<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VMC on AWS Connected VPC in Break-Fix Technical Discussions</title>
    <link>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972360#M404</link>
    <description>&lt;P&gt;While the subnet doesn't have to be reserved for the SDDC, it is best to do dedicate one for it. There are certain constraint on the route tables and security groups being used.&amp;nbsp;&lt;BR /&gt;The subnet for the SDDC shouldn't be to big, and a /26 is recommended, but a /27 can be used as well.&lt;/P&gt;&lt;P&gt;More can be read here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://blogs.vmware.com/cloud/2019/10/03/selecting-ip-subnets-sddc/" target="_blank"&gt;https://blogs.vmware.com/cloud/2019/10/03/selecting-ip-subnets-sddc/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jun 2023 18:57:32 GMT</pubDate>
    <dc:creator>AsafBlubshtein</dc:creator>
    <dc:date>2023-06-08T18:57:32Z</dc:date>
    <item>
      <title>VMC on AWS Connected VPC</title>
      <link>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972353#M403</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;When deploying an SDDC, a connected VPC and subnet is chosen and linked.&lt;/P&gt;&lt;P&gt;For creating native services in Connected VPC (ex; S3 interface endpoint), do I need to create a new subnet in same AZ so I do not consume IP's from the SDDC Connected subnet?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 17:49:33 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972353#M403</guid>
      <dc:creator>andvm</dc:creator>
      <dc:date>2023-06-08T17:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: VMC on AWS Connected VPC</title>
      <link>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972360#M404</link>
      <description>&lt;P&gt;While the subnet doesn't have to be reserved for the SDDC, it is best to do dedicate one for it. There are certain constraint on the route tables and security groups being used.&amp;nbsp;&lt;BR /&gt;The subnet for the SDDC shouldn't be to big, and a /26 is recommended, but a /27 can be used as well.&lt;/P&gt;&lt;P&gt;More can be read here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://blogs.vmware.com/cloud/2019/10/03/selecting-ip-subnets-sddc/" target="_blank"&gt;https://blogs.vmware.com/cloud/2019/10/03/selecting-ip-subnets-sddc/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 18:57:32 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972360#M404</guid>
      <dc:creator>AsafBlubshtein</dc:creator>
      <dc:date>2023-06-08T18:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: VMC on AWS Connected VPC</title>
      <link>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972420#M405</link>
      <description>&lt;P&gt;indeed, this is the key part:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"It is best not to modify these routes manually, and also a best practice to dedicate the selected subnet for the SDDC, by deploying any native services in different subnets within the VPC.&amp;nbsp; For this reason, make sure to size the VPC sufficiently large to accommodate current and future AWS native workloads that will interact with the SDDC&amp;nbsp;"&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 05:51:39 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Break-Fix-Technical-Discussions/VMC-on-AWS-Connected-VPC/m-p/2972420#M405</guid>
      <dc:creator>andvm</dc:creator>
      <dc:date>2023-06-09T05:51:39Z</dc:date>
    </item>
  </channel>
</rss>

