Azure Private Endpoint Connection to Omniverse Cloud PaaS

Overview

Accessing Omniverse Cloud PaaS requires connectivity from your Azure infrastructure to Omniverse Cloud PaaS which is done through the use of an Azure Private Endpoint. The following documentation will walk you through all the steps needed to complete the configuration.

Creating an Azure Private Endpoint

An Azure Private Endpoint is created using the Azure Portal. Log into the Azure Portal:

  1. Click the Private endpoints icon:

../_images/ovc_privateendpoint_button.jpg
  1. Click +Create to create a new Private Endpoint:

../_images/ovc_private_endpoints_heading.png

Basics Tab

On the Basics tab, configure the following:

  1. Project Details:

    • Choose the Subscription for this Private Endpoint.

    • Choose an existing Resource Group or create a new one.

../_images/ovc_screenshot-pe-basics.png

Resource Tab

On the Resource tab, configure the following:

  • Enter the Resource ID provided by your NVIDIA technical contact.

  • The Resource ID is a long string that begins with /, such as: /subscription/<UUID>/resourceGroups/<RG_NAME>/providers/Microsoft.Network/privateLinkServices/<PLS_NAME>

  • The Request Message field will be seen by the NVIDIA OVC Technical Team to review and approve the Private Endpoint connection.

../_images/ovc_screenshot-pe-resource.png

Virtual Network Tab

Click the Virtual Network tab and configure the following:

  • Choose the VNet through which users will connect. This VNet will control which IP Address will be assigned to the Private Endpoint. It also is where the VPN endpoint will reside to allow external connectivity into the Private Endpoint.

  • The Private IP configuration has options:

    • Dynamically allocate an IP Address

    • Statically allocate an IP Address

Choose the preferred IP configuration based on your organization’s policy and/or requirements. The Dynamic option allows Azure to automatically pick an unused IP Address from the Virtual Network subnet. The Static option will require a static IP Address to be chosen and allocated to the Private Endpoint.

../_images/ovc_screenshot-pe-virtualnet_expanded.png

DNS Tab

Do not configure DNS here. DNS settings are handled outside of the Private Endpoint configuration. Additional information about DNS is covered in the DNS section.

Tags Tab

Click the Tags tab and configure the following:

  • Choose Tags as required based on your organization’s policy and/or requirements.

../_images/ovc_screenshot-pe-tags.png

Review + Create Tab

On the Review + Create tab, review all configurations before submitting the Private Endpoint request.

../_images/ovc_screenshot-pe-review.png

DNS

The following DNS entries must be added to ensure connectivity to the Private Endpoint in the customer tenant within the Azure VNet. The primary DNS entry will be the URL that users will visit using their web browser to access the Omniverse Cloud PaaS Portal.

Note

The <OVC_TENANT_NAME> will be provided by NVIDIA during onboarding.

  • <OVC_TENANT_NAME>.cloud.omniverse.nvidia.com (Primary)

  • streaming-client.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

  • customer.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

  • public-api.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

  • external.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

  • store.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

  • farm-services.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

  • api.<OVC_TENANT_NAME>.az.cloud.omniverse.nvidia.com

Creating a VPN Gateway Virtual Machine (OpenVPN)

Note

Creating a VPN Gateway Virtual Machine is optional.

Using a VPN Gateway Virtual Machine in Azure allows users access to the Azure VNet from their local computer through a VPN connection.

Note

This is only needed if direct access (i.e., Azure ExpressRoute) to the Azuze VNet is NOT available. Additional connection types may be available depending on your infrastructure architecture.

Log into the Azure Portal, then follow the steps below:

  1. Click the Virtual Machines icon:

../_images/ovc_select-virtual-machines.png
  1. Click Create, then click Azure virtual machine:

../_images/ovc_click-create.png
  1. When choosing the virtual machine parameters, select the appropriate Subscription, Resource group, Region, and Security type. Choose the appropriate Virtual Machine size based on expected simultaneous connections. Ubuntu Linux 22.04 or greater is required for the steps below.

../_images/ovc_select-main-virtual-machine-params.png
  1. Click the authentication type and complete the account information based on your organization’s policy and/or requirements.

  2. Advance to the Networking tab, set up your subnet, and choose to create a new or use an existing public IP Address and allow SSH (TCP 22) on the Azure firewall.

    Note

    As a best security practice, consider restricting access to this port to ONLY trusted networks.

../_images/ovc_switch-to-networking.png
  1. Configure any additional options as needed based on your organization’s policy and/or requirements. Click Review + create and review the Virtual Machine parameters. Once verified, click Create to build the Virtual Machine.

  2. Once the Virtual Machine is built, view the Virtual Machines dashboard and locate it within the list. In the interface below, make note of the Public IP Address.

../_images/ovc_click-virtual-machines.jpg
  1. Connect using SSH to the Virtual Machine using the Public IP Address and using the appropriate credentials.

  2. Once signed in, run the following commands within the terminal:

    sudo apt update
    sudo apt install curl openvpn
    sudo curl -O  https://raw.githubusercontent.com/angristan/openvpn-install/master/openvpn-install.sh
    sudo chmod +x openvpn-install.sh
    sudo ./openvpn-install.sh
    

    As the installation script runs, accept the default choices, but verify the auto-detected private and public IP Addresses. Create a user when you are prompted to do so during the installation. You can create additional users by launching ./openvpn-install.sh again after installation is complete.

  3. Edit /etc/openvpn/server.conf

  4. Click non-overlapping subnet in server 10.8.0.0 255.255.255.0 clause (if needed.)

  5. Add a push "route 10.26.0.0 255.255.0.0" statement that corresponds to your Virtual Machine’s subnet. This command is required to push that route to the client PCs.

  6. Restart the OpenVPN service using this command: sudo systemctl restart openvpn@server.service

  7. Gather the \*.ovpn files from your home directory and distribute them as appropriate to your users.

  8. Click Inbound port rule from the + Create port rule drop-down list and enter the options listed below:

    • Name: AllowOVPN

    • Port Number: 1194

    • Protocol: UDP

    • Source: Any

    • Destination: Any

    • Action: Allow

../_images/ovc_vm-networking-tab.png

  1. Visit OpenVPN and download and install the OpenVPN client software on your workstation.

../_images/ovc_download-openvpn.png

  1. Within the client, click Upload File and use the interface to import the profile gathered earlier and then click Connect.

../_images/ovc_import-profile-cloud.png

  1. Confirm the VPN and server IP Addresses. Ensure that they match the configurations set in a prior step.

../_images/ovc_check-vpn-ip.png

You should now be able to access Omniverse Cloud PaaS resources from this workstation.