Uploaded by hervé Abbey

vmware-vsphere-install-configure-manage-v70

advertisement
VMware vSphere:
Install, Configure, Manage
Lecture Manual
ESXi 7 and vCenter Server 7
vmware·
VMware® Education Services
VMware, Inc.
www.vmware.com/education
CONTENTS
Module 1
1
Course Introduction
1-2
Course lntroduction ................................................................................................2
1-3
Importa nce .............................................................................................................3
1-4
Learner Objectives (1) ............................................................................................4
1-5
Learn er Objectives (2) ............................................................................................5
1-6
Course Outline ........................................................................................................6
1-7
Typograph ical Conventions ....................................................................................7
1-8
References (1) .........................................................................................................8
1-9
References (2).........................................................................................................9
1-10
VMware Online Resources ...................................................................................10
1-11
VMware Education Overview ...............................................................................11
1-12
VMware Certification Overview ...........................................................................12
1-13
VMware Badge Overview .....................................................................................13
1-14
Virtual Beans: Introduction ..................................................................................14
Module 2
Introduction to vSphere and the Software-Defined Data
Center
15
2-2
Importance ...........................................................................................................16
2-3
Module Lessons ....................................................................................................17
2-4
Virtual Beans: Data Center ...................................................................................18
2-5
Lesson 1: Overview of vSphere and Virtual Machines .........................................19
2-6
Lea rner Objectives ................................................................................................20
2-7
Terminology (1) ....................................................................................................21
2-8
Terminology (2) ....................................................................................................22
2-9
About Virtual Machines ........................................................................................23
2-10
Benefits of Using Virtual Machines ......................................................................24
2-11
Types of Virtualization ..........................................................................................26
Contents
2-12
About the Software-Defi ned Data Center ............................................................27
2-13
vSphere and Cloud Computing .............................................................................29
2-14
About VMware Skyline .........................................................................................31
2-15
VMware Skyline Fam ily ........................................................................................32
2-16
Review of Learner Objectives ...............................................................................34
2-17
Lesson 2: vSphere Virtualizati on of Resources .....................................................35
2-18
Lea rner Objectives................................................................................................36
2-19
Virtual Machine: Guest and Consumer of ESXi Host ............................................37
2-20
Physical and Virtual Architectu re .........................................................................38
2-21
Physical Resource Sharing ....................................................................................39
2-22
CPU Virtua lization .................................................................................................41
2-23
Physical and Vi rtualized Host Memory Usage ......................................................42
2-24
Physical and Virtual Networking ..........................................................................43
2-25
Physical File Systems and Data stores ................................................................... 45
2-26
GPU Virtualization ................................................................................................47
2-27
Review of Learner Objectives ...............................................................................48
2-28
Lesson 3: vSphere User Interfaces .......................................................................49
2-29
Learner Objectives ................................................................................................50
2-30
vSphere User Int erfaces .......................................................................................51
2-31
About VMware Host Client ...................................................................................52
2-32
About vSphere Client............................................................................................53
2-33
About PowerCLI and ESXCLI .................................................................................54
2·34
Lab 1: Accessing the Lab Environment .................................................................55
2-35
Review of Learner Objectives ...............................................................................56
2-36
Lesson 4: Overview of ESXi ...................................................................................57
2~37
Learner Objectives ................................................................................................58
2-38
About ESXi ............................................................................................................59
2-39
Configuring an ESXi Host ......................................................................................61
2-40
Configuring an ESXi Host: Root Access .................................................................62
2·41
Configuring an ESXi Host : Management Network ................................................63
2-42
Configuring an ESXi Host : Other Settings .............................................................64
11
Contents
2-43
Controlling Remote Access to an ESXi Host .........................................................65
2-44
Managing User Accounts: Best Practices .............................................................66
2·45
ESXi Host as an NTP Client ....................................................................................67
2-46
Demonstration : Insta lling and Configuring ESXi Hosts .........................................68
2-47
Lab 2: Configuring an ESXi Host ............................................................................69
2-48
Review of Learner Objectives ...............................................................................70
2-49
Virtual Beans: Data Center ...................................................................................71
2-50
Key~ints .. . . ... . . . . .
Module 3
. ...... ....... .. . .............................................................72
73
Virtual Machines
3 ...2
lmportance .. ................................................ .........................................................74
3-3
Module Lessons ....................................................................................................75
3-4
Virtual Beans: Vi rtualizing Workloads ..................................................................76
3-5
Lesson 1: Creati ng Vi rtual Machi nes ....................................................................77
3-6
Learner Obj ectives................................................................................................78
3-7
About Provisioning Virtual Machines ...................................................................79
3-8
Creating VMs w ith the New Virtual Machine Wizard (1) .....................................81
3-9
Creating VMs w ith t he New Virtual Machine Wizard (2) .....................................82
3-10
New Virtual Machine Wizard Settings ..................................................................84
3-11
Installing the Guest Operating System .................................................................85
3-12
Deploying OVF Templ ates ....................................................................................86
3-13
About VMware Tools ............................................................................................87
3-14
Installing VMware Tools .......................................................................................89
3· 15
Downloading VMware Tools ................................................................................90
3-16
Labs .......................................................................................................................91
3-17
Lab 3: Creating a Virtual Machine ........................................................................92
3-18
Lab 4: Installing VMware Tools ............................................................................93
3-19
Review of Learner Obj ectives ...............................................................................94
3-20
Lesson 2: Virtual Machine Hardware Deep Dive ..................................................95
3-21
Learner Objectives................................................................................................96
3-22
Virtual Mach ine Encapsulation .............................................................................97
Contents
111
3-23
About Virtual Machine Files .................................................................................98
3-24
About VM Virtual Hardware ...............................................................................100
3-25
Virtual Hardware Versions .................................................................................102
3-26
About CPU and M emory.....................................................................................103
3-27
About Vi rtual Storage .........................................................................................105
3-28
About Thick-Provisioned Virtual Disks ...............................................................107
3-29
About Thin-Provisioned Virtua l Disks .................................................................108
3-30
Thick-Provisioned and Th in-Provisioned Disks ...................................................109
3-31
About Virtual Networks ......................................................................................110
3-32
About Virtual Network Adapters ........................................................................111
3-33
Other Virtual Devices .........................................................................................114
3-34
About the Virtual Machine Console ...................................................................115
3-35
Lab 5: Adding Virtual Hardware .........................................................................116
3-36
Review of Learner Objectives ............................................................................. 117
3-37
Lesson 3: Introduction to Cont ainers .................................................................118
3-38
Lea rner Objectives..............................................................................................119
3·39
Tradit ional Applica tion Development ................................................................120
3-40
Modern Application Development .....................................................................122
3-41
Benefits of M icroservices and Containerization ................................................123
3-42
Container Term inology ....................................................................................... 124
3-43
About Containers................................................................................................125
3-44
Rise of Cont ainers...............................................................................................126
3 . .45
About Container Hosts .................................. .....................................................127
3-46
Containers at Runtime........................................................................................128
3-47
About Container Engines ....................................................................................129
3-48
Virtual Machines and Containers (1) ..................................................................130
3-49
Virtual Machines and Containers (2) ..................................................................131
3-50
About Kubernet es ..............................................................................................132
3-51
Challenges of Running Kubernetes in Production ..............................................134
3·52
Architecting with Common Application Requiremen ts ...................................... 135
3-53
Review of Learner Objectives .............................................................................136
1v
Contents
3-54
Virtual Beans: Virtualizing Workloads ................................................................137
3-55
Key Points ...........................................................................................................138
Module 4
139
vCenter Server
4-2
Importa nce ......................................................................................................... 140
4-3
Module Lessons ..................................................................................................141
4-4
Virtual Beans: vCenter Server Requirements .....................................................142
4-5
Lesson 1: Centralized Management with vCenter Server ..................................143
4-6
Learner Objectives..............................................................................................144
4-7
About the vCenter Server Managem ent Platform .............................................145
4·8
About vCenter Server Appliance ........................................................................ 146
4-9
vCenter Server Services ......................................................................................147
4-10
vCenter Server Architecture ...............................................................................148
4-11
About vCenter Single Sign-On ............................................................................149
4·12
About Enhanced Lin ked Mode ...........................................................................150
4-13
ESXi and vCenter Server Communication ...........................................................151
4-14
vCenter Server Appliance Scalability ..................................................................153
4-15
Review of Learner Objectives .............................................................................154
4-16
Lesson 2: Deploying vCenter Server Appliance ..................................................155
4-17
Lea rner Objectives..............................................................................................156
4-18
Preparing for vCenter Server Appliance Deployment ........................................ 157
4-19
vCenter Server Appliance Native GUI lnstaller ...................................................158
4-20
vCenter Server Appliance Insta llation ................................................................159
4-21
vCenter Server Appliance Installa tion : Stage 1 .................................................. 160
4-22
vCenter Server Appliance Insta llation: Stage 2 ..................................................161
4-23
Getting Sta rted with vCenter Server ..................................................................162
4-24
Configuring vCenter Server Using the vSphere Client ........................................163
4-25
vCenter Server Appliance Management Interface ............................................. 164
4-26
vCenter Server Appliance Multihoming .............................................................165
4-27
Demonstration: Deploying vCenter Server Appliance .......................................166
4-28
Review of Learner Objectives .............................................................................167
Contents
v
4-29
Lesson 3: vSphere licensing ............................................................................... 168
4-30
Learner Objectives ..............................................................................................169
4-31
vSphere Licensing Overview ...............................................................................170
4-32
vSphere License Service ..................................................................................... 171
4-33
Adding license Keys to vCenter Server ..............................................................172
4-34
Assign ing a license to a vSphere Component ....................................................173
4-35
Viewing Licensed Features .................................................................................174
4-36
Lab 6: Adding vSphere Licenses ..........................................................................175
4-37
Review of Learner Objectives .............................................................................176
4-38
Lesson 4: Managing the vCenter Server Inventory ............................................177
4-39
learner Objectives ..............................................................................................178
4-40
vSphere Client Shortcuts Page ...........................................................................179
4-41
Using the Navigation Pane .................................................................................180
4-42
vCent er Server Views for Hosts, Clusters, VMs, and Templates ........................ 181
4-43
vCenter Server Views for Storage and Networks ...............................................182
4-44
Viewing Object Information ...............................................................................183
4-45
About Data Center Objects.................................................................................184
4-46
Organizing Inventory Objects into Folders .........................................................185
4-47
Adding a Data Center and Organizational Objects t o vCenter Server ................187
4-48
Adding E5Xi Hosts to vCenter Server ..................................................................188
4-49
Creating Custom Tags for Inventory Obj ect s......................................................189
4-50
Labs .....................................................................................................................190
4-51
Lab 7: Creating and Managing the vCenter Server Inven tory ............................191
4-52
Lab 8: Configuring Active Directory: Joining a Domain ...................................... 192
4-53
Review of Learner Objectives .............................................................................193
4-54
Lesson 5: vCenter Server Roles and Permissions ...............................................194
4-55
Learn er Objectives ..............................................................................................195
4-56
About vCenter Server Permissions .....................................................................196
4-57
About Roles ........................................................................................................197
4-58
About Objects .....................................................................................................199
4-59
Adding Permissions to t he vCent er Server Inventory ........................................200
vi
Contents
4-60
Viewing Roles and User Assignments .................................................................201
4-61
Applying Permissions: Scenario 1 .......................................................................202
4-62
Applying Permissions: Scenario 2 .......................................................................203
4-63
Activity: Applying Group Permissions (1) ...........................................................204
4-64
Activity: Applying Group Permissions (2) ...........................................................205
4-65
Applying Permissions: Scenario 3 .......................................................................206
4-66
Applying Perm issions: Scenario 4 .......................................................................207
4-67
Creating a Role ...................................................................................................208
4-68
About Global Permissions ..................................................................................209
4·69
Labs ...................................................... ............................................................... 210
4-70
Lab 9: Configuring Active Directory: Adding an Identity Source ........................211
4-71
Lab 10: Users, Groups, and Permissions ............................................................ 212
4-72
Review of Learner Objectives .............................................................................213
4-73
Lesson 6: Backing Up and Restoring vCenter Server Appliance ......................... 214
4-74
Learner Objectives..............................................................................................215
4-75
Virtual Beans: vCenter Server Operations ..........................................................216
4-76
About vCenter Server Backup and Restore ........................................................217
4-77
Methods for vCenter Server Appliance Backup and Restore .............................218
4-78
File-Based Backup of vCenter Server Appliance .................................................219
4-79
File-Based Restore of vCenter Server Appliance ................................................220
4-80
Scheduling Backups ............................................................................................221
4-81
Viewing the Backup Schedule ............................................................................222
4-82
Demonstration: Backing Up and Restoring a vCenter Server Appliance
Instance ..............................................................................................................223
4-83
Review of Learner Objectives .............................................................................224
4-84
Lesson 7: Monitoring vCenter Server and Its lnventory .....................................225
4·85
Learn er Obj ectives..............................................................................................226
4-86
vCenter Server Events ........................................................................................227
4-87
About Log Levels.................................................................................................228
4-88
Setting Log Levels ...............................................................................................229
4-89
Forwarding vCenter Server Appliance Log Files to a Remote Host ....................230
Contents
vii
4-90
vCenter Server Database Health ........................................................................231
4-91
Monitoring vCenter Server Appliance ................................................................232
4-92
Monitoring vCenter Server Appliance Services ..................................................233
4-93
Monthly Patch Updates for vCenter Server Appliance ......................................234
4-94
Review of Learner Objectives .............................................................................235
4-95
Lesson 8: vCenter Server High Avai labil ity .........................................................236
4-96
Learn er Obj ectives..............................................................................................237
4-97
Importance of Keeping vCenter Server Highly Available ...................................238
4-98
About vCenter Server High Availabil ity ..............................................................239
4-99
Scena rio: Active Node Failu re ............................................................................240
4-100
Scenario: Passive Node Failu re ...........................................................................241
4-101
Scenario: Witness Node Failure .........................................................................242
4-102
Benefits of vCenter Server High Availability .......................................................243
4-103
vCenter Server High Availability Requirement s .................................................244
4-104
Demonstration: Configuring vCenter Server High Availability ...........................245
4-105
Review of Learner Objectives .............................................................................246
4-106
Virtual Beans: vCenter Server Maint enance and Operations ............................247
4-107
Key Points ...........................................................................................................248
Module 5
Configuring and Managing Virtual Networks
249
5-2
Importance .........................................................................................................250
5-3
Module Lessons ..................................................................................................251
5-4
Virtual Beans: Networki ng Requirements ..........................................................252
5-5
Lesson 1: Introduction to vSphere Standard Switches .......................................253
5-6
Learner Obj ectives ..............................................................................................254
5-7
About Vi rtu al Switches .......................................................................................255
5-8
Types of Virtual Switch Connections ..................................................................256
5-9
Virtual Switch Connection Examples ..................................................................257
5-10
About VLANs .......................................................................................................258
5-11
Types of Virtual Switches ................................................................................... 260
5-12
Adding ESXi Networking .....................................................................................261
viii
Contents
5-13
Viewing the Configuration of Standa rd Switches ...............................................262
5-14
Network Adapter Properties ..............................................................................263
5-15
Distributed Switch Architect ure .........................................................................264
5-16
Standard and Distributed Switches: Shared Featu res ........................................265
5-17
Additional Features of Distributed Switches ......................................................266
5-18
Lab 11: Using Standard Switches........................................................................267
5-19
Review of Learner Objectives .............................................................................268
5-20
Lesson 2: Configuring Standa rd Switch Policies .................................................269
5-21
Learner Objectives..............................................................................................270
5-22
Network Switch and Port Policies ......................................................................271
5-23
Configuring Security Policies ..............................................................................272
5-24
Traffic-Shaping Policies.......................................................................................274
5-25
Configuring Tra ffic Shaping ................................................................................275
5-26
NIC Teaming and Failover Policies ......................................................................277
5-27
Load-Balancing Method: Originating Virtual Port 10 ..........................................279
5-28
Load-Balancing Method: Source MAC Hash .......................................................281
5-29
Load-Balancing M ethod: Source and Destination IP Hash .................................283
5-30
Detecting and Handling Network Failure ...........................................................285
5-31
Physical Network Considerations .......................................................................287
5-32
Review of Learner Objectives .............................................................................288
5-33
Virtual Beans: Networking Requirements ..........................................................289
5-34
Key Points ...........................................................................................................290
Module 6
291
Configuring and Managing Virtual Storage
6-2
Importa nce .........................................................................................................292
6-3
Module Lessons ..................................................................................................293
5 . .4
Virtual Beans: Storage ........................................................................................294
6-5
Lesson 1: Storage Concepts ................................................................................295
6-6
Learner Objectives..............................................................................................296
6-7
About Datastores................................................................................................ 297
6-8
Storage Overview ...............................................................................................298
Contents
ox
6-9
Storage Protocol Overview .................................................................................300
6-10
About VM FS ........................................................................................................302
6· 11
About NFS ...........................................................................................................304
6-12
About vSAN.........................................................................................................305
6-13
About vSphere Virtual Volum es .........................................................................306
6-14
About Raw Device Mapping ...............................................................................307
6·15
Physica l Storage Considerations.........................................................................308
6-16
Review of Learner Objectives .............................................................................309
6-17
Lesson 2: Fibre Channel Storage ........................................................................310
6-18
Learner Objectives..............................................................................................311
6-19
About Fibre Cha nnel ...........................................................................................312
6-20
Fibre Channel SAN Components ........................................................................313
6-21
Fibre Channel Addressing and Access Control ...................................................315
6-22
Multipathing with Fibre Channel ........................................................................317
6-23
FCoE Adapt ers ....................................................................................................319
6-24
Configuring Software FCoE: Creating VMkernel Ports .......................................320
6·25
Configuring Software FCoE: Activating Software FCoE Adapters.......................321
6-26
Review of Learner Objectives .............................................................................322
6-27
Lesson 3: iSCSI Storage .......................................................................................323
6·28
Learner Objectives ..............................................................................................324
6-29
iSCSI Components ...............................................................................................325
6-30
iSCSI Addressing .................................................................................................327
6-31
Storage Device Naming Conventions .................................................................329
6-32
iSCSI Adapters.....................................................................................................330
6-33
ESXi Network Configuration for IP Storage ........................................................332
6-34
Activating the Softwa re iSCSI Adapt er ...............................................................333
6-35
Discovering iSCSI Targets....................................................................................334
6-36
iSCSI Security: CHAP ...........................................................................................335
6-37
Multipathing with iSCSI Storage .........................................................................337
6·38
Binding VMkernel Port s with the iSCSI lnitiator .................................................338
6-39
Lab 12: Accessing iSCSI Storage ..........................................................................339
x
Contents
6-40
Review of Learner Objectives .............................................................................340
6-41
Lesson 4: VM FS Datastores ................................................................................341
6--42
Learner Objectives ..............................................................................................342
6-43
Creating a VM FS Datastore ................................................................................343
6-44
Browsing Datastore Contents.............................................................................344
6-45
About VMFS Datastores .....................................................................................345
6-46
Managing Overcommitted Data stores ...............................................................346
6-47
Increasi ng the Size of VMFS Datastores .............................................................347
6-48
Datastore Maintenance Mode ...........................................................................348
6-49
Deleting or Unmounting a VM FS Datastore .......................................................349
6-50
Multipathing Algorithms ....................................................................................351
6-51
Co nfiguring Storage Load Balancing ...................................................................352
6-52
Lab 13: Managing VMFS Oatastores ...................................................................354
6-53
Review of Learner Objectives .............................................................................355
6-54
Lesson 5: NFS Datastores ...................................................................................356
6-55
Lea rner Objectives ..............................................................................................357
6-56
NFS Components ................................................................................................358
6-57
NFS 3 and NFS 4.1 ...............................................................................................359
6-58
NFS Version Compatibility with Other vSphere Technologies ...........................360
6-59
Configuring NFS Oatastores ................................................................................362
6-60
Configuring ESXi Host Authentication and NFS Kerberos Credentials ...............363
6-61
Configuring the NFS Datastore to Use Kerberos ................................................365
6-62
Unmounting an NFS Datastore ...........................................................................366
6-63
Multipathing and NFS Storage ...........................................................................367
6-64
Enabling Multipathing for NFS 4.1......................................................................369
6-65
Lab 14: Accessing NFS Storage ...........................................................................370
6-66
Review of Learner Objectives .............................................................................371
6-67
Lesson 6: vSAN Dat astores .................................................................................372
6-68
Learner Objectives ..............................................................................................373
6-69
About vSAN Datastores ......................................................................................374
6-70
Disk Groups .........................................................................................................375
Contents
x1
6-71
vSAN Hardware Req uirements ...........................................................................376
6-72
Viewing the vSAN Datastore Summary ..............................................................378
6-73
Objects in vSAN Datastores ................................................................................379
6-74
VM Storage Policies ............................................................................................380
6-75
Viewing VM Settings for vSAN Information .......................................................381
6-76
Lab 15: Using a vSAN Datastore .........................................................................382
6-77
Review of Learner Objectives .............................................................................383
6-78
Virtual Beans: Storage ........................................................................................384
6-79
Activity: Using vSAN Storage at Virtual Beans (1) ..............................................385
6-80
Activity: Using vSAN Storage at Virtual Beans (2) ..............................................386
6-81
Key Points ...........................................................................................................387
Module 7
Virtual Machine Management
389
7-2
Importa nce .........................................................................................................390
7-3
Module Lessons ..................................................................................................391
7-4
Virtual Beans: VM Management ........................................................................392
7-5
Lesson 1: Creating Templates and Clones ..........................................................393
7-6
Learn er Objectives..............................................................................................394
7-7
About Te mplat es ................................................................................................395
7-8
Creating a Template: Clone VM to Template .....................................................396
7·9
Creating a Template: Convert VM to Template .................................................397
7-10
Creating a Template: Clone a Template .............................................................398
7-11
Updating Templates ...........................................................................................399
7-12
Deploying VMs from a Templa te ........................................................................400
7-13
Cloning Virtual Machines....................................................................................401
7-14
Guest Operating System Customization .............................................................402
7· 15
About Customization Specifications ...................................................................403
7-16
Customizing the Guest Operating System ..........................................................404
7-17
About Instant Clones ..........................................................................................405
7-18
Use Cases for Instant Clones ..............................................................................406
7-19
Lab 16: Using VM Templa tes: Creat ing Templates and Deploying VMs ............407
xn
Contents
7-20
Review of Learner Objectives .............................................................................408
7-21
Lesson 2: Working with Cont ent Libraries..........................................................409
7·22
Learner Objectives ..............................................................................................410
7-23
About Content Libraries .....................................................................................411
7-24
Benefits of Content Libraries ..............................................................................412
7-25
Types of Content Libraries ..................................................................................413
7-26
Adding VM Templates to a Content Library .......................................................415
7-27
Deploying VMs from Templates in a Content Library ........................................416
7-28
Lab 17: Using Cont ent Libraries ..........................................................................417
7-29
Review of Learner Objectives .............................................................................418
7-30
Lesson 3: Modifying Virtual Machines ...............................................................419
7-31
Lea rner Objectives ..............................................................................................420
7-32
Modifying Virtual Machine Settings ...................................................................421
7-33
Hot-Pluggable Devices ........................................................................................423
7-34
Dynamically Increasing Vi rtual Disk Sile ............................................................425
7-35
Inflating Thin-Provisioned Disks .........................................................................426
7-36
VM Options: General Settings ............................................................................427
7-37
VM Options: VMware Tools Settings .................................................................428
7-38
VM Options: VM Boot Settings...........................................................................429
7..39
Removing VMs ....................................................................................................431
7-40
Lab 18: Modifying Virtual Machines ...................................................................432
7-41
Review of Learner Obj ectives .............................................................................433
7-42
Lesson 4: M igrating VMs with vSphere vMotion ...............................................434
7-43
Learn er Objectives ..............................................................................................435
7-44
About VM Migration ...........................................................................................436
7·45
About vSphere vMotion .............................. .......................................................437
7-46
Enabling vSphere vMotion .................................................................................438
7-47
vSphere vMotion M igration Workflow ..............................................................439
7-48
VM Requirements for vSphere vMotion M igration ...........................................441
7-49
Host Requirements for vSphere vMotion Migration (1) ....................................442
7-50
Host Requirements for vSphere vMotion Migration (2) ....................................443
Contents
xiii
7-51
Checking vSphere vMotion Errors ......................................................................444
7-52
Encrypted vSphere vMotion ...............................................................................445
7-53
Cross vCenter Migrations ...................................................................................446
7-54
Cross vCenter M igration Requ irements .............................................................447
7-55
Network Checks for Cross vCenter Migrations ..................................................448
7-56
VMkernel Networking Layer and TCP/IP Stacks .................................................449
7-57
vSphere vMotion TCP/IP Stacks .........................................................................451
7-58
long-Distance vSphere vMotion Migration .......................................................452
7-59
Networking Prerequisites for Long-Distance vSphere vMotion ......................... 453
7-60
Lab 19: vSphere vMotion Migrations .................................................................454
7-61
Review of Learner Objectives .............................................................................455
7-62
Lesson 5: Enhanced vMotion Compatibility ....................................................... 456
7-63
Learner Objectives ..............................................................................................457
7-64
CPU Constraints on vSphere vMotion M igration ...............................................458
7-65
About Enhanced vMotion Compatibility ............................................................459
7-66
Enhanced vMotion Compatibi lity Cluster Requirements ...................................461
7-67
Enabling EVC Mode on an Existing Cluster .........................................................462
7-68
Changing the EVC Mode for a Cluster ................................................................463
7-69
Virtual Machine EVC Mode ................................................................................464
7-70
Review of Learner Objectives .............................................................................465
7-71
lesson 6: Migrating VMs with vSphere Storage vMotion ..................................466
7-72
Learner Objectives..............................................................................................467
7-73
About vSphere Storage vMotion ........................................................................468
7-74
vSphere Storage vMotion In Action ...................................................................469
7-75
Identifying Storage Arrays That Support vSphere Storage APls - Array
Integra tion ...................................................... ....................................................471
7-76
vSph ere Storage vMotion Guidelines and Limitations .......................................472
7-77
Changing Both Compute Resource and Storage During Migration (1) ..............473
7-78
Changing Both Compute Resource and Storage During Migration (2) ..............474
7·79
Lab 20: vSphere Storage vMotion Migrations ....................................................475
7-80
Review of Learner Objectives .............................................................................476
xov
Contents
7-81
lesson 7: Creating Virtual Machine Snapshots ..................................................477
7-82
Learner Objectives..............................................................................................478
7·83
VM Snapshots .....................................................................................................479
7-84
Taking Snapshots ................................................................................................480
7-85
Types of Snapshots .............................................................................................481
7-86
VM Snapshot Files ..............................................................................................483
7-87
VM Snapshot Files Example (1) ..........................................................................485
7-88
VM Snapshot Files Example (2) ..........................................................................486
7-89
VM Snapshot Files Example (3) ..........................................................................487
7-90
Managing Snapshots ..........................................................................................488
7-91
Deleting VM Snapshots (1) .................................................................................490
7-92
Deleting VM Snapshots (2) .................................................................................491
7-93
Deleting VM Snapshots (3) .................................................................................492
7-94
Delet ing All VM Snapshots .................................................................................493
7-95
About Snapshot Consolidation ...........................................................................494
7-96
Discovering When to Consolidate Snapshots .....................................................495
7-97
Consolidating Snapshots ....................................................................................496
7-98
Lab 21: Working with Snapshots ........................................................................497
7-99
Review of Learner Objectives .............................................................................498
7-100
Lesson 8: vSphere Replication and Backu p ........................................................499
7-101
learner Objectives ..............................................................................................500
7-102
About vSphere Replication .................................................................................501
7-103
About the vSphere Replication Appliance ..........................................................502
7-104
Replication Functions .........................................................................................504
7-105
Deploying the vSphere Replication Appliance ...................................................505
7-106 Configuring vSphere Replication for a Single VM ...............................................506
7-107
Configuring Recovery Point Objective and Point in Time Instances ..................507
7-108
Recovering Replicat ed VMs ................................................................................508
7-109
Backup and Restore Solution for VMs ................................................................510
7-110
vSphere Storage AP ls - Data Protection: Offloaded Backup Processing ............511
7-111
vSphere Storage APls - Data Protection: Changed-Block Tracking ....................513
Contents
xv
7-112
Review of Learner Objectives .............................................................................514
7-113
Activity: Virtual Beans VM Management (1) ......................................................515
7-114
Activity: Virtual Beans VM Management (2) ......................................................516
7-115 Activity: Virtual Beans VM Management (3) ......................................................517
7-116
Key Points ...........................................................................................................518
Module 8
Resource Management and Monitoring
519
8·2
Importance .........................................................................................................520
8-3
Module Lessons ..................................................................................................521
8-4
Virtual Beans: Resource Management and Monitoring .....................................522
8-5
Lesson 1: Virtual CPU and Memory Concepts ....................................................523
8-6
Learner Objectives..............................................................................................524
8-7
Memory Virtualization Basics .............................................................................525
8-8
VM Memory Overcommitment ..........................................................................526
8-9
Memory Overcommit Techniques ......................................................................528
8-10
Configuring Multicore VMs ................................................................................530
8-11
About Hyperthreading ........................................................................................532
8-12
CPU Load Balancing ............................................................................................533
8-13
Review of Learner Objectives .............................................................................534
8-14
Lesson 2: Resource Controls...............................................................................535
8-15
Learner Objectives..............................................................................................536
8-16
Reservations, Limits, and Shares ........................................................................537
8-17
Resource Allocation Reservations: RAM ............................................................538
8-18
Resource Allocation Reservations: CPU .............................................................539
8-19
Resource Allocation Limits .................................................................................540
8-20
Resource Allocation Shares ................................................................................541
8-21
Resource Shares Example (1) .............................................................................542
8-22
Resource Shares Example (2) .............................................................................543
8-23
Resource Shares Exam ple (3) .............................................................................544
8-24
Resource Shares Exam ple (4) .............................................................................545
8-25
Defining Resource Allocation Settings for a VM .................................................546
xvi
Contents
8-26
Viewing VM Resource Allocation Settings ..........................................................547
8-27
Lab 22: Controlling VM Resources .....................................................................548
8~28
Review of Learner Objectives .............................................................................549
8-29
Lesson 3: Resource Monitoring Tools ................................................................550
8-30
Lea rner Objectives..............................................................................................551
8-31
Performance-Tuning Methodology ....................................................................552
8-32
Resource-Monitoring Tools ................................................................................553
8-33
Guest Operating System Monitoring Tools ........................................................554
8-34
Using Perfmon to Monitor VM Resources .........................................................555
8-35
Using esxtop to Monitor VM Resources .............................................................556
8-36
Monitoring Inventory Objects with Performance Charts ...................................557
8-37
Working with Overview Performance Charts .....................................................558
8-38
Working with Advanced Performance Charts ....................................................559
8-39
Chart Options: Real-Time and Historical ............................................................560
8-40
Chart Types: Bar and Pie ....................................................................................562
8-41
Chart Types: Line ................................................................................................563
8-42
Chart Types: Stacked ..........................................................................................564
8-43
Chart Types: Stacked Per VM .............................................................................565
8-44
Saving Charts ......................................................................................................566
8-45
About Objects and Cou nters ..............................................................................567
8-46
About Statistics Types ........................................................................................568
8-47
About Rollup .......................................................................................................569
8-48
Review of Learner Objectives .............................................................................571
8-49
Lesson 4: Monitoring Resource Use ...................................................................572
8-50
Learner Objectives ..............................................................................................573
8-51
Interpreti ng Data from Tools ..............................................................................574
8-52
CPU-Constrained VMs (1) ...................................................................................575
8-53
CPU-Constrained VMs (2) ...................................................................................577
8-54
Memory-Constrained VMs (1) ............................................................................578
8-55
Memory-Constrained VMs (2) ............................................................................579
8-56
Memory-Constrained Hosts ...............................................................................580
Contents
xvii
8-57
Disk-Constrained VMs ........................................................................................581
8-58
Monitoring Disk Latency.....................................................................................582
8-59
Network-Constrained VMs .................................................................................583
8-60
Lab 23: Monitoring Virtual Machine Performance ............................................584
8-61
Review of Learner Objectives .............................................................................585
8-62
Lesson 5: Using Alarms .......................................................................................586
8-63
Learn er Objectives ..............................................................................................587
8-64
About Alarms ......................................................................................................588
8-65
Predefined Alarms (l) ......................................................................................... 589
8-66
Predefined Alarms (2) .........................................................................................590
8-67
Creating a Custom Alarm ....................................................................................591
8-68
Defining the Alarm Target Type .........................................................................592
8-69
Defining the Alarm Rule: Trigger (1) ...................................................................593
8-70
Defining the Alarm Ru le: Trigger (2} ...................................................................594
8-71
Defining the Alarm Ru le: Setti ng the Notification ..............................................595
8-72
Defining the Alarm Reset Rules ..........................................................................596
8-73
Enabling the Alarm .............................................................................................597
8-74
Configuring vCenter Server Notifications ...........................................................598
8-75
Lab 24: Using Alarms ..........................................................................................599
8-76
Review of Learner Objectives .............................................................................600
8-77
Activity: Virtual Beans Resource Monitoring (1) ................................................601
8-78
Activity: Virtual Beans Resource Management and Monitoring (2) ..................602
8-79
Key Points ...........................................................................................................603
Module 9
vSphere Clusters
605
9-2
Importance .........................................................................................................606
9 -3
Module Lessons ..................................................................................................607
9-4
Virtual Beans: vSphere Clusters .........................................................................608
9-5
Lesson 1: vSphere Clust ers Overview .................................................................609
9-6
Lea rner Objectives ..............................................................................................610
9-7
About vSphere Clusters ......................................................................................611
xviii
Contents
9-8
Creating a vSphere Clust er and Enabl ing Clust er Features ................................612
9-9
Configuring the Cluster Using Quickstart ...........................................................613
9-10
Configuring the Cluster Manually .......................................................................615
9-11
Adding a Host to a Cluster ..................................................................................616
9-12
Viewing Cluster Summary Information ..............................................................617
9-13
Monitoring Cluster Resou rces ............................................................................618
9-14
Review of Learner Objectives .............................................................................619
9-15
Lesson 2: vSphere DRS........................................................................................620
9-16
Learner Objectives..............................................................................................621
9-17
About vSphere DRS.............................................................................................622
9-18
vSphere DRS: VM Focused..................................................................................623
9-19
About the VM DRS Score ....................................................................................624
9-20
VM DRS Score List ...............................................................................................625
9-21
Viewing VM DRS Scores Using Performance Charts (1) .....................................626
9-22
Viewing VM DRS Scores Using Performance Chart s (2) .....................................627
9-23
Viewing vSphere DRS Setti ngs ............................................................................628
9·24
vSphere DRS Settings: Automation Level ...........................................................629
9-25
vSphere DRS Settings: Migration Threshold .......................................................630
9-26
vSphere DRS Settings: Pred ictive DRS ................................................................632
9-27
vSphere DRS Settings: VM Swap File Location ...................................................633
9-28
vSphere DRS Setti ngs: VM Affinity .....................................................................634
9-29
vSphere DRS Settings: DRS Groups .....................................................................635
9-30
vSphere DRS Settings: VM-Host Affinity Rules ...................................................636
9-31
VM-Host Affinity Preferential Rules ...................................................................637
9-32
VM-Host Affinity Required Rules ........................................................................638
9-33
vSphere DRS Set tings: VM-Level Automation ....................................................639
9-34
vSph ere DRS Cluster Requirement s ...................................................................640
9-35
Viewing vSphere DRS Cluster Resource Utilization ............................................641
9-36
Viewing vSphere DRS Recommendations ..........................................................642
9-37
Maintenance Mode and Sta ndby Mode ............................................................643
9-38
Removing a Host from the vSphe re DRS Cluster ................................................644
Contents
xix
9-39
vSphere DRS and Dynam ic DirectPath 1/0 ......................................................... 645
9-40
Adding a Dynamic DirectPath 1/0 Device to a VM .............................................646
9-41
Lab 25: Implement ing vSphere DRS Clusters .....................................................647
9-42
Review of Learner Objectives .............................................................................648
9-43
Lesson 3: Introduction to vSphere HA ................................................................649
9-44
Learner Objectives ..............................................................................................650
9-45
Protection at Every Level ....................................................................................651
9-46
About vSphere HA ..............................................................................................653
9-47
vSphere HA Scenario: ESXi Host Failure .............................................................654
9-48
vSphere HA Scenario: Guest Operating System Fai lure .....................................655
9-49
vSphere HA Scenario: Application Failure ..........................................................656
9-50
vSphere HA Scenario: Datastore Accessibility Failures ......................................657
9-51
vSphere HA Scenario: Protecting VMs Against Network lsolation .....................659
9-52
Importa nce of Redundant Heartbeat Networks ................................................660
9-53
Redundancy Using NIC Teaming.........................................................................661
9-54
Redundancy Using Add itional Networks ............................................................662
9-55
Review of Learner Objectives .............................................................................663
9-56
Lesson 4: vSphere HA Arch itecture ....................................................................664
9-57
Learner Objectives ..............................................................................................665
9-58
vSphere HA Architectu re : Agent Communication ..............................................666
9-59
vSphere HA Architectu re: Network Heartbeats .................................................669
9-60
vSphere HA Architectu re: Datastore Heartbeats ...............................................670
9-61
vSphere HA Fa ilure Scenarios .............................................................................671
9-62
Failed Subordinat e Hosts....................................................................................672
9-63
Failed Master Hosts ............................................................................................674
9·64
Isolated Hosts .....................................................................................................675
9-65
VM Storage Failures ...........................................................................................676
9-66
Protecti ng Against Storage Fa ilures with VMCP .................................................677
9-67
vSphere HA Design Considerations ....................................................................678
9-68
Review of Learner Objectives .............................................................................679
9-69
Lesson 5: Configuring vSphere HA......................................................................680
xx
Contents
9-70
learner Objectives..............................................................................................681
9-71
vSphere HA Prerequisites ...................................................................................682
9-72
Configuring vSphere HA Settings ........................................................................683
9-73
vSphere HA Settings: Failures and Responses ....................................................684
9-74
vSphere HA Settings: VM Monitoring ................................................................686
9-75
vSphere HA Settings: Heartbeat Datastores ......................................................687
9-76
vSphere HA Settings: Admission Control ............................................................688
9-77
Example: Admission Control Using Clust er Resources Percentage ....................690
9-78
Example: Admission Control Using Slots (1) .......................................................691
9-79
Example: Admission Control Using Slots (2) .......................................................692
9-80
vSphere HA Set tings: Performance Degradation VMs Tolerate .........................693
9-81
vSphere HA Setting: Default VM Restart Priority ...............................................695
9-82
vSphere HA Settings: Advanced Options ............................................................696
9-83
vSphere HA Settings: VM-level Settings ............................................................697
9-84
About vSphere HA Orchestrated Restart ...........................................................698
9-85
VM Dependencies in Orchestrated Restart (1) ..................................................699
9-86
VM Dependencies in Orchestrated Restart (2) ..................................................700
9-87
Network Configuration and Maintenance .........................................................701
9-88
Monitoring vSphere HA Cluster Status ...............................................................702
9-89
Using vSphere HA with vSphere DRS ..................................................................703
9-90
Lab 26: Using vSphere HA...................................................................................704
9-91
Review of Learner Objectives .............................................................................705
9-92
Lesson 6: Introduction to vSphere Fa ult Tolerance............................................706
9-93
Learn er Objectives ..............................................................................................707
9-94
About vSphere Fault Tolerance ..........................................................................708
9-95
vSphere Fault Tolerance Features ......................................................................709
9-96
vSphere Fault Tolerance with vSphere HA and vSphere DRS.............................710
9-97
Redundant VMDK Files .......................................................................................711
9-98
vSphere Fault Tolerance Checkpoint ..................................................................712
9-99
vSphere Fault Tolerance: Precopy ......................................................................713
9-100
vSphere Fault Tolera nce Fast Checkpoint ing .....................................................714
Contents
xxi
9-101
vSphere Fault Tolerance Shared Files.................................................................715
9-102
Enabling vSphere Fa ult Tolerance o n a VM ........................................................716
9· 103
Review of Learner Objectives .............................................................................717
9· 104
Activity: Virtual Beans Clusters (1) .....................................................................718
9-105
Activity: Virtual Bea ns Clust ers (2) .....................................................................719
9-106
Key Points ...........................................................................................................720
Module 10
vSphere Lifecycle Management
721
10-2
Importance .........................................................................................................722
10-3
Module Lessons ..................................................................................................723
10·4
Virtual Beans: Lifecycle Management ................................................................724
10-5
Lesson 1: vCenter Server Update Planner ..........................................................725
10-6
Learner Objectives..............................................................................................726
10-7
Overview of vCenter Server Update Planner .....................................................727
10-8
Update Pl anner Requirements ...........................................................................728
10-9
Update Planner View in the vSphere Client .......................................................729
10-10
Interopera bility View in vSphere Client .............................................................730
10-11
Exporting Report Result s ....................................................................................731
10-12
Managing t he vCenter Server Life Cycle .............................................................732
10-13
Review of Learner Objectives .............................................................................733
10·14
Lesson 2: Overview of vSphere Lifecycle Manager ............................................734
10-15
Lea rner Objectives ..............................................................................................735
10-16
Introduct ion to vSphere Lifecycle Manager .......................................................736
10-17
Baselines and Images ................................... ......................................................737
10-18
vSphere Lifecycle Manager Home View .............................................................738
10-19
Patch Settings .....................................................................................................739
10-20
vSphere Lifecycle Manager Int egrat ion with vSphere DRS................................740
10-21
Review of Learner Objectives .............................................................................741
10-22
Lesson 3: Working with Baselines ......................................................................742
10·23
Lea rner Objectives..............................................................................................743
10-24
Ba selines and Baseline Groups ...........................................................................744
xxii
Contents
10-25
Creating and Editing Patch or Extension Baselines ............................................745
10-26 Creating a Baseline .............................................................................................746
10-27
Creating a Baseline: Name and Description .......................................................747
10-28
Creating a Baseline: Select Patches Automatically.............................................748
10-29 Creating a Baseline: Select Patches Manually ....................................................749
10-30
Updating Your Host or Cluster with Baselines ...................................................750
10-31
Remediation Precheck........................................................................................751
10-32
Remediating Hosts..............................................................................................752
10-33
Review of Learner Objectives ............................................................................. 753
10-34
Lesson 4: Working with lmages ..........................................................................754
10-35
Learner Objectives ..............................................................................................755
10-36
Elements of ESXi lmages.....................................................................................756
10-37
Image Oepots......................................................................................................758
10-38
Importi ng Updates .............................................................................................759
10-39
Using Images to Perform ESXi Host Life Cycle Operations .................................760
10-40 Creating an ESXi Image for a New Cluster ..........................................................761
10-41
Checking Image Compliance ...............................................................................762
10-42
Ru nning a Remediation Precheck.......................................................................763
10-43
Hardware Compatibility .....................................................................................764
10..4.4
Standalone VIBs ..................................................................................................765
10-45
Remediating a Cluster Aga inst an lmage ............................................................766
10-46
Reviewing Remediation lmpact ..........................................................................767
io ..47
Recomm ended Images .......................................................................................768
10-48
Viewing Recommended Images .........................................................................769
10-49 Selecting a Recommended Image ......................................................................771
10-50
Customizing Cluster Images ...............................................................................772
10-51
Lab 27: Using vSphere Lifecycle Manager ..........................................................773
10-52
Review of LearnerObjectives .............................................................................774
10-53
Lesson 5: Managing the Life Cycle of VMwa re Tools and VM Hardware...........775
10·54
Learner Objectives..............................................................................................776
10-55
Keeping VMware Tools Up To Date ....................................................................777
Contents
xxiii
10-56
Upgrading VMware Tools (1) ..............................................................................778
10-57
Upgrading VMware Tools (2) ..............................................................................779
10-58
KeepingVM Hardware Up To Date ....................................................................780
10-59
Upgrading VM Hardware (1) ..............................................................................781
10-60
Upgrading VM Hardware (2) ..............................................................................782
10-61
Review of Learner Objectives .............................................................................783
10-62
Virtual Beans: Conclusion ...................................................................................784
10-63
Key Points ...........................................................................................................785
xxiv
Contents
Module 1
Course Introduction
VMware vSphere 7.0: Install,
Configure, Manage
Module 1: Course lntroduction1
1-2
Course Introduction
Course Introduction
vmware·
2
Module 1: Course Introduction
1-3
Importance
As a vSphere administrator. you require knowledge about vSphere components and resources and
how they work together in your environment. You also require practical skills in installing, deploying,
and managing these components and resources. By developing your knowledge and skills, you can
build and run a highly scalable vSphere virtual infrastructure.
Module 1: Course lntroduction3
1-4
Learner Objectives ( 1)
After compleUng this course. you should be able to meet the following objectives:
Install and configure ESXi hosts
Deploy and configure \'Center Server Appliance
Use the vSphere Client to manage the vCenter Server inventory and the vCenter Server
configuration
Create virtual netwotl<s with vSphere standard switches
Describe the storage technologies supported by vSphere
Configure virtual storage using iSCSI and NFS storage
Create and manage VMFS datastores
Use the vSphere Client to create virtual machines, templates, clones, and snapshots
Create a content library for deploying virtual machines
4
Module 1: Course Introduction
1-5
Learner Objectives (2)
Manage virtual machine resource use
Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion
Create and manage a vSphere cluster that is enabled with vSphere HA and vSphere ORS
Use vSphere Lifecycle Manager to perform upgrades to ESXi hosts and virtual machines
Module 1: Course Introductions
1-6
Course Outline
1. Course l nlroduction
7. Virtual Machine Management
2. Introduction to vSphere and the SoftwareDefined Dala Center
8. Resource Management and Monitoring
9. vSphere Clusters
3. Virtual Machines
4. vCenter Server
10.vSphere Lifecycle Management
5. Configuring and Managing Vi.rtual Nel\vorks
6. Configuring and Managing Virtual Storage
6
Module 1: Course Introduction
1-7
Typographical Conventions
The following typographical conventions are used in this course.
Conventions
Usage and Examples
?'1on ospace
loent1f;e$ command names. command options, parameters, oode fragments, error
message$, filenames folder names. dif&e-tol)' names and paih names·
• Run thoe!>xlopco1nmand.
found 10 the var/log/messagesfde
Monospace
Bold
Identifies user inputs:
Boldface
Identifies oser interface controls
• Cl•ck me Configuration tab
Italic
ldent1f1es hook ti1fes
• Enter ipconf i g I release
• vSphere Virtual Machine Administration
<>
Indicates ptaceholdervanables
<ESX1_host_name~
the SettJ ngs/<Yo1Jr Name> . t x t file
Module 1 : Course Introduction 7
1-8
References ( 1)
Title
Location
vSphere Installation and Serup
vcenrer SeNer and Hos1
Management
titfps:tfdocs.vmw@re.com'en.'VMware.vSphere/index html
vSphere Virtual Machine
https .//docs.vmv.•are.comrenN~~·,yare-
Administration
vSpherel7 Ofcom .vmware vsphere.vm a<fmln_doc/GUTD·55238059912E·411F=AOE9-A7A536972A91 html
ht1PS:lldocs.\IJTTIA•are.com/enNM•Na.reVSpherel7.0/com.vmv.•are.ysphere.networking.dociGUID-35B40BOBOC13-43B2-BC85· 18C9C9 \BE204.html
httpsJ/docs.vmware.eornlenNMwareVSphe!eJ7 .O/com.vmware.vsohere.stor.age.doctGU D~8AE8875820C1-4873.99C7-181 EF9ACFA70 html
vSphere Networking
vSphere Storage
8
http§. IIdocs.\11"11Ware.corrlellNMwarevSOOeref7 Ofcom vmware vsphere vtenterfJQsl doc/GUID·3B5AF2B t•
C534-44?6·697A·D14019AQ01 OF him!
Module 1: Course Introduction
1-9
References (2)
Title
Location
vSphere Security
tlttps ·tidocs .vmwsre.oom'en.'VMwareVSphel'ef7 Otcom vmware vspllere secunty docJGUI0°52188148C079-4F!ll\·8~Jli-CF!lCEODQ21!17 him!
httQs;l!docs.vnlWare.corrVenNMwareVSpheref7 Olcom vmware.vsphere resmgmt doc,'GUID·98BD5A8A·
200A·494F. flAAE·7•781F5C4B87 html
vSphere Resource Management
VMware Compatibility Guide
httos;/tvmware.com/resources/compatibility
VMware Configul'8bon t.1al(imums
hfu>f;-nconfigma1t vmware com
Module 1: Course lntroduction9
1-10
VMware Online Resources
Documentation for vSphere: https.//docs.vmware.coml
VMware Communities: http://communities.vmware.com
Start a discussion.
Access the knowledge base.
Access documentation, technical papers, and compatibility guides.
Access communities.
Access user groups.
VMware Support: http l/www vmware com/support
VMware Hands-on Labs: http·//hol.vmware,com
VMware Education: http;//Www vmware comleducat1on
• Access course catalog and worldwide course schedule.
10
Module 1: Course Introduction
1-11
VMware Education Overview
Your instructor will introduce other Education Services offerings available to you:
VMware Learning Paths:
- Help you find the course that you need based on the product, your role, and your level of
experience
- Can be accessed al hUps //\lmware co!!]/educa!JQD
VMware Learning Zone, which is the official source of digital training, includes the following
options:
- On-Demand Courses: Self-paced learning that combines lecture modules with hands-on
practice laoo
- VM\vare Lab Connect: Self-paced. technical lab environment that lets you practice skills learned
during instructor-led training
- Celtification Exam Prep: Comprehensive video-based reviews of exam topics and objectives to
help you take your certification exam
For more information, see httos//vmwarelearn1ngzone_vm\'lare.com.
Module 1: Course lntroduction11
1-12
VMware Certification Overview
VMware certifications validate
your expertise and recognize
vcDx
\IM#t, •
~ D•tClfl E""'"'
""fWlllcl
your technical knov1ledge and
skills with VMware technology.
VC IX
,v,,~,o
cc•ll'"·j ''<-•C"•:t1ot , £•r.cn
......l ...><>t'
, ,~.,..,
VCAP ""'"'"'~Ce~ "°""'v.~J Ptol'~.$o:<'Oll
~~~~~~~~~~~~~~~~~-
0...>,,Ill
VCP
De~!Oy
I
\.°M"'!f~ (Cf111~ "'tO'M510nto'
Alll'llnlW~l>O'I
VCA
·:~n·'~-".<.;.:>;1;.rn
-- --- -"i"'~"
------
1',,...,,,,,..r<; ~l"tl llr".,..•"1~1'(1>1>9
I .....
....
""'"'
VOk~
\ltll•• llotlinn
Technology Tracks
VMware certification sets the standards for IT professionals who work with VMware technolo!,'Y·
Certifications are grouped into technology tracks. Each track offers one or more levels of
certification (up to five levels).
For the complete list of certifications and details about how to attain these certifications, see
https: //\ 111\\'are. co111/ce 11i tic at ion.
1
12
Module 1: Course Introduction
1-13
VMware Badge Overview
VMware badges are digftal emblems of skills and achievements.
vmware·
vmware
Pf:IOFUSIQNAL
tt1PlEM£NTATION
EXPERT
ti.-11- QI l 0 Ull
"11 1 ""4~
IA•1cr. X1X1
vmware·
SP£ClALIST
... . .
vmware
IT A<;ADt;.MY
fh
.. ..-~
..
I
Digital badges have the following features:
•
Easy to share in social media (Linkcdlo, Twitter, facebook, biogs, and so on)
•
Tetl1ered to VMware to validate and verify achievement
•
Contain metadata with skill tags and accomplishments
•
Based on lvlozilla's Open Badges s tandard
For the complete list of digital badges, sec hup:iiww\\ .pcarson,uc.comlv111warcibad>!ing.
Module 1: Course lntroduction13
1-14
Virtual Beans: Introduction
Virtual Beans is a coffee company that owns a chain of cyber cares. Each care sells coffee drinks,
snacks, and packaged coffee beans. Each cafe Is also equipped with a variety or video games and
high-speed Internet access.
Virtual Beans has an online store (vmbeans.com)where you can purchase coffee beans and various
accessories.
Virtual Beans is a last-growing company. After much success over the years, it went from a single,
small cafe to a company that owns a chain of cafes spanning multiple cities. The online web store is
also a huge success.
Virtual Beans recently purchased vSphere 7 for its data center.
You work as a system administrator al Virtual Beans. You will be part of the IT team in charge of
deploying vSphere 7 in the data center. You are new to vSphere, but you have two years experience
\Vorking for Virtual Beans.
14
Module 1: Course Introduction
Module 2
Introduction to vSphere and the Software-Defined Data
Center
Module 2 : Introduction to vSphere
and the Software-Defined Data
Center
Module 2: Introduction to vSphere and the Software-Defined Data Center
15
2-2
Importance
As a vSphere administrator, you must be familiar with the components on v1hich vSphere is based.
You must also understand the following concepts:
Virtualization, the role of the ESXi hypelVisor in virtualization and virtual machines
Fundamental VSphere components and the use of vSphere in the software-defined data center
Use of vSphere clients to administer and manage vSphere environments
16
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-3
1.
2.
3.
4.
Module Lessons
Overview of vSphere and Virtual Machines
vSphere Virtualization of Resources
vSphere User Interfaces
Overview of ESXi
Module 2: Introduction to vSphere and th e Software-Defined Data Center
17
2-4
Virtual Beans: Data Center
Virtual Beans has a data center at its company headquarters. The company's goals are as follows:
Use the latest version of vSphere.
Create a cost-effective. leading-edge data
center.
Create a secure, scalable, high-performing,
and highly available infrastructure.
As a Virtual Beans administrator, you must
decide how to implement these goals. But first,
you must understand how a vSphere data
center \VOrks.
Create a vSphere infrastructure that follov1s
VMware best practices.
Open a second data center to seive as a
backup site to the primary data center and to
host new applications.
18
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-5
Lesson 1: Overview of vSphere and Virtual Machines
Lesson 1: Overview of vSphere and Virtual
Machines
vmware·
Module 2: Introduction to vSphere and the Software-Defined Data Center
19
2-6
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Explain basic virtualization concepts
Desclibe how vSphere fits into the software-defined data center and the cloud infrastructure
Desclibe how to proactively manage your vSphere environment
20
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-7
Terminology (1)
Vlrtuahzation ts associated with several key concepts, products, and features.
Term
Oafin1t1on
Examples
OperatJng system
Software designed to allocate physic<tl f8$.0Urces to
epplrcatlons
tvltcrosoft W ndows, Unux
Application
Software that runs on an operaung system, consuming
physical resources
Microsoft Office, Chrome
Virtual 1nach1oe
Specialized apphcat1on that abstracts hardware
resources into software
Guesl
The operating sys!em that runs 1n a VM {also called lhe
gue~t ope1abng system)
M1croson Windows, Linux
Hyperv15or
Spec1aihzed operobng $Y$le:m des>gned to run V~'\s
ESXi. W0tk.sta~JOn. Futnori
Host
Phys-1cal comput&rthat PfOYides l'esources to th& ESX1
h~i sor
Module 2: Introduction to vSphere and the Software-Defined Data Center
21
2-8
Terminology (2)
Term
Oef1nn1on
vSphere
Setver vlrtuahzation product of VMware that combines the ESX1 hypefV1sor
and the VCentef Server managemeotplatfonn
Cluster
Group or ESX1 hosts \Vhose rf!source$ are shared by VMs
vSphere vMotion
Feature that supports the migration of powered-on Vl\4s from host to host
without service interruption
Clust111r feature th.at protects against host hardware failur&S by restaning Vfi.tls
on hosts thal are ruMJng normally
vSphete HA
\/Sphere DRS
22
Clus1er feature lhat uses vSphere vMobon to place VMs on hosls and ens1.ue
that each. VM te.cerves I.he 1esources that It n6eds
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-9
About Virtual Machines
A virtual machine (VM) is a software representation of a physical computer and its components. The
vlrtualization software converts the physical machine and Its components Into files.
Virtual Machine Components
APP
Guest operating system
VM\vare Tools
OS
Virtual resources. such as:
- CPU and memory
- NetworK adapters
- DisKs and controllers
- Parallel and serial ports
A virtual machine {Vivi) includes a set ofspccificaiion and configuration filc.s and is supported by
the physica l resource.s ofa host. Every VM has virtual devices that provide the same functionality
as physical hardware but are more portable, more secure, and easier to manage.
Vl'vls typically include an operating system, appUcat ions, VMware Tools, and both virtual
resources and hardware that you manage in much the same way as you manage a physical
computer.
VMware Tools is a bundle of drivers. Using these drivers, the guest operating system can interact
efficiently with the guest hardware. VMware Tools adds extra functionality so that ESXi can
better manage the VM's use of physica l hardware.
Module 2: Introduction to vSphere and the Software-Defined Data Center
23
2-10
Benefits of Using Virtual Machines
Physical machines:
Difficult to move or copy
Bound to a specific set of hardware
Virtual machines:
Easy to move or copy
Independent of physical hardware because
components
VMs are encapsulated into files
Often have a short life cycle
Require personal contact to upgrade
Isolated from other VMs running on same
physical har.,,,are
hardv1are
Insulated from physical hardi.vare changes
DATA
VMware
0
111
I
0
ln a physical machine, the operating system (for example, Windows or Linux) is installed directly
on the hardware. The operating system requires specific device drivers to support specific
hardware. If the computer is upgraded with new hardware, new device drivers are required.
If applications interface directly with hardware drivers, an upgrade to the hardware, drivers, or
both can have significant repercussions if incompatibilities exi~1. Because of these potential
repercussions, hands-on technical support personnel must test hardware upgrades against a wide
variety of application suites and operating systems. Such testing costs time and money.
Virtualizing these systems saves on such costs because VMs are l 00 percent software.
Multiple VMs are isoltited from one tmother. You can have a database server and an email server
rulllling on the same physical computer. The isolation between the VMs means that softwaredependenc)' confl icts are not a problem. Even users with system administrator privileges on a
VM·s guest operating system cannot breach this layer of isolation to access another VM . These
users must explicitly be granted access by the ESXi system administrator. As a result ofVM
24
Module 2: Introduction to vSphere and the Software-Defined Data Center
isolation, if a guest operating system running in a VM fails, other VMs on the same host are
unaffected and continue to run.
A guest operating system failure does not affect access and perfo11nance:
•
Users can still access the other V1vfs.
•
The operat ional VJVls can access tbe resources that they need.
•
The otJ1er VJV!s can still perform.
With VMs, you can consolidate your physical servers and make more efficient use of your
hard\\rare. Because a Vfvl is a set ot" files~ features tl1at are not available or llOt as efficient 0 11
physical architectures are available to you, for example:
•
You can rapidly and consistently provision VMs.
•
\Vith VMs, you can use live migration, fault tolerance, high availability, and disaster recovery
scenarios to increase uptime and reduce recovery time from failures.
•
You can use multitenancy to mix VMs into specialized configurations, such as a DM Z.
\Vith VMs, you can support legacy appUcations and operating systems on newer hardware when
n1ai11te11ance contracts 011 tl1e existing hard\\ are expire.
1
Module 2: Introduction to vSphere and the Software-Defined Data Center
25
2-11
Types of Virtualization
Virtualization Is the pr~ss of
creating a software-based
representation of something
physical, such as a server.
desktop, network, or storage
device.
Virtualization is the single most
effective way to reduce IT
expenses while boosting
efficiency and agility for an
business sizes.
•
•
11111111
•
11111111
11111111
•
11111111
•
•
11111111
•
11111111
11111111
•
•
•
11111111
t·
I·
11111111
11111111
11111111
11111111
•
•
Server
Virtualization
Network
Virtualization
Storage
Vlrtualization
Desktop
Virtuahzation
Server virtualization addresses inefficiencies by allowing multipl e operating systems to run on a
single physical server as VMs, each with access to the underlying server's computing resources.
Network virtualization is the complete reproduction of a physical network in software.
Applications run on the virtual network exactly as if on a physical network.
Storage virrnaliuition is the process of creating a software-based representation of network storage
devices into what appears to be a s ingle unit.
By deploying desktops as a managed service, you can re.spond more quickly to changing needs
and oppo1tu11itics.
26
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-12
About the Software-Defined Data Center
In a software-defined data center (SODC), all infrastructure is vlrtualized, and the control of the data
center is automated by software. vSphere is the foundation of the SOOC.
~Vi te Mono~ment
OOUCI
Dnd Automotioo
Man.:.~nt
Swrvte• Catalog
Bu~if\(lU
U~l!'t
Elo
<(}')
v'1@a!l;ro
lnfrat.ttuc;tu.fe
St-11- S•tVtC:e Port•I
VW"lu.al
0l)er<ilJ(Hi~
r
vRe.:i!l:.e
AulomaUO/\
0
V"1W • rtt vSpl\!!"te
S.ito flccovoty
M.)n1>g!O'r
t.ay~r
/
Phy&!c..'11
Socurit"
Conunu1ty
VMwMC vSAN
l
VMv1are NSX
Cornpute
LdVl.!'f
I
vSpt1e1tReplication
0
~
NSX
Mjcroo;•~t;itlon
VJ1M!l70
Orc:l'll.'l~trator
A so ftware-defined virtual data center (SDOC) is deployed with isolated computing. storage.
neru orking, and secttrity resoltrces that are fitster than tl1e traditional, har(t\vare-based data center.
1
All the resources (CPU, memory, disk. and network) ofa software -defined data center arc
abstracted in to files . This abstraction brings the benefits of virtuaJiz.at.ion at all levels of the
infrastructure. independent of the physic;i J infrastructure.
An SDDC can include the following components :
•
Service management and automation: Use service management and automation to track and
analyze the operation of multiple data sources in the multiregioo SDDC. Deploy vRealize
Operations Manager and vRcalize Log Ins ight across multiple nodes for continued availability
and increased log ingestion rates.
•
Cloud management layer: This layer includes the service catalog, which houses the facilities
to be deployed. The cloud management layer also includes orchestrat ion, which provides the
Module 2: Introduction to vSphere and the Software-Defined Data Cente r
27
workflows to deploy catalog items, and the sel f-service portal for end users to access and use
the SDDC.
•
Virtual infrastructure layer: This layer establisbcs a robust virtualized environment tbat all
other solutions integrate with. The virtual infrastructure layer includes the virtualization
platform for rhe hypervisor, pools of resources, and virmalization control. Additional
pl'Ocesses and technologies build on the infrastructure to support Jnfrastructw·e as a Service
(IaaS) and Platform as a Service (PaaS).
•
Physical layer: The lowest layer of the solution includes compute, storage, and network
companents.
•
Security: Customers use this layer oftbe platfon11 to meet demandi.ng compliance
rcquiremcnrs for virtual ized workloads and to manage business risk.
28
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-13
vSphere and Cloud Computing
Cloud computing exploits the efficient pooling of an on-demand. sen-managed. and virtual
infrastructure.
BBB
I
•
Private Cloud
Public. Cloud
As defined by the National Institute of Standards and Technology (NIST), cloud computing is a
model for the ubiquitous, convenient, and on-demand network access to a shared pool of
configurable computing resources.
For example, networks, servers, storage, applications, and services can be rapidly provisioned and
released with minimal management effort or little service provider interaction.
vSphere is the foundation for the technology that supports shared and configurable resource pools.
vSphere abstracts the physical resources of the data center to separate the workload from the
physical hardware. A software user interface can provide the framework for managing and
maintaining this abstraction and allocation.
VMware Cloud Foundation is the unified SDDC platform that bundles vSphere (ESXi and
vCenter Server), vSAN, and NSX into a natively integrated stack to deliver enterprise -ready cloud
infrastructure. VMware Cloud Foundation discovers the hardware, installs the VMware stack
(ESXi, vCentcr Server, vSAN, and NSX), manages updates, and performs li fecyclc management.
Vtvfware Cloud Foundation can be self-deployed oo compatible hardware or preloaded by partners
Module 2: Introduction to vSphere and the Software-Defined Data Center
29
and can be used in both private and public clouds (VM ware Cloud on AWS or VMware cloud
providers).
Use cases:
•
Cloud infrastructure: Exploit the high performance, avai labil ity, and scalabil ity of the SDDC
to run mission-critical applications s uch as databases, web applications, and virtual desktop
infrastructure (VDI).
•
IT automation: Automate infrastructure and application delivery with self-se rvice capabilities.
•
VD!: Provide a complete solution for VD! deployment at scale. It si1npli fies the planning and
des ign with standardized and tested solutions fully optimized for VDT workloads.
•
Hybrid cloud: Build a hybrid cloud with a common infrastructure and a consistent operational
model, connecting your on-premises and off-p ren1ises data center that is compatible,
stretched, and distributed.
T o find out more about VNlware cloud computing, go to http://wv.w.vmware.com/cloudcon1pt1t i 112/ 0\'Cl'\'ie\v .l1t111I .
30
Module 2: Introduction to vSphere and the Software -Defined Data Center
2-14
About VMware Skyline
VMware Skyline is a proactive support technology that provides predictive analysis and proactive
recommendations to help you avoid problems. VMware Skyline provides the following benefits:
Issue avoidance;
Personalized recommendations·
- Proactively identifies potential issues
based on environment-specific
configuration1 details, and usage.
- Resolution is specific to your environment
No add~iona l cost
-Resolves issues before they occur,
improving enllironment reliability and
stability.
- You receive additional value with your
current support subscription (Basic,
Production, or Premier support).
Shortens time to resolution:
- Environment·specffic, data-driven analytics
accelerate problem resolution.
VMware Skyli ne shortens the time it takes to resolve a problem so that you can get back to
business quickly. VMware Technical Support engineers can use VMware Skyline to view your
environment's configuration and the specific, data-d1iven analytics to help speed up problem
resolution.
Module 2: Introduction to vSphere and th e Software-Defined Data Center
31
2-15
VMware Skyline Family
The VMware Skyline ramily includes Skyline Health and Skyline Advisor.
Skyline Hnalth
Skyline Advisor
All V~Aware Customer&
Producbon and Premier Support Customers
Key capabilities;
\/Sphere and vSAN findlngs
Key capabilities:
Supports vSphere. vSAN. NSX for vSphere,
vReatize Opetations fi..1anager. and VMware
Avaitable in the \'Sphere Cfleot
• SupportsvSphere 6 7 U1 and later
H01izon
SupportsvSphere 55 ;;ind loter
Tags VMwi're Val1d.ated Oes.Jgn, VllRa1I, ~nd
VMware Cloud Foundation deployments
Automates log transfe1s w ith Log Assist
Uses cloud-based ID and access
Premier Support Customecs
Key capabilities:
Advanced f1nd1n9s and reporting
•
Tailored remedtahon plans
\Vi th Basic Support. you can access Skyline findings and recommendatio ns for vSphcrc and
vSAN by using Skyline Health in the vSpbere Client (version 6.7 and later).
\Vith .Productio n o r Premier Support, you must use Skyline Advisor and the run functionality of
Skyline (including Log Assist).
32
Module 2: Introduction to vSphere and the Software-Defined Data Center
\Vith Premier Support, you receive additional Skyline features that are not available with
Production Support. for example:
•
An advanced set of proactive findings and recommendations
•
Scheduled and custom operational summary reports that provide an overview of the proactive
findings and recommendations
•
All additional benefits of Premier Support. including the following services:
Designated support team
Direct access to senior-level technical support engineers
Assistance with multivendor troubleshooting
Onsite support services, such as Mission Critical Support (MCS), Healthcare C1·itical
Support (HCS), and Carrier Grade Support (CGS)
Skyline supports vSphere, NSX for vSphere, vSAN, VMware Horizon, and vRealize Operations
lvlanager. A Skyline management pack for vRealize Operations Manager is also available. lf you
install this management pack, you can see Skyline proactive findings and recommendations within
the vRealize Operntions Manager client.
The identification and tagging of VxRail and VMware Validated Design deployments help you
and VMware Technical Support to better understand and support multiproduct solutions.
Skyline identifies all ESXi 5.5 objects within a vCenter Server instance and provides additional
information in VMware lrnowledge base article 51 491 at https://kb.,•mware.cornlkb/514'> I. This
article details the end of general support for vSphere 5.5.
For versions ofvSphere, vSAN, NSX for vSphere, VMware Horizon, and vRealize Operations
lvlanager that are supported by Skyline, see the Skyli ne Collector Release Notes at
ht1ps:.//<loc.:s.\ ··n1v..arc.co11\.
Module 2: Introduction to vSphere and the Software-Defined Data Center
33
2-16
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Explain basic virtualization concepts
Desclibe how vSphere fits into the software-defined data center and the cloud infrastructure
Desclibe how to proactively manage your vSphere environment
34
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-17
Lesson 2: vSphere Virtualization of Resources
Lesson 2: vSphere Virtualization of
Resources
vmware·
Module 2: Introduction to vSphere and the Software-Defined Data Center
35
2-18
Learner Objectives
After completing this lesson, you should be able to meet the following objective:
• Explain how vSphere interacts with CPUs, memory, networks, and storage
36
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-19
Virtual Machine: Guest and Consumer of ESXi Host
1
1111
D
CPU
0
111
I
10001
.. ... ~ ~~
' '
Memory
Disk
Network
A virtual machine is an abstrnction in software of a physical machine. A VM turns components
into files that act like physical components .
For the list of all supported operating systems , see VMware Compatibility Guide at
https://\V\\T\\ \'lll\\'are.co11llresot1rces/co111patibiIi tv.
1
•
Module 2: Introduction to vSphere and the Software-Defined Data Center
37
2-20
Physical and Virtual Architecture
Vlrtuahzation technology abstracts physical components into software components and provides
solutions for many IT problems.
Physical Arch itecture
Virtual Architecture
ESXi (Hypervisor
li.64 Arehltcc:tutc
x64 Architccture
10001
.. .... .
You can use virtualization to consolidate and run multiple workloads as VMs on a single
computer.
The slide shows the di flcrences between a virtualized and a nonvirtualized host.
In traditional architectures, the operating system interacts directly with the installed hardware. The
operating system schedules processes to run, allocates memory to applications, sends and receives
data on network interfaces, and both reads from and writes ro anached storage devices.
In comparison. a virtualized host interacts with the installed hardware through a thin layer of
soilware called the virtualization layer or hypervisor.
The hypervisor provides physical hardware resources dynamically co VMs as needed to support
the operation of the VMs. \Vith the hypcrvisor. VMs can operate with a degree of independence
from the underlying physical hardware. For examp le, a VM can be moved from one physical host
to anothcr. ln addition, itS virtual disks can be moved from one type of storage ro another without
affecting the functioning of the VM.
38
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-21
Physical Resource Sharing
Multiple VMs, running on a
physical host, share the
compute, memory, network, and
storage resources of the host.
I
x64
~
+ Architecture i
Physical
Re!.OUfCff
~
o-O
\Vi th virtua liiation, you can run multiple Vl\1s on a single physical host, with each VM sharing
the resources of one physical computer across multiple environments. \/Nls share access to CPUs
and are scheduled to run by the hypervisor.
In addition, Vt.1s are assigned their own region of memory to use and share access to the physical
network cards and disk controllers. Different Vlvls can run different operating systems and
applications on the same physical computer.
\I/hen multiple VMs nm on an ESXi host, each VM is allocated a portion of the physical
resources. T he hypervisor schedules VMs like a traditional operating system allocates memory
and schedules applications. These Vlvls n m on various CPUs. The ESXi hypervisor can also
overcommit memory. Memory is overcommitted when your Vlv!s can use more virtual RAM than
the physical RAM that is available on the host
VMs, like applications, use network and disk bandwidth. However. VMs are managed with
elaborate control mechanisms to manage how much access is available for each VM . With the
Module 2: Introduction to vSphere and the Software-Defined Data Center
39
default resource allocation seuings, all Vl\1s associated with the same ESXi host receive an equal
share of available resources.
40
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-22
CPU Virtualization
In a physical environment, the operating system assumes lhe ownership of all the physical CPUs in
the system.
CPU virtuali:zation emphasizes performance and runs directly on the available CPUs.
Virtual Archttectvre
Phystcal Arehltecture
GB
0
~
. ·~
x64 Architecture
DODD
E
00
0000
11
x64 Architecture
DODD
The virlualization layer runs instructions only when needed to make VMs operate as if they were
running directly on a physical machine. CPU virtualization is not emulation. \Vith a software
emulator, programs can run on a computer system otl1er than the one for which !hey were
originally written.
Emulation provides portabi lity but might negatively affect perfonnance. CPU virtualization is not
emulation because the supported guest operating systems are designed for x64 processors. Using
the bypervisor the operating systems can run natively on the hosts' physical x64 processors.
\Vhen many virtual VMs are running on an ESXi host, those VMs might compete for CPU
resources. \Vhen CPU contention occurs, the ESXi host time slices the physical processors across
all vinual machines so that each VM nms as if it had a specified number of virtual processors.
Module 2: Introduction to vSphere and the Software-Defined Data Center
41
2-23
Physical and Virtualized Host Memory Usage
In a physical environment, the operating system assumes lhe ownership of all physical memory in
the system.
Memory virtualizalion emphasizes performance and runs direcUy on the available RAM.
Physical
Virtual
Archi t~ctu re
x64 Architecture
Ard\it~rc
x64 Architecture
looollooollooolloool
looolJooollooo llooo I
....... ..... ..
··· ····
'''''' '
!
t
i++••
•
•
•
•••
•
''*''' '
• • •••••
\Vhcn an application starts, it uses the interfaces provided by the operating system to allocate or
release virtual memory pages during the execution. Virtual memory is a decades-old technique
used in most general-purpose operating systems. Operating systems use vi1tual memo1y to present
more memory to applications than they physically have access to. Almost all modem processors
have hardware to support virtual memory.
Virtual memory creates a unifom1 virtual address space for applications. \Vi th t11e operating
system and hardware, virtual memory can handle the address translation between the virtual
address space and the physical address space. This technique adapts the execution environment to
support large address spaces, process protection, file mapping, and swapping in modern computer
systems.
In a virtualized environment, the VMware virtualization layer creates a contiguous addressable
memory space for the VM when it is started. The allocated memory space is configured when the
VM is created and has the same properties as the virtual address space. IVith this configuration,
the hypervisor can run multiple VMs simultaneously while protecting the memory of each Vl\1
from being accessed by otbers.
42
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-24
Physical and Virtual Networking
Virtual Ethernet adapters and virtual sv1itches are key virtual networking components.
Physical Architecture
Virtual Architecture
x64 Arehltoeturo
x64 Architecture
A VM can be configured with one or more viJ1u.~I Ethernet adapters. VMs use virtual s witches on
the same ESXi host to communicate with one another by using the same protocols that are used
over physical switches, witl1out the need for additional hardware.
Virtual swi.tches also support VLANs that are co1npatibJe with standard VLAN implementat ions
from other networking equipment vendors. \Vith V~1ware virtual networking. you can link local
VMs together and link local VMs to the external network through a virtual switch.
A virtual switch, like a physical Ethen1et switch, forwards frames at the dat:<I link layer. An ESXi
host might contain multiple virtual switches. The vi11ual switch connects to the external network
through outbound Ethernet adapters, called \01lnics. T he virtual switch can bind multiple vmnics
together, like NIC teaming on a traditional server, offering greater availability and bandwidth to
the VMs using the virtual switch.
Vi11ual switches are similar to modem physical Ethernet switches in many ways. Like a phys ical
switch, each virtual switch is isolated and has its own forwarding table. So every destination that
Module 2: Introduction to vSphere and the Software-Defined Data Center
43
1he swilch looks up can match only poris on 1hc same virtual swi1ch where lhe frame originated.
This feature imprtwes security, making ii difficult for hackers 10 break virtual swilch isolation.
Virtual switches also supporl VLAN segmenta1ion a1 lhe port level, so thal each port can be
configured as an access or trunk port. providi11g access to either single or multiple VLANs.
However. unlike phys ical switchc.s, virtual swi1ches do not require the Spanning Tree Proiocol
because a single-tier networking topology is enforced. Multiple virtual switches cannot be
inlerconnecled. and nelwork traffic cannot Oow directly from one virtual swi1ch to another virtua l
switch on the sanie host. Virtual switches provide all the ports that you need in one switch. Virtual
switches do not need to be cascaded because virtual switches do not share physical Ethernet
adapters, and leaks do not occur between virnial switches.
44
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-25
Physical File Systems and Datastores
vSphere VMFS provides a distributed s torage architecture, \Vhere multiple ESXi hosts can read or
write to the shared storage concurrenHy.
V i.rt:ual Architeetu te
Phys.le.al Atehitectore
x64 Arc ite<:ture
NTFS, ext4, UFS
x64 Architecture
x64 Architecture
Sh.a.red Stota9e: VMFS. NFS. vSAN,
vSphere V1rtu-al Volumes
To store virtual disks, ESXi uses datastorcs, which are logical containers that hide the specifics of
physical storage from VMs and provide a uniform model for storing Vl\1 files. Datastores that you
deploy on block storage devices use the VMFS format, a special high-performance file system
format that is optimized for storing virtual machines.
VlvfFS is designed, constructed, and optimized for a virtualized environment. lt is a highpcrformance cluster file system designed for virtual machines. 1t functions in the following ways:
•
Uses distributedjounialing of its file system metadata changes for fast and resilient recovery
if a hardware failure occurs
•
Increases resource usage by providing multiple VMs with shared access to a consolidated
pool of clustered storage
•
Is the foundation of distributed infrastructure services, such as live migration of VMs and VM
files, dynamically balanced workloads across available compute resources, automated restart
of V!vls, and fault tolerance
Module 2: Introduction to vSphere and the Software-Defined Data Center
45
VMFS provides an interface Lo storage resources so that several storage protocols (Fibre Channel,
Fibre Channel over Ethernet, and iSCSJ) can be used to access datastores on which VMs can
reside. \Vi th the dynamic growth of VMFS datastores through aggregation of storage resource.s
and dynamic expansion of a VlvlFS datastore, you can increase a shared storage re.source pool with
no dov.rnti1ne.
With the disllibuted locking methods, VMFS forges the link between the VM and the underlying
storage resources. VMs can use the unique capabilities of VMFS to join a cluster seamlessly, with
no 111a11agen1e11t overl1ead.
46
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-26
GPU Virtualization
GPU graphics devices optimize complex graphics operations. These operations can run at high
performance without overloading the CPU.
Virtual GPUs can be added to VMs for the following use cases:
Rich 20 and 30 graphics
VM\ltare Horizon virtual desktops
Graphics-intensive applications, such as those used by architects and engineers
Server applications for massivety parallel tasks, such as scientific computation applications
You can configure VMs with up to four vGPU devices to cover use cases requiring multiple GPU
accelerators.
VMware supports AMO and NVIDIAgraphics cards.
GPUs can be used by developers o f server applications. Although servers do not usually have
monitors, GPU suppo1t is important and relevant to server virtualization.
M odule 2: Introduction to vSphere and th e Softw are-Defined Data Cente r
47
2-27
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objective:
• Explain how vSphere interacts with CPUs, memory, networks, and storage
48
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-28
Lesson 3: vSphere User Interfaces
Lesson 3: vSphere User Interfaces
vmware·
Module 2: Introduction to vSphere and the Software-Defined Data Center
49
2-29
Learner Objectives
After completing this lesson, you should be able to meet the following objective:
• Recognize the user intelfaces for accessing the vCenter Server system and ESXi hosts
50
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-30
vSphere User Interfaces
You can use the vSphere Client, PowerCLI, VMware Host Client, and ESXCLI to interact with the
vSphere environment.
For information on ports and protocols, see hltQ.l/oons.vmwre,com.
•
:
•
-
VMware Host Client provides direct management of individual ESXi hosts. VMware Host Client
is generally used only when management through vCenter Server is not possible.
\Vith the vSphere Client, an HTlv!LS-based client, you can manage vCenter Server Appliance and
the vCenter Server object inventory.
Vlvfwarc Host Client and the vSphcre Client provide the following benefits :
•
Clean. modern UI
•
No browser plug-ins to install or manage
•
Integrated into vCenter Server and ESXi
Module 2: Introduction to vSphere and th e Software-Defined Data Center
51
2-31
About VMware Host Client
VMware Host Client is an HTML5-based user interface that you can use lo manage individual ESXi
hosts direcUy when vCenter Server is unavailable.
VMware Host Client is served from ESXi, and you access it from a supported browser at
hnps:/IESXi_FODN_or_IP_Address/ui.
https://sa-esxi-01.vclass.local/ ui
Infrastructure •
vSphere Site-A •
I vmware· Esxr·
VMware ESXi in the upper-left corner of the banner on the VMware Host Client interface helps
you to differentiate VMware Host Client from other clients.
52
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-32
About vSphere Client
The vSphere Client is an HTML5-base<I client You manage the vSphere environment with the
vSphere c ,1ient by connecting to vCenter Server Appliance.
You access the vSphere Client from a supported browser at
https·/tvCenter_ Server_Appliance_FQDN_or_IP_Address/ui.
vSphere Site-A •
vSphcrc Client, which in the uppcr-lefl corner of tl1e banner on the vSphere Client interface, helps
you differentiate vSpbere Client from other clients.
\Vhen you use https://vCenter_Server_Appliancc_FQON_or_rP_Address/ui to access the vSphere
Client, the URL internally redirects to port 9443 on your vCenter Server system.
\'lith the vSphere Client, you can manage vCenter Server Appliance through a web browser, and
Adobe Flex does not have to be enabled in the browser.
Module 2: Introduction to vSphere and th e Software-Defined Data Center
53
2-33
About PowerCLI and ESXCLI
PowerCU ls a command-line and scripting tool that is built on Windows PowerShell:
Provides a PowerShell interface lo vSphere API
• Provides more than 700 cmdlets for managing and automating vSphere
The ESXCLI tool allows for remote management of ESXi hosts by using the ESXCU command set:
ESXCLI can be downloaded from the VMware {code} page at
https.//code.vmware com/web/tool/7 Olesxch.
ESXCLI commands can be run against a vCenter Server system and target any ESX1system.
You can install ESXCLT on a \l/indows or Linux system. You can run ESXCL£ commands from
the \l/indows or Linux system to manage ESXi systems.
For more information about ESXCL£, sec huns:i/codc.vmwarc.com, wchl tool/7.0lc'xch .
For more information about PowerCLJ , see https:ilco<le. vmware.com/ webltooll l2 .0.0lvmwarepowercli.
54
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-34
Lab 1: Accessing the Lab Environment
Log in to the student desl<top and access the vSphere Client and VMware Host Client:
1. Access the Student Desktop
2. Log In to an ESXi Host with VMware Host Client
3. Log In to vCenter Server with the vSphere Client
Module 2: Introduction to vSphere and th e Softw are-Defined Data Center
55
2-35
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objective:
• Recognize the user intelfaces for accessing the vCenter Server system and ESXi hosts
56
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-36
Lesson 4: Overview of ESXi
Lesson 4: Overview of ESXi
vmware·
Module 2: Introduction to vSphere and the Software-Defined Data Center
57
2-37
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe the ESXi host architecture
Navigate the Direct Console User Interface (DCUI) to configure an ESXi host
Recognize user account best practices
Install an ESXi host
Configure ESXi host settings
58
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-38
About ESXi
ESXi is a hypeivisor that you can buy with vSphere or get in a free, downloadable version. ESXi has
the follo\v1ng features:
High security:
- Host-based firewall
- Memory hardening
- Kernel module integrity
- Trusted Platform Module (TPM 2.0)
- UEFI secure boot
- Encrypted core dumps
Small disk footprint
Quick boot for faster patching and upgrades
Installable on hard disks, SAN LUNs, SSO, USS devices, SD cards, SATADOM, and diskless
hosts
To ensure that your physical servers are supported by ESXi 7.0, check V.11ware Compatibility
G11i<fe at https://\\l\\'\V., -111\\ are.con1/ resources!co111pat ibiIi tv.
1
You can obtain a free version ofESXi, called vSphere Hypervisor, or you can purchase a licensed
version with vSphere. ESXi can be insta lled on a hard disk, a USB device, or an SD card. ESXi
can also be insta lled on diskless hosts (directly into memory) with vSphere Auto Deploy.
ESXi has a sma ll disk footprint for added security and re liability. ESXi provides additional
protection with the following features:
•
Host-based fi rewall: To minimize the risk of an attack through the management interfoce,
ESXi includes a firewall between the management interface and tbe network.
•
lvlemory hardening: T he ESXi kernel, user-mode applications, and executable components,
such as drivers and libraries, are located at random, nonpredictable memory addresses.
Combined with the nonexecutable memory protections made available by microprocessors,
memory hardening provides protection that makes it di fficult for malicious code to use
memory exploits to mke advantage of vulnerabilities.
Module 2: Introduction to vS phere and the Software-Defined Data Cente r
59
•
Kernel module integrity: Digital signing ensures the integrity and authenticity of modules,
drivers, and applications as they are loaded by the VMkernel.
•
Trusted Platform Module: TPM is a hardware element that creates a trusted platform. This
element a!lirms that the boot process and all drivers loaded are genuine.
•
UEFI secure boot: This feature is for systems that support UEFI secure boot firmware, which
contains a digital certificate that the VMware infrastructure bundles (VIBs) chain to. At boot
time, a verifier is started before other processes to check the VIB's chain to the certificate in
the firn1\vare-.
•
Lockdown modes: This vSphere feature disables login and API functions from being executed
directly on an ESXi host.
•
ESXi Quick Boot: \\lith this feature, ESXi can reboot without reinitializing the physical
server BIOS. Quick Boot reduces remediation time during host patch or host upgrade
operations. Quick Boot is enabled by default on supported hardware.
60
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-39
Configuring an ESXi Host
The DCUI is a text-based user interface wtth keyboard-only interaction.
I •.. --~·-·- - I___________••_.----·-·-~
You use the Direct Console User lnterfac·e (DCUI) to configure ce11ain settings for ESXi hosts.
The DCUI is a low-level configuration and management interface, accessible through the console
of the server, that is used primarily for initial basic configuration. You press F2 to start
customizing system settings.
Module 2: Introduction to vSphere and the Software-Defined Data Center
61
2-40
Configuring an ESXi Host: Root Access
Administrators use the OCUI to configure root access settings:
Set a root password (complex passwords only}.
Enable or disable lockdown mode:
- Limits management of the host to vCenter Server
-Can be configured only for hosts managed by a vCenter Server instance
4*#i.,..,~..
,......,l~ll"O ...••-
v-~•-u..
"""' ~ '"'-'tGol
~· ~,
... (..,,,....,._
The administrative user name for the ESXi host is root. The root password must be configured
during the ESXi installation process.
62
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-41
Configuring an ESXi Host: Management Network
Using the DCUI, you can modify nelWork settings:
Host name
IP configuration (IP address, subnet mask. default gateway)
DNS servers
_,lei-t --~ f'll!\IO'it
1e\t ""'~1 tll!1-k
l'l!ti.orit Antorc Opt IOfO
Conflgu-e~
1f"Olblt:9ioot IRO Opt I MS
YICM $vttCN
L-OfP
You must set up your TP address before your ESX i host is operational. By default, a DHCPassigned address is configured for the ESXi host. To change or configure basic network settings,
)'OU use the DCUI.
In addition to changing IP settings, you pcrfonn the following iasks from the DCUI:
•
Configure VLAN settings.
•
Configure 1Pv6 addressing.
•
Set custom DNS suffixes.
•
Restart the management network (without rebooting the system).
•
Test the management network (using ping and DNS requests).
•
Disable a management network.
Module 2: Introduction to vSphere and the Software-Defined Data Center
63
2-42
Configuring an ESXi Host: Other Settings
Using the OCUI, you can configure the keyboard layout, enable troubleshooting services, view
support information, and view system logs.
, ...........
~-4
i--...(.,.,
1.,.. .. .,,..t.w'I
. -·l
,, ~·--..
.....
...
-.--1. .... ,..... ,..,,..
o..11.....
~·
r...11
~
llU-
~1-
'""'
"
vi.... .,,~• - l(JWI
\'I• ..,.,_., lhf-11..,
-
~Utl c..11-Mh"'
<ti+
....
e!JM.ca .... a·-·
......... .._..
-
r•~<Qt
..,., .... _ J
....
..
.
--.. lil.'.UI ..loo f l -
From the DCUI, you can change the keyboard layout, view support information, such as tbe host's
license serial number, and view system logs. The default keyboard layout is U.S. English.
You can use the troubleshooting options. whicb are disabled by default, to enable or disable
troubleshooting services:
•
vSphere ESXi Shell: For troubleshooting issues locally
•
SSH: For troubleshooting issues remotely by using an SSH client, for example, PuTTY
The best practice is to keep troubleshooting services disabled until they are necessary, for
example. when you are working with VMware technical support lo resolve a pwblem.
By selecting the Reset System Configuration option, you can reset the system configuration to its
so ftware defaults and remove custom exicnsions or packages thac you added to che host.
64
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-43
Controlling Remote Access to an ESXi Host
You can use the vSphere Client to customize
essential security settings that control remote
access to an ESXi host
The ESXi firewall is enabled by default:
- The firewall blocks incoming and outgoing
traffic, except for the traffic that is enabled
in the host's firewall settings.
Services, such as the NTP client and the
SSH client, can be managed by the
administrator.
Lockdown mode prevents remote users from
logging in to the host direcUy, The host is
accessible only through the DCUI or vCenter
Server.
....
,-.,.....,.
...
'
O.w·-...--'°'""
·~·-a .........·->-•·
~~Ul(M
1ls.-..o.i..-
o-'°'-...-11eo1
......
.,_
-·-·
,.,_.
Flrew.'111
__ _ ·-........
r_c.,,...._
. c._._
· -....i·
,- - . . 1... ,........
,.,,..... .......
---Q
.. "
~-
(
~~
................
~-
-·
"'
,.._
-~'C'
An ESXi host includes a firewall as part of the default installation. On ESXi hosts, remote clients
are typically prevented from accessing services on the host. Sin1ilarly, local clients are typically
prevented from accessing services on remote hosts.
To ensure the integrity of the bosL, few ports are open by default. To provide or prevent access Lo
certain services or clients, you must modify the properties of the. firewall.
You can configure firewall settings for incoming and outgoing connections for a service or a
ma11agen1ent age11t. For so111e services, yoll can 111anage service details.
For example, you can use the Start, Stop, or Restart buttons to change the status of a service
temporarily. Alternatively, you can change the startup policy so that the service starts with the host
or with port use. For some services. you can explicitly specify lP addresses from which
connec.tions are allo~red.
Module 2: Introduction to vSphere and the Software-Defined Data Center
65
2-44
Managing User Accounts: Best Practices
When assigning user accounts to access ESXi hosts or vCenter Sel\ler systems, ensure that you
follow these security guidelines:
Strictly control root privileges to ESXi hosts.
Create strong root account passwords that have a t least eight characters. Use special characters,
case changes, and numbers. Change passwords periodically.
Manage ESXi hosts centrally through the vCenter SeNer system by using the appropriate vSphere
client.
Minimize the use of local users on ESXi hosts:
- Add the ESXi hosts to Active Director( and add the relevant administrator users to the ESX
Adminsdomain group. Users in the ESXAdminsdomain group have root privileges on ESXi
hosts, by default.
- If local users are created, manage them centrally using the esxe l i command in the vSphere
CLI.
On an ESXi host, the root user account is the most powerful user account on the system. The user
root can access all files and all commands. Securing this account is the most important step that
)'OU
can take to secure an ESXi host.
\Vhenever possible, use the vSphere Client to log in to the vCenter Server system and manage
)'Our ESXi hosts. In some unusual circumstances, for example. when the vCenter Server system is
down, you use VMware Host Client to connect d irect!)' to the ESXi host.
Although you can log in to )'OUT ESXi host through the vSphere CLI or through vSphere ESXi
Shell, these access methods should be reserved for troubleshooting or configuration that cannot be
accomplished by using VMware Host Client.
If a host must be managed directly, avoid creating local users on the host. If possible, j oin the host
to a \Vindows domain and log in with domain credentials instead.
66
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-45
ESXi Host as an NTP Client
Network lime Protocol (NTP) is a client-server
protocol used to synchronize a computer's clock
to a time reference.
NTP is important:
. For accurate performance graphs
• For accurate time stamps in log messages
. So that virtual machines have a source to
synchronize with
An ESXIhost can be configured as an NTP
•
•
I
~
client. It can synchronrze time with an NTP
server on the Internet or your corporate NTP
server.
•
.
ESXi Host
•
I
Th• NTP Client uses
UDP over poet 123 to
commu.nicate with
the NTP se-rver.
Network T ime Protocol (NTP) is an Internet standard protocol that is used to synchronize
computer clock times in a uetwork. The benefit~ of synchronizing an ESXi host's time include:
•
Performance data can i>e displayed and interpreted properly.
•
Accurate tin1e stamps appear in log a1essitges, v.1hich 111ake altdit logs 111eanir1gful.
•
VMs can synchronize their time witl1 the ESXi host. Time synchronization is beneficial to
applications. such as database applications. running on VMs.
NTP is a client-server protocol. When you configure the ESXi host to be an NTP client, the host
synchronizes its time with an NTP server, which can be a server on the Internet or your corporate
NTP server.
For information about NTP, see http:llwww.ntp.orn.
For more information about timekeeping, see VMware knowledge base article 1318 at
http://kb. vmware.comlkb/ IJ 18.
Module 2: Introduction to vSphere and the Software-Defined Data Center
67
2-46
Demonstration: Installing and Configuring ESXi Hosts
Your instructor will run a demonstration.
68
Module 2: Introduction to vSphere and the Software-Defined Data Center
2-47
Lab 2: Configuring an ESXi Host
Use VMware Host Client to configure an ESXi host:
1. Add an ESXi Host to Active Directory
2. Log In to the ESXi Host as an Active Directory User
3. Enable U1e SSH and vSphere ESXi Shell Services
Module 2: Introduction to vSphere and the Software-Defin ed Data Center
69
2-48
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe the ESXi host architecture
Navigate the Direct Console User Interface (DCUI) to configure an ESXi host
Recognize user account best practices
Install an ESXi host
Configure ESXi host settings
70
Module 2: Introduction lo vSphere and the Software-Defined Data Center
2-49
Virtual Beans: Data Center
As a Virtual Beans administrator, you now understand essential vSphere terminology. Your initial
takea\vays about vSphere are as follo\vs:
vSphere is the starting point for building a software-defined data center.
ESXi hosts are highly secure platforms on which Virtual Beans applications run.
Check the VMware Compatibility Guide to ensure that yaur physical servers support ESXi 7 .0.
Module 2: Introduction to vSphere and th e Software-Defined Data Center
71
2-50
Key Points
Virtual machines are hardware independent.
VMs share the physical resources of the ESXi host on which they reside.
vSphere abstracts CPU, memory, storage, and netwot1<in9 for VM use.
The ESXi hypervlsor runs directly on the host.
Questions?
72
Module 2: Introduction to vSphere and the Software-Defined Data Center
Module 3
Virtual Machines
Module 3: Virtual Machines
Module 3: Virtual Machines 73
3-2
Importance
You can create a virtual machine in several ways. Choosing the correct method can save you time
and make the deployment process manageable and scalable.
74
Module 3: Virtual Machines
3-3
Module Lessons
1. Creating Virtual Machines
2. Virtual Machine Hardware Deep Dive
3. Introduction to Containers
Module 3: Virtual Machines 75
3-4
Virtual Beans: Virtualizing Workloads
Virtual Beans uses internally developed applications that run in an environment with Windows and
Linux systems.
Virtual Beans requires that 100% of their workloads be virtualized:
• Business-critical applications
• Nonbusiness-critical applications
In addttion. Virtual Beans application developers are creating and testing a new order-fulfillment
system based on container technology.
As a Virtual Beans administrator, you must familiarize yourself with the components of a virtual
machine and lhe virtual devices that are supported. You also want to learn about containers because
future applications will use this technology.
76
Module 3: Virtual Machines
3-5
Lesson 1: Creating Virtual Machines
Lesson 1: Creating Virtual Machines
vmware·
Module 3: Virtual Machines 77
3-6
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Create and provision a virtual machine
Desclibe how to import a virtual appliance OVF template
Explain the importance of VMware Tools
Install VMware Tools
78
Module 3: Virtual Machines
3-7
About Provisioning Virtual Machines
You can create VMs in several ways:
Use the New Virtual Machine wizard to create a single VM using:
- The vSphere Client
- VM\vare Host Client
Use the vSphere Client to deploy VMs in the following formats:
- Ne\v V"'~s from existing templates or clones
- VMs, v!rtual appliances, and vApps stored in OVF formal
The optimal method for provisioning VMs for your environment depends on factors such as the.
size and type of your infrastn1cture and U1e goals that you want to achieve.
You can use the New Virtual Machine wizard to create a single VM i f no other VMs in your
environment 111eet your require1neots, such as a particular ope111ting system or hard,vare
configuration. For example, you might need a \/~1 that is configured only for testing purposes.
You can also create a single VM, install an ope.rating S) s te1n on it, and use that VM as a te.n1plate
from which to clone other VMs.
1
Deploy VMs, virtual appliances, and vApps stored in Open Virtual ~1achine Format (OVF) to use
a preconfigured VM. A virtual appliance is a VM that typically has an operating system and other
software preinstalled. You can deploy VMs from OVF templates that are on local file systems (for
example, local disks such as C:), removable media (for example, CDs or USB keychain drives),
shared network drives, or URLs.
In addition to using the vSphere Client, you can also use Viviware Most Client to create a VM by
using OVF files. However, several limitations apply when you use VMware Host Client for this
Module 3: Virtual Machines 79
deployment method. for information about OVF and OVA limitations for the VMware Host
Client, see vSphere Single Host 1Ha11age111e111 - VMware Hosr Cliell/ at
hllps://docs. vmware.comlen!V M ware-vSphcre17 .0/com. vmware. vspherc.hostclicnt .doc/GU ID509C I2B2-32 F2-1928-B8 I B-DE87C7B2A5F6.html.
80
Module 3: Virtual Machines
3-8
Creating VMs with the New Virtual Machine Wizard (1)
You can use the Ne\v Virtual Machine \Vizard in the vSphere Client to create a VM.
o ......
~....-.­
lll~"°"'l
.....t........,
r::Jt4~-oOI
1-............
-··
i -
,
1,.~
·~ · (•.....,.. ....f f
- C..-·---
•• - -
_ _
1
,_.,_,
1M-..
._ -
, ... u.to-..i•
•Wt.._,,,,.,
c..c...,,.,....,_
..... _ . _.. 1111
c.- ....."'''"0 ...,_.....,,...
J C - . . ...._
O>l+Wlwilm.kl-10..,,.......
I _ , lo.._.f'#'•
°""""' -
--
~--·!
to_.._
~·--- ...
Module 3: Virtual Machines 81
3-9
Creating VMs with the New Virtual Machine Wizard (2)
You can use the Ne\v Virtual Machine \Vizard in VMware Host Client to create a VM.
ti·_. _ _...._ ••• •1~r••nw!U(""•
_ ..
,....... ......... ..... ,,.
~
~
"'"""""'" ..
,_
.. ..
)
S.IK1 I tlllflt •nd pat OS
......,_ ••••• cs:
~(:---
_..._,,,._
_ _ _ po_ .. ,..._
--
_.,,,., _._.............
..." _ _ _ _ ...,..._ f b l -
....
~------.....·"""'"'
-~-
-·..us·-
The New Virtual Machine wizard prompts you for standard information:
•
The VM name
If using the vSphere Client, you can also specify the folder in which to place the VM.
•
The resource on which the VM runs
If using VMware Host Client, you create the VM on the host that you are logged in to.
If using the vSphere Client. you can specify a host, a cluster, a vApp, or a resource pool. T he
VM can access th.e resources of the selected object.
•
The datastore oo which to store the VM.'s files
Each datastore might have a different s ize, speed, availability, and other properties. T he
available datastores are accessible from the destination resource that you select.
•
82
The guest operating system to be installed into the Vt-1
Module 3: Virtual Machines
•
T he number of NI Cs, the network to connect to, and the network adapter type
•
Vi1111al disk provisioning choice
Module 3: Virtual Machines 83
3-10
New Virtual Machine Wizard Settings
VM configuration settings are based on prior choices that you made about the operating system.
- - - - - YVI t(lj)llt.t...._inot_
Custornll:• settings
c...,.,._.,.._.,_,,_.,,_....,,.. _,.._
•
,,,_"O'
• l_ _
!!'!!'.!!!!!:!.
w-
2,,.,-- - - - - a:~-• Q Cl'\I ~
· ·~
6.
• ;,J'"""'eo*' U
• D.sc:t~I
Q $4fA~0
Clluh--•
....
· ·-~·
. '°'°"°°"'" '
(
84
Module 3: Virtual Machines
,...
•
~·
w
~--
~
--LSIJ I
""~-
3-11
Installing the Guest Operating System
Installing a guest operating system in your VM Is similar to installing it on a physical computer.
(· --~
"
lrUUlllng W~O<Nts..
.." ..
-
IOo'I -e~ 6tj!(-, V..... OOf!IPlo(d .,II!'"'_,.~""-~ d\llt"f
llo;ft\ . . Uoe WOl-
~·
,/
.....
'
~W........,.~ IN
M\o
.,~
•
-
~--
~-
C)
To install the guest operating system, you interact with the VM through the VM console. Using
the vSphere Client. you can attach a CD, DVD, or !SO image containing the installation image to
the virtual CD/DVD drive.
On the slide, the \'lindows Server 2008 guest operating system is being installed. You can use the
vSphere Client to install a guest operating system. You can also install a guest operating system
from an ISO image or a CD. Installing from an ISO image is typically foster and more convenient
than a CD installation.
For more information about installing guest operating systems, see 11Sphere Virtual 1\1acl1ine
Ad1ninistration at l1tt11s://docs. \'fl1\vare.con1ienf\lMv.1arevSpherel7.0icom. vmware.vsphere.vm admin.doc 1GUID-55238059-912E-4 I I F-AOE9A7 A5369 72A9 I.html.
For more about the supponed guest opernting systems, see Vi\1ware Compatibility Guide at
https:/i\VVl\V. \ '1t1\\ are.co111lresources/con1pat ibiIi ty.
1
Module 3: Virtual Machines 85
3-12
Deploying OVF Templates
You ean deploy any VM or virtual
appliance stored in OVF format.
Virtual appliances are
preconfigured VMs:
They are usually designed for
a single purpose.
• They are also available from
VMware Solution Exchange.
·- ..... ..
it kill!! I
E
-.........___
_...__ __
____......_..__···- -----..
_
..,.,. _
...,
._-.._
- ·---·--···-·___,
,..
·~
··---
···-·- ...-....
-·
·- ---··.·--.....-_
....-..--.
___..-..
·-·-,_- -----·-~...
___
...~­
-.· ..
•
~
__
----
•
........ -----.....
-.............
.. -......
•
~
~·-__ , ...
.·-·
---&,!
- - --
---'=~'-"''--"-"'I
•
-
11111
·-
A virtual appliance is a preconfigured Vl\1 that typically includes a prcinstal lcd guest operating
system and other software. A virtua l appliance is usually designed for a specific purpose, for
example, to provide a secure web browser. a firewall. or a backup and recovery utility.
A virtual appliance can be added or imported to your vCenter Server system inventory or ESXi
inventory. Virtual appliances can be impo1ted from websites such as the Vr-4ware Virtual
Appliance Marketplace at https:l/marketplace. vmwarc.coniivsx/.
Virtual appliances are deployed as OVF templates. OVF is a platform-independent, efficient,
extensible, and open packaging and distribution fonnat for VMs. OVF files are compressed,
resulting in faster downloads. The vSphere Client validates an OVF ti le before importing it and
ensures that it is compatible with the intended destination server. If the appliance is incompatible
with the selected host, you cannot import it.
86
Module 3: Virtual Machines
3-13
About VMware Tools
VMware Tools is a set of features that enhance the performance of a VM's guest operating system.
Benefits and features include:
Device drivers
- SVGA display
- VMXNETNMXNET3
- Balloon driver for memory management
- Sync driver for quiescing 110
Increased graphics performance
Improved mouse performance
Guest OS heartbeat seNice
Time synchronization
Ability to shut down the VM
VMware Tools improves management of the VM by replacing generic operating system drivers
with VMware drivers tuned for virtual hardware. You install VMware Tools into the guest
operating system. When you install VMware Tools, you install these items:
•
The Vl\1ware Tools service: This service synchronizes the time in the guest opera1ing system
witl1 the time in the host operating system.
•
A set of VMware device drivers, with additional Perfmon monitoring options.
•
A se1 of scripts that helps you alllomate guest operating system operaiions: You can configure
1he scripts to run when the Vivi's power state changes.
VMware Tools enhances 1he performance of a VM and makes many of the ease-of-use features in
VMware products possible:
•
Faster graphics performance and \Vindows Aero on operating systems that suppo1t Aero
•
Shared folders between host and guest file systems
Module 3: Virtual Machines 87
•
Copying and pasting text, graphics, and files between the virtual machine and the host or
client desktop
•
Scripting that helps automate guest operating system operations
Although the guest operating system can run without VMware Tools, many VMware features arc
not available until you install V~>fwarc Tools. For example, if VMware Tools is not installed in
your VJ'vl, you canoot use the shutdown or restart options from the toolbar. You can use only the
power options.
88
Module 3: Virtual Machines
3-14
Installing VMware Tools
Ensure that you select the correct version or VMware Tools for your guest operating system.
To find out which VMware Tools ISO images are bundled with vSphere 7, see the vSphere 7 Release
Notes.
The method for installing VMware Toots depends on the guest operating system type.
Guest Operating System
VMware Tooli; Installation Method
l\lp•
Microsoft Windows
install from .,.,.indows . i so for Vista and tater guests.
Linux
To 3llow vSphere to man~ge the jnstalfatlon, lnst;in from l inux . i so
To allow the guest OS to manage the 1nsta11a11on. use o pe r)- Vfn- tools .
available 1n vauous Linux package m.lnagement systems, such .as yum. ilpt, or
rpm
MacOS
tn~tall
Solaris
Install hom solar is . i so for Solans versions 10 and la!er
from d ar.r.•in . i so for Mac OS X versions 10 11 and latef
For more information about using Open Vl\1 tools, sec VMware Tools User Guide at
https:l/docs. \llllV\ra re .comleni\l M\vare-Toolslindex .ht1nl.
Module 3: Virtual Machines 8 9
3-15
Downloading VMware Tools
You can download a s pecific version of VMware Toots from the VM\vare vSphere product download
page.
.._
_-·-- - - -
.._ ..
CL •••
-- ______. ___ -...--.. . --·----··- --·..
----~ ·~--
Get Your vSphere License l<ey
....._...
--
la
-----··---·--..--·-----------·-------....
-- -
I --·
.
90
'° . ,. _.._
Module 3: Virtual Machines
--
3-16
Labs
Lab: Creating a Virtual Machine
Lab: Installing VMware Tools
Module 3: Virtual Machines 91
3-17
Lab 3: Creating a Virtual Machine
Use VMware Host Client to create and delete a virtual machine:
1. Create a Virtual Machine
2. Delete the Virtual Machine
92
Module 3: Virtual Machines
3-18
Lab 4: Installing VMware Tools
Use VMware Host Client to install VMware Tools into an existing Windows VM:
1. Power On and Open a Console to the VM
2. Install VMware Tools
Module 3: Virtual Machines 93
3-19
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Create and provision a virtual machine
Desclibe how to import a virtual appliance OVF template
Explain the importance of VMware Tools
Install VMware Tools
94
Module 3: Virtual Machines
3-20
Lesson 2: Virtual Machine Hardware Deep Dive
Lesson 2: Virtual Machine Hardware Deep
Dive
vmware·
Module 3: Virtual Machines 95
3-21
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the files that make up a VM
Compare VM hardware versions
Recognize the components of a VM
Navigate the vSphere Client and examine VM settings
Identify methods for accessing a VM console
Identify virtual network adapters, including the enhanced VMXNET3
Distinguish between types of virtual disk provisioning
96
Module 3: Virtual Machines
3-22
Virtual Machine Encapsulation
vSphere encapsulates each VM
Into a set of VM files.
VM files are stored in directones
on a VMFS, NFS, vSAN, or
vSphere Virtual Volumes
datastore.
VM1
8B
0
VM2
""
t=j
0
o~~5tore:
VM.F$, NFS,
vs•tt. or
VM3
~
~eVbl~I
Volu~
.
0
vSphcre encapsulates each VM into a few files or objecis, making VMs easier to manage and
migrate. The fi les and objects for each VM are stored in a separate folder on a datastore.
Module 3: Virtual Machines 97
3-23
About Virtual Machine Files
A VM Includes a set of related files.
~
El
r
I
D
~
V M Folder
•
COnti9'1'0ttlon tile
VM_naMt,VMX
Swapflte5
VM- l\ill'l'l9.V'5-WP
BIOS file
vmx •VM_ nMl'llt.V5WP
VM _n.ame.nvr.tm
Log filf>~
'lmwe1•~
T•MPl~t• conf'~•Uon 11i.
VM_NfN ,VlttU(
Disk dOKtlplor tll•
Disk dat.1 file
VM_M!'M.llmdk
VM.,.name• fl.21.vmdlc
VM_rn1me-•.vnus
Suspend mite file
The slide lists some of the files that make up a Vivi. Except for the log files, the name of each file
starts with the Vivi's name <VM_name>. A Vivi consists of the following files:
•
A configuration file (. vmx).
•
Swap files ( . vswp) used to reclaim memory during periods of contention.
•
A file conta ining the Vivi's BIOS settings ( . nv ram).
•
A VM's current log file ( . log) and a set of files used to archive old log entries( -# . l og).
In addition to the current log file, vmware. log, up to six archive log files are maintained at
one time. For example, -1 . log to -6 . log might exist at first.
The next time an arcbive log fi le is created, for example, when the VM is powered off and
powered back on, the following actions occur: The - 6 . log is deleted, the - 5. log is
98
Module 3: Virtual Machines
recalled to - 6 . l og, and so on. Finally, the previous vmware . log is recalled to the l . log.
•
One or more virtua l disk files. T he first virtua l disk has files VM name . vmdk and
VM name - flat . vmdk.
lfthe VM has more tlrnn one disk file, the file pair for the subsequent disk fi les is called
VM_ name_# . vmdk and VM_name_ #-flat . vmdk. # is the next number in the sequence,
starting with I. For example, if the VM called TestOI bas two virtual disks, this Vl\1 has the
TestO l . vmdk, TestOl-flat . vmdk, Te stOl _ l . vmdk, and TestOl_ lflat. . vmdk files.
•
If the Vl\1 is converted to a template, a VM template configuration file (. vmtx) replaces che
Vivi configuration file (. vmx). A VM ccmplate is a masrer copy of the Vl\1 .
The list of files shown on the slide is not comprehensive. For a complete lisc o f all the types of
VM files, see v.Splzere Virt11al Mt1cl1i11e Atl111i11ist1·c1tio11 at https://llc>c~. \·m\\'arc.com/cnN \4 \varc ..
vSphcrci7.0lcom.vmwarc.,sphcrc. vm admin.cloc/GUID·55238059·912h-4 11 F-AOE9A 7 A5J6972A9 I .html.
Module 3: Virtual Machines 99
3-24
About VM Virtual Hardware
A VM uses virtual hard\vare.
UI> to)
Pill'illkll Port'
l IOE- COntrollt:f
• Device$
UP«>JZ
~neoveo.... PurtJ
Upto4~5ATA<:on~.
30 oewe' pw<:on1ro1w
1 us•
m
t use Controller
20 bcvices
"
VI) lO iO K'ICt
Vlrtva1 Machine
UP to• MIMe M$1tcrs
15 °fbl'Q¢ti; f!CI° ~lllCf
....
Up to• SCS.l ~pti!rt
C>4 De'YKn pe!" ,\Col)(ff
6 T8 d RAM
(PVSCSI Only)
Up .. , , , " " " '
D
:r) '
Vit'IWI OiiskS. \10 «>62 T8
Each guesl OS secs ordinary hardware devices. The guest OS docs nol know rhal these devices arc
virtual. All VMs have uniform hardware, except for a few variations that the system administrator
can apply. Unifo1111 hardware makes VMs portable across VMware vittualization platfonns.
You can configure Vtvt memory and CPU SCltings. vSphere supportS many of rhe larest CPU
features, including virtual CPU perfonnance counters. You can add virtual hard disks and NI Cs.
You can also add imd configure virtual hardware, such as CD/DVD drives, and SCSI devices. Not
all devices are available io add and configure. For example, you cannor add video devices, but you
can configure available video devices and video cards.
You can add multiple USB devices, such as security dongles and mass storage devices, to a VM
that resides on an ESXi host to which the devices are physically attached. \\/hen you attach a USB
device to a physical hos!, the device is available only to VMs that reside on that host. Those \/1vls
cannot connect to a device on anorher host in the data center. A USB device is available to only
one VM at a time. \Vhcn you remove a device from a VM, ii becomes available to Olhcr VMs that
reside on the host.
100
Module 3: Virtual Machines
You can add up to 16 PC[ vSpherc DirectPath 110 devices LO a VM. The devices must be reserved
for PCl passthrough on tbe host on which the VM runs. Snapshots are oot supported with vSpbere
Direct Path 1/0 pass-through devices.
The SATA cootroller provides access to virtual disks and CD/DVD devices. The SATA virtual
controller appears to a virtual machine as an AHCI SATA controller.
The Virtual Machine Communication Interface (VMCT) is an infrastructure that provides a highspeed communication channel betweeo a VM and the hypervisor. You cannot add or remove
VMCI devices.
The Vl\fCl SD K facilitates the development of appl.ications that use the VMC l infrastructure.
\l/ithout VMCl, VMs communicate witl1 the host using the network layer. Using the network layer
adds overhead to the communkation. With VMCI, communication overhead is minimal and tasks
that require communication can be optimized . VMCI can go up to nearly 10 Gbit/s with 128 K
sized queue pairs.
The following types of communication are available:
•
Datagrams: Connectionless and similar to UDP queue pairs
•
Connection oriented: Similar to TCP
VMCI provides socket AP ls that are similar to A Pis that are used for TCP/UDP applications. IP
addresses are replaced with VMCJ ID numbers. For example, you can port nctpcrf to use VMCI
sockets instead of TCP/UDP. VMCI is disabled by default.
For more information about virtual hardware, sec vSphere Virtual 1Wachi11e Administration at
https://docs. vmwarc.com/cn, VMwarc-vSphcrci7 .O/com. '111warc. vsphcrc.\'lll ad min.doc/GU IJ).
55238059-91 ZF.-4 I I F-AOE9-A 7i\536972/\91.html.
Module 3: Virtual Machines101
3-25
Virtual Hardware Versions
The virtual hardware version, or VM compatibility level, determines the operating system !unctions
that a VM supports.
Do not use a later version that fs not supported by the VM\vare product.
Compatlb!ltty
V1rrua1 Hardware Version
ESXl70
17
ESX16 7 U2 aod later
15
ESXi 6 7 and later
14
ESX1 6.5 an<l la:er
13
ESXI 6 0 and later
11
Virtual hard\vare ve1s1ons 12 and 16 are specific to Wotksrat!oo and Fus,on Pro.
Each release of a Vrvtwarc product has a corresponding VN! hardware version included. The table
shows the latest hardware version that each ESXi version supports. Each VM compatibility level
supports at least five major or minor vSphere releases.
For a complete list of virtual machine configuration max imums, see VMware Configuration
l\ll~lXilTIUOlS at ht1JJS://confi l!nla'i.. \'lTI\Ali.\re.com.
102
Module 3: Virtual Machines
3-26
About CPU and Memory
You can add. change. or configure CPU and memory resources to improve VM perfonnance.
The maximum number or virtual CPUs (vCPUs) that you can assign to a VM depends on the
following factors:
• The number of logical CPUs on the host
• The type of installed guest operating system
A VM running on an ESXi 7.0 host can have up to 256vCPUs.
The maximum memory size of a VM depends on the VM's compatibility setting.
The maximum memory size of a VM with ESX1 7.0 compatibility running on ESXi 7 .0 is 6 TB.
You size the VM's CPU and memory according to the applications and the guest operating system.
You can use the multicorc vCPU fcarurc tO control the number o f cores per virtual socket in a VM.
\Vith this capability, operating systems with socket restrictions can use more o f the host CPU's
cores, increasing overall performance.
A VM cannot have more virtual CPUs than the number oflogic.al CPUs on the host. The number
of logical CPUs is rhc number of physical processor cores, or hvicc rhat number if hype1thrc.ading
is enabled. For example. ifa host has 128 logical CPUs, you can configure 1J1e VM for 128
vCPUs.
You C<ln set most of the memory pai:ameters during VM cre;Jtion or after the guest operating
system is insta lled. Some actions require that you power off the VM before changing the settings.
The memory resource setti ngs for a VM dcrcnn.ine how much of the hosr's memory is allocated to
tbe VM.
Module 3: Virtual Machines103
The virtual hardware memory size dctem1ines how much memory is available to applications that
run in the VM. A VM cannot benefi t from more memory resources than itS configured virtual
hardware memory size.
ESXi hosts limit the memory resource use to the maximum amount useful for the VM so that you
can accept the default of unli1nit.ed memory resources. You can reconfigure the amount of memory
allocated to a VM to enhance perfonn<mce. Maximum memory size for a VM depends on the
VM's compatibility setting.
104
Module 3: Virtual Machines
3-27
About Virtual Storage
Virtual disks are connected to virtual storage adapters.
The ESXi host offers VMs several choices in storage adapters:
BusLogic Parallel
LSI Logic Parallel
LSI Logic SAS
VMware Paravirtual SCSI
AHCI SATA controller
Virtual NVMe
Storage adapters provide connectivity for your ESXi host to a specific storage unit or network.
ESXi supports different classes of adapters, including SCSI, iSCS I, RAID, Fibre Channel, Fibre
Channel over Ethernet (FCoE), and Ethernet. ESXi accesses the adapters directly through device
drivers in the VMkernel:
•
BusLogic Parallel: The latest Mylex (BusLogic) BT/KT-958 compatible host bus adapter.
•
LSI Logic Parallel: The LSI logic LS153C!Oxx Ultra320 SCSI 1/0 controller is supported.
•
LSI Logic SAS: The LSI Logic SAS adapter has a se.rial interface.
•
VMware Parnvirtual SCSI: A high-pe1fonnance storage adapter that can provide greater
throughput and lower CPU use.
Module 3: Virtual Machines105
•
AHCI SATA controller: Provides access to virtual disks and CD/DVD devices. The SATA
virtual controller appe<1rs to a Vlvl as an AHCI SAT A controller. AHCI SATA is available
only for VMs with ESXi 5.5 and later compatibility.
•
Virtual NVMe: NV/vie is an Intel specification for attaching and accessing t1ash storage
devices to the PCI Express bus. NVl\1e is an alternative to existing block-based server storage
110 access protocols.
106
Module 3: Virtual Machines
3-28
About Thick-Provisioned Virtual Disks
Thick provisioning uses all the defined disk
space at the creation of the virtual disk.
VM disks consume alt the capacfty, as defined
at creation, regardless of the amount of data in
the guest operating system file system.
Thick-provisioned disk types are eager zeroed
or lazy zeroed:
In an eager-zeroed thick-provisioned disk,
every block is prefilted with a zero.
In a lazy.zeroed
thick~ p rovisioned
disk, every
block is filled with a zero when data is wntten
to the block.
El
Host
!
0
•'
111
I
""''
20GB
.,.........
~
In a lazy-zeroed thick-provisioned disk, space required for tl1e virtual disk is allocated during
creation. Data remaining on the physical device is not erased during creation. Later, the data is
zeroed out on demand on first write fi'om the VM. This disk type is the default.
In an eager-zeroed thick-provisioned disk, the space required for the virtual disk is allocated
during creation. Data remaining on the physical device is zeroed out when the disk is created.
Module 3: Virtual Machines107
3-29
About Thin-Provisioned Virtual Disks
El El
With thin provisioning, VMs use storage space
as needed:
Virtual disks consume only the capacity
needed to hold the current files.
Host
• The VM always sees lhe full allocated disk
size
Run the umnap command to reclaim unused
space from the array.
Reporting and alerts help manage allocations
and capacity,
You can mix thick and thin formats.
More efficient use of storage, for example:
Provisioned space for virtual disks: 140 GB
Available datastore capacity: 100 GB
Used datastore capacity: 80 GB
.: I.___....._.....I
111
""''
0 48
""""'
0 1$11:$.
0 : 111
.....
-- --- ..
•'
Thin
80GB
--- -- .
·-- ----- ~ ~------
•
•
A thin-provisioned disk uses only as much darasrore space as the disk initially needs. If the thin
(iisk i1eeds inore space later, it ca11 expar~(i to tJ1e n1axin1ltm capacity alloc-ated to it.
Thin provisioning is o ften used with storage array dcduplication to improve storage use and to
back up VMs.
Thin provisioning provides alarms and reports that track allocation versus current use of storage
capacity. Storage administrators can use thin provisioning to optimize the a llocation of storage for
virtual en,•ironments. \'lith thin provision ing, users can optimally but safely use available storage
space through overallocation.
108
Module 3: Virtual Machines
3-30
Thick-Provisioned and Thin-Provisioned Disks
Virtual disk options differ in terms of creation time, block allocation, layout, and zeroing out of
allocated file blocks.
Stow and propottJon.aJ to disk
s12e
fully preallocated
Fully preallocated
Allocated and zeroed oul
on demand at (1Tst wnte to
bloek.
Hlg.her c;hance of
H1ghet ctlanceof con11guous
contiguous file blocks
file block.s
Layout vanes acc<xdlng to
the dynamic state of 1he
volume at time or bloclk
allocation
file bloieks are zeroed out
when each block is f.rst
File blocks are allocated and
zeroed out when disk. IS
Ft!e bJocks are zeroed out
when blocks are allocated
created
Module 3: Virtual Machines109
3-31
About Virtual Networks
VMs and physical machines communicate through a virtual network.
When you configure networking for a VM, you select or change the following settings:
Network adapter type
Port group to connect to
Network connection state
Whelherto connect to lhe network when the VM powers on
For more information about virtual networks, sec vSphere Networking at
https:l/docs. \llll\\ra re .comleni \l M\vare-\o·Snhere/7.()/co111.\tJll\\' a re. \rspl1ere.net\\r(1rkinu:.<foc/(i UI035 B40BOB-OC I3-13B2-BC85-J8C9C9 I BE204.hh11I.
110
Module 3: Virtual Machines
3-32
About Virtual Network Adapters
When you configure a VM, you can add network adapters (NICs) and specify the adapter type.
Whenever possible, select VMXNET3.
Nctworl< Adaptor Typo
Dcscnpbon
E1000.E1 OOOE
Emulate<I version of an Intel G19ab1t Ethernet NIC, with drivers availab.e 1n mos•
newer guest operatrng systems
VMXNET3
Flex.Ible
SR-IOV pass-through
Available only with VMware Tools
can runcflon as either a Vianee or VMXNET adapter
AflO\VS VM a.nd physical adapter to exchange data without using the VMkernel as
an Intermediary
Allows VM access to physfeal PCI netv1ortc functions on platforrns with an 1/0
memory management unit
vSphere DirectPalh VO
PVRDMA
ParaVirtualt?ed device that provides Improved virtual devtce perlormanc& It
prOYi.dos an ROMA-like interface fo< vSphere guests.
The types of network adapters that are available depend on the following factors:
•
VM compatibility level (or hardwMe version), which depends on the host that created or most
recently updated it. f'or example, the VMXNET3 virtual NfC requires hardware version 7
(ESX/ ESXi 4.0 or later).
•
\l/hether the VM compatibility is updated to the latest version for the current host.
•
Guest operating system
Module 3: Virtual Machines111
The following NIC types are supported:
•
E IOOOE: Emulated version of the lotel 82574 Gigabit Ethernet NIC. E lOOOE is the default
adapter for \Vindows 8 and \Vindows Server 20 12.
•
E l 000: Emulated version of the lntel 82545EM Gigabit Ethernet NlC, with drivers available
in most newer guest operating systems, including \Vindows XP and later and Linux versions
2.4. 19 and later.
•
Flexible: ldentifie.s itself as a Ylance adapter when a YM s tarts, but initializes itself and
functions as e ither a Ylancc or a VMXNET adapter. depending on which driver initializes it.
\Vi th \ rM ware Tools insialled, the YMXNET driver changc.s the Vianee adapter to the higher
performance YMXNET adapter.
•
Ylance: Emulated version of the AMD 79C970 PCnet32 LANCE NIC, an older 10 Mbps NIC
with drivers available in 32-bit legacy guest operating systems. A VM configured with this
network adapter can use its network immediately.
•
YMXNET2 (Enhanced): Based on the VMXNET adapter but provides bigh-perfon11ance
features commonly used on modern networks, such as jumbo frames and hardware offloads.
VMXNET2 (Enhanced) is available only for some guest operating systems on ESX/ESXi 3.5
and later. It is not supported for ESXi 6.7 aod later.
•
YMXNET3: A paravirtualized NIC designed for perfonnance. YMXNET3 offers all the
features available in YMXNET2 and adds several new features, such as multiqucue support
(also known as Rece ive Side Scaling in \V indows), fPv6 oflloads, and MSl/MSJ-X interrupt
delivery.
•
SR-IOY pass-through: Represen~1tion ofa virtual function on a physical NIC with SR-JOY
support. T his adapter type is suitable for VMs that require more CPU resources or where
latency might cause failure. If VMs arc sensitive to network delay, SR-IOV can provide direct
access to the virtual functions of supported physical NlCs, bypass ing the virtual switches and
reducing overhead.
SR-IOY pass-through is available in ESX i 6.0 and later for Red Hat Enterprise Linux 6 and
later, and Windows Server 2008 R2 with SP2. An operating system release might contain a
default virtual function driver for certain NICs. For others, you must download and install it
from a location provided by the NIC or host vendor.
112
Module 3: Virtual Machines
•
vSphere DirectPath 1/0 allows a guest operating system on a VM to directly access physical
PCI and PCie devices coonected to a host. Pass-through devices help your environment use
resources efficiently and improve performance. You can configure a pass-through PCI device
on a VM by using the vSphere Client. VMs configured with vSphere Directl'ath 1/0 do oot
have the following features:
Hot adding and removing of virtual devices
Suspend and resume
Record and replay
Fault tolerance
High availabi lity
vSphere DRS: Limited availability
The Vivi can be part of a cluster but cannot migrate across hosts.
Snapshots.
•
\Vith PVRDMA, multiple guests can access the RDl\1A device by using verbs API , an
industry-standard interface. A set of these verbs was implemented to expose an RDMAcapable guest device (PVRDMA) to applications. The applications can use the PVRDlvIA
guest driver to communicate with the underlying physical device. PVRDMA supports
ROMA, providing the following fiuict ions:
OS bypass
Zero-copy
Low latency and high bandwidth
Less power use and faster data access
Module 3: Virtual Machines1 13
3-33
Other Virtual Devices
A VM must have a vCPU and virtual memoiy.
The addition of other viltual devices makes the
VM more useful:
CO/DVD driVe: For connecting to a CD, DVD,
or ISO image.
USS 3.0 and 3.1: Supported with hostconnected and client.connected devices.
Floppy drive: For connecting a VM to a noppy
drive or a floppy image.
Generic SCSI devices: A VM can be
connected to additional SCSI adapters.
vGPUs: A VM can use GPUs on the physical
host for high--computation activities.
0
0
-
10001
Virtual CPU (vCPU) and virtual memory arc rhc minimum required virtual hardware. Having a
virtual hard disk, \•irtual NICs. and other virtual devices make the Vl\1 more useful.
For informat ion about adding virtual devices to a \fM, sec vSphere Virtual A1achi11e
Ad111inistrntior1 at hltps://docs. vm\varc.co111/cn/Vf\1'"'arc·
vSphere/7.0lcom.\•mware.vsphere.vm adm in.doclGUJD-55238059-912E-4 I I F-1\ 0f.9A 7 A536972A91.html.
114
Module 3: Virtual Machines
3-34
About the Virtual Machine Console
The VM console provides the mouse, keyboard, and screen features to control the VM.
You can use the standalone VMware Remote Console Apphcation (VMRC) to connect to client
devices.
u
Q
~
P.
wtN10-02
...._
~-....11
!J :>!l0•- 0
!> - w
,,._
.. __
ifj~ "w
El!: w....IOC!la
~-
;
-- ----- -- ·-- ..
--·
........ -_
...
___
··u--
• # • &
r:::I
......,~
'-'·
"J
-1~
# -:....• · -
:
......:a..u
11>1<10~
I
"""""'·'~'-
.. ....
:..,"'j
· - 'l'l~:l
•
0
-··
;;·Q -.,
._
r.-
Ill
Ill
c:o
_,
~ --
'
••
You can open the VM console from the vSphcrc Client.
You use the VM console to access the BIOS of the \l}.1, install an operating system on a Vl'vl,
power the VM on and off. and reset the VM.
The VM console is normally not used ro connect to the Vl\1 for daily tasks. Remote Desktop
Connection, Virtual Network Connection, or other options are normal! y used to connect to the
virtual desktop. The VM console is used for tasks such as power cycling, configuring hardware,
and troubleshooting net.work issues.
Module 3: Virtual Machines115
3-35
Lab 5: Adding Virtual Hardware
Use VMware Host Client to examine a virtual machine's configuration and add virtual hardware to the
virtual machine:
1. Examine a Virtual Machine's Configuration
2. Add Virtual Hard Disks to the Virtual Machine
3. Compare Thin-Provisioned and Thick-Provisioned Disks
116
Module 3: Virtual Machines
3-36
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the files that make up a VM
Compare VM hardware versions
Recognize the components of a VM
Navigate the vSphere Client and examine VM settings
Identify methods for accessing a VM console
Identify virtual network adapters, including the enhanced VMXNET3
Distinguish between types of virtual disk provisioning
Module 3: Virtual Machines1 17
3-37
Lesson 3: Introduction to Containers
Lesson 3: Introduction to Containers
vmware·
118
Module 3: Virtual Machines
3-38
Learner Objectives
Alter completing this lesson, you should be able to meet the following objectives:
Describe the benefits and use cases for containers
Identify the parts of a container system
Differentiate between containers and virtual machines
Module 3: Virtual Machines119
3-39
Traditional Application Development
In data centers, traditional applications are enhanced with modern application capabilities and
models. But uaditional application development is dilferent lrom modem application development
Trat11t1onal Appt1cat1on Development
Waterfall d"""IOjlment
DeveJopme.nl cycles ace relatively long {several mooths)
Requirements can change~ time
HandOWJt to 1he operattons team
The operations team 1s tespons1ble for the code tn p1oduct1on
Ttain1ng 1s not prCMded
Monoltthrc applic1;1hons
All funchon41lrty 1s handled by a single large application
Typ1caUy, monohlhtCilP-Pl•c:ahonscan only be scaledvertica.ly, not
hortZontally
Separate development, staging
and production (!nvironment$
lncon5-lstenc:1esbetween environments occur
Issues 1n pcoduchon do not occur dunng staging
\Vaterfall development: Wate.rfall development cycles take from 6 to 12 months to deliver a
product. Because this cycle is relatively Jong in the context of software development, requirements
are at risk of changing. In addition, initial requirements might be misunderstood, but this
misunderstanding might be realized only at the end of the project.
Handover to the operations team: \Vhen a product is ready for production, it is handed over to the
operations team. The operations team deplO)'S and manages the software from that point. Without
proper training and documentation, the team can find it difficult to skill up and effectively manage
the so ftware.
Monolithic applications: Traditional applications are developed to run as a single large monolithic
process. Large does not refer to the lines of code buc to the large number of functionalities and
responsibilities. Typically, traditional applications arc deployed to a single VM using manual
processes. And they arc not typically designed to be scalable. The only option is to increase CPU,
disk, and memory to achieve higher performance.
Separate environments: Developers start developing on their workstations. Eventually, code
moves to testing, s~1ging, and production environments. Each environment is manually
120
Module 3: Virtual Machines
configured, resulting in a relatively large amount of effort in a ll identical environme nts . Each
environment creates diffe rent software libraries, packages, and configurations. Th is variation
causes issues fo r developers who must determine why the application works in one enviromnent
but not in the others.
Module 3: Virtual Machines121
3-40
Modern Application Development
Modem application development Is transforming modern business.
Modorn Appl1c-at1on Development
Typically use m1croseMces styJe
ar<:hl1ectures
MOtlohthlc appl1cat.ton5are broken into many s.mal!er standalone modular
fu~tlons Of services ft\at make it easier for developel'$ to be innovat111e
when producing and changing code
Minimize time to market
Streanthnethe process of deplO)'Jng new code into a staging environment
for test1ng
•dentify and address bugs almost 1mmedtately.
Quickly deploy sma11, incremental changes 1n tne producbon environment
and ea"S1lywithdraw rf problems &ns.e
Deliver upda~s and features
quickly.
Increase product quahty and avoid
nsl<
F-ewet resouree requ remantsand
more producttYlty
Mlnrmlze the time 1t takes to bulld, test. and release new features
122
Automate lests, ge-t user feedback, and improve software 1te-tat1vely.
Apply cont1nooos deve1opmen1 and continuous integration 1n small
.terallons to reduce labof'
Module 3: Virtual Machines
3-41
Benefits of Microservices and Containerization
Containers are an ideal technology for supporting mlcroseivices because lhe goals of containers
(light\veight, easily packaged, can run anywhere) align v1ell with the goals of a microseivices
architecture.
Monolithic Architecture
Microservices Architocturo
i.m
t.ni
Applications tl1at run on cloud-based environments arc des igned with fail ure in mind. They arc
built to be resilient, to tolerate network or database outages, and to degrade gracefully.
Typically, cloud-native applic.ations use microscrvice-based architectures. The tem1 micro docs
not co.,-elate to lines of code. Jt refers to functionality and responsibility.
Each microservice s hould be responsible fo r speci lie parts of the system.
In the example, the application is broken into multiple services, including a UI and user, order, and
product services. Each service has its own database. \Vith this architccnirc, each service can be
scaled independently. For example, during busy times, the order service might need to be scaled to
handle high throughput.
The Twelve-Factor App principles describe characteristics of microservice and cloud-native
applications.
Module 3: Virtual Machines123
3-42
Container Terminology
Several terms and concepts apply to containers.
Term
Dofintnon
COfltalner
An appt1c..Wn ~ckaged wnh dependencies
Container engine
A 1unhme engine lh.at manages the cootasners
Docker
The most recognized runtrme-engine for conta ner support. alld it is often used
as a synonym for many aspects of conta111er tec:hnolog es
Cootainer host
A virtuaJ machine or physical 1nac-h1ne on wtucll the conta ners and container
engine run
Kuberne1es
Google-deva&oped orchestration f01 containers
124
Module 3: Virtual Machines
3-43
About Containers
A container is an encapsulation or an application and dependent binaries and libraries. The
application is decoupled from the operating syscem and becomes a seiverless function.
Among the reasons that containers were
popularized by software developers are:
They make coding easier, locally and
anywhere.
You can deploy and lest appllcabons quickly
• ••
•
••
in a staging environment. No operating
system or load is required.
Module 3: Virtual Machines125
3-44
Rise of Containers
Application developers are quickly adopting container technok>gy as their tool of choice.
1.5 B
1B
500 M
2015
-· -·-·- - -- ....
2016
2017
2018
2019
2020
2021
....
Conwincrs arc a new format of virtualizcd workload. They require CPU, memory, network,
sect11ity, and storage.
Containers satisfy developers' need for speed by removing dependencies on underlying operating
sys1ems:
•
Change the paradigm on security by using a discard and reslart approach 10 patching and
upgrades.
•
Use structured tooling to fully automale update.s of application logic running inside.
•
Provide an easy user experience for developers thal is infrastructure-agnostic (meaning that it
can run on a.ny cloud).
The opportunities containers present are many, given the infrastructure and operational complexity
that they offer.
126
Module 3: Virtual Machines
3-45
About Container Hosts
The container host runs the operating system on which the containers run.
Container hosts can be of the following types:
Standard OS with a container engine
installed:
- Ubuntu with Docker
OS developed specifically with containers in
mind:
- Photon OS
- Fedora CoreOS
Virtual machine or physical machine:
- Among the many benefits of using VMs are
VM I Guest OS (Container Host)
Hyperv1sor
easy management and scalability.
Infrastructure
Administrators provide container hosts. which arc the base structure that developers use LO run
their conta iners. A robust microservices system includes more deliverables, many of which are
built using containers.
For developers to focus on providing services to customers, operations must provide a reliable
container host infrastructure.
In vSphcrc with Kubcrnetcs, the container hosts arc Photon-based VMs.
Module 3: Virtual Machines127
3-46
Containers at Runtime
Containers have the following characteristics:
A container can run on any container host with the same operating system kemel that is specified
by that container.
A running container is accessed using its FODN or its unique IP address.
Each container can access only its own resources in the shared environment.
When you log into a container using a remote terminal (such as SSH), you see no indication tha t
other containers are running on the same container host.
128
Module 3: Virtual Machines
3-47
About Container Engines
A container engine is a control plane that is installed on each container host. The control plane
manages the containers on that host.
Container engines perform several functions:
Build container images from source code (for
example. Dockerfile). Alternatively, load
container images from a repository.
Create running containers based on a
container image.
Commit a running container to an image.
Save an image and push it to a repository.
VM I Guest OS (Container Host)
S top and remove containers.
Suspend and restart containers.
Hyperv1sor
Report container status.
Infrastructure
Docker is the most commonly used container engine.
The container engine runs as a daemon process on the container host OS. \\/hen a user requests
that a container is run, the container engine gets the container image from an image regi stry (or
locally, if already downloaded) and runs tbc container as a process.
Module 3: Virtual Machines129
3-48
Virtual Machines and Containers ( 1)
VMs provide virtual hardware that the guest OS uses to run applications. Multiple applications run on
a single VM but they are logically separated and isolated.
With containers, developers take a streamlined base OS file system and layer on only the required
binaries and libraries that the application depends on.
App 1 and App2
Oepl'1"!denc1es
VM/GuestOS
VM I Guest OS (Container Host)
Hypervbot
H~!sor
Infrastructure
Infrastructure
\Vith virtualiiation, multiple physical machines c.an be consolidated into a single physical machine
that nms multiple VMs. Each VM provides virtual hardware that the guest OS uses to run
applications. tvlultiple applications nm on a single VM but these applications are still logically
separated and isolated.
A concen1 about VMs is that they are hundreds of megabytes to gigab)1es in size and contain
n1a11y binaries a11d libro:tries tl1at are not rele-va11t to the 111ain application runni11g 011 t·hem.
\Vith containers, developers take a streamlined base OS fi le system and layer on only the required
binaries and libraries that the application depends on. When a container is nm as a process on the
container host OS, the container can see its dependencies and base OS packages. The container is
isolated from all other processes on the container host OS. The container processes are the only
processes that run on a minimal system.
From the container host OS perspective, the container is another process that is nmning, but it has
a restricted view of the file system and potentially restricted CPU and memory.
130
Module 3: Virtual Machines
3-49
Virtual Machines and Containers (2)
VMs and containers work in dilferent ways.
Virtual J.1ach1ncs
Containers
Encapsulation of an entire operating system
EncapsuJatlon of an appllcauon and dependent
t)inarie:s or llbranes
Scheduled by the container hoss OS
Scheduled by the hypeMsor
Rt1n on the tiypervlsor
Starting a vt\1 means startlng an operating system
(seconds to minutes)
Run on the container llost OS
Starting a container mea1lS starting the application
process (mtlliseconds to seconds)
Conwincrs arc the ideal technology for microscrvices because the goals of containers (lightweight,
easily packaged, can nm anywhere) align with the goals and benefits of the microservices
arcbjtecture.
Oper;uors get modularized application componenlS that are small and can fit into existing
resources.
Developers can focus on the logic of modularized application components, knowing that the
infrastructure is reliable and suppo1ts the sca lability of modules.
Module 3: Virtual Machines131
3-50
About Kubernetes
Containers are managed on a single container host. Managing multiple containers across multiple
container hosts creates many problems:
Managing large numbers of containers
Restarting failed containers
Scaling containers to meet capacity
Netwol1<ing and load balancing
Kubernetes provides an orchestration layer to solve these problems.
Kubernetes is an open-source system for automating deployment, scaling, and management of
containerized applications.
Kubernetcs automates many key operational responsibilities, providing the developer with a
reliable environment.
Kuberneres performs the following functions:
•
Groups containers that make up an application into logical units for easy management and
discovery
•
Automatically places containers based on their resource requirements
•
Restarts failed containers, replaces and reschedules containers when hosts foil, and stops
containers that do not respond to your user-defined health check
•
Progressively rolls out changes to your application, ensuring that it does not stop all your
instances at the same time and enabling zero downtime
•
Allocates IP addre.sses, mounts the storage system of your choice, load balances, and
generally looks aft.er the containers
132
Module 3: Virtual Machines
Kubcrnetcs manages containers across multiple container hosts, similar to how vCcntcr Server
manages all ESXi hosts in a cluster. Ruooing Docker without Kubernetes is like running ESXi
hosts without vCenter Server to manage them.
Module 3: Virtual Machines1 33
3-51
Challenges of Running Kubernetes in Production
The top challenges of running Kubernetes are reliability, security, networ1<ing , scaling, logging, and
complexity.
..,.
...."'"'
'°"
,.,.
'°" ""
""'
••
""
Kubcrnctcs orchestrates containers that support the application. However, running Kubcrnctcs in
production is not easy, especi<tlly for operations te.ims. The top challenges of running Kubernetes
are related to reliability, security, networking, scaling, logging, and complexity. How do you
monitor Kubemetes and the underlying infrastructure? How do you build a reliable platform to
deploy your applications? How do you handle the complexity that this layer of abstraction
introduces?
For years, VMware has helped to solve these types of problems for IT. VMware can offer its
expertise and solutions in this area.
134
Module 3: Virtual Machines
3-52
Architecting with Common Application Requirements
•
Aopl _.:\ti
0-RVPI )Pl'r
Architects With
native Kubornet0$
contructs
~
~
Platform
Operators
Focus on Mapping
Pt111a ~len1
SG<:urity Pobcy
.
.
Votvrries
Resources/
Avn !abilltv Zo~
Kubemetes
oontructs to the
SOOCand
publlc clouds
vSo'1ere
NSX
l nfr~M1vc:tvre
Application developers prefer using Kubcrnctcs rather than programming to the infrastructure. For
ex.ample, an application developer must build an ELK stack. The developer prefers to deal with
the Kubemetes APL The developer wants to use the resources, load balancer. and all the
primitives that Kubernetes constructs, rather than worry about the underlying infrastructure.
But the infrnstructure is still there. lt must be mapped for Kubernetes to use it. Usually, that
mapping is done by a platform operntor so the developer can use the Kubernetes constructs.
The slide shows how the mapping is done with the VMware software-defined data center (SDDC).
The resources and availability zones map to vSphere clusters, security policy and load -balancing
map to NSX, persistent volumes map to vSphere datastores and metrics map to \Vavefront. Each
of these items provides value.
Module 3: Virtual Machines1 35
3-53
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe the benefits and use cases for containers
Identify the parts of a container system
Differentiate between containers and virtual machines
136
Module 3: Virtual Machines
3-54
Virtual Beans: Virtualizing Workloads
As a Virtual Beans administrator, you want to start creating VMs with different configurations and
testing your applications.
Your key takeaways are:
The VMware Compatibility Guide can help you determine what versions of Windows and Linux
guest operating systems are supported m ESXi 7.0.
Virtual machines support a wide selection of virtual hardware devices, ror example, vGPUs and
NVME adapters.
vSphere provides the underlying infrastructure on which containers and Kubernetes run.
Module 3: Virtual Machines1 37
3-55
Key Points
A VM is a set or files that are encapsulated into a !older and placed on a datastore.
VMs can be provistoned using the vSphere Chen\ and VMware Host Client.
VMware Tools increases the overall pertormance of the VM's guest operating system.
The virtual hardware version, or VM compatibility level, determines the operating system functions
that a VM supports.
Containers are the k:leal technology for microservices because the goals of containers align with
the goals and benefits of the microservices architecture.
Questions?
138
Module 3: Virtual Machines
Module 4
vCenter Server
Module 4 : vCenter Server
Module 4: vCenter Server 139
4-2
Importance
VCenter Server helps you centrally manage multiple ESXi hosts and their virtual machines. If you do
not properly deploy, configure. and managevCenter Seiver Appliance. your environment might
experience reduced administrative efficiency or ESXi host and virtual machine dov1ntime.
140
Module 4: vCenter Server
4-3
Module Lessons
1. Centralized Management with vCenter Server
2. Deploying vCenter Server Appliance
3. vSphere Licensing
4. Managing the vCenter Server Inventory
s. vcenter Server Roles and Permissions
6. Backing Up and Restoring vCenter Server Appliance
7. Monitoring vCenter Server Appliance
6. vCenter Server High Availability
Module 4: vCenter Server 141
4-4
Virtual Beans: vCenter Server Requirements
Virtual Beans has the following requirements for vCenter Server (the management platform):
Use Active Directory for user and group authentication.
Restrict user access to vCenter Server:
-System administrators: Administrative rights to the entire vSphere environment
-Operators: Provision VMs and monitor, and troubleshoot vSphere problems
When the new data center comes online, manage both data centers from a centralized
management console.
As a Virtual Beans administrator, you are responsible tor installing and configuring vCenter Server,
and setting up user access.
142
Module 4: vCenter Server
4-5
Lesson 1: Centralized Management with vCenter
Server
Lesson 1: Centralized Management with
vCenter Server
vmware-
Module 4: vCenter Server 143
4-6
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the vCenter Seiver archite<:ture
Recognize how ESXi hosts communicate with vCenter Seiver
Identify vCenter Seiver services
144
Module 4: vCenter Server
4-7
About the vCenter Server Management Platform
vCenter Server acts as a central
administration pmnt for ESXi
hosts and virtual machines that
vCente1 Server
are connected in a network:
D irects the actions of VMs and
hosts
• Runs on a Linux-based
appliance
'll'Sphore
.l1_11__0___
11_1l.l1_11__0___
11_1l.l1_11__0___
11_11
\Vith vCentcr Server, you can pool and manage the resources of multiple hosts.
You can deploy vCcntcr Server Appliance on an ESXi host in your infrastructure. vCcnter Server
Appliance is a preconfigured Linux -based virtual machine that is optimized for running vCentcr
Server and the vCenter Server components.
vCenter Server Appliance provides advanced features, such as vSphcre DRS, vSphere HA,
vSphcrc Pa ult Tolerance, vSpherc vMotion, and vSphcrc Storage vMotion.
Module 4: vCenter Server 145
4-8
About vCenter Server Appliance
vCenter Server Appliance is a prepackaged Linux-based VM that is optimized for running vCenter
Server and associated services.
The \/Center Server Appliance package contains the following software:
Photon
• PostgreSQL database
• vCenter Server services
During deployment, you can select the vCenter Server Appliance size for your vSphere environment
and the storage size for your database requirements.
vCcntcr Server is a service that runs in vCcnter Server Appliance. vCcntcr Server acts as a central
administrator for ESXi hosts that are connected in a network.
146
Module 4: vCenter Server
4-9
vCenter Server Services
vCenter Setver seivices include:
vcenter Server
• vSphere Client
vCenter Single Sign-On
License service
vCenter Lookup Service
VMware Certificate Authority
Content Library
vSphere ESXi Dump Collector
When you deploy vCenter Server Appliance, all
these services are included.
---·--·--
--.-·-----__
--------------- ---------_.,.
--------
-~
.. •
----
---- ----- ---·
--- --·-·
--- --·---- --- ---~-
~-
Although installation of vCcntcr Server services is not optional. administrators can choose
whether lo use their functionalities.
Module 4: vCenter Server 147
4-10
vCenter Server Architecture
vCenter Server is supported by the vSphere Client, the vCenter Server database, and managed
hosts.
~---- -.e-er ~, ~nee
...-=='!-=.....,
~onos --11
-•--:] 8 -·I--- ~:;;s!;~'::.ilib••
1111
v .........
1111
0
111 1
I H~fS'Xl-1
0
1111
llSXIH--lnl
...Cl'<'lle•~
AOpllliroc. llllUllOK
~ ~(1(1 Vitt.... ~....
.
1 ~·
The vCenter Server architecture relies on the following components :
•
vSphere Clieot: You use this c lient to connect 10 vCeotcr Server so that you C>ln manage your
ESXi hosts centrally. \Vhen an ESXi host is managed by vCentcr Server, you should always
use vCentcr Server and the vSphcrc Client to manage that host.
•
vCent.er Server database: The vCenter Server database is the most important component. The
database stores inventory items, security roles, resource pools, performance data, and other
critical information fo r vCenLer Server.
•
lvlanaged hosts: You can use vCenter Server to manage ESXi hosts and the Vlvls that nm on
them.
148
Module 4: vCe nter Server
4-11
About vCenter Single Sign-On
vCenter Single Sign-On provides authentication
across multiple vSphere components through a
secure token mechanism:
1. User logs in to the vSphere Client.
2. vcenter Single Sign-On authenticates
credentials against a directory service (for
example. Active Directory).
3. A SAML token is sent back to the use(s
browser.
4. The SAML token is sent to vCenter Server.
and the user is granted access,
•
•
Module 4: vCenter Server 149
4-12
About Enhanced Linked Mode
Wilh Enhanced Linked Mode, you can log in 10 a single inslance of \/Cenler Seiver and manage lhe
inventones of all the vCenter Server systems in the group:
• Up to 15 VCenter Server instances can be linked in one VCenter Single Sign-On domain.
• An Enhanced Linked Mode group can be created only during the deployment of \/Center Server
Appliance.
""' ............... '""''
0 Q t1 2
.~C:
-=c:,.c_
:==-· ~
..
:i\~
Q
~W-01 o<JIU IK.i
Q; ,. oi.i...-..
.
-
"' ••
-
.
....
..-.
00
""""'
l.t•,
.........
- l >;,>,IC l.)o UooRoll_ _ _ - - -
- . •• a....
-
--......... •"' "
e.N
r - r111111>1
...s~
,,..
•
'""
~1111.11.
c...... llC:...
You canno1 create an Enhanced Linked Mode group after you deploy vCen1cr Server Appliance.
Enhanced Linked lv!ode provides the following features:
•
You can log in 10 all linked vCenter Server instances simultaneously wilh a single user name
and password.
•
You ean view and search 1hc inventories of al l linked vCcntcr Seiver instances in the vSphcrc
Client.
•
Roles. permission, licenses, tags, and policies arc replicated across li.nkcd vCentcr Server
instances.
To join vCenter Server instances in Enhanced Linked Mode, connect the vCenter Server instances
to the same vCenter Single Sign-On domain.
Enhanced Linked lvlode requires the vCenter Seiver Standard licensing level. This mode is not
supported with vCenter Seiver Foundation or vCenter Server for Essentials.
150
Module 4: vCenter Server
4-13
ESXi and vCenter Server Communication
The vSphere Client communicates directly with vCenter Server. To communicate directly with an
ESXi host, you use VMware Host Client
"
•
-
•••
.
- •
.
•=~
W••
ES)(! Ho\l
vCcntcr Server provides direct access to the ESXi host through a vCentcr Server agent called
virtual provisioning X agent (vpxa). The vpxa process is automatically installed on the host and
started when the host is added to the vCenter Server inventory. The vCenter Server service (vpxd)
communicates with the ESXi host daemon (hostd) through the vCenter Server agent (vpxa).
Clients that communicate directly with the host, and bypass vCenter Server, converse with hostd.
The hostd process runs directly on the ESXi host and manages most of the operations on the ESXi
host. The hostd process is aware of all VMs that are registered on the ESXi host, the storage
volwnes visible to the ESXi host, and the status of all VJ'vls.
Most commands or operations come from vCenter Server through vpxa. Examples include
creating, migrating, and powering on virtual machines. Acting as an intermediary between the
vpxd process, which runs Oil vCenter Server, and the hostd process, vpxa relays the tasks to
perfonn Oil 1he host.
\Vhen you are logged in to the vCenter Server syslem through the vSphere Client, vCenter Server
passes commands 10 the ESX i host through !he vpxa.
Module 4: vCenter Server 151
The vCcnter Server database is also updated. 1f you use \/~1 ware Host Client to communicate
directly with an ESX.i host, comniunications go directly to the hostd process and the vCenter
Server database is not updated.
152
Module 4: vCenter Server
4-14
vCenter Server Appliance Scalability
Metric
v Center Server Appliance 7.0
Hosts per vCen1er Server nst.ance
Powered-on VMs per vCenter Server Instance
Registered \A4s per '/Center Server instance
2,500
Hosts per cluster
64
VMs per cluster
8000
40,000
45,000
Module 4: vCenter Server 153
4-15
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the vCenter Seiver archite<:ture
Recognize how ESXi hosts communicate with vCenter Seiver
Identify vCenter Seiver services
154
Module 4: vCenter Server
4-16
Lesson 2: Deploying vCenter Server Appliance
Lesson 2: Deploying vCenter Server
Appliance
vmware·
Module 4: vCenter Server 155
4-17
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Deploy vCenter Server Appliance into an infrastructure
• Configure vCenter Server settings
156
Module 4: vCenter Server
4-18
Preparing for vCenter Server Appliance Deployment
Before deploying \'Center Server Appliance. you must complete several tasks:
Verify that all vCenter Server Appliance system requirements are met.
Get the fully qualified domain name (FQON) or the static IP of the host machine on which you
mstall vCenter Server Appliance.
Ensure that clocks on all VMs in the vSphere networ1< are synchronized.
For more information, sec VMware £SXi lnstallatio11 a11d Setup at
https:l/docs. \ llll\\ra re.comleni \l M\vare-\o·Snhere/ 7.()/co111.\tJll\\'a re .esx i. instalI .doc/C.T U ID-
B2FO I BF5-078A-~C7E-B505-5DFFEDOB8C38 htm l.
Module 4: vCenter Server 157
4-19
vCenter Server Appliance Native GUI Installer
-
The GUI installer has several
features:
With the GUI installer, you can
perform an interactive
deployment of vCenter Server
Appliance.
• The GUI installer is a native
application tor Windows,
Linux, and macOS.
The installer has no
dependency on bro\vsers or
plug-ins.
It performs validations and
prechecks durtng the
deployment.
. t • • tM>o... ~w....... . -
~
•t-•
• o-i..a
...............
• Ooit1•
.·-_,,,.
_ ,.... .
• ~] (-.1....... '"'..
ti• -
1,...
IQ.,t/"11ltUf
IU ......
t .. ,.......
uncITT ,,,,,.
l(t'llnQIJ
II)!~
0
p
W•
r;,, ,,...,
/' l'l>ltPt
·-..
• Ootlil..,
..ao- ...-
·~ "'!>(
... ~
~
L
tn.io.~tQ
.. 011)0....~""""'
._. orv~•11~
"'- '
The GUI ins1allcr performs valida1ions and prcchccks duri ng 1hc deployment phase to ensure that
no mistakes are made and th<tt a compatible environment is created.
158
Module 4: vCenter Server
4-20
vCenter Server Appliance Installation
The vCenter Seiver Appllance
Installation is a t\vo-slage
process:
• Stage 1: Deployment of OVF
• Stage 2: Configuration
The deployment can be fully
automated by using JSON
templates with the CL I installer
on Windows, Linux, or macOS.
The Install option installs a new vCcntcr Server Appliance.
The Upgrade opt ion upgrades an existing vCenter Server Appliance instance, or upgrades and
converges an existing vCcntcr Server Appliance instance with external Platform Services
Controller.
The !\1igrate option migrates from an existing \\lindows vCenter Server instance, or migrates and
converges an existing Windows vCcntcr Server instance with external Platform Services
Controller.
The Restore option restores from a previous vCenrcr Server Appliance backup.
Module 4: vCenter Server 159
4-21
vCenter Server Appliance Installation: Stage 1
Stage 1 begins with the UI phase:
Accept the EULA.
• Connect to the target ESXi host or vCenter
Server system.
Define the \'Center Server Appliance name
and root password.
Select compute size, storage size, and
datastore location (thin disk).
• Define networking settings.
Stage 1 continues wilh the deployment phase:
OVF is deployed to the ESXi hosl
• Disks and networking are configured.
160
Module 4: vCenter Server
- ·~-
·~-
..... ·-
----... .. ---
----· -
-~
---··-
-
-
- m
4-22
vCenter Server Appliance Installation: Stage 2
Stage 2 is the configuration phase:
Configure time synchronization mode and
SSH access.
Create a vCenter Single Sign.On domain or
join an existing SSO domain,
Join the Customer Experience Improvement
Program (CEIP).
_.................
~.,
S.SC conl111i.t•!la•
I·=---·--'
-·-• ---
·----__
..__ ---_....._ -·~-
-
•
•
•
...
l n stage 2, you configure whether to use the ESXi host or NTP servers as the time synchronization
source. You can also enable SSH access. SSH access is disabled by default.
Module 4: vCenter Server 161
4-23
Getting Started with vCenter Server
After you depk>y vCenter Server Appliance, use the vSphere Client to log 1n and manage your
vCenter Seiver inventory: https://vCenter_Seiver_FQDN_or_IP_address/ui.
.....
• +
-N'T'r
----
162
Module 4: vCenter Server
-
··· 90'
--·
4-24
Configuring vCenter Server Using the vSphere Client
Using the vSphere Client, you can configure vCenter Server, including settings such as licensing,
statistics collection, and logging.
-
~~·
u ..n
111 Q
2
....
I !6w. ___
, . ._"
o~.-..-
(.} s.TVC0-0l.Y(l(l$S IOCal
I
--......-----°"'•
~
loC.l~l
l=I
v
vCoi"'!tl<! Se1wi< $etll!>Q!
---...
- --·-__
·-__
__
----..
•••
..............
~
Ool•t.-•
,.
.t;...... -
......""'-..
..,__.
....
.....
..._,,
~
-- -
.
,..,.._
....,,.,.,_
,,...._
...
r---·-•"•
---"°
.c;--· -..
•
-·~
'~
-111 ......~
•-.o-..
"""'
...
_,.
-
....
._,~
.... ....
...
~
.c••-·--u..--....
To access the vCcnicr Server system settings by using the vSphcrc Client, select the vCcntcr
Server system in the navigation pane, click the Configure tab, and expand Settings.
Module 4: vCenter Server 163
4-25
vCenter Server Appliance Management Interface
Using the vCenter Server
Appliance Management Interface
(VAMI), you can configure and
monitor your vCenter Server
Appliance instance.
Tasks include:
Monitoring resource use by
the appliance
Backing up the appliance
Monitoring vCenter Server
I
V Mwa1e vC~ntet Sefver
Mana!)e<nent
services
Adding additional networi<
adapters
The vCcntcr Server Appliance Management Interface is an HTML client designed
and monitor vCenter Server Appliance.
LO configure
The vCenter Server Appliance Management Interface connects directly to port 5480. Use the URL
https://FQDN_or_ll'_address:5480.
164
Module 4: vCenter Server
4-26
vCenter Server Appliance Multihoming
With vCenter Server Appliance 7 .0 multihom1ng, you can configure multiple NI Cs to manage network
traffic.
For example, vCenter Server High Availability requires a second NIC for its pliltate network .
.... . ...... ,..... . .
~
.........
..
.
,.,.,.~.
-.....
..__..,
-·-·- ----·- -----·--·
- --...
----
.
'
NM~s.-i~'I-
.... ~
- .......
~·
··~
•
•••
-""--
~
'
·-.,_
a
A maximum of four NlCs arc supported fo r multihoming. All four multihoming-supportcd NTC
configurations are preserved during upgrade, backup, and restore processes.
Module 4: vCenter Server 165
4-27
Demonstration: Deploying vCenter Server Appliance
Your instructor will run a demonstration.
166
Module 4: vCenter Server
4-28
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Deploy vCenter Server Appliance into an infrastructure
• Configure vCenter Server settings
Module 4: vCenter Server 167
4-29
Lesson 3: vSphere Licensing
Lesson 3: vSphere Licensing
vmware·
168
Module 4: vCenter Server
4-30
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Vtew licensed features for vCenter Server or an ESXi host
• Add license keys to vCenter Server
Module 4: vCenter Server 169
4-31
vSphere Licensing Overview
Licensing vSphere components is a two-step process:
1. Add a license to the \/Center License Seivice.
2. Assign the license to the ESXi hosts. \/Center Server Appliance instances, and other vSphere
components.
170
Module 4: vCenter Server
4-32
vSphere License Service
The License Seivice runs on
vCenter Server Appliance.
The License Seivice perfonns
the following functions:
Provides centralized license
management
• Provides an inventory of
vSphere licenses
Manages the license
assignments for products that
integrate with vSphere, such
as Site Recovery Manager.
..
~
'
.... . ...... _ ..
_,
-··-
-·-·
---
-
__-.._
---
~---
••
·---.._...--·
_
--·..----·
·--·-·---·
-- ---- -- ---· --- -----· --·- ---
·-·-·-·
-·
---·
The License Service manages the license assignments for ESXi hosts, vCentcr Server systems, and
clusters with vSAN enabled.
You can monitor the health and status o f the License Service by using the vCemer Appliance
Management Interface.
Module 4: vCenter Server 171
4-33
Adding License Keys to vCenter Server
You must assign a license lo vCenter Server before its 60-day evaluahon penod expires.
Select Menu > Administration > Licenses to open the Licenses pane .
-~'"'"(.'""''
·- ··-·---- -·....
~·
-~
·~-
y
•
LICenses
~-
............
.....
• ...
•
-.,.._.
--
•
•
•
•
-
ipm,.• ...,,....
New Licenses
1---
Ent('r hccnse!' keys
~·-
ln the vSphcrc environment. license reporti ng and management arc centralized. All product and
feature licenses are encapsulated in 25-<:haracter Iicense keys that you can manage and monitor
from vCenter Server.
You can view license information by product, license key, or asset:
•
Product: A License to use a vSphere software component or feature, for example, evaluation
mode or vSphcrc Enterprise Plus.
•
License key: The serial number that corresponds to a product.
•
Asset: A machine on which a product is installed. For an asset to run certain software legally,
the asset must be licensed.
172
Module 4: vCenter Server
4-34
Assigning a License to a vSphere Component
You can assign a license to an asset, such as vCenter Server.
-
·-
.....•. ··•···.....
----
--··----·__
··-----
·-
.,..
...
II
:1
•
•
-- --
T
•
·-
G O. - . - -
.............. ,. . '"'"
·--·
-
l·.-
--
Module 4: vCenter Server 173
4-35
Viewing Licensed Features
You assign valid license keys to your ESXi hosts and vCenter Server Instance using the Licensing
pane. This pane shows tile type of license and available features .
...!!.
g
ft
•
------- ..........------ -·--·--------··--·---....
·---·---··--·-·-·-·
---------·-···__
----·-------·---
·-___ -------·
--··-..··-- o ..- • ..--~
:;,,,_..,
..........
"
f
-
•
.... .,...,_
---~-· -~
•
..
•
......,
Before purchasing and activating licenses for ESXi and vCcnter Server, you can install the
software and run it in evaluation mode. Evaluation mode is intended for demonstrating the
software or evaluating its features. During tJ1e evaluation period. tbe software is operational.
The evaluation period is 60 days from 1.be time of installat ion. During this period, 1he software
notifies you of the time remaining until expiration. The 60-day evaluation period cannot be paused
or restarted. After the evaluation period expires, you can no longer perform some operations in
vCenter Server and ESXi. For example, you cannot power on or reset your vi11ual machines. In
addition, all hosts are disconnected from the vCenter Server system. To continue to have full use
ofESXi and vCenter Server operations, you must acquire license keys.
174
Module 4: vCenter Server
4-36
Lab 6: Adding vSphere Licenses
Use the vSphere Client to add vSphere licenses to vCenter Server and assign a license to vCenter
Server:
1. Add vSphere Licenses to vCenter Server
2. Assign a License to the vCenter Server Instance
Module 4: vCenter Server 175
4-37
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Vtew licensed features for vCenter Server or an ESXi host
• Add license keys to vCenter Server
176
Module 4: vCenter Server
4-38
Lesson 4: Managing the vCenter Server Inventory
Lesson 4: Managing the vCenter Server
Inventory
vmware·
Module 4: vCenter Server 177
4-39
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Use the vSphere Client to manage the vCenter Seiver inventory
Create and organize vCenter Seiver inventory objects
Add data center and organizational objects to vCenter Seiver
Add hosts to vCenter Seiver
Recognize how to create custom inventory tags for inventory objects
178
Module 4: vCenter Seiver
4-40
vSphere Client Shortcuts Page
From the vSphere Client Shortcuts page, you can manage your vCenter Server system Inventory,
monttor your infrastructure environment, and complete system administration tasks.
.. _....,_
a-·--
-·-.......
__
.. ___
·-ti<--
··---·-··-,··_
"''-·--·
.............
·-:'>....:....-
--·-
·-
-·- --Ill
- -- I
~
M
.,
--
---- -..- --- - -- =°'
!I
-•
..................
r
•••
~·
I
~-
-"
•
Select Menu > S hortcuts. The Shortcuts page has a navigation pane on the left and Inventories,
Monitoling, and Administnttion panes on the right.
Module 4: vCenter Server 179
4-41
Using the Navigation Pane
You can use the navigation pane to b1owse and select objects in the vCenter Server inventory.
-
•'<••-~
-
- ,
nlln!l
l · to·-···-~
I·•--.
·~­
... _
-
.
=-·-. --_,_
..... -·- - - - ·------.........··-------·•
·-- .
.._
~oo
--·
--
-·-
-
~----- · ----
_,_ -
180
Module 4: vCenter Server
... -:l.'...
------······--
•
0-
-~
-
•
4-42
vCenter Server Views for Hosts, Clusters, VMs, and
Templates
Host and cluster objects are shown in one vif!W, and VM an<l template objects are displaye<l in
another view.
Host ond Clusters Inventory Vtcw
-·-- ·-I
···--
VMs <tnd Template& Inventory VMJ"I\•
-··-·-·-
--
The Hosts and Clusters inventory view shows all host and cluster obj ects in a data center. You can
further organize the hosts and clusters into folders.
The VMs and Templates inventory view shows all VM and template objects in a data center. You
can also organize the VMs and templates into folders.
Module 4: vCenter Server 181
4-43
vCenter Server Views for Storage and Networks
Storage Inventory View
The Storage inventory view
sho\VS all the details for
_- -
datastores in the data center.
The Networking Inventory view
.........
sho\vs all standard s\11itches and
distributed switches.
~
Network Inventory View
ICI
Q
I:!
o .. oc.. ooot....
-
~
~
... Proouct1on
>
v
Ui,.,,...r...-..!11 ""'-~
a~~-
0--00---
-·Cl·-'"--
g .. -~~-
.,.,_.
-
--
·-
,..
-,,_
---
As wirh the other inventory views, you c.an. organize your datastorc and network objects into
folders.
182
Module 4: vCenter Server
4-44
Viewing Object Information
Because you can \lie\v object information and access related objects, monitoring and managing
object properties is easy.
·-·o---·----a•-O•••-
·-.
-- -- -·
. ---- ----·
...
__
-••.•
·-·
-------··- ·--- ·--- -
-·.
'
~
...__
'
• • ••
•
...
•
--~
Module 4: vCenter Server 183
4-45
About Data Center Objects
A virtual data center is a logical organization of all the inventory objects required to complete a fully
functional environment for operating VMs:
• You can create multiple data centers to organize sets of environments.
• Each data center has its own hosts, VMs. templates, datastores, and networl<s.
vCenter Serve.t
Toronto Oat•
Los Angele$
Munir;h Dai.
P&ri$ D4 t~
Center
Data Center
Center
Center
You might create a data center object for each data center geographical location. Or, you might
create a daw center object for each organizational unit in your enterprise.
You might create some data centers for high-performance environments and other data centers for
less dem;mdiog YMs.
184
Module 4: vCenter Server
4-46
Organizing Inventory Objects into Folders
Objects in a data center can be placed into folders. You can create folders and subfofders to better
organize systems.
Los Angeles
Data Center
You plan the setup of your virtual environment depending on your requirements.
A large vSpherc implementation might contain severa l virtual data centers with a complex
arrangement o f hosts. clusters, resource pools. and networks. It might include multiple vCentcr
Ser\ier S} Stems.
1
Smaller implementations might require a single virtual data center with a less complex topology.
Regardless of the scale of your virtual environment, consider how the VMs that it supports are
used and administered.
Populating and organizing your inventory involves the following tasks:
•
Creating data centers
•
Creating clusters to consolidate the resources of multiple hosts and VMs
•
Adding hosts to the clusters or co the data centers
Module 4: vCenter Server 185
•
Organizing inventory objects in folders
•
Sening up networking by using vSphere standard switches or vSphere distributed switches
•
Configuring storage systems and creating datastore inventory objects to provide logical
containers for storage devices in your inventory
186
Module 4: vCenter Server
4-47
Adding a Data Center and Organizational Objects to
vCenter Server
You can add a data center, a host. a cluster, and folders to vCenter Server.
You can use folders to group objects of the same type for easier management.
ti
Q
llJ
,:2
l;.• ....
-· .
!) sa·vcsa-01 vc1as.s.1oca1
Uc····
'
.
1-'-·-·~
" -------< b----0.?:> ..... Nola«\',.,..
~-y,...,..
.........
., ::...oltvO'"" - _,....,.
-
!l ...·~-"-
':J NI• ""I~ f••d1W .__
Module 4: vCenter Server 187
4-48
Adding ESXi Hosts to vCenter Server
You can add ESXi hosts to \/Center Server using the vSphere Client.
'
"'"
.~
.. r,...,,
.
.
"
n---
D
J ..... ..;..
r.::-:-:'."'.'."-:------, -
·--·
188
Module 4: vCenter Server
•
a ........ ___ .., __
-·--
-
•
•
4-49
Creating Custom Tags for Inventory Objects
You can use tags to attach metadata to objects
In the vCenter Server inventory. Tags help make
these objects more sortable.
--·__ _
,,
You can associate a set of objects of the same
type by searching for objectives by a given tag.
You can use tags to group and manage VMs,
clusters, and datastores, for example:
•
- - ... ·----· -- ...Jo-·.._ ·---
·-·--
-J · - ~-
_
Tag VMs that run production workloads.
Tag VMs based on their guest operating
system.
-~-
..•
....
·-·-· -- .,.__
.... ··-
-- --
~--
Module 4: vCenter Server 189
4-50
Labs
Lab: Creating and Managing the vCenter Server Inventory
Lab: Configuring Active Directory: Joining a Domain
190
Module 4: vCenter Server
4-51
Lab 7: Creating and Managing the vCenter Server
Inventory
Use the vSphere Client to create and configure objects in the vCenter Server inventoiy.
1. Create a Data Center Object
2. Add ESXi Hosts to the Inventory
3. View lnformalion About the ESXi Hosts
4. Configure the ESXI Hosts as NTP Clients
5. Create a Folder for U1e ESXi Hosts
6. Create Folders for VMs and VM Templates
Module 4: vCenter Server 19 1
4-52
Lab 8: Configuring Active Directory: Joining a Domain
Join vCenter Server to the vclass.local domain:
1. Join vCenter Server to the vclass.local Domain
192
Module 4: vCenter Server
4-53
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Use the vSphere Client to manage the vCenter Seiver inventory
Create and organize vCenter Seiver inventory objects
Add data center and organizational objects to vCenter Seiver
Add hosts to vCenter Seiver
Recognize how to create custom inventory tags for inventory objects
Module 4: vCenter Server 193
4-54
Lesson 5: vCenter Server Roles and Permissions
Lesson 5: vCenter Server Roles and
Permissions
vmware·
194
Module 4: vCenter Server
4-55
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Define the term permission in the context of vCenter Server
Desclibe the rules for applying permissions
Create a custom role
Create a permission
Module 4: vCenter Server 195
4-56
About vCenter Server Permissions
Using the access control system, the vCenter
Server administrator can define user privileges
to access objects in the inventory.
The following concepts are important:
Privilege: An action that can be performed
Object: The target of the action
User or group: Indication of who can perform
the action
Role: A set of privileges
Permission: Gives one user or group a role
(set of privileges) for the selected object
-
j ----------- - ------------ 1
1
'
1 10°-t·M--+--~1
Pe<mi--1-n
.....
'
''
f
Ill
: ________________________ !
The authorization LOperform tasks in vCcnLcr Server is governed by an access control system.
Through this system, the vCenter Server administrator can specify in detail which users or groups
can perform which tasks on which objects.
A pemussion is set on an object in the vCenter Server object hierarchy. Eacn permission
associates the object with a group or user and the group or user access roles. For example. you can
select a VM object, add one pennission that gives the Read-only role to group I, and add a second
pennission that gives the Administrator role to user 2.
By assigning a different role to a group of users on different objects, you control the tasks that
those users can perfonn in your vSphere environment. For example, to allow a group to configure
memory for the host, select that host and add a permission that grants a role to that group that
includes the Most.Configuration.l\1emory Configuration privilege.
196
Module 4: vCenter Server
4-57
About Roles
Privileges are grouped into roles:
A privilege allows access to a
specific task and is grouped
with other privileges related to
it.
Roles allow users to pertorm
tasks.
vCenter Server provides a few
system roles, which you cannot
modify.
____
..,
------....
·-·-__- .. __
--·----~
,
.
__
-__
----- ·_
_
·---··----..-....__
----...
_
-----_____
--·-·----,,_
------w. . .
-·-·-·--.. ---··-•• _.,_
'
...
-
• I . I i!llM
.......
•'""--'-.,_
._.,.
~...
°"'"'"_
~-~
u-
·-
A role is a set of one or more pri vileges. For example, the Virtual Machine Power User sample
role consists of severnl privileges in categories such as Datastore and Global. A role is assigned to
a user or group and determines the level of access of that user or group.
You cannot change the privileges associated with the system roles:
•
Administrator role: Users with this role for an object may view and perform all actions on the
object.
•
Read-only role: Users with this role for an object may view the state of the object and details
about the object.
Module 4: vCenter Server 197
•
No access role: Users with this role for an object may not view or change the object in any
way.
•
No cryptography administrator role: Users with this role for an object have the same
privileges as users with the Administrator role, except for p1ivileges in the Cryptographic
operations category.
All roles are independent of each other. Hierarchy or inheritance between roles does not apply.
198
Module 4: vCenter Server
4-58
About Objects
Objects are entities on which actions are performed. Objects include data centers, folders, clusters,
hosts, datastores, nel\vorks, and \jjrtual machines.
All objects have a Permissions tab, T he Permissions tab shows which user or group and role are
associated with the selected object.
'-"'
0
vSO(le<.;o C~<i'~C
Q
13
,~ •
2 0
IJ ~<to»·O! Ol.llU""'-·
a ...... ,..~ ~-­
a-..ci<ICI-•
.,,
SA-Cluster-01
'
.1 Vti'l'l-loc:M-~ i..OUl.~••m
e 11~uiu..·--­
a
\?l+~U)C.AI.~
'
•
-· •
· '
•
•
.,_..
+ ·'
•
1
-
...............
-
..~l-
..
......
e.~
. -·
o ..
----
~---
-"'I.Ill~
Module 4: vCenter Server 199
4-59
Adding Permissions to the vCenter Server Inventory
To add a permission:
1. Select an object.
2. Select a user or group rrom a
domain.
3. Select a role.
4. Propagate the permission to
the child objects.
---
•
You can assign pcnn issions to objects at dilTercnt leve ls o f the hierarchy. For example, you can
assign permissions to a host object or to a folder object that includes all host objects. You can also
assign permissions to a global root object to apply tl1e permissions to all objects in all solutions.
For information about hierarchical inheritance of permissions and global permissions, see vSphere
5'ec11rity at https://c.tocs. \'lll\\'are.com/enNrv1'"'arevSpherei7. ()/com vmwnre. vsphere.5ecuritv.doclG UI D-52 l 881 ~8-C579-4F6i\-83 3 5CFBCEO DD2 I6 7. html
200
Module 4: vCenter Server
4-60
Viewing Roles and User Assignments
The Roles pane shows which users are assigned the selected role on a particular object.
-. ......
·---·
-·---__
.. __
-·
.... _
..__
__
·--·
--------·-·--·----·----..
·-·-Cl'-------- ---·-------_____
--···-
••
._,,
~-
.._.
•
.. _ ( I f_ _
~--
------...--··---J___- ----·---------
............
•
...
........
~~-·OC•-
_,_._
You can view all the objecis to which a role is assigned and all the users or groups who are
granted the role.
To view infom1ation about a role, click Usage in the Roles pane and select a role from the Roles
list. Tbe information provided 10 the right shows e~cb object to which the role is assigned and the
tisers an(t grol1ps Vi1ho \Vere gral1te<t the role.
Module 4: vCenter Server 201
4-61
Applying Permissions: Scenario 1
A permission can propagate dov1n the object hierarchy to all subobjects, or it can apply only to an
immediate obje<:t.
v
O sa.vcsa-01 vdassJoc.al
v
[]jlr"'11ng+ - - - - - - - - - - - - Greg: Read-Only (Propagate to children)
Cl PrQductJon
Bi Pl'Qd03·1
~Pl'Qd03·2
- - -- - - - -- Greg: Administrator
~ Pl'Qd04-2
~Pl'Qd0<-3
ijl Pl'O<fTemJ)lale
v
CJ TIMI and Dev
Eli Oev01
{5Jc.v02
&0ev03
ln addition to specifying whether permissions propagate downward, you can ovcnidc permissions
set at a higher level by explicitly setting different permissions for a lower-level object.
On the s lide, user Greg is given Re.ad-only access in the Training data center. This role is
propagated to all child objects except one, the Prod03 -2 V~1. for this VM, Greg is an
adn1jnistrJtor.
202
Module 4: vCenter Server
4-62
Applying Permissions: Scenario 2
When a user is a member or multiple groups with permissions on the same obiect, the user Is
assigned the union of privtleges assigned to the groups for that object.
v
o ~-vcsa-o1 vc&assJocai
[
Ill Training ••---------1
"' OPrc>ducbOft
Group1 : VM_Power _On (Propagate to children)
Group2: Take_ Snapshots (Propagate to children)
EP "'""00.1
Et;. PYod03-2
&
&
v
?rod04·2
?rod04·3
Ci) PfoefTems:i&ate
Cl Te:st and Dev
Eb Dt-01
fP Dt-02
Greg
Members of Group2:
Greg
Susan
carta
Members of G roup1:
{5J 0.-03
On the s lide, Group I is assigned the Vlvl_Powcr_On role, a custom role that contains only one
privilege: the ability to power on a VM. Group2 is assigned the Take_Snapshots role, another
custom role that contains the prh•ileges to create and remove snapshots. Both roles propagate to
the child objects.
Because Greg belongs to both Group I and Group2, he gets both VlvLPower_On and
Take_Snapshots privileges for all objects in the T raining data center.
Module 4: vCenter Server 203
4-63
Activity: Applying Group Permissions ( 1)
If Group1 has the Administrator role and Group2 has the No Access role, what permissions does
Greg have?
v
••------1[
o ....c..-o•w:._.._•sJoc
__
Ill Training •
v ClP<oducbOft
Groupl: Administrator (Propagate to children)
-
Group2: No Access (Propagate to children)
EP "'""00-1
Et;. PYod03-2
&
&
v
P<od04·2
P<od04·3
Ci) PfoefTems:i&ate
Cl Te:st and Dev
E/J DtYOI
fP DtY02
{5J O.Y03
204
Module 4: vCenter Server
Members of Groupl ·
Greg
Susan
Members of Group2 :
Greg
Carta
4-64
Activity: Applying Group Permissions (2)
Greg has Administrator pnvileges.
Greg 1s assigned the union of privileges assigned to Group1 and Group2.
v
••------1[
o ....c..-o•w:._.._•sJoc
__
Ill Training •
v
ClP<oducbOft
Groupl: Administrator (Propagate to children)
-
Group2: No Access ( Propagate to children)
EP "'""00-1
Et;. PYod03-2
& ?rod04-2
& ?rod04·3
v
Ci) PfoefTems:i&ate
Cl Te:st and Dev
Eb Dt-01
fP Dt-02
Members of Groupl ·
Greg
Susan
Members of Group2 :
Greg
Carta
{5J 0.-03
Module 4: vCenter Server 205
4-65
Applying Permissions: Scenario 3
A user can be a member of multiple groups with permissions on different objects. In this case, lhe
same permissions apply for each object on \Vhich the group has permissions, as though the
permissions were granted directly to the user.
a sa-1t<so-Olvc1assJoc.al
[t Trarwng
Group1: Administrator ( Propagate to children)
0Proouctl0n
8J ProdOl-1
G Pc'odo3-2
Group2:
Read ~Only
a: Prod04~2
~
.._,..,
~ ProcJTl!molate
"' 0
Te<;t ana Oev
Bi°"""
Bi Oe.02
Bi°""°'
M embe r s of Group1:
Greg
Members of Gtoup2:
Greg
Susan
Carla
You can override pcm1issions set for a higher-level object by explicitly seuing different
penn issions for a lower-level object.
On the s lide, Group I is assigned the Administrator role at the Training data center and Group2 is
assigned the Read-only role on the VM object. Prod03- l. T he permission granted to Group I is
propagated to child objects.
Because Greg is a member of both Group I and Group2, he gets administrator privileges on the
entire Training data center (the higher-level object), except for the VM called Prod03 -I (the
lower-level object). For this VM, he gets read-only access.
206
Module 4: vCenter Server
4-66
Applying Permissions: Scenario 4
A user (or group) is given only one role ror any given object.
Permissions defined exptic1tly for the user on an object take precedence over all group permissions
on lhat same object.
E
O sa-vcsa-01vc1as.s.10ea1
Group1: VM_ Power _ On (Propagate to children)
Ill Tr.ining ••---------!-- Group2: Take_ Snapshots (Propagate to children)
v
Cl PrOduction
Greg: No Access ( Propagate to children)
BJ PYod03·1
~ PYod03·2
&,Prod04·2
6,PJ0004·3
ca ProdTemOlate
v
Cl THt and O.v
BJ 0.•01
BJ 0.•02
BJ 0.v03
Members of Group1:
Greg
Members of Group2:
Greg
Susan
Carla
On the s lide, three permissions are assigned to the Training data center:
•
Group I is assigned the VM_l'ower_On role.
•
Group2 is assigned the Take_Snapsbots role.
•
Greg is assigned the No Access role.
Greg is a member of both Group I and Group2. Assume that propagation to child objects is
enabled on all roles. Although Greg is a member of both Group I and Group2, he gets the No
Access privilege to the Training data center and all objects under it. Greg gets the No Access
privilege because explicit user penni ssions on an object take precedence over all group
pennissions on that san1e object.
Module 4: vCenter Server 207
4-67
Creating a Role
Create roles for only neeessaiy tasks.
For example, you can create a Virtual Beans
VM Provisioning role that allows a user to
deploy VMs from a template.
Use raiders to contain the scope of permissions.
Virtual Beans VM Provisioning role:
Dat<tstore > Allocate space
Resource > Assign Virtual machine to resource pool
Virtuat machine >
For instance, assign the VirtuaJ Beans VM
Edit lnventory > Create from existing
Provisioning role to user nancy@vmbeans.com
Interaction >Power on
and apply it to the Production VMs folder.
Pl'Qvi$b'IJn9
>
Allow read•oolv disk access
eustomiZe guest
De:PIOV templ.&le
A.ead customization specifications
The Virtual Beans VM Provisioning role is one o f many examples of roles that can be created.
Define a role using the smallest number of privileges possible to maximize security and control
over your environment. Give the roles names that explicitly indicate what each role allows, to
make its purpose clear.
208
Module 4: vCenter Server
4-68
About Global Permissions
Global permissions support assigning privileges across solutions from a global root object.
Span solutions such as vCenter Server and vRealize Orchestrator
• Give a user or group privileges for all objects in all object hierarchies
Globul Root ObJect
l
vCenteir Servt:>r Instance
l
Content Library
Data Center Folder
Tag Category
l
l
l
Library Item
Data Center
Often, you apply a permission to a vCenter Server inventory object such as an ESXi host or a VI\{
When you apply a permission, you specify that a user or group has a set of privileges, called a
role, on the object.
Global pent1i ssions give a user or group privi leges to view or manage all objects in each of the
inventory hierarchies in your deployment. The example on the slide shows that the global root
object has pen11issions over all vCenter Server objects, including content libraries, vCenter Server
instances, and tags. Global permissions allow access across vCenter Server instances. vCenter
Server permissions, however, are effective only on objects in a particular vCenter Server instance.
Module 4: vCenter Server 209
4-69
Labs
Lab: Configuring Active Directory: Adding an Identity Source
Lab: Users, Groups, and Permissions
210
Module 4: vCenter Server
4-70
Lab 9: Configuring Active Directory: Adding an Identity
Source
Add velass.local as an identity source:
1. Add velass.local as an Identity Source
Module 4: vCenter Server 211
4-71
Lab 10: Users, Groups, and Permissions
Assign roles and permissions so that an Active Directory user can perform functions in vCenter
SeNer.
1. View Act.ive Directory Users
2. Assign Object Permission to an Active Directory User
3. Assign Root-Level Global Pennission to an Active Directory user
4. Log In as an Active Directory User
s. Use an Active Directory User to Create a Virtual Machine
212
Module 4: vCenter Server
4-72
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Define the term permission in the context of vCenter Server
Desclibe the rules for applying permissions
Create a custom role
Create a permission
Module 4: vCenter Server 213
4-73
Lesson 6: Backing Up and Restoring vCenter Server
Appliance
Lesson 6: Backing Up and Restoring
vCenter Server Appliance
vmware-
214
Module 4: vCenter Server
4-74
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Create a vCenter SeNer Appliance backup schedule
• Restore vCenter SeNer Appliance from backup
Module 4: vCenter Server 215
4-75
Virtual Beans: vCenter Server Operations
As a Virtual Beans administrator, you are responsible for the maintenance and daily operation of
vCenter Server.
To align with Virtual Beans policies, you perform the following tasks:
Back up vCenter Server data monthly.
Make vCenter Server highly available·
- 99.99 percent available (dov1ntime per year of 52.56 minutes)
Monitor vCenter Server performance to avoid potential problems in the infrastructure
216
Module 4: vCenter Server
4-76
About vCenter Server Backup and Restore
vCenter Setver backup and restore operations
prote<:t data. These operations work in the
following ways:
Use the vCenter Server Appliance
Management Interface
Remove dependency on third-party backup
solutions
Support FTPS, HTTP, HTTPS, SFTP, FTP,
NFS, andSMB
Include the option to encrypt backups
Restore directly from the vCenter Seiver
Appliance GUI installer
Restore a vCenter Setver instance to a
brand-new appliance
The vCcntcr Server Appliance Management Interface supports backing up key parts of the
appliance. You can protect vCenter Server data and minimize the time required to restore data
center operatioJ1s.
The backup process collects key tiles into a tar bundle and compresses the bundle to reduce the
network load. To minimize the storage impact. the transmission is streamed without caching in the
appliance. To reduce tl1e total time required to complete the backup operation, the backup process
handles the di ffere nt components in parallel.
You can encrypt the compressed file before. transmission to the backup stornge location. \Vhen
you choose encryption, you m ust supply a password that can be used to decrypt the file during
restoratio11.
The backup operation always includes the vCenter Server database and system configuration files,
so that a restore operntion has all the data to recreate an operational appliance. Optionally, you can
specify that a backup operation should include S tatistics, Events, and Tasks from the current state
of the data center. Current a larms are always included in a backup.
Module 4: vCenter Server 217
4-77
Methods for vCenter Server Appliance Backup and
Restore
You can use different methods to back up and restore vCenter Server Appliance:
File-based backup and restore:
- Use the vCenter Server Appliance Management lntertace to create a file-based backup.
- Restore the backup through the GUI installer of the appliance.
- Schedule the file-based backup and restore.
Image-based backup and restore:
- Use vSphere Storage APls • Data Protection with a third-party backup product to pertorm
centralized, efficient. off-host, LAN-lree backups.
218
Module 4: vCenter Server
4-78
File-Based Backup of vCenter Server Appliance
You can perform a file-based backup manually.
---·
--
-·--
-
--
-
[ .....·-··-wtfJt
"".... Pel
-
----
--- ··--- -·__ ·•-w--·-·
,.
---
...._,
__
...
-·-...
You use the vCenter Server Appliance 1'1anagemeot Interface to pcrfoni1 a file-based backup of
the vCenter Server core configuration, inventory, and histotical data of your choice. The backedup data is streamed over the selected protocol to a remote system. The backup is not stored on
vCenter Server Appliance.
\Vhen specifying the backup location, use the following syntax: protocol : <se rve r -
address< : port- number>/ folder /subfolder.
Module 4: vCenter Server 219
4-79
File-Based Restore of vCenter Server Appliance
Use the vCenter Server Appliance GUI installer
to restore a vCen1er Server Appliance to an
ESXi host or a vCenter Server instance.
The restore procedure occurs in stages:
1. A new appliance is deployed.
2. The newly deployed vCenter Server
Appliance 1s populated wtth the data stored in
the file-based backup.
When you use the file-l>ased restore method.
reconciliation is automatically performed.
·-
--
w
•
-.
You can perform a file-based restore only for a vCcntcr Server Appliance instance that you
previously backed up by using the vCenter Server Appliance Jvlanagement Interface. You can
perfonn the restore operation by using the GUI installer ofvCenter Server Appliance. The process
consists of deploying a new vCenter Server Appliance instance and copying the data from the filebased backup to the new appliance.
You can also perfonn a restore operation by deploying a new vCenter Sen•er Appliance instance
and using the vCenter Server Appliance Management Interface to copy the data from the filebased backup to the new appliance.
220
Module 4: vCenter Server
4-80
Scheduling Backups
You can schedule au1omatic fiJe..
based backups.
The backup scheduler supports:
A retention policy to keep all
backups or a defined number
of backups
• Daily, weekly, or custom
schedule
Failed backups trigger an alarm
in !he vSphere Client.
--··
,
~·~
.. - ... ..... '
---·--
~ ~
··--·-·-------------... --....
" _ _ .... _ _ , t ... - - - - · - - - " " ' "'f11"
~-----!
'
,,.
_ ------····-
___ ..
..
......... . .
·-·
-----..--o ··----- -·-·-
-
·----
----·-.....
-·
,
.
You can se1 up a tile-based backup schedule co perform periodic backups:
•
The schedule can be set up with information about the backup location, recurrence, and
rctcniion for Ilic backups.
•
You can set up only one schedule at a time.
Module 4: vCenter Server 221
4-81
Viewing the Backup Schedule
You can view the existing defined backup schedule from the vCenter Server Appliance Management
l ntelface.
The backup schedule can be edited, disabled, or deleted.
""""'·
• .s-•..111 ["'9f'ti.
•
222
Module 4: vCenter Server
rMMIQ'1
..:I,...,
.no tonflgv~
4-82
Demonstration: Backing Up and Restoring a vCenter
Server Appliance Instance
Your instructor will run a demonstration.
Module 4: vCenter Server 223
4-83
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Create a vCenter SeNer Appliance backup schedule
• Restore vCenter SeNer Appliance from backup
224
Module 4: vCenter Server
4-84
Lesson 7: Monitoring vCenter Server and Its Inventory
Lesson 7: Monitoring vCenter Server
Appliance
vmware·
Module 4: vCenter Server 225
4-85
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Vtew vCenter Sel\ler logs and events
Manage vCenter Seiver services
Monitor vCenter Server Appliance for seivice and disk space usage
Use vSphere alarms for resource exhaustion and service failures
226
Module 4: vCenter Server
4-86
vCenter Server Events
The vCenter Server events and audit trails allow selectable retention periods in increments of 30
days:
User-action Information includes the user's account and specific event details.
All actions are reported, Including file ID, file path, source of operation, operation name, and date
and hme of operation.
Events and alarms are displayed to alert the user to changes in the vCenter Server seNice health
or when a seMce fails.
.-
·•
. -•
•
·--
--
••
••
-
~
••
•
..•
•
Module 4: vCenter Server 227
4-87
About Log Levels
You can set log levels lo control the quantity and type of information logged.
Examples of when to set log levels:
• When troubleshooting complex issues, set the log level to verbose or trivia. Troubleshoot and set it
back to info.
For controlling the amount of information being stored in the log files.
Option
Oe!lcr1pt1on
None
Error (errors only)
Tufns o"logg1ng
Warning (errors and
Displays watnlno and a1Tor log en1rles
Displays onJy error log entries
warnings}
Info (normal logging)
Displays 1nfonnat1on, error and warning log enuies
Verbose
Displays tnformauon, error. warning, and verbose log entries
Trivia (extended verbose}
Displays 1nformat1on erro1 warning verbose and tnvia log entries
Changes to the logging settings take effect immediately. You do not have to restart the vCcntcr
Ser\1er S)'Ste1n.
228
Module 4: vCenter Server
4-88
Setting Log Levels
You can configure lhe amount or detail that vCenter SeNet collects in log files:
You can edit the log levels in the vSphere Client.
· More verbose logging requires more space on your VCenter SeNer system.
O U
O
·-o·---
•
I
___
___
---
_-- ------ --
I -
·- .. ·-
...._
,,
-... ___ .. __
-·--·--·· --- --- ........ --1=
----·
..
____
------ ·-- --- -·-L=-
--
~-
----
To configure logging levels. follow these steps:
I.
ln the vSphere Client, select the vCenter Server instance in the navigation pane.
2.
Click the Configure tab.
3.
Under Settings, select General.
4.
Click EDIT.
5.
Under Edit vCentcr general settings, select Logging settings in the left pane.
6.
Select an option !Tom the Log level drop-down menu.
Module 4: vCe nter Server 229
4-89
Forwarding vCenter Server Appliance Log Files to a
Remote Host
vCenter Server and ESXi can stream their log information to a remote Syslog server:
You can enable this feature in the vCenter Server Appliance Management Interface.
• With this feature, you can further analyze .Center Server Appliance log files with log analysis
products, such as vRealize Log Insight.
----·--
~-
-- _.._ -- --·
•
-·
-
230
... ---- --- --·-·- -·
--
":' ,-,----·-t
Module 4: vCenter Server
-
4-90
vCenter Server Database Health
vCenter Setver ch~ks the status of the
database every 15 minutes:
By default, database health warnings trigger
--
an aJarm \Vhen the space used reaches 80
percent
The alarm changes from warning to error
\Vhen lhe space used reaches 95 percent.
vCenter Setver setvices shut down so that
you can configure more disk space or remove
unwanted content.
You can also monitor database space utilizatfon
using the vCenter Setver Appliance
Management Interface.
---..J
...
-
_,,
-- -
..
- ,.
. . ..
----
- ..
- --
L
Module 4: vCenter Server 231
4-91
Monitoring vCenter Server Appliance
The vCenter Server Appliance Management Interface has a built-in monitoring lntertace.
c,pu and Memory View
Oi.SkS View
=
--
The CPU and Memory views provide a historical v iew of C PU and memory use.
Using the Disks view, you can moni tor the available disk space.
232
Module 4: vCenter Server
4-92
Monitoring vCenter Server Appliance Services
You can use the vCenter Server Apphance Management Interlace to monitor the health and state or
the vCenter Server Appliance services. You can restart, starl, or stop services from this interlace.
-·----·-
--·--
-------·-_
..,,,,,._..
----·
··__
..._
"'---··--·-··
-·--......
..--...
...___
-·-------------
-- --- --..--- ·--..-_
--- ·-----·
.,_
h-
Module 4: vCenter Server 233
4-93
Monthly Patch Updates for vCenter Server Appliance
VMware provides monthly security patches for
vCenter Server Appliance:
Critical vulnerability patches are delivered on
a monthly release cycle.
• Important and lmv vulnerabilities are
delivered with the next available vCenter
Seiver patch or update.
You can configure the VCenter Server Appliance
to perform automatic checks for available
patches in the configured repository URL at a
regular interval.
--·-
·----
-__
__
..-. __
___..
.=. .............. _.....
~-::::
·· ~·--
. .........
~··
~--
If a vCcntcr Server patch or update occurs in the same time period as the monthly security patch,
the monthly security patch is rolled into the vCenter Server patch or update.
234
Module 4: vCenter Server
4-94
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Vtew vCenter Sel\ler logs and events
Manage vCenter Server services
Monitor vCenter Server Appliance for service and disk space usage
Use vSphere alarms for resource exhaustion and service failures
Module 4: vCenter Server 235
4-95
Lesson 8: vCenter Server High Availability
Lesson 8: vCenter Server High Availability
vmware·
236
Module 4: vCenter Server
4-96
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize the importance of vCenter Server High Availability
Explain how vCenter SeJVer High Availability works
Identify vCenter SeJVer High Availability requirements
Module 4: vCenter Server 237
4-97
Importance of Keeping vCenter Server Highly
Available
VMwaro Produc.ts
High availab1lrty is an important
characteristic for many VMware
and third-party solutions that
depend on vCenter Server as the
primary management platform:
vCenter Server is the
foundation for the virtual
desktop infrastrocture.
• Backup and disaster recovery
solutions rely on vCenter
Server.
11Rc<1!1:e
Orctt~.;n;;lOI'
l .,.J
I l
'
"''
Third-Party Integrations
vSphere is a virtualization platfonn that forms the foundation for building and managing an
organization's virtual, public, and private cloud infrastructures. vCenter Server Appliance sits at
the heart of vSphere and provides services to manage various components of a virtual
infrastructure, such as ESXi hosts, virtual machines, and storage and networking resources. As
large virtual infrastructures are built using vSphere, vCenter Server becomes an important element
in ensuring the business continuity of an organization. vCenter Server must protect itsel f from a
set of hardware and software failures in an environment and must recover transparently from such
failures.
238
Module 4: vCenter Server
4-98
About vCenter Server High Availability
vCenter Setver High Availability protects
vCenter Setver Appliance against both
hardware and software failures.
vCenter Setver High Availabiltty forms a cluster
or nodes:
•
Active node: Runs the active vCenter Server
Appliance instance
Passive node: Automatically takes over the
role of the Active node if a failure a<:curs
Witness node: Provides a quorum to protect
against a split-brain situation
vCenter Setver High Availability is built in to
vCenter Server Appliance and is included with
the standard license.
•...............
Wrtn<:':;~
(Quorum)
\Vi th vCentcr Server High Availability, )' OU can recover quickly from a vCcntcr Server failure.
Using automated foilover, vCenter Server foilover occurs with minima l downtime.
Module 4: vCenter Server 239
4-99
Scenario: Active Node Failure
If the active node fails, the passrve node takes over the role of the active node. The cluster 1s
considered to be running in a degraded state .
•
--
OB/ File Repllcation
'''L----------------------
Witness
(Quorum)
'
'
---------------------·'
0
The animation demonstrates what happens if an active node fails. To play the animation. go to
https:llvmwarc .brava is.com/s/PlUBZn2zC07 HESgN 2fin-I .
The active node runs the active instance o f vCentcr Server Appliance. The node uses an IP address
on the Management network for the vSphcre Client to connect to.
If the active node fails (because ofa hardware, sofiware, or network failure), the passive node
takes over the role of the active node. The IP address to which the vSphcrc Client was connected
is switched from the foiled node to the new active node. The new active node starts serving client
requests. Meanwhile, the user must log back in to the vSphere Client for continued access to
vCenter Server.
Because only two nodes are up and rutming, the vCenter Server High Availability cluster is
considered to be nmning in a degraded state and subsequent fo ilover cannot occur. A subsequent
failure. in a degraded c luster means vCenter Server services are no longer available. A passive
node is required to return the cluster to a healthy state.
240
Module 4: vCe nter Server
4-100
Scenario: Passive Node Failure
If the passive node fails, the active node continues to operate normally. However, the cluster is
considered to be running in a degraded state .
•
OB/Fiio ~eplicatlon
lf thc passive node fails, the active node continues to operate as normal. Bcc.ausc no disruption in
service occurs, users can continue to access the active node using the vSphere Client.
Because the passive node is down, the active node is no longer protected. The cluster is considered
to be running in a degraded state because only two nodes are up and ruru1ing. A subsequent failure
in a degraded cluster means vCenter Server services are no longer available. A passive node is
required to return the cluster to a healthy state.
Module 4: vCenter Server 241
4-101
Scenario: Witness Node Failure
If the \vilness node fails, the active node c-0ntinues to operate normally. However, the cluster is
considered to be running in a degraded state.
l
I
OB/Fi e Replication
The witness node is used to main1ain quorum.
lf the wi1ness node fails, the active node continues to operate without disruption in service.
Because only two nodes arc up and running, the cluster is considered to be running in a degraded
state and failover cannot occur. A subsequent failure in a degraded cluster means vCenter Server
services are 110 longer available. The witness node is required to retu1n the cluster to a healthy
state.
242
Module 4: vCenter Server
4-102
Benefits of vCenter Server High Availability
vCenter Server High Availability provides many benefits:
vCenter Server Appliance is made more resilient.
Protection against hardware, host, and application failures is provided.
Recovery occurs in minutes. End-to-end downtime is minimized.
Active-passive archttecture provides transparent failover:
- Recovery point objective: No data loss.
- Recovery time objective: Within minutes.
One-click automated high availability is set up.
Nodes can be geographically distant (less than 10 milllseconds latency).
No shared storage is required.
No third-party technologies are required.
Module 4: vCenter Server 243
4-103
vCenter Server High Availability Requirements
Component
Requirements
ESXI
VerslOn 6.0 or latl!tf
M1n1mumof three ESXt h0s1s is recommended
vCenter Server Appliance
VersK>n e 5 or later
Oeploymen1 su:e s.rnatl or larger ts required to meet the RTO
Enougll disk space to collect and store support bundles for all Lhrea nodes on
the active node.
Network connechv1ty
Network latency between the three nodes must be fess than 10 milliseconds
The vCen!er HA network ruust be on a ddfe1enl subnet than the management
netWOtk
L1cens1ng
A srn9le vCenter Server Standard hcense
For more information about the vCcnter Server High Availability requirements, sec vSphere
Availability at https:lldocs.vmware.comleniVMwarevSphere/7 .Olcom. vmware. vsphcre.avail.doclGUI D-63 F 45987 -8884-48 I 8-8872C9753 B2E02 I 5 .hun l.
244
Module 4: vCenter Server
4-104
Demonstration: Configuring vCenter Server High
Availability
Your instructor will run a demonstration.
Module 4: vCenter Server 245
4-105
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize the importance of vCenter Server High Availability
Explain how vCenter SeJVer High Availability works
Identify vCenter SeJVer High Availability requirements
246
Module 4: vCenter SeJVer
4-106
Virtual Beans: vCenter Server Maintenance and
Operations
As a Virtual Beans administrator, you plan to maintain vCenter Server and keep it up and running.
Virtual Beans Requirement
Back up \!Center Server data
monthly
Make vCenter Servet highly
avail.able.
ti.ionit0<vCentor Server regularly.
Plan
Use the VAMJto schedulemonthlybackupsofVCenter Server.
Because the NFS protocol is supported, you can use one of lhe NFS
filesystems in your data center to store the backups._
Configure vCenter Seiver Hjgh Availability to protect against vCenter
Sel'\ter failures.
Because recovery time is minimal you are confident that 99.99 percent
availability (downtime per year of 52.56 m1nutes) can be achieved
Use the VSphcre Client and VAMI daily to monitorVC:enter Serwr
health and perfortTiance.
Module 4: vCenter Server 24 7
4-107
Key Points
vCenter Seiver Appliance uses the Photon operating system and the PostgreSOL database.
You use the vSphere Cbent to connect to vCenter Server instances and manage vCenter Server
inventory obje<:ts.
A permission, defined in vCenter Seiver. gives one user or group a role (set of privileges) for a
selected obje<:t
You can use the vCenter Seiver Appliance Management lntelface to monitor appliance resource
use and pelform a file-based backup of the appliance.
vCenter Seiver High Availability is built in to vCenter Seiver Appliance and protects the appliance
from both hardware and software failures.
Questions?
248
Module 4: vCenter Server
Module 5
Configuring and Managing Virtual Networks
Module 5: Configuring and
Managing Virtual Networks
Module 5: Configuring and Managing Virtual Networks
249
5-2
Importance
When you configure ESXi networking properly, virtual machines can communicate with other virtual,
and physical, machines. In this way, remote host management and IP-based storage operate
effectively.
250
Module 5: Configuring and Managing Virtual Networks
5-3
Module Lessons
1. Introduction to vSphere Standard Switches
2. Configuring Standard Switch Policies
Module 5: Configuring and Managing Virtual Networks
251
5-4
Virtual Beans: Networking Requirements
Virtual Beans has the following requirements for its network infrastructure:
Use the existing VLAN infrastructure and create VLANs as needed for the vSphere environment.
Use the available bandwidth efficienUy:
- Infrastructure services must gel enough bandWidth.
- Infrastructure traffic should not interfere with the performance of business-critical and
nonbusiness-critical application traffic.
Avoid single points of failure.
As the Virtual Beans administrator. you must configure VSphere neti.vorking to meet these
requirements.
252
Module 5: Configuring and Managing Virtual Networks
5-5
Lesson 1: Introduction to vSphere Standard Switches
Lesson 1: Introduction to vSphere Standard
Switches
vmware·
Module 5: Configuring and Managing Virtual Networks
253
5-6
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify virtual switch connection types
Configure and view standard switch configurations
Distinguish between the features of standard and distributed switches
254
Module 5: Configuring and Managing Virtual Networks
5-7
About Virtual Switches
Virtual switches connect VMs to the physical network.
They provide connectivity between VMs on the same ESXi host or on d ifferent ESXi hosts.
They also support VMkemel services, such as vSphere vMotion migration, iSCSI . NFS, and access
lo the management network.
Module 5: Configuring and Managing Virtual Networks
255
5-8
Types of Virtual Switch Connections
A virtual switch has specific conne<;tion types:
VM port groups
VMkernel port: For IP storage, vSphere \/Motion migration, vSphere Fault Tolerance, vSAN,
vSphere Replication, and the ESXi management network
Uplink ports
Virtual Machine Port Groups
VMkernel Ports
Virtual Switch
Uplink Ports
The ESXi managemcn1 network port is a V1vfkcrncl port that connects to network or remote
services, including vpxd on vCenter Server and Vivi ware Host Client.
Each ESXi management network port and each VM kerncl port must i>c configured with its own fp
address, netmask, and gateway.
To help configure virtual switches, you can create port groups. A port group is a template that
stores configuration information to create virtual s witch ports on a virtual switch. VM port groups
connect \/Ms to one another with common networking properties.
VM port groups and VMkernel por!S connect to the outside world through the physical Ethernet
;\dapters thM are connected to the virtual switch uplink ports.
256
Module 5: Configuring and Managing Virtual Networks
5-9
Virtual Switch Connection Examples
More than one nehvork can coex.ist on the same virtual switch or on separate virtual swrtches.
MAN19cment
vSphere
vMotion
iSC$1
ISCSI
\Vhcn you design your networking environment, you can team all your networks on a s ingle
virtual switch. Alternatively, you can opt for multiple virtual switches, each with a separate
network. The decision partly depends on the layout of your physical networks.
For example, you might not have enough network adapters to create a separate virtual switch for
each network. instead, you might place your network adapters in a single virtual switch and isolate
the networks by using VLANs.
Because physical NI Cs are assii,'lled at tl1e virtual switch level, all ports and port groups that are
define-0 for a particular switch share the same hardware.
Module 5: Configuring and Managing Virtual Networks
257
5-10
About VLANs
ESXi supports 802.1 Q VLAN tagging.
Virtual switch tagging is one of the supported
tagging policies:
Frames from a VM are tagged as they exit
the virtual switch.
Tagged frames arriving at a virtual switch are
untagged before they are sent to the
destination VM.
VMkemel
The effect on performance is minimal.
1
ESXi provides VLAN support by assigning a
VLAN ID to a port group.
~°;gl
Physical S\vitch
----
Physical N!C
1
lillii vvv•I
~--
Trunk Port
mm
VLANs provide for logical groupings of switch ports. Al l virtual machines or ports in a VLAN
communicate as if they are on the same physical LAN segment. A VLAN is a software-configured
broadcast domain. Using a VLAN provides the following benefits:
•
Creat ion of logical networks that arc not based on the physical topology
•
Improved pe1formance by confming broadcast traffic to a subset of ports Oil a switch
•
Cost savings by partitioning the network without the overhead of deploying new routers
VLANs can be configured at the port group level. The ESXi host provides VLAN support through
v irrnal switch tagging, which is provided by giving a port group a VLAN ID. By default, a VLAN
ID is optional. T he VMkcmcl takes care of all tagging and untagging as the packets pass through
the virtual switch.
The port on a physical s witch to which an ESXi host is connected must be defined as a static trunk
port. A trunk port is a port on a physical Ethernet switch that is configured to send and receive
258
Module 5: Configuring and Managing Virtual Networks
packets ragged with a VLAN ID. No VLAN configuration is required in the Vl\1 . In fact, the VM
does not know that it is connected to a VLAN.
For more information abou1 how VLANs are implemented, see VMware knowledge base article
I003806 at hun://kb.vmw<1re.comlkbll 003806.
Module 5: Configuring and Managing Virtual Networks
259
5-11
Types of Virtual Switches
A virtual network supports standard and distributed switches. Both switch types are elastic: Ports are
created and removed automatically.
Standard switch·
Distributed sw~ch ;
- Virtl1al S\•1itch that is configured for a single
- Virtual switch that is configured for an
host.
entire data center.
- Up to 2,000 hosts can be attached to the
same distributed switch.
- The configuration is consistent across all
attached hosts.
- Hosts must either have an Enterpnse Plus
license or belong to a vSAN cluster.
260
Module 5: Configuring and Managing Virtual Networks
5-12
Adding ESXi Networking
You can add new standard sw~ches to an ESXi host or configure existing ones using the vSphere
Client or VMware Host Client.
- ...........
,
0..-......-
....
a"""-....
Cl··-·
Iii_
g ........
__
dt-111-Gl••'°"-
.
-
-
-......- ·....._
_ ... _
1- - 1
-·--····-,
...
___
.
---.......
-·~;-;:::
--- .....
--- ·-----·- __..____ _
-·--...
---·
.. ·------·
.....
---·-__
_
-·....... -..
·----------·
-
·.·.·1
~·-
._.
•
.:..:::")
...,
...
·------·· -·--....•.
Module 5: Configuring and Managing Virtual Networks
-
261
5-13
Viewing the Configuration of Standard Switches
In the vSphere Client, you can view a host's standard switch configuration by selecting Virtual
Switches on the Configure tab.
a--·aa-.u...-
-··--·___
..
~
.-·
--·
--
~-
-·
, ,_,,_..._....- - ..... .
........
[··-·"'..
·--""
-
....
-·-
i.-...
[,_.,.,_ I _;.J
._.,..,._
Q _ _ ...
~··
- · •.».'1:1..
!ii __••, .........
__-
[~, ~-..
<\•'< ,.
~··
•
..
.
,.
•
The slide shows the standard switch vSwitchO on the sa-csxi-01.velass.local ESXi host. By
default, the ESXi installation creates a virtual machine pott group named V~1 Network and a
VMkemel po11 named IV!anagement Network. You can create additional port groups such as the
Production port group, which you can use for the production virtual machine network.
For performance and security, you should remove the VM Network virtual mach.ine port group
and keep VM networks and management networks separated.
262
Module 5: Configuring and Managing Virtual Networks
5-14
Network Adapter Properties
The Physical adapters pane shows adapter details such as speed, duplex, and MAC address
selbngs.
Atthough the speed and duplex settings are configurable, the best practice is to leave the settings at
autonegotiate.
-
.
-~~.,... .
--..
----·
a---.
.
.
.
·-·-·-... -·- -.._
,,_
_,_ ·-·--·.. ...-·
·--··-·-·- ·-·-·- ·- ---.....-··•
-·_
---..
..
....
-----·-----.._.,,_
---- . -"----... _
-·
o--·~.....
=
,
•
~
•
...
.,_
.,_
You can change the connection speed and dup.lex of a physical adapter to 1ransfcr data in
compliance with the traffic rate.
If the physical adapter supports SR-IOV, you can enable it and configure the number of virtual
functions 10 use for vi1tual machine networking.
Module 5: Configuring and Managing Virtual Networks
263
5-15
Distributed Switch Architecture
Management
Port
11Sphere
vMotlon
Port
vSphere
VMotlon Port ~
Management
Port
Distributed Ports
and Port Groups
Distributed Switch
(Control Plane)
Uplink Port
G roup
Hidden Vlrtval
Switehes
{J/0 Plane)
Virtual
PhySiC-41 NICS
( Uplinks)
Host 1
Host 2
vCcntcr Server owns the configuration ofthc distributed switch. T he configuration is consistent
across a ll hosts that use the distributed switch.
264
Module 5: Configuring and Managing Virtual Networks
5-16
Standard and Distributed Switches: Shared Features
Standard and distributed s\v1tches have several features in common.
Featura
Standard Switch
Distributed Switch
Layer 2 swnch
Yes
IPl.6 support
Yes
Yes
Yes
NIC teaming
Yes
Outbound treffic$haping
Ye•
Yes
Yes
Yes
VLAN segmentii1t1on{802 10
~g91n9}
C1cso D1sc0Yery Protocol {CDPJ
Yes
Yes
Yes
Module 5: Configuring and Managing Virtual Networks
265
5-17
Additional Features of Distributed Switches
Distributed switches include several reatures that are not part of standard switches.
Featura
Standard Switch
01su-1butad Switch
lnb0<md tra~ s~aplng
No
No
Yes
VM netv1ork port bloc.It
Private VLANs
Load-based teaming
O.at,a center level management
vSphere vf\.1otion m191allon of virtual networking stale
PP.r por1 policy settings
NO
No
No
No
No
Yes
Yes
Yes
Yes
Yes
Ne!Flow
No
No
Yes
Yes
Yes
Port mirroring
No
Yes
Access to NSX-T port groups
No
NO
Yes
Yes
4
Pon .state morutoring of netwotk stahstlc$
Link Layer Olscoveiy Protocol (LLDP)
Duri ng a vSpherc vMotion migration, a distribuled switch tracks the virtual networking State (for
example, counters and pott statistics) as the virtual machine moves from host to host. The trncking
provides a consistent view of a virtual network interface, regardless of the virtual machine location
or vSphere v~1otion migration history. Tracking simplifies network monitoring and
troubleshooting activities where vSphere vl\l!otion is used to migrate virtual machines between
hosts.
266
Module 5: Configuring and Managing Virtual Networks
5-18
Lab 11: Using Standard Switches
Create a standard switch and a port group for virtual machines:
1. View the Standard Switch Configuration
2. Create a Standard Switch with a Virtual Machine Port Group
3. Attach Virtual Machines to the Virtual Machine Port Group
Module 5: Configuring and Managing Virtual Networks
267
5-19
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify virtual switch connection types
Configure and view standard switch configurations
Distinguish between the features of standard and distributed switches
268
Module 5: Configuring and Managing Virtual Networks
5-20
Lesson 2: Configuring Standard Switch Policies
Lesson 2: Configuring Standard Switch
Policies
vmware·
Module 5: Configuring and Managing Virtual Networks
269
5-21
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Explain how to set the security policies for a standard switch port group
Explain how to set the traffic shaping policies for a standard switch port group
Explain how to set the NIC teaming and failover policies for a standard switch port group
270
Module 5: Configuring and Managing Virtual Networks
5-22
Network Switch and Port Policies
Policies that are set at the standard switch level apply to all port groups on the standard switch by
defaull
Available network policies;
Security
Traffic shaping
Policy levels;
Standard switch level: Default policies for all
the ports on the standard switch.
Port group level: Effective policies defined at
this level override the default policies that are
NIC teaming and faUover
set at the standard switch level.
Networki ng security pol icy provi de$ protection again st MAC address i mpersonation and
llll\Vanted port scanni11g.
Traffic shaping is useful when you want to l i mit the amount of traffic 10 a VM or a group of VMs.
Use the teami ng and fai lover policy to determi ne the following in formation:
•
How the network traffic o f VMs and \/Mkernel adapters that are connected 10 the switch is
distributed be1ween physical adapters
•
How the craff'ic should be rerouted if an adapter fails.
Module 5: Configuring and Managing Virtual Networks
271
5-23
Configuring Security Policies
As an administrator, you can define security policies at both the standard switch level and the port
group level:
Promiscuous mode: You can aUo\v a virtual switch or port group to forward all traffic regardless of
the destination
MAC address changes: You can ae<:ept or reject inbound traffic when the MAC address is altered
by the guest.
Forged transmits: You can accept or reject outbound traffic when the MAC address Is allered by
the guest.
VM Network - Edtt Settings
.........
The network security policy contains the following exceptio ns:
•
Promiscuous mode: Promiscuous mode allows a virtual switch or port group to fo rward all
traffic regardless of their destinations. T he default is Reject.
•
lvlAC address changes: T he default is Reject. If this option is set to Reject and the guest
attempts to change the MAC address assigned to the virtual NIC, it stops receiving frnmes.
•
Forged transmits: A frame's source address field m ight be altered by the g uest and contain a
lv!AC add ress other than the assigned virtual NI C MAC address. Yo u can set the Forged
Transmits parameter to accept o r reject such fra mes. The default is Reject.
In vSphere 7, these security settings are set to Reject by defa ult.
In general, these policies give you the option of disallowing certain behaviors that might
compromise security. For example, a hacker m ight use a promiscuous mode device to capture
network traffic for unscrupulous activities. O r, someone might impersonate a node and gain
unauthorized access by spooling iis MAC add ress.
272
Module 5: Configuring and Managing Virtual Networks
Set Promiscuous mode. to Accept to use an application in a VM that analyzes or sniffs packets.
such as a network-based intrusion detection system.
Keep the l\•IAC addres s changes and Forged transmits set to Reject co help protect against
attacks launched by a rogue guest operating S)'Stem.
Set J\1AC address changes and Forged transmits to Accept if your applications change the
mapped tvfAC address, as do some guest operating system-based firewalls.
Module 5: Configuring and Managing Virtual Networks
273
5-24
Traffic-Shaping Policies
Network traffic shaping is a mechanism for limiting a virtual machine's consumption of available
network bandwidth.
Average rate, peak rate, and burst size a_re configurable.
Pebk Bbndwidth
Time
A virtual machine's network bandwidth can be controlled by enabling the network tra ffic shaper.
The network trnffic shaper, when used on a standard switch, shapes only outbound network traffic.
To control inbound traffic, use a load-balancing system or turn on rate-li miting features on your
physical router.
274
Module 5: Configuring and Managing Virtual Networks
5-25
Configuring Traffic Shaping
A traffic-shaping policy is defined by average bandwidth, peak bandwidth, and burst size. You can
establish a lraffio-shaping policy for each port group and each distributed port or distributed port
group:
Traffic shaping ls disabled by default.
Parameters apply to each virtual NIC 1n the standard s\vitch.
On a standard switch, traffic shaping controls only outbound traffic, that is, traffic traveling from the
VMs to the virtual switch and out onto the physical network.
VM Network - Edit Sen1ngs
Status
Ttamc~
• .,..., l:»atlmwitn (ldlll/s)
......-("""'•)
9lr-S1 srze (KB)
·~
En-•
-
~~~~~~~~~~~~
102400
-
The ESXi host shapes only outbound traffic by establishing parameters for the following traffic
characteristics:
•
Average bandwidth ( Kbps): Establishes the number or kilobits per second to allow across a
port, averaged over rime. The average bandwidth is the allowed average load.
•
Peak bandwidth (Kbps): The maximum number of kilobits per second to allow across a port
when it is sendi ng a burst of traffie. T his number tops the bandwidth that is used by a port
whenever the port is using the burst bonus that is configured using the Burst size pa.ramctcr.
•
Burst size (KB): The maximum number of kilobytes to allow in a burst. If this parnmeter is
ser. a port might gain a burst bonus if it docs not use all irs allocated bandwidth. \Vhcnevcr the
port needs more bandwidth than specified in the Average bandwidth field, the port might be
allowed to temporarily transmit data at a faster speed ifa burst bonus is available. T his
parameter tops the number of kilobytes that have accumulated in the burst bonus and so
transfers at a faster speed.
Module 5: Configuring and Managing Virtual Networks
275
Network traffic s haping is off by default.
Although you can establish a traffic-shaping policy at e ither the virtual switch level or the port
group level, settings at the pon group level override settings at the virtual switch level.
276
Module 5: Configuring and Managing Virtual Networks
5-26
NIC Teaming and Failover Policies
With NIC teaming, you can increase the network capacity of a vtrtual switch by including t\vo or more
physical N!Cs in a team.
----
_
... ...... __
___
......
,
..
-·-•
·-·
--
....
..
D
---------
--
-
~.pr.,..,..._.
---·--~·--
.........
"-'""'..,,~
......
---------· -
NlC teaming increases the network bandwidth of the switch and provides redundancy. To
determine how the traffic is rerouted when an adapter foils, you include physical NI Cs in a
failover order.
To determine how the virtual switch distributes the network traffic between the physical NICs in a
team. you select load-balancing a lgori thms depending on the needs and capabilities of your
environtnent:
•
Load-balancing policy: This policy determine.s how network traffic is distributed between tbe
network adapters in a NlC team. Virtual switches load balance only the outgoing traffic.
Incoming traffic is controlled by the load-balancing policy on the physical switch.
•
Failback policy: By default, a foilback policy is enabled on a N!C team. If a fuiled physical
NlC returns ooline, the virtual switch sets the NJC back to active by replacin g the standby
NIC that took over its s lot.
Module 5: Configuring and Managing Virtual Networks
277
If the physical NIC that stands first in the failover order experiences intermittent failures, the
fai lback policy might lead to frequent changes in the NIC that is used. T he physical switch
sees frequent changes in MAC addresses, and the physical switch port might not accept traffic
immediately when an adapter comes online. To minimize such delays, you might consider
changing the following settings on the physical switch.
•
Notify switches policy: IN ith this policy, you can determine how the ESXi host communicates
failover events. \\/hen a physical N IC connects to the virtua l switch or when traffic is rerouted
to a different physical NIC in the team, the virtual switch sends notifications over the network
to update the lookup cables on physical switches. Notifying the physical switch offers the
lowest latency when a failover or a migration with vSphere v!Vlotion occurs.
Default NIC teaming and failover policies are set for the entire standard switch. These default
settings can be overridden at tbe port group level. The policies show what is inheri ted from the
settings at the switch level.
278
Module 5: Configuring and Managing Virtual Networks
5-27
Load-Balancing Method: Originating Virtual Port ID
With the load-balancing method that is based on the originating virtual port ID, a virtual machine's
outbound traffic is mapped to a specific physical NIC.
--------.
...
"
"
II
I
I
I
I
~
:------ ---~----------:
I
I
I
I
I
I
I
I
I
r---------------•
•
..
""'""
NIC.
0
To play the animation, go to htqis://,•mwarc.bravais.com'sl7jEkuYvYOl70xc'v\lbmnnZ.
The load-balancing method that uses the originating virtual port ID is simple and fast and does not
require the VMkcmcl to examine the frame for the necessary information. T he Nl C is detcm1incd
by the LD of the virtual port to which the VM is connected. With this method, oo single-N!C VM
gets more bandwidth than can be provided by a single physical adapter.
This method has advantages :
•
Traffic is evenly distributed if the number of virtual NICs is greater than the number of
phys ical NICs in the team.
•
Resource consumption is low because, in most cases, the virtual switch calculates uplinks for
the V:t-1 only once.
•
No changes on tlie physical switch are required.
Module 5: Configuring and Managing Virtual Networks
279
This method also has disadvantages:
•
The virtual switch is not aware of the traffic load on the uplinks, and it does not load balance
the traffic to uplinks that are less used.
•
The ba.ndwidth that is available to a VM is limited to the speed of the upli nk tJ1at is associated
with the relevant port 10, unless the \ tM has more than one v.ir1 ual N IC.
280
Module 5: Configuring and Managing Virtual Networks
5-28
Load-Balancing Method: Source MAC Hash
For the load-balancing method based on source MAC hash, each virtual machine's outbound traffic is
mapped to a specific physical NIC that is based on the virtual NIC's MAC address.
-------.
l lf"
:
I
I
~
:-- ---- ~~----------:
I
I
I
I
I
I
I
I
I
••
"
,---------------+
•
VI'°""
NIC.
-
To play the animation, go to httPs:/lvmware.bravais.com/s/MmjsUVkaURaNJz\llnsao2.
The load-balancing method based on source MAC hash has low overhead and is compatible with
all switches, but it might not spread trnffic evenly across all the physical NI Cs. In addition, no
single-NJC virtual machine gets more bandwidth than a single physical adapter can provide.
This method has advantages :
•
VMs use the same uplink because the tvlAC address is static. Powering a Vtvl on or off does
not change the up lin k that the VM uses.
•
No changes on the physical switch are required.
Module 5: Configuring and Managing Virtual Networks
281
This method has disadvantages:
•
The bandwidth that is available to a VM is lim.ited to the speed oftbe uplink that is associated
with the relevant port ID, unless the VM uses multiple source MAC addresses.
•
Resource consumption is higher tban with a route based on the originating virtua l port
because the virtual switch calculates an uplink for every packet.
•
The virtual switch is not aware of the load of the uplinks, so uplinks might become
overloaded.
282
Module 5: Configuring and Managing Virtual Networks
Load-Balancing Method: Source and Destination IP
Hash
5-29
With the IP-based load-balancing method. a NIC for each outbound packet is selected based on its
source and destination IP addresses.
';Ill
- - - - - - -.
1111
:
r-·----4inr.,
T---------.
~•
I
I
I
I
I
I
I
I
-I
I
, _______________ ..,..
I
I
I
Virtue!
,.
1111
Virt'Jol
NIC.
Switch
A'l~iea!
..
Sw>d>
~
..,_ ,
....
~ !Cs
To play the animation, go to hups:/1Vmwarc.bravais.com/s155sfUlJvzGzuBG\VETPu9.
The LP-based method requires 802.3ad link aggregation support or EtherChmmel on the switch.
The Link Aggregation Control Protocol is a method to control the bw1dli ng of several physical
ports to fonn a single logical channel. LACP is part of the fEEE 802.3ad specification.
EtherChannel is a port tnmking teclmology that is used primarily on Cisco switches. With this
technology, you can group several physical Ethernet links to create one logical Ethernet link for
providing fault tolerance and high-speed links between switches, routers, and servers.
\Vith this method, a single-NIC virtual machine might use the bandwidth of multiple physical
adapters.
The IP-based load-balancing method only affects outbound traffic. For example, a VNI might
choose a particular NIC to communicate with a particular destination Vlvl. The return traffic might
not arrive on the same NIC as the outbound traffic. The return traffic might arrive on another NIC
in the same NIC ream.
Module 5: Configuring and Managing Virtual Networks
283
This method has advantages:
•
The load is more evenly distributed compared to the route based on the originating virtual port
and the route based on source MAC hash because the virtual s witch calc.ulates the uplink for
every packet.
•
VMs that communicate with multiple fp addresses have a p0tentially higher th.rougbput.
This method has disadvantages:
•
Resource consumption is the highest compared to the other load-balancing algorithms.
•
The virtual switch is not aware of the actual load of the uplinks.
•
Changes on the physical network are required.
•
The method is complex to troubleshoot.
284
Module 5: Configuring and Managing Virtual Networks
5-30
Detecting and Handling Network Failure
The VMkemel can use link status or beaconing, or both, to detect a netwol1< failure.
Network failure is detected by the VMkemel, which monitors the link state and performs beacon
probing.
The VMkemel notifies physical switches of changes m the physical location of a MAC address.
Failover is implemented by the VMkemel based on configurable parameters:
Fail back: How the physical adapter is returned to active duty after recovering from failure.
Load-balancing option: Use explicit failover order. Always use the vmnic uplink at the top of the
active adapter list.
Jvlonitoring the link status that is provided by the network adapter detects failures such as cable
pulls and physical switch power failures. This monitoring does not detect configuration errors,
such as a physical switch port being blocked by the Spanning Tree Protocol or misconfigured
VLAN membership. This method cannot detect upstream, nondirectly connected physical switch
or cable failtrrcs.
Beaconing introduces a 62-b)1e packet load approximate ly every 1 second per physical NlC.
When beaconing is activated, the Vlvlkemel sends out and listens for probe packets on all N!Cs
that arc configured as part of the team. This technique c.an detect failures that link-status
monitoring alone cannot. Consult your switch manufacturer to verify the support of beaconing in
your environment. fo r information on beacon probing, see VJvlware knowledge base article
I005577 at hllp://kb. \'!l1ware.comlkbl I005577.
A physical switch can be notified by the VMkemel whenever a virtual N\C is coonected to a
\rirtltal switch. A physic-al switcl1 c~1n also be notifie-<t whenever a failover eve11t ca11ses <t virtual
N!C's traffic to be routed over a different physical NlC. The notification is sent over the network
to update the lookup tables on physical switches. ln most cases, this notification process is
Module 5: Configuring and Managing Virtual Networks
285
beneficial because, without it, VMs experience greater latency a fter failovcrs and vSpherc
vtv!otion operation.
Do not set this option when the V~1s connected to the port group are running unicast-mode
Microsoft Network Load Balancing (NLB). NLB in multicast mode is unaffected. For more
information about tbe NLB issue, see VMware knowledge base article 1556 at
http://kb. vmware.comlkh/ I 556.
\Vhen using explicit failovcr order, always use the highest order uplink from the list of active
adapters that pass failover-detection criteria.
The fai lback option determines how a physical adapter is returned to active duty a ficr recovering
from a failure:
•
Lf Failback is set to Yes, the failed adapter is returned to active duty immediately on
recovery, displacing the standby adapter that took its place at the time of fa ilure.
•
I f Failback is set to No, a failed adapter is left inactive even after recovery, until another
currently active adapter fai ls, requiring its replacement.
286
Module 5: Configuring and Managing Virtual Networks
5-31
Physical Network Considerations
Your virtual networking environment relies on the physical ne1Wor1< infrastructure. As a vSphere
administrator, you should discuss your vSphere net\vorking needs with your networt< administration
team.
The follov11ng issues are topics ror discussion:
Number of physical switches
Ne1Wor1< bandwidth required
Physical switch configuration support ror 802.3ad, for NIC teaming
Physical switch configuration support for 802.10, for VLAN lagging
Physical switch configuration support ror linkAggregation Control Protocol (LACP)
Ne1Wor1< port security
Link Layer Discovery Protocol (LLOP) and Cisco Discovery Protocol (COP) and their operation
modes, such as listen, broadcast, listen and broadcast, and disabled
Module 5: Configuring and Managing Virtual Networks
287
5-32
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Explain how to set the security policies for a standard switch port group
Explain how to set the traffic shaping policies for a standard switch port group
Explain how to set the NIC teaming and failover policies for a standard switch port group
288
Module 5: Configuring and Managing Virtual Networks
5-33
Virtual Beans: Networking Requirements
As a Virtual Beans administrator, you have a few decisions to make about your network
Infrastructure.
As you plan your network, you consider these key takeaways about vSphere networking:
You must create port groups for the VLANs that you \Yant to use In your VSphere environment.
You can use NIC learning in the virtual switch to avoid a single point of failure.
You can separate infrastructure service traffic from your application traffic by putting each traffic
type on its own VLAN.
Segmenting traffic can improve performance and enhance security by limiting network access to a
specific traffic type.
You should research the benefits of using distributed switches 1n your environment. Distributed
S\Vitches have additional features over standard sv1itches.
Module 5: Configuring and Managing Virtual Networks
289
5-34
Key Points
Virtual switches can have the following connection types: VM port group, VMkernel port, and
physical uplinks.
A standard switch is a virtual switch configuration for a single host
Network policies set at the standard switch level can be overridden at the port group level.
A distributed S\Vitch provides centralized management and monitoring for the networking
configuration of all ESXi hosts !hat are associated with !he switch.
Questions?
290
Module 5: Configuring and Managing Virtual Networks
Module 6
Configuring and Managing Virtual Storage
Module 6: Configuring and
Managing Virtual Storage
Module 6: Configuring and Managing Virtual Storage 291
6-2
Importance
Under$tanding the available storage options helps you set up your storage according to your cost,
performance, and manageability requirements.
You can use shared storage for disaster recovery, high availability, and moving virtual machines
between hosts.
292
Module 6: Configuring and Managing Virtual Storage
6-3
Module Lessons
1. Storage Concepts
2. Fibre Channel Storage
3. iSCSI Storage
4. VMFS Oatastores
s. NFS Oatastores
6. vSAN Oatastores
Module 6: Configuring and Managing Virtual Storage 293
6-4
Virtual Beans: Storage
Virtual Beans Cllrrent storage infrastructure consists of NAS storage and iSCSI storage arrays.
Virtual Beans has the following goals for its storage infrastructure:
Run the production and development workloads on shared storage systems.
Use existing NAS and iSC·Sf storage arrays 1n the vSphere enVlronment.
These atTays are managed by the storage administrator at Virtual Beans.
Evaluate other options in vSphere 7 for cost-effective, high-performance storage.
As a Virtual Beans vSphere administrator, you must configure storage for use in the vSphere
environment and provide recommendations to management on other storage options in vSphere 7 .
294
Module 6: Configuring and Managing Virtual Storage
6-5
Lesson 1: Storage Concepts
Lesson 1: Storage Concepts
vmware·
Module 6: Configuring and Managing Virtual Storage 295
6-6
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize vSphere storage technologies
• Identify types of datastores
296
Module 6: Configuring and Managing Virtual Storage
6-7
About Datastores
A datastore is a logical storage unit that can use
disk space on one physical device or span
several physical devices.
Datastores are used to hold VM files. VM
templates, and ISO images.
vSphere supports the following types of
data stores:
VMFS
NFS
vSAN
v$phere Virtual Volumes
Host
Host
Datastore
A datastorc is a generic tcnn for a container that holds files and objects. Datastorcs are logical
containers, analogous to fi le systems, that hide the specifics of each storage device and provide a
uniform model for storing virtual machine files. A VM is stored as a set of files in its own
directory or as a group of objects in a datastore.
You can display all datastores that are 3\•ailable to your hosts and analyze their properties.
Module 6: Configuring and Managing Virtual Storage 297
6-8
Storage Overview
ESX1 hosts should be configured with shared access to datastores.
Virtual Disks
El lvMI (3
I111 0 111 I
1111
0
uq
BBB
EIBEi
1111
1111
l
l
Disk
LUN
LUN
Transport
111 1
pu o uq
1111
0
pu o uq
- -l -
oatastor'e Type
l
0
1 l
l
Bacl<Jng
LUN
Depending on 1he type of storage that you use, datastorcs can be format1cd with VMFS or NFS.
In the vSphere environment, ESXi hos1s support several storage technologies:
•
Direct-attached storage: Internal or external storage disks or arrays attached to 1he host
through a direct connection instead of a network connection.
•
Fibre Channel (FC): A high-speed transport protocol used for SANs. Fibre Channel
enc.apsula1es SCSI commands, which are transmitted bet,veen Fibre Channel nodes. In
general, a Fibre Channel node is a server, a storage system, or a 1ape drive. A Fibre Channel
switch interconnects multiple nodes, forming the fabric in a Fibre Channel network.
•
FCoE: The Fibre Channel traffic is encapsulated into Fibre Channel over Ethernet (FCoE)
frames. These FCoE frames are converged with other 1ypes of traffic on the Ethernet network.
•
iSCSI: A SCSI transport protocol, providing access to s1orage dcvicc.s and cabling over
standard TCP/IP networks. iSCSI maps SCS I block-oriented s1orage over TCP/IP. lnitia1ors,
298
Module 6: Configuring and Managing Virtual Storage
such as an iSCSJ hos! bus adapter (HBA) in an ESXi host, send SCSI commands lo carge1s,
localed in iSCSJ s1orage sys1ems.
•
NAS: Storage shared over standard TCP/rP nciworks at the file system level. NAS storage is
used 10 hold NFS dacastores. The NFS pro!ocol does no! suppor! SCSI commands.
•
iSCS.l, network-attached storage (NAS), and FCoE can nm over h.i gh-speed n.ciworks
providing increased storage performance levels and ensuring sufficient bandwidth. \Vith
sufficient bandwidth, multiple !ypcs of high-bandwidth protocol traffic can coexist on the
same network. r For more infonnation about physical NlC support and maximum ports
supported, see \tri...fv.tare Configuration f\'1axi1nums at l1rlps://conligmax.\ ttl\varc.cL)n1.
1
Module 6: Configuring and Managing Virtual Storage 299
6-9
Storage Protocol Overview
Each datastore uses a protocol with varying support features.
Oalastore 'type
Storage Protocol
Boot lrom
SAN
Suppon
vSphere
vMotton
Support
vSphere
HA
Support
vSphere
ORS
Support
VMFS
Fibre Channel
Ye•
Ye.;
Yes
v..
FCoE
Yos
Yes
Yes
y.,.
1SCSI
1SERINVM...0F (ROMA)
OAS (Sl\S, Sl\TA NVMe)
Yes
No
NIA
Yes
Yes
Yes
Yes
Yes
Yes
Yes·
NFS
FCIEthemet (•SCSI, NFS}
No
No
Yes
Yes
No
Yes
Yes
No
Yes
Yes
vSAN
No
Yes
Yes
Yes
NFS
vSphere Virtual
Volumes
VSAN Datas.tore
* Direct-attached storage (DAS) supports vSphere vMotion when combined with vSphere Storage
vMotion.
Direct-attached storage, as opposed to SAN storage, is where many administrators install ESXi.
Direct-attached storage is also ide.al for small environments because of the cost savings associated
with purchasing and managing a SAN. The drawback. is that you lose man)' or tbe fe:nures that
mak.e virtualizatioo a worthwhile investment, for example, balancing the work load on a specific
ESXi host. Direct-attached storage can also be used to store noncritical data:
•
CD/DVD ISO images
•
Decomn1issione.ct VMs
•
VM templates
300
Module 6: Configuring and Managing Virtual Storage
ln comparison, storage LUNs must be pooled and shared so that all ESXi hosts can access them.
Shared storage provides the following vSphere features:
•
vSphere vMotion
•
vSphere HA
•
vSphere DRS
Using shared SAN storage also provides robust features in vSphere:
•
Central repositories for Vlv! files and templates
•
Clustering ofVMs across ESXi hosts
•
Allocation o f large amounts (tcrabytes) o f storage 10 your ESXi hosts
ESXi suppot1s different methods of booting from tl1e SAN to avoid handling the maintenance of
additional direct-attached storage or if you have diskless hardware configurations, such as blade
systems. If you set up your host to boot from a SAN, your host's boot image is stored on one or
more LUNs in the SAN storage system. ~'hen the host starts, it boots from the LUN on the SAN
rather than from its direct-attached disk.
For ESXi hosts, you can boot from software iSCSI, a supported independent hardware SCSI
adapter, and a supported dependent hardware iSCSJ adapter. The network adapter must support
only the iSCSI Boot Finnware Table (iBFT) fonnat, which is a method of communicating
parameters about the iSCSI boot device to an operJting system.
Module 6: Configuring and Managing Virtual Storage 301
6-10
About VMFS
ESXi hosts support VMFSS and VMFS6:
Features supported by both VMFSS and
VMFS6:
- Concurrent access to shared storage
1-iost
- Dynamic expansion
- On-disk locking
Features supported by VMFS6:
- 4K native storage devices
'
r
l l
l l
r
- Automatic space reclamation
VMFS
DC'ltastore
Vl\1 FS is a clustered file system where multiple ESXi hosts can read and write to the same storage
device simultaneously. The clustered file system provides unique, vim1alization-based services:
•
Migrat ion of running VMs from one ESXi host to another without downtime
•
Automatic restarting of a foiled VM on a separate ESXi host
•
Clustering of VMs across various physical servers
Using VMFS, IT organizations can simpli fy VM provisioning by efficiently storing the entire VM
state in a central location. Multiple ESXi hosts can access shared VM storage concurrently.
The size of a VMFS datastore can be increased dynamically when VMs residing on the VlvlFS
datasrore are powered on and running. A VM FS datastore efficiently stores both large and small
files belonging LOa Vivi. A VMFS da1as1ore can support virtual disk tiles. A virtual disk lile has a
maximum of62 TB. A v·M·Fs datastorc uses subblock addressing to make efficient use of storage
for small files.
302
Module 6: Configuring and Managing Virtual Storage
VMFS provides block-level distributed locking to ensure that the same Vl\1 is not powered on by
multiple servers at the same time. If an ES Xi host fai ls, the on-disk lock for each VM is released
and \/Ms can be restarted on other ESXj hosts.
On the s lide, each ESXi host has two \/Ms running on it. The lines connecting the \/Ms to the VM
disks (VMDKs) are logical representations of the association and allo~tion of the larger \llv!FS
datastore. The Vlv!FS datastore includes one or more LUNs. The \llvls see the assigned storage
volume only as a SCSI target !Tom within the guest operating system. The \/!vi contents are only
files on the \llv!FS volume.
VMFS can be deployed on tl1ree kinds of SCSI-based storage devices:
•
Direct-attached storage
•
Fibre Channel storage
•
iSCSI storage
A virtual disk stored on a VMFS datastore always appears to the VM as a mounted SCSI device.
The virtual disk hides the physical storage layer rrom the \/M's operating system.
For the operating system in the VM, VMFS preserves the internal lilc system semantics. As a
result, the operating system running in the VM sees a native fi le system, oot VMFS. These
semantics ensure correct behavior and data integrity for applications running on the \/Ms.
Module 6: Configuring and Managing Virtual S torage 303
6-11
About NFS
NFS is a file-sharing protocol
that ESXi hosts use to
communicate with a network·
attached storage (NAS) device.
NFS supports NFS 3 and 4.1
over TCP/IP,
Host
Host
l
l
1
L
1
l
NFS
Datastore
NAS is a specialized storage device that connects 10 a network and can provide fi le access services
to ESXi hosts.
NFS datastores arc treated like VMFS datastores because they can hold VM files, templates, and
JSO images. In addition, Ii.kc a VMFS datastore, an NFS volume allows the vSphere vMotion
migration ofVMs whose files reside on an NFS datastore. The NFS client built in to ESXi uses
NFS protocol versions 3 and 4. 1 to communicate with the NAS or NFS servers.
ESXi hosts do not use the Network Lock Manager protoc.ol, which is a standard protocol that is
used to support the file locking of NFS-mounted fi les. VMware has its own locking protocol. NFS
3 locks are implemented by creating lock files on the NFS server. NFS 4.1 uses server-side file
locking.
Because NFS 3 and NFS 4.1 clients do not use the same locking protocol, you cannot use different
NFS versions to mount the same datastore on multiple hosts. Ac.cessing the same virtual disks
from two incompatible clients might result in incorrect behavior and cause data corruption.
304
Module 6: Configuring and Managing Virtual Storage
6-12
About vSAN
vSAN is hypervisor-converged, software-defined
storage for virtual environments that does not
use traditional external storage.
By clustering host-attached hard disk drives
vSAN
(HDDs) or solid-state drives (SSDs), vSAN
creates an aggregated datastore shared
by
VMs.
vSphere
l
l
o "'11111 o
1111
3·64
l
11111111
o
"'I
:- ~ - ~ - ~:
I
t
I
HOO/FlbSh/SSO
------------------------
!
I~ '
I
\Vhen vSAN is enabled on a cluster, a single vSAN dalastore is created. This datastore uses the
storage components of each host in the cluster.
vSAN can be configured as hybrid or all-tlash storage.
In a hybrid storage arch itec1ure, vSAN pools server-attached HDDs a11d SSDs to create a
dis1ribu1ed shared da1as1ore. This darascore abstracts the storage hardware to provide a software defincd storage tier for VMs. flash is used as a read cache/write buffer to accelerate pcrfom1ancc,
and magnetic disks provide capacity and persistent data storage.
Altemately, vSAN can be deployed as an all-Aasb storage architecture in which nash devices are
used as a write cacbe. SSDs provide capacity, data persistence, and consistent, fast response times.
In the all-Aasb architecture, the tiering of SSDs results lo a cost-effective implementation: a writeintensive, enterprise-grade SSD cache tier and a read-intensive, lower-cost SSD capacity tier.
Module 6: Configuring and Managing Virtual Storage 305
6-13
About vSphere Virtual Volumes
vSphere Virtual Volumes provides several
functionalities:
Native representation or VMDKs on
SAN/NAS: No LUN s or volume management
• Works with existing SAN/NAS systems
A new control path for data operations at the
VM and VMDK level
Snapshots, replications, and other operations
at the VM level on external storage
BBBBBB
YSph~e
1111
0
11111111
11111111
0
0
Replication
snapshots
' ·'JI''*
Encryption
8
I\
.c
6
vSphcre Virtual Volumes virtualizcs SAN and NAS devices by abstracting physical hardware
resource.s into logical pools of capacity.
vSphere Virtual Volumes provides the following benefits:
•
l-0\ver storage cost
•
Reduced storage management overhead
•
Greater scalability
•
Better response to data access and analytical requirements
306
1111
•&•&QllJ;a.1
Automates control of per·VM service levels
by using storage policies
Standard access to storage with the vSphere
AP\ for Storage Awareness protocol endpoint
Storage containers that span an entire array
Virtual Volumes
Module 6: Configuring and Managing Virtual Storage
6-14
About Raw Device Mapping
Virtual Disk
Although not a datastore, ra\v
device mapping (ROM) gives a
ROM
~ ~
VM drrecl access to a physical
.
•
LUN.
The mapping file (- rdm . vmdk)
that points a VM to a LUN must
be stored on a VMFS datastore.
c
.vmdk
c
· r<fm.vmc::Jk.
·rlot.vmdk
'
VMFS or NFS
.vmdk
Raw UJN
L·
I
VMFS
NTFS/ext4
Raw device mapping (RDM) is a file stored in a VlvlFS volume that acts as a proxy for a raw
physical device.
Instead of storing Vivi data in a virtual disk file that is stored on a VMFS datastore, you can store
the guest operating system data directly on a raw LUN. Storing the data is usetirl if you run
applications in your \/Ms that must know the physical characteristics of the storage device. By
mapping a raw LUN, you can use existing SAN commands to manage storage for the disk.
Use RD!vl when a VM must interact with a real disk on the SAN. This condition occurs when you
make disk array snapshots or have a large amowlt of data that you do not want to move onto a
virtual disk as a part of a physical-to-virtual conversion.
Module 6: Configuring and Managing Virtual Storage 307
6-15
Physical Storage Considerations
Before implementing your vSphere environment, discuss the storage needs with your storage
administration team. Consider the following factors:
LUN sizes
1/0 bandwidth required by your applications
110 requests per second that a LUN is capable of
Disk cache parameters
Zoning and masking
Mull1pathing setting for your storage arrays (active-active or active-passive)
Export properties for NFS datastores
For information to help you plan for your s1orage needs, sec vSplrere Storage at
https:l/docs. \ llll\\ra re.comleni \l M\vare-\o·Snhere/ 7.()/co111.\tJll\\'a re. \:spl1ere.storage .doc/LI U ID-
8A E88758-20C 1-4873-99C7- I 8 I EF9J\CFA 70,html.
http:-i:!/,foes. \ '111\\ arc.C<lmlcniVM \Vare-vS1lhCrc/ 7.()/con1. \ 1111\1\ra rc . v"iphcre .stor<1g..: .clc>c/GU I 1)-
8A E88758-20C 1-4873-99C7- 18 I EF9J\CFJ\ 70.html Another good source of information is the
\ 1Sphe.re Stor•1ge page at https://sltlr..1gel1ub.\'lll\\'are.cor11/ .
308
Module 6: Configuring and Managing Virtual Storage
6-16
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize vSphere storage technologies
• Identify types of datastores
Module 6: Configuring and Managing Virtual Storage 309
6-17
Lesson 2: Fibre Channel Storage
Lesson 2: Fibre Channel Storage
vmware·
310
Module 6: Configuring and Managing Virtual Storage
6-18
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe uses of Fibre Channel with ESXi
Identify Fibre Channel components and addressing
Explain how multipathing with Fibre Channel worl<s
Module 6: Configuring and Managing Virtual Storage 311
6-19
About Fibre Channel
Fibre Channel stores VM files remotely on a
Fibre Channel SAN.
A Fibre Channel SAN is a specialized high·
speed network that connects your hosts to high-
performance storage devices.
The networl< uses the Fibre Channel protocol to
transport SCSI traffic from VMs to the Fibre
Channel SAN devices.
ESXi supports:
32 Gbps Fibre Channel
• Fibre Channel over Ethernet (FCoE)
To connect to the Fibre Channel SAN, your host should be equipped with Fibre Channel host bus
adapters (HBAs).
Unless you use Fibre Channel direct connect storage, you need Fibre Channel switches to route
storage traffic. lf your host cootai.ns FCoE adapters, you can connect to your shared f ibre Channel
devices by using an Ethen1et network.
In this configuration. a host connects to a SAN fabric, which consists o f Fibre Channel switches
and storage itrrays, using a Fibre Cha11nel adapter. LUNs fro111 a storJge arnty become available to
the host. You can access the LUNs and create datastores for your storage needs. These datastores
use the VMFS format.
Alten1atively, you can access a storage array that supports vSpbere Virtual Vol umes and create
vSphere V irtual Volumes datastores on the array's storage containers.
312
Module 6: Configuring and Managing Virtual Storage
6-20
Fibre Channel SAN Components
A SAN consists of one or more servers that are attached to a storage array using one or more SAN
switches.
Oisk Arrr:1
Stor.:ig-ct System
Physical H ard Oisks
LUN$ (logi~ un.it
numbers)
SPS (Slor.:19e
processors)
FC S"'ltcl\
~•c_{F_;_•_~_
c_••_f"bric'"
•_••_'>~~~~~--<[
_ •witd'los
"tho
Serve-rs \\'Ith Host
Bus Ad~ptor$
.....
Each SAl'I/ server might host numerous applications that require dedicated storage for applications
processing.
Module 6: Configuring and Managing Virtual Storage 313
The following components are involved:
•
SAN switches: SAN switches connect various el.cments of the SAN. SAN switches might
connect hosts to storage arrays. Using SAN switches, you can set up path redundancy to
address any path failures from host server to switch, or from storage array to switch.
•
Fabric: The SAN fabric is the network pon ion of the SAN. When one or more SAN switches
are connected. a fabric is created. The Fibre Channel (FC) protocol is used to communicate
over the entire network. A SAN can consiscof multiple interconnected fabrics. Even a simple
SAN ofien consiscs of two fabric.s for redundancy.
•
Connections (HBAs and storage proc.essors): Host servers and storage systems are connected
to the SAN fabric through pOrlS in the fabric:
A host c.onnects to a fabric pot1 through an HBA.
Storage devices connect to the fabric pons through their storage processors.
314
Module 6: Configuring and Managing Vir1ual Storage
6-21
Fibre Channel Addressing and Access Control
Disk Array
WWN (World W ide
Name):
Unique. 64· blt
11
0
§
address assigned to
fibre channel node.
12
LUNs
§§
i
S0:06:01:60 :10!.20:AD-:87
LUN masking:
Zoning:
Done at switch level,
used to segment the
fabric.
21 :00:00:E0 :88~19: AB:31
FC Switch
Done at SP 0( server
level and makes a
LUN invisible when
a target is scanned.
21!00!00~ E0 :88:19: B 2~33
A port connects from a device into 1he SAN. Each node in the SAN includes each host, storage
device, and fabric component (router or swi1ch). Each node in the SAN has one or more ports that
connec1 it 10 the SAN. Ports can be identified in the following ways:
•
\Vorld \\fide Port Name (\\/\VPN): A globall y unique idcn1ifier for a port 1haLallows certain
applications to access the port. The Fibre Channel switches discover the \V\VPN of a device
or hos1and assign a port address to the device.
•
PortJD: \Vithfo SAN, e<.ch port has a unique port JD that serves as the f ibre Channel address
for that port. The Fibre Channel switches assign the port ID when the device logs in to the
fabric. The port ID is valid only while the device is logged on.
You can use zoning and LUN masking to segregate SAN activity and restrict access to storage
devices.
You can protect access to storage in your vSphere environment by using zoning and LUN masking
with your SAN resources. For example, you might manage zones defined for testing
Module 6: Configuring and Managing Virtual Storage 315
independently within the SAN so that they do not interfere with activity in the production zones.
Similarl y, you might set up different zones for different depanmeots.
\Vhen you set up zones, consider host groups that are set up on the SAN device.
Zoning and masking capabilities for each SAN switch and disk array, and the tools for managing
LUN masking, are vendor-specific.
See your SAN vendor's doctunentation and vSphere Storage at
https:/l<locs.\ 111\\·al'e.co111/en/ V M\\'are-\'Sflhcre/7.0/coni. \ 111\\ :.J.rc. vspl1ere.storage.d<.'lc/G lJID1
1
1
8AE88758-20C 1-4873-9QC7- 18 I EF9ACFA 70.htinl.
316
Module 6: Configuring and Managing Virtual Storage
6-22
Multipathing with Fibre Channel
Disk Array
Multipathing is having more than one path from
a host to a LUN. Multipathing provides the
following functions·
Continued access to SAN LUNs if hardware
fails
Load balancing
Host
Host
A Fi bre Channel path describes a route:
•
From a specific l{BA port in the host
•
Through the switches in the fabric
•
lnto a specific storage port on the storage anay
By default, ESXi hosts use onl y one path from a host to a given LUN at any one time. If the path
actively being used by the ESXi host fails, the server selects another avai lable path.
The process of detecting a failed path and switchi ng to another i s called path failover. A path fails
if any of the components along the path (HBA. cable, switch port, or storage processor) fail.
Module 6: Configuring and Managing Virtual Storage 31 7
Distinguishing between active-active and active-passive disk arrays can be useful:
•
A11 active-active disk array allows access to the LUNs simultaneously through the available
storage processors without signific.ant performance degradation. All the paths are active at all
times (unless a pa1h fai ls).
•
In an active-passive disk array, one storage processor is actively servicing a given LVN . The
other storage processor acts as a backup for the LUN and might be actively servicing other
LUN 1/0.
1/0 can be sent only to an active processor. If the primary storage processor foi ls, one of the
secon(tary storage processors be.co111es acti,,e~ either auto111aticalJy or tJyough ad1r1i11istrative
intervention.
318
Module 6: Configuring and Managing Virtual Storage
6-23
FCoE Adapters
If your host contains FCoE adapters, you can connect to your shared Fibre Channel devices
by using
an Ethernet network.
Mardw:ito FCoE
filt'l9>1~ IP Fr•m••
to LAN Otvlce5
Softwaro FCoE
F<; F1fmtt; 10 FC
StOl'i19@Attay&
The Fibre Channel traffic is encapsulated into FCoE frames. These FCoE frames arc converged
with other types of traffic on !lie Ethernet network.
\Vhen both Ethemct and Fibre Channel traffic are c.arricd on the same Ethcmet link, use of the
physical infrastrocturc incre,1scs. FCoE also reduces the total number of network ports and
cabling.
Module 6: Configuring and Managing Virtual Storage 319
6-24
Configuring Software FCoE: Creating VMkernel Ports
Step 1: Connect the VMKemel to the physical FCoE NICs that are installed on your host:
The VLAN ID and the priority class are
d iscovered during FCoE initialization. The
priority class is not configured 1n vSphere.
ESXi supports a ma~i mum of lour networlc
adapter ports for software FCoE.
F>hy~tt1! Jld11~er.
vmnioc2
VMl<'eo1twl !.ab~I : FCoE·2
Vt.AN ID: 20
IP !ldclr~,, ; 1n.17.12.1SO
Subnet maU:: 25S.2SS.255.0
VMkornol Port
..
vSpherG
Virtual Sv11tch
vmnk:2
320
M odule 6: Configuring and Managing Virtual Storage
l
CJ
, ..........
NIC with
FCoE Support
6-25
Configuring Software FCoE: Activating Software FCoE
Adapters
Step 2: Add the .software FCoE adapter and configure it as needed.
--·-·-·-- . ·-
...
Storage Adapters ~--~------------~
I~--- F* Add sottw.vo ~Mor
......... "
o --01-1ou
•
.....,
·=~!.<-'·-~
·-
'"1
· -1'111(,1--);~
•
- --=~
•
·----------·-------·-
--
-~----
•
·-·-·
......
-
You add the software FCoE adapter by selecting the host, clicking the Configure tab, selecting
Storage Adapters, and c licking Add Software Adapter.
Module 6: Configuring and Managing Virtual Storage 321
6-26
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe uses of Fibre Channel with ESXi
Identify Fibre Channel components and addressing
Explain how multipathing with Fibre Channel worl<s
322
Module 6: Configuring and Managing Virtual Storage
6-27
Lesson 3: iSCSI Storage
Lesson 3: iSCSI Storage
vmware·
Module 6: Configuring and Managing Virtual Storage 323
6-28
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify uses of IP storage with ESXi
Desclibe iSCSI components and addressing
Configure iSCSI initiators
Recognize storage device naming conventions
324
Module 6: Configuring and Managing Virtual Storage
6-29
iSCSI Components
An iSCSI SAN consists of an iSCSI storage system, which contains LUNs and storage processors.
Communication between the host and storage array occurs over a TCP/IP network.
iSCSI StOfa.QO Syrtom
[fr] [fr] [fr][fr][fr]~[fr]
PhySical Hafd DiSk.s
I
I
I
I
I
I
I
888
1..UN&
S1or.190 Procossors
~-r_c_P_11_P_"_••_w_••_•~~~~~-tc:
S.rvers with lSCS I
tnltia.tofS (H.ardwa..e- 01
Si;iftw,.r9)
An iSCS I SAN consists of an iSCSl storage system, which contains one or more lUNs and one or
n1ore storage-processors. Con1n1l1nicatio11 be-t\ve.en the l1ost an<t the st.0~1ge atTit)' occurs 0\1er a
TCP/IP network.
The ESXi host is confi gured with an iSCSI in itiator. An initiator c.a n be hardware-based, where
!he initiator is an iSCSI HBA. Or the initiator can be software-based, known as the iSCSI software
initiator.
An initiator transmits SCSI commands over the n> network. A target receives SCSI commands
from the JP network. Your iSCSI network can include multiple initiators and targets. iSCSl is
SAN-oriented for the following reasons:
•
The initiator finds one or more targets.
•
A target presents lUNs to the initiator.
•
The initiator sends SCSI commands to a target.
Module 6: Configuring and Managing Virtual S torage 325
An initiator resides in 1hc ESXi host Targets reside in the sioragc arrays 1ha1arc supported by the
ESXi host.
To res1rict access 10 targets from hosis, iSCSI arrays can use various mechanisms, including IP
address, subnets, and authentication requirements.
326
Module 6: Configuring and Managing Virtual Storage
6-30
iSCSI Addressing
0 1Sk AfrbY
iSCSI target l\&t'l"IO:
iqn. 1992-08.com.mycompany:storL-47cf3G2S
0,
0
11
12
eui.fedcba9876543210
iSCSI alias: storl
IP ad dress: 192.168.36. 10 1
iSCSI initiator name:
i(ln, 1998· 0 1.com. vmware:train 1•64ad4c29
0'
eul.1234 5-67890abcdet
iSCSI alitis: train!
IP oddrO$$: 192. 168.36.88
Host
The main addressable. discoverable entity is an iSCSl node. An iSCSI node can be an initiator or a
target. An iSCSl node requires a name so that storage can be managed regardless of address.
The iSCS I name can use one of rhc following formats: The iSCSI qualified name (IQN) or the
extended unique identifier (EUI).
The !QN can be up to 255 characters long. Several naming conventions are used:
•
Prefix iqn
•
Date code specifying t.he year and month in which the organization registered the domain or
sub(to111ain na111e that is use<t as the na1ni11g authority string
•
Organizational naining authority string, which consists of a valid, reversed domain or
st1b(ton1ain O(Lt11e
•
(Optional) Colon(:), followed by a string of the assigning organiz.1tion's choosing, which
must make each assigned iSCSI name unique
Module 6: Configuring and Managing Virtual Storage 327
EU! naming conventions are as follows:
•
Prefix is eui.
•
A 16-character name follows the prefix.
The name includes 24 bits for a company name that is assigned by the IEEE and 40 bits for a
unique ID, such as a serial number.
328
Module 6: Configuring and Managing Virtual Storage
6-31
Storage Device Naming Conventions
Storage devices are Identified in several ways.
Runtime name. Uses the vmhbaN:C:T:L convention. This name ts not persistent through reboots .
Target: Identifies ll1e iSCSI target address and port.
LUN: A unique identifier designated to individual or collections or hard disk devices. A logical unit is
addressed by the SCSI protocol or SAN protocols that encapsulate SCSI, such as iSCSI or Fibre
Channel.
St0<age Adapte<S
.
.
.
r+- ..."'"- ra-
-... -·-·- -·-· ----·-~
, __
.
_,..,....._ , _
,_,
""'
..........
Q*~(l!oo\--
• _,..... ... -nn....~c.c.e-..
~
~
-
-
·
~a.-,,
•
...1c.a._,.
---..... . ·--
·-~-·nc ••••D>,llJ~
~-"
--~·)
-~-.....-•IJliCIG.t
-·.::.~~
...-.....,-......
... -
.." ' f - - t t ? J O e t
~'O•f'-1 I
: :m••t-
•
f'la>~I
.
~.
~.
•
•'
;
• •
• •
• .
,._. ·-
,..,_....,,......,. ...,.__._,.
·-
. •
~(
...-1.orn•~
• '"
•
•
•
•
•
•
-
-.- ... .
··-·-·-· ·· -~
;.
{
.
On ESXi hosts, SCSI storage devices use various identifiers. Each identifier serves a specific
purpose. For example. the VMkernel requires an identifier, generated by the storage device, which
is guaranteed to be unique to each LUN. If the storage device cannot provide a unique identifier,
the VMkernel must generate a unique identifier to represent each LUN or disk.
The following SCSI storage device identifiers arc available:
•
Runtime name: The name of the first path to the device. The runtime name is a user-friendl y
name that is created by the host after each reboot. It is not a reliable identifier for the disk
device be.cause it is not persistent. The runtime name might change if you add H"BAs to the
ESXi host. However, you can use this name when you use command-line utilities to interact
with storage that an ESXi host rccognize.s.
•
iSCSI name: A worldwide unique name for identifying the node. iSCSI uses the JQN and
EUI. IQN uses the format iqn . yyyy- mm . naming -authority : unique name.
Storage device names appear in various panels in the vSphere Client.
Module 6: Configuring and Managing Virtual Storage 329
6-32
iSCSI Adapters
You must set up software or hardware iSCSI adapters before an ESXi hosl can work wilh iSCSI
storage.
To access iSCSI targets, your host uses iSCSI fnitiators.
1SCSJ lr.IN!l !)I"
!SCSI H8A d"""f
lCP/IP
'WIC Drivel'
NIC
''"~!•
•ntl.'.;
•'!
LUii
Host
HOS!
Host
Software ISCSJ
Dependent HardWllre tSCSJ
lndependcnt Hardware 1SCSJ
The iSCSI initiators transport SCSI requests and responses, encapsulated in the iSCSI protocol,
between the host and the iSCSI target. Your host supports two types of initiators: software iSCSI
and hardware iSCSI.
A software iSCS.I initiator is VMware code buil t in to the VMkernel. Using the initiator. your host
cim connect to the iSCSl storage device through s tandard network adapters. The software iSCSl
initiator handles iSCSI processing while communicating with the network adapter. With the
software iSCSJ initiator, you can use iSCSJ technology without purchasing specia lized hardware.
A hardware iSCS I initiator is a specialized third-party adapter capable of accessing iSCSl storage
over TCP/IP. Hardware iSCSl initiators are d ivided into two categories: dependent hardware
iSCSI and independent hardware iSCSI.
A dependent hardware iSCSI initiator, also known as an iSCSI host bus adapter, is a s~~ndard
network adapter that includes the iSCS I offload function. To use this type of adapter, you must
configure networking for the iSCSI traffic and bind the adapter to an appropriate VMkemel iSCSJ
port.
330
Module 6: Configuring and Managing Virtual Storage
An independent hardware iSCSI adapter handles all iSCSI and ne1work processing and
management for your ESXi host. Ln rb.is case, a Vt-1kernel iSCSJ port is 001 required.
For configuration informa1ion, see vSphere Storage at https://docs., mware.comleniVMwarcvSphcre/7 .Olcom.vmwarc. vsphcrc.>1omgc.doc/G LI D-8AEX8758-20C1-4871-99(' 7•
181 EF9ACFi\ 70.hlml.
Module 6: Configuring and Managing Virtual Storage 331
6-33
ESXi Network Configuration for IP Storage
A VMkemel port must be created
for ESX1 to access software
iSCSI. The same port can be
used to access NAS and NFS
storage.
To optimize your vSphere
networking setup, separate
iSCSI networ1<s from NAS and
NFS networks:
Physical separation is
preferred.
If physical separation is not
possible, use VLANs.
---..
---...
-------
-
....,
_____ _
·--- -···- ... . ...... - ·.-- ... -·-- ............. ...
--·
_.,,_ ...
9 .. ,.,..
•
•_,,_
••
,
"''
..._)W,.
~
t----·
--·---""
·-·-~-
•
Networking configuration for software iSCSI involves creating a VMkemel port on a virtual
switch to handle your iSCSl traffic.
Depending on the number of physical adapters that you want to use for the iSCSJ traffic, the
networking setup can be different:
•
If you have one physical network adapter, you need a \fMkemel port on a vi.rtual switch.
•
If you have two or more physical network adapters for iSCSJ, you can use these adapters for
host-based multipathing.
For performance and security, isolate your iSCSJ network from other networks. Physically
separate the networks. If physically separating the networks is impossible, logically separate the
networks from one another on a single virtual switch by configuri ng a separate VLAN for each
netv.1ork.
332
Module 6: Configuring and Managing Virtual Storage
6-34
Activating the Software iSCSI Adapter
To add the software iSCSI adapter:
1. Select the host and click the Configure tab.
2. Select Storage Adapters and click Add Software Adapter.
--... .
------·-_,
L··· -
You must activate your so ftware iSCS I adapter so that your host can use it to access iSCSI
storage.
You can acrivate only one software iSCSI adapter.
NOTE
If you boot from iSCSI using the software iSCSI adapter, the adapter is enabled, and
the network configuration is created at tlie first boot. If you disable the adapter, it is
reenabled each time you boot the host.
Module 6: Configuring and Managing Virtual Storage 333
6-35
Discovering iSCSI Targets
The iSCSI adapter disc-Overs storage resources
on the network and determines which resources
iSCSI Storage
are available for access.
An ESXi host supports the following discovery
methods:
• Static
• Dynamic or Sendlargets
The Sendlargets response returns the ION and
all available IP addresses.
Host
------··
---..------ ........
......... ..·-_
__
...-
------"
-·-.....--··-·-
...
......
,.._
The ESXi host supports the following iSCS I target-discovery methods:
•
Static discovery: The initiator does not have to perform discovery. The initiator knows in
advance all rhe targets that it will contact. It uses their IP addresses and domain names to
communicate with them.
•
Dynamic discovery or SendTargets discovery: Each time the initiator contacts a specified
iSCSI server, it sends the SendTargets request to the server. The server responds by supplying
a list of available targets to the initiator.
The names and rP addresses of these targets appc.ar as static targets in the vSphere Client. You
can remove a static target that is added by dynamic discovery. If you remove the target, the
targec might be returned to the list during the next rescan operation. The target might also be
returned to the list if the HBA is reset or the host is rebooted.
334
Module 6: Configuring and Managing Virtual Storage
6-36
iSCSI Security: CHAP
iSCSI initiators use CHAP for authentication
purposes.
By default, CHAP is not configured.
ESXi supports two types of CHAP
authentication:
• Unidirectional
· Bidirectional
ESXi also supports per-target CHAP
authentication.
--- ·-·--· __ --· ---· __
-·- --·· -·- ,,
,
.......
~
vmhb065 · Edit Authcnuc.atlon
___ ...... --
n. -~-----,.. .... ....,.... ....
""'
"'___ °' ..... OW."t °"""' . . . . ."'"'
_ ........
- ··-
---
°'""""00.-Cl_.....,__°""I~,,.~
..,,,...........,ow-~"""'"
~--
CAll(.Q
. .
You can implement CHAP to provide authentication between iSCSf initiators and targets.
ESXi supports the following CHAP authentication methods:
•
Unidirectional or one-way CHAP: The target authenticates the initiator, but the initiator does
not authenticate the target. You must specify the CHAP secret so that your initiators can
access the target.
•
Bidirectional or mutual CHAP: 'i\lith an extra level of security, the initiator can authenticate
the target. You must specify different target and initiator secrets.
CHAP uses a three-way handshake algorithm to verify the identity of your host and, if applicable,
of the iSCSl target when the host and target establish a connection. The verification is based on a
predefined private value, or CHAP secret, that the initiator and target share. ESXi implements
CHAP as defined in RFC 1994.
Module 6: Configuring and Managing Virtual S torage 335
ESXi supports CHAP authentication at the adapter level. All targeis receive the same CHA P secret
from tbe iSCS! initiator. For both software iSCS I and dependent hardware iSCSI in.itiators, ESX i
also supports per-target CHAP authentication.
Before configuring CHAP, check whether CHAP is enabled at the iSCS I storage system and check.
the CHAP authentication method that the system supporlS. If CHAP is enabled, you must enable it
for your initiators, ''e1ifying that the CHAP authentication credentials match the credentials on the
iSCSI storage.
Using CHAP in your iSCSI SAN implementation is recommended, but consult with your ston1ge
vendor to ensure that best practices are followed.
You can protect your data in additional ways. For example, you might protect your iSCSI SAN by
giving it a dedicated standard switch. You might also configure the iSCSI SAN on its own VLAN
to improve performance and security. Some inline network devices might be implemented to
provide encryption and fiu1her data protection.
336
Module 6: Configuring and Managing Virtual Storage
6-37
Multipathing with iSCSI Storage
Software or dependent hardware
!SCSI uses multiple NICs:
iSCSIS~•
Each NIC is connected to a
separate VMkemel port.
Each VMkernel port binds with
the iSCSI initiator.
Independent hardware iSCSI
uses two or more hardware
iSCSI adapters.
\Vhen setting up your ESXi host for multipath.ing and failover. you can use multiple hardware
iSCSI adapters or multiple NICs. The choice depends on the type of iSCSI initiators on your host.
\Vith soflware iSCs·1 and dependent hardware iSCSl, you can use multiple 'N'ICs that provide
failover for iSCSI connections between your host and iSCSI storage systems.
\Vith independent hardware iSCSI , the host typically has two or more available hardware iSCSl
adapters, from which the storage system can be reached by using one or more switches.
Alternatively, the setup might include one adapter and rwo storage processors so that the adapter
can use a different path to reach the storage system.
After iSCSJ multipathing is set up, each port on the ESXi system has its own IP address, but the
ports share the same iSCSI initiator IQN. \Vhen iSCSI rnultipathing is configured, the Vlvlkemel
routing table is not eon>ullcd for identifying the outbound NlC to use. Instead, iSCSI rnultipathing
is managed usi.ng vSpberc multipathiog modules. Because oftbe latency that can be incurred,
routing iSCSI traffic is not recommended.
Module 6: Configuring and Managing Virtual Storage 337
6-38
Binding VMkernel Ports with the iSCSI Initiator
With port binding. each VMkernel port that is connected to a separate NIC becomes a dlfferent path
that the iSCSI storage stack can use.
Storage Adapters
+
-
.a.;d
SO~ AQ-
..• -lDffl•
...
....
•
• MoOerc ~~
I • ~'
"°'....
"'"
·-·· ~ llt'IWI ll.11-1'1~
•
~ "'"""*'-'"
•
·~
O\ll)')a.ouo..-,.....- -
'
•'
•
• MOGl!l "llX.I; ll:il'U:>JX.&40&),.trCICltlEGln:IGllll
_.._
u....,_,_
Pl-OCMll'WK ~... Pl':Tll Oyl\llmiC Ori;t"~ su1.c
+ ...
a .......
r
0
-
j'IP~~
•
0 '2: ""S.-,.1~11
.r
°"~
-.
·-·
·•
I
Nt1wa1< Pon
. .\ . . . . . .)11.;y
._.
• '-"
•
•
... • ... •
•
'
•'
.;.,ei:ior...
Bi'Mlirool A<1Y111\t..a
--....-
....,_
,
•J
1.•
•' ""••
'
·-
°"'' °""
• •
•I
•
\Vi th software iSCSI and dependent hardware iSCSI, multipathing plug-ins do not have direct
access to physical NICs on your host. For tl1is reason, you mu;1 first connect each physical NIC to
a separate VMkemel port. Then you use a port-binding technique to associate all VMkemel ports
with the iSCSI initiator.
For dependent hardware iSCSI. you must correctly install the physical network card, which should
appear on the hosfs Configure tab in the Vi1tual Switches view.
338
Module 6: Configuring and Managing Virtual Storage
6-39
Lab 12: Accessing iSCSI Storage
Configure access to an iSCSI datastore:
1. Vtew an Existing ESXi Host iSCSI Configuration
2. Add a VMkernel Port Group to a Standard Switch
3. Add the iSCSI Software Adapter to an ESXi Host
4. Connect the iSCSI Software Adapters to Storage
Module 6: Configuring and Managing Virtual Storage 339
6-40
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify uses of IP storage with ESXi
Desclibe iSCSI components and addressing
Configure iSCSI initiators
Recognize storage device naming conventions
340
Module 6: Configuring and Managing Virtual Storage
6-41
Lesson 4: VMFS Datastores
Lesson 4: VMFS Datastores
vmware·
Module 6: Configuring and Managing Virtual Storage 341
6-42
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Create a VMFS datastore
Increase the size of a VMFS datastore
Delete a VMFS datastore
342
Module 6: Configuring and Managing Virtual Storage
6-43
Creating a VMFS Datastore
You can create VMFS datastores on any SCSJ.based storage devices that the host discovers,
including Fibre Channel, iSCSI. and local storage devices.
0
GI
tt
o-·-··""'°"""'...
q
di ICM-l'.>6tbeenter
.o~•- •
···~·-====
lo
..
•
•,
--~ 1-·!tl:M.~O •~-~•-"'-"
-·--·
-·--·-!"". .___
--------
._
____
...---··------..----__ ___
___
...
.._._.. ___ __ .... __
___ - --· -- -·----------- -- -·
~
•
--~-
,
,
_
,
"
~
....._
..
........,..
,..
..
..
'*°""""·..
-~
., _____
,..
_.,.
•
•
..........
-
Module 6: Configuring and Managing Virtual Storage 343
6-44
Browsing Datastore Contents
You use the datastore file browser to manage the contents of your data stores.
-
ICM·Dotastore
'
........
•
"
....,._
~-~
~~·~~~I r'~~~~~~~~.,-~~~~~~~~~~~~~~~~~~~~~~....,
- ... ~
o-cwCU••U..
0-01..--
c-•
c ..
,,,_
c-
The Datastorcs pane lists all datastorcs currently configured for all managed ESXi hosts.
The example shows the contents of the VMFS datastore named Class-Datastore. The contents of
the datastorc arc folders that contain the files for virtual machines or templates.
344
Module 6: Configuring and Managing Virtual Storage
6-45
About VMFS Datastores
A VMFS datastore primarily serves as a repository for VM files.
This type of datastore is optimized for storing and accessing large files, such as virtual disks and
memory images of suspended VMs.
A VMFS datastore can have a maximum volume size of 64 TB.
Module 6: Configuring and Managing Virtual Storage 345
6-46
Managing Overcommitted Datastores
A datastore becomes overcommitted when the total provisioned space of thin-provisioned disks is
greater than the size of the datastore.
To actively monitor datastore capacity;
Set alarms to send notifications about:
- Oatastore disk overallocation
- VMdiskuse
Use reporting to view space usage.
To actively manage datastore capacity:
Increase datastore capacity when necessary.
Use vSphere Storage vr\11otion to mitigate
space use problems on a particular datastore.
Using thin-provisioned virtual disks for your Vl\1s is a way 10 make the most o f your datastore
capacity. But if your datastore is not sized properly. it can become overco1nmitted. A datastore
becomes overcomn1itted when the full capacity of its thin-provisioned virtual disks is greater than
the datastore's capacity.
When a datastore reaches capacity, the vSphere Client prompts you to pro,•ide more space on the
underlying VMFS datastore and all VM UO is paused.
!vlonit.or your dat'Jstore capacity by setting alanns to alert you about how much a datastore's disks
are fully allocated or how much disk space a Vl\1 is using.
Manage your datastore capacity by dynamically increasing the size of your datastore when
necessary. You can also use vSphere Storage v!vlotion to mitigate space use issues.
For example, with vSpherc Storage viVlotion, you can migrate a VM off a datastorc. The migration
can be done by changing from virtual disks of thick format to thin format at the target datastore.
346
Module 6: Configuring and Managing Virtual Storage
6-47
Increasing the Size of VMFS Datastores
Increase a VMFS datastore's size to give it
more space or to possibly improve performance.
In general, before changing your storage
allocation:
Perform a rescan to ensure that all hosts see
the most current storage.
Add an extent to the existing VMFS.
VMFSOI
88
LVN 6
LUN 7
Record the unique identifier of the volume
that you want to expand
To dynamically increase the size of a VMFS
datastore:
Add an extent (LUN).
• Expand the datastore within its extent.
VMFS02
Expa.nef lho datastore on the
ex1st1ng extent.
You can expand but you cannot
shrink a VMFS dot.9store.
An example of the unique identifier of a volume is the NAA ID. You require this information to
identify the VJvlFS datastore that must be increased .
You can dynamic.ally increase the capacity of a VM FS datasto rc if the datastorc has insufficient
disk space. You discover whether insufficieot disk space is an issue when you create a YM o r you
try to add more disk space to a YM.
Use one of the following methods:
•
Add an extent to the VrvlFS datasto re: An extent is a partitio n o n a LUN. You can add an
extent to any VMFS datastore. T he datastore can stretch over multiple extents, up to 32.
•
Expand the YMFS datastore: You expand the size of the YMFS datastore by expanding its
underlying extent firsL
Module 6: Configuring and Managing Virtual Storage 347
6-48
Datastore Maintenance Mode
Before taking a datastore out of service, place the datastore in maintenance mode.
Before placing a datastore m maintenance mode. you must migrate all VMs (powered on and
powered off) and templates to a different datastore.
__
-
Sh01ecl·VMFS
o.. _,,, ...,_..
,
!).-...""""'"'
.._,,
....
• _
..
(......,...
''"'' II' I hi "' ....... )
o0• ... - - ...
-i:i--
-I :::
Enter Maintenance Mode
Warn1nQ
ht..
___
........ -
_
___--
....... ___ .,. .........
__
w - .. ·- ,,,__,
- - -.......,_oat-• ·~···o,..
..
...,___ .... ......,. __
....
.....,. _ _,.. _.,_ _ _ 'i:
By selecting the Let. me migrate storage for all virtual machines and continue entering
maintenance mode after migration check box, all VMs and templates on the datastore are
automatically migrated to the datastore of your choice. T he datastore enters maintenance mode
after all VMs and templates are moved off the datastore.
Datastore maintenance mode is a function of the vSphere Storage DRS foat1u·e, but you can use
maintenance mode without enabling vSphere Storage DRS. For more i11formation on vSphere
Storage DRS, see vSphere Resource Ma11ageme111 at htt1»:lldocs. vmw:ire.comlenlVMwarevSphcrel7.0/com. vmwarc.\•Sphere. rcsm<?mt.doc/G UID -98 B D 5 A&A -260A ·-194F-BA A"-·
747~ 1 F5C4B87.html.
348
Module 6: Configuring and Managing Virtual Storage
6-49
Deleting or Unmounting a VMFS Datastore
An unmounted datastore remains intact but
cannot be seen from the hosts lhal you specify.
It continues lo appear on other hosts, where ii
remains mounted.
A deleted dalaslore is desl.royed and disappeara
from all hosts that have access to it.
The deleted datastore permanently removes all
files on the datastore.
<Q~Aff
o-.c:.w·°'-·~
ll!icwo - If~.,,...
SNfto >'WF\
as.. ~...
Ote>-w.w.OI.-~
..
_,,,_
Uomounting a VMFS datastorc preserves the files on the datasiorc but makes the datastorc
inaccessible to the ESXi host.
Do not perform any configuration operations that might result in 1/0 to the da~1s1orc while the
unmounting is in progress.
You can delete any type ofVMFS datastore, including copies that you mounted without
resignaturing. Although you can delete the datastorc withorn unmounting, you should unmount the
datastore first. Deleting a Vlv!FS datastore destroys the pointers to tbe fi les oo the datastore, so the
files disappear from all hosts that have access to the datastore.
Module 6: Configuring and Managing Virtual S torage 349
Before you delete or unmount a VMFS datastore, power off all VMs whose disks reside on the
datastore. If you do not power offrhe Vl\1s and you try to continue, an error message !ells you that
the resource is busy. Before you unmount a VNIFS datastore, use the vSphere Client ro verify the
following condirions:
•
No virtual machines reside on the datastore.
•
The darastorc is not part of a datastorc cluster.
•
The datastore is not managed by vSphere Storage DRS.
•
vSphere Storage 110 Control is disabled.
•
The datastore is not used for vSpbere HA heartbeat.
To keep your data, back up the conrents of your VtvfFS datastore before you delete the datastore.
350
Module 6: Configuring and Managing Virtual Storage
6-50
Multipathing Algorithms
Arrays provide active-active and active-passive storage processors. Multipathing algorithms interact
with these storage arrays:
::
vSphere offers native path selection, loadbalancing, and failover mechanisms.
Third-party vendors can create software !or
ESXi hosts to properly Interact with the
storage arrays.
:1 ::.
:i
::
nli!i!i~
Storage Aft-ay
=:: :: =
Storage
Ptoces.sors
iP999
Ill
0
Ill
___
._
Ill
0
Swittnes
_. ESXI
Host$
111
The Pluggable Storage Architecture is a Vl\~kernel layer responsible for managing multiple
storage paths and providing load balancing. An ESXi host can be attached to storage am1ys with
eitl1er active-active or active-passi,,e storage prcx:essor co11figurations.
VMware offers native load-balancing and failover mechanisms. VMware path selection policies
include the following examples:
•
Round Robin
•
Most Recently Used (MRU)
•
Fixed
Third-party vendors can design their own load-balancing techniques and failover mechanisms for
particular storage array rypes ro add support for new arrays. Third-party vendors do not need co
provide internal inforrnation or intellectual property about the array to VMware.
Module 6: Configuring and Managing Virtual Storage 351
6-51
Configuring Storage Load Balancing
Path seleetion policies provide:
.
Scalability
- Round Robin
• Availabiltty:
- Most Recently Used
- Fixed
-..-= - """'-"'-"""' -c~'Dr.Mt~
·- -- --- ----- -·--- - - -----· ·---·- .............- ··- 1- -1
... ··--- ~l MJt---- ·.
-- ·-·-·- dre #~"')'""'
... ,
•
~
_ ,.,.,..__........,
I
..
1- - - - I
_,
•
1
1-1 111
-·-t
Multiple paths from an ESXi host to a datastorc arc possible.
For multipathing with Fibre Channel or iSCSI, the following path selection policies are supported:
•
Fixed: T he host always uses the preferred path to the disk when that path is available. lf the
host cannot access the disk through the preferred path, it tries the alternative paths. This
policy is the default policy for active-active storage devices.
•
Most Recently Used: T he host selects the first working path discovered at system boot time.
When the path becomes unavailable, the host selects an alternative path. The host does not
reven to the original path when that path becomes available. The lvfost Recently Used policy
does not use the preferred path setting. This policy is the default policy for active -passive
storage devices and is required for those devices.
•
Round Robin: The host uses a path selection algorithm that rotates through all available paths.
In addition to path failover, the Round Robin multipathing policy supports load balancing
352
Module 6: Configuring and Managing Virtual Storage
across the paths. Before using this policy, check with storage vendors to find our whether a
Round Robin configuration is supported on their storage.
Module 6: Configuring and Managing Virtual Storage 353
6-52
Lab 13: Managing VMFS Datastores
Create and manage VMFS datastores:
1. Create VMFS Datastores for the ESX1 Host
2. Expand a VMFS Datastore to Consume Unused Space on a LUN
3. Remove a VMFS Datastore
4. Extend a VMFS Datastore
5. Create a Second VMFS Datastore
354
Module 6: Configuring and Managing Virtual Storage
6-53
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Create a VMFS datastore
Increase the size of a VMFS datastore
Delete a VMFS datastore
Module 6: Configuring and Managing Virtual Storage 355
6-54
Lesson 5: NFS Datastores
Lesson 5: NFS Datastores
vmware·
356
Module 6: Configuring and Managing Virtual Storage
6-55
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify NFS components
Recognize the differences between NFS 3 and NFS 4 1
Configure and manage NFS datastores
Module 6: Configuring and Managing Virtual Storage 357
6-56
NFS Components
An N FS file system is on a NAS device that is called the N FS server.
N"FS Server
/ISO
NAS Device or a
server v.oltl'I S«lra.ge
I
'I
•
8
''2-163.81.J l
~
192.168.f:lt .72
ESXI H!M.t \'<Ith
NIC MilllPOed to
1- - -
•
Vir"Warsv.itdl
VMkcmet Port
OfJln<t<J Ol'I' Vlrtue1
Sw1u:h
""'
The NFS server contains one or more directories rhat are shared with the ESXi host over a TCP/IP
network. An ESXi host accesses the NFS server through a VMkernel port that is defined on a
\rirtltal S\Vitch.
358
Module 6: Configuring and Managing Virtual Storage
6-57
NFS 3 and NFS 4.1
An NFS datastore can be created as either NFS 3 or NFS 4 .1.
NFS 3
NFS 4 .1
ESX1 mOll•ged mult1p•thirig
Native multJpaih1ng:and $ession trunking.
AlJTH_ SYS (root) au-lhenheal1on
Optional Kert>etos. ~ulhenl1cahon
Vf\iw.3~e proplietary ctient-side file
Ci1ent-side error tracking
locking
Server-side file looking
Server-side error tracking
Compatibility issues between the two NFS versions prevent access to datastorcs using both
protocols at the same time from di fferent hosts. If a datastore is configured as NFS 4.1, all hosts
that access that datastore must mount the share as NFS 4.1. Data corruption can occur if hosts
access a datastore with the wrong NFS version.
Module 6: Configuring and Managing Virtual Storage 359
6-58
NFS Version Compatibility with Other vSphere
Technologies
vSphere supports NFS 4.1 to overcome many limitations when using NFS 3. Both NFS 3 and NFS
4.1 shares can be used, but you must consider important constraints when designing a vSphere
environment in which both versions are used.
vSphere Technology
NFS 3
NFS 4 . 1
vSphere vfvtolion and \#Sphere Storage vMouon
Yes
vSphere HA and vSphere Fault Tolerance
vSphere DRS andllSpnere DPM
Ye•
Yes
Yes
Yes
Stateless ESX• and Hos I Profiles
Yes
Yes
Yes
vSph&re Storaoe ORS and Slorage 110 Con1rol
Site Recovery ti.•anager
Yes
Yes
No
No
\ISphecre Virtual Volume$and vSph.oro Repllca11on
Yes
vR.eahze Operations Manager
Yes
Yes
Yes
Host Profifes
Yes
Yes
N"FS 4.1 provides the following enhotncements:
•
Native multipathing and sessioll tnmking: NFS 4.1 provides multipathing for servers that
support session trunking. \\'hen tnmking is available, you can use multiple IP addresses to
access a single NFS volume. Client LO trunking is not supported.
•
Kerberos authentication: NFS 4.1 introduces Kerberos authentication in addition to the
traditional AUTH_SYS method used by NFS 3.
•
Improved built-in file locking.
•
Enhanced error recovery using server-side tracking of open files and delegations.
•
Nlany general efficiency improvements including session leases and less protocol overhead.
360
Module 6: Configuring and Managing Virtual Storage
The NFS 4. 1 client offers the following new features:
•
Stateful locks with share reservation using a mandatory locking semantic
•
Protocol integration, side-band (auxiliary) protocol no longer required to lock and mount
•
Trunking (true NFS multipathing), where multiple paths (sessions) to the NAS array can be
created and load-distributed across those sessions
•
Enhanced error recovery to mitigate server failure and loss of connectivity
Module 6: Configuring and Managing Virtual Storage 361
6-59
Configuring NFS Datastores
To configure an NFS datastore:
1. Create a VMkernel port:
• For better performance and security, separate your NFS netwol1< from lhe iSCSI network.
2. Create the NFS datastore by providing the following information:
NFS version: 3 or 4.1
Datastore name
NFS sel\ler names or IP addresses
Fotder on the NFS server, for example, /templates or / nfs_share
Hosts that mount the datastore
Whether to mount the NFS file system as read only
Authentication parameters
For each ESXi host that accesses an NFS datastore over U1e network, a VMkernel port must be
configured on a vi11ual switch. The name of this port can be anything that you want.
For performance and security reasons, isolate )'Our NFS networks from the other networks, sucb as
)'Our iSCSl network and your virtual machine networks.
362
Module 6: Configuring and Managing Virtual Storage
6-60
Configuring ESXi Host Authentication and NFS
Kerberos Credentials
As a requirement of Kerberos authentication, you must add each ESXi host to the Active Directory
domain. Then you configure NFS Kerberos credentials.
.
CJ sa·esxi-01 vclassJocal
s"
'.
AuthentK:at1on Services
v
DllfftofY SttvlCM ~#lion
::.reu::oi, ~~ rvoo
,1.,;:u....._ Oree.~
Dol!l•ll httlr9
-~
T ....i.o Con:.o.- COl'lll_._
;-e-"1 r ....,..
I
NFS Kerberos Credentials
I CU,,t.11 c:.:i,,., ......~ I
l:lll
I
You must take several configuration steps to prepare each ESXi host to use Kerberos
autl1e11ricatio11.
Kerberos authentication requires that all nodes involved (the Active Directory server. the NFS
servers, and the ESXi hosts) be synchronized so that little to no time dri ft exists. Kerberos
authentication fails if any significant drift exists between the nodes.
To prepare your ESXi host to use Kerberos authentication, confii:,'Ure the NTP client settings to
reference a common NTP se1ver (or the domain controller, if applicable).
\Vhen planning to use NFS Kerberos, consider the following points:
•
NFS 3 and 4.1 use different authentication credentials, resulting in incompatible UID and GID
on Oles.
•
Using different Active Directory users on different hosts that access tl1e same NFS share can
cause the vSphere vlvlotion migration to foil.
Module 6: Configuring and Managing Virtual Storage 363
•
NFS Kerberos configuration can be automate-0 by using host profiles to reduce configuration
conflicts.
•
Time must be synchronize(! between all participating components.
364
Module 6: Configuring and Managing Virtual Storage
6-61
Configuring the NFS Datastore to Use Kerberos
When creating each NFS
datastore, you enable Kerberos
authentication by selecting one
of the security modes:
• Kerberos5 authentication
• Kerberos5i authenticatton and
data integrity
.___ ..
.,_____
,
N~ O&!oS:tOlfl
__
. _
,,_
,,'1_ ..,, __
,,, , ...._
._
..
__ ..""" --·------·0.1-·-·-.... _ ··-- .... -...
____
~---,..,,,,...,
..,
~··--
I• •••- • -•
' ,.
--~
,._ ..,.____, ..
,... --1• .. e
~,_ ,~.--
---·~~. -- ·
_
....._....._
--
n.,._ _ _ _ _ _ _ . . . _ _
After pe1ib1111iog the in itial configuratio n steps, you can configure the datastore to use Kerberos
authenticatio n.
The screenshot shows a choice of Kerberos authenticatio n only (krb5) or authentication with data
integrity (krb5i). The difference is whether only the header o r the header and the body of each
NFS operatio n is signed using a secure checksum.
For more information about how to configure the ESXi hosts for Kerberos authentication, see
vSpltere Storage at httos://docs.vmware.com/en/VMwarevSphcre/7.0icom.\ mware.vsphere.storaee.doc/G Ul D-8AE88 758-20C I -4873-99C7l 8 I EF9ACFA 70.html.
Module 6: Configuring and Managing Virtual Storage 365
6-62
Unmounting an NFS Datastore
Unmounting an NFS datastore causes the files
on the datastore to become Inaccessible to the
ESXi host.
Before unmounting an NFS datastore, you must
stop all VMs whose disks reside on the
datastore .
=so
I
-~·
Iq U~t
Oll!:t\:Of9
COl'll•our• S!OUll!Jlt
366
Module 6: Configuring and Managing Virtual Storage
IO Ccn!ro1
6-63
Multipathing and NFS Storage
For a highly available NAS architecture, configure NFS multipathing to avoid single points of failure.
Example of a multipathing configuration:
Configure one VMkemel port.
Attach NICs to the same physical switch to
configure NIC teaming.
Configure the NFS server with multiple IP
addresses (same subnet is OK).
To better use multiple links, configure NIC
teams wilh lhe IP hash load-balancing policy.
Ph'fi,!Clll Switch
V1rtl.1.:,.I Swttth
VM:ke-tnel Port~ouo
Um091P H"'§h
--
Examples of a single point o f failure in tJ1e NAS architecture include the NlC card in an ESXi
host, and the cable between the NIC card and the switch. To avoid single points of failure and to
create a highly available NAS architecture, conllgure the ESXi host witb redundant NIC cards and
redundant physical switches.
The best approach is to install multiple N!Cs on an ESXi host and configure them in NIC teams.
NIC teams should be configured on separate exte111al switches, with each NIC pair configured as a
team on the respective external switch.
In addition, you might apply a load-balancing algorithm, based on the link aggregation protocol
type supported on the external switch, such as 802.3ad or EtherChannel.
An even higher level of pe1fonnance and high availability can be achieved with cross-stack,
EtherCbannel-capable switches. \Vith certain network switches, you can team pot1s across two or
more separate physical switches that are managed as one logica l switch.
Module 6: Configuring and Managing Virtual Storage 367
NlC teaming across virtual switchc$ provides additional resilience and some performance
opti1nization. Having more paths available to the ESXi host can improve performance by enabling
distributed load sharing.
Only one active path is available for the connection between tbe ESXi host and a single storage
target (LUN or mount poi11t). Nthougb alternative connections might be available for foilover, the
bandwidth for a single datastore and tl1e underlying storage is limited to what a single connection
can pro\ride.
To use more available bandwidth, an ESXi host requires multiple connections from the ESXi host
to the storage targets. You might need to configure multiple datastores, each using separate
connections between the ESXi host and the storage.
The table shows tl1e recommended configuration for NFS multipathing.
External Switches Support Cross-Stack
EtherChannel
External Switches Do Not Support
Cross-Stack EtherChannel
Configure one VMkemel port.
Con figure two or more VMkerncl ports on
different vim1al switches on different subnets.
Configure NIC teaming by using adapters
attached 10 separate physical switches.
Confi&'llre NlC teaming with adapters attached
to the same physical switch.
Configure the NFS server with multiple IP
;1ddresses. IP addresses can be on the same
subnet.
Configure the NFS sen•er with multiple IP
addresses. JP addre.sses can be on the same
subnet.
To use multiple li nks, configure NIC teams with To use multiple links, allow the VMkernel
the LP hash lo;1d-balancing policy.
routing table to decide which link lo send
packets (requires multiple datastores).
368
Module 6: Configuring and Managing Virtual Storage
6-64
Enabling Multipathing for NFS 4.1
NFS 4.1 supports native
multipathing and session
lrunking.
To enable multipathing, enter
multiple seiver IP addresses
when configuring the datastore.
_..,_. .....
_,.......
·---· _
. ,..,_,.."'
_
......... ·-<wun-....,,_. __. •.
--· Q
-
411--... - ........... - . - - - -......
- ...
_iw..,,
- --..._
....
_
~=~--
+
I ,.,.. I
$>
-·-·
ri-""· ........ . ,
·-
NFS 4. l provides multipathing for servers that support the session trunking. \\/hen trunking is
available, you can use multiple IP addresses to access a s ingle NFS volume. Client ID trunking is
not supported.
Module 6: Configuring and Managing Virtual Storage 3 69
6-65
Lab 14: Accessing NFS Storage
Create an NFS datastore and record its storage information:
1. Configure Access to an NFS Datastore
2. View NFS Storage Information
370
Module 6: Configuring and Managing Virtual Storage
6-66
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify NFS components
Recognize the differences between NFS 3 and NFS 4 1
Configure and manage NFS datastores
Module 6: Configuring and Managing Virtual Storage 371
6-67
Lesson 6: vSAN Datastores
Lesson 6: vSAN Datastores
vmware·
372
Module 6: Configuring and Managing Virtual Storage
6-68
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Explain the purpose of a vSAN datastore
Desclibe the architecwre and requirements of vSAN configuration
Explain the purpose of vSAN storage policies
Module 6: Configuring and Managing Virtual Storage 373
6-69
About vSAN Datastores
BBBBBB
vSAN is a software-defined storage solution
providing shared storage for vSphere clusters
without using traditional external storage.
A vSAN cluster requires:
A minimum of three hosts to be part of the
vSphere cluster and enabled for vSAN
A vSAN network
Local disks on each host that are pooled to
create a virtual shared vSAN datastore
....sphere
!
1m
I
o
111
11._1_11_
! 3-64!
111 ~ 111 ~ 111
1
I
0_ _
11 ...
111...,-11-0
--11-.1
HOO/Fla.$h/SS0
m:
I
- -----------------------I
vSAN datastores help administrators use so ftware-defined storage in the following ways:
•
Storage policy per YM architecture: \Vith mult iple policies per datastorc, each VM c.an have
di fferent storage.
•
vSphere and vCenter Server integration: vSAN capability is built in and requires no
appliance. You create a vSAN cluster, like vSphcrc HA or vSphcrc DRS.
•
Scale-out storage: Up to 64 ESXi hosts can be in a cluster. Scale out by populating new nodes
in the cl uster.
•
Built-in resiliency: The default vSAN storage policy establishes RAID I redundancy for all
YMs.
374
Module 6: Configuring and Managing Virtual Storage
6-70
Disk Groups
Disk groups are vSAN management constructs on all ESXi hosts in a vSAN cluster. A host can
include a ma.ximum of frve disk groups.
The disk groups are combined to create a single
vSAN datastore. A disk group requires:
One ftash device for caching
• One to seven capacity devices for storage
Anh DIM Groups
==c:~:i
"o=....
=. =c:::i
=A,,,
"o;
=.....
FlFl l·· l ... J
FlFl
"Ol•l Gro..
1111 0
(•~ l uo)
~ 0-.p
1111
Hybrid Diak Groups
A
ri1rl1
~.~ ~~
1111 0
111 1
vSAN uses the concept of disk groups to pool together cache devices and capacity devices as
single management constructs. A disk group is a pool of one cache device and one to seven
capacity devices
Module 6: Configuring and Managing Virtual Storage 375
6-71
vSAN Hardware Requirements
vSAN capabilities are native to ESXi and require no addrtional softi.vare.
~
Any server In
thovSAN
[sso·1. -sso
./) rsso}•'\I""
,
--------+
550
1sso tor cc.chin,
Al lc.,st 1 SSO for c.iipocity
. ...-- HOO
(or HOD lot hybrid mode)
Compatibility
Guide
1
~ 1111
0
~ ~iHJ
...
10GGNIC
-------+
1G B for hybrid mode
111 !
• />
W
n~
1J=
, ,...controllers
SASISATA/NVM,.,__ _ _ _-+
Memory 8·32 GB
.. A 1~901._ of RAM d~p~oding
v
...-- on IM amount of
dtlw.s and dJsk groups
RAIO c-ontroners must work in
Pi11$through Ot RAID 0 mode
M~ty r~uircments may
differ dep~nt on workklad
needs
vSAN requires several hardware components that hosts do not nonnally have:
•
One Serial. Attached SCS.1 (SAS), SAlt\ solid-state drive (SSD), or PCle flash device and one
to seven magnetic drives for each hybrid disk group.
•
One SAS, SATA SSD, or PC!e flash device and one to seven flash disks with flash capacity
enabled for all -flash disk groups.
•
Dedicated I Gbps network (10 Gbps is recommended) for hybrid disk groups.
•
Dedicated 10 Gbps network for all-flash disk groups.
I Gbps network speeds result in detrimental congestion for an all -flash arch itecture and arc
unsupported.
•
376
The vSAN network must be coufii;.'llred for lPv4 or !Pv6 and support unicast.
Module 6: Configuring and Managing Virtual Storage
In addition, each host should have a minimum of32 GB of memory to accommodate a maximum
number of tive disk groups and a max imum number of seven capacity devices per disk group.
Module 6: Configuring and Managing Virtual Storage 377
6-72
Viewing the vSAN Datastore Summary
The Summary tab of the vSAN datastore shows the general vSAN configuration information.
~·
•SU'or1t C--.t
o---..--
•
vsainDotaslote
!....
D!C"'-··
Ut••c.i ......
,_
u-
)Ulltlt-~..
•-o..n-
-
'""'~····-·
o- c - . -
l'C'""'"'
""°' -
,....
...,~__,_.,~~~"l~•~ll
-
..,
--
--
378
-
•
A
....
'
c..---·
-
~------
Module 6: Configuring and Managing Virtual Storage
.. ___
.______
6-73
Objects in vSAN Datastores
VSAN storage is object-based and policy-<lriven.
VMs created on a vSAN datastore include the
following objects:
One VM home namespace
One or more VMDK objects
Thin-provisioned VM swap object
One or more VM memory objects
vSAN pertormance data objects
iSCSI LUN objects
vSAN Ob1cct
Trad1tlonal Vt., Flies
VMhome
. nv r~m
namespace
". vswp, . .log . hlog
VMDK
- ! lat . vn1d k
VMswap
. v:;wp
VM 1nemory
. vmem
Snapshot delta
- 0 0000#- Ue I Lo. VJtld k ,
. . vmsd . . vmx vmx-
- (100 <>0#-se.spal·se. vmdk
A vSAN cluster stores and manages data as flexible data containers called objects. \Vhen you
provision a VM on a vSAN datastore, a set of objects is created:
•
VM home namespace: Stores the virtual machine mctadata (configuration fi les)
•
VMDK: Virtual machine disk
•
VM swap: Virtual machine swap file, which is created when the VM is powered on
•
VM memory: Virtual machine's memory state when a VM is suspended or when a snapshot is
taken of a VM and its memory state is preserved
•
Snapshot delta: Created when a vim1al machine snapshot is taken
Module 6: Configuring and Managing Virtual Storage 379
6-74
VM Storage Policies
Storage policies define how objects that are included in a VM are stored.
Storage policies have the following
characteristics:
Based on storage capabilities
Defined for a VM or disk at the bme of
deployment
Can be applied later
Can be changed at any time
VM Storage Policy
• capacity
• Avallabll ly
• Performance
Cannot be deleted if they are in use
~
EJ
v
r--------'
vSAN Oat.astnre
:
I
I
I
I
:----------f I:
I vSphere Q
vSAN
VM storage policies are a set of mies that you configure for VMs. Each storage policy reflects a
set of capabilities that meet the availability, performance, and storage requirements of the
application or service-level agreement for that VM.
You should create storage policies before deploying the VMs that require these storage policies.
You can apply and update storage policies after deployment.
A vSphere administrntor who is responsible for the deployment of V/Vls can select policies that are
created based on storage capabilities.
Based on the policy that is selected for the object Vlvl, these capabilities are pushed back to the
vSAN datastore. The object is create-0 across ESXi hosts and disk groups to satisfy these policies.
380
Module 6: Configuring and Managing Virtual Storage
6-75
Viewing VM Settings for vSAN Information
The consumption of vSAN
storage is based on the VM's
storage policy.
The VM's hard disk view
provides the following
information:
A display of the VM storage
policy
The location of disk files on a
vSAN datastore
I - ..... "'"'" J
___....
--·
......
......
--
_,
0
,....... ..
...
•
_
J
......... _,...,
i~-tor.../-
--
I
.. - ,4._........ . _
(cA.11( 1'1
1
. .
Module 6: Configuring and Managing Virtual Storage 381
6-76
Lab 15: Using a vSAN Datastore
View a vSAN datastore configuration and a virtual machine's components on the vSAN datastore:
1. View a vSAN Oatastore Configuration
?.. View the vSAN Default Storage Policy
3. View a Virtual Machine on the vSAN Oatastore
382
Module 6: Configuring and Managing Virtual Storage
6-77
Review of Learner Objectives
After complefing this lesson, you should be able to meet the following objectives:
Explain the purpose of a vSAN datastore
Descnbe the archttecrure and requirements of vSAN configuration
Explain the purpose of vSAN storage policies
Module 6: Configuring and Managing Virtual Storage 383
6-78
Virtual Beans: Storage
As a Virtual Beans administrator, you are planning how to use NAS and iSCSI storage with vSphere:
For NAS storage. you can create one or more NFS datastores and share them across ESXi hosts:
- Use the datastores to hold templates, VMs, and vCenter Server Appliance backups.
For iSCSI storage, you can create one or more iSCSI datastores and share them across ESXi
hosts:
- Use the datastores lo hold templates and VMs.
384
Module 6: Configuring and Managing Virtual Storage
6-79
Activity: Using vSAN Storage at Virtual Beans (1)
As a Virtual Beans administrator, you thinK that vSAN storage is the best option for the company's
new storage requirements. What are the benefits to Virtual Beans of using vSAN storage?
Module 6: Configuring and Managing Virtual Storage 385
6-80
Activity: Using vSAN Storage at Virtual Beans (2)
What are the benefits to Virtual Beans of using vSAN storage?
Benefits include (but are not limited to):
You can use lhe vSphere Client to manage the vSAN configuration. No separate user intertace is
necessary.
vSphere administrators do not need special storage hardware training.
You can usevSAN storage policies to define specific levels of service for a VM.
You can expand the vSAN capacity by adding one or more hosts to the vSAN cluster (also known
as scale out).
386
Module 6: Configuring and Managing Virtual Storage
6-81
Key Points
ESXi hosts support various storage technologies: Direct-attached storage, Fibre Channel, FCoE,
iSCSI, and NAS.
You use VMFS and NFS dalastores to hold VM files.
Shared storage is integral lo vSphere features such as vSphere vMotion, vSphere HA, and
vSphere DRS.
vSAN clusters direct-attached server disks to create shared storage designed for VMs.
Questions?
Module 6: Configuring and Managing Virtual Storage 387
388
Module 6: Configuring and Managing Virtual Storage
Module 7
Virtual Machine Management
Module 7: Virtual Machine
Management
Module 7: Virtual Machine Management
389
7-2
Importance
Virtual machines are the foundation of your virtual infrastructure. Managing Vfl.1s eft'ectivety requires
skills in creating templates and clones, modifying VMs, migrating VMs, taking snapshots, and
protecting the VMs through replication and backups.
390
Module 7: Virtual Machine Management
7-3
Module Lessons
1. Creating Templates and Clones
2. Wof1<ing with Content Libraries
3. Modifying Virtual Machines
4. Migrating VMs with vSphere vMotion
s. Enhanced vMotion Compatibility
6. Migrating VMs with VSphere Storage vMotion
7. Creating Virtual Machine Snapshots
6. vSphere Replication and Backup
Module 7: Virtual Machine Management
391
7-4
Virtual Beans: VM Management
Virtual Beans wants to automate its processes. It requires the following processes for the \/Sphere
Infrastructure:
Provisioning and deploying VMs: Performing fast, error-free, consistent deployments
Ma1nta1ning VMs: Patching and upgrading operating systems and applications
Backing up VMs: Making daily backups of application data
Disaster recovery and business continuity: Moving VMs between the primary and secondary data
center
As a Virtual Beans administrator, you must recognize the options available for these processes.
Then. you can create effective processes for managing VMs in your data center
392
Module 7: Virtual Machine Management
7-5
Lesson 1: Creating Templates and Clones
Lesson 1: Creating Templates and Clones
vmware·
Module 7: Virtual Machine Management
393
7 -6
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Create a template of a virtual machine
Deploy a virtual machine from a template
Clone a virtual machine
Create customization specifications for guest operating systems
394
Module 7: Virtual Machine Management
7-7
About Templates
A template is a master copy of a virtual machine. You use templates to create and provision new
VMS.
A template typically includes:
A guest operating system
One or more applications
A specific VM configuration
VMware Tools
o-
·. - -
.
•~t: .... 1..-
,
""··-fl-·u·----
- -___..______
--· __ _
-·-·-
--~
.... _ , , ,....
---·
-·- -·
.,,
Creating templates makes the provisioning o f virtual mach.ines much faster and less error-prone
than provisioning physical machines and creating a VM by using the New Virtual Machine
\ViZ<1rd.
Templates coexist with VMs in the inventory. You can organize collections of VMs and templates
into arbitrary folders and apply permissions to VMs and templates. You can change VMs into
templates without having to make a full copy of the Vivi fi les and create an object.
You can deploy a VM from a template. The deployed VNI is added to the folder that you selected
when creating the template.
Module 7: Virtual Machine Management
395
7-8
Creating a Template: Clone VM to Template
You can create templates using drfterent methods. O ne method is to clone the VM to a template. The
VM can be powered on or off.
vm
vSphere Chen
GufttOS
•
•
0 .........,,•<""IO<~
Ill t<:M·Oatacenter
., •
CJ Lab remoiates
OS
Clt..abVM.s
M1crtfl
(}. PliOto1"•11
&
Photon-12
Fault Tolerance
VM Po!ICleS
Tomplli10
The Clone to Template option offers you a choice of format for storing the
•
Same format as source
•
Thin-provisioned format
•
Thick-provisioned lazy-zeroed fonnat
•
Thick-provisioned eager-zeroed fom1at
396
Module 7: Virtual Machine Management
V~1's
virtual disks:
7-9
Creating a Template: Convert VM to Template
You can create a template by converting a VM to a template. In this case. the VM must be powered
off.
tb
v
G "' VCM·OLYda<U.loc
[h ICM-Ocltacenter
OUbTem~itK
Ot.aoVM'
&-n
(}
...........,
&
WIN10.ol
Eb 'MitlCKM
t/J W\1'110-06
{;J #lno:on-.t-IW
@WIN'O·T~
(h SA-Oataeent~
-
-
•
. _,OS
•
""'"'"'"'
•
~ iot«'JG.O<I
OPMI ~le ecmo.
•
,
I) oil
""""""'
...
~ ,..igfote...
""""' OS
"""°
•
F.-uit Toler•~
•
VM Pollcll!'
•
Tet'l'lplite
•
Gon'OaliOl1ty
• & £llPQtt OVF TempQI•
Coenpatlb•ty
VMwMe Toots..
ONSNOMe.
p AOO!"\ll'S
'°"GonYctn 10 T~re
~t Sy,ttml.091
The Con,«rt to Template option does not offer :1 choice of fonnat and leaves the VM's disk file
intact.
Module 7: Virtual Machine Management
397
7-10
Creating a Template: Clone a Template
You can create a template from an existing template, or clone a template.
vm
vSphere Chent
v
·~.
1
_'
li!I Photon-Template
{) sa·'o'C10-Clvctass t>cal
[}] IC"4--0ai.c:4!f'ter
v
0
UICI TM'd&tK
I~ ~tal"-T~lalc
Guett os·
L:IUOVMs
@ Pno! Ort-HW
VMN~t
SSX1 7 0
fl' New VM fYom This lempr.aw
Not ru""
M...-.lnt'
@ WIN"ll).T OQ6s
Ill SA·Oo.lbeenter
)0
398
sb-Vcsa-01 vdaU.IOC'ai
<1$convett to "'1u8' Macl'IM:..•
( 1"aonetoTemolate
Module 7: Virtual Machine Management
sa ttUi 0
7-11
Updating Templates
You update a template to include new patches, make system changes. and install new applications.
To update a template:
1. Convert the template to a VM.
2. Place the VM on an isolated net\vork lo
prevent user access.
3. Make appropriate changes to the VM.
4. Convert the VM to a template.
IO
C2
8
2
12 Photon-Template
•Cl
.., 0 ............Ol...wuJOtM
(lOI O...Xenie1
0\801 .....•~
B:--
l(ji\ ·- .. Quo VM'
EJ-io.-1-
[tSAOffv'·-
> 0~...ot..o;~~
I Ct!--~ "- V W ir.,_ fl* T - l fl>t
I•e.-110V""°""~
....,,,_,.
fl$;;."''"
'd'OOne•l~lle..
f4 00... '° \.b"ory.
To update your template to include new patches or software, you do not need to create a template.
Instead, you conve1t the template to a VM. You can then power on the VM.
For added security, you m ight want to prevent users from accessing the V~1 while you update it.
To prevent access, either disconnect the VM from the n etwork or place it on an isolate<l network.
log i n to the VN! 's guest operating system and appl y the patch or install the software. \!/hen you
finish, power off the VM and convert i t to a template again.
Module 7: Virtual Machine Management
399
7-12
Deploying VMs from a Template
To deploy a VM, you must provide information such as the VM name, inventory location, host,
datastore. and guest operating system customization data.
Q PhOtorr-Tcmp&&te
...
o--oi.""-loe.M
i;--
lll!CM·-
.......
t:u.v11_.
·- ..................
___
Photon-TempJate - Deploy From Template
Iii
--
l -~. - " "
Jihw··· ·-
,
-
...__..
---·
...__ ...
!ipMll", •
"*""' l\olM -
l#(IM-
() s+--.ot-.'°'d
. . a lthl<>wi.ww
CJUOft~
t:• ··,,JlS-a.·~-
o '°-'°'~,.ICJC,IJ
\Vhcn you place ISO files in a content library, the ISO filc.s arc available only to VMs that arc
registered on an ESXi host that can access the datastore where the content library is located . These
ISO files are not available to VMs on hosts that ca1mot see the datastore on which the content
library is located .
400
Module 7: Virtual Machine Management
7-13
Cloning V irtual Machines
Cloning a VM creates a VM that Is an exact copy of the original:
Cloning is an alternative to deploying a VM.
· Duling cloning, the VM can be powered on or off.
Ct..ol> TIMD&llft
!2PnolOll-T~
--
-~~" CM60Nt
.;o, M'91'•1•
"' 0Ul>VM'
B> "iwJ.!Qtl·n
It?~ PMll'>fl·I?
.,....,,,.,,,
GI W W\10-(M
~ Win().06
__
,
To c lone a VM, you must be connected to vCcntcr Server. You cannot clone Vl\1s if you use
VMware Host Client to manage a host directly.
\Vhen you clone a V~1 that is powered on. services and applicat ions are not automatically
quiesced when the Vl\1 is cloned.
When dec iding whether to clone a Vl\1 or deploy a VM from a template, consider the following
points :
•
VM templates use storage space, so you must plan your storage space requirements
accordingly.
•
Deploying a VM from a template is quicker than cloning a running VM, especially when you
must deploy many Vl\1s at a time.
•
\Vhen you deploy many VMs !Tom a template, all the Vlvls start with the same base image.
Cloning many VMs from a running VM might not create identical Vl\1s, depending on the
accivity happening within the VM when the VM is c loned.
Module 7: Virtual Machine Management
401
7-14
Guest Operating System Customization
You customize the guest operating system to make VMs, created from lhe same template or clone,
unique.
By customizing a guest operating system, you can change information, Including lhe following details:
Computer name
Network settings
License settings
Windows Security Identifier
Customizing the guest operating system prevents confl icts that might occur when you deploy a
VM and a clone with identical guest OS settings simultaneously.
402
Module 7: Virtual Machine Management
7-15
About Customization Specifications
You can create a customization spe<:ification to prepare the guest operating system:
Specificalions are stored 1n lhe vCenter Server database.
• Windows and Linux guests are supported.
vm
vSphere Clte nt
~·'·
, .
~
v
~~ •
·
Pollctes and Profiles
i) VM CU'Stomlzatton Spactft..
ro
VM Storage PoHc:ies
Host Prohles
VM Customization Specifications
+ New.. 4J lmPort...
Ed.It
..,
!fl Storage Policy Components
Pl!oton.cuswmSpec
D It
c
~OS
unux
To manage customization specifications, select Policies and Profiles from the Menu drop-down
n1er1u.
On the VM Customiz.1tion Specifications pane. you can create specifications or manage ex isting
ones.
Module 7: Virtual Machine Management
403
7-16
Customizing the Guest Operating System
When cloning a VM or deploying a VM from a template, you can use a customization specification to
prepare the guest operating system.
Photon-Template · Oepl()f From Template
___ -·
-""·-·--u.c.--.,."-·-··~
-oto .. ,.. - -....~--
Photon-Template - Deploy From Template
. , l S-.Ct I Mfl'll M'ldt~
"
2 ~ I COMl»UI• , . . _
.,
~~
"
I
C1At01YCr•9U"t OS
0-:I OMli• Int 9Vfd 0$ ti>~~ COl'lftiCU. ..,.... YOl<I otJ)IO)' ll'lf ~ f'l'l.tlt.....
•t6'•9'f
h i.ct dorw OpUion•
......
....
You can define the customization scuings by using an existing customization specification during
cloning or deployment. You create the specification ahead of time. During cloning or deployment,
you can select the customization specification to apply to the new VM.
Vl'vlware Too.ls must be installed on the guest opernting system that you want to customize.
The guest operating system must be installed on a disk attached to SCSl node 0:0 in the VM
configuration.
For more about guest operating system customization, sec vSphere Virtual A1aehi11e
1ltl111i11istratic>t1 al ht 111s://<l<K:S. vm,vare.c<)ni/cnf\ I M'A1arcvSphcrel7 .0/com.vmwarc. vsphcrc. vm admin.doc/GUID-55238059-9 12E-4 I I F-AOE9A 7 A536972A9 1.html.
404
Module 7: Virtual Machine Management
7-17
About Instant Clones
You can use Instant Clone Technology to create
a powered-on VM from the running state of
another powered-on VM:
The processor state, virtual device state,
memory state, and disk state of the
destination (child) VM are identical lo lhe
states of the source (parent) VM.
Snapshot-based oisk sharing is used to
provide storage efficiency and to improve the
speed of the cloning process.
Shared
Memory
Copy-on·
Write
Clllll VM
Oolta
Disk
Through instant cloning, the source (parent) VM docs not lose its state because of the cloning
process. You can move to just-in-time provisioning, given the spe.ed and state-persisting nature of
this operation.
During an instant clone operation, the source VJ\1 is stunned for a short time, less than I second.
\Vhile the source VM is stunned, a new writable delta disk is generated for each virtual disk, and a
chc.ckpoint is taken and transferred to the destination VM.
The desti nation VM powers on by using the source's checkpoint.
After the destination Vl\1 is fully powered on, the source VM resumes running.
Instant clone VN!s are fully independent vCenter Server inventory objects. You can manage
instant clone VMs like regular VMs, without any restrictions.
Module 7: Virtual Machine Management
405
7-18
Use Cases for Instant Clones
Instant clone VMs have various uses:
Virtual desktop infrastructure
Rapid scale-out: Container hosts. l>ig data, and Hadoop worker nodes
DevTest: Quickly and efficiently replicate VMs and test l>eds with the same running state
DevOps: Replicate VMs from staging to production, and the converse, witl1 the identical running
state
In vSphere 6. 7 and later, you can create instant clones or VMs only through API calls.
In vSphere 7, instant clone guest customization is supported {Linux only).
lnstant cloning is convenient for large-scale application deployments because it ensures memory
efficiency, and you can create many VMs on a single host.
To avoid network connicts, you can customize the virtual hardware o f the destination \fM during
the instant cloning operation. For example, you can custom.ize the l'vtAC addresses of the virtual
N!Cs or the serial and parallel port configurations of the destination VM.
Starting with vSphcrc 7, you can customize the guest operating system for Linux VMs only. You
can customize networking settings such as JP address, DNS server, and the gateway. You can
change these settings without having to power off or restart the VM.
406
Module 7: Virtual Machine Management
7-19
Lab 16: Using VM Templates: Creating Templates and
Deploying VMs
Create a VM template, create a customization specification, and deploy VMs rrom a template:
1. Create a Virtual Machine Template
2. Create Customization Specifications
3. Deploy Virtual Machines from a Template
Module 7: Virtual Machine Management
407
7-20
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Create a template of a virtual machine
Deploy a virtual machine from a template
Clone a virtual machine
Create customization specifications for guest operating systems
408
Module 7: Virtual Machine Management
7-21
Lesson 2: Working with Content Libraries
Lesson 2: Working with Content Libraries
vmware·
Module 7: Virtual Machine Management
409
7-22
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the benefits of a content library
Recognize types of content libraries
Deploy a virtual machine from a content library
410
Module 7: Virtual Machine Management
7-23
About Content Libraries
Content libraries are repositories of OVF templates and other file types that can be shared and
synchronized across vCenter Server systems globally.
•
Organizations might have multiple vCentcr Server instances in data centers around the globe. On
these vCenter Server instances, organizations might have a collection of templates, ISO images,
and so on. The challenge is that all these items are independent of one another, with di fferent
versions of these file$ and templates on various vCenter Server instances.
The content library is the solution to this challenge. IT can Store OVF templates, ISO images. or
any other file types in a central location. The templates, images, and file.s can be published, and
other content libraries can subscribe to and download content. The content library keeps content
up to date by periodically synchronizing with the publisher, ensuring that the latest version is
available.
Module 7: Virtual Machine Management
411
7-24
Benefits of Content Libraries
Storage and consistency are key reasons to install and use a content library.
Using content librartes, administrators can perform the following functions:
Store, version, and share content.
Perform distributed file management.
Synchronize content librartes across sites and vCenter Seiver instances.
Mount an ISO file directly from a content library.
Perform live updates of VM templates
. _.. ,..,_
D•"'••-0..-
a ......... , __
__-
""-
.. -·
n
.....
Content librhrles
- ·- - - ·IPllW ....,
,,,.
-
..
M
Shari ng content and ensuring that the content is kept up 10 date arc major tasks.
For example, for a main vCcntcr Server instance, you create a central content library to store the
master copies ofOVF templates, ISO images, and other file types. When you publish this content
library, other libraries, which m.igbt be located anywhere in th.e world, can subscribe and
download an exact copy of the data.
\Vhcn an OVF template is added, modified, or deleted from the published catalog, the subscriber
synchronizes with the publisher, and the librnries are updated with the latest content.
Starting with vSphcrc 7, you can update a template while simultaneously deploying VMs from the
template. In addition, the content library keeps two copies of the VM template, the previous aad
current versions. You can roll back the template to reverse changes made to the template.
412
Module 7: Virtual Machine Management
7-25
Types of Content Libraries
Types of content libraries are local, published, and subscribed .
••
. ......
~-----------~
-----··
--
AulOMill lC '
Synch
'==="
Metadata
-----
-···-~--...
.
......
-
You can create a loc.~l library as the source for content LhaL you want to save or share. You create
the local library on a single vCenter Server instance. You can then add or remove items to and
from the local library.
You can publish a loc;1J library, and this content library service endpoint can be accessed by other
vCent.er Server instances in your virtual enviromnent. \Vhen you publish a library. you can
configure the authentication method, which a subscribed library must use to authenticate to it.
You can create a subscribed library and populate its content by synchronizing it lo a published
library. A subscribed library contains copies of the published library fi les or only the metadata of
the library items.
The published library can be on the same vCenter Server instance as the subscribed library, or the
subscribed library can reference a published librnry on a different vCenter Server instance.
You cannot add library items to a subscribed li brary. You can add items only to a local or
published library.
Module 7: Virtual Machine Management
413
After synchronization, both libraries conta in the same items, or the subscribed library contains tbc
metadata for tbe items.
414
Module 7: Virtual Machine Management
7-26
Adding VM Templates to a Content Library
libraiy items include VM templates, vApp templates, or other VMware objects that can be contained
in a content library.
Clone e tempi.ate to the content librairy.
Clone et VM to i temotate In uie COl'l(ent library.
:2 ca Photon· Template
............ • ,
v o~~.-...
D
IA
--
I')
... Q. QI o.t.c-Cut. 1- {la~T•-•
e>-·
""' CL.o .."'•
~--0
O:wuw10~
i:'ol Yl1<111MM
G ,,_...a.;
<t-..w
"
-
"""'
rftoe•YM-ll\ij.f~lt
"""~-~~
11°"COM111,.,....
IQ0..•"1<.-v
0
IA
....."'
,, ........, .......
r.uo""
,.._.,
"......" """
...
...
r.1.icT~
"'°""....._~
~
_ --
ei~-
f; WINIQ-W
'~"'"'
!SIVMtO·~
~
-·
.,_
'"""'Wllll
0....1 OS
""""'~"'
-·-,
fSl'i 1 0 lftO I
·I~c- '°""""1• ~ a...to1'~1'
. ,'ila-•-~111\.lltW"I' ~
.- "
Vrvfs and vApps have severa l files, such as log files. disk files, memory files, and snapshot files
that are part ofa single library item. You can create library items in a specific loca l library or
remove items from a local library. You can also upload files to an item in a local library so U1at the
libraries subscribed to it can download the fi les to their NFS or SMB server, or datastore.
Module 7: Virtual Machine Management
415
7-27
Deploying VMs from Templates in a Content Library
The templates 1n lhe content
library can be used to deploy
VMs and vApps.
Each VM template. vApp
template, or other type of file in a
library is a library item.
0
~ VMllbrary
ca ..... -__.....
You can also mount an ISO file
directly from a content library.
Ia"-""'"'"""""", __
•llM_....,.
gc_.au.,.
~°""'"
....
416
Module 7: Virtual Machine Manag ement
......
7-28
Lab 17: Using Content Libraries
Create a content library to clone and deploy virtual machines:
1. Create a Content Library
2. Clone a VM Template to a Template in a Content Library
3. Deploy a VM from a VM Template in the Content Library
Module 7: Virtual Machine Management
41 7
7-29
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the benefits of a content library
Recognize types of content libraries
Deploy a virtual machine from a content library
418
Module 7: Virtual Machine Management
7-30
Lesson 3: Modifying Virtual Machines
Lesson 3: Modifying Virtual Machines
vmware·
Module 7: Virtual Machine Management
419
7-31
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe virtual machine settings and options
Add a hot-pluggable device
Dynamically increase the size of a virtual disk
420
Module 7: Virtual Machine Management
7-32
Modifying Virtual Machine Settings
You ean modify a VM's
configuration by editing the VM's
settings:
Add virtual hardware·
- You can add some
hardware v1hile the VM is
powered on.
Remove virtual hardware:
- You can remove some
hardware only wtlen the VM
is powered off.
• Set VM options,
• Control a VM's CPU and
memoiy resources.
_,_...,_-(14
Edit Settings
V>-lwl--·•
-.........
••
--·--...... ...
I
.._,
•
~-·
,
JI._.._
.... ...........
__...
•
~o-•
•
v .......
--·
-_..._
••.,.~o
~~
...
·~·
x.·
~o...,,•
:>)'"-OW"-
S..:"'111-•
l'll . . .
L
"""'....
Joi.. IJ..l!C.......
,,._.:,,..,_
0 .1.-.
-·-...---"'""""'
U.l•I••'-
w ............
........_!Uoo>
-
,.,..,.,_.
....,,,...... .,
You might have LO modi fy a VM's configuration, for example, to add a network adapter or a
virtual disk. You can make all VM changes while the VM is powered off. Some VJvl hardware
changes can be made while the VM is powered on.
vSphere 7.0 makes the following virtual devices available:
•
\Vatchdog timer: Viitua.l device used to detect and recover from operating system problems. If
a fail ure occurs, the watchdog timer anempis to reset or power off the VM. This feature is
based on Microsoft specifications: \Vatchdog Resource Table (\l/DRT) and \Varchdog Action
Table (\VDAT).
The watchdog timer is useful with high availability solutions such as Red Hat High
Availability and the Jv!S SQL failover cluster. This device is also use fol on VMware Cloud
and in hosted environments for implementing custom failover logic to reset or power off
VMs.
Module 7: Virtual Machine Management
421
•
Precision Clock: Virtual device that presents the ESXi host's system time to the guest OS.
Precision Clock helps the guest operating system achieve clock accuracy in the I millisecond
range. The &'tleSt operating System uses Precision Clock time as reference time. Precision
Clock is not directly involved in guest OS time synchronization.
Precision Clock is useful when precise timekeeping is a requirement for the application, such
as for financial services applications. Precision Clock is also useful when precise time stamps
are required on events that rrack financial transactions.
•
Virt·ual SGX: Virtual device that exposes Intel's SGX technology to \/Ms. Intel 's SGX
technology prevents unauthorized programs or processes from accessing certain regions in
memory. Intel SGX meets the needs of ihe Trusted Computing Industry.
Virtual SGX is useful for applications that must conce<il proprietary algorithn1s and
encryption keys from unauthorized users. For example, cloud service providers cannot inspect
a client's code and data in a virtual SGX·proiccted environn1enl.
422
Module 7: Virtual Machine Management
7-33
Hot-Pluggable Devices
With the hot plug option, you can
add resources to a running VM.
Examples of hot-pluggable
devices:
• use controllers
Ethernet adapters
Hard disk devices
.
.
With supported guest operating
systems, you can also add CPU
and memory while the VM is
po\vered on.
.•--£Gil ~U"'IJ$
-~
I
'""'- "'·-·-
_,_
----
--1----·
-·-·
--·
-·........_
--
--ft
.
. -·--._
--·
-·
-r::--·-·..... ...
·----:-!- - -'!..
I
•
.,._
,
-- •
•
•
-·-· _,,._,
--•
•
I
•
•
-·
~-
.,._
.
•
------
,,._.,
u
-=-a
Adding devices to a physical server or removing devices from a physical server requires that you
physically internet with the server in the data center. \Vhen you use VMs, resources can be added
dynamically without a disruption in service. You must shut down a VM to remove hardware, but
you can reconfigure the VJ\1 without entering the data center.
You can add CPU and memory while the VM is powerc.d on. T hese leatures are called the CPU
H0t Add and Memory Hot Plug, which arc supported only on guest operating systems that support
hot-pluggable functionality. T hese features arc disabled by default. To use these hot-plug features ,
the following requirements must be satis fied:
•
You must install VMware Tools .
•
The VM must use hardware version 11 or later.
•
The guest operating system in the VM must support CPU and memory hot-plug features.
•
The hot-plug features must be enabled in the CPU or Memory settings on the Virtual
Hardware tab.
Module 7: Virtual Mach ine Management
423
If virtual NUMA is configured with virtual CP U hot-plug scllings, the VM is started without
virtual NUlvlA. Instead, the VM uses UM.A (Uniform l\1cmory Acce.s s).
424
Module 7: Virtual Machine Management
7-34
Dynamically Increasing Virtual Disk Size
You can Increase the size of a virtual disk that belongs to a pov1ered-0n VM .
--
-
•
,-
l
- ___-,..
I
I --
---
~--
0
-·
_,
--·-- _ - - ..... ·-.... ...
--- ---· .. .. I
-·---·--. ,. ,.. , ., _
-............,_"____..... - -...
.
•u
__,-1 --
._~
' ,r
_.._
--
-
.-....,.__
,.,.......
_
.. "-°•
_,, .,.......
-
--~..
~
.-·
..
~ 4'1>'W>
u
-·----·
.....- - - ....
..__ ,._
·~··
·- ·-..,-
•
--__........
•
I
__
--
.,_ _
\Vhcn you increase the s ii.c o f a virtual disk, the VM must not have snapshots attached.
After you increase the s ize o f a virtual disk, you might need to increase the size o f the file system
on this disk. Use the appropriate tool in the guest OS co enable the file system co use the newly
allocated disk space.
Module 7: Virtual Machine Management
425
7-35
Inflating Thin-Provisioned Disks
Thin-provisioned virtual disks
can be converted to a thick,
eager-zeroed format.
To inflate a thin-provisioned disk:
The VM must be powered oW.
Right-click the VM's file with
the .vmdk extension and
select innate.
Or you can use vSphere Storage
vMotion and select a thickprovisioned disk as the
destination.
r,;1
Class-Oatast0f9
.......
•
• .,. "'·
.... ·~
--·
-·
~
r:-,........-.
, . _ . , ........ (II
·----·· ·---·-............ -.. --·-
b----- ...--.. i..-·----·..
••• -··
,1~n.
;110-..
C.•-H-·•
""
1.3-·I
•
-·~
~o
~-~
....... 0
~-"'·
>•
llOI...
j), .....f! ..
-~~
,,_
,·-___
e,.,.
_,i~··
'-.1111...,..,llc..
..J Jtll.-
--.~'MOl DOI
-~
.,_
'~e
00
••
...........
~
•
""'""''•
••
'"
IC•·••-
~M
1'11!"'1 ... II
••
~=-
~-
\Vhcn you i nllate a thin-p rovisioned di sk, the inllated virtual disk occupies the entire datastore
space originally provisioned to it. Inflating a thin-provisioned disk converts a thin disk to a virtual
disk in thick-provisioned format.
426
Module 7: Virtual Machine Management
7-36
VM Options: General Settings
You can use the VM Options tab
to modify properties such as the
display name for the VM and the
type of guest operating system
that is installed.
I
--------- _..
----___
-·..
.. __ _
-- ______
___
.._
---
.,.
Uoder General Options, you can view the location and name o f the configuration file (with the
.vmx extension) and the location oftbe Vl\1's directory.
You can select the text for the configuration fi le and the working location to copy and paste them
into a document. However, only the display name and the gue.s t operating system type can be
modified.
Changing the display name docs not change the names of all the VM files or the directory that the
VM is stored in. \Vhen a VM is created, the filenames and the directory name associated with the
VM are based on its display name. But changing the display name later does not modi fy the
filename and the directory name.
Module 7: Virtual Machine Management
427
7-37
VM Options: VMware Tools Settings
You can use the VMware Tools controls to customize the power buttons on the VM.
E<1n; Setr.ngs-
___
.. ..______
__ -------- ·----°"""'--'
·--.... _
·-__ ·-. ....
___ - ~
··--
...
"
.- ,,__
,__~
'
l> ·••O. -
o~ -
..
..........11o1...,.
..,.,_b<' ""''
~.
....
.,. ,,.,..
.
•
_,..
"
CU"Jto1'*e POWer
button 111;tion-.
Otell for \lpct;ftff
to VMwtte Tools.
'
5(Mdult VM•<'•··
Toots K ripu .
....--~-
\Vhcn you use the VMware Tools controls to customize the power buttons on the VM, the \TM
must be powered off.
You can select the C heck and upgrade VMware T ools before each po wer on check box to
check for a newer version of VMware Tools. lfa newer version is found, VMware Tools is
upg)'aded when the VM is power cycled.
\Vhcn you select rhc Synchronize g uest time with host check box, the g uest operating system's
clock synchronizes with the host.
For info rmation about time keeping best practices fo r the g uest operating systems that you use, sec
VMware knowledge base articles 1318 at httr:ilkb.vmwarc.comlkbll 318 itnd 1006427 a1
http:i:'kb. vmware.comlkb/ 1006427.
428
Module 7: Virtual Machine Management
7-38
VM Options: VM Boot Settings
Occasionally, you might need to set the VM boot options.
-- ______
-·_
___
----- -·-..___
-__ -··---·
··-...
---·__ 1.--. ·- ·-- r
t:d!l Stoll•
.. __,_
.,,,
..,.,.""
I ·,
'
'
,
_.,.
---
----
...
.
._
~-
•
I
'
..
.
...
------
.
-
lilWIDI• SCICw"• 8ooc.
I_o~,,_.,Oft.
I ...... .
" L
~ht!Yil~
'- ·
. . .....cf
\Vhen you build a VM and select a guest operating system, BI.OS or EFT is selected automatically,
depending on the firmware-supported by the operating system. lvlac OS X Server guest operating
systems support only Extensible Firmware Interface (EFI). If the operating system supports BIOS
and EFI, you can change the boot option as needed. However, you must change the option before
installing the guest OS.
UEFI Secure Boot is a security standard that helps ensure that your PC boots use only software
that is trusted by the PC manufacturer. In an OS that supports UEFI Secure Boot, each piece of
boot software is signed, including the bootloader, the operating system kernel, and operating
system drivers. If you enable Secure Boot for a VM, you can load only signed drivers into that
VM.
\Vith the Boot Delay value, you can set a delay between the time when a Vivi is mrned on and the
guest OS starts to boot. A delayed boot can help stagger VM start ups when several VMs are
powered on.
Module 7: Virtual Machine Management
429
You can change the BJOS or EFTseHings. For example, you might want to force a \ TM to start
from a CD/DVD. The next time the VM powers on, it goes straight into the B LOS. A fo rced entry
into the firmware setup is much easier than powering on the VM, opening a console, and quickly
trying to press the F2 key.
\l/ith the Fa iled Boot Recovery setting. you can confi&'llre the VM to retry booting after I0
seconds (the default) if the VM fails to find a boot device.
430
Module 7: Virtual Machine Management
7-39
Removing VMs
You can remove a VM in the following ways:
Remove from the inventory:
ti
- The VM is unregistered from the ESXi host and vCenter
Server.
- The VM's files remain on the disk.
@--_
--,.
--·1-- . . ·'",._
.. ·- ,._"
.,_
~
,,
.
\
0 ....................
lllio.o..-
c~-
'# QW·--~
::::..1.e .....
- The VM can later be registered (added) to the inventory.
Delete from d isk:
R..._1)
~
- All VM files are permanenUy d ele te d from the datastore.
- The VM is unregistered from the ESXi host and vCenter
Seiver.
·0--oi--·1 ·""-·"~­
tp_.,.,_
lo.II""~-
••
~."""..._,_
------
\Vhcn a VM is removed from the inventory, iLS tiles remain at the same storage location, and the
VM can be re-registered in the datastore browser.
Module 7: Virtual Machine Management
431
7-40
Lab 18: Modifying Virtual Machines
Modify a virtual machine's hardware and rename a virtual machine:
1. Adjust Memory Allocation on a Virtual Machine
2. Increase the Size of a VMDK Fite
3. Rename a Virtual Machine in the vCenter Server Inventory
432
Module 7: Virtual Machine Management
7-41
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe virtual machine settings and options
Add a hot-pluggable device
Dynamically increase the size of a virtual disk
Module 7: Virtual Machine Management
433
7-42
Lesson 4: Migrating VMs with vSphere vMotion
Lesson 4: Migrating VMs with vSphere
vMotion
vmware·
434
Module 7: Virtual Machine Management
7-43
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize the types of VM migraUons that you can perform within a \/Center Server instance and
across \/Center Server Instances
Explaln ho\v vSphere vPY1otion works
Verify vSphere vMotion requirements
Migrate virtual machines using vSphere vMotion
Module 7: Virtual Machine Management
435
7-44
About VM Migration
Migration means moving a VM from one host, datastore, or vCenter Server instance to another host.
datastore, or vCenter Server instance.
Depending on the power state of the VM that you migrate, migration can be cold or hot
· A cold migration involves moving a pov1ered-0tr or suspended VM to a new host.
• A hot migration involves moving a po\vered-on VM to a new host.
Depending on the Vfl.~ resource type, you can perform different types of migrations.
Migration Type
Descr1ption
Compute resource only
fi.1ove Vfi..I, but not its storage, to another hOSL
Fot a hot migration. vSphere 'vMotion is use<! to move the VM
Storage only
MOY& a VM's st0tage, but not Its host to a new datastote.
FOf a hot migration~ vSphere Storage vMotion is used to move the
VM
ti.•ove a VM to anolh&'I' host and dttl<lttore
F0r a ho1 m1'3r.a11on, VSphem vfvlotion and \#Sphere Stotage vMolion
are used to move the VM.
Both eomput& relource and s.toragl!'
A deciding factor for using a particular migration technique is the purpose of performing the
migration. For example, you might need to stop a host for maintenance but keep the VMs running.
You use vSphere vMotion to migrate the VMs instead of performing a cold or suspended VM
migration. If you must move a VM's files to another datastore to better balance the disk load or
transition to another storage an ay, you use vSphere Storage vMotion.
So1ne 111igr<1tior1 tech.J1iqltes, st1cl1 as vSpl1ere ''Motion 111igration, have special hard\\•are
requirements that must be met to function properly. Other techniques, such as a cold migration, do
not have special hardware requirements to function properly.
You can perfonn the different types of migration on either powered-off (cold) or powered-on (hot)
VMs.
436
Module 7: Virtual Machine Management
7-45
About vSphere vMotion
A vSphere vMotion migration moves a powered-on VM from one host to anoU1er. vSphere vMotion
changes the compute resource only.
vSphere vMotion provides the following capabilrties:
Improvement 1n overall hardware use
Continuous VM operation v1h1le accommodating scheduled hard\vare downtime
vSphere ORS to balance VMs across hosts
vm
vm
vm
vm
vm
ESXI
ESXi
0
0
vm
Using vSpherc vMotion, you can migrate running VMs from one ESXi host to another ESXi host
with no disruption or downtime. \Vith vSphere vMotion, vSpbere DRS can migrate running \/Ms
from one host to another to ensure that the VMs have the resources that they require.
\Vith vSphere vMotioa, the entire state oftbe VM is moved from one host to another, but the data
storage remains in the same datastore.
The state information includes rhc current memory content and all the information that defines and
identifies the Vtv!. The memory content includes transaction data and whatever bits of the
operating system and applications are in memory. The definition and identification information
stored in the state includes all the data that maps to the VM hardware elements, such as the BIOS,
devices, CPU, and MAC addresses for the Ethernet cards.
Module 7: Virtual Machine Management
437
7-46
Enabling vSphere vMotion
To enable vSphere vMotion, you must configure a VMkernel port \vilh the vSphere vMotion service
enabled on the source and destination host.
,._
.....
...........
•
-----·--.......y--·
_.
...........
Vl<ftuil &Witches
-•<--••
-
•
~-
~1
_........_
0.i..llY.. _
438
__
----- ·-__,.
--.....-·-
Module 7: Virtual Machine Management
......
•
....c.o... '"-'.,..._
-....._._ .
-·"""'1~.u's
-... ---·-.. -··
--- ,_.-·-•
....... _....
.,.._,......,_
,----..~
.......-_,_
-·~
•
••-•--·..,
[·
•
••
..r ... -
•
.
·~·
_,
JX-•~11'
·-
--
~·
7-47
vSphere vMotion Migration Workflow
The source host (ESX101 ) and the destination host (ESXi02) can access the shared datastore that
holds the VM's files.
VMA
VMA
rNetwo•k
{Network•
00
ProdurtlQl"I-)
;>-{1{i J [ ! {Jr')
vSt>he(e vMotion N etwotk
-+--...L-1..J-I====
Production Network -+ - - - -"'++----T"""_ _ _ _ _...__ _
0
To play the animation, go to httrs://,•mware.bravais.com'siVb,a Db6<•wpSMKyKc940F.
A vSphere vMotion migration consists of the following steps:
l.
A shadow VM is created on the destination host.
2.
The VM' s memory state is copied over the vSphere vMocion network from the source host co
the targec host through the vSphere vMotion network. Users continue to access the Vivi and,
potentially, update pages in memory. A list of modified pages in memory is kepc in a memory
bitmap on the source host.
3.
After the first pass o f memory state copy completes, another pass of memory copy is
perfonned to copy any pages that changed during the last iteration. This iterative memory
copying continues until no changed pages remain.
4.
After most of the VNl' S memory is copied fro m the source hose to the target host, the VM is
quie.seed. No additional activity occurs on the VM. In the quiesce period, vSphere vMocion
transfers the VN! device stace and memory bitmap co the destination hose.
Module 7: Virtual Machine Management
439
5.
Immediately a fter the VM is quiesced on the source host, the Vivi is initialized and starts
running on the target host. A Gratuitous Address Resolution Protocol (GARP) request notifies
the subnet that VM A's MAC address is now on a new switch port.
6.
Users access the
7.
The memory pages that the VM was using on the source host are marked as free.
440
V~1
on the target host instead of the source host.
Module 7: Virtual Machine Management
7-48
VM Requirements for vSphere vMotion Migration
For migration with vSphere vMotion, a VM must meet these requirements:
If 1t uses an ROM disk, the ROM file and the LUN to which 11 maps must be accessible by the
destination host.
It must not have a connection to a virtual device, such as a CO/DVD or lloppy dnve, w~h a hostlocal image mounted.
In vSphere 7, you can use vSphere vMotion to migrate a VM with a device attached through a remote
console.
Remote devices include physical devices or disk images on the client machine running the remote
console.
For the complete Iist o f vSphere vMotion migration requirements, see vCe11ter Server and Host
J\.fanageniem at https://docs. vmware.com/en/VMware-
vSphcre/7.Oicom. vmware.vsphere. vcenterhost .dociG UI D-3 B5 AF213 1-C534-4426-B9 7AD I 4019 A&O I OF.html.
Module 7: Virtual Machine Management
441
7-49
Host Requirements for vSphere vMotion Migration (1)
Source and destination hosts must have the following characteristics:
Accessibility to all the VM's storage:
- 128 concurrent migrations are possible per VMFS or NFS datastore.
- If the swap file location on the destination host differs from the swap file location on the source
host, the S\Yap file is copied to the ne\v location.
VMKernel port with vSphere vMotion enabled
Matching management network IP address families (1Pv4 or 1Pv6) between the source and
destination hosts
You cannot migrate a VM from a host that is registered to vCcntcr Server with an 1Pv4 address to
a host that is registered with an JPv6 address.
Copying a swap file to a new loc.ation can result in s lower migrations. lf thc dc.s tination host
caonot access the specified s wap fde location, it stores the swap file with the VM configuration
file.
442
Module 7: Virtual Machine Management
7-50
Host Requirements for vSphere vMotion Migration (2)
At least a 1 Gigabit Ethernet (1 GigE) netwofl<:
- Each active vSphere vMotion process requires a minimum throughput of 250 MbiVsecond on
the vSphere vMotion network.
- Concurrent migrations are limited to four on a 1 Gbps network.
- Concurrent migrations are limtted to eight on a 1OGbps (or faster) network.
- For better performance, dedicate at least two port groups to the vSphere vMotion traffic.
Compatible CPUs:
- The CPU feature sets of both the source host and the destination host must be compatible.
- Some features can be hidden by using Enhanced vMot1on Compatibility or compatib1hty masks.
Using I GbE network adapters for the vSphcrc vMotion network might result in migration failure,
if you migrate VMs with large vGPU profiles.
Module 7: Virtual Machine Management
443
7-51
Checking vSphere vMotion Errors
When you selec1 lhe hosl and
cluster, a validation check is
performed lo verify lhal most
vSphere vMotion requirements
are met.
. , ,_.
__ ... -··--·c-,
.
,
.
"'
_
,
_
,
.
,
.
.
,
.
,
.
_
--'
-·- __ ,,
•
~
~
·-···-··-·~
I
lll:m
..,
,.._
'"-
--
•
-
Qw.i
·-
"
-~-~
-··
•"_..,_
.. -' ·-·
~
•
·~-c..-
•••
-·
'
-
If validation succeeds, you can continue in the wizard. Ir validation docs not succeed, a lis1 of
vSphere vMotion eITors and warnings displays in the Compatibility pane.
\Vith warnings, you can still pcrfo nn a vSphcrc vMotion migration. But with errors, you can.not
continue. You must ex.it the wizard and fix all errors before retrying the migration.
If a failure occurs during the vSphere vMotion migration, the VM is not migrated and continues to
run on the source host.
444
Module 7: Virtual Machine Management
7-52
Encrypted vSphere vMotion
When migrating encrypted VMs, you always use encrypted vSphere vMotion.
For VMs that are not encrypted, select one of
the following encrypted vSphere vMotion menu
items:
Disabled .
Opportunistic (default): EncryptedvSphere
vMotion is used if the source and destination
hosts support it.
Required: If the source or destination host
does not support encrypted vSphere vMotion,
the migration fails.
.... :Ml_
-·-·---
---·--·-
--··-
·-·-..-
--· --"
1 51 -
- -
Encrypted vSphcrc vMotion secures confidentiality, integrity, and authenticity of data that is
transferred with vSphere vMotion. Encrypted vSpbere v~1otion suppo11s all variants of vSphere
vMotion, including migration across vCenter Server systems. Encrypted vSphere Storage vMotion
is not supported.
You cannot tum off encrypted vSphere v~1otion for encrypted VMs.
Module 7: Virtual Machine Management
445
7-53
Cross vCenter Migrations
With vSphere vMotion. you can migrate VMs between linked vCenter Server systems.
Migration of VMs across vCenter Server instances is helpful In the following cases:
Balancing workloads across clusters and vCenter Server instances that are in the same site or in
another geographical area.
Moving VMs between environments that have different purposes. rar example. from a development
environment to production environment.
Moving VMs to meet different Service Level Agreements (St.As) for storage space, performance,
and so on.
446
Module 7: Virtual Machine Management
7-54
Cross vCenter M igration Requirements
Cross vCenter migrations have lhe following requirements:
ESX1hosts and vCenter Server systems must be at vSphere 6.0 or later.
vCenter Server instances must be in Enhanced Linked Mode.
Hosts must be time-synchronized.
VS~e VMOllO,. Nt1WOilk
A
~E
l
---
'"' i "' l
8
~-=
~
-
~
I
,,.. r "''
- ·-··-18
........
lt!lhltft(ltd
You can perform cross vCcntcr migrations between vCcnter Server instances of different versions.
For information on the supponed versions, see VMware knowledge base article 21 06952 at
http://kb. vmware .cont'kb'2 I06952 .
Module 7: Virtual Machine Management
447
7-55
Network Checks for Cross vCenter Migrations
vCenter Server performs several netwot1< compatibility che<:ks to prevent the following configuration
problems:
MAC address incompatibility on the destination host
vSphere vMotion migration from a distributed switch to a standard s\vitch
vSphere vMotion migration between distributed switches of different versions
448
Module 7: Virtual Machine Management
7-56
VMkernel Networking Layer and TCP/IP Stacks
The VMkemel networking layer provides connectivity to hosts and handles the standard system
traffic of vSphere vMotion, IP storage, vSphere Fault Tolerance, vSAN, and others.
TCP/IP stacks at the VMkemel level:
Default TCP/IP stack
vSphere vMotion TCP/IP stack
Provisioning TCP/IP stack
Custom TCP/IP slacks
Consider rhe following key poinrs about TCP/IP sracks at rhe VMkernel level:
•
Default TCPtrP stack: Provides networking support for the management traffic between
vCcntcr Server and ESXi hosts and for system traffic such as vSphere vMotion, JP storage,
and vSpherc Fault Tolerance.
•
vSphere vlvlotion TCP/lP stack: Supports the traffic for bot migrations ofVMs.
•
Provisioning TCP/ lP stack: Supports the traffic for VM cold migration, cloning, and snapshot
creation. You can use the provisioning TPC/JP stack to handl.e NFC traffic during longdistance vSphcre vlv!ot ion migration. VMkemel adapters configured with the provisioning
TCP/ I}' stack handle the trafiic from cloning the virtual disks of the migrated VMs in long·
distance vSphcrc vMotion.
By using the provisioning TCP/IP stack, you can isolate the traffic from the cloning
operations on a separate gateway. After you configure a VMkernel adapter with the
Module 7: Virtual Machine Management
449
provisioning TCP/IP stack, all adap1ers on the default TCP/IP siack are disabled for the
provisioning traffic.
•
Custom TCP/ IP stacks: You can create a custom TCP/IP siack on a host 10 forward
networking traffic through a cus1om applica1ion. Open an SSH connection to the host and run
the vSphere CLI command:
esxcl i ne t wo rk ip nets t a ck a dd - N="stack name "
Take appropria1e security measures to prevent unauthorized access to the management and system
traffic in your vSphere environment. For example, isola1e the vSphere vMotion traffic in a
separate network that includes only the ESXi hosts that participate in the migration. Isolate the
management traffic in a network that only network and security administrators can access.
450
Module 7: Virtual Machine Management
7-57
vSphere vMotion TCP/IP Stacks
Each ESXi host has a second TCP/IP stack that is dedicated to vSphere vMotion migration.
--·-·-·ibdi§c
I
user Wotld
:·- I VMkernel
I
'I
'
'-
.-
'I
.
-·
vSphefe vMotion
,---------
'I
I
- - - - -; - - - - - - .- - - - - - - r -,- - - - - - - - . - - - - - - . - - - - - - - , - - - - - - - -,
1
- .-
-
1. , . _
~
DHCP
PING
hostd
-
-•-
.,
. .
:
-
r'
:
...'
:
VMKTCP·API
-,-~
:
;
...'
-----•
06fouU TCP/IP
vSpht,tfO vMotlon TCP/IP
• Sep.orotc Memory Hoop
• Scparato Memory H~;ip
•ARP Tables
• ARP T<1bfe!i
• ~bng rable
•Routing Tabfe
• Default G.ateway
• Default Gateway
. - . -- . -- . - . -
. - . --
.-
. -- . -- . -
l
•
- . - . - .-
vSphcrc vMotion TCP/TP stacks support the traffic for hot migrations ofVtvfs. Use the vSphcre
vMotion TCP/IJ' stack to provide better isolation for the vSphere vMotion traffic. After you create
a VMkemel adapter on the vSphere vl\1otion TCP/IP stack, you can use only this stack for
vSphere v/\llotion migration on this host.
The VMkernel adapters on the default TCP/IP stack are disabled for the vSphere v/\llotion service
after you create a Vl\1kernel adapter on the vSphere vMotion TCP/I P stack. !fa hot migration uses
the default TCP/IP stack while you configure VMkernel adapters with the vl\1otion TCP/IP stack,
the migration completes successfully. However, these VMkemel adapters on the default TCP/IP
stack are disabled for future vSphere v/\llotion sessions.
Module 7: Virtual Machine Management
451
7-58
Long-Distance vSphere vMotion Migration
Long-distance vSphere vMotion migration is an
extension of cross vCenter migration.
vCenter Server Instances are spread across
large geographic distances and \Vhere the
latency across sites is high.
Use cases for long·d1stance vSphere vMotion
migration:
Permanent migrations
I
Disaster avoidance
Site Recovery Manager and disaster
avoidance testing
Multisite load balancing
Follow-the-sun scenario support
ln the follow-the-sun scenario, a global support team m.ight support a certain set ofVMs. As one
suppo1t team ends their workday, another support team in a different timezone takes over support
duty. Tile VMs being supported can be moved rrom one geographical location to another so that
the support team on duty can access those VMs locally instead of long distance.
452
Module 7: Virtual Machine Management
7-59
Networking Prerequisites for Long-Distance vSphere
vMotion
Long-distance vSphere vMotion migrations must connect over layer 3 connections:
Virtual machine network:
- L2 connection.
- Same VM IP address is available at the destination.
vSphere vMolion network:
- L3 connection.
- Secure
(~you
are not using vSphere 6.5 or tater encrypted vSphere vMotion).
-250 Mbps per vSphere vMotion operation.
-Round-trip time between hosts can take up to 150 milliseconds.
Module 7: Virtual Machine Management
453
7-60
Lab 19: vSphere vMotion Migrations
Configure vSphere vMotion networking and migrate virtual machines using vSphere vMotion:
1. Configure vSphere vMotion Ne~vorking on sa-esxi-01 .vclass.local
2. Configure vSphere vMotion Networking on sa-esxi-02.vclass.local
3. Prepare Virtual Machines for vSphere vMotion Migration
4. Migrate Virtual Machines Using vSphere vMotion
454
Module 7: Virtual Machine Management
7-61
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize the types of VM migraUons that you can perform within a \/Center Server instance and
across \/Center Server Instances
Explaln ho\v vSphere vPY1otion works
Verify vSphere vMotion requirements
Migrate virtual machines using vSphere vMotion
Module 7: Virtual Machine Management
455
7-62
Lesson 5: Enhanced vMotion Compatibility
Lesson 5: Enhanced vMotion Compatibility
vmware·
456
Module 7: Virtual Machine Management
7-63
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe Enhanced vMotion Compatibility
Configure EVC mode on a vSphere cluster
Explain how per-VM EVC mode works with vSphere vMotion
Module 7: Virtual Machine Management
457
7-64
CPU Constraints on vSphere vMotion Migration
CPU compatibility bet\veen source and target hosts is a vSphere vMotion requirement that must be
met.
CPU Charactcr1st1c.s
Exact t.1atch Required By
Reason
Source Host and Target Host
Clock speeds, each& s12es,
NJA
hyport.hreadlng, al'Kf number of cores
The VMkern&l v1rtualt%es these
character1Sibcs
ri.1enuracturer (Intel or AMO) family
and generation (Opteron4 Intel
Westmere)
A$1phcable
Instruction sets contain many small
Presence Of absence of SSEJ.
SSSE3 or SSE4 1 instructions
A4Jphcabte
fv1ultimedla instructions are usable
directly by appllcah0C1s
VlrtualizaUon hardware assist
For 32-bit VMs: NIA
The Vfl.1kernel virtualtzes this
charactensllc
For 64-bit VMs on Intel
Intel 64-bit w1th VMware
implenlefltaUonuses ·ntel VT
d1fference-s
Applicable
Depending on the CPU charac1cris1ic, an exact ma1ch bet we.e n 1he source and largct host might or
mighl not be required.
For example, ifhyperthreading is enabled on the source host and disabled on the destination host,
the vSphere vMotion migration continues because the VMkernel haodle.s this difference i.n
characteristics.
Bui, if the source host procc.s sor supports SSE4. I instructions and the destination hos1 processor
does not support them, the hosts are considered incompatible and the vSphere vMotion 111igra1io11
fails.
SS81. I instructio.n s are application-level instructions that bypass the virtualization layer a.n d might
cause application inslability if mismatched after a mignttion with vSphere vNlolion.
458
Module 7: Virtual Machine Management
7-65
About Enhanced vMotion Compatibility
Enhanced vMotion Compatibility is a cluster feature that prevents vSphere vMotion migrations from
failing because of Incompatible CPUs.
This feature \Vorks at the cluster level. using CPU baselines to configure all processors in the cluster
that are enabled for Enhanced vMotion Compatibility.
A_
..... la• ..~ ol C"f'U " - ' "
~~·II b<,-"~"'\''''"l lr'I U"'
111
111
Ill
Ill
•
111
x
Ill
Ill
'
'' Slty~h-"'.
''
'
Ctuster Enabled for EVC
Enhanced vJ\1otion Compatibility ensures that all hosts in a cluster present the same CPU feature
set to VMs, C\'en if the CPUs on the hosts differ.
Enhanced vMotion Compatibility faci litates safe vSpherc vMotion migration across a range of
CPU generations. With Enhanced vMotiou Compatibility, you can use vSphere vMotion to
migrate Vlvls among CPUs that otherwise are considered incompatible.
Enhanced vMotion Compatibility allows vCcnter Server to enforce vSphere vMotion
compatibility among all hosts in a cluster by forcing hosts to expose a common set of CPU
features (baseline) to Vlvls. A baseline is a set of CPU features that are suppotted by every host in
the cluster. \Vhen you configure Enhanced vMotioo Compatibility, you set all host processors in
the cluster to present the features of a baseline processor. After the features are enabled for a
cluster, hosts that arc added to the cluster are automatically configured to the CPU basel ine.
Hosts that cannot be configured to the baseline are not permitted to join the cluster. Vlvls in the
cluster always see an identical CPU feamre set, no matter which host they happen to run on.
Module 7: Virtual Machine Management
459
Because rhis process is automatic, Enhanced vMotion Compatibility is easy to use and requires no
specialized knowledge of CPU features and masks.
460
Module 7: Virtual Machine Management
7-66
Enhanced vMotion Compatibility Cluster Requirements
All hosts in the cluster must meet several requirements:
Use CPUs from a single vendor, either Intel or AMO:
- Use Intel CPUs with Merom microarchitecture and later.
- Use AMO first-generation Opteron CPUs and later.
Be enabled for hardware virtualization: AMO·V or Intel VT.
Be enabled for execution-disable technology: AMO No execute (NX) or Intel execute Disable
(XO).
Be configured for vSphere vMotion migration.
Applications in VMs must be CPU 10 compatible.
Before you create an Enhanced vMotion Compatibility cluster, ensure that the hosts that you
intend to add to the cluster meet the requirements.
Enhanced vMotion Compatibility automatically configures hoses whose CPUs have lntcl
FlexM igration and Ai\/10-V Extended Mii;,•ration tecb.nologies to be compatible with vSphere
vN!otion with hosts that use older CPUs.
For Enhanced vMotion Compatibility to function properly, the applications on the VMs must be
written to use the CPU 10 machine instruction for discovering CPU features as recommended by
the CPU vendors. vSphere cannot support Enhanced vMotion Compatibility with applications that
do not follow the CPU vendor recommendations fo r discovering CPU features.
To det.emtlne which EVC modes are compatible with your CPU. search the VMware
Compatibility Guide at http://www.v111warc.com/resources/co111patibilitv. Search for the server
model or CPU family, and click the entry in the CPU Series column to display the compatible
EVC modes.
Module 7: Virtual Machine Management
461
7-67
Enabling EVC Mode on an Existing Cluster
You enable EVC mode on an existing cluster to ensure vSphere vMotion CPU compatibility between
the hosts in the cluster.
- .. ..
_..,.,,,
_,
.
,
-- -
C.,..fv.!-
--
-
.._ .
.. I··
--~--~
You can use one of the following methods to create an Enhanced
-
v~1otion
Compatibility cluster:
•
Create an empty cluster with EVC mode enabled and move hosts into the cluster.
•
Enable EVC mode on an existing cluster.
For information about Enhanced vlV!otion Compatibility processor support, see VMware
knowledge base article I003212 at hnp:/lkb.vmware.com/kbl I0032 L2.
462
Module 7: Virtual Machine Management
7-68
Changing the EVC Mode for a Cluster
Several EVC mode approaches are available to ensure CPU compatibilrty:
If all the hosts in a cluster are compatible wrth a newer EVC mode, you can change the EVC mode
of an existing Enhanced vMotion Compatibility cluster.
You can enable EVC mode for a cluster that does not have EVC mode enabled.
You can raise or lower the EVC mode, but the VMs must be in the correct power state to do so.
EVC Mode
Raise !he EVC mode to a CPU
baseline with more features.
Lower the EVC mode to a CPU
basetinewith rewer features.
VM Po\ver Action
Running VMs can tema n powered on
New EVC mode features are not ava1lable to the VMs until they a.re
oowe1ed off and powered back on again (Suspending and resuming
lhe Vf!..i 1s not suffic:;enL)
Power offVMs if they are powered on and running at a higher EVC
mode than the one you Intend to enable.
Module 7: Virtual Machine Management
463
7-69
Virtual Machine EVC Mode
EVC mode can be applied to some or all VMs in a cluster:
At the VM level, EVC mode facilitates the migration of VMs beyond the cluster and across vCenter
Server systems and data centers.
You can apply more granular definitions of Enhanced vMotion Compatibility for specific VMs.
VM EVC mode is independent of the EVC mode defined at the cluster level.
VM EVC mode requires vSphere 6.7 or later.
\l'MEVC~
'
ESX! Clu<;.tttr
\Vi th per· VM EVC mode, the EVC mode becomes an attribute of the VM rather than Lhc speci fic
processor generation it happens to be booted on in the cluster. This feature supports seamJe.ss
migration between two data centers that have different processors. Further, the feature is persisted
per VM and does not lose the EVC mode during migrations across clusters or during power
cycles.
ln this diagram, EVC mode is not enabled on the cluster. The cluster consists of differing CPU
models with different feature sets. The VMs with per· VM EVC mode can run on any ESXi host
that can satisfy the defined EVC mode.
464
Module 7: Virtual Machine Management
7-70
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe Enhanced vMotion Compatibility
Configure EVC mode on a vSphere cluster
Explain how per-VM EVC mode works with vSphere vMotion
Module 7: Virtual Machine Management
465
7-71
Lesson 6: Migrating VMs with vSphere Storage vMotion
Lesson 6: Migrating VMs with vSphere
Storage vMotion
vmware·
466
Module 7: Virtual Machine Management
7-72
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Explain how vSphere Storage vMotion works
Recognize guidelines for using vSphere Storage vMotion
Migrate virtual machines using vSphere Storage vMotion
Migrate both the compute resource and storage of a virtual machine
Module 7: Virtual Machine Management
467
7-73
About vSphere Storage vMotion
With vSphere Storage vMotion. you can migrate a powered-on VM from one datastore to another.
Using vSphere Storage vMotion, you ca.n
perform the following tasks:
Move VMs off arrays for maintenance or to
upgrade.
Change the disk provisioning type.
••
ESX1
Ill
0
Ill
Change Vf\+1 files on the destination datastore
to match the inventory name of the VM.
Migrate between datastores to balance traffic
across storage paths and reduce latencies.
Redistribute VMs or virtual disks to different
storage volumes to balance capacity or
:f r •
f@ 11 fii. I 11($ 1:1ng.1.M
improve performance.
vSpherc Storage vMotion provides nexibility to optimize disks for performance or transform disk
type$, which you can use to reclaim space.
You can place the \ fM and a ll its disks in a single location, or you can select separate locations for
the VM configuration ti le aod each virtual disk. During a migration with vSphere Storage
vN!otion. the VM does not change the host that it runs on.
\Vi th vSphcre Storage vfVfotion, you can rename a VM 's lilcs on the destination datastorc. T he
migration renames all virtual disk. configuration. snapshot, and . nvram files.
468
Module 7: Virtual Machine Management
7-74
vSphere Storage vMotion In Action
vSphere S torage v'Motion uses an 1/0 mirroring architecture to copy disk blocks bel\veen the source
and destination.
fit
~write VO
l() VMOK.
-
..•
..
.
.. Storage
VMk:ernet:
Artay
...
~-SQUl'QI O..IHlore
~
Dftt!l'l~(»fl o~
0
To play the animation, go to
httrs://,•mware.bravais.com'si~nHZwq043PJ8dV3ZRV7p .
The vSphere Storage vMotion migration process includes the following steps:
l.
lnitiat.e storage migration.
2.
Use the Vl\.fkemel data mover or vSphere Storage APls - Array Integration to copy data.
3.
Stai1 a new VM process.
4.
Mirror 1/0 calls to file blocks that are already copied to the virtual disk on the destirnltion
datastore.
5.
Transition to the destination VM process to begin accessing the virtual disk copy.
The storage migrntion process does a single pass of the disk, copying all the blocks to the
destination disk. If blocks are changed after they are copied, the blocks are synchronized from the
source to the destination through the mirror driver, with no need for recursive passes.
Module 7: Virtual Machine Management
469
This approach guarantees complete transactional integrity and is fast enough 10 be unnoliccablc 10
the end user. The mirror driver uses lhe VMkernel da1a mover to copy blocks of data from the
source disk to the de~1ination disk. Tbe mirror driver synchronously minors writes to both disks
during lbe vSphere Storage vMotion operation.
Finally. vSphere Storage vtvlotion operations are perfom1ed either internally on a single ESXi bost
or offloaded lo the stornge array. Operations pe1formed internally on the ESXi host use a data
mover built into the YMkernel. Operations are offloaded to the storage an ay if the an ay supports
vSphere Storage APls - Array Integration, also called hardware acceleration.
470
Module 7: Virtual Machine Management
7-75
Identifying Storage Arrays That Support vSphere
Storage APls - Array Integration
vSphere Storage vMotion offloads lls operations to the storage array if the array supports VMv1are
vSphere Storage APls - Array Integration, also called hardware acceleration.
Use the vSphere Client to determine whether your storage array supports hardware acceleration.
·-·
.
----
_.
....
.....
•••
- -- -
---·
._
--~··
...·----·- --........
--- ..~-
-~
'
--- --- -...... ·-·-- -- --
D
-- ---·-··
---
Module 7: Virtual Machine Management
471
7-76
vSphere Storage vMotion Guidelines and Limitations
Guidelines:
• Plan the migration and coordinate with administrators.
• Perform migrations during off-peak hours.
Limilahon:
• Independent virtual machine disks must be in persistent mode.
A VM and its host must meet certain resource and configuration requirements for the virrual
machine disks (VMDKs) to l>e migrated with vSphere Storage vMotion. One of the requirements
is that the host on which the VIVI runs must have access both to the source datastore and to the
target datastore.
During a mif,>rJ tion with vSphere Storage vMotion, you can change the disk provisioning type.
Migration with vSphere Storage vMotion changes VM files on the destination datastore to match
the inventory name of the VM . T he migration renames all virtual disk, configuration, s napshot,
and .nvram-extension files. If the new names exceed the maximum filename length, the migration
does not succeed.
4 72
Module 7: Virtual Machine Management
7-77
Changing Both Compute Resource and Storage
During Migration ( 1)
When you change both compute resource and storage during migration, a VM changes its host,
datastores, networks. and vCenter Server instances simultaneously:
• This technique combines vSphere vMotion and vSphere Storage vMotion into a single operation.
• You can migrate VMs across clusters, data centers, and vCenter Server instances.
•mm1 gs1.4ag,e
_r\..
rc:10
~ ~10
I
In•
I
0
111
I
9
Gd
.----•••
I
·.e :.
You can migrate VMs beyond storage accessibility boundaries and between hosts, within and
across clt1sters, data centers~ a11d vCe11ter Ser''er insta11ces.
This type of migration is useful for perfonning cross-cluster migrations, when the target cluster
VMs might not have access to the source c luster's storage. Processes on the VM continue to nm
during the migration with vSphere vMotion.
Module 7: Virtual Machine Management
473
7-78
Changing Both Compute Resource and Storage
During Migration (2)
Compute resource and storage migration is useful for virtual infrastructure administration tasks.
Task
Benefit of Using vSphere Storage vlilotlon
Host maintenance
Storage maintenance and
reconfiguration
Yoo can move VMs from a host when you want lo perform tlost
maintenance.
You can mova VMs ftom a storage device so that you can peiform
mainte.nance or 1econ.figure the storage de·lice without VM downtime.
Storage load red1slnbuhon
Yoo can rnanuatly red1st11bu1e Vfv1s or V\nual disk$ to different storage
volumes to balance ~pa.city 01 to 1mptove p&rfocmanee.
474
Module 7: Virtual Machine Management
7-79
Lab 20: vSphere Storage vMotion Migrations
Use vSphere Storage vMotion to migrate virtual machines:
1. Migrate Virtual Machine Files from Local Storage to Shared Storage
2. Migrate Both the Compute Resource and Stora9e of a Virtual Machine
Module 7: Virtual Machine Management
475
7-80
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Explain how vSphere Storage vMotion works
Recognize guidelines for using vSphere Storage vMotion
Migrate virtual machines using vSphere Storage vMotion
Migrate both the compute resource and storage of a virtual machine
476
Module 7: Virtual Machine Management
7-81
Lesson 7: Creating Virtual Machine Snapshots
Lesson 7: Creating Virtual Machine
Snapshots
vmware·
Module 7: Virtual Machine Management
477
7-82
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Take a snapshot of a virtual machine
Manage muniple snapshots
Delete virtual machine snapshots
Consolidate snapshots
478
Module 7: Virtual Machine Management
7-83
VM Snapshots
With snapshots, you can preserve the state of
the VM so that you can repeatedly return to the
same state.
For example, if problems occur during the
patching or upgrading process, you can stop the
process and revert to the previous state.
VM snapshots are not recommended as a VM
·--...........
·-'"
"
._._,.
___...
-------- .._
backup strategy.
Snapshots are useful when you want to revert repeatedly to the same state but do nOL want LO
create multiple VMs. Examples include patching or upgrading the guest operating system in a
VM.
The relationship between snapshots is like the relationship between a parent and a child. Snapshots
are organized in a snapshot tree. In a snapshot tree, eacb snapshot has one parent and one or more
children, except for the last snapshot, which has no children.
Module 7: Virtual Machine Management
479
7-84
Taking Snapshots
You can take a snapshot while a VM is powered
on, powered off, or suspended.
A snapshot captures the following items·
VM configuration
• VM memory state (optional)
• Virtual disks
---·-----·
---
A snapshot capture does not include
Independent virtual disks (persistent and
nonpersistent).
.....
-
A snapshot captures the emire state of the VM at the time that you take the snapshot, including the
following states:
•
Memory Stale: The contents of the V'M ' s memory. T he memory s tate is captured only if the
VM is powered on and if you select the Snapshot the virtual machine's memory check box
(selected by default).
•
Settings state: The VM settings.
•
Disk state: The state of a ll the VM's virtual disks.
At the time that you take the snapshot, you can also quiesce the guest operating system. T his
action quiesces the Jiie system of the guest operating system. This option is available only if you
do not capture the memory state as part of the snapshot.
480
Module 7: Virtual Machine Management
7-85
Types of Snapshots
A delta or chftd disk is created when you create a snapshot:
On the VMFS datastore, the delta disk is a sparse disk.
• Delta disks use different sparse formats depending on the type of datastore.
Snapshot 'fype
Notes
Filename
Bloc:k Size
VMFSsparse
VMFS5 with vlrtuol disks smaller than 2 TB
f - d eJ La . v1nd k
5t2 bytes
SEsparse
• VMFS6
• V~'1FS5 with virtual disk$ larger th.en 2 TB
Space efficient (thin provisioned)
Supports disk reclamation(unmap)
v- sesparsa . vnldk
4KB
vsanSparse
vSAN
001 t<-1 ot>jec t
4MB
Delta disks use different sparse formats depending on the type of daiastore.
•
VM.FSsparse: YMfSS uses the VMFSsparse format for virtual disks smaller than 2 TB.
VMFSsparse is implemented on to1>ofVl\1FS. The YlvfFSsparsc layer processes 110
operations issued to a snapshot VM. Technically, VMfSsparse is a redo log that starts empty,
immediately after a VM snapshot is taken. The redo log expands to the size of its base
YMDK, when the entire VMDK is rewri tten with new data after the Vlvl snapshot. This redo
log is a file in rhe VMFS darastore. On snapshot creation, the base VMDK attached to rhe VM
is changed ro the newly created sparse VMDK.
•
SEsparse: SEsparse is a default format for all delta disks on the YMFS6 daiastores. On
Vlv1FS5, SEsparse is used for virtual disks of the size 2 TB and larger. SEsparse is a format
that is like VlvfFSsparse with some enhancemenrs. This format is space efficient and supports
the space-reclamation technique. \Vith space reclamation, blocks that the guest OS deletes are
marked. The system sends commands to the SEsparse layer in the hypervisor co unmap those
Module 7: Virtual Machine Management
481
blocks. The unmapping helps to reclaim space allocated by SEsparse after che guest operating
system deletes the data.
482
Module 7: Virtual Machine Management
7-86
VM Snapshot Files
A snapshot consists or a set of files:
-Snapshot# . vm$n: Configuration state
- snapahotf . vmem: Memory state (optional)
- ooooof . vmok: Disk descriptor
• - 000001 - de l t" . vmd~: VMFS5delta
- 000001 - acapar:>e . vmdk: VMFS6 delta
. vmsd: Stores names, descriptions, and
relationships ror an the VM's sr1apshots
ICM o.u,.1.,,,.
·L-t--•--
-l-----· --......... ---·· ·-- - ·-·
-•.. -- --"
--- -·--....,_--·.. l-·--·-.-·-"'..···___.. -·-- -.. ,·---·-- ·-.. 1 .....-
•
I _., _ _
~
•
,,
~··
•
....
•
A VM can have one or more snapshots . For each snapshot, the following files are created:
•
Snapshot delta file: This file contains the changes to the virtual disk' s data since the snapshot
was taken. \.\'hen you take a s napshot of a Vtvl, the state of each virtual disk is preserved. T he
VM stops writi ng to its - flat . vmdk file. Writes arc redirected to > - ### ###delta . vmdk (or - j # # JI# #- sesparse . vmdk) instead (for which # # ll # # ll is the next
number in the sequence). You can exclude one or more virtual disks fro m a snapshot by
des ignating them as independent disks. Configuring a virtual disk as independent is typically
done when the virtual disk is created, but this option can be changed whenever the VM is
powered off.
•
Disk descriptor file: - 00000 I . vmdk. This file is a small text file that contains information
about the snapshot.
•
Configuration state file: - . v msn. W is the next number in the sequence, staning wiih I. This
file holds the active memory state of the VM at rhc point that the snapshot was taken,
including virtual hardware, power State, and hardware version.
M odule 7: Virtual Machine Management
483
•
lvlemory state ti le: - . vmem. This tile is created if the option to include memory state was
selected dming the creation of the snapshot. It contains the entire contents of the VMs at the
time that the snapshot of the VM was taken.
•
Snapshot active memory file: - . vmem. This file contains the contents of the Vivi memory if
che opcion co include memory is selected during the creacion of che snapshot.
•
The . vmsd tile is che snapshot list file and is created at che lime that che VM is creaced. II
maincains snapshot information for a VM so that it C<ln create a snapshot list in the vSphere
Client. This information includes the name of the snapshot . vmsn file and the name of the
''irtual disk file.
•
The snapshot state file has a .vmsn extension and i.s used to store the state ofa VM wben a
snapshot is taken. A new . vms n file is created for every snapshot that is created on a VM and
is deleted when the snapshot is deleted. The size of this file varies, based on the options
selected when the snapshot is creaced. For example, including the memory state of the Vivi in
the snapshot increases the size of the . vmsn file.
You can exclude one or more of the VMDKs from a snapshot by designating a virtual disk in the
VM as an independent disk. Placing a virtual disk in independent mode is typically done when the
virtual disk is created. If the virtual disk was created without enabling independent mode, you
must power off the VM to enable it.
Other fi les might also exist, depending on the VM hardware version. For example, each snapshot
of a Vivi that is powered on has an associated . vmem fi le, which contains the guest operating
system main memory, saved as part of the snapshot.
484
Module 7: Virtual Machine Management
7-87
VM Snapshot Files Example (1)
VM with
no snapshots
I
v
8i w
10-01
Q YotJ are her•
Winl0-01.vmsd
Winl0-01-flat.vmdk
Winl0-01.vmdk
This example shows the snapshot and virtual disk fi les rhat arc created when a VM has no
snapshots, one snapshot, and two snapshots.
Module 7: Virtual Machine Management
485
7-88
VM Snapshot Files Example (2)
VMwlth
no snapshots
First snapshot taken
(with memory state)
486
IvBJw~
Winl0-01. vmsd
t~inl0-01-f lat. vmdk
01
Q Vou•«IW<e
v
8J Wlnl().01
-~'i·
rP itnlO
Q You are tll!l't-
Module 7: Virtual Machine Management
WinlO-Ol.vmdk
"inl0-01-Snapshotl.vmem
Winl0-01-Snapshotl.vmsn
~~in 10 ... 01-000001-se~parse. vmdk
~inlO-Ol-000001.vmdk
7-89
VM Snapshot Files Example (3)
Wlnl0-01.vrnsd
VMwllh
no snapsriots
First snapshot taken
(with memory state)
WJnl0-01-fl~t.vmdk
Win I 0-0 l. Vllld k
Winl0-01-Snap~hotl.vmem
"' {jJ W,,10-01
<.J
~ SKur - Patcti IO
Q You ide !'l...(e
BJ W'l\W-Ol
Second snapshOt taken
(without momory slate)
Winl0-0l-Snapahot2.vmsn
°$St.curl'!\' P•lCf'! I 0
:(b Soci
w1n10-01-snapshot1.vmsn
Winl0-01-000001-sosparse.vmdk
Winl0-01-000001.vmdk
l '>.it.ctl 1
Q You
Wiolo -01 -000002 -~esparse.vmdk
Winl0- 01-000002.vmdk
•it"""'"
Module 7: Virtual Machine Management
487
7-90
Managing Snapshots
In the vSphere Client, you can view snapshots for the actwe VM and take edtt, delete. and revert to
actions.
Manage snapshots
-
I ,,.........
·~
o---
•
··- _._
·- -·r:;.. . _
~-·-·
r.: ••""'
'-" »""'
-
.r..-........... ,
...... .,. ..
......_ __
.,._
...
•• • ••
"
4--,
--·..-·. -··- .....
~
o-··-
-
....... ~1.f
-._._. -
~
-~-
......
.,_
l
11.... "i ~ .....
·I
..
You can perfonn the following actions from the Manage Snapshots window:
•
E<li1 the snapshot: E<lil the snapshot name and description.
•
Delete the snapshot: Remove the snapshot from the Snapshot Manager, consolidate the
snapshot files 10 !he parent snapshot disk, and merge with the YM base disk.
•
Delete all snapshots: Commit all the intermediate snapshots before the cunent-state icon (You
are here) 10 the YM and remove all snapshots for that YM.
•
Revert lo a snapshot: Restore. or revert to, a particular snapshot. The snapshot that you restore
becomes the current snapshot.
\Vhen you revert to a snapshot, you remrn all these items to the stale that they were in at the time
that you took the snapshot. If you wam the Yl\1 lo be suspended, powered on, or powered olT
when you start it, ensure !hat the VM is in the correct state when you take the snapshot.
488
Module 7: Virtual Machine Management
Deleting a snapshot (DELETE or D ELETE ALL) consolidates the changes between snapshots
and previous disk state.s. Deleting a snapshot also writes to the parent disk all data from the delta
disk that contains tbe information about the deleted snapshot. \Vhen you delete the base parent
snapshot, all changes merge with the base VMDK.
Module 7: Virtual Machine Management
489
7-91
Deleting VM Snapshots ( 1)
If you delete a snapshot one or more levels above the You are here level, the snapshot state is
deleted. In this example, the snap01 data is committed into the parent (base disk), and the
foundation for snap02 is retained.
s.oap02 Delta !2 GB)
0
To play the animation, go to httrs://,•mwarc.bravais.com'si\VhbcXR4sSwk2V17McaX[).
490
Module 7: Virtual Machine Management
7-92
Deleting VM Snapshots (2)
If you delete the latest snapshot, the changes are committed to Its parent. T he snap02 data is
committed into snap01 data, and the snap02 -delta . vmdkfile is deleted.
ea.. Ou;l< (5 GB}
snap0 2 Delta (2 GB)
0
To play the animation, go to httrs://,•mwarc.bravais.coml:;/IO.IYYQzMTv7rvxHgNcQp.
Module 7: Virtual Machine Management
491
7-93
Deleting VM Snapshots (3)
If you delete a snapshot one or more levels below the You are here level, subsequent snapshots are
deleted, and you can no longer return to those states. The snap02 data is deleted.
Base Olsk (5 GB)
tnap01 O.lla 11 GBI
>-----0
Delete this
snapshot.
Yovorehete.
/
sn:ip02 Dcl!:i (2 G R)
0
To play the animation, go 10 h1qis://,•rnwarc.bravais.comls/NiQxPT3 iyccmQ8\VYXKom.
492
Module 7: Virtual Machine Management
7-94
Deleting All VM Snapshots
The d elete-au.snapshots mechanism uses storage space efficiently. The size of the base disk does
not increase. Snap01 is committed to tile base disk before snap02 is committed.
Base Disk (5 GB)
snap01 Delta (1 GB)
snap02 Delta (2 GB)
0
To play the animation, go to httrs://,•mwarc.bravais.comls/L3ilQHlrv" Ehlgr5p7RP.
All snapsholS before the You are here point arc committed all the way up to the base disk. All
snapshots after You are here arc discarded .
Like a single snapshot delelion, changed blocks in the snapshot over.vrite their counterparts in the
base disk.
Module 7: Virtual Machine Management
493
7-95
About Snapshot Consolidation
Snapshot consolidation is a method for committing a chain of delta disks to the base disks when the
Snapshot Manager shows that no snapshots exist but the delta disk liles remain on the data store.
Snapshot consolidation resolves problems that might occur with snapshots:
The snapshot descriptor file is committed correcuy, and the Snapshot window shows that all the
snapshots are deleted.
The snapshot files (- de lta . vmdk) are still part of the VM.
Delta disk files continue to expand until the datastore on which the VM is located runs out of
space.
Snapshot consolidation is a way to clean unneeded delta disk files from a datastorc. lf no
snapshots are registere<l for a VM, but delta disk files exist, snapshot consolidation conm1its the
chain of the delta disk files and removes them.
If consolidation is oot performed, the delta disk files might expand to the point of consuming alI
the remaining space on the VM 's datastore or the delta disk file reaches its configured size. The
delta disk cannot be larger than the size configured for the base disk.
494
Module 7: Virtual Machine Management
7-96
Discovering When to Consolidate Snapshots
On the Monitor tab under All Issues for the VM, a warning notifies you that a consolidation is
required.
wn
IOI
~spheofe C~ent
ca
I'!
O w..cwcn~
•
:2 l.l w1n10-04
.i..i""' "'
QIOI0.1..-Cll!'
CLillll-lft
C::t..11b\IM$
"l>N)l~ll
&~t;"
(iWIWICl-01
& 'Wrl:l.(;14
a wto-.o.OE.
'
"~
,
•
•
loCllO"«o "'
MOnilor
-.........
All Issues
~
---~--
---t-•-··-
tllglJW'llO-•
~---
o.i-ot.:xi~
l•l'liil
' _,,...
:i.t~>OM lW."°'
\Vith snapshot consolidation, vCcntcr Server displays a warning when the descriptor and the
snapshot files do not match. After the warning displays, you can use the vSphere Client to commit
the snapshots.
Module 7: Virtual Machine Management
495
7-97
Consolidating Snapshots
After the snapshot consolidation
warning appears, you can use
the vSphere Client to consol.idate
the snapshots.
All snapshot delta disks are
commttted to the base disks.
lt:Ji
Cil
n
0 ~rtlil!SfJOt..
..,, Ilt ICM·tllllKef'lef
Cl latl T•inot.lolK
QL.llbVMs
{;! Dno'lon.n
..
~-
&
W'foil0-02
""'"°'
""'""""'
' O!X-" ~l:!'(OI~
"""
·~ 110
..,~illQ~~~
1411 ~<1 to lA!ftt SMl'V'O'l
•1
~ll Toter-~
""""""'
It I>
·l ~T•~~
~ MfVM•
~w~
ti, W11!0-06
• ,,
.....
"'-·
Oeiiett' At WP"\OD
i..to'
•
For a list of best practices for using snapshots in a vSpbere environment, see VMware knowledge
base aiticle 1025279 at http:i/kb.vmware.com/kbi1025279.
496
Module 7: Virtual Machine Management
7-98
Lab 21: Working with Snapshots
Take VM snapshots, revert a VM to a different snapshot, and delete snapshots
1. Take Snapshots of a Virtual Machine
2. Add Files and Take Another Snapshot of a Virtual Machine
3. Revert the Virtual Machine to a Snapshot
4. Delete an Individual Snapshot
5, Delete All Snapshots
Module 7: Virtual Machine Management
497
7-99
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Take a snapshot of a virtual machine
Manage muniple snapshots
Delete virtual machine snapshots
Consolidate snapshots
498
Module 7: Virtual Machine Management
7-100
Lesson 8: vSphere Replication and Backup
Lesson 8: vSphere Replication and Backup
vmware·
Module 7: Virtual Machine Management
499
7-101
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the components in the vSphere Replication architecture
Deploy and configure vSphere Replication
Recover replicated virtual machines
Explain the backup and restore solution for VMs
Describe the benefits of vSphere Storage APls - Data Protection
500
Module 7: Virtual Machine Management
7-102
About vSphere Replication
vSphere Replication is an
extension for vCenter Server.
It provides hypervisor-based VM
replication and recovery.
\IM
L::J
\f'M
Target
~
1111 0 111 I
vSphere Replication is an al!emative to array-based replication. vSphere Replication protects VMs
from partial or complete site failures by replicating the VMs between the following sites:
•
From a source site to a target site
•
\l/ithin a single site from one cluster to another
•
From multiple source sites to a shared remote target site
vSpbere Replication provides several benefits as compared to array-based replication:
•
Data protection at lower cost per VM
•
A replication solution that supports ncxibility in storage vendor selection at the source and
target sites
•
Overall lower cost per replication
Module 7: Virtual Machine Management
501
7-103
About the vSphere Replication Appliance
The vSphere Replication appliance provides all the components that are required to perform VM
replication.
VSpherc Replica11on
Appliance
Standard OVF
Virtual Appliance
Delivered with the
vSphere Platform
Included with Most
vSphere Editions
The vSphere Replication appliance includes the following components:
•
A vSphere Replication server that provides the core of the vSpbere Replication infrastructure
•
An embedded database that stores replication configuration and management information
•
A vSphere Replication management server that perfonns the following functions:
Configures the vSphere Replication server
Enables, manages, and monitors replications
Authenticates users and checks their pennissions to perform vSphere Replication
operations
•
A plug-in to the vSphere Client that provides a user interface for vSphere Replication
You can use vSphere Replication inunediately after you deploy the appliance. The vSphere
Replication appliance provides the virtual appliance management interface (VAMI) that is used to
50 2
Module 7: Virtual Machine Management
reconfigure the appliance after deployment. For example, you can use the VAMJ to change the
appliance security seuings, change the network settings, or configure an external database. You
can deploy additional vSphere Replication servers by using a separate OVF package.
Module 7: Virtual Machine Management
503
7-104
Replication Functions
With vSphere Repltcation, you can replicate a VM from a source site to a target site, monitor and
manage the replication status, and recover the VM at the target sije.
Sourc~ Sh~
Taf9et Site
VM
You can replicate a VNI between two sites. vSphcrc Replication is installed on both source and
target sites. Only one vSphere Replication appliance is deployed on each vCenter Server. The
vSpbere Replication (VR) appliance contains an embedded vSphere Replication server that
manages the replication process. To meet the load-balancing needs of your environment, you
might need to deploy additional vSphere Replication servers at each site.
When you configure a VM for replication, the vSphere Replication agent sends changed blocks in
the VM disks from the source site to the target site. The changed blocks are applied to the copy of
the VM. This process occurs independently of the storage layer. vSphere Replication performs an
initial full synchronization of the source VM and its replica copy. You can use replication seeds to
reduce the network traffic that is generated by data transfer during the initial full synchronization.
504
Module 7: Virtual Machine Management
7-105
Deploying the vSphere Replication Appliance
You use the vSphere Client to deploy the vSphere Replication appliance on an ESXi host:
1. Download the installation package to a local directory or obtain its URL.
2. Use the standard vSphere OVF deployment wizard to deploy the appliance.
a. Select Menu > Hosts and Clusters.
b. Right-click an ESXi host and select Deploy OVF template.
... ....-..
..
___
_
---______
·---·-___
•-----·.._
___ ........ -."--'-'='..:::,..-----..-----.. ·-...
·------ ·------- .-
••
...
_.,._
·-
,
-
-
-
:
c
:
:
'
:
:
-
:
-
~
__
--------
"
-~
.. ___
_
____ -......__
;•-w•-··--- ---- ·----....
.., ,
·-- - ----- •.;t;.;·_-=.,
-
.....
-
You can deploy vSphcre Rcplic.ation with e ither an 1Pv4 or fPv6 address. l\1ixing IP addresses, for
example having a sing)e appli<mce with an !Pv4 and an lPv6 address, is not supported.
After you deploy the vSphcre Replication appliance, you use the V AMl to register the endpoint
and the certi!icate of the vSphere Replication management server with the vCenter Lookup
Service. You also use the VAMJ to register the vSphere Replication solution user with the vCenter
Single S ign-On administration server.
For more details on deploying the vSphere Replication appliance, see Vi\1ware 115phere
Replication Doc11111en/atio11 at https:lldocs. vmware.comien/vSphere-Replicationlinde' .html.
Module 7: Virtual Machine Management
505
7-106
Configuring vSphere Replication for a Single VM
To configure vSphere Replication for a VM in the vSphere Client, right-click the VM in the inventory
and select All vSphere Replication Actions > Configure.
l'!::ill - -· ·. ·----·--
--···· ·~·· ·
I
@ Ed11 Sentngs. ..
Move To...
Rename ...
Edrt Notes...
Tags & C\Jstom Attributes
'
Add Permission...
Alarms
'
n ntD<y
De
"
D
All \/Center Orehe$tra!O< plugln Acl1ons
All vsphere Replleabon AcOons
'•fOJ Configure Repllcatlon...
l l-.J-11>
•
M~---""r
I
vSphcrc Replication can protect individua l VMs and their vir1ual disks by replicating tbem to
another location.
506
Module 7: Virtual Machine Management
7-107
Configuring Recovery Point Objective and Point in
Time Instances
During replication configuration, you can set an RPO and enable retention of instances from multiple
points in time.
..
••
., l
~uton~
_, 2 U~I•*"'
., l lttf'IUdM · . , 4 b ....l IOOt~
llt-1)'tf. . .
COll~\lll!f«;OWIJIJM"IJ'
---.tyhiiril ~
lot .... ~• 111acM1c1
!1'tl"Ct
i.-RP01mes.i.a~&m-
w..w-..-..i1n_,,,__
~ hflilc#IOll l>fllOllll
.;
., ) lht~tl....-
il'Ol'll In """
Iris•-·
•-Ad~ .,.lll'>Oll9 -
-.
.,...,_ Ill
•""P'"'* 11"""9 ....,.,y lilcp.U..ollO!I f/lc;bllllf \N 1.....lllilil •
•
...,~
ll-RPOpMtcll1I_.,.,._.""'" ,-ll'l'ljlll•M•4ll!;ft>l••IMAPOllll~•-.,._.. ..,....... ll)mt•.. "'1111!1\fte1' llf lllt..,_ 1W 'IOti - 1 IO loltesi
The value that you set for the recovery point objective (RPO) affects replication scheduling.
\Vhen you configure replication, you set an RPO to determine the time between replications. For
example, an RPO of I hour aims to ensure that a VM loses no more than I hour of data during the
recovery. For smaller RPOs, less data is lost in a recovery, but more network bandwidth is
consumed to keep the replica up to date .
For a discussion about how the RPO affects replication sche.duling, see vSphere Replication
Administration at https: lldocs.vmware.com/enlvSphereReplicationi8.31com. vmware. vsphere.replication-ad min.doclGUID-35COAJ 55-CS 7D-4 30D-876E9D2 E6 DE4 DDOA .html.
Module 7: Virtual Machine Management
507
7-108
Recovering Replicated VMs
WilhvSphere Replication, you can recover VMs that were successruny replicated at the target site.
You can recover one VM at a time on the Incoming Replications tab.
··-
·-·-
- -·-·---· ··------
-.
·-•
___ __
----.."·-··- ------·-·.. ___. ____.
.-----_
s-----·-.
.-..----·--__
__
---·---·----· ,,,
,,
......
....
_...,_..,..
_,._...,_.,_
,
-~~-
""' ...........
To perform Lhe recovery, you use the Recover virtual machine wizard in the vSphcre Client at Lhc
target site.
You arc asked to select either to recover the VM with all the latest data or to recover the Vl'vl with
the most recent data available on the target site:
•
If you select Recover with recent changes t·o avoid data loss, vSphcre Replication performs
a full synchronization of the VM from the source s ite to the target site before recovering the
VM. T his option 1·equires that the data of the source VM be accessible. You can select this
option only if the VM is powered off.
•
Ir you select Recover with latest available data, vSpherc Replication recovers the VJ\1 by
using the data from the most recent replication on the target site, without performing
synchronization. Selecting this option results in the loss of any data that changed since the
most recent replication. Select this option if the source Vivi is inaccessible or if its disks are
corrupted.
508
Module 7: Virtual Machine Management
vSphcrc Replication validatc.s the input 1ha1 you provide and recovers the. Vivi. ff successful, the
VM status changes to Recovered. The Vwl appears in the inventory of the target site.
Module 7: Virtual Machine Management
509
7-109
Backup and Restore Solution for VMs
To protect your VM's data, you can use a backup solution based on vSphere Storage APis · Data
Protection.
With vSphere S torage AP ls - Data Protection, backup producls can perform centralized. efficient, off-
host. LAN-free backups of vSphere VMs.
Virtual
AppUance
..- -----------------------·.•
..
- ····-····'····-·--···········-...
...'
.
VMware vSphere
o00
1
'
- =i
_ ,,.,-.................... -=
---- 0
vSphcrc Storage APis - Data Protection is VMwarc 's data protection framework, which was
introduc.e d in vSphere 4.0. A backup product that uses this AP! can back up VMs from a centrJI
backup system (physical o r virtual system). The backup does not require backup agents or any
backup processing to be done inside the guest operating system.
Backup processing is offioaded from the ESXi host. In addition. vSpbere snapshot capabilities are
used to support backups across the SAN without requiring downtime for VMs. As a result,
backups can be performed nondisruptively at any time of the day without requiring extended
back-up windows.
For frequently asked questions about vSphere Storage APls - Data Protection, see V!vlware
knowledge base article 102 1175 at https:/ikb. vmwarc.cornfs lan iclell 021 175 .
510
Module 7: Virtual Machine Management
7-110
vSphere Storage APls - Data Protection: Offloaded
Backup Processing
Configure the storage enV1ronment so that the backup server can access the s torage volumes that
are managed by the ESXi hosts.
Backup prcx:essing is offloaded lrom the ESXi host to the backup server, which prevents local ESXi
resources lrom becoming overloaded.
llM
~
llM
,,,.....l
1111
0
1111
Ill
0
Ill
!11~111
··~
...,
One of the. biggest bottlenecks that limits backup performance is the backup server that is handling
all the backup coordination tasks. One of these backup tasks is copying data from point A to point
B. Other backup tasks do much CPU processing. For example, tasks are performed to determine
what data to back up and what not to back up. Other tasks are perfonned to deduplicate data and
compress data that is written to the target.
A server with insutlicient CPU resources can greatly reduce baclrnp performance. Provide enough
resources for your backup server. A physical server or VM with an ample amount of memory and
CPU capacity is necessary for the best backup performance possible.
The motivation to use LAN-free backups is to reduce the stress on the physical resources of the
ESXi host when VMs are backed up. LAN-free backups reduce the stress by offloading backup
processing from the ESXi host to a backup proxy server.
Module 7: Virtual Machine Management
511
You can conr.gurc your environment for LAN -free backups to the backup server. also called the
backup proxy server. for LAN-free backups. the backup server must be able to access the storage
managed by the ESXi hosts on which the VNls for backup are running.
I f you use Nt\S or direct-attached storage, en.sure that the backup proxy server accesses the
volumes with a net.work-based transport. If you run a direct SAN backup, zone the SAN and
configure the disk subsystem host mappings. The host mappings must be configured so that all
ESXi hosts and the backup proxy server access the same disk volumes.
512
Module 7: Virtual Machine Management
7-11 1
vSphere Storage APls - Data Protection: ChangedBlock Tracking
With changed-block tracking, the
backup solution copies only file
blocks that changed since the
last backup.
1
Changed-block tracking supports
raster incremental backups.
[~
I
I
.,,I(,\IM(tlc
~
I
· (1tt,vmdk
8
8
............ ............
• •• • •
• • •••
Changed-block tracking (CBT) is a VNlkernel feature that t.rncks the storage blocks of VMs as
they change over time. The VMkernel tracks block changes on VMs, enhancing the backup
process for applications that are developed to exploit vSphere Storage AP ls - Dara Protection.
By using CBT during restores, vSphere Data Protection offers fast and efficient recoveries of VMs
to their original location. During a restore process, the backup solution uses CBT to determine
which blocks changed since the last backup. The use of CBT reduces data transfer within the
vSphere environmem during a recovery operation and, more imporiant, reduces the recovery rime.
Module 7: Virtual Machine Management
513
7-112
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the components in the vSphere Replication architecture
Deploy and configure vSphere Replication
Recover replicated virtual machines
Explain the backup and restore solution for VMs
Describe the benefits of vSphere Storage APls - Data Protection
514
Module 7: Virtual Machine Management
7-113
Activity: Virtual Beans VM Management ( 1)
As a Virtual Beans administrator, you work with your team to consider whk:h vSphere features lo use
for key VM management processes. Provide one or more suggestions for each process.
Vlnual Beans Process
vSphere Suggestions
Pr<Ms1onlng and deploying VMs
Maintaining VMs (patching and upgradu>g opeyabng
systems and appllcauons)
Back ng up VM•
Disaster recovery and bus1nes$ cont1nu1ty
Module 7: Virtual Machine Management
515
7-114
Activity: Virtual Beans VM Management (2)
As a Virtual Beans administrator, you work with your team to consider whk:h vSphere features lo use
for key VM management processes. Provide one or more suggestions for each process.
Vlnual Beans Process
Pr<Ms1onlng. and deploying VMs
vSphere Suggestions
Use VM templates Consider creating a. template and a
c;us.tomlzation speoificahon for each guest operattng system type
Manage all templatesv~ith the content hbrary H~ve the pnmary
data center publish its library to the secondary data center, when
tl comes onltne.
ri..1ainlaintn.g VP.~s (plltchlng and upgrading
operating systems and apphcalloos}
Take a snapshot or the VM before applying any pate Iles or
up~t01;
Manage all le111plateswilh the content library Using the content
lttxary. you can update templates while V~1s are deployed from
the template
516
Module 7: Virtual Machine Management
7-115
Activity: Virtual Beans VM Management (3)
As a Virtual Beans administrator, you work with your team to consider whk:h vSphere features lo use
for key VM management processes. Provide one or more suggestions for each process.
Vlnual Beans Process
Backing up \11\.1$
vSphere Suggestions
Use a vSptlere Storage APls • Oata Protection solution Check
knowledge base artic.f.P.102ti75 for baokupsolut1on$ that a.re
curzenlly available
Dis.aster recoveey and business continuity
Use vSphere Repfication. which p1otects vti.~s from partial or
complete site rallure
For planned downhme. use the various types or vSphere vMotion
migrations to move VMs between hosts, bel\veen vCenler SeNef
instances and even between data centers
Module 7: Virtual Machine Management
517
7-116
Key Points
vCenter Seiver provides features for provisioning virtual machines, such as templates, cloning,
and content libraries.
By deploying VMs from a template, you can create many VMs easily and quickly.
You can dynamically manage a VM's configuration by adding hot·pluggable devices and
increasing the size of a VM's virtual disk.
Hot migrations use vSphere vMotion, vSphere Storage vMotion, or both.
You can use VM snapshots to preseive the state of the VM so that you can return repeatedly to the
same state.
You can use vSphere Replication to protect VMs as part of a disaster recovery strategy.
Backup products that use vSphere Storage APls . Data Protection can be used to back up VM
data.
Questions?
518
Module 7: Virtual Machine Management
Module 8
Resource Management and Monitoring
Module 8: Resource Management
and Monitoring
Module 8: Resource Management and Monitoring
519
8-2
Importance
Although t.he VMkernel works proactively to avoid resource contention, maximizing performance
requires both analysis and ongoing monitoring. Developing skills in resource management, you can
dynamically reallocate resources so that you can use available capacity more efficiently.
520
Module 8: Resource Management and Monitoring
8-3
1.
2.
3.
4.
s.
Module Lessons
Virtual CPU and Memory Concepts
Resource Controls
Resource Monitoring Tools
Monitoring Resource Use
Using Alarms
Module 8: Resource Management and Monitoring
521
8-4
Virtual Beans: Resource Management and Monitoring
Virtual Beans wants to proactively manage and monitor ~s vSphere environment.
Virtual Beans administrators must be able to:
Increase allocation or CPU and memory resources for business-critical wo11doads, pariicularly
during peak months.
Monitor VM performance to troubleshoot user problems.
Monitor ESXi host pelformance to avoid potential problems in the infrastructure.
Create monthly reports, for management, that contain graphs of VM resource usage.
Set notifications for when ESX1 hosts experience high resource use.
As a Virtual Beans administrator, you must use the available tools in vSphere for managing and
mon~ori ng
522
the vSphere environment.
Module 8: Resource Management and Monitoring
8-5
Lesson 1: Virtual CPU and Memory Concepts
Lesson 1: Virtual CPU and Memory
Concepts
vmware·
Module 8: Resource Management and Monitoring
523
8-6
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe CPU and memory concepts in relation to a virtualized environment
Recognize techniques tor addressing memory resource overcommitment
Identify additional technologies that improve memory usage
Desclibe how VMware Virtual SMP works
Explain how the VMkernel uses hyperthreading
524
Module 8: Resource Management and Monitoring
8-7
Memory Virtualization Basics
vSphere has the following layers of memory:
Guest OS virtual memory is presented to
applications by the operating system.
Guest OS physical memory is presented to
the virtual machine by the VMkemel.
Host machine memory that is managed by
the VMkernel provides a contiguous,
addressable memory space that is used by
lheVM.
Virtual Machine
~ --- --- ---- - ----- -- ---- --- -- - -
Application
11v;,!~~:~!o•y I
1 ~-~~ 1
I
I
1
Operating
System
Guestos
Physical Memory •
- ~­
------------ i ------------
.. -- ............ -- - .. ·t - - - - .... l . . -....... ,. .J.. ..,
'
ESX i Host
I
ESXI Ho.st
- h;no Momo<y
•
I
I:
:
·-----------------------------!
\Vhcn running a virtual machine, the Vl\1kerncl creates a contiguous addressable memory space
for tl1e Vivi. This memory space has the same properties as the virtual memory address space
presellled to applications by the guest operating system. This memory space allows the Vtvlkernel
to
nm multiple \/Ms simultaneously
while protecting the memory of each Vivi from being
accessed by others. From the perspective of an appl ication running in the VM, the VMkernel adds
an extra level of address translation that maps the guest physical address to the host physical
address.
Module 8: Resource Management and Monitoring
525
8-8
VM Memory Overcommitment
Memory ~ overcommitted when the combined
configured memory footprtnt of all powered-on
VMs exceeds that of the host memory s izes.
When memory is overcommitted:
VMs do not always use their full allocated
.
memory.
• To improve memory usage, an ESXi host
transfers memory from idle VMs to VMs that
need more memory.
OVercommitted memory is stored in the
.
file.
. Memory overhead is stored in the vmx • V S'N p
• . v swp file.
Host machine memory = 32 GB
To~I configured VM memory = 40 GB
On
On
on
1099]
~
190,q]
~
lqpql
[~9ql
10G8
10 GB
10 GB
10GB
•
+
f
•
•
•
•
•.
••
I
•
. ---- ·----·
L: ••
•
c
t:
"
"'"
.vowp
YiN • '.Y*-wf)
••
•
r,
VM2
,v•P
v ma .•.....-....o
Off
B
•
•
•
•
-•
•
••
•
~
VM3
.v owp
vmo.•' .vw.p
The total configured memory sizes of all VMs might exceed the amount of available physical
memory on the host. However, this condition does not necessaii ly mean that memory is
overconunitted. 1'1emory is overcommitted when the working memory size of all Vtvls exceeds
that of the ESXi host's phys ical memory s ize.
Because oft be memory management techniques used by the ESXi host. your VMs can use more
virtual RAM than the available physical RANI on the host. For example, you can have a host with
32 GB of memory and run four VMs with I 0 GB of memory each. In that case, the memory is
overcommitted. !fall four VNls are idle, the combined consumed memory is below 32 GB.
However, if all VMs are actively consuming memory, then their memory foo tprint might exceed
32 GB and the ESXi host becomes overcommitccd. An ESXi host can run ouc of memory if \/Ms
consume all rcscrvable memory in an ovcrcommiued-mcmory environment. Although chc
powered-on VMs arc not a ffected, a new V M might faiI to power on because of lack of memory.
Overconm1itment makes sense because, typically, some VMs are lightly loaded whereas others are
n1ore hea\1 ily loaded, a11d re.lati\1e-activity levels vary 0\ 1er ti111e.
526
Module 8: Resource Management a nd Monitoring
Extra memory from a VM is gathered into a swap ti le with the . vswp extension. The memory
overcommitment process on the host uses the vmx - • . v s wp swap file to gather and track
memory overhead. Memory from this file is swapped out to disk when host machine memory is
0\1ercom1nirtcd.
Module 8: Resource Management and Monitoring
527
8-9
Memory Overcommit Techniques
An ESX1host uses memory overcommit techniques to allow the overcommitment of memory whtle
possibly avoiding the need to page memory out to disk.
Methods Usod by Ula ESX1 Host
Octatls
Traospareni page shanng
This method ecooomJZes the use or physical memory pages In this
meiflod, pages with 1dent1¢al conteni5 tare stored only once
This method uses the VMware Tools balloon drrver to deallocate
memory from one VM to another. The bal1ooning mechanism becomes
actrve when memory 1s scarce. forcing VMs to use their own paging
areas
Memory compress1on
This method tries to reclaim some memOfY per1om\ance when meO"l<M)'
contention is high
Host-level SSC swapping
Use or a sohd-state drive on the. ESX1 host for a host cache swap file
mtght increase performance
vri.• memory pag1nq to disk
Ustng VMkerr.el swap space 1s the lasl teso« because ol poor
~rfdtmance
The Vl\1kernel uses various techniques to dynamically reduce the amount of physical RAM that is
required for each Vl\1. Each technique is described in the order that the VMkernel uses it:
•
f>age sharing: ESXi can use a proprietary technique to transparently share memory 1>ages
between VMs, eliminating redundant copies of memory pages. Although pages arc shared by
default within VM s, as of vSphcre 6.0, pages arc no longer shared by default among Vl\1s.
•
Ballooning: If the host memory begins to get low and the VM's memory use approaches its
memory target, ESX i uses ballooning to reduce rhat VM's memory demands. Using the
VMware-supplied vmmemc t l module installed in the guest operating system as part of
VMware Tools, ESXi ca.n cause the guest operating system to relinquish the memory pages it
considers least valuable. Ballooning provides performance closely matching that of a native
system under simi lar memory constraints. To use ballooning, the guest operating system must
be configured with sufficient swap space.
528
Module 8: Resource Management and Monitoring
•
lvlemory compression: If the Vivi's memory use approaches the level at which host-level
swapping is required, ESXi uses memory compression to reduce the number of memory pages
that it must swap out. Because the decompression latency is much smaller than the swap-in
latency, compressing memory pages h<1s significantly less impact on perfonnance than
swapping out those pages.
•
Swap to host cache: Host swap cache is an optional memory reclamation teclmique that uses
local flash storage to cnche a virtual machine's memory pages. By using local flash storage,
the virtual machine avoids U1e latency associated wiU1 a storage network that might be used if
it swapped memory pages 10 the virtual swap (. vswp) file.
•
Regular host-level swapping: \Vhen memory pressure is severe and the hypervisor must swap
memor)' pages to disk, the hypervi.sor swaps to a host swap cache rather than to a . vswp file.
\Vhen a host runs out of space on the host cache, a virtual machine's cached memory is
migrated to a virtual machine's regular . vswp file. Each host must have its own host swap
cache configured.
Module 8: Resource
Management and Monitoring
529
8-10
Configuring Multicore VMs
You can build VMs with multiple virtual CPUs (vCPUs). The number or vCPUs that you configure for
a single VM depends on the physical architecture of the ESXi host.
I
Vlrlual
T
h
•-=ae -- --
Pliysi<al
..
Core
• ,
:(Cll'U;
.
Socket
Single·Core
Oual·SOCket System
..
.
tau
.-- . .-- . .-- . .-..
LCl'V
..
OuaJ-Core
slngle-Soc-ket System
..
L.,._.
..
1.aU.
U::.U
'
..
Ouad-Core
Sln9te-SOdce1 System
You can configure a VM with up to 256 virtual CPUs (vCPUs). The VMkernel includes a CPU
scheduler that dynamically schedules vCPUs on the physical CPUs of the host system.
The VMkernel scheduler considers socket-core-thread topology when making scheduling
decisions. Intel and AMD processors combine multiple processor cores into a single integrated
circuit, called a socket in this discussion.
A socket is a single package with one or more physical CPUs. Each core has one or more logical
CPUs (LCPU in the diagram) or threads. \l/ith logical CPUs, the core can schedule one thread of
execution.
On the slide, the first system is a single-core, dual-socket system with two cores and, therefore,
two logical CPUs.
\I/hen a vCPU of a single-vCPU or multi-vCPU VM must be scheduled, the VMkernel maps the
vCPU to an available logical processor.
530
Module 8: Resource Management and Monitoring
In addition to the physical host conliguration, the number of vCPUs conligurc.d for a VM also
depends on the guest operating system. the applications, and the specific use case for the Vivi
itself.
Module 8: Resource Management and Monitoring
531
8-11
About Hyperthreading
With hyperthreading , a core can execute two
threads or sets of instructions at the same time.
Hyperthreading provides more scheduler
throughput
• Hyperthreading is enabled by default.
To enable hyperthreading:
Verify that the host system supports
hyperthreading.
Enable hyperthreading in the system BlOS.
Ensure that hyperthreading for the ESX1host
ts turned on.
Dual-Core Single-Socket
System w ith Hyperthreading
lf hypcrihrcading is enabled, ESXi can schedule two threads at the same time on each processor
core (physical CPU). Hypertbreading provides more scheduler throughput. That is, hyperthreading
provides more logical CPUs on which vCPUs can be scheduled.
The dmwback of hyperth.reading is that it does not double the power of a core. So, if both threads
of execution need the same on-chip resources at the same time, one thread has to wait. Still, on
systems that use hype1tlueading technology, pe1formance is improved.
An ESXi host that is enabled for hyperthreading should behave ahnost exactly like a standard
system. Logical processors on the same core have adjacent CPU numbers. Logica l processors 0
and I are on the first core, logical processors 2 and 3 are on the second core, and so on.
Consult the host system hardware documentation to verify whether the BIOS includes support for
hyperthreading. Then, enable hyperthreading in the system BIOS. Some manufacturers call this
option Logical Processor and others call it Enable Hype1tlu·eading.
Use the vSphere Client to ensure that hyperthreading for your host is turned on. To access the
hyperthreading option, go to the host's Summary tab and select CPUs under Hardware .
532
Module 8: Resource Management and Monitoring
8-12
CPU Load Balancing
The VMkernel balances
processor Ume to guarantee that
the load is spread smoothly
across processor cores in the
system.
Hyperthreaded Dual-Core
Dual-Socket System
The CPU scheduler can use each logical processor independently to execute VMs, providing
capabilities thnt are similar to trnditional symmetric multiprocessing (SMP) systems. The
VMkemel intelligently manages proce-ssor time to i.•uarantee that the load is spread smoothly
across processor cores in the system. Every 2 milliseconds to 40 milliseconds (depending on the
socket-core-thread topology), the Vlvlkemel seeks to migrate vCPUs from one logical processor to
another to keep the load balanced.
The VMkernel does its best to schedule VMs with multiple vCPUs on two different cores rather
than on two logical processors on the same core. But, if necessary, the \'Mkernel can map two
vCPUs from the same VM to threads on rhe same core.
If a logical processor has no work, it is put into a halted state. This action frees its execution
resources, and the VM running on the other logical processor on the same core can use the full
execution resources of the core. Because the Vlvfkernel scheduler accounts for this halt time, a
VM running with the full resources o r a core is charged more than a \'M running on a half core.
Th is approach to processor management ensures that the server does not violate the ESXi resource
allocation rules.
Module 8: Resource Management and Monitoring
533
8-13
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Desclibe CPU and memory concepts in relation to a virtualized environment
Recognize techniques tor addressing memory resource overcommitment
Identify additional technologies that improve memory usage
Desclibe how VMware Virtual SMP works
Explain how the VMkernel uses hyperthreading
534
Module 8: Resource Management and Monitoring
8-14
Lesson 2: Resource Controls
Lesson 2: Resource Controls
vmware·
Module 8: Resource Management and Monitoring
535
8-15
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Assign share values for CPU and memory resources
Desclibe how virtual machines compete tor resources
Define CPU and memory reservations and limits
536
Module 8: Resource Management and Monitoring
8-16
Reservations, Limits, and Shares
Beyond the CPU and memory configured for a
VM, you can apply resource allocation settings
to a VM to control the amount of resources
granted:
A reservation specifies the guaranteed
AvalJabJe Capacity -
... - -
StlantS • • UMd to
.
c0nt~e
minimum allocation for a Vf\~.
--
• A limit specifies an upper bound for CPU or
.
memory that can be allocated to a VM.
A share is a value that specifies the relative
priority or importance of a VM's access to a
given resource.
Umh
0 MHz/MB
In this raf'\oQle
Rc.sorvollon
I
Because VMs simultaneously use the resources of an ESXi hosL. resource contcnLion can occur.
To manage resources cmciently, vSphere provides mechanisms to allow less, more, or an equal
amount of access to a defined resource. vSpbere also prevents a VM !Tom consuming large
amounts of a resource. vSpberc grants a guaraoLeed amount of a resource to a VM whose
performance is not adequate or that requires a certain amount of a resource to run properly.
\Vhen host memory or CPU is overcommitted, a Vl\1's allocation target is somewhere between its
specified reservation and specified limit, depending on the VM's shares and the system load.
vSphere uses a share-based allocation algorithm to achieve efficient resource use for all VMs and
to guarantee a given resource to the VMs that need it most.
Module 8: Resource Management and Monitoring
537
8-17
Resource Allocation Reservations: RAM
RAM reservations:
Memory reserved to a VM is guaranteed
never to swap or balloon.
If an ESXi host does not have enough
unreserved RAM to support a VMwith a
reservation, the VM does not power on.
Reservations are measured in MB, GB, or
TB.
The default is OMB.
Adding a vSphere DuectPath 1/0 device to a
VM sets memory reservation to the memory
size of the VM.
·-·"
......
----.. _ ...
-·-- . - -·-• -•no.-------·-·-r-- " --·- ·-·- ·-·-·..·--..
-............ .··---------.... . ---·---· ----··
____=
,_
....
, ..?.ICS
•
••
•
\Vhcn configuring a memory reservation for a Vl\1, you can specify the VM's configured amount
of memory to reserve all of the Vtvl's memory. For example, if a VM is configured with 4 GB of
memory, you can set a memory reservation of 4 GB for the Vtvl. You might configure such a
memory reservation for a critical Vivi that must maintain a high level of performance.
Alternatively, you can select the Resen ·e All Guest Memory (All locked) check box. Selecting
this check box ensures that all of the VM's memory gets reserved even if you change the total
amount of memory for the VM . The memory reservation is immediately readjusted when the VM's
memory configurntion changes.
538
Module 8: Resource Management and Monitoring
8-18
Resource Allocation Reservations: CPU
CPU reservations:
CPU that is reserved for a VM is guaranteed to be immediately scheduled on physical cores. The
VM is never placed in a CPU ready state.
If an ESXi host does not have enough unreserved CPU to support a VM with a reservation, the VM
does not power on.
Reservations are measured in MHz or GHz.
The default is 0 MHz.
M odule 8 : Re source Managem ent and Mo nito ring
5 39
8-19
Resource Allocation Limits
RAM limits:
VMs never consume more physical RAM than
is specified by the memory allocation limit.
VMs might use the VM swap mechan1sm
( . vswp ) if the guest OS attempts to consume
more RAM than is specified by the limtt.
CPU limits:
VMs never consume more physical CPU than
is specified by the CPU allocal.ion limit.
CPU threads are placed in a ready state if the
guest OS attempts to schedule threads faster
than the limit allows.
Usually, specifying a limit is not necessary.
•
--- ...
,_.
I
-
1----
.
•
-_ - ,_
~---'
•I
I
•
~
I
_ , ....
-·-·
--·
·---
·-
Specifying limits has the following benefits and drawbacks :
•
Benefits: Assigning a limit is useful if you start with a few VMs and want to manage user
expectations. The performance deteriorates as you add more VMs. You can s imulate having
fewer resources available by specifying a limit.
•
Drawbacks: You might waste idle resources if you specify a limit. The system does not allow
VMs to use more resources than the limit, even when the system is underused and idle
resources arc available. Specify the limit only if you have good reasons for doing so.
540
Module 8: Resource Management and Monitoring
8-20
Resource Allocation Shares
Shares define the relative importance of a VM:
If a VM has twice as many shares of a resource as another VM, the VM is entitled to consume
twice as much of that resource when the-se tv10 VMs compete for resources.
Share values apply only if an ESXi host ex_periences contention for a resource.
You can set shares to high, normal, or low. You can also select the custom setting to assign a specific
number of shares to each VM.
Setting
CPU Share Values
'-•cmory Share Values
High
2,000 shar&s per vCPU
20 sharas per MB of configu1ed V.,,~ rnetnory
Noonal
1,000shores pervCPU
10 shares per MB of configured VM memory
Low
500 shares per VCPU
5 share!. p&i MB ot configured VM memol)'
High, normal, and low settings represent share values with a 4:2: I ratio, respe<:tively. A custom
value of shares assigns a specific number of shares (which expresses a proportional weight) to
each VM.
Module 8: Resource Management and Monitoring
541
8-21
Resource Shares Example ( 1)
VMs are resource consumers. The default resource settings that you assign during VM creation work
well for most VMs.
1,000
Number of shares
c
•
1,000
1,000
Ill I I
The proportional share mechanism applie.s to CPU, memory, storage 1/0, and network 110
allocation. The mechanism operates only when VMs contend for the same resource.
542
Module 8: Resource Management and Monitoring
8-22
Resource Shares Example (2)
You can add shares to a virtual machine while it rs running.
1,000
Number of shares
1,000
Ill I I
I I Ill I I
c
•
1, 000
Change Number of shares
1, 000
3,000
1,000
You can add shares to a VM while it is running, and the VM gets more access to that resource
(assuming competition for the resource). \Vhen you add a Vr>.1, it gets shares too. T he VM's share
amount factors into the total number of shares, but existing VMs are b'Uaranteed not to be starved
for the resource.
Module 8: Resource Management and Monitoring
543
8-23
Resource Shares Example (3)
Shares guarantee that a VM is given a certain amount of a resource.
1,000
Number of shares
Change Number of shares
1,000
1,000
Ill II
II Ill II
Ill II
c
•
1,000
3,000
1,000
1,000
3,000
1,000
Power on virtuai machine ~
1,000
VMD
Shares guarantee that a VM is given a certain amount of a resource (CPU, RAM, storage J/0, or
network 110).
For example, consider the third row of\11\1s on the slide:
•
YM Dis powered on with 1.000 shares.
•
Before Vl'vt D was powered on. a total of 5,000 shares were available, but Vl'vl D's addition
increases the 1otal shares 10 6,000.
•
The result is that the other YMs' shares decline in value. Bui each VM 's share value sti ll
represents a minimum guarJntee. VM A is still guamnteed one-sixth of the resource because it
owns one-sixth of the shares.
544
Module 8: Resource Management and Monitoring
8-24
Resource Shares Example (4)
When you delete or power off a VM. fewer total shares remain, so the surviving VMs get more
access.
Number of shares
Change Number of shares
Power on virtual machine
1, 000
3,000
1,000
3,000
1,000
• •
• •
•
•
II •
1,000
Power off virtual machine
1, 000
3, 000
1,000
VMD
1,000
VMD
Module 8: Resource Management and Monitoring
545
8-25
Defining Resource Allocation Settings for a VM
You can edit a VM's settings to configure CPU
and memory resource allocations.
--·
---
x
'
G .....
-. - -
•
...,_
- ------ -- - ..I~ --·--·
--•
•
•
w
•
546
Module 8: Resource Management and Monitoring
8-26
Viewing VM Resource Allocation Settings
You can vie\v reservattons, limits, and shares settings for all VMs in a cluster.
...n
.0
.,,.,...,., . Cl • t O
Q
a
Q'f-<'(~~W/11
au.11. ." .
0V.OA•
"
..
•
...
-··--·-.
D S.A Cluster
"-
,_
.w
,..,,_....,
~
CPu ResefVatlon OeUllls
--- ·-..
··-..
·- -,._ -- --·- - - ..-- ···.. "-· -- -·- -- -- ...
- - - ·- -- ,,,.,.............
~
u_..
~·'-C-.0
''"·"-'-~
···
. .......... to...
,_
. """"'"~"'° _,
"
..
..,._
_,,
...,.,.
!!I=
r;. ~~
•
•
a-- •
,._
.,._ ••
...
>,,r,.,.
!•t'•fJ<W
,_
~
••
••
"
••
~
Module 8: Resource Management and Monitoring
547
8-27
Lab 22: Controlling VM Resources
Control VM CPU fesources using shares:
1. Create CPU Contention
2. Verify CPU Share Functionalrty
548
Module 8: Resource Management and Monitoring
8-28
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Assign share values for CPU and memory resources
Desclibe how virtual machines compete tor resources
Define CPU and memory reservations and limits
Module 8: Resource Management and Monitoring
549
8-29
Lesson 3: Resource Monitoring Tools
Lesson 3: Resource Monitoring Tools
vmware·
550
Module 8: Resource Management and Monitoring
8-30
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the performance-tuning methodology
Identify resource-monitoring tools
Use vCenter Server performance charts to view performance
Module 8: Resource Management and Monitoring
551
8-31
Performance-Tuning Methodology
You can tune the pertormance of your vSphere
environment.
Assess pertormance:
- Use appropriate monitoring tools.
Do not make casual changes
to production systems.
- Record a numerical benchmark before
changes.
Identify the limiting resource.
Make more resources available:
- Allocate more resources.
- Reduce competition.
- log your changes.
• Benchmark again.
The best practice for performance tuning is to 1ake a logical step-by-step approach:
•
For a complete view of the performance situation of a VM. use monitoring tools in the guest
operating system and in vCcntcr Server.
•
Identify the resource that t11e VM relies on the most. This resource is most likely to affect the
VM's performance if the VM is constrained by it.
•
Give a Vivi more resources or decrease the resources of other Vlvls.
•
Aller making more of the li miting resource avai lable to the V/\-1, take another benchmark and
record changes.
Be cautious when making changes to production systems because a change might negatively affect
the performance of the VMs.
552
Module 8: Resource Management and Monitoring
8-32
Resource-Monitoring Tools
Many resource.monitoring and performance-monitoring tools are available for use wrth vSphere.
Perfmon DLL
Task Manager
The top command (Linux)
vCenter Server performance charts
vRealize Operations
vSphere/ESXi system logs
resxtop and esxtop
Tools in the guest operating system arc available from sources external to VMware and arc used in
vatious VMware applications. Many tools used outside of the guest OS are made available by
VMware for use with vSphere and other applications.
A partial list of these resource-monitori ng tools is shown on !he slide.
Module 8: Re source Management and Monitoring
553
8-33
Guest Operating System Monitoring Tools
To monitor performance in the
guest operabng system, use
tools that you are familiar with,
such as W indo'tvs Task Manager.
W indows Task Manager
... _,,..
-
..._,
~ ~,.
•
·-
CPU
o~:a""'
L
ILJ ~--
,, __
•• •fl•••
I
• '""''
I
t1~
1-1
.........
.......
f
®'-....
O(i.,.
ti! .... -
-,..- -- --- - -.
""'
.. ..._
3.17 GH;i:
1997 5572-t
••
~-
•'
wa
~
3:16:36-.27
... ...
\Vindows Task Manager helps you measure CPU and memory use in the guest operating system.
The measurements that you take with tools in the guest operating system rclleet resource usage of
the guest operating system, not necessarily o f the VM itself.
554
Module 8: Resource Management and Monitoring
8-34
Using Perfmon to Monitor VM Resources
The Perfmon OLL in Vf\~ware Tools provides V M processor and memory objects for accessing host
statistics in a VM.
--..- -.
_,.
••
"
·-,,..,._,
.·e-- --·
---··
--__
_
--..............
........,-
,
.
0
x
.I
•
h M U
: 1:::--""'
••
I
•
r---
::J~
OD
••
---··---..-__
• '"°~'
___- _
....~--
,
-----
.•..
.::~
a J
.
"'- ... .....
---
.......
"
---
!'lttll.~-~
........... - _.....
--·
w-~
";
,
,
a
•J
1~'"' __J
:._J
I
L.;c!:j
,.. ....
....
I
~
~
u
I
I
~I
•
·~
VMware Tools includes a library of functions called the Perfmon DLL. With Pcrfmon, you can
access key host statistics in a guest VM. Using the Perfmon performance objects (Vl\1 Processor
and VM Memory), you can view actua I CPU and memory usage and observed CPU and memory
usage of the guest operating system.
For example. )' OU can use the YM Processor object to view the% Proce.ssor Time counter, which
monitors the YM's current virtual processor load. Likewise, you can use the Processor object and
view the % Processor Time counter (not shown), which monitors the total use of the processor by
all running processes.
Module 8: Resource Management and Monitoring
555
8-35
Using esxtop to Monitor VM Resources
The e.sx top utility is the primruy reaHime performance monitoring tool for vSphere:
Can be run from the host's local vSphere ESXi Shell as esx top
• Can be run remotely from vSphere CLI as resx top
• Works like the <op performance utilrty in Linux operating systems
In this example, you enter lowercase c and uppercase v to view CPU metrics for VMs.
2 : fS:S7J!ftl !..'F '1 d•V• tS =! 6 , ••,, vorld•, I '
PCr.J O:s!:D(• ): 1 .¢ l . ~ ~VU 1 2.1
tlT!f.(\l: ' · ' t . : AVC: t . :l:
•nu. ls
veFO•; C'Ptl l oaa •V4ra.c;-•: O.<l!I , O. OS, G. Ol
;e"'
52121
$2127 Vff.l ..);
1ll1•
1 3-)16 VKl-2
55009
SSOOf Vl0-1
£
c
e.
O. ts
0 . 14
G.00
0 . 11
0.10
0 . 01
0 . 11
o. to
0.01
9UO.OG
eJJo.oo
eoo.oo
o . ;;
0.14
o.;s
0.0!
o.o;
o.t,
99. 67
99,f1
99. 6S
O.«!
o.e>o
o.oo
You can run the esxtop utility by using vSphere ESXi Shell to communicate with the
management interface of the ESXi host. You must have root user privileges.
556
Module 8: Resource Management and Monitoring
o . oo
o.oo
o.oo
8-36
Monitoring Inventory Objects with Performance Charts
The vSphere statistics
subsystem collects data on the
resource usage of inventory
objects, which include:
Clusters
Hosts
Datastores
C'PU.<MloitnO».-fM • 04il06fX»G, 10:0.
-
..-
a..~
O>J-•·
-
C! ...
>M
•
"
Networks
Virtual machines
~
••
•
•
..
....... ....-- ""'"'""
I~
-
~o
•
_ _ (Ill,, _ _ _
0
-- -....... - - .,.- ,.-- ..... -....
- "' ·•
•
•
'
'
'
"
•
tl".'lt
~·
~·
•
•
u
•
>M
~n~
Data on a wide range of metrics is collected at frequent intervals, processed. and archived in the
vCenter Server database. You can access statistica l information through command-line monitoiing
utilities or by viewing performance charts in tJ1e vSphere Client.
Module 8: Resource Management and Monitoring
557
8-37
Working with Overview Performance Charts
The overview performance charts display the most common metrics for an object in the inventory.
....
.
-... -·--·--
-
...
---
._
......
--·--· ·-· -·· --· --· --·
. ...'"? ....
j
--
•
•
--
- - - --••
•
·I
Ii'
J...
-- -
.L
•
I
J
You can access overview and advanced performance charts in the vSpherc Client.
Ove.rvicw performance char1s show the performance s1atis1ics that VMware considers mos1 useful
for moni1oring performance and diagnosing problems.
Depending on the object that you select in the inventory, 1he performance charts provide a quick
v isual representation of how your hose or \ll\1 is performing.
558
Module 8: Resource Management and Monitoring
8-38
Working with Advanced Performance Charts
Advanced charts support data
counters that are not supported
in other performance charts.
Ol.Vt OM~
I',__
-·.,__.
----------
I ...
,_ ,
·- --1
-- - ___;:,,.,_
---·- - ------- --- - ---- --- -·-...
----··-·
--..
- --·
·-..
EEJ -
G::J •
--~-
-.
•
•
...
•
I "
I -
.I
·I
I
'
... ,...
.. '''
...• •'
•
I
•
ln the vSphcrc Client, you can custom ize the appearance of advanced performance charis.
Advanced charts have !he following feamres:
•
More information rhan overview charts: Poin! lo a dara point in a chart lo display derails abou1
that specific dara point
•
Customizable charrs: Change char! settings. Save custom seuings to create your own charrs.
•
Save data to an image file or a spreadsheet
To customize advanced performance charts, select Advanced under Perfonnance. Click the Chart
Options link in the Advanced Perfonnance pane.
Module 8: Resource Management and Monitoring
559
Chart Options: Real-Time and Historical
8-39
vCenter Server stores statistics at different specificities.
Tima Interval
Data Frequency
Number of Samples
Re3l-tlme (P••t hour)
180
Past week
20 seconds
5 minutes
30 minutes
Past month
2 hours
380
Past year
t doy
365
Past day
288
336
Real-time information is information that is generated for the past hour ar 20-sccond intervals.
Historical information is generated for the past day, week, month, or year, at varying specificities.
By dcf:lull, vCentcr Server has fou r archiving intervals: day, week, month, and year. Each interval
specifies a length of time that statistics are archived in the vCenter Server database.
You can configure which intervals are used and for what period of time. You can also configure
the number of data counters that arc used during a collection interval by setting the collect ion
level.
Together, the collection interval and the collection level determine how much statistic.11data is
collected and stored in your vCenter Server database.
For example, using the table, past-day statistics show one data point every 5 minutes, for a total of
288 samples. Past-year statistics show I data point per day, or 365 samples.
Real-time statistics are not stored in the database. They are stored in a flat file on ESXi hosts and
in memory on vCcnter Server instances. ESXi hosts collect re.al-time statistics only for the host or
560
Module 8: Resource Management and Monitoring
1he VMs 1ha1 arc available on lhc host. Real -lime s1a1is1 ics arc collected dircclly on an ESXi host
every 20 seconds.
If you query for real-lime sra1is1ics, vCenter Server queries each host directly for the daia. vCenter
Server does not process the data at this point. vCenter Server only passes the data to the vSphere
Client.
On ESXi hosts, the statistics arc kepi for 30 minutes. after which 90 data points arc collected. The
data points are aggregaied, processed, and returned to vCenler Server. vCenter Server !hen
archives the dala in the database as a data poinl for the day collection inierva.I.
To ensure tha1 perfom1ancc is no1 impaired when colleciing and wriling the da1a 10 the dalabase,
cyclical queries are used to collect data counter statistics. The queries occur for a specified
collection interval. At the end of each interval, the data calculation occurs.
Module 8: Resource
Management and Monitoring
561
8-40
Chart Types: Bar and Pie
Depending on the melrlc type and object, performance mellics are displayed 1n di"erent types of
charts, such as bar charts and pie charts.
·-=
- ..- ....-
1-:.-·-
.-
_
-----·--
__,,
·....
, ... _
·--·
~
__
...
_.
·-·....
·----·
...-·
Bar charts display storage metrics for datastorcs in a selected data center. Each datastorc is
represented as a bar in the chart. Each bar displays metrics based on the file. type: virtual disks,
other VM files, snapshots, swap files, and other files.
Pie charts display storage metrics for a single object, based on the file types or V/Ills. For example,
a pie chart for a datastore can display the amount of storage space occupied by the VMs that take
up the largest spac.e.
562
Module 8: Resource Management and Monitoring
8-41
Chart Types: Line
A line chart displays metrics for a single inventory object, for example, metncs for each CPU on an
ESXi host
........
..
_-... -
...
--
·-
·-··
............
--- ·-
-
.,
.
.
_,,_
·-
· ·--~~....
-·-·'-••
••
••
•
--
---- -•
---- •
--·--- ---
•
•
•
•
•
•
- - - --- - -- -~
••
"
••
~
~
••
I
•••
••
ln a line chart, rhe data for each performance counrcr is pJoued on a scparare line in the chart. For
example, a CPU chart for a host can contain a line for each of the host's CPUs. Each line plots the
CPU's usage over time.
Module 8: Resource Management and Monitoring
563
8-42
Chart Types: Stacked
Stacked charts are useful for comparing resource allocation and usage across rnultipJe hosts or VMs .
----- _._- ___
.. ·-.. ---.........·-·.........
.
.... -...
·-·-...
·--··-
-
....
...
;•
......
. ..
~
.
-
_
_
.
--
...
.....
•
••
••
••
•
•
•
-·- -- -• ....-· - . -• ---- -- • .... -- ---••
-
•
•
•
••
~
I
~
•
•
•
••
Stacked charts display metrics for 1hc chi ld objects 1ha1 have the highest s1a1is1ical values. All
olher objects are aggregated, and !he sum value is displayed wilh !he lenn Other. For example, a
host's slacked CPU usage chai1 displays CPU usage metJics for the five VMs on the host that are
consuming the most CPU resources. The Other amount contains the total CPU usage of the
remaining VMs. The metrics for the host itse lf are displayed in separate line charts. By default, the
I0 child objects with the highest data counter values appear.
564
Module 8: Resource Management a nd Monitoring
8-43
Chart Types: Stacked Per VM
Per-VM s tacked graphs are available only for hosts.
It. .....,,.. ...
---
..
..--~--·-·---
.
-·--•• -- ----- -- -- . -•• -- -• . •
----- -- - .·-•• -.•
- -·-- • - --·
~
•
•
•
·~
Stacked charts display metrics for 1hc child objects 1ha1 have the highest s1a1is1ical values. All
olher objects are aggregated, and !he sum value is displayed with the term Otl1er. For example, a
host's slacked CPU usage chai1 displays CPU usage mellics for the five VMs on the host that are
consuming the most CPU resources. The Other amount contains the total CPU usage of the
remaining VMs. The metrics for the host itself are displayed in separate line charts. By default, the
I0 child objects with the highest data counter values appear.
Module 8: Resource Management and Monitoring
565
8-44
Saving Charts
You click the Save Chart icon above the graph to save performance cha.rt information.
You can save information in PNG, JPEG, SVG, and C-S V formats.
·--·----..
·---
-··------
--______
-- -· _-_. -
---
.... .... ......
•
.""-
....
•
•
--• ··---
- ·--
~-
-. - . --•
•
••
. ·•
--
ln the vSphcre Client, you can save data from the advanced performance charts to a file in various
graphics fonmlts or in l\1icrosoft Excel format. \\'hen you save a chart, you select the fi le type and
save the chm1 to the location of your choice.
566
Module 8: Resource Management and Monitoring
8-45
About Objects and Counters
Performance charts graphically display CPU, memory, disk, network, and storage metrics for devices
and entities managed by vcenter Server.
Objects are instances or aggregations of
devices:
Examples:
Counters identify which statistics to collect;
Examples:
- CPU: Used time, ready time. usage(%)
- vCPUO
- NIC: Network packets received
- vCPU1
- Memory: Memory swapped
- vmhba1:1 :2
- Aggregation ove< all NtCs
ln vCcntcr Server, you can determine how much or how liu le information about a specific device
type is d isplayed . You can control the amount of information a chart displ ays by selecting one or
more objects and counters.
An object refers to an i nstance for w h.ich a statistic is collected. For example, you mi ght collect
statistics for an indi vidual CPU, all CPUs, a host. or a specific network device.
A counter represents the actual stati stic that you arc collecti ng. A n examp le is the amount o r CPU
used or the number of network packets per second for a given devi ce.
Module 8: Re source Manageme nt and Mo nitoring
567
8-46
About Statistics Types
The statistics type is the unit of measurement that is used during the statistics interval.
Stat1SbC$ l)'pc
Ocscript1on
Exantplo
Rate
Value OYer tll-e currenc mterval
CPU use (MHz)
Delta
Change from preVtous interval
CPU ready time
AbsoilJte
Absolute value independent of interval
Memory active
The statistics type refers to the measurement that is used during the statistics interval and is related
to the unit of measurement.
The statistics type is one of the following:
•
Rate: Value over the current statistics interval
•
Delta: Change from the 1Jrevious statistics interv;tl
•
Absolute: Absolute v;1lue (independent of the statistics interval)
For example, CPU usage is a rate, CPU ready time is a delta, and memory active is an absolme
value.
568
Module 8: Resource Management and Monitoring
8-47
About Rollup
Rollup is the conversion function between statistics inteJVals:
5 minutes or past-hour statistics are converted to one past-day value:
- Fifteen 20-se<:ond statistics are rolled up into a single value.
30 minutes or past-day statistics are converted to 1 past-week value:
- Six 5-minute statistics are rolled up into a single value.
Rollup Type
Conversion Function
Sample Statistic
Average
Average of data point&
CPU use {average)
Summation
Sum of dat3 pomts
CPU ready time (m1lllseoo~$~
L.1.tes1
Last data point
Upnme (days)
"°'11n1mum
Cu«eflt OI average minimum data point
Maximum
Cu1rent or average maximum data point
Available in iill counters when vCenter
Server stat1sticscollecilon Is set to
level 4
Data is displayed at different specificities according to the historical interval. Past-hour statistics
are sh0\\11 at a 20-second specificity, and past-day statistics are shown at a 5-minute specificity.
The averaging that is done to convert rrom one time interval to another is called roll up.
Different roll up types arc available. The roll up type determines the type of statistical values
returned for the counter:
•
Average: The data collected during the interval is agi:,.,egat.ed and averaged.
•
Minimum: The minimum value is rolled up.
•
l'vlaximum: The maximu m value is rolled up.
The minimum and maximum values are collected and displayed only in collection level 4.
Nlinimum and maximum rollup types are used to capture peaks in data during rhe interval. For
real-Lime dara, the value is the current minimum or current maximum. For historical data, the
''alue is the average n1ini 1nun1 or average max.in1t1m.
Module 8: Resource Management and Monitoring
569
For example, the following information for the CPU usage chart shows that the average is
collected at collection level I and that the minimum and maximum values are collected at
collection level 4:
•
Counter: Usage
•
Unit: Percentage (%)
•
Rollup Type: Average (Minimum/Maximum)
•
Collection Level: I (4)
Statistics levels include summation and latest:
•
Summation: The collected data is summed. The measurement displayed in che performance
chart represents the sum of data collected during the interval.
•
Latest: The data that is collected during the interval is a set value. The value displayed in rhc
perforrnance chart represents the current value.
For example, if you look at the CPU Used counter in a CPU performance chart, the rollup type is
stm1mation . So, for a given 5-minute interval, tl1e sum of all the 20-second samples in that interval
is represented.
570
Module 8: Resource Management and Monitoring
8-48
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the performance-tuning methodology
Identify resource-monitoring tools
Use vCenter Server performance charts to view performance
Module 8: Resource Management and Monitoring
571
8-49
Lesson 4: Monitoring Resource Use
Lesson 4: Monitoring Resource Use
vmware·
572
Module 8: Resource Management and Monitoring
8-50
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Monitor the key factors that can affect a virtual machine's performance
• Use performance charts to view and improve performance
Module 8: Resource Management and Monitoring
573
8-51
Interpreting Data from Tools
vCenter Server monitoring tools and guest OS monitoring tools provide different points of view.
__
----··..
.....,
.
_
CPU Usage Chart for H ost
_,,_
-
••
•
~1
... -- ...
·-- _
·_... - --·- -- --·
-·•
•
.
••• •••
.......
••• •-~
•• •••
••• •
•
_,
T-'
~-
...~-•
•
•
--
•
-- --••
•
•
T3$k Manager Jn
Guost Opor8ting System
--·---·-8":.,.... .
CPU
EJ~·~
•o.o•• !Ol
.-.1.,
•
I
·---
_..._,,,,.m_
'~
The key to interpreting perfom1ance data is to observe the range of data from the perspective of
the guest operating system, the VM, and the host.
The CPU usage statistics in Task Manager, for example, do not give you the complete picture.
View CPU usage for the VM and the host on which the VM is located.
Use the perfom1ance charts in the vSphere Client 10 view this data.
574
Module 8: Resource Management and Monitoring
8-52
CPU-Constrained VMs (1)
If CPU use is continuously high, the VM is constrained
by the CPU. However, the host m ight have
enough CPU for other VMs to run.
··--- -
_,_,...._,_
......·_.
·-_,
- --
--·__
.'
.
----·--·-
-·(-••
--
•
••
••
•
-- - - ---• ---·- •
•
-- - ·-- • •
•
•
•
"'
••
•'
"'
•
-.
.. ...
•
•
"
,_..•
lf CPU use is high, check the VNf's CPU usage statistics. Use either the overview charts or the
advanced charts to view CPU usage. The slide displays an advanced chart tracking a Vivi's CPU
ttsage.
Jfa VM's CPU use remains high over a period of time, the Vivi is constrained by CPU. Other
Vl'vls on the host might have enough CPU resources to satisfy their needs.
If more than one VM is constrained by CPU, the key indicator is CPU ready time. Ready time
refers to the interval when a VNI is ready to execute instructions but cannot because it cannot get
scheduled onto a CPU. Several factors affect the amount of ready time:
•
Overall CPU use: You arc more like ly 10 sec ready time when use is high because the CPU is
more li kely to be busy when another Vivi becomes ready to run.
•
Number of resource consumers ( in this case, guest opernting sys tems): \Vhen a host is running
a larger number of VMs, the scheduler is more like ly to queue a VM behind VMs that arc
already running or queued.
Module 8: Re source Management and Monitoring
575
A good ready time value varies from workl.oad to workload. To find a good ready time value ror
your workload, collect ready time data over time for each VNL \Vhen you have this ready time
data for each VM, estimate how much of the observed respo11se time is ready time. lftbe shortfalls
in meeting response-time targets for the applications appear largely because of the ready time, take
steps to address the excessive ready time.
576
Module 8: Resource Management and Monitoring
8-53
CPU-Constrained VMs (2)
Multiple VMs are constrained by the CPU if the following conditions are present.
High CPU usage in the guest operating system
• Relatively high CPU readiness values for the VMs
---- ---·-·-----·-·
-·-- -- ·-•••
- -- ·--•• •
-
-•
--
~
~
-
To determine whether a VM is being constrained by CPU resources, view CPU usage in 1he guest
operating system using, for example, Task Manager.
I f more than one \ fM is constrained by CPU, the key indicator is CPU readiness. CPU readiness is
the percent of time !hat the VM cannot run because it is contending for access to 1be physical
CPUs.
You arc more likely to sec readiness values when use is high because 1he CPU is more likely to be
busy when another VJVI becomes ready to run. You are also more likely to see readiness values
when a host is running many VMs. In this case, the scheduler is more likely to queue a VM behind
VMs that are already running or queued.
A good readiness value varies from workload to workload.
Module 8: Resource Management and Monitoring
577
8-54
Memory-Constrained VMs ( 1)
Compare a VM's memory consumed and granted values to determine whether the v ·M is memory-
constrained.
·-·
·--- ··-
----•1$• - Ulla!-.•.1'1•- _a..,
•
w
---•• --·
w
•
••
578
-- ." .
•fl••
--·
-- -- - -- -- --- -- - - ·-- . . ·-. ··- ·•
•
••
••
•
•
•
M
w
•
~
Module 8: Resource Management and Monitoring
•
•
•
•
'*
·~~
8-55
Memory-Constrained VMs (2)
If a V M consumes its entire memory allocation, the VM might be memory-constrained, and you
should consider increasing the VM's memory size.
. ·-
·-·-....
·---·-
-··-
"" ...........
-...._ --..a. . . - .-•
--·
,.._._,_.~
'
• 0
•
-
•
•
.
...
---•-- - -- - -. ..- .
• -• -- - ,_
•
•
•
••
-- -
•
•
-
•
•
,
•
~
- -~
J. . - ·
Module 8: Resource Management and Monitoring
579
8-56
Memory-Constrained Hosts
Any evidence of balloon1ng or swapping is a sign that your host might be memory-constrained.
-----·-........
·--_
....................- -.. ... -·- ·---·--- •---- -c-.
-•• ---· --..... ---- ••
•• - ·••
•• - -- - ....
~-
•
--
~-
•
--
•
•
•
•
•
." .
-
......
-··---- .....-----· - ----·
---~
•
•
-~
-~
•
•
'
~-
A~G
.
'
••
'
You might see Vt.ls with high ballooning activity and VMs being swapped in and out by the
VMkemeL T his serious situation indicates that the host memory is overcommitted and must be
incre.ased.
580
Module 8: Resource Management and Monitoring
8-57
Disk-Constrained VMs
Disk-intensive applications can saturate the storage or the path .
If you suspect lhat a VM is constrained by disk access, take these actions:
Measure the throughput and latency between the VM and storage.
Use the advanced performance charts to monJtor t.hroughput and latency:
- Read rate and write rate
- Read latency and write latency
Disk performance problems arc commonly caused by saturating tJ1e underlying physica l storage
hardware. You Ciln tise the \1Ce11ter Server adva_
nced pe1fonnnnce cha11s to 111easure-storage
perfonnance at different levels. These charts provide insight about a Vivi performance. You can
monitor everything from the Vivi's datastore to a specific storage path.
If you select a host object. you can view throughput and latency for a datastore, a storage adapter.
or a stornge path. The storage adapter charts are ava ilable only for Fibre Channel storage. The
storage path charts are available for Fibre Channel and iSCSI storage, not for NFS.
If you select a VM object, you can view throughput and latency for the VM's datastore or specific
virtual disk.
To monitor throughput, view tbe Read rate and \Vrite rate counters. To monitor latency, view the
Read latency and \I.' rite latency counters.
Module 8: Resource Management and Monitoring
581
8-58
Monitoring Disk Latency
To determine disk performance problems, monitor two disk latency data counters:
Kernel command latency:
- This counter is the average time that is spent in the VMkernel per SCSI command.
- High numbers {greater than 2 milliseconds or 3 milliseconds) represent erther an overworked
array or an overworked host.
Physical device command latency:
- This counter is the average time that the physical device takes to complete a SCSI command.
- High numbers represent a slow or oveiworked array, for example:
• For spinning disks (HDDs), greater than 15 milliseconds or 20 milliseconds
• For SSDs. greater than 3 milliseconds or 4 milliseconds
To determine whether your vSphere environment is experiencing di sk problems, monitor the disk
latency data counters. Use the advanced performance charts to view these statistics. I n particular,
monitor the followi ng counters:
•
Kernel command latency: This data counter measures the average amount of time, in
milliseconds, that the Vlvlkemcl spends processing each SCSI command. For best
performance. the value should be 0 through I millisecond. lf the value is greater than 4
milliseconds, the VMs on the ESXi host are trying to send more throughput to the storage
system than the configuration supports.
•
Physical device command latency: Tb.is daL1 counter measures tbe average amount of time, in
mi lliseconds, for the physical device to complete a SCS I command.
582
Module 8: Resource Management and Monitoring
8-59
Network-Constrained VMs
Network-intensive applications often bottleneck on path segments outside the ESXi host:
• Example: WAN links between server and client
II you suspect that a VM is cons trained by the network, take these actions:
Verily that VMware Tools 1s installed and that VMXNET3 is the virtual network adapter.
Measure the effective bandwidth between the VM and Its peer system.
Check for dropped receive packets and dropped lransmtt packets.
Like disk performance problems, network perfonnance problems are commonly caused by
saturating a network link between client and server. Use a tool such as lometer, or a large file
transfer, to measure the effective bandwidth.
Network perfonnance depends on application workload and network configuration. Dropped
network packets indicate a bottleneck in the network. To determine whether packets are being
dropped, use the advanced performance charts to examine the droppedTx and droppedRx network
counter values of a \Irv!.
In general, the larger the network packers, the faster the network speed. \I/hen the packet size is
large, fewer packets are transferred, which reduces the amount of CPU that is required to process
the darn. In some instances, large packets can result in high nerwork latency. When network
packers arc small, more packets arc transferred, but the network speed is slower because more
CPU is required to process the data.
Module 8: Resource Management and Monitoring
583
8-60
Lab 23: Monitoring Virtual Machine Performance
Use the system monitoring tools to review the CPU workload:
1. Create a CPU Workload
2. Use Performance Charts to Mon~or CPU Use
3. Remove CPU Affinity and Change CPU Shares to Normal
584
Module 8: Resource Management and Monitoring
8-61
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Monitor the key factors that can affect a virtual machine's performance
• Use performance charts to view and improve performance
Module 8: Resource Management and Monitoring
585
8-62
Lesson 5: Using Alarms
Lesson 5: Using Alarms
vmware·
586
Module 8: Resource Management and Monitoring
8-63
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Use predefined alarms in vCenter Server
View and acknowledge alarms
Create custom alarms
Module 8: Resource Management and Monitoring
587
8-64
About Alarms
An alarm is a notification that Is sent in response to an event or condition that occurs with an object in
the inventory.
Y'm
....pn.,.,.,1 ...~1
.
() sa-vcso-Ot.vclassJocal
o~.c--B!.C:....0 . -
a ...._
o-.ai.-... ......
---, _ _ l'W...
·-·
~-
...
•
.
'
-
oc"OOI" v
rrlggered Alarms
"
--
.
-·
'
•
--
·--
.
You can acknowledge an alarm 10 let other users know that you take ownership of the issue. For
example, a VM has an alarm set to monitor CPU use. The alarm is configured to send an email to
an administrator when the alarm is triggered. The VM CPU use spikes, triggering the alarm, wbicb
sends an email to the administrator. The administrator acknowledges the n·iggered alarm to let
other administrators know the problem is being addressed
After you acknowledge an alann, the alam1 actions are discontinued, but the alarm does not get
cleared or reset when acknowledged. You reset the alarm manually in the vSphere Client to return
the alarm to a normal state.
588
Module 8: Resource Management and Monitoring
8-65
Predefined Alarms (1)
You ean access many predefined
alarms for various inventory
objects, such as hosts. virtual
machines. datastores, networks,
and so on.
G
I
~vcso-Otvcloss.1oc41
--··
·-""'
-_,_._
--
...........
...
• •
.., Alarrn oefn t.ons
'--~-"'
---~
.....
._.._.........
----
~
~
--.,
-.........- __
-·---!!-·--··--··____
--......__ ---__
-• --·--------~-"-_..,_._.
•
....
,_
..,.;
...
-- --··
---_,
......
....
...- i.. _ _ _ _
•
....~--,_
--
,.,.m_
•
-·
o--
•
o-,,a-__
o-a-t!I
'""'°""""'
0"""'tJ ,...._...
01...~
•
Module 8: Resource Management and Monitoring
•'
589
8-66
Predefined Alarms (2)
-
You ean edit predefined alarms,
or you can make a copy of an
existing alarm and modify the
settings as needed.
-·__ ....,_ oe---.
-- __....-·___ -·- -·
......
o-o-·---......._, 10 -____ ·-·..-- _,..,._ ..,..
--·__....._.,_,_
a----·-·--- -,,o-__
--···'>-- ---------- -""" '""""''
~_ , , ,.... ei..
.-...-
..........,
--~
A -
•
' ........
, .......
•
,
To make a copy of an alarm, select the alarm and click
590
......_....,..,
, "'_.....,
y('l:'l--
Module 8: Resource Management and Monitoring
°"_
~-
~··
...
-~
-~-~-~-
·===
••• -
ADO.
0 ...
Q:..0-
0'
' '""'°""""
Q l•Qolt-°'
•' •
.•"
8-67
Creating a Custom Alarm
In addition to using predefined alarms, you can create custom alarms in the vSphere Client.
o sa-vcsa-01.vclass.!ocal
lo...·--a1-I O "'-•"""""'- - __,. '
..
,....,.
ID
Q
n
Q
.. ..
.....
!J?c.,~
1.:1"'~...
0
...-.o•Ol...:i-~
~ 1- 2l»O. ?":
"'°'
....
-
. _ Altotm
tcl'Je<IUOH
°'"''"'"''"
If the predefined alarms do not address the event, state, or condition that you want to monitor,
define. custom alarm definitions instead of modifying predefined alarms.
Module 8: Resource Management and Monitoring
591
8-68
Defining the Alarm Target Type
On the N ame and Targets page, you name the alarm ~ give it a description, and select the type of
inventory object that tllis alarm monitors.
' ,.,......_1.-girl•
)(
--·
,, ...
,,..,_;:,.o~,.,,,.,.,._,.
You can create custom alarms for the following target types:
•
Virtual machines
•
Hosts, clusters, and data centers
•
Datastores and datastore clusters
•
Distributed switches and distributed po11 groups
•
vCenter Server
592
Module 8: Resource Management and Monitoring
•1
8-69
Defining the Alarm Rule: Trigger (1)
An alarm rule must contain at least one trigger.
A trigger can monitor the current condition or
state of an object, for example:
A VM's current snapshot is more than 2 GB.
A host is using 90 percent of its total memory.
A datastore is disconnected from all hosts.
A trigger can monitor events that occur in
response to operations occurring on a managed
object, for example:
The health of a host's hardware changes.
A license expires in the data center.
A host leaves the distributed switch .
You configure the alarm trigger to show as a warning or critical eveot when the specified criteria
are met:
•
You c.a11 111011itor tJ1e curre11t conditio11 or state of virtlial macl1i11es> hosts, a11d datastores.
Conditions or states ioclude power states, cormection states, and performance metrics such as
CPU and disk use.
•
You can monitor events that occur in response to operations occurring with a managed object
in the inventory or vCenter Server itself. For example. an event is recorded each time a VM
(which is a managed object) is cloned, created, deleted, deployed, and migrnted.
Module 8: Resource Management and Monitoring
593
8-70
Defining the Alarm Rule: Trigger (2)
You select and configure the events, states, or conditions that trigger the alarm.
x
Afafm RUie 1
all(> a
~_....
••
'
...,
-
· 'I
'
"
_
.......
You must create a separate alarm definition for each trigger. T he OR operator i s not supported i n
the vSphere Client. However, you can combine more than one condition tr igger with the AND
operator.
594
Module 8: Resource Management and Monitoring
8-71
Defining the Alarm Rule: Setting the Notification
You configure the notification method to use when the alarm is triggered. The methods are sending
an email, sending an SNMP trap, or running a script.
New Alarm Oefin-t'On
x
Alarm Ru~e 1
I 1-~
....,
.... , ........
......,,............
·-~
.
r•""
E a:ll
Module 8: Resource Management and Monitoring
595
8-72
Defining the Alarm Reset Rules
You can select and configure the events, states, or conditions to reset the alarm to normal.
Sometimes, as in this example, you can access only one option to reset the alarm.
.I . . .
t\ew Alaim Dellnrtioo
Reset Rule 1
·~·•''
-~*"'-·•
)
~0.1-1
....
~Cl't-lfllo
!-~
o(IO"""""'
...-VSN"ll>lr-
::>. ..........
0 ........
<>
<>
,...
l:Alo !'.];
596
Module 8: Resource Management and Monitoring
l
I I.Cl!
J-
8-73
Enabling the Alarm
On the Review page, the new alarm definition is enabled
by default.
New Alarm Oefininon
J .............. .
I
••! "'1Ht I
'11-lEH f •9....
.........
·. ..........
c _.,
"'"'"'""'........
~~
,._..._...,. ......""'.,,_,
11oE11 ~.'O'J91' •
_.....as
e ...,J_
~·~c
'i
'I'·'
Module 8: Resource Management and Monitoring
597
8-74
Configuring vCenter Server Notifications
If you use email or SNMP traps as the notification method, you must configure vCenter server to
support these notification methods.
-
ti
-
v5ptiev-i! Chm!
Q
l'I
"' iO ~t ll!Sfi~•
.......
:2 O
I
•
sa·vcsa-01.vclass.local
S..11111'....
) QI M-O<A~l.,-Qll
.
"
··---·
..........
......
tcrloiu··
•
vc~1et
I
"'-'
'
" ,.
'
..
".
...
-
,... v
.........
!llll«.-1
serve-r sen1ngs.
.......11&
°"'l.W•
""
o.ua1c.n..
.......
"
I
£01·
I
Edit vCenter 9encr"I ~tt'19S
,..,_,
OolAIHO
f&.llt(l'• - N I
""'~'(It'
I :.~-
I
...•
·-'
··--
~------
To configure email, specify the mail server FQDN or IP address and the email address of the
sender account.
You can configure up to four receivers of SN'M'P traps. They must be configured in numerical
order. Each SNl\1P trap requires a corresponding host name, port, and community.
598
Module 8: Resource Management a nd Monitoring
8-75
Lab 24: Using Alarms
Create alarms to monitor virtual machine events and conditions:
1. Create a Virtual Machine Alarm to Monitor a Condition
2. Trigger the Virtual Machine Alarm
3. Create a Virtual Machine Alarm to Monitor an Event
4. Trigger the Virtual Machine Alarm
5. Disable Virtual Machine Alarms
Module 8: Resource Management and Monitoring
599
8-76
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Use predefined alarms in vCenter Server
View and acknowledge alarms
Create custom alarms
600
Module 8: Resource Management and Monitoring
8-77
Activity: Virtual Beans Resource Monitoring ( 1)
Which tools can Virtual Beans use to meet its goals for managing and monitoling the vSphere
environment? Match each Virtual Beans requirement with the appropriate vSphere feature.
Virtual Beans Requirements
vSphere Features
,, Increase compute resources for businesscritical workloads, particulany during peak
months.
o Provide proactive recommendations to help
o Alarms
avoid problems before they occur.
o Shares 1 11mits, reservations
o
V~~\11a re
Skyline
o vCenter Server performance charts
o Create monthly reports, for management. that
contain graphs of VM resource usage.
o Be notified when ESXi hosts experience high
CPU and memory usage.
Module 8: Resource Management and Monitoring
601
8-78
Activity: Virtual Beans Resource Management and
Monitoring (2)
Which tools can Virtual Beans use to meet its goals for managing and monitoring the vSphere
environment? Match each Virtual Beans requirement with the appropliate vSphere feature.
Virtual Beans Requirement
vSphere Feature
Increase compllte tesources for busi oess~criticalwori<loads,
Shares. limfls. and 1eservalions
parucularly dunng peak months
Provide p<oacwe recommendations to help avoid probtams bofore VMware Skyline
they occur.
Ct&ate monlhlytepol'ts, for n'lan.aigement that contain graphs of
vCenter SeM?r perfocmaneechans
Vf\.4 tesource usage.
Be no11r1ed when S.SXJ hosts expenence high CPU and memory
usage
602
Module 8: Resource Management and Monitoring
Alarms
8-79
Key Points
An ESXi host uses memory overcommit techniques to allow the overcommitment of memory while
possibly avoiding the need to page memory out to disk.
The VMkemel balances processor time to guarantee that the load is spread smoothly across
processor cores in the system.
You can apply reservations, limits. and shares against a VM to control the amount of CPU and
memory resources granted.
The key to interpreting performance data is to observe the range of data from the perspective of
the guest operating system, the virtual machine, and the host.
You use alarms to monitor the vCenter Server inventory objects and send notifications when
selected events or condrtions occur.
Questions?
Module 8: Resource Management and Monitoring
603
604
Module 8: Resource Management and Monitoring
Module 9
vSphere Clusters
Module 9: vSphere Clusters
Module 9: vSphere Clusters605
9-2
Importance
Most organizations rely on computer-based services like email, databases, and \Veb-based
applications. The failure of any of these services can mean lost productivity and revenue.
By understanding and using vSphere HA, you can configure highly available. computer-based
services, which are important for an organization to remain competitive in contemporary business
environments. And by developing skills in using vSphere DRS, you can improve service levels by
guaranteeing appropriate resources to virtual machines.
606
Module 9: vSphere Clusters
9-3
Module Lessons
1. vSphere Clusters Overview
2. vSphere ORS
3. Introduction to vSphere HA
4. vSphere HAArchitecture
s. Configuring vSphere HA
6. Introduction to vSphere Fault Tolerance
Module 9: vSphere Cluste rs607
9-4
Virtual Beans: vSphere Clusters
Virtual Beans has the following requirements for their data center:
Infrastructure must be highly available:
- Business-critical applications: 99.99 percent available (downtime per year of 52.56 minutes)
- Nonbusiness-critical applications: 99 percent available (downtime per year of 3.65 days)
Infrastructure must be scalable:
- Virtual Beans ex.pects huge gro\vth over the next three years, so the virtual infrastructure must
be easy to scale.
Applications must perform well:
- Applications must have enough resources to meet performance levels as defined in the servicelevel agreement.
As a Virtual Beans administrator, you create a vSphere cluster architecture for the data center that is
highly available, scalable, and high-performing.
608
Module 9: vSphere Clusters
9-5
Lesson 1: vSphere Clusters Overview
Lesson 1: vSphere Clusters Overview
vmware·
Module 9: vSphere Clusters609
9-6
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the benefits of vSphere clusters
Create a vSphere cluster
View information about a vSphere cluster
610
Module 9: vSphere Clusters
9-7
About vSphere Clusters
A cluster is used in vSphere to share physical
resources between a group of ESXi hosts.
vCenter Seiver manages cluster resources as a
single pool of resources.
You can create one or more clusters based on
the purpose each cluster must fulfill, for
example:
Management
• Production
• Compute
A cluster can contain up to 64 ESXi hosts.
vm
vSphere Client
MP-1111
v
..., G s.HK>a-Otvdtt>sJOCdl
..., OJ. SA·Do:acemer
> n SA-Compule-01
> CJ SA<ompute-02
> {!I SA...,.,N9ement
..., 0 st>-vcsa-Olvcl<lss l<>Cai
v 01 SB·Dat..c:enter
fll SB·Developm<!nt
>0 ss-~ient
Module 9: vSphere Clusters611
9-8
Creating a vSphere Cluster and Enabling Cluster
Features
When you create a cluster, you can enable one
)(
or more cluster features:
vSphere DRS
• vSphere HA
• vSAN
~·-
© "" ... OllS
You can also manage image setup and updates
on all hosts collectively.
""_ .......
.......... ,
~
You can enable the following services in a vSphere cluster:
•
vSphere HA, for high availability
•
vSphere DRS, for Vivi placement and load balancing
•
vSAN, fol' shared storage
You can also manage host updates using images. \'lith vSphere Lifecycle 1v!anager, you can
update all hosts in the cluster collectively, using a specified ESXi image.
612
Module 9: vSphere Clusters
9-9
Configuring the Cluster Using Quickstart
After you create a cluster, you can use the Cluster Quickstart workfto\v to configure the cluster. With
Cluster Quickstart, you follow a step-by-step configuration wizard that makes tt easy to expand the
c,luster as needed.
o--·
•
·- ·-~·-·
,.,..,
·-·
o ....~
.
.
.. - .. ----·. -··-- --- ---__
__
_
·----------·
--_, ··---..·-- ··---
.
._...... I
..... __.._____ -··--•74- ...- ---,
....w -
~--
--·........._
·-~­
-
The Cluster Quickstart workfiow guides you through the deployment process for clusters. le
covers every aspect oftl1e initial configuration, such as host, network, and vSphere settings. \Vitl1
Cluster Quickstat1, you can also add additional hosts to a cluster as part of the ongoing expansion
of clusters.
Cluster Quickstart reduces the time it takes to configure a cluster.
The workflow incl udes the following tasks:
•
Setting up services such as vSphcre HA aod vSAN
•
Verifying hardware and software compatibility
•
Deploying Virtual Distributed Switches
•
Configuring network settings for vSphere vMotion and vSAN
Module 9: vSphere Clusters613
•
Creating a vSAN stretched cluster or vSAN fault domains
•
Ensuring consistent NTP configuration across the cluster
The Cluster quickstart page provides workflow cards for configuring your new cluster:
•
Cluster basics: Lists the services that you have already enabled and prov ides an option for
editing the cluster's name.
•
Add hosts : Adds ESX i hosts to the clus ter. These hosts must alre,idy be present in tbe
inventory. After hosts are added, the workflow shows the total number of hosts that are
present in the cluster and provides health check validation for those hosts. At the start, this
workflow is empty.
•
Configure cluster: Informs you about what can be automatically configured, provides details
on configuration mismatch, and reports cluster health results through the vSAN health service
even after the cluster is configured.
For more information about creating clusters, see vCenter Server and Host i\1a11ageme111 at
httos://docs. \1 111\.1.,1are.co1111'e111V1'v1,varc-\.'S pherel7.O/ ro1l1. \1 111v~.rare. \.'spl1ere.\'Center11ost .doc/GU 1D3 B5 AF2 BI -C534-4426-B97A-0140 l <JA8010F hnnl.
614
Module 9: vSphere Clusters
9-10
Configuring the Cluster Manually
Alternatively) you can use the Configure tab to manually configure a cluster's settings.
.
--
0 ICM·Compote·01
.........,
..._ "'" ' v
1 ~1 -
•
""'--
.
Ooo!~>llOI
•
~-
·-...-__
_,.._
.......,."'._'°...
......
~--
,.,
~
vSphete ORS IS Tutned ON
--- -·-"-·-·
~···--
- - --I··-..
-r~"·
----
-
•Co:I , ., • •,
I
C(l<f
J
~
.....
w•-
·--·~
•
·~
tfUJI &ol'O"I¥ Q
......°"_
-
Module 9: vSphere Clusters615
9-11
Adding a Host to a Cluster
To add a host to a cluster, drag the host onto the cluster object in the Inventory.
vm
-0
vSphere Client
1
v
O sa-esxi-01.vclass.local
sa·vcsa-Ol vcilass.local
(]) tCM·O•t«en "
sa-esxi.02 vclass.local
ti ICM.ccmout..01
llJ SA-0.t.ttftlter
0
•.;.
Sb-\'CW•OI VClass.JOC.al
Summary
-
""'"""
H,,_."°'
Module 9: vSphere Clusters
VMwar~
VM ~art
Model
Processor Type
Logieal Processors·
2
NICs.
s
vw1ua1 Machines:
s
State
Upome
G.
616
Pe
Confiqur~
tntcl(R)
...,..
Coonec:
9-12
Viewing Cluster Summary Information
For a quick viev1 of your cluster configuration, the Summary tab provides general information about a
cluster's resources and its consumers.
.. ----n...
0 ICM Compule--01
4
,_..,
--
~
,.,
•c·-,..
,....,_ ..,.,._ •
...
~
•••
_
.. -· .
.
•
,_
_,,
°"''"~
~-
•
··-
A
•
o-1~
-··-
.....
~
"
N-~
-·
-. . --·
-·---,
•
•
v-wa•--
"-41\IPI •l'l<
~Sclwo•
~
OllS
•
•
Module 9: vSphere Clusters617
9-13
Monitoring Cluster Resources
You can vie\v a report of total cluster CPU, memory, memory overhead, storage capacity, the
capacity reserved by VMs, and how much capacity remains available.
_
...
-
, _ _ c-_ ....
"
MemoryReservatoonOetaas
,_
'""'"c-...
1--..
...._ . _
:Joi-
••
·---~,
~
...
--·
•
It-·
-·a-•
·-- . ,,_
•
,._
•
-·
- --·--"'"·-WOP'lfoi:iQoo•
........,,.....
~
---·~·
._,._"'
~
'
& ...... .
•
it-•
f1:
··~-
----------
.....-- ..·-,.
·~
••
....
- ..
~
--
'-~
~u
~
..u
vCcntcr Server uses vSphcrc HA admission control to ensure that sufficient resources arc
available in a cluster to provide foilover protection and to ensure that VM resource reservations
are respected.
618
Module 9: vSphere Clusters
9-14
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the benefits of vSphere clusters
Create a vSphere cluster
View information about a vSphere cluster
Module 9: vSphere Clusters619
9-15
Lesson 2: vSphere DRS
Lesson 2: vSphere DRS
vmware·
620
Module 9: vSphere Clusters
9-16
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the functions of a vSphere DRS cluster
Explain how vSphere DRS determines VM placement on hosts in the cluster
Enable vSphere DRS in a cluster
Monitor a vSphere DRS cluster
Module 9: vSphere Clusters621
9-17
About vSphere DRS
vSphere DRS is a cluster feature that helps improve resource allocation across all hosts in a cluster
It aggregates computing capacity across a collection of servers into logical resource pools.
vSphere DRS is used in the following situations:
Initial placement of a VM when it is powered on
Load balancing
M igrating Vtvts when an ESX i host is placed in maintenance mode
EJEJE B•'' ii.IN[ t EJ
vw
• . Im
• . Im
v..
• . l;!D
~~~
1111
0
11111111
0
11111111
0
1111
\Vhcn you power on a VM in the cluster for the first time, vSpherc DRS either places the Vivi on a
pa1t icltlar host or 1nakes a reco111n1ei1(lation.
ORS attempts to improve resource use across the cluster by performing automatic migrat ions of
Ylvls (vSpbere vMotion) or by providing a recommendation for VM migrations.
Before an ESXi host enters maintenance mode, VMs running on the host must be migrated to
another host (either manuall y or automaticall y by DRS) or shut down .
622
Module 9: vSphere Clusters
9-18
vSphere DRS: VM Focused
VSphere DRS is VM focused:
While the VM is powered on, vSphere DRS operates on an individual VM basis by ensuring that
each VM's resource requirements are met.
vSphere DRS calculates a score for each VM and gives recommendations (or migrates VMs) for
meeting VM's resource requirements.
The DRS algorithm recommends where individual VMs should be moved for maximum
efficiency. If the cluster is in fully automated mode, DRS executes the recommendations and
migrates VMs to their optimal host based on the underlying calculations pe1fonned every minute.
Module 9: vSphere Clusters623
9-19
About the VM DRS Score
The VM DRS score is a metric that tracks a VM's execution elficiency on a given host.
Execution efficiency is the frequency that the VM is reported as having Its resources requirements
met:
• Values closer to 0% indicate severe resource contention.
• Values closer to 100% indicate mild to no resource contention.
Cllr..1cr OM Score
<D
,....
·-·"'"
""
V IEW
o•s &ET"f lN GS
YfEW ALL
v .....
A VM DRS score is computed from an individual VM's CPU. memory. and nc1work metric.s. DRS
uses tl1ese metrics to gauge the goodness or wellness of the VM.
In vSphere 7, the DRS algorithm runs every minute. The Cluster DRS Score is the last result of
DRS running and is filed i.oto one of five bucketS. These buckets are simply 20 percent ranges: 020, 20-40. 40-60. 60-80 and 80- l 00 percent over the sample period.
624
Module 9: vSphere Clusters
9-20
VM DRS Score List
The cluster's Monitor tab lists the V M D RS Score and more detailed metrics for all the VMs in the
cluster.
-- -- - -· .... -· --
D ICM-Comput<>-01
........., ..,
,
.'
T--C,_
3\-·~
•
•
.-4..
-·-
~.. CIC!f
~
~
-·....................
~~-
--·
...
.....
a. ~
r•-a
.,._..
•
·~
I .... .........
3\-~
.s -~
•
I
G"'"-o0
Ill'-
I
-·~
·~
·~
,._
n
...
~
--~
'""''"'"""
-~
·~
·~
·-
·-
·~
·~
·~
u-
;1'aou
·~
u-
'
..
~·.
....
......
•
--.
. ,.,_
,.
.
•
a-
'
The Vl\1 DRS Score page shows rhe following values for VMs thar are powered on:
•
DRS Score
•
•
Active CPU
•
CPU Readiness
•
Granted Memory
•
•
Swapped Memory
Used CPU
Ballooned lvlemory
Module 9: vSphere Clusters625
9-21
Viewing VM DRS Scores Using Performance Charts
(1)
The advanced performance chart for a cluster object provides the DRS Score counter.
,
-----
,r,_..,._
·- -- - -__,.N_•
·I ·----- __ - -- -- -- --·--____
- ......
...
·--~
,........
-~
-~
~----
'
,,_
~-­
"~-
626
Module 9: vSphere Clusters
9-22
Viewing VM DRS Scores Using Performance Charts
(2)
The DRS Score counter displays the DRS scores for VMs in the cluster over the selected time
period.
0 ICM.Compute,.01
.._ _ AMnfll "
--·
..,._
"-
•
n
• •
-- _,
..··- .... -- - ·1::- -- .- ..- •
--"'"'" ..............
'"•
·~·
,,...
°""'-
. . . . - . .........oio
~
• ••
••
•
•
~-
}QIL
•'llW
.........
=-~·I
•
•
'OO•
,..
IAW
~
•
• • ,....
tOOW
......
.... .
-
-
·
•
•
Jill
n•
Module 9: vSphere Clusters627
9-23
Viewing vSphere DRS Settings
When you cli<:k VIEW DRS
SETTINGS, the mainvSphere
DRS parameters and their
current values are shown.
vSphere DRS settings include:
--... --------- ·-·-·-·-·..,.
' 100%
~­
Automation level
• Migration threshold
-To view the vSpherc DRS pane, go to the e.l ustcr's Summary tab.
628
Module 9: vSphere Clusters
...,,....
_
~ fll*llY"1 ....... 2- -
"*""
1 iw-ur.-
•
9-24
vSphere DRS Settings: Automation Level
You can configure the automation level for the inltial placement of VMs and for dynamic balancing
while VMs are running.
Edit Cluster Settings
1CM~1«1•
.,....• c.t. C)
&.ii~
AOG~\Otlll OOIOll~
~ """"'"'"""'
.14i1¥'<4'0 ~-
i'.'Cl'I.,..,...,.....,.,..,..___,._ ••• ....__,..._......
... -.....-.tt•.UU.-~~....
•11·~-·~1.o•
The automation level determines whether vSphcrc DRS makes migration recommendations or
automatically places VMs on hosts. vSphere DRS makes placement decisions when a VM powers
on and wben VMs must be rebalanced across hosts in the cluster.
The following automation levels arc available:
•
Manual: \Vhen you power on a V~1, vSphere DRS displays a list of recommended hosts on
which to place the VM. '-'' hen the cluster becomes imbalanced. vSphcrc DRS displays
recommendations for VM migration.
•
Partially automated: \Vhen you power on a VM, vSpbere DRS places it on the best-suited
host. \Vhen the cluster becomes imbalanced, vSpbere DRS displays recommendations for
manual VM migration.
•
FuUy automated: \Vhen you power on a VM, vSphere DRS places it on the best-suited host.
\Vhen the cluster becomes i.mba.lanced, vSpbere DRS migrates VMs from overused hosts to
underused hosts to ensure balanced use of cluster resources.
Module 9: vSphere Clusters629
9-25
vSphere DRS Settings: Migration Threshold
The migration threshold determines how aggressively vSphere DRS selects to migrate VMs.
ici«~e-01
Edit CJuster Settings
.,,.,.••• c.&
• uiornll&Oll
x
C)
•4i::Ub'>l!OD'..ons
Pu- Mllltt;MMe"W
60.IWXt<IOi:J',OflS.
.....
l)ltS._........, ....
~nw.i~ON!O>- • - ..,.,,.. ._ ........ ............_(_1~''11""1-hi)ti IO -
-~-
°""""'
""
,._
---........
,
.,, ..... _ _ .....,,_
fl)
t'lliaC1tcm.lt11
•---·u-.,t--,_..
, ......._
.. ,.,._ v ......._ · · - · llU•• .. ···1-
'°"""""'
¥°f''"
The following migration threshold settings are available:
•
Level 1 (Conservative): Applies only priority I recommendations. vCenter Server applies
only recommendations that must be taken to satisfy cluster constraints, such as affinity rnles
ai1d 11ost mainte11ance.
•
Level 2: Apply priority I and priority 2 recommendations. vCenter Server applies
recommendations that promise a significant improvement to the cluster's load ba lance.
•
Level 3 (default): Apply priority I, priority 2, and priority 3 recommendations. vCenter
Server applies recommendations that promise at least good improvement to the cluster's load
bala11ce.
630
Module 9: vSphere Clusters
•
Level 4: Apply priority I, priority 2, priority 3, and priority 4 recommendations. vCenter
Server applies recommendations that promise even '' modernte improvement to the c luster's
load balance.
•
Level 5 (Aggressive): Apply all recommendations. vCenter Server applies recommendations
that promise even a slight improvement to the cluster's load balance.
Module 9: vSphere Clusters631
9-26
vSphere DRS Settings: Predictive DRS
vSphere ORS and vRealize Operations
Manager combine data to predict future demand
and determine When and where high resource
utilization occurs.
To make predictive decisions, the vSphere ORS
data collector retrieves the following data.
Resource usage statistics from ESXi hosts
• Predicted usage statistics from the vRealize
Operations Manager server
Predicted usage statistics al\vays take
precedence over current usage statistics.
632
Module 9: vSphere Clusters
- -----·-----..----------·
_
..
--. . --(D -__ ______·-.,._
--· - CJ
...
~----;=-I" -::;I ·-·-··----
--- ..._
,_..
_
9-27
vSphere DRS Settings: VM Swap File Location
By default, swap files for a VM are on a data store in the folder containing the other VM files.
For all VMs in the cluster, you can place VM swap files on an alternative datastore.
lf vSphere DRS is enabled, you should place the VM swap file in the VM's directory.
··=
I " ICM COtnPll!t Ol
-----. ---- - - ®
----..-.
-•
.
C...11•tM
~llVl'C
~--
Edit Cluster Settings
-
'°"~-·
9
I
I
. . . _.,,,..... 1...._ . . .. ,... ... 1............-
_ _ _ ,...,.,"'1'>,
- . .,....,... ,_,,_..,...,.. ..
.._...,c~--· •--'-•-
- · - - - - ...... i .... _ _ ........... r- .....
·--·~-•- ..... 11>-M"' .......- _ . . , _ ,
,..._<I"~~
.... - - -.............
(" •ll('l•
-
A VM's lilcs can be on a V1vfFS datastorc, an NFS datastorc, a vSAN datastorc, or a vSphcrc
Virtual Volumes datastore. On a vSAN datastore or a vSphere Virtual Volumes datastore, the
swap file is created as a separate vSAN or vSphere Virtual Volumes object.
A swap file is created by the ESXi host when a VM is powered on. 1f this tile cannot be created,
the VM cannot power on. Instead of accepting the default, you can also use the following options:
•
Use per-VM configuration options to change the datastore to another shared storage location.
•
Use host-local swap, which allows you to specify a datastore stored locally on the host. You
can swap at a per-host level. However, it can lead to a slight degradation in petformaoce for
vSphere vMotion because pages swapped to a local swap ti le on tbe source host must be
transferred across tbe network to the destination host. Currently, vSAN and vSpbere Virtual
Volumes datastorcs cannot be specified for host-local swap.
Module 9: vSphere Clusters633
9-28
vSphere DRS Settings: VM Affinity
vSphere ORS virtual machine
affinity rules specify that selected
VMs be placed either on the
same host (affinrty) or on
separate hosts (anti-affinity):
Affinity rules: Use for multi-VM
systems where VMs
communicate heavily with one
another.
Anti-affinity rules: Use for
m ulti ~VM
Create VM/Host Rule
1o+<:- u t•·01
x
t· I
Dos.c:r,xioo:
~ ast~Q V.tl.H!ll Mkn"K must
. ....
systems where load
balancing or high availability is
desired.
•
I
<•NCEl
1m
After a vSphere DRS c luster is cre<1ted. you can edit its prope11ies to create rules that specify
affinity. The following types of rules can be created:
•
Affinity rules: vSphere DRS keeps certain VMs together on the same host (for example, for
perfo1111ance re<tsons).
•
Anti-affinity rules: vSphere DRS ensures that certain VMs are not together (for example, for
avaiJability reasons).
If two rules conflict, you are prevented from enabling both.
\Vhen you add or edit a rule, and the cluster is immediately in violation of that rule, the cluster
cominues to operate and n·ies to correct the violation.
For vSphere DRS clusters that have a default automation level of manual or partially automated,
migration recommendations are based 011 both rule folfi llment and load balancing.
634
Module 9: vSphere Clusters
9-29
vSphere DRS Settings: DRS Groups
VM groups and host groups are used in defining
VM-Host affinity rules.
The VM-Host affinity rule specifies whether VMs
can or cannot be run on a host.
Types of groups:
• VM group: One or more VMs
• Host group: One or more ESXi hosts
A VM can belong to multiple VM groups.
A host can belong to multiple host groups.
ICI tcM-Compute-Ol
----·"'
.-c""""' ..
VM/Host Groups
+ Ma x a...
-
•
""""'
U:e'l!lllll
VW-.,('YC
V)llAflal c;,.,._
v...........
VN OWl"Gtl
lfO l'\flto'•
•
- --·
...
·.......-
--
Hcu.IOclwn•
"Oil"'°'"'
For case of administration, virtual machines can be placed in VM or host groups. You c.an ere.ate
one or more VM groups in a vSphere DRS cluster, each consisting of one or more VMs. A host
group consists of one or more ESXi hosts.
The main use ofVM groups and host groups is to help in defining the VM -Host affinity rules.
Module 9: vSphere Clusters635
9-30
vSphere DRS Settings: VM-Host Affinity Rules
A VM-Host affinity rule:
Defines an affinity (or anti-affinity) relationship
between a VM group and a host group
Is either a required rule or a preferential rute
Rule options:
Must run on hosts in group
Should run on hosts in group
Create VM/Host Rule
teM~~'
x
..
,
..
v.w..1~"*_.,..-,..;-o..Cltfv...u.ouoOill_M 'fioft-
.....
....., 00" IKKI "'°'"'~~I
~
Must not run on hosts in group
Should not run on hosts in group
IESX.Gloool
A VM- Host affinity or anti-affini ty rule speci fies whether the members of a selected Viv! group
can run on the members of a specific host group.
Unlike an affinity rule for VMs, which specifies affi nity (or anti-affini ty) between individual
Vl'vls, a VM -Host affinity rule speci fies an affinity relationship between a group of VMs and a
group of hosts.
Because VM-Host affinity rules arc cluster-based, the VMs and hosts that arc included in a rule
must all reside in the same cluster. Lf a VM is removed from the cluster, the VM loses its
membership from all VM groups, even if it is later returned to the cluster.
636
Module 9: vSphere Clusters
9-31
VM-Host Affinity Preferential Rules
A preferential rule is softly enforced and can be violated if necessary.
Example: Separate Vl\t1s on different blade systems for improved performance.
vSphere ORS Cluster
Grovp B
Fl
Ill
Ill
Ill
VM
Ill
Ill
0
VM
Ill
Ill
0
Ill
~---~' ~'--~-~
Slade Chassis A
81.lde Chassis 8
Preferential rules can be violated 10 allow the proper functioning of vSphcre ORS, vSphcrc HA,
and VMware vSphere DPwl.
On the slide, Group A and Group B arc VM groups. Blade Chassis A and Blade Chassis B arc host
groups. The goal is to force the vrvts in Group A to run on the hostS io Blade Chassis A aod to
force the \/Ms in Group B to run on the hostS in Blade Chassis B. lftbe hosts foil, vSphere HA
restarts the \/Ms on the other hosts in the cluster. If the hosts are put into maintenance mode or
become overused, vSphere ORS moves the VMs to the other hosts in the cluster.
Module 9: vSphere Clusters637
9-32
VM-Host Affinity Required Rules
A required rule is strictly enforced and can never be violated.
Example: Enforce host-based tSV licensing.
vSphere ORS Cluster
GrOVl) A
VM
VM
VM
ISV·Llieense<t
A VM-Host affinity rule that is required, instead of preferential, can ()e used when the software
running in your \/Ms has licensing restrictions. You can enforce this rule when the software
running in your \/Ms has licensing restrictions. You can place such \/Ms in a VM group. Then
you can create a rule that requires the \/Ms to nm on a host &>Toup, which contains hosts with the
required licenses.
When you create a VM-Host affinity rule that is based on the licensing or hardware requirements
of the software running in your \/Ms, you are responsible for ensuring that the groups are properly
set up. The rule does not monitor the software running in the VMs. Nor does it know which thirdparty licenses are in place on which ESXi hosts.
On the slide, Group A is a VM group. You can force Group A to run on hosts in the IS\1-Licensed
group to ensure that the VMs in Group A run on hosts that have the required licenses. But if the
hosts in the ISV-Licensed group fail, vSphere HA ca1mot restart the VMs in Group A on hosts that
arc nOt in the group. If the hosts in the ISV-Licenscd group arc put into maimcnancc mode or
become overused, vSphere DR.S cannot move tile \/Ms in Group A to hosts that are oot in the
group.
638
Module 9: vSphere Clusters
9-33
vSphere DRS Settings: VM-Level Automation
You can customize the automation level for individual VMs in a cluster to override the automation
level set on the entire cluster.
-.
D ICM Compute Ol
•
-·-_
..-·
~ ·~
"-""
""_ .......
•·
.,
,._,_
..
''"4·••
---.....
----
;l -
••
~~
_.....__
-·.....
--..... _
•
~-
...... ····J. .
By setting the automation level for individua l VMs, you can line-tune automation to suit your
needs. For example, you might have a VM that is especially critical to your business. You want
more control over its placement so you set its automation level to Manual.
Jfa VM's automation level is set LO disabled, vCcnter Server does not migrate that Vlvl or provide
migr<ttion reco11m1endatio11s for it.
As a best practice, enable automation. Select the automation level based on your environment and
level of comfort.
For example, if you arc new to vSphcre DRS clusters, you might select Partially Automated
because you want control over the movement of VMs.
\\Then you are comfortable with what vSphere DRS does and how it works, you might set the
automation level to Fully Automated.
You can set the automation level to Nl auual on VMs over which you want more control, such as
your bus iness-critical VMs.
Module 9: vSphere Clusters639
9-34
vSphere DRS Cluster Requirements
ESXi hosts that are added lo a vSphere DRS cluster must meet certain requirements to use cluster
fea1ures successfully:
To use vSphere DRS for load balancing, the hosts in your cluster must be part of a vSphere
vMotion network:
- If the hosts are not part of a vSphere vMolion network, vSphere DRS can still make inilial
placement recommendations.
- vSphere ORS works best if the vriv1s meet vSphere vMotion requirements.
Configure all managed hosts to use shared storage.
You can create vSphere DRS clusters, or you can enable vSphere DRS for existing vSphere HA or
vSAN clusters.
640
Module 9: vSphere Clusters
9-35
Viewing vSphere DRS Cluster Resource Utilization
From the cluster's Monitor tab, you can view CPU, memory, and network utilization per host.
0 ICM·compc.rte-0'1
v
I
ACTICll'it
"' · sum of Virtual Machine CPU Utila.ation • J>e.f' Host
..
...
....
r.
.........c;I~ t·--------~---------- '
r. -.-<D·-0..-t. . . 1.,,.()!IU,Q•........-0y '>"M....- ..
j)CAJ~ .....reu
...,._u. -,O'U"-.-""'·°' - ....,......,__..u.ct.\.
--... v
The CPU Utilization and Memory Utilization charts show all the hosts in the cluster and how their
CPU and memory resources are allocated to each VM .
•
For CPU usage, the Vfvl information is represented by a colored box. If you point to the
colored box, the VM's CPU usage information appears. If the VM is receiving the resources
that it is entitled to, the box is green. Green means that 100 percent of the VM's entitled
resources are delivered. If the box is not green (for example, entitled resources are 80 percent
or les.s) for an extended time, you might want to investigate what is causing this shortfall (for
example, unapplied recommendations).
•
For memory usage, tbe VM boxes are not color-coded because the relatioosh.ip between
consumed memory and entitlement is often not easily categorized.
ln the Network Utilization chart, the displayed network data reflects all traffic across physical
network interfaces on the host.
Module 9: vSphere Clusters641
9-36
Viewing vSphere DRS Recommendations
The ORS Recommendations
pane disptays information about
the vSphere DRS
recommendations made for the
cluster.
You can also view the faults that
0<:curred when the
recommendations were applted
and the history ofvSphere DRS
actions.
10 ICMc:..::•01 •·-~
-
-___ _w
.......
--·.....
------c:.----.
.
-·----·-·
·~
-- . .
--·-
()Rs. Re<:On'r!lef'IOd !lo"'
1-..·-I
,..
-·-·-
----· ----~-
-··
the DRS Recommendations pane, you can see the current set of recommendations that are
generated for optimizing resource use in the cluster through either migrations or power
n1a11agen1e11t. 011ly 111anuaJ reco11m1e11dations awaiting user confirn1atio11 appe-ar in tl1e list.
ln
To refresh the recommendations, click R UN DRS NOW.
To apply all recommendations, click APPLY RECOM1\1"ENDA TIONS.
To apply a subset of the recommendations, select the Override DRS recommendations check
box. Select che check box next to each desired recommendation and click APPLY
RECOMl\ofENl>ATIONS.
642
Module 9: vSphere Clusters
9-37
Maintenance Mode and Standby Mode
Maintenance mode:
Removes a host's resources from a cluster, making those
resources unavailable for use
Is often used to service a host in a cluster
To pJace a host in maintenance mode:
tSI ...._.(It__ _ _
!Jl. IC.. 0-illf'll•
c;i ...........
All running VMs on the host must be migrated to another
'-l~M-1:-~
host, shut down or suspended.
When DRS is in fully automated mode. powered·on VMs are
automatically migrated from a host that is placed in
~ A·~YrlauJoal'.MM'!l~Mol)O
f! ••·~1<11$$.locll~~·~I
maintenance mode.
Standby mode:
Is used by vSphere OPM to optimize power usage. When a
host is placed in standby mode, tt is powered off.
A host enters or leaves maintenance mode as the result of a user request. \Vhi le .i n maintenance
mode, the host does not allow you to deploy or power on a VM .
VMs that arc running on a host entering maintenance mode must be shut down or migrated to
another host, either manually (by a user) or automatically (by vSpbere DRS). The host continues
to run the Enter Maintenance tvlode rJsk until all VMs are powered down or moved away.
\ Vh cn no more runni ng VMs arc on the host, the host 's icon indicates that it has entered
maintenance mode. T he host's Summar y tab indicates the n ew state.
Place a host i n maintenance mode before servicin g the host, for example, when installi ng more
menlOf}' or reJ110,ring a host fron1 a cluster.
You can place a host in standby mode manually. However, the next time that vSphere DRS runs, it
m ight undo your change or recommend that you undo the changes. ff you want a host to remain
powered off, place it in ma.i nteoan ce. mode and turn i t off
Module 9: vSphere Clusters643
9-38
Removing a Host from the vSphere DRS Cluster
To remove a host from a cluster:
1. Place the host in maintenance mode.
2. Drag the host to a different inventory location. for example, the data center or another cluster.
The resources available for the cluster decrease.
\Vhcn a host is put into maintenance mode, all its running VMs must be shut down, suspended, or
migrated to other hosts by using vSphere vMotion. VMs with disks on local storage must l>e
powered off, suspended, or nligrnted to another host and datastore.
\Vhen you remove the host from the cluster, the Vl\1s that an~ currently associated with the host
are also removed from the cluster. If the cluster still bas enough resources to satisfy the
reservations of all VMs in the cluster, the c luster adjusts resource allocation to reflect the reduced
amount of resources.
644
Module 9: vSphere Clusters
9-39
vSphere DRS and Dynamic DirectPath 1/0
Dynamic DirectPath 1/0 improves the vSphere
DirectPath 1/0 functionality by adding a layer of
abstraction between a VM and the physical PCI
device:
A pool of PCI devices that are available in the
cluster can be assigned to the VM.
vSphere DRS is aware of Dynamic DirectPath
1/0 devices:
When the VM is powered on, vSphere DRS
places the VM on any ESXi host that provides
the assigned PCI device.
vSphere DRS takes action only at VM power
on and does not perform any load-balancing
actions.
vSphere DRS Cluster
vm
• ~~
I·
1111
1111
• ~
1111
• ~
1111
I.
1111
I
I
Dynamic OircctPath 1/0 is useful on hosts that have PCI passthrough devices and for virtualiicd
devices that require a directly assigned hardware de,•ice to back it.
Dynamic DirectPath 110 is also called assignable hardware. The following devices can use
assignable hardware:
•
PCI passthrough devices
•
Shared PCI passthrough devices, for example, NVIDIA GR.JD vGPUs
Full memory reservation is applied to the VMs with pass-through devices.
Module 9: vSphere Clusters645
9-40
Adding a Dynamic DirectPath 1/0 Device to a VM
You can add Dynamic DirectPath
110 devices to a VM by editing
the VM's settings.
__
~~-c:n
Eol SettillQS
- -.. o
....
--
x
--·
_ ....,
,
,.....,
--
-~-
.
........ ..
•
•
---·
............
.......
•
_,....._
For New PCI device, click Dynamic DirectPath IO. Clicking SELECT HARD\VARE displays
a list of devices that can be attached to the VM . You can select one or more devices from the list.
ln the image, tJ1e Vtvl can use either an Intel NIC with the RED hardware label or vmxnet3 NIC
with the RED hardware label.
646
Module 9: vSphere Clusters
9-41
Lab 25: Implementing vSphere DRS Clusters
Implement a VSphere DRS cluster and verify proper functionality:
1. Create a Cluster That Is Enabled for vSphere DRS
2. Modify vSphere DRS Settings
3. Add ESXi Hosts to the Cluster
4. Verify VSphere vMotion Configuration on the ESXi Hosts
5. Create a Load Imbalance
6. Verify Proper vSphere DRS Cluster Functionality
Module 9: vSphere Clusters64 7
9-42
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the functions of a vSphere DRS cluster
Explain how vSphere DRS determines VM placement on hosts in the cluster
Enable vSphere DRS in a cluster
Monitor a vSphere DRS cluster
648
Module 9: vSphere Clusters
9-43
Lesson 3: Introduction to vSphere HA
Lesson 3: Introduction to vSphere HA
vmware·
Module 9: vSphere Clusters649
9-44
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify options for configuring a highly available vSphere emrironment
• Desclibe how vSphere HA responds when an ESXi host, a virtual machine, or an application fails
650
Module 9: vSphere Clusters
9-45
Protection at Every Level
With vSphere, you can reduce planned do\vntime, prevent unplanned downtime, and recover rapidly
from outages.
I I II II I
tII I II I
........ II · ... ... 11 •
"'"lj" II· •1•11• 11 ·
"""'"II· ........ 11.
........ u.
. ..... )
........ ,
Sitt'R«~y
"'~~9<H'
.. ..... 1
'"""'11 11 •
'""""I
....... II· ...... 11 • ,. ,.... I
- \Vhethcr planned or unplanned, downtime brings with it considerable costs. However, solutions to
ensure higher levels of availability are traditionally costly, hard to implement, and difficult to
n1a11age.
VM ware software makes ir simpler and less expensive to provide higher levels of availability for
important applications. With vSphere, organizations can easily increase the baseline level of
availability provided for all applications and provide higher levels of availability more easily and
cost effectively. \Vith vSphere, you can:
•
Provide h.igber ava ilability independent of bardware, operating system, and applications.
•
Reduce planned downtime for commoo maintenance operations.
•
Provide automatic recove1y in cases of failure.
vSphere MA provides a base level of protection for your VMs by restarting \/Ms if a host fails.
vSphere Fault T olerance provides a higher level of availability, allowing users to protect any VM
Module 9: vSphere Clusters651
from a host failure wi1b no loss of data, 1ransac1ions, or conncc1ions. vSphcrc Faull Tolerance
provides conlinuous availabiti1y by ensuring that the states of the primary and secondary YMs are
identical at any point in lbe instruction execution of the YM.
vSphere v/vfotion and vSphere Storage vMotion keep Y/vls available during a planned outage, for
example, when hosls or storage must be laken offline for mail1tenance. Syslem recovery from
unexpecled storage failures is simple, quick, and reliable wi1h the encapsulation property ofYMs.
You can use vSpbere Storage vMotion to suppo1t planned storage outages resulting from upgrades
to storage arrays to newer finnware or technology and YMFS upgrades.
\Vith vSphere Replication, a vSphere platform can prolect YMs natively by copying their disk
files 10 another localion where they are ready to be recovered.
YM encapsulation is used by lhird-party backup applicalions lhat support file and image-level
backups using vSphere Storage APls - Dala Protection. Backup solutions play prominenl roles in
recovering from dele1ed files or disks and corrupt or infected guest operating systems or file
systems.
Wilh Site Recovery Manager, you can quickly restore your organization's IT infraslructure,
shortening 1he time that you experience a business outage. Site Recovery /vlanager automates
semp, failover, and testing of disaster recovery plans. Site Recovery Manager requires that you
install vCenter Server at the protected site and at the recovery site. Site Recovery Manager also
requires either host-based replicai-ioa tbrough vSphere Replication or preconfigured array-based
replic;1tion between lhe protected site and the recovery site.
652
Module 9: vSphere Clusters
9-46
About vSphere HA
vSphere HA provides rapid recovery from outages and cost-elfective high availab1llty rar applications
running in VMs. vSphere HA protects application availability in several ways.
Protects Against
How Docs vSphcre HA Provide Protaction?
ESX1 host failure
By restarting ihe Vlllfs on other hosts wtth1n the cluster
vr-.1 railure
By re$1art1ng the VM when e VMware Tools heartbeat 1s not received
w1lh1n a set lune
AppllooUon l>l•lure
By restarting lhe VM when an application heartbeat 15 not received
within a set lime
Data.store accessibility failure
Network isolation
By restarting the affected VMs on other hosts that still can access the
datastores.
By restarting VMs if their host becomes s:olated on the management or
VSAN net\vork_ This protection is pcovided even if the network becomes
pamtioned.
Uolikc other clustering solutions, vSphcre HA protectS all workloads by using the infrastructure
itself. After you configure vSphere HA, no actions are required to protect new VMs. All
workloads are automatically protected by vSphere HA.
Module 9: vSphere C lusters653
9-47
vSphere HA Scenario: ESXi Host Failure
When a host fails, vSphere HA restarts the impacted VMs on other hosts in the cluster.
VM C
ESX1 Host
ESXI Host
vCenter
Set'YOI
ESXI Host
•
• \+Sphere HA
Ouste1
0
To play the animation, go to h11rs://,•mwarc.bravais.comls/!...vK761swrsbm.iq8kRuco .
vSphcre HA can also determine whether a ESXi host is isolated or has fai led. ff an ESXi host
fails, vSphcrc HA attempts to restart any VMs that were running on the failed host by us ing one of
the remaining hosts in the c luster.
In every cluster, the time to recover depends on how long it takes your guest operating systems
and applications to re.s tart when the VM is failed over.
654
Module 9: vSphere Clusters
9-48
vSphere HA Scenario: Guest Operating System
Failure
When a VM stops sending heartbeats or the VM process (vmx) fails unexpectedly, vSphere HA
resets the VM.
,_l
VM A
tyM ....
VM 8
:vw..,,,.. 1~\.
Host
VM C
VM E
(VM,...• fllO.:]
(VM...,,.. f Qalo)
VM D
VM F
1vw...,,,.1~
lV'°'"'"'" 1(;)1J)
ESXI Host
ESXi Host
vCenter
Server
•
• \ISphete HA
O uster
To play the animation, go to hltps://vmw:ire.brnvais.com/slikio41.tOkS6fl>ivlJpR6.
If VM monitoring is enabled, the vSphere HA agent on each individual host mon.itors VMware
Tools in each VM running on the host. ~'hen a VNI stops sending heartbeats, the guest operating
system is reset. The VM stays on the same host.
Module 9: vSphere C!usters655
9-49
vSphere HA Scenario: Application Failure
When an application fails, vSphere HA restarts the Impacted VM on the same host.
VM <
... ' ..-·
..._
ESXI Host
ESXI Host
vCenter
Set'YOI
ESXI Host
•
• \+Sphere HA
Ouste1
0
To play the animation, go to httrs://,•mwarc.bravais.comlsfOgf,03mC2MiGVVPKCxdh .
The agent on each host can optionally monitor heartbeats of applications running in each VlVI.
\Vhcn an application fai ls, the VM on which the application was running is restarted on the same
host. Application monitoring requires a third-party application monitoring agent designed to work
with VM application monitoring.
656
Module 9: vSphere Clusters
9-50
vSphere HA Scenario: Datastore Accessibility Failures
If VM Component Protection {VMCP) is enabled, vSphere HA can detect datastore accessibility
failures and provide automated recovery for affected VMs.
You can determine the response that vSphere HA makes to such a failure. ranging from the creation
of event alarms to VM restarts on other hosts:
All paths down (APO):
- Recoverable.
- Represents a transient or unknown accessibility loss.
- Response can be either Issue events, Power off and restart VMs ·Conservative restart
policy, or Power off and restart VMs -Aggressive restart policy.
Permanent device loss (POL):
- Unrecoverable loss of accessibmty.
- Occurs When a storage device reports that the datastore Is no longer accessible by the host.
- Response can be either Issue events or Power off and restart VMs.
Power off and restart Vlvfs - Conservative restart policy: vSphcrc HA docs not aucmpt to restart
the affected VMs unless vSphere HA determines that another host can restart the Vtv!s. The host
experiencing the all paths down (APO) communicates with the vSphere HA master host to
determine whether the cluster has sufficient capacity to power on the affected Vlvls. lfthe master
host determines that sufficient capacity is available, the host experiencing the APO stops the VMs
so that the VMs can be restarted on a healthy host. 1f the host experiencing the APO cannot
communicate with the master host, no action is taken.
Power off and restart VMs - Aggressive restart policy: vSphere HA stops the affected VMs even if
it cannot determine that another host can restart the VMs. The host experiencing the APO attempts
to communicate with the master host to determine whether the cluster has sufficient capacity to
power on Lhe affected VMs. ff the master host is not reachable, sufficient capacity 10 restart the
VMs is unknown. ln this scenario, the host takes the risk aod stops the VMs so they c.1n be
restarted on the remaining healthy hosts. However, if sufficient capacity is not available, vSpbere
HA might not be able to recover all the affected VMs. This result is common in a network
Module 9: vSphere Clusters657
partition scenario where a host cannot communicate with the master host to get a definitive
response 10 the likelihood of a successful recovery.
658
Module 9: vSphere Clusters
9-51
vSphere HA Scenario: Protecting VMs Against
Network Isolation
vSphere HA restarts VMs if their host becomes isolated on the management or vSAN network.
Host network isolation occurs when a host is still
running, but it can no longer obseNe traffic from
vSphere HA agents on the management
network:
The host tries to ping the isolation addresses.
An isolation address is an IP address or
FQON that can be manually specified (the
default is the host's default gateway).
If pinging fails. the host declares that it is
isolated from the network.
-
Prll'W)'14ffltb- ~~
-
All•ma.. 11_,.,.,.I N•I_.,
This protection is provided even if the
network becomes partitioned.
lfyou ensure that the network infrastructure is sufficiently redundant and that at least one network
path is always available, host network isolation is less likely to occur.
Module 9: vSphere Clusters659
9-52
Importance of Redundant Heartbeat Networks
Redundant heartbeat networks ensure reliable failure detection and minimize the chance of hostlsolalion scenarios.
In a vSphere HA cluster, heartbeats have the following characteristics:
They are sent bet\veen the master host and the subordinate hosts.
They are used to determine whether a master host or a subordinate host has failed.
They are senl over a heartbeat network.
Redundant heartbeat networking is t]l(> best approach for your vSphcrc HA cluster. \Vhcn a master
host's connection fails, a second connection is still available to send heartbeats to other hosts. If
you do not provide redundancy, your failover setup has a single point of failure.
660
Module 9: vSphere Clusters
9-53
Redundancy Using NIC Teaming
A heartbeat network is
Implemented in the following
ways:
• By using a VMkemel port that
is marked for management
• By using a VMkemel port lhat
is marked ror vSAN traffic
when vSAN is in use
You can use NIC teaming to
create a redundant heartbeat
netwot1< on ESXt hosts.
-
··---·--
~- ~
-- .
...
Vlrtuel s.,..1lc:<1~
-__-·
"".,...._
--..
~-·--
··--..
·--·-·
.
----........
--
- · .llO•ti
. ·-·
.
- -·-. -· ...
I ..,.,..__
---
ln this example, vmnicO and vmnic I fonn a NlC team in the M anagement network. The vmkO
VMkemel po1t is mar ked for management.
Module 9: vSphere Clusters661
9-54
Redundancy Using Additional Networks
You can create redundancy by configuling more
heartbeat networks.
On each ESXi host, create a second VMkemel
...
physical adapter.
Redundant management networking supports
the reliable detection of failures and prevents
networks.
·-··--"
port on a separate virtual switch \Vith its own
isolation or partition conditions from occurring,
because heartbeats can be sent over multiple
---..
..........._ l·M··--'
V•rw.il S..;1TQ'IK
...
~·
--.........
--
~.
-•
_,
___ _,.._ - -
.............,_...•
..
·-·- .
·--
v___.,,_,,
•
.......
Q
~""""""''
...... #
---'
ln most implcmcnlations, N lC 1c,1ming provides sufficient heartbeat redundancy, but as an
alternative. you can create a seco11d 111anage1nent net\vork co1u1ection attached to a se1)arate virtt1al
S\l\'itcl1.
The original management network connection is used for network and management purposes.
When the second management network cow1ection is created. the mast.e r host sends heartbeats
over both management network connections. If one path fails, the master host still sends and
receives heartbeats over the other path.
662
Module 9: vSphere Clusters
9-55
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify options for configuring a highly available vSphere emrironment
• Desclibe how vSphere HA responds when an ESXi host, a virtual machine, or an application fails
Module 9: vSphere Clusters663
9-56
Lesson 4: vSphere HA Architecture
Lesson 4: vSphere HA Architecture
vmware·
664
Module 9: vSphere Clusters
9-57
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the heartbeat mechanisms used by vSphere HA
Desclibe failure scenarios
Re<:ognize vSphere HA design considerations
Module 9: vSphere Clusters665
9-58
vSphere HA Architecture: Agent Communication
When vSphere HA is enabled In a cluster, the Fault Domain Manager (FDM) service starts on the
hosts in the cluster.
e>atasto.-e
oatastore
Datastore
E31.
~·
~
I
-
•
Man~ement Network
vCenter Ser.·et
The vSphcrc HA cluster is managed by a master host All other hosts are called subordinate hosts.
Fault Domain Manager (FDM) services on subordinate hosts all communicate with FDM on the
master host. Hosts cannot participate in a vSphere HA cluster if they are in maintenance mode, in
standby mode, or discoru1ected from vCenter Server.
To detennine which host is the mast.er host. an election process takes place. The host that can
access the greatest number of datastores is elected the master host. If more than one host sees the
same number of datastores, the election process determines the master host by using the host
lv!anaged Object ID (MOID) assigned by vCencer Server.
666
Module 9: vSphere Clusters
The election process for a new master host completes in approximately 15 seconds and occurs
under these circumstances:
•
vSphere HA is enabled.
•
The master host encounters a system foilure because of ooe of the following factors:
The master host is placed in maintenance mode.
The master host is placed in standby mode.
vSphere HA is reconfigured.
•
The subordinate hosts cannot communicate with the master host because of a network
problem.
During the election process, the candidate vSphere HA agents communicate with each other over
che managemenc network, or che vSAN network in a vSAN cluster. by using User Datagram
Protocol (UDP). All necwork connections are point-to-point. After the master host is determined,
the master host and subordinate hosts communicate using secure TCP. \Vhen vSphere HA is
started. vCenter Server contacts the master host and sends a list of hosts with membership in the
cluster wiU1 the cluster configuration. That infonnation is saved to local storage on the master host
and then pushed out to the subordinate hosts in the cluster. If additional hosts are added to the
cluster during normal operation, the master host sends an update to all hosts in che cluster.
The master host provides an interface for vCenter Server co query the state of and report on the
health of the fault domain and VM availability. vCenter Server tells the vSphere HA agent which
VMs to protect with their VM-to-host compatibility list. The agent learns about state changes
through hostd and vCenter Server learns through vpxa. The master host monitors the health of the
subordinace hoses and take-5 responsibility for VMs that were running on a failed subordinate host.
A subordinace host monitors the health ofVMs running loca lly and sends state changes to the
master host A subordinate host also monitors the health of che master host.
vSphere MA is configured, managed, and monitored through vCenter Server. The vpxd process,
which runs on the vCencer Server system, maintains the cluster configuration data. The vpxd
process reports cluster configuration changes to the master host. The master host advertises a new
copy of the cluster configuration information and each subordinate host fetches an updated copy.
Each subordinate host writes the updated configur~tion information to local storage. A list of
protected VIV!s is stored on each datascore. The VM list is updated after each user-initiated poweron (protected) and power off (unprotected) operation. The VM list is updated after vCenter Server
observes these operations.
Module 9: vSphere Clusters667
A VM becomes protected when an operation results in a power on. Reverting a VM to a snapshot
with memory state causes the VM to power on and become prOtected. Similarly, a user action that
causes the VM to power off, for example, reverting to a snapshot without memory state or a
standby operation performed in the guest, causes the VM to become unprotected.
668
Module 9: vSphere Clusters
9-59
vSphere HA Architecture: Network Heartbeats
8
heartbeats to the subordinate
hosts.
In this way, the subordinate
hosts kno\v that the master host
is alive and the master host
knows that the subordinate hosts
•••
VMF$
The master host sends periodic
8
V11t1H1I Mll(h!M C
V<1lu11I Mad!!nt> a
are alive.
. ··r-········- ·····- ·····- ·"·. ····- ········--·····-
111
0
111
Heartbeats arc sent to each subordinate host from the master host over all configured management
netv.rorks. However, subordi11ate J1osts use 0 11Jy one 1nanagerneot net\vork to c-0111111unicate \vitl1
the master host. If the management network used to communicate with the master bost fails, U1e
subordinate host switches to another management interface to c.o mmunicate with the master host.
If the subordinate host does not respond within the predefined timeout period, the master host
declares the subordinate host as agent unreachable. When a subordinate host is not responding, the
master host attempts to determine the cause of the subordinate host's inability to respond. The
master host must determine whether the subordinate host crashed, is not responding because of a
network failw·e, or the vSphere HA agent is in an unreachable state.
Module 9: vSphere Clusters669
9-60
vSphere HA Architecture: Datastore Heartbeats
When the master host cannot
communicate with a subordinate
host over the management
network, the master host uses
datastore heartbeating to
determine the cause:
Subordinate host failure
VMFS
VMFS
~
~
•••
8
\/ltlv31 M.'lthuw E
Network partition
Network isolation
111
0
Ill
,.,._
Ma~nt
Network 2
Using dat1sLore hcartbcating, the master host detem1ines whether a host has failed or a network
isolation bas occurred. I f datastore heartbeating from the host stops, the hosi is considered foiled.
ln this case, the failed host's VMs are started on another host in the vSphere HA cluster.
670
Module 9: vSphere Clusters
9-61
vSphere HA Failure Scenarios
VSphere HA can identify and respond to various types of failures:
Subordinate host failure
• Master host failure
• Network failure (host isolation)
VMCP enables vSphere HA to detect and respond to datastore access failures:
APO
• POL
vSphcrc HA can also determine whether an ESXi host is isolated or has failed. Isolation refers to
when an ESXi host cannot see traffic coming from the other hosts in the cluster and cannot ping
its configured isolation address. If an ESXi bost fails, vSphere HA attempts to restart the VMs that
were running on the failed host on one of the remaining hosts in the c luster. If the ESXi host is
isolated because it cannot ping its configured isolation address and sees no management network
traffic, the host executes the Host Isolation Response.
Module 9: vSphere Clusters671
9-62
Failed Subordinate Hosts
When a subordinate host does
not respond to the net\vork
heartbeat issued by the master
host, the master host tries to
VMFS
g
NAS,INFS
(HNflbe.lt ~g1o~
~
identify the cause.
Ill
0
~
Ill
-
Pl'IMll')' Ht¥1.,.il1 H•twC)(k
. ...... Alt• fNI• HN •lbf.al Nf(WOfli.
The master host must dctem1inc whether the subordinate host is isolated or has failed, for
example, because of a misconfigured firewall rule or component failure. The type of failure
dictates how vSphere HA responds.
\ Vhen the master host cannot communicate with a subordinate host over the heartbeat network, the
master host uses daiastore heartbeating to determine whether the subord inate host faile<t, is in a
network partition, or is network-isolated. lfthe subordinate host stops datastore heartbeating, the
subordinate host is cons idered to have fai led, and its vimtal machines are restarted elsewhere.
For VlvlFS, a heartbeat region on the datastore is read to find out if the host is sti ll heartbeating to
it. For NFS daiastores, vSphere HA reads the hos t --hb file, which is locked by the ESX i host
accessing the datastore. T he file guarantees that the Vlvlkemel is heanbeating to the datastore and
periodically updates the lock file.
The lock file time stamp is used by the master host to determine whether the subordinate host is
isolated or has failed.
672
Module 9: vSphere Clusters
In both storage examples, che vCenter Server instance selects a small subset of datastorcs for hosts
to heartbeat to. The datastores that are acc.essed by the !;,'featest oumber of hosts are selected as
candidates. But two datastores are selected (by default) to keep the associated overhead and
processi11g to a 111i11in1l1n1.
Module 9: vSphere Clusters673
9-63
Failed Master Hosts
When the master host is placed
HAS/lil S
In maintenance mode or fails, the
subordinate hosts detect that the
master host is no longer issuing
heartbeats.
o.f'ault GM..-•v
( ltlllatl(ln AOClfti$)
Ill
---.-···-···-·
Ill
0
···-r·-·----Ill
0
Ill
Primary H11Mt~.:at Hfltwort
-·- ...-,........ 11ellrtbl!•t H«.work
MOIO ... ,_nft)d Obj~ ID
To determine which host is the master host, an e lection process takes place. The host that can
access the greatest number of datastores is electe.d the master host. If more than one host sees the
same number of datastores, the election process determines the master host by using the host
tvlanaged Object ID (MOlO) assigned by vCenter Server. lfthe master host fails, is shut down, or
is removed from the cluster a new election is held.
674
Module 9: vSphere Clusters
9-64
Isolated Hosts
A host is declared isolated when
the following conditions occur:
The host is not receiving
networlc heartbeats.
The host cannot ping its
isolation addresses.
V 1rtu.i l M:ic-runo C
Vlrtu"! M;Kh•M
e
1
i'§'1ii1
·- ····.,..······-·······- ······-······- ·······-······-··..
Ill
0
'
Ill
Default Gateway
(lwl•tion AddtCS$)
·-······-······-···· ~-····- -·······-
-
Primary Hcartbc!at Nctwotk
·····-
Alternate H eartbeat Network
The slide illustnncs one of several scenarios that might res ult in host isolation. Ifa host loses
connectivity to both the piimary heartbeat network and the alternate heartbeat network, the host no
longer receives network heartbeats from the other hosts in the vSphere HA cluster. Furthermore,
the slide depicts that this same host can no longer ping its isolation address.
!fa host becomes isolated, the master host m ust determine if that host is still alive, and mere ly
isolated, by checking for datastore heartbeats. Datastore heartbeats are used by vSphere HA only
when a host becomes isolated or partitioned.
Module 9: vSphere Clusters675
9-65
VM Storage Failures
Storage connectivity problems might arise
because of:
Networt< or switch failure
• Array misconfiguration
• Power outage
Storage conne<:tivtty problems affe<:t VM
availability:
VMs on affected hosts are difficult to manage.
• Applications with attached disks fail.
676
Module 9: vSphere Clusters
ESX1
ESX1
~
1111
0
111
I
9-66
Protecting Against Storage Failures with VMCP
VM Component Protection protects against storage failures on a VM.
If VMCP 1s enabled, vSphere HA can detect datastore accessibility failures and p10V1de automated
recovery for affected VMs.
• VMCP is not supported with vSAN.
DOOOO ::I:.l:: . . 1:.1
E.SXi
VMC4' '"""Oil It clo11t•1
VMC:P ol'-*Wlll::•tlOll
'"'"'e<l•lllllon.
cllofrb'<!'d for v~pne<i~ MA
. ,. . .~'ty
~
1111
0
.,..d
1111
V"'1C9 cl~i:d~ and
lO f~lh-~
ft'WO!•(!~
\Vhcn a datastorc accessibility failure occurs, the affected host can no longer access the storage
path for a specific datastore. You can determine the response that vSphere HA gives to such a
failure. ranging from the creation of event alarms to VM restarts on other hosts.
Module 9: vSphere Clusters677
9-67
vSphere HA Design Considerations
When designing your vSphere HA cluster, consider these guidelines:
Implement redundant heartbeat networks and redundant isolation addresses:
- Redundancy minimizes host isolation events.
Physically separate VM networks from the heartbeat networks.
Implement data stores so that they are separated from the management network by using one or
both of the following approaches·
- Use Fibre Channel over fiber optic for your datastores.
- If you use IP storage, physically separate your IP storage network from the management
network.
If a datastore is based on Fibre Channel, a network failure doc-5 not disrupt da1as1orc access. \Vhcn
using datastores based on lP storage (for example, NFS, iSCSI, or Fibre Channel over Ethernet),
)'OU must physically separate the IP storage network and tl1e management network (the heattbeat
network). If physica l separation is not possible, you can logically separate the networks.
678
Module 9: vSphere Clusters
9-68
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify the heartbeat mechanisms used by vSphere HA
Desclibe failure scenarios
Re<:ognize vSphere HA design considerations
Module 9: vSphere Clusters679
9-69
Lesson 5: Configuring vSphere HA
Lesson 5: Configuring vSphere HA
vmware·
680
Module 9: vSphere Clusters
9-70
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Recognize the requirements for creating and using a VSphere HA cluster
• Configure a vSphere HA cluster
Module 9: vSphere Clusters681
9-71
vSphere HA Prerequisites
To create a vSphere HA cluster, you must meet several requirements:
All hosts must be configured with static IP addresses. If you are using DHCP, you must ensure that
the address for each host persists across reboots.
All hosts must have at least one management network in common.
For VM monitoring to work, VMware Tools must be installed in every VM.
Only vSphere HA clusters that contain ESXi hosts 6.x and later can be used to enable VMCP.
You must not exceed the maximum number of hosts that are allowed In a cluster.
See VMware Configuration Maximums at https·/Jconfigmax vmware.oom.
To determine the maximum number of hosts per cluster, see Vl\1ware Configuration Max imums at
https;//conti gmax. \.'Til\\.'are.co1n .
682
Module 9: vSphere Clusters
9-72
Configuring vSphere HA Settings
--
When you create or configure a
..
vSphere HA cluster. you must
configure settings that determine
ho\v the feature works.
Pt'
Cdl!. Cluste-< SMlt'IQS
f ,,,
<...c
r c
- "' -·-..-o.--- ---,__
____
___
....._
..
___
_
-.....- ______ -----...-.....
,_ _
·---·-
----·
..,._,.
....
_..
_ _ _ ,:.. C ·
--·-.--...
--~
1--···
~
""':"
ra;;;,,. ... _ _ _
In the vSphere Client, you can configure the following vSphere HA settings:
•
Availability failure conditions and responses: Provide scni11gs for host failure responses, host
isolat ion, VM monitoring, and vrvtCP.
•
Admission control: Enable or disable admission control for the vSphere HA cluster and select
a policy for how it is enforced.
•
Heartbeat datastores: Specify preferences for the datastores that vSphere HA uses for
datastore heart-eating.
•
Advanced options: Customize vSphere HA behavior by setting advanced options.
Module 9: vSphere Clusters683
9-73
vSphere HA Settings: Failures and Responses
You use the Failures and
Edit Cluster Settings
responses pane to configure a
cluster's response if a failure
~
.... - ~
~curs .
.,_,.. _
_
.....,,. r• • ...,.,,._"'"'"'--'
••tn•••o.••.. ,,. ......_ _ _ _, _
l'O.._ _ _ , . ..... ~---··- ...•~llQ. .. .,.u'OI
-----
\'..... ~~"'
,..M1_3
,_"" _ _ ..... .:l
--_- __ _
~-·""·· ..--.~- ............ 9
....... _.... ,..,..,..
.
_ of!_,,_,._...,_ _ ""91'1'
[ 0~"
Im
Using the Failures and Responses pane, you can configure how your cluster should function when
problems are encountered . You can specity the vSphere HA cluster's response for host failures
and isolation. You can also configure Vl\1CP actions when permanent device loss and all paths
down situacions occur and enable VM monitoring.
If a datastore encounters an All Paths Down (APO) condition, the device state is unknown and
might only be temporarily available. You can select the following options for a response to a
datastore APO:
•
Disabled: No action is taken for the affocted VNls.
•
Issue events: No action is taken against the affected VMs, however the administrator is
notified when an APO event has occurred.
•
Power off and restart VMs - Consen·ative restart policy: vSphere HA does not attempt to
restart the affected VMs unless vSphere HA determines that another host can restart the VMs.
684
Module 9: vSphere Clusters
The host experiencing the APD communicates with the master host to determine whether
su fficient capacity exists in the cluster to power on the affected VMs. If the master host
determines sufficient capacity exists, the host experiencing the APD stops the VMs so that the
VMs can be restarted on a healthy hose. If the host experiencing the APD cannot
conununicate with the master host, no action is taken
•
Power off and restart VMs - Aggressive res tart policy: vSphere HA stops the affected
VMs even if it cannot determine that another host can restart the VMs.
The host experiencing the A.PD attempts to communicate with the master host to determine if
sufficient capacity exists in the cluster to power on the a ffected VMs. If the master host is not
reachable, sufficient capacity for restarting the VM s is unknown. In this scenario, the host
takes the risk and stops the VMs so chat they can be restarted on the remaining healthy hosts.
However, if suflicient capacity is not available, vSphere HA might not be able to recover all
the affected V~1s. This result is common in a network partition scenario where a host cannot
communicate wich the master host to get a definitive response to the likelihood of a successfol
reco\rery.
For more information about Vivi Component Protection, see
https:/fhlo~s. \'mware.comlvsphere/.
Module 9: vSphere Clusters685
9-74
vSphere HA Settings: VM Monitoring
...._.
---- ........·-·__- . .,_.,.,....."-°"'"___ . .
•
Ed1t Cluster Setti'lgs
You use VM Monitoring sellings
to control the monitoring of VMs.
-~ «:>
By default, VM Monttoring is set
,,_~
to Disabled
""~-·
4-u•~
...
'""'* _...,... ....._,..........,,...........-....-
-~·
__ ___
,,..
~~·,--
~1'(.'1.-~~"'--·-
t·--•"""'-1{1 C)
_,_""'-""
-----"""'
\IM_I_
I
r.,;;;;;-- -:i
1-
@
1-..----a
1-..- ....- -..- -...... 3
,?.! '
-
I ~ "l'WW'O O"'I'
.....
I·
1
.......... -~
-
I
(;.&'!ICU
-
The Vl\1 monitoring service detennines that the VM has failed if one of the following events
occurs:
•
VMware Tools heartbeats arc not received.
•
The guest operating system has not issued an 1/0 for the last 2 minutes (by default}.
If the VM has failed, the VJvl monitoring service resets the VJvl to restore services.
You can configure the level of monitoting sensitivity. Highly sensitive monitoring results in a
more rapid conclusion that a fail1u-e has occurred. Although unlikely, highly sensitive monitoring
might lead to falsely identifying failures when the VM or application is still working but
heartbeats have not been received because of factors like resource constraints. Low-sensitivity
monitoring results in longer interruptions in service between actual failures and VMs being reset.
Select an option that is an e ffective compromise for your needs .
You can select VJvl and Application Monitoring to enable application monitoring.
686
Module 9: vS phere Clusters
9-75
vSphere HA Settings: Heartbeat Datastores
A heartbeat file is created on the
selected datastores and is used
if the management network fails.
~
Edit CIOS-tllr Settings
..:<d-lif.
x
C>
._....,__ ,.._Cori•"' , ..___
_ -
..... ...
....... -
~-~--
........
_.._,~
Ill_
1.,.,. • .. -."-.lo
.........
"'
I___
Os-.
"" .........._.t..u ____ ; .p.
-~-
---...-..
u..o-·-·11. . -..-.. - -...-.. . . . . .
---·---- -- ·----·
•.
,,..,......,
-.,~-
~
a
11
a
n
~
~~-
·-·
«»0 1 ' " '
,.
••
,.
,.
•
..o.o
'
'
'
'
l <411Cll
-
Oatasiorc hcaribcating takes checking the health of a host 10 another level by checking more than
the management network to determine a host's health. You can configure a list of datas tores to
monitor for a particular host, or you can allow vSphere HA to decide. You can also combine both
methods.
Module 9: vSphere Clusters687
9-76
vSphere HA Settings: Admission Control
vCenter Server uses admission
Edit Cluster Set~.s.
control to ensure both that
- N CJ
sufficient resources are available
•
Ktot.Clmp<llt oi
-0lif.;I-.. . . .
,...,.,..., ..._ _ I ~c.rc.· 1 ....
in a cluster to provide failover
protection and that VM resource
--··-,-•t. _
reservations are respected.
.... i - . . . .-
... - -
l<fllq....,.• ......, _ , , , ,
r--.----·..,
-~
•!Alo>-- -
..,,........ -
" " " ' ' · • - • • " - _ _ , _ , ._ _ _
•• -
-·----..I
-
I°""'"' -·· - ...._ ::J
...... •'
----···-""' -·--1-.. .- . . .
""" . . . . , , , -•.lo\... •••·~-.... -
•• -
._,,,'" __ ... __
--
···-·-
..,.....,.«l.~W.-..,
.....
After you create a cluster. you can use admission control to specify whether VMs can be started if
they violate availability constrnints. T he c luster reserves resource-s to allow foilover for all running
VMs for a specified number of host failures.
The admission control settings include:
•
Disabled: (Not reconun ended) This option disables admission control, allowing the VMs
violating availability constraints to power on.
•
S lot Policy: A slot is a logical representation of memory and CPU resources. \Vith the s lot
policy option, vSpbere HA calculates the slot s ize, determ.i nes bow many s lots each host in
the cluster can hold, and therefore determines the current failover capacity of the cluster.
688
Module 9: vSphere Clusters
•
Cluster resource Percentage: (Default) T his value specifies a percentage of the cluster's
CPU and Memory resources to be reserved as spare capacity to support foilovers.
•
Dcdjcated failover hosts: T his option selects hosts to use for failover actions. If a default
failover host does not have enough resources, failovers can still occur to other hosts in the
cluster.
Module 9: vSphere Clusters689
9-77
Example: Admission Control Using Cluster Resources
Percentage
Example of calculating total faflover capacrty
using cluster resource percentages:
Total cluster capacity:
DDDDD
- CPU: 18GHz
- Memory: 24 GB
Total VM reservations:
- CPU: 7 GHz
- Memory: 6 GB
Current failover CPU capacity is 61%:
((18 GHz - 7 GHz)/18 GHz) = 61%
___
..
,
-'·1
Current ta1lover memory capacity is 75%:
((24 GB - 6 GB)/24 GB) = 75%
.. --·-I
Cluster resource percentage is the default admission control policy. Recalculations occw·
automatically as the cluster's resources change, for example, when a host is added to or removed
from the cluster.
690
Module 9: vSphere Clusters
9-78
Example: Admission Control Using Slots (1)
A slot is calculated by combining the largest
memory rese1Vation and the largest CPU
reservation of any running VM in the cluster.
vSphere HA performs admission control by
calculaling the following values:
Slot size:
- In this example, the slot size is 2 GHz CPU
and 2 GB memory.
Number of slots each host in the cluster can
hold:
- Three
- The cluster has a total of nine slots (3 + 3 +
3).
DODOO
2GHz
1 GB
:Z GHot
1GO
I GHz
2GB
1GH:t
I GB
l GH~
1GB
Module 9: vSphere Clusters691
9-79
Example: Admission Control Using Slots (2)
VSphere HA also calculates the current failover capacity. In this example, the failover capacity is one
host
If the first host fails. six slots remain in the
cluster, which is sufficient for all five of the
pov1ered-on VMs.
If the first and second hosts fail, only three
slots remain, which is insufficient for alt five of
theVMs.
If the current failover capacity is less than the
configured failover capacity, vSphere HA
does not allow any more VMs to power on.
692
Module 9: vSphere Clusters
DODOO
2GH Z
1GO
2GH Z
1G9
1 GHZ
1GH2
1 GHZ
2GO
1GO
1GO
9-80
vSphere HA Settings: Performance Degradation VMs
Tolerate
The Performance degradation VMs tolerate threshold specifies lhe percentage of performance
degradation that the VMs in the cluster are allowed to tolerate during a failure.
Ed it Cluster settings
v1
-·Oj·
x
~• .01
C)
"......... ...., '""'°""""
~--IS
&dl!Msllon C""1!'d
MNrlbNI °"~"om
Ao.w>e~~·
•,....X-'tUMCI..,. vklllll'ft ..ato-e ~ ~t wot'WI• C'*'° ~1114'/'ll'!effdOO'l"'IW
...., ....,," ..'~lw-.....-,toftill'... ..a~•W'~
-
14'1 ,.,....., ~· , _• .,..
°'-"'>e ~ I~ tkJiKl!y Of
- LiJ"'"'
~··-~• I•
I~ ,,_« llt>w>1l9r
0~i·~~I•
l'e<f~•"JC:t:lfg·»-
W'lib
bot"-
< - - 11
·~-
iiilO -
'
,,.~
---
~ 11f Pf"llln'l"•'ICI ~h vYs ot11-. DoAW" fff ~11!'
1•••,.,. ,,,........
""'*""' °'
--.......... '
l'W" . . .,..n.:;e,,. ,_
_ _,, U.;;1...¥11f'ol'll'O!wntWI... ..,-.;.e.,.Vht)
~Wt
100'\
W~<t•l.llhn
Admission control can also be configured to offer warnings when the actual use exceeds the
failover capacity percentage. The resource reduction calculation takes into account a Vivi's
reserved memory and memory overhead.
By setting the Perfor mance degradation V~h to.lerate threshold, you can specify when a
configuration issue should generate a warning or notice. For example:
•
The default value is l 00 percent, which produces no wa111ings.
•
If you reduce the threshold to 0 percent, a warning is generated when cluster use exceeds the
available capacity.
•
If you reduce the threshold to 20 percent, the perfonnance reduction that can be tolerated is
calculated as performance reduction = current use x 20 percent.
Module 9: vSphere C lusters693
When the current use minus the perfonnance reduction exceeds the available capacity, a
configuration notice is issued.
The Performance degradation VMs tolerate threshold is nor available unless vSphere DRS is
enabled.
694
Module 9: vSphere Clusters
9-81
vSphere HA Setting: Default VM Restart Priority
The VM restart priolity determines the order in
which vSphere HA restarts VMs on a running
host.
VMs are put In the Medium 1estart plionty by
default, unless the restart priority is explicitly set
using VM overrides.
Exceptions:
A.gent VMs always start first, and the restart
priority is nonconfigurable.
vSphere Fault Tolerance se<:ondary VMs fail
over before regular VMs. Primary VMs follow
the normal restart priority.
·----
---·-
_ , C>
"I
.. - -
---_____
.... --__
__..
--...- .·----· -- -- --- . -,.,,._
...
,I
[~· ·
...
FflOfltlej:
lO'"-n( (5)
Med.- (dofloo.M)
""'
111~~(1)
COnll!Uon.t
-
A1!$0oul'l:llS oloatte
--~
w
Gi.t:n l'ltal'd)lltu elf\~
~fll)ellol ~l.leaied
Optionally, you can configure a delay when a certain restart condition is met.
Module 9: vSphere Clusters695
9-82
vSphere HA Settings: Advanced Options
You can set advan ced vSphere HA options to customize VSphere HA behavior.
Ocscr1phon
Option
Valu~
Force a cluster not to us.e 1he
default isolation ilddress (default
das usedefaultisolattonadores.s
t a lse
Force a clus1er to pfng artemate
Isolation addresses
das.lsolatonaddressX
IP address or FOON
Force a cluster to wait be>·ond the
default 30-second 1solauon actJon
tdm .1solauon polrcydetaysec
>=30 seconds
Force maximum bound on the
momory stot size
das stotmeminmb
100
Force maximum bound on Ille CPU
slots1ze
das.sk>lcpu1nmhz
32
9otewoy)
wlndO\V
You can set advanced optio ns that affect the behavior of your vSphcrc HA cluster. For more
details, see vSpliere Availability at htl])s: lldocs.vmware.comlenlVMwarevSphere/7 .Olcom. \1Hware. vsphcre.avail.doclGUID -63 F 45987 -8884-48 I 8-8872C975 .lB2E02 I 5 .html.
696
Module 9: vSphere Clusters
9-83
vSphere HA Settings: VM-Level Settings
You can customize the restart priority for individual VMs in a cluster to override the default level set
tor the entire cluster.
- ..
-·--~
_,,.
eo
•=fl-
--·
~
....
_.....
""""-
--
--·---. .-- '!·--
~--
...-- ---- . . . - =·----.._.._.. " -
•
-
.,.._~·--1- :..
Module 9: vSphere Clusters697
9-84
About vSphere HA Orchestrated Restart
Orchestrated restart in '/Sphere HA enables five tiers ror restarting VM and VM-VM dependencies.
Choose rrom among the rouowlng conditions that must be met berore a VM is considered ready:
VM has resources secured.
VM is po!f\•ered on.
VMware Tools heartbeat is detected.
VMware Tools application heartbeat is detected.
VMs can be grouped into tiers indicating their startup priority:
All VMs in the priority 1 tier receive their resources first and are powered on.
After all the VMs in tier 1 have met their defined restart condition, vSphere HA continues to the
VMs in the priority 2 tier. and so on.
After a hosi failure, VMs arc assigned to other hosts with unreserved capacity. with the highest
priority Vtvls placed first. The process continues to those VMs with lower priority until all have
been placed or no more cluster capacity is available to meet the reservations or memory overhead
of the VMs. A host then restai1s the Vtv!s assigned to it in priority order.
If insufficieni resources exist. vSphere HA waits for more unreserved capacity to become
available, for example, because of a host coming back online, and then retries the placement of
these VMs. To reduce the chance of this simation occurring, configure vSphere HA admission
control to reserve more resources for failures. \Vith admission control, you can control ihe amount
of cluster capacity that is reserved by VMs, which is unavailable to meei the reservations and
memory overhead of other VMs if a fai lure occurs.
698
Module 9: vSphere Clusters
9-85
VM Dependencies in Orchestrated Restart (1)
VMs can depend only on other VMs of the same or higher priority. Only direct dependencies are
supported. VM-to-VM dependency is a hard rule. Creating cyclical dependencies causes VM restart
to fail
Cf]
t
Depends On
Depends On
Indirect Dependency
m
t
Module 9: vSphere C lusters699
9-86
VM Dependencies in Orchestrated Restart (2)
In vSphere 6.5 and later, vSphere HA restarts VMs only from a failed host. Configure affinity rules to
keep VMs on the same host if necessary.
VM
0
To play the animation, go to httrs://,•mwarc.bravais.com'siJDg7NJ3DjVli7r6Fi'ltl QO.
700
Module 9: vSphere Clusters
9-87
Network Configuration and Maintenance
Disable host monitoring before
modifying virtual networking
components that invotve the
VMkernel ports configured for
management or vSAN traffic.
This practice prevents unwanted
attempts to fail over VMs.
Ed~t
Ouster Settings
x
IC~'°'
_.. ...... C)
.-. .,.-......_..,.._
....
---
-··..--
,"""-~--~
.... -ti.-.-·-·-
...-->ll•l-•-Plll--loJll:.lJVlll-•"'••-
;..,_
... _............,,..:":]
1-..·--~"" ~-----3
'°"-
The following network maintenance suggestions can help you avoid the false decection of host
failure and network isolacion because of dropped vSphere HA heartbeats:
•
Changing your network hardware or network ing settings can interrupt the heartbeats used by
vSphere HA to detect host failures, and might result in unwanted attempts LO fail over VMs.
\Vhen changing the management or vSAN networks of the hosts in the vSpherc HA-enabled
cluster, s uspend host monitoring and place the host in maintenance mode.
•
Disabling host monitoring is required only when modifying virtual networking c-0mponenrs
and properties that involve the \TM.kernel ports con figured for the Management or vSAN
traffic, which are used by the vSphere HA networking heartbeat service.
•
After you change the networking configuration on ESXi hosts. for example, adding port
groups, removing virtual switches, or suspending host monitoring, you must reconfigure
vSphere HA on all hosts in the cluster. T his reconfiguration causes the network information lo
be reinspected. Then, you must reenable host monitoring.
Module 9: vSphere Clusters701
9-88
Monitoring vSphere HA Cluster Status
You can monitor the status of a vSphere HA cluster on the Summary page of the Monitor tab.
-··--__
O ICM-Compute·01
'
v
;;,,,,......,.
._
·-·........_
--
...·-·-..
-o..c..-............
~--
.......................
---- -- .
--.............__
--- -- ·- ··--·..·"'-.
......or.
- ..1o0
~
.............
_..___
'0
--- a
.,.,._ .......... ~-
0
..,,.,.,_
,
0
. . . . . . ,14
..,.
•
CIM-1•<1..__...
~.... -
c............ -
~-.t.i'toll'
v
......_........_
'0
0
II
..
~~~~ · ~~~~
""'
......
~
You cluster or its hosts can experience configuration issues and other enors that adversely affect
proper vSphere HA operation. You can monitor these errors on the Configuration Issues page.
702
Module 9: vSphere Clusters
9-89
Using vSphere HA with vSphere DRS
vSphere HA os closely Integrated with vSphere DRS.
When a faitover occurs, vSphere HA checks whether resources are available on thal host for lhe
failover.
• If resources are not available, vSphere HA asks vSphere ORS lo accommodate for the VMs where
possible.
vSphere HA might not be able lo fail over VMs for the following reasons:
vSphere HA admission control is disabled. and resources are insufficient in the remaining hosts lo
power on all the failed VMs.
Sul!icient aggregated resources exist, but they are fragmented across hosts. In such cases.
vSphere HA uses vSphere DRS to try to adjust the cluster by migrating VMs to defragment the
resources.
\Vhcn vSphere HA performs failover and restarts VMs on different hosts, its first priority is the
immediate availability of all VMs. After the \1~·1s are restarted, the hosts in wh ich they were
powered on are usual ly heavily loaded, and other hosts are comparatively lightly loaded. vSphere
DRS helps to balance the load across hosts in the cluster.
Module 9: vSphere Clusters703
9-90
Lab 26: Using vSphere HA
Use vSphere HA functionality:
1. Enable vSphere HA in a Cluster
2. View Information About the vSphere HA Cluster
3. Configure Network Management Redundancy
4. Test the vSphere HA Functionality
5. View the vSphere HA Cluster Resource Usage
6. Configure the Percentage of Re1;0urce Degradation to Tolerate
704
Module 9: vSphere Clusters
9-91
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Recognize the requirements for creating and using a VSphere HA cluster
• Configure a vSphere HA cluster
Module 9: vSphere Clusters705
9-92
Lesson 6: Introduction to vSphere Fault Tolerance
Lesson 6: Introduction to vSphere Fault
Tolerance
vmware·
706
Module 9: vSphere Clusters
9-93
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the features and benefits of using vSphere Faull Tolerance
Desclibe how vSphere Fault Tolerance works
Desclibe how vSphere Fault Tolerance works with vSphere HA and vSphere DRS
Enable vSphere Fault Tolerance using the vSphere Client
Module 9: vSphere Clusters707
9-94
About vSphere Fault Tolerance
vSphere Faull Tolerance provides instantaneous fallover and continuous avallabllity:
Zero downtime
Zero data loss
No loss or VM network connectivity
lnst\lntO)nOQu$
I
I
B
Failover
B
Primary Virtual Machine
secondary Vlrtual Machine
Cl~l{PrOd ESX1 HO~ls
Im o ml
1111
0
111
I
You can use vSphcre Fault Tolerance for most mission-critical Vlvfs. vSphcre Fault Tolerance is
built on the ESXi host platfonn.
The protected VM is c.alled the primary VM . The duplicate VM is called the secondary VM. The
secondary V1v1 is created and ruos on a different host 10 the primary VM . The secondary VM 's
execution is identical to that of the primary VM. The secondary Vivi can take over at any point
without interruption and provide fault-tolerant protection.
The ptimary VM and the secondaty VM continuously monitor the status of each other to ensure
that fault tolerance is maintained. A transparent failover occurs if the host running the primary Vivi
fails, in which case the secondary VM is immediately activated to replace the primary VM. A new
secondary VM is created and started, and fault tolerance redundancy is reestablished
automatically. If the host running the secondary VM fai ls, the secondary VM is also immediately
replaced. In either case, users experience no interruption in service and no loss of data.
708
Module 9: vSphere Clusters
9-95
vSphere Fault Tolerance Features
VSphere Fault Tolerance protects mission-critical, high-performance applications regardless of the
operating system used.
VSphere Fault Tolerance:
Supports VMs configured with up to 8 vCPUs and 128 GB memory
Supports up to four lault-tolerant VMs per host with no more than eight vCPUs between them
Supports vSphere vMotion migration for primary and secondary VMs
Creates a secondary copy or all VM files and d isks
ProVJdes fast checkpoint copying to keep primary and secondary VMs synchronized
Supports multiple VM disk formats; thin provision, thick provision lazy-zeroed, and thk;k provision
eager-zeroed
Can be used with vSphere DRS only when Enhanced vMotion Compatibillty is enabled
Supports interoperability with vSAN
You can use vSphcre Fault Tolerance with vSphere DRS only when the Eo.h anccd vMotion
Compatibility feature is enabled.
\Vhen you enable EVC mode on
a cluster, vSpherc
DRS m akes the i nitial placement
recommendations for fault-to lerant Vl\ols, and you can assign a vSphcrc DRS automation level to
primary VMs. The secondary Vl\ol always assumes the same setting as its associated primary VM.
\Vhcn vSphcre Fault Tolerance is used for VMs in a cluster that has EVC mode disabled, the fault-
tolernnt Vlvls are given the disabled vSphere DRS automation level. I n such a cluster, each
primary VM is powered on only on its registered host, and its secondary VM is automatically
placed.
Module 9 : vSphere C lusters709
9-96
vSphere Fault Tolerance with vSphere HA and
vSphere DRS
vSphere HA and vSphere DRS are vSphere Fault Tolerance aware:
vSphere HA:
- Is required for vSphere Fault Tolerance
- Restarts failed VMs
vSphere DRS:
- Selects which hosts run the primary and secondary VM, when a VM is powered on
- Does not automatically migrate fautt-tolerant VMs
Primary
Machine
secondary
New Secondary
Mac,hine
Machine
EJE1
ESXi
I111
0
ESX1
111
I
I111
0
A fault-tolerant VM and its secondary copy are not allowed to nm on the same host. This
restriction ensures that a host failure cannot result in the loss of both VMs.
710
Module 9: vSphere Clusters
9-97
Redundant VMDK Files
vSphere Faull Tolerance creates two complete VMs.
Each Vl'v1 has its o\vn .vmx configuration file and . v:mdk files. Each VM can be on a different
datastore.
Seconda!)'
.vmx file
.vmdk file
.vmdk file
Datastore 1
.vmdk file
.vmdk file
.vmdk file
.vmdk file
Datastore 2
vSphcrc Fault Tolerance provide.s failovcr redundancy by creating two full \/Nl copic.s. The VM
files can be placed on the same datastore. However, VMware place these fi les on separate
datastores to provide recovery from datastore failures.
Module 9: vSphere Clusters711
9-98
vSphere Fault Tolerance Checkpoint
Changes o·n the pnmary VM are not processed on the secondary VM. The memory is updated on the
secondary VM.
ESXo
..
Network
F
ESXi
0
To play the animation, go to httrs://,•mwarc.bravais.com'sla8GAXMVDFHx\'/LstdhM 1G.
712
Module 9: vSphere Clusters
9-99
vSphere Fault Tolerance: Precopy
Using vSphere Fault Tolerance, a second VM is created on the secondary host. The memory of the
source VM is then copied to the secondary host.
Primary VM
S&eondaiy VM
Memory Bitmap
vSphere Fault Tolerance
Logging Network -+--...L..-t++ - - - - - - - - - ' -+ - VM Port GfO\JJ)-+- - - -"++-- - - - - - - - - . . . L . . - -
VM
End use(
0
To play the animation, go to httrs://,•mwarc.bravais.com'slXM l 111rNGU5vPd61 IV n3fv.
Module 9: vSphere C lusters713
9-100
vSphere Fault Tolerance Fast Checkpointing
The vSphere Fault Tolerance c.heckpoint interval is dynamic. It adapts to maximize the workload
performance.
vmxconfl9
D&viees
Dl:Sks
VM
Memory
checl(polnt
VM
VM
•
·
- - ~Sph;.; F;utt T~r;n~; N.;t;~ - - -
Primary H ost
Secondary Host
0
To play the animation, go to httrs://,•mwarc.bravais.c11mis 1Kall<VB.1NsBp Y7hn5bmGs.
vSphcre Fault Tolerance uses an algorithm that provides fast, continuous copying (checkpointing)
of the primary host VM. The primary VM is copied (checkpointed) periodically, and the copies
arc sent to a secondary host. lfthe primary host fails, the VM continues on the secondary host at
the poim of its last network send.
The goal is to take checkpoinis of VMs at least every I0 mill iseconds. The primary VM is
continuously copied (checkpointed), and these copies (checkpoints) are sent to a secondary host.
The initial complete copy (checkpoint) is created using a modified fom1 of vSphcre vMotion
migration to the second:LTy host. The primary VM holds e~ch outgoing network packet until the
foUowing copy (checkpoint) has been sent to the secondary host.
In vSphcrc Fault Tolerance, checkpoint data makes up the last changed pages of memory. T he
source VJ\1 is paused to access th.is memory. T his pause is typically under one second.
714
Module 9: vSphere Cluste rs
9-101
vSphere Fault Tolerance Shared Files
VSphere Fault Tolerance has shared files. The sh ared . vmft file ensures that I.h e primary VM
always retains the same UUID. The • ft-generation file is for the spilt-brain condition.
I
UUID·2
I
VM
Primary Host
Secondary Host
0
To play the animation, go to httrs://,•mware.bravais.com's' 2c9Y6hQ4X4uF\V\V1.STcFk.
The shared . vmft file, which is fo und on a shared datastore, is the vSphere Fault Tolerance
metadata file. This file contains the primary and secondary instance UUIDs and the primary and
secon(tary \ r111x paths.
vSphere Fault Tolerance avoids split-brain situations, which can le'1d to two active copies of a
virtual machine after recovery from a failure. T he . ftgeneration file ensures that only one
VM instance is designated as the primary Viv!.
Module 9: vSphere Clusters7 15
9-102
Enabling vSphere Fault Tolerance on a VM
You ean tum on vSphere Faull
vm
vSoh.ere Chen!
Tolerance for a VM using the
vSphere Client.
II)
Cil
0 ..."'(U4)1Y(ltfflO(il
IJs ICM.O<lUC«llflt
Ci lob~,
OICM~t..m
W·~OlVO.W.Joc;
a
ll l-f~02¥Clim
fj.llrlo~TI
& .Pbotofl·t2
BJ Pl\ol~HW
& W~10o02
Ci w ,").Of
Ci Wnl().06
E'ilA'- -~
.....
•
Guest OS
•
...........
•
•
,
1$
COftti;wrt'
'# ~n ~~ COflSClllp
~ Ml(lf.m
Gu.-.. ex
•
°""'
f:"aul! Tolel.-.ce
""
fl>
......
•
Comoal1c.t..,
""'''<I
Tum on F~11 i~•
,1!
Tfll'\Cililltt
Comootll..,y
E.Q>ofl sv~em
•
l.O!Jt.
1
After you take all the required sieps for enabling vSpherc Fault Tolerance for your cluster, you can
use the feature by turning it on for individual VMs.
Before vSphere Fault Tolerance can be turned on, validation checks arc performed on a V'M.
After these checks are passed, and you mrn on vSphere Fault Tolerance for a VM, new options are
added to the Faull Tolerance section of the VM's context menu. These options include turning off
or disabling vSphcre Faull Tolerance, migrating the secondary VM, testing failover, and 1cs1ing
restart of the sec<mdary Vivi.
\Vben vSpberc Faull Tolerance is turned on, vCenlCr Server resets the Vivi's memory limit 10 1he
default (unlimited memory) and sets the memory reservation to tbe memory size of the VM. WbHe
vSphere Fault Tolerance is turned on, you cannot change the memory reservation, size, lilnit.
number of virtual CPUs, or shares. You also cannot add or remove disks for the VM . When
vSphere Fault Tolerance is turned off, any parameters that were changed are not reverted to their
original values.
716
Module 9: vSphere Clusters
9-103
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe the features and benefits of using vSphere Faull Tolerance
Desclibe how vSphere Fault Tolerance works
Desclibe how vSphere Fault Tolerance works with vSphere HA and vSphere DRS
Enable vSphere Fault Tolerance using the vSphere Client
Module 9: vSphere Clusters717
9-104
Activity: Virtual Beans Clusters (1 )
As a Virtual Beans administrator, you want to place ESXi hosts in a vSphere cluster for a scalable
and highly available infrastructure. Match the goal to the feature that helps achieve the goal.
Goal
,, Add ESXi hosts to the data center and let
vSphere balance the load across the hosts.
o Make business-critical applications 99.99
percent available (downtime per year of 52.56
minutes).
o Identify VMs that are experiencing serious
resource contention.
o Improve the performance of certain VMs by
ensuring that they always run together on the
same host.
71 8
Module 9: vSphere Clusters
vSphere Feature
o vSphere HA
o vri.~ scores
o Cluster Quickstart
o vSphere Fault Tolerance
o VM-Host affinity
9-105
Activity: Virtual Beans Clusters (2)
As a Virtual Beans administrator, you want lo place ESXI hosts In a vSphere cluster for a scalable
and highly aval!able infrastructure. Match the goal to the feature that helps achieve the goal.
Vlnual Beans Goals
vSphere Feature
Add ESXI hos ls to tile dato center aJ1d lel vSp~ere balan<:e lhe
load across the hosts-
vSphe<e DRS
"'1ake business..crtticalappl i~tions 99.99 percent avatlable
{downtime per year of52.56 minutes).
\/Sphere HA or YSphere Fault Tolerance
Identify VMs that are experiencing serious resoutce contention.
VMscores.
Improve the performance of certain VMs by en$unng t~t they
always n;n together on the s"me host
VM-Hosl offmrty
Module 9: vSphere Clusters719
9-106 Key Points
When you create a cluster, you can enable vSphere DRS, vSphere HA, vSAN, and the ability to
manage image updates on all hosts collectively.
vSphere ORS clusters provide automated resource management to ensure that a VM's resource
requirements are satisfied.
vSphere DRS works best when the VMs meet vSphere vMotion migration requirements.
vSphere HA restarts VMs on the remaining hosts in the cluster.
You implement redundant heartbeat networks either with NIC teaming or by creating additional
heartbeat networks.
vSphere Fault Tolerance provides zero downtime for applications that must always be available.
Questions?
720
Module 9: vSphere Clusters
Module 10
vSphere Lifecycle Management
Module 10: vSphere Lifecycle
Management
Module 10: vSphere Lifecycle Management 721
10-2
Importance
Managing the life cycle of vSphere involves keeping vCenter Server and ESXi hosts up to date and
integrated with other VMware and third-party solutions. To achieve these goals, you must understand
how to use the new features provided by vSphere Lifecycle Manager, namely, cluster.level
management of ESXi hosts and the vCenter Seiver Update Planner.
722
Module 10: vSphere Lifecycle Management
10-3
Module Lessons
1. vcenter Server Update Planner
2. Overview of vSphere life<:ycle Manager
3. Working with Baselines
4. Working with Cluster Images
s. Managing the Lne Cycle of VMware Tools and VM Hardware
Module 10: vSphere Lifecycle Management 723
10-4
Virtual Beans: Lifecycle Management
Virtual Beans is struggling with its current lifecycle management process. The process is mosUy
manual and is error-prone and inefficient.
The company wants lo use vSphere Ufe<:ycle Manager. It hopes that this feature can provide a
centralized, automated patch and version management system for keeping vSphere components up
10 date:
vCenter Seiver
ESXi hosts
Virtual machines:
- VM hard\11are
- VMware Tools
As the vSphere administrator. you must implement vSphere Lifecycle Manager in the Virtual Beans
data center.
724
Module 10: vSphere Lifecycle Management
10-5
Lesson 1: vCenter Server Update Planner
Lesson 1: vCenter Server Update Planner
vmware·
Module 10: vSphere Lifecycle Management 725
10-6
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe features of the vCenter Se1Ver Update Planner
Run .Center SeNer upgrade prechecks and interoperability reports
Export prechecks and interoperability report results
726
Module 10: vSphere Lifecycle Management
10-7
Overview of vCenter Server Update Planner
In vSphere 7, you can use the Update Planner feature for planning updates to VCenter Server and
other VMware products that are registered with it.
The Update Planner can perform the following tasks:
Retrieve information about VMware products registered with vCenter Server.
List available VCenter Server updates and upgrades,
Create interoperability reports.
Perform a precheck to verify that your system meets the minimum software and hard\vare
requirements for a successful upgrade of vCenter Server.
Module 10: vSphere Lifecycle Management 727
10-8
Update Planner Requirements
The Update Planner feature is
available for vCenter Server 7 .0
or later.
You must join the VMware
Customer Experience
Improvement Program (CEIP) to
generate an interoperability or
precheck repcrt.
-.
(} $b·VCstl·02.VCl&SS.IOC41
.
•< "'11•
..
_ ...., . . . ... ..
.........
........,...,,.
T_
_
._
.,.
-.c...,_"""""'0""1'!1
"""'-T _..__.,,..
..
_
......... _.•·,..... ,.._
,............
..e· .... -.i ...- . -
"°"
...w.._,_.,.......,~r-•vom,,••
•-,.ivw-•~("•­
r-•••
•=•~·"•,..
\-
......
~-
'... ...
°"""' ...
~
,,
. .....
-.-........._
·-··
~
. . .""°"". ,
.....---~
....,...(.011..1 ......... ~~...-
~-~~·Me
w..-
,..cioer...
....
l.ae!·-....... a:IP
&iOttQt' .,,.
c.n·---
,)f.,
_
~
·-
c
\Vhcn generating reports, if the Customer Experience Improvement Program (CEIP) is not yet
accepted, a prompt de.scribing CEIP appears. Reports are not generated if you do not join CEIP.
728
Module 10: vSphere Lifecycle Management
10-9
Update Planner View in the vSphere Client
When a ne\V vCenter Server version is avail.able, the ne-.v version appears on the Updates tab of the
vSphere Client.
• •
-""'--··--·-
-
~-
-- . -
·~
.-
-
-
.
--
·-
.
...-.c.. ..._
......
,_
~
-· . -- ·--
\Vhen new vCentcr Server updates arc released, the vSphere Client shows a notification in the
Summary tab. Clicking the notification directs you to the Updates tab.
The Updates tab has an Update Planner page. This page shows a list of vCcnter Server versions
that you can select.
Detai ls include release date, version. build, and other informacion about each vCenter Server
version available.
The Type column tells you if the release item is an update. an upgrade, or a pacch.
If multiple versions appear, the recommended version is preselected.
After selecting a vCenter Server version from the list, you can generate product interoperability
reports and preupdace reports.
Module 10: vSphere Lifecycle Management 729
10-10
Interoperability View in vSphere Client
The Interoperability page on the Moni tor lab sho\vs VM\Yare products that are currently registered
with vCenter Server and their compatibility with the current version of vCenter Server.
--.. __ .
--- ----)
--,..
)
""''""-
...
""'"'
--
_, ...
;~ --~
~....--~-­
..... , -.. p-IS
_..._..1~
...
.....
~--·.,._........,
_ _ ,...,• .,""'
te
--
c
-
ln the vSphere Client, the Interoperability page appears on the ~<fonitor tab of vCenter Server.
Tltis page displays VMware products currently registered with vCenter Server.
Columns show the name, current version, compatible version, and release notes of each detected
product.
If you do not see your registered VMware products, you can manually modi fy the list and add the
appropriate names and versions.
730
Module 10: vSphere Lifecycle Management
10-11
Exporting Report Results
You can export report results 1n CSV formal and use the report as a guide to prepare for an update.
Both product interoperability and precheck reports can be exported.
ProelJct lnte1ope1abll1ty
~
I •oo "'o°""' I lll•M• I
0
0
---·
---·"'
...
"
·-...
-· ••••
'-"·-
~·~·!iOll
·~Of'(,~Of
<!) l:.SlUUJ
0
0
c
ESlll t.»
N$Xlo<Y~f
ca · -,,_l)Qoi.
~ sw~-..~~
--·-.........Oil.
<...1t1on~
~
"
••
••
••
V •
....
...
u•
M:ll-<l'!Jltl•-
'l
l
Module 10: vSphere Lifecycle Management 731
10-12
Managing the vCenter Server Life Cycle
To manage the life cycle of vCenter Server, use the vCenter Server Management Interface (VAMI) to
update and patch, and use the vCenter Server installer to upgrade.
-·
__
....... _._
-- ·- ---·---·-- -- .::
,.... ~r.o~
-- --
732
?O».~>.. -
..::.:.!!:.]
·-
-- -•
Module 10: vSphere Lifecycle Management
io
1'
--- -·-
w
..,,.
~···
10-13
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe features of the vCenter Se1Ver Update Planner
Run .Center SeNer upgrade prechecks and interoperability reports
Export prechecks and interoperability report results
Module 10: vSphere Lifecycle Management 733
10-14
Lesson 2: Overview of vSphere Lifecycle Manager
Lesson 2: Overview of vSphere Lifecycle
Manager
vmware·
734
Module 10: vSphere Lifecycle Management
10-15
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize features of vSphere lifecycle Manager
Distinguish between managing hosts using baselines and managing hosts using images
Change the patch download source
Module 10: vSphere lifecycle Management 735
10-16
Introduction to vSphere Lifecycle Manager
vSphere Lifecycle Manager centralizes automated patch and
version management for clusters, ESXi, drivers and firm\vare,
VM hardware, and VMware Tools.
vSphere Lifecycle Manager features include:
Upgrading and patching ESXi hosts
Installing and updating third-pa11y software on ESXi hosts
Standardizing Images across hosts In a cluster
Installing and updating ESX1drivers and firmware
Managing VMware Tools and VM hardware upgrades
Q.__
• " ''
$Nlr1a.A.\
0
""'"_...Cl.At.,..
;.i
~.rd,...,_
• •J
.....
Q
SU.IOI!
•
I
•
•..rt
c.
a
l>b-"'"''
'°" Woiioo.d ~ I!<'«
• "' •
l;ortf"'I
!$') (iiOfMI ~IO'Y ...,,
,,,._
W,tir!O Ool.llJ Somltet
....._..,_
0 Atll!lf'J~I •llOll
c ....
.,. ......
"'Tm&:c;ien1A1~::w.-
Module 10: vSphere Lifecycte Management
•
2:~
IA Pok-.. ..a P<u-.:
0 .Aulo Dtt*"t
736
' •
•
•
• Ml
• ... • •
10-17
Baselines and Images
vSphere Lifecycle Manager supports two methods for updating and upgrading ESXi hosts.
Only one method 1s supported al a time.
If you switch from managing using baselines to managing using images, you cannot switch back.
IAan.agtng Using Baselines
r.tanag1ng Using Images
Compares esx; hosts ag9lnst an ESXi mator version,
Compares ESXI hosts against a customized Image that
group of patches. or set of extensions
Includes a baise ESXi image, one or more itdd·oo
componftnts, ooe or mme vendor add.on components,
firmware and dnVets
Supports all versions or ESXi from 6.5 and later.
SUpports ESXi verslOn 7 .0 and later
Basehnesattach to 1ndrt1doal ESXi !}()Sf.$
Hosls "'a cluster are managed coUecbvely, wdh one
ESX1 ho~ Image pet clust~r
ES.Xi upgrades through ISO lmage.s
ESX1 upgrades through image depots {ZIP files)
ESX1 updates or patches are bundled into baselines
ESXJ updates or patches are bulldled and d1stnbuted
as new ESXi version5
Module 10: vSphere Lifecycle Management 737
10-18
vSphere Lifecycle Manager Home View
In the vSphere Life<:ycle Manager home view.
you configure and administer the vSphere
Lilecycle Manager instance that runs on your
vCenter SeNer system.
From the drop-down menu at the top of the
Lifecycle Manager pane. you can select the
vCenter Server system that you want to
manage.
To access the vSphere Lile<:ycle Manager home
view in the vSphere. Client, select Menu >
Lifecycle Manager.
-
,._,
•..
-· ...
·-·--.
........ - - _
...
·-·-·-- ... _ - -·
·-,. ___
·--- ·-
l'-r, . .. . ..,'"lf"'
-
· -
........
...
----
·~­
.·--
_.. ______
---- ----
--· You do not require special privileges to access the vSphcrc Lifecyc lc 1vlanagcr home view.
In the Lifecyclc Manager pane, you can access the following tabs: I mage De1101, Updates,
Imported ISOs, Baseli nes, and Settings.
738
Module 10: vSphere Lifecycle Management
•
10-19
Patch Settings
By default, vSphere Lifecy<:te Manager is configured to download patch metadata automatically from
the VMware repository.
Select Settings > Patch Setup to change the patch download source or add a U RL to configure a
custom download source.
........
...
----
. ,....
- --
-_____
-- ·-·-· -- - -- ·-_ -...
.
-·
.....,..._,..., ...,
____ -
_
..
.,.
,,_
..
·-
.,
-
V-·--WV"-... tVI•
·--...
Module 10: vSphere Lifecycle Management 739
10-20
vSphere Lifecycle Manager Integration with vSphere
DRS
When performing remediation operations on a cluster that is enabled with vSphere DRS, vSphere
LJfe<:ycle Manager automatically integrates with vSphere DRS:
WhenvSphere Lifecycle Manager places hosts into maintenance mode, vSphere ORS evacuates
each host before the host is patched.
When vSphere Life<:ycle Manager attempts to place a host into maintenance mode. certain
pre<:hecks are performed to ensure that the ESXi host can enter maintenance mode.
The vSphere Client reports any configuration issues that might prevent an ESXi host from entering
maintenance mode.
740
Module 10: vSphere Lifecycle Management
10-21
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Recognize features of vSphere lifecycle Manager
Distinguish between managing hosts using baselines and managing hosts using images
Change the patch download source
Module 10: vSphere lifecycle Management 741
10-22
Lesson 3: Working with Baselines
Lesson 3: Working with Baselines
vmware·
742
Module 10: vSphere Lifecycle Management
10-23
Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify types of baselines and baseline groups
Recognize how to create baselines
Describe how to update hosts using baselines
Module 10: vSphere Lifecycle Management 743
10-24
Baselines and Baseline Groups
A baseline Includes one or more
patches, extensions, or
upgrades.
vSphere Lifecycle Manager
includes the follo\ving dynamic
baselines by default:
Clitical Host Patches
• Non-Critical Host Patches
• Host Security Patches
A baseline group includes
multiple baselines.
Baseline groups can 0-0ntain one
upgrade baseline and one or
more patch and extension
baselines.
744
Ot1li0~
-
-
·
•
·-
• II•-
>
---
-·
-··
-·- __
-- - -·--·--- - ._ __ ,,
Module 10: vSphere Lifecycle Management
-----·
----·-- -
.. ...
...,,,
10-25
Creating and Editing Patch or Extension Baselines
Using the New Baseline wizard, you can create baselines to meet the needs of your deployment
Fixed patch baseline: Set of patches that do not change as patch availability changes.
Dynamic patch baseline: Set of patches that meet certain critena
Host extension baseline: Contains additional software for ESXi hosts. This addttional software
might be VMware or third-party software.
When you create a patch or extension baseline, you can filler the patches and extensions available in
the vSphere Lifecycle Manager repository to find specific patches and extensions lo include in the
baseline.
Module 10: vSphere Lifecycle Management 745
10-26
Creating a Baseline
To create a baseline, select Lifecycle Manager from the Menu drop-down menu. Click NEW >
Baseline.
o--~
;21.....__,_,
c.--
L lecycle M¥1a9er
.__--~­
Bc:or-•1.••-
•
JIC:W •
._,~.._
be'''~
,,ca......--.
~~Orouo
· ~ c:-
- - -..... .-!lo-·-..._
I~...
•P.OW'9to<J•
(>1,,_.-10to~,..............I
. ..a.e .....
......"' '*"' ""-
'
•
-
~-;""'""''"""CJ''~
.-....cu.1. u.c.-........or
-
- ·-"~
.. ........ __.
746
Module 10: vSphere Lifecycle Management
1 1 . . -...
•
,_
,.....
•>o too •<:o
,,(l..!)0
•'o.•i>o
'o·
·-,_._.,..,..,.
,_,_
11 ......... _
•
10-27
Creating a Baseline: Name and Description
Provide the name, a description,
the content of the basehne, and
the ESXi version that this
baseline applies to.
---- -·------·-.~
--
-
---
__
.... _.. .. .._
·-·--;;. ................
~-""'
I,.,.
~
Module 10: vSphere Lifecycle Management 747
10-28
Creating a Baseline: Select Patches Automatically
To create a dynamic baseline, set the cnteria for adding patches to the baseline and select the check
box for automatic updating of the baseline.
-·--
-. . ... --..-··--·
...(..,----_.,, ____
-_,,_. -----.......
..
,................
,_
........
,
,.._,
-·-·-·--
-·
__ __ ........
I
- 11-.-,.,
. .•,__.,,_.- - · - - ·
, ,..
.... _,,,......
.......
...
I
f
•
•
•
..
•
T
~
•• •
..
It
•
·~
_
A dynamic baseline is a set of patches that meet certain criteria. The content of a dynamic baseline
changes as the available patches change. You can manually exclude or add specific patches to the
baseline.
748
Module 10: vSphere Lifecycle Management
10-29
Creating a Baseline: Select Patches Manually
To create a fixed basel1ne, select the patches that you want to include in the baseline.
You m ust also disable lhe automatic updates by deselecting lhe check box on the Selecl Patches
Automatically page.
__
___ ... ..__
_. ,
1---·---
-
---- -- -----· --·--·
•
--- ---- ----
-·
--
-· A fixed baseline is a set of patches 1hat docs not change as patch availability c hanges.
Module 10: vSpher e Lifecycle Manag ement 749
10-30
Updating Your Host or Cluster with Baselines
Managing the life cycle of a standalone host or
cluster of hosts is a rive-step process:
1. Select your host or cluster and select the
Updates lab.
...... ,,.,...
-
---
·---
--
The Baselines windov1 is the default vie\v.
2. Attach one or more baselines.
3. Check compliance of your host or cluster v1ith
the attached baselines.
4. Perform a precheck before remediating.
5. Remediate the host or cluster.
Optionally, stage your patches to copy them
to hosts for remediation later.
750
Module 10: vSphere Lifecycle Management
-·-
•
·--•
•
.
-
10-31
Remediation Precheck
•
The Remediation Pre-check In
vSphere Lifecycle Manager
helps to verify that your
remediation is successful.
..
vSphere Lifecycle Manager
notifies you about any actions
that it takes before the
remediation and recommends
actions for your attention.
--
-· -- ·- ..·- -
·-
)~"'i..1.., . - -.....(~lltrlMmd ...· - d l
liiiifii I ifl~
.
---··--
---
--•
•
. .. ~ ·I m
Module 10: vSphere Lifecycle Management 751
10-32
Remediating Hosts
During the remediating process, the upgrades, updates, and patches from the compliance check are
applied to your hosts:
You can perform the remediation immediately or schedule It for a later date.
Host remediation runs in different ways, depending on the types of baselines that you attach and
whether the host is in a cluster.
For ESXi hosts in a cluster, the pr0<:ess is sequential by default.
The remediation of hosts m a cluster temporarily disables cluster features such as vSphere HA
admission control,
752
Module 10: vSphere Lifecycle Management
10-33
Review of Learner Objectives
After completing this lesson, you should be able to meet the following objectives:
Identify types of baselines and baseline groups
Recognize how to create baselines
Describe how to update hosts using baselines
Module 10: vSphere Lifecycle Management 753
10-34
Lesson 4: Working with Images
Lesson 4: Working with Images
vmware·
754
Module 10: vSphere Lifecycle Management
10-35
Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe ESXi images
Import ESXi updates into the vSphere Client
Enable vSphere Lifecycle Manager in a cluster
Define a cluster image using vSphere L~ecycle Manager
Validate ESXi host compliance against a cluster image
Update ESXi hosts using vSphere Lifecycle Manager
Apply a recommended image to the hosts in a cluster
Module 10: vSphere Lifecycle Management 755
10-36
Elements of ESXi Images
Managing clusters wilh images helps to standardize lhe
software running on your ESXi hosts.
An ESXi Image consists of several elements:
ESXi base image: An update that provides software fixes and
enhancements
Components:A logical grouping of one or more VIBs
(vSphere Installation Bundles) that encapsulates a
functionality in ESXi
Vendor add-ons: Sets of components that OEMs bundle
together with an ESXi base image
Firm\vare and Drivers Add ~On: Firmware and driver bundles
Firmware and Drivers
Add-On
ComPQnents
that you can define for your c·luster image
To maintain consistency, you apply a single ESXi image to atl
hosts in a cluster.
Base Image
(ESXI Version)
ESXi Image
The ESXi base image is a complete ESXi installation package and is enougb to start an ESXi host.
Only VMware creates and releases ESXi base images.
The ESXi base image is a grouping of components. You must select at least the base image or
vSphere version when creating a cluster image.
Starting with vSphere 7. the component is the smallest unit that is used by vSphere Lifecycle
N!anager to install VNlware and third-party sotlware on ESXi hosts. Components are the basic
packaging for VIBs and metadata. The metadata provides the name and version of the component.
On installation, a component provides you with a visible feature. For example, vSphere HA is
provided as a component. Components are optional elements to add to a cluster image.
Vendor add-ons are custom OEM images. Eacb add-on is a collection of components customized
for a family of servers. OEMs can add, update, or remove components from a base image to create
an add-on. Selecting an add-on is optional.
756
Module 10: vSphere Lifecycle Management
The firmware and drivers add-on is a vendor-provided add-on. ft contains the components that
encapsulate fimnvare and driver update packages for a specific server type. To add a firmware and
drivers add-on to your image, you must first instal l the Hardware Support /vlanager plug-in for tl1e
respective family of servers.
Module 10: vSphere Lifecycle Management 757
10-37
Image Depots
The landing page ror the
vSphere Lifecycle Manager
home view is the Image Depot
tab.
In lhe Image Depot tab, you can
view details about downloaded
ESXi elements:
• ESXi versions
Vendor add-ons
Components
-- -
··-
--0 ""
-...
........
~
·----··-
,_
•o~
--
t
""
wo-10..,._ .....___.~
--....-..-......___
"""t-11
•""'°"'' _"'._..,,...,.
ot a-11< · -. ., r..-~
,..,.....,_
---f'O;.--·-·---...
------~--
"'
---.-~ •.,, . _ , _ _
Q:4M~
..
- .
_ _,.,._..,.,,,_
·--••-o•.-
_ _ _, _ . _ . , _ ... I'<
P•m•-
~---o-.c-..,._
__
<
...
- ......,_,_.,.._
·----------·-
··-
····~-
\Vhen you select a downloaded fi le, the details appear to the right:
•
\Vhen you select an ESX i version, the de~1ils include the version name, build number,
category, and description, and the list of componcnis that make up the base image.
•
\Vhen you select a vendor add-on, the details include the add-on name, version, vendor name,
release date, category, and the list of added or removed componenis.
•
\Vhen you select a com1xment, t.he details include the component name, version, publisher,
release date, category, severity, and contents (V IBs).
758
Module 10: vSphere Lifecycle Management
10-38
Importing Updates
To use ESXi updates from a
configured online depot, select
Sync Updates from the Actions
drop-down menu in the Lifecycle
Manager pane.
You can also use ESXi updates
from an omine bundle:
• From the Actions drop-down
menu, select Import Updates.
Enter a URL or browse for a
ZIP file lhat contains an ESXl
image.
-..-
·-
... -~
-
-
---
- _____
_ ___ _
---·i.,..., ........
,,
,,
.. ..,_
-
•
.... -· · - ............._ .._ .••___,......._r.o..,.
~"=-=··'-'-=-------"'" l - ... I
........
-
Module 10: vSphere Lifecycle Management 759
10-39
Using Images to Perform ESXi Host Life Cycle
Operations
After all ESXi hosts in a cluster are upgraded to
vSphere 7, you can convert their lifecycle
---·----·-....--···---1
-__
--...-_. ·-··-·-·--- -. -·--··----.. -··--.
- --
·-
management from baselines to Images.
You set up a single image and apply it to all
hosts in a cluster. This step ensures cluster-
wide host image homogeneity.
To set up a cluster image, the following
requirements apply:
All ESXi hosts must be version 7 or later.
All ESXI hosts must be statefully installed.
Ideally, all physical hosts should be from lhe
same vendor.
..
_
·-··--··
- ____
___
....._.
·------·.._
------·
____.....____
.. ..__
___.........
.. _,._,,_
-- .....
Manage \'11th a single image
..
.,
760
Module 10: vSphere Lifecycle Management
,
10-40
Creating an ESXi Image for a New Cluster
When creating a cluster, you can create a
corresponding cluster image:
New Cluster
·-·
1. Create a cluster.
2. Select the Manage image setup and
updates on all hosts collectively check
box.
3. Define the ESXi version for your cluster
image.
.,._
icM~•
Ill
x
--~·f9f'
a>
~ere flllS
~
Ci)
~C'W,...,
~
·~·
~
4. (Optional) Select vendor add-0ns for the host.
Only add-ons that are compatible with the
selected vSphere version appear in the dropdown menu.
-
7 0 G4 1S&Uk>7
After your cluster is created, add ESXi hosts to it.
The Create New Cluster wizard introduces a switch for enabling vSphcrc Lifccyclc Manager and
selecting clen1c11ts for tl1e desired cluster i1,-1age.
You can fhrther customize the image in the cluster update settings.
M odule 10: vSphere Lifecycle Management 761
10-41
Checking Image Compliance
After you define a valid image, you can perform a compliance check to compare that image with the
Image that runs on the ESXi hosts in your cluster.
You can check the image compliance at the
level of various vCenter Server objects:
At the host level for a specific ESXi host
At the cluster level for all ESXi hosts in the
•
...
•l-••w - - · · - -
..... .... ......
-
... "'"
-_..
cluster
...... ""'d _ _ ,,........
-
.....~ ... "" .........
---..-..... · ·--- --·
~,.
,....
·-
......
.,,_
-_,...
~"""
---
At the data c-enter level for all clusters and
.
hosts in the data center
At the \/Center Server level for all data
centers, clusters, and ESXi hosts in the
vCenter Server inventol)'.
·-·
The status of a host can l>e unknown, compliant, out of compliance, or not compatible with the
11nage.
•
A host status is unknown before you check compliance.
•
A compliant host. is one that. has the same ESXi image defined for the cluster and with no
standalone Vll3s or differing components.
•
If the host is out of compliance, a message about the impact of remediation appears. Ln the
example, the host must be rebooted as part of the remediation. Another impact that 1night be
reported is the requi.rcment that the host enters maintenance mode.
•
A host is not compatible if it. runs an image version that is later than the desired cluster image
version, or if the host does not meet the installation requirements for the vSphere build.
762
Module 10: vSphere Lifecycle Management
10-42
Running a Remediation Precheck
To ensure that the cluster's health is good and that no problems occur dunng the remediation process
of your ESXi hosts, you can perform a remediation precheck.
...
The procedure for a remediation precheck is as
follows:
In the vSphere Client, click Hosts and
.._
...........
_. ___ '1':.1.0I-- --·-o-.r.-•
Clusters and select a cluster that is managed
by an image .
In the Updates tab, click Image.
In the Image Compliance pane, run a
remediation precheck.
Module 10: vSphere Lifecycle Management 763
10-43
Hardware Compatibility
The hardware compatibility
chec·k verifies the underlying
hardware of the ESXi host in the
cluster against the vSAN
Hardware Compatibility List
(HCL).
--__
.......
V
M.
"'
C."'
,_
~
c.c.tc....... ..
c>........
,._,..,~ -~~
~-··a..·
~&Otltllty
...........".., ....,..._.,.
x
cr«k ,et1.oltt
~ .. ~C.~~l'Nfll~C..-
l
11::0..."•• - - 0 U I
Hardware compatibility is checked only for vSAN storage controllers and not with the full
VMware Compatibility Guide.
764
Module 10: vSphere Lifecycle Management
10-44
Standalone VIBs
When you convert a cluster to use vSphere Ufecycle Manager, ESXi hosts are scanned.
During this scan, any VIB that is not part of an identified component is identified as standalone, and a
warning appears.
Before updating ESXi hosts, you can Import or ignore standalone VIBs:
Import a component that contains the VIB and add it to the cluster image.
• Ignore the \Varning and let the update process remove the VIB from the host.
Convert to an Image
Hosu
Bolottk»?.
!m;,ge
VMware I ools.
VM
"4roware
&
Iden! Jed st.lndalor.e-y1b vmwar~fdm 7.0 O-l!K)543J2 on the foOcw.mg host(sr sa~x1
03 VC16$> !e«I
Review the compliance details ar-d en'SUfe r.o '"amng about if\ls Vlb ~prKent- If present,
import tti~ <:Ompooe-nt ((lC'ltt1n1n(I
x
th& Ql'I$\ \•1b l)nd tdd •t to !ht lmfQe
A warning abou1a standalone VTB docs not block the process of converting the cluster to use
vSphere Lifecycle lvlanager. If you continue to update ESXi, the Vl.B is uninstalled from the host
as part of the process.
You cannot include standalone V!Bs in a cluster image.
Module 10: vSphere Lifecycle Management 765
10-45
Remediating a Cluster Against an Image
When you remediate a cluster that you manage
with an image, vSphere Llfecycle Manager
applies the following elements to the ESXi
hosts:
ESXi image version
Optional: vendor addon
Optional: firmware and driver addons
Optional: user specified components
Remediation makes the selected hosts
compliant with the desired image.
You can remediate a single ESXi host or an
entire cluster. or simply pre-check hosls witllout
updating them.
J
•1-•weo _ _ _ .._
x
__ __
.. .. .. o--. ,,...............
.:A ..,_ . _...._ ......_ __ __
,._...,
- --·-- -__
----. ..,..,.. -
••Cot> _...,,
...
The Review Remediation Impact dialog box shows the impact summary, applicable remediation
settings, End User License Agreement, and impact on specific hosts.
vSphere Lifecyclc Manager pcrfom1s a prccheck on every remediation call. \'/hen the prccheck is
complete, vSphere Lifecycle Manager applies tbe h1test saved cluster image to the hosts.
During each step of a remediation process, vSphere Lifecycle Manager determines the readiness of
the host 10 enter or exit maintenance mode or be rebooted.
You can also click RUN PRE-CHECK to precheck hosts without updating them.
766
Module 10: vSphere Lifecycle Management
10-46
Reviewing Remediation Impact
The Review Remediation Impact dialog box
Includes the following information:
Impact summary
--_..__
Applicable remediation settings
When the precheck is complete, vSphere
Lttecycle Manager applies the latest saved
clus1er image to the hosts.
---------------_.....-··-·-...
End User License Agreement
Impact 10 specific hosts
vSphere Lifecycle Manager performs a
precheck before each remediation.
__
_
-
..
-·--·-·---·-------·-·---
·-·--
Module 10: vSphere Lifecycle Management 767
10-47
Recommended Images
Using vSphere Lifecycle Manager, you can check for recommended images for a cluster that you
manage with an image.
vSphere Lifecycle Manager checks for compatibility across the image components. This process
ensures that the recommended image fulfills all software dependencies.
To check for recommended images:
1. In the Updates tab, select Image in the navigation pane.
2. Click the ellipses menu next to EDIT and select Check for recommended images.
•
--·
_ ·--.............
,.................
"""'................
,,.~
......
···-··~
,.111 .........
·-
.....
. . . . . . . . 0 .............
1..-
'"
.,,,,. ?
~.,,,.r
0
..........
-
-··
J
•
__,
n...... ... -
....."".
I
.., ..
·-
_ ... ...,.....,.,.,.."-~"·-"""''"''..-r..-,,,."""'"'"'
You check for image recommendations on demand and per cluster. You can check for
recommendations for different clusters at the same time. \I/hen rec.o mmendation checks run
concurrently with other checks. with compatibility scans, and with remediation operations, the
checks are queued to run one at a time.
If you have never checked recommendations for the cluster. the View recommended images
option is dimmed .
After you select Check for recommended images, the results for that cluster are generated.
The Checking for recommended images task is visible to all user sessions and cannot be canceled.
\I/hen the check completes, you can select View recommended images.
768
Module 10: vSphere Lifecycle Management
10-48
Viewing Recommended Images
To view recommended images for a cluster:
1. Click the Updates tab for the cluster.
2. Select Act.ions under Cluster Image.
3. Select View r&commended images.
4. Select an image and click CONTINUE.
vSphere shows the recommended images for
clusters in the following categories:
Latest release within the current series
• Latest major release
- ....
-·
~
--·-·______
.....___
- -·.-.------·--
..._
...
-------·---_____
_
-·
...----·....
-- --· __
----- --
.. --
-
....
I .....
\Vhen you view recommended images, vSphere shows the following types of images:
•
CURR.ENT fMAGE: The image specification that is being used to manage the cluster.
•
LATEST IN CURRENT SERJES: If available, a later version within the same release series
appears. For example. if the cluster is running vSphere 7.0 and vSphere 7. I is released, an
image based on vSphcrc 7.1 appears.
•
LATEST AND GREATEST: If available, a later version in a later major release. For
example, if the cluster is running vSphere 7.0 or 7.1 and vSphere 8.0 is released, an image
based on vSpbere 8.0 appears.
Module 10: vSphere Lifecycle Management 769
vSphere might show one or more recommendations:
•
If the latest release within the current series is the same as the latest major version released,
only one recommendation appears.
•
If the two releases are different, two recom.meudations appear.
•
lf the Cltrrent in1age is the sa1ne as tl1e ll1test release, no rec-0n11nendations appenr.
770
Module 10: vSphere Lifecycle Management
10-49
Selecting a Recommended Image
You can select a recommended image and then validate and save ~ as the desired cluster image.
..,, ....... .. n -
!,
QI
·•••
fl
II<
.
--_
... _. ___
_ ---- =
-....
-·-·
--- ·-- -.
-- -..
--· ..
D N.... 0..U.-
(~
.,.._ •
rm.ge
••
--
••
•
•
~
-You can use a recommended image as a starting point to customize the cluster image. When you
select a reconunended image, the Edit Image workflow appears.
You can perfonn these act ions:
•
Add or remove image components.
•
Validate and save the image.
•
Scan the cluster for compatibility.
•
Remediate the cluster.
Module 10: vSphere Lifecycle Management 771
10-50
Customizing Cluster Images
.........
"""
-..·---·· ------fl
....-.
.--..
adding, or removing components, such as the
ESXi image version, vendor add-ons, firmware
and driver add-ons, and other components.
Ensures completeness of the image
Verifies that the image has no missing
component dependencies
• Confirms that components do not conflJct with
one another
••W ·--
..,
....
_
...
_,
__
_
,....,..._
..______
-
O ~r
.. •
_ _
---·-
<;.ott_ _ _
Module 10: vSphere Lifecycle Management
.....
......
·--·-·-·
-
772
,
____
--.,..__
Before saving the image specification, you can
validate it:
-
--·-·,
..
-__
.._______ .....r-...
- ,,,_
After you start managing a cluster with an
image, you can edit the image by changing,
·--·-·
_
....
...._._
...----·--
........ (!=..,
-
10-51
Lab 27: Using vSphere Lifecycle Manager
Update ESXi hosts using vSphere Lifecycle Manager:
1. Import Update Files to the Image Depot
2. Create a Cluster with vSphere Lifecycle Manager Enabled
3. Add ESXi Hosts to the Cluster
4. Update ESXi Hosts Using the Cluster Image
Module 10: vSphere Lifecycle Management 773
10-52
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objectives:
Desclibe ESXi images
Import ESXi updates into the vSphere Client
Enable vSphere Lifecycle Manager in a cluster
Define a cluster image using vSphere L~ecycle Manager
Validale ESXi host compliance against a cluster image
Update ESXi hosts using vSphere Lifecycle Manager
Apply a recommended image to the hosts in a cluster
774
Module 10: vSphere Lifecycle Management
10-53
Lesson 5: Managing the Life Cycle of VMware Tools
and VM Hardware
Lesson 5: Managing the Life Cycle of
VMware Tools and VM Hardware
vmware-
Module 10: vSphere Lifecycle Management 775
10-54
Learner Objectives
After compleUng this lesson, you should be able to meet the following objective:
• Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware
776
Module 10: vSphere Lifecycle Management
10-55
Keeping VMware Tools Up To Date
With each release of ESXi, VMware provides a new release of VMware Tools.
New releases include:
Bug fixes
Security patches
New driver support for ESXi enhancements
Performance enhancements for virtual devices
Keeping VMware Tools up to date is an important part of ongoing data center maintenance.
Module 10: vSphere Lifecycle Management 777
10-56
Upgrading VMware Tools ( 1)
From a host or ctuste(s Updates tab, select
VMware Tools to manage the hfe cycle of
VMware Tools.
Step 1: Check the status of VMware Tools
running in your VMs. AVM has one of the
following status values:
--
Upgrade Available
Guest Managed
Not Installed
,.,» _ __,...,_
...,...,....
--- .. ·-- -•
.
--· -•
•...
........
--- --- ··-... ...
-- -- ··-·
--· - --•
•
•
Unknown
•
••
Up to Date
,
•
•
A Vl\11 has one ofrhe following VMware Tools stams values:
•
Upgrade Available: You can upgrade VMware Tools to match the current version available
for your ESXi hosts.
•
Guest Managed: Your VM is running the Linux OpenVMTools package. Use native Linux
package management tools to upgrade VMware Tools.
•
Not Installed: Consider installing VMware Tools in this Vt.I.
•
Unknown: vSphere Lifecycle Manager has not yet checked the status of VMware Tools.
Ensure that the VM is powered on before clicking U1e CHECK STATUS link.
•
Up to Date: The version of VMware Tools running in the VM matches the latest available
version for the ESXi host.
778
Module 10: vSphere
Lifecycle Management
10-57
Upgrading VMware Tools (2)
Select the VMs that use VMware
Tools whose version you want to
upgrade to a nev1er version.
Step 2 : Click UPGRADE TO
MATCH HOST.
1. Select the VMs to upgrade.
2. Schedule the upgrade.
Plan the upgrade during your
maintenance window.
3. Select rollback options.
..•
--
_
_____...._..
.--. ··- ----··-··--
-·--·-- ·--·---
--
·---
-- ---·
---·-··-. ------- --..
r-
1m11111111
Module 10: vSphere Lifecycle Management 779
10-58
Keeping VM Hardware Up To Date
With each subsequent release of ESXi, VMIVare provides a ne\V release of VM hardware.
As ESXi improves its hardware support, VMware often carries that support into its VMs.
New releases include:
· Greater configuration maximums
• New types of hardware (for example, vGPU. vNVMe, vSGX, vTPM, and so on)
Consider upgrading VM hardware only when new features are required.
780
Module 10: vSphere Lifecycle Management
10-59
Upgrading VM Hardware ( 1)
Select VM Hardware to upgrade your VMs'
hardware.
Step 1: Check the status of the VM hardware
running in your VMs. A VM has one of the
following status values:
Upgrade Available: You can choose to
upgrade VM hardware to match the current
version available for your ESXi hosts.
Up to Date: The version of VM hardware
running in the VM matches the latest
available version for the ESXi host.
.
.................
--- _
_.............._
---
- -
Module 10: vSphere Lifecycle Management 781
10-60
Upgrading VM Hardware (2)
Select the VMs whose hardware
version you v1ant to upgrade to
the latest version available on
the ESXi host on which they run.
Step 2: Click UPGRADE TO
MATCH HOST.
1. Select the VMs to upgrade.
2. Schedule the upgrade.
Plan the upgrade during your
maintenance window.
3. Select rollback options.
-- - _. --- __
------ - . - ·- - .. .. .... ___ -'
_-----__
...
--
-
-..--.
~
.....--
_
._
--··-·.....
-- -·.
-·-·.- -·- -- ·-···----~
782
....
··-·"'
M odule 10: vSphere Lifecycle Management
_.,
10-61
Review of Learner Objectives
After compleUng this lesson, you should be able to meet the following objective:
• Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware
Module 10: vSphere Lifecycle Management 783
10-62
Virtual Beans: Conclusion
By developing vSphere knowledge and skills and helping to create a modern data center at Virtual
Beans, you help lhe company meet its expanding business demands.
Your manager recognizes your competence and assigns you as lhe lead vSphere administrator.
Thinking of the continuous company growth, your manager considers you for cross-training and
additional responsibilities.
You think to yourself. "Now I must get that VMware certification!"
VMware Certified Professional - Data Center Virtuallzation:
https.//Wl•JW.vmware.com/education-serviceslcertification/Vcp-dcv.htrnl
784
Module 10: vSphere Lifecycle Management
10-63 Key Points
With the Update Planner feature, you can pertorm prechecks to verify that your vCenter Server
system meets the minimum requirements for a successful upgrade.
vSphere l ifecycle Manager centralizes automated patch and version management for clusters.
ESXi, drivers and firmware. VM hardware. and VMware Tools.
In vSphere Lilecycle Manager, you can manage ESXi hosts by using baselines, or you can
manage a cluster ot ESXi hosts by using images.
Keeping VMware Tools up to date is an Important part of ongoing data center maintenance.
Consider upgrading VM hard\vare only w·hen ne\v feature.s are required.
Questions?
Module 10: vSphere Lifecycle Management 785
Download