Chapters 4 - 6 Flashcards
You have VUM installed, and you’ve configured it from the vSphere Desktop Client on your laptop. One of the other administrators on your team is saying that she can’t access or configure VUM and that there must be something wrong with the installation. What is the most likely cause of the problem?
The most likely cause is that the VUM plug-in hasn’t been installed in the other administrator’s vSphere Desktop Client. The plug-in must be installed on each instance of the vSphere Desktop Client in order to be able to manage VUM from that instance.
In addition to ensuring that all your ESX/ESXi hosts have the latest critical and security patches installed, you need to ensure that all your ESX/ESXi hosts have another specific patch installed. This additional
patch is noncritical and therefore doesn’t get included in the critical patch dynamic baseline. How do you work around this problem?
Create a baseline group that combines the critical patch dynamicbaseline with a fixed baseline that contains the additional patch you want installed on all ESX/ESXi hosts. Attach the baseline group to all your ESX/ESXi hosts. When you perform remediation, VUM will ensure that all the critical patches in the dynamic baseline plus the additional patch in the fixed baseline are applied to the hosts.
You’ve just finished upgrading your virtual infrastructure to VMware vSphere. What two additional tasks should you complete?
Upgrade VMware Tools in the guest OSs and then upgrade the virtual machine hardware to version 11.
How can you avoid VM downtime when applying patches (for example, remediating) to your ESX/ESXi hosts?
VUM automatically leverages advanced VMware vSphere features like Distributed Resource Scheduler (DRS). If you make sure that your ESX/ESXi hosts are in a fully automated DRS cluster, VUM will leverage vMotion and DRS to move VMs to other ESX/ESXi hosts, avoiding downtime to patch the hosts.
Which VUM functionality can simplify the process of upgrading vSphere across a large number of hosts and their VMs?
VUM can take care of these interactions in an automated fashion with what is known as an orchestrated upgrade. An orchestrated upgrade combines several baseline groups that include updates for the hosts and subsequent updates for the VMs’ hardware and VMware Tools.
Virtual appliance upgrade baselines can also be included. When combined with fully automated DRS clusters and sufficient redundant capacity,
potentially an entire vCenter’s host inventory can be upgraded in one orchestrated task.
Without using VUM, how else can you upgrade an existing host?
You can grab the CD install media and run an interactive
upgrade on the host. Or you can use the inherent command-line tool on the hosts’ themselves: esxcli software vib update (see VMware Knowledge Base article 2008939 for full details) or esxcli software vib install to patch them with individual VIBs.
You have just started a new job as the vSphere administrator at a company. The company hasn’t reviously centralized the hosts’ logs and you decide you want to collect them, and so you want to install the vSphere Syslog Collector tool and the ESXi Dump Collector tool as well. How do you install them on the company’s vCSA instance?
The Syslog Collector and ESXi Dump Collector are already included in vCSA and enabled by default. You should log into the vCSA console and check that the services are running and adjust the core dump’s repository so it’s large enough for their environment.
List the ways you can configure your hosts for centralized logging.
You can send core dumps to the ESXi Dump Collector by using
esxcli system coredump
at each host’s command line.
Use the Host Profiles feature in vCenter to propagate the same setting across multiple hosts, or continue to use the CLI on each host. Use the Web Client to configure each host via its advanced settings under
syslog .global.
Set each host via the CLI with
esxcli system syslog.
Use the Host Profiles feature in vCenter to propagate the same setting across multiple hosts, or continue to use one of the previous two methods on each host.
What factors contribute to the design of a virtual network and the components involved?
any factors contribute to a virtual network design: the number of physical network adapters in each ESXi host, using vSphere Standard Switches versus vSphere Distributed Switches, the presence or use of VLANs in the environment, the existing network topology, requirements for the support of LACP or port mirroring, and the connectivity needs of the VMs in the environment are all factors that will play a role in the final network design. These are some common questions to ask while designing
the network:
Do you have or need a dedicated network for management traffic, such
as for the management of physical switches?
Do you have or need a dedicated network for vMotion traffic?
Are you using 1 Gb Ethernet or 10 Gb Ethernet?
Do you have an IP storage network? Is this IP storage network a dedicated network? Are you running iSCSI or NAS/NFS?
Do you need extremely high levels of fault tolerance for VMs?
Is the existing physical network composed of VLANs?
Do you want to extend the use of VLANs into the virtual switches?
You’ve asked a fellow vSphere administrator to create a vSphere Distributed Switch for you, but the administrator can’t complete the task because he can’t find out how to do this with an ESXi host selected in thevSphere Web Client. What should you tell this administrator?
vSphere Distributed Switches aren’t created on a per–ESXi host basis but instead span multiple ESXi hosts at the same time. This is what enables the centralized configuration and management of distributed port groups. Tell the administrator to navigate to the Distributed Switches area of the vSphere Web Client to create a new vSphere Distributed Switch.
As a joint project between the networking and server teams, you are going to implement LACP in your VMware vSphere 5.5 environment. What are some limitations you need to know about?
While vSphere 5.5 and vSphere 6.0 boast enhanced LACP support over previous versions of vSphere, there are still limitations. You can’t have multiple active link aggregation groups (LAGs) for a particular distributed port group. You also can’t have both LAGs and stand-alone uplinks active for a given distributed port group. However, different distributed port groups could use different LAGs, if desired. The enhanced LACP support also requires the use of a version 5.5.0 vSphere Distributed Switch.
You’d like to use NIC teaming to bond multiple physical uplinks together for greater redundancy and improved throughput. When selecting the NIC teaming policy, you select Route Based On IP Hash, but then the vSwitch seems to lose connectivity. What could be wrong?
The Route Based On IP Hash load-balancing policy requires that the physical switch also be configured to support this arrangement. This is accomplished through link aggregation, referred to as EtherChannel in the
Cisco environment. Without an appropriate link aggregation configuration on the physical switch, using the IP hash load-balancing policy will result in a loss of connectivity. One of the other load-balancing policies, such as the default policy Route Based On Originating Virtual Port ID, may be more appropriate if the configuration of the physical switch cannot be modified.
How do you configure both a vSphere Standard Switch and a vSphere Distributed Switch to pass VLAN tags all the way up to a guest OS?
n a vSphere Standard Switch, you configure Virtual Guest Tagging (VGT, the name of this particular configuration) by setting the VLAN ID for the VM’s port group to 4095.
On a vSphere Distributed Switch, you enable VGT by setting the VLAN configuration for a distributed port group to VLAN Trunking and then specifying which VLAN IDs should be passed up to the guest OS.
What three third-party virtual switches are, as of this writing, available for vSphere environments?
As of this writing, the three third-party virtual switches available for use with vSphere are the Cisco Nexus 1000V, the IBM Distributed Virtual Switch 5000V, and the HP FlexFabric 5900v.
You have a networking application that needs to see traffic on the virtual network that is intended for other production systems on the same VLAN. The networking application accomplishes this by using Promiscuous mode. How can you accommodate the needs of this networking application without sacrificing the security of the entire virtual switch?
Because port groups (or distributed port groups) can override the security policy settings for a virtual switch, and because there can be multiple port groups/distributed port groups that correspond to a VLAN, the best solution involves creating another port group that has all the same settings as the other production port group, including the same VLAN ID.
This new port group should allow Promiscuous mode. Assign the VM with the networking application to this new port group, but leave the remainder of the VMs on a port group that rejects Promiscuous mode. This allows thenetworking application to see the traffic it needs to see without overly compromising the security of the entire virtual switch.