CIS Test 3 Flashcards
When is Cold Server-to-Server VM migration typically used?
Cold migration is typically used when a VM needs to be moved to another remote location or VDC.
Concurrent VM Server-to-Server Migration
Migrate a VM simultaneously to multiple hypervisors.
Hot-Suspended VM Server-to-Server Migration
Migrate a VM that is suspended.
Cold VM Server-to-Server Migration
Migrate a VM that is powered off.
Hot-On VM Server-to-Server Migration
Migrate a VM that is powered on.VM needs to be quiesced before migration.
4 Major Modes of VM Migration Between Servers
1) Hot-On 2) Cold 3) Hot-Suspended 4) Concurrent
VM state information
Include memory contents and all other information which identifies the VM.
Involves moving the entire active state of a VM from the source hypervisor to the target.
VM migration
VM identification information
Data, which maps the VM hardware elements such as BIOS, devices, CPU, and MAC address for Ethernet cards.
What happens after VM migration is complete
The VM in the source hypervisor needs to be deleted after migration is complete. Virtual disks are also deleted if they were actually moved.
True or False: In case of array-to-array migration, virtual disks are always moved from source array to target array.
TRUE
True or False: In case of server-to-server VM migration, virtual disks are not moved within clustered servers.
TRUE
Types of VM Migration
1) Server-to-Server 2) Array-to-Array
Involves movement of entire active state of a VM
VM migration process
Moving a VM from one hypervisor to another hypervisor
VM Migration
Asynchronous Replication Characteristics
Extended distanceNon zero RPO
Synchronous replication characteristics
Limited distanceNear zero RPO
All VM files are copied to the remote site.
Array-Based REMOTE Replication of VMs
LUNs are replicated between two sites using storage array replication technology.
Array-Based REMOTE Replication of VMs
True or False: VMs typically reside on LUNs that reside on the same storage arrays. In single-site replication, these LUNs are replicated using the array controller within the same storage array.
TRUE
Replication is done using array controller within the SAME storage array.
Array-Based LOCAL Replication of VMs
Creates copies of LUNs that contain VM files on the same storage array.
Array-Based Local Replication of VMs
Benefits of VM Templates
Increased efficiency, consistency and standardization. Repetitive installation and configuration tasked can be avoided. Deploying VMs from VM templates helps to enforce standards.
A reusable image created from a VM
VM Template
Two ways a VM Template is created
1) Convert a powered-off VM into a template. 2) Clone a VM into a template.
Master copy to create and provision new VMs.
VM Template
How does a linked clone differ from a snapshot?
A linked clone is a running VM that would change its state over time. However, a snapshot is only a state of the VM at a specific point-in-time, which cannot change on its own.
How is a linked clone handled after being made from a snapshot of the parent VM?
The snapshot is given a separate network identity and assigned to the hypervisor to run as independent VM.
How is a linked clone made?
From a snapshot of the parent VM.
How are writes of a linked clone captured?
Writes of the linked clone are captured in a separate delta disk of smaller size.
True or False: The virtual disk of the parent VM is read-only for the linked clone.
TRUE
Clone type that shares virtual disks with the parent VM
Linked Clone
True or False: The cloning process for a Full Clone may take a relatively longer time than a linked clone.
TRUE
An independent copy of a VM that does not share virtual disks with the parent.
Full Clone
Two type of VM clones
1) Full Clone 2) Linked Clone
Why is VM cloning helpful?
Installing a guest OS and applications on multiple VMs is a time consuming task. With clones, a user can make many copies of a VM from a single installation and configuration process.
Does a clone VM have a different MAC address than the parent VM?
Yes
Does a clone VM have a separate network identity from the parent VM?
Yes.
Can a clone VM share virtual disks with the parent VM?
Yes, in the case of a Linked clone.
True or False: Changes made to the parent VM do not appear in a clone.
TRUE
True or False: Changes made to a clone VM do not affect the parent VM.
TRUE
Created when the VM is required for a DIFFERENT use (for example, an identical VM needs to be deployed for testing purposes)
VM Clone
An identical copy of an existing VM
VM Clone
Reverting a VM to snapshot causes what?
Causes all settings configured in the Guest OS to be reverted to an earlier point in time.
When is a VM snapshot useful?
Useful when a VM needs to be reverted to the same state again. For example, when using a VM for testing purposes, upgrading or patching applications and servers.
Data of a VM consists of what?
Data includes all the files that makeup the VM including virtual disks, memory, and other devices, such as virtual NIC.
VM state consists of what?
State includes VM configuration files as well as its power status (on, off, suspended).
Preserves the state and data of a VM at a specific point in time
VM Snapshot
How storage array based replication works
Works by copying LUNs of the source VM to the target array.
Is performed at the storage array level.Is similar to traditional array based replication in the CDC.Is performed either at local (primary) site or to a remote (secondary) site.
Storage array-based replication
Enables replicating VMs between dissimilar storage.Creates VM snapshot, VM clone, or VM template.
Compute-based replication
Two VM replication methods
1) Compute-based replication 2) Storage array based replication
Where is quiescing performed?
At the application level, to achieve application-level consistency. Applications complete any pending transactions and write the pending data to the disk.
Pauses currently running applications within a VM and forcibly flushes all data in the memory to the disk.
Quiescing
Needed to ensure data integrity before VM replication starts
Quiescing of VM
Where VM replication is performed.
At the hypervisor level
VM restore steps
1) Selection of VM and virtual disks to restore from backup. 2) Selection of the destination. 3) Configuration settings.
Candidates for deduplication
Backup images of VM disk files
Backup that can be restored to dissimilar hardware resources and can recover servers remotely.
Image-based backup
Advantage of an image-based backup
All information can be collected in a single pass, providing a Bare Metal Recovery (BMR) capability.
Creates a copy of the guest OS, its data, VM state, and configurations.Restores directly at VM level only.Operates at hypervisor level.Mounts image on backup server.
Image-based backup
Requires installing a backup agent on a hypervisor.Cannot backup LUNs directly attached to a VM.
Backup VM files
Requires installing a backup agent on a VM.Can only backup virtual disk data.
Backup VM as a physical server
Disadvantage to backup of VM files
LUNs assigned directly to a VM (using RDM) cannot be backup up using this approach.
Backup method that uses snapshot and cloning techniques
Array-based
Backup option that may have a guest OS dependency, owing to file system structure.
File-based backup
Backup option that does not provide a way to access individual files
Image-based backup
Backup option that provides a way to access individual files.
File-based backup does.
Backup optimization method
Deduplication
Backup Options
1) File based 2) Image based
Included in a VM backup
Virtual disks containing system and application data. Configuration data including network and power state.
Site Failover Dependencies
VM migration capability - Reliable network infrastructure - Data backup and replication functionality
Preferred type of hypervisor for BC
Bare-metal (Type 1) hypervisor running directly on the physical compute.
IEEE 802.1AX
Link Aggregation Standard
True or False: After a NIC team is configured, the VM will not be aware of the underlying physical NICs.
TRUE
Enables failover in case of physical NIC failures / link outages
Physical NIC teaming
Supports the IEEE 802.1AX-2008 link aggregation standard.
Physical NIC teaming
Technique to enable multiple paths for accessing the same storage device.Provides dynamic failover to an alternate path if current active path fails.
Multipathing to storage
Requirements for multipating
1) Server needs two or more HBAs available.or 2) One HBA port is set up with multiple storage controllers
Causes of virtual network failure
1) An incorrect operation of the software components (e.g., virtual NIC, virtual switch). 2) Failure in the compute infrastructure (e.g., physical server going down, hypervisor crashes, VM crashes).
Three methods to protect physical networks using redundancy
1) Interconnect devices with redundant hot swappable components. 2) Redundant links and multipathing. 3) Redundant NICs and NIC teaming.
How to achieve high-availability design for storage infrastructure
1) Redundant array controllers to address primary array controller failures. 2) Redundant ports in a storage array if one of the currently active port fails. 3) Redundant storage array for when the whole array goes down.
Redundant Storage Components
Array Controllers - Ports in a Storage Array - Storage Arrays
Standby disk drive in a RAID array
Hot spare
Provides data protection against drive failures
RAID
True or False: The two VMs essentially access a common storage and appear as a single entity with a single IP address and a single MAC address to other VMs.
TRUE
Describe VMFT Failover
The primary and secondary VMs check the status of each other using heartbeats. If the primary VM fails, the other takes over immediately.
True or False: In a VMFT scenario, the primary and secondary VMs share the same virtual disk using VMFS, but all output (e.g., write) operations are performed only by the primary VM.
TRUE
VMFT
Virtual Machine Fault Tolerance
Creates a live instance of the primary VM that runs on another physical machine.
Virtual Machine Fault Tolerance (VMFT)
Uses a secondary VM running on another physical machine as a live copy of the primary VM.
VM Fault Tolerance
True or False: VMFS ensures that a VM cannot be opened by more that one hypervisor at a time.
True. When a VM is operating, VMFS locks those files so that other hypervisors cannot update them.
What does VMFS provide?
VMFS provides multiple VMs with shared access to a consolidated pool of clustered storage. A VM sees the (virtual) disks in a VMFS as local targets, when they are actually just files on the VMFS volume.
Uses a clustered file system, such as VMFS, to enable failover.
Clustered servers
Provides protection from server and hypervisor failures.
Clustered servers
Groups of physical servers are combined and managed as an aggregated compute resource pool.
Clustered Servers
How is failover enabled in a server cluster?
Clustered servers use a clustered file system, such as VMFS, to enable failover.
Other ways to eliminate SPOFs in a VDC
1) Configure multiple copies of virtual disks and VM configuration files. 2) Implement server clustering. 3) Employ a fault tolerance mechanism whereby two VMs in a cluster access the same set of storage volumes. If one of the VM fails, the other takes up the complete workload.
How to mitigate the effect of a local site failure
Implementation of a storage array at a remote site to replicate data
How to ensure continuous operation in the event of a disk failure
RAID configuration
How to enhance a storage array’s accessibility
Configure multiple storage array ports
Mitigation of switch failure
Configure multiple fabrics
Mitigation of single HBA failure
Configure multiple HBAs
SPOFs in VDC Network Infrastructure
Network components - Virtual network
SPOFs in VDC Storage Infrastructure
Storage array and its components - Virtual disks
SPOFs in VDC Compute Infrastructure
Physical server and hypervisor - VM and guest OS
True or False: Restoring of data after an outage in a VDC is faster and more reliable, compared to a CDC.
TRUE
True or False: It is comparatively easier to maintain VM copies in diverse geographic locations, which makes the BC process robust.
TRUE
True or False: Different DR policies may be applied to different VMs, even if they are running on the same physical server.
TRUE
Six Advantages of Compute Virtualization in BC
1) Hardware independence 2) Cross platform compatibility 3) Mutual isolation 4) Encapsulation of complete computing environment 5) Relatively robust BC processes 6) Higher data availability
Included in BC technology for data protection
Backup and replication of data (similar to CDC environment).
BC planning should include what?
End-to-end protection of both physical and virtual resources at the compute, storage, and network layers.
Ensuring BC mainly involves what?
Redundancy of components at each layer (compute, storage, & network)
Backup option that is independent of the guest OS running on the VM.
Image-based backup
Cloud Challenges for the Provider
1) Service Warranty and Service Cost 2) Huge Numbers of Software to Manage 3) No Standard Cloud Access Interface
Cloud Challenges for the Consumer
1) Security and Regulation 2) Network Latency 3) Supportability 4) Interoperability
Key cost savings provided by cloud computing
Savings in:1) Infrastructure costs 2) Management costs 3) Power and energy costs
Cloud deployment model where the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns.Managed by organizations or by a third party.
Community Cloud
Advantage of a hybrid cloud approach
Allows a business to take advantage of the scalability and cost-effectiveness that a public Cloud Computing environment offers without exposing mission critical applications and data to third-party vulnerabilities.
Cloud deployment model where an organization consumes resources from both private and public Clouds.
Hybrid Cloud
Another name for an on-premise private cloud
Internal cloud
Two variations of the Private Cloud model
1) On-Premise Private Cloud 2) Externally-Hosted Private Cloud
Three Deployment Models of Cloud Computing
1) Private 2) Public 3) Hybrid
Software-as-a-Service solution for CRM applications
Salesforce.com
Software-as-a-Solution for online backup
EMC Mozy
Advantages of SaaS
1) Reduces the need for infrastructure (because storage and compute powers can be provided remotely). 2) Reduces the need for manual updates (because SaaS providers can perform those tasks automatically).
Cloud model where billing is based on application usage.
Software-as-a-Service
Cloud model where application is accessible from various client devices (e.g., via a thin client interface such as a Web browser).
Software-as-a-Service
Complete stack including application is provided as a service.
Software-as-a-Service
Capability provided to the consumer to use a provider’s applications running in a Cloud infrastructure.
Software-as-a-Service
PaaS example that provides diverse functionalities to build applications.Visual Studio and .Net are used to build applications.Build applications also in Java and PHP using Eclipse and other tools.
Microsoft Azure Platform
PaaS example that provides platform for consumers to deploy or create their own applications.Provides Java and Python environment to create and deploy application.Allows dynamic allocation of system resources for an application based on the actual demand.
Google App Engine
PaaS Examples
1) Google App Engine 2) Microsoft Azure Platform
Cloud model where consumer has control over deployed applications and possible application hosting environment configurations.
Platform-as-a-Service
Cloud model where consumer is billed for platform software components (OS, DB, middleware)
Platform-as-a-Service
Capability provided to the consumer to deploy consumer-created or acquired applications on the Cloud provider’s infrastructure.
Platform-as-a-Service
Example of an IaaS model that provides resizable compute capacity on a pay-per-use basis.
Amazon Elastic Compute Cloud (EC2)
IaaS example that provides Storage as a service, Internet accessible, on demand service
EMC Atmos Online
IaaS Examples
1) Amazon Elastic Compute Cloud (EC2) 2) EMC Atmos Online
True or False: In a IaaS model, scaling and elasticity are the responsibilities of the consumer, not the provider.
TRUE
Pays for infrastructure components usage, for example, storage capacity, CPU usage, etc.
Infrastructure-as-a-Service (IaaS)
Enables consumers to deploy and run software, including OS and applications.
Infrastructure-as-a-Service (IaaS)
Provides capability to the consumer to hire infrastructure components such as servers, storage, and network.
Infrastructure-as-a-Service (IaaS)
Three Categories of Cloud Services
1) Infrastructure-as-a-Service (IaaS) 2) Platform-as-a-Service (PasS) 3) Software-as-a-Service (SaaS)
Five Cloud Computing Benefits
1) Reduced IT Cost 2) Business Agility Support 3) Flexible Scaling 4) High Availability 5) Less Energy Consumption
Enable transforming capital expenditure (CAPEX) into ‘pay as you use’ operational cost.
Metered services
Provides billing and chargeback information for the Cloud resource used by the consumer.
Metered Service
Ability to scale IT resources rapidly, as required, to fulfill the changing needs without interruption of service.
Rapid Elasticity
Basis for dynamic assignment and reassignment of resources
Consumer demand
Pooled to serve multiple consumers
IT resources (compute, storage, network)
True or False: The consumer has no knowledge about the exact location of the resources provided.
TRUE
Enables accessing the services from anywhere across the globe.
Broad Network Access
Eliminates the need for accessing a particular client platform to access the services.
Broad Network Access
Client platforms from which cloud services are accessed.
Desktop computers - Laptops - Mobile phones - Thin Clients
Allows provisioning of resources using self-service interface.
On-Demand Self-Service
Facilitates consumer to leverage “ready to use” services or, enables to choose required services form the service catalog.
On-Demand Self-Service
Enables consumers to get computing resources as and when required, without any human intervention.
On-Demand Self-Service
Five essential characteristics of Cloud Computing
1) On-Demand Self Service 2) Broad Network Access 3) Resource Pooling 4) Rapid Elasticity 5) Measured Service
A deployed SOA-based architecture provides what?
A set of services that can be used in multiple business domains.
Form of distributed computing which applies the resources of numerous computers in a network to work on a single complex task at the same time.
Grid Computing