see Creating Cloud Routers.
Create an
InterconnectAttachment
of typePARTNER
, specifying the name of your Cloud Router and the edge availability domain (EAD) of the VLAN attachment. Also, add the--admin-enabled
flag to pre-activate the attachments and send traffic immediately after Google Cloud completes the Bare Metal Solution configuration.gcloud compute interconnects attachments partner create first-attachment-name \ --region region \ --router first-router-name \ --edge-availability-domain availability-domain-1 \ --admin-enabled
gcloud compute interconnects attachments partner create second-attachment-name \ --region region \ --router second-router-name \ --edge-availability-domain availability-domain-2 \ --admin-enabled
Google Cloud automatically adds an interface and a BGP peer on the Cloud Router. The attachment generates a pairing key that you'll need to share with Google Cloud later.
The following example creates redundant attachments, one in EAD
availability-domain-1
and another in EADavailability-domain-2
. Each is associated with a separate Cloud Router,my-router-1
andmy-router-2
, respectively. They are both in theus-central1
region.gcloud compute interconnects attachments partner create my-attachment \ --region us-central1 \ --router my-router-1 \ --edge-availability-domain availability-domain-1 \ --admin-enabled
gcloud compute interconnects attachments partner create my-attachment \ --region us-central1 \ --router my-router-2 \ --edge-availability-domain availability-domain-2 \ --admin-enabled
Describe the attachment to retrieve its pairing key. You'll share the key with Google Cloud after you open a change request to create the connection to the Bare Metal Solution environment.
gcloud compute interconnects attachments describe my-attachment \ --region us-central1
adminEnabled: false edgeAvailabilityDomain: AVAILABILITY_DOMAIN_1 creationTimestamp: '2017-12-01T08:29:09.886-08:00' id: '7976913826166357434' kind: compute#interconnectAttachment labelFingerprint: 42WmSpB8rSM= name: my-attachment pairingKey: 7e51371e-72a3-40b5-b844-2e3efefaee59/us-central1/1 region: https://www.googleapis.com/compute/v1/projects/customer-project/regions/us-central1 router: https://www.googleapis.com/compute/v1/projects/customer-project/regions/us-central1/routers/my-router selfLink: https://www.googleapis.com/compute/v1/projects/customer-project/regions/us-central1/interconnectAttachments/my-attachment state: PENDING_PARTNER type: PARTNER
- The
pairingKey
field contains the pairing key that you need to copy and share with your service provider. Treat the pairing key as sensitive information until your VLAN attachment is configured. - The state of the VLAN attachment is
PENDING_PARTNER
until Google Cloud completes your VLAN attachment configuration. Afterwards, the state of the attachment isINACTIVE
orACTIVE
, depending on whether you chose to pre-activate your attachments.
When you request connections from Google Cloud, you must select the same metro (city) for both attachments for them to be redundant. For more information, see the Redundancy section in the Partner Interconnect Overview page.
- The
If the VLAN attachments do not come up after Google Cloud completes your Bare Metal Solution order, activate each VLAN attachment:
gcloud compute interconnects attachments partner update attachment-name \ --region region \ --admin-enabled
You can check the status of the Cloud Routers and your advertised routes in the Cloud console. For more information, see Viewing Router Status and Advertised Routes.
Set up routing between Bare Metal Solution and Google Cloud
As soon as your VLAN attachments are active, your BGP sessions come up and the routes from the Bare Metal Solution environment are received over the BGP sessions.
Add a custom advertisement for a default IP range to your BGP sessions
To set up routing for traffic from the Bare Metal Solution environment, the
recommendation is to add a custom advertisement of a default route,
such as 0.0.0.0/0
, on your BGP sessions to the Bare Metal Solution
environment.
To specify advertisements on an existing BGP session:
Console
- Go to the Cloud Router page in the Google Cloud console.
Cloud Router list - Select the Cloud Router that contains the BGP session to update.
- In the Cloud Router's detail page, select the BGP session to update.
- In the BGP session details page, select Edit.
- For the Routes, select Create custom routes.
- Select Add custom route to add an advertised route.
- Configure the route advertisement.
- Source — Select Custom IP range to specify a custom IP range.
- IP address range — Specify the custom IP range by using CIDR notation.
- Description — Add a description to help you identify the purpose of this route advertisement.
- After you're done adding routes, select Save.
gcloud
You can add to existing custom advertisements or you can set a new customer advertisement, which replaces any existing custom advertisements with the new one.
To set a new custom advertisement for a default IP range, use the
--set-advertisement-ranges
flag:
gcloud compute routers update-bgp-peer router-name \ --peer-name bgp-session-name \ --advertisement-mode custom \ --set-advertisement-ranges 0.0.0.0/0
To append the default IP range to existing ones, use the
--add-advertisement-ranges
flag. Note that this flag requires the
Cloud Router's advertisement mode to already be set to custom
.
The following example, adds the 0.0.0.0/0
custom IP to the
Cloud Router's advertisements:
gcloud compute routers update-bgp-peer router-name \ --peer-name bgp-session-name \ --add-advertisement-ranges 0.0.0.0/0
Optionally, set the VPC Network Dynamic Routing Mode to global
If you have Bare Metal Solution servers in two different regions, consider enabling global routing mode on the VPC network to have your Bare Metal Solution regions talk to each other directly over the VPC network.
The global routing mode is also needed to enable communications between an on-premises environment that is connected to one Google Cloud region and a Bare Metal Solution environment in another Google Cloud region.
To set the global routing mode, see Setting the VPC Network Dynamic Routing Mode.
VPC firewall setup
New VPC networks come with active default firewall rules that restrict most traffic in the VPC network.
To connect to your Bare Metal Solution environment, network traffic must be enabled between:
- Your Bare Metal Solution environment and network destinations on Google Cloud.
- Your local environment and your resources on Google Cloud, such as any jump host VM instance you might use to connect to your Bare Metal Solution environment.
Within your Bare Metal Solution environment, if you need to control network traffic between the bare-metal servers or between the servers and destinations not on Google Cloud, you need to implement a control mechanism yourself.
To create a firewall rule in your VPC network on Google Cloud:
Console
Go to the Firewall rules page:
Click Create firewall rule.
Define the firewall rule.
- Name the firewall rule.
- In the Network field, select the network where your VM is located.
- In the Targets field, specify either Specified target tags or Specified service account.
- Specify the target network tag or service account in the appropriate fields.
- In the Source filter field, specify IP ranges to allow incoming traffic from your Bare Metal Solution environment.
- In the Source IP ranges field, specify the IP addresses of the servers or devices in your Bare Metal Solution environment.
- In the Protocols and ports section, specify the protocols and ports that are required in your environment.
- Click Create.
gcloud
The following command creates a firewall rule that defines the source by using an IP range and the target by using the network tag of an instance. Modify the command for your environment as necessary.
gcloud compute firewall-rules create rule-name \ --project=your-project-id \ --direction=INGRESS \ --priority=1000 \ --network=your-network-name \ --action=ALLOW \ --rules=protocol:port \ --source-ranges=ip-range \ --target-tags=instance-network-tag
For more information about creating firewall rules, see Creating firewall rules.
Connecting to your bare-metal server
The servers in your Bare Metal Solution environment are not provisioned with external IP addresses.
After you have created a firewall rule to allow traffic into your VPC network from the Bare Metal Solution environment, you can connect to your server by using a jump host VM instance.
Create a jump host VM instance on Google Cloud
To quickly connect to your bare-metal servers, create a Compute Engine virtual machine (VM) to use as a jump host. Create the VM in the same Google Cloud region as your Bare Metal Solution environment.
If you need a more secure connection method, see Connect using a bastion host.
To create a jump host VM instance, choose the instructions below based on the operating system you are using in your Bare Metal Solution environment.
For more information about creating Compute Engine VM instances, see Creating and starting a VM instance.
Linux
Create a virtual machine instance
In the Google Cloud console, go to the VM Instances page:
Click Create instance.
In the Name field, specify a name for the VM instance.
Under Region, select the region of your Bare Metal Solution environment.
In the Boot disk section, click Change.
- In the Operating systems field, select an OS of your choice.
- In the Version field, select the OS version.
Click Management, security, disks, networking, sole tenancy to expand the section.
Click Networking to display the networking options.
- Optionally, under Network tags, define one or more network tags for the instance.
- Under Network interfaces, confirm that the proper VPC network is displayed.
Click Create.
Allow a short time for the instance to start. After the instance is ready, it is listed on the VM instances page with a green status icon.
Connect to your jump host VM instance
If you need to create a firewall rule to allow access to your jump host VM instance, see Firewall setup.
In the Google Cloud console, go to the VM instances page:
In the list of VM instances, click SSH in the row that contains your jump host.
You now have a terminal window with your jump host VM instance, from which you can connect to your bare-metal server by using SSH.
Logging in to a Bare Metal Solution server for the first time
Linux
On the jump host VM instance, open a command-line terminal and confirm that you can reach your Bare Metal Solution server:
ping bare-metal-ip
If your ping is unsuccessful, check and correct the following:
- Your VLAN attachments are active with a
Status
ofUp
. See Create the VLAN attachments for the Cloud Interconnect connection. - Your VLAN attachments include a custom route advertisement
of
0.0.0.0/0
. See Add a custom advertisement for a default IP range to your BGP sessions. - Your VPC includes a firewall rule that allows access from the IP address range that you are using in the Bare Metal Solution environment for communication with the Google Cloud environment. See VPC firewall setup.
- Your VLAN attachments are active with a
From the jump host VM instance, SSH into the Bare Metal Solution server by using the
customeradmin
user ID and the IP address of the server:ssh customeradmin@bare-metal-ip
When prompted, enter the password provided to you by Google Cloud.
On first login, you are required to change the password for your Bare Metal Solution server.
Set a new password and store it in a safe location. After resetting the password, the server logs you out automatically.
Log back into the Bare Metal Solution server using the
customeradmin
user ID and your new password:ssh customeradmin@bare-metal-ip
We recommend that you also change the root user password. Start by logging in as the root user:
sudo su -
To change the root password, issue the
passwd
command and follow the prompts:passwd
To return to the
customeradmin
user prompt, exit the root user prompt:exit
Remember to store your passwords in a safe place for recovery purposes.
Confirm that your server configuration matches your order. The things to check include:
- The server configuration, including the number and type of CPUs, the sockets, and the memory.
- The operating system or hypervisor software, including vendor and version.
- The storage, including type and amount.
Accessing network services, Google Cloud services, or the public internet
Bare Metal Solution does not come with access to Google Cloud services, networking services, or the internet. You have many options for implementing access and which you choose depends on various factors, including your business requirements, existing infrastructure, and others. The following sections present some of the options.
Accessing the internet
Some of the options for accessing the internet include:
- Routing outgoing traffic through a NAT gateway.
- Routing traffic through a Compute Engine VM that serves as a proxy server.
- Routing traffic through Cloud VPN or Dedicated Interconnect to on-premises gateways to the internet.
Setting up a NAT gateway on a Compute Engine VM
The following instructions set up a NAT gateway on a Compute Engine VM to connect the servers in a Bare Metal Solution environment to the internet for purposes such as receiving software updates.
The instructions use the default internet gateway of your VPC network to access the internet.
The Linux commands that are shown in the following instructions are for the Debian operating system. If you use a different operating system, the commands you need to use might also be different.
In the VPC network that you are using with your Bare Metal Solution environment, perform the following steps:
Open the Cloud Shell:
Create and configure a Compute Engine VM to serve as a NAT gateway.
Create a VM:
gcloud compute instances create instance-name \ --machine-type=machine-type-name \ --network vpc-network-name \ --subnet=subnet-name \ --can-ip-forward \ --zone=your-zone \ --image-family=os-image-family-name \ --image-project=os-image-project \ --tags=natgw-network-tag \ --service-account=optional-service-account-email
In later steps, you use the network tag that you define in this step to route traffic to this VM.
If you don't specify a service account, remove the
--service-account=
flag. Compute Engine uses the default service account of the project.SSH into the
VM and configure the iptables: $ sudo sysctl -w net.ipv4.ip_forward=1
$ sudo iptables -t nat -A POSTROUTING \ -o $(/sbin/ifconfig | head -1 | awk -F: {'print $1'}) -j MASQUERADE
The first sudo command tells the kernel that you want to allow IP forwarding. The second sudo command masquerades packets received from internal instances as if they were sent from the NAT gateway instance.
Check the iptables:
$ sudo iptables -v -L -t nat
To retain your NAT gateway settings across a reboot, execute the following commands on the NAT gateway VM:
$ sudo -i
$ echo "net.ipv4.ip_forward=1" > /etc/sysctl.d/70-natgw.conf
$ apt-get install iptables-persistent
$ exit
In Cloud Shell, create a route to
0.0.0.0/0
with the default internet gateway as the next hop. Specify the network tag that you defined in the previous step on the--tags
argument. Assign the route a higher priority than any other default route.gcloud compute routes create default-internet-gateway-route-name \ --destination-range=0.0.0.0/0 \ --network=network-name \ --priority=800 \ --tags=natgw-network-tag \ --next-hop-gateway=default-internet-gateway
Add the network tag that you just created to any existing VMs in your VPC network that need internet access, so that they can continue to access the internet after you create a new default route that your Bare Metal Solution servers can also use.
Optional: Remove routes to the internet that existed before the route you created in the previous step, including those created by default.
Confirm that any existing VMs in your network and the NAT gateway VM can access the internet by pinging a public IP address, such as 8.8.8.8, the Google DNS, from each VM.
Create a default route to
0.0.0.0/0
with the NAT gateway VM as the next hop. Give the route a lower priority than priority that you specified for the first route that you created.gcloud compute routes create natgw-route-name \ --destination-range=0.0.0.0/0 \ --network=network-name \ --priority=900 \ --next-hop-instance=natgw-vm-name \ --next-hop-instance-zone=natgw-vm-zone
Log in to your Bare Metal Solution servers and ping a public IP address to confirm that they can access the internet.
If the ping is not successful, make sure that you have created a firewall rule that allows access from your Bare Metal Solution environment to your VPC network.
Setting up access to Google Cloud APIs and services
You can access Google Cloud APIs and services privately from your Bare Metal Solution environment.
You set up private access to the Google Cloud APIs and services from a Bare Metal Solution environment as you would for an on-premises environment. Follow the instructions for on-premises environments in Configuring Private Google Access for on-premises hosts.
The instructions guide you through the following high-level steps:
- Configuring routes for the Google API traffic
- Configuring firewall rules in any Bare Metal Solution firewall to allow the outgoing traffic to the Restricted Google APIs IP range.
- Configuring your Bare Metal Solution DNS to resolve
*.googleapis.com
as aCNAME
torestricted.googleapis.com
.
What's next
After you have set up your Bare Metal Solution environment, you can install your workloads.
If you plan to run Oracle databases on the servers in your Bare Metal Solution environment, you can use the open source Toolkit for Bare Metal Solution to install your Oracle software.