vmware windows - WordPress.com

advertisement
VMWARE WINDOWS
Windows 2003 vs Windows 2008
RODC
WDS instead of RIS
Services have been changed as roles - server manager
Introduction of hyper V- only on 64 bit versions
Enhanced event viewer
Bitlocker feature
Server core installation without GUI
MMC 3.0, with three pane view
Key management services(KMS) to activate Windows OS without connecting to Microsoft site
Performance enhancement using technologies like Windows SuperFetch,ReadyBoost and Readydrive
Windows Aero user interface
Instant search
Support for IPv6 in DNS
ESX vs ESXi
ESXi has no service console which is a modified version of RHEL
ESXi is extremely thin hence results in fast installation + fast boot
ESXi can be purchased as an embedded hypervisor on hardware
ESXi has builtin server health status check
ESXi 4.1 vs ESXi 5.0 - Migration
Local upgrade from CD
VMware update manager (only supports upgrade of ESX/ESXi 4.x to ESXi 5.0)
ESXi 4.1 vs ESXi 5.0 - Features
vSphere Auto deploy
Storage DRS
HA - Primary/secondary concept changed to master/slave
Profile driven storage
VMFS version - 3 → 5
ESXi firewall
VMware hardware version - 7 → 8
VMware tools version - 4.1 → 5
vCPU - 8 → 32
vRAM - 256 → 1 TB
VMs per host - 320 → 512
RAM per host - 1TB → 2TB
USB 3.0 support
vApp
FSMO roles
Schema Master
Domain naming master
Infrastructure master
PDC Emulator
RID master
GPO
GPO
Templates (ADMX)
Block inheritance
Enforced
Loopback policy
Forest and Domain concepts
OSI layer
Application Layer
Presentation Layer
Sessions Layer
Transport Layer
Network Layer
DataLink layer
Physical Layer
ASA - site to site VPN
HA 5.0
Uses an agent called FDM - Fault domain manager
HA now talks directly to hostd instead of using vcenter agent vpxa
Master/slave concept
Master
monitors availability of hosts/VMs
manages VM restarts after host failure
maintains list of all VMs in each host
restarting failed VMs
exchanging state with vcenter
monitor state of slaves
Slave
monitor running VMs and send status to master and performs restart on request from master
monitors master node health
if master fails, participates in election
Two different heartbeat mechanisms - Network heartbeat and datastore heartbeat
Network heartbeat
Sends between slave and master per second
When slave is not receiving heartbeat from master, checks whether it is isolated or master is isolated or has failed
Datastore heartbeat
To distinct between isolation and failure
Uses ‘Power On’ file in datastore to determine isolation
This mechanism is used only when master loses network connectivity with hosts
2 datastores are chosen for this purpose
Isolation response
PowerOff
Leave Powered On
Shutdown
vMotion
vMotion enables live migration of running virtual machines from one host to another with zero downtime
Prerequisites
Host must be licensed for vMotion
Configure host with at least one vMotion n/w interface (vmkernel port group)
Shared storage (this has been compromised in 5.1)
Same VLAN and VLAN label
GigaBit ethernet network required between hosts
Processor compatibility between hosts
vMotion does not support migration of applications clustered using Microsoft clustering service
No CD ROM attached
No affinity is enabled
vmware tools should be installed
RAID
Redundant Array of Independent disks
A category of disk drives that uses 2 or more drives in a combination for redundancy and performance
Most common RAIDs: RAID 0(Striped), RAID 1(Mirroring), RAID 5
Backup types
Backup types
Full backup - Will take the backup of all selected files and reset the archive bit
Copy backup - Will take the backup of all selected files but does not reset the archive bit
Incremental backup - Will take the backup of files whose archive bits are set and resets it after backup
Differential backup - Will take the backup of files whose archive bits are set but does not reset it after backup
2003 → 2008 migration
Can be done only by logging in to Windows 2003 server
Min of Windows 2003 SP1 required
Can be migrated only to same version, except for Windows server 2003 standard which can be migrated to either standard or
enterprise
Extra space of 30 GB required prior migration
Cannot upgrade to server core
Perform forestprep and domainprep to 2008 using 2008 cd before migrating. (Copy sources/adprep folder for this)
ESXi update manager
Global Catalog
Global catalog (GC) is a role handled by domain controllers in an Active directory model.
The global catalog stores a full copy of all objects in the directory for its host domain and a partial copy of all objects for all other
domains in the forest.
‘Partial copy’ refers to the set of attributes that are most used for searching every object in every domain.
All domain controllers can be promoted as a GC.
GC helps in faster search of AD objects.
The replicas that are replicated to the global catalog also include the access permissions for each object and attribute.
If you are searching for an object that you do not have permission to access, you do not see the object in the list of search
results. Users can find only objects to which they are allowed access.
Global catalog server clients depend on DNS to provide the IP address of global catalog servers. DNS is required to advertise
global catalog servers for domain controller location.
By default, first DC of in a forest will be a global catalog server
Basic networking concepts
RODC
New feature in Windows 2008
Only have the read only copy of directory database
RODC will have all the objects of a normal DC in read only mode. But this doesn’t include passwords. RODC does not store
password of accounts.
Updates are replicated to RODC by writable DC
Password caching : A feature which enables RODC to cache password of the logged in users.
Password Replication Policy: Determines whether the password can be cached or not.
DNS can be integrated with RODC but will not directly register client updates. For any DNS change, the RODC refers the client
to DNS server that hosts a primary or AD integrated zone
NAS vs SAN
Both used as storage solution
NAS can be used by any device connected using LAN whereas SAN is used only by server class devices with SCSI
NAS is file based whereas SAN is block based storage
NAS is cheap while SAN is expensive
SAN is comparatively faster than NAS
What is DRS? Types of DRS
Distributed Resource Scheduler
It is a feature of a cluster
DRS continuously monitors utilization across the hosts and moves virtual machines to balance the computing capacity
DRS uses vMotion for its functioning
Types of DRS
Fully autom ated - The VMs are moved across the hosts automatically. No admin intervention required.
Partially automated - The VMs are moved across the hosts automatically during the time of VM bootup. But once up, vCenter
will provide DRS recommendations to admin and has to perform it manually.
Manual - Admin has to act according to the DRS recommendations
DRS prerequisites
Shared storage
Processor compatibility of hosts in the DRS cluster
vMotion prerequisites
vMotion is not working. What are the possible reasons?
Ensure vMotion is enabled on all ESX/ESXi hosts
Ensure that all vmware pre requisites are met
Verify if the ESXi/ESX host can be reconnected or if reconnecting the ESX/ESXi host resolves the issue
Verify that time is synchronized across environment
Verify that the required disk space is available
What happens if a host is taken to maintenance mode
Hosts are taken to maintenance mode during the course of maintenance
In a single ESX/ESXi setup, all the VMs need to be shutdown before getting into maintenance mode
In a vCenter setup If DRS is enabled, the VMs will be migrated to other hosts automatically.
How will you clone a VM in an ESXi without vCenter
Using vmkftools
Copy the vmdk file and attach to a new VM
Using VMware converter
Explain traverse folder
Allows or denies moving through a restricted folder to reach files and folders beneath the restricted folder in the folder
hierarchy.
Traverse folder takes effect only when the group or user is not granted the "Bypass traverse checking user" right in the Group
Policy snap-in. This permission does not automatically allow running program files.
1.
Maximum number of LUNs that can be attached to a host (ESXi 5.0)
o 256
2.
Maximum number of vCPUs that can be assigned to a VM (ESXi 5.0)
o 32
3.
What are the uses of ntdsutil tool?
o Some of the main uses of ntdsutil tool
i.
Authoritative Restore - Authoritatively restores the Active Directory database or AD LDS instance
ii.
ifm - Create installation media for writable and RODC setups (Offline DC provisioning)
iii.
metadata cleanup - Cleans up objects of decommissioned servers
iv.
roles - Transfers and seizes operations master roles
v.
set DSRM password - Resets DSRM administrator password
vi.
snapshot - Manages snapshots of the volumes that contain the Active Directory database and
log files
4.
FSMO roles and its failure scenarios
o http://www.systemadminguide.in/2013/07/fsmo-roles-in-nutshell.html
5.
IPv6 addresses and its DNS record
o 128 bit address
o Represented as 8 groups of 4 hexadecimel digits seperated by colons
o Represented by ‘AAAA’ record in DNS
o Uses DHCP v6 for addressing
6.
Loadbalancer vs Clustering
o Clustering
i.
Cluster is a group of resources that are trying to achieve a common objective, and are aware of
one another.
ii.
Clustering usually involves setting up the resources (servers usually) to exchange details on a
particular channel (port) and keep exchanging their states, so a resource’s state is replicated at
other places as well.
iii.
It usually also includes load balancing, wherein, the request is routed to one of the resources in
the cluster as per the load balancing policy
o Load Balancing
.
7.
Used to forward requests to either one server or other, but one server does not use the other server’s
resources. Also, one resource does not share its state with other resources.
Software installation using group policy
o This can be done using 2 methods
i.
Assigning
ii.
Publishing
o Assign :
.
If you assign the program to a user, it is installed when the user logs on to the computer. When
the user first runs the program, the installation is completed.
i.
If you assign the program to a computer, it is installed when the computer starts, and it is
available to all users who log on to the computer. When a user first runs the program, the
installation is completed.
o Publish :
.
You can publish a program distribution to users.
i.
When the user logs on to the computer, the published program is displayed in the Add or
Remove Programs dialog box, and it can be installed from there.
o msi packages are used for installation. Normal exe would not work.
o Windows cannot install the software while the user is already logged on. The user need to log off and log in
8.
Group policy security filtering for users. Which all users are in there by default. Members of Authenticated
Users group
o Security filtering is a way of refining which users and computers will receive and apply the settings in a
Group Policy object (GPO)
o In order for the GPO to apply to a given user or computer, that user or computer must have both Read and
Apply Group Policy (AGP) permissions on the GPO, either explicitly, or effectively through group
membership
o By default, all GPOs have Read and AGP both Allowed for the Authenticated Users group.
o The Authenticated Users group includes both users and computers. This is how all authenticated users
receive the settings of a new GPO when it is applied to an organizational unit, domain or site
9.
Relevance of host file and its location
o Came before the concept of DNS
o An FQDN is first checked in Host file
o Location : C:\Windows\System32\Drivers\etc
10.
L3 switch vs Routers
o L3 switches just have the ethernet ports only whereas the routers have WAN interfaces
o QoS is not available with L3 switches whereas in routers it can be enabled
o Routers have expansion slots and cards that allow them to use different media types, like serial
connections for T1 and T3 circuits
o Routers are more intelligent in handling packets
o L3 switches does not support NAT
11.
VLAN vs Subnet
o VLAN works at layer 2 while subnet is at layer 3
o Subnets are more concerned about IP addresses.
o VLANs bring more network efficiency
o Subnets have weaker security than VLANs as all the subnet uses the same physical network
12.
Contents of System state backup
o Registry
o COM+ Class Registration database
o Boot files, including the system files
o System files that are under Windows File Protection
o Active Directory directory service (If it is domain controller)
o SYSVOL directory (If it is domain controller)
o Cluster service inform ation (If it is a part of a cluster)
o IIS Metadirectory (If it is an IIS server)
o Certificate Services database (If it is a certificate server)
13.
Incremental vs Differential backups
o Incremental backup - Will take the backup of files whose archive bits are set and resets it after backup
o Differential backup - Will take the backup of files whose archive bits are set but does not reset it after
backup
14.
Robocopy
o Microsoft tool used for copying files effectively
o It has plenty of options to manage the copy process
15.
How do you patch microsoft applications? Frequency of patches released by Microsoft
o The Microsoft applications can be patched using WSUS
o In WSUS, we can create several computer groups to manage this patch process.
o MS patches are released once in a month
16.
Explain GPO, GPC & GPT
o GPO - Group Policy Object : Refers to the policy that is configured at the Active Directory level and is
inherited by the domain member computers. You can configure a GPO at the site level, domain level or OU
level. GPO stores policy settings in two locations GPC and GPT
o GPO behaviour : Local Policy > Site GPO > Domain GPO > OU GPO > Child OU GPO
o GPC - Group Policy Container :This is the AD portion of the group policy. This can be viewed using ADSI
edit. It stores version information, status information, and other policy information. When you create a new
GPO, an AD object of class groupPolicyContainer gets created under the System\Policies container within
your AD domain
o
o
17.
GPT - Group Policy Template : The GPT is where the GPO stores the actual settings. It stores software
policy script, and deployment information.
GPT is stored in SYSVOL share (\\DomainNameHere\SYSVOL\Policies) whereas GPC is stored in the AD
What is CPU affinity in VMware? Its impact on DRS?
o CPU refers to a logical processor on a hyperthreaded system and refers to a core on a non-hyperthreaded
system
o By setting CPU affinity for each VM, you can restrict the assignment of VMs to a subset of available
processors
o The main use of setting CPU affinity is when there are display intensive workloads which requires
additional threads with vCPUs.
o DRS will not work with CPU affinity
http://frankdenneman.nl/2011/01/11/beating-a-dead-horse-using-cpu-affinity/
18.
.
VMversion 4 vs VMversion 7
o Version 4
i.
Runs on ESX 3.x
ii.
Max supported RAM 64 GB
iii.
Max vCPUs 4
iv.
MS cluster is not supported
v.
4 NICs/VM
vi.
No USB Support
o Version 7
Runs on vSphere 4.x
i.
Max supported RAM 256 GB
ii.
Max vCPUs 8
iii.
MS cluster is supported
iv.
10 NICs/VM
v.
USB support
19.
What happens to the VMs if a standalone host is taken to maintenance mode?
o In case of standalone servers , VMware recommends that VMs should be powered off before putting the
server in maintenance mode
o If we put the standalone host in maintenance mode without powering off the VMs, it will remain in the
‘entering maintenance mode’ state until the VMs are all shutdown
o When all the VMs are powered down, the host status changes to ‘under maintenance’
http://pubs.vmware.com/vsphere-4-esxvcenter/index.jsp#using_drs_clusters_to_m anage_resources/c_using_maintenance_mode.html
20.
What is new in Windows server 2012
o Server core improvements: no need of fresh installation, you can add/remove GUI from server manager
o Remotely manage servers , add/rem ove roles etc using Server manager-manage 2008 and 2008 R2 with
WMF 3.0 installation, installed by default in Server 2012
o Remote server administration tools available for windows 8 to manage Windows server 2012 infrastructure
o Powershell v3
o Hyper-V 3.0
i.
supports upto 64 processors and 1 TB RAM per virtual machine
ii.
upto 320 logical hardware processors and 4 TB RAM per host
iii.
Shared nothing live migration, move around VMs without shared storage
o
o
ReFS(Resilient file system), upgraded version of NTFS- supports larger file and directory sizes. Removes
the 255 character limitation on long file names and paths, the limit on the path/filename size is now 32K
characters!
Improved CHKDSK utility that will fix disk corruptions in the background without disruption
21.
How does the backup software recognize that a file has changed since last backup?
o The files use a bit called archive bit for tracking any change in the file.
o The backup softwares normally checks the archive bit of the file to determine whether the file has to be
backed up or not
22.
How can you edit a vm template?
o The VM templates cannot be modified as such
o First , the VM template have to be converted to a virtual machine
o After making necessary machines in the virtual machine, convert the virtual machine back to template
23.
VMware configuration maximums
ESXi 5.5
ESXi 5.1
ESXi 5.0
ESXi 4.x
VMs
vCPU
64
64
32
8
RAM
1 TB
1 TB
1 TB
255 GB
vNIC
10
10
10
10
VMDK size
62 TB
1 TB
1 TB
2 TB for
8MB
block
Logical CPU
320
160
160
160
Mem ory
4 TB
2 TB
2 TB
1 TB
LUNs
256
256
256
256
LUN size
64 TB
64 TB
64 TB
64 TB
Virtual
Machines
512
512
512
320
Hosts
24. What is the major difference between Windows server 2008 and windows server 2012 in terms of AD
promotion?
In Win 2012, dcpromo has been depreciated. In order to make a Windows server 2012 to a domain controller, the ADDS
service has to be installed from the server manager. After installation, run the post-deployment configuration wizard from server
manager to promote the server as AD
25.
VMware hardware version comparison
What is vSAN?
It is a hypervisor-converged storage solution built by aggregating the local storage attached to the ESXi hosts managed by a
vCenter.
Recommended iSCSI configuration?
A separate vSwitch, and a separate network other than VMtraffic network for iSCSI traffic. Dedicated physical NICs should be
connected to vSwitch configured for iSCSI traffic.
What is iSCSI port binding ?
Port binding is used in iSCSI when multiple VMkernel ports for iSCSI reside in the same broadcast dom ain and IP subnet, to
allow multiple paths to an iSCSI array that broadcasts a single IP address.
iSCSI port binding considerations ?
Array Target iSCSI ports must reside in the sam e broadcast domain and IP subnet as the VMkernel port.
All VMkernel ports used for iSCSI connectivity must reside in the same broadcast domain and IP subnet.
All VMkernel ports used for iSCSI connectivity must reside in the same vSwitch.
Currently, port binding does not support network routing.
Recommended iSCSI configuration of a 6 NIC infrastructure ? (Answer changes as per the infrastructure requirements)
2 NICs for VM traffic
2 NICs for iSCSI traffic
1 NIC for vMotion
1 NIC for managem ent network
Post conversion steps in P2V
Adjust the virtual hardware settings as required
Remove non present device drivers
Remove all unnecessary devices such as serial ports, USB controllers, floppy drives etc..
Install VMware tools
Which esxtop metric will you use to confirm latency issue of storage ?
esxtop --> d --> DAVG
What are standby NICs
These adapters will only become Active if the defined Active adapters have failed.
Path selection policies in ESXi
Most Recently Used (MRU)
Fixed
Round Robin
Which networking features are recommended while using iSCSI traffic
iSCSI port binding
Jumbo Frames
Ports used by vCenter
80,443,902
What is 'No Access' role
Users assigned with the 'No Access' role for an object, cannot view or change the object in any way
When is a swap file created
When the guest OS is first installed in the VM
The active directory group, where the members will be ESXi administrators by default.
ESX Admins
Which is the command used in ESXi to manage and retrieve inform ation from virtual machines ?
vmware-cmd
Which is the command used in ESXi to view live performance data?
esxtop
Command line tool used in ESXi to manage virtual disk files?
vmkfstools
Port used for vMotion
8000
Log file location of VMware host
\var\log\vmware
Can you map a single physical NIC to multiple virtual switches ?
No
Can you map a single virtual switch to multiple physical NICs?
Yes. This method is called NIC teaming.
VMKernel portgroup can be used for:
vMotion
Fault Tolerance Logging
Management traffic
Major difference between ESXi 5.1 and ESXi 5.5 free versions
Till ESXi 5.1 free version there was a limit to the maximum physical memory to 32 GB. But from 5.5 onwards this limit has been
lifted.
What is IPAM server in Windows server 2012?
IPAM is IP Address Management server in Windows Server 2012. It enables central management of both DHCP and DNS
servers. It can also be used to discover, monitor, and audit DHCP and DNS servers.
How to promote a server to domain controller in Windows server 2012?
DCPROMO was the conventional tool used to promote a normal server to DC. This is now deprecated in Server 2012.
In Server 2012, you can convert a server into DC using the server manager console. Under Server Manager, add a new role
"Active Directory Domain Services"
How VMWare Kernel different from other kernels?
VMWare kernel is a proprietary kernel that means that it is a registered kernel by VMWare Company and it is not based
on any other kernel architecture or any other operating system. VMWare consists of a kernel that requires an
operating system to boot it. A service console is being provided when VMWare kernel is booted.
What are the features provided by VMWare for easy access?
VMWare provides several features to make it easy for the user to access and maintain it. The features are as follows:
• VMWare provides web browser interface
• It provides easy to use wizard to configure the settings
• It provides tools to easily create hosts and maintain it from one place
• It provides easy maintenance of Virtual machines
• It provides easy graphics to configure the VMWare settings for security
What are the features of VMWare Player?
VMWare player is a stand-alone player that comes with the installation of VMWare also. The features that make it more
popular are as follows:
• Creation of virtual machines can be done with easy install options. The creation and installation can be done directly
to the system.
• VMWare Player can run any virtual machine and it can be used by anyone, anywhere. It allows quick and easy
access, to take the advantage of security, portability and flexibility to manage the virtual machines.
• VMWare player allows sharing of virtual machines with other computers or users.
What are the different components used in VMWare infrastructure?
The different and major components used in VMWare infrastructure is as follows:
1. VMWare infrastructure consists of the lowest layer which acts as a ESX server host.
2. VMWare infrastructure also use the virtual centre server that keep tracks of all the VM related images and manage it
from one point.
3. VMWare infrastructure (VI) client: this allows the client to interact with user's applications that are running on
VMWare.
4. Web browser is used to access the virtual machines.
5. License server is used to create a server that provides licensing to the applications
6. Database servers are used to maintain a database.
5. What are the benefits of virtualization?
Virtualization is a creation of virtual machines and to manage them from one place. It allows the resources to be
shared with large number of network resources. Virtualization is having lots of benefits and they are as follows:
1. It helps in saving lots of cost and allows to easily maintaining it, in less cost.
2. It allows multiple operating systems on one virtualization platform.
3. It removes the dependency of heavy hardware to run the application.
4. It provides consolidating servers that are used for crashing of a server purpose
5. It reduces the amount of space being taken by data centres and company data.
6. What is the purpose of a Hypervisor?
Hypervisor is a program that manages the virtual machine. It also act like virtual machine manager that manages the
many virtual machines from one place. It allows multiple operating system to share single hardware host. Each
operating system in this consists of its own defined space consisting of space, memory and processor. It is used as a
controller program to control host processors and resources. It separates out the layer between many operating
systems so that one can't conflict with another one.
7. How ESX server related to VMWare?
ESX server is the enterprise edition of VMWare. It provides server virtualization platform that allows many operating
systems to be shared together in a convenient way and consists of a centralized management platform that is also
known as virtual centre. ESX server is a virtualization technique that is used to create cloud applications and allows
easy development of cloud platforms. It is related to VMWare as it is the upper layer of it.
8. What is the difference between ESX and GSX server?
GSX server acts as type 2 hypervisor that gets installed on the host operating system’s hardware like windows and
Linux. VMWare workstation gets mixed up with GSX server to provide it more functionality to run your applications
and operating systems. ESX server on the other hand, is type 1 hypervisor that runs its software directly on the
system’s hardware and it doesn’t require any operating system prior to its installation. It is level 0 hypervisor and it
has its own operating system.
9. What is the use of VMWare workstation?
VMWare workstation is software that allows user to run more than one operating system in there system. It provides virtualization to run
different applications on many operating systems at a single time. It saves the current configuration of operating system for the user in
the form of virtual machines. VMWare allows user to view there application and work with so many different OS without even switching
between the OSs.
10. What are the different types of extensions used by VMWare?
1. .log: is used to keep a log file to maintain a key for VMWare. This file allows user to see the problems encountered during any
installation or while using VMWare.
2. .nvram: is used to store the state of the virtual machine in system’s BIOS.
3. .vmdk: is a virtual disk file that is used to store the content of virtual machine.
4. .vmsd: stores the information and metadata of the system’s snapshots.
5. .vmsn: is used to store the snapshot state. It stores both the running state and the time when you have taken it.
6. .vmss: stores the suspended state of a virtual machine.
7. .vmtm: stores the configuration team data.
8. .vmx: store the primary configurations for the new virtual machine.
11. How virtual machine’s concept is different for host and guest systems?
Host system is the system that runs the operating system and over which the virtual platform can be installed. The virtual platform that
runs another operating system is called as guest operating system. Host and guest can be connected with each other by using the
virtual machines. A host system that runs all together its own operating system is called as virtualization host and the guest operating
system will be that, which get installed over that operating system.
12. What are some major differences between VMWare Server and ESX server?
• ESX server is a bare metter virtualation platform that is a physical server whereas, VMWare server needs an operating system to run
itself.
• ESX server is type 1 hypervisor virtualization platform whereas, VMWare server is a type-2 hypervisor virtualization platform.
• ESX server gives better performance then VMWare server, due to less overhead.
• ESX server have more features available then VMW are server.
• VMWare server is good to be used on small platforms and with less resources but, ESX server requires high specifications.
13. What is the use of Para-virtualization?
Para-virtualization is a virtualization technique that allows similar virtual machines to be created on particular hardware. It
allows many operating systems to run on host hardware at the sam e time. It makes good use of resources like processors,
memory and networking. It acts as a virtual machine monitor that has high performance and more efficient. It is used for
development, testing and production of the virtual machines. It also good in disaster recovery by moving the guest virtual
machine till the hardware is being repaired.
14. Why snapshots are really important in VMWare?
Snapshots are images that is been taken at a particular point from the virtual guest operating system. The snapshot consists of
the virtual machine configurations, memory and the devices that were present at the time of the snapshot. By doing this, you
can return back to virtual machine which might have become corrupted or might not be working. Snapshots can be taken
anytime according to your need and requirement. Snapshots can be saved and then system can be reverted back in case of
any disaster happened to your operating system.
15. What are the disadvantages associated with VMWare virtualization platform?
The disadvantage of VMW are virtualization platform is as follows:
• VMWare concept requires the knowledge of the concept.
• It requires money to buy the resources required for virtualization platform.
• It requires high end server with lots of high end configuration and specification that increases the cost.
• It requires different technologies that have to be implemented for the enterprise virtualization systems.
• Reliability decreases and cost increases in case of the system failures.
EXTRA ----
VMWARE L2 and L3 Interview Questions
VMWARE Questions
1). What's new with vsphere 5.1?
http://www.vmware.com/files/pdf/products/vsphere/vmware-what-is-new-vsphere5.pdf
2). Difference between ESX and ESXi?
3). How does vmotion works?
Live migration of a virtual machine from one physical server to another with VMware VMotion is enabled by three underlying
technologies.
First, the entire state of a virtual machine is encapsulated by a set of files stored on shared storage such as Fibre Channel or
iSCSI Storage Area Network (SAN) or Network Attached Storage (NAS). VMware vStorage VMFS allows multiple installations
of VMware ESX® to access the same virtual machine files concurrently.
Second, the active memory and precise execution state of the virtual machine is rapidly transferred over a high speed network,
allowing the virtual machine to instantaneously switch from running on the source ESX host to the destination ESX host.
VMotion keeps the transfer period imperceptible to users by keeping track of on-going memory transactions in a bitmap. Once
the entire memory and system state has been copied over to the target ESX host, VMotion suspends the source virtual
machine, copies the bitmap to the target ESX host, and resumes the virtual machine on the target ESX host. This entire
process takes less than two seconds on a Gigabit Ethernet network.
Third, the networks being used by the virtual machine are also virtualized by the underlying ESX host, ensuring that even after
the migration, the virtual machine network identity and network connections are preserved. VMotion manages the virtual MAC
address as part of the process. Once the destination machine is activated, VMotion pings the network router to ensure that it is
aware of the new physical location of the virtual MAC address.
Since the migration of a virtual machine with VMotion preserves the precise execution state, the network identity, and the active
network connections, the result is zero downtime and no disruption to users.
4). Pre-requisites of vMotion?
1.
ESX Servers must be configured with VMkenerl ports enabled for vmotion and on the same network segment
2.
ESX Servers must be managed by the sam e Virtual Center server
3.
ESX Must have compatible CPUs
4.
ESX Servers must have consistent Networks and Netwroks labels
5.
The VMs must be stored on shared storage - iSCSI or FC SAN or NAS/NFS
6.
The VMs cannot use local cd/floppy or internal only vrtual switches on the ESX server
5). Difference between h/w version 4 vs 7 vs 8 vs 9?
http://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.upgrade.doc_50%2FGUID-68E5EDAE-66DE43F8-9420-F424AFEADB1D.html
6). What is storage DRS?
http://www.vmware.com/ap/products/datacenter-virtualization/vsphere/storage-drs.html
7). How is HA of vsphere 4.1 different from vsphere 5.x?
http://www.yellow-bricks.com/vmware-high-availability-deepdiv/
8). What is NMP (native multipathing)?
9). If one host is showing disconected to vcenter, how will you troubleshoot it?
10). What is PSOD, how will you troubleshoot it?
11). Where does the logs of hostd and vpx go?
12). what is in-memory filesystem and is introduced with which version?
13). Pr-requisites of FT?
14). What can be the maxium size of snapshot, how it grows?
15). Commands to create vswitch?
16). What is lockdown mode?
17). what is CPU ready time?
18). How to enable hot-add feature?
19). how to generate logs using CLI?
20). What is the default location for AAM logs?
21). Difference between VMF3 and VMFS5 filesystem?
22). How to troubleshoot VMs performance using CLI?
23). Difference between vpxa and hostd deamons?
24). How many simultaneous vmotions are possible in 1gigs n/w?
25). What are default roles in vcenter?
26). Whati s the difference between vmdk and flat.vmdk?
27). What is "shared nothing" vmotion and its pre-requisites?
28). Licensing model in 5.0 and how it is changed in 5.1?
29). How to upgrade from ESX 3.5 to 4.0 /4.x to 5.x?
30). What is a slot-size and how is it calculated?
31). Importance of VMware tools?
32). How many disk failures does RAID 5 support?
33). which is better RAID 10 or RAID 01
Storage Questions
1). What is zoning, different types of zoning?
2). Difference b/w soft and hard zoning?
3). Whati s LUN masking?
4). What is vault drive?
5). What is LUN masking and how is it different from zoning?
6. How many maximum number of disks can be placed in EMC clariion CX4 - 960
7). What is LCC and its importance?
8). What is difference between contcatination and Striping in lun expansion?
9). How is a LUN presented to a server, all steps like RAID grouping, LUN binding etc?
10). what is WW N and IQN
11). W hat are different types of backup techniques?
12). What is deduplication?
MORE – VMWARE
1. Is VMware Kernel a Linux/Unix Kernel?
VMware Kernel is a Proprietary Kernel and is not based on any of the UNIX operating systems, it's a kernel developed by
VMware Company.
2. Does the VMKernel boot by itself?
The VMKernel can't boot by itself, so it takes the help of the 3rd party operating system. In the case of VMware the kernel is
booted by RedHat Linux operating system which is known as service console.
3. The service console is developed based up on Redhat Linux Operating system; it is used to manage the VMKernel
4. Which command is used to restart webaccess service on vmware?service vmware-webaccess restart – this will restart
apache tomcat app
5. What is the command to restart ssh service on vmware?service sshd restart
6. What is the command to restart host agent(vmware-hostd) on VMware esx server?
service mgmt-vmware restart
7. What is the Path of the struts-config.xml?
/usr/lib/vmware/webAccess/tomcat/apache-tomcat-5.5.17/webapps/ui/WEB-INF/
8. What is the command to start the scripted install?
esx ks=nfs:111.222.333.444:/data/KS.config ksdevice=eth0
location device name
9. Virtual Network in Simple……………….
Virtual Nic(s) on Virtual Machine(s) ----->
Physical Nic on the ESX Server (Virtual Switch - 56 Ports) ----->
Physical Switch Port should be trunked with all the VLANS to which the VM's need access
All the ESX servers should be configured with Same number of Physical Nics (vSwitches) and Connectivity also should be
same, So that vMotion succeeds.
All the Virtual Machines are connected to one vSwitch with Different VLANS, this means the Physical Nic(vSwitch) needs to be
trunked with the sam e VLANS on the Physical Switch Port
10 What are the three port groups present in ESX server networking?1. Virtual Machine Port Group - Used for Virtual
Machine Network
2. Service Console Port Group - Used for Service Console Communications
3. VMKernel Port Group - Used for VMotion, iSCSI, NFS Communications
11. What is the use of a Port Group?
The port group segregates the type of communication.
12. What are the types of communications which requires an IP address for sure?
Service Console and VMKernel (VMotion and iSCSI), these communications does not happen without an ip address (Whether it
is a single or dedicated)
13. In the ESX Server licensing features VMotion License is showing as Not used, why?
Even though the license box is selected, it shows as "License Not Used" until, you enable the VMotion option for specific
vSwitch.
14. How the Virtual Machine Port group communication works?
All the vm's which are configured in VM Port Group are able to connect to the physical machines on the network. So this port
group enables communication between vSwitch and Physical Switch to connect vm's to Physical Machine's
15. What is a VLAN?A VLAN is a logical configuration on the switch port to segment the IP Traffic. For this to happen, the port
must be trunked with the correct VLAN ID.
16. Does the vSwitches support VLAN Tagging? Why?Yes, the vSwitches support VLAN Tagging; otherwise if the virtual
machines in an esx host are connected to different VLANS, we need to install a separate physical nic (vSwitch) for every VLAN.
That is the reason vmware included the VLAN tagging for vSwitches. So every vSwitch supports upto 1016 ports, and BTW
they can support 1016 VLANS if needed, but an ESX server doesn’t support that many VM’s.
17. What is Promiscuous Mode on vSwitch? What happens if it sets to accept?If the promiscuous mode set to Accept, all
the communication is visible to all the virtual machines, in other words all the packets are sent to all the ports on vSwitch
If the promiscuous mode set to Reject, the packets are sent to inteded port, so that the intended virtual machine was able to
see the communication.
18. What is MAC address Changes? What happens if it is set to accept?
When we create a virtual machine the configuration wizard generates a MAC address for that machine, you can see it in the
.vmx (VM Config) file. If it doesn't matches with the MAC address in the OS this setting does not allow incoming traffic to the
VM. So by setting Reject Option both MAC addresses will be remains same, and the incoming traffic will be allowed to the VM.
19. What is Forged Transmits? What happens if it is set to Accept?When we create a virtual machine the configuration
wizard generates a MAC address for that machine, you can see it in the .vmx (VM Config) file. If it doesn't matches with the
MAC address in the OS this setting does not allow outgoing traffic from the VM. So by setting Reject Option both MAC
addresses will be rem ains sam e and the outgoing traffic will be allowed from the VM.
20. What are the core services of VC?
VM provisioning, Task Scheduling and Event Logging
21. Can we do vMotion between two datacenters? If possible how it will be?
Yes we can do vMotion between two datacenters, but the mandatory requirement is the VM should be powered off.
22. What is VC agent? What service it corresponds to? What are the minimum requisites for VC agent installation?VC
agent is an agent installed on ESX server which enables communication between VC and ESX server. The daemon associated
with it is called vmware-hostd, and the service which corresponds to it is called as mgmt-vmware, in the event of VC agent
failure just a restart of the service by typing the following command at the service console helps. " service mgmt-vmware restart
" VC agent is installed on the ESX server when we add it to the VC, so at the time of installation if you are getting an error like "
VC Agent service failed to install ", check the /Opt size whether it is sufficient or not.
23. How can you edit VI Client Settings and VC Server Settings?Click Edit Menu on VC and Select Client Settings to
change VI settings
Click Administration Menu on VC and Select VC Management Server Configuration to Change VC Settings.
24. What are the files that make a Virtual Machine?
.vmx - Virtual Machine Configuration File
.nvram - Virtual Machine BIOS
.vmdk - Virtual Machine Disk file
.vswp - Virtual Machine Swap File
.vmsd - Virtual Machine Snapshot Database
.vmsn - Virtual Machine Snapshot file
.vmss - Virtual Machine Suspended State file
.vmware.log - Current Log File
.vmware-#.log - Old Log file
25. What are the devices that can be added while the virtual Machine running?
In VI 3.5 we can add Hard Disk and NIC's while the machine running. In vSphere 4.0 we can add Memory and Processor along
with HDD and NIC's while the machine running
26. How to set the time delay for BIOS screen for a Virtual Machine?
Right Click on VM, select edit settings, choose options tab and select boot option, set the delay how much you want.
27. What is a template?
We can convert a VM into Template, and it cannot be powered on once it’s changed to template. This is used to quick
provisioning of VM's.
23. What to do to customize the windows virtual machine clone?
Copy the sysprep files to Virtual center directory on the server, so that the wizard will take the advantage of it.
24. What to do to customize the linux/unix virtual machine clone?
VC itself includes the customization tools, as these operating systems are available as open source.
25. Does cloning from template happen between two datacenters?
Yes... it can, if the template is in one datacenter, we can deploy the vm from that template in another datacenter without any
problem.
26. What are the common issues with snapshots? What stops from taking a snapshot and how to fix it?
If you configure the VM with Mapped LUN's, then the snapshot failed. If it is mapped as virtual then we can take a snapshot of
it.
If you configure the VM with Mapped LUN's as physical, you need to remove it to take a snapshot.
27. What are the settings that are taken into to consideration when we initiate a snapshot?
Virtual Machine Configuration (What hardware is attached to it)
State of the Virtual Machine Hard Disk file (To revert back if needed)
State of the Virtual Machine Memory (if it is powered on).
28. What are the requirements for Converting a Physical machine to VM?
An agent needs to be installed on the Physical machine
VI client needs to be installed with Converter Plug-in
A server to import/export virtual machines
29. What is VMWare consolidated backup?
It is a backup framework, which supports 3rd party utilities to take backups of ESX servers and Virtual Machines. It’s not a
backup service.
30. To open the guided consolidation tool, what are the user requirements?
The user must be member of administrator, the user should have "Logon as service" privileges - To give a user these
privileges, open local sec policy, select Logon as service policy and add the user the user should have read access to AD to
send queries
31. Difference between HA and Vmotion?
VMotion and HA are not related and are not dependents of each other. DRS has a dependency on vMotion,but not HA. HA is
used in the event that a hosts fails you can have your virtual machines restart on another host in the cluster. vMotion allows you
to move a virtual machine from one host to another while it is running without service interruption. Ideally you will utilize
vMotion, HA and DRS within your cluster to achieve a well balanced VI environment.
So HA fail over is not really seamless since you mentioned it has virtual machines restart on another host in the
Cluster? No, your VM's will go down If there is a host failure and then HA will restart them on another ESX Host in the cluster.
This is where DRS will take over and start to balance out the load across the remaining ESX Hosts in the cluster using vmotion.
32. What is DRS? DRS : Distributed Resource Scheduling (Youtube Video)
VMware DRS dynamically balances computing capacity across a collection of hardware resources aggregated into logical
resource pools, continuously monitoring utilization across resource pools and intelligently allocating available resources among
the virtual machines based on pre-defined rules that reflect business needs and changing priorities. When a virtual machine
experiences an increased load, VMware DRS automatically allocates additional resources by redistributing virtual machines
among the physical servers in the resource pool. VMware DRS allows IT organizations to:
• Prioritize resources to the highest value applications in order to align resources with business goals
• Optimize hardware utilization automatically and continuously to respond to changing conditions
• Provide dedicated resources to business units while still profiting from higher hardware utilization through
resource pooling.
• Conduct zero-downtime server maintenance
* Lower power consumption costs by up to 20 percent.
33. What is HA? HA : High Availability (Youtube video)
vSphere High Availability (HA) delivers the availability needed by many applications running in virtual machines, independent of
the operating system and application running in it. HA provides uniform, cost-effective failover protection against hardware and
operating system failures within your virtualized IT environment.
·
·
Monitors virtual machines to detect operating system and hardware failures.
Restarts virtual machines on other physical servers in the resource pool without manual intervention when server
failure is detected.
·
Protects applications from operating system failures by automatically restarting virtual machines when an operating
system failure is detected.
34. What is DPM in VMWARE? DPM : Distributed Power Management
VMware Distributed Power Management (DPM) is a pioneering new feature of VMware DRS that continuously monitors
resource requirements in a VMware DRS cluster. When resource requirements of the cluster decrease during periods of low
usage, VMware DPM consolidates workloads to reduce power consumption by the cluster. When resource requirem ents of
workloads increase during periods of higher usage, VMware DPM brings powered-down hosts back online to ensure service
levels are met. VMware DPM allows IT organizations to:
• Cut power and cooling costs in the datacenter
• Automate management of energy efficiency in the datacenter
What is dvSwitch? Distributed vSwitch
It’s a new feature introduced in vSphere4.0.The configuration of vDS is centralized to vCenter. The ESX/ESXi 4.xand ESXi 5.x
hosts that belong to a dvSwitch do not need further configuration to be compliant. Distributed Switches provide similar
functionalities to vSwitches. dvPortgroups is a set of dvPorts. The vDS equivalent of portgroups is a set of ports in a vSwitch.
Configuration is inherited from dvSwitch to dvPortgroup, like what happens for vSwitch/Portgroup. Virtual machines, Service
Console interface (vswif), and VMKernel interfaces can be connected to dvPortgroups just as like they could be connected to
portgroups in vSwitches Administrative rights are required to create the following virtual adapters on each ESX/ESXi host
dvSwitch in vCenter:
·
·
Service Console and VMKernel interfaces
Physical NICs and their assignment to dvSwitch Uplink groups
Configuring vNetwork Distributed Switch using vCenter
What is FT in vmware? FT : Fault Tolerance for Virtual Machines
vSphere Fault Tolerance (FT) provides continuous availability for applications in the event of server failures, by creating a live
shadow instance of a virtual machine that is in virtual lockstep with the primary instance. By allowing instantaneous failover
between the two instances in the event of hardware failure, FT eliminates even the smallest chance of data loss or disruption.
VMware Fault Tolerance FAQ
What is vApps in vmware?
vApps : vApp is a container same as resource pool, but it is having some features of virtual machines, a vApp can be powered
on or powered off, and it can be cloned too.
More details on vApps along with a video.
What is vSafe?
vmSafe : VMsafe's application programming interfaces are designed to help third-party vendors create virtualization security
products that better secure VMware ESX, vShield Zones is a security tool targets the VMware administrator.
In other words VMware VMsafe™ is a program for integrating partner security solutions into VMware-virtualized environments,
offering visibility, control and choice to customers. The result is an approach to virtualized security that provides custom ers with
a choice of enhanced security and IT compliance solutions enabling comprehensive protection for virtual datacenters and cloud
environments
What is vShields?
vShield : VShield Zones is essentially a virtual firewall designed to protect VMs and analyze virtual network traffic. This threepart series describes vShield Zones, explains how to install it and provides useful management tips.
ALL ABOUT DNS _ DOMAIN NAME SYSTEM
1) What is DNS?
Ans: Its a distributed naming system which is organized in a hierarchy. Its used in private network or internet by computers,
services or entities lying within.
2) What is Domain Naming Service?
Ans: A domain naming service translates names to IP address and vice-verse. Since humans can't remember numbers but
names, this system was designed so that it helps them recognize a service or computer by nam e but computers are able to talk
to each other using IP addresses.
3) What is forward look up?
Ans: When DNS server is queried for a name and it returns an IP address in reply, its called forward lookup. For example
when I type yahoo.com in the internet explorer, the dns server returns an IP address to which a computer is able to connect.
4) What is reverse lookup?
Ans: When a DNS client queries a DNS server about an IP and the DNS server responds by providing a name is known as
reverse lookup in DNS.
5) What is DNS cache?
Ans: All the queries that a DNS client does, its results are saved by it in its temporary storage so that next time when it has to
find out about an IP or name, it would first look into the cache. If its not there, then only it'll contact the DNS server. This
temporary storage is called DNS cache. It helps increase the speed of name resolution for frequently queried names.
Q: How DNS query works?
Ans: The answer is a detailed one. Please visit this page to know more.
6) What are DNS forwarders?
Ans: When we setup DNS servers we want queries for internet names to be forwarded to ISP DNS so that those can be
resolved by the server to which they have been forwarded and returned back to my DNS server. These servers to which the
DNS queries are forwarded to are called "DNS Forwarders".
Internet names are just one example, we could as well set up forwarders for a particular domain name as well.
7) What is Primary DNS Server?
Ans: Its the Writable copy of the DNS where the DNS database is stored. All the changes related to creation, deletion or
modification of a DNS record or Zone is done on this server.
8) What is secondary DNS?
Ans: Secondary DNS servers are read only replica of primary DNS servers. They are created to distribute the load of primary
DNS servers and to prevent the writable copy of the DNS to the external world. Secondary DNS servers do the same job of
carrying out name resolution by using a read only copy of the primary DNS server database. They get this copy of primary DNS
server database using one of the DNS Zone transfer methods. They are AXFR, IXFR and Full Zone Transfer.
IXFR - Incremental Zone Transfer.
AXFR - augmented Zone transfer.
Full/Complete Zone Transfer
To know more about Zone transfer in detail please visit this page and read thoroughly.
9) What is Active Directory Integrated DNS?
Ans: Active Directory–integrated DNS enables Active Directory storage and replication of DNS zone databases. Windows 2000
DNS server, the DNS server that is included with Windows 2000 Server, accommodates storing zone data in Active Directory.
When you configure a computer as a DNS server, zones are usually stored as text files on name servers — that is, all of the
zones required by DNS are stored in a text file on the server computer. These text files must be synchronized among DNS
name servers by using a system that requires a separate replication topology and schedule called a zone transfer However, if
you use Active Directory–integrated DNS when you configure a domain controller as a DNS name server, zone data is stored
as an Active Directory object and is replicated as part of domain replication.
10) What is stand alone DNS Server?
Ans: A non AD integrated DNS can be termed as standalone DNS server. Its the only DNS server in an environm ent.
11) How DNS can do load balancing?
Ans: DNS can do load balancing by using the following methods:
1) DNS Round Robin
2) Using weights on DNS records. For example we can define weight on each MX record to define how much of load we
want a particular server to handle.
12) What is Secondary Zone?
Ans: The zone hosting the read only copy of a Primary DNS server's writable copy of Zone is called a secondary zone.
13) What is SRV record?
Ans: The SRV RR identifies the host(s) that will support particular services. The MX RR is a specialised example of service
discovery while the SRV RR is a general purpose RR to discover any service.
14) What is A record and PTR record?
Ans: "A" records are host records where a name is mapped to the IP address assigned to it. A "PTR" records where IP
addresses are mapped to a name.
15) What is a Stub Zone?
Ans: A stub zone is a copy of a zone that contains only those resource records necessary to identify the authoritative Domain
Name System (DNS) servers for that zone. A stub zone is used to resolve names between separate DNS nam espaces. This
type of resolution may be necessary when a corporate merger requires that the DNS servers for two separate DNS
namespaces resolve names for clients in both namespaces.
A stub zone consists of:
The start of authority (SOA) resource record, name server (NS) resource records, and the glue A resource records for the
delegated zone.
16) What is a delegated DNS zone? When do we use it?
Ans: Delegated DNS zones are created when we want the name resolution of subdomains or child domains to be broken up
with in DNS. For more details please visit this page.
17) Steps by Step method to install DNS in Windows?
Ans: Step by step method to install DNS in windows 2003 is given here.
Step by Step method to install DNS in Windows 2008 is given here.
19) How to troubleshoot Active Directory related DNS problems using DCDiag tool?
Ans: Please find the steps here. Do look for part 2 of this youtube video.
20) New features of DNS in Windows 2008?
·
Background zone loading: DNS servers that host large DNS zones that are stored in Active Directory Domain
Services (AD DS) are able to respond to client queries more quickly when they restart because zone data is now loaded in the
background.
·
IP version 6 (IPv6) support: The DNS Server service now fully supports the longer addresses of the IPv6
specification.
·
Support for read-only domain controllers (RODCs): The DNS Server role in Windows Server 2008 provides primary
read-only zones on RODCs.
·
Global single names: The GlobalNames zone provides single-label nam e resolution for large enterprise networks that
do not deploy Windows Internet Name Service (WINS). The GlobalNam es zone is useful when using DNS name suffixes to
provide single-label name resolution is not practical.
·
Global query block list: Clients of such protocols as the Web Proxy Auto-Discovery Protocol (WPAD) and the Intrasite Automatic Tunnel Addressing Protocol (ISATAP) that rely on DNS name resolution to resolve well-known host names are
vulnerable to malicious users who use dynamic update to register host computers that pose as legitimate servers. The DNS
Server role in Windows Server 2008 provides a global query block list that can help reduce this vulnerability.
Watch the videos and have fun learning answers to the above mentioned questions and gain much more additional knowledge
as well. Hope it helps you all.
Download DNS Videos
+ Download one by one if you don't have a live ID or a hotmail ID.
What is EDNS?
Its called "Extended mechanisms for DNS". More details can be found at the links given below:
http://spanougakis.wordpress.com/2011/05/01/edns-what-is-all-about-2/
http://social.technet.microsoft.com/Forums/en-US/winservergen/thread/b4e22807-a4ed-4a9e-be23-cdcc2b77ed22/
http://sysadminthings.blogspot.ca/2011/09/things-i-never-knew-about-dns-edns.html
Q: When does DNS works using UDP and when it uses TCP?
Ans: DNS uses both TCP and UDP for valid reasons. Note that UDP messages are not larger than 512 Bytes and are
trucncted when greater than this size. So DNS uses TCP for Zone transfer and UDP for name queries either regular (primary)
or reverse. UDP can be used to exchange small information whereas TCP must be used to exchange information larger than
512 bytes. If a client doesn't get response from DNS it must retransmit the data using TCP after 3-5 seconds of interval.
The Network Files, Case #53: Diagnosing Diseases of DNS
Network troubleshooters soon learn that the first place to look when the network stops working is DNS... and soon after that,
they learn that the in-the-box DNS troubleshooting tool, nslookup, is a pretty basic answer. So if keeping DNS working is part of
your job, don't miss this "beyond the basics" DNS troubleshooting session presented by Mark Minasi, the author of the
Mastering Windows Server books that have taught DNS to more Windows admins than any other. We start with "dig," the
nslookup replacement that is a must-know for DNS techies. Then we see how to give your troubled DNS queries a thorough
workup with Network Monitor (even if you've never used Netmon), where you'll be able to find out why those dynamic updates
aren't happening. From there, get the scoop on "EDNS," a feature of DNS servers since 2003 that has been blamed -- wrongly
-- for a host of DNS ills. After that, see how to take your DNS system's pulse with DNSLint, a free, not-to-be-missed utility. Then
see how to understand what those DNS logs are REALLY saying. Attend this talk and you'll soon be known as "Doctor DNS!"
Difference between vSphere, ESXi and vCenter
VMware Inc. is a software company that develops many suite of software products specially for providing
various virtualization solutions. There are many cloud products, datacenter products, desktop products and
so on.
vSphere is a software suite that comes under data center product. vSphere is like Microsoft Office suite which
has many software like MS Office, MS Excel, MS Access and so on. Like Microsoft Office, vSphere is also a
software suite that has many software components like vCenter, ESXi, vSphere client and so on. So, the
combination of all these software components is vSphere. vSphere is not a particular software that you can install
and use, “it is just a package name which has other sub components”.
ESXi, vSphere client and vCenter are components of vSphere. ESXi server is the most important part of
vSphere. ESXi is the virtualization server. It is type 1 hypervisor. All the virtual machines or Guest OS are
installed on ESXi server. To install, manage and access those virtual servers which sit above of ESXi server, you
will need other part of vSphere suit called vSphere client or vCenter. Now, vSphere client allows administrators to
connect to ESXi servers and access or manage virtual machines. vSphere client is installed on the client machine
(e.g. Administrator’s laptop). The vSphere client is used from client machine to connect to ESXi server and do
management tasks. So now what is vCenter? Why we need it? Try cloning existing virtual machine using just
a vSphere client without vCenter server.
vCenter server is similar to vSphere client but it’s a server with more power. vCenter server is installed on
Windows Server or Linux Server. VMware vCenter server is a centralized management application that lets you
manage virtual machines and ESXi hosts centrally. vSphere client is used to access vCenter Server and
ultimately manage ESXi servers. vCenter server is compulsory for enterprises to have enterprise features like
vMotion, VMware High Availability, VMware Update Manager and VMware Distributed Resource Scheduler
(DRS). For example, you can easily clone existing virtual machine in vCenter server. So vCenter is another
important part of vSphere package. You have to buy vCenter license separately.
The diagram above shows vSphere suite in a more descriptive way. vSphere is a product suite, ESXi is a
hypervisor installed on a physical machine. vSphere Client is installed on laptop or desktop PC and is used to
access ESXi Server to install and manage virtual machines on ESXi server. vCenter server is installed as virtual
machine on top of ESXi server. vCenter server is a vSphere component which is mostly used in large
environment where there are many ESXi server and dozens of virtual machines. The vCenter server is also
accessed by vSphere client for management purpose. So, vSphere client is used to access ESXi server directly
in small environment. In larger environment, vSphere client is used again to access vCenter server which
ultimately manages ESXi server.
In How to Import a Virtual Machine into ESXi Part 1: P2V Migration, I described cold
and hot migrations, the difference between physical-to-virtual (P2V) and virtual-tovirtual (V2V) migrations, and how to perform a P2V migration using VMware vCenter
Converter. In the second half of this two-part series, I’ll explain how to import an
existing virtual machine (VM) into an ESX/ESXi Server.
VMware vCenter Converter supports several different kinds of virtual machines. It
can import into ESX/ESXi virtual machines created in a VMware application or in a
competing product. It’s important to note, however, that not all virtualization products
use the same virtualization method when running guest machines. VMware
Workstation, VMware Player, VMware Server, VMware Fusion, Parallels Desktop,
Microsoft Virtual PC and Microsoft Virtual Server — all of which are compatible with
vCenter Converter — use hosted virtualization.VMware ESX/ESXi Server and
Microsoft Hyper-V Server, on the other hand, use bare-metal virtualization to run
VMs. The former group of software runs on top of an existing operating system,
while the latter group runs on top of the host hardware.
These differences mean little once vCenter Converter has completed the conversion
process, but virtual machines created in hosted virtualization software require
different migration steps from virtual machines created in bare-metal virtualization
platforms.
Just about all V2V migrations are cold migrations, which require that the source
system be powered off during the conversion process. It is, however, possible to
perform a hot migration of a virtual machine using the hot migration method as
described in How to Import a Virtual Machine into ESXi: Part 1. After installing
vCenter Converter Standalone to the virtual machine, launch the Conversion wizard.
Select “Powered-On Machine” from the drop-down menu, click “Local Machine,” and
then follow the same steps as described in the section P2V: Hot Migration.
One thing to keep in mind before performing a hot migration, however, is that, in
some instances, vCenter Server can interfere with the migration process. If the
source system is inside a Distributed Resource Schedule (DRS) cluster that vCenter
Server controls, DRS Power Management (DPM) will turn off the ESX/ESXi host that
vCenter Converter is working with. Change DPM to Manual via the cluster’s Settings
screen before performing the hot migration. Once the migration is complete, revert
Power Management to its previous configuration.
Although hot migrations have their purpose, they’re only needed when a virtual
machine is too important to be taken offline. In all other instances, you should
perform a cold migration. The following steps detail the offline conversion process.
V2V: Cold Migration
1. Power down the source machine before proceeding. Select “Convert Machine”
from the toolbar to launch the Conversion wizard.
See steps 2a and 2b to import a VM from a hosted virtualization platform; See
steps 3a and 3b to import a VM from a bare-metal virtualization platform.
2a. Hosted Virtualization: Choose “VMware Workstation or Other VMware Virtual
Machine” or “Backup Image or Third-Party Virtual Machine” from the Source Type
drop-down menu, depending on which platform the source machine is using.
2b. Hosted Virtualization: Enter the full file or network path linking to the virtual
machine. Supported third-party platforms include Microsoft Virtual PC and Microsoft
Virtual Server (.vmc), and Parallels Desktop (.pvs). Use .vmx for virtual machines
created in VMware. Note that if you’re importing a VM from Microsoft Virtual PC, you
should remove the Virtual PC Additions from the machine, as they can interfere with
the conversion process.
Enter the login credentials for the server if accessing a network share, and then click
“Next.” Skip to step 4.
3a. Bare-Metal Virtualization: Select “VMware Infrastructure Virtual Machine” or
“Hyper-V Server” from the drop-down menu on the Source System screen. If vCenter
Converter is not installed to Hyper-V Server, a prompt will appear requesting
permission to install the application to the system. Confirm the installation of the
software to proceed with the conversion.
Enter the server address and login credentials for the ESX/ESXi or Hyper-V Server.
Click “Next” to go to the Source Machine screen.
3b. Bare-Metal Virtualization: Search through the inventory to locate the source
system. If you’re accessing ESX/ESXi through vCenter Server, choose “Hosts and
Clusters” or “VMs and Templates,” depending on where the source machine is
housed. Select the virtual machine to import into the ESX/ESXi Server, and then
click “Next.”
4. Select “VMware Infrastructure Virtual Machine” from the Select Destination Type
drop-down menu. Enter the address, user name, and password for ESX/ESXi Server
into the required fields. Click “Next” to go to the Destination Virtual Machine screen.
5. Enter a new name for the destination machine or use the default name. Select a
destination location for the VM if managing ESX/ESXi through vCenter Server. Click
“Next” to go to the Destination Location screen.
6. Select a host, resource pool, or cluster to accommodate the virtual machine;
select a datastore where the files associated with the virtual machine should be
stored (optional); and then select the virtual hardware version from the drop-down
menu (optional). Use Version 4 for machines running ESX/ESXi 3.x, Version 7 for
machines running ESX/ESXi 4.x, and Version 8 for machines running ESX/ESXi 5.x.
Click “Next” to go to the Options screen.
7. Click “Edit” to make changes to a hardware device. If you’re importing a virtual
machine based on the Microsoft Windows operating system, select “Advanced” from
the middle pane to view the Post-Conversion tab. Uncheck “Remove System
Restore Checkpoints on Destination.” Check “Reconfigure Destination Virtual
Machine” to personalize the OS (e.g., create a unique name and password, enter a
new product license, or change the workgroup or domain settings). Click “Next” after
making the desired changes.
8. Review your selections on the Summary screen; then click “Finish” to begin
importing the VM.
Download